1 - 5 of 15
- ItemInformation Technology Governance in the Tunisian Banking Industry: An Exploratory Study(Richtmann Publishing Ltd, 2022-05)Information Technology (IT) has become the foundation for supporting and sustaining businesses. IT strategic importance has prompted many organizations to extend Governance to IT and place it high on their agendas. Banks are among those organizations that heavily use IT to enhance their service delivery capabilities. Besides, globalization, competition, and compliance requirements pushed banks to consider IT Governance as part of their overall corporate governance strategy. Past studies have shown that IT Governance in the financial industry is more mature than in other sectors. However, there is little information about IT Governance in economically developing nations. This article conducted a Delphi study to evaluate the Perceived Efficiency and Ease of Implementation of IT Governance practices in the Tunisian banking industry. The results show that compared with Process and Relational Mechanisms, Structural Practices are perceived to be more effective and easier to implement. This research helps to understand better the current state of IT Governance Implementation in less developed countries. © 2022 Harguem et al.
- ItemTowards Goal-Oriented Software Requirements Elicitation(Institute of Electrical and Electronics Engineers Inc., 2021)Correct and unambiguous software requirements are key to the success of any software engineering project. Eliciting such requirements is a daunting task. In this paper, we present a framework that uses goal orientation as its main building blocks. Unlike other frameworks that have been reported in the literature, this framework strives to balance a compromise between formal methods on one hand and natural language on the other hand in specifying operations. A Chabot for covid-19 is presented to illustrate the framework. © 2021 IEEE.
- ItemPhishing detection based associative classification data mining(Elsevier Ltd, 2014-10-01)Website phishing is considered one of the crucial security challenges for the online community due to the massive numbers of online transactions performed on a daily basis. Website phishing can be described as mimicking a trusted website to obtain sensitive information from online users such as usernames and passwords. Black lists, white lists and the utilisation of search methods are examples of solutions to minimise the risk of this problem. One intelligent approach based on data mining called Associative Classification (AC) seems a potential solution that may effectively detect phishing websites with high accuracy. According to experimental studies, AC often extracts classifiers containing simple "If-Then" rules with a high degree of predictive accuracy. In this paper, we investigate the problem of website phishing using a developed AC method called Multi-label Classifier based Associative Classification (MCAC) to seek its applicability to the phishing problem. We also want to identify features that distinguish phishing websites from legitimate ones. In addition, we survey intelligent approaches used to handle the phishing problem. Experimental results using real data collected from different sources show that AC particularly MCAC detects phishing websites with higher accuracy than other intelligent algorithms. Further, MCAC generates new hidden knowledge (rules) that other algorithms are unable to find and this has improved its classifiers predictive performance. © 2014 Elsevier Ltd. All rights reserved.
- ItemTutorial and critical analysis of phishing websites methods(Elsevier Ireland Ltd, 2015-08-01)The Internet has become an essential component of our everyday social and financial activities. Internet is not important for individual users only but also for organizations, because organizations that offer online trading can achieve a competitive edge by serving worldwide clients. Internet facilitates reaching customers all over the globe without any market place restrictions and with effective use of e-commerce. As a result, the number of customers who rely on the Internet to perform procurements is increasing dramatically. Hundreds of millions of dollars are transferred through the Internet every day. This amount of money was tempting the fraudsters to carry out their fraudulent operations. Hence, Internet users may be vulnerable to different types of web threats, which may cause financial damages, identity theft, loss of private information, brand reputation damage and loss of customers' confidence in e-commerce and online banking. Therefore, suitability of the Internet for commercial transactions becomes doubtful. Phishing is considered a form of web threats that is defined as the art of impersonating a website of an honest enterprise aiming to obtain user's confidential credentials such as usernames, passwords and social security numbers. In this article, the phishing phenomena will be discussed in detail. In addition, we present a survey of the state of the art research on such attack. Moreover, we aim to recognize the up-to-date developments in phishing and its precautionary measures and provide a comprehensive study and evaluation of these researches to realize the gap that is still predominating in this area. This research will mostly focus on the web based phishing detection methods rather than email based detection methods. © 2015 Elsevier Inc.
- ItemA Conceptual Framework on IT Governance Impact on Organizational Performance: A Dynamic Capability Perspective(Richtmann Publishing Ltd, 2021-01-17)Recent years have seen substantial growth in Information Technology Governance (ITG) research. However, the influence of ITG on organizational performance has been less covered and very little theorized. To address this gap, the purpose of this paper is to build a conceptual framework to provide a better understanding of ITG contribution to organizational performance. Based on an extensive literature review on ITG and guided by the dynamic capabilities perspective, the proposed conceptual framework analyses the ITG – Organizational Performance relationship through the lenses of the dynamic capability perspective and generate a set of five research propositions. The proposed framework suggests that the effectiveness of ITG mechanisms (structures, processes, and relational mechanisms), contribute to the development of a dynamic ITG competence which has an impact on the development of IT management capabilities and their evolution. Moreover, the proposed conceptual framework suggests that ITG is more likely to lead to better organizational performance when IT management capabilities are developed in line with business strategy. © 2021 Saida Harguem.