2023 | Americas Conference on Information Systems | Citations: 0
Authors: Abhari, Kaveh; Xiao, Bo; Eisenberg, David
Abstract: As the world moves ever forward into a digital future, the need for responsible ... Expand
Semantic filters: access control
Topics: innovation management digital innovation access control
Methods: theory development synthesis design artifact
2023 | ACM Transactions on Management Information Systems | Citations: 0
Authors: Akello, Patricia; Vemprala, Naga; Lang Beebe, Nicole; Raymond Choo, Kim-Kwang
Abstract: In the United States and around the world, gun violence has become a long-standi ... Expand
Semantic filters: access control
Topics: blockchain criminality smart contract Ethereum access control
Methods: design artifact design science design process case study simulation
2023 | HICSS | Citations: 0
Authors: Asprion, Petra; Grieder, Hermann; Grimmberg, Frank; Moriggl, Pascal
Abstract: Organizations today need internal reporting channels to report illegal/unethical ... Expand
Semantic filters: access control
Topics: blockchain electronic health privacy IT security usability
Methods: design artifact qualitative interview design process design science expert panel
2023 | HICSS | Citations: 0
Authors: Hasse, Hendrik; Van Der Valk, Hendrik
Abstract: The collaborative utilization of data becomes increasingly important in industry ... Expand
Semantic filters: access control
Topics: digital twin production management information system use distributed system access control
Methods: design principle design artifact design requirement literature study
2023 | Information Systems Frontiers | Citations: 0
Authors: Herath, Tejaswini C.; Herath, Hemantha S. B.; Cullum, David
Abstract: As organizations have become increasingly reliant on information systems, senior ... Expand
Semantic filters: access control
Topics: data security COBIT IT security ITIL information security management
Methods: qualitative interview case study personal interview survey delphi study
Theories: theory of everything
2023 | International Conference on Information Systems | Citations: 0
Authors: Mansour, Osama; Ghazawneh, Ahmad
Abstract: The enactment of the revised Payment Services Directive (PSD2) by the European ... Expand
Semantic filters: access control
Topics: application programming interface digital platform Google+ electronic finance network effect
Methods: qualitative interview literature study qualitative content analysis design methodology longitudinal research
2023 | Communications of the Association for Information Systems | Citations: 0
Authors: Pigola, Angélica; Costa, Priscila da
Abstract: ... Expand
Semantic filters: access control
Topics: IT security data security database system innovation management IT security threat
Methods: case study synthesis design science maturity model capability maturity model integration
Theories: dynamic capabilities theory resource based view of the firm
2023 | International Conference on Business Informatics | Citations: 0
Authors: Richter, Kenneth; Zimmer, Markus P.; Lemmer, Kristina
Abstract: The notion of Smart Cities (SCs) has gained significant attention in recent yea ... Expand
Semantic filters: access control
Topics: IT security open source access control data encryption big data
Methods: structured literature research literature sample case study literature study
2023 | European Journal of Information Systems | Citations: 0
Authors: Rueckel, David; Krumay, Barbara; Dannerer, Ewald
Abstract: Great potential exists for the use of information systems (IS) in medical resear ... Expand
Semantic filters: access control
Topics: usability user interface database system MongoDB systems development
Methods: design artifact qualitative interview design process design science field study
2023 | International Journal of Information Management | Citations: 0
Authors: Shanmugam, Ramesh Kumar; Dhingra, Tarun
Abstract: Outcome-based contracts (OBC) in information technology outsourcing have attract ... Expand
Semantic filters: access control
Topics: digital transformation artificial intelligence marketing management IT alignment laptop computer
Methods: theoretical contribution simulation longitudinal research synthesis business process modeling
Theories: game theory