2023 | International Journal of Information Management | Citations: 0
Authors: Chen, Renee Rui; Chen, Kun; Ou, Carol X.J.
Abstract: Strategic alliances require mutual trust and collaboration between organizations ... Expand
Semantic filters: public key encryption
Topics: blockchain affordance user experience usability smart contract
Methods: qualitative interview case study design artifact conceptual modelling computational algorithm
Theories: theory of affordance
2023 | Electronic Markets | Citations: 0
Authors: Guggenberger, Tobias; Kühne, Daniela; Schlatt, Vincent; Urbach, Nils
Abstract: The introduction of blockchain offers new opportunities to rethink enterprise id ... Expand
Semantic filters: public key encryption
Topics: blockchain Hyperledger electronic commerce government system privacy
Methods: design principle design artifact qualitative interview design theory literature study
2023 | European Conference On Information Systems | Citations: 0
Authors: Hamm, Peter
Abstract: Financial technology is undergoing rapid developments with the arrival of crypt ... Expand
Semantic filters: public key encryption
Topics: stablecoin cryptocurrency IT security threat self efficacy social commerce
Methods: survey meta analysis
Theories: unified theory of acceptance and use of technology technology acceptance theory
2023 | Journal of the Association for Information Systems | Citations: 0
Authors: Lichti, Constantin; Tumasjan, Andranik
Abstract: Given the growing pervasiveness of information systems (IS) in everyday life, r ... Expand
Semantic filters: public key encryption
Topics: Bitcoin affordance blockchain information system use user experience
Methods: theory development survey design artifact data transformation post-hoc analysis
Theories: theory of affordance sociomaterialism theory socio technical theory
2023 | Americas Conference on Information Systems | Citations: 0
Authors: Sabanci, Kadir; cebe, mumin
Abstract: Narrowband Internet of Things (NB-IoT) is a wireless communication technology t ... Expand
Semantic filters: public key encryption
Topics: internet of things mobile system electronic authentication Diffie-Hellman key exchange public key encryption
Methods: computational algorithm experiment simulation literature study
2023 | Americas Conference on Information Systems | Citations: 0
Authors: Schaefer, Benjamin; Vetterling, Dennis; Wrobel, Lasse; Jung, Reinhard
Abstract: ... Expand
Semantic filters: public key encryption
Topics: blockchain digital ecosystem database system public key encryption peer-to-peer model
Methods: literature study structured literature research case study qualitative coding
2023 | ACM Transactions on Management Information Systems | Citations: 0
Authors: Mishra, Rahul; Ramesh, Dharavath; Kanhere, Salil S.; Edla, Damodar Reddy
Abstract: Public auditing and data deduplication are integral considerations in providing ... Expand
Semantic filters: public key encryption
Topics: blockchain data encryption outsourcing cloud computing cloud storage
Methods: experiment computational algorithm mixed method business process modeling
2022 | Americas Conference on Information Systems | Citations: 0
Authors: Folha, Rodrigo; Times, Valéria; Carvalho, Arthur; Araújo, André; Viana, Flaviano; Couto, Henrique
Abstract: Demand for food delivery services has grown significantly in recent years and, ... Expand
Semantic filters: public key encryption
Topics: blockchain smart contract Ethereum privacy peer-to-peer model
Methods: qualitative interview design requirement design principle design artifact design science
Theories: transaction cost economics game theory
2022 | ACM Transactions on Management Information Systems | Citations: 0
Authors: Parameswarath, Rohini Poolat; Gope, Prosanta; Sikdar, Biplab
Abstract: The use of Electric Vehicles (EVs) has been gaining traction in recent years due ... Expand
Semantic filters: public key encryption
Topics: electronic authentication privacy public key encryption data encryption anonymity
Methods: experiment
2022 | Information Systems Frontiers | Citations: 0
Authors: Russo, Antonia; Lax, Gianluca; Dromard, Baptiste; Mezred, Menad
Abstract: The General Data Protection Regulation highlights the principle of data minimiza ... Expand
Semantic filters: public key encryption
Topics: blockchain Ethereum smart contract terrorist incident privacy
Methods: archival research design artifact survey