Managing information assets using feedback re-enforced search and navigation
First Claim
1. A computer-implemented method of governing information assets managed by an enterprise, the computer-implemented method comprising:
- identifying, by an enterprise information asset management application executing on a computing system having at least a processor and a memory, a set of search results responsive to a query requesting a subset of information assets within the enterprise;
providing the set of search results;
receiving a selection of a first information asset presented in the set of search results;
identifying at least a second information asset presented in the set of search results, wherein the first information asset and the second information asset are related to one another by an edge in a semantic graph that represents relationships between the plurality of information assets, wherein the semantic graph associates the plurality of information assets with nodes of the semantic graph, wherein the relationships between nodes in the semantic graph are generated and updated by monitoring user behavior in accessing the plurality of information assets with the set of search results and without requiring user input explicitly specifying to update the relationships, wherein the semantic graph is updated based on a domain ontology;
parsing the semantic graph in order to identify at least one information asset selected from;
(i) an informal information asset whose relationships satisfy an overuse criterion and (ii) an underused information asset whose relationships satisfy an underuse criterion; and
designating the at least one information asset as being overused or underused, whereafter the at least one information asset is formally commissioned or decommissioned.
1 Assignment
0 Petitions
Accused Products
Abstract
Embodiments of the invention provide an approach for creating, evolving and using a weighted semantic graph to manage and potentially identify certain information assets within an enterprise. The semantic graph may be generated by monitoring users navigating through search results which provide a set of information assets responsive to a search query. By recording the navigation path taken by many users, relationships between information assets may be identified. Further, once generated, the semantic graph may be used to present users with in indication of related information assets as part of the search results. Further still, the semantic graph may also be used to identify information assert “hubs” as well as information assets that may provide low utility to individuals within the enterprise.
-
Citations
20 Claims
-
1. A computer-implemented method of governing information assets managed by an enterprise, the computer-implemented method comprising:
-
identifying, by an enterprise information asset management application executing on a computing system having at least a processor and a memory, a set of search results responsive to a query requesting a subset of information assets within the enterprise; providing the set of search results; receiving a selection of a first information asset presented in the set of search results; identifying at least a second information asset presented in the set of search results, wherein the first information asset and the second information asset are related to one another by an edge in a semantic graph that represents relationships between the plurality of information assets, wherein the semantic graph associates the plurality of information assets with nodes of the semantic graph, wherein the relationships between nodes in the semantic graph are generated and updated by monitoring user behavior in accessing the plurality of information assets with the set of search results and without requiring user input explicitly specifying to update the relationships, wherein the semantic graph is updated based on a domain ontology; parsing the semantic graph in order to identify at least one information asset selected from;
(i) an informal information asset whose relationships satisfy an overuse criterion and (ii) an underused information asset whose relationships satisfy an underuse criterion; anddesignating the at least one information asset as being overused or underused, whereafter the at least one information asset is formally commissioned or decommissioned. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20)
-
Specification