2021 | Decision Support Systems | Citations: 8
Authors: Carvalho, Arthur
Abstract: The ever-increasing reliance on loot boxes by the video game industry has attrac ... Expand
Semantic filters: cryptographic hash function
Topics: loot box blockchain smart contract Ethereum video game
Methods: computational algorithm design artifact design science Pearson's chi squared test of goodness of fit statistical hypothesis test
Theories: decision theory
2021 | Journal of Management Information Systems | Citations: 0
Authors: Zhang, Wenping; Wei, Chih-Ping; Jiang, Qiqi; Peng, Chih-Hung; Zhao, J. Leon
Abstract: The insurance business is characterized by complicated transactional interrelati ... Expand
Semantic filters: cryptographic hash function
Topics: blockchain Bitcoin database system privacy IT manager
Methods: experiment design science applicability check computational algorithm database modeling
Theories: transaction cost economics
2020 | Americas Conference on Information Systems | Citations: 0
Authors: Marella, Venkata; Vijayan, Anoop
Abstract: With the changing landscape of the job market, it is very difficult to secure a ... Expand
Semantic filters: cryptographic hash function
Topics: blockchain Advanced Encryption Standard information privacy law Python privacy
Methods: design science computational algorithm design artifact design process
2019 | HICSS | Citations: 0
Authors: Miller, Daniel Bradford; Gatlin, Jacob; Glisson, William Bradley; Yampolskiy, Mark; McDonald, Jeffery Todd
Abstract: The continued adoption of Additive Manufacturing (AM) technologies is raising co ... Expand
Semantic filters: cryptographic hash function
Topics: production management 3D printing cryptographic hash function open source database system
Methods: experiment case study literature study
2016 | International Journal of Information Management | Citations: 31
Authors: Yaqoob, Ibrar; Hashem, Ibrahim Abaker Targio; Gani, Abdullah; Mokhtar, Salimah; Ahmed, Ejaz; Anuar, Nor Badrul; Vasilakos, Athanasios V.
Abstract: a b s t r a c tBig data is a potential research area receiving considerable att ... Expand
Semantic filters: cryptographic hash function
Topics: big data distributed computing cryptographic hash function parallel computing Cassandra
Methods: case study web mining machine learning social network analysis computational algorithm
2015 | European Conference On Information Systems | Citations: 9
Authors: Brenig, Christian; Accorsi, Rafael; Müller, Günter
Abstract: This paper reports on our research towards an economic analysis of money launder ... Expand
Semantic filters: cryptographic hash function
Topics: cryptocurrency cryptographic hash function public key encryption
Methods: cross sectional research
2014 | Information Systems Frontiers | Citations: 0
Authors: Truong, Toan-Thinh; Tran, Minh-Triet; Duong, Anh-Duc
Abstract: With non-stop growth in network environments, communication security is necessar ... Expand
Semantic filters: cryptographic hash function
Topics: electronic authentication smart card password computer hardware mobile system
Methods: experiment computational algorithm