Data Mining Usage in Corporate Information Security: Intrusion Detection Applications
Author
Abstract
Suggested Citation
DOI: 10.1515/bsrj-2017-0005
Download full text from publisher
References listed on IDEAS
- Stoel, M. Dale & Muhanna, Waleed A., 2011. "IT internal control weaknesses and firm performance: An organizational liability lens," International Journal of Accounting Information Systems, Elsevier, vol. 12(4), pages 280-304.
- Willison , Robert, 2006. "Understanding the Perpetration of Employee Computer Crime in the Organisational Context," Working Papers 2006-4, Copenhagen Business School, Department of Informatics.
- B Baesens & C Mues & D Martens & J Vanthienen, 2009. "50 years of data mining and OR: upcoming trends and challenges," Journal of the Operational Research Society, Palgrave Macmillan;The OR Society, vol. 60(1), pages 16-23, May.
Citations
Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
Cited by:
- Kenda Klemen & Mladenić Dunja, 2018. "Autonomous Sensor Data Cleaning in Stream Mining Setting," Business Systems Research, Sciendo, vol. 9(2), pages 69-79, July.
Most related items
These are the items that most often cite the same works as this one and are cited by the same works as this one.- Wei Yu & Huiqin Huang & Xinyan Kong & Keying Zhu, 2023. "Can Digital Inclusive Finance Improve the Financial Performance of SMEs?," Sustainability, MDPI, vol. 15(3), pages 1-16, January.
- Hyunjung Nam & Won Gyun No & Youngsu Lee, 2017. "Are Commercial Financial Databases Reliable? New Evidence from Korea," Sustainability, MDPI, vol. 9(8), pages 1-23, August.
- Amitava Dutta & Rahul Roy, 2008. "Dynamics of organizational information security," System Dynamics Review, System Dynamics Society, vol. 24(3), pages 349-375, September.
- Mengmeng Song & Joseph Ugrin & Man Li & Jinnan Wu & Shanshan Guo & Wenpei Zhang, 2021. "Do Deterrence Mechanisms Reduce Cyberloafing When It Is an Observed Workplace Norm? A Moderated Mediation Model," IJERPH, MDPI, vol. 18(13), pages 1-16, June.
- Dejaeger, Karel & Goethals, Frank & Giangreco, Antonio & Mola, Lapo & Baesens, Bart, 2012.
"Gaining insight into student satisfaction using comprehensible data mining techniques,"
European Journal of Operational Research, Elsevier, vol. 218(2), pages 548-562.
- K. Dejeager & F. Goethals & A. Giangreco & L. Mola & B. Baesens, 2012. "Gaining insight into student satisfaction using comprehensible data mining techniques," Post-Print hal-00787269, HAL.
- Karel Dejaeger & Frank Goethals & Antonio Giangreco & Lapo Mola & Bart Baesens, 2012. "Gaining insight into student satisfaction using comprehensible data mining techniques," Post-Print halshs-01929190, HAL.
- Daniel Gartner & Yiye Zhang & Rema Padman, 2018. "Cognitive workload reduction in hospital information systems," Health Care Management Science, Springer, vol. 21(2), pages 224-243, June.
- Sungchang Kang & Jeongseok Bang & Doojin Ryu, 2024. "Female CEOs’ risk management and earnings performance during the financial crisis," Asian Business & Management, Palgrave Macmillan, vol. 23(1), pages 110-138, February.
- Feng, Yuan & Mao, Yihuan & Cai, Jing & Xu, Nan, 2024. "Can board IT expertise improve corporate internal control?," Finance Research Letters, Elsevier, vol. 62(PA).
- J. D’Haen & D. Van Den Poel & D. Thorleuchter, 2012. "Predicting Customer Profitability During Acquisition: Finding the Optimal Combination of Data Source and Data Mining Technique," Working Papers of Faculty of Economics and Business Administration, Ghent University, Belgium 12/818, Ghent University, Faculty of Economics and Business Administration.
- Saridakis, Charalampos & Katsikeas, Constantine S. & Angelidou, Sofia & Oikonomidou, Maria & Pratikakis, Polyvios, 2023. "Mining Twitter lists to extract brand-related associative information for celebrity endorsement," European Journal of Operational Research, Elsevier, vol. 311(1), pages 316-332.
- Park, Sangchul, 2019. "Why information security law has been ineffective in addressing security vulnerabilities: Evidence from California data breach notifications and relevant court and government records," International Review of Law and Economics, Elsevier, vol. 58(C), pages 132-145.
- Mounia Boulhaga & Abdelfettah Bouri & Ahmed A. Elamer & Bassam A. Ibrahim, 2023. "Environmental, social and governance ratings and firm performance: The moderating role of internal control quality," Corporate Social Responsibility and Environmental Management, John Wiley & Sons, vol. 30(1), pages 134-145, January.
- Li, Zhe & Wang, Bo & Wu, Tianlong & Zhou, Dan, 2021. "The influence of qualified foreign institutional investors on internal control quality: Evidence from China," International Review of Financial Analysis, Elsevier, vol. 78(C).
- Choi, Dongjoon & Lee, Hansol & Lee, Ho-Young & Park, Hyun-Young, 2021. "The association between human resource investment in IT controls over financial reporting and investment efficiency," International Journal of Accounting Information Systems, Elsevier, vol. 43(C).
- Wang, Soyoung, 2021. "How will users respond to the adversarial noise that prevents the generation of deepfakes?," 23rd ITS Biennial Conference, Online Conference / Gothenburg 2021. Digital societies and industrial transformations: Policies, markets, and technologies in a post-Covid world 238060, International Telecommunications Society (ITS).
- Qian Tang & Andrew B. Whinston, 2020. "Do Reputational Sanctions Deter Negligence in Information Security Management? A Field Quasi‐Experiment," Production and Operations Management, Production and Operations Management Society, vol. 29(2), pages 410-427, February.
- Wu, Tung-Hsien & Huang, Shaio Yan & Chiu, An-An & Yen, David C., 2024. "IT governance and IT controls: Analysis from an internal auditing perspective," International Journal of Accounting Information Systems, Elsevier, vol. 52(C).
- Ali, Irfan, 2016. "The impact of ERP implementation on the financial performance of the firm : An empirical study," Other publications TiSEM 876506f5-1aed-4421-aa2c-0, Tilburg University, School of Economics and Management.
- Benaroch, Michel & Chernobai, Anna & Goldstein, James, 2012. "An internal control perspective on the market value consequences of IT operational risk events," International Journal of Accounting Information Systems, Elsevier, vol. 13(4), pages 357-381.
- Vlačić, Božidar & Corbo, Leonardo & Costa e Silva, Susana & Dabić, Marina, 2021. "The evolving role of artificial intelligence in marketing: A review and research agenda," Journal of Business Research, Elsevier, vol. 128(C), pages 187-203.
More about this item
Keywords
data mining; instruction; privacy; corporate information security;All these keywords.
Statistics
Access and download statisticsCorrections
All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:bit:bsrysr:v:8:y:2017:i:1:p:51-59:n:5. See general information about how to correct material in RePEc.
If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.
If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .
If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Peter Golla (email available below). General contact details of provider: https://www.sciendo.com .
Please note that corrections may take a couple of weeks to filter through the various RePEc services.