Showing 1–20 of 53 results
A Guide to the National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework (2.0)
A Guide to the National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework (2.0) presents a comprehensive discussion of the tasks, knowledge, skill, and ability (KSA) requirements of the NICE Cybersecurity Workforce Framework 2.0. It discusses in detail the relationship between the NICE framework and the NIST’s cybersecurity framework (CSF), showing how the NICE model specifies what the particular specialty areas of the workforce should be doing in order to ensure that the CSF’s identification, protection, defense, response, or recovery functions are being carried out properly. The authors construct a detailed picture of the proper organization and conduct of a strategic infrastructure security operation, describing how these two frameworks provide an explicit definition of the field of cybersecurity. The book is unique in that it is based on well-accepted standard recommendations rather than presumed expertise. It is the first book to align with and explain the requirements of a national-level initiative to standardize the study of information security. Moreover, it contains knowledge elements that represent the first fully validated and authoritative body of knowledge (BOK) in cybersecurity. The book is divided into two parts: The first part is comprised of three chapters that give you a comprehensive understanding of the structure and intent of the NICE model, its various elements, and their detailed contents. The second part contains seven chapters that introduce you to each knowledge area individually. Together, these parts help you build a comprehensive understanding of how to organize and execute a cybersecurity workforce definition using standard best practice.
About the Author
Daniel P Shoemaker, PhD, is principal investigator and senior research scientist at the University of Detroit Mercy’s Center for Cyber Security and Intelligence Studies. Dan has served 30 years as a professor at UDM with 25 of those years as department chair. He served as a co-chair for both the Workforce Training and Education and the Software and Supply Chain Assurance Initiatives for the Department of Homeland Security, and was a subject matter expert for the NICE Cybersecurity Workforce Framework 2.0. Dan has coauthored six books in the field of cybersecurity and has authored more than one hundred journal publications. Dan earned his PhD from the University of Michigan. Anne Kohnke, PhD, is an assistant professor of IT at Lawrence Technological University and teaches courses in both the information technology and organization development/change management disciplines at the bachelor through doctorate levels. Anne started as an adjunct professor in 2002 and joined the faculty full time in 2011. Her IT career started in the mid-1980s on a help desk, and over the years, Anne developed technical proficiency as a database administrator, network administrator, systems analyst, and technical project manager. After a decade, Anne was promoted to management and worked as an IT director, vice president of IT and chief information security officer (CISO). Anne earned her PhD from Benedictine University. Ken Sigler is a faculty member of the Computer Information Systems (CIS) program at the Auburn Hills campus of Oakland Community College in Michigan. His primary research is in the areas of software management, software assurance, and cloud computing. He developed the college’s CIS program option entitled “Information Technologies for Homeland Security.” Until 2007, Ken served as the liaison for the college to the International Cybersecurity Education Coalition (ICSEC), of which he is one of three founding members. Ken is a member of IEEE, the Distributed Management Task Force (DMTF), and the Association for Information Systems (AIS).
The first comprehensive guide to discovering and preventing attacks on the Android OS As the Android operating system continues to increase its share of the smartphone market, smartphone hacking remains a growing threat. Written by experts who rank among the world’s foremost Android security researchers, this book presents vulnerability discovery, analysis, and exploitation tools for the good guys. Following a detailed explanation of how the Android OS works and its overall security architecture, the authors examine how vulnerabilities can be discovered and exploits developed for various system components, preparing you to defend against them. If you are a mobile device administrator, security researcher, Android app developer, or consultant responsible for evaluating Android security, you will find this guide is essential to your toolbox. A crack team of leading Android security researchers explain Android security risks, security design and architecture, rooting, fuzz testing, and vulnerability analysis Covers Android application building blocks and security as well as debugging and auditing Android apps Prepares mobile device administrators, security researchers, Android app developers, and security consultants to defend Android systems against attack Android Hacker’s Handbook is the first comprehensive resource for IT professionals charged with smartphone security.
About the Author
JOSHUA J. DRAKE is a Director of Research Science at Accuvant LABS. PAU OLIVA FORA is a Mobile Security Engineer with viaForensics. ZACH LANIER is a Senior Security Researcher at Duo Security. COLLIN MULLINER is a postdoctoral researcher at Northeastern University. STEPHEN A. RIDLEY is a Principal Researcher with Xipiter. GEORG WICHERSKI is a Senior Security Researcher with CrowdStrike.
An expert guide to selecting the right cloud service model for your business Cloud computing is all the rage, allowing for the delivery of computing and storage capacity to a diverse community of end-recipients. However, before you can decide on a cloud model, you need to determine what the ideal cloud service model is for your business. Helping you cut through all the haze, Architecting the Cloud is vendor neutral and guides you in making one of the most critical technology decisions that you will face: selecting the right cloud service model(s) based on a combination of both business and technology requirements. Guides corporations through key cloud design considerations Discusses the pros and cons of each cloud service model Highlights major design considerations in areas such as security, data privacy, logging, data storage, SLA monitoring, and more Clearly defines the services cloud providers offer for each service model and the cloud services IT must provide Arming you with the information you need to choose the right cloud service provider, Architecting the Cloud is a comprehensive guide covering everything you need to be aware of in selecting the right cloud service model for you.
About the Author
MICHAEL J. KAVIS is Principal Architect at Cloud Technology Partners, a vendor independent, cloud-exclusive, nimble alternative to large technology consultants. He has served in numerous technical roles such as CTO, Chief Architect, and Vice President and has over 25 years of experience in software development and architecture. Kavis is a pioneer in cloud computing and led a team that built the worlds first high-speed transaction network in Amazons public cloud. He is the former CTO of startup M-Dot Network, which won the 2010 Amazon AWS Global Startup Challenge.
Building on the successful top-down approach of previous editions, the Sixth Edition of Computer Networking continues with an early emphasis on application-layer paradigms and application programming interfaces (the top layer), encouraging a hands-on experience with protocols and networking concepts, before working down the protocol stack to more abstract layers.
This book has become the dominant book for this course because of the authors’ reputations, the precision of explanation, the quality of the art program, and the value of their own supplements.
Computer Security: Principles and Practice, 2e, is ideal for courses in Computer/Network Security.
In recent years, the need for education in computer security and related topics has grown dramatically – and is essential for anyone studying Computer Science or Computer Engineering. This is the only text available to provide integrated, comprehensive, up-to-date coverage of the broad range of topics in this subject. In addition to an extensive pedagogical program, the book provides unparalleled support for both research and modeling projects, giving students a broader perspective.
A strong business focus through a solid technical presentation of security tools. Boyle/Panko provides a strong business focus along with a solid technical understanding of security tools. This text gives readers the IT security skills they need for the workplace. This edition is more business focused and contains additional hands-on projects, coverage of wireless and data security, and case studies.
For one-semester, undergraduate- or graduate-level courses in Cryptography, Computer Security, and Network Security A practical survey of cryptography and network security with unmatched support for instructors and students In this age of universal electronic connectivity, viruses and hackers, electronic eavesdropping, and electronic fraud, security is paramount. This text provides a practical survey of both the principles and practice of cryptography and network security. First, the basic issues to be addressed by a network security capability are explored through a tutorial and survey of cryptography and network security technology. Then, the practice of network security is explored via practical applications that have been implemented and are in use today. An unparalleled support package for instructors and students ensures a successful teaching and learning experience. Teaching and Learning Experience To provide a better teaching and learning experience, for both instructors and students, this program will: *Support Instructors and Students: An unparalleled support package for instructors and students ensures a successful teaching and learning experience. *Apply Theory and/or the Most Updated Research: A practical survey of both the principles and practice of cryptography and network security. *Engage Students with Hands-on Projects: Relevant projects demonstrate the importance of the subject, offer a real-world perspective, and keep students interested.
Cyber Security for Industrial Control Systems: From the Viewpoint of Close-Loop provides a comprehensive technical guide on up-to-date new secure defending theories and technologies, novel design, and systematic understanding of secure architecture with practical applications. The book consists of 10 chapters, which are divided into three parts. The first three chapters extensively introduce secure state estimation technologies, providing a systematic presentation on the latest progress in security issues regarding state estimation. The next five chapters focus on the design of secure feedback control technologies in industrial control systems, displaying an extraordinary difference from that of traditional secure defending approaches from the viewpoint of network and communication. The last two chapters elaborate on the systematic secure control architecture and algorithms for various concrete application scenarios. The authors provide detailed descriptions on attack model and strategy analysis, intrusion detection, secure state estimation and control, game theory in closed-loop systems, and various cyber security applications. The book is useful to anyone interested in secure theories and technologies for industrial control systems.
About the Author
Peng Cheng earned his BE degree in automation and his PhD degree in control science and engineering from Zhejiang University in 2004 and 2009, respectively. He was a research fellow at the National University of Singapore from 2010 to 2011 and at Singapore University of Technology and Design from 2012 to 2013. Currently, he is a full professor with the Department of Control Science and Engineering at Zhejiang University. He has served as associate editor of Wireless Networks and International Journal of Communication Systems, and as guest editor of IEEE Transactions on Control of Network Systems. His research interests include networked sensing and control, cyber-physical systems, control system security, and robust control theory and applications. Heng Zhang earned his BSc degree in mathematics from Jiangsu Normal University in 2004, his masters degree in mathematics and PhD in control science and engineering from Zhejiang University in 2006 and 2015, respectively. He is a faculty member of Huaihai Institute of Technology, China. He was a visiting student in the Department of Electronic and Computer Engineering, Hong Kong University of Science and Technology in fall, 2012. He has served as a guest editor of Peer-to-Peer Networking and Applications. His research interests include security and privacy in cyber-physical systems, networked control systems, and optimization theory. Jiming Chen earned his BSc degree and PhD degree in control science and engineering from Zhejiang University in 2000 and 2005, respectively. He was a visiting researcher at INRIA in 2006, National University of Singapore in 2007, and University of Waterloo from 2008 to 2010. Currently, he is a full professor with the Department of Control Science and Engineering, group coordinator of Networked Sensing and Control, vice director of the State Key Laboratory of Industrial Control Technology, and vice director of the Institute of Industrial Process Control at Zhejiang University, China.
Data Security for Modern Enterprises: Data Security in the World of Cloud Computing, Big Data, Data Science, and Modern Attacks 1st Edition
This practical book provides an overview of the security challenges, practices, and blueprints for today's data storage and analysis systems to protect against current and emerging attackers. It includes the organizational, strategic, and technological depth to design a modern data security practice within any organization. Most commercial and government organizations face two major drivers for their enterprises: the increasing use of cloud services and a deluge of data for mining. If you're involved with one of these organizations, you need to understand how to use these technologies alongside the compliance, privacy, and data theft requirements. Learn the nature of emerging data security threats Ensure data security and privacy while enabling data exploration and analysis Scale security to meet new needs as new regulations and compliance requirements emerge Establish a rigorous team that will ensure data security Employ technology that adopts the appropriate security policy automatically.
About the Author
Peter Guerra is a Vice President in Booz Allen Hamilton's Strategic Innovation Group co-leading the Data Science team. He has been a software and security consultant to government and commercial organizations throughout his diverse IT career, focusing on software development, systems engineering, and highly available system design. Mr. Guerra holds an MBA from Loyola University, a B.A. degree in English and B.S. degree in Computer and Information Science both from University of Maryland. Drew Farris is a senior technologist and software developer at Booz Allen Hamilton where he helps his clients solve problems related to large scale analytics, distributed computing and machine learning. He is a member of the Apache Software Foundation, mentors and contributes a number of open source software projects and holds a master's degree in Information Resource Management from Syracuse University's iSchool.
Everything in the book will have practical application for information security professionals. The entire purpose of data analysis and visualization is to gather feedback from the environment to make better and more informed technology decisions. Within information security that means identifying ways to prevent or detect breaches and then measuring the effectiveness in doing so, which is all wrapped up under “risk management.” All of the examples will be directed at answering real-world questions. One of the key points is not just to analyze what is in front of us, but collect and analyze the data we need to answer the questions that will lead to better decisions and prevention of hacks and vulnerabilities.
The book will present the core elements of analyzing I.T. system data and information security feedback by using 30 use cases and domain-specific data sets with a focus on practical “how-to.” This hands-on approach will be covered in context and will not be limited to just the analysis, but all the supporting skills needed to learn from our data. Data analysis from start to finish: from the data collection and preparation through the data storage and management fundamentals then into the analysis and finally data visualization and communication techniques all in the context of security.Use cases will include: Discovering anomalous firewall trafficHow to acquire and prepare security dataCreating a repeatable data analysis toolkit and workflowWhitehat stats reportSecurity event correlationVulnerability countsUsing inferential stats to detect malware outbreaksVisualizing system logsMapping BotnetsUsing NLP and Data Loss PreventionPredicting rogue behaviorHow to perform predictive analytics.
About the Author
Jay Jacobs is the coauthor of Verizon Data Breach Investigation Reports and the cofounder of the Society of Information Risk Analysts, where he currently sits on the board of directors. Bob Rudis is the Director of Enterprise Information Security & IT Risk Management at Liberty Mutual Insurance and was named one of the Top 25 Influencers in Information Security by Tripwire .
Electronically Stored Information: The Complete Guide to Management, Understanding, Acquisition, Storage, Search, and Retrieval 2nd Edition
Although we live in an era in which we are surrounded by an ever-deepening fog of data, few of us truly understand how the data are created, where data are stored, or how to retrieve or destroy data-if that is indeed possible. This book is for all of you, whatever your need or interest. Electronically Stored Information: The Complete Guide to Management, Understanding, Acquisition, Storage, Search, and Retrieval, Second Edition explains the reasons you need to know about electronic data. It also gets into great detail about the how, what, when, and where of what is known in legal circles as electronically stored information (ESI). With easy-to-understand explanations and guidelines, this book provides the practical understanding you need to effectively manage the complex world of ESI. Whether you are an attorney, judge, paralegal, business manager or owner, or just one of the ever-growing population of computer users, you will benefit from the information presented in this book.
About the Author
David Matthews has worked in the information technology (IT) field since 1992. He began working for the City of Seattle as the technology manager for the Legislative Department (City Council) in 1998. In early 2005, he was selected to be the first Deputy CISO for the city. In his work for the city, he developed and created an incident response plan that is compliant with the National Incident Management System (NIMS)/Incident Command System (ICS); updated and extensively rewrote the city’s information security policy; and created and taught training courses on information security and forensics. He created an IT primer for the city’s law department as part of his collaboration with them on e-discovery issues. In 2012, he was recruited by Expedia, Inc. to develop and lead their global cyber incident response team. He created and exercised a plan that integrated with their network response and disaster recovery plans and led a team located both in the United States and India. He retired in 2014 and is now doing consultant work mostly with local governments and critical infrastructure to enhance their cyber response and resiliency capabilities.
Enable employees to be productive and access data from any location or device Protect both corporate assets and employee privacy, so your people can be fully productive from any device, anywhere. Learn how to use Microsoft Intune to manage applications to satisfy your unique requirements, make the most of Mobile Device Management (MDM) for Office 365, and defend on-premises resources with Microsoft Advanced Threat Analytics (ATA). Plan, deploy, and deliver complete enterprise mobility while improving security * Choose the right Microsoft enterprise mobility solution for your organization* Protect apps and data with Microsoft Intune Mobile Application Management (MAM)* Identify suspicious user or device activity in hybrid cloud/on-premises environments* Prepare for and successfully implement Microsoft ATA* Flexibly manage diverse mobile devices with MDM for Office 365* Configure access, define policies, enroll mobile devices, and manage compliance
About the Author
YURI DIOGENES is a Senior Content Developer on the CSI Enterprise Mobility Team, focusing on BYOD and Azure Security Center. Previously, Yuri has worked as a writer for the Windows Security Team and as a Support Escalation Engineer for the CSS Forefront Team, also at Microsoft. He has a Master of Science degree in Cybersecurity Intelligence and Forensics from UTICA College and an MBA from FGF in Brazil, and he holds several industry certifications. He is co-author of Enterprise Mobility Suite: Managing BYOD and Company-Owned Devices (Microsoft Press, 2015), Microsoft Forefront Threat Management Gateway (TMG) Administrator’s Companion (Microsoft Press, 2010), and three other Forefront titles from Microsoft Press. JEFF GILBERT is a Senior Content Publishing Manager on the Enterprise Mobility Team at Microsoft. He manages the documentation teams supporting Microsoft System Center Configuration Manager and Microsoft Intune. Prior to returning to management, he was responsible for authoring cross-product solutions to IT business problems involving enterprise client-management technologies, including Microsoft System Center Configuration Manager, Microsoft Intune, and MDOP. Previously, Jeff was the content publishing manager for MDOP and a senior technical writing lead for the Configuration Manager 2007 documentation team. Before joining Microsoft, Jeff was an SMS administrator with the US Army. Jeff is a regular speaker on enterprise client management and MDOP technologies at conferences including the Microsoft Management Summit (MMS), TechEd, ITDev Connections, and the Minnesota Management Summit (MMS). ROBERT MAZZOLI is a Senior Content Developer with Microsoft on the Enterprise Mobility team, working on developing enterprise mobility solutions using the Microsoft Enterprise Mobility Suite and MDM for Office 365. Robert joined the Enterprise Mobility team in 2014 and has been a speaker on enterprise mobility solutions and mobile device management at several conferences, including Ignite 2015 and the 2015 Microsoft MVP Summit. Previously, Robert was a Senior Content Developer for Microsoft Exchange Server and Exchange Online in Office 365, specializing in Exchange hybrid deployments and managing the Exchange Server Deployment Assistant. Before joining Microsoft, Robert owned an information technology consulting business and served as an officer in the United States Navy.
The convergence of knowledge, technology, and human performance which comprises today’s enterprise allows creative business process design. Thus, an organization can create new and innovative ways to service customers or to do business with suppliers and make itself a leader in its field. This capability relies on a successful strategy that integrates the enterprise. Enterprise Systems Integration, Second Edition continues to provide you with the business insight and the technical know-how that ensures successful systems integration.The book combines the perspectives, knowledge, and experience of more than 70 experts in the various areas that involve enterprise integration. Their expertise ranges from hands-on experience with technology and project management to the higher-level issues of business and management strategy. Each chapter examines an issue or technology relevant to today’s enterprise. Collectively, these chapters span the range of enterprise computing and systems integration. Once armed with the strategy and technologies, you must successfully deploy ERP systems within budget and on time. In addition, you must be able to integrate them into the rest of the enterprise. Still, ERP software does not make up the full picture of today’s enterprise. Legacy systems, e-commerce and other Web-based systems, client/server applications, networks and communications systems, data warehousing, and integrated databases enter into the mix. Enterprise Systems Integration, Second Edition paints a comprehensive picture of the technologies that comprise today’s enterprise and shows you how to make them work together.
Understand and implement VMware Virtual SAN: the heart of tomorrow’s Software-Defined Datacenter (SDDC) VMware’s breakthrough Software-Defined Datacenter (SDDC) initiative can help you virtualize your entire datacenter: compute, storage, networks, and associated services. Central to SDDC is VMware Virtual SAN (VSAN): a fully distributed storage architecture seamlessly integrated into the hypervisor and capable of scaling to meet any enterprise storage requirement. Now, the leaders of VMware’s wildly popular Virtual SAN previews have written the first authoritative guide to this pivotal technology. You’ll learn what Virtual SAN is, exactly what it offers, how to implement it, and how to maximize its value. Writing for administrators, consultants, and architects, Cormac Hogan and Duncan Epping show how Virtual SAN implements both object-based storage and a policy platform that simplifies VM storage placement. You’ll learn how Virtual SAN and vSphere work together to dramatically improve resiliency, scale-out storage functionality, and control over QoS. Both an up-to-the-minute reference and hands-on tutorial, Essential Virtual SAN uses realistic examples to demonstrate Virtual SAN’s most powerful capabilities. You’ll learn how to plan, architect, and deploy Virtual SAN successfully, avoid gotchas, and troubleshoot problems once you’re up and running. Coverage includes * Understanding the key goals and concepts of Software-Defined Storage and Virtual SAN technology * Meeting physical and virtual requirements for safe Virtual SAN implementation * Installing and configuring Virtual SAN for your unique environment * Using Storage Policy Based Management to control availability, performance, and reliability * Simplifying deployment with VM Storage Policies * Discovering key Virtual SAN architectural details: caching I/O, VASA, witnesses, pass-through RAID, and more * Ensuring efficient day-to-day Virtual SAN management and maintenance * Interoperating with other VMware features and products * Designing and sizing Virtual SAN clusters * Troubleshooting, monitoring, and performance optimization.
About the Author
Cormac Hogan is a storage architect in the Integration Engineering team at VMware. Cormac was one of the first VMware employees at the EMEA headquarters in Cork, Ireland, back in 2005, and has previously held roles in VMware’s Technical Marketing and Support organizations. Cormac has written a number of storage-related white papers and has given numerous presentations on storage best practices and new features. Cormac is the owner of CormacHogan.com, a blog site dedicated to storage and virtualization. He can be followed on twitter @CormacJHogan. Duncan Epping is a principal architect working for VMware R&D. Duncan is responsible for exploring new possibilities with existing products and features, researching new business opportunities for VMware. Duncan specializes in software-defined storage, hyperconverged platforms, and availability solutions. Duncan was among the first VMware Certified Design Experts (VCDX 007). Duncan is the owner of Yellow-Bricks.com and author of various books, including the VMware vSphere Clustering Technical Deepdive series. He can be followed on twitter @DuncanYB.
Framing Internet Safety: The Governance of Youth Online (The John D. and Catherine T. MacArthur Foundation Series on Digital Media and Learning)
Since the beginning of the Internet era, it has become almost impossible to discuss youth and technology without mentioning online danger — pornography that is just a click away, lurking sexual predators, and inescapable cyberbullies. In this book, Nathan Fisk takes an innovative approach to the subject, examining youth Internet safety as a technology of governance — for information technologies and, by extension, for the forms of sociality and society they make possible. He argues that it is through the mobilization of various discourses of online risk that the everyday lives of youth are increasingly monitored and policed and the governing potentials of information technologies are explored. Fisk relates particular panics over youth Internet safety to patterns of technological adoption by young people, focusing on the policy response at the federal level aimed at producing future cybercitizens. He describes pedagogies of surveillance, which position parents as agents of surveillance; the evolution of the youth Internet safety curricula, as seen through materials on cyberbullying and online reputation management; and, drawing on survey results and focus groups, parent and child everyday practice. Finally, Fisk offers recommendations for a “cybersafety of everyday life,” connecting youth Internet safety to trends in national infrastructure protection and corporate information assurance.
About the Author
Nathan W. Fisk is Assistant Professor of Cybersecurity Education Education at the University of South Florida and and faculty affiliate of the Florida Center for Cybersecurity. He is among the first cohort of Fulbright Cybersecurity Scholars.
Fraud Analytics Using Descriptive, Predictive, and Social Network Techniques: A Guide to Data Science for Fraud Detection (Wiley and SAS Business Series) 1st Edition
Detect fraud earlier to mitigate loss and prevent cascading damage Fraud Analytics Using Descriptive, Predictive, and Social Network Techniques is an authoritative guidebook for setting up a comprehensive fraud detection analytics solution. Early detection is a key factor in mitigating fraud damage, but it involves more specialized techniques than detecting fraud at the more advanced stages. This invaluable guide details both the theory and technical aspects of these techniques, and provides expert insight into streamlining implementation. Coverage includes data gathering, preprocessing, model building, and post-implementation, with comprehensive guidance on various learning techniques and the data types utilized by each. These techniques are effective for fraud detection across industry boundaries, including applications in insurance fraud, credit card fraud, anti-money laundering, healthcare fraud, telecommunications fraud, click fraud, tax evasion, and more, giving you a highly practical framework for fraud prevention. It is estimated that a typical organization loses about 5% of its revenue to fraud every year. More effective fraud detection is possible, and this book describes the various analytical techniques your organization must implement to put a stop to the revenue leak. * Examine fraud patterns in historical data * Utilize labeled, unlabeled, and networked data * Detect fraud before the damage cascades * Reduce losses, increase recovery, and tighten security The longer fraud is allowed to go on, the more harm it causes. It expands exponentially, sending ripples of damage throughout the organization, and becomes more and more complex to track, stop, and reverse. Fraud prevention relies on early and effective fraud detection, enabled by the techniques discussed here. Fraud Analytics Using Descriptive, Predictive, and Social Network Techniques helps you stop fraud in its tracks, and eliminate the opportunities for future occurrence.
About the Author
BART BAESENS is a full professor at KU Leuven, and a lecturer at the University of Southampton. He has done extensive research on analytics, customer relationship management, web analytics, fraud detection, and credit risk management. He regularly advises and provides consulting support to international firms with respect to their analytics and credit risk management strategy. VERONIQUE VAN VLASSELAER is a PhD researcher in the Department of Decision Sciences and Information Management at KU Leuven. Her research focuses on the development of new techniques for fraud detection by combining predictive and network analytics. WOUTER VERBEKE is an assistant professor at Vrije Universiteit Brussel (Brussels, Belgium). His research is situated in the field of predictive analytics and complex network analysis with applications in fraud, marketing, credit risk, human resources management, and mobility.