期刊文献+

微博客的竞争性信息构成与质量评价 被引量:6

Composition of Competitive Information in Micro-blogs & Its Quality Evaluation
原文传递
导出
摘要 分别从微博客微内容中的信息形式和行为形式两个角度为出发点,分析微博客中所含有对企业情报活动有价值的竞争性信息构成,并提出其质量评价方式和相关指标,说明在企业竞争情报研究中的应用。 From the perspective of the information form and behavioral form of the micro-content of the micro-blog,this paper analyzes the composition of competitive information in micro-blog,which is valuable to the information activities of the enterprise.The paper also proposes the quality evaluation method and relevant indices,and explains the application of micro-blog in enterprise competitive intelligence study.
出处 《情报理论与实践》 CSSCI 北大核心 2012年第5期10-14,共5页 Information Studies:Theory & Application
基金 国家社会科学基金项目"网络内容分析与挖掘的企业竞争情报方法研究"的成果之一 项目编号:10BTQ034
关键词 微博客 竞争情报 信息构成 质量评价 micro-blog competitive intelligence information composition quality evaluation
  • 相关文献

参考文献9

二级参考文献26

  • 1盂广均.信息资源管理导论[M].北京:科学出版社,2000..
  • 2约翰·E·普赖斯科特 包昌火 谢新洲 译.竞争情报应用战略—企业实战案例分析[M].长春出版社,2004..
  • 3黄英.KIT—一企业情报需求分析[A]..北京大学首届企业竞争对手分析专题研讨会[C].北京:北京大学,2003..
  • 4凤凰卫视.人民日报误报人民币升值,引发全球证券市场一片混乱.2005-05-12.
  • 5Infosphere AB.Intelligence Primer[EB].http://www.infosphere.se
  • 6Krizan Lisa.Intelligence Essentials for Everyone.USA:Joint Military Intelligence College,June 1999.
  • 7杨雪婷.企业竞争情报系统四大攻略[N].北京现代商报,2004—04—19.
  • 8Johnson P E, Grazioli S, Jamal K Detecting deception: adversarial problem solving in a low base-rate world. Cognitive Science, 2001(25) :355 -392.
  • 9Granhag P A, Stromwall L A. Deception detection based on repeated interrogations. Legal and Criminological Psychology, 2001 (6):78 -84.
  • 10Neugarten M L. Seeing and noticing: an optical perspective on competitive intelligence. Journal of Competitive Intelligence and Management, 2003:93 -98.

共引文献37

同被引文献95

  • 1沈振萍,谢阳群.基于微博客的竞争情报搜集研究:以新浪微博为例[J].情报杂志,2012,31(5):29-35. 被引量:16
  • 2毛晓燕,环菲菲.竞争对手情报分析[J].情报探索,2006(3):73-75. 被引量:10
  • 3易兰丽.基于人类动力学的微博用户行为统计特征分析与建模研究[D].北京:北京邮电大学,2012.
  • 4Rui HX, Whinston A. Information or attention An empirical study of user contribution on TwitterrJ'l. Information System E-Business Management, 2012(10) :309-324.
  • 5Cheong M, Lee V C S. A microblogging-based approach to terrorism informatics: Exploration and chronicling civilian sentiment and response to terrorism events via Twitter[J]. Information System Front, 2011( 13)=45-59.
  • 6Sonnenbichler A C, Bazant C. Application of a community membership life cycle model on tag-based communities in Twitter[A]//Proceedings of the 34th Annual Conference of the Gesellschaft fur Klassifikation e. V[C]. Karlsruhe, 2010:301-309.
  • 7Wang A H. Machine learning for the detection of spam in Twitter networks[A]//Obaidat M S, Tsihrintzis G A, Filipe J (eds). e-Business and Telecommunications 7th International Joint Oonference, IOETE 2010, Athens, Greece, July 26-28, 2010, Revised Selected PaperslO]. COIS 222. Springer Berlin Heidelberg, 2012:319-333.
  • 8Vosecky J, Leung K W, Ng W. Searching for quality microblog posts: filtering and ranking basea on comem analysis and implicit links[A]//Lee S-g, Peng Z, Zhou X, et al (Eds.). Database System for Advanced Applications 17th International Conference, DASFAA 2012, Busan, South Korea, April 15-19, 2012, Proceedings, Part I[C]. LNCS 7238. Springer Berlin Heidelberg, 2012:397-413.
  • 9长微博 百度百科[EB/OL][2013-04-27].http://baikebaidu.com/view/6194369.htm.
  • 10Lin Y R, Sundaram H, Kelliher A. Summarization of LargeScale Social Network Activity [ C ]. IEEE. Proceedings of the 2009 IEEE International Conference on Acoustics, Speechand Signal Processing. Washington, DC, USA: IEEE,2009 : 3481-3484.

引证文献6

二级引证文献61

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部