Showing 1 - 3 of 3
Criminal elements in today's technology-driven society are using every means available at their disposal to launder the proceeds from their illegal activities. While many-anti-money laundering solutions have been in place for some time within the financial community, they cannot adapt to the...
Persistent link: https://www.econbiz.de/10009448793
IT security outsourcing is the establishment of a contractual relationship between an organization with an outside vendor which assumes responsibility for the organisation’s security functions. Outsourcing in IS has had a variable history of success and the complexity of the decision making...
Persistent link: https://www.econbiz.de/10009483706
This paper presents a generic conceptual model of risk evaluation in order to manage the risk throughrelated constraints and variables under a multi-agent collaborative design environment. Initially, a hierarchyconstraint network is developed to mapping constraints and variables. Then, an...
Persistent link: https://www.econbiz.de/10009463044