Sciweavers

95 search results - page 4 / 19
» Credit Card Forensics
Sort
View
COMCOM
2007
83views more  COMCOM 2007»
14 years 9 months ago
Improving authentication of remote card transactions with mobile personal trusted devices
Credit card transactions are a popular and diffused means of payment over the network. Unfortunately, current technology does not allow us to technically solve disputes that may ...
Andrea Bottoni, Gianluca Dini
89
Voted
ESWA
2007
176views more  ESWA 2007»
14 years 9 months ago
Credit scoring with a data mining approach based on support vector machines
The credit card industry has been growing rapidly recently, and thus huge numbers of consumers’ credit data are collected by the credit department of the bank. The credit scorin...
Cheng-Lung Huang, Mu-Chen Chen, Chieh-Jen Wang
ESOP
2008
Springer
14 years 11 months ago
Just Forget It - The Semantics and Enforcement of Information Erasure
Abstract. There are many settings in which sensitive information is made available to a system or organisation for a specific purpose, on the understanding that it will be erased o...
Sebastian Hunt, David Sands
BPSC
2009
190views Business» more  BPSC 2009»
14 years 10 months ago
Detective Information Flow Analysis for Business Processes
Abstract: We report on ongoing work towards a posteriori detection of illegal information flows for business processes, focusing on the challenges involved in doing so. Resembling ...
Rafael Accorsi, Claus Wonnemann
EOR
2007
92views more  EOR 2007»
14 years 9 months ago
Modelling profitability using survival combination scores
The paper presents the first empirical investigation of the relationship between present value of net revenue from a revolving credit account and times to default and to second pu...
Galina Andreeva, Jake Ansell, Jonathan Crook