Identifying Internet Abuse by Analyzing User Behavior on the Internet
Ahmad Mashhour () and
Abdulla Al-Saad ()
Additional contact information
Ahmad Mashhour: Yarmouk University
Abdulla Al-Saad: Yarmouk University
Journal of Internet Banking and Commerce, 2011, vol. 16, issue 1, 01-15
Abstract:
Advances in the banking sector have ushered in an era of multi-product and multiservices being delivered using multiple yet integrated channels. The use of information and communication technology (ICT) is on the increase and encompasses nearly the entire gamut of banking operations. Rising competition and customer expectations have compelled top management to implement, and continuously upgrade, agile and scalable ICT practices and solutions. The enormity and range of banking services combined with the complexity of integrated and ICT-enabled delivery mechanisms require comprehensive partnerships to be forged between banks and providers of ICT solutions, especially with regard to Business Continuity Management (BCM). This paper presents the preliminary findings of a research study to identify the essential ingredients of successful BCM implementation based on experiences of banks in India.
Keywords: Firewall Log file; Internet abuse; Internet control; Log files analysis; User behavior (search for similar items in EconPapers)
JEL-codes: L86 (search for similar items in EconPapers)
Date: 2011
References: Add references at CitEc
Citations:
There are no downloads for this item, see the EconPapers FAQ for hints about obtaining it.
Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.
Export reference: BibTeX
RIS (EndNote, ProCite, RefMan)
HTML/Text
Persistent link: https://EconPapers.repec.org/RePEc:ris:joibac:0370
Access Statistics for this article
Journal of Internet Banking and Commerce is currently edited by Vijaya Lakshmi, Nahum Goldmann and Dale Pinto
More articles in Journal of Internet Banking and Commerce
Bibliographic data for series maintained by Dale Pinto ().