請用此 Handle URI 來引用此文件:
http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/63689完整後設資料紀錄
| DC 欄位 | 值 | 語言 |
|---|---|---|
| dc.contributor.advisor | 魏志平 | |
| dc.contributor.author | Pai-Hsun Lee | en |
| dc.contributor.author | 李柏勳 | zh_TW |
| dc.date.accessioned | 2021-06-16T17:16:28Z | - |
| dc.date.available | 2012-08-22 | |
| dc.date.copyright | 2012-08-22 | |
| dc.date.issued | 2012 | |
| dc.date.submitted | 2012-08-17 | |
| dc.identifier.citation | Adamic, L. A., & Adar, E. (2003). Friends and neighbors on the Web. Social Networks.
Bao, S., Li, R., Yu, Y., & Cao, Y. (2008). Competitor Mining with the Web. IEEE Transactions on Knowledge and Data Engineering. Barabasi, A. L., Jeong, H., Neda, Z., Ravasz, E., Schubert, A., & Vicsek, T. (2002). Evolution of the social network of scientific collaboration. Physica A. Bergen, M., & Peteraf, M. A. (2002). Competitor Identification and Competitor Analysis: A Broad-Based Managerial Appraoch. Managerial and Decision Economics Brandes, U. (2001). A Faster Algorithm for Betweenness Centrality. Journal of Mathematical Sociology. Chen, H., Chau, M., & Zeng, D. (2002). CI Spider: a tool for competitive intelligence on the Web. Decision Support Systems, 34(1), 1-17. Choo, C. W. (1999). The Art of Scanning the Environment. Bulletin of the American Society for Information Science, 25(3), 13-19. D'Aveni. (1994). Hypercompetition. New York: Free Press. Eisenhardt, K. M., & Bourgeois III, L. J. (1989). Politics of Strategic Decision Making in High-velocity Environments: Toward A Midrange Theory. Academy of Management Journal, 31(4), 737-770. Hall, M., Frank, E., Holmes, G., Pfahringer, B., Reutemann, P., & Witten, I. H. (2009). The WEKA Data Mining Software: An Update. SIGKDD Explorations, 11(1). Jennings, D. F., & Lumpkin, J. R. (1992). Insights between Environmental Scanning Activities and Porter's Generic Strategies: An Empirical Analysis. Journal of Management, 18(4), 791-803. Kleinberg, J. (1999). Authoritative sources in a hyperlinked environment. Journal of the ACM, 46(5), 604 - 632. Ma, Z., Pant, G., & Sheng, O. R. L. (2010). Mining competitor relationships from online news: A network-based approach. Electronic Commerce Research and Applications, 10(4). Newman, M. E. J. (2001). Clustering and preferential attachment in growing networks. Physical Review Letters E. O'Madadhain, J., Fisher, D., & White, S. (2010). JUNG, from http://jung.sourceforge.net/ Page, L., & Brin, S. (1998). The Anatomy of a Large-Scale Hypertextual Web Search Engine. Pant, G., & Sheng, O. R. L. (2009). Avoiding the Blind Spots: Competitor identification Using Web Text and Linkage Structure. International Conference on Information Systems. Smith, K. G., Grimm, C. M., & Gannon, M. J. (1992). Dynamics of Competitive Strategy. Dynamics of Competitive Strategy, Newbury Park, CA: Sage. Zajac, E. J., & Bazerman, M. H. (1991). Blind Spots in Industry and Competitor Ananlysis: Implications of Interfirm (Mis)Perception for Strategic Decisions. The Academy of Management Review, 16, 37-56. | |
| dc.identifier.uri | http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/63689 | - |
| dc.description.abstract | 在如今變動快速且混亂的商業環境中,組織一定要能主動且快速地適應環境才有可能存續及發展。組織可以透過環境掃描來取得眾多的資訊。在執行環境掃描時,取得競爭者資訊可說是最重要的一環。但在蒐集競爭者資訊之前,找出競爭者是首要的工作。找出競爭者可以支援組織對抗險惡的商業競爭環境,或者規劃攻擊目標以及反應的策略。在此研究中,我們結合了網路特徵與文字資訊來作為經爭者辨識的預測變數。此外,本研究還提出了一個多回合的判斷模型,來達到改善競爭者辨識的目的。就效果而言,兩個方法在辨識競爭者關係上都表現的良好。 | zh_TW |
| dc.description.abstract | The business environment is increasingly volatile and turbulent. Organizations must adapt to their environments proactively and swiftly in order to survive and prosper. Environmental scanning can be adopted by organizations to discover varieties of information. Competitor information serves as an important part while conducting environmental scanning. Before gathering the competitor information, competitor mining is a key and necessary task for company that allows a company to shore up their defenses against probable competitive incursions and plan competitive attack and response strategies. In this research, we extend the network-based approach by incorporating text information as additional predictors and propose an iterative approach to improve the performance of competitor mining. The evaluation results suggest that the approach proposed by this study performs well in competitor mining problem. | en |
| dc.description.provenance | Made available in DSpace on 2021-06-16T17:16:28Z (GMT). No. of bitstreams: 1 ntu-101-R99725045-1.pdf: 1151595 bytes, checksum: 40cb749a4b5791214f4a82380c45db83 (MD5) Previous issue date: 2012 | en |
| dc.description.tableofcontents | 口試委員會審定書 i
誌謝 ii 中文摘要 iii Abstract iv Chapter 1 Introduction 1 Chapter 2 Literature Review 4 Chapter 3 Design of the System 3.1 Graph Representation 17 3.2 System Design 19 3.3 Variables 24 Chapter 4 Evaluations 4.1 Data Collection 33 4.2 Ground Truth 34 4.3 Instance Selection 35 4.4 Evaluation Metrics 38 4.5 Competitor Discovery 40 Chapter 5 Conclusion and Future Works 52 Reference 53 Appendix A. Financial Times Global 500 in 2011 55 Appendix B. Industry Types in News Documents 72 | |
| dc.language.iso | en | |
| dc.subject | 競爭者辨識 | zh_TW |
| dc.subject | 網路特徵 | zh_TW |
| dc.subject | 文字資訊 | zh_TW |
| dc.subject | 網絡分析 | zh_TW |
| dc.subject | 多回合模型 | zh_TW |
| dc.subject | Network Feature | en |
| dc.subject | Competitor Mining | en |
| dc.subject | Iterative Approach | en |
| dc.subject | Network Analysis | en |
| dc.subject | Text Information | en |
| dc.title | 利用網路特徵和文字資訊找出競爭者關係 | zh_TW |
| dc.title | Identifying Competitor Relationships Using Network Features and Text Information | en |
| dc.type | Thesis | |
| dc.date.schoolyear | 100-2 | |
| dc.description.degree | 碩士 | |
| dc.contributor.oralexamcommittee | 李彥賢,楊錦生,楊傳智 | |
| dc.subject.keyword | 競爭者辨識,網路特徵,文字資訊,網絡分析,多回合模型, | zh_TW |
| dc.subject.keyword | Competitor Mining,Network Feature,Text Information,Network Analysis,Iterative Approach, | en |
| dc.relation.page | 77 | |
| dc.rights.note | 有償授權 | |
| dc.date.accepted | 2012-08-18 | |
| dc.contributor.author-college | 管理學院 | zh_TW |
| dc.contributor.author-dept | 資訊管理學研究所 | zh_TW |
| 顯示於系所單位: | 資訊管理學系 | |
文件中的檔案:
| 檔案 | 大小 | 格式 | |
|---|---|---|---|
| ntu-101-1.pdf 未授權公開取用 | 1.12 MB | Adobe PDF |
系統中的文件,除了特別指名其著作權條款之外,均受到著作權保護,並且保留所有的權利。
