Search
for Topics
All Reviews
Browse All Reviews
>
Computing Milieux (K)
>
Computers And Society (K.4)
>
Electronic Commerce (K.4.4)
> Security (K.4.4...)
Options:
All Media Types
Journals
Proceedings
Div Books
Whole Books
Other
Date Reviewed
Title
Author
Publisher
Published Date
Descending
Ascending
1-10 of 22 Reviews about "
Security (K.4.4...)
":
Date Reviewed
Managing cyber risk in the financial sector: lessons from Asia, Europe and the USA
Taplin R., Routledge, New York, NY, 2017. 194 pp. Type: Book (978-1-138477-17-9)
I would classify this book as a buffet of articles, studies, research, and references spanning the spectrum of cyber risk domains across various economies around the world. Just like a buffet, there is a lot of very valuable informatio...
Jun 7 2019
Semantics-based analysis of content security policy deployment
Calzavara S., Rabitti A., Bugliesi M. ACM Transactions on the Web 12(2): 1-36, 2018. Type: Article
Security is one of the biggest concerns in digital societies. Without reasonable levels of security, people will never really embrace the use of technology for tasks that they consider sensitive or risky. Only with a reasonable guarant...
Jul 11 2018
Facilitating a battle between hackers: computer security outside of the classroom
Backman N. SIGCSE 2016 (Proceedings of the 47th ACM Technical Symposium on Computing Science Education, Memphis, TN, Mar 2-5, 2016) 603-608, 2016. Type: Proceedings
Backman describes an attack/defend security contest for inexperienced undergraduates. The contest uses capture the flag, where an attacking team exploits vulnerabilities to acquire sensitive data, “the flag.” The de...
Mar 29 2016
Effective detection of sophisticated online banking fraud on extremely imbalanced data
Wei W., Li J., Cao L., Ou Y., Chen J. World Wide Web 16(4): 449-475, 2013. Type: Article
The novel algorithm proposed in this academic paper aims to facilitate the online detection of banking fraud. While it is not a silver bullet, it does promise to be a useful tool. The paper is recommended reading for professionals invo...
Nov 5 2013
Hands-on ethical hacking and network defense
Simpson M., Backman K., Corley J., Course Technology Press, Boston, MA, 2013. 464 pp. Type: Book (978-1-133935-61-2)
Network security is of great interest to students, researchers, and government officials, and of course to people who want to extract information for pleasure or money. Hacking is a means to exploit holes in software via inspection, br...
Jul 12 2013
Transaction aggregation as a strategy for credit card fraud detection
Whitrow C., Hand D., Juszczak P., Weston D., Adams N. Data Mining and Knowledge Discovery 18(1): 30-55, 2009. Type: Article
Whitrow et al. investigate the important problem of detecting fraudulent credit card transactions. A traditional approach to detecting a fraudulent transaction is based on a transaction-level classification. Another method is to consid...
Nov 5 2009
A framework for detection and measurement of phishing attacks
Garera S., Provos N., Chew M., Rubin A. Recurring malcode (Proceedings of the 2007 ACM Workshop on Recurring Malcode, Alexandria, Virginia, Nov 2, 2007) 1-8, 2007. Type: Proceedings
Several features are identified that can be used to distinguish a phishing uniform resource locator (URL). High accuracy (97.31 percent) is achieved by a logistic regression filter based on these features. An advantage of feature-based...
Jan 3 2008
How to obtain full privacy in auctions
Brandt F. International Journal of Information Security 5(4): 201-216, 2006. Type: Article
The author proposes an interesting general technique for granting privacy in auctions: the protocol yields only the winner(s) and the final price, and only to the winners themselves. The author develops the algorithm for (
M
Nov 15 2007
Improving customer retention in e-commerce through a secure and privacy-enhanced loyalty system
Enzmann M., Schneider M. Information Systems Frontiers 7(4-5): 359-370, 2005. Type: Article
Almost 30 percent of adults in the United States are reported to hold a loyalty card. The use of such cards is growing worldwide. There are two main incentives for businesses to encourage the use of loyalty cards: retaining customers a...
Oct 18 2006
Impacts and risk assessment of technology for Internet security: enabled information small-medium enterprises (Advances in Information Security)
Shoniregun C., Springer-Verlag New York, Inc., Secaucus, NJ, 2005. 196 pp. Type: Book (9780387243436)
This book has the organization and feel of an extended research paper. It discusses the impacts of technology on small-to-medium enterprises, and the need for a risk assessment model. It is challenging to identify an audience for the b...
Feb 6 2006
Display
5
10
15
25
50
100
per page
Reproduction in whole or in part without permission is prohibited. Copyright 1999-2024 ThinkLoud
®
Terms of Use
|
Privacy Policy