Skip to main content

Automated Identification and Prioritization of Business Risks in e-service Networks

  • Conference paper
  • First Online:
Exploring Services Science (IESS 2016)

Part of the book series: Lecture Notes in Business Information Processing ((LNBIP,volume 247))

Included in the following conference series:

Abstract

Modern e-service providers rely on service innovation to stay relevant. Once a new service package is designed, implementation-specific aspects such as value (co-)creation and cost/benefit analysis are investigated. However, due to time-to-market or competitive advantage constraints, innovative services are rarely assessed for potential risks of fraud before they are put out on the market. But these risks may result in loss of economic value for actors involved in the e-service’s provision.

Our \(e^{3}fraud\) approach automatically generates and prioritizes undesired-able scenarios from a business value model of the e-service, thereby drastically reducing the time needed to conduct an assessment. We provide examples from telecom service provision to motivate and illustrate the utility of the tool.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Reaves, B., Shernan, E., Bates, A., Carter, H., Traynor, P.: Boxed out: Blocking cellular interconnect bypass fraud at the network edge. In: 24th USENIX Security Symposium (USENIX Security 15), pp. 833–848. Washington, D.C., USENIX Association, August 2015

    Google Scholar 

  2. Mohan, K., Ramesh, B.: Ontology-based support for variability management in product and families. In: Proceedings of the 36th Annual Hawaii International Conference on System Sciences, pp. 9–18, January 2003

    Google Scholar 

  3. Carbo, J., Garcia, J., Molina, J.: Trust and reputation in e-services: concepts, models and applications. In: Lu, J., Zhang, G., Ruan, D. (eds.) E-Service Intelligence. Studies in Computational Intelligence, vol. 37, pp. 327–345. Springer, Berlin Heidelberg (2007)

    Chapter  Google Scholar 

  4. Tan, Y.H., Hofman, W., Gordijn, J., Hulstijn, J.: A framework for the design of service systems. In: Demirkan, H., Spohrer, J.C., Krishna, V. (eds.) Service Systems Implementation. Service Science: Research and Innovations in the Service Economy, pp. 51–74. Springer, New York (2011)

    Chapter  Google Scholar 

  5. Soomro, I., Ahmed, N.: Towards security risk-oriented misuse cases. In: La Rosa, M., Soffer, P. (eds.) BPM Workshops 2012. LNBIP, vol. 132, pp. 689–700. Springer, Heidelberg (2013)

    Chapter  Google Scholar 

  6. Yu, E.S.K.: Models for supporting the redesign of organizational work. In: Proceedings of Conference on Organizational Computing Systems, COCS 1995, pp. 226–236. ACM, New York (1995)

    Google Scholar 

  7. Cahill, M., Lambert, D., Pinheiro, J., Sun, D.: Detecting fraud in the real world. In: Abello, J., Pardalos, P.M., Resende, M.G.C. (eds.) Handbook of Massive Data Sets. Massive Computing, vol. 4, pp. 911–929. Springer, New York (2002)

    Chapter  Google Scholar 

  8. Ionita, D., Wieringa, R.J., Wolos, L., Gordijn, J., Pieters, W.: Using value models for business risk analysis in e-service networks. In: Ralyté, J., et al. (eds.) PoEM 2015. LNBIP, vol. 235, pp. 239–253. Springer, Heidelberg (2015). doi:10.1007/978-3-319-25897-3_16

    Chapter  Google Scholar 

  9. Ruch, M., Sackmann, S.: Customer-specific transaction risk management in e-commerce. In: Nelson, M.L., Shaw, M.J., Strader, T.J. (eds.) AMCIS 2009. LNBIP, vol. 36, pp. 68–79. Springer, Heidelberg (2009)

    Chapter  Google Scholar 

  10. Dritsoula, L., Musacchio, J.: A game of clicks: Economic incentives to fight click fraud in ad networks. Perform. Eval. Rev. 41, 12–15 (2014)

    Article  Google Scholar 

  11. Pieters, W., Banescu, S., Posea, S.: System abuse by service composition: Analysis and prevention. In: CESUN 2012: 3rd International Engineering Systems Symposium Delft University of Technology, The Netherlands, pp. 18–20, June 2012

    Google Scholar 

  12. Bolton, R.J.: Statistical fraud detection: A review. Stat. Sci. 17(3), 235–249 (2002)

    Article  MathSciNet  MATH  Google Scholar 

  13. Gordijn, J., Akkermans, H.: Designing and evaluating e-business models. IEEE Intell. Syst. 16(4), 11–17 (2001)

    Article  Google Scholar 

  14. Gerpott, T.J.: Biased choice of a mobile telephony tariff type: Exploring usage boundary perceptions as a cognitive cause in choosing between a use-based or a flat rate plan. Telematics Inform. 26(2), 167–179 (2009)

    Article  Google Scholar 

  15. Scourias, J.: Overview of the global system for mobile communications. Technical report (1995)

    Google Scholar 

  16. Gordijn, J., Akkermans, H., van Vliet, H.: Business modelling is not process modelling. In: Mayr, H.C., Liddle, S.W., Thalheim, B. (eds.) ER Workshops 2000. LNCS, vol. 1921, pp. 40–51. Springer, Heidelberg (2000)

    Chapter  Google Scholar 

  17. Ionita, D., Koenen, S.K., Wieringa, R.J.: Modelling telecom fraud with e3value. Technical report TR-CTIT-14-11, Centre for Telematics and Information Technology, University of Twente, Enschede, October 2014

    Google Scholar 

  18. Ross, S.: How does revenue sharing work in practice? Investopedia (2015). http://www.investopedia.com/ask/answers/010915/how-does-revenue-sharing-work-practice.asp. Accessed 12 December 2015

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Dan Ionita .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing Switzerland

About this paper

Cite this paper

Ionita, D., Wieringa, R.J., Gordijn, J. (2016). Automated Identification and Prioritization of Business Risks in e-service Networks. In: Borangiu, T., Dragoicea, M., Nóvoa, H. (eds) Exploring Services Science. IESS 2016. Lecture Notes in Business Information Processing, vol 247. Springer, Cham. https://doi.org/10.1007/978-3-319-32689-4_42

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-32689-4_42

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-32688-7

  • Online ISBN: 978-3-319-32689-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics