EconBiz - Find Economic Literature
    • Logout
    • Change account settings
  • A-Z
  • Beta
  • About EconBiz
  • News
  • Thesaurus (STW)
  • Academic Skills
  • Help
  •  My account 
    • Logout
    • Change account settings
  • Login
EconBiz - Find Economic Literature
Publications Events
Search options
Advanced Search history
My EconBiz
Favorites Loans Reservations Fines
    You are here:
  • Home
  • Search: subject_exact:"User access control"
Narrow search

Narrow search

Year of publication
Subject
All
User access control 114 Zutrittskontrolle 114 Data security 60 Datensicherheit 60 Theorie 19 Theory 19 IT crime 18 IT-Kriminalität 18 Zugriffskontrolle 17 Datenschutz 15 Data protection 14 Biometrics 13 Biometrie 13 Betriebliches Informationssystem 11 Computer network 9 Computernetz 9 USA 9 United States 9 E-commerce 8 Electronic Commerce 8 Internet 8 Deutschland 7 Germany 7 Identitätsverwaltung 7 Information management 7 Informationsmanagement 7 Business intelligence system 6 Datensicherung 6 Electronic Banking 6 Electronic banking 6 RFID 6 Algorithm 5 Algorithmus 5 Authentifikation 5 Computersicherheit 5 Enterprise architecture 5 Unternehmensarchitektur 5 Cloud Computing 4 Cloud computing 4 Database 4
more ... less ...
Online availability
All
Undetermined 16 Free 12
Type of publication
All
Article 92 Book / Working Paper 38
Type of publication (narrower categories)
All
Article in journal 49 Aufsatz in Zeitschrift 49 Aufsatz im Buch 43 Book section 43 Graue Literatur 9 Non-commercial literature 9 Hochschulschrift 8 Arbeitspapier 7 Working Paper 7 Thesis 6 Case study 3 Collection of articles of several authors 3 Fallstudie 3 Sammelwerk 3 Aufsatzsammlung 2 Dissertation u.a. Prüfungsschriften 2 Forschungsbericht 2 Conference paper 1 Conference proceedings 1 Konferenzbeitrag 1 Konferenzschrift 1 Lehrbuch 1
more ... less ...
Language
All
English 102 German 26 Undetermined 2
Author
All
Bellou, Andriana 3 Gaudin, Germain 3 Roberds, William 3 White, Alexander 3 Bhatt, Rachana 2 Eckert, Claudia 2 Fuchs, Ludwig 2 Li, Yan 2 Mookerjee, Vijay S. 2 Royer, Denis 2 Schreft, Stacey L. 2 Sowa, Aleksandra 2 Stepien, Bernard 2 Sun, Lili 2 Wang, Hua 2 Aali, Nawal Ait 1 Abdullah, Matin Saad 1 Adi, Kamel 1 Adl, Rosa Karimi 1 Ahmed, Waseem 1 Ajam, Nabil 1 Akar, Gulsah 1 Al-Harby, Fahad 1 Ansari, Zahid A. 1 Antonakopoulou, Anna 1 Arshad, Junaid 1 Badar, Nazia 1 Baina, Amine 1 Baldimtsi, F. 1 Bansal, Nitin 1 Bar-Josef, Noa 1 Barker, Ken 1 Bartmann, Dieter 1 Barz, Christiane 1 Baumgärtner, Frank 1 Bayliss, Christopher 1 Bellafkih, Mostafa 1 Ben Attia, Hasiba 1 Benali, Khalid 1 Benharzallah, Saber 1
more ... less ...
Institution
All
ICETE <4, 2007, Barcelona> 1 Organisation for Economic Co-operation and Development 1 Verlag Dr. Kovač 1
Published in...
All
E-business and telecommunications : 4th international conference ; revised selected papers 10 E-technologies: innovation in an open world : 4th international conference, MCETECH 2009, Ottawa, Canada, May 4-6, 2009 ; proceedings 3 HMD : Praxis der Wirtschaftsinformatik 3 Information systems : crossroads for organization, management, accounting and engineering : ItAIS: the Italian Association for Information Systems 3 Journal of organizational computing and electronic commerce 3 Berichte aus der Wirtschaftsinformatik 2 Decision support systems : DSS ; the international journal 2 Digital identity management : perspectives on the technological, business and social implications 2 Discussion paper series / IZA 2 Diskussionsbeiträge / Wissenschaftliches Institut für Infrastruktur und Kommunikationsdienste 2 E-technologies: transformation in a connected world : 5th international conference, MCETECH 2011, Les Diablerets, Switzerland, January 23 - 26, 2011 ; revised selected papers 2 Information diffusion management and knowledge sharing ; volume 1 2 International journal of business information systems : IJBIS 2 International journal of networking and virtual organisations : IJNVO 2 Journal of air transport management 2 Journal of internet commerce 2 Journal of payments strategy & systems 2 SpringerLink / Bücher 2 Web 2.0 und soziale Netzwerke - Risiko oder strategische Chance? : Handlungsoptionen für die Zukunftsperspektive von Kreditinstituten 2 Wissen - Märkte - Geistiges Eigentum 2 Advances in multimedia and interactive technologies 1 American economic journal 1 Banking and information technology : BIT ; a strategic report for top management 1 Business analytics and cyber security management in organizations 1 Business intelligence : methods and applications ; essays in honor of Prof. Dr. Hans-J. Lenz 1 Communications in computer and information science 1 Contemporary economic policy : a journal of Western Economic Association International 1 De Gruyter Oldenbourg Studium 1 Diskussionsbeiträge zu Wirtschaftsinformatik und Operations Research 1 ERP-Management : Auswahl, Einführung und Betrieb von ERP-Systemen 1 Edition <kes> 1 Electronic markets : the international journal on networked business 1 Emerging methods in predictive analytics : risk management and decision-making 1 Enterprise applications and services in the finance industry : 3. international workshop, FinanceCom 2007, Montreal, Canada, December 8, 2007 ; revised papers 1 FAZIT-Schriftenreihe : Forschung, Informations- und Medientechnologien in Baden-Württemberg 1 Federal Reserve Bank of Atlanta Working Paper 1 Finance India : the quarterly journal of Indian Institute of Finance 1 Finanzierung, Leasing, Factoring : FLF 1 IEEE transactions on engineering management : EM 1 INFORMS journal on computing : JOC 1
more ... less ...
Source
All
ECONIS (ZBW) 124 USB Cologne (EcoSocSci) 6
Showing 1 - 50 of 130
Cover Image
Digitale Identitäten als Fundament des Web 3.0
Puhl, Pirmin; Roloff, Malte; Märkel, Christian; … - 2023
Die Evolution des World Wide Web führt zu einem verstärkten Wunsch nach und Bedarf an dezentralen, selbstverwalteten Digitalen Identitäten, auch als Self-Sovereign Identities (SSI) bekannt. Im Gegensatz zu gegenwärtig verbreiteten zentralisierten und föderierten Digitalen Identitäten...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10014441893
Saved in:
Cover Image
Cybersecurity : Technology and Governance
Jøsang, Audun - 2025
Chapter 1 Basic concepts of cybersecurity -- Chapter 2 Attack vectors and malware -- Chapter 3 System security -- Chapter 4 Cryptography -- Chapter 5 Key management and PKI -- Chapter 6 Network security -- Chapter 7 Wireless Security -- Chapter 8 User authentication -- Chapter 9 IAM – Identity...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015135607
Saved in:
Cover Image
Research on secure storage data access control of smart TV based on blockchain
Qiu, Jianxin - In: International journal of product development : IJPD 27 (2023) 4, pp. 384-396
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015065221
Saved in:
Cover Image
Vertical Agreements and User Access
Gaudin, Germain; White, Alexander - 2020
Platforms acting as sales channels for producers often charge users for access, via a subscription fee or a markup on hardware. We compare two common forms of vertical pricing agreement that platforms use with sellers: per-­unit and proportional fees. In particular, we analyze the critical role...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10014033182
Saved in:
Cover Image
Vertical Agreements and User Access
Gaudin, Germain - 2020
Platforms acting as sales channels for producers often charge users for access, via a subscription fee or a markup on hardware. We compare two common forms of vertical pricing agreement that platforms use with sellers: per-unit and proportional fees. In particular, we analyze the critical role...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10012826139
Saved in:
Cover Image
Development of Trust Based Access Control Models Using Fuzzy Logic in Cloud Computing
Kesarwani, Abhishek - 2020
Cloud computing is the technology that provides different types of services as a useful resource on the Internet. Resource trust value will help the cloud users to select the services of a cloud provider for processing and storing their essential information. Also, service providers can give...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10014091143
Saved in:
Cover Image
Vertical agreements and user access
Gaudin, Germain; White, Alexander - In: American economic journal 13 (2021) 3, pp. 328-371
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10012655814
Saved in:
Cover Image
Access control system for RFID-tagged documents in supply chain management
Nowicki, Tadeusz; Kiedrowicz, Maciej; Waszkowski, Robert; … - In: LogForum : elektroniczne czasopismo naukowe z dziedziny … 13 (2017) 1, pp. 91-101
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10011808610
Saved in:
Cover Image
Enhance the security properties and information flow control
El Moussaid, Nadya; El Azhari, Maryam - In: International journal of electronic business : IJEB 15 (2020) 3, pp. 249-274
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10012271210
Saved in:
Cover Image
Enabling attribute revocation for fine-grained access control in blockchain-IoT systems
Yu, Guangsheng; Zha, Xuan; Wang, Xu; Ni, Wei; Yu, Kan; … - In: IEEE transactions on engineering management : EM 67 (2020) 4, pp. 1213-1230
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10012387941
Saved in:
Cover Image
Access control and information flow control for web services security
Kedjar, Saadia; Tari, Abdelkamel - 2020
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10012169730
Saved in:
Cover Image
Analysis of healthcare workflows in accordance with access control policies
Lakaraju, Sandeep; Xu, Dianxiang; Wang, Yong - 2020
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10012169745
Saved in:
Cover Image
Rentabilität von Identity und Access Management im digitalen Wandel
Messerschmidt, Phillip - 2020
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10012250969
Saved in:
Cover Image
Awareness of password management and adoption of digital banking services in rural India
Bansal, Nitin - In: Finance India : the quarterly journal of Indian … 34 (2020) 2, pp. 861-874
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10012792311
Saved in:
Cover Image
Unified enterprise modelling language-based interoperability for collaborative access control framework in critical infrastructures
Baina, Amine; Benali, Khalid; Bellafkih, Mostafa; Aali, … - In: International journal of networking and virtual … 22 (2020) 1, pp. 75-100
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10012178096
Saved in:
Cover Image
Broadband industry structure and cybercrime : an empirical analysis
Gideon, Carolyn; Hogendorn, Christiaan - 2015 - Preliminary draft, Draft 2.0
Prior studies have shown that while ISPs are well positioned to provide residential and SME users critical protection from cybercrime, their incentives to do so are often insufficient. The presence of competition in providing broadband service is a factor we might expect to impact such...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10011526783
Saved in:
Cover Image
Investigating radio-frequency identification usage behaviours and organisational performance according to factors of user perception
Tang, Linglang; Chan, Ya-wen; Shen, Sheng-Lun - In: International journal of services technology and management 25 (2019) 3/4, pp. 199-214
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10012101600
Saved in:
Cover Image
Data Breaches and Identity Theft
Roberds, William - 2014
This paper presents a monetary-theoretic model to study the implications of networks' collection of personal identifying data and data security on each other's incidence and costs of identity theft. To facilitate trade, agents join clubs (networks) that compile and secure data. Too much data...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10012708651
Saved in:
Cover Image
FRABAC: a new hybrid access control model for the heterogeneous multi-domain systems
Ben Attia, Hasiba; Kahloul, Laid; Benharzallah, Saber - In: International journal of management and decision making … 17 (2018) 3, pp. 245-278
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10011971578
Saved in:
Cover Image
IT-Sicherheit : Konzepte - Verfahren - Protokolle
Eckert, Claudia - 2018 - 10. Auflage
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10011821990
Saved in:
Cover Image
Reducing Underage Alcohol and Tobacco Use : Evidence from the Introduction of Vertical Identification Cards
Bellou, Andriana - 2012
From 1994-2009, forty-three states changed the design of their driver's license/state identification cards in an effort to reduce underage access to and consumption of alcohol and tobacco. In these states, individuals under the age of 21 are issued licenses that are vertically oriented, whereas...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10013098816
Saved in:
Cover Image
Reducing underage alcohol and tobacco use : evidence from the introduction of vertical identification cards
Bellou, Andriana; Bhatt, Rachana - 2012
From 1994-2009, forty-three states changed the design of their driver's license/state identification cards in an effort to reduce underage access to and consumption of alcohol and tobacco. In these states, individuals under the age of 21 are issued licenses that are vertically oriented, whereas...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10009656636
Saved in:
Cover Image
Continuous user authentication on touch-screen mobile phones : toward more secure and usable m-commerce
Zhang, Dongsong; Kang, Yin; Zhou, Lina; Lai, Jianwei - In: Internetworked world : 15th Workshop on e-Business, WeB …, (pp. 225-236). 2017
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10011758993
Saved in:
Cover Image
Customer perception and behavioral intention to use biometric-enabled e-banking services in India
Varma, Siddharth; Gupta, Ruchika - In: Business analytics and cyber security management in …, (pp. 137-146). 2017
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10011586306
Saved in:
Cover Image
Mobile application development, usability, and security
Mukherjea, Sougata (ed.) - 2017
"This book provides a thorough overview on the different facets of mobile technology management and its integration into modern society, highlighting issues related to analytics, cloud computing, and different types of application development"--Provided by publisher.
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10012395070
Saved in:
Cover Image
Using classification for role-based access control management
Badar, Nazia; Vaidya, Jaideep; Vijayalakshmi, Alturi; … - In: International journal of technology, policy and … 16 (2016) 1, pp. 45-78
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10011607564
Saved in:
Cover Image
Konvergenz und Divergenz der sicheren Authentifizierung im browserbasierten Online-Banking und E-Government in Deutschland
Diederich, Günther - 2015
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10011545702
Saved in:
Cover Image
Onlineidentifikation : medienbruchfreies Multikanalmanagement
Fürst, Franz Thomas; Jorga, Frank Stefan - In: Multi- und Omnichannel-Management in Banken und …, (pp. 363-375). 2015
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10011305192
Saved in:
Cover Image
Data breaches and identity theft
Roberds, William (contributor);  … - 2008
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10003768483
Saved in:
Cover Image
The cost impact of spam filters : measuring the effect of information system technologies in organizations
Caliendo, Marco; Clement, Michel; Papies, Dominik; … - 2008
More than 70% of global e-mail traffic consists of unsolicited and commercial direct marketing, also known as spam. Dealing with spam incurs high costs for organizations, prompting efforts to try to reduce spam-related costs by installing spam filters. Using modern econometric methods to reduce...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10003762188
Saved in:
Cover Image
On the design of a privacy aware authorization engine for collaborative environments
Gogoulos, Fotius I.; Antonakopoulou, Anna; Lioudakis, … - In: Electronic markets : the international journal on … 24 (2014) 2, pp. 101-112
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10010367264
Saved in:
Cover Image
Biometric authentication : verifying a user's identity using a frequentist probability model of keystroke intervals
Voloshin, Mikhail - In: Emerging methods in predictive analytics : risk …, (pp. 254-269). 2014
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10010367399
Saved in:
Cover Image
Ownership, access, and sequential
Mai, Maxim; Smirnov, Vladimir; Wait, Andrew - In: The Canadian journal of economics 47 (2014) 1, pp. 203-231
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10010373271
Saved in:
Cover Image
The impact of digital fingerprinting and identity verification on data quality : duplication detection is not a perfect science
Courtright, Melanie; Pashupati, Kartik - In: Journal of advertising research 54 (2014) 3, pp. 263-269
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10010419829
Saved in:
Cover Image
Role refinement in access control : model and analysis
Xia, Hao; Dawande, Milind; Mookerjee, Vijay S. - In: INFORMS journal on computing : JOC 26 (2014) 4, pp. 866-884
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10010477689
Saved in:
Cover Image
Real-time Security Extensions for EPCglobal Networks : Case Study for the Pharmaceutical Industry
Schapranow, Matthieu-Patrick - 2014
Introduction -- Related Work -- Security in EPCglobal Networks -- Device-level Extensions -- Business-level Extensions for Event Repositories -- Qualitative and Quantitative Discussion -- Evaluation -- Conclusion -- Appendices.
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10014016802
Saved in:
Cover Image
Enterprise Identity Management : Towards an Investment Decision Support Approach
Royer, Denis - 2013
Introduction -- Scientific Positioning and Research Approach -- EIdM: Concepts, Technologies, and Application Fields -- Evaluation of EIdMS Investments -- A Decision Support Model for the Introduction of EIdMS Systems -- Prototype Implementation of an EIdMS Decision Support System -- Empirical...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10014016570
Saved in:
Cover Image
Ground access to airports, case study : Port Columbus International Airport
Akar, Gulsah - In: Journal of air transport management 30 (2013), pp. 25-31
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10009772856
Saved in:
Cover Image
Advanced biometric technology : reinforcing security within payment systems
Coetzee, Marius - In: Journal of payments strategy & systems 7 (2013/14) 1, pp. 73-89
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10009740326
Saved in:
Cover Image
Methodenunterstützte Berechtigungsvergabe : Neugestaltung und Anpassung bestehender Berechtigungskonzepte auf Basis realer Anforderungen
Füller, Marlon - 2013 - 1., Aufl
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10009722033
Saved in:
Cover Image
Enterprise identity management : towards an investment decision support approach
Royer, Denis - 2013
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10009728017
Saved in:
Cover Image
Qualitätssicherung im Identity- und Access Management
Fuchs, Ludwig; Pernul, Günther - In: HMD : Praxis der Wirtschaftsinformatik 50 (2013) 289, pp. 88-97
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10009730921
Saved in:
Cover Image
Reducing underage alcohol and tobacco use : evidence from the introduction of vertical identification cards
Bellou, Andriana; Bhatt, Rachana - In: Journal of health economics 32 (2013) 2, pp. 353-366
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10009735035
Saved in:
Cover Image
Modeling airport employees commuting mode choice
Tsamboulas, Dimitrios; Evmorfopoulos, A. P.; Moraiti, P. - In: Journal of air transport management 18 (2012) 1, pp. 74-77
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10009701765
Saved in:
Cover Image
MyBank : creating and launching a pan-European e-authorisation solution for e-commerce transactions
Broxis, John - In: Journal of payments strategy & systems 6 (2012/13) 4, pp. 345-351
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10009718096
Saved in:
Cover Image
Decentralised privacy preservation in social networks
Chinaei, Amir H.; Adl, Rosa Karimi; Liang, Chenen; … - In: International journal of business information systems : … 9 (2012) 4, pp. 402-414
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10009513969
Saved in:
Cover Image
A mediated access control infrastructure for dynamic service selection
Fritsch, Christoph - 2012
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10009576112
Saved in:
Cover Image
Negotiation of weighted RTML credentials on mobile devices
Bistarelli, Stefano; Martinelli, Fabio; Roperti, Francesco - In: Information systems : crossroads for organization, …, (pp. 429-438). 2012
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10009577615
Saved in:
Cover Image
Prioritizing role engineering objectives using the analytic hierarchy process
Colantonio, Alessandro - In: Information systems : crossroads for organization, …, (pp. 419-427). 2012
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10009577617
Saved in:
Cover Image
Towards improving usability of authentication systesm using smartphones for logical and physical resource access in a single sign-on environment
Carullo, Giuliana; Ferrucci, Filomena; Sarro, Federica - In: Information systems : crossroads for organization, …, (pp. 145-153). 2012
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10009577680
Saved in:
  • 1
  • 2
  • 3
  • Next
  • Last
A service of the
zbw
  • Sitemap
  • Plain language
  • Accessibility
  • Contact us
  • Imprint
  • Privacy

Loading...