EconBiz - Find Economic Literature
    • Logout
    • Change account settings
  • EN 
    • DE
    • ES
    • FR
  • A-Z
  • Beta
  • About EconBiz
  • News
  • Thesaurus (STW)
  • Research Skills
  • Help
  • EN 
    • DE
    • ES
    • FR
  •  My account 
    • Logout
    • Change account settings
  • Login
Publications Events
Search options
Advanced Search history
My EconBiz
Favorites Loans Reservations Fines
    You are here:
  • Home
  • Search: subject_exact:"Zutrittskontrolle"
Narrow search

Narrow search

Year of publication
Subjects
All
Zutrittskontrolle 91 User access control 88 Data security 45 Datensicherheit 45 IT-Kriminalität 17 IT crime 16 Biometrics 13 Biometrie 13 Theorie 13 Theory 13 Zugriffskontrolle 11 USA 10 United States 9 Betriebliches Informationssystem 8 Datenschutz 8 E-Business 8 E-business 8 Computer network 7 Computernetz 7 Data protection 7 Deutschland 7 Germany 7 Information management 6 Informationsmanagement 6 Internet 6 Electronic Banking 5 Electronic banking 5 Authentifikation 4 Business intelligence system 4 Computersicherheit 4 Database 4 Datenbank 4 Identitätsverwaltung 4 Datensicherung 3 Enterprise architecture 3 Großbritannien 3 Informationssystem 3 Innovation adoption 3 Innovationsakzeptanz 3 Internet marketing 3
more ... less ...
Online availability
All
Free 7
Type of publication
All
Article 76 Book / Working Paper 25
Type of publication (narrower categories)
All
Article in book 39 Aufsatz im Buch 39 Article in journal 37 Aufsatz in Zeitschriften 37 Working Paper 8 Hochschulschrift 7 Dissertation 6 Graue Literatur 6 Non-commercial literature 6 Thesis 6 Arbeitspapier 5 Case study 3 Fallstudie 3 Collection of articles of several authors 2 Dissertation u.a. Prüfungsschriften 2 Sammelwerk 2 Aufsatzsammlung 1 Congress report 1 Forschungsbericht 1 Kongress 1 Kongressschrift 1
more ... less ...
Language
All
English 77 German 22 Undetermined 2
Persons
All
Roberds, William 3 Schreft, Stacey L. 3 Bellou, Andriana 2 Bhatt, Rachana 2 Caliendo, Marco 2 Clement, Michel 2 Fuchs, Ludwig 2 Li, Yan 2 Papies, Dominik 2 Scheel-Kopeinig, Sabine 2 Sowa, Aleksandra 2 Stepien, Bernard 2 Sun, Lili 2 Wang, Hua 2 Abdullah, Matin Saad 1 Adi, Kamel 1 Adl, Rosa Karimi 1 Ahmed, Waseem 1 Akar, Gulsah 1 Al-Harby, Fahad 1 Ansari, Zahid A. 1 Arshad, Junaid 1 Baldimtsi, F. 1 Bar-Josef, Noa 1 Barker, Ken 1 Bartmann, Dieter 1 Barz, Christiane 1 Baumgärtner, Frank 1 Bayliss, Christopher 1 Bertino, Elisa 1 Birch, David G. W. 1 Bistarelli, Stefano 1 Blake, Ian F. 1 Bouzida, Yacine 1 Bowers, Dan M. 1 Božović, Vladimir 1 Broxis, John 1 Burnett, Royce D. 1 Böttcher, Stefan 1 Büllingen, Franz 1
more ... less ...
Institutions
All
ICETE <4, 2007, Barcelona> 1
Published in...
All
E-business and telecommunications : 4th international conference ; revised selected papers 10 E-technologies: innovation in an open world : 4th international conference, MCETECH 2009, Ottawa, Canada, May 4-6, 2009 ; proceedings 3 HMD : Praxis der Wirtschaftsinformatik 3 Information systems : crossroads for organization, management, accounting and engineering : ItAIS: the Italian Association for Information Systems 3 Journal of organizational computing and electronic commerce 3 Berichte aus der Wirtschaftsinformatik 2 Decision support systems : DSS : the international journal 2 Digital identity management : perspectives on the technological, business and social implications 2 Discussion paper series 2 E-technologies: transformation in a connected world : 5th international conference, MCETECH 2011, Les Diablerets, Switzerland, January 23 - 26, 2011 ; revised selected papers 2 International journal of business information systems : IJBIS 2 Journal of air transport management 2 Journal of internet commerce 2 Journal of payments strategy & systems 2 Web 2.0 und soziale Netzwerke - Risiko oder strategische Chance? : Handlungsoptionen für die Zukunftsperspektive von Kreditinstituten 2 Wissen - Märkte - Geistiges Eigentum 2 Banking and information technology : BIT ; a strategic report for top management 1 Business analytics and cyber security management in organizations 1 Business intelligence : methods and applications ; essays in honor of Prof. Dr. Hans-J. Lenz 1 Communications in computer and information science 1 Contemporary economic policy : a journal of Western Economic Association International 1 Discussion Paper Series, Forschungsinstitut zur Zukunft der Arbeit 1 Diskussionsbeiträge 1 Diskussionsbeiträge zu Wirtschaftsinformatik und Operations Research 1 ERP-Management : Zeitschrift für unternehmensweite Anwendungssysteme 1 Edition <kes> 1 Emerging methods in predictive analytics : risk management and decision-making 1 Enterprise applications and services in the finance industry : 3. international workshop, FinanceCom 2007, Montreal, Canada, December 8, 2007 ; revised papers 1 Finanzierung, Leasing, Factoring : FLF 1 ITK-Kompendium ... : Expertenwissen, Trends und Lösungen in der Informations- und Kommunikationstechnologie 1 IZA discussion papers 1 Ideas, insights and innovation on management research : an international perspective 1 Information resources management ; Vol. 2 1 Information systems and new applications in the service sector : models and methods 1 Innovations in SMEs and conducting e-business : technologies, trends and solutions 1 International journal of e-business research : an official publication of the Information Resources Management Association 1 International journal of electronic commerce : IJEC 1 International journal of electronic customer relationship management : IJECRM 1 International journal of electronic finance : IJEF 1 International journal of enterprise network management 1
more ... less ...
Sources
All
ECONIS (ZBW) 92 USB Cologne (EcoSocSci) 6 EconStor 3
Showing 1 - 50 of 101
Cover Image
Broadband industry structure and cybercrime : an empirical analysis
Gideon, Carolyn; Hogendorn, Christiaan - 2015 - Preliminary draft, Draft 2.0
Prior studies have shown that while ISPs are well positioned to provide residential and SME users critical protection from cybercrime, their incentives to do so are often insufficient. The presence of competition in providing broadband service is a factor we might expect to impact such...
Saved in:
Cover Image
Customer perception and behavioral intention to use biometric-enabled e-banking services in India
Varma, Siddharth; Gupta, Ruchika - In: Business analytics and cyber security management in …, (pp. 137-146). 2017
Saved in:
Cover Image
Continuous user authentication on touch-screen mobile phones : toward more secure and usable m-commerce
Zhang, Dongsong; Kang, Yin; Zhou, Lina; Lai, Jianwei - In: Internetworked world : 15th Workshop on e-Business, WeB …, (pp. 225-236). 2017
Saved in:
Cover Image
Reducing underage alcohol and tobacco use: Evidence from the introduction of vertical identification cards
Bellou, Andriana; Bhatt, Rachana - 2012
From 1994-2009, forty-three states changed the design of their driver's license/state identification cards in an effort to reduce underage access to and consumption of alcohol and tobacco. In these states, individuals under the age of 21 are issued licenses that are vertically oriented, whereas...
Saved in:
Cover Image
Reducing underage alcohol and tobacco use : evidence from the introduction of vertical identification cards
Bellou, Andriana; Bhatt, Rachana - 2012
From 1994-2009, forty-three states changed the design of their driver's license/state identification cards in an effort to reduce underage access to and consumption of alcohol and tobacco. In these states, individuals under the age of 21 are issued licenses that are vertically oriented, whereas...
Saved in:
Cover Image
Onlineidentifikation : medienbruchfreies Multikanalmanagement
Fürst, Franz Thomas; Jorga, Frank Stefan - In: Multi- und Omnichannel-Management in Banken und …, (pp. 363-375). 2015
Saved in:
Cover Image
Mobility handling in wireless body area networks for patient monitoring in smart hospital
Venkateswari, R.; Rani, S. Subha - In: International journal of enterprise network management 6 (2015) 4, pp. 251-262
Saved in:
Cover Image
Konvergenz und Divergenz der sicheren Authentifizierung im browserbasierten Online-Banking und E-Government in Deutschland
Diederich, Günther - 2015
Saved in:
Cover Image
The impact of digital fingerprinting and identity verification on data quality : duplication detection is not a perfect science
Courtright, Melanie; Pashupati, Kartik - In: Journal of advertising research 54 (2014) 3, pp. 263-269
Saved in:
Cover Image
Biometric authentication : verifying a user's identity using a frequentist probability model of keystroke intervals
Voloshin, Mikhail - In: Emerging methods in predictive analytics : risk …, (pp. 254-269). 2014
Saved in:
Cover Image
Ownership, access, and sequential
Mai, Maxim; Smirnov, Vladimir; Wait, Andrew - In: The Canadian journal of economics 47 (2014) 1, pp. 203-231
Saved in:
Cover Image
Advanced biometric technology : reinforcing security within payment systems
Coetzee, Marius - In: Journal of payments strategy & systems 7 (2013/14) 1, pp. 73-89
Saved in:
Cover Image
Qualitätssicherung im Identity- und Access Management
Fuchs, Ludwig; Pernul, Günther - In: HMD : Praxis der Wirtschaftsinformatik 50 (2013) 289, pp. 88-97
Saved in:
Cover Image
Methodenunterstützte Berechtigungsvergabe : Neugestaltung und Anpassung bestehender Berechtigungskonzepte auf Basis realer Anforderungen
Füller, Marlon - 2013 - 1., Aufl
Preview
Preview
Saved in:
Cover Image
Enterprise identity management : towards an investment decision support approach
Royer, Denis - 2013
Preview
Preview
Saved in:
Cover Image
Ground access to airports, case study : Port Columbus International Airport
Akar, Gulsah - In: Journal of air transport management 30 (2013), pp. 25-31
Saved in:
Cover Image
The cost impact of spam filters: measuring the effect of information system technologies in organizations
Caliendo, Marco; Clement, Michel; Papies, Dominik; … - 2008
More than 70% of global e-mail traffic consists of unsolicited and commercial direct marketing, also known as spam. Dealing with spam incurs high costs for organizations, prompting efforts to try to reduce spam-related costs by installing spam filters. Using modern econometric methods to reduce...
Saved in:
Cover Image
Data breaches and identity theft
Roberds, William; Schreft, Stacey L. - 2008
This paper presents a monetary-theoretic model to study the implications of networks' collection of personal identifying data and data security on each other's incidence and costs of identity theft. To facilitate trade, agents join clubs (networks) that compile and secure data. Too much data...
Saved in:
Cover Image
The cost impact of spam filters : measuring the effect of information system technologies in organizations
Caliendo, Marco (contributor); Clement, Michel (contributor) - 2008
More than 70% of global e-mail traffic consists of unsolicited and commercial direct marketing, also known as spam. Dealing with spam incurs high costs for organizations, prompting efforts to try to reduce spam-related costs by installing spam filters. Using modern econometric methods to reduce...
Preview
Preview
Saved in:
Cover Image
Data breaches and identity theft
Roberds, William (contributor);  … - 2008
Preview
Preview
Saved in:
Cover Image
Negotiation of weighted RTML credentials on mobile devices
Bistarelli, Stefano (contributor);  … - In: Information systems : crossroads for organization, …, (pp. 429-438). 2012
Saved in:
Cover Image
Prioritizing role engineering objectives using the analytic hierarchy process
Colantonio, Alessandro - In: Information systems : crossroads for organization, …, (pp. 419-427). 2012
Saved in:
Cover Image
Towards improving usability of authentication systesm using smartphones for logical and physical resource access in a single sign-on environment
Carullo, Giuliana; Ferrucci, Filomena; Sarro, Federica - In: Information systems : crossroads for organization, …, (pp. 145-153). 2012
Saved in:
Cover Image
Context-sensitive access control model for government services
Gostojić, Stevan (contributor); Sladić, Goran (contributor) - In: Journal of organizational computing and electronic commerce 22 (2012) 2, pp. 184-213
Saved in:
Cover Image
Modeling airport employees commuting mode choice
Tsamboulas, Dimitrios; Evmorfopoulos, A. P.; Moraiti, P. - In: Journal of air transport management 18 (2012) 1, pp. 74-77
Saved in:
Cover Image
Decentralised privacy preservation in social networks
Chinaei, Amir H. (contributor); Adl, Rosa Karimi (contributor) - In: International journal of business information systems : … 9 (2012) 4, pp. 402-414
Saved in:
Cover Image
A mediated access control infrastructure for dynamic service selection
Fritsch, Christoph - 2012
Preview
Preview
Saved in:
Cover Image
MyBank : creating and launching a pan-European e-authorisation solution for e-commerce transactions
Broxis, John - In: Journal of payments strategy & systems 6 (2012/13) 4, pp. 345-351
Saved in:
Cover Image
Zugriffskontrolle in Geschäftsprozessen : Ein modellgetriebener Ansatz
Klarl, Heiko - 2011
Preview
Preview
Saved in:
Cover Image
The design, development and application of a proxy credential auditing infrastructure for collaborative research
Bayliss, Christopher (contributor);  … - In: E-technologies: transformation in a connected world : …, (pp. 211-226). 2011
Saved in:
Cover Image
A systematic approach to web application penetration testing using TTCN-3
Stepien, Bernard; Xiong, Pulei; Peyton, Liam - In: E-technologies: transformation in a connected world : …, (pp. 1-16). 2011
Saved in:
Cover Image
Access control method with XML databases
Sun, Lili; Li, Yan; Wang, Hua - In: Information systems and new applications in the service …, (pp. 227-239). 2011
Saved in:
Cover Image
An image-based authentication for mobile phone to prevent unauthorised usage
Roomi, S. Mohamed Mansoor (contributor);  … - In: International journal of electronic customer … 5 (2011) 3/4, pp. 250-258
Saved in:
Cover Image
Adoption of biometric authentication systems : implications for research and practice in the deployment of end-user security systems
Laux, Dawn (contributor); Luse, Andy (contributor);  … - In: Journal of organizational computing and electronic commerce 21 (2011) 3, pp. 221-245
Saved in:
Cover Image
Integrating business process modelling and ERP role engineering
Panayiotou, Nikolaos A.; Gayialis, Sotiris P.; … - In: International journal of business information systems : … 8 (2011) 1, pp. 66-86
Saved in:
Cover Image
A conditional role-involved purpose-based access control model
Kabir, Md. Enamul; Wang, Hua; Bertino, Elisa - In: Journal of organizational computing and electronic commerce 21 (2011) 1, pp. 71-91
Saved in:
Cover Image
Automatic editing rights management in Wikipedia
Wöhner, Thomas; Köhler, Sebastian; Peters, Ralf - 2011
Preview
Preview
Saved in:
Cover Image
Mit dem E-Perso in die Wolke
Reisner, Stefan - In: Wirtschaftsinformatik & Management : WuM : die … 3 (2011) 3, pp. 68-70
Saved in:
Cover Image
Semantic mapping for access control model
Zhao, Yi; Halang, Wolfgang A. - In: Innovations in SMEs and conducting e-business : …, (pp. 247-262). 2011
Saved in:
Cover Image
A looking-out portal (LOP) approach to enhance qualitative aspects of bandwidth utilisation in academic networks
Ahmed, Waseem (contributor); Ansari, Zahid A. (contributor);  … - In: International journal of networking and virtual … 9 (2011) 4, pp. 317-330
Saved in:
Cover Image
Sicherheit für Banken in einer vernetzen Welt
Martini, Ullrich - In: Web 2.0 und soziale Netzwerke - Risiko oder …, (pp. 413-432). 2011
Saved in:
Cover Image
Sicherheitsstrategien für das Online-Angebot von Banken
Kraus, Hans-Peter - In: Web 2.0 und soziale Netzwerke - Risiko oder …, (pp. 389-412). 2011
Saved in:
Cover Image
The role of access control in risk management
Hardy, Keith - In: Managing business risk : a practical guide to …, (pp. 215-219). 2010
Saved in:
Cover Image
Commercial Internet filters : perils and opportunities
Chou, Chen-huei; Sinha, Atish P.; Huimin, Zhao - In: Decision support systems : DSS : the international journal 48 (2009/10) 4, pp. 521-530
Saved in:
Cover Image
Governance Risk Compliance im SAP-Umfeld der Banken
Petermann, Sven; Sowa, Aleksandra - In: HMD : Praxis der Wirtschaftsinformatik 47 (2010) 272, pp. 91-99
Saved in:
Cover Image
Das Electronic Banking mit dem neuen Personalausweis (nPA) : Authentifikation und elektronische Signatur
Wunderlich, Torsten - In: Finanzierung, Leasing, Factoring : FLF 57 (2010) 3, pp. 109-112
Saved in:
Cover Image
Neue Chancen im Service Management durch Sprachbiometrie
Baumgärtner, Frank - In: Professionelles Sales & Service Management : Vorsprung …, (pp. 233-258). 2010
Saved in:
Cover Image
Towards an understanding of user acceptance to use biometric authentication systems in e-commerce : using an extension of the Technology Acceptance Model
Al-Harby, Fahad; Qahwaji, Rami; Kamala, Mumtaz - In: International journal of e-business research : an … 6 (2010) 3, pp. 34-55
Saved in:
Cover Image
Rollen und Berechtigungskonzepte : Ansätze für das Identity- und Access Management im Unternehmen
Tsolkas, Alexander; Schmidt, Klaus - 2010 - 1. Aufl.
Preview
Preview
Saved in:
Cover Image
Managing information access in data-rich enterprises with escalation and incentives
Zhao, Xia; Johnson, M. Eric - In: International journal of electronic commerce : IJEC 15 (2010/11) 1, pp. 79-111
Saved in:
  • 1
  • 2
  • 3
  • Next
A service of the
zbw
Questions? Chat with us

Questions? Chat with us

Loading...
 Searching for statistics or facts?
  • Sitemap
  • Contact us
  • Imprint
  • Privacy

Loading...