Open Access. Powered by Scholars. Published by Universities.®
- Institution
Articles 1 - 2 of 2
Full-Text Articles in Business
Cybersecurity Risk Assessment Using Graph Theoretical Anomaly Detection And Machine Learning, Goksel Kucukkaya
Cybersecurity Risk Assessment Using Graph Theoretical Anomaly Detection And Machine Learning, Goksel Kucukkaya
Engineering Management & Systems Engineering Theses & Dissertations
The cyber domain is a great business enabler providing many types of enterprises new opportunities such as scaling up services, obtaining customer insights, identifying end-user profiles, sharing data, and expanding to new communities. However, the cyber domain also comes with its own set of risks. Cybersecurity risk assessment helps enterprises explore these new opportunities and, at the same time, proportionately manage the risks by establishing cyber situational awareness and identifying potential consequences. Anomaly detection is a mechanism to enable situational awareness in the cyber domain. However, anomaly detection also requires one of the most extensive sets of data and features …
Return On Investment Of The Cftp Framework With And Without Risk Assessment, Anne Lim Lee
Return On Investment Of The Cftp Framework With And Without Risk Assessment, Anne Lim Lee
Walden Dissertations and Doctoral Studies
In recent years, numerous high tech companies have developed and used technology roadmaps when making their investment decisions. Jay Paap has proposed the Customer Focused Technology Planning (CFTP) framework to draw future technology roadmaps. However, the CFTP framework does not include risk assessment as a critical factor in decision making. The problem addressed in this quantitative study was that high tech companies are either losing money or getting a much smaller than expected return on investment when making technology investment decisions. The purpose of this research was to determine the relationship between returns on investment before and after adding risk …