The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The research work in this paper focused on cloud security challenges that prevented South African small and medium-sized enterprises from adopting and using various cloud-based business intelligence systems. The study conducted a literature review on 39 publications which were meticulously extracted from various electronic databases. Only 7 publications (5 journal articles, 1 conference proceeding,...
Considering the various security constraints is a primordial task in software development. Dealing with security problems early enable us to not going further in the process and avoid rework. Extract-Transform-Load (ETL) processes are the back stage of data warehouse architectures. Securing the ETL processes development is highly important and helps in mitigating security defects. Defining the right...
Hiding High Utility Sequential Patterns (HUSPs) is the task of finding the ways how to hide high utility sequential patterns appearing in sequence databases so that the adversaries cannot discover them after hiding. It has become an important research topic in recent years and has been applied in various domains such as business, marketing, stock, health and security, etc. However, few methods have...
In this study we develop a simplified technique for identifying prominent voices (and characterizing prevalent discourses) using Text Data Mining around Corporate Social Responsibility (CSR) issues or topics. We do this by analyzing a corpus of CSR reports produced by 7 US firms (Citi, Coca-Cola, Exxon-Mobil, General Motors, Intel, McDonald's and Microsoft) in 2004, 2008 and 2012, and focusing on...
Ihıs article presents an analysis on the attacks related to the sensitive data breach in the Web ecosystem. The study is based on an Meta-Analysis which identified the significance of 21 years of relevant contributions to the subject. Considering the results we elaborate two contributions: (i) we group attacks according to their behavior and (ii) we reveal the most serious emerging attacks. Additionally,...
The Internet of Things (IoT) is a emerging revolution technology that mankind has ever seen. IoT represents the future vision of computing and communication. IoT introduce the world of information and communication technology (ICT) for connectivity of anything at anytime from anywhere. Current Internet is considered as “Internet of People”, connecting the users of all over the world with various ways...
Online process mining techniques are increasingly used to provide operational support. In this work we describe tools to support distributed business processes which handle sensitive data and require a high level of security together with real-time validation. The techniques presented here have been specifically developed for real-time compliance checking of distributed processes in choreographies...
Nowadays, many industries and government can exploit Big Data to extract valuable insight. Such insight can help decision makers to enhance their strategies and optimize their plans. It helps the organization to gain a competitive advantage and provides added value for many economic and social sectors. In fact, several governments have launched programs, with important funds, in order to enhance research...
Cloud Computing has emerged as a new paradigm in the field of network-based services within many industrial and application domains. The major benefits that it provides in terms of IT efficiency and business agility represent a huge competitive advantage for an organization. However, building new services in the cloud or designing cloud-based solutions into existing business context in general is...
User reported experiences and opinions are used by peers to make decisions about where to go and what to buy. Unfortunately, not all users or opinions are honest. Many opinions are fabricated and may be submitted by automated systems or by people who are recruited by businesses and search engine optimizers to write good reviews. Such reviews and ratings are called spam reviews. These are misleading...
To face continuously growing security threats and requirements, sound methodologies for constructing secure systems are required. In this context, Model-Driven Security (MDS) has emerged since more than a decade ago as a specialized Model-Driven Engineering approach for supporting the development of secure systems. MDS aims at improving the productivity of the development process and quality of the...
Advances in computer technologies facilitate the implementation of inter-organizational business processes. At the same time, managing the security of these processes is increasingly difficult. Compliance with high level specifcations, like normatives and pre-agreed protocols, rules and requirements, is difficult to validate. Here we discuss how Conformance Checking, a specific area of Process Mining,...
A set of indexes for evaluation is a basic requirement for carrying out the evaluation successfully to protect telecom data network. How to extract useful indexes is a main problem to solve in this paper. The ITU-T X.805 is the basis of the analysis. The general framework is combined with the structure of China telecom data network. Then through determining key assets of the evaluation objects and...
Recently, the leak of domestic core technology of major business in Korea and the subsequent damage, has been increasing every year. Financial losses due to this leak are estimated to be about 220 trillion, which is equivalent to the gross budget of Korea Besides, the majority of the leaks are caused by former and current staff members, cooperated businesses, scientists and investment companies. This...
This paper starts from security needs of electronic notes in the present situation of e-commerce and discusses the application of information hiding technology and relative concepts. Then it presents a algorithm of information hiding technology that applies in the electronic notes system, including embedded hidden information algorithm and hidden information extraction algorithm, and describes the...
The customer relationship management (CRM) based on the model of software as a service (SaaS) is more suitable for application needs of small and medium enterprises compared with traditional CRM, but there are also some shortages. It has higher requirements on system security, basic resources and further service. Some solutions are provided to solve the above-mentioned problems based on the theory...
Adopt XBRL in Net Finance consultation criteria will provide major benefits in some aspects: the convenience and reliability of finance information search, transmission and exchange cross-platform financial information data, mining and tracing data. The network and associated infrastructure and a huge database system support are essential to achieve a net financial consultation supported by XBRL....
The Arlington Domestic Violence Information Collective (ADVIC) is a domestic violence (DV) data mart for the government of Arlington County, VA, combining law enforcement, court and human services databases into a single data repository. The goal of ADVIC in connecting these disparate data sources is to provide the ability to view and analyze DV victim and offender data across agencies, in addition...
Today, role-based access control (RBAC) has become a well-accepted paradigm for implementing access control because of its convenience and ease of administration. However, in order to realize the full benefits of the RBAC paradigm, one must first define the roles accurately. This task of defining roles and associating permissions with them, also known as role engineering, is typically accomplished...
Two parties that conduct a business transaction through the internet do not see each other face-to-face nor do they exchange any document or currency hand-to-hand. Electronic payment is a way by which the two parties transfer the money through internet. Offering electronic payment can also help businesses improve and customer retention. When electronic money is transferred from a buyer to a seller...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.