Table of Contents Author Guidelines Submit a Manuscript
Mathematical Problems in Engineering
Volume 2013, Article ID 542314, 8 pages
http://dx.doi.org/10.1155/2013/542314
Research Article

Classification of Hospital Web Security Efficiency Using Data Envelopment Analysis and Support Vector Machine

Department of Computer Science and Information Engineering, National Dong Hwa University, 1, Sec. 2, Da Hsueh Rd., Shou-Feng, Hualien 97401, Taiwan

Received 3 July 2013; Revised 4 September 2013; Accepted 10 September 2013

Academic Editor: Jung-Fa Tsai

Copyright © 2013 Han-Ying Kao et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. M. Jakobsson and S. Myers, Phishing and Countermeasures: Understanding the Increasing Problem of Electronic Identity Theft, Wiley-Interscience, Hoboken, NJ, USA, 2007.
  2. I. Bose and A. C. M. Leung, “Assessing anti-phishing preparedness: a study of online banks in Hong Kong,” Decision Support Systems, vol. 45, no. 4, pp. 897–912, 2008. View at Publisher · View at Google Scholar · View at Scopus
  3. R. Wetzel, “Tackling phishing,” Business Communications Review, vol. 35, no. 2, p. 46, 2005. View at Google Scholar · View at Scopus
  4. Anti-Phishing Working Group, Phishing Activity Trends Report, 2009, http://www.antiphishing.org/reports/apwg_report_Q4_2009.pdf.
  5. Gartner, “Gartner says number of phishing attacks on U.S. consumers increased 40 percent in 2008,” 2009, http://www.gartner.com/it/page.jsp?id=936913.
  6. N. Chou, R. Ledesma, Y. Teraguchi, and J. C. Mitchell, “Client-side defense against web-based identity theft,” in Proceedings of the Annual Network and Distributed System Security Symposium (NDSS '04), 2004.
  7. ISO, “ISO/IEC 27001:2005—information technology—security techniques—information security management systems—requirements,” Tech. Rep., International Organization for Standardization (ISO) and the International Electrotechnical Commission (IEC), 2005. View at Google Scholar
  8. NIST, “NIST special publication 800-12: an introduction to computer security—the NIST handbook,” Tech. Rep., National Institute of Standards and Technology, 2004. View at Google Scholar
  9. eBay, “Spoof email tutorial,” 2010, http://pages.ebay.com/education/spooftutorial/.
  10. S. Srikwan and M. Jakobsson, “Using cartoons to 8 teach internet security,” Tech. Rep., DIMACS, 2007. View at Google Scholar
  11. SonicWALL Phishing and Spam IQ Quiz, 2010, http://survey.mailfrontier.com/survey/quiztest.html.
  12. S. A. Robila and J. W. Ragucci, “Don't be a phish: steps in user education,” in Proceedings of the 11th Annual SIGCSE Conference on Innovation and Technology in Computer Science Education (ITiCSE '06), pp. 237–241, New York, NY, USA, June 2006. View at Scopus
  13. R. D. Banker, A. Charnes, and W. W. Cooper, “Some models for estimating technical and scale inefficiencies in data envelopment analysis,” Management Science, vol. 30, no. 9, pp. 1078–1092, 1984. View at Google Scholar · View at Scopus
  14. A. Charnes and W. W. Cooper, “Programming with linear fractional functionals,” Naval Research Logistics Quarterly, vol. 9, pp. 181–186, 1962. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at MathSciNet
  15. A. Charnes, W. W. Cooper, and E. Rhodes, “Measuring the efficiency of decision making units,” European Journal of Operational Research, vol. 2, no. 6, pp. 429–444, 1978. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at MathSciNet · View at Scopus
  16. J. Garcia-Lacalle and E. Martin, “Rural versus urban hospital performance in a “competitive” public health service,” Social Science and Medicine, vol. 71, no. 6, pp. 1131–1140, 2010. View at Publisher · View at Google Scholar · View at Scopus
  17. S. J. Chang, H. C. Hsiao, L. H. Huang, and H. Chang, “Taiwan quality indicator project and hospital productivity growth,” Omega, vol. 39, no. 1, pp. 14–22, 2011. View at Publisher · View at Google Scholar · View at Scopus
  18. M. Caballer-Tarazona, I. Moya-Clemente, D. Vivas-Consuelo, and I. Barrachina-Martínez, “A model to measure the efficiency of hospital performance,” Mathematical and Computer Modelling, vol. 52, no. 7-8, pp. 1095–1102, 2010. View at Publisher · View at Google Scholar · View at Scopus
  19. Y. Chen, J. Du, H. D. Sherman, and J. Zhu, “DEA model with shared resources and efficiency decomposition,” European Journal of Operational Research, vol. 207, no. 1, pp. 339–349, 2010. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at MathSciNet · View at Scopus
  20. C. H. Huang and H. Y. Kao, “On solving the DEA CCR ratio model,” International Journal of Innovative Computing, Information and Control, vol. 4, no. 11, pp. 2765–2773, 2008. View at Google Scholar · View at Scopus
  21. V. N. Vapnik, The Nature of Statistical Learning Theory, Springer, New York, NY, USA, 1995. View at MathSciNet
  22. V. N. Vapnik, Statistical Learning Theory, John Wiley & Sons, New York, NY, USA, 1998. View at MathSciNet
  23. L. Wang, Ed., Support Vector Machines: Theory and Applications, Springer, Berlin, Germany, 2005.
  24. X. Chen, I. Bose, A. C. M. Leung, and C. Guo, “Assessing the severity of phishing attacks: a hybrid data mining approach,” Decision Support Systems, vol. 50, no. 4, pp. 662–672, 2011. View at Publisher · View at Google Scholar · View at Scopus
  25. K. J. Nishanth, V. Ravi, N. Ankaiah, and I. Bose, “Soft computing based imputation and hybrid data and text mining: the case of predicting the severity of phishing alerts,” Expert Systems with Applications, vol. 39, no. 12, pp. 10583–10589, 2012. View at Publisher · View at Google Scholar · View at Scopus
  26. V. S. Lakshmi and M. S. Vijaya, “Efficient prediction of phishing websites using supervised learning algorithms,” Procedia Engineering, vol. 30, pp. 798–805, 2012. View at Publisher · View at Google Scholar
  27. H. K. Hong, S. H. Ha, C. K. Shin, S. C. Park, and S. H. Kim, “Evaluating the efficiency of system integration projects using data envelopment analysis (DEA) and machine learning,” Expert Systems with Applications, vol. 16, no. 3, pp. 283–296, 1999. View at Google Scholar · View at Scopus
  28. C. C. Chang and C. J. Lin, “LIBSVM—a library for support vector machines,” 2003, http://www.csie.ntu.edu.tw/~cjlin/libsvm/.