2023 | European Conference On Information Systems | Citations: 0
Authors: Schäfer, Fabian; Rosen, Jeremy; Zimmermann, Christian; Wortmann, Felix
Abstract: Companies increasingly innovate data-driven business models, enabling them to c ... Expand
Semantic filters: fully homomorphic encryption
Topics: digital ecosystem differential privacy fully homomorphic encryption distributed ledger technology data encryption
Methods: design science qualitative interview design artifact design requirement design process
2023 | European Conference On Information Systems | Citations: 0
Authors: Weigl, Linda; Barbereau, Tom; Sedlmeir, Johannes; Zavolokina, Liudmila
Abstract: The Digital Markets Act (DMA) constitutes a crucial part of the European legisl ... Expand
Semantic filters: fully homomorphic encryption
Topics: legal context General Data Protection Regulation privacy differential privacy data protection
Methods: decision tree classification structured literature research computational algorithm synthesis qualitative interview
Theories: theory of task technology fit
2015 | Information Systems Frontiers | Citations: 1
Authors: Barkataki, Sharad; Zeineddine, Hassan
Abstract: Security of private information is a critical requirement for information sharin ... Expand
Semantic filters: fully homomorphic encryption
Topics: supply chain management privacy anonymity data encryption information exchange
Methods: literature study computational algorithm optimization model machine learning
2011 | International Conference on Information Systems | Citations: 0
Authors: Kerschbaum, Florian; StrÃ, Jens
Abstract: The pressure on enterprises to manage and improve their environmental sustainabi ... Expand
Semantic filters: fully homomorphic encryption
Topics: data encryption supply chain management enterprise resource planning homomorphic encryption public key encryption
Methods: design artifact experiment company material computational algorithm data envelopment analysis
2011 | Business & Information Systems Engineering | Citations: 0
Authors: Kerschbaum, Florian
Abstract: Cloud computing entails a novel security threat: The cloud service provider is ... Expand
Semantic filters: fully homomorphic encryption
Topics: cloud computing homomorphic encryption Java data encryption web service
Methods: experiment cluster analysis computational algorithm time series analysis longitudinal research