Einsatz von Big-Data-Erkenntnissen und aufbereiteten Informationen zur Betrugsbekämpfung
By: IBM (German) View more from IBM (German) >>
Download this next:
Analyst report: How finance teams can manage digital growth
By: Avalara
Type: Analyst Report
Given that digital transformation is evolving at a dizzying pace, and that such transformation drives new customer preferences, businesses must adapt to remain competitive.
This Aberdeen Strategy and Research report zeroes in on how finance teams are meeting that challenge.
Read the CFO’s State of Commerce Playbook to learn about:
- The five riskiest business obstacles facing finance teams
- Key capabilities that can support digital commerce strategies
- And much more
These are also closely related to: "Einsatz von Big-Data-Erkenntnissen und aufbereiteten Informationen zur Betrugsbekämpfung"
-
AI proves value in HR, but handle with care
By: TechTarget ComputerWeekly.com
Type: eGuide
Artificial Intelligence could be, and often is, seen as a bogeyman in HR. The infamous Amazon case, widely reported in 2018, where a recruitment algorithm decided not to consider women candidates because of their gender, basing itself on past data, is a byword for how things can go wrong with AI in HR.
But AI is also proving its value for HR. The Amazon debacle, which came to light in 2015, leading to the termination of that specific project in 2017, has not stopped companies using AI to standardise recruitment. And Amazon said it had never used the rogue algorithm for real, in any case.
The increasing prominence of AI, and other digital technologies, means that organisations are also being forced to re-skill the workforces they have recruited and retained. Even CIOs will need to up their game to stay relevant, we find.
And, contrary to popular common wisdom that AI is bound to be on the side of the bosses and against the workers, we also see, in this e-guide, how the allocation of work by algorithm might have advantages for workers as well as employers, even in the so-called “gig economy”.
Moreover, there is more to advanced HR software use than AI. In this e-guide we see it being used, in richly detailed case studies, at a strategic level by a trio of companies: at the merged Standard Life and Aberdeen Asset Management, The Gym Group, using data analytics to support expansion , and Agfa-Gevaert, to effect a spin-off.
-
Analyst report: Take control of your data with cloud ERP
By: SAP
Type: Analyst Report
The demand for timely and accurate financial information to enable data-driven business decisions has put a constant strain on financial teams at mid-market companies.
Without strong data management and monitoring capabilities, they struggle to find ways to connect disparate data sources and enable a holistic view of the business – not to mention dealing with the risk of data loss and cyber threats.
In this analyst report, you’ll discover how a cloud ERP system can help organizations overcome the symptoms of siloed data and drive productivity by solving core challenges for financial teams. Read on to learn how you can build a foundation for success.
Find more content like what you just read:
-
Computer Weekly datacentre case studies
By: TechTarget ComputerWeekly.com
Type: Case Study
Jim Mortleman takes a look at what made the winning entries stand out from the crowd in the Computer Weekly European User Awards.
-
Managing Integrated Communications, Consumerization and Security: Best Practices
By: TechTarget Security
Type: eGuide
This E-Guide explores the necessity of integrated communications and how they are changing the collaboration and productivity of many organizations. View now for best practices to tackling the challenges you are likely to face and to meeting the needs of integrated communications – for both your organization AND your end-users.
-
SIP contact centers: Key benefits and potential challenges
By: TechTarget Security
Type: eGuide
Learn how Session Initiation Protocol (SIP), unified communications (UC) and contact centers fit hand in hand in this e-guide from SearchUnifiedCommunications.com.
-
E-Book: Technical Guide on PCI
By: TechTarget Security
Type: eBook
TechTarget’s Security Media Group presents a global look at PCI, and how it is impacted by today’s evolving business needs. Our technical editors from the U.S., Europe, India and Asia provide their respective regions’ perspective on PCI compliance.
-
Security leader’s guide to reducing risk in minutes
By: Security Journey
Type: White Paper
Cyberattacks are on the rise, and leading the vanguard of this influx are injection vulnerabilities and other attacks that prey on weak code security practices. This white paper outlines the critical need of secure coding training, analyzing the means to implementing programs. Download the white paper now to learn more.
-
Computer Weekly - 17 December 2019: How data analytics is improving the world's greatest tennis players
By: TechTarget ComputerWeekly.com
Type: Ezine
In this week's Computer Weekly, we talk to the organisation that runs men's tennis worldwide to find out how data analytics is transforming the sport. Intel processors delays will affect Windows 10 upgrades – we examine the implications. And we ask if AI is living up to the hype in enterprise IT. Read the issue now.
-
Fraud management: A perennial business issue
By: TechTarget ComputerWeekly.com
Type: eGuide
In this e-guide we will explore the current cyber fraud landscape and look at some organisations in the region that are using technology to overcome the challenges posed by fraudsters.
-
Data Management Strategies for the CIO
By: TechTarget Data Center
Type: eBook
CIOs are turning to emerging forms of data management, including predictive business intelligence and information architectures, to harness the power of their data. Inside this expert e-book, gain insight on data management topics such as storage and retention policies, data protection and lifecycle management.
-
Risk management is the beating heart of your cyber strategy
By: TechTarget ComputerWeekly.com
Type: eBook
In this E-Guide we will explore four separate aspects of this wide-ranging topic area, beginning with a look ahead at some of the most impactful and significant data privacy trends likely to affect your risk and compliance strategy during 2022.
-
Case study: How PayPal improved its fraud detection strategy
By: AWS & Intel
Type: Case Study
Like most banking services, PayPal experiences fraud challenges. To improve security and identify emerging threats in real-time, they realized they needed to process and analyze more data faster. Download this case study now to learn how PayPal was able to overcome the limitations of its legacy infrastructure and stay secure.
-
Top 10 business applications stories of 2019
By: TechTarget ComputerWeekly.com
Type: eGuide
The steady incursion of artificial intelligence (AI) into enterprise software was a major theme behind Computer Weekly's indepth stories in this area in 2019. Human versus machine is the opposition that looms over much of the coverage here. Here are Computer Weekly's top 10 business applications stories of 2019.
-
Delivering better user experiences with identity orchestration
By: Ping Identity Corporation
Type: White Paper
Digital transformation has fundamentally changed the way businesses operate and interact with their customers. Identity orchestration presents a means of curating world-class user experiences without heavy custom coding or an army of developers, focused instead on maximizing existing technology investments and infrastructure. Read on to learn more.
-
CW ASEAN November 2016
By: TechTarget Security
Type: Ezine
Small businesses in the ASEAN region could unknowingly be allowing hackers to access large corporate networks.
-
How to reap the rewards from SMS with new APIs
By: 8x8
Type: Case Study
When this financial services organization started to run into problems with their email engagement and marketing strategies, they began to seek out an SMS solution that could help them combat fraud and improve the customer experience without placing extra burdens on their team. Browse the case study to hear the full story.
-
CW Europe - June-August 2020: 5G rush in Russia
By: TechTarget ComputerWeekly.com
Type: eGuide
Russian mobile operators are pooling their resources to help them overcome the technical challenges of creating 5G networks. Also read how Swedbank is rebuilding its anti-money laundering systems after a damning report, and how a public-private partnership in the Netherlands is helping to combat cyber fraudsters.
-
CW Europe - June-August 2020: 5G rush in Russia
By: TechTarget ComputerWeekly.com
Type: Ezine
Russian mobile operators are pooling their resources to help them overcome the technical challenges of creating 5G networks. Also read how Swedbank is rebuilding its anti-money laundering systems after a damning report, and how a public-private partnership in the Netherlands is helping to combat cyber fraudsters.
-
Computer Weekly - 8 February 2022: Exploring the metaverse
By: TechTarget ComputerWeekly.com
Type: Ezine
In this week's Computer Weekly, the metaverse is set to become a highly competitive commercial playground –profitable markets but also high-profile failures will follow. IT contractors have been hit by cyber attacks on the firms that pay their wages – we examine the impact. And we ask if it's time to plan for quantum computing. Read the issue now.
-
Computer Weekly - 14 September 2021: Is 3D printing about to hit the mainstream?
By: TechTarget ComputerWeekly.com
Type: Ezine
In this week's Computer Weekly, we find out about the emerging consumer services using 3D printing and ask if the technology is about to go mainstream. Our latest buyer's guide looks at the importance of sustainable datacentres. And we analyse the risks of increasing contactless card spending limits and whether tech could help. Read the issue now.
-
Computer Weekly – 16 August 2022: Broadband reaches for the stars – the new space race
By: TechTarget ComputerWeekly.com
Type: Ezine
In this week's Computer Weekly, we look at the latest space race, as satellite firms compete to provide high-speed connectivity. Is the datacentre sector hindering house building in the UK? We find out what's really going on. And we talk to the IT director of the Mercedes Formula One team about how data helps to win races. Read the issue now.
-
A Computer Weekly buyer's guide to expense management
By: TechTarget ComputerWeekly.com
Type: eBook
Every year, UK businesses deal with about £10bn in expenses claims, but surprisingly few use IT to manage that spend. In this 12-page buyer's guide, Computer Weekly looks at how the application of expense management tools can reward organisations with immediate cost and time savings
-
Hacking the Human Operating System
By: TechTarget ComputerWeekly.com
Type: Essential Guide
Cyber attackers often bypass the consciousness of their targets and attempt to manipulate victims through subconscious influences. This report from Intel Security offers advice on how to mitigate these risks.
-
Financial leader’s guide to the FCPA violations
By: Oversight Systems
Type: White Paper
For any business, it’s critical to know the ins and outs of the Foreign Corrupt Practices Act (FCPA) intended to ensure compliance and punish bribery. But with so many violations to know, it can be tricky to mitigate risk while keeping up with potential changes and new policies. Browse this white paper to learn more.
-
CIO Trends #11: Benelux
By: TechTarget ComputerWeekly.com
Type: eGuide
The Netherlands is a nation leading the world in terms of digital, so it is to be expected that bit also leads the works in securing digital assets. In this e-guide read about a report that has damning conclusions on the IT security of some of the airport's core systems.
-
CIO Trends #11: Benelux
By: TechTarget ComputerWeekly.com
Type: eGuide
The Netherlands is a nation leading the world in terms of digital, so it is to be expected that bit also leads the works in securing digital assets. In this e-guide read about a report that has damning conclusions on the IT security of some of the airport's core systems.
-
How Oversight helped White Cap fight fraud
By: Oversight Systems
Type: Case Study
White Cap Construction Supply distributes construction materials to contractors across 450 branches. With so much infrastructure comes an equally large quantity of data. Read the case study now to learn how Oversight helped White Cap tighten up procure-to-pay operations and fight fraud.
-
Trusted AI innovation: How to deliver value at scale
By: Teradata
Type: Webcast
Generative AI is poised to create a massive impact on enterprise value, and it’s already opening the doorway to new frontiers in productivity and innovation. This webcast will provide you with an overview of a comprehensive cloud analytics and data platform for trusted AI innovation. Tune in to learn how you can accelerate your AI journey.
-
AI in Fraud Management: Uses cases, benefits and challenges
By: TechTarget ComputerWeekly.com
Type: eGuide
AI is involved in many cybersecurity processes. Now, AI has its sights set on improving the fraud detection and management landscape. In this e-guide, learn about the use cases, as well as the benefits and challenges organisations should keep in mind when implementing AI into their fraud detection and management processes.
-
Guide to managing customer identities
By: Ping Identity Corporation
Type: White Paper
In today’s digital landscape, customers have formed some strong opinions on how easy it should be for them to consume these digital services. This guide to CIAM is designed to help you navigate the complex demands of today’s customers while ensuring the security of their entrusted data. Read on to learn more.
-
-
Biometrics in the enterprise: An opportunity or an ethical minefield?
By: TechTarget ComputerWeekly.com
Type: eGuide
Is biometric technology ready for use in the enterprise to help improve IT security? IT leaders need to be aware of the concerns. In this e-guide we take a look at some of the potential – as well as the risks.
-
-
Essential Guide to Threat Management
By: TechTarget Security
Type: eGuide
Our Expert Essential Guide to Threat Management explores the best ways to defend against modern threats and targeted attacks. Malicious insiders have placed a bull’s eye on your organization’s back, waiting to strike at just the right time.
-
-
Malware Attacks Demand a New Malware Defense Approach
By: TechTarget Security
Type: eGuide
Customized, targeted malware attacks require new defense measures beyond those currently in place. This e-guide from SearchSecurity.com offers advice on protecting your organization from these new threats. View now to learn more!
-
How to unlock business value with AI & cloud analytics
By: SAS
Type: eBook
In this e-book, you’ll discover how the partnership between SAS and Microsoft can help organisations unlock the potential of the cloud to deliver cost savings and innovation, including 5 real world use cases across a variety of industries. Read on to learn how your organisation can accelerate your cloud analytics and AI journey.
-
AI & Data Analytics in Financial Services: A Use Case Library
By: Dataiku
Type: eBook
In this 41-page e-book, you’ll discover a library of use cases for analytics and AI designed to help financial services organizations get ahead in their data journey. Read on to learn how you can develop a competitive advantage across all the different functions of your organization.
-
The myth of email as proof of communication
By: TechTarget ComputerWeekly.com
Type: Analyst Report
Increasingly, there is a need for organisations to be able to prove the content of communications between themselves and other parties. Analyst group Quocirca looks at the options.
-
7 top predictive analytics use cases
By: TechTarget ComputerWeekly.com
Type: eGuide
Across industries, companies are using predictive analytics to forecast future trends and actions. Learn about the most popular use cases for predictive analytics.
-
AI for accounts payable: The key to mitigating risk
By: Oversight Systems
Type: eBook
As today’s finance teams work to improve their controls and reduce fraud, error, misconduct, and non-compliance, many have turned to AI for help. However, some organizations are hesitant to use this technology, especially when it comes to their accounts payable (AP) processes. Browse this e-book to learn more.
-
Predictive analytics gains evermore accuracy in guiding enterprises forward
By: TechTarget ComputerWeekly.com
Type: eBook
Predictive analytics can help businesses look for meaningful patterns in data, then build models that forecast what is likely to happen in the future.
-
A guide to where mainframes fit in the cloud
By: TechTarget ComputerWeekly.com
Type: eBook
Far from being legacy IT, the mainframe is a driving force in modern computing. In this e-guide we look at its place in cloud computing.
-
The balancing act: Earning trust through convenience and security
By: Ping Identity Corporation
Type: Analyst Report
When customers can’t log in, they’re willing to stay logged out. But convenience isn’t the only thing you need to account for, as data privacy is still paramount. Read this report to learn more about the expectations of the modern user, and how you can balance a seamless login experience with a high level of security.
-
8 big data use cases for businesses
By: TechTarget ComputerWeekly.com
Type: eGuide
For businesses, the ability to deal with big data is important: it can bring companies significant business value, from enabling cost optimization and improved efficiency to providing better customer insight. In this article, we'll explore 8 use cases that show big data's profound impact on businesses across different industry sectors.
-
10 common uses for machine learning applications in business
By: TechTarget ComputerWeekly.com
Type: eGuide
Machine learning (ML) enables businesses to perform tasks on a scale previously thought impossible. As a result, many organizations are finding ways to harness ML to not just drive efficiencies but to fuel new business opportunities. Here are 10 applications of ML that are being used to solve problems & deliver tangible business benefits:
-
Digital secure remote payment: How Apple Pay can change the future of remote payments
By: TechTarget ComputerWeekly.com
Type: Research Content
Apple Pay introduces EMV cryptographic strength to remote payments for in-app payments on the iPhone and interconnected Apple devices. It has the potential to reduce card-not-present (CNP) fraud.
-
Time and Attendance Software Best Practices
By: TechTarget Business Analytics
Type: eGuide
In this informative e-guide, discover insights on time and attendance software best practices.
-
A Starting Point for Your Zero-trust Journey
By: Qriar
Type: Product Overview
So, you want to launch your journey to zero trust, but you’re wondering where to begin. This IBM paper advises to set identity and access management (IAM) as your starting point. Read on for more guidance.