1,952 research outputs found
Design of a Controlled Language for Critical Infrastructures Protection
We describe a project for the construction of controlled language for critical infrastructures protection (CIP). This project originates
from the need to coordinate and categorize the communications on CIP at the European level. These communications can be physically
represented by official documents, reports on incidents, informal communications and plain e-mail. We explore the application of
traditional library science tools for the construction of controlled languages in order to achieve our goal. Our starting point is an
analogous work done during the sixties in the field of nuclear science known as the Euratom Thesaurus.JRC.G.6-Security technology assessmen
Unraveling e-WOM patterns using text mining and sentiment analysis
Electronic word-of-mouth (e-WOM) is a very important way for firms to measure the pulse of its online reputation. Today, consumers use e-WOM as a way to interact with companies and share not only their satisfaction with the experience, but also their discontent. E-WOM is even a good way for companies to co-create better experiences that meet consumer needs. However, not many companies are using such unstructured information as a valuable resource to help in decision making. First, because e-WOM is mainly textual information that needs special data treatment and second, because it is spread in many different platforms and occurs in near-real-time, which makes it hard to handle. The current chapter revises the main methodologies used successfully to unravel hidden patterns in e-WOM in order to help decision makers to use such information to better align their companies with the consumer’s needs.info:eu-repo/semantics/acceptedVersio
- …