Enterprise risk and security management: Data, text and Web mining
نویسندگان
چکیده
The Internet, Web 2.0, consumer-generated social media, and new advanced data, text, and Web mining techniques have created tremendous business opportunities. However, the potential risk and security concerns are also equally alarming. Research of relevance to enterprise risk and security assessment and analysis has gained significant interests among MIS, CS, and business researchers. Through large-scale Web enabled content collection (e.g., corporate reports, news, consumer feedback, corporate blogs and forums, and brand sentiment) and advanced mining techniques, companies and industries will be better positioned to identify potential risks and security concerns. This special issue aimed at archiving a collection of research papers of practical and novel applications, techniques, algorithms, methods, and practices in data, text, and Web mining that will make a contribution to knowledge in enterprise risk and security management. We received 33 submissions and each paper was reviewed by two to three experts in the area. After two rounds of review, 11 highquality papers were accepted. These papers report on latest research relevant to enterprise risk and security management. The first four papers of the special issue investigated the effects of news coverage and announcements, such as those on information security investment and phishing attacks, on a company's stock price and volatility. Chai, Kim, and Rao found substantial support for their hypotheses based on the public announcements of information security investment over a 10 year period from 1997 to 2006. Despite the fact that investments in data and information security are unavoidable expenses for firms, it is difficult to measure the direct return from IT security investments. This study selected the event methodology to investigate whether information security investment announcements would affect the stock price in the market. Due to the fact that phishing attack causes financial loss and shatters the confidence of customers in conducting e-commerce, Chen, Bose, Leung and Guo adopted a hybrid approach that used text phrase extraction and supervised classification to predict the severity of a phishing attack according to its risk level or financial loss generating potential. Results indicated that the classification accuracy of the hybrid approach was quite superior, and demonstrated that the key identifying variables for risk level and potential financial loss of phishing attacks were different from each other. The usefulness of accounting numbers has been an important issue for accounting researchers and general investors. However, other information sources such as financial news may also contain useful information. Chen and his colleagues investigate how financial news impacts the return-earnings relation. The news articles in the Wall Street Journal from August 1999 through February 2007 were used to construct measures for news coverage on S&P 500 companies. This study highlighted the importance of financial news in conveying value-related information to the markets.
منابع مشابه
Identifying SOA Security Threats using Web Mining
The Service Oriented Architecture (SOA) became a dominant paradigm for enterprise computing. The web services are the implementation of SOA that works for heterogeneous platforms as they use common Internet protocols for communication and simple text format such as XML for data representation. The basic SOA architecture does not contain any security solution within it and the security is applie...
متن کاملNetwork Risk Evaluation by Data Mining
Risk management is one of the most prominent concepts which has recently been brought into sharp focus regarding security issues in computer networks. Scientifically speaking, risk in the field of network security is a generalized matter leading the organization to the provision of resolutions which target resources and profits of the organization. This paper has discussed what methods are ...
متن کاملPrediction of user's trustworthiness in web-based social networks via text mining
In Social networks, users need a proper estimation of trust in others to be able to initialize reliable relationships. Some trust evaluation mechanisms have been offered, which use direct ratings to calculate or propagate trust values. However, in some web-based social networks where users only have binary relationships, there is no direct rating available. Therefore, a new method is required t...
متن کاملDesigning a System for Trend Analysis of Users in Website Surfing in Iran Using Data Mining and Text Mining Algorithms
Background and Aim: As of the entrance of web surfing to the lifestyle of a vast majority of people in the society and the need for a more accurate social and cultural policy making in the field, authors intended to analyze the behavior of the society users in viewing different websites so as to help politicians and practitioners. Methods: Design science research method is used in this research...
متن کاملBusiness and Market Intelligence 2.0
to the “skills, technologies, applications, and practices used to support decision making” (http:// en.wikipedia.org/wiki/Business_intelligence). On the basis of a survey of 1,400 CEOs, the Gartner Group projected BI revenue to reach $3 billion in 2009.1 Through BI initiatives, businesses are gaining insights from the growing volumes of transaction, product, inventory, customer, competitor, and...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- Decision Support Systems
دوره 50 شماره
صفحات -
تاریخ انتشار 2011