Sciweavers

1511 search results - page 55 / 303
» Active Risk Estimation
Sort
View
ICEIS
2002
IEEE
14 years 3 months ago
The AEX Method and Its Instrumentation
: We aim at elaborating a decision support system to manage concrete experience, using Artificial Intelligence methods, such as Case-Based Reasoning. We target any organization tha...
Sabine Delaître, Alain Giboin, Sabine Moisan
DIM
2009
ACM
14 years 2 months ago
Using identity credential usage logs to detect anomalous service accesses
For e-commerce companies providing online services, fraudulent access resulting from theft of identity credentials is a serious concern. Such online service providers deploy a var...
Daisuke Mashima, Mustaque Ahamad
ECIS
2004
13 years 11 months ago
A conceptual framework of e-fraud control in an integrated supply chain
The integration of supply chains offers many benefits; yet, it may also render organisations more vulnerable to electronic fraud (e-fraud). E-fraud can drain on organisations'...
Lucian Vasiu
ECIS
2001
13 years 11 months ago
Cyberliability: Is the Chief Privacy Officer the Solution?
The primary responsibility of the Chief Privacy Officer (CPO) is to protect online consumer privacy by developing an organization's privacy policy and ensuring compliance wit...
Janice C. Sipior, Burke T. Ward
ICSE
2009
IEEE-ACM
13 years 8 months ago
Extended eTVRA vs. security checklist: Experiences in a value-web
Abstract--Security evaluation according to ISO 15408 (Common Criteria) is a resource and time demanding activity, as well as being costly. For this reason, only few companies take ...
Ayse Morali, Emmanuele Zambon, Siv Hilde Houmb, Ka...