2023 | Communications of the Association for Information Systems | Citations: 0
Authors: Lakshmi, Vijaya; Corbett, Jacqueline
Abstract: The world is confronted with the grand challenge of food insecurity amidst grow ... Expand
Semantic filters: darknet
Topics: artificial intelligence decision support system human computer interaction human in the loop decision making
Methods: literature sample literature study computational algorithm qualitative coding artificial neural network
2023 | Journal of Management Information Systems | Citations: 1
Authors: Samtani, Sagar; Zhu, Hongyi; Padmanabhan, Balaji; Chai, Yidong; Chen, Hsinchun; Nunamaker Jr., Jay F.
Abstract: Modern artificial intelligence (AI) is heavily reliant on deep learning (DL), an ... Expand
Semantic filters: darknet
Topics: knowledge base IT security artificial intelligence darknet IT security threat
Methods: Cross-Industry Standard Process for Data Mining data transformation autoencoder computational algorithm econometric modeling
2023 | Communications of the Association for Information Systems | Citations: 2
Authors: Ulrich, Frank; Müller, Sune; Flowers, Stephen
Abstract: Underground hacking has evolved from its early countercultural roots to become ... Expand
Semantic filters: darknet
Topics: innovation management IT security criminality cyberwarfare IT workforce
Methods: qualitative content analysis theory development synthesis archival research literature study
Theories: management theory
2022 | Decision Support Systems | Citations: 0
Authors: Biswas, Baidyanath; Mukhopadhyay, Arunabha; Bhattacharjee, Sudip; Kumar, Ajay; Delen, Dursun
Abstract: Online hacker communities are meeting spots for aspiring and seasoned cybercrimi ... Expand
Semantic filters: darknet
Topics: IT security IT security threat darknet source code logistics management
Methods: classification method sentiment analysis decision tree classification term frequency–inverse document frequency literature study
Theories: social exchange theory social practice theory
2022 | ACM Transactions on Management Information Systems | Citations: 0
Authors: Chen, Mu-Yen; Fan, Min-Hsuan; Huang, Li-Xiang
Abstract: In recent years, vehicular networks have become increasingly large, heterogeneou ... Expand
Semantic filters: darknet
Topics: extensible markup language enterprise architecture Python open source evaluation criteria
Methods: machine learning deep learning experiment convolutional neural network TensorFlow
2022 | Management Information Systems Quarterly | Citations: 0
Authors: Ebrahimi, Mohammadreza; Chai, Yidong; Samtani, Sagar; Chen, Hsinchun
Abstract: International dark web platforms operating within multiple geopolitical regions ... Expand
Semantic filters: darknet
Topics: darknet IT security knowledge sharing shapley additive explanation spoofing
Methods: machine learning design science design artifact case study deep learning
2022 | International Conference on Information Systems | Citations: 0
Authors: Gerlach, Jana; Werth, Oliver; Breitner, Michael H.
Abstract: Cybersecurity is a critical success factor for more resilient companies, organi ... Expand
Semantic filters: darknet
Topics: IT security artificial intelligence business model strategic management value creation
Methods: decision tree classification qualitative interview cluster analysis machine learning theoretical contribution
2022 | Management Information Systems Quarterly | Citations: 0
Authors: Li, Weifeng; Chen, Hsinchun
Abstract: The prevalence and rapid growth of cybercrime are largely attributed to hacker c ... Expand
Semantic filters: darknet
Topics: darknet IT security denial of service attack malware Wikipedia
Methods: topic model computational algorithm machine learning experiment design science
2022 | Management Information Systems Quarterly | Citations: 0
Authors: Samtani, Sagar; Chai, Yidong; Chen, Hsinchun
Abstract: Black hat hackers use malicious exploits to circumvent security controls and tak ... Expand
Semantic filters: darknet
Topics: IT security web application information retrieval darknet PHP
Methods: computational algorithm case study experiment usability testing Okapi BM25
2022 | Information Systems Frontiers | Citations: 0
Authors: Spagnoletti, Paolo; Ceci, Federica; Bygstad, Bendik
Abstract: This paper investigates the functioning of Online Black-Markets (OBMs), i.e. a d ... Expand
Semantic filters: darknet
Topics: information technology infrastructure digital ecosystem electronic commerce anonymity computer crime
Methods: longitudinal research qualitative interview longitudinal case study triangulation mixed method
Theories: transaction cost economics