top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
2021 12th International Conference on E-business, Management and Economics / / Yongan Zhang
2021 12th International Conference on E-business, Management and Economics / / Yongan Zhang
Autore Cheung Rickey
Pubbl/distr/stampa New York, NY : , : Association for Computing Machinery, , 2021
Descrizione fisica 1 online resource (882 pages) : illustrations
Disciplina 658.472
Collana ACM international conference proceedings series
Soggetto topico Business intelligence
Electronic commerce
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910514187503321
Cheung Rickey  
New York, NY : , : Association for Computing Machinery, , 2021
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Las 7S de McKinsey / / por Anastasia Samygin-Cherkaoui ; en colaboracion con Anne-Christine Cadiat ; traducido por Laura Bernal Martin
Las 7S de McKinsey / / por Anastasia Samygin-Cherkaoui ; en colaboracion con Anne-Christine Cadiat ; traducido por Laura Bernal Martin
Autore Samygin-Cherkaoui Anastasia
Pubbl/distr/stampa [Place of publication not identified] : , : 50Minutos.es, , 2016
Descrizione fisica 1 online resource (22 pages)
Disciplina 658.472
Soggetto topico Business intelligence
ISBN 2-8062-7489-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione spa
Record Nr. UNINA-9910796679703321
Samygin-Cherkaoui Anastasia  
[Place of publication not identified] : , : 50Minutos.es, , 2016
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Las 7S de McKinsey / / por Anastasia Samygin-Cherkaoui ; en colaboracion con Anne-Christine Cadiat ; traducido por Laura Bernal Martin
Las 7S de McKinsey / / por Anastasia Samygin-Cherkaoui ; en colaboracion con Anne-Christine Cadiat ; traducido por Laura Bernal Martin
Autore Samygin-Cherkaoui Anastasia
Pubbl/distr/stampa [Place of publication not identified] : , : 50Minutos.es, , 2016
Descrizione fisica 1 online resource (22 pages)
Disciplina 658.472
Soggetto topico Business intelligence
ISBN 2-8062-7489-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione spa
Record Nr. UNINA-9910822192603321
Samygin-Cherkaoui Anastasia  
[Place of publication not identified] : , : 50Minutos.es, , 2016
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Beginning Power BI with Excel 2013 [[electronic resource] ] : Self-Service Business Intelligence Using Power Pivot, Power View, Power Query, and Power Map / / by Dan Clark
Beginning Power BI with Excel 2013 [[electronic resource] ] : Self-Service Business Intelligence Using Power Pivot, Power View, Power Query, and Power Map / / by Dan Clark
Autore Clark Dan
Edizione [1st ed. 2014.]
Pubbl/distr/stampa Berkeley, CA : , : Apress : , : Imprint : Apress, , 2014
Descrizione fisica 1 online resource (309 p.)
Disciplina 658.472
Collana The expert's voice in business intelligence Beginning power BI with Excel 2013
Soggetto topico Microsoft software
Microsoft .NET Framework
Computers
Microsoft and .NET
Information Systems and Communication Service
ISBN 1-4302-6446-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Contents at a Glance; Contents; About the Author; About the Technical Reviewers; Acknowledgments; Introduction; Part 1: Building Models in Power Pivot; Chapter 1: Introducing Power Pivot; Why Use Power Pivot?; The xVelocity In-memory Analytics Engine; Enabling Power Pivot for Excel; Exploring the Data Model Manager Interface; Summary; Chapter 2: Importing Data into Power Pivot; Importing Data from Relational Databases; Importing Data from Text Files; Importing Data from a Data Feed; Importing Data from an OLAP Cube; Reusing Existing Connections to Update the Model; Summary
Chapter 3: Creating the Data ModelWhat Is a Data Model?; Creating Table Relations; Creating a Star Schema; Understanding When to Denormalize the Data; Creating Linked Tables; Creating Hierarchies; Making a User-Friendly Model; Summary; Chapter 4: Creating Calculations with DAX; What Is DAX?; Implementing DAX Operators; Working with Text Functions; Using DAX Date and Time Functions; Using Informational and Logical Functions; Getting Data from Related Tables; Using Math, Trig, and Statistical Functions; Tips for Creating Calculations in Power Pivot; Summary
Chapter 5: Creating Measures with DAXMeasures versus Attributes; Creating Common Aggregates; Mastering Data Context; Altering the Query Context; Using Filter Functions; Creating KPIs; Summary; Chapter 6: Incorporating Time Intelligence; Date-Based Analysis; Creating a Date Table; Time Period-Based Evaluations; Shifting the Date Context; Using Single Date Functions; Creating Semi-additive Measures; Summary; Chapter 7: Data Analysis with Pivot Tables and Charts; Pivot Table Fundamentals; Slicing the Data; Adding Visualizations to a Pivot Table; Working with Pivot Charts
Using Multiple Charts and TablesUsing Cube Functions; Summary; Part 2: Building Interactive Reports and Dashboards with Power View; Chapter 8: Optimizing Power Pivot Models for Power View; Visualizing Data with Power View; Creating a Basic Report; Improving the Power View Experience; Summary; Chapter 9: Creating Standard Visualizations with Power View; Creating Tables and Matrices; Constructing Bar, Column, and Pie Charts; Building Line and Scatter Charts; Creating Map-Based Visualizations; Summary; Chapter 10: Creating Interactive Dashboards with Power View
Linking Visualizations in Power ViewUsing Tiles to Organize the Data; Filtering Groups and Views; Exposing the Dashboard; Summary; Part 3: Exploring and Presenting Data with Power Query and Power Map; Chapter 11: Data Discovery with Power Query; Discovering and Importing Data; Transforming, Cleansing, and Filtering Data; Merging and Shaping Data; Grouping and Aggregating Data; Inserting Calculated Columns; Summary; Chapter 12: Geospatial Analysis with Power Map; Preparing Data for Mapping; Creating a Map-Based Graph; Creating Heat and Region Maps; Adding Multiple Layers to a Power Map
Analyzing Changes over Time
Record Nr. UNINA-9910300460703321
Clark Dan  
Berkeley, CA : , : Apress : , : Imprint : Apress, , 2014
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Business espionage : risk, threats, and countermeasures / / Bruce Wimmer
Business espionage : risk, threats, and countermeasures / / Bruce Wimmer
Autore Wimmer Bruce
Edizione [First edition.]
Pubbl/distr/stampa Waltham, Massachusetts : , : Elsevier, , [2015]
Descrizione fisica 1 online resource (210 p.)
Disciplina 658.472
Soggetto topico Business intelligence
ISBN 0-12-420059-1
0-12-420054-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Front Cover; Business Espionage: Risk, Threats, and Countermeasures; Copyright; Dedication; Contents; Author Biography; Introduction; Business espionage misunderstood; Silo Syndrome; James Bond Syndrome; Exclusive Cyber-Security Focus; Ostrich Syndrome; Objective; How to Use This Book; Part 1: Understanding the Problem of Business Espionage; Chapter 1: Understanding the risks; Introduction; Risk Methodology; Risk Formula; Summary; Chapter 2: Characteristics of business spies; MICE; CRIME; BECCA; Project Slammer; U.S. FBI; Summary; Chapter 3: High-Threat Locations for Business Espionage
Asia-PacificLatin America; Europe; Africa; Middle East; More Examples; Business Espionage in/from Greater China; Business Espionage in Singapore; Business Espionage in Vietnam; Korea, Japan, and India; Business Espionage in Latin America; United States; Vulnerabilities Identified in Examples; Summary; Chapter 4: Espionage by Electronic Means; Introduction; Cases of Electronic Eavesdropping; Vulnerabilities Identified; Summary; Chapter 5: Espionage by Force: Physical Theft or Other Appropriation; Introduction; Cases of Business Espionage by Physical Theft or Other Appropriation
Vulnerabilities IdentifiedSummary; Chapter 6: Facing Espionage While Traveling; Introduction; Cases of Travelers Becoming Victims of Business Espionage; Vulnerabilities Identified; Conclusion; Chapter 7: Insider Threat; Introduction; Cases of Insider Espionage; Vulnerabilities Identified; Summary; Part 2: Business Espionage Countermeasures; Chapter 8: Protecting Your Most Critical Resources; Focus on protecting the most critical information and resources; Chapter 9: Physical and Personnel Security Countermeasures; Introduction; Business Espionage Security Awareness Training
Key Elements of a Good Employee Counterespionage Education and Awareness ProgramBusiness Espionage Reporting Program; Travel Security Program that Includes Business Espionage Threat; Executive Protection; Clear, Demonstrated Senior Leadership Support; Identifying and Properly Classifying Sensitive Information; Include in Business Continuity/Disaster Recovery Plans; Conduct a Holistic Risk Assessment; Well-Constructed, Comprehensive Security Policies and Procedures; Create a Specific and Focused Information Protection Team
Do Comprehensive Due Diligence of Partners, Suppliers, Vendors, and ClientsBe Involved in Office/Site Location Selection; Conduct Background Investigations/Personnel Security; Address Resignations and Terminations; Access controls; Secure Storage and Locks; Importance of Information Security Manager(s) as Program Contacts; Document and Material Destruction/Trash Controls; Control of Office Machines; Pro-Active Prevention Monitoring; Use of Tiger and Red Team Testing; Non-Disclosure, Non-Compete, and Other Legal Agreements; Limiting Where/How Company Information Can Be Worked On or Discussed
Develop Special Measures for Marketing and Sales Staff
Record Nr. UNINA-9910796901903321
Wimmer Bruce  
Waltham, Massachusetts : , : Elsevier, , [2015]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Business espionage : risk, threats, and countermeasures / / Bruce Wimmer
Business espionage : risk, threats, and countermeasures / / Bruce Wimmer
Autore Wimmer Bruce
Edizione [First edition.]
Pubbl/distr/stampa Waltham, Massachusetts : , : Elsevier, , [2015]
Descrizione fisica 1 online resource (210 p.)
Disciplina 658.472
Soggetto topico Business intelligence
ISBN 0-12-420059-1
0-12-420054-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Front Cover; Business Espionage: Risk, Threats, and Countermeasures; Copyright; Dedication; Contents; Author Biography; Introduction; Business espionage misunderstood; Silo Syndrome; James Bond Syndrome; Exclusive Cyber-Security Focus; Ostrich Syndrome; Objective; How to Use This Book; Part 1: Understanding the Problem of Business Espionage; Chapter 1: Understanding the risks; Introduction; Risk Methodology; Risk Formula; Summary; Chapter 2: Characteristics of business spies; MICE; CRIME; BECCA; Project Slammer; U.S. FBI; Summary; Chapter 3: High-Threat Locations for Business Espionage
Asia-PacificLatin America; Europe; Africa; Middle East; More Examples; Business Espionage in/from Greater China; Business Espionage in Singapore; Business Espionage in Vietnam; Korea, Japan, and India; Business Espionage in Latin America; United States; Vulnerabilities Identified in Examples; Summary; Chapter 4: Espionage by Electronic Means; Introduction; Cases of Electronic Eavesdropping; Vulnerabilities Identified; Summary; Chapter 5: Espionage by Force: Physical Theft or Other Appropriation; Introduction; Cases of Business Espionage by Physical Theft or Other Appropriation
Vulnerabilities IdentifiedSummary; Chapter 6: Facing Espionage While Traveling; Introduction; Cases of Travelers Becoming Victims of Business Espionage; Vulnerabilities Identified; Conclusion; Chapter 7: Insider Threat; Introduction; Cases of Insider Espionage; Vulnerabilities Identified; Summary; Part 2: Business Espionage Countermeasures; Chapter 8: Protecting Your Most Critical Resources; Focus on protecting the most critical information and resources; Chapter 9: Physical and Personnel Security Countermeasures; Introduction; Business Espionage Security Awareness Training
Key Elements of a Good Employee Counterespionage Education and Awareness ProgramBusiness Espionage Reporting Program; Travel Security Program that Includes Business Espionage Threat; Executive Protection; Clear, Demonstrated Senior Leadership Support; Identifying and Properly Classifying Sensitive Information; Include in Business Continuity/Disaster Recovery Plans; Conduct a Holistic Risk Assessment; Well-Constructed, Comprehensive Security Policies and Procedures; Create a Specific and Focused Information Protection Team
Do Comprehensive Due Diligence of Partners, Suppliers, Vendors, and ClientsBe Involved in Office/Site Location Selection; Conduct Background Investigations/Personnel Security; Address Resignations and Terminations; Access controls; Secure Storage and Locks; Importance of Information Security Manager(s) as Program Contacts; Document and Material Destruction/Trash Controls; Control of Office Machines; Pro-Active Prevention Monitoring; Use of Tiger and Red Team Testing; Non-Disclosure, Non-Compete, and Other Legal Agreements; Limiting Where/How Company Information Can Be Worked On or Discussed
Develop Special Measures for Marketing and Sales Staff
Record Nr. UNINA-9910827894803321
Wimmer Bruce  
Waltham, Massachusetts : , : Elsevier, , [2015]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Business intelligence : 7th International Conference, CBI 2022, Khouribga, Morocco, May 26-28, 2022, Proceedings / / Mohamed Fakir, Mohamed Baslam, and Rachid El Ayachi
Business intelligence : 7th International Conference, CBI 2022, Khouribga, Morocco, May 26-28, 2022, Proceedings / / Mohamed Fakir, Mohamed Baslam, and Rachid El Ayachi
Autore Fakir Mohamed
Pubbl/distr/stampa Cham, Switzerland : , : Springer, , [2022]
Descrizione fisica 1 online resource (301 pages)
Disciplina 658.472
Collana Lecture Notes in Business Information Processing
Soggetto topico Business intelligence
Business intelligence - Data processing
ISBN 3-031-06458-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNISA-996475765503316
Fakir Mohamed  
Cham, Switzerland : , : Springer, , [2022]
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Business intelligence : 7th International Conference, CBI 2022, Khouribga, Morocco, May 26-28, 2022, Proceedings / / Mohamed Fakir, Mohamed Baslam, and Rachid El Ayachi
Business intelligence : 7th International Conference, CBI 2022, Khouribga, Morocco, May 26-28, 2022, Proceedings / / Mohamed Fakir, Mohamed Baslam, and Rachid El Ayachi
Autore Fakir Mohamed
Pubbl/distr/stampa Cham, Switzerland : , : Springer, , [2022]
Descrizione fisica 1 online resource (301 pages)
Disciplina 658.472
Collana Lecture Notes in Business Information Processing
Soggetto topico Business intelligence
Business intelligence - Data processing
ISBN 3-031-06458-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910568289703321
Fakir Mohamed  
Cham, Switzerland : , : Springer, , [2022]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Business intelligence [e-book] : the savvy manager's guide, getting onboard with emerging IT / David Loshin ; [foreword by Ronald J. Powell]
Business intelligence [e-book] : the savvy manager's guide, getting onboard with emerging IT / David Loshin ; [foreword by Ronald J. Powell]
Autore Loshin, David
Pubbl/distr/stampa Amsterdam ; Boston : Morgan Kaufmann Publishers, c2003
Descrizione fisica xx, 270 p. : ill. ; 23 cm
Disciplina 658.472
Collana The savvy manager's guides
Soggetto topico Business intelligence
Information technology - Management
Management information systems
ISBN 9781558609167
1558609164
Formato Risorse elettroniche
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Business Intelligence and Information Exploitation. The Value of Information. Business Models and Information Flow. Data Models and Meta Data. Business Intelligence Environments. Business Rules. Data Profiling. Data Quality and Information Compliance. Information Integration. Alternate Information Contexts. Data Enhancement. Knowledge Discovery. Guide to Public Data. References
Record Nr. UNISALENTO-991003249279707536
Loshin, David  
Amsterdam ; Boston : Morgan Kaufmann Publishers, c2003
Risorse elettroniche
Lo trovi qui: Univ. del Salento
Opac: Controlla la disponibilità qui
Business intelligence : a managerial perspective on analytics / / Ramesh Sharda [and six others]
Business intelligence : a managerial perspective on analytics / / Ramesh Sharda [and six others]
Autore Sharda Ramesh
Edizione [Third, Global edition.]
Pubbl/distr/stampa Harlow, England : , : Pearson, , [2014]
Descrizione fisica 1 online resource (416 pages) : illustrations
Disciplina 658.472
Soggetto topico Business intelligence
ISBN 1-292-00502-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cover -- Title Page -- Contents -- Preface -- About the Authors -- Chapter 1 An Overview of Business -- 1.1 Opening Vignette: Magpie Sensing -- 1.2 Changing Business Environments and Computerized -- The Business Pressures-Responses-Support Model -- 1.3 A Framework for Business Intelligence (BI) -- Definitions of BI -- A Brief History of BI -- The Architecture of BI -- The Origins and Drivers of BI -- Application Case 1.1 Sabre Helps Its Clients -- A Multimedia Exercise in Business Intelligence -- 1.4 Intelligence Creation, Use, and BI Governance -- A Cyclical Process of Intelligence Creation and Use -- Intelligence and Espionage -- 1.5 Transaction Processing Versus Analytic Processing -- 1.6 Successful BI Implementation -- The Typical BI User Community -- Appropriate Planning and Alignment with the Business -- Real-Time, On-Demand BI Is Attainable -- Developing or Acquiring BI Systems -- Justification and Cost-Benefit Analysis -- Security and Protection of Privacy -- Integration of Systems and Applications -- 1.7 Analytics Overview -- Descriptive Analytics -- Predictive Analytics -- Application Case 1.2 Eliminating Inefficiencies -- Application Case 1.3 Analysis at the Speed -- Prescriptive Analytics -- Application Case 1.4 Moneyball: Analytics in Sports -- Application Case 1.5 Analyzing Athletic Injuries -- Analytics Applied to Different Domains -- Application Case 1.6 Industrial and Commercial Bank of China -- Analytics or Data Science? -- 1.8 Brief Introduction to Big Data Analytics -- What Is Big Data? -- Application Case 1.7 Gilt Groupe's Flash Sales -- 1.9 Plan of the Book -- 1.10 Resources, Links, and the Teradata University -- Resources and Links -- Vendors, Products, and Demos -- Periodicals -- The Teradata University Network Connection -- The Book's Web Site -- Key Terms -- Questions for Discussion -- Exercises.
End-of-Chapter Application Case -- References -- Chapter 2 Data Warehousing -- 2.1 Opening Vignette: Isle of Capri Casinos -- 2.2 Data Warehousing Definitions and Concepts -- What Is a Data Warehouse? -- A Historical Perspective to Data Warehousing -- Characteristics of Data Warehousing -- Data Marts -- Operational Data Stores -- Enterprise Data Warehouses (EDW) -- Application Case 2.1 A Better Data Plan: Well-Established -- Metadata -- 2.3 Data Warehousing Process Overview -- Application Case 2.2 Data Warehousing Helps -- 2.4 Data Warehousing Architectures -- Alternative Data Warehousing Architectures -- Which Architecture Is the Best? -- 2.5 Data Integration and the Extraction, Transformation -- Data Integration -- Application Case 2.3 BP Lubricants Achieves BIGS Success -- Extraction, Transformation, and Load -- 2.6 Data Warehouse Development -- Application Case 2.4 Things Go Better with Coke's -- Data Warehouse Development Approaches -- Application Case 2.5 Starwood Hotels & Resorts Manages -- Additional Data Warehouse Development Considerations -- Representation of Data in Data Warehouse -- Analysis of Data in Data Warehouse -- OLAP Versus OLTP -- OLAP Operations -- 2.7 Data Warehousing Implementation Issues -- Application Case 2.6 EDW Helps Connect State -- Massive Data Warehouses and Scalability -- 2.8 Real-Time Data Warehousing -- Application Case 2.7 Egg Plc Fries the Competition -- 2.9 Data Warehouse Administration, Security -- The Future of Data Warehousing -- 2.10 Resources, Links, and the Teradata University Network -- Resources and Links -- Cases -- Vendors, Products, and Demos -- Periodicals -- Additional References -- The Teradata University Network (TUN) Connection -- Key Terms -- Questions for Discussion -- Exercises -- End-of-Chapter Application Case -- References -- Chapter 3 Business Reporting, Visual Analytics, and Business.
3.1 Opening Vignette: Self-Service Reporting -- 3.2 Business Reporting Definitions and Concepts -- What Is a Business Report? -- Application Case 3.1 Delta Lloyd Group Ensures Accuracy -- Components of Business Reporting Systems -- Application Case 3.2 Flood of Paper -- 3.3 Data and Information Visualization -- Application Case 3.3 Tableau Saves Blastrac -- A Brief History of Data Visualization -- Application Case 3.4 TIBCO Spotfire Provides -- 3.4 Different Types of Charts and Graphs -- Basic Charts and Graphs -- Specialized Charts and Graphs -- 3.5 The Emergence of Data Visualization and Visual Analytics -- Visual Analytics -- High-Powered Visual Analytics Environments -- 3.6 Performance Dashboards -- Dashboard Design -- Application Case 3.5 Dallas Cowboys Score Big -- Application Case 3.6 Saudi Telecom Company Excels -- What to Look For in a Dashboard -- Best Practices in Dashboard Design -- Benchmark Key Performance Indicators -- Wrap the Dashboard Metrics with Contextual -- Validate the Dashboard Design by a Usability -- Prioritize and Rank Alerts/Exceptions Streamed -- Enrich Dashboard with Business-User Comments -- Present Information in Three Different Levels -- Pick the Right Visual Construct Using Dashboard Design Principles -- Provide for Guided Analytics -- 3.7 Business Performance Management -- Closed-Loop BPM Cycle -- Application Case 3.7 IBM Cognos Express Helps -- 3.8 Performance Measurement -- Key Performance Indicator (KPI) -- Performance Measurement System -- 3.9 Balanced Scorecards -- The Four Perspectives -- The Meaning of Balance in BSC -- Dashboards Versus Scorecards -- 3.10 Six Sigma as a Performance Measurement System -- The DMAIC Performance Model -- Balanced Scorecard Versus Six Sigma -- Effective Performance Measurement -- Application Case 3.8 Expedia.com's Customer Satisfaction -- Key Terms -- Questions for Discussion.
Exercises -- End-of-Chapter Application Case -- References -- Chapter 4 Data Mining -- 4.1 Opening Vignette: Cabela's Reels in More -- 4.2 Data Mining Concepts and Applications -- Definitions, Characteristics, and Benefits -- Application Case 4.1 Smarter Insurance: Infinity -- How Data Mining Works -- Application Case 4.2 Harnessing Analytics to Combat -- Data Mining Versus Statistics -- 4.3 Data Mining Applications -- Application Case 4.3 A Mine on Terrorist Funding -- 4.4 Data Mining Process -- Step 1: Business Understanding -- Step 2: Data Understanding -- Step 3: Data Preparation -- Step 4: Model Building -- Step 5: Testing and Evaluation -- Step 6: Deployment -- Application Case 4.4 Data Mining in Cancer Research -- Other Data Mining Standardized Processes -- 4.5 Data Mining Methods -- Classification -- Estimating the True Accuracy of Classification Models -- Application Case 4.5 2degrees Gets a 1275 Percent -- Cluster Analysis for Data Mining -- Association Rule Mining -- 4.6 Data Mining Software Tools -- Application Case 4.6 Data Mining Goes to Hollywood: -- 4.7 Data Mining Privacy Issues, Myths, and Blunders -- Data Mining and Privacy Issues -- Application Case 4.7 Predicting Customer Buying -- Data Mining Myths and Blunders -- Key Terms -- Questions for Discussion -- Exercises -- End-of-Chapter Application Case -- References -- Chapter 5 Text and Web Analytics -- 5.1 Opening Vignette: Machine Versus Men -- 5.2 Text Analytics and Text Mining Overview -- Application Case 5.1 Text Mining for Patent Analysis -- 5.3 Natural Language Processing -- Application Case 5.2 Text Mining Improves Hong -- 5.4 Text Mining Applications -- Marketing Applications -- Security Applications -- Application Case 5.3 Mining for Lies -- Biomedical Applications -- Academic Applications -- Application Case 5.4 Text mining and Sentiment -- 5.5 Text Mining Process.
Task 1: Establish the Corpus -- Task 2: Create the Term-Document Matrix -- Task 3: Extract the Knowledge -- Application Case 5.5 Research Literature Survey -- 5.6 Sentiment Analysis -- Application Case 5.6 Whirlpool Achieves Customer -- Sentiment Analysis Applications -- Sentiment Analysis Process -- Methods for Polarity Identification -- Using a Lexicon -- Using a Collection of Training Documents -- Identifying Semantic Orientation of Sentences -- Identifying Semantic Orientation of Document -- 5.7 Web Mining Overview -- Web Content and Web Structure Mining -- 5.8 Search Engines -- Anatomy of a Search Engine -- Development Cycle -- Web Crawler -- Document Indexer -- Response Cycle -- Query Analyzer -- Document Matcher/Ranker -- Search Engine Optimization -- Methods for Search Engine Optimization -- Application Case 5.7 Understanding Why Customers -- 5.9 Web Usage Mining (Web Analytics) -- Web Analytics Technologies -- Application Case 5.8 Allegro Boosts Online Click-Through -- Web Analytics Metrics -- Web Site Usability -- Traffic Sources -- Visitor Profiles -- Conversion Statistics -- 5.10 Social Analytics -- Social Network Analysis -- Social Network Analysis Metrics -- Application Case 5.9 Social Network Analysis Helps -- Connections -- Distributions -- Segmentation -- Social Media Analytics -- How Do People Use Social Media? -- Application Case 5.10 Measuring the Impact of Social -- Measuring the Social Media Impact -- Best Practices in Social Media Analytics -- Application Case 5.11 eHarmony Uses Social -- Key Terms -- Questions for Discussion -- Exercises -- End-of-Chapter Application Case -- References -- Chapter 6 Big Data and Analytics -- 6.1 Opening Vignette: Big Data Meets Big Science at CERN -- 6.2 Definition of Big Data -- The Vs That Define Big Data -- Application Case 6.1 BigData Analytics Helps.
6.3 Fundamentals of Big Data Analytics.
Record Nr. UNINA-9910153069003321
Sharda Ramesh  
Harlow, England : , : Pearson, , [2014]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui