EconBiz - Find Economic Literature
    • Logout
    • Change account settings
  • A-Z
  • Beta
  • About EconBiz
  • News
  • Thesaurus (STW)
  • Research Skills
  • Help
  •  My account 
    • Logout
    • Change account settings
  • Login
EconBiz - Find Economic Literature
Publications Events
Search options
Advanced Search history
My EconBiz
Favorites Loans Reservations Fines
    You are here:
  • Home
  • Search: subject_exact:"Access control"
Narrow search

Narrow search

Year of publication
Subject
All
User access control 95 Zutrittskontrolle 95 Data security 50 Datensicherheit 50 Access Control 16 IT crime 16 IT-Kriminalität 16 Access control 15 Biometrics 15 Biometrie 14 Theorie 13 Theory 13 Zugriffskontrolle 13 Datenschutz 12 Data protection 10 United States 10 E-Business 9 E-business 9 Internet 9 USA 9 access control 9 Betriebliches Informationssystem 8 Computer network 7 Computernetz 7 Deutschland 7 Electronic Banking 7 Electronic banking 7 Germany 7 Information management 6 Informationsmanagement 6 Authentifikation 5 Computersicherheit 5 Database 5 Identitätsverwaltung 5 Privacy 5 RBAC 5 Business intelligence system 4 Cloud Computing 4 Datenbank 4 Datensicherung 4
more ... less ...
Online availability
All
Undetermined 25 Free 18
Type of publication
All
Article 107 Book / Working Paper 32 Other 6
Type of publication (narrower categories)
All
Article in journal 49 Aufsatz in Zeitschrift 49 Aufsatz im Buch 42 Book section 42 Hochschulschrift 8 Thesis 8 Graue Literatur 6 Non-commercial literature 6 Arbeitspapier 5 Working Paper 5 Case study 3 Congress Report 3 Fallstudie 3 Collection of articles of several authors 2 Dissertation u.a. Prüfungsschriften 2 Sammelwerk 2 Aufsatzsammlung 1 Bibliographie 1 Conference paper 1 Conference proceedings 1 Forschungsbericht 1 Konferenzbeitrag 1 Konferenzschrift 1
more ... less ...
Language
All
English 108 German 24 Undetermined 13
Author
All
Bertino, Elisa 6 Hatzinakos, Dimitrios 3 Mohammadian, Masoud 3 Wang, Hua 3 Dawson, Edward 2 Eckert, Claudia 2 Fuchs, Ludwig 2 Kedjar, Saadia 2 Li, Ninghui 2 Li, Yan 2 Lin, Dan 2 Rao, Prathima 2 Roberds, William 2 Schreft, Stacey L. 2 Sowa, Aleksandra 2 Stepien, Bernard 2 Sun, Lili 2 Tari, Abdelkamel 2 Abbasi, Hasan 1 Abdullah, Matin Saad 1 Abrishami, Saied 1 Adi, Kamel 1 Adl, Rosa Karimi 1 Agbara, Nathan 1 Ahmed, Waseem 1 Akar, Gulsah 1 Al-Harby, Fahad 1 Alfaro, Luis Alfredo 1 Amine, Abdelmalek 1 Ansari, Zahid A. 1 Antonakopoulou, Anna 1 Arshad, Junaid 1 Asim, Yousra 1 Badar, Nazia 1 Bagchi, Aditya 1 Baldimtsi, F. 1 Bansal, Nitin 1 Bar-Josef, Noa 1 Barker, Ken 1 Bartmann, Dieter 1
more ... less ...
Institution
All
ICETE <4, 2007, Barcelona> 1 Verlag Dr. Kovač 1
Published in...
All
E-business and telecommunications : 4th international conference ; revised selected papers 10 E-technologies: innovation in an open world : 4th international conference, MCETECH 2009, Ottawa, Canada, May 4-6, 2009 ; proceedings 3 HMD : Praxis der Wirtschaftsinformatik 3 Information diffusion management and knowledge sharing ; volume 1 3 Information systems : crossroads for organization, management, accounting and engineering : ItAIS: the Italian Association for Information Systems 3 Journal of organizational computing and electronic commerce 3 Berichte aus der Wirtschaftsinformatik 2 Decision support systems : DSS ; the international journal 2 Digital identity management : perspectives on the technological, business and social implications 2 Discussion paper series / IZA 2 E-technologies: transformation in a connected world : 5th international conference, MCETECH 2011, Les Diablerets, Switzerland, January 23 - 26, 2011 ; revised selected papers 2 International Journal of Electronic Finance 2 International Journal of Information Security and Privacy (IJISP) 2 International journal of business information systems : IJBIS 2 Journal of air transport management 2 Journal of internet commerce 2 Journal of payments strategy & systems 2 Web 2.0 und soziale Netzwerke - Risiko oder strategische Chance? : Handlungsoptionen für die Zukunftsperspektive von Kreditinstituten 2 Wissen - Märkte - Geistiges Eigentum 2 Advances in multimedia and interactive technologies 1 Banking and information technology / Deutsche Ausgabe : BIT ; a strategic report for top management 1 Business & Information Systems Engineering 1 Business analytics and cyber security management in organizations 1 Business intelligence : methods and applications ; essays in honor of Prof. Dr. Hans-J. Lenz 1 Communications in computer and information science 1 Contemporary economic policy : a journal of Western Economic Association International 1 De Gruyter Oldenbourg Studium 1 Diskussionsbeiträge / Wissenschaftliches Institut für Infrastruktur und Kommunikationsdienste 1 Diskussionsbeiträge zu Wirtschaftsinformatik und Operations Research 1 ERP-Management : Zeitschrift für unternehmensweite Anwendungssysteme 1 Edition <kes> 1 Electronic markets : the international journal on networked business 1 Emerging methods in predictive analytics : risk management and decision-making 1 Enterprise applications and services in the finance industry : 3. international workshop, FinanceCom 2007, Montreal, Canada, December 8, 2007 ; revised papers 1 European journal of operational research : EJOR 1 Finance India : the quarterly journal of Indian Institute of Finance 1 Finanzierung, Leasing, Factoring : FLF 1 Health care management science : a new journal serving the international health care management community 1 IEEE transactions on engineering management : EM 1 ITK-Kompendium ... : Expertenwissen, Trends und Lösungen in der Informations- und Kommunikationstechnologie 1
more ... less ...
Source
All
ECONIS (ZBW) 111 BASE 11 USB Cologne (EcoSocSci) 10 Other ZBW resources 9 RePEc 4
Showing 1 - 50 of 145
Cover Image
Image-Based Password Authentication System for an Online Banking Application
Agbara, Nathan - 2018
Authentication is the first line of defence against compromising confidentiality and integrity. Though traditional login/password based schemes are easy to implement, they have been subjected to several attacks. As alternative, token and biometric based authentication systems were introduced....
Persistent link: https://ebtypo.dmz1.zbw/10012922900
Saved in:
Cover Image
Awareness of password management and adoption of digital banking services in rural India
Bansal, Nitin - In: Finance India : the quarterly journal of Indian … 34 (2020) 2, pp. 861-874
Persistent link: https://ebtypo.dmz1.zbw/10012792311
Saved in:
Cover Image
Enabling attribute revocation for fine-grained access control in blockchain-IoT systems
Yu, Guangsheng; Zha, Xuan; Wang, Xu; Ni, Wei; Yu, Kan; … - In: IEEE transactions on engineering management : EM 67 (2020) 4, pp. 1213-1230
Persistent link: https://ebtypo.dmz1.zbw/10012387941
Saved in:
Cover Image
Access control and information flow control for web services security
Kedjar, Saadia; Tari, Abdelkamel - 2020
Persistent link: https://ebtypo.dmz1.zbw/10012169730
Saved in:
Cover Image
Analysis of healthcare workflows in accordance with access control policies
Lakaraju, Sandeep; Xu, Dianxiang; Wang, Yong - 2020
Persistent link: https://ebtypo.dmz1.zbw/10012169745
Saved in:
Cover Image
A survey on access control techniques for Social Networks
Asim, Yousra; Malik, Ahmad Kamran - 2020
Persistent link: https://ebtypo.dmz1.zbw/10012169772
Saved in:
Cover Image
Rentabilität von Identity und Access Management im digitalen Wandel
Messerschmidt, Phillip - 2020
Preview
Preview
Persistent link: https://ebtypo.dmz1.zbw/10012250969
Saved in:
Cover Image
User acceptance of voice biometrics in managing the physical access to a secure area of an international airport
Cornacchia, Michele; Papa, Filomena; Sapio, Bartolomeo - In: Technology analysis & strategic management 32 (2020) 10, pp. 1236-1250
Persistent link: https://ebtypo.dmz1.zbw/10012315019
Saved in:
Cover Image
A privacy protection method for health care big data management based on risk access control
Shi, Mingyue; Jiang, Rong; Hu, Xiaohan; Shang, Jingwei - In: Health care management science : a new journal serving … 23 (2020) 3, pp. 427-442
Persistent link: https://ebtypo.dmz1.zbw/10012291203
Saved in:
Cover Image
A conceptual framework that monitors port facility access through integrated Port Community Systems and improves port and terminal security performance
Koliousis, Ioannis - In: International journal of shipping and transport … 12 (2020) 4, pp. 251-283
Persistent link: https://ebtypo.dmz1.zbw/10012256829
Saved in:
Cover Image
Access control system for RFID-tagged documents in supply chain management
Nowicki, Tadeusz; Kiedrowicz, Maciej; Waszkowski, Robert; … - In: LogForum : elektroniczne czasopismo naukowe z dziedziny … 13 (2017) 1, pp. 91-101
Persistent link: https://ebtypo.dmz1.zbw/10011808610
Saved in:
Cover Image
Broadband industry structure and cybercrime : an empirical analysis
Gideon, Carolyn; Hogendorn, Christiaan - 2015 - Preliminary draft, Draft 2.0
Prior studies have shown that while ISPs are well positioned to provide residential and SME users critical protection from cybercrime, their incentives to do so are often insufficient. The presence of competition in providing broadband service is a factor we might expect to impact such...
Persistent link: https://ebtypo.dmz1.zbw/10011526783
Saved in:
Cover Image
Parallel Access Control Model in Cross-Domain Grid Computing Environment
Namane, Sarra; Ghoualmi, Nassira - In: International Journal of Embedded and Real-Time … 9 (2018) 1, pp. 50-65
Despite the various attractive features that grid computing has to offer, it has many great security challenges, such as access control. With the expansion of the network scale, a large number of authorization requests have to be treated; on the other hand, the multi-domain nature of grid...
Persistent link: https://ebtypo.dmz1.zbw/10012044698
Saved in:
Cover Image
Access Control Framework Using Multi-Factor Authentication in Cloud Computing
Patel, Subhash Chandra; Jaiswal, Sumit; Singh, Ravi Shankar - In: International Journal of Green Computing (IJGC) 9 (2018) 2, pp. 1-15
The most challenging issues in cloud computing are access control and data security because users of the cloud outsource sensitive data and information to cloud provider servers, which are not within the same trusted domain as the data owner. Within cloud computing, various services and...
Persistent link: https://ebtypo.dmz1.zbw/10012044942
Saved in:
Cover Image
Generic Access Control Model and Semantic Mapping Between Heterogeneous Policies
Haguouche, Samira; Jarir, Zahi - In: International Journal of Technology Diffusion (IJTD) 9 (2018) 4, pp. 52-65
This article aims to ensure a dynamic set up of access control policies across collaborating organizations where these organizations adopt heterogeneous access control models. To attain this objective, this contribution started with a survey on existing access control models, and their...
Persistent link: https://ebtypo.dmz1.zbw/10012048398
Saved in:
Cover Image
Privacy and security of electronic patient records : Tailoring multimethodology to explore the socio-political problems associated with Role Based Access Control systems
Small, Adrian; Wainwright, David - In: European journal of operational research : EJOR 265 (2018) 1, pp. 344-360
Persistent link: https://ebtypo.dmz1.zbw/10011805485
Saved in:
Cover Image
Data across control in data exchanging supporting big data area
Jia, Haoyang; Sheng, Yimin; Han, Weili; Wang, X. Sean - In: Journal of management analytics 5 (2018) 3, pp. 155-169
Persistent link: https://ebtypo.dmz1.zbw/10011889307
Saved in:
Cover Image
Research on key techniques of cryptographic access control and properties optimisation in cloud storage
Zhu, Shidong; Jiang, Liu; Zhou, Zhenliu - In: International journal of information technology and … 17 (2018) 4, pp. 257-274
Persistent link: https://ebtypo.dmz1.zbw/10011989744
Saved in:
Cover Image
IT-Sicherheit : Konzepte - Verfahren - Protokolle
Eckert, Claudia - 2018 - 10. Auflage
Preview
Preview
Persistent link: https://ebtypo.dmz1.zbw/10011821990
Saved in:
Cover Image
Privacy Aware Access Control: A Literature Survey and Novel Framework
Bhatia, Rekha; Gujral, Manpreet Singh - In: International Journal of Information Technologies and … 10 (2017) 2, pp. 17-30
Due to the ever increasing number of web services available through the Internet, the privacy as a fundamental human right is endangered. Informed consent and collection of information are two important aspects while interacting on the Internet through web services. The ease of data access and...
Persistent link: https://ebtypo.dmz1.zbw/10012046064
Saved in:
Cover Image
Goal Modelling for Security Problem Matching and Pattern Enforcement
Washizaki, Hironori; Yu, Yijun; Kaiya, Haruhiko; … - In: International Journal of Secure Software Engineering (IJSSE) 8 (2017) 3, pp. 42-57
This article describes how earlier detection of security problems and the implementation of solutions would be a cost-effective approach for developing secure software systems. Developing, gathering and sharing similar repeatable programming knowledge and solutions has led to the introduction of...
Persistent link: https://ebtypo.dmz1.zbw/10012048088
Saved in:
Cover Image
Mobile application development, usability, and security
Mukherjea, Sougata (ed.) - 2017
"This book provides a thorough overview on the different facets of mobile technology management and its integration into modern society, highlighting issues related to analytics, cloud computing, and different types of application development"--Provided by publisher.
Preview
Preview
Persistent link: https://ebtypo.dmz1.zbw/10012395070
Saved in:
Cover Image
Continuous user authentication on touch-screen mobile phones : toward more secure and usable m-commerce
Zhang, Dongsong; Kang, Yin; Zhou, Lina; Lai, Jianwei - In: Internetworked world : 15th Workshop on e-Business, WeB …, (pp. 225-236). 2017
Persistent link: https://ebtypo.dmz1.zbw/10011758993
Saved in:
Cover Image
Customer perception and behavioral intention to use biometric-enabled e-banking services in India
Varma, Siddharth; Gupta, Ruchika - In: Business analytics and cyber security management in …, (pp. 137-146). 2017
Persistent link: https://ebtypo.dmz1.zbw/10011586306
Saved in:
Cover Image
Reducing underage alcohol and tobacco use : evidence from the introduction of vertical identification cards
Bellou, Andriana; Bhatt, Rachana - 2012
From 1994-2009, forty-three states changed the design of their driver's license/state identification cards in an effort to reduce underage access to and consumption of alcohol and tobacco. In these states, individuals under the age of 21 are issued licenses that are vertically oriented, whereas...
Persistent link: https://ebtypo.dmz1.zbw/10009656636
Saved in:
Cover Image
Hierarchy Similarity Analyser-An Approach to Securely Share Electronic Health Records
Bhartiya, Shalini; Mehrotra, Deepti; Girdhar, Anup - In: International Journal of E-Health and Medical … 7 (2016) 2, pp. 14-29
Health professionals need an access to various dimensions of Electronic Health Records (EHR). Depending on technical constraints, each organization defines its own access control schema exhibiting heterogeneity in organizational rules and policies. Achieving interoperability between such schemas...
Persistent link: https://ebtypo.dmz1.zbw/10012044418
Saved in:
Cover Image
Combination of Access Control and De-Identification for Privacy Preserving in Big Data
Rahmani, Amine; Amine, Abdelmalek; Hamou, Reda Mohamed - In: International Journal of Information Security and … 10 (2016) 1, pp. 1-27
Despite of its emergence and advantages in various domains, big data still suffers from major disadvantages. Timeless, scalability, and privacy are the main problems that hinder the advance of big data. Privacy preserving has become a wide search era within the scientific community. This paper...
Persistent link: https://ebtypo.dmz1.zbw/10012045669
Saved in:
Cover Image
Creating Time-Limited Attributes for Time-Limited Services in Cloud Computing
Moradbeikie, Azin; Abrishami, Saied; Abbasi, Hasan - In: International Journal of Information Security and … 10 (2016) 4, pp. 44-57
Nowadays, Cloud Computing is considered one of the important fields in both research and industry. Users enjoy membership of cloud providing effective services called time-limited services. This paper addresses time-limited services offering an attribute-based access control method and...
Persistent link: https://ebtypo.dmz1.zbw/10012045683
Saved in:
Cover Image
Access Control and Information Flow Control for Web Services Security
Kedjar, Saadia; Tari, Abdelkamel; Bertok, Peter - In: International Journal of Information Technology and Web … 11 (2016) 1, pp. 44-76
With the advancement of web services technology, security has become an increasingly important issue. Various security standards have been developed to secure web services at the transport and message level, but application level has received less attention. The security solutions at the...
Persistent link: https://ebtypo.dmz1.zbw/10012046078
Saved in:
Cover Image
Using classification for role-based access control management
Badar, Nazia; Vaidya, Jaideep; Vijayalakshmi, Alturi; … - In: International journal of technology, policy and … 16 (2016) 1, pp. 45-78
Persistent link: https://ebtypo.dmz1.zbw/10011607564
Saved in:
Cover Image
Fine-grained integration of access control policies
Rao, Prathima; Lin, Dan; Bertino, Elisa; Li, Ninghui; … - 2011
Collaborative and distributed applications, such as dynamic coalitions and virtualized grid computing, often require integrating access control policies of collaborating parties. Such an integration must be able to support complex authorization specifications and the fine-grained integration...
Persistent link: https://ebtypo.dmz1.zbw/10009430552
Saved in:
Cover Image
A conditional purpose-based access control model with dynamic roles
Kabir, Enamul; Wang, Hua; Bertino, Elisa - 2011
This paper presents a model for privacy preserving access control which is based on variety of purposes. Conditional purpose is applied along with allowed purpose and prohibited purpose in the model. It allows users using some data for certain purpose with conditions. The structure of...
Persistent link: https://ebtypo.dmz1.zbw/10009430806
Saved in:
Cover Image
Towards a game theoretic authorisation model
Salim, Farzad; Reid, Jason; Dulleck, Uwe; Dawson, Edward - 2010
Authorised users (insiders) are behind the majority of security incidents with high financial impacts. Because authorisation is the process of controlling users? access to resources, improving authorisation techniques may mitigate the insider threat. Current approaches to authorisation suffer...
Persistent link: https://ebtypo.dmz1.zbw/10009483459
Saved in:
Cover Image
Modelling a Trusted Mechanism for Knowledge Sharing
PETRESCU, Marius; POPESCU, Delia Mioara; SIRBU, Nicoleta - In: REVISTA DE MANAGEMENT COMPARAT INTERNATIONAL/REVIEW OF … 11 (2010) 5, pp. 799-806
Knowledge sharing has been identified as a major focus area for knowledge management. Efforts are made with a view to identify the most effective ways to share knowledge, as a step towards improving organizational performance. In this striving, various factors have been identified as impediments...
Persistent link: https://ebtypo.dmz1.zbw/10008852699
Saved in:
Cover Image
Resolving authorization conflicts by ontology views for controlled access to a digital library
Dasgupta, Subhasish; Pal, Pinakpani; Mazumdar, Chandan; … - In: Journal of knowledge management 19 (2015) 1, pp. 45-59
Persistent link: https://ebtypo.dmz1.zbw/10011296912
Saved in:
Cover Image
Onlineidentifikation : medienbruchfreies Multikanalmanagement
Fürst, Franz Thomas; Jorga, Frank Stefan - In: Multi- und Omnichannel-Management in Banken und …, (pp. 363-375). 2015
Persistent link: https://ebtypo.dmz1.zbw/10011305192
Saved in:
Cover Image
A framework for tracking reliable data in the cloud for port logistics
Choi, Hyung Rim; Alfaro, Luis Alfredo; Le, Thi My Hanh; … - In: International journal of applied business and economic … 13 (2015) 2, pp. 501-518
Persistent link: https://ebtypo.dmz1.zbw/10011376429
Saved in:
Cover Image
Konvergenz und Divergenz der sicheren Authentifizierung im browserbasierten Online-Banking und E-Government in Deutschland
Diederich, Günther - 2015
Persistent link: https://ebtypo.dmz1.zbw/10011545702
Saved in:
Cover Image
An algebra for fine-grained integration of XACML policies
Rao, Prathima; Lin, Dan; Bertino, Elisa; Li, Ninghui - 2009
Collaborative and distributed applications, such as dynamic coalitions and virtualized grid computing, often require integrating access control policies of collaborating parties. Such an integration must be able to support complex authorization specifications and the fine-grained integration...
Persistent link: https://ebtypo.dmz1.zbw/10009430789
Saved in:
Cover Image
Specification and enforcement of flexible security policy for active cooperation
Sun, Yuqing; Gong, Bin; Meng, Xiangxu; Lin, Zongkai; … - 2009
Interoperation and services sharing among different systems are becoming new paradigms for enterprise collaboration. To keep ahead in strong competition environments, an enterprise should provide flexible and comprehensive services to partners and support active collaborations with partners and...
Persistent link: https://ebtypo.dmz1.zbw/10009430798
Saved in:
Cover Image
Modeling Support for Role-Based Delegation in Process-Aware Information Systems
Schefer-Wenzl, Sigrid; Strembeck, Mark - In: Business & Information Systems Engineering 6 (2014) 4, pp. 215-237
<Para ID="Par2">In the paper, an integrated approach for the modeling and enforcement of delegation policies in process-aware information systems is presented. In particular, a delegation extension for process-related role-based access control (RBAC) models is specified. The extension is generic in the sense...</para>
Persistent link: https://ebtypo.dmz1.zbw/10011001385
Saved in:
Cover Image
The impact of digital fingerprinting and identity verification on data quality : duplication detection is not a perfect science
Courtright, Melanie; Pashupati, Kartik - In: Journal of advertising research 54 (2014) 3, pp. 263-269
Persistent link: https://ebtypo.dmz1.zbw/10010419829
Saved in:
Cover Image
On the design of a privacy aware authorization engine for collaborative environments
Gogoulos, Fotius I.; Antonakopoulou, Anna; Lioudakis, … - In: Electronic markets : the international journal on … 24 (2014) 2, pp. 101-112
Persistent link: https://ebtypo.dmz1.zbw/10010367264
Saved in:
Cover Image
Biometric authentication : verifying a user's identity using a frequentist probability model of keystroke intervals
Voloshin, Mikhail - In: Emerging methods in predictive analytics : risk …, (pp. 254-269). 2014
Persistent link: https://ebtypo.dmz1.zbw/10010367399
Saved in:
Cover Image
Ownership, access, and sequential
Mai, Maxim; Smirnov, Vladimir; Wait, Andrew - In: The Canadian journal of economics 47 (2014) 1, pp. 203-231
Persistent link: https://ebtypo.dmz1.zbw/10010373271
Saved in:
Cover Image
Scalable Role & Organization Based Access Control and Its Administration
Zhang, Zhixiong - 2008
In Role Based Access Control (RBAC), roles are typically created based on jobfunctions inside an organization. Traditional RBAC does not scale up well for modelingsecurity policies spanning multiple organizations. To solve this problem, a family ofextended RBAC models called Role and...
Persistent link: https://ebtypo.dmz1.zbw/10009458921
Saved in:
Cover Image
Secure outspurcing of IT services in a non-trusted environment
Evdokimov, Sergei - 2008
In dieser Arbeit werden die Mšglichkeiten sicherer Ausgliederung von Datenbanken und inhaltsbasiertem Routing an einen nicht voll vertrauenswŸrdigen Dienstanbieter betrachtet. Wir untersuchen die Grenzen der Sicherheit, die in diesem Szenario erreicht werden kšnnen. Sicherheit wird dabei...
Persistent link: https://ebtypo.dmz1.zbw/10009467071
Saved in:
Cover Image
Commitment issues in delegation process
Pham, Quan; Reid, Jason F.; McCullagh, Adrian; Dawson, … - 2008
Delegation is a powerful mechanism to provide flexible and dynamic access control decisions. Delegation is particularly useful in federated environments where multiple systems, with their own security autonomy, are connected under one common federation. Although many delegation schemes have been...
Persistent link: https://ebtypo.dmz1.zbw/10009437840
Saved in:
Cover Image
Data breaches and identity theft
Roberds, William (contributor);  … - 2008
Preview
Preview
Persistent link: https://ebtypo.dmz1.zbw/10003768483
Saved in:
Cover Image
The cost impact of spam filters : measuring the effect of information system technologies in organizations
Caliendo, Marco; Clement, Michel; Papies, Dominik; … - 2008
More than 70% of global e-mail traffic consists of unsolicited and commercial direct marketing, also known as spam. Dealing with spam incurs high costs for organizations, prompting efforts to try to reduce spam-related costs by installing spam filters. Using modern econometric methods to reduce...
Preview
Preview
Persistent link: https://ebtypo.dmz1.zbw/10003762188
Saved in:
  • 1
  • 2
  • 3
  • Next
  • Last
A service of the
zbw
  • Sitemap
  • Contact us
  • Imprint
  • Privacy

Loading...