-
2
-
-
0043157171
-
Learning to filter spam e-mail: A comparison of a naive Bayesian and a memory-based approach
-
Androutsopoulos I, Paliouras G, Karkaletsis V, Sakkis G, Spyropoulos C, Stamatopoulos P (2000) Learning to filter spam e-mail: A comparison of a naive Bayesian and a memory-based approach. In: Proceedings of the 4th PKDD's Workshop on Machine Learning and Textual Information Access
-
(2000)
Proceedings of the 4th PKDD's Workshop on Machine Learning and Textual Information Access
-
-
Androutsopoulos, I.1
Paliouras, G.2
Karkaletsis, V.3
Sakkis, G.4
Spyropoulos, C.5
Stamatopoulos, P.6
-
3
-
-
0028461417
-
Automated learning of decision rules for text categorization
-
Apté C, Damerau F (1994) Automated learning of decision rules for text categorization. ACM Trans Inf Syst 12(3):233-251
-
(1994)
ACM Trans Inf Syst
, vol.12
, Issue.3
, pp. 233-251
-
-
Apté, C.1
Damerau, F.2
-
5
-
-
0036667993
-
Employee Internet management: Current business practice and outcomes
-
Case CJ, Young KS (2002) Employee Internet management: Current business practice and outcomes. CyberPsychol Behav 5(4):355-361
-
(2002)
CyberPsychol Behav
, vol.5
, Issue.4
, pp. 355-361
-
-
Case, C.J.1
Young, K.S.2
-
6
-
-
33646156614
-
Web page classification based on a support vector machine using a weighted vote schema
-
Chen R-C, Hsieh C-H (2006) Web page classification based on a support vector machine using a weighted vote schema. Expert Syst Appl 31(2):427-435
-
(2006)
Expert Syst Appl
, vol.31
, Issue.2
, pp. 427-435
-
-
Chen, R.-C.1
Hsieh, C.-H.2
-
8
-
-
0036667997
-
Validation of a new scale for measuring problematic Internet use: Implications for pre-employment screening
-
Davis RA, Flett GL, Besser A (2002) Validation of a new scale for measuring problematic Internet use: Implications for pre-employment screening. CyberPsychol Behav 5(4):331-345
-
(2002)
CyberPsychol Behav
, vol.5
, Issue.4
, pp. 331-345
-
-
Davis, R.A.1
Flett, G.L.2
Besser, A.3
-
9
-
-
0003551671
-
-
Addison-Wesley, Reading
-
Fishbein M, Ajzen I (1975) Belief, attitude, intention, and behavior: An introduction to theory and research. Addison-Wesley, Reading
-
(1975)
Belief, Attitude, Intention, and Behavior: An Introduction to Theory and Research
-
-
Fishbein, M.1
Ajzen, I.2
-
10
-
-
84976776599
-
A Probabilistic learning approach for document indexing
-
Fuhr N, Buckley C (1991) A Probabilistic learning approach for document indexing. ACM Trans Inf Syst 9(3):223-248
-
(1991)
ACM Trans Inf Syst
, vol.9
, Issue.3
, pp. 223-248
-
-
Fuhr, N.1
Buckley, C.2
-
14
-
-
0038009720
-
Internet abuse in the workplace: Issues and concerns for employers and employment counselors
-
Griffiths M (2003) Internet abuse in the workplace: Issues and concerns for employers and employment counselors. J Employ Couns 40(2):87-96
-
(2003)
J Employ Couns
, vol.40
, Issue.2
, pp. 87-96
-
-
Griffiths, M.1
-
15
-
-
34249342269
-
Anticipatory event detection via classification
-
He Q, Chang K, Lim E-P (2007) Anticipatory event detection via classification. Inf Syst E-Bus Manage 5(3):275-294
-
(2007)
Inf Syst E-Bus Manage
, vol.5
, Issue.3
, pp. 275-294
-
-
He, Q.1
Chang, K.2
Lim, E.-P.3
-
16
-
-
0034195990
-
Social impacts: Internet filter effectiveness-testing over-and underinclusive blocking decisions of four popular web filters
-
Hunter CD (2000) Social impacts: Internet filter effectiveness-testing over-and underinclusive blocking decisions of four popular web filters. Soc Sci Comput Rev 18(2):214-222
-
(2000)
Soc Sci Comput Rev
, vol.18
, Issue.2
, pp. 214-222
-
-
Hunter, C.D.1
-
17
-
-
84957069814
-
Text categorization with support vector machine: Learning with many relevant features
-
Joachims T (1998) Text categorization with support vector machine: learning with many relevant features. In: Proceedings of the 10th European conference on machine learning, pp 137-142
-
(1998)
Proceedings of the 10th European Conference on Machine Learning
, pp. 137-142
-
-
Joachims, T.1
-
20
-
-
0037213443
-
Text categorization based on k-nearest neighbor approach for Web site classification
-
Kwon O-W, Lee J-H (2003) Text categorization based on k-nearest neighbor approach for Web site classification. Inf Process Manage 39(1):25-44
-
(2003)
Inf Process Manage
, vol.39
, Issue.1
, pp. 25-44
-
-
Kwon, O.-W.1
Lee, J.-H.2
-
23
-
-
0142123338
-
The IT way of loafing on the job: Cyberloafing, neutralizing and organizational justice
-
Lim KG (2002) The IT way of loafing on the job: Cyberloafing, neutralizing and organizational justice. J Organ Behav 23(5):675-694
-
(2002)
J Organ Behav
, vol.23
, Issue.5
, pp. 675-694
-
-
Lim, K.G.1
-
24
-
-
0142054225
-
How do I loaf here? Let me count the ways
-
Lim VKG, Teo TSH, Loo GL (2002) How do I loaf here? Let me count the ways. Commun ACM 45(1):66-70
-
(2002)
Commun ACM
, vol.45
, Issue.1
, pp. 66-70
-
-
Lim, V.K.G.1
Teo, T.S.H.2
Loo, G.L.3
-
25
-
-
50149108900
-
Predicting Cyber-production deviance in the workplace
-
Mahatanankoon P (2006) Predicting Cyber-production deviance in the workplace. Int J Internet Enterp Manage 4(4):314-330
-
(2006)
Int J Internet Enterp Manage
, vol.4
, Issue.4
, pp. 314-330
-
-
Mahatanankoon, P.1
-
26
-
-
1442329001
-
Development of a measure of personal web usage in the workplace
-
Mahatanankoon P, Anandarajan M, Igbaria M (2004) Development of a measure of personal web usage in the workplace. CyberPsychol Behav 7(1):93-104
-
(2004)
CyberPsychol Behav
, vol.7
, Issue.1
, pp. 93-104
-
-
Mahatanankoon, P.1
Anandarajan, M.2
Igbaria, M.3
-
29
-
-
0042406259
-
Monitoring for pornography and sexual harassment
-
Panko RR, Beh HG (2002) Monitoring for pornography and sexual harassment. Commun ACM 45(1):84-87
-
(2002)
Commun ACM
, vol.45
, Issue.1
, pp. 84-87
-
-
Panko, R.R.1
Beh, H.G.2
-
30
-
-
84948481845
-
An algorithm for suffix stripping
-
Porter MF (1980) An algorithm for suffix stripping. Program 14(3):130-137
-
(1980)
Program
, vol.14
, Issue.3
, pp. 130-137
-
-
Porter, M.F.1
-
35
-
-
0000646059
-
Learning internal representations by error propagation
-
In: Rumelhart DE, McClelland JL (eds) MIT, Cambridge
-
Rumelhart DE, Hinton GE, Williams RJ (1986) Learning internal representations by error propagation. In: Rumelhart DE, McClelland JL (eds) Parallel distributed processing: Explorations in the microstructure of cognition, vol. 1. MIT, Cambridge, pp 318-362
-
(1986)
Parallel Distributed Processing: Explorations in the Microstructure of Cognition
, vol.1
, pp. 318-362
-
-
Rumelhart, D.E.1
Hinton, G.E.2
Williams, R.J.3
-
36
-
-
0009304541
-
A Bayesian approach to filtering junk e-mail
-
In: Madison, Wisconsin
-
Sahami M, Dumais S, Heckerman D, Horvitz E (1998) A Bayesian approach to filtering junk e-mail. In: Proceedings of the AAAI'98 workshop on learning for text categorization, Madison, Wisconsin, pp 55-62
-
(1998)
Proceedings of the AAAI'98 Workshop on Learning for Text Categorization
, pp. 55-62
-
-
Sahami, M.1
Dumais, S.2
Heckerman, D.3
Horvitz, E.4
-
37
-
-
3843143080
-
Staking classifiers for anti-spam filtering of e-mail
-
Sakkis G, Androutsopoulos I, Paliouras G, Karkaletsis V, Spyropoulos C, Stamatopoulos P (2000) Staking classifiers for anti-spam filtering of e-mail. In: Proceedings of the 6th conference on empirical methods in natural language processing, pp 44-50
-
(2000)
Proceedings of the 6th Conference on Empirical Methods in Natural Language Processing
, pp. 44-50
-
-
Sakkis, G.1
Androutsopoulos, I.2
Paliouras, G.3
Karkaletsis, V.4
Spyropoulos, C.5
Stamatopoulos, P.6
-
38
-
-
1542634596
-
A memory-based approach to anti-spam filtering for mailing lists
-
Sakkis G, Androutsopoulos I, Paliouras G, Karkaletsis V, Spyropoulos C, Stamatopoulos P (2003) A memory-based approach to anti-spam filtering for mailing lists. Inf Retr 6(1):49-73
-
(2003)
Inf Retr
, vol.6
, Issue.1
, pp. 49-73
-
-
Sakkis, G.1
Androutsopoulos, I.2
Paliouras, G.3
Karkaletsis, V.4
Spyropoulos, C.5
Stamatopoulos, P.6
-
39
-
-
45549117987
-
Term-weighting approaches in automatic text retrieval
-
Salton G, Buckley C (1988) Term-weighting approaches in automatic text retrieval. Inf Process Manage 24(5):513-523
-
(1988)
Inf Process Manage
, vol.24
, Issue.5
, pp. 513-523
-
-
Salton, G.1
Buckley, C.2
-
41
-
-
0002442796
-
Machine learning in automated text categorization
-
Sebastiani F (2002) Machine learning in automated text categorization. ACM Comput Surv 34(1):1-47
-
(2002)
ACM Comput Surv
, vol.34
, Issue.1
, pp. 1-47
-
-
Sebastiani, F.1
-
42
-
-
1042300810
-
Improving workers' productivity and reducing Internet abuse
-
Sharma SK, Gupta J (2003) Improving workers' productivity and reducing Internet abuse. J Comput Inf Syst 44(2):74-78
-
(2003)
J Comput Inf Syst
, vol.44
, Issue.2
, pp. 74-78
-
-
Sharma, S.K.1
Gupta, J.2
-
43
-
-
0142054224
-
Acceptable Internet use policy
-
Siau K, Nah F, Teng L (2002) Acceptable Internet use policy. Commun ACM 45(1):75-79
-
(2002)
Commun ACM
, vol.45
, Issue.1
, pp. 75-79
-
-
Siau, K.1
Nah, F.2
Teng, L.3
-
46
-
-
0344755343
-
Does electronic monitoring of employee Internet usage work?
-
Urbaczewski A, Jessup LM (2002) Does electronic monitoring of employee Internet usage work? Commun ACM 45(1):80-83
-
(2002)
Commun ACM
, vol.45
, Issue.1
, pp. 80-83
-
-
Urbaczewski, A.1
Jessup, L.M.2
-
48
-
-
50149098687
-
Managing non-work related computing within an organization: The effects of two disciplinary approaches on employees' commitment to change
-
In: Bangkok, Thailand
-
Wong WM, Lee O, Lim, KH (2005) Managing non-work related computing within an organization: The effects of two disciplinary approaches on employees' commitment to change. In: Proceedings of the ninth Pacific Asia conference on information systems, Bangkok, Thailand, pp 441-454
-
(2005)
Proceedings of the Ninth Pacific Asia Conference on Information Systems
, pp. 441-454
-
-
Wong, W.M.1
Lee, O.2
Lim, K.H.3
-
52
-
-
1442328997
-
Internet abuse in the workplace: New trends in risk management
-
Young KS, Case CJ (2004) Internet abuse in the workplace: New trends in risk management. CyberPsychol Behav 7(1):105-111
-
(2004)
CyberPsychol Behav
, vol.7
, Issue.1
, pp. 105-111
-
-
Young, K.S.1
Case, C.J.2
-
53
-
-
3142747644
-
A comparison of classification methods for predicting deception in computer-mediated communication
-
Zhou L, Burgoon JK, Twitchell D, Qin T (2004) A comparison of classification methods for predicting deception in computer-mediated communication. J Manage Inf Syst 20(4):139-166
-
(2004)
J Manage Inf Syst
, vol.20
, Issue.4
, pp. 139-166
-
-
Zhou, L.1
Burgoon, J.K.2
Twitchell, D.3
Qin, T.4
|