445,986 research outputs found

    Topic-based analysis for technology intelligence

    Full text link
    University of Technology Sydney. Faculty of Engineering and Information Technology.Since the past several decades, scientific literature, patents and other semi-structured technology indicators have been generating and accumulating at a very rapid rate. Their growth provides a wealth of information regarding technology development in both the public and private domain. However, it has also caused increasingly severe information overload problems whereby researchers, analysts and decision makers are not able to read, summarize and understand massive technical documents and records manually. The concept and tools of technology intelligence aims to handle this issue. In the current technology intelligence research, one of the big challenges is that, the frameworks and applications of existing technology intelligence conducted semantic content analysis and temporal trend estimation separately, lacking a comprehensive perspective on trend analysis of the detailed content within an area. In addition, existing research of technology intelligence is mainly constructed on the fundamentals of semantic properties of the semi-structured technology indicators; however, single keywords and their ranking alone, are too general or ambiguous to represent complex concepts and their corresponding temporal patterns. Thirdly, systematic post-processing, forecasting and evaluation on both content analysis and trend identification outputs are still in great demand, for diverse and flexible technological decision support and opportunity discovery. This research aims to handle these three challenges in both theoretical and practical aspects. It first quantitatively defines and presents temporal characteristics and semantic properties of typical semi-structured technology indicators. Then this thesis proposes a framework of topic-based technology intelligence, with three main functionalities, including data-driven trend identification, topic discovery and comprehensive topic evaluation, to synthetically process and analyse technological publication count sequence, textual data and metadata of target technology indicators. To achieve the three functionalities, this research proposes an empirical technology trend analysis method to extract temporal trend turning points and trend segments, which help with producing a more reasonable time-based measure; a topic-based technological forecasting method to first discover and characterize the semantic knowledge underlying in massive textual data of technology indicators, meanwhile estimating the future trends of the discovered topics; a comprehensive topic evaluation method that links metadata and discovered topics, to provide integrated landscape and technological insight in depth. In order to demonstrate the proposed topic-based technology intelligence framework and all the related methods, this research presents case studies with both patents and scientific literature. Experimental results on Australian patents, United States patents and scientific papers from Web of Science database, showed that the proposed framework and methods are well-suited in dealing with semi-structured technology indicators analysis, and can provide valuable topic-based knowledge to facilitate further technological decision making or opportunity discovery with good performance

    Privacy-Preserving Identification via Layered Sparse Code Design: Distributed Servers and Multiple Access Authorization

    Full text link
    We propose a new computationally efficient privacy-preserving identification framework based on layered sparse coding. The key idea of the proposed framework is a sparsifying transform learning with ambiguization, which consists of a trained linear map, a component-wise nonlinearity and a privacy amplification. We introduce a practical identification framework, which consists of two phases: public and private identification. The public untrusted server provides the fast search service based on the sparse privacy protected codebook stored at its side. The private trusted server or the local client application performs the refined accurate similarity search using the results of the public search and the layered sparse codebooks stored at its side. The private search is performed in the decoded domain and also the accuracy of private search is chosen based on the authorization level of the client. The efficiency of the proposed method is in computational complexity of encoding, decoding, "encryption" (ambiguization) and "decryption" (purification) as well as storage complexity of the codebooks.Comment: EUSIPCO 201

    The insider on the outside: a novel system for the detection of information leakers in social networks

    Get PDF
    Confidential information is all too easily leaked by naive users posting comments. In this paper we introduce DUIL, a system for Detecting Unintentional Information Leakers. The value of DUIL is in its ability to detect those responsible for information leakage that occurs through comments posted on news articles in a public environment, when those articles have withheld material non-public information. DUIL is comprised of several artefacts, each designed to analyse a different aspect of this challenge: the information, the user(s) who posted the information, and the user(s) who may be involved in the dissemination of information. We present a design science analysis of DUIL as an information system artefact comprised of social, information, and technology artefacts. We demonstrate the performance of DUIL on real data crawled from several Facebook news pages spanning two years of news articles

    A characteristics framework for Semantic Information Systems Standards

    Get PDF
    Semantic Information Systems (IS) Standards play a critical role in the development of the networked economy. While their importance is undoubted by all stakeholders—such as businesses, policy makers, researchers, developers—the current state of research leaves a number of questions unaddressed. Terminological confusion exists around the notions of “business semantics”, “business-to-business interoperability”, and “interoperability standards” amongst others. And, moreover, a comprehensive understanding about the characteristics of Semantic IS Standards is missing. The paper addresses this gap in literature by developing a characteristics framework for Semantic IS Standards. Two case studies are used to check the applicability of the framework in a “real-life” context. The framework lays the foundation for future research in an important field of the IS discipline and supports practitioners in their efforts to analyze, compare, and evaluate Semantic IS Standard

    Subject benchmark statement : criminology

    Get PDF

    The clinical effectiveness of individual behaviour change interventions to reduce risky sexual behaviour after a negative human immunodeficiency virus test in men who have sex with men: systematic and realist reviews and intervention development

    Get PDF
    Background: Men who have sex with men (MSM) experience significant inequalities in health and well-being. They are the group in the UK at the highest risk of acquiring a human immunodeficiency virus (HIV) infection. Guidance relating to both HIV infection prevention, in general, and individual-level behaviour change interventions, in particular, is very limited. Objectives: To conduct an evidence synthesis of the clinical effectiveness of behaviour change interventions to reduce risky sexual behaviour among MSM after a negative HIV infection test. To identify effective components within interventions in reducing HIV risk-related behaviours and develop a candidate intervention. To host expert events addressing the implementation and optimisation of a candidate intervention. Data sources: All major electronic databases (British Education Index, BioMed Central, Cumulative Index to Nursing and Allied Health Literature, EMBASE, Educational Resource Index and Abstracts, Health and Medical Complete, MEDLINE, PsycARTICLES, PsycINFO, PubMed and Social Science Citation Index) were searched between January 2000 and December 2014. Review methods: A systematic review of the clinical effectiveness of individual behaviour change interventions was conducted. Interventions were examined using the behaviour change technique (BCT) taxonomy, theory coding assessment, mode of delivery and proximity to HIV infection testing. Data were summarised in narrative review and, when appropriate, meta-analysis was carried out. Supplemental analyses for the development of the candidate intervention focused on post hoc realist review method, the assessment of the sequential delivery and content of intervention components, and the social and historical context of primary studies. Expert panels reviewed the candidate intervention for issues of implementation and optimisation. Results: Overall, trials included in this review (n = 10) demonstrated that individual-level behaviour change interventions are effective in reducing key HIV infection risk-related behaviours. However, there was considerable clinical and methodological heterogeneity among the trials. Exploratory meta-analysis showed a statistically significant reduction in behaviours associated with high risk of HIV transmission (risk ratio 0.75, 95% confidence interval 0.62 to 0.91). Additional stratified analyses suggested that effectiveness may be enhanced through face-to-face contact immediately after testing, and that theory-based content and BCTs drawn from ‘goals and planning’ and ‘identity’ groups are important. All evidence collated in the review was synthesised to develop a candidate intervention. Experts highlighted overall acceptability of the intervention and outlined key ways that the candidate intervention could be optimised to enhance UK implementation. Limitations: There was a limited number of primary studies. All were from outside the UK and were subject to considerable clinical, methodological and statistical heterogeneity. The findings of the meta-analysis must therefore be treated with caution. The lack of detailed intervention manuals limited the assessment of intervention content, delivery and fidelity. Conclusions: Evidence regarding the effectiveness of behaviour change interventions suggests that they are effective in changing behaviour associated with HIV transmission. Exploratory stratified meta-analyses suggested that interventions should be delivered face to face and immediately after testing. There are uncertainties around the generalisability of these findings to the UK setting. However, UK experts found the intervention acceptable and provided ways of optimising the candidate intervention. Future work: There is a need for well-designed, UK-based trials of individual behaviour change interventions that clearly articulate intervention content and demonstrate intervention fidelity

    Argumentation Mining in User-Generated Web Discourse

    Full text link
    The goal of argumentation mining, an evolving research field in computational linguistics, is to design methods capable of analyzing people's argumentation. In this article, we go beyond the state of the art in several ways. (i) We deal with actual Web data and take up the challenges given by the variety of registers, multiple domains, and unrestricted noisy user-generated Web discourse. (ii) We bridge the gap between normative argumentation theories and argumentation phenomena encountered in actual data by adapting an argumentation model tested in an extensive annotation study. (iii) We create a new gold standard corpus (90k tokens in 340 documents) and experiment with several machine learning methods to identify argument components. We offer the data, source codes, and annotation guidelines to the community under free licenses. Our findings show that argumentation mining in user-generated Web discourse is a feasible but challenging task.Comment: Cite as: Habernal, I. & Gurevych, I. (2017). Argumentation Mining in User-Generated Web Discourse. Computational Linguistics 43(1), pp. 125-17

    IT service management: towards a contingency theory of performance measurement

    Get PDF
    Information Technology Service Management (ITSM) focuses on IT service creation, design, delivery and maintenance. Measurement is one of the basic underlying elements of service science and this paper contributes to service science by focussing on the selection of performance metrics for ITSM. Contingency theory is used to provide a theoretical foundation for the study. Content analysis of interviews of ITSM managers at six organisations revealed that selection of metrics is influenced by a discrete set of factors. Three categories of factors were identified: external environment, parent organisationand IS organisation. For individual cases, selection of metrics was contingent on factors such as organisation culture, management philosophy and perspectives, legislation, industry sector, and customers, although a common set of four factors influenced selection of metrics across all organisations. A strong link was identified between the use of a corporate performance framework and clearly articulated ITSM metrics
    corecore