{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,31]],"date-time":"2026-01-31T03:59:04Z","timestamp":1769831944463,"version":"3.49.0"},"reference-count":70,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2024]]},"DOI":"10.1109\/access.2024.3488321","type":"journal-article","created":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T17:55:34Z","timestamp":1730310934000},"page":"165068-165080","source":"Crossref","is-referenced-by-count":5,"title":["Using AI to Improve Risk Management: A Case Study of a Leading Telecommunications Provider"],"prefix":"10.1109","volume":"12","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8121-8735","authenticated-orcid":false,"given":"Helena","family":"Richard","sequence":"first","affiliation":[{"name":"Institute of IT Management and Digitization (IFID), FOM University of Applied Sciences, Dusseldorf, Germany"}]},{"given":"Peter","family":"Dornheim","sequence":"additional","affiliation":[{"name":"Technische Universit&#x00E4;t Berlin, Berlin, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5090-0651","authenticated-orcid":false,"given":"Thorsten","family":"Weber","sequence":"additional","affiliation":[{"name":"Institute of IT Management and Digitization (IFID), FOM University of Applied Sciences, Dusseldorf, Germany"}]}],"member":"263","reference":[{"issue":"19","key":"ref1","doi-asserted-by":"crossref","first-page":"81","DOI":"10.3991\/ijim.v16i19.32093","article-title":"Security and privacy challenges of big data adoption: A qualitative study in telecommunication industry","volume":"16","author":"Anawar","year":"2022","journal-title":"Int. J. Interact. Mobile Technol. (iJIM)"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.23919\/SoftCOM58365.2023.10271658"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"272","DOI":"10.4337\/9781839106750.00028","article-title":"Chapter 17: The future of cyber risk management: AI and DLT for automated cyber risk modelling, decision making, and risk transfer","volume-title":"Handbook of Research on Artificial Intelligence, Innovation and Entrepreneurship","author":"Pandey","year":"2023"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1515\/jcbtp-2017-0003"},{"key":"ref5","first-page":"288","volume-title":"Corporate Risk Management: Unternehmensweites Risikomanagement ALS F\u00fchrungsaufgabe","author":"Exner","year":"2019"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-658-23480-5"},{"issue":"2","key":"ref7","first-page":"225","article-title":"Risk management and risk management failure: Lessons for business enterprises","volume":"3","author":"Fadun","year":"2013","journal-title":"Int. J. Acad. Res. Bus. Social Sci."},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/P19-1139"},{"issue":"2","key":"ref9","article-title":"Extraction and classification of risk-related sentences from securities reports","volume-title":"Int. J. Inf. Manage. Data Insights","volume":"2","author":"Fujii","year":"2022"},{"key":"ref10","article-title":"BERT: Pre-training of deep bidirectional transformers for language understanding","author":"Devlin","year":"2018","journal-title":"arXiv:1810.04805"},{"key":"ref11","first-page":"1","article-title":"Attention is all you need","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","volume":"30","author":"Vaswani"},{"issue":"4","key":"ref12","doi-asserted-by":"crossref","DOI":"10.1016\/j.asej.2023.102605","article-title":"Attention-based contextual local and global features for urgent posts classification in MOOCs discussion forums","volume":"15","author":"El-Rashidy","year":"2024","journal-title":"Ain Shams Eng. J."},{"issue":"4","key":"ref13","first-page":"13","article-title":"The CRISP-DM model: The new blueprint for data mining","volume":"5","author":"Shearer","year":"2000","journal-title":"J. Data Warehousing"},{"key":"ref14","first-page":"1","article-title":"Reconstructing the giant: On the importance of rigour in documenting the literature search process","volume-title":"Proc. ECIS","author":"Brocke"},{"key":"ref15","volume-title":"Risk Management\u2014Guidelines","year":"2018"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-36689-5"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.21125\/inted.2021.0201"},{"key":"ref18","volume-title":"Business Assurance Dimension Framework\u2014An Excerpt From GB1004","author":"Forum","year":"2020"},{"key":"ref19","first-page":"1","article-title":"Translation","volume-title":"Proc. Conf. Mech. Transl.","author":"Weaver"},{"key":"ref20","volume-title":"The History of Machine Translation in a Nutshell","author":"Hutchins","year":"2005"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1126\/science.aaa8685"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/MCI.2018.2840738"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-022-13428-4"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2020.2979670"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-10-5209-5_1"},{"key":"ref26","first-page":"704","volume-title":"Handbook of Natural Language Processing","author":"McDonald","year":"2000"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.48550\/ARXIV.1907.11692"},{"key":"ref28","article-title":"DeBERTa: Decoding-enhanced BERT with disentangled attention","author":"He","year":"2020","journal-title":"arXiv:2006.03654"},{"issue":"5","key":"ref29","first-page":"8968","article-title":"ERNIE 2.0: A continual pre-training framework for language understanding","volume-title":"Proc. AAAI Conf. Artif. Intell.","volume":"34","author":"Sun"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/W18-5446"},{"key":"ref31","volume-title":"The Stanford Question Answering Dataset","year":"2022"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2020.acl-main.740"},{"key":"ref33","first-page":"248","article-title":"Domain and task adaptive pretraining for language models","volume-title":"Proc. Workshop Comput. Humanities Res.","author":"Konle"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1007\/s42979-022-01563-6"},{"key":"ref35","first-page":"3892","article-title":"Evaluation of transfer learning and domain adaptation for analyzing German-speaking job advertisements","volume-title":"Proc. 13th Lang. Resour. Eval. Conf.","author":"Gnehm"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.26615\/978-954-452-072-4_090"},{"key":"ref37","first-page":"1","article-title":"A domain-adaptive pre-training approach for language bias detection in news","volume-title":"Proc. ACM\/IEEE Joint Conf. Digit. Libraries (JCDL)","author":"Krieger"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1017\/S026988891300043X"},{"key":"ref39","first-page":"12","article-title":"Single-class classification","volume-title":"Proc. LARS Symp.","author":"Minter"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-8655(97)00049-4"},{"issue":"4","key":"ref41","doi-asserted-by":"crossref","first-page":"217","DOI":"10.1049\/ip-vis:19941330","article-title":"Novelty detection and neural network validation","volume":"141","author":"Bishop","year":"1994","journal-title":"IEE Proc. -Vis., Image, Signal Process."},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1145\/1541880.1541882"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1186\/s40537-021-00514-x"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2013.12.026"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/IWSSIP55020.2022.9854496"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/DepCoS-RELCOMEX.2008.32"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/CyberC.2013.22"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.3390\/info10040150"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1038\/nmeth.3945"},{"key":"ref50","volume-title":"Classification: Precision and Recall","year":"2023"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-658-30153-8"},{"key":"ref52","volume-title":"Classification: Roc Curve and AUC","year":"2023"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2020.3036524"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.5121\/csit.2021.111501"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1038\/nbt1206-1565"},{"key":"ref56","volume-title":"Machine Learning Algorithms: Popular Algorithms for Data Science and Machine Learning","author":"Bonaccorso","year":"2018"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/UKSim.2018.00018"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.11591\/ijece.v10i5.pp5497-5506"},{"key":"ref59","first-page":"284","volume-title":"Python Natural Language Processing Cookbook: Over 50 Recipes To Understand, Analyze, and Generate Text for Implementing Language Processing Tasks","author":"Anti\u0107","year":"2021"},{"key":"ref60","volume-title":"Glue Leaderboard","year":"2023"},{"key":"ref61","volume-title":"Superglue Leaderboard","year":"2023"},{"key":"ref62","volume-title":"Hugging Face Platform","year":"2023"},{"key":"ref63","volume-title":"Spacy Models Documentation","year":"2023"},{"key":"ref64","volume-title":"Dataproc","year":"2023"},{"key":"ref65","volume-title":"Compute Engine Machine Types for General Purposes","year":"2023"},{"key":"ref66","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4842-5177-5","volume-title":"Beginning Anomaly Detection Using Python-based Deep Learning: With Keras and PyTorch","author":"Alla","year":"2019"},{"key":"ref67","volume-title":"Eine Arbeitsstunde Kostete Im Jahr 2022 Im Schnitt 39,50 Euro","year":"2023"},{"key":"ref68","volume-title":"Google Cloud-Cost-Calculator","year":"2023"},{"key":"ref69","volume-title":"Aktuelle Strompreise","year":"2023"},{"key":"ref70","volume-title":"Adopting Neural Language Models for Telecom\u2014Ericsson","year":"2022"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/6287639\/10380310\/10738795.pdf?arnumber=10738795","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,27]],"date-time":"2024-11-27T04:37:57Z","timestamp":1732682277000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10738795\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"references-count":70,"URL":"https:\/\/doi.org\/10.1109\/access.2024.3488321","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024]]}}}