{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:40:52Z","timestamp":1742913652499,"version":"3.40.3"},"publisher-location":"Cham","reference-count":19,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319584683"},{"type":"electronic","value":"9783319584690"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-58469-0_37","type":"book-chapter","created":{"date-parts":[[2017,5,3]],"date-time":"2017-05-03T11:34:53Z","timestamp":1493811293000},"page":"553-567","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Using Fraud Patterns for Fraud Risk Assessment of E-services"],"prefix":"10.1007","author":[{"given":"Ahmed Seid","family":"Yesuf","sequence":"first","affiliation":[]},{"given":"Jetzabel","family":"Serna-Olvera","sequence":"additional","affiliation":[]},{"given":"Kai","family":"Rannenberg","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,5,4]]},"reference":[{"key":"37_CR1","doi-asserted-by":"crossref","unstructured":"Zuccato, A., Daniels, N., Jampathom, C.: Service security requirement profiles for telecom: how software engineers may tackle security. In: Sixth International Conference on Availability, Reliability and Security. IEEE (2011)","DOI":"10.1109\/ARES.2011.81"},{"issue":"1","key":"37_CR2","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1016\/j.istr.2010.10.012","volume":"16","author":"Y Rebahi","year":"2011","unstructured":"Rebahi, Y., Nassar, M., Magedanz, T., Festor, O.: A survey on fraud and service misuse in voice over IP (VoIP) networks. Inf. Secur. Tech. Rep. 16(1), 12\u201319 (2011)","journal-title":"Inf. Secur. Tech. Rep."},{"key":"37_CR3","unstructured":"CFCA: Global telecom fraud report. Technical report, Communications Fraud Control Association (2000\u20132015)"},{"key":"37_CR4","unstructured":"Yesuf, A.S.: A review of risk identification approaches in the telecommunication domain. In: The 3rd International Conference on Information Systems Security and Privacy, ICISSP (2017)"},{"key":"37_CR5","series-title":"Lecture Notes in Business Information Processing","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-56925-3_26","volume-title":"Exploring Services Science","author":"AS Yesuf","year":"2017","unstructured":"Yesuf, A.S., Wolos, L., Rannenberg, K.: Fraud risk modelling: requirements elicitation in the case of telecom services. In: Za, S., Dr\u0103agoicea, M., Cavallari, M. (eds.) IESS 2017. LNBIP, vol. 279. Springer, Cham (2017)"},{"key":"37_CR6","doi-asserted-by":"publisher","first-page":"90","DOI":"10.1016\/j.jnca.2016.04.007","volume":"68","author":"A Abdallah","year":"2016","unstructured":"Abdallah, A., Maarof, M.A., Zainal, A.: Fraud detection system: a survey. J. Netw. Comput. Appl. 68, 90\u2013113 (2016)","journal-title":"J. Netw. Comput. Appl."},{"issue":"7","key":"37_CR7","doi-asserted-by":"publisher","first-page":"721","DOI":"10.1016\/j.knosys.2008.03.026","volume":"21","author":"CS Hilas","year":"2008","unstructured":"Hilas, C.S., Mastorocostas, P.A.: An application of supervised and unsupervised learning approaches to telecommunications fraud detection. Knowl. Based Syst. 21(7), 721\u2013726 (2008)","journal-title":"Knowl. Based Syst."},{"key":"37_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"199","DOI":"10.1007\/978-3-642-12368-9_14","volume-title":"Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices","author":"I Ruiz-Agundez","year":"2010","unstructured":"Ruiz-Agundez, I., Penya, Y.K., Garcia Bringas, P.: Fraud detection for voice over IP services on next-generation networks. In: Samarati, P., Tunstall, M., Posegga, J., Markantonakis, K., Sauveron, D. (eds.) WISTP 2010. LNCS, vol. 6033, pp. 199\u2013212. Springer, Heidelberg (2010). doi:10.1007\/978-3-642-12368-9_14"},{"issue":"1","key":"37_CR9","doi-asserted-by":"publisher","first-page":"182","DOI":"10.1016\/j.engappai.2010.05.009","volume":"24","author":"H Farvaresh","year":"2011","unstructured":"Farvaresh, H., Sepehri, M.M.: A data mining framework for detecting subscription fraud in telecommunication. Eng. Appl. Artif. Intell. 24(1), 182\u2013194 (2011)","journal-title":"Eng. Appl. Artif. Intell."},{"key":"37_CR10","series-title":"Lecture Notes in Business Information Processing","doi-asserted-by":"publisher","first-page":"239","DOI":"10.1007\/978-3-319-25897-3_16","volume-title":"The Practice of Enterprise Modeling","author":"D Ionita","year":"2015","unstructured":"Ionita, D., Wieringa, R.J., Wolos, L., Gordijn, J., Pieters, W.: Using value models for business risk analysis in e-Service networks. In: Ralyt\u00e9, J., Espa\u00f1a, S., Pastor, \u00d3. (eds.) PoEM 2015. LNBIP, vol. 235, pp. 239\u2013253. Springer, Cham (2015). doi:10.1007\/978-3-319-25897-3_16"},{"key":"37_CR11","series-title":"Lecture Notes in Business Information Processing","doi-asserted-by":"publisher","first-page":"102","DOI":"10.1007\/978-3-319-48393-1_8","volume-title":"The Practice of Enterprise Modeling","author":"D Ionita","year":"2016","unstructured":"Ionita, D., Gordijn, J., Yesuf, A.S., Wieringa, R.: Value-driven risk analysis of coordination models. In: Horkoff, J., Jeusfeld, M.A., Persson, A. (eds.) PoEM 2016. LNBIP, vol. 267, pp. 102\u2013116. Springer, Cham (2016). doi:10.1007\/978-3-319-48393-1_8"},{"key":"37_CR12","unstructured":"ISO\/TC 262 Risk management: ISO 31000:2009, ISO 31000:2009 Risk Management - Principles and Guidelines (2009)"},{"key":"37_CR13","first-page":"61801","volume":"51","author":"J Yoder","year":"1998","unstructured":"Yoder, J., Barcalow, J.: Architectural patterns for enabling application security. Urbana 51, 61801 (1998)","journal-title":"Urbana"},{"key":"37_CR14","unstructured":"Braga, A., Rubira, C., Dahab, R.: Tropyc: a pattern language for cryptographic software (1999)"},{"key":"37_CR15","volume-title":"Security Patterns: Integrating Security and Systems Engineering","author":"M Schumacher","year":"2013","unstructured":"Schumacher, M., Fernandez-Buglioni, E., Hybertson, D., Buschmann, F., Sommerlad, P.: Security Patterns: Integrating Security and Systems Engineering. Wiley, West Sussex (2013)"},{"key":"37_CR16","doi-asserted-by":"publisher","first-page":"289","DOI":"10.1007\/978-3-642-12544-7_16","volume-title":"Intentional Perspectives on Information Systems Engineering","author":"\u00c9 Dubois","year":"2010","unstructured":"Dubois, \u00c9., Heymans, P., Mayer, N., Matulevi\u010dius, R.: A systematic approach to define the domain of information system security risk management. In: Nurcan, S., Salinesi, C., Souveyet, C., Ralyt\u00e9, J. (eds.) Intentional Perspectives on Information Systems Engineering, pp. 289\u2013306. Springer, Heidelberg (2010)"},{"key":"37_CR17","unstructured":"Rosas, E., Analide, C.: Telecommunications fraud: problem analysis-an agent-based KDD perspective. Aveiro: EPIA 2009 (2009)"},{"issue":"7","key":"37_CR18","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1016\/S1361-3723(10)70082-8","volume":"2010","author":"M Ghosh","year":"2010","unstructured":"Ghosh, M.: Telecoms fraud. Comput. Fraud Secur. 2010(7), 14\u201317 (2010)","journal-title":"Comput. Fraud Secur."},{"key":"37_CR19","series-title":"Lecture Notes in Business Information Processing","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1007\/978-3-319-25897-3_5","volume-title":"The Practice of Enterprise Modeling","author":"A Rrenja","year":"2015","unstructured":"Rrenja, A., Matulevi\u010dius, R.: Pattern-based security requirements derivation from secure tropos models. In: Ralyt\u00e9, J., Espa\u00f1a, S., Pastor, \u00d3. (eds.) PoEM 2015. LNBIP, vol. 235, pp. 59\u201374. Springer, Cham (2015). doi:10.1007\/978-3-319-25897-3_5"}],"container-title":["IFIP Advances in Information and Communication Technology","ICT Systems Security and Privacy Protection"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-58469-0_37","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,22]],"date-time":"2021-05-22T00:09:19Z","timestamp":1621642159000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-58469-0_37"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319584683","9783319584690"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-58469-0_37","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1868-422X"}],"subject":[],"published":{"date-parts":[[2017]]},"assertion":[{"value":"4 May 2017","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SEC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"IFIP International Conference on ICT Systems Security and Privacy Protection","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Rome","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Italy","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2017","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 May 2017","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"31 May 2017","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"32","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"sec2017","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/ifipsec.org\/2017\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}