Semantic Filter
show all semantic filters
Found 7 articles
  • Bringing transparency and trustworthiness to loot boxes with blockchain and smart contracts

    PDF

    2021 | Decision Support Systems | Citations: 8

    Authors: Carvalho, Arthur

    Abstract: The ever-increasing reliance on loot boxes by the video game industry has attrac ... Expand

    Semantic filters: cryptographic hash function

    Topics: loot box blockchain smart contract Ethereum video game

    Methods: computational algorithm design artifact design science Pearson's chi squared test of goodness of fit statistical hypothesis test

    Theories: decision theory

  • Beyond the Block: A Novel Blockchain-Based Technical Model for Long-Term Care Insurance

    PDF

    2021 | Journal of Management Information Systems | Citations: 0

    Authors: Zhang, Wenping; Wei, Chih-Ping; Jiang, Qiqi; Peng, Chih-Hung; Zhao, J. Leon

    Abstract: The insurance business is characterized by complicated transactional interrelati ... Expand

    Semantic filters: cryptographic hash function

    Topics: blockchain Bitcoin database system privacy IT manager

    Methods: experiment design science applicability check computational algorithm database modeling

    Theories: transaction cost economics

  • Document Verification using Blockchain for Trusted CV Information

    2020 | Americas Conference on Information Systems | Citations: 0

    Authors: Marella, Venkata; Vijayan, Anoop

    Abstract: With the changing landscape of the job market, it is very difficult to secure a ... Expand

    Semantic filters: cryptographic hash function

    Topics: blockchain Advanced Encryption Standard information privacy law Python privacy

    Methods: design science computational algorithm design artifact design process

  • Investigating 3D Printer Residual Data

    2019 | HICSS | Citations: 0

    Authors: Miller, Daniel Bradford; Gatlin, Jacob; Glisson, William Bradley; Yampolskiy, Mark; McDonald, Jeffery Todd

    Abstract: The continued adoption of Additive Manufacturing (AM) technologies is raising co ... Expand

    Semantic filters: cryptographic hash function

    Topics: production management 3D printing cryptographic hash function open source database system

    Methods: experiment case study literature study

  • Big data: From beginning to future

    PDF

    2016 | International Journal of Information Management | Citations: 31

    Authors: Yaqoob, Ibrar; Hashem, Ibrahim Abaker Targio; Gani, Abdullah; Mokhtar, Salimah; Ahmed, Ejaz; Anuar, Nor Badrul; Vasilakos, Athanasios V.

    Abstract: a b s t r a c tBig data is a potential research area receiving considerable att ... Expand

    Semantic filters: cryptographic hash function

    Topics: big data distributed computing cryptographic hash function parallel computing Cassandra

    Methods: case study web mining machine learning social network analysis computational algorithm

  • Economic Analysis of Cryptocurrency Backed Money Laundering

    2015 | European Conference On Information Systems | Citations: 9

    Authors: Brenig, Christian; Accorsi, Rafael; Müller, Günter

    Abstract: This paper reports on our research towards an economic analysis of money launder ... Expand

    Semantic filters: cryptographic hash function

    Topics: cryptocurrency cryptographic hash function public key encryption

    Methods: cross sectional research

  • Enhanced Dynamic Authentication Scheme (EDAS)

    PDF

    2014 | Information Systems Frontiers | Citations: 0

    Authors: Truong, Toan-Thinh; Tran, Minh-Triet; Duong, Anh-Duc

    Abstract: With non-stop growth in network environments, communication security is necessar ... Expand

    Semantic filters: cryptographic hash function

    Topics: electronic authentication smart card password computer hardware mobile system

    Methods: experiment computational algorithm