Browsing Faculty of Business & Information Technology by Title
Now showing items 9-18 of 18
-
Filtering honeywords using probabilistic context free grammar
(2023-10-01)With the growing prevalence of cyber threats, effective password policies have become crucial for safeguarding sensitive information. Traditional password-based authentication techniques are open to a number of threats. ... -
A game-theoretic model for co-promotions: Choosing a complementary versus an independent product ally
(Elsevier, 2015-07)This paper studies the optimal choice of promotional partners in a three-firm market where two firms sell complementary products and a third firm sells an independent product. Game-theoretic models are developed to investigate ... -
Guarding the gate: using honeywords to enhance authentication security
(2023-10-01)A honeyword (false password) can be defined as a duplicate password (rearranged) resembling the same characteristics of the original password. It is very challenging for any cyberpunk to distinguish between a real password ... -
Informational and/or Transactional Websites: Strategic Choices in a Distribution Channel
(Elsevier, 2017)While most businesses have faced the decision of whether to operate an informational and/or a transactional website, the literature on website selection in marketing channels remains very sparse. This paper proposes an ... -
Matching expectations and reality in AI systems - cybersecurity use case
(2023-04-01)Artificial intelligence (AI) is a growing field in computer science which develops intelligent systems capable of performing things that a human mind can do. The manufacturers of security systems integrate AI capabilities ... -
Modeling reward expiry for loyalty programs in a competitive market
(2017-08-10)This paper investigates reward expiry for loyalty programs. It provides insights into the profitability of setting reward expiry for competing firms and identifies conditions under which such a policy would be beneficial. ... -
Privacy Implications of GSM Network Services
(2013-07-15)Current research on GSM does not deal with privacy requirements, or confuses privacy (legislated) with security (standards based). This paper seeks to examine how the applicable privacy legislation in Canada (PIPEDA) would ... -
Security Analysis of Onos Software-Defined Network Platform
(2016-10-12)Software Defined Networking (SDN) enables organizations strengthen their network architectures, reduce running costs and enable sophisticated network functions. The adoption of software defined networks by top industry ... -
Should Companies Jointly Promote their Complementary Products when they Compete in other Product Categories?
(ScienceDirect, 2016-12)Joint promotions, whereby companies pool marketing resources to promote their brands, are increasingly used to reduce marketing costs and develop common business opportunities, but formal knowledge about how they should ... -
Systems and models for secure fallback authentication
(2018-12-01)Fallback authentication (FA) techniques such as security questions, Email resets, and SMS resets have significant security flaws that easily undermine the primary method of authentication. Security questions have been shown ...