Semantic Filter
show all semantic filters
Found 370 articles
  • Blockchain innovation for consent self-management in health information exchanges

    PDF

    2023 | Decision Support Systems | Citations: 0

    Authors: Anderson, Chad; Carvalho, Arthur; Kaul, Mala; Merhout, Jeffrey W.

    Abstract: With the increasing digitalization of health data, patients need to make informe ... Expand

    Semantic filters: electronic authentication

    Topics: blockchain mobile application information exchange privacy Ethereum

    Methods: survey design artifact design science design process design principle

    Theories: evidence-based design

  • Design of a Novel Information System for Semi-automated Management of Cybersecurity in Industrial Control Systems

    PDF

    2023 | ACM Transactions on Management Information Systems | Citations: 0

    Authors: Ameri, Kimia; Hempel, Michael; Sharif, Hamid; Lopez, Juan; Perumalla, Kalyan

    Abstract: There is an urgent need in many critical infrastructure sectors, including the e ... Expand

    Semantic filters: electronic authentication

    Topics: IT security database system website Python electronic authentication

    Methods: computational algorithm sentiment analysis natural language processing BERT language model

  • Are Information Security Practices Driven by the Likelihood and potential Impact of Security Events?

    2023 | Americas Conference on Information Systems | Citations: 0

    Authors: Batra, Gunjan; Saeed, Khawaja; Zafar, Humayun

    Abstract: Organizations have opened up various digital interfaces through which customers ... Expand

    Semantic filters: electronic authentication

    Topics: electronic authentication cybersecurity behavior password online banking information security practice

    Methods: cluster analysis survey exploratory factor analysis data transformation descriptive statistic

  • Architecture and Design of National Digital Identity Platforms

    2023 | European Conference On Information Systems | Citations: 0

    Authors: Choudhary, Prashant Kumar; Kaushik, Anjali

    Abstract: Digital identity systems are mandated to be established by all countries as par ... Expand

    Semantic filters: electronic authentication

    Topics: digital platform application programming interface systems design innovation management open source

    Methods: qualitative interview design science case study personal interview design theory

  • Managing Organizational Cyber Security – The Distinct Role of Internalized Responsibility

    2023 | HICSS | Citations: 0

    Authors: Faltermaier, Stefan; Strunk, Kim; Obermeier, Michaela; Fiedler, Marina

    Abstract: Desirable user behavior is key to cyber security in organizations. However, a co ... Expand

    Semantic filters: electronic authentication

    Topics: IT security user behavior information technology capability IT security defense password

    Methods: qualitative interview personal interview qualitative coding grounded theory case study

  • Connecting the Dots: An Assessment of Cyber-risks in Networked Building and Municipal Infrastructure Systems

    2023 | HICSS | Citations: 0

    Authors: Francik, Paul; Ashley, Travis; Poplawski, Michael

    Abstract: The buildings and city streets we walk down are changing. Driven by various data ... Expand

    Semantic filters: electronic authentication

    Topics: IT security operating system internet technology Python electronic authentication

  • Designing a cross-organizational identity management system: Utilizing SSI for the certification of retailer attributes

    PDF

    2023 | Electronic Markets | Citations: 0

    Authors: Guggenberger, Tobias; Kühne, Daniela; Schlatt, Vincent; Urbach, Nils

    Abstract: The introduction of blockchain offers new opportunities to rethink enterprise id ... Expand

    Semantic filters: electronic authentication

    Topics: blockchain Hyperledger electronic commerce government system privacy

    Methods: design principle design artifact qualitative interview design theory literature study

  • Continuous improvement of information security management: an organisational learning perspective

    PDF

    2023 | European Journal of Information Systems | Citations: 0

    Authors: Ghahramani, Fereshteh; Yazdanmehr, Adel; Chen, Daniel; Wang, Jingguo

    Abstract: This study explores ways to empower organisations to continuously improve their ... Expand

    Semantic filters: electronic authentication

    Topics: data security information security management absorptive capacity IT security anonymity

    Methods: survey statistical hypothesis test structural equation modeling conceptual modelling ordinary least square

    Theories: dynamic capabilities theory

  • The Impact of Social Media on Digital Guanxi Development in the Chinese Workplace

    2023 | HICSS | Citations: 0

    Authors: Hong, J.; Tan, B.; Ng, E.; Davison, R.; Wong, L.

    Abstract: Organisational employees increasingly rely on various social media to develop g ... Expand

    Semantic filters: electronic authentication

    Topics: social media electronic business electronic authentication chat room innovation management

    Methods: qualitative interview qualitative coding case study theory development personal interview

  • An Architecture Using Payment Channel Networks for Blockchain-based Wi-Fi Sharing

    PDF

    2023 | ACM Transactions on Management Information Systems | Citations: 0

    Authors: Janiesch, Christian; Fischer, Marcus; Imgrund, Florian; Hofmann, Adrian; Winkelmann, Axel

    Abstract: Enabling Internet access while taking load of mobile networks, the concept of Wi ... Expand

    Semantic filters: electronic authentication

    Topics: wireless LAN blockchain accounting system support internet technology

    Methods: design principle literature study experiment design requirement factorial experiment

    Theories: transaction cost economics