266 resultados para applicazione, business analysis, data mining, Facebook, PRIN, relazioni sociali, social network
Resumo:
Customer perceived value is concerned with the experiences of consumers when using a service and is often referred to in the context of service provision or on the basis of service quality (Auh, et al., 2007; Chang, 2008; Jackson, 2007; Laukkanen, 2007; Padgett & Mulvey, 2007; Shamdasani, Mukherjee & Malhotra, 2008). Understanding customer perceived value has benefits for social marketing and allows scholars and practitioners alike to identify why consumers engage in positive social behaviours through the use of services. Understanding consumers’ use of wellness services in particular is important, because the use of wellness services demonstrates the fulfilment of social marketing aims; performing pro-active, positive social behaviours that are of benefit to the individual and to society (Andreasen, 1994). As consumers typically act out of self-interest (Rothschild, 1999), this research posits that a value proposition must be made to consumers in order to encourage behavioural change. Thus, this research seeks to identify how value is created for consumers of wellness services in social marketing. This results in the overall research question of this research: How is value created in social marketing wellness services? A traditional method towards understanding value has been the adoption of an economic approach, which considers the utility gained and where value is a direct outcome of a cost-benefit analysis (Payne & Holt, 1999). However, there has since been a shift towards the adoption of an experiential approach in understanding value. This experiential approach considers the consumption experience of the consumer which extends beyond the service exchange and includes pre- and post-consumption stages (Russell-Bennett, Previte & Zainuddin, 2009). As such, this research uses an experiential approach to identify the value that exists in social marketing wellness services. Four dimensions of value have been commonly conceptualised and identified in the commercial marketing literature; functional, emotional, social, and altruistic value (Holbrook, 1994; Sheth, Newman & Gross, 1991; Sweeney & Soutar, 2001). It is not known if these value dimensions also exist in social marketing. In addition, sources of value said to influence value dimensions have been conceptualised in the literature. Sources of value such as information, interaction, environment, service, customer co-creation, and social mandate have been conceptually identified both in the commercial and social marketing literature (Russell-Bennet, Previte & Zainuddin, 2009; Smith & Colgate, 2007). However, it is not clear which sources of value contribute to the creation of value for users of wellness services. Thus, this research seeks to explore these relationships. This research was conducted using a wellness service context, specifically breast cancer screening services. The primary target consumer of these services is women aged 50 to 69 years old (inclusive) who have never been diagnosed with breast cancer. It is recommended that women in this target group have a breast screen every 2 years in order to achieve the most effective medical outcomes from screening. A two-study mixed method approach was utilised. Study 1 was a qualitative exploratory study that analysed individual-depth interviews with 25 information-rich respondents. The interviews were transcribed verbatim and analysed using NVivo 8 software. The qualitative results provided evidence of the existence of the four value dimensions in social marketing. The results also allowed for the development of a typology of experiential value by synthesising current understanding of the value dimensions, with the activity aspects of experiential value identified by Holbrook (1994) and Mathwick, Malhotra and Rigdon (2001). The qualitative results also provided evidence for the existence of sources of value in social marketing, namely information, interaction, environment and consumer participation. In particular, a categorisation of sources of value was developed as a result of the findings from Study 1, which identify organisational, consumer, and third party sources of value. A proposed model of value co-creation and a set of hypotheses were developed based on the results of Study 1 for further testing in Study 2. Study 2 was a large-scale quantitative confirmatory study that sought to test the proposed model of value co-creation and the hypotheses developed. An online-survey was administered Australia-wide to women in the target audience. A response rate of 20.1% was achieved, resulting in a final sample of 797 useable responses after removing ineligible respondents. Reliability and validity analyses were conducted on the data, followed by Exploratory Factor Analysis (EFA) in PASW18, followed by Confirmatory Factor Analysis (CFA) in AMOS18. Following the preliminary analyses, the data was subject to Structural Equation Modelling (SEM) in AMOS18 to test the path relationships hypothesised in the proposed model of value creation. The SEM output revealed that all hypotheses were supported, with the exception of one relationship which was non-significant. In addition, post hoc tests revealed seven further significant non-hypothesised relationships in the model. The quantitative results show that organisational sources of value as well as consumer participation sources of value influence both functional and emotional dimensions of value. The experience of both functional and emotional value in wellness services leads to satisfaction with the experience, followed by behavioural intentions to perform the behaviour and use the service again. One of the significant non-hypothesised relationships revealed that emotional value leads to functional value in wellness services, providing further empirical evidence that emotional value features more prominently than functional value for users of wellness services. This research offers several contributions to theory and practice. Theoretically, this research addresses a gap in the literature by using social marketing theory to provide an alternative method of understanding individual behaviour in a domain that has been predominantly investigated in public health. This research also clarifies the concept of value and offers empirical evidence to show that value is a multi-dimensional construct with separate and distinct dimensions. Empirical evidence for a typology of experiential value, as well as a categorisation of sources of value is also provided. In its practical contributions, this research identifies a framework that is the value creation process and offers health services organisations a diagnostic tool to identify aspects of the service process that facilitate the value creation process.
Resumo:
Discovering proper search intents is a vi- tal process to return desired results. It is constantly a hot research topic regarding information retrieval in recent years. Existing methods are mainly limited by utilizing context-based mining, query expansion, and user profiling techniques, which are still suffering from the issue of ambiguity in search queries. In this pa- per, we introduce a novel ontology-based approach in terms of a world knowledge base in order to construct personalized ontologies for identifying adequate con- cept levels for matching user search intents. An iter- ative mining algorithm is designed for evaluating po- tential intents level by level until meeting the best re- sult. The propose-to-attempt approach is evaluated in a large volume RCV1 data set, and experimental results indicate a distinct improvement on top precision after compared with baseline models.
Resumo:
Many modern business environments employ software to automate the delivery of workflows; whereas, workflow design and generation remains a laborious technical task for domain specialists. Several differ- ent approaches have been proposed for deriving workflow models. Some approaches rely on process data mining approaches, whereas others have proposed derivations of workflow models from operational struc- tures, domain specific knowledge or workflow model compositions from knowledge-bases. Many approaches draw on principles from automatic planning, but conceptual in context and lack mathematical justification. In this paper we present a mathematical framework for deducing tasks in workflow models from plans in mechanistic or strongly controlled work environments, with a focus around automatic plan generations. In addition, we prove an associative composition operator that permits crisp hierarchical task compositions for workflow models through a set of mathematical deduction rules. The result is a logical framework that can be used to prove tasks in workflow hierarchies from operational information about work processes and machine configurations in controlled or mechanistic work environments.
Resumo:
Collaborative question answering (cQA) portals such as Yahoo! Answers allow users as askers or answer authors to communicate, and exchange information through the asking and answering of questions in the network. In their current set-up, answers to a question are arranged in chronological order. For effective information retrieval, it will be advantageous to have the users’ answers ranked according to their quality. This paper proposes a novel approach of evaluating and ranking the users’answers and recommending the top-n quality answers to information seekers. The proposed approach is based on a user-reputation method which assigns a score to an answer reflecting its answer author’s reputation level in the network. The proposed approach is evaluated on a dataset collected from a live cQA, namely, Yahoo! Answers. To compare the results obtained by the non-content-based user-reputation method, experiments were also conducted with several content-based methods that assign a score to an answer reflecting its content quality. Various combinations of non-content and content-based scores were also used in comparing results. Empirical analysis shows that the proposed method is able to rank the users’ answers and recommend the top-n answers with good accuracy. Results of the proposed method outperform the content-based methods, various combinations, and the results obtained by the popular link analysis method, HITS.
Resumo:
In the last few years we have observed a proliferation of approaches for clustering XML docu- ments and schemas based on their structure and content. The presence of such a huge amount of approaches is due to the different applications requiring the XML data to be clustered. These applications need data in the form of similar contents, tags, paths, structures and semantics. In this paper, we first outline the application contexts in which clustering is useful, then we survey approaches so far proposed relying on the abstract representation of data (instances or schema), on the identified similarity measure, and on the clustering algorithm. This presentation leads to draw a taxonomy in which the current approaches can be classified and compared. We aim at introducing an integrated view that is useful when comparing XML data clustering approaches, when developing a new clustering algorithm, and when implementing an XML clustering compo- nent. Finally, the paper moves into the description of future trends and research issues that still need to be faced.
Resumo:
Nowadays, everyone can effortlessly access a range of information on the World Wide Web (WWW). As information resources on the web continue to grow tremendously, it becomes progressively more difficult to meet high expectations of users and find relevant information. Although existing search engine technologies can find valuable information, however, they suffer from the problems of information overload and information mismatch. This paper presents a hybrid Web Information Retrieval approach allowing personalised search using ontology, user profile and collaborative filtering. This approach finds the context of user query with least user’s involvement, using ontology. Simultaneously, this approach uses time-based automatic user profile updating with user’s changing behaviour. Subsequently, this approach uses recommendations from similar users using collaborative filtering technique. The proposed method is evaluated with the FIRE 2010 dataset and manually generated dataset. Empirical analysis reveals that Precision, Recall and F-Score of most of the queries for many users are improved with proposed method.
Resumo:
In this paper we analyse the oursourcing of accounting services. The extent to which firms are currently outsourcing, or considering outsourcing such services, and the motivations and barriers associated with outsourcing are identified. Empirical data from a random sample of accounting firms are used in this analysis. Data indicate that the majority of accounting firms are either currently outsourcing or considering outsourcing and that they exopect the volume of oursourced services to increase. In contrast to the scholarly literature advocating labor arbitrage as the primary driver for organizations choosing to outsource, in this study it was found that the main factors underpinning the decision to outsource were the expediting of service delivary to clients, and to enable the firm to focus on its core competencies.
Resumo:
A service-oriented system is composed of independent software units, namely services, that interact with one another exclusively through message exchanges. The proper functioning of such system depends on whether or not each individual service behaves as the other services expect it to behave. Since services may be developed and operated independently, it is unrealistic to assume that this is always the case. This article addresses the problem of checking and quantifying how much the actual behavior of a service, as recorded in message logs, conforms to the expected behavior as specified in a process model.We consider the case where the expected behavior is defined using the BPEL industry standard (Business Process Execution Language for Web Services). BPEL process definitions are translated into Petri nets and Petri net-based conformance checking techniques are applied to derive two complementary indicators of conformance: fitness and appropriateness. The approach has been implemented in a toolset for business process analysis and mining, namely ProM, and has been tested in an environment comprising multiple Oracle BPEL servers.
Resumo:
In the era of Web 2.0, huge volumes of consumer reviews are posted to the Internet every day. Manual approaches to detecting and analyzing fake reviews (i.e., spam) are not practical due to the problem of information overload. However, the design and development of automated methods of detecting fake reviews is a challenging research problem. The main reason is that fake reviews are specifically composed to mislead readers, so they may appear the same as legitimate reviews (i.e., ham). As a result, discriminatory features that would enable individual reviews to be classified as spam or ham may not be available. Guided by the design science research methodology, the main contribution of this study is the design and instantiation of novel computational models for detecting fake reviews. In particular, a novel text mining model is developed and integrated into a semantic language model for the detection of untruthful reviews. The models are then evaluated based on a real-world dataset collected from amazon.com. The results of our experiments confirm that the proposed models outperform other well-known baseline models in detecting fake reviews. To the best of our knowledge, the work discussed in this article represents the first successful attempt to apply text mining methods and semantic language models to the detection of fake consumer reviews. A managerial implication of our research is that firms can apply our design artifacts to monitor online consumer reviews to develop effective marketing or product design strategies based on genuine consumer feedback posted to the Internet.
Resumo:
This paper presents an extended granule mining based methodology, to effectively describe the relationships between granules not only by traditional support and confidence, but by diversity and condition diversity as well. Diversity measures how diverse of a granule associated with the other granules, it provides a kind of novel knowledge in databases. We also provide an algorithm to implement the proposed methodology. The experiments conducted to characterize a real network traffic data collection show that the proposed concepts and algorithm are promising.
Resumo:
It is a big challenge to clearly identify the boundary between positive and negative streams. Several attempts have used negative feedback to solve this challenge; however, there are two issues for using negative relevance feedback to improve the effectiveness of information filtering. The first one is how to select constructive negative samples in order to reduce the space of negative documents. The second issue is how to decide noisy extracted features that should be updated based on the selected negative samples. This paper proposes a pattern mining based approach to select some offenders from the negative documents, where an offender can be used to reduce the side effects of noisy features. It also classifies extracted features (i.e., terms) into three categories: positive specific terms, general terms, and negative specific terms. In this way, multiple revising strategies can be used to update extracted features. An iterative learning algorithm is also proposed to implement this approach on RCV1, and substantial experiments show that the proposed approach achieves encouraging performance.
Resumo:
Monitoring the natural environment is increasingly important as habit degradation and climate change reduce theworld’s biodiversity.We have developed software tools and applications to assist ecologists with the collection and analysis of acoustic data at large spatial and temporal scales.One of our key objectives is automated animal call recognition, and our approach has three novel attributes. First, we work with raw environmental audio, contaminated by noise and artefacts and containing calls that vary greatly in volume depending on the animal’s proximity to the microphone. Second, initial experimentation suggested that no single recognizer could dealwith the enormous variety of calls. Therefore, we developed a toolbox of generic recognizers to extract invariant features for each call type. Third, many species are cryptic and offer little data with which to train a recognizer. Many popular machine learning methods require large volumes of training and validation data and considerable time and expertise to prepare. Consequently we adopt bootstrap techniques that can be initiated with little data and refined subsequently. In this paper, we describe our recognition tools and present results for real ecological problems.
Resumo:
IT-supported field data management benefits on-site construction management by improving accessibility to the information and promoting efficient communication between project team members. However, most of on-site safety inspections still heavily rely on subjective judgment and manual reporting processes and thus observers’ experiences often determine the quality of risk identification and control. This study aims to develop a methodology to efficiently retrieve safety-related information so that the safety inspectors can easily access to the relevant site safety information for safer decision making. The proposed methodology consists of three stages: (1) development of a comprehensive safety database which contains information of risk factors, accident types, impact of accidents and safety regulations; (2) identification of relationships among different risk factors based on statistical analysis methods; and (3) user-specified information retrieval using data mining techniques for safety management. This paper presents an overall methodology and preliminary results of the first stage research conducted with 101 accident investigation reports.