You are previewing Business Intelligence: Concepts, Methodologies, Tools, and Applications.
O'Reilly logo
Business Intelligence: Concepts, Methodologies, Tools, and Applications

Book Description

Data analysis is an important part of modern business administration, as efficient compilation of information allows managers and business leaders to make the best decisions for the financial solvency of their organizations. Understanding the use of analytics, reporting, and data mining in everyday business environments is imperative to the success of modern businesses. Business Intelligence: Concepts, Methodologies, Tools, and Applications presents a comprehensive examination of business data analytics along with case studies and practical applications for businesses in a variety of fields and corporate arenas. Focusing on topics and issues such as critical success factors, technology adaptation, agile development approaches, fuzzy logic tools, and best practices in business process management, this multivolume reference is of particular use to business analysts, investors, corporate managers, and entrepreneurs in a variety of prominent industries.

Table of Contents

  1. Cover
  2. Title Page
  3. Copyright Page
  4. Editorial Advisory Board and List of Reviewers
    1. Editor-in-Chief
    2. Associate Editors
    3. Editorial Advisory Board
  5. Preface
  6. Section 1: Fundamental Concepts and Theories
    1. Chapter 1: Text-Driven Reasoning and Multi-Structured Data Analytics for Business Intelligence
      1. ABSTRACT
      2. INTRODUCTION
      3. MULTI-STRUCTURED DATA ANALYTICS: A BRIEF INTRODUCTION
      4. TEXT ANALYSIS DRIVEN BUSINESS INTELLIGENCE: A REVIEW
      5. APPLICATIONS OF TEXT MINING ON CUSTOMER COMMUNICATIONS: REVIEW OF RELATED WORK
      6. TEXT MINING TO OBTAIN OPEN SOURCE BUSINESS INTELLIGENCE: REVIEW OF RELATED WORK
      7. A NEW FRAMEWORK FOR INFORMATION FUSION AND INTEGRATION FOR BUSINESS INTELLIGENCE
      8. EVENT EXTRACTION AND CHARACTERIZATION FROM TEXT DOCUMENTS
      9. CHARACTERIZING BUSINESS CRITICAL EVENTS
      10. CORRELATION-BASED IMPACT ANALYSIS FOR MINED EVENTS ON STRUCTURED DATA
      11. CASE STUDY
      12. FUTURE RESEARCH DIRECTIONS
      13. CONCLUSION
      14. REFERENCES
      15. ADDITIONAL READING
      16. KEY TERMS AND DEFINITIONS
      17. ENDNOTES
    2. Chapter 2: Implementing Business Intelligence in Contemporary Organizations
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. IMPLEMENTING A BUSINESS INTELLIGENCE
      5. FUTURE RESEARCH DIRECTIONS
      6. CONCLUSION
      7. REFERENCES
      8. KEY TERMS AND DEFINITIONS
    3. Chapter 3: Overview of Business Intelligence through Data Mining
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. DATA MINING BASICS
      5. COMPETITIVE ADVANTAGE THROUGH BI
      6. IMPACT OF BUSINESS INTELLIGENCE ON MODERN BUSINESS
      7. CASE STUDY: JAEGER LOCATES LOSSES WITH BI
      8. CASE STUDY: KFC/PIZZA HUT FIND A BETTER BI TOOL
      9. FUTURE CHALLENGES
      10. DISCUSSION AND REMARKS
      11. CONCLUSION
      12. REFERENCES
      13. ADDITIONAL READING
      14. KEY TERMS AND DEFINITIONS
    4. Chapter 4: Overview of Predictive Modeling Approaches in Health Care Data Mining
      1. ABSTRACT
      2. 1. INTRODUCTION
      3. 2. DATA MINING METHOD AND ITS CLASSIFICATION
      4. 3. PRELIMINARIES AND LITERATURE SURVEY OF PREDICTIVE DATA MINING METHODS
      5. 4. CONCLUSION AND FINDINGS
      6. REFERENCES
      7. KEY TERMS AND DEFINITIONS
    5. Chapter 5: Understanding the Influence of Business Intelligence Systems on Information Quality
      1. ABSTRACT
      2. INTRODUCTION
      3. CONCEPTUAL RESEARCH MODEL
      4. RESULTS
      5. FINDINGS
      6. FUTURE RESEARCH DIRECTIONS
      7. CONCLUSION
      8. ACKNOWLEDGMENT
      9. REFERENCES
      10. ADDITIONAL READING
      11. KEY TERMS AND DEFINITIONS
    6. Chapter 6: An Enterprise Ontology Based Conceptual Modeling Grammar for Representing Value Chain and Supply Chain Scripts
      1. ABSTRACT
      2. INTRODUCTION
      3. INTRODUCTION TO REA
      4. REA PRIMITIVES
      5. REA AXIOMS
      6. COMPARATIVE ANALYSIS
      7. INSIDE AND OUTSIDE AGENT
      8. RELATED RESEARCH
      9. CONCLUSION
      10. ACKNOWLEDGMENT
      11. REFERENCES
      12. ENDNOTES
    7. Chapter 7: Trust-Based Knowledge Management System Building
      1. ABSTRACT
      2. INTRODUCTION
      3. WHAT WE SHOULD KNOW ABOUT TRUST
      4. A CASE STUDY ABOUT A MULTINATIONAL COMPANY IN HUNGARY
      5. BACKGROUND
      6. A CASE STUDY ABOUT A BIG HUNGARIAN COMPANY
      7. A CASE STUDY ABOUT A HUNGARIAN UNIVERSITY: TO CONSTRUCT A KNOWLEDGE MANAGEMENT CENTRE
      8. SUMMARY
      9. CONCLUSION
      10. REFERENCES
    8. Chapter 8: We Have Good Information for You
      1. ABSTRACT
      2. INTRODUCTION
      3. FOLKAUTHORITY AND INFORMATION RETRIEVAL
      4. THE AUTHORITYSEARCH SYSTEM
      5. THE EVALUATION OF AUTHORITYSEARCH
      6. DIRECTIONS FOR FUTURE RESEARCH
      7. CONCLUSION
      8. ACKNOWLEDGMENT
      9. REFERENCES
      10. ADDITIONAL READING
      11. KEY TERMS AND DEFINITIONS
    9. Chapter 9: Big Data and Service Science
      1. ABSTRACT
      2. BIG DATA
      3. MACHINE LEARNING AND DATA MINING TECHNIQUES
      4. SERVICE SCIENCE
      5. BIG DATA IN SERVICE SCIENCE
      6. CONCLUSION
      7. REFERENCES
      8. KEY TERMS AND DEFINITIONS
    10. Chapter 10: Information Systems Innovations Using Competitive Intelligence
      1. ABSTRACT
      2. 1. INTRODUCTION
      3. 2. RESEARCH METHODOLOGY
      4. 3. DATA ANALYSIS
      5. 4. FINDINGS
      6. 5. CHAPTER RECOMMENDATIONS
      7. 6. BENEFIT FROM THE ANALYSIS
      8. 7. CONCLUSION
      9. REFERENCES
      10. KEY TERMS AND DEFINITIONS
    11. Chapter 11: Business Intelligence, Knowledge Management, and Customer Relationship Management Technological Support in Enterprise Competitive Competence
      1. ABSTRACT
      2. INTRODUCTION
      3. 1. LITERATURE REVIEW
      4. 2. BUILDING INTELLIGENCE ENTERPRISE FRAMEWORK
      5. 3. INTELLIGENCE ENTERPRISE OPERATION
      6. 4. CONCLUSION
      7. REFERENCES
      8. KEY TERMS AND DEFINITIONS
    12. Chapter 12: Competitive Advantage and Automated Sharing of Tacit Knowledge
      1. ABSTRACT
      2. INTRODUCTION
      3. ELECTRONIC SYSTEMS USED IN KNOWLEDGE MANAGEMENT
      4. MANAGERIAL IMPLICATIONS
      5. CONCLUSION
      6. REFERENCES
    13. Chapter 13: Biological and Medical Big Data Mining
      1. ABSTRACT
      2. INTRODUCTION
      3. BASIC MOLECULAR BIOLOGY CONCEPTS
      4. NEW BIOLOGICAL FIELDS AND PARADIGMS
      5. DATA MINING
      6. BIG DATA CHALLENGES AND OPPORTUNITIES
      7. BIOLOGICAL AND MEDICAL DATA MINING APPLICATIONS
      8. CONCLUSION
      9. REFERENCES
    14. Chapter 14: Rules Extraction using Data Mining in Historical Data
      1. ABSTRACT
      2. INTRODUCTION
      3. PHASES OF RULES EXTRACTION
      4. PARADIGM OF RULE EXTRACTION
      5. DECISION RULE ALGORITHM
      6. REGRESSION
      7. HYPOTHESIS TESTING ALGORITHM
      8. ROUGH SET RULES
      9. RESEARCH METHODOLOGIES
      10. TOOLS FOR RULE EXTRACTION
      11. ATTRIBUTE SELECTION MEASURE
      12. REMARKS
      13. CONCLUSION
      14. ACKNOWLEDGMENT
      15. REFERENCES
      16. ADDITIONAL READING
      17. KEY TERMS AND DEFINITIONS
  7. Section 2: Development and Design Methodologies
    1. Chapter 15: A Perturbation Method Based on Singular Value Decomposition and Feature Selection for Privacy Preserving Data Mining
      1. ABSTRACT
      2. INTRODUCTION
      3. ACKNOWLEDGMENT
      4. REFERENCES
      5. ENDNOTE
    2. Chapter 16: Business Intelligence Strategy
      1. ABSTRACT
      2. INTRODUCTION
      3. LITERATURE REVIEW
      4. RESEARCH METHOD
      5. CASE STUDY
      6. CASE STUDY SUMMARY
      7. CONCLUSION
      8. ACKNOWLEDGMENT
      9. REFERENCES
    3. Chapter 17: Alignment of Knowledge Sharing Mechanism and Knowledge Node Positioning
      1. ABSTRACT
      2. INTRODUCTION
      3. CONCLUSION
      4. REFERENCES
    4. Chapter 18: Implementation of Mining Techniques to Enhance Discovery in Service-Oriented Computing
      1. ABSTRACT
      2. INTRODUCTION
      3. ISSUES IN SERVICE DISCOVERY AND RESOLUTIONS
      4. LITERATURE REVIEW
      5. A CASE STUDY
      6. CONCLUSION
      7. REFERENCES
      8. ADDITIONAL READING
      9. KEY TERMS AND DEFINITIONS
    5. Chapter 19: Predictive Analytics and Data Mining
      1. ABSTRACT
      2. INTRODUCTION
      3. RELATED WORKS
      4. CABS: CLUSTER ANALYSIS TO STUDY BEHAVIOR OF SCHOOL CHILDREN FROM LARGE DATABASES
      5. IMPLEMENTATION
      6. EXPERIMENTATION
      7. CONCLUSION AND FUTURE WORK
      8. REFERENCES
      9. KEY TERMS AND DEFINITIONS
    6. Chapter 20: Infrastructures of Knowledge Sharing Countrywide
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. RESEARCH AIMS
      5. HYPOTHESIS
      6. METHODOLOGY
      7. FINDINGS
      8. TESTING THE HYPOTHESES
      9. CONCLUSION
      10. REFERENCES
      11. KEY TERMS AND DEFINITIONS
    7. Chapter 21: A Hybrid Analysis of E-Learning Types and Knowledge Sharing Measurement Indicators
      1. ABSTRACT
      2. INTRODUCTION
      3. LITERATURE REVIEW
      4. INTEGRATED VIEW
      5. CONCLUSION
      6. REFERENCES
    8. Chapter 22: The Role of Knowledge Sharing on Organisational Innovation
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. MAIN FOCUS OF THE CHAPTER
      5. FUTURE RESEARCH DIRECTIONS
      6. CONCLUSION
      7. REFERENCES
      8. ADDITIONAL READING
      9. KEY TERMS AND DEFINITIONS
    9. Chapter 23: Data Mining Models as a Tool for Churn Reduction and Custom Product Development in Telecommunication Industries
      1. ABSTRACT
      2. 1. INTRODUCTION
      3. 2. BACKGROUND
      4. 3. VEZA COMPANY: GOALS OF THE PROJECT
      5. 4. PROPOSED SOLUTION FROM PERSPECTIVE OF DATA MINING METHODS
      6. 5. DATA FOUNDATION
      7. 6. MODELING SOLUTION FOR PROSPECTIVE CUSTOMER VALUE CALCULATION
      8. 7. CHURN PREDICTION MODELLING
      9. 8. REVEALED KNOWLEDGE AS A BASE FOR THE CHURN MITIGATION STRATEGIES AND THE NEW PRODUCTS DEVELOPMENT
      10. 9. DISCUSSION
      11. 10. FUTURE RESEARCH
      12. 11. CONCLUSION
      13. REFERENCES
      14. ADDITIONAL READING
      15. KEY TERMS AND DEFINITIONS
      16. APPENDIX
    10. Chapter 24: A Layered Parameterized Framework for Intelligent Information Retrieval in Dynamic Social Network using Data Mining
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. MAIN FOCUS OF THE CHAPTER
      5. CONCLUSION AND FUTURE RESEARCH
      6. REFERENCES
      7. ADDITIONAL READING
      8. KEY TERMS AND DEFINITIONS
    11. Chapter 25: Lessons from the Private Sector
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. METHODOLOGY
      5. MAIN FOCUS OF THE CHAPTER
      6. CASE FINDINGS
      7. SOLUTIONS AND RECOMMENDATIONS
      8. FUTURE RESEARCH DIRECTIONS
      9. CONCLUSION
      10. REFERENCES
      11. KEY TERMS AND DEFINITIONS
    12. Chapter 26: BISC
      1. ABSTRACT
      2. 1. INTRODUCTION
      3. 2. LITERATURE REVIEW AND THEORETICAL BACKGROUND
      4. 3. RELATED WORKS
      5. 4. THE PROPOSED FRAMEWORK
      6. 5. EVALUATION OF THE PROPOSED FRAMEWORK
      7. 6. CASE STUDY: BANK
      8. 7. CONCLUSION
      9. ACKNOWLEDGMENT
      10. REFERENCES
    13. Chapter 27: Evaluation of Clustering Methods for Adaptive Learning Systems
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. EVALUATION OF THE MAIN CLUSTERING METHODS
      5. FUTURE RESEARCH DIRECTIONS
      6. CONCLUSION
      7. REFERENCES
      8. ADDITIONAL READING
      9. KEY TERMS AND DEFINITIONS
    14. Chapter 28: Application of Data Mining and Analysis Techniques for Renewable Energy Network Design and Optimization
      1. ABSTRACT
      2. INTRODUCTION
      3. MOTIVATION
      4. DEMONSTRATION
      5. CONCLUSION
      6. REFERENCES
      7. ADDITIONAL READING
      8. KEY TERMS AND DEFINITIONS
    15. Chapter 29: Applications of Data Mining in Software Development Life Cycle
      1. ABSTRACT
      2. 1. INTRODUCTION
      3. 2. RESEARCH METHODOLOGY
      4. 3. INTRODUCTION TO SDLC
      5. 4. INTRODUCTION TO DATA MINING
      6. 5. CLASSIFICATION FRAMEWORK
      7. 6. RESEARCH IMPLICATIONS
      8. 7. LIMITATIONS
      9. 8. CONCLUSION
      10. REFERENCES
      11. ADDITIONAL READING
      12. KEY TERMS AND DEFINITIONS
  8. Section 3: Tools and Technologies
    1. Chapter 30: Integrating Business Intelligence Services in the Cloud
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. INTEGRATED CLOUD-BASED BUSINESS INTELLIGENCE
      5. FUTURE RESEARCH DIRECTIONS
      6. CONCLUSION
      7. REFERENCES
      8. KEY TERMS AND DEFINITIONS
    2. Chapter 31: X-CM
      1. ABSTRACT
      2. INTRODUCTION
      3. RELATED WORKS
      4. CONCEPTUAL MODELING USING XER
      5. OUR PROPOSED MODEL REQUIREMENT FOR XML CONCEPTUAL MODELING
      6. X-CM: CONCEPTUAL MODELING FOR XML DATABASES
      7. A CASE STUDY ON A UNIVERSITY-BASED SCENARIO
      8. CONCEPTUAL MODELING USING X-CM
      9. EVALUATION OF X-CM BY XML EXPERTS
      10. EVALUATION QUALITY OF X-CM BY EXPERIMENTAL TESTING
      11. EXPERIMENTAL DESIGN
      12. EXPERIMENTAL TREATMENT
      13. EXPERIMENTAL TASK
      14. EVALUATION TASK
      15. RESULTS AND DISCUSSIONS
      16. CONCLUSION
      17. ACKNOWLEDGMENT
      18. REFERENCES
      19. APPENDIX
    3. Chapter 32: Information Retrieval Technologies and the “Realities” of Music Information Seeking
      1. ABSTRACT
      2. INTRODUCTION
      3. MUSIC INFORMATION SEEKING BEHAVIOR
      4. MUSICIANS AND MUSIC INFORMATION TECHNOLOGIES
      5. A CONCEPTUAL APPROACH ON MUSIC INFORMATION RETRIEVAL (MIR)
      6. DISCUSSION
      7. CONCLUSION
      8. REFERENCES
      9. APPENDIX
    4. Chapter 33: A Formative Evaluation of Rendezvous
      1. ABSTRACT
      2. INTRODUCTION
      3. LITERATURE REVIEW
      4. RENDEZVOUS: DESIGN OVERVIEW
      5. METHODOLOGY
      6. DATA COLLECTION AND ANALYSIS
      7. DISCUSSION
      8. CONCLUSION
      9. ACKNOWLEDGMENT
      10. REFERENCES
      11. APPENDIX
    5. Chapter 34: A Fireworks Algorithm for Modern Web Information Retrieval with Visual Results Mining
      1. ABSTRACT
      2. INTRODUCTION
      3. REVIEW OF LITERATURE
      4. PRELIMINARY CONCEPTS
      5. FIREWORKS ALGORITHM OVERVIEW
      6. RESEARCH APPROACH
      7. EXPERIMENTATION AND RESULTS
      8. VISUAL RESULTS MINING
      9. CONCLUSION
      10. FUTURE WORKS
      11. REFERENCES
    6. Chapter 35: Computer-Aided Deductive Critical Discourse Analysis of a Case Study from Mauritius with ATLAS-ti 6.2
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. COMPUTER-AIDED DEDUCTIVE CRITICAL DISCOURSE ANALYSIS
      5. FUTURE RESEARCH DIRECTIONS
      6. CONCLUSION
      7. REFERENCES
      8. ADDITIONAL READING
      9. KEY TERMS AND DEFINITIONS
      10. ENDNOTES
    7. Chapter 36: Visualization of High-Level Associations from Twitter Data
      1. ABSTRACT
      2. INTRODUCTION
      3. RELATED WORKS
      4. THE TWITTER GENERALIZED RULE VISUALIZER
      5. EXPERIMENTAL VALIDATION
      6. FUTURE RESEARCH DIRECTIONS
      7. CONCLUSION
      8. REFERENCES
      9. ADDITIONAL READING
      10. KEY TERMS AND DEFINITIONS
    8. Chapter 37: Information Retrieval (IR) and Extracting Associative Rules
      1. ABSTRACT
      2. INTRODUCTION
      3. 2. INFORMATION RETRIEVAL, BASIC CONCEPTS AND MODELS
      4. 3. ASSOCIATION RULES
      5. 4. IMPLEMENTATION
      6. 5. CONCLUSION
      7. REFERENCES
    9. Chapter 38: Validating a Model Predicting Retrieval Ordering Performance with Statistically Dependent Binary Features
      1. ABSTRACT
      2. INTRODUCTION
      3. SUMMARY AND CONCLUSION
      4. REFERENCES
    10. Chapter 39: A Tool for GIS Based Risk Analysis for Transportation of Dangerous Goods on Road (the RAGISADR)
      1. ABSTRACT
      2. INTRODUCTION
      3. CASE STUDY FOR FUEL PRODUCTS TRANSPORTATION ON ROAD
      4. CONCLUSION
      5. REFERENCES
      6. KEY TERMS AND DEFINITIONS
    11. Chapter 40: The Use of Arabic WordNet in Arabic Information Retrieval
      1. ABSTRACT
      2. INTRODUCTION
      3. RELATED WORK
      4. THE EXPANSION PROCEDURE
      5. EXPERIMENTS
      6. RESULTS
      7. CONCLUSION
      8. REFERENCES
    12. Chapter 41: Authenticity in Online Knowledge Sharing
      1. ABSTRACT
      2. INTRODUCTION
      3. CASE DESCRIPTION
      4. THE ROLE OF AUTHENTICITY IN KNOWLEDGE SHARING
      5. CASE DESCRIPTION
      6. GOTOMEETING™ FACILITATING LEARNING ACTIVITES ACROSS BOUNDARIES
      7. DISCUSSION AND CONCLUSION
      8. REFERENCES
    13. Chapter 42: ConChi
      1. ABSTRACT
      2. INTRODUCTION
      3. PREVIOUS WORKS
      4. THE CONCHI FRAMEWORK
      5. EXPERIMENTAL VALIDATION
      6. CONCLUSION
      7. FUTURE RESEARCH DIRECTIONS
      8. REFERENCES
      9. ADDITIONAL READING
      10. KEY TERMS AND DEFINITIONS
    14. Chapter 43: Social Networks Discovery Based on Information Retrieval Technologies and Bees Swarm Optimization
      1. ABSTRACT
      2. INTRODUCTION
      3. MOTIVATION
      4. METHODOLOGY
      5. RELATED WORKS
      6. STRUCTURE
      7. AN INFORMATION RETRIEVAL DESIGN
      8. LEX AS A TOOL FOR DOCUMENTS INDEXING
      9. TRADITIONAL MATCHING TECHNIQUES
      10. SIMILARITY MEASURE
      11. SEARCH PROCESS
      12. BEE SWARM OPTIMIZATION BSO
      13. BEEINIT
      14. THE SEARCH AREA
      15. THE DANCE STRUCTURE
      16. BSO ALGORITHM
      17. BSO FOR INFORMATION RETRIEVAL
      18. SOLUTIONS ENCODING
      19. DETERMINATION OF SEARCH AREA
      20. THE NEW ARCHITECTURE FOR THE IRS
      21. ARCHITECTURE FOR THE OVERALL SYSTEM
      22. EXPERIMENTAL STUDY
      23. EXAMPLES OF EXTRACTION OF DOCUMENTS
      24. CONCLUSION
      25. REFERENCES
    15. Chapter 44: Effectiveness of Visualization for Information Retrieval through Ontologies with Entity Evolution
      1. ABSTRACT
      2. 1. INTRODUCTION
      3. 2. BACKGROUND AND RELATED WORK
      4. 3. THE ONTOLOGY USED
      5. 4. ONTOLOGY VISUALIZATIONS
      6. 5. EVALUATION DESCRIPTION AND SET-UP
      7. 6. DISCUSSION
      8. 7. CONCLUSION AND FUTURE WORK
      9. REFERENCES
  9. Section 4: Utilization and Application
    1. Chapter 45: A Case Study of a Knowledge-Sharing Web-Based Platform for Energy Education
      1. ABSTRACT
      2. 1. INTRODUCTION
      3. 2. PURPOSES OF RESEARCH
      4. 3. LITERATURE REVIEW
      5. 4. METHODOLOGY
      6. 5. RESULTS
      7. 6. CONCLUSION
      8. ACKNOWLEDGMENT
      9. REFERENCES
    2. Chapter 46: The Importance of Visualization and Interaction in the Anomaly Detection Process
      1. ABSTRACT
      2. INTRODUCTION
      3. THE ROLE OF VISUALIZATION AND INTERACTION IN DATA MINING
      4. THE ROLE OF VISUALIZATION AND INTERACTION IN ANOMALY DETECTION
      5. ANOMALY DETECTION METHODS FOR MARITIME TRAFFIC
      6. HOW DO EXPERTS MONITOR MARITIME TRAFFIC?
      7. USING VISUALIZATION AND INTERACTION IN ANOMALY DETECTION
      8. EXAMPLES
      9. CONCLUSION
      10. REFERENCES
      11. KEY TERMS AND DEFINITIONS
    3. Chapter 47: Detection of Non-Technical Losses
      1. ABSTRACT
      2. INTRODUCTION
      3. REVIEW OF THE CURRENT STATE
      4. THE PROJECT MIDAS
      5. SYSTEM ARCHITECTURE
      6. SELECT SAMPLE
      7. DATA MINING
      8. INTEGRATED EXPERT SYSTEM
      9. EXPERIMENTAL RESULTS
      10. FUTURE RESEARCH DIRECTIONS
      11. CONCLUSION
      12. REFERENCES
      13. ADDITIONAL READING
      14. KEY TERMS AND DEFINITIONS
    4. Chapter 48: A Comparative Study on Medical Diagnosis Using Predictive Data Mining
      1. ABSTRACT
      2. INTRODUCTION
      3. LITERATURE REVIEW
      4. PREDECTIVE DATA MINING TECHNIQUES
      5. COMBINATION OF CLASSIFICATION ALGORITHMS
      6. MEDICAL DIAGNOSIS USING PREDICTIVE DATA MINING
      7. CONCLUSION
      8. ACKNOWLEDGMENT
      9. REFERENCES
      10. ADDITIONAL READING
      11. KEY TERMS AND DEFINITIONS
    5. Chapter 49: Knowledge Sharing for Improving Effectiveness of University-Industry Collaborations
      1. ABSTRACT
      2. INTRODUCTION
      3. WHAT IS KNOWLEDGE?
      4. KNOWLEDGE SHARING (KS)
      5. COLLABORATION BETWEEN UNIVERSITIES AND INDUSTRIAL ORGANIZATIONS FOR KNOWLEDGE SHARING
      6. COMMUNICATIONAL CHANNELS
      7. ROLE OF INFORMATION COMMUNICATIONS TECHNOLOGIES IN KNOWLEDGE SHARING
      8. UNIVERSITY-INDUSTRY TECHNOLOGY TRANSFER (UITT)
      9. ROLE OF UNIVERSITY LIBRARIES IN KNOWLEDGE SHARING
      10. CONCEPTUAL MODEL
      11. CONCLUSION
      12. REFERENCES
      13. KEY TERMS AND DEFINITIONS
    6. Chapter 50: From Project's Information Management to Project-Based Organizational Learning
      1. ABSTRACT
      2. BACKGROUND
      3. PROJECTS, PROJECT MANAGEMENT, AND PBO
      4. CURRENT TRENDS IN PROJECT MANAGEMENT LITERATURE
      5. THE TROUBLES OF INFORMATION AND KNOWLEDGE MANAGEMENT IN PBO
      6. OVERCOMING THE INFORMATIONAL LIMBO: A COMPREHENSIVE BASIS FOR KNOWLEDGE SHARING STRATEGIES
      7. CONCLUSION
      8. REFERENCES
      9. KEY TERMS AND DEFINITIONS
    7. Chapter 51: A Study on a Combined Model in Business Intelligence for Improving Electronic Insurance
      1. ABSTRACT
      2. 1. INTRODUCTION
      3. 2. ADVANTAGES OF BUSINESS INTELLIGENCE AND THE REASONS FOR THE NEED FOR IT
      4. 3. THE IMPORTANCE OF APPLYING BUSINESS INTELLIGENCE IN INSURANCE INDUSTRY AND ITS USAGE IN E-INSURANCE
      5. 4. OPTIMUM MODEL IN APPLYING BUSINESS INTELLIGENCE IN E-INSURANCE INDUSTRY
      6. 5. CONCLUSION
      7. REFERENCES
    8. Chapter 52: Enablers and Barriers of Knowledge Sharing for Offshore Outsource ISD Project
      1. ABSTRACT
      2. INTRODUCTION
      3. OFFSHORE OUTSOURCING
      4. KNOWLEDGE SHARING IN OFFSHORE ISD PROJECTS
      5. ISD PROJECT MANAGEMENT
      6. RESEARCH METHOD
      7. RESULTS AND DISCUSSION
      8. CONCLUSION AND FUTURE RESEARCH
      9. REFERENCES
    9. Chapter 53: Assessing the Usefulness of Testing for Validating and Correcting Security Risk Models Based on Two Industrial Case Studies
      1. ABSTRACT
      2. 1. INTRODUCTION
      3. 2. TEST-DRIVEN SECURITY RISK ANALYSIS
      4. 3. RESEARCH METHOD
      5. 4. OVERVIEW OF THE TWO CASE STUDIES
      6. 5. RESULTS
      7. 6. DISCUSSION
      8. 7. RELATED WORK
      9. 8. CONCLUSION
      10. ACKNOWLEDGMENT
      11. REFERENCES
    10. Chapter 54: Recognising Influences on Attitudes to Knowledge Sharing in a Research Establishment
      1. ABSTRACT
      2. INTRODUCTION
      3. FACTORS IN KNOWLEDGE SHARING
      4. INTERPRETIVISM AND KNOWLEDGE SHARING
      5. APPRECIATIVE INQUIRY METHOD
      6. FIELD STUDY ORGANIZATION
      7. THE STUDY
      8. ASPECTS OF KNOWLEDGE
      9. TACIT KNOWLEDGE
      10. KNOWLEDGE SHARING INFRASTRUCTURE
      11. VALUE OF KNOWLEDGE TO THE ORGANIZATION AND ITS CLIENTS
      12. KNOWLEDGE SHARING CULTURES IN THE ORGANIZATION
      13. MOTIVATION FOR KNOWLEDGE SHARING
      14. DISCUSSION
      15. LIMITATIONS OF THE RESEARCH
      16. FURTHER WORK
      17. REFERENCES
    11. Chapter 55: A Proposal to Study of Cross Language Information Retrieval (CLIR) System Users' Information Seeking Behavior
      1. ABSTRACT
      2. INTRODUCTION
      3. LITERATURE REVIEW
      4. THEORY
      5. RESEARCH QUESTIONS
      6. METHODOLOGY
      7. DISCUSSION
      8. CONCLUSION
      9. REFERENCES
      10. ADDITIONAL READING
      11. KEY TERMS AND DEFINITIONS
      12. ENDNOTES
    12. Chapter 56: Predictive Analytics of Social Networks
      1. ABSTRACT
      2. 1. INTRODUCTION: PREDICTION IN SOCIAL NETWORKS
      3. 2. BACKGROUND
      4. 3. TECHNIQUES
      5. 4. APPLICATIONS
      6. 5. SYSTEMS
      7. REFERENCES
    13. Chapter 57: On The Reuse of Past Searches in Information Retrieval
      1. ABSTRACT
      2. INTRODUCTION
      3. RELATED WORK
      4. PRINCIPLES FOR COLLECTIVE REUSE OF PAST SEARCHES
      5. APPROACH FOR REUSING PAST QUERIES
      6. SIMULATION OF INFORMATION RETRIEVAL COLLECTIONS
      7. EMPIRICAL RESULTS
      8. CONCLUSION AND FUTURE WORK
      9. REFERENCES
    14. Chapter 58: A Literature Survey for Hazardous Materials Transportation
      1. ABSTRACT
      2. INTRODUCTION
      3. HAZMAT TRANSPORTATION LITERATURE
      4. CONCLUSION
      5. REFERENCES
      6. KEY TERMS AND DEFINITIONS
    15. Chapter 59: Resource Scheduling Techniques in Utility Computing
      1. ABSTRACT
      2. INTRODUCTION
      3. RESEARCH METHOD
      4. RELATED WORK
      5. RESULTS AND DISCUSSION
      6. CONCLUSION AND FUTURE WORK
      7. ACKNOWLEDGMENT
      8. REFERENCES
    16. Chapter 60: Information Extraction from Microarray Data
      1. ABSTRACT
      2. INTRODUCTION
      3. REAL USE CASES
      4. CONCLUSION AND FUTURE RESEARCH DIRECTIONS
      5. REFERENCES
      6. ENDNOTES
    17. Chapter 61: Roles of Culture for Knowledge Sharing in Asian Virtual Teams
      1. ABSTRACT
      2. 1. INTRODUCTION
      3. 2. LITERATURE REVIEW
      4. 3. CASE BACKGROUND
      5. 4. RESEARCH FRAMEWORK AND PROPOSITIONS
      6. 5. DISCUSSION
      7. 6. LIMITATIONS AND FUTURE STUDIES
      8. ACKNOWLEDGMENT
      9. REFERENCES
      10. KEY TERMS AND DEFINITIONS
    18. Chapter 62: Applying the K-Means Algorithm in Big Raw Data Sets with Hadoop and MapReduce
      1. ABSTRACT
      2. INTRODUCTION
      3. RELATED WORK
      4. HADOOP DISTRIBUTED FILE SYSTEM (HDFS)
      5. DATA MINING
      6. SIMULATIONS
      7. COMPLEXITY AND COMPARISONS
      8. DISCUSSION AND CONCLUSION
      9. REFERENCES
      10. ADDITIONAL READING
      11. KEY TERMS AND DEFINITIONS
  10. Section 5: Organizational and Social Implications
    1. Chapter 63: From Tf-Idf to Learning-to-Rank
      1. ABSTRACT
      2. 1. INTRODUCTION
      3. 2. THE RANKING PROBLEM IN INFORMATION RETRIEVAL
      4. 3. AREN’T EXISTING SEARCH ENGINES ENOUGH?
      5. 4. WHAT DOES RELEVANCY OF A DOCUMENT MEAN?
      6. 5. TRADITIONAL APPROACHES
      7. 6. LEARNING-TO-RANK APPROACH
      8. 7. EVALUATION METRICS FOR RANKING
      9. 8. THREE MAJOR TASKS OF SUPERVISED LEARNING
      10. 9. IMPORTANT ASPECTS OF AN LTR ALGORITHM
      11. 10. A BRIEF REVIEW OF LTR LITERATURE
      12. 11. THEORETICAL FRAMEWORK OF LEARNING TO RANK
      13. 12. CURRENT TRENDS IN LTR RESEARCH
      14. 13. SUMMARY
      15. 14. CONCLUSION
      16. REFERENCES
      17. KEY TERMS AND DEFINITIONS
      18. ENDNOTES
    2. Chapter 64: On Trust, Knowledge Sharing and Innovation
      1. ABSTRACT
      2. INTRODUCTION
      3. LITERATURE REVIEW
      4. METHODOLOGY
      5. THE FINDINGS AND DISCUSSION
      6. CONCLUSION
      7. REFERENCES
      8. ADDITIONAL READING
      9. KEY TERMS AND DEFINITIONS
    3. Chapter 65: Insights into the Search Behavior of Non-Medical Professionals Based on Task Difficulty and an Evaluation against New Generation Medical Information Retrieval Strategies
      1. ABSTRACT
      2. 1. MEDICAL INFORMATION SEARCHING ON THE RISE
      3. 2. PREDECESSOR INFORMATION RETRIEVAL STRATEGIES: A REFLECTION OF THE PAST
      4. 3. NEW GENERATION MEDICAL INFORMATION RETRIEVAL STRATEGIES
      5. 4. ANALYSIS OF NEW GENERATION INFORMATION RETRIEVAL STRATEGIES
      6. 5. MEDICAL SEARCH CHALLENGES: A NON-MEDICAL PROFESSIONAL’S PERSPECTIVE
      7. 6. RESEARCH DIRECTION
      8. 7. THE AFFECTS OF TASK DIFFICULTY ON NON-MEDICAL TYPE SEARCHES
      9. 8. RESEARCH METHODOLOGY
      10. 9. DEMOGRAPHIC DETAILS, SEARCH SESSION DETAILS AND PERCEPTION OF TASK DIFFICULTY
      11. 10. STUDY RESULTS
      12. 11. DISCUSSION
      13. 12. RESEARCH CONTRIBUTIONS
      14. 13. CONCLUSION AND FUTURE RESEARCH DIRECTION
      15. ACKNOWLEDGMENT
      16. REFERENCES
      17. ENDNOTES
    4. Chapter 66: Employing Individuals' Social Capital to Create Value in the Public Sector Organisations
      1. ABSTRACT
      2. 1. BACKGROUND AND INTRODUCTION
      3. 2. LITERATURE REVIEW
      4. 3. PROPOSED MODEL FOR INFORMAL KNOWLEDGE COLLABORATION
      5. 4. IMPLICATIONS OF THE MODEL
      6. 5. CONCLUSION
      7. REFERENCES
      8. ADDITIONAL READING
      9. KEY TERMS AND DEFINITIONS
    5. Chapter 67: Customer Relationship Management and Data Mining
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. DATA AND METHODOLOGY
      5. DISCUSSIONS
      6. FUTURE RESEARCH DIRECTIONS
      7. CONCLUSION
      8. NOMENCLATURE
      9. REFERENCES
      10. ADDITIONAL READING
      11. KEY TERMS AND DEFINITIONS
    6. Chapter 68: Determinants of Knowledge Sharing Behaviour among Academics in United Arab Emirates
      1. ABSTRACT
      2. INTRODUCTION
      3. PROBLEM STATEMENT
      4. SIGNIFICANCE OF RESEARCH
      5. KNOWLEDGE SHARING PRACTICE
      6. THEORETICAL BASE
      7. RESEARCH MODEL AND HYPOTHESES
      8. METHODOLOGY
      9. FINDINGS
      10. DISCUSSION
      11. CONTRIBUTION
      12. CONCLUSION
      13. REFERENCES
    7. Chapter 69: The Influence of Individual Characteristics on Knowledge Sharing Practices, Enablers, and Barriers in a Project Management Context
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. METHODOLOGY
      5. ANALYSIS AND RESULTS
      6. DISCUSSION
      7. IMPLICATIONS
      8. LIMITATIONS AND FUTURE RESEARCH
      9. CONCLUSION
      10. REFERENCES
    8. Chapter 70: Predicting Student Academic Performance
      1. ABSTRACT
      2. 1. INTRODUCTION
      3. 2. LITERATURE REVIEW
      4. 3. HYPOTHESES FORMULATION
      5. 4. RESEARCH METHODOLOGY
      6. 5. DISCUSSION
      7. 6. CONCLUSION AND IMPLICATIONS
      8. REFERENCES
      9. APPENDIX
    9. Chapter 71: Multi-Group Moderation Analysis for Relationship between Knowledge Sharing Orientation and Business Performance
      1. ABSTRACT
      2. INTRODUCTION
      3. PREVIOUS STUDIES
      4. OBJECTIVES OF THE STUDY
      5. RESEARCH HYPOTHESES
      6. RESEARCH INSTRUMENT
      7. RESEARCH SETTING AND SAMPLE
      8. ANALYSIS AND INTERPRETATION
      9. VALIDATION OF KNOWLEDGE SHARING ORIENTATION SCALE
      10. VALIDATION OF BUSINESS PERFORMANCE SCALE
      11. STRUCTURAL EQUATION MODELING
      12. MULTI-GROUP MODERATION
      13. DISCUSSION
      14. CONCLUSION
      15. REFERENCES
    10. Chapter 72: Chinese Cultural Values and Knowledge Sharing
      1. ABSTRACT
      2. INTRODUCTION
      3. LITERATURE
      4. RESEARCH METHODOLOGY
      5. RESULTS
      6. INTERPRETATIONS AND CONCLUSION
      7. REFERENCES
    11. Chapter 73: Knowledge Sharing, Social Relationships, and Contextual Performance
      1. ABSTRACT
      2. INTRODUCTION
      3. RESEARCH FRAMEWORK AND HYPOTHESES
      4. RESEARCH DESIGN
      5. LIMITATIONS AND FUTURE RESEARCH DIRECTIONS
      6. DISCUSSION
      7. REFERENCES
      8. ENDNOTE
      9. APPENDIX
    12. Chapter 74: HRM Practices and Knowledge Sharing Behaviour
      1. ABSTRACT
      2. INTRODUCTION
      3. LITERATURE REVIEW AND HYPOTHESES
      4. DATA COLLECTION
      5. RESULTS
      6. DISCUSSION
      7. LIMITATIONS AND FUTURE RESEARCH
      8. CONCLUSION
      9. REFERENCES
    13. Chapter 75: Effect of Knowledge Sharing and Supply Chain Management on Organizational Performance
      1. ABSTRACT
      2. INTRODUCTION
      3. INFORMATION SHARING AND SUPPLY CHAIN PROCESSES
      4. PERFORMANCE AND SUPPLY CHAIN MANAGEMENT
      5. RELATIONSHIP BETWEEN SUPPLY CHAIN MANAGEMENT, INFORMATION SHARING AND BUSINESS PERFORMANCE
      6. THE RESEARCH MODEL
      7. DISCUSSION
      8. REFERENCES
    14. Chapter 76: Knowledge Management Practices and the Focus on the Individual
      1. ABSTRACT
      2. INTRODUCTION
      3. CONCEPTS AND DEFINITIONS
      4. KM PRACTICES
      5. DISCUSSION
      6. CONCLUSION
      7. REFERENCES
    15. Chapter 77: Business Intelligence in the Music Industry Value Chain
      1. ABSTRACT
      2. INTRODUCTION
      3. BUSINESS INTELLIGENCE IN TODAY’S BUSINESS ENVIRONMENT
      4. THE MUSIC INDUSTRY
      5. CHANGES DUE TO THE EMERGENCE OF THE INTERNET
      6. CHALLENGES
      7. THE VALUE CHAIN OF THE MUSIC INDUSTRY
      8. INTEGRATING BI INTO THE VALUE CHAIN
      9. CONCLUSION AND LIMITATIONS
      10. REFERENCES
    16. Chapter 78: Face-to-Face Matters
      1. ABSTRACT
      2. INTRODUCTION
      3. ONLINE KNOWLEDGE SHARING AND MEETUPS
      4. METHODS
      5. RESULTS
      6. FUTURE HUMAN LIBRARY EVENTS
      7. CONCLUSION
      8. REFERENCES
    17. Chapter 79: Organizational Barriers and Facilitators in Embedding Knowledge Strategy
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. BARRIERS TO KNOWLEDGE MANAGEMENT
      5. COMPETITIVE ADVANTAGE AND KM
      6. EMBEDDING KM STRATEGY
      7. SOLUTIONS AND RECOMMENDATIONS
      8. REALISMS REGARDING KNOWLEDGE STRATEGY
      9. BENEFITS OF EMBEDDING KNOWLEDGE STRATEGY
      10. CONCLUSION
      11. REFERENCES
      12. ADDITIONAL READING
      13. KEY TERMS AND DEFINITIONS
  11. Section 6: Managerial Impact
    1. Chapter 80: Knowledge Sharing between Local Government and Rural Remote Communities in Tanzania
      1. ABSTRACT
      2. INTRODUCTION
      3. LITERATURE REVIEW
      4. METHODOLOGY OF THE CASE STUDY AND SURVEY
      5. FINDINGS AND DISCUSSION
      6. CONCLUSION
      7. AREAS FOR FURTHER RESEARCH
      8. REFERENCES
      9. ADDITIONAL READING
      10. KEY TERMS AND DEFINITIONS
    2. Chapter 81: Quantifying Education Quality in Secondary Schools
      1. ABSTRACT
      2. 1. INTRODUCTION
      3. 2. RESEARCH METHODS
      4. 3. THEORY
      5. 4. INTERVIEWS
      6. 5. SURVEY RESPONDENTS
      7. 6. FRAMEWORK FEASIBILITY ANALYSIS
      8. 7. DISCUSSION AND CONCLUSION
      9. REFERENCES
      10. APPENDIX
    3. Chapter 82: Social Networks and Employee Knowledge Sharing and Performance
      1. ABSTRACT
      2. INTRODUCTION
      3. LITERATURE REVIEW
      4. RESEARCH HYPOTHESES
      5. DATA COLLECTION
      6. MODELS
      7. DISCUSSION
      8. CONCLUSION
      9. ACKNOWLEDGMENT
      10. REFERENCES
      11. APPENDIX
    4. Chapter 83: Knowledge Sharing Barriers in Procurement
      1. ABSTRACT
      2. INTRODUCTION
      3. KNOWLEDGE MANAGEMENT AND KNOWLEDGE SHARING IN ORGANIZATIONS
      4. KNOWLEDGE SHARING BARRIERS WITHIN PROCUREMENT PROCESSES IN A GLOBALLY OPERATING COMPANY
      5. RESEARCH METHODOLOGY
      6. CASE FINDINGS
      7. DISCUSSION
      8. CONCLUSION
      9. REFERENCES
      10. KEY TERMS AND DEFINITIONS
    5. Chapter 84: Knowledge Management Practice at a Bulgarian Bank
      1. ABSTRACT
      2. 1. INTRODUCTION
      3. 2. LITERATURE REVIEW
      4. 3. RESEARCH METHODOLOGY
      5. 4. KM IN BANK A’S CUSTOMER SERVICE AND LENDING DEPARTMENTS
      6. 5. DISCUSSION AND RECOMMENDATIONS
      7. 6. CONCLUSION
      8. REFERENCES
    6. Chapter 85: Mind Training for Innovation
      1. ABSTRACT
      2. INTRODUCTION
      3. WHY FOCUS ON KNOWLEDGE-SHARING, CREATIVITY AND INNOVATION?
      4. ISSUES, CONTROVERSIES, PROBLEMS
      5. SOLUTIONS AND RECOMMENDATIONS
      6. FUTURE RESEARCH DIRECTIONS
      7. CONCLUSION
      8. REFERENCES
      9. KEY TERMS AND DEFINITIONS
    7. Chapter 86: Police Knowledge Management Strategy
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND AND ISSUES
      4. CONCLUSION
      5. REFERENCES
    8. Chapter 87: The Roles of Knowledge Management and Organizational Innovation in Global Business
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. ROLES OF KNOWLEDGE MANAGEMENT AND ORGANIZATIONAL INNOVATION IN GLOBAL BUSINESS
      5. FUTURE RESEARCH DIRECTIONS
      6. CONCLUSION
      7. REFERENCES
      8. ADDITIONAL READING
      9. KEY TERMS AND DEFINITIONS
    9. Chapter 88: Knowledge Integration in Problem Solving Processes
      1. ABSTRACT
      2. INTRODUCTION
      3. LITERATURE REVIEW
      4. KNOWLEDGE CONCEPT
      5. RESEARCH METHODOLOGY
      6. RESEARCH FINDINGS: PROBLEM SOLVING IN ALPHA ORGANISATION
      7. DISCUSSION
      8. CONCLUSION
      9. ACKNOWLEDGMENT
      10. REFERENCES
    10. Chapter 89: QoS Oriented Enhancement based on the Analysis of Dynamic Job Scheduling in HPC
      1. ABSTRACT
      2. 1. INTRODUCTION
      3. 2. STATE-OF-THE-ART
      4. 3. BACKGROUND STUDY
      5. 4. QUANTITATIVE ANALYSIS
      6. 5. PERFORMANCE ANALYSIS
      7. 6. PROPOSED SYSTEM
      8. 7. CONCLUSION AND DISCUSSION
      9. REFERENCES
  12. Section 7: Critical Issues
    1. Chapter 90: Data Mining and Business Intelligence
      1. ABSTRACT
      2. INTRODUCTION
      3. BUSINESS INTELLIGENCE
      4. DATA MINING
      5. BUSINESS INTELLIGENCE AND DATA MINING
      6. FUTURE RESEARCH DIRECTIONS
      7. CONCLUSION
      8. REFERENCES
      9. ADDITIONAL READING
      10. KEY TERMS AND DEFINITIONS
      11. ENDNOTES
    2. Chapter 91: Exploration of Soft Computing Approaches in Itemset Mining
      1. ABSTRACT
      2. 1. INTRODUCTION
      3. 2. DATA MINING DEFINITION OF TERMS
      4. 3. PRELIMINARIES AND LITERATURE SURVEY OF SOFT COMPUTING
      5. 4. FINDINGS OF THE SURVEY
      6. 5. CONCLUSION
      7. REFERENCES
      8. KEY TERMS AND DEFINITIONS
    3. Chapter 92: Rethinking Knowledge Sharing Barriers
      1. ABSTRACT
      2. INTRODUCTION
      3. LITERATURE REVIEW
      4. KNOWLEDGE SHARING
      5. KNOWLEDGE SHARING BARRIERS
      6. METHODOLOGY
      7. RESULTS
      8. CONCLUSION
      9. CONTRIBUTION
      10. FUTURE RESEARCH
      11. REFERENCES
    4. Chapter 93: A Comprehensive Relational Model of Factors Influencing Knowledge Sharing
      1. ABSTRACT
      2. 1. INTRODUCTION
      3. 2. LITERATURE REVIEW
      4. 3. HYPOTHESES
      5. 4. METHOD
      6. 5. RESULTS
      7. 6. DISCUSSIONS
      8. 7. CONCLUSION
      9. REFERENCES
      10. APPENDIX: MEASURES USED IN THE RESEARCH MODEL
    5. Chapter 94: Modeling the Metrics of Individual, Organizational and Technological Knowledge Sharing Barriers
      1. ABSTRACT
      2. INTRODUCTION
      3. EFFECTS OF KNOWLEDGE SHARING BARRIERS (KSBS)
      4. EFFECTIVENESS MEASUREMENT OF KSBS PARADIGM
      5. EVALUATION OF PROPOSED ANP FRAMEWORK
      6. SENSITIVITY ANALYSIS
      7. RESULT AND CONCLUSION
      8. DISCUSSION AND MANAGERIAL IMPLICATIONS
      9. LIMITATIONS AND SCOPE OF FUTURE WORK
      10. REFERENCES
    6. Chapter 95: A Conceptual Proposition
      1. ABSTRACT
      2. INTRODUCTION
      3. KS ENABLERS: A REVIEW OF PAST STUDIES
      4. COMMUNITIES OF PRACTICE: THE WAY FORWARD
      5. SOCIAL CAPITAL: THE GAME CHANGER
      6. IT AND KS
      7. ORGANIZATION STRUCTURE AND KS
      8. REWARD SYSTEM AND KS
      9. MANAGEMENT SUPPORT AND KS
      10. CONCEPTUAL MODEL
      11. PRACTICAL IMPLICATIONS
      12. POINTS TO PONDER
      13. REFERENCES
    7. Chapter 96: An Investigation of BI Implementation Critical Success Factors in Iranian Context
      1. ABSTRACT
      2. 1. INTRODUCTION
      3. 2. LITERATURE REVIEW
      4. 3. RESEARCH METHOD
      5. 4. RESULTS
      6. 5. DISCUSSION
      7. 6. CONCLUSION
      8. REFERENCES
    8. Chapter 97: Comparison of Linguistic Summaries and Fuzzy Functional Dependencies Related to Data Mining
      1. ABSTRACT
      2. INTRODUCTION
      3. RELATIONAL KNOWLEDGE AND DEPENDENCIES IN DATA
      4. ROLE OF FUZZY LOGIC IN DATA MINING
      5. FUZZY FUNCTIONAL DEPENDENCIES
      6. LS FOR EXTRACTING RELATIONAL KNOWLEDGE IN DATA
      7. CONSTRUCTION OF MEMBERSHIP FUNCTIONS
      8. CASE STUDIES
      9. DIRECTIONS FOR FUTURE RESEARCH
      10. CONCLUSION
      11. REFERENCES
      12. ADDITIONAL READING
      13. KEY TERMS AND DEFINITIONS
    9. Chapter 98: Ajzen and Fishbein's Theory of Reasoned Action (TRA) (1980)
      1. ABSTRACT
      2. INTRODUCTION
      3. OVERVIEW OF THE THEORY
      4. CRITICISMS AND LIMITATIONS OF THE TRA
      5. REFINEMENTS AND VARIATIONS
      6. EMPIRICAL USE AND TESTS OF THE TRA
      7. IMPLICATIONS FOR LIBRARY AND INFORMATION SCIENCE
      8. FUTURE RESEARCH DIRECTIONS
      9. CONCLUSION
      10. REFERENCES
      11. ADDITIONAL READING
      12. KEY TERMS AND DEFINITIONS
    10. Chapter 99: Amelioration of Anonymity Modus Operandi for Privacy Preserving Data Publishing
      1. ABSTRACT
      2. 1. INTRODUCTION
      3. 2. IMPETUS FOR PPDP
      4. 3. PRIVACY-PRESERVING DATA PUBLISHING (PPDP)
      5. 4. THE ANONYMIZATION APPROACH
      6. 5. RELATED WORK
      7. 6. ARCHITECTURE OF THE PROPOSED SYSTEM
      8. 7. EVALUATION AND EXPERIMENTAL RESULTS
      9. 8. CONCLUSION AND FUTURE WORK
      10. REFERENCES
    11. Chapter 100: Information Evaluation
      1. ABSTRACT
      2. 1. DEFINING THE SUBJECT: PRELIMINARY CONSIDERATIONS
      3. 2. PERFORMANCE EVALUATION OF INFORMATION SERVICES
      4. 3. THE EVALUATION OF INFORMATION RETRIEVAL TOOLS
      5. 4. THE EVALUATION OF INFORMATION FLOW
      6. 5. FINAL REMARKS ON METHODOLOGICAL OPERATIONALIZATION
      7. REFERENCES
      8. KEY TERMS AND DEFINITIONS
      9. ENDNOTES
      10. APPENDIX
    12. Chapter 101: Business Intelligence as a Service
      1. ABSTRACT
      2. 1. INTRODUCTION
      3. 2. THE BIAAS CAPABILITY MODEL
      4. 3. THE BIAAS MATURITY MODEL
      5. 4. DISCUSSION AND CONCLUSION
      6. REFERENCES
    13. Chapter 102: Modeling the Knowledge Sharing Barriers
      1. ABSTRACT
      2. INTRODUCTION
      3. LITERATURE REVIEW
      4. CONCLUSION AND RESULT
      5. REFERENCES
  13. Section 8: Emerging Trends
    1. Chapter 103: The Data Machine
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. MAIN FOCUS OF THE CHAPTER
      5. SOLUTIONS AND RECOMMENDATIONS
      6. FUTURE RESEARCH DIRECTIONS
      7. CONCLUSION
      8. ACKNOWLEDGMENT
      9. REFERENCES
      10. ADDITIONAL READING
      11. KEY TERMS AND DEFINITIONS
    2. Chapter 104: Pattern Based Feature Construction in Semantic Data Mining
      1. ABSTRACT
      2. INTRODUCTION
      3. RELATED WORK
      4. PRELIMINARIES
      5. ALGORITHM
      6. EXPERIMENTAL EVALUATION
      7. CONCLUSION
      8. ACKNOWLEDGMENT
      9. REFERENCES
      10. ENDNOTES
      11. APPENDIX: DATA SET CHARACTERISTICS
    3. Chapter 105: How Web 2.0 Shapes Patient Knowledge Sharing
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. THE RESEARCH
      5. FUTURE RESEARCH DIRECTIONS
      6. CONCLUSION
      7. REFERENCES
      8. ADDITIONAL READING
      9. KEY TERMS AND DEFINITIONS
      10. ENDNOTES
    4. Chapter 106: Business Intelligence for Healthcare
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. BETTER MANAGING COSTS AND MEDICAL OUTCOMES USING DIQ AND BI
      5. FUTURE RESEARCH DIRECTIONS
      6. CONCLUSION
      7. REFERENCES
      8. KEY TERMS AND DEFINITIONS
    5. Chapter 107: Data Profiling and Data Quality Metric Measurement as a Proactive Input into the Operation of Business Intelligence Systems
      1. ABSTRACT
      2. INTRODUCTION
      3. MAIN FOCUS OF THE CHAPTER
      4. FUTURE RESEARCH DIRECTIONS
      5. CONCLUSION
      6. REFERENCES
      7. ADDITIONAL READING
      8. KEY TERMS AND DEFINITIONS
    6. Chapter 108: Adaptive Intrusion Detection Systems
      1. ABSTRACT
      2. 1. INTRODUCTION
      3. 2. GENERALITIES AND BASIC CONCEPTS
      4. 3. FIRST GENERATION OF IDSS: CLASSICAL IDSS
      5. 4. SECOND GENERATION OF IDSS: DATA MINING BASED IDSS
      6. 5. VALIDATION OF INTRUSION DETECTION APPROACHES
      7. 6. THE CHALLENGING PROBLEM OF DETECTING NEW ATTACKS
      8. 7. THE REQUIREMENT OF ADAPTABILITY IN INTRUSION DETECTION
      9. 8. PRESENTATION AND EVALUATION OF THE EXISTING EMINENT ADAPTIVE INTRUSION DETECTION APPROACHES
      10. 9. NEW TRENDS FOR ADAPTIVE INTRUSION DETECTION SYSTEMS
      11. 10. CONCLUSION
      12. REFERENCES
      13. KEY TERMS AND DEFINITIONS
    7. Chapter 109: Beyond the Back Room
      1. ABSTRACT
      2. INTRODUCTION
      3. COLLABORATION IS KEY: DEVELOPING PARTNERSHIPS ON CAMPUS
      4. CASE STUDY: THE DIGITAL HUMANITIES INITIATIVE
      5. RECYCLED SKILLS IN THE DIGITAL HUMANITIES
      6. NEW SKILLS TO SUPPORT THE DIGITAL HUMANITIES
      7. LEARNING NEW SKILLS
      8. BUILDING AND SUPPORTING DIGITAL HUMANITIES SYSTEMS ON CAMPUS
      9. CONCLUSION
      10. REFERENCES
      11. ADDITIONAL READING
      12. KEY TERMS AND DEFINITIONS
      13. ENDNOTES
    8. Chapter 110: Metadata in Serbia
      1. ABSTRACT
      2. INTRODUCTION
      3. METADATA DESCRIBING PRINTED HOLDINGS OF SERBIAN LIBRARIES
      4. METADATA DESCRIBING DIGITAL OBJECTS OF SERBIAN LIBRARIES
      5. METADATA AS MEANS FOR AUTOMATION OF DIGITAL DATA DELIVERY FOR PATRONS IN SERBIAN LIBRARIES
      6. CONCLUSION
      7. REFERENCES
    9. Chapter 111: Information Systems in Healthcare with a Special Focus on Developing Countries
      1. ABSTRACT
      2. INTRODUCTION
      3. RE-STRUCTURING THE RESEARCH ON HIS
      4. HEALTH INFORMATICS IN DEVELOPING COUNTRIES
      5. LESSONS LEARNED FROM DEVELOPING COUNTRIES
      6. DISCUSSION AND FUTURE DIRECTION
      7. SYSTEM INTEGRATION
      8. REFERENCES
      9. KEY TERMS AND DEFINITIONS
    10. Chapter 112: Biologically Inspired Techniques for Data Mining
      1. ABSTRACT
      2. INTRODUCTION
      3. SWARM INTELLIGENCE
      4. PARTICLE SWARM OPTIMIZATION
      5. PARTICLE SWARM OPTIMIZATION FOR DATA CLUSTERING
      6. PSO BASED OUTLIER DETECTION
      7. PSO BASED RECOMMENDER SYSTEMS
      8. FUTURE WORK
      9. CONCLUSION
      10. REFERENCES
      11. ADDITIONAL READING
      12. KEY TERMS AND DEFINITIONS