The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
An approach to detection of phishing hyperlinks using the rule based system formed by genetic algorithm is proposed, which can be utilized as a part of an enterprise solution to anti-phishing. A legitimate webpage owner can use this approach to search the web for suspicious hyperlinks. In this approach, genetic algorithm is used to evolve rules that are used to differentiate phishing link from legitimate...
In recent years, many accounting scandals have been reported in companies not only in the United States, but also in Japan. The need for Internal Control is growing steadily. In particular, auditing logs are important for Internal Control. Any Internal Control without audits is incomplete. Furthermore, logs are necessary not only for defensive implications, but also as they contain much information...
This paper discusses the often overlooked issues and key vulnerabilities evident in Web facing technologies. The process of uncovering these issues and vulnerabilities is known as footprinting. We describe how organisations leak key information from their Web facing systems. Essentially the paper describes how individuals may target an organisation's Internet systems using general purpose tools and...
In today's digital business environment CRM (Customer relationship management) is an art of integrating People, Procedures and Technology to amplify the relationships in an organization with all sorts of customers and competitors in a way to maximize the share of them in the marketplace. CRM aims at transforming strategies, operational processes and business functions in order to retain customers...
Privacy and security are major concerns for partners in B2B and B2C applications. Service providers want on the one hand isolate their private process in order to protect their business logic and improve their privacy and on the other hand they have to expose (at least some parts of) their private process to other partners in order to enable communication, interaction and data exchange. Process Views...
This paper established a two-stage logic trust model for consumers with online shopping experience and without, and on this base, put forward the corresponding calculation formula and assessment method of trust degree, which provide reference and experience for the e-business companies to make correct decision and reasonably schedule their network marketing activities due to different stages of consumers.
Recent changes in the German energy sector forces energy companies to adopt their processes and IT-Systems. As a consequence intensive interaction is required amongst many different actors that now have to participate in intercompany business processes. One way to mitigate the issue of this additional information overload is the dedicated application of modern ICT systems. The Smart Architecture is...
Business policy reflects way too many things not only restricting what the company should do but also predicting the future direction of the company. It is desirable that the description of business policy can be interchangeable between business descriptions and engineering specifications so that the rules can be integrated into engineering process without further misinterpreting and conflicting....
This article presents implications of the research and conclusions regarding the understanding of the e-business practices amongst rural small and medium-sized enterprises. It showed the need for better support of rural small and medium-sized businesses in their transition towards modern enterprises competitive in the new era of information economy. The first section of the article summarizes the...
How to effectively prevent and to avoid security risks and promote the healthy development of the security business are the most important security issues facing the investment guarantee company. In this paper, fuzzy comprehensive evaluation method to create a credit guarantee risk assessment model, the risk of a security company for the quantitative analysis, so as to achieve the purpose of risk...
Companies and organizations are faced with quite a tough competition and increasing regulatory and legal constraints. Therefore, the use of security risk management is evolving and becoming more and more important in companies and organizations. We define engineering of security of information systems as a process whose aim is to guarantee the global security of information systems, in their eco-system...
This paper demonstrates the importance of a well-formulated and articulated information security policy. The relationship between business needs and information security and the conflict that often results between the two are discussed. The case also explores the complexities of balancing business expedience with long-term strategic technical architecture. This paper procedures in contemporary business...
In the middle of online business in China, the third-party payment has its unique characteristics, but it is difficult for the companies to make their advantages in competition with other parts of value chain. This paper suggests that the online payment platforms should improve their construction according to three different value chain layers, such as integrating security protocols with payment gateway...
Selecting, developing and deploying a document management system for engineering use involves the ability to follow an engineering revision process, integrate easily with engineering and corporate applications (custom or ldquoout of the boxrdquo), uniting disparate systems, and integrating existing business processes and applications.
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.