Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- articleDecember 2024
The Influence of Readability of Financial App Privacy Policy on Enterprise Performance
Journal of Database Management (JDBM), Volume 35, Issue 1Pages 1–16https://doi.org/10.4018/JDM.361999From the perspective of the inhibition of privacy computing theory, taking user satisfaction as risk perception, this paper discusses how the readability of financial APP privacy policies inhibits user satisfaction, thus affecting enterprise performance. ...
- articleApril 2023
Credit Risk Models for Financial Fraud Detection: A New Outlier Feature Analysis Method of XGBoost With SMOTE
Journal of Database Management (JDBM), Volume 34, Issue 1Pages 1–20https://doi.org/10.4018/JDM.321739Outlier detection is currently applied in many fields, where existing research focuses on improving imbalanced data or enhancing classification accuracy. In the financial area, financial fraud detection puts higher demands on real-time and ...
- research-articleDecember 2022
Knowledge graph of mobile payment platforms based on deep learning: Risk analysis and policy implications
Expert Systems with Applications: An International Journal (EXWA), Volume 208, Issue Chttps://doi.org/10.1016/j.eswa.2022.118143AbstractThe Fintech mobile payment platform is expanding rapidly; this expansion, in turn, creates numerous risks. There is an urgent need to better understand these risks and to spur more secure payment behavior. This research aims to develop knowledge ...
- research-articleApril 2022
Knowledge acquisition model of mobile payment based on automatic summary technology
Electronic Commerce Research (KLU-ELEC), Volume 24, Issue 1Pages 131–154https://doi.org/10.1007/s10660-022-09553-9AbstractThe risks in mobile payment under Fintech have become an urgent problem to be addressed. This paper develops a research framework of knowledge acquisition and explores how automatic summarization technology helps extract knowledge of mobile ...
- research-articleJanuary 2022
Auto insurance fraud identification based on a CNN-LSTM fusion deep learning model
International Journal of Ad Hoc and Ubiquitous Computing (IJAHUC), Volume 39, Issue 1-2Pages 37–45https://doi.org/10.1504/ijahuc.2022.120943The traditional auto insurance fraud identification method relies heavily on feature engineering and domain knowledge, making it difficult to accurately and efficiently identify fraud when the amount of claim data is large and the data dimension is high. ...
-
- articleOctober 2020
Influential Factors of Knowledge Sharing of Multinational E-Health Service Based on 24HrKF
Journal of Global Information Management (JGIM), Volume 28, Issue 4Pages 52–73https://doi.org/10.4018/JGIM.2020100104In order to solve the problem of cross-time and cross-regional medical collaboration and distributed knowledge sharing across patients and medical teams for 24 hours a day in the context of global resource allocation, a new 24HrKF e-health service ...
- research-articleJune 2020
Sentiment analysis for online reviews using conditional random fields and support vector machines
Electronic Commerce Research (KLU-ELEC), Volume 20, Issue 2Pages 343–360https://doi.org/10.1007/s10660-019-09354-7AbstractSentiment analysis of online reviews is an important way of mining useful information from the Internet. Despite several advantages, the accuracy of sentiment analysis based on a domain dictionary relies on the comprehensiveness and accuracy of ...
- research-articleApril 2020
Creating the best first impression: Designing online product photos to increase sales
AbstractEffectively displaying goods in search results is valuable for B2C merchants to earn clicks from consumers and even increase sales. Taking down jackets and trousers sold on Tmall—China's largest B2C e-commerce platform—as the example, ...
Highlights- Study four photo elements: logo, promotional information, street scenes, and model
- ArticleApril 2010
Automated Assessment System for Subjective Questions Based on LSI
IITSI '10: Proceedings of the 2010 Third International Symposium on Intelligent Information Technology and Security InformaticsPages 250–254https://doi.org/10.1109/IITSI.2010.76Subjective question is capable of examining the adopting ability of knowledge of the student, but the assessment for it suffers from a number of questions such as trickiness, synonymy and polysemy. This reduces the advantage of subjective question for ...
- ArticleMarch 2010
The Customer Relationship Management Model Based on Optimal Control
CESCE '10: Proceedings of the 2010 International Conference on Challenges in Environmental Science and Computer Engineering - Volume 01Pages 253–255https://doi.org/10.1109/CESCE.2010.68According to the characteristics of customer relationship management, we build the optimal control model of customer relationship management using the optimal control theory. Through the model we can get some useful managerial insights into the customer ...
- ArticleNovember 2009
Social Networks Analysis of the Knowledge Diffusion among University Students
KAM '09: Proceedings of the 2009 Second International Symposium on Knowledge Acquisition and Modeling - Volume 02Pages 343–346https://doi.org/10.1109/KAM.2009.240Basing on the relationship between the network location of college students in the class and the knowledge diffusion, we gave the students major in Information Management and Information System of a university some questionnaires for collecting data. We ...
- ArticleAugust 2009
Case Study of Public Emergency Diffusion Based on SD Simulation Xintan Landslide in Three Gorges Dam Region
NCM '09: Proceedings of the 2009 Fifth International Joint Conference on INC, IMS and IDCPages 703–705https://doi.org/10.1109/NCM.2009.250Through field investigation, this paper establishes systematic dynamics model based on Xintan landslides in Three Gorges Dam Region and applies SD model to emulate the simulation of their diffusion. The results indicate that the landslide leads to 10 ...
- ArticleAugust 2009
Warning System Construction Research Based on Emergency Diffusion
NCM '09: Proceedings of the 2009 Fifth International Joint Conference on INC, IMS and IDCPages 679–681https://doi.org/10.1109/NCM.2009.248Based on phrase characteristics of public emergency diffusion, this paper establishes an emergency warning system consisting of five subsystems, then depicts the operation and functions of these subsystems and introduces the operation mechanism of this ...
- ArticleAugust 2009
A Study on the Algorithm Based on Image Color Correlation Mining
IAS '09: Proceedings of the 2009 Fifth International Conference on Information Assurance and Security - Volume 02Pages 377–380https://doi.org/10.1109/IAS.2009.143Because of the semantic gap between low-level feature and high-level semantic feature of images, the results of the traditional color-based image retrieval can’t meet users’ needs. In order to eliminate interference factors in the image retrieval, use ...
- ArticleJuly 2009
Streaming Media Information Services Based on Peer to Peer Technology
SSME '09: Proceedings of the 2009 IITA International Conference on Services Science, Management and EngineeringPages 404–407https://doi.org/10.1109/SSME.2009.77Streaming media is data that is delivered in a continuous stream to a client and that can be used as it arrives. With the rapid development of information technology, streaming media service is one of the important ways of the information services. P2P ...
- ArticleJuly 2009
Design of Distributed Architecture Based on Java Remote Method Invocation Technology
ESIAT '09: Proceedings of the 2009 International Conference on Environmental Science and Information Application Technology - Volume 02Pages 618–621https://doi.org/10.1109/ESIAT.2009.235Remote method invocation is a distributed object model for the Java programming language that making distributed objects easy to implement and tousle. Remote method invocation applications are often comprised of two separate programs: a Server and a ...
- ArticleJuly 2009
Analyzing and Designing of the Classroom Teaching System Based on the Network
ESIAT '09: Proceedings of the 2009 International Conference on Environmental Science and Information Application Technology - Volume 02Pages 614–617https://doi.org/10.1109/ESIAT.2009.232The rapid development of the network technology greatly expands information communication between people and makes the network education become real. Network education has already been an important educational mode, while the teaching information system ...
- ArticleDecember 2008
Streaming Media Information Services Based on Grid
KAM '08: Proceedings of the 2008 International Symposium on Knowledge Acquisition and ModelingPages 814–818https://doi.org/10.1109/KAM.2008.120Under the grid environment, streaming media will become the main current of the network application. In this paper, from the application of the information service of streaming media, the author expounds that the streaming media technique system and the ...
- ArticleDecember 2008
MIS Implementing Approaches Choose Based on Analytic Hierarchy Process
ISCSCT '08: Proceedings of the 2008 International Symposium on Computer Science and Computational Technology - Volume 02Pages 500–504https://doi.org/10.1109/ISCSCT.2008.196Choose of suitable approaches for implementing management information system is a complex problem involves many intangibles that need to be trades off. Based on analytic hierarchy process, this paper structures the problem of choose as a hierarchy. ...
- ArticleDecember 2008
Information Distribution of Electronic Commerce Activities
ISBIM '08: Proceedings of the 2008 International Seminar on Business and Information Management - Volume 01Pages 169–172https://doi.org/10.1109/ISBIM.2008.103In electronic commercial activity, to strengthen the information distributive ability of the business to the customer can increase customers’ knowledge of goods and relevant information. One of the strategies for weakening the negative effect of the ...