2023 | International Conference on Information Systems | Citations: 0
Authors: Clapham, Benjamin; Jakobs, Jenny; Schmidt, Julian; Gomber, Peter; Muntermann, Jan
Abstract: Numerous frauds, market manipulations and other violations have recently shaken ... Expand
Semantic filters: denial of service attack
Topics: IT security threat crypto wallet accounting information technology infrastructure smart contract
Methods: robustness check cluster analysis
2023 | European Journal of Information Systems | Citations: 0
Authors: Ngwenyama, Ojelanki; Henriksen, Helle Zinner; Hardt, Daniel
Abstract: The rise of the digital society is accompanied by incalculable social risks, but ... Expand
Semantic filters: denial of service attack
Topics: IT risk management data breach identity theft denial of service attack internet technology
Methods: theory development case study qualitative content analysis cluster analysis design artifact
Theories: theory of information warfare theory of communicative action
2023 | Information Systems Frontiers | Citations: 0
Authors: Sharma, Kalpit; Mukhopadhyay, Arunabha
Abstract: Hackers have used Distributed-Denial-of-Service attacks to overwhelm a firm’s cy ... Expand
Semantic filters: denial of service attack
Topics: denial of service attack IT security risk management IT security threat extensible markup language
Methods: artificial neural network descriptive statistic logistic regression k-nearest neighbor support vector machine
2023 | Information Systems Frontiers | Citations: 1
Authors: Sewak, Mohit; Sahay, Sanjay K.; Rathore, Hemant
Abstract: The cybersecurity threat landscape has lately become overly complex. Threat acto ... Expand
Semantic filters: denial of service attack
Topics: mobile system denial of service attack internet of things IT security malware
Methods: machine learning computational algorithm deep learning reinforcement learning supervised learning
2022 | Decision Support Systems | Citations: 0
Authors: Biswas, Baidyanath; Mukhopadhyay, Arunabha; Bhattacharjee, Sudip; Kumar, Ajay; Delen, Dursun
Abstract: Online hacker communities are meeting spots for aspiring and seasoned cybercrimi ... Expand
Semantic filters: denial of service attack
Topics: IT security IT security threat darknet source code logistics management
Methods: classification method sentiment analysis decision tree classification term frequency–inverse document frequency literature study
Theories: social exchange theory social practice theory
2022 | Communications of the Association for Information Systems | Citations: 0
Authors: Chua, Cecil; Storey, Veda
Abstract: The Internet of Things, which has been quietly building and evolving over the p ... Expand
Semantic filters: denial of service attack
Topics: internet of things mobile system internet technology systems design Ethernet
Methods: design artifact wearables based research
2022 | Management Information Systems Quarterly | Citations: 0
Authors: Ebrahimi, Mohammadreza; Chai, Yidong; Samtani, Sagar; Chen, Hsinchun
Abstract: International dark web platforms operating within multiple geopolitical regions ... Expand
Semantic filters: denial of service attack
Topics: darknet IT security knowledge sharing shapley additive explanation spoofing
Methods: machine learning design science design artifact case study deep learning
2022 | International Conference on Information Systems | Citations: 0
Authors: Kim, Doehun; Park, Jiyong
Abstract: While net neutrality guarantees equal access to the Internet and online content ... Expand
Semantic filters: denial of service attack
Topics: net neutrality computer crime internet technology IT security criminality
Methods: experimental group natural experiment robustness check longitudinal research qualitative interview
Theories: economic theory
2022 | Management Information Systems Quarterly | Citations: 0
Authors: Li, Weifeng; Chen, Hsinchun
Abstract: The prevalence and rapid growth of cybercrime are largely attributed to hacker c ... Expand
Semantic filters: denial of service attack
Topics: darknet IT security denial of service attack malware Wikipedia
Methods: topic model computational algorithm machine learning experiment design science
2022 | Journal of the Association for Information Systems | Citations: 0
Authors: Mou, Jian; Cohen, Jason; Bhattacherjee, Anol; Kim, Jongki
Abstract: Information security is one of the important domains of information systems res ... Expand
Semantic filters: denial of service attack
Topics: data security self efficacy cybersecurity behavior malware social norm
Methods: meta analysis structural equation modeling descriptive statistic literature sample SEM tool
Theories: expectancy–value theory