|
[1]Internet World Stats [Online]. Available: http://www.internetworldstats.com/emarketing.htm. [2]Internet World Stats [Online].Available: http://www.internetworldstats.com/stats.htm. [3]Morahan-Martin, J., & Schumacher, P. (2000). Incidents and correlates of pathological internet use among college students. Computers in Human Behavior, Vol. 16, pp. 13-29. [4] Egger, O., & Rauterberg, M. (1996). Internet behavior and addiction [On-line]. Available: http://www.ifap.bepr.ethz.ch/~egger/ibq/res.html. [5]Griffiths, M.D. (2000). Does Internet and computer “addiction” exist? Some case study evidence. Cyber-Psychology and Behavior, Vol. 3, pp. 211-218. [6]Jennifer, B. G. & Neal, D. G. (2006). The Web of Internet Dependency: Search Results for the Mental Health Professional. International journal of mental health and addiction, Vol. 4, pp. 307-318. [7] Lin, S. S. J., & Tsai, C. C. (2002). Sensation seeking and internet dependence of Taiwanese high school adolescents. Computers in Human Behavior, Vol. 18, No. 4, pp. 411-426. [8]Brenner, V. (1996). An initial report on the online assessment of Internet addiction: the first days of the Internet usage survey [Online]. Available: http://www.ccsnet.com/prep/pap/pap8b/638b/012p.txt. [9] Brenner, V. (1997). Parameters of Internet use, abuse, and addiction: the first 90 days of the Internet usage survey. Psychological Reports, Vol. 80, pp. 879-882. [10]Greenfield, D. N. (2000). Psychological characteristics of compulsive Internet use: a preliminary analysis. Cyber Psychology and Behavior, Vol. 5, No. 2, pp. 403-412. [11]Kraut, R., Patterson, M., Lundmark, V., Kiesler, S., Mukopadhyay, T., & Scherlis, W. (1998). A social technology that reduces social involvement and psychological welling being? American Psychologist, Vol. 53, No. 9, pp. 1017-1031. [12]Young, K. S. (1996). Internet addiction survey [Online]. Available: http://www.pitt.edu/_ksy/survey.htm. [13]Young, K. S. (1997). Internet addiction: the emergence of a new disorder. Paper presented at the 105th annual convention of the American Psychological Association, Chicago. [14] Fei, B.K.L., Eloff, J.H.P., Olivier, M.S. & Venter, H.S. (2006). The use of self-organising maps for anomalous behaviour detection in a digital investigation. Forensic Science International, Vol. 162, No. 1-3, pp. 33-37. [15]Griffiths, M. D. (1998). Internet addiction: Does it really exist? In Gackenbach, J. (ed.), Psychology and the Internet, Academic Press. [16]Kandell, J. J. (1998). Internet addiction on campus: The vulnerability of college students. Cyberpsychology and Behavior, Vol. 1, No. 1, pp. 11-17. [17]Chou, C., & Hsiao, M. C. (2000). Internet addiction, usage, gratifications, and pleasure experience-The Taiwan college students’ case. Computer Education, Vol. 35, No. 1, pp. 65-80. [18]Young, K. S. (1996). Internet addiction: The emergence of a new clinical disorder. The 104th American Psychological Association Annual Convention, Toronto, Canada. [19]Goldberg, I. (1996). Internet Addiction Disorder [Online].Available: http://www.rider.edu/∼suler/psycyber/supportgp.html. [20]Davis, R. A. (2001). A cognitive-behavioral model of pathological Internet use. Computers in Human Behavior, Vol. 77, pp. 187-195. [21] Scherer, K. (1997). College life on-line: Healthy and unhealthy internet use. Journal of College Student Development, Vol. 38, pp. 655-665. [22]Young, K. S. (1998). Internet addiction: The emergence of a new clinical disorder. Cyber Psychology and Behavior, Vol. 3, pp. 237-244. [23] Young, K. (1998). Caught in the Net. New York: John Wiley & Sons. [24]Chen, S. H., & Chou, C. (1999). Development of Chinese Internet addiction scale in Taiwan. The 107th American Psychology Annual convention, Boston, USA. [25]Lin, S. S. J., & Tsai, C. C. (1999). Internet Addiction among High Schoolers in Taiwan. The 107th American Psychology Association (APA) Annual Convention, Boston, USA. [26] Widyanto, L. & McMurran, M. (2004). The Psychometric Properties of the Internet Addiction Test. CyberPsychology and Behavior, Vol. 7, No. 4, pp. 443-450. [27] Marcella, A. & Greenfield, R. (2002). Cyber Forensics: A Field Manual for Collecting, Examining and Preserving Evidence of Computer Crimes. Auerbach. [28] Fei, B., Eloff, J., Venter, H. & Olivier, M. (2005). Exploring forensic data with self-organising maps. Advances in Digital Forensics, pp. 113-123. [29] Kohonen, T. (1997). Self-Organizing Maps, 2nd Edition. Springer-Verlag. [30] Vapnik, V. (1995). The Nature of Statistical Learning Theory. Springer-Verlag. [31] Jensen, F.V. (1996). An Introduction to Bayesian Networks. UCL Press Limited, London. [32] Cowell, R.G., Dawid, A.P., Lauritzen, S.L. & Spiegelhalter, D.J. (1999). Probabilistic Networks and Expert Systems. Springer, New York, USA. [33] Heckerman, D. (1995). A tutorial on learning Bayesian networks. Technical Report MSR-TR-95-06, Microsoft Research. [34] Pernkopf F. (2005). Bayesian network classifiers versus selective k-NN classifier. Pattern Recognition, Vol. 38, pp. 1-10. [35] Friedman, N., Geiger, D. & Goldszmidt, M. (1997). Bayesian network classifiers. Machine Learning, Vol. 29, pp. 131-163. [36] Quinlan, R. (2005). Data Mining Tools [Online].Available: http://www.rulequest.com/see5-info.html. [37] Rastogi, R. & Shim, K. (1998). PUBLIC: a decision tree classifier that integrates building and pruning. Proceedings of the 24th International Conference on Very Large Databases, pp. 404-415. [38]Quinlan, J.R. (1986). Induction of decision trees. Machine Learning, Vol. 1, pp. 81-106. [39] Chi, M. & Bruzzone, L. (2006). An ensemble-driven k-NN approach to ill-posed classification problems. Pattern Recognition Letters, Vol. 27, pp. 301-307. [40] Aamodt, A. & Plaza, E. (1994). Case-based reasoning: foundational issues methodological variations and systems approaches. AI Communications, Vol. 7, pp. 39-59. [41] Pinho, D., Vivacqua, A., Palma, S. & Souza, J. M. (2006). SYMBAD-Similarity based agents for design. Expert Systems with Applications, Vol. 31, pp. 728-733. [42] Kolodner, J. (1993). Case-based reasoning. San Mateo, CA: Morgan Kaufmann [43] Choy, K. L., & Lee, W. B. (2001). Multi-agent based virtual enterprise supply chain network for order management. Journal of Industrial Engineering Research, Vol. 2, No. 2, pp. 126-141. [44] Choy, K. L., Lee, W. B., & Lo, V. (2003). Design of an intelligent supplier relationship management system-a hybrid case-based neural network approach. International Journal of Expert Systems with Applications, Vol. 24, No. 3, pp. 225-237. [45] Dietterich, T. G. (1997). Machine learning research: four current directions. , AI Magazine, Vol. 18, No. 4, pp. 97-136. [46] Bray, T., Paoli, J., Sperberg-McQueen, C.M. & Maler, E. (2000). Extensible markup language (xml) 1.0, 2nd ed. w3c recommendation. [Online]. Available:http://www.w3.org/TR/REC-xml. [47] Ferris, C. & Farrell, J. (2003). What are web services. Communications of the ACM, Vol. 46, No. 6, pp. 31. [48] Rezgui, Y. (2007). Role-based service-oriented implementation of a virtual enterprise: A case study in the construction sector. Computers in Industry, Vol. 58, pp. 74-86. [49] Kreger, H. (2001). Web services conceptual architecture (WSCA 1.0). Technical Report, IBM Corporation. [50] Mateos, C., Zunino, A. & Campo, M. (2007).Extending movilog for supporting Web services. Computer Languages, Systems & Structures, Vol. 33, pp. 11-31. [51] Nakamur, Y., Hada, S. & Neyama, R. (2002). Towards the Integration of Web services Security on Enterprise Environments. Proceedings of the 2002 Symposium on Applications and the Internet, pp. 166-175. [52] Yin, H., Lin, C. & Lin, Y.S. (2006). A Mobile Police Information System Based on Web Service. Journal of Tsinghua Science and Technology, No. 1. [53]IETF. The SSL Protocol. Version 3.0. [54] Neuman, C. & Ts’o, T. (1994). Kerberos: an authentication service for computer networks. IEEE Commun., Vol. 32, No. 9, pp. 33-38. [55] Efrim Boritz, J. & Won, G. N. (2005). Security in XML-based financial reporting services on the Internet. Journal of Accounting and Public Policy, Vol. 24, pp. 11-35. [56] Access Data Corp. (2004). [Online].Available: http://www.accessdata.com [57] Hsu, C. W., Chang, C. C., & Lin, C. J. (2003). A practical guide to support vector classification. [Online]. Available: http://www.csie.ntu.edu.tw/~cjlin/papers/guide/guide.pdf. [58] Hsu, W.H. (2004). Genetic Wrappers for feature selection in decision tree induction and variable ordering in Bayesian network structure learning. Information Science, Vol. 163, pp. 103-122. [59] Cano, R., Sordo, C. & Gutie’rrez, J.M. (2004). Applications of Bayesian Networks in Meteorology. Advances in Bayesian Networks , Springer-Verlag, pp. 309-327. [60] Gregory, F. C. & Herskovitz, E. (1992). A Bayesian method for the induction of probabilistic networks from data. Machine Learning, Vol. 9, pp. 309-347. [61] Hruschka, Jr. E. R. & Ebecken, F.F. (2007). Towards efficient variables ordering for Bayesian networks classifier. Data & Knowledge Engineering, Vol. 63, pp. 258-269. [62] Bauer, E. & Kohavi, R. (1999). An empirical comparison of voting classification algorithms: bagging, boosting, and variants. Machine Learning, Vol. 36, No. 1, pp. 105-139. [63]Richards, G., Rayward-Smith, V.J., Sonksen, P.H., Carey, S. & Weng, C. (2001). Data mining for indicators of early mortality in a database of clinical records. Artificial Intelligence in Medicine, Vol. 22, pp. 215-31.
|