Semantic Filter
show all semantic filters
Found 182 articles
  • Responsible Digital Innovation in Dark: Toward Access-Control-Transparency Theory

    2023 | Americas Conference on Information Systems | Citations: 0

    Authors: Abhari, Kaveh; Xiao, Bo; Eisenberg, David

    Abstract: As the world moves ever forward into a digital future, the need for responsible ... Expand

    Semantic filters: access control

    Topics: innovation management digital innovation access control

    Methods: theory development synthesis design artifact

  • Blockchain Use Case in Ballistics and Crime Gun Tracing and Intelligence: Toward Overcoming Gun Violence

    PDF

    2023 | ACM Transactions on Management Information Systems | Citations: 0

    Authors: Akello, Patricia; Vemprala, Naga; Lang Beebe, Nicole; Raymond Choo, Kim-Kwang

    Abstract: In the United States and around the world, gun violence has become a long-standi ... Expand

    Semantic filters: access control

    Topics: blockchain criminality smart contract Ethereum access control

    Methods: design artifact design science design process case study simulation

  • Building Digital Trust to Protect Whistleblowers - A blockchain-based Reporting Channel

    2023 | HICSS | Citations: 0

    Authors: Asprion, Petra; Grieder, Hermann; Grimmberg, Frank; Moriggl, Pascal

    Abstract: Organizations today need internal reporting channels to report illegal/unethical ... Expand

    Semantic filters: access control

    Topics: blockchain electronic health privacy IT security usability

    Methods: design artifact qualitative interview design process design science expert panel

  • Simple Design Approach for Shared Digital Twins

    2023 | HICSS | Citations: 0

    Authors: Hasse, Hendrik; Van Der Valk, Hendrik

    Abstract: The collaborative utilization of data becomes increasingly important in industry ... Expand

    Semantic filters: access control

    Topics: digital twin production management information system use distributed system access control

    Methods: design principle design artifact design requirement literature study

  • An Information Security Performance Measurement Tool for Senior Managers: Balanced Scorecard Integration for Security Governance and Control Frameworks

    PDF

    2023 | Information Systems Frontiers | Citations: 0

    Authors: Herath, Tejaswini C.; Herath, Hemantha S. B.; Cullum, David

    Abstract: As organizations have become increasingly reliant on information systems, senior ... Expand

    Semantic filters: access control

    Topics: data security COBIT IT security ITIL information security management

    Methods: qualitative interview case study personal interview survey delphi study

    Theories: theory of everything

  • The Evolving Interdependencies between Banks and Fintechs within Open Banking Platforms

    2023 | International Conference on Information Systems | Citations: 0

    Authors: Mansour, Osama; Ghazawneh, Ahmad

    Abstract: The enactment of the revised Payment Services Directive (PSD2) by the European ... Expand

    Semantic filters: access control

    Topics: application programming interface digital platform Google+ electronic finance network effect

    Methods: qualitative interview literature study qualitative content analysis design methodology longitudinal research

  • Dynamic Capabilities in Cybersecurity Intelligence: A Meta-Synthesis to Enhance Protection Against Cyber Threats

    PDF

    2023 | Communications of the Association for Information Systems | Citations: 0

    Authors: Pigola, Angélica; Costa, Priscila da

    Abstract: ... Expand

    Semantic filters: access control

    Topics: IT security data security database system innovation management IT security threat

    Methods: case study synthesis design science maturity model capability maturity model integration

    Theories: dynamic capabilities theory resource based view of the firm

  • Decoding the Landscape of Smart City Platforms: A Taxonomy Approach

    2023 | International Conference on Business Informatics | Citations: 0

    Authors: Richter, Kenneth; Zimmer, Markus P.; Lemmer, Kristina

    Abstract: The notion of Smart Cities (SCs) has gained significant attention in recent yea ... Expand

    Semantic filters: access control

    Topics: IT security open source access control data encryption big data

    Methods: structured literature research literature sample case study literature study

  • Developing a collaboration system for pancreatic cancer research: a clinical design science study

    PDF

    2023 | European Journal of Information Systems | Citations: 0

    Authors: Rueckel, David; Krumay, Barbara; Dannerer, Ewald

    Abstract: Great potential exists for the use of information systems (IS) in medical resear ... Expand

    Semantic filters: access control

    Topics: usability user interface database system MongoDB systems development

    Methods: design artifact qualitative interview design process design science field study

  • Outcome-based contracts – Linking technology, ownership and reputations

    PDF

    2023 | International Journal of Information Management | Citations: 0

    Authors: Shanmugam, Ramesh Kumar; Dhingra, Tarun

    Abstract: Outcome-based contracts (OBC) in information technology outsourcing have attract ... Expand

    Semantic filters: access control

    Topics: digital transformation artificial intelligence marketing management IT alignment laptop computer

    Methods: theoretical contribution simulation longitudinal research synthesis business process modeling

    Theories: game theory