Search Results - information systems

Refine Results
  1. 1701
  2. 1702
  3. 1703

    Marijuana and madness

    Published 2012
    Table of Contents: “…Pharmacology of Cannabis and the Endocannabinoid System: 1. The cannabinoid system from the point of view of a chemist Raphael Mechoulam and Lumir Hanus; 2. …”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  4. 1704
  5. 1705
  6. 1706

    Construction management new directions. by McGeorge, W. D.

    Published 2013
    Table of Contents: “…Differences in the style of management Differences in management systems The relationship between value management and quantity surveying Conclusion References Chapter 10 Constructability Introduction Origins The goals of constructability Implementing constructability Constructability in practice Constructability and the building product Constructability and Building Information Modeling (BIM) Good and bad constructability Quantifying the benefits of constructability Conclusion References Chapter 11 Linking the concepts Bibliography Index.…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  7. 1707
  8. 1708

    Forensic investigation of stolen-recovered and other crime-related vehicles by Stauffer, Eric, 1975-

    Published 2006
    Table of Contents: “…Smylie -- Restoration of serial numbers / Horst Katterwe -- Alarm and anti-theft systems / Robert F. Mangine -- Examination of steering columns and ignition locks / Robert F. …”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  9. 1709

    Turnaround leading stressed colleges and universities to excellence /

    Published 2009
    Table of Contents: “…Samels -- An international perspective on the fragility of higher education institutions and systems / D. Bruce Johnstone -- A view from Washington : trouble signs for at-risk universities and colleges / Daniel J. …”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  10. 1710

    An introduction to algorithmic trading basic to advanced strategies / by Leshik, Edward A.

    Published 2011
    Table of Contents: “…Our nomenclature ; Math toolkit ; Statistics toolbox ; Data : symbol, date, timestamp, volume, price ; Excel mini seminar ; Excel charts : how to read them and how to build them ; Our metrics : algometrics ; Stock personality clusters ; Selecting a cohort of trading stocks ; Stock profiling ; Stylistic properties of equity markets ; Volatility ; Returns : theory ; Benchmarks and performance measures ; Our trading algorithms described : the Alpha algo strategies ; Parameters and how to set them ; Technical analysis (TA) ; Heuristics, AI, artificial neural networks and other avenues to be explored ; How we design a trading alpha algo ; From the efficient market hypothesis to prospect theory ; The road to chaos (or nonlinear science) ; Complexity economics ; Brokerages ; Order management platforms and order execution systems ; Data feed vendors, real-time, historical -- Connectivity -- Hardware specification examples ; Brief philosophical digression -- Information sources.…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  11. 1711

    Handbook for supply chain risk management case studies, effective practices, and emerging trends /

    Published 2012
    Table of Contents: “…Risk in maritime supply chain systems -- An analysis of a major oil spill case in the Baltic sea -- Political risks in contemporary supply chains : the case of the natural gas crisis -- Enegrisa : managing procurement risks in the Turkish energy industry -- Introduction to tools, techniques, and approaches -- Managing supply chain risk in financial services -- A comparative study of financial and operational measures in the automotive industry -- A toolkit to secure supplies for effective supply chain risk management in the aircraft construction industry -- Using information technology to mitigate supply network risk -- Practical approaches to supply chain continuity : new challenges and timeless principles -- Strategic supply management : the litmus test for risk management in a three echelon supply chain -- Assessing project risks within the supply chain of SELEX Sistemi Integrati (Finmeccanica) -- Estimation of disruption risk exposure in supply chains - three cases.…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  12. 1712

    Psychology of trust

    Published 2011
    Table of Contents: “…: how blog users judge credibility of different types of blogs for information about the Iraq war / Thomas J. Johnson, Barbara K. …”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  13. 1713
  14. 1714

    Ideology and Holy Landscape in the Baltic Crusades / by Leighton, Gregory

    Published 2022
    Full text available:
    Electronic eBook
  15. 1715

    Handbook of neuropsychiatry research

    Published 2010
    Table of Contents: “….] -- Serotonergic receptors in the central nervous system : a brief review / L. Y. Yeung, Ross Y. Y. …”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  16. 1716

    Hostile intent and counter-terrorism : human factors theory and application /

    Published 2015
    Table of Contents: “…Merging crime control and counter-terrorism in the UK / Pete Fussey -- Analysing the terrorist brain: neurobiological advances, ethical concerns and social implications / Valentina Bartolucci -- Ethical issues in surveillance and privacy / Ron Iphofen -- Deception and decision-making -- Non-verbal cues to deception and their relationship to terrorism / Dawn L Eubanks, Ke Zhang and Lara Frumkin -- Deception detection in counter-terrorism / Aldert Vrij, Sharon Leal and Samantha Mann -- A field trial to investigate human pheromones associated with hostile intent / Peter Eachus, Alex Stedmon and Les Baillie -- On the trail of the terrorist: a research environment to simulate criminal investigations / Alexandra L Sandham, Thomas C Ormerod, Coral J Dando and Tarek Menacere -- Modeling hostile intent -- Safety and security in rail systems: drawing knowledge from the prevention of railway suicide and trespass to inform security interventions / Brendan Ryan -- Tackling financial and economic crime through strategic intelligence management / Simon Andrews, Simon Polovina, Babak Akhgar, Alex Stedmon, Andrew Staniforth and Dave Fortune -- Competitive adaptation in militant networks: preliminary findings from an Islamist case study / Michael Kenney, John Horgan, Cale Horne, Peter Vining, Kathleen M. …”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  17. 1717
  18. 1718

    Statistical disclosure control

    Published 2012
    Table of Contents: “…Machine generated contents note: Preface vii Acknowledgements ix 1 Introduction 1 1.1 Concepts and Definitions 2 1.1.1 Disclosure 2 1.1.2 Statistical disclosure control 2 1.1.3 Tabular data 3 1.1.4 Microdata 3 1.1.5 Risk and utility 4 1.2 An approach to Statistical Disclosure Control 6 1.3 The chapters of the handbook 8 2 Ethics, Principles, Guidelines and Regulations, a general background 9 2.1 Introduction 9 2.2 Ethical codes and the new ISI code 9 2.2.1 ISI Declaration on Professional Ethics 10 2.2.2 New ISI Declaration on Professional Ethics 10 2.2.3 European Statistics Code of Practice 14 2.3 UNECE Principles and guidelines 14 2.4 Laws 17 2.4.1 Committee on Statistical Confidentiality 18 2.4.2 European Statistical System Committee 18 3 Microdata 21 3.1 Introduction 21 3.2 Microdata Concepts 22 3.2.1 Stage 1: Assess need for confidentiality protection 22 3.2.2 Stage 2: Key characteristics and uses of microdata 24 3.2.3 Stage 3: Disclosure risk 27 3.2.4 Stage 4: Protection methods 29 3.2.5 Stage 5: Implementation 30 3.3 Definitions of disclosure 32 3.3.1 Definitions of disclosure scenarios 33 3.4 Definitions of Disclosure Risk 34 3.4.1 Disclosure risk for categorical quasi-identifiers 35 3.4.2 Disclosure risk for continuous quasi-identifiers 37 3.5 Estimating Re-identification Risk 39 3.5.1 Individual risk based on the sample: threshold rule 39 3.5.2 Estimating individual risk using sampling weights 39 3.5.3 Estimating individual risk by Poisson model 42 3.5.4 Further models that borrow information from other sources 43 3.5.5 Estimating per record risk via heuristics 44 3.5.6 Assessing risk via record linkage 45 3.6 Non-Perturbative Microdata Masking 45 3.6.1 Sampling 46 3.6.2 Global recoding 46 3.6.3 Top and bottom coding 47 3.6.4 Local suppression 47 3.7 Perturbative Microdata Masking 48 3.7.1 Additive noise masking 48 3.7.2 Multiplicative noise masking 52 3.7.3 Microaggregation 54 3.7.4 Data swapping and rank swapping 66 3.7.5 Data shuffling 66 3.7.6 Rounding 67 3.7.7 Resampling 67 3.7.8 PRAM 67 3.7.9 MASSC 71 3.8 Synthetic and Hybrid Data 71 3.8.1 Fully synthetic data 72 3.8.2 Partially synthetic data 77 3.8.3 Hybrid data 79 3.8.4 Pros and cons of synthetic and hybrid data 88 3.9 Information Loss in Microdata 91 3.9.1 Information loss measures for continuous data 92 3.9.2 Information loss measures for categorical data 99 3.10 Release of multiple files from the same microdata set 101 3.11 Software 102 3.11.1 _-ARGUS 102 3.11.2 sdcMicro 103 3.11.3 IVEware 106 3.12 Case Studies 106 3.12.1 Microdata files at Statistics Netherlands 106 3.12.2 The European Labour Force Survey Microdata for Research Purposes 108 3.12.3 The European Structure of Earnings Survey Microdata for Research Purposes 111 3.12.4 NHIS Linked Mortality Data Public Use File, USA 117 3.12.5 Other real case instances 119 4 Magnitude tabular data 121 4.1 Introduction 121 4.1.1 Magnitude Tabular Data: Basic Terminology 121 4.1.2 Complex tabular data structures: hierarchical and linked tables 122 4.1.3 Risk Concepts 124 4.1.4 Protection Concepts 127 4.1.5 Information Loss Concepts 127 4.1.6 Implementation: Software, Guidelines and Case Study 127 4.2 Disclosure Risk Assessment I: Primary Sensitive Cells 128 4.2.1 Intruder Scenarios 128 4.2.2 Sensitivity rules 129 4.3 Disclosure Risk Assessment II: Secondary risk assessment 140 4.3.1 Feasibility Interval 141 4.3.2 Protection Level 142 4.3.3 Singleton and multi cell disclosure 143 4.3.4 Risk models for hierarchical and linked tables 144 4.4 Non-Perturbative Protection Methods 145 4.4.1 Global Recoding 145 4.4.2 The Concept of Cell Suppression 145 4.4.3 Algorithms for Secondary Cell Suppression 146 4.4.4 Secondary Cell Suppression in Hierarchical and Linked Tables 149 4.5 Perturbative Protection Methods 151 4.5.1 A pre-tabular method: Multiplicative Noise 152 4.5.2 A Post-tabular Method: Controlled Tabular Adjustment 153 4.6 Information Loss Measures for Tabular Data 153 4.6.1 Cell Costs for Cell Suppression 153 4.6.2 Cell Costs for CTA 154 4.6.3 Information Loss Measures to Evaluate the Outcome of Table Protection 155 4.7 Software for Tabular Data Protection 155 4.7.1 Empirical comparison of cell suppression algorithms 156 4.8 Guidelines: Setting up an efficient table model systematically 160 4.8.1 Defining Spanning Variables 161 4.8.2 Response Variables and Mapping Rules 162 4.9 Case Studies 164 4.9.1 Response Variables and Mapping Rules of the Case Study 164 4.9.2 Spanning Variables of the Case Study 165 4.9.3 Analysing the Tables of the Case Study 165 4.9.4 Software Issues of the Case Study 167 5 Frequency tables 169 5.1 Introduction 169 5.2 Disclosure risks 169 5.3 Methods 176 5.4 Post-tabular methods 178 5.4.1 Cell Suppression 178 5.4.2 ABS Cell Perturbation 179 5.4.3 Rounding 179 5.5 Information loss 184 5.6 Software 186 5.6.1 Introduction 186 5.7 Case Studies 188 5.7.1 UK Census 188 5.7.2 Australian and New Zealand Censuses 190 6 Data Access Issues 193 6.1 Introduction 193 6.2 Research Data Centres 193 6.3 Remote Execution 194 6.4 Remote Access 195 6.5 Licensing 196 6.6 Guidelines on output checking 196 6.6.1 Introduction 196 6.6.2 General approach 197 6.6.3 Rules for output checking 199 6.6.4 Organizational/procedural aspects of output checking 208 6.6.5 Researcher training 215 6.7 Additional issues concerning data access 218 6.7.1 Examples of disclaimers 218 6.7.2 Output description 218 6.8 Case Studies 219 6.8.1 The U.S. …”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  19. 1719
  20. 1720

    Intellectual property, market power and the public interest

    Published 2008
    Table of Contents: “…/ Eileen Sheehan -- Research tools : patents and the information market in the knowledge based economy / Christine Godt -- Exploitative abuses : which competition policy, which public policy / Imelda Maher.…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook