Data mining is the process of extracting hidden patterns from data, and it's commonly used in business, bioinformatics, counter-terrorism, and, increasingly, in professional sports. First popularized in Michael Lewis' best-selling Moneyball: The Art of Winning An Unfair Game, it is has become an intrinsic part of all professional sports the world over, from baseball to cricket to soccer. While an industry has developed based on statistical analysis services for any given sport, or even for betting behavior analysis on these sports, no research-level book has considered the subject...
Data mining is the process of extracting hidden patterns from data, and it's commonly used in business, bioinformatics, counter-terrorism, and, inc...
This book is a compilation of chapters written by leading researchers from all over the world. Those researchers' common characteristic is that they have investigated issues at the intersection of the elds of information systems (IS) and evoluti- ary psychology (EP). The main goal of this book is to serve as a reference for IS research building on EP concepts and theories (in short, IS-EP research). The book is organized in three main parts: Part I focuses on EP concepts and theories that can be used as a basis for IS-EP research; Part II provides several exemplars of IS-EP research in...
This book is a compilation of chapters written by leading researchers from all over the world. Those researchers' common characteristic is that they h...
Comparative E-Government examines the impact of information and communication technology (ICT) on governments throughout the world. It focuses on the adoption of e-government both by comparing different countries, and by focusing on individual countries and the success and challenges that they have faced. With 32 chapters from leading e-government scholars and practitioners from around the world, there is representation of developing and developed countries and their different stages of e-government adoption. Part I compares the adoption of e-government in two or more countries. The purpose...
Comparative E-Government examines the impact of information and communication technology (ICT) on governments throughout the world. It focuses on the ...
Logical Data Modeling offers business managers, analysts, and students a clear, basic systematic guide to defining business information structures in relational database terms. The approach, based on Clive Finkelstein s business-side Information Engineering, is hands-on, practical, and explicit in terminology and reasoning. Filled with illustrations, examples, and exercises, Logical Data Modeling makes its subject accessible to readers with only a limited knowledge of database systems. The book covers all essential topics thoroughly but succinctly:...
Logical Data Modeling offers business managers, analysts, and students a clear, basic systematic guide to defining business inform...
Designing and Evaluating E-Managemnet Decision Tools presents the most relevant concepts for designing intelligent decision tools in an Internet-based multimedia environment and assessing the tools using concepts of statistical design of experiments. The design principle is based on the visual interactive decision modeling (VIDEMO) paradigm. Several case studies are discussed in detail, referring to online preference elicitation, collaborative decision making, negotiation and conflict resolution, and marketing decision optimization.
(See www.beroggi.net for more...
Designing and Evaluating E-Managemnet Decision Tools presents the most relevant concepts for designing intelligent decision tools ...
On September 11, 2001 the World became completely cognizant of the security challenges it faces on an international scale. With this awareness a commitment has come from the scientific, engineering, and health communities to help meet the world meet an array of security challenges. From these activities the science of "Intelligence and Security Informatics," is emerging, which will influence a new generation of policy makers, practitioners, researchers, and students. INTELLIGENCE AND SECURITY INFORMATICS FOR INTERNATIONAL SECURITY: Information Sharing and Data Mining...
On September 11, 2001 the World became completely cognizant of the security challenges it faces on an international scale. With this awareness a co...
Medical Informatics and biomedical computing have grown in quantum measure over the past decade. An abundance of advances have come to the foreground in this field with the vast amounts of biomedical and genomic data, the Internet, and the wide application of computer use in all aspects of medical, biological, and health care research and practice. MEDICAL INFORMATICS: Knowledge Management and Data Mining in Biomedicine covers the basic foundations of the area while extending the foundational material to include the recent leading-edge research in the field. The newer...
Medical Informatics and biomedical computing have grown in quantum measure over the past decade. An abundance of advances have come to the foregrou...
Recently knowledge management and management learning has received considerable published coverage; however, most of this exposure is based on a rational, mechanistic view of knowledge management. Practice, on the other hand, has taught us that knowledge management and learning are extremely broad concepts with an expanding area of subfields. This rationalized and measured view of knowledge management has lead to a more technologically driven development of the field. In practice, however, this view of knowledge management has fallen short of its promise. This situation has created the...
Recently knowledge management and management learning has received considerable published coverage; however, most of this exposure is based on a ra...
This book details metagraph theory and its applications. It begins by defining a metagraph and its uses, which allow for the representation and analysis of more complex systems. The first part of the book develops the theoretical results with an emphasis on the development of a metagraph algebra. In the second part, four promising applications of metagraphs are examined.
This book details metagraph theory and its applications. It begins by defining a metagraph and its uses, which allow for the representation and ana...
The overall mission of this book is to provide a comprehensive understanding and coverage of the various theories and models used in IS research. Specifically, it aims to focus on the following key objectives: To describe the various theories and models applicable to studying IS/IT management issues. To outline and describe, for each of the various theories and models, independent and dependent constructs, reference discipline/originating area, originating author(s), seminal articles, level of analysis (i.e. firm, individual, industry) and links with other theories. To provide a critical...
The overall mission of this book is to provide a comprehensive understanding and coverage of the various theories and models used in IS research. S...