共查询到20条相似文献,搜索用时 31 毫秒
1.
Advisory Individualisation in the Financial Services Sector — Implementation Concepts and Legal Requirements
This article describes the individualisation of advisories in the financial services sector, especially the consideration
of situations and roles. An important aspect in this context is the connection between the requirements imposed by the law
(consumer protection and data protection) and the individualisation. Discussing this topic the article concludes that the
individualisation benefits from the consumer protection in the financial services sector — in contrast to many other sectors
— because of the documentation requirements imposed by this law. After introducing a concept for an individualised financial
advisory (which describes the data necessary for an advisory, relationships between the data and factors influencing the data)
two influencing factors are focussed: Situations and roles. The situations and roles relevant for a financial advisory are
categorised and their impact on the advisory is illustrated by examples. Finally the customer view on the application of situation
and roles in an advisory is discussed.
Eingereicht am 2006-06-05, nach drei überarbeitungen angenommen am 2006-09-22 durch die Herausgeber des Schwerpunktthemas. 相似文献
2.
Using Customer Data to Minimize the Risk of Default in Distance Selling
In distance selling, customers and merchants get together in an anonymous way — at least for the first contact. Merchants
have to form an opinion about the credibility of their customers to reduce the risk of defaults to a minimum. Various mechanisms
to prevent such risks are known from the banking and insurance industry, e.g. consumer scoring, which is normally based on
internal and external data about the credibility and buying patterns of customers. The focus of this article is on customer
data with so called negative attributes as well as the ‘value’ of additional data (in particular Marketing data with so called
positive attributes). There, especially the area of conflict between the economic necessity from the merchant’s perspective
and resulting limitation of informational self-determination of the customer will be discussed.
Eingereicht am 2006-04-24, nach drei überarbeitungen angenommen am 2006-09-22 durch die Herausgeber des Schwerpunktthemas. 相似文献
3.
Beziehungsmarketing aus Kundensicht 总被引:1,自引:1,他引:0
Horst Treiblmaier 《WIRTSCHAFTSINFORMATIK》2007,49(1):42-48
Relationship Marketing from a Customer’s Perspective
Companies need a wealth of personal data in order to address customers in a targeted manner. Utilizing IT enables them to
directly address customers in order to increase sales by improving customer retention. The use of personal data becomes problematic
when customers decline the use of their data. If companies ignore their customers’ privacy preferences, their chances of retaining
them with targeted offers decline. In this paper, we first identify opportunities and drawbacks of individualization measures
from a customer’s perspective based on the findings of a qualitative survey. The results of a quantitative survey illustrate
how people’s general attitude toward personal data transmission determines their perception of personalization measures.
Engereicht am 2006-05-12, nach fünf überarbeitungen angenommen am 2006-10-15 durch die Herausgeber des Schwerpunktthemas. 相似文献
4.
Lösungsarchitektur für die Einführung der elektronischen Gesundheitskarte und der auf ihr basierenden Anwendungen 总被引:1,自引:0,他引:1
In Germany it is intended that each insurant in the compulsory health insurance will get a Patient Data Card by 2006-01-01. This project report characterizes the present state of the system architecture for the telematics infrastructure elaborated by the self-administration of German health care. The introduction of the Patient Data Card aims at increasing the quality in medical care as well as improvement of cost effectiveness and transparency of health care output. The great deal of actors and the high amount of requirements concerning law including data privacy, and engineering including security and reliability cause a highly complex project. The overall system architecture is based on legacy systems which are connected to the telematics infrastructure and its new services by special modules. 相似文献
5.
6.
The importance of information in today’ss society is still growing and information search has become an essential task in both the workplace and in private life. Search engines provide access to the abundance of information available, but show certain limitations in dealing with the typical information overload problems. With the application of personalisation techniques search engine providers aim at moderating some of the problems by providing users with information access individualised to their needs. The aim of this paper is twofold. Firstly, a state-of-the-art overview of research on the personalisation of search services is given. For doing so, various techniques for search engine personalisation are discussed and structured along the lines of a typical user search process. Secondly, the list of techniques is used to classify a sample of 20 search engines in order to illustrate the application of search personalisation in practice. The results are discussed and implications for future research are derived. 相似文献
7.
Moshe Unger Bracha Shapira Lior Rokach Amit Livne 《New Review of Hypermedia and Multimedia》2018,24(3):262-290
ABSTRACTContext-aware systems enable the sensing and analysis of user context in order to provide personalised services. Our study is part of growing research efforts examining how high-dimensional data collected from mobile devices can be utilised to infer users’ dynamic preferences that are learned over time. We suggest novel methods for inferring the category of the item liked in a specific contextual situation, by applying encoder-decoder learners (long short-term memory networks and auto encoders) on mobile sensor data. In these approaches, the encoder-decoder learners reduce the dimensionality of the contextual features to a latent representation which is learned over time. Given new contextual sensor data from a user, the latent patterns discovered from each deep learner is used to predict the liked item’s category in the given context. This can greatly enhance a variety of services, such as mobile online advertising and context-aware recommender systems. We demonstrate our contribution with a point of interest (POI) recommender system in which we label contextual situations with the items’ categories. Empirical results utilising a real world data set of contextual situations derived from mobile phones sensors log show a significant improvement (up to 73% improvement) in prediction accuracy compared with state of the art classification methods. 相似文献
8.
Privacy-preserving SVM classification 总被引:2,自引:2,他引:0
Traditional Data Mining and Knowledge Discovery algorithms assume free access to data, either at a centralized location or
in federated form. Increasingly, privacy and security concerns restrict this access, thus derailing data mining projects.
What is required is distributed knowledge discovery that is sensitive to this problem. The key is to obtain valid results,
while providing guarantees on the nondisclosure of data. Support vector machine classification is one of the most widely used
classification methodologies in data mining and machine learning. It is based on solid theoretical foundations and has wide
practical application. This paper proposes a privacy-preserving solution for support vector machine (SVM) classification,
PP-SVM for short. Our solution constructs the global SVM classification model from data distributed at multiple parties, without
disclosing the data of each party to others. Solutions are sketched out for data that is vertically, horizontally, or even
arbitrarily partitioned. We quantify the security and efficiency of the proposed method, and highlight future challenges.
Jaideep Vaidya received the Bachelor’s degree in Computer Engineering from the University of Mumbai. He received the Master’s and the Ph.D.
degrees in Computer Science from Purdue University. He is an Assistant Professor in the Management Science and Information
Systems Department at Rutgers University. His research interests include data mining and analysis, information security, and
privacy. He has received best paper awards for papers in ICDE and SIDKDD. He is a Member of the IEEE Computer Society and
the ACM.
Hwanjo Yu received the Ph.D. degree in Computer Science in 2004 from the University of Illinois at Urbana-Champaign. He is an Assistant
Professor in the Department of Computer Science at the University of Iowa. His research interests include data mining, machine
learning, database, and information systems. He is an Associate Editor of Neurocomputing and served on the NSF Panel in 2006.
He has served on the program committees of 2005 ACM SAC on Data Mining track, 2005 and 2006 IEEE ICDM, 2006 ACM CIKM, and
2006 SIAM Data Mining.
Xiaoqian Jiang received the B.S. degree in Computer Science from Shanghai Maritime University, Shanghai, 2003. He received the M.C.S. degree
in Computer Science from the University of Iowa, Iowa City, 2005. Currently, he is pursuing a Ph.D. degree from the School
of Computer Science, Carnegie Mellon University. His research interests are computer vision, machine learning, data mining,
and privacy protection technologies. 相似文献
9.
《Information Security Journal: A Global Perspective》2013,22(1-3):39-47
ABSTRACTEmbedded devices are becoming ubiquitous in both domestic and commercial environments. Although smartphones, tablets, and video game consoles are all labeled by their primary function, most of these devices offer additional features and are capable of additional interactivity. Given the proprietary nature of such devices in terms of hardware and software and the protection mechanisms incorporated into these systems, it is and will continue to be extremely difficult to use “traditional digital forensics” methodologies to access storage media and acquire data for analysis. This paper examines how consumer law may be stifling research that the forensic community could ultimately depend upon to examine devices. 相似文献
10.
Pervasive computing creates possibilities for presenting highly personalised information about the people, places and things
in a building. One of the challenges for such personalisation is the creation of the system that can support ontological reasoning for several key tasks: reasoning about location; personalisation of information about location at the right level of detail;
and personalisation to match each person’s conceptions of the building based on their own use of it and their relationship
to other people in the building. From pragmatic perspectives, it should be inexpensive to create the ontology for each new
building. It is also critical that users should be able to understand and control pervasive applications. We created the PERSONAF
(personalised pervasive scrutable ontological framework) to address these challenges. PERSONAF is a new abstract framework
for pervasive ontological reasoning. We report its evaluation at three levels. First, we assessed the power of the ontology
for reasoning about noisy and uncertain location information, showing that PERSONAF can improve location modelling. Notably,
the best ontological reasoner varies across users. Second, we demonstrate the use of the PERSONAF framework in Adaptive Locator,
an application built upon it, using our low cost mechanisms for non-generic layers of the ontology. Finally, we report a user
study, which evaluated the PERSONAF approach as seen by users in the Adaptive Locator. We assessed both the personalisation
performance and the understandability of explanations of the system reasoning. Together, these three evaluations show that
the PERSONAF approach supports building of low cost ontologies, that can achieve flexible ontological reasoning about smart
buildings and the people in them, and that this can be used to build applications which give personalised information that
can provide understandable explanations of the reasoning underlying the personalisation. 相似文献
11.
Eugenijus Kurilovas 《Behaviour & Information Technology》2016,35(11):998-1007
ABSTRACTThe paper aims to analyse the problem of quality evaluation and personalisation of virtual reality/augmented reality/mixed reality (VR/AR/MR). First of all, systematic review of relevant scientific literature on the research topic was conducted. After that, findings of the systematic review concerning evaluation of quality and personalisation of VR/AR/MR learning environments are presented. The author’s VR/AR/MR learning systems/environments quality evaluation and personalisation framework is also presented in the paper. Evaluation of quality of VR/AR/MR platforms/environments should be based on (a) applying both expert-centred (top-down) and user-centred (bottom-up) quality evaluation methods and (b) separating ‘internal quality’ criteria, and ‘quality in use’ criteria in the set of quality criteria (model). Personalisation of VR/AR/MR platforms/environments should be based on learners’ models/profiles using students’ learning styles, intelligent technologies, and Semantic Web applications. 相似文献
12.
《Information Security Journal: A Global Perspective》2013,22(3):105-116
ABSTRACT Digital watermarking for relational databases emerged as a candidate solution to provide copyright protection and tamper detection and to maintain the integrity of data. Sectors such as defense, finance, and human resources require reliable schemes, especially for data alteration and integrity checking. Many watermarking techniques have been proposed in the literature to address the above-mentioned problems subject to their limitations on numeric attributes. However, these techniques do not yield satisfactory results in the case of small numeric values. To overcome these limitations, we have proposed a watermarking scheme in which the third most significant bit of numeric and nonnumeric attributes is replaced with the watermark bit without loss of originality. The proposed scheme must be suitable for the above-mentioned sectors, including commercial banks where fraud and forgery cases are common. 相似文献
13.
Peter J. Love Alec Maassen van den Brink A. Yu. Smirnov M. H. S. Amin M. Grajcar E. Il’ichev A. Izmalkov A. M. Zagoskin 《Quantum Information Processing》2007,6(3):187-195
We define a set of 2
n−1−1 entanglement monotones for n qubits and give a single measure of entanglement in terms of these. This measure is zero except
on globally entangled (fully inseparable) states. This measure is compared to the Meyer–Wallach measure for two, three, and
four qubits. We determine the four-qubit state, symmetric under exchange of qubit labels, which maximizes this measure. It
is also shown how the elementary monotones may be computed as a function of observable quantities. We compute the magnitude
of our measure for the ground state of the four-qubit superconducting experimental system investigated in [M. Grajcar et al.,
Phys. Rev. Lett. 96, 047006 (2006)], and thus confirm the presence of global entanglement in the ground state.
相似文献
14.
Prof. Dr. Dr. h. c. L. Collatz 《Computing》1966,1(3):233-255
Zusammenfassung In vielen Wissenschaften, so auch in der Angewandten Mathematik, hat sich in letzter Zeit ein innerer Strukturwandel, insbesondere eine starke Wendung zum Abstrakten hin, vollzogen, welche sich z. B. in der ausgiebigen Verwendung funktionalanalytischer Methoden äußert. In diesem zusammenfassenden Vortrag wird versucht, am Beispiel der Halbordnung die Verwendung und den Nutzen abstrakter Begriffe in der Numerischen Mathematik zu zeigen. Die Halbordnung wird u. a. benutzt bei den Begriffen:Rieszscher Halbordnungs-Banachraum, pseudometrischer Raum, Intervall, monotoner Operator, positiver Operator, lineare und nichtlineare Optimierung. Anwendungen der monotonen Operatoren werden beschrieben bei der Biegegleichung für Träger, bei Randwertaufgaben linearer und nichtlinearer elliptischer Differentialgleichungen, bei der Extrapolation für Anfangswertaufgaben und bei Eigenwertaufgaben. Es werden die Zusammenhänge zwischen verschiedenen Gebieten betont, z. B. zwischen Randwertaufgaben und Optimierungsaufgaben.
Mit 18 Textabbildungen
Erweiterte Fassung eines Vortrages, gehalten am 11. November 1965, anläßlich der 150-Jahrfeier der Technischen Hochschule Wien. 相似文献
Summary As in many branches of science, there has been a change of inner structure taking place in Applied Mathematics in recent times, with a marked turn towards abstraction, exemplified by the wide use of methods of functional analysis. In this summarizing lecture, an attempt is made to demonstrate the useful application of abstract notions in Numerical Mathematics, especially by means of the concept of partial order. This concept is used, for instance, in connection withRiesz' partially ordered Banachspaces, pseudometric spaces, intervals, monotone and positive operators, linear and nonlinear optimization. Applications of monotone operators are given for benting of beams, boundary value problems for linear and nonlinear elliptic differential equations, extrapolation for initial value problems and eigenvalue problems. Emphasis is laid on the interrelation between various problem areas, e.g. between boundary value problems and optimization problems.
Mit 18 Textabbildungen
Erweiterte Fassung eines Vortrages, gehalten am 11. November 1965, anläßlich der 150-Jahrfeier der Technischen Hochschule Wien. 相似文献
15.
16.
Prof. Dr. J. Heinhold 《Computing》1966,1(3):197-213
Zusammenfassung Neben den elektronischen Digitalrechenanlagen gewinnt heute der elektronische Analogrechner und seine Verallgemeinerung zum iterativen Analogrechner, sowie der durch einen Digitalrechner gesteuerte Analogrechner und schließlich die Verbindung von Analog- und Digitalrechner im Hybridrechner zunehmende Bedeutung. Das gilt vor allem für solche mathematische Problemstellungen, bei denen die große Genauigkeit des Digitalrechners nicht erforderlich ist, andererseits aber die typischen Eigenschaften des Analogrechners einen raschen Überblick über die Eigenschaften der Lösungen ermöglichen. Aus der Fülle derartiger Anwendungen seien im folgenden Probleme der Unternehmungsforschung herausgegriffen.
Mit 11 Textabbildungen
Vortrag, gehalten am 12. November 1965 anläßlich der 150-Jahrfeier der Technischen Hochschule Wien. 相似文献
Summary Besides the electronic digital computers electronic analog computers and their generalisations to iterativ-analog computers or analog computers controlled by digital computers and finally the connection of analog and digital computers in hybrid computers are of increasing importance especially for those mathematical problems, which do not need the high accuracy of digital computers, whereas the typical possibilities of the analog computers allow a quick survey of the features of the solutions. From these applications we choose a few problems of operations research.
Mit 11 Textabbildungen
Vortrag, gehalten am 12. November 1965 anläßlich der 150-Jahrfeier der Technischen Hochschule Wien. 相似文献
17.
《Information Security Journal: A Global Perspective》2013,22(4):45-50
Abstract Customer satisfaction. It is what we all want, but it can be difficult to ensure, even under the best conditions. Especially when your information work- place is under attack. The Radicati Group estimates that threats to the information workplace will cost companies over $54 billion by 2006. The writers of new viruses are much better at infiltrating corporate networks; they exploit system vulnerabilities, use sophisticated programming techniques, and constantly change subject lines and attachment names. 相似文献
18.
Rebecca C. Hedreen Jennifer L. Johnson Mack A. Lundy Peg Burnette Carol Perryman Guus Van Den Brekel 《国际互联网参考资料服务季刊》2013,18(2-3):167-195
ABSTRACT In April 2006, Alliance Library System and Online Programming for All Libraries partnered to start the Second Life Library 2.0 in the online world Second Life and in August 2006 purchased an island on the Teen grid of Teen Second Life. Second Life is a virtual world, a descendant of multiplayer online games. Educational institutions have recently been drawn into Second Life's robust economy and vibrant cultural life. The Second Life Library 2.0 works with librarians from around the world and with other educational partners such as TechSoup, WorldBridges, and the New Media Consortium. Second Life Library 2.0 provides “traditional” library services such as ready reference, book discussions, and search assistance, but, at heart, it explores what it means to be a virtual library in a virtual world. 相似文献
19.
ABSTRACTA common personalisation approach in educational systems is mastery learning. A key step in this approach is a criterion that determines whether a learner has already achieved mastery. We thoroughly analyse several mastery criteria for the basic case of a single well-specified knowledge component. For the analysis we use experiments with both simulated and real data. The results show that the choice of data sources used for mastery decision and the setting of thresholds are more important than the choice of a learner modelling technique. We argue that a simple exponential moving average method is a suitable technique for mastery criterion and discuss techniques for the choice of a mastery threshold. We also propose an extension of the exponential moving average method that takes into account practical aspects like time intensity of items and we report on a practical application of this mastery criterion in a widely used educational system. 相似文献
20.
IT/Business Alignment
IT/Business Alignment has become a key issue for many companies. Therefore a lot of companies, institutions and universities
have published documents about this topic. This paper is intended to give an overview of these resources found in the Internet.
相似文献