Posts

Showing posts from March, 2019

International Journal of Managing Information Technology (IJMIT)

International Journal of Managing Information Technology (IJMIT) ISSN : 0975-5586 (Online);0975-5926 (Print) http://airccse.org/journal/ijmit/ijmit.html Scope & Topics The International Journal of Managing Information Technology (IJMIT) is a quarterly open access peer-reviewed journal that publishes articles that contribute new results in all areas of the strategic application of information technology (IT) in organizations. The journal focuses on innovative ideas and best practices in using IT to advance organizations - for-profit, non-profit, and governmental. The goal of this journal is to bring together researchers and practitioners from academia, government and industry to focus on understanding both how to use IT to support the strategy and goals of the organization and to employ IT in new ways to foster greater collaboration, communication and information sharing both within the organization and with its stakeholders. The International Journal of Managing In...

NEED FOR CRITICAL CYBER DEFENCE, SECURITY STRATEGY AND PRIVACY POLICY IN BANGLADESH - HYPE OR REALITY?

Image
NEED FOR CRITICAL CYBER DEFENCE, SECURITY STRATEGY AND PRIVACY POLICY IN BANGLADESH - HYPE OR REALITY?  AKM Bahalul Haque  Depart of Electrical and Computer Engineering North South University, Dhaka, Bangladesh  ABSTRACT  Cyber security is one of the burning issues in modern world. Increased IT infrastructure has given rise to enormous chances of security breach. Bangladesh being a relatively new member of cyber security arena has its own demand and appeal. Digitalization is happening in Bangladesh for last few years at an appreciable rate. People are being connected to the worldwide web community with their smart devices. These devices have their own vulnerability issues as well as the data shared over the internet has a very good chances of getting breached. Common vulnerability issues like infecting the device with malware, Trojan, virus are on the rise. Moreover, a lack of proper cyber security policy and strategy might make the existing situati...

A NEW CONCEPT OF R&D IN NEO OPEN INNOVATION - TRANSFORMATION OF R&D TRIGGERED BY AMAZON

Image
A NEW CONCEPT OF R&D IN NEO OPEN INNOVATION - TRANSFORMATION OF R&D TRIGGERED BY AMAZON  Yuji Tou1, Chihiro Watanabe2 ,3, Kuniko Moriya2, 4, Victor Vurpillat5, Pekka Neittaanmäki2 1Dept. of Ind. Engineering & Magm., Tokyo Institute of Technology, Tokyo, Japan 2Faculty of Information Technology, University of Jyväskylä, Finland 3International Institute for Applied Systems Analysis (IIASA), Austria 4Research and Statistics Department, Bank of Japan, Tokyo, Japan 5Global Connexus Inc., San Jose, USA http://aircconline.com/ijmit/V11N1/11119ijmit02.pdf http://airccse.org/journal/ijmit/vol11.html

PREDICTING CLASS-IMBALANCED BUSINESS RISK USING RESAMPLING, REGULARIZATION, AND MODEL EMSEMBLING ALGORITHMS

Image
PREDICTING CLASS-IMBALANCED BUSINESS RISK USING RESAMPLING, REGULARIZATION, AND MODEL EMSEMBLING ALGORITHMS  Yan Wang1 , Xuelei Sherry Ni2  1Graduate College, Kennesaw State University, Kennesaw, USA 2Department of Statistics and Analytical Sciences, Kennesaw State University, Kennesaw, USA  ABSTRACT  We aim at developing and improving the imbalanced business risk modeling via jointly using proper evaluation criteria, resampling, cross-validation, classifier regularization, and ensembling techniques. Area Under the Receiver Operating Characteristic Curve (AUC of ROC) is used for model comparison based on 10-fold cross validation. Two undersampling strategies including random undersampling (RUS) and cluster centroid undersampling (CCUS), as well as two oversampling methods including random oversampling (ROS) and Synthetic Minority Oversampling Technique (SMOTE), are applied. Three highly interpretable classifiers, including logistic regression withou...