Semantic Filter
show all semantic filters
Found 37 articles
  • Using AI to Improve Sustainable Agricultural Practices: A Literature Review and Research Agenda

    PDF

    2023 | Communications of the Association for Information Systems | Citations: 0

    Authors: Lakshmi, Vijaya; Corbett, Jacqueline

    Abstract: The world is confronted with the grand challenge of food insecurity amidst grow ... Expand

    Semantic filters: darknet

    Topics: artificial intelligence decision support system human computer interaction human in the loop decision making

    Methods: literature sample literature study computational algorithm qualitative coding artificial neural network

  • Deep Learning for Information Systems Research

    PDF

    2023 | Journal of Management Information Systems | Citations: 1

    Authors: Samtani, Sagar; Zhu, Hongyi; Padmanabhan, Balaji; Chai, Yidong; Chen, Hsinchun; Nunamaker Jr., Jay F.

    Abstract: Modern artificial intelligence (AI) is heavily reliant on deep learning (DL), an ... Expand

    Semantic filters: darknet

    Topics: knowledge base IT security artificial intelligence darknet IT security threat

    Methods: Cross-Industry Standard Process for Data Mining data transformation autoencoder computational algorithm econometric modeling

  • The Professionalization of Hackers: A Content Analysis of 30 Years of Hacker Communication

    PDF

    2023 | Communications of the Association for Information Systems | Citations: 2

    Authors: Ulrich, Frank; Müller, Sune; Flowers, Stephen

    Abstract: Underground hacking has evolved from its early countercultural roots to become ... Expand

    Semantic filters: darknet

    Topics: innovation management IT security criminality cyberwarfare IT workforce

    Methods: qualitative content analysis theory development synthesis archival research literature study

    Theories: management theory

  • A text-mining based cyber-risk assessment and mitigation framework for critical analysis of online hacker forums

    PDF

    2022 | Decision Support Systems | Citations: 0

    Authors: Biswas, Baidyanath; Mukhopadhyay, Arunabha; Bhattacharjee, Sudip; Kumar, Ajay; Delen, Dursun

    Abstract: Online hacker communities are meeting spots for aspiring and seasoned cybercrimi ... Expand

    Semantic filters: darknet

    Topics: IT security IT security threat darknet source code logistics management

    Methods: classification method sentiment analysis decision tree classification term frequency–inverse document frequency literature study

    Theories: social exchange theory social practice theory

  • AI-Based Vehicular Network toward 6G and IoT: Deep Learning Approaches

    PDF

    2022 | ACM Transactions on Management Information Systems | Citations: 0

    Authors: Chen, Mu-Yen; Fan, Min-Hsuan; Huang, Li-Xiang

    Abstract: In recent years, vehicular networks have become increasingly large, heterogeneou ... Expand

    Semantic filters: darknet

    Topics: extensible markup language enterprise architecture Python open source evaluation criteria

    Methods: machine learning deep learning experiment convolutional neural network TensorFlow

  • Cross-Lingual Cybersecurity Analytics in the International Dark Web with Adversarial Deep Representation Learning

    2022 | Management Information Systems Quarterly | Citations: 0

    Authors: Ebrahimi, Mohammadreza; Chai, Yidong; Samtani, Sagar; Chen, Hsinchun

    Abstract: International dark web platforms operating within multiple geopolitical regions ... Expand

    Semantic filters: darknet

    Topics: darknet IT security knowledge sharing shapley additive explanation spoofing

    Methods: machine learning design science design artifact case study deep learning

  • Artificial Intelligence for Cybersecurity: Towards Taxonomy-based Archetypes and Decision Support

    2022 | International Conference on Information Systems | Citations: 0

    Authors: Gerlach, Jana; Werth, Oliver; Breitner, Michael H.

    Abstract: Cybersecurity is a critical success factor for more resilient companies, organi ... Expand

    Semantic filters: darknet

    Topics: IT security artificial intelligence business model strategic management value creation

    Methods: decision tree classification qualitative interview cluster analysis machine learning theoretical contribution

  • Discovering Emerging Threats in the Hacker Community: A Nonparametric Emerging Topic Detection Framework

    2022 | Management Information Systems Quarterly | Citations: 0

    Authors: Li, Weifeng; Chen, Hsinchun

    Abstract: The prevalence and rapid growth of cybercrime are largely attributed to hacker c ... Expand

    Semantic filters: darknet

    Topics: darknet IT security denial of service attack malware Wikipedia

    Methods: topic model computational algorithm machine learning experiment design science

  • Linking Exploits from the Dark Web to Known Vulnerabilities for Proactive Cyber Threat Intelligence: An Attention-Based Deep Structured Semantic Model

    2022 | Management Information Systems Quarterly | Citations: 0

    Authors: Samtani, Sagar; Chai, Yidong; Chen, Hsinchun

    Abstract: Black hat hackers use malicious exploits to circumvent security controls and tak ... Expand

    Semantic filters: darknet

    Topics: IT security web application information retrieval darknet PHP

    Methods: computational algorithm case study experiment usability testing Okapi BM25

  • Online Black-Markets: An Investigation of a Digital Infrastructure in the Dark

    PDF

    2022 | Information Systems Frontiers | Citations: 0

    Authors: Spagnoletti, Paolo; Ceci, Federica; Bygstad, Bendik

    Abstract: This paper investigates the functioning of Online Black-Markets (OBMs), i.e. a d ... Expand

    Semantic filters: darknet

    Topics: information technology infrastructure digital ecosystem electronic commerce anonymity computer crime

    Methods: longitudinal research qualitative interview longitudinal case study triangulation mixed method

    Theories: transaction cost economics