Adaptive User Profiles for Enterprise Information Access
نویسندگان
چکیده
A major challenge for users of enterprise information is finding the information they want, presented in a way that makes sense to them. In this paper we tackle this problem by creating adaptive user profiles from implicit behaviour. In traditional approaches to information filtering, the user has to explicitly create his or her profile, and manually keep the profile up to date. Taking advantage of the popularity of collaborative tagging systems, we use the recorded tagging behaviour to construct an implicit, yet realistic and dynamic user profile. We present and evaluate algorithms for creating such profiles, characterizing their behaviour through statistical analysis. In addition, we present a visualisation tool which was used in a small scale user study to provide insight as to the effectiveness of our approach. Finally, we show how the profiles can be leveraged to enable personalised access to enterprise data sources.
منابع مشابه
Cedar: Engineering Role-Based Adaptive User Interfaces for Enterprise Applications
Feature-bloated enterprise applications such as customer relationship management (CRM) and enterprise resource planning (ERP) are very large scale, encompassing millions of lines-of-code and thousands of user interfaces (UI). Also, these applications are sold as generic off-the-shelf products to be used by people with diverse needs in required featureset and backgrounds such as skills, culture,...
متن کاملA profile-based architecture for a flexible and personalized information access
Information relevance is an important issue in information access techniques. A solution for improving this relevance is the personalization or adaptation of the answers provided to users. For this purpose we propose, in this article, an information retrieval and recommendation architecture in which any element is described in detail by a profile. The originality of this architecture is at the ...
متن کاملComprehensive life cycle support for access rules in information systems: the CEOSIS project
The definition and management of access rules (e.g. to control access to business documents and business functions) is a fundamental task in any enterprise information system (EIS). While there exists considerable work on how to specify and represent access rules, only little research has been spent on access rule changes. Examples include the evolution of organisational models with need for su...
متن کاملتشخیص ناهنجاری روی وب از طریق ایجاد پروفایل کاربرد دسترسی
Due to increasing in cyber-attacks, the need for web servers attack detection technique has drawn attentions today. Unfortunately, many available security solutions are inefficient in identifying web-based attacks. The main aim of this study is to detect abnormal web navigations based on web usage profiles. In this paper, comparing scrolling behavior of a normal user with an attacker, and simu...
متن کاملA New Single-Display Intelligent Adaptive Interface for Controlling a Group of UAVs
The increasing use of unmanned aerial vehicles (UAVs) or drones in different civil and military operations has attracted attention of many researchers and science communities. One of the most notable challenges in this field is supervising and controlling a group or a team of UAVs by a single user. Thereupon, we proposed a new intelligent adaptive interface (IAI) to overcome to this challenge. ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2007