You've requested...

Einsatz von Big-Data-Erkenntnissen und aufbereiteten Informationen zur Betrugsbekämpfung

If a new window did not open, click here to view this asset.

Download this next:

AI proves value in HR, but handle with care

Artificial Intelligence could be, and often is, seen as a bogeyman in HR. The infamous Amazon case, widely reported in 2018, where a recruitment algorithm decided not to consider women candidates because of their gender, basing itself on past data, is a byword for how things can go wrong with AI in HR.

But AI is also proving its value for HR. The Amazon debacle, which came to light in 2015, leading to the termination of that specific project in 2017, has not stopped companies using AI to standardise recruitment. And Amazon said it had never used the rogue algorithm for real, in any case.

The increasing prominence of AI, and other digital technologies, means that organisations are also being forced to re-skill the workforces they have recruited and retained. Even CIOs will need to up their game to stay relevant, we find.

And, contrary to popular common wisdom that AI is bound to be on the side of the bosses and against the workers, we also see, in this e-guide, how the allocation of work by algorithm might have advantages for workers as well as employers, even in the so-called “gig economy”.

Moreover, there is more to advanced HR software use than AI. In this e-guide we see it being used, in richly detailed case studies, at a strategic level by a trio of companies: at the merged Standard Life and Aberdeen Asset Management, The Gym Group, using data analytics to support expansion , and Agfa-Gevaert, to effect a spin-off.

These are also closely related to: "Einsatz von Big-Data-Erkenntnissen und aufbereiteten Informationen zur Betrugsbekämpfung"

  • AI and ML: Benefits, challenges, value & more

    AI, once deemed complex and unattainable, has undergone a transformation. Today, its user-friendly nature has enabled numerous organizations to harness the power of AI and ML solutions in their daily operations.

    Despite this, some remain uncertain about its advantages and business value, feeling overwhelmed by the purchasing and integration process.

    Delve into this report from MIT Technology Review in partnership with Teleperformance for deeper insights on how leading companies utilize AI and ML to enhance operational efficiency.

  • Computer Weekly - 17 December 2019: How data analytics is improving the world's greatest tennis players

    In this week’s Computer Weekly, we talk to the organisation that runs men’s tennis worldwide to find out how data analytics is transforming the sport. Intel processors delays will affect Windows 10 upgrades just as Microsoft ends Windows 7 support – we examine the implications. And we ask if AI is living up to the hype in enterprise IT. Read the issue now.

Find more content like what you just read:

  • Fraud management: A perennial business issue

    In this e-guide we will explore the current cyber fraud landscape and look at some organisations in the region that are using technology to overcome the challenges posed by fraudsters.

    Download

  • The future of manufacturing: Industry 4.0 and more

    Manufacturers understand the importance of quality. However, ensuring quality can be made difficult by a number of challenges. So, how can companies revamp their operations to best prioritize quality in their processes to improve their profitability and the bottom line? Dig into this white paper to learn more.

    Download

  • Risk management is the beating heart of your cyber strategy

    In this E-Guide we will explore four separate aspects of this wide-ranging topic area, beginning with a look ahead at some of the most impactful and significant data privacy trends likely to affect your risk and compliance strategy during 2022.

    Download

  • Top 10 business applications stories of 2019

    The steady incursion of artificial intelligence (AI) into enterprise software was a major theme behind Computer Weekly's indepth stories in this area in 2019. Human versus machine is the opposition that looms over much of the coverage here. Here are Computer Weekly's top 10 business applications stories of 2019.

    Download

  • Case study: How PayPal improved its fraud detection strategy

    Like most banking services, PayPal experiences fraud challenges. To improve security and identify emerging threats in real-time, they realized they needed to process and analyze more data faster. Download this case study now to learn how PayPal was able to overcome the limitations of its legacy infrastructure and stay secure.

    Download

  • 8 fraud fighting benefits of BankIDs

    With the help of an effective BankID, some even reducing online payment fraud for their users and business partners to levels as low as 0.00042%. This white paper explores how organizations can use BankIDs to fight fraud, including 8 key benefits. Read on to learn more.

    Download

  • Unpacking 9 examples of business email compromise (BEC)

    One way to boost your defenses against business email compromise (BEC) fraud is by understanding how BEC schemes have impacted other businesses. To access those insights, read this 24-page e-book, “You’ve Got Fraud: A Roundup of the Biggest, Boldest and Most Brazen Business Email Compromise Attacks.”

    Download

  • CW ASEAN November 2016

    Small businesses in the ASEAN region could unknowingly be allowing hackers to access large corporate networks.

    Download

  • CW Europe - June-August 2020: 5G rush in Russia

    Russian mobile operators are pooling their resources to help them overcome the technical challenges of creating 5G networks. Also read how Swedbank is rebuilding its anti-money laundering systems after a damning report, and how a public-private partnership in the Netherlands is helping to combat cyber fraudsters.

    Download

  • CW Europe - June-August 2020: 5G rush in Russia

    Russian mobile operators are pooling their resources to help them overcome the technical challenges of creating 5G networks. Also read how Swedbank is rebuilding its anti-money laundering systems after a damning report, and how a public-private partnership in the Netherlands is helping to combat cyber fraudsters.

    Download

  • Computer Weekly - 8 February 2022: Exploring the metaverse

    In this week's Computer Weekly, the metaverse is set to become a highly competitive commercial playground –profitable markets but also high-profile failures will follow. IT contractors have been hit by cyber attacks on the firms that pay their wages – we examine the impact. And we ask if it's time to plan for quantum computing. Read the issue now.

    Download

  • Computer Weekly - 14 September 2021: Is 3D printing about to hit the mainstream?

    In this week's Computer Weekly, we find out about the emerging consumer services using 3D printing and ask if the technology is about to go mainstream. Our latest buyer's guide looks at the importance of sustainable datacentres. And we analyse the risks of increasing contactless card spending limits and whether tech could help. Read the issue now.

    Download

  • Computer Weekly – 16 August 2022: Broadband reaches for the stars – the new space race

    In this week's Computer Weekly, we look at the latest space race, as satellite firms compete to provide high-speed connectivity. Is the datacentre sector hindering house building in the UK? We find out what's really going on. And we talk to the IT director of the Mercedes Formula One team about how data helps to win races. Read the issue now.

    Download

  • A Computer Weekly buyer's guide to expense management

    Every year, UK businesses deal with about £10bn in expenses claims, but surprisingly few use IT to manage that spend. In this 12-page buyer's guide, Computer Weekly looks at how the application of expense management tools can reward organisations with immediate cost and time savings

    Download

  • Hacking the Human Operating System

    Cyber attackers often bypass the consciousness of their targets and attempt to manipulate victims through subconscious influences. This report from Intel Security offers advice on how to mitigate these risks.

    Download

  • Fighting ransomware: Why good luck won’t help you

    Download this e-book for the Insider’s Guide to Defending Against Ransomware, so you can evaluate the real risks, costs, and strategies for IT leaders.

    Download

  • CIO Trends #11: Benelux

    The Netherlands is a nation leading the world in terms of digital, so it is to be expected that bit also leads the works in securing digital assets. In this e-guide read about a report that has damning conclusions on the IT security of some of the airport's core systems.

    Download

  • CIO Trends #11: Benelux

    The Netherlands is a nation leading the world in terms of digital, so it is to be expected that bit also leads the works in securing digital assets. In this e-guide read about a report that has damning conclusions on the IT security of some of the airport's core systems.

    Download

  • Trusted AI innovation: How to deliver value at scale

    Generative AI is poised to create a massive impact on enterprise value, and it’s already opening the doorway to new frontiers in productivity and innovation. This webcast will provide you with an overview of a comprehensive cloud analytics and data platform for trusted AI innovation. Tune in to learn how you can accelerate your AI journey.

    Download

  • 6-step guide for perfecting your anti-fraud strategy

    As payment card fraud transactions are forecasted to rise 20% to $38.5 billion by 2027, it’s no wonder that organizations are looking for new ways to combat modern fraud techniques. However, establishing anti-fraud frameworks and taking preventative measures isn’t always easy. Access this guide to learn more.

    Download

  • AI in Fraud Management: Uses cases, benefits and challenges

    AI is involved in many cybersecurity processes. Now, AI has its sights set on improving the fraud detection and management landscape. In this e-guide, learn about the use cases, as well as the benefits and challenges organisations should keep in mind when implementing AI into their fraud detection and management processes.

    Download

  • 6 types of BEC & how to spot them

    Business email compromise (BEC) attacks pose a threat to all of your organization’s employees. Therefore, educating yourself—and your organization at large—is key. Step in “Breaking Down BEC,” an e-book that maps out 6 BEC types and how to spot them. Keep reading to explore real-world examples of each threat type.

    Download

  • Biometrics in the enterprise: An opportunity or an ethical minefield?

    Is biometric technology ready for use in the enterprise to help improve IT security? IT leaders need to be aware of the concerns. In this e-guide we take a look at some of the potential – as well as the risks.

    Download

  • Asia Pacific Fraud Trends Uncovered

    PH

    Download

  • Common Fraud Challenges in Asia Pacific

    PH

    Download

  • The Evolution of Ecommerce

    PH

    Download

  • How to unlock business value with AI & cloud analytics

    In this e-book, you’ll discover how the partnership between SAS and Microsoft can help organisations unlock the potential of the cloud to deliver cost savings and innovation, including 5 real world use cases across a variety of industries. Read on to learn how your organisation can accelerate your cloud analytics and AI journey.

    Download

  • The myth of email as proof of communication

    Increasingly, there is a need for organisations to be able to prove the content of communications between themselves and other parties. Analyst group Quocirca looks at the options.

    Download

  • 7 top predictive analytics use cases

    Across industries, companies are using predictive analytics to forecast future trends and actions. Learn about the most popular use cases for predictive analytics.

    Download

  • Predictive analytics gains evermore accuracy in guiding enterprises forward

    Predictive analytics can help businesses look for meaningful patterns in data, then build models that forecast what is likely to happen in the future.

    Download

  • 6 steps for protecting your business from BEC attacks

    You’re familiar with the costs of a business email compromise (BEC) attack, whether it’s been your organization on the receiving end or another company. So, you know that these attacks are costly—but do you know why they’re so successful? Find out why in this e-book.

    Download

  • AI and ML Power Financial Services Transformation

    With the mission to put AI and ML in the hands of every developer, AWS provides a deep set of AI and ML services for financial services institutions of all sizes, and for developers across expertise levels, to help accelerate their journey. Find out more here.

    Download

  • A guide to where mainframes fit in the cloud

    Far from being legacy IT, the mainframe is a driving force in modern computing. In this e-guide we look at its place in cloud computing.

    Download

  • Is your identity security sufficient to protect your organization?

    Is your identity security sufficient to protect your organization? By evaluating multiple attack vectors, assigning risk scores, and providing insights, PingOne Protect allows organizations to thwart potential attacks. Download the data sheet to learn more.

    Download

  • 8 big data use cases for businesses

    For businesses, the ability to deal with big data is important: it can bring companies significant business value, from enabling cost optimization and improved efficiency to providing better customer insight. In this article, we'll explore 8 use cases that show big data's profound impact on businesses across different industry sectors.

    Download

  • 10 common uses for machine learning applications in business

    Machine learning (ML) enables businesses to perform tasks on a scale previously thought impossible. As a result, many organizations are finding ways to harness ML to not just drive efficiencies but to fuel new business opportunities. Here are 10 applications of ML that are being used to solve problems & deliver tangible business benefits:

    Download

  • How to boost your email cybersecurity

    With more cyberthreats reaching the inboxes of your employees, this much is clear: It’s time to boost your email cybersecurity. But where do you start? First, by understanding today’s most prevalent cyberattacks. Read “The Definitive Email Cybersecurity Strategy Guide” to learn about them.

    Download

  • Digital secure remote payment: How Apple Pay can change the future of remote payments

    Apple Pay introduces EMV cryptographic strength to remote payments for in-app payments on the iPhone and interconnected Apple devices. It has the potential to reduce card-not-present (CNP) fraud.

    Download

  • How to build a counter-fraud strategy

    According to a recent study, account takeover attacks are up 131%. An effective counter-fraud strategy must focus on higher-level principles rather than implementation details, outlining the general principles for adopting, maintaining, and reinforcing counter-fraud measures through technology. Read on to learn more.

    Download

  • Secure your organization from account takeover attacks

    In a single month alone, Checkpoint HEC researchers saw 1,345 unique compromised accounts. In this whitepaper, HEC will discuss how to prevent account takeover from taking control of your business by giving you tips and strategies you can implement to improve security. Read on to learn more.

    Download

  • A Starting Point for Your Zero-trust Journey

    So, you want to launch your journey to zero trust, but you’re wondering where to begin. This IBM paper advises to set identity and access management (IAM) as your starting point. Read on for more guidance.

    Download

  • Top 10 challenges to AI success in financial services… and how to solve them

    Although AI is already having an impact on nearly every facet of business in financial services, one wrong move can lead to automated disaster. Discover in this e-book the top 10 challenges to AI success in financial services… and how to solve them.

    Download

  • Graph database: Enable real-time decisions at scale

    Organizations today are turning to multi-model, multi-cloud databases that can be effective and efficient when dealing with different scenarios. Read on to learn about such a database and discover how you can leverage it to make real-time decisions at scale.

    Download

  • Memorandum of points and authorities by David Godkin (with highlights) - 20 May 2018

    David Godkin, counsel for app developer Six4Three, outlines the legal arguments that will be used in the case against Facebook, as well as the relevant cases, statutes and authorities that apply.

    Download

  • Top 3 Machine Learning use cases for Finance

    If there’s one thing finance leaders and professionals need more of, it’s time. But using traditional analysis methods based on historical data is both a tedious and time-consuming manual process. Discover 3 areas where you could use Alteryx Machine Learning to return time to your team in this e-book.

    Download

  • A Computer Weekly buyer's guide to graph databases

    In this 14-page buyer's guide, Computer Weekly looks at the technology that teases out connections between divergent datasets – and how it is revolutionising data analysis.

    Download

  • The Essential Guide to Security

    Download The Essential Guide to Security to discover new security use cases as well as how to implement Splunk’s security product suite for advanced security analytics, security automation and orchestration (SOAR), Security Information and Event Management (SIEM), MITRE ATT&CK, machine learning and more, all in one place to power your SOC.

    Download