2021 12th International Conference on E-business, Management and Economics / / Yongan Zhang |
Autore | Cheung Rickey |
Pubbl/distr/stampa | New York, NY : , : Association for Computing Machinery, , 2021 |
Descrizione fisica | 1 online resource (882 pages) : illustrations |
Disciplina | 658.472 |
Collana | ACM international conference proceedings series |
Soggetto topico |
Business intelligence
Electronic commerce |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910514187503321 |
Cheung Rickey
![]() |
||
New York, NY : , : Association for Computing Machinery, , 2021 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Las 7S de McKinsey / / por Anastasia Samygin-Cherkaoui ; en colaboracion con Anne-Christine Cadiat ; traducido por Laura Bernal Martin |
Autore | Samygin-Cherkaoui Anastasia |
Pubbl/distr/stampa | [Place of publication not identified] : , : 50Minutos.es, , 2016 |
Descrizione fisica | 1 online resource (22 pages) |
Disciplina | 658.472 |
Soggetto topico | Business intelligence |
ISBN | 2-8062-7489-3 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | spa |
Record Nr. | UNINA-9910796679703321 |
Samygin-Cherkaoui Anastasia
![]() |
||
[Place of publication not identified] : , : 50Minutos.es, , 2016 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Las 7S de McKinsey / / por Anastasia Samygin-Cherkaoui ; en colaboracion con Anne-Christine Cadiat ; traducido por Laura Bernal Martin |
Autore | Samygin-Cherkaoui Anastasia |
Pubbl/distr/stampa | [Place of publication not identified] : , : 50Minutos.es, , 2016 |
Descrizione fisica | 1 online resource (22 pages) |
Disciplina | 658.472 |
Soggetto topico | Business intelligence |
ISBN | 2-8062-7489-3 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | spa |
Record Nr. | UNINA-9910822192603321 |
Samygin-Cherkaoui Anastasia
![]() |
||
[Place of publication not identified] : , : 50Minutos.es, , 2016 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Beginning Power BI with Excel 2013 [[electronic resource] ] : Self-Service Business Intelligence Using Power Pivot, Power View, Power Query, and Power Map / / by Dan Clark |
Autore | Clark Dan |
Edizione | [1st ed. 2014.] |
Pubbl/distr/stampa | Berkeley, CA : , : Apress : , : Imprint : Apress, , 2014 |
Descrizione fisica | 1 online resource (309 p.) |
Disciplina | 658.472 |
Collana | The expert's voice in business intelligence Beginning power BI with Excel 2013 |
Soggetto topico |
Microsoft software
Microsoft .NET Framework Computers Microsoft and .NET Information Systems and Communication Service |
ISBN | 1-4302-6446-2 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Contents at a Glance; Contents; About the Author; About the Technical Reviewers; Acknowledgments; Introduction; Part 1: Building Models in Power Pivot; Chapter 1: Introducing Power Pivot; Why Use Power Pivot?; The xVelocity In-memory Analytics Engine; Enabling Power Pivot for Excel; Exploring the Data Model Manager Interface; Summary; Chapter 2: Importing Data into Power Pivot; Importing Data from Relational Databases; Importing Data from Text Files; Importing Data from a Data Feed; Importing Data from an OLAP Cube; Reusing Existing Connections to Update the Model; Summary
Chapter 3: Creating the Data ModelWhat Is a Data Model?; Creating Table Relations; Creating a Star Schema; Understanding When to Denormalize the Data; Creating Linked Tables; Creating Hierarchies; Making a User-Friendly Model; Summary; Chapter 4: Creating Calculations with DAX; What Is DAX?; Implementing DAX Operators; Working with Text Functions; Using DAX Date and Time Functions; Using Informational and Logical Functions; Getting Data from Related Tables; Using Math, Trig, and Statistical Functions; Tips for Creating Calculations in Power Pivot; Summary Chapter 5: Creating Measures with DAXMeasures versus Attributes; Creating Common Aggregates; Mastering Data Context; Altering the Query Context; Using Filter Functions; Creating KPIs; Summary; Chapter 6: Incorporating Time Intelligence; Date-Based Analysis; Creating a Date Table; Time Period-Based Evaluations; Shifting the Date Context; Using Single Date Functions; Creating Semi-additive Measures; Summary; Chapter 7: Data Analysis with Pivot Tables and Charts; Pivot Table Fundamentals; Slicing the Data; Adding Visualizations to a Pivot Table; Working with Pivot Charts Using Multiple Charts and TablesUsing Cube Functions; Summary; Part 2: Building Interactive Reports and Dashboards with Power View; Chapter 8: Optimizing Power Pivot Models for Power View; Visualizing Data with Power View; Creating a Basic Report; Improving the Power View Experience; Summary; Chapter 9: Creating Standard Visualizations with Power View; Creating Tables and Matrices; Constructing Bar, Column, and Pie Charts; Building Line and Scatter Charts; Creating Map-Based Visualizations; Summary; Chapter 10: Creating Interactive Dashboards with Power View Linking Visualizations in Power ViewUsing Tiles to Organize the Data; Filtering Groups and Views; Exposing the Dashboard; Summary; Part 3: Exploring and Presenting Data with Power Query and Power Map; Chapter 11: Data Discovery with Power Query; Discovering and Importing Data; Transforming, Cleansing, and Filtering Data; Merging and Shaping Data; Grouping and Aggregating Data; Inserting Calculated Columns; Summary; Chapter 12: Geospatial Analysis with Power Map; Preparing Data for Mapping; Creating a Map-Based Graph; Creating Heat and Region Maps; Adding Multiple Layers to a Power Map Analyzing Changes over Time |
Record Nr. | UNINA-9910300460703321 |
Clark Dan
![]() |
||
Berkeley, CA : , : Apress : , : Imprint : Apress, , 2014 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Business espionage : risk, threats, and countermeasures / / Bruce Wimmer |
Autore | Wimmer Bruce |
Edizione | [First edition.] |
Pubbl/distr/stampa | Waltham, Massachusetts : , : Elsevier, , [2015] |
Descrizione fisica | 1 online resource (210 p.) |
Disciplina | 658.472 |
Soggetto topico | Business intelligence |
ISBN |
0-12-420059-1
0-12-420054-0 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Front Cover; Business Espionage: Risk, Threats, and Countermeasures; Copyright; Dedication; Contents; Author Biography; Introduction; Business espionage misunderstood; Silo Syndrome; James Bond Syndrome; Exclusive Cyber-Security Focus; Ostrich Syndrome; Objective; How to Use This Book; Part 1: Understanding the Problem of Business Espionage; Chapter 1: Understanding the risks; Introduction; Risk Methodology; Risk Formula; Summary; Chapter 2: Characteristics of business spies; MICE; CRIME; BECCA; Project Slammer; U.S. FBI; Summary; Chapter 3: High-Threat Locations for Business Espionage
Asia-PacificLatin America; Europe; Africa; Middle East; More Examples; Business Espionage in/from Greater China; Business Espionage in Singapore; Business Espionage in Vietnam; Korea, Japan, and India; Business Espionage in Latin America; United States; Vulnerabilities Identified in Examples; Summary; Chapter 4: Espionage by Electronic Means; Introduction; Cases of Electronic Eavesdropping; Vulnerabilities Identified; Summary; Chapter 5: Espionage by Force: Physical Theft or Other Appropriation; Introduction; Cases of Business Espionage by Physical Theft or Other Appropriation Vulnerabilities IdentifiedSummary; Chapter 6: Facing Espionage While Traveling; Introduction; Cases of Travelers Becoming Victims of Business Espionage; Vulnerabilities Identified; Conclusion; Chapter 7: Insider Threat; Introduction; Cases of Insider Espionage; Vulnerabilities Identified; Summary; Part 2: Business Espionage Countermeasures; Chapter 8: Protecting Your Most Critical Resources; Focus on protecting the most critical information and resources; Chapter 9: Physical and Personnel Security Countermeasures; Introduction; Business Espionage Security Awareness Training Key Elements of a Good Employee Counterespionage Education and Awareness ProgramBusiness Espionage Reporting Program; Travel Security Program that Includes Business Espionage Threat; Executive Protection; Clear, Demonstrated Senior Leadership Support; Identifying and Properly Classifying Sensitive Information; Include in Business Continuity/Disaster Recovery Plans; Conduct a Holistic Risk Assessment; Well-Constructed, Comprehensive Security Policies and Procedures; Create a Specific and Focused Information Protection Team Do Comprehensive Due Diligence of Partners, Suppliers, Vendors, and ClientsBe Involved in Office/Site Location Selection; Conduct Background Investigations/Personnel Security; Address Resignations and Terminations; Access controls; Secure Storage and Locks; Importance of Information Security Manager(s) as Program Contacts; Document and Material Destruction/Trash Controls; Control of Office Machines; Pro-Active Prevention Monitoring; Use of Tiger and Red Team Testing; Non-Disclosure, Non-Compete, and Other Legal Agreements; Limiting Where/How Company Information Can Be Worked On or Discussed Develop Special Measures for Marketing and Sales Staff |
Record Nr. | UNINA-9910796901903321 |
Wimmer Bruce
![]() |
||
Waltham, Massachusetts : , : Elsevier, , [2015] | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Business espionage : risk, threats, and countermeasures / / Bruce Wimmer |
Autore | Wimmer Bruce |
Edizione | [First edition.] |
Pubbl/distr/stampa | Waltham, Massachusetts : , : Elsevier, , [2015] |
Descrizione fisica | 1 online resource (210 p.) |
Disciplina | 658.472 |
Soggetto topico | Business intelligence |
ISBN |
0-12-420059-1
0-12-420054-0 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Front Cover; Business Espionage: Risk, Threats, and Countermeasures; Copyright; Dedication; Contents; Author Biography; Introduction; Business espionage misunderstood; Silo Syndrome; James Bond Syndrome; Exclusive Cyber-Security Focus; Ostrich Syndrome; Objective; How to Use This Book; Part 1: Understanding the Problem of Business Espionage; Chapter 1: Understanding the risks; Introduction; Risk Methodology; Risk Formula; Summary; Chapter 2: Characteristics of business spies; MICE; CRIME; BECCA; Project Slammer; U.S. FBI; Summary; Chapter 3: High-Threat Locations for Business Espionage
Asia-PacificLatin America; Europe; Africa; Middle East; More Examples; Business Espionage in/from Greater China; Business Espionage in Singapore; Business Espionage in Vietnam; Korea, Japan, and India; Business Espionage in Latin America; United States; Vulnerabilities Identified in Examples; Summary; Chapter 4: Espionage by Electronic Means; Introduction; Cases of Electronic Eavesdropping; Vulnerabilities Identified; Summary; Chapter 5: Espionage by Force: Physical Theft or Other Appropriation; Introduction; Cases of Business Espionage by Physical Theft or Other Appropriation Vulnerabilities IdentifiedSummary; Chapter 6: Facing Espionage While Traveling; Introduction; Cases of Travelers Becoming Victims of Business Espionage; Vulnerabilities Identified; Conclusion; Chapter 7: Insider Threat; Introduction; Cases of Insider Espionage; Vulnerabilities Identified; Summary; Part 2: Business Espionage Countermeasures; Chapter 8: Protecting Your Most Critical Resources; Focus on protecting the most critical information and resources; Chapter 9: Physical and Personnel Security Countermeasures; Introduction; Business Espionage Security Awareness Training Key Elements of a Good Employee Counterespionage Education and Awareness ProgramBusiness Espionage Reporting Program; Travel Security Program that Includes Business Espionage Threat; Executive Protection; Clear, Demonstrated Senior Leadership Support; Identifying and Properly Classifying Sensitive Information; Include in Business Continuity/Disaster Recovery Plans; Conduct a Holistic Risk Assessment; Well-Constructed, Comprehensive Security Policies and Procedures; Create a Specific and Focused Information Protection Team Do Comprehensive Due Diligence of Partners, Suppliers, Vendors, and ClientsBe Involved in Office/Site Location Selection; Conduct Background Investigations/Personnel Security; Address Resignations and Terminations; Access controls; Secure Storage and Locks; Importance of Information Security Manager(s) as Program Contacts; Document and Material Destruction/Trash Controls; Control of Office Machines; Pro-Active Prevention Monitoring; Use of Tiger and Red Team Testing; Non-Disclosure, Non-Compete, and Other Legal Agreements; Limiting Where/How Company Information Can Be Worked On or Discussed Develop Special Measures for Marketing and Sales Staff |
Record Nr. | UNINA-9910827894803321 |
Wimmer Bruce
![]() |
||
Waltham, Massachusetts : , : Elsevier, , [2015] | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Business intelligence : 7th International Conference, CBI 2022, Khouribga, Morocco, May 26-28, 2022, Proceedings / / Mohamed Fakir, Mohamed Baslam, and Rachid El Ayachi |
Autore | Fakir Mohamed |
Pubbl/distr/stampa | Cham, Switzerland : , : Springer, , [2022] |
Descrizione fisica | 1 online resource (301 pages) |
Disciplina | 658.472 |
Collana | Lecture Notes in Business Information Processing |
Soggetto topico |
Business intelligence
Business intelligence - Data processing |
ISBN | 3-031-06458-5 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNISA-996475765503316 |
Fakir Mohamed
![]() |
||
Cham, Switzerland : , : Springer, , [2022] | ||
![]() | ||
Lo trovi qui: Univ. di Salerno | ||
|
Business intelligence : 7th International Conference, CBI 2022, Khouribga, Morocco, May 26-28, 2022, Proceedings / / Mohamed Fakir, Mohamed Baslam, and Rachid El Ayachi |
Autore | Fakir Mohamed |
Pubbl/distr/stampa | Cham, Switzerland : , : Springer, , [2022] |
Descrizione fisica | 1 online resource (301 pages) |
Disciplina | 658.472 |
Collana | Lecture Notes in Business Information Processing |
Soggetto topico |
Business intelligence
Business intelligence - Data processing |
ISBN | 3-031-06458-5 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910568289703321 |
Fakir Mohamed
![]() |
||
Cham, Switzerland : , : Springer, , [2022] | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Business intelligence [e-book] : the savvy manager's guide, getting onboard with emerging IT / David Loshin ; [foreword by Ronald J. Powell] |
Autore | Loshin, David |
Pubbl/distr/stampa | Amsterdam ; Boston : Morgan Kaufmann Publishers, c2003 |
Descrizione fisica | xx, 270 p. : ill. ; 23 cm |
Disciplina | 658.472 |
Collana | The savvy manager's guides |
Soggetto topico |
Business intelligence
Information technology - Management Management information systems |
ISBN |
9781558609167
1558609164 |
Formato | Risorse elettroniche ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Business Intelligence and Information Exploitation. The Value of Information. Business Models and Information Flow. Data Models and Meta Data. Business Intelligence Environments. Business Rules. Data Profiling. Data Quality and Information Compliance. Information Integration. Alternate Information Contexts. Data Enhancement. Knowledge Discovery. Guide to Public Data. References |
Record Nr. | UNISALENTO-991003249279707536 |
Loshin, David
![]() |
||
Amsterdam ; Boston : Morgan Kaufmann Publishers, c2003 | ||
![]() | ||
Lo trovi qui: Univ. del Salento | ||
|
Business intelligence : a managerial perspective on analytics / / Ramesh Sharda [and six others] |
Autore | Sharda Ramesh |
Edizione | [Third, Global edition.] |
Pubbl/distr/stampa | Harlow, England : , : Pearson, , [2014] |
Descrizione fisica | 1 online resource (416 pages) : illustrations |
Disciplina | 658.472 |
Soggetto topico | Business intelligence |
ISBN | 1-292-00502-5 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Cover -- Title Page -- Contents -- Preface -- About the Authors -- Chapter 1 An Overview of Business -- 1.1 Opening Vignette: Magpie Sensing -- 1.2 Changing Business Environments and Computerized -- The Business Pressures-Responses-Support Model -- 1.3 A Framework for Business Intelligence (BI) -- Definitions of BI -- A Brief History of BI -- The Architecture of BI -- The Origins and Drivers of BI -- Application Case 1.1 Sabre Helps Its Clients -- A Multimedia Exercise in Business Intelligence -- 1.4 Intelligence Creation, Use, and BI Governance -- A Cyclical Process of Intelligence Creation and Use -- Intelligence and Espionage -- 1.5 Transaction Processing Versus Analytic Processing -- 1.6 Successful BI Implementation -- The Typical BI User Community -- Appropriate Planning and Alignment with the Business -- Real-Time, On-Demand BI Is Attainable -- Developing or Acquiring BI Systems -- Justification and Cost-Benefit Analysis -- Security and Protection of Privacy -- Integration of Systems and Applications -- 1.7 Analytics Overview -- Descriptive Analytics -- Predictive Analytics -- Application Case 1.2 Eliminating Inefficiencies -- Application Case 1.3 Analysis at the Speed -- Prescriptive Analytics -- Application Case 1.4 Moneyball: Analytics in Sports -- Application Case 1.5 Analyzing Athletic Injuries -- Analytics Applied to Different Domains -- Application Case 1.6 Industrial and Commercial Bank of China -- Analytics or Data Science? -- 1.8 Brief Introduction to Big Data Analytics -- What Is Big Data? -- Application Case 1.7 Gilt Groupe's Flash Sales -- 1.9 Plan of the Book -- 1.10 Resources, Links, and the Teradata University -- Resources and Links -- Vendors, Products, and Demos -- Periodicals -- The Teradata University Network Connection -- The Book's Web Site -- Key Terms -- Questions for Discussion -- Exercises.
End-of-Chapter Application Case -- References -- Chapter 2 Data Warehousing -- 2.1 Opening Vignette: Isle of Capri Casinos -- 2.2 Data Warehousing Definitions and Concepts -- What Is a Data Warehouse? -- A Historical Perspective to Data Warehousing -- Characteristics of Data Warehousing -- Data Marts -- Operational Data Stores -- Enterprise Data Warehouses (EDW) -- Application Case 2.1 A Better Data Plan: Well-Established -- Metadata -- 2.3 Data Warehousing Process Overview -- Application Case 2.2 Data Warehousing Helps -- 2.4 Data Warehousing Architectures -- Alternative Data Warehousing Architectures -- Which Architecture Is the Best? -- 2.5 Data Integration and the Extraction, Transformation -- Data Integration -- Application Case 2.3 BP Lubricants Achieves BIGS Success -- Extraction, Transformation, and Load -- 2.6 Data Warehouse Development -- Application Case 2.4 Things Go Better with Coke's -- Data Warehouse Development Approaches -- Application Case 2.5 Starwood Hotels & Resorts Manages -- Additional Data Warehouse Development Considerations -- Representation of Data in Data Warehouse -- Analysis of Data in Data Warehouse -- OLAP Versus OLTP -- OLAP Operations -- 2.7 Data Warehousing Implementation Issues -- Application Case 2.6 EDW Helps Connect State -- Massive Data Warehouses and Scalability -- 2.8 Real-Time Data Warehousing -- Application Case 2.7 Egg Plc Fries the Competition -- 2.9 Data Warehouse Administration, Security -- The Future of Data Warehousing -- 2.10 Resources, Links, and the Teradata University Network -- Resources and Links -- Cases -- Vendors, Products, and Demos -- Periodicals -- Additional References -- The Teradata University Network (TUN) Connection -- Key Terms -- Questions for Discussion -- Exercises -- End-of-Chapter Application Case -- References -- Chapter 3 Business Reporting, Visual Analytics, and Business. 3.1 Opening Vignette: Self-Service Reporting -- 3.2 Business Reporting Definitions and Concepts -- What Is a Business Report? -- Application Case 3.1 Delta Lloyd Group Ensures Accuracy -- Components of Business Reporting Systems -- Application Case 3.2 Flood of Paper -- 3.3 Data and Information Visualization -- Application Case 3.3 Tableau Saves Blastrac -- A Brief History of Data Visualization -- Application Case 3.4 TIBCO Spotfire Provides -- 3.4 Different Types of Charts and Graphs -- Basic Charts and Graphs -- Specialized Charts and Graphs -- 3.5 The Emergence of Data Visualization and Visual Analytics -- Visual Analytics -- High-Powered Visual Analytics Environments -- 3.6 Performance Dashboards -- Dashboard Design -- Application Case 3.5 Dallas Cowboys Score Big -- Application Case 3.6 Saudi Telecom Company Excels -- What to Look For in a Dashboard -- Best Practices in Dashboard Design -- Benchmark Key Performance Indicators -- Wrap the Dashboard Metrics with Contextual -- Validate the Dashboard Design by a Usability -- Prioritize and Rank Alerts/Exceptions Streamed -- Enrich Dashboard with Business-User Comments -- Present Information in Three Different Levels -- Pick the Right Visual Construct Using Dashboard Design Principles -- Provide for Guided Analytics -- 3.7 Business Performance Management -- Closed-Loop BPM Cycle -- Application Case 3.7 IBM Cognos Express Helps -- 3.8 Performance Measurement -- Key Performance Indicator (KPI) -- Performance Measurement System -- 3.9 Balanced Scorecards -- The Four Perspectives -- The Meaning of Balance in BSC -- Dashboards Versus Scorecards -- 3.10 Six Sigma as a Performance Measurement System -- The DMAIC Performance Model -- Balanced Scorecard Versus Six Sigma -- Effective Performance Measurement -- Application Case 3.8 Expedia.com's Customer Satisfaction -- Key Terms -- Questions for Discussion. Exercises -- End-of-Chapter Application Case -- References -- Chapter 4 Data Mining -- 4.1 Opening Vignette: Cabela's Reels in More -- 4.2 Data Mining Concepts and Applications -- Definitions, Characteristics, and Benefits -- Application Case 4.1 Smarter Insurance: Infinity -- How Data Mining Works -- Application Case 4.2 Harnessing Analytics to Combat -- Data Mining Versus Statistics -- 4.3 Data Mining Applications -- Application Case 4.3 A Mine on Terrorist Funding -- 4.4 Data Mining Process -- Step 1: Business Understanding -- Step 2: Data Understanding -- Step 3: Data Preparation -- Step 4: Model Building -- Step 5: Testing and Evaluation -- Step 6: Deployment -- Application Case 4.4 Data Mining in Cancer Research -- Other Data Mining Standardized Processes -- 4.5 Data Mining Methods -- Classification -- Estimating the True Accuracy of Classification Models -- Application Case 4.5 2degrees Gets a 1275 Percent -- Cluster Analysis for Data Mining -- Association Rule Mining -- 4.6 Data Mining Software Tools -- Application Case 4.6 Data Mining Goes to Hollywood: -- 4.7 Data Mining Privacy Issues, Myths, and Blunders -- Data Mining and Privacy Issues -- Application Case 4.7 Predicting Customer Buying -- Data Mining Myths and Blunders -- Key Terms -- Questions for Discussion -- Exercises -- End-of-Chapter Application Case -- References -- Chapter 5 Text and Web Analytics -- 5.1 Opening Vignette: Machine Versus Men -- 5.2 Text Analytics and Text Mining Overview -- Application Case 5.1 Text Mining for Patent Analysis -- 5.3 Natural Language Processing -- Application Case 5.2 Text Mining Improves Hong -- 5.4 Text Mining Applications -- Marketing Applications -- Security Applications -- Application Case 5.3 Mining for Lies -- Biomedical Applications -- Academic Applications -- Application Case 5.4 Text mining and Sentiment -- 5.5 Text Mining Process. Task 1: Establish the Corpus -- Task 2: Create the Term-Document Matrix -- Task 3: Extract the Knowledge -- Application Case 5.5 Research Literature Survey -- 5.6 Sentiment Analysis -- Application Case 5.6 Whirlpool Achieves Customer -- Sentiment Analysis Applications -- Sentiment Analysis Process -- Methods for Polarity Identification -- Using a Lexicon -- Using a Collection of Training Documents -- Identifying Semantic Orientation of Sentences -- Identifying Semantic Orientation of Document -- 5.7 Web Mining Overview -- Web Content and Web Structure Mining -- 5.8 Search Engines -- Anatomy of a Search Engine -- Development Cycle -- Web Crawler -- Document Indexer -- Response Cycle -- Query Analyzer -- Document Matcher/Ranker -- Search Engine Optimization -- Methods for Search Engine Optimization -- Application Case 5.7 Understanding Why Customers -- 5.9 Web Usage Mining (Web Analytics) -- Web Analytics Technologies -- Application Case 5.8 Allegro Boosts Online Click-Through -- Web Analytics Metrics -- Web Site Usability -- Traffic Sources -- Visitor Profiles -- Conversion Statistics -- 5.10 Social Analytics -- Social Network Analysis -- Social Network Analysis Metrics -- Application Case 5.9 Social Network Analysis Helps -- Connections -- Distributions -- Segmentation -- Social Media Analytics -- How Do People Use Social Media? -- Application Case 5.10 Measuring the Impact of Social -- Measuring the Social Media Impact -- Best Practices in Social Media Analytics -- Application Case 5.11 eHarmony Uses Social -- Key Terms -- Questions for Discussion -- Exercises -- End-of-Chapter Application Case -- References -- Chapter 6 Big Data and Analytics -- 6.1 Opening Vignette: Big Data Meets Big Science at CERN -- 6.2 Definition of Big Data -- The Vs That Define Big Data -- Application Case 6.1 BigData Analytics Helps. 6.3 Fundamentals of Big Data Analytics. |
Record Nr. | UNINA-9910153069003321 |
Sharda Ramesh
![]() |
||
Harlow, England : , : Pearson, , [2014] | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|