Knowledge management of cyber security expertise: an ontological approach to talent discovery
暂无分享,去创建一个
[1] Jennifer E. Rowley,et al. The wisdom hierarchy: representations of the DIKW hierarchy , 2007, J. Inf. Sci..
[2] Robert E. Lewis,et al. Talent management: A critical review , 2006 .
[3] John S. Liu,et al. Research fronts in data envelopment analysis , 2016 .
[4] James Conrad. Seeking help: the important role of ethical hackers , 2012, Netw. Secur..
[5] Asunción Gómez-Pérez,et al. Methodologies, tools and languages for building ontologies: Where is their meeting point? , 2003, Data Knowl. Eng..
[6] Gabriella Pasi,et al. Personal ontologies: Generation of user profiles based on the YAGO ontology , 2013, Inf. Process. Manag..
[7] Dorothy E. Leidner,et al. Review: Knowledge Management and Knowledge Management Systems: Conceptual Foundations and Research Issues , 2001, MIS Q..
[8] Thompson S. H. Teo. Meeting the challenges of knowledge management at the Housing and Development Board , 2005, Decis. Support Syst..
[9] Kamel Mellahi,et al. Strategic talent management: A review and research agenda , 2009 .
[10] Kieron O'Hara,et al. Editorial: Knowledge representation with ontologies: Present challenges-Future possibilities , 2007 .
[11] W. A. Schiemann. From talent management to talent optimization , 2014 .
[12] Nicola Zannone,et al. A reference model for reputation systems , 2014, Decis. Support Syst..
[13] Lawrence M. Seiford,et al. Data envelopment analysis (DEA) - Thirty years on , 2009, Eur. J. Oper. Res..
[14] John Grundy,et al. Performance appraisal of software testers , 2014, Inf. Softw. Technol..
[15] R. Bone. Discovery , 1938, Nature.
[16] Rossouw von Solms,et al. From information security to cyber security , 2013, Comput. Secur..
[17] Kecheng Liu,et al. Understanding the roles of signs and norms in organizations - a semiotic approach to information systems design , 2000, Behav. Inf. Technol..
[18] B. Fruytier,et al. Talent management and the relevance of context: Towards a pluralistic approach , 2013 .
[19] Kecheng Liu,et al. Semiotics in Information Systems Engineering , 2000 .
[20] Hung-Tso Lin,et al. Personnel selection using analytic network process and fuzzy data envelopment analysis approaches , 2010, Comput. Ind. Eng..
[21] Nicky Dries,et al. What is the meaning of ‘talent’ in the world of work? , 2013 .
[22] Heiner Stuckenschmidt,et al. Handbook on Ontologies , 2004, Künstliche Intell..
[23] H.A.M. Luiijf,et al. National Cyber Security Framework Manual , 2013 .
[24] R. Schuler,et al. Global talent management: Literature review, integrative framework, and suggestions for further research , 2010 .
[25] Iuon-Chang Lin,et al. A fair reputation system for use in online auctions , 2015 .
[26] Ramón Hermoso,et al. From blurry numbers to clear preferences: A mechanism to extract reputation in social networks , 2014, Expert Syst. Appl..
[27] T. L. Saaty. A Scaling Method for Priorities in Hierarchical Structures , 1977 .
[28] Lily Sun,et al. Talent discovery for cyber security: An organisational perspective , 2015, 2015 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA).
[29] Tracey Caldwell,et al. Plugging the cyber-security skills gap , 2013 .
[30] A. Kaplan,et al. Users of the world, unite! The challenges and opportunities of Social Media , 2010 .
[31] Ivana Pais,et al. Predictors of job seekers' self-disclosure on social media , 2015, Comput. Hum. Behav..
[32] X. T. Wang,et al. Trust or not: Heuristics for making trust-based choices in HR management , 2014 .
[33] Mohammed Alsaigh,et al. Information analytics for healthcare service discovery. , 2014, Journal of healthcare engineering.