Effective security management depends upon good risk management, which is itself based upon a reliable risk assessment, involving data collection of all the facets influencing sys...
Peer-to-peer (P2P) systems are based upon the cooperative interactions of member peers. Typically, peers are both autonomous and self-interested, meaning that there is no hierarch...
The integration of supply chains offers many benefits; yet, it may also render organisations more vulnerable to electronic fraud (e-fraud). E-fraud can drain on organisations'...
We present a quantitative approach for IT portfolio management. This is an approach that CMM level 1 organizations can use to obtain a corporate wide impression of the state of th...
This paper presents an application of association rule mining in compliance in the context of health service management. There are approximately 500 million transactions processed...
Yin Shan, David Jeacocke, D. Wayne Murray, Alison ...