The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This exploratory study is intended to address the problem of fraudulent loan requests on peer-to-peer (P2P) platforms. We propose a set of features that capture the behavioral characteristics (e.g., learning, past performance, social networking, and herding manipulation) of malevolent borrowers, who intentionally create loan requests to acquire funds from lenders but default later on. We found that...
This article presents the U-Deal, a decentralized and multi-agent ubiquitous commerce model, that describes a peer-to-peer context aware system, with a distributed context history (trail) engine and a dynamic profile generator. The aim of the model is to provide an automatic deal opportunity recommendation, based on user profile, preferences and activities history in a peer-to-peer environment. In...
Most human centric business activities, like the handling of an insurance claim or the design of an IT solution, do not follow a formal process model word-by-word. While there are often underlying processes in place, the real business operation typically encompasses a wider scope of actions. It includes unstructured segments of human activities, additional documents and interactions, the integration...
Run-time adaptability is a key feature of dynamic business environments, where the processes need to be constantly refined and restructured to deal with exceptional situations and changing requirements. The execution of such a system results in a set of adapted process variants instantiated on the same process model but dynamically restructured to handle specific contexts. Process evolution exploits...
As business processes continue to gain relevance in different domains, dynamicity is becoming a great concern. Static processes no longer cover the actual needs of constantly changing environments, and process adaptation is a must in order to maintain competitive levels. While creating dynamically adaptable business processes can be a challenging task, undoing these adaptations is a natural functionality...
Convergence of data mining and process management is ideal - but still limited. An example of such a convergence is presented in the form of APE Framework that addresses the problem of static-agent-assignment-strategies in Workflow Management Systems (WfMS) - one cause of poor business process performance since all eligible agents may be assigned to a task instead of only assigning those which are...
Modern business goals are often fulfilled with workflows that may cross many organisations and utilise services on a variety of devices and/or supported by different platforms. Current workflows are inherently context-aware. Each context is governed and constrained by its own policies and rules to prevent unauthorised participants from executing sensitive tasks and also to prevent tasks from accessing...
Separation of duty (SoD) is a primary internal control in many businesses including information systems intended to prevent frauds and errors due to the conflict of interest. To enforce the separation of duty in the information systems, Role-Based Access Control (RBAC) has been proposed and been the most popular access control model in today's security management. This paper focuses on the Dynamic...
Data as a Service (DaaS) emerges as a new trend for exchanging data between independent data owners and data users so that data can be acquired on demand through standard protocols across heterogeneous platforms. It is usually a user-interactive and iterative process to compose the services into various data-driven business scenarios of data acquisition, analysis, and other processing activities....
Service-oriented architecture is a paradigm for modeling and enacting business processes that promotes improved flexibility and monitor ability through the composition of loosely-coupled Web services. However, such process-centric composition, with focus on invoking Web services to reach a stated goal, still does not provide the desired flexibility. Web services implementations are typically locked...
Passive RFID event refers to one kind of composite event in RFID middleware, one or more constituent sub-events of which do not occur under certain condition. Definition of passive RFID event requires careful consideration of temporal constraint and composition hierarchy, and moreover, the detection requires well-organized query plan for eventpsilas absence in runtime context. To process complex RFID...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.