Showing 1 - 20 results of 65 for search 'Business Insider', query time: 0.12s Refine Results
  1. 1

    Business process mining based insider threat detection system by Tai-ming ZHU, Yuan-bo GUO, An-kang JU, Jun MA

    Published 2016-10-01
    “…Current intrusion detection systems are mostly for detecting external attacks,but sometimes the internal staff may bring greater harm to organizations in information security.Traditional insider threat detection methods of-ten do not combine the behavior of people with business activities,making the threat detection rate to be improved.An insider threat detection system based on business process mining from two aspects was proposed,the implementation of insider threats and the impact of threats on system services.Firstly,the normal control flow model of business ac-tivities and the normal behavior profile of each operator were established by mining the training log.Then,the actual behavior of the operators was compared with the pre-established normal behavior contours during the operation of the system,which was supplemented by control flow anomaly detection and performance anomaly detection of business processes,in order to discover insider threats.A variety of anomalies were defined and the corresponding detection algorithms were given.Experiments were performed on the ProM platform.The results show the designed system is effective.…”
    Get full text
    Article
  2. 2

    Business or Security? Goals and Decision-Making Inside the French Oil Policy of the 1920s by I. E. Magadeev

    Published 2022-03-01
    “…First, to diversify the supplies; second, to acquire control or direct access to the oil sources; and, finally, to consolidate the French business interests with the mediation of the state authorities. …”
    Get full text
    Article
  3. 3

    Strategy implementation in private equity funded companies by Anders Henriksson

    Published 2023-10-01
    Subjects: “…business performance; strategy implementation; private equity; strategy as practice; insider action research…”
    Get full text
    Article
  4. 4

    Study on user behavior profiling in insider threat detection by Yuanbo GUO, Chunhui LIU, Jing KONG, Yifeng WANG

    Published 2018-12-01
    “…With the better performance, it can be used in detecting insider threats.…”
    Get full text
    Article
  5. 5

    Inside trade system development in Lithuanian province in 1861-1914 by Aelita Ambrulevičiūtė

    Published 2009-12-01
    “…Increasingly, peasants and townspeople were involved in the trade business. Simultaneously, the web of domestic trade increased—the number of markets, marts, and dolly-shops. …”
    Get full text
    Article
  6. 6
  7. 7

    Modern features of organization’s management system in Germany on the example of BASF LLC by V. I. Ivanova, D. D. Mishchenko

    Published 2023-09-01
    “…Insider model of company organization and German company BASF were chosen for the study. …”
    Get full text
    Article
  8. 8
  9. 9
  10. 10

    A method of SQL access logs pretreatment for power business system by Weiwei LI, Tao ZHANG, Yuanyuan MA, Cheng ZHOU

    Published 2015-12-01
    “…With the development of smart grid interactive,the database interaction between the information inside and outside is increasing.A method of SQL access log compression for power business system to respond to the demand of database security audit for the power system was designed in detail.This method can realize the compression of SQL access log and have the function of simple classification for SQL logs.The test results show that the method can achieve a large margin compression of SQL access logs and meet the requirements of log preprocessing for the database behavior audit of power business system.…”
    Get full text
    Article
  11. 11

    20 Years of Scientific Study on Business Intelligence and Decision-Making Performance: A Bibliometric Analysis by Abdessamad Charkaoui, Siham Jabraoui

    Published 2024-10-01
    “…Background: Business intelligence (BI) is an area in which data analytics is applied to generate crucial information supporting business decision-making and has been a significant domain for over three decades. …”
    Get full text
    Article
  12. 12

    Game-theoretic analysis of the impact of differential leadership on employee silence behavior in Chinese family enterprises by Jie Lu, Ting Yang, Yi Qin, Xinting Hu

    Published 2025-01-01
    “…From a micro perspective, this study offers a new direction for Chinese family businesses to alleviate employee silence behavior and successfully achieve transformation.…”
    Get full text
    Article
  13. 13

    The Bioethics-CSR Divide by Caio Caesar Dib

    Published 2024-03-01
    “…However, the interaction between these two fields (as well as business and human rights) is fairly recent both in academic and business settings. …”
    Get full text
    Article
  14. 14

    The Mechanism of Non-Financial Firms’ Performance and Corporate Governance Leadership by Huda Alsayed

    Published 2024-10-01
    “…The results indicate that insider ownership and board size significantly influence return on assets. …”
    Get full text
    Article
  15. 15

    Managing a firm in the face of change by I. D. Matskulyak, V. D. Kuligin, D. I. Matskulyak

    Published 2021-04-01
    “…The company management itself is represented not only inside of it, but also outside, as the continuation and generation of a functioning market, market system. …”
    Get full text
    Article
  16. 16
  17. 17

    Analysis of Attributes and Dimensions of the Built Environment Quality from the Perspective of Employees from Furniture Companies by Gabriel Sperandio Milan, Marcelo Benetti Correa da Silva, Suélen Bebber

    Published 2015-01-01
    “…The analysis of the attributes and dimensions of the built environment quality (workspace) of companies is relevant, because it is associated to the expectations and perceptions of their employees and re lated to its satisfaction, productivity and business performance. Thus a survey research was implemented in five furniture companies, located inside the Rio Grande do Sul state, focusing on identifying the dimensions of the quality of the built environments analyzed, and their respective attributes, using as a basis previous studies of the area. …”
    Get full text
    Article
  18. 18
  19. 19

    Analysis Determination of Firm Value: Corporate Governance Perception Index as Moderating Variable by Mardiyani Mardiyani, Sinta Lestari, Rian Febriansyah, Egi Arvian Firmansyah

    Published 2024-11-01
    “…Various elements influence the worth of a company inside the framework of a constantly changing worldwide market. …”
    Get full text
    Article
  20. 20

    Dynamic and semantic-aware access-control model for privacy preservation in multiple data center environments by Aiguo Chen, Guoming Lu, Hanwen Xing, Yuan Xie, Shunwei Yuan

    Published 2020-05-01
    “…However, insider threats pose very significant privacy and security risks to systems. …”
    Get full text
    Article