Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Business interruption (1)
- CID (1)
- Cyberinsurance (1)
- DDOS (1)
- Decision (1)
-
- Economics of cybersecurity (1)
- Emotional sentiment (1)
- Governance (1)
- Human-machine intelligence (1)
- Information theory (1)
- Intrusion detection capability (1)
- Intrusion detection system (1)
- Mobile payment (1)
- Natural languages processing (NPL) (1)
- Ontology (1)
- Risk quantification (1)
- SEVQUAL (1)
- SIDES (1)
- Security (1)
- Security risk tolerance (1)
- Sentiment analysis (1)
- Service quality (1)
- Social media (1)
- Software intrusion detection evaluation system (1)
- Systems engineering (1)
- Taxonomy (1)
- Trade off (1)
- Publication
- Publication Type
Articles 1 - 5 of 5
Full-Text Articles in Business
Security Risk Tolerance In Mobile Payment: A Trade-Off Framework, Yong Chen
Security Risk Tolerance In Mobile Payment: A Trade-Off Framework, Yong Chen
Information Technology & Decision Sciences Theses & Dissertations
Security is identified as a major barrier for consumers in adopting mobile payment. Although existing literature has incorporated security into the Technology Acceptance Model (TAM), the Unified Theory of Acceptance, and the Use of Technology (UTAUT) and it has investigated the way in which security affects consumers’ acceptance of mobile payment, security is a factor only in diverse research models. Studies of mobile payment that focus on security are not available. Additionally, previous studies of mobile payment are based on Direct Carrier Billing- (DCB)-based mobile payment or Near Field Communication- (NFC)-based mobile payment. The results regarding security might not be …
Effectiveness Of Social Media Analytics On Detecting Service Quality Metrics In The U.S. Airline Industry, Xin Tian
Information Technology & Decision Sciences Theses & Dissertations
During the past few decades, social media has provided a number of online tools that allow people to discuss anything freely, with an increase in mobile connectivity. More and more consumers are sharing their opinions online with others. Electronic Word of Mouth (eWOM) is the virtual communication in use; it plays an important role in customers’ buying decisions. Customers can choose to complain or to compliment services or products on their social media platforms, rather than to complete the survey offered by the providers of those services. Compared with the traditional survey, or with the air travel customer report published …
Economics-Based Risk Management Of Distributed Denial Of Service Attacks: A Distance Learning Case Study, Omer Keskin, Unal Tatar, Omer Poyraz, Ariel Pinto, Adrian Gheorghe
Economics-Based Risk Management Of Distributed Denial Of Service Attacks: A Distance Learning Case Study, Omer Keskin, Unal Tatar, Omer Poyraz, Ariel Pinto, Adrian Gheorghe
Engineering Management & Systems Engineering Faculty Publications
Managing risk of cyber systems is still on the top of the agendas of Chief Information Security Officers (CISO). Investment in cybersecurity is continuously rising. Efficiency and effectiveness of cybersecurity investments are under scrutiny by boards of the companies. The primary method of decision making on cybersecurity adopts a risk-informed approach. Qualitative methods bring a notion of risk. However, particularly for strategic level decisions, more quantitative methods that can calculate the risk and impact in monetary values are required. In this study, a model is built to calculate the economic value of business interruption during a Distributed Denial-of-Service (DDoS) attack …
Software Intrusion Detection Evaluation System: A Cost-Based Evaluation Of Intrusion Detection Capability, Agbotiname L. Imoize, Taiwo Oyedare, Michael E. Otuokere, Sachin Shetty
Software Intrusion Detection Evaluation System: A Cost-Based Evaluation Of Intrusion Detection Capability, Agbotiname L. Imoize, Taiwo Oyedare, Michael E. Otuokere, Sachin Shetty
VMASC Publications
In this paper, we consider a cost-based extension of intrusion detection capability (CID). An objective metric motivated by information theory is presented and based on this formulation; a package for computing the intrusion detection capability of intrusion detection system (IDS), given certain input parameters is developed using Java. In order to determine the expected cost at each IDS operating point, the decision tree method of analysis is employed, and plots of expected cost and intrusion detection capability against false positive rate were generated. The point of intersection between the maximum intrusion detection capability and the expected cost is selected as …
Human-Intelligence And Machine-Intelligence Decision Governance Formal Ontology, Faisal Mahmud
Human-Intelligence And Machine-Intelligence Decision Governance Formal Ontology, Faisal Mahmud
Engineering Management & Systems Engineering Theses & Dissertations
Since the beginning of the human race, decision making and rational thinking played a pivotal role for mankind to either exist and succeed or fail and become extinct. Self-awareness, cognitive thinking, creativity, and emotional magnitude allowed us to advance civilization and to take further steps toward achieving previously unreachable goals. From the invention of wheels to rockets and telegraph to satellite, all technological ventures went through many upgrades and updates. Recently, increasing computer CPU power and memory capacity contributed to smarter and faster computing appliances that, in turn, have accelerated the integration into and use of artificial intelligence (AI) in …