Semantic Filter
show all semantic filters
Found 121 articles
  • A probabilistic approach to information management of order fulfilment reliability with the help of perfect-order analytics

    PDF

    2023 | International Journal of Information Management | Citations: 0

    Authors: Lukinskiy, Valery; Lukinskiy, Vladislav; Ivanov, Dmitry; Sokolov, Boris; Bazhina, Darya

    Abstract: Supplier reliability and order fulfilment performance are usually assessed using ... Expand

    Semantic filters: backup

    Topics: supply chain management logistics management information exchange backup information system use

    Methods: experiment literature study computational algorithm survey mixed method

    Theories: fuzzy set theory

  • When Stablecoin is No Longer Stable - A Case Study on the Failure of TerraUSD

    2023 | International Conference on Information Systems | Citations: 0

    Authors: Nurbaev, Vladimir; Au, Cheuk Hang; Chou, Chih-Yuan

    Abstract: Comparing to other price-volatile cryptocurrencies, stablecoins provide a relia ... Expand

    Semantic filters: backup

    Topics: stablecoin value creation backup digital entrepreneurship social media

    Methods: qualitative coding case study field study netnography business process modeling

  • Toward AI Governance: Identifying Best Practices and Potential Barriers and Outcomes

    PDF

    2023 | Information Systems Frontiers | Citations: 2

    Authors: Papagiannidis, Emmanouil; Enholm, Ida Merete; Dremel, Chirstian; Mikalef, Patrick; Krogstie, John

    Abstract: In recent years artificial intelligence (AI) has been seen as a technology with ... Expand

    Semantic filters: backup

    Topics: artificial intelligence backup decision making competitive advantage video conference

    Methods: qualitative interview case study multiple case study triangulation qualitative coding

  • Designing Extended Zero Trust Maturity Model – From Technical to Socio-Technical

    2023 | International Conference on Information Systems | Citations: 0

    Authors: Tokerud, Simen; Jansen, Jarand; Niemimaa, Marko; Järveläinen, Jonna

    Abstract: Recent successful cybersecurity attacks have exploited trust to compromise orga ... Expand

    Semantic filters: backup

    Topics: data security information security management IT security spreadsheet phishing

    Methods: maturity model design science qualitative interview literature study case study

  • Availability-Aware Virtual Resource Provisioning for Infrastructure Service Agreements in the Cloud

    PDF

    2023 | Information Systems Frontiers | Citations: 0

    Authors: Yuan, Shuai; Das, Sanjukta; Ramesh, Ram; Qiao, Chunming

    Abstract: Service availability is a key construct in Service Level Agreements (SLA) betwee ... Expand

    Semantic filters: backup

    Topics: backup cloud computing resource allocation price management high-performance computing

    Methods: computational algorithm experiment literature study simulation

  • Where was COVID-19 first discovered? Designing a question-answering system for pandemic situations

    2022 | European Conference On Information Systems | Citations: 0

    Authors: Graf, Johannes; Lancho, Gino; Zschech, Patrick; Heinrich, Kai

    Abstract: The COVID-19 pandemic is accompanied by a massive "infodemic" that makes it har ... Expand

    Semantic filters: backup

    Topics: knowledge base pandemic covid 19 database system Elasticsearch

    Methods: design artifact design principle design science question answering design requirement

  • Designing Information Security Culture Artifacts to Improve Security Behavior: An Evaluation in SMEs

    PDF

    2022 | DESRIST | Citations: 0

    Authors: Ismail, Olfa

    Abstract: This article examines the relationship between the information system security c ... Expand

    Semantic filters: backup

    Topics: IT security data security password backup cybersecurity behavior

    Methods: qualitative interview design science case study design artifact testing conceptual modelling

    Theories: organizational behavior theory

  • Actions Lead to Results: How the Behaviors of Information Systems Professionals Influence the Success of Information Systems Departments

    PDF

    2022 | Communications of the Association for Information Systems | Citations: 0

    Authors: Karimikia, Hadi; Maccani, Giovanni; Singh, Harminder; Donnellan, Brian

    Abstract: The growing complexity of systems, the increasing intensity of their use, and t ... Expand

    Semantic filters: backup

    Topics: IT workforce data quality system quality service quality IS service quality

    Methods: survey statistical hypothesis test SEM tool structural equation modeling literature study

    Theories: information systems success model

  • Designing a Framework for Digital KYC Processes Built on Blockchain-Based Self-Sovereign Identity

    PDF

    2022 | Information & Management | Citations: 0

    Authors: Schlatt, Vincent; Sedlmeir, Johannes; Feulner, Simon; Urbach, Nils

    Abstract: Know your customer (KYC) processes place a great burden on banks, because they a ... Expand

    Semantic filters: backup

    Topics: blockchain privacy identity management distributed ledger technology electronic authentication

    Methods: qualitative interview design artifact design science literature study qualitative coding

  • A dynamic simulation approach to support the evaluation of cyber risks and security investments in SMEs

    PDF

    2021 | Decision Support Systems | Citations: 1

    Authors: Armenia, Stefano; Angelini, Marco; Nonino, Fabio; Palombi, Giulia; Schlitzer, Mario Francesco

    Abstract: The growing amount of cyberspace threats highlights the need to evaluate cyberse ... Expand

    Semantic filters: backup

    Topics: IT security risk management IT security threat computer crime innovation management

    Methods: simulation survey system dynamics case study parametric test