Data Mining Usage in Corporate Information Security: Intrusion Detection Applications
Author
Abstract
Suggested Citation
DOI: 10.1515/bsrj-2017-0005
Download full text from publisher
References listed on IDEAS
- Stoel, M. Dale & Muhanna, Waleed A., 2011. "IT internal control weaknesses and firm performance: An organizational liability lens," International Journal of Accounting Information Systems, Elsevier, vol. 12(4), pages 280-304.
- Willison , Robert, 2006. "Understanding the Perpetration of Employee Computer Crime in the Organisational Context," Working Papers 2006-4, Copenhagen Business School, Department of Informatics.
- B Baesens & C Mues & D Martens & J Vanthienen, 2009. "50 years of data mining and OR: upcoming trends and challenges," Journal of the Operational Research Society, Palgrave Macmillan;The OR Society, vol. 60(1), pages 16-23, May.
Citations
Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
Cited by:
- Kenda Klemen & Mladenić Dunja, 2018. "Autonomous Sensor Data Cleaning in Stream Mining Setting," Business Systems Research, Sciendo, vol. 9(2), pages 69-79, July.
Most related items
These are the items that most often cite the same works as this one and are cited by the same works as this one.- Wu, Tung-Hsien & Huang, Shaio Yan & Chiu, An-An & Yen, David C., 2024. "IT governance and IT controls: Analysis from an internal auditing perspective," International Journal of Accounting Information Systems, Elsevier, vol. 52(C).
- Ali, Irfan, 2016. "The impact of ERP implementation on the financial performance of the firm : An empirical study," Other publications TiSEM 876506f5-1aed-4421-aa2c-0, Tilburg University, School of Economics and Management.
- Benaroch, Michel & Chernobai, Anna & Goldstein, James, 2012. "An internal control perspective on the market value consequences of IT operational risk events," International Journal of Accounting Information Systems, Elsevier, vol. 13(4), pages 357-381.
- Vlačić, Božidar & Corbo, Leonardo & Costa e Silva, Susana & Dabić, Marina, 2021. "The evolving role of artificial intelligence in marketing: A review and research agenda," Journal of Business Research, Elsevier, vol. 128(C), pages 187-203.
- Wei Yu & Huiqin Huang & Xinyan Kong & Keying Zhu, 2023. "Can Digital Inclusive Finance Improve the Financial Performance of SMEs?," Sustainability, MDPI, vol. 15(3), pages 1-16, January.
- Hyunjung Nam & Won Gyun No & Youngsu Lee, 2017. "Are Commercial Financial Databases Reliable? New Evidence from Korea," Sustainability, MDPI, vol. 9(8), pages 1-23, August.
- Wei Yu & Huiqin Huang & Keying Zhu, 2023. "Enhancing Construction Enterprise Financial Performance through Digital Inclusive Finance: An Insight into Supply Chain Finance," Sustainability, MDPI, vol. 15(13), pages 1-16, June.
- J. D’Haen & D. Van Den Poel, 2013. "Model-supported business-to-business prospect prediction based on an iterative customer acquisition framework," Working Papers of Faculty of Economics and Business Administration, Ghent University, Belgium 13/863, Ghent University, Faculty of Economics and Business Administration.
- Amitava Dutta & Rahul Roy, 2008. "Dynamics of organizational information security," System Dynamics Review, System Dynamics Society, vol. 24(3), pages 349-375, September.
- Mai Dao & Trung Pham & Hongkang Xu, 2022. "Internal control effectiveness and trade credit," Review of Quantitative Finance and Accounting, Springer, vol. 59(4), pages 1423-1452, November.
- Yasmin MOBASHER, 2022. "The Importance Of Implementing Integrated Information Systems In Hospitals," Business Excellence and Management, Faculty of Management, Academy of Economic Studies, Bucharest, Romania, vol. 12(5), pages 5-21, October.
- Martin-Barragan, Belen & Lillo, Rosa & Romo, Juan, 2014. "Interpretable support vector machines for functional data," European Journal of Operational Research, Elsevier, vol. 232(1), pages 146-155.
- Mengmeng Song & Joseph Ugrin & Man Li & Jinnan Wu & Shanshan Guo & Wenpei Zhang, 2021. "Do Deterrence Mechanisms Reduce Cyberloafing When It Is an Observed Workplace Norm? A Moderated Mediation Model," IJERPH, MDPI, vol. 18(13), pages 1-16, June.
- Dejaeger, Karel & Goethals, Frank & Giangreco, Antonio & Mola, Lapo & Baesens, Bart, 2012.
"Gaining insight into student satisfaction using comprehensible data mining techniques,"
European Journal of Operational Research, Elsevier, vol. 218(2), pages 548-562.
- Karel Dejaeger & Frank Goethals & Antonio Giangreco & Lapo Mola & Bart Baesens, 2012. "Gaining insight into student satisfaction using comprehensible data mining techniques," Post-Print halshs-01929190, HAL.
- K. Dejeager & F. Goethals & A. Giangreco & L. Mola & B. Baesens, 2012. "Gaining insight into student satisfaction using comprehensible data mining techniques," Post-Print hal-00787269, HAL.
- Chen, Zhen-Yu & Fan, Zhi-Ping & Sun, Minghe, 2019. "Individual-level social influence identification in social media: A learning-simulation coordinated method," European Journal of Operational Research, Elsevier, vol. 273(3), pages 1005-1015.
- Haislip, Jacob Z. & Masli, Adi & Richardson, Vernon J. & Watson, Marcia Weidenmier, 2015. "External reputational penalties for CEOs and CFOs following information technology material weaknesses," International Journal of Accounting Information Systems, Elsevier, vol. 17(C), pages 1-15.
- Daniel Gartner & Yiye Zhang & Rema Padman, 2018. "Cognitive workload reduction in hospital information systems," Health Care Management Science, Springer, vol. 21(2), pages 224-243, June.
- Sungchang Kang & Jeongseok Bang & Doojin Ryu, 2024. "Female CEOs’ risk management and earnings performance during the financial crisis," Asian Business & Management, Palgrave Macmillan, vol. 23(1), pages 110-138, February.
- Daniel Antony Kolkman & Paolo Campo & Tina Balke-Visser & Nigel Gilbert, 2016. "How to build models for government: criteria driving model acceptance in policymaking," Policy Sciences, Springer;Society of Policy Sciences, vol. 49(4), pages 489-504, December.
- Sangjae Lee & Seongil Jeon & ByungWon Lee, 2019. "Security Controls for Employees’ Satisfaction: Perspective of Controls Framework," SAGE Open, , vol. 9(2), pages 21582440198, May.
More about this item
Keywords
data mining; instruction; privacy; corporate information security;All these keywords.
Statistics
Access and download statisticsCorrections
All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:bit:bsrysr:v:8:y:2017:i:1:p:51-59:n:5. See general information about how to correct material in RePEc.
If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.
If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .
If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Peter Golla (email available below). General contact details of provider: https://www.sciendo.com .
Please note that corrections may take a couple of weeks to filter through the various RePEc services.