2023 | European Journal of Information Systems | Citations: 0
Authors: Parks, Rachida F; Wigand, Rolf T; Benjamin Lowry, Paul
Abstract: One needs to look only at recent data breaches to be reminded of the severe and ... Expand
Semantic filters: role-based access control
Topics: privacy decision making organizational impact health information system usability
Methods: qualitative interview literature study personal interview triangulation theory development
2021 | International Journal of Information Management | Citations: 0
Authors: Spanaki, Konstantina; Karafili, Erisa; Despoudi, Stella
Abstract: Industry 4.0 and the associated IoT and data applications are evolving rapidly a ... Expand
Semantic filters: role-based access control
Topics: artificial intelligence data management access control role-based access control industry 4.0
Methods: design science case study
Theories: theory of abduction
2020 | HICSS | Citations: 0
Authors: Abolfathi, Masoumeh; Raghebi, Zohreh; Jafarian, Jafar Haadi; Banaei-Kashani, Farnoush
Abstract: Role-based access control (RBAC) is one of the most widely authorization models ... Expand
Semantic filters: role-based access control
Topics: access control role-based access control
Methods: computational algorithm cluster analysis experiment fuzzy clustering optimization model
2020 | ACM Transactions on Management Information Systems | Citations: 0
Authors: Lu, Haibing; Chen, Xi; Shi, Junmin; Vaidya, Jaideep; Atluri, Vijayalakshmi; Hong, Yuan; Huang, Wei
Abstract: Many applications use data that are better represented in the binary matrix form ... Expand
Semantic filters: role-based access control
Topics: database system role-based access control access control information retrieval
Methods: computational algorithm experiment cluster analysis machine learning k-means clustering
2018 | Journal of the Association for Information Systems | Citations: 0
Authors: Wainwright, David W.; Oates, Briony J.; Edwards, Helen M.; Childs, Sue
Abstract: Despite the increasing sophistication and quality of published work, the develop ... Expand
Semantic filters: role-based access control
Topics: decision making role-based access control organizational context IS problem blog
Methods: structured literature research delphi study narrative analysis
Theories: semiotic theory socio technical theory
2017 | ACM Transactions on Management Information Systems | Citations: 0
Authors: Roy, Arindam; Sural, Shamik; Majumdar, Arun Kumar; Vaidya, Jaideep; Atluri, Vijayalakshmi
Abstract: Since any organizational environment is typically resource constrained, especial ... Expand
Semantic filters: role-based access control
Topics: role-based access control access control Linux
Methods: computational algorithm integer linear programming literature study experiment optimization model
2017 | International Journal of Information Management | Citations: 0
Authors: Tseng, Shian-Shyong; Chen, Hsing-Chung; Hu, Li-Ling; Lin, Yen-Tsung
Abstract: a b s t r a c tWith the progress of new technologies of information management, ... Expand
Semantic filters: role-based access control
Topics: knowledge representation ubiquitous computing smart device information management mobile system
Methods: literature study
Theories: theory of case-based reasoning
2014 | Business & Information Systems Engineering | Citations: 0
Authors: Schefer-Wenzl, Sigrid; Strembeck, Mark
Abstract: The paper presents an integrated approach for the modeling and enforcement of d ... Expand
Semantic filters: role-based access control
Topics: business process management role-based access control access control system support model driven development
Methods: design science unified modeling language case study metamodel computational algorithm
2013 | European Conference On Information Systems | Citations: 0
Authors: Schefer-Wenzl, Sigrid; Sobernig, Stefan; Strembeck, Mark
Abstract: In recent years, we developed a modeling framework for process-related security ... Expand
Semantic filters: role-based access control
Topics: business process management systems development IT security model driven development role-based access control
Methods: case study design science unified modeling language qualitative interview business process modeling
2012 | Information Systems Frontiers | Citations: 0
Authors: Chebotko, Artem; Chang, Seunghan; Lu, Shiyong; Fotouhi, Farshad
Abstract: XML is rapidly emerging as a standard for data representation and exchange over ... Expand
Semantic filters: role-based access control
Topics: extensible markup language authorization access control Java Microsoft Windows
Methods: computational algorithm experiment optimization model survey literature study