Einsatz von Big-Data-Erkenntnissen und aufbereiteten Informationen zur Betrugsbekämpfung
By: IBM (German) View more from IBM (German) >>
Download this next:
AI proves value in HR, but handle with care
By: TechTarget ComputerWeekly.com
Type: eGuide
Artificial Intelligence could be, and often is, seen as a bogeyman in HR. The infamous Amazon case, widely reported in 2018, where a recruitment algorithm decided not to consider women candidates because of their gender, basing itself on past data, is a byword for how things can go wrong with AI in HR.
But AI is also proving its value for HR. The Amazon debacle, which came to light in 2015, leading to the termination of that specific project in 2017, has not stopped companies using AI to standardise recruitment. And Amazon said it had never used the rogue algorithm for real, in any case.
The increasing prominence of AI, and other digital technologies, means that organisations are also being forced to re-skill the workforces they have recruited and retained. Even CIOs will need to up their game to stay relevant, we find.
And, contrary to popular common wisdom that AI is bound to be on the side of the bosses and against the workers, we also see, in this e-guide, how the allocation of work by algorithm might have advantages for workers as well as employers, even in the so-called “gig economy”.
Moreover, there is more to advanced HR software use than AI. In this e-guide we see it being used, in richly detailed case studies, at a strategic level by a trio of companies: at the merged Standard Life and Aberdeen Asset Management, The Gym Group, using data analytics to support expansion , and Agfa-Gevaert, to effect a spin-off.
These are also closely related to: "Einsatz von Big-Data-Erkenntnissen und aufbereiteten Informationen zur Betrugsbekämpfung"
-
AI and ML: Benefits, challenges, value & more
By: Teleperformance
Type: Research Content
AI, once deemed complex and unattainable, has undergone a transformation. Today, its user-friendly nature has enabled numerous organizations to harness the power of AI and ML solutions in their daily operations.
Despite this, some remain uncertain about its advantages and business value, feeling overwhelmed by the purchasing and integration process.
Delve into this report from MIT Technology Review in partnership with Teleperformance for deeper insights on how leading companies utilize AI and ML to enhance operational efficiency.
-
Computer Weekly - 17 December 2019: How data analytics is improving the world's greatest tennis players
By: TechTarget ComputerWeekly.com
Type: Ezine
In this week’s Computer Weekly, we talk to the organisation that runs men’s tennis worldwide to find out how data analytics is transforming the sport. Intel processors delays will affect Windows 10 upgrades just as Microsoft ends Windows 7 support – we examine the implications. And we ask if AI is living up to the hype in enterprise IT. Read the issue now.
Find more content like what you just read:
-
Fraud management: A perennial business issue
By: TechTarget ComputerWeekly.com
Type: eGuide
In this e-guide we will explore the current cyber fraud landscape and look at some organisations in the region that are using technology to overcome the challenges posed by fraudsters.
-
The future of manufacturing: Industry 4.0 and more
By: Sage
Type: White Paper
Manufacturers understand the importance of quality. However, ensuring quality can be made difficult by a number of challenges. So, how can companies revamp their operations to best prioritize quality in their processes to improve their profitability and the bottom line? Dig into this white paper to learn more.
-
Risk management is the beating heart of your cyber strategy
By: TechTarget ComputerWeekly.com
Type: eBook
In this E-Guide we will explore four separate aspects of this wide-ranging topic area, beginning with a look ahead at some of the most impactful and significant data privacy trends likely to affect your risk and compliance strategy during 2022.
-
Top 10 business applications stories of 2019
By: TechTarget ComputerWeekly.com
Type: eGuide
The steady incursion of artificial intelligence (AI) into enterprise software was a major theme behind Computer Weekly's indepth stories in this area in 2019. Human versus machine is the opposition that looms over much of the coverage here. Here are Computer Weekly's top 10 business applications stories of 2019.
-
Case study: How PayPal improved its fraud detection strategy
By: AWS & Intel
Type: Case Study
Like most banking services, PayPal experiences fraud challenges. To improve security and identify emerging threats in real-time, they realized they needed to process and analyze more data faster. Download this case study now to learn how PayPal was able to overcome the limitations of its legacy infrastructure and stay secure.
-
8 fraud fighting benefits of BankIDs
By: Ping Identity Corporation
Type: White Paper
With the help of an effective BankID, some even reducing online payment fraud for their users and business partners to levels as low as 0.00042%. This white paper explores how organizations can use BankIDs to fight fraud, including 8 key benefits. Read on to learn more.
-
Unpacking 9 examples of business email compromise (BEC)
By: Proofpoint
Type: eBook
One way to boost your defenses against business email compromise (BEC) fraud is by understanding how BEC schemes have impacted other businesses. To access those insights, read this 24-page e-book, “You’ve Got Fraud: A Roundup of the Biggest, Boldest and Most Brazen Business Email Compromise Attacks.”
-
CW ASEAN November 2016
By: TechTarget Security
Type: Ezine
Small businesses in the ASEAN region could unknowingly be allowing hackers to access large corporate networks.
-
CW Europe - June-August 2020: 5G rush in Russia
By: TechTarget ComputerWeekly.com
Type: eGuide
Russian mobile operators are pooling their resources to help them overcome the technical challenges of creating 5G networks. Also read how Swedbank is rebuilding its anti-money laundering systems after a damning report, and how a public-private partnership in the Netherlands is helping to combat cyber fraudsters.
-
CW Europe - June-August 2020: 5G rush in Russia
By: TechTarget ComputerWeekly.com
Type: Ezine
Russian mobile operators are pooling their resources to help them overcome the technical challenges of creating 5G networks. Also read how Swedbank is rebuilding its anti-money laundering systems after a damning report, and how a public-private partnership in the Netherlands is helping to combat cyber fraudsters.
-
Computer Weekly - 8 February 2022: Exploring the metaverse
By: TechTarget ComputerWeekly.com
Type: Ezine
In this week's Computer Weekly, the metaverse is set to become a highly competitive commercial playground –profitable markets but also high-profile failures will follow. IT contractors have been hit by cyber attacks on the firms that pay their wages – we examine the impact. And we ask if it's time to plan for quantum computing. Read the issue now.
-
Computer Weekly - 14 September 2021: Is 3D printing about to hit the mainstream?
By: TechTarget ComputerWeekly.com
Type: Ezine
In this week's Computer Weekly, we find out about the emerging consumer services using 3D printing and ask if the technology is about to go mainstream. Our latest buyer's guide looks at the importance of sustainable datacentres. And we analyse the risks of increasing contactless card spending limits and whether tech could help. Read the issue now.
-
Computer Weekly – 16 August 2022: Broadband reaches for the stars – the new space race
By: TechTarget ComputerWeekly.com
Type: Ezine
In this week's Computer Weekly, we look at the latest space race, as satellite firms compete to provide high-speed connectivity. Is the datacentre sector hindering house building in the UK? We find out what's really going on. And we talk to the IT director of the Mercedes Formula One team about how data helps to win races. Read the issue now.
-
A Computer Weekly buyer's guide to expense management
By: TechTarget ComputerWeekly.com
Type: eBook
Every year, UK businesses deal with about £10bn in expenses claims, but surprisingly few use IT to manage that spend. In this 12-page buyer's guide, Computer Weekly looks at how the application of expense management tools can reward organisations with immediate cost and time savings
-
Hacking the Human Operating System
By: TechTarget ComputerWeekly.com
Type: Essential Guide
Cyber attackers often bypass the consciousness of their targets and attempt to manipulate victims through subconscious influences. This report from Intel Security offers advice on how to mitigate these risks.
-
Fighting ransomware: Why good luck won’t help you
By: Druva & AWS Marketplace
Type: eBook
Download this e-book for the Insider’s Guide to Defending Against Ransomware, so you can evaluate the real risks, costs, and strategies for IT leaders.
-
CIO Trends #11: Benelux
By: TechTarget ComputerWeekly.com
Type: eGuide
The Netherlands is a nation leading the world in terms of digital, so it is to be expected that bit also leads the works in securing digital assets. In this e-guide read about a report that has damning conclusions on the IT security of some of the airport's core systems.
-
CIO Trends #11: Benelux
By: TechTarget ComputerWeekly.com
Type: eGuide
The Netherlands is a nation leading the world in terms of digital, so it is to be expected that bit also leads the works in securing digital assets. In this e-guide read about a report that has damning conclusions on the IT security of some of the airport's core systems.
-
Trusted AI innovation: How to deliver value at scale
By: Teradata
Type: Webcast
Generative AI is poised to create a massive impact on enterprise value, and it’s already opening the doorway to new frontiers in productivity and innovation. This webcast will provide you with an overview of a comprehensive cloud analytics and data platform for trusted AI innovation. Tune in to learn how you can accelerate your AI journey.
-
6-step guide for perfecting your anti-fraud strategy
By: Galileo
Type: eBook
As payment card fraud transactions are forecasted to rise 20% to $38.5 billion by 2027, it’s no wonder that organizations are looking for new ways to combat modern fraud techniques. However, establishing anti-fraud frameworks and taking preventative measures isn’t always easy. Access this guide to learn more.
-
AI in Fraud Management: Uses cases, benefits and challenges
By: TechTarget ComputerWeekly.com
Type: eGuide
AI is involved in many cybersecurity processes. Now, AI has its sights set on improving the fraud detection and management landscape. In this e-guide, learn about the use cases, as well as the benefits and challenges organisations should keep in mind when implementing AI into their fraud detection and management processes.
-
6 types of BEC & how to spot them
By: Proofpoint
Type: eBook
Business email compromise (BEC) attacks pose a threat to all of your organization’s employees. Therefore, educating yourself—and your organization at large—is key. Step in “Breaking Down BEC,” an e-book that maps out 6 BEC types and how to spot them. Keep reading to explore real-world examples of each threat type.
-
Biometrics in the enterprise: An opportunity or an ethical minefield?
By: TechTarget ComputerWeekly.com
Type: eGuide
Is biometric technology ready for use in the enterprise to help improve IT security? IT leaders need to be aware of the concerns. In this e-guide we take a look at some of the potential – as well as the risks.
-
-
-
-
How to unlock business value with AI & cloud analytics
By: SAS
Type: eBook
In this e-book, you’ll discover how the partnership between SAS and Microsoft can help organisations unlock the potential of the cloud to deliver cost savings and innovation, including 5 real world use cases across a variety of industries. Read on to learn how your organisation can accelerate your cloud analytics and AI journey.
-
The myth of email as proof of communication
By: TechTarget ComputerWeekly.com
Type: Analyst Report
Increasingly, there is a need for organisations to be able to prove the content of communications between themselves and other parties. Analyst group Quocirca looks at the options.
-
7 top predictive analytics use cases
By: TechTarget ComputerWeekly.com
Type: eGuide
Across industries, companies are using predictive analytics to forecast future trends and actions. Learn about the most popular use cases for predictive analytics.
-
Predictive analytics gains evermore accuracy in guiding enterprises forward
By: TechTarget ComputerWeekly.com
Type: eBook
Predictive analytics can help businesses look for meaningful patterns in data, then build models that forecast what is likely to happen in the future.
-
6 steps for protecting your business from BEC attacks
By: Proofpoint
Type: eBook
You’re familiar with the costs of a business email compromise (BEC) attack, whether it’s been your organization on the receiving end or another company. So, you know that these attacks are costly—but do you know why they’re so successful? Find out why in this e-book.
-
AI and ML Power Financial Services Transformation
By: AWS
Type: eBook
With the mission to put AI and ML in the hands of every developer, AWS provides a deep set of AI and ML services for financial services institutions of all sizes, and for developers across expertise levels, to help accelerate their journey. Find out more here.
-
A guide to where mainframes fit in the cloud
By: TechTarget ComputerWeekly.com
Type: eBook
Far from being legacy IT, the mainframe is a driving force in modern computing. In this e-guide we look at its place in cloud computing.
-
Is your identity security sufficient to protect your organization?
By: Ping Identity Corporation
Type: Product Overview
Is your identity security sufficient to protect your organization? By evaluating multiple attack vectors, assigning risk scores, and providing insights, PingOne Protect allows organizations to thwart potential attacks. Download the data sheet to learn more.
-
8 big data use cases for businesses
By: TechTarget ComputerWeekly.com
Type: eGuide
For businesses, the ability to deal with big data is important: it can bring companies significant business value, from enabling cost optimization and improved efficiency to providing better customer insight. In this article, we'll explore 8 use cases that show big data's profound impact on businesses across different industry sectors.
-
10 common uses for machine learning applications in business
By: TechTarget ComputerWeekly.com
Type: eGuide
Machine learning (ML) enables businesses to perform tasks on a scale previously thought impossible. As a result, many organizations are finding ways to harness ML to not just drive efficiencies but to fuel new business opportunities. Here are 10 applications of ML that are being used to solve problems & deliver tangible business benefits:
-
How to boost your email cybersecurity
By: Proofpoint
Type: eBook
With more cyberthreats reaching the inboxes of your employees, this much is clear: It’s time to boost your email cybersecurity. But where do you start? First, by understanding today’s most prevalent cyberattacks. Read “The Definitive Email Cybersecurity Strategy Guide” to learn about them.
-
Digital secure remote payment: How Apple Pay can change the future of remote payments
By: TechTarget ComputerWeekly.com
Type: Research Content
Apple Pay introduces EMV cryptographic strength to remote payments for in-app payments on the iPhone and interconnected Apple devices. It has the potential to reduce card-not-present (CNP) fraud.
-
How to build a counter-fraud strategy
By: Ping Identity Corporation
Type: White Paper
According to a recent study, account takeover attacks are up 131%. An effective counter-fraud strategy must focus on higher-level principles rather than implementation details, outlining the general principles for adopting, maintaining, and reinforcing counter-fraud measures through technology. Read on to learn more.
-
Secure your organization from account takeover attacks
By: Checkpoint Software Technologies
Type: White Paper
In a single month alone, Checkpoint HEC researchers saw 1,345 unique compromised accounts. In this whitepaper, HEC will discuss how to prevent account takeover from taking control of your business by giving you tips and strategies you can implement to improve security. Read on to learn more.
-
A Starting Point for Your Zero-trust Journey
By: Qriar
Type: Product Overview
So, you want to launch your journey to zero trust, but you’re wondering where to begin. This IBM paper advises to set identity and access management (IAM) as your starting point. Read on for more guidance.
-
Top 10 challenges to AI success in financial services… and how to solve them
By: Pure Storage
Type: eBook
Although AI is already having an impact on nearly every facet of business in financial services, one wrong move can lead to automated disaster. Discover in this e-book the top 10 challenges to AI success in financial services… and how to solve them.
-
Graph database: Enable real-time decisions at scale
By: Aerospike
Type: White Paper
Organizations today are turning to multi-model, multi-cloud databases that can be effective and efficient when dealing with different scenarios. Read on to learn about such a database and discover how you can leverage it to make real-time decisions at scale.
-
Memorandum of points and authorities by David Godkin (with highlights) - 20 May 2018
By: TechTarget ComputerWeekly.com
Type: Resource
David Godkin, counsel for app developer Six4Three, outlines the legal arguments that will be used in the case against Facebook, as well as the relevant cases, statutes and authorities that apply.
-
Top 3 Machine Learning use cases for Finance
By: Alteryx
Type: eBook
If there’s one thing finance leaders and professionals need more of, it’s time. But using traditional analysis methods based on historical data is both a tedious and time-consuming manual process. Discover 3 areas where you could use Alteryx Machine Learning to return time to your team in this e-book.
-
A Computer Weekly buyer's guide to graph databases
By: TechTarget ComputerWeekly.com
Type: eBook
In this 14-page buyer's guide, Computer Weekly looks at the technology that teases out connections between divergent datasets – and how it is revolutionising data analysis.
-
The Essential Guide to Security
By: Splunk
Type: eBook
Download The Essential Guide to Security to discover new security use cases as well as how to implement Splunk’s security product suite for advanced security analytics, security automation and orchestration (SOAR), Security Information and Event Management (SIEM), MITRE ATT&CK, machine learning and more, all in one place to power your SOC.