Article ID: | iaor20022612 |
Country: | United Kingdom |
Volume: | 52 |
Issue: | 10 |
Start Page Number: | 1159 |
End Page Number: | 1164 |
Publication Date: | Oct 2001 |
Journal: | Journal of the Operational Research Society |
Authors: | Hansen J.V. |
Keywords: | communication, computers: information |
When a corporation begins exchanging business transactions over the Internet, the Internet becomes part of the corporate computer network. With access now available not only to the emloyees, but potentially to anyone else on the Internet, the scope of security concerns expands significantly. A variety of useful security software is available for controlling unauthorized intrusion, data corruption, and other potential vulnerabilities. These controls are subject, however, to vulnerability or inadequacy. The consequent losses can be mitigated by checking their performance periodically. This paper addresses current Internet commerce security problems and outlines selected optimization models and artificial intelligence methods that can be useful in scheduling the monitoring of related controls.