Semantic Filter
show all semantic filters
Found 63 articles
  • A Taxonomy of Violations in Digital Asset Markets

    2023 | International Conference on Information Systems | Citations: 0

    Authors: Clapham, Benjamin; Jakobs, Jenny; Schmidt, Julian; Gomber, Peter; Muntermann, Jan

    Abstract: Numerous frauds, market manipulations and other violations have recently shaken ... Expand

    Semantic filters: denial of service attack

    Topics: IT security threat crypto wallet accounting information technology infrastructure smart contract

    Methods: robustness check cluster analysis

  • PUBLIC MANAGEMENT CHALLENGES IN THE DIGITAL RISK SOCIETY: A Critical Analysis of the Public Debate on Implementation of the Danish NemID

    PDF

    2023 | European Journal of Information Systems | Citations: 0

    Authors: Ngwenyama, Ojelanki; Henriksen, Helle Zinner; Hardt, Daniel

    Abstract: The rise of the digital society is accompanied by incalculable social risks, but ... Expand

    Semantic filters: denial of service attack

    Topics: IT risk management data breach identity theft denial of service attack internet technology

    Methods: theory development case study qualitative content analysis cluster analysis design artifact

    Theories: theory of information warfare theory of communicative action

  • Cyber-risk Management Framework for Online Gaming Firms: an Artificial Neural Network Approach

    PDF

    2023 | Information Systems Frontiers | Citations: 0

    Authors: Sharma, Kalpit; Mukhopadhyay, Arunabha

    Abstract: Hackers have used Distributed-Denial-of-Service attacks to overwhelm a firm’s cy ... Expand

    Semantic filters: denial of service attack

    Topics: denial of service attack IT security risk management IT security threat extensible markup language

    Methods: artificial neural network descriptive statistic logistic regression k-nearest neighbor support vector machine

  • Deep Reinforcement Learning in the Advanced Cybersecurity Threat Detection and Protection

    PDF

    2023 | Information Systems Frontiers | Citations: 1

    Authors: Sewak, Mohit; Sahay, Sanjay K.; Rathore, Hemant

    Abstract: The cybersecurity threat landscape has lately become overly complex. Threat acto ... Expand

    Semantic filters: denial of service attack

    Topics: mobile system denial of service attack internet of things IT security malware

    Methods: machine learning computational algorithm deep learning reinforcement learning supervised learning

  • A text-mining based cyber-risk assessment and mitigation framework for critical analysis of online hacker forums

    PDF

    2022 | Decision Support Systems | Citations: 0

    Authors: Biswas, Baidyanath; Mukhopadhyay, Arunabha; Bhattacharjee, Sudip; Kumar, Ajay; Delen, Dursun

    Abstract: Online hacker communities are meeting spots for aspiring and seasoned cybercrimi ... Expand

    Semantic filters: denial of service attack

    Topics: IT security IT security threat darknet source code logistics management

    Methods: classification method sentiment analysis decision tree classification term frequency–inverse document frequency literature study

    Theories: social exchange theory social practice theory

  • A Tutorial on Prototyping Internet of Things Devices and Systems: A Gentle Introduction to Technology that Shapes Our Lives

    PDF

    2022 | Communications of the Association for Information Systems | Citations: 0

    Authors: Chua, Cecil; Storey, Veda

    Abstract: The Internet of Things, which has been quietly building and evolving over the p ... Expand

    Semantic filters: denial of service attack

    Topics: internet of things mobile system internet technology systems design Ethernet

    Methods: design artifact wearables based research

  • Cross-Lingual Cybersecurity Analytics in the International Dark Web with Adversarial Deep Representation Learning

    2022 | Management Information Systems Quarterly | Citations: 0

    Authors: Ebrahimi, Mohammadreza; Chai, Yidong; Samtani, Sagar; Chen, Hsinchun

    Abstract: International dark web platforms operating within multiple geopolitical regions ... Expand

    Semantic filters: denial of service attack

    Topics: darknet IT security knowledge sharing shapley additive explanation spoofing

    Methods: machine learning design science design artifact case study deep learning

  • Is the Repeal of Net Neutrality a Necessary Evil? An Empirical Analysis of Net Neutrality and Cybercrime

    2022 | International Conference on Information Systems | Citations: 0

    Authors: Kim, Doehun; Park, Jiyong

    Abstract: While net neutrality guarantees equal access to the Internet and online content ... Expand

    Semantic filters: denial of service attack

    Topics: net neutrality computer crime internet technology IT security criminality

    Methods: experimental group natural experiment robustness check longitudinal research qualitative interview

    Theories: economic theory

  • Discovering Emerging Threats in the Hacker Community: A Nonparametric Emerging Topic Detection Framework

    2022 | Management Information Systems Quarterly | Citations: 0

    Authors: Li, Weifeng; Chen, Hsinchun

    Abstract: The prevalence and rapid growth of cybercrime are largely attributed to hacker c ... Expand

    Semantic filters: denial of service attack

    Topics: darknet IT security denial of service attack malware Wikipedia

    Methods: topic model computational algorithm machine learning experiment design science

  • A Test of Protection Motivation Theory in the Information Security Literature: A Meta-Analytic Structural Equation Modeling Approach

    PDF

    2022 | Journal of the Association for Information Systems | Citations: 0

    Authors: Mou, Jian; Cohen, Jason; Bhattacherjee, Anol; Kim, Jongki

    Abstract: Information security is one of the important domains of information systems res ... Expand

    Semantic filters: denial of service attack

    Topics: data security self efficacy cybersecurity behavior malware social norm

    Methods: meta analysis structural equation modeling descriptive statistic literature sample SEM tool

    Theories: expectancy–value theory