Search For:

Displaying 1-8 out of 8 total
Modeling Attrition in Organizations from Email Communication
Found in: 2013 International Conference on Social Computing (SocialCom)
By Akshay Patil,Juan Liu,Jianqiang Shen,Oliver Brdiczka,Jie Gao,John Hanley
Issue Date:September 2013
pp. 331-338
Modeling people's online behavior in relation to their real-world social context is an interesting and important research problem. In this paper, we present our preliminary study of attrition behavior in real-world organizations based on two online dataset...
 
Proactive Insider Threat Detection through Graph Learning and Psychological Context
Found in: 2012 IEEE CS Security and Privacy Workshops (SPW 2012)
By O. Brdiczka, Juan Liu,B. Price, Jianqiang Shen,A. Patil,R. Chow,E. Bart,N. Ducheneaut
Issue Date:May 2012
pp. 142-149
The annual incidence of insider attacks continues to grow, and there are indications this trend will continue. While there are a number of existing tools that can accurately identify known attacks, these are reactive (as opposed to proactive) in their enfo...
   
A Bayesian Network Model for Predicting Insider Threats
Found in: 2013 IEEE CS Security and Privacy Workshops (SPW2013)
By Elise T. Axelrad,Paul J. Sticha,Oliver Brdiczka, Jianqiang Shen
Issue Date:May 2013
pp. 82-89
This paper introduces a Bayesian network model for the motivation and psychology of the malicious insider. First, an initial model was developed based on results in the research literature, highlighting critical variables for the prediction of degree of in...
   
Discovering frequent work procedures from resource connections
Found in: Proceedingsc of the 13th international conference on Intelligent user interfaces (IUI '09)
By Erin Fitzhenry, Jianqiang Shen, Thomas G. Dietterich
Issue Date:February 2009
pp. 653-654
Intelligent desktop assistants could provide more help for users if they could learn models of the users' workflows. However, discovering desktop workflows is difficult because they unfold over extended periods of time (days or weeks) and they are interlea...
     
Detecting and correcting user activity switches: algorithms and interfaces
Found in: Proceedingsc of the 13th international conference on Intelligent user interfaces (IUI '09)
By Anh Tran, Brenton Kirschner, Fredric Carl, Jed Irvine, Jianqiang Shen, Michael Goodman, Simone Stumpf, Stephen Kolibaba, Thomas G. Dietterich, Xinlong Bao
Issue Date:February 2009
pp. 653-654
The TaskTracer system allows knowledge workers to define a set of activities that characterize their desktop work. It then associates with each user-defined activity the set of resources that the user accesses when performing that activity. In order to cor...
     
Automatically finding and recommending resources to support knowledge workers' activities
Found in: Proceedings of the 13th international conference on Intelligent user interfaces (IUI '08)
By Beth Brownholtz, Casey Dugan, David R Millen, Jianqiang Shen, Michael Muller, Werner Geyer
Issue Date:January 2008
pp. 3-3
Knowledge workers perform many different activities daily. Each activity defines a distinct work context with different information needs. In this paper we leverage users' activity representations, stored in an activity management system, to automatically ...
     
Active EM to reduce noise in activity recognition
Found in: Proceedings of the 12th international conference on Intelligent user interfaces (IUI '07)
By Jianqiang Shen, Thomas G. Dietterich
Issue Date:January 2007
pp. 132-140
Intelligent desktop environments allow the desktop user to define a set of projects or activities that characterize the user's desktop work. These environments then attempt to identify the current activity of the user in order to provide various kinds of a...
     
A hybrid learning system for recognizing user tasks from desktop activities and email messages
Found in: Proceedings of the 11th international conference on Intelligent user interfaces (IUI '06)
By Jianqiang Shen, Jonathan L. Herlocker, Lida Li, Thomas G. Dietterich
Issue Date:January 2006
pp. 86-92
The TaskTracer system seeks to help multi-tasking users manage the resources that they create and access while carrying out their work activities. It does this by associating with each user-defined activity the set of files, folders, email messages, contac...
     
 1