1,952 research outputs found

    Design of a Controlled Language for Critical Infrastructures Protection

    Get PDF
    We describe a project for the construction of controlled language for critical infrastructures protection (CIP). This project originates from the need to coordinate and categorize the communications on CIP at the European level. These communications can be physically represented by official documents, reports on incidents, informal communications and plain e-mail. We explore the application of traditional library science tools for the construction of controlled languages in order to achieve our goal. Our starting point is an analogous work done during the sixties in the field of nuclear science known as the Euratom Thesaurus.JRC.G.6-Security technology assessmen

    Unraveling e-WOM patterns using text mining and sentiment analysis

    Get PDF
    Electronic word-of-mouth (e-WOM) is a very important way for firms to measure the pulse of its online reputation. Today, consumers use e-WOM as a way to interact with companies and share not only their satisfaction with the experience, but also their discontent. E-WOM is even a good way for companies to co-create better experiences that meet consumer needs. However, not many companies are using such unstructured information as a valuable resource to help in decision making. First, because e-WOM is mainly textual information that needs special data treatment and second, because it is spread in many different platforms and occurs in near-real-time, which makes it hard to handle. The current chapter revises the main methodologies used successfully to unravel hidden patterns in e-WOM in order to help decision makers to use such information to better align their companies with the consumer’s needs.info:eu-repo/semantics/acceptedVersio
    • …
    corecore