Semantic Filter
show all semantic filters
Found 66 articles
  • Facilitating interorganizational trust in strategic alliances by leveraging blockchain-based systems: Case studies of two eastern banks

    PDF

    2023 | International Journal of Information Management | Citations: 0

    Authors: Chen, Renee Rui; Chen, Kun; Ou, Carol X.J.

    Abstract: Strategic alliances require mutual trust and collaboration between organizations ... Expand

    Semantic filters: public key encryption

    Topics: blockchain affordance user experience usability smart contract

    Methods: qualitative interview case study design artifact conceptual modelling computational algorithm

    Theories: theory of affordance

  • Designing a cross-organizational identity management system: Utilizing SSI for the certification of retailer attributes

    PDF

    2023 | Electronic Markets | Citations: 0

    Authors: Guggenberger, Tobias; Kühne, Daniela; Schlatt, Vincent; Urbach, Nils

    Abstract: The introduction of blockchain offers new opportunities to rethink enterprise id ... Expand

    Semantic filters: public key encryption

    Topics: blockchain Hyperledger electronic commerce government system privacy

    Methods: design principle design artifact qualitative interview design theory literature study

  • CRYPTOCURRENCIES, STABLECOINS AND CENTRAL BANK DIGITAL CURRENCIES: THE IMPACT OF TRUST AND PERCEIVED RISK

    2023 | European Conference On Information Systems | Citations: 0

    Authors: Hamm, Peter

    Abstract: Financial technology is undergoing rapid developments with the arrival of crypt ... Expand

    Semantic filters: public key encryption

    Topics: stablecoin cryptocurrency IT security threat self efficacy social commerce

    Methods: survey meta analysis

    Theories: unified theory of acceptance and use of technology technology acceptance theory

  • “My Precious!”: A Values-Affordances Perspective on the Adoption of Bitcoin

    PDF

    2023 | Journal of the Association for Information Systems | Citations: 0

    Authors: Lichti, Constantin; Tumasjan, Andranik

    Abstract: Given the growing pervasiveness of information systems (IS) in everyday life, r ... Expand

    Semantic filters: public key encryption

    Topics: Bitcoin affordance blockchain information system use user experience

    Methods: theory development survey design artifact data transformation post-hoc analysis

    Theories: theory of affordance sociomaterialism theory socio technical theory

  • Exploring Post-Quantum Cryptographic Schemes for TLS in 5G Nb-IoT: Feasibility and Recommendations

    2023 | Americas Conference on Information Systems | Citations: 0

    Authors: Sabanci, Kadir; cebe, mumin

    Abstract: Narrowband Internet of Things (NB-IoT) is a wireless communication technology t ... Expand

    Semantic filters: public key encryption

    Topics: internet of things mobile system electronic authentication Diffie-Hellman key exchange public key encryption

    Methods: computational algorithm experiment simulation literature study

  • Where blockchain could help - An analysis of challenges in ecosystems blockchain technology may help to solve

    2023 | Americas Conference on Information Systems | Citations: 0

    Authors: Schaefer, Benjamin; Vetterling, Dennis; Wrobel, Lasse; Jung, Reinhard

    Abstract: ... Expand

    Semantic filters: public key encryption

    Topics: blockchain digital ecosystem database system public key encryption peer-to-peer model

    Methods: literature study structured literature research case study qualitative coding

  • Enabling Efficient Deduplication and Secure Decentralized Public Auditing for Cloud Storage: A Redactable Blockchain Approach

    PDF

    2023 | ACM Transactions on Management Information Systems | Citations: 0

    Authors: Mishra, Rahul; Ramesh, Dharavath; Kanhere, Salil S.; Edla, Damodar Reddy

    Abstract: Public auditing and data deduplication are integral considerations in providing ... Expand

    Semantic filters: public key encryption

    Topics: blockchain data encryption outsourcing cloud computing cloud storage

    Methods: experiment computational algorithm mixed method business process modeling

  • Towards a Novel Business Process Model for Food Delivery Services Using Blockchain Technology

    2022 | Americas Conference on Information Systems | Citations: 0

    Authors: Folha, Rodrigo; Times, Valéria; Carvalho, Arthur; Araújo, André; Viana, Flaviano; Couto, Henrique

    Abstract: Demand for food delivery services has grown significantly in recent years and, ... Expand

    Semantic filters: public key encryption

    Topics: blockchain smart contract Ethereum privacy peer-to-peer model

    Methods: qualitative interview design requirement design principle design artifact design science

    Theories: transaction cost economics game theory

  • User-empowered Privacy-preserving Authentication Protocol for Electric Vehicle Charging Based on Decentralized Identity and Verifiable Credential

    PDF

    2022 | ACM Transactions on Management Information Systems | Citations: 0

    Authors: Parameswarath, Rohini Poolat; Gope, Prosanta; Sikdar, Biplab

    Abstract: The use of Electric Vehicles (EVs) has been gaining traction in recent years due ... Expand

    Semantic filters: public key encryption

    Topics: electronic authentication privacy public key encryption data encryption anonymity

    Methods: experiment

  • A System to Access Online Services with Minimal Personal Information Disclosure

    PDF

    2022 | Information Systems Frontiers | Citations: 0

    Authors: Russo, Antonia; Lax, Gianluca; Dromard, Baptiste; Mezred, Menad

    Abstract: The General Data Protection Regulation highlights the principle of data minimiza ... Expand

    Semantic filters: public key encryption

    Topics: blockchain Ethereum smart contract terrorist incident privacy

    Methods: archival research design artifact survey