2023 | International Journal of Information Management | Citations: 0
Authors: Lukinskiy, Valery; Lukinskiy, Vladislav; Ivanov, Dmitry; Sokolov, Boris; Bazhina, Darya
Abstract: Supplier reliability and order fulfilment performance are usually assessed using ... Expand
Semantic filters: backup
Topics: supply chain management logistics management information exchange backup information system use
Methods: experiment literature study computational algorithm survey mixed method
Theories: fuzzy set theory
2023 | International Conference on Information Systems | Citations: 0
Authors: Nurbaev, Vladimir; Au, Cheuk Hang; Chou, Chih-Yuan
Abstract: Comparing to other price-volatile cryptocurrencies, stablecoins provide a relia ... Expand
Semantic filters: backup
Topics: stablecoin value creation backup digital entrepreneurship social media
Methods: qualitative coding case study field study netnography business process modeling
2023 | Information Systems Frontiers | Citations: 2
Authors: Papagiannidis, Emmanouil; Enholm, Ida Merete; Dremel, Chirstian; Mikalef, Patrick; Krogstie, John
Abstract: In recent years artificial intelligence (AI) has been seen as a technology with ... Expand
Semantic filters: backup
Topics: artificial intelligence backup decision making competitive advantage video conference
Methods: qualitative interview case study multiple case study triangulation qualitative coding
2023 | International Conference on Information Systems | Citations: 0
Authors: Tokerud, Simen; Jansen, Jarand; Niemimaa, Marko; Järveläinen, Jonna
Abstract: Recent successful cybersecurity attacks have exploited trust to compromise orga ... Expand
Semantic filters: backup
Topics: data security information security management IT security spreadsheet phishing
Methods: maturity model design science qualitative interview literature study case study
2023 | Information Systems Frontiers | Citations: 0
Authors: Yuan, Shuai; Das, Sanjukta; Ramesh, Ram; Qiao, Chunming
Abstract: Service availability is a key construct in Service Level Agreements (SLA) betwee ... Expand
Semantic filters: backup
Topics: backup cloud computing resource allocation price management high-performance computing
Methods: computational algorithm experiment literature study simulation
2022 | European Conference On Information Systems | Citations: 0
Authors: Graf, Johannes; Lancho, Gino; Zschech, Patrick; Heinrich, Kai
Abstract: The COVID-19 pandemic is accompanied by a massive "infodemic" that makes it har ... Expand
Semantic filters: backup
Topics: knowledge base pandemic covid 19 database system Elasticsearch
Methods: design artifact design principle design science question answering design requirement
2022 | DESRIST | Citations: 0
Authors: Ismail, Olfa
Abstract: This article examines the relationship between the information system security c ... Expand
Semantic filters: backup
Topics: IT security data security password backup cybersecurity behavior
Methods: qualitative interview design science case study design artifact testing conceptual modelling
Theories: organizational behavior theory
2022 | Communications of the Association for Information Systems | Citations: 0
Authors: Karimikia, Hadi; Maccani, Giovanni; Singh, Harminder; Donnellan, Brian
Abstract: The growing complexity of systems, the increasing intensity of their use, and t ... Expand
Semantic filters: backup
Topics: IT workforce data quality system quality service quality IS service quality
Methods: survey statistical hypothesis test SEM tool structural equation modeling literature study
Theories: information systems success model
2022 | Information & Management | Citations: 0
Authors: Schlatt, Vincent; Sedlmeir, Johannes; Feulner, Simon; Urbach, Nils
Abstract: Know your customer (KYC) processes place a great burden on banks, because they a ... Expand
Semantic filters: backup
Topics: blockchain privacy identity management distributed ledger technology electronic authentication
Methods: qualitative interview design artifact design science literature study qualitative coding
2021 | Decision Support Systems | Citations: 1
Authors: Armenia, Stefano; Angelini, Marco; Nonino, Fabio; Palombi, Giulia; Schlitzer, Mario Francesco
Abstract: The growing amount of cyberspace threats highlights the need to evaluate cyberse ... Expand
Semantic filters: backup
Topics: IT security risk management IT security threat computer crime innovation management
Methods: simulation survey system dynamics case study parametric test