Big data opportunities for accounting and finance practice and research

S Cockcroft, M Russell - Australian Accounting Review, 2018 - Wiley Online Library
We examine the research opportunities for the use of 'big data'in accounting and finance.
The purpose of the study is to present a snapshot of big data academic research in …

Fraud detection using fraud triangle risk factors

SY Huang, CC Lin, AA Chiu, DC Yen - Information Systems Frontiers, 2017 - Springer
The objective of this study is to identify the financial statement fraud factors and rank the
relative importance. First, this study reviews the previous studies to identify the possible …

The role of machine learning in cybersecurity

G Apruzzese, P Laskov, E Montes de Oca… - … Threats: Research and …, 2023 - dl.acm.org
Machine Learning (ML) represents a pivotal technology for current and future information
systems, and many domains already leverage the capabilities of ML. However, deployment …

The dark side of the insider: detecting the insider threat through examination of dark triad personality traits

M Maasberg, J Warren… - 2015 48th Hawaii …, 2015 - ieeexplore.ieee.org
Efforts to understand what goes on in the mind of an insider have taken a back seat to
developing technical controls, yet insider threat incidents persist. We examine insider threat …

[图书][B] Rethinking Learning in an Age of Digital Fluency: Is being digitally tethered a new learning nexus?

M Savin-Baden - 2015 - taylorfrancis.com
" This is a book that I am going to have to own, and will work to find contexts in which to
recommend. It cuts obliquely through so many important domains of evidence and …

Guest editorial: A brief overview of data leakage and insider threats

CL Huth, DW Chadwick, WR Claycomb… - Information Systems …, 2013 - Springer
The challenges of preventing, detecting, and responding to data leakage propagated by
authorized users, or insider threats, are among the most difficult facing security researchers …

[PDF][PDF] Discovering new cyber protection approaches from a security professional prospective

A Loukaka, S Rahman - International Journal of Computer …, 2017 - researchgate.net
Cybersecurity has become a very hot topic due to high profile breaches that occurred in the
past years. Despite the implementation of current known pre-emptive methods such as …

Leader's dilemma game: An experimental design for cyber insider threat research

SM Ho, M Warkentin - Information Systems Frontiers, 2017 - Springer
One of the problems with insider threat research is the lack of a complete 360° view of an
insider threat dataset due to inadequate experimental design. This has prevented us from …

Unsupervised learning for financial statement fraud detection using manta ray foraging based convolutional neural network

AK Singh Yadav, M Sora - Concurrency and Computation …, 2022 - Wiley Online Library
Financial statement fraud detection is a significant topic and a challenging task related to
countless applications such as financial sectors, insurance, government agencies, law …

The enemy within the insider: Detecting the insider threat through addiction theory

M Maasberg, NL Beebe - Journal of Information Privacy and …, 2014 - Taylor & Francis
“Insiders” remain a significant threat to organizations—evidenced by recent cases involving
Robert Hansen, Bradley Manning, and Edward Snowden—even in light of significant …