Showing 1 - 5 of 5
Criminal elements in today's technology-driven society are using every means available at their disposal to launder the proceeds from their illegal activities. While many-anti-money laundering solutions have been in place for some time within the financial community, they cannot adapt to the...
Persistent link: https://www.econbiz.de/10009448793
Discovering a set of domain classes during object-oriented analysis isintellectually challenging and time-consuming for novice analyzers. This chapterpresents a taxonomic class modeling (TCM) methodology that can be used forobject-oriented analysis in business applications. Our methodology helps...
Persistent link: https://www.econbiz.de/10009451004
There have been few studies that investigate the reasons that dissatisfied customers stay with service organisations. Further, there have been no studies that have investigated a range of factors simultaneously in a single model in the business services sector. This paper attempts to address...
Persistent link: https://www.econbiz.de/10009457516
IT security outsourcing is the establishment of a contractual relationship between an organization with an outside vendor which assumes responsibility for the organisation’s security functions. Outsourcing in IS has had a variable history of success and the complexity of the decision making...
Persistent link: https://www.econbiz.de/10009483706
This paper presents a generic conceptual model of risk evaluation in order to manage the risk throughrelated constraints and variables under a multi-agent collaborative design environment. Initially, a hierarchyconstraint network is developed to mapping constraints and variables. Then, an...
Persistent link: https://www.econbiz.de/10009463044