Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Browse by topic Browse by titles Authors Reviewers Browse by issue Browse Help
Search
  Browse All Reviews > Computing Milieux (K) > Computers And Society (K.4) > Electronic Commerce (K.4.4) > Security (K.4.4...)  
 
Options:
 
  1-10 of 22 Reviews about "Security (K.4.4...)": Date Reviewed
  Managing cyber risk in the financial sector: lessons from Asia, Europe and the USA
Taplin R., Routledge, New York, NY, 2017. 194 pp.  Type: Book (978-1-138477-17-9)

I would classify this book as a buffet of articles, studies, research, and references spanning the spectrum of cyber risk domains across various economies around the world. Just like a buffet, there is a lot of very valuable informatio...

Jun 7 2019
  Semantics-based analysis of content security policy deployment
Calzavara S., Rabitti A., Bugliesi M. ACM Transactions on the Web 12(2): 1-36, 2018.  Type: Article

Security is one of the biggest concerns in digital societies. Without reasonable levels of security, people will never really embrace the use of technology for tasks that they consider sensitive or risky. Only with a reasonable guarant...

Jul 11 2018
  Facilitating a battle between hackers: computer security outside of the classroom
Backman N.  SIGCSE 2016 (Proceedings of the 47th ACM Technical Symposium on Computing Science Education, Memphis, TN, Mar 2-5, 2016) 603-608, 2016.  Type: Proceedings

Backman describes an attack/defend security contest for inexperienced undergraduates. The contest uses capture the flag, where an attacking team exploits vulnerabilities to acquire sensitive data, “the flag.” The de...

Mar 29 2016
  Effective detection of sophisticated online banking fraud on extremely imbalanced data
Wei W., Li J., Cao L., Ou Y., Chen J. World Wide Web 16(4): 449-475, 2013.  Type: Article

The novel algorithm proposed in this academic paper aims to facilitate the online detection of banking fraud. While it is not a silver bullet, it does promise to be a useful tool. The paper is recommended reading for professionals invo...

Nov 5 2013
  Hands-on ethical hacking and network defense
Simpson M., Backman K., Corley J., Course Technology Press, Boston, MA, 2013. 464 pp.  Type: Book (978-1-133935-61-2)

Network security is of great interest to students, researchers, and government officials, and of course to people who want to extract information for pleasure or money. Hacking is a means to exploit holes in software via inspection, br...

Jul 12 2013
  Transaction aggregation as a strategy for credit card fraud detection
Whitrow C., Hand D., Juszczak P., Weston D., Adams N. Data Mining and Knowledge Discovery 18(1): 30-55, 2009.  Type: Article

Whitrow et al. investigate the important problem of detecting fraudulent credit card transactions. A traditional approach to detecting a fraudulent transaction is based on a transaction-level classification. Another method is to consid...

Nov 5 2009
  A framework for detection and measurement of phishing attacks
Garera S., Provos N., Chew M., Rubin A.  Recurring malcode (Proceedings of the 2007 ACM Workshop on Recurring Malcode, Alexandria, Virginia, Nov 2, 2007) 1-8, 2007.  Type: Proceedings

Several features are identified that can be used to distinguish a phishing uniform resource locator (URL). High accuracy (97.31 percent) is achieved by a logistic regression filter based on these features. An advantage of feature-based...

Jan 3 2008
  How to obtain full privacy in auctions
Brandt F. International Journal of Information Security 5(4): 201-216, 2006.  Type: Article

The author proposes an interesting general technique for granting privacy in auctions: the protocol yields only the winner(s) and the final price, and only to the winners themselves. The author develops the algorithm for (M
Nov 15 2007
  Improving customer retention in e-commerce through a secure and privacy-enhanced loyalty system
Enzmann M., Schneider M. Information Systems Frontiers 7(4-5): 359-370, 2005.  Type: Article

Almost 30 percent of adults in the United States are reported to hold a loyalty card. The use of such cards is growing worldwide. There are two main incentives for businesses to encourage the use of loyalty cards: retaining customers a...

Oct 18 2006
  Impacts and risk assessment of technology for Internet security: enabled information small-medium enterprises (Advances in Information Security)
Shoniregun C., Springer-Verlag New York, Inc., Secaucus, NJ, 2005. 196 pp.  Type: Book (9780387243436)

This book has the organization and feel of an extended research paper. It discusses the impacts of technology on small-to-medium enterprises, and the need for a risk assessment model. It is challenging to identify an audience for the b...

Feb 6 2006
 
 
 
Display per page
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy