We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 741 results
  1. A Systematic Review of Identity and Access Management Requirements in Enterprises and Potential Contributions of Self-Sovereign Identity

    Digital identity and access management (IAM) poses significant challenges for companies. Cyberattacks and resulting data breaches frequently have...

    Jana Glöckler, Johannes Sedlmeir, ... Gilbert Fridgen in Business & Information Systems Engineering
    Article Open access 12 September 2023
  2. Stop me if you’ve heard this one before: Identity-based consumer responses to music in marketing contexts

    The use of music in marketing campaigns is ubiquitous. Frequently, brands choose music that they think will be personally meaningful to consumers so...

    Zoë Godfrey, Daniel Korschun in AMS Review
    Article 02 May 2024
  3. Online User Reviews and Goal-Directed Consumer Behavior: A Qualitative Study

    With the rapid growth of the Internet and the increasing ability of its users to generate and publish content, active online communities have...
    Matthias B. Schulten in Dialogmarketing Perspektiven 2022/2023
    Chapter 2023
  4. Online Users’ Identity Theft and Co** Strategies, Attribution and Sense of Urgency: A Non-Linear Quadratic Effect Assessment

    Defined as someone using other’s personally identifiable information to make profit or commit crimes, identity theft has become a critical problem...

    A. F. Salam, Hua Dai, Lei Wang in Information Systems Frontiers
    Article 23 October 2021
  5. A Two-Stage Authorship Attribution Method Using Text and Structured Data for De-Anonymizing User-Generated Content

    User-generated content (UGC) is an important source of information on products and services for consumers and firms. Although incentivizing...

    Matthew J. Schneider, Shawn Mankad in Customer Needs and Solutions
    Article 06 August 2021
  6. Brand user imagery clarity (BUIC): conceptualization, measurement, and consequences

    Brand user imagery is an important aspect of brand association and, consequently, brand equity. Extant conceptualizations emphasize content features...

    Yi **e, Siqing Peng, Daniel P. Hampson in Journal of Brand Management
    Article 27 June 2020
  7. Leading With Clarity (Part 1—Understanding the Basics of Bias and Identity Bias)

    Having developed a deep conviction in DEI, the authors explore what leading with clarity entails. Being aware of and clear about bias is particularly...
    Poornima Luthra, Sara Louise Muhr in Leading Through Bias
    Chapter 2023
  8. What impacts learning effectiveness of a mobile learning app focused on first-year students?

    In recent years, the application of digital technologies for learning purposes is increasingly discussed as smartphones have become an integral part...

    Florian Johannsen, Martin Knipp, ... Jochen Zimmermann in Information Systems and e-Business Management
    Article Open access 26 July 2023
  9. A Review of Anonymization Algorithms and Methods in Big Data

    In the era of big data, with the increase in volume and complexity of data, the main challenge is how to use big data while preserving the privacy of...

    Elham Shamsinejad, Touraj Banirostam, ... Amir Masoud Rahmani in Annals of Data Science
    Article 13 July 2024
  10. Sequential customer experiences leading to continuance intention in the mobile telecom industry: from contract to call center

    In today's digital age, most individuals own smartphones and routinely use telecom services. As a result, understanding users' intentions to continue...

    Article 03 January 2024
  11. Toward Seamless Mobility-as-a-Service

    With growing awareness of sustainability and convenience expectations, customers are increasingly demanding integrated and seamless mobility in the...

    Alexandra Hoess, Jonathan Lautenschlager, ... Nils Urbach in Business & Information Systems Engineering
    Article Open access 19 February 2024
  12. Service robots’ anthropomorphism: dimensions, factors and internal relationships

    Robots have been widely used in social production, especially in the service industry. As their use continues to spread, their anthropomorphic...

    Shengliang Zhang, **nfeng Lin, ... Ai Ren in Electronic Markets
    Article 22 February 2022
  13. Representing a Model for the Anonymization of Big Data Stream Using In-Memory Processing

    In light of the escalating privacy risks in the big data era, this paper introduces an innovative model for the anonymization of big data streams,...

    Elham Shamsinejad, Touraj Banirostam, ... Amir Masoud Rahmani in Annals of Data Science
    Article 13 July 2024
  14. Importance of IT and Role Identities in Information Systems Infusion

    Information systems (IS) should be infused into individuals’ work activities for organizations to extract value from these systems. Studies have...

    Farkhondeh Hassandoust, Angsana A. Techatassanasoontorn, Felix B. Tan in Information Systems Frontiers
    Article Open access 27 March 2023
  15. Design Implementation and Academic Correlation for Harmonizing Contemporary Usage and Heritage of Bodo Traditional Attire

    Dokhona, a traditional women’s attire of the Bodo Community of the northeast India, marks the community’s cultural and traditional identity besides...
    Chaitali Brahma, Bhaskar Saha, Debkumar Chakrabarti in Ergonomics for Design and Innovation
    Conference paper 2022
  16. Understanding the determinants of reviewer credibility: an interpretive structural modeling and artificial neural network approach

    With the digitization of the tourism and hospitality sector, all hotel and travel bookings can be done online. Since the quality of experience is...

    Abhishek Tandon, Anu G. Aggarwal, Sanchita Aggarwal in Annals of Operations Research
    Article 18 October 2023
  17. Privacy in the Digital Age: Navigating the Risks and Benefits of Cybersecurity Measures

    This chapter provides an overview of privacy and cybersecurity, classifies, and describes various attack vectors, presents best practices to mitigate...
    Christopher Farnell, Philip Huff, William Cox in Human Privacy in Virtual and Physical Worlds
    Chapter Open access 2024
  18. Blockchain adoption in food supply chain for new business opportunities: an integrated approach

    Blockchain technology identifies and categorises product waste in supply chains, helps identify food contamination risks, and improves transit...

    Monica Sharma, Akshay Patidar, ... Anjesh Jhajhriya in Operations Management Research
    Article 04 October 2023
  19. Digital Identity: A Case Study of the ProCIDA Project

    The role of cloud computing in today’s world of globalization has seen as a major contribution for application development and deployment. Many...
    Francesco Bellini, Fabrizio D’Ascenzo, ... Marco Savastano in Exploring Digital Ecosystems
    Conference paper 2020
  20. Critical Success Factors for Emerging Technology Adoption, Strategic Flexibility, and Competitiveness: An Evidence-Based Total Interpretive Structural Modeling Approach (TISM-E)

    In the dynamic business environment, firms can adopt emerging technologies to remain relevant and effectively meet changing customer demands. The...

    Surabhi Singh, Shiwangi Singh, ... Sanjay Dhir in Global Journal of Flexible Systems Management
    Article 26 June 2024
Did you find what you were looking for? Share feedback.