Designing fuzzy expert system for chief privacy officer in government and businesses E-transactions

Publish Year: 1394
نوع سند: مقاله ژورنالی
زبان: English
View: 174

This Paper With 20 Page And PDF Format Ready To Download

  • Certificate
  • من نویسنده این مقاله هستم

این Paper در بخشهای موضوعی زیر دسته بندی شده است:

استخراج به نرم افزارهای پژوهشی:

لینک ثابت به این Paper:

شناسه ملی سند علمی:

JR_JITM-7-3_003

تاریخ نمایه سازی: 26 بهمن 1400

Abstract:

The Chief Privacy Officers (CPO) are faced with many and varied responsibilities and roles. In this paper, a fuzzy expert system is designed, called "Chief Privacy Officer Fuzzy Expert System (CPOFEX)", to inform the Chief Privacy Officer about "the Status of the Privacy of Government and Businesses (G-B) E-Transactions". To develop the research model and knowledge base of the mentioned expert system, the concepts of “the Chief Privacy Officers (CPO) Capability“, “Electronic Crimes Intents“, “Type of Government and Business E-Transactions“, “Professional Ethics-Orientation in E-Transactions Parties“, “Privacy Protector Technologies in Enterprise“ were identified, as components of "the Status of the Privacy of Government and Businesses E-Transactions". To validate the mentioned expert system, the outputs of the system were compared with the experts views. This system can help to analyze "the status of the privacy of government and businesses e-transactions", and provide more accurate advices.

Keywords:

chief privacy officer , Expert system , Fuzzy logic , government and businesses e-transactions

Authors

شعبان الهی

Associate Prof., Information Technology Management Department, Faculty of Management and Economic, Tarbiat Modares University, Tehran, Iran

مصطفی رشیدی

MSc. in Information Technology Management, Faculty of Management and Economic, Tarbiat Modares University, Tehran, Iran

محمود صادقی

Associate Prof., Private Law Department, Faculty of Law, Tarbiat Modares University, Tehran, Iran

مراجع و منابع این Paper:

لیست زیر مراجع و منابع استفاده شده در این Paper را نمایش می دهد. این مراجع به صورت کاملا ماشینی و بر اساس هوش مصنوعی استخراج شده اند و لذا ممکن است دارای اشکالاتی باشند که به مرور زمان دقت استخراج این محتوا افزایش می یابد. مراجعی که مقالات مربوط به آنها در سیویلیکا نمایه شده و پیدا شده اند، به خود Paper لینک شده اند :
  • Arias-Aranda, D., Castro, J.L., Navarro, M., Sánchez, J.M., Zurita, J.M. ...
  • Aslani, H.R. (۲۰۰۶). Information Technology Laws. Tehran: Mizan Publications ...
  • (in Persian)Awazu, Y. & Desouza, K. C. (۲۰۰۴). The Knowledge ...
  • Azar, A, Fani, A.A. & Dajkhosh, S.S. (۲۰۱۳). Modeling Business ...
  • Belanger, F. & Hiller, J.S. (۲۰۰۶). A framework for e-government: ...
  • Beldad, A., de Jong, M. & Steehouder, M. (۲۰۱۰). Reading ...
  • Bella, G., Giustolisi, R. & Riccobene, S. (۲۰۱۱). Enforcing privacy ...
  • A Study on the Effect of Perceived Security on the Trust of Female Customers in the Internet Banking: (A Survey of the SADERAT BANK in Semnan) [مقاله ژورنالی]
  • Dimick, C. (۲۰۱۲). The new privacy officer. Journal of AHIMA/American ...
  • Dinev, T. & Hart, P. (۲۰۰۶). An extended privacy calculus ...
  • Elahi, Sh. & Hassanzadeh, A. (۲۰۰۹). A framework for evaluating ...
  • Elahi, Sh., Khadivar, A. & Hassanzadeh, A. (۲۰۱۲). Designing a ...
  • Effects of Consumer Characteristics on their Acceptance of Online Shopping: A Survey in Faculty of Management, University of Tehran [مقاله ژورنالی]
  • Hochberg, J., Jackson, K., Stallings, C., McClary, J.F., DuBois, D. ...
  • Hosseini Dolwlat Abadi, F. (۲۰۰۱). The Ethical Conscience and ways ...
  • (in Persian)Jensen, C., Potts, C. & Jensen, C. (۲۰۰۵). Privacy ...
  • Jutla, D.N., Bodorik, P. & Zhang, Y. (۲۰۰۶). PeCAN: An ...
  • Kailay, M. P. & Peter, J. (۱۹۹۵). RAMeX: a prototype ...
  • Kalloniatis, Ch., Belsis, P. & Gritzalis, S. (۲۰۱۱). A soft ...
  • Karami, A. & Guerrero-Zapatab, M. (۲۰۱۵). A Fuzzy anomaly detection ...
  • Karat, J., Karat, C.M., Brodie, C. & Feng, J. (۲۰۰۵). ...
  • Le Blanc, L. A. & Jelassi, T. (۱۹۹۱). an evaluation ...
  • Li, J., Li, J., Chen, X., Liu, Zh. & Jia, ...
  • Liao, SH. (۲۰۰۵). Expert system methodologies and applications-a decade review ...
  • Longley, D. & Rigby, S. (۱۹۹۲). An automatic search for ...
  • Majdalawieh, M. (۲۰۱۰). The Integrated Privacy Model: Building a Privacy ...
  • Miah, Sh., Kerr, D. & Gammack, J.G. (۲۰۰۹). A methodology ...
  • Naderi, A & Ghaseminezhad, Y. (۲۰۱۴). Investigating the Indicators Affecting ...
  • Qin, B., Zhou, X., Yang, J. & Song, C. (۲۰۰۶). ...
  • Reddick, C.G. & Roy, J. (۲۰۱۳). Business perceptions and satisfaction ...
  • Reza Karimi, M., Sepandarand, S. & Haghshenas, F. (۲۰۱۲). Study ...
  • Rezmierski, V. E. & Marshall, R. S. (۲۰۰۲). University systems ...
  • Shamsi, Z. (۲۰۱۴). Designing a Fuzzy expert system for selecting ...
  • (in Persian)Sivanandam, S. N., Sumathi, S. & Deepa, S.N. (۲۰۰۷). ...
  • Summers, R. C. & Kurzban, S.A. (۱۹۸۸). Potential applications of ...
  • Investigating Security in Developed Information Systems through Service oriented Architecture (SOA) [مقاله ژورنالی]
  • Bank card fraud detection using artificial neural network [مقاله ژورنالی]
  • Xu, D.L., Liu, J., Yang, J.B., Liu, G.P., Wang, J., ...
  • نمایش کامل مراجع