首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
Advisory Individualisation in the Financial Services Sector — Implementation Concepts and Legal Requirements This article describes the individualisation of advisories in the financial services sector, especially the consideration of situations and roles. An important aspect in this context is the connection between the requirements imposed by the law (consumer protection and data protection) and the individualisation. Discussing this topic the article concludes that the individualisation benefits from the consumer protection in the financial services sector — in contrast to many other sectors — because of the documentation requirements imposed by this law. After introducing a concept for an individualised financial advisory (which describes the data necessary for an advisory, relationships between the data and factors influencing the data) two influencing factors are focussed: Situations and roles. The situations and roles relevant for a financial advisory are categorised and their impact on the advisory is illustrated by examples. Finally the customer view on the application of situation and roles in an advisory is discussed.
Eingereicht am 2006-06-05, nach drei überarbeitungen angenommen am 2006-09-22 durch die Herausgeber des Schwerpunktthemas.  相似文献   

2.
Using Customer Data to Minimize the Risk of Default in Distance Selling In distance selling, customers and merchants get together in an anonymous way — at least for the first contact. Merchants have to form an opinion about the credibility of their customers to reduce the risk of defaults to a minimum. Various mechanisms to prevent such risks are known from the banking and insurance industry, e.g. consumer scoring, which is normally based on internal and external data about the credibility and buying patterns of customers. The focus of this article is on customer data with so called negative attributes as well as the ‘value’ of additional data (in particular Marketing data with so called positive attributes). There, especially the area of conflict between the economic necessity from the merchant’s perspective and resulting limitation of informational self-determination of the customer will be discussed.
Eingereicht am 2006-04-24, nach drei überarbeitungen angenommen am 2006-09-22 durch die Herausgeber des Schwerpunktthemas.  相似文献   

3.
Beziehungsmarketing aus Kundensicht   总被引:1,自引:1,他引:0  
Relationship Marketing from a Customer’s Perspective Companies need a wealth of personal data in order to address customers in a targeted manner. Utilizing IT enables them to directly address customers in order to increase sales by improving customer retention. The use of personal data becomes problematic when customers decline the use of their data. If companies ignore their customers’ privacy preferences, their chances of retaining them with targeted offers decline. In this paper, we first identify opportunities and drawbacks of individualization measures from a customer’s perspective based on the findings of a qualitative survey. The results of a quantitative survey illustrate how people’s general attitude toward personal data transmission determines their perception of personalization measures.
Engereicht am 2006-05-12, nach fünf überarbeitungen angenommen am 2006-10-15 durch die Herausgeber des Schwerpunktthemas.  相似文献   

4.
In Germany it is intended that each insurant in the compulsory health insurance will get a Patient Data Card by 2006-01-01. This project report characterizes the present state of the system architecture for the telematics infrastructure elaborated by the self-administration of German health care. The introduction of the Patient Data Card aims at increasing the quality in medical care as well as improvement of cost effectiveness and transparency of health care output. The great deal of actors and the high amount of requirements concerning law including data privacy, and engineering including security and reliability cause a highly complex project. The overall system architecture is based on legacy systems which are connected to the telematics infrastructure and its new services by special modules.  相似文献   

5.
6.
The importance of information in today’ss society is still growing and information search has become an essential task in both the workplace and in private life. Search engines provide access to the abundance of information available, but show certain limitations in dealing with the typical information overload problems. With the application of personalisation techniques search engine providers aim at moderating some of the problems by providing users with information access individualised to their needs. The aim of this paper is twofold. Firstly, a state-of-the-art overview of research on the personalisation of search services is given. For doing so, various techniques for search engine personalisation are discussed and structured along the lines of a typical user search process. Secondly, the list of techniques is used to classify a sample of 20 search engines in order to illustrate the application of search personalisation in practice. The results are discussed and implications for future research are derived.  相似文献   

7.
ABSTRACT

Context-aware systems enable the sensing and analysis of user context in order to provide personalised services. Our study is part of growing research efforts examining how high-dimensional data collected from mobile devices can be utilised to infer users’ dynamic preferences that are learned over time. We suggest novel methods for inferring the category of the item liked in a specific contextual situation, by applying encoder-decoder learners (long short-term memory networks and auto encoders) on mobile sensor data. In these approaches, the encoder-decoder learners reduce the dimensionality of the contextual features to a latent representation which is learned over time. Given new contextual sensor data from a user, the latent patterns discovered from each deep learner is used to predict the liked item’s category in the given context. This can greatly enhance a variety of services, such as mobile online advertising and context-aware recommender systems. We demonstrate our contribution with a point of interest (POI) recommender system in which we label contextual situations with the items’ categories. Empirical results utilising a real world data set of contextual situations derived from mobile phones sensors log show a significant improvement (up to 73% improvement) in prediction accuracy compared with state of the art classification methods.  相似文献   

8.
Privacy-preserving SVM classification   总被引:2,自引:2,他引:0  
Traditional Data Mining and Knowledge Discovery algorithms assume free access to data, either at a centralized location or in federated form. Increasingly, privacy and security concerns restrict this access, thus derailing data mining projects. What is required is distributed knowledge discovery that is sensitive to this problem. The key is to obtain valid results, while providing guarantees on the nondisclosure of data. Support vector machine classification is one of the most widely used classification methodologies in data mining and machine learning. It is based on solid theoretical foundations and has wide practical application. This paper proposes a privacy-preserving solution for support vector machine (SVM) classification, PP-SVM for short. Our solution constructs the global SVM classification model from data distributed at multiple parties, without disclosing the data of each party to others. Solutions are sketched out for data that is vertically, horizontally, or even arbitrarily partitioned. We quantify the security and efficiency of the proposed method, and highlight future challenges. Jaideep Vaidya received the Bachelor’s degree in Computer Engineering from the University of Mumbai. He received the Master’s and the Ph.D. degrees in Computer Science from Purdue University. He is an Assistant Professor in the Management Science and Information Systems Department at Rutgers University. His research interests include data mining and analysis, information security, and privacy. He has received best paper awards for papers in ICDE and SIDKDD. He is a Member of the IEEE Computer Society and the ACM. Hwanjo Yu received the Ph.D. degree in Computer Science in 2004 from the University of Illinois at Urbana-Champaign. He is an Assistant Professor in the Department of Computer Science at the University of Iowa. His research interests include data mining, machine learning, database, and information systems. He is an Associate Editor of Neurocomputing and served on the NSF Panel in 2006. He has served on the program committees of 2005 ACM SAC on Data Mining track, 2005 and 2006 IEEE ICDM, 2006 ACM CIKM, and 2006 SIAM Data Mining. Xiaoqian Jiang received the B.S. degree in Computer Science from Shanghai Maritime University, Shanghai, 2003. He received the M.C.S. degree in Computer Science from the University of Iowa, Iowa City, 2005. Currently, he is pursuing a Ph.D. degree from the School of Computer Science, Carnegie Mellon University. His research interests are computer vision, machine learning, data mining, and privacy protection technologies.  相似文献   

9.
ABSTRACT

Embedded devices are becoming ubiquitous in both domestic and commercial environments. Although smartphones, tablets, and video game consoles are all labeled by their primary function, most of these devices offer additional features and are capable of additional interactivity. Given the proprietary nature of such devices in terms of hardware and software and the protection mechanisms incorporated into these systems, it is and will continue to be extremely difficult to use “traditional digital forensics” methodologies to access storage media and acquire data for analysis. This paper examines how consumer law may be stifling research that the forensic community could ultimately depend upon to examine devices.  相似文献   

10.
Pervasive computing creates possibilities for presenting highly personalised information about the people, places and things in a building. One of the challenges for such personalisation is the creation of the system that can support ontological reasoning for several key tasks: reasoning about location; personalisation of information about location at the right level of detail; and personalisation to match each person’s conceptions of the building based on their own use of it and their relationship to other people in the building. From pragmatic perspectives, it should be inexpensive to create the ontology for each new building. It is also critical that users should be able to understand and control pervasive applications. We created the PERSONAF (personalised pervasive scrutable ontological framework) to address these challenges. PERSONAF is a new abstract framework for pervasive ontological reasoning. We report its evaluation at three levels. First, we assessed the power of the ontology for reasoning about noisy and uncertain location information, showing that PERSONAF can improve location modelling. Notably, the best ontological reasoner varies across users. Second, we demonstrate the use of the PERSONAF framework in Adaptive Locator, an application built upon it, using our low cost mechanisms for non-generic layers of the ontology. Finally, we report a user study, which evaluated the PERSONAF approach as seen by users in the Adaptive Locator. We assessed both the personalisation performance and the understandability of explanations of the system reasoning. Together, these three evaluations show that the PERSONAF approach supports building of low cost ontologies, that can achieve flexible ontological reasoning about smart buildings and the people in them, and that this can be used to build applications which give personalised information that can provide understandable explanations of the reasoning underlying the personalisation.  相似文献   

11.
ABSTRACT

The paper aims to analyse the problem of quality evaluation and personalisation of virtual reality/augmented reality/mixed reality (VR/AR/MR). First of all, systematic review of relevant scientific literature on the research topic was conducted. After that, findings of the systematic review concerning evaluation of quality and personalisation of VR/AR/MR learning environments are presented. The author’s VR/AR/MR learning systems/environments quality evaluation and personalisation framework is also presented in the paper. Evaluation of quality of VR/AR/MR platforms/environments should be based on (a) applying both expert-centred (top-down) and user-centred (bottom-up) quality evaluation methods and (b) separating ‘internal quality’ criteria, and ‘quality in use’ criteria in the set of quality criteria (model). Personalisation of VR/AR/MR platforms/environments should be based on learners’ models/profiles using students’ learning styles, intelligent technologies, and Semantic Web applications.  相似文献   

12.
ABSTRACT

Digital watermarking for relational databases emerged as a candidate solution to provide copyright protection and tamper detection and to maintain the integrity of data. Sectors such as defense, finance, and human resources require reliable schemes, especially for data alteration and integrity checking. Many watermarking techniques have been proposed in the literature to address the above-mentioned problems subject to their limitations on numeric attributes. However, these techniques do not yield satisfactory results in the case of small numeric values. To overcome these limitations, we have proposed a watermarking scheme in which the third most significant bit of numeric and nonnumeric attributes is replaced with the watermark bit without loss of originality. The proposed scheme must be suitable for the above-mentioned sectors, including commercial banks where fraud and forgery cases are common.  相似文献   

13.
We define a set of 2 n−1−1 entanglement monotones for n qubits and give a single measure of entanglement in terms of these. This measure is zero except on globally entangled (fully inseparable) states. This measure is compared to the Meyer–Wallach measure for two, three, and four qubits. We determine the four-qubit state, symmetric under exchange of qubit labels, which maximizes this measure. It is also shown how the elementary monotones may be computed as a function of observable quantities. We compute the magnitude of our measure for the ground state of the four-qubit superconducting experimental system investigated in [M. Grajcar et al., Phys. Rev. Lett. 96, 047006 (2006)], and thus confirm the presence of global entanglement in the ground state.   相似文献   

14.
Zusammenfassung In vielen Wissenschaften, so auch in der Angewandten Mathematik, hat sich in letzter Zeit ein innerer Strukturwandel, insbesondere eine starke Wendung zum Abstrakten hin, vollzogen, welche sich z. B. in der ausgiebigen Verwendung funktionalanalytischer Methoden äußert. In diesem zusammenfassenden Vortrag wird versucht, am Beispiel der Halbordnung die Verwendung und den Nutzen abstrakter Begriffe in der Numerischen Mathematik zu zeigen. Die Halbordnung wird u. a. benutzt bei den Begriffen:Rieszscher Halbordnungs-Banachraum, pseudometrischer Raum, Intervall, monotoner Operator, positiver Operator, lineare und nichtlineare Optimierung. Anwendungen der monotonen Operatoren werden beschrieben bei der Biegegleichung für Träger, bei Randwertaufgaben linearer und nichtlinearer elliptischer Differentialgleichungen, bei der Extrapolation für Anfangswertaufgaben und bei Eigenwertaufgaben. Es werden die Zusammenhänge zwischen verschiedenen Gebieten betont, z. B. zwischen Randwertaufgaben und Optimierungsaufgaben.
Summary As in many branches of science, there has been a change of inner structure taking place in Applied Mathematics in recent times, with a marked turn towards abstraction, exemplified by the wide use of methods of functional analysis. In this summarizing lecture, an attempt is made to demonstrate the useful application of abstract notions in Numerical Mathematics, especially by means of the concept of partial order. This concept is used, for instance, in connection withRiesz' partially ordered Banachspaces, pseudometric spaces, intervals, monotone and positive operators, linear and nonlinear optimization. Applications of monotone operators are given for benting of beams, boundary value problems for linear and nonlinear elliptic differential equations, extrapolation for initial value problems and eigenvalue problems. Emphasis is laid on the interrelation between various problem areas, e.g. between boundary value problems and optimization problems.


Mit 18 Textabbildungen

Erweiterte Fassung eines Vortrages, gehalten am 11. November 1965, anläßlich der 150-Jahrfeier der Technischen Hochschule Wien.  相似文献   

15.
16.
Zusammenfassung Neben den elektronischen Digitalrechenanlagen gewinnt heute der elektronische Analogrechner und seine Verallgemeinerung zum iterativen Analogrechner, sowie der durch einen Digitalrechner gesteuerte Analogrechner und schließlich die Verbindung von Analog- und Digitalrechner im Hybridrechner zunehmende Bedeutung. Das gilt vor allem für solche mathematische Problemstellungen, bei denen die große Genauigkeit des Digitalrechners nicht erforderlich ist, andererseits aber die typischen Eigenschaften des Analogrechners einen raschen Überblick über die Eigenschaften der Lösungen ermöglichen. Aus der Fülle derartiger Anwendungen seien im folgenden Probleme der Unternehmungsforschung herausgegriffen.
Summary Besides the electronic digital computers electronic analog computers and their generalisations to iterativ-analog computers or analog computers controlled by digital computers and finally the connection of analog and digital computers in hybrid computers are of increasing importance especially for those mathematical problems, which do not need the high accuracy of digital computers, whereas the typical possibilities of the analog computers allow a quick survey of the features of the solutions. From these applications we choose a few problems of operations research.


Mit 11 Textabbildungen

Vortrag, gehalten am 12. November 1965 anläßlich der 150-Jahrfeier der Technischen Hochschule Wien.  相似文献   

17.
Abstract

Customer satisfaction. It is what we all want, but it can be difficult to ensure, even under the best conditions. Especially when your information work- place is under attack. The Radicati Group estimates that threats to the information workplace will cost companies over $54 billion by 2006. The writers of new viruses are much better at infiltrating corporate networks; they exploit system vulnerabilities, use sophisticated programming techniques, and constantly change subject lines and attachment names.  相似文献   

18.
ABSTRACT

In April 2006, Alliance Library System and Online Programming for All Libraries partnered to start the Second Life Library 2.0 in the online world Second Life and in August 2006 purchased an island on the Teen grid of Teen Second Life. Second Life is a virtual world, a descendant of multiplayer online games. Educational institutions have recently been drawn into Second Life's robust economy and vibrant cultural life. The Second Life Library 2.0 works with librarians from around the world and with other educational partners such as TechSoup, WorldBridges, and the New Media Consortium. Second Life Library 2.0 provides “traditional” library services such as ready reference, book discussions, and search assistance, but, at heart, it explores what it means to be a virtual library in a virtual world.  相似文献   

19.
ABSTRACT

A common personalisation approach in educational systems is mastery learning. A key step in this approach is a criterion that determines whether a learner has already achieved mastery. We thoroughly analyse several mastery criteria for the basic case of a single well-specified knowledge component. For the analysis we use experiments with both simulated and real data. The results show that the choice of data sources used for mastery decision and the setting of thresholds are more important than the choice of a learner modelling technique. We argue that a simple exponential moving average method is a suitable technique for mastery criterion and discuss techniques for the choice of a mastery threshold. We also propose an extension of the exponential moving average method that takes into account practical aspects like time intensity of items and we report on a practical application of this mastery criterion in a widely used educational system.  相似文献   

20.
IT/Business Alignment IT/Business Alignment has become a key issue for many companies. Therefore a lot of companies, institutions and universities have published documents about this topic. This paper is intended to give an overview of these resources found in the Internet.
  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号