EconBiz - Find Economic Literature
    • Logout
    • Change account settings
  • A-Z
  • Beta
  • About EconBiz
  • News
  • Thesaurus (STW)
  • Research Skills
  • Help
  •  My account 
    • Logout
    • Change account settings
  • Login
EconBiz - Find Economic Literature
Publications Events
Search options
Advanced Search history
My EconBiz
Favorites Loans Reservations Fines
    You are here:
  • Home
  • Search: subject_exact:"Zutrittskontrolle"
Narrow search

Attention

ZBW has fallen victim to a cyber attack.For this reason, EconBiz was offline for several weeks. Many EconBiz services are now online again. Please excuse the circumstances!
Details  Contact

Narrow search

Year of publication
Subject
All
Zutrittskontrolle 108 User access control 104 Data security 55 Datensicherheit 55 IT-Kriminalität 22 IT crime 21 Zugriffskontrolle 17 Theorie 16 Theory 16 Biometrics 14 Biometrie 14 Datenschutz 11 Betriebliches Informationssystem 10 Data protection 10 USA 10 United States 9 Computer network 8 Computernetz 8 E-Business 8 E-business 8 Deutschland 7 Germany 7 Identitätsverwaltung 7 Information management 7 Informationsmanagement 7 Datensicherung 6 Electronic Banking 6 Electronic banking 6 Internet 6 Soziale Kosten 6 Authentifikation 5 Business intelligence system 5 Computersicherheit 5 Kriminalitätsökonomik 5 Social costs 5 Airport 4 Alkoholkonsum 4 Database 4 Datenbank 4 Digitale Dienste 4
more ... less ...
Online availability
All
Free 14 Undetermined 11
Type of publication
All
Article 85 Book / Working Paper 39
Type of publication (narrower categories)
All
Article in journal 43 Aufsatz in Zeitschrift 43 Aufsatz im Buch 42 Book section 42 Working Paper 11 Graue Literatur 9 Non-commercial literature 9 Hochschulschrift 8 Arbeitspapier 7 Thesis 6 Case study 3 Collection of articles of several authors 3 Fallstudie 3 Sammelwerk 3 Aufsatzsammlung 2 Dissertation u.a. Prüfungsschriften 2 Forschungsbericht 2 Conference paper 1 Conference proceedings 1 Konferenzbeitrag 1 Konferenzschrift 1
more ... less ...
Language
All
English 96 German 26 Undetermined 2
Author
All
Bellou, Andriana 4 Roberds, William 4 Bhatt, Rachana 3 Schreft, Stacey L. 3 Büllingen, Franz 2 Caliendo, Marco 2 Clement, Michel 2 Eckert, Claudia 2 Fuchs, Ludwig 2 Hillebrand, Annette 2 Li, Yan 2 Papies, Dominik 2 Royer, Denis 2 Scheel-Kopeinig, Sabine 2 Sowa, Aleksandra 2 Stamm, Peter 2 Stepien, Bernard 2 Sun, Lili 2 Wang, Hua 2 Abdullah, Matin Saad 1 Adi, Kamel 1 Adl, Rosa Karimi 1 Ahmed, Waseem 1 Akar, Gulsah 1 Al-Harby, Fahad 1 Ansari, Zahid A. 1 Antonakopoulou, Anna 1 Arshad, Junaid 1 Baldimtsi, F. 1 Bansal, Nitin 1 Bar-Josef, Noa 1 Barker, Ken 1 Bartmann, Dieter 1 Barz, Christiane 1 Baumgärtner, Frank 1 Bayliss, Christopher 1 Bertino, Elisa 1 Bhatt, Rachana R. 1 Birch, David G. W. 1 Bistarelli, Stefano 1
more ... less ...
Institution
All
ICETE <4, 2007, Barcelona> 1 Verlag Dr. Kovač 1
Published in...
All
E-business and telecommunications : 4th international conference ; revised selected papers 10 E-technologies: innovation in an open world : 4th international conference, MCETECH 2009, Ottawa, Canada, May 4-6, 2009 ; proceedings 3 HMD : Praxis der Wirtschaftsinformatik 3 Information systems : crossroads for organization, management, accounting and engineering : ItAIS: the Italian Association for Information Systems 3 Journal of organizational computing and electronic commerce 3 Berichte aus der Wirtschaftsinformatik 2 Decision support systems : DSS ; the international journal 2 Digital identity management : perspectives on the technological, business and social implications 2 Discussion paper series / IZA 2 E-technologies: transformation in a connected world : 5th international conference, MCETECH 2011, Les Diablerets, Switzerland, January 23 - 26, 2011 ; revised selected papers 2 IZA Discussion Papers 2 Information diffusion management and knowledge sharing ; volume 1 2 International journal of business information systems : IJBIS 2 Journal of air transport management 2 Journal of internet commerce 2 Journal of payments strategy & systems 2 SpringerLink / Bücher 2 Web 2.0 und soziale Netzwerke - Risiko oder strategische Chance? : Handlungsoptionen für die Zukunftsperspektive von Kreditinstituten 2 Wissen - Märkte - Geistiges Eigentum 2 Advances in multimedia and interactive technologies 1 Banking and information technology / Deutsche Ausgabe : BIT ; a strategic report for top management 1 Business analytics and cyber security management in organizations 1 Business intelligence : methods and applications ; essays in honor of Prof. Dr. Hans-J. Lenz 1 Communications in computer and information science 1 Contemporary economic policy : a journal of Western Economic Association International 1 De Gruyter Oldenbourg Studium 1 Diskussionsbeiträge / Wissenschaftliches Institut für Infrastruktur und Kommunikationsdienste 1 Diskussionsbeiträge zu Wirtschaftsinformatik und Operations Research 1 ERP-Management : Auswahl, Einführung und Betrieb von ERP-Systemen 1 Edition <kes> 1 Electronic markets : the international journal on networked business 1 Emerging methods in predictive analytics : risk management and decision-making 1 Enterprise applications and services in the finance industry : 3. international workshop, FinanceCom 2007, Montreal, Canada, December 8, 2007 ; revised papers 1 European journal of operational research : EJOR 1 FAZIT-Schriftenreihe : Forschung, Informations- und Medientechnologien in Baden-Württemberg 1 Federal Reserve Bank of Atlanta Working Paper 1 Federal Reserve Bank of Philadelphia - Payment Cards Center Discussion Paper 1 Finance India : the quarterly journal of Indian Institute of Finance 1 Finanzierung, Leasing, Factoring : FLF 1 IEEE transactions on engineering management : EM 1
more ... less ...
Source
All
ECONIS (ZBW) 114 USB Cologne (EcoSocSci) 6 EconStor 4
Showing 1 - 50 of 124
Cover Image
User acceptance of voice biometrics in managing the physical access to a secure area of an international airport
Cornacchia, Michele; Papa, Filomena; Sapio, Bartolomeo - In: Technology analysis & strategic management 32 (2020) 10, pp. 1236-1250
Persistent link: https://ebtypo.dmz1.zbw/10012315019
Saved in:
Cover Image
Rentabilität von Identity und Access Management im digitalen Wandel
Messerschmidt, Phillip - 2020
Preview
Preview
Persistent link: https://ebtypo.dmz1.zbw/10012250969
Saved in:
Cover Image
Enabling attribute revocation for fine-grained access control in blockchain-IoT systems
Yu, Guangsheng; Zha, Xuan; Wang, Xu; Ni, Wei; Yu, Kan; … - In: IEEE transactions on engineering management : EM 67 (2020) 4, pp. 1213-1230
Persistent link: https://ebtypo.dmz1.zbw/10012387941
Saved in:
Cover Image
Awareness of password management and adoption of digital banking services in rural India
Bansal, Nitin - In: Finance India : the quarterly journal of Indian … 34 (2020) 2, pp. 861-874
Persistent link: https://ebtypo.dmz1.zbw/10012792311
Saved in:
Cover Image
Access control and information flow control for web services security
Kedjar, Saadia; Tari, Abdelkamel - 2020
Persistent link: https://ebtypo.dmz1.zbw/10012169730
Saved in:
Cover Image
Analysis of healthcare workflows in accordance with access control policies
Lakaraju, Sandeep; Xu, Dianxiang; Wang, Yong - 2020
Persistent link: https://ebtypo.dmz1.zbw/10012169745
Saved in:
Cover Image
Out of sight, out of mind : consumer reaction to news on data breaches and identity theft
Mikhed, Vyacheslav; Vogan, Michael - 2015
Persistent link: https://ebtypo.dmz1.zbw/10011449313
Saved in:
Cover Image
Broadband industry structure and cybercrime : an empirical analysis
Gideon, Carolyn; Hogendorn, Christiaan - 2015 - Preliminary draft, Draft 2.0
Prior studies have shown that while ISPs are well positioned to provide residential and SME users critical protection from cybercrime, their incentives to do so are often insufficient. The presence of competition in providing broadband service is a factor we might expect to impact such...
Persistent link: https://ebtypo.dmz1.zbw/10011526783
Saved in:
Cover Image
Cybersecurity, Data Breaches, and the Economic Loss Doctrine
Opderbeck, David W. - 2015
Data breaches are pervasive and costly. Recent civil data breach cases have centered on the consumer credit card payment chain in the retail industry. An important issue in such cases is whether the economic loss doctrine should bar negligence claims for purely pecuniary losses suffered by a...
Persistent link: https://ebtypo.dmz1.zbw/10013018608
Saved in:
Cover Image
Data Breaches and Identity Theft
Roberds, William - 2014
This paper presents a monetary-theoretic model to study the implications of networks' collection of personal identifying data and data security on each other's incidence and costs of identity theft. To facilitate trade, agents join clubs (networks) that compile and secure data. Too much data...
Persistent link: https://ebtypo.dmz1.zbw/10012708651
Saved in:
Cover Image
Privacy and security of electronic patient records : Tailoring multimethodology to explore the socio-political problems associated with Role Based Access Control systems
Small, Adrian; Wainwright, David - In: European journal of operational research : EJOR 265 (2018) 1, pp. 344-360
Persistent link: https://ebtypo.dmz1.zbw/10011805485
Saved in:
Cover Image
IT-Sicherheit : Konzepte - Verfahren - Protokolle
Eckert, Claudia - 2018 - 10. Auflage
Preview
Preview
Persistent link: https://ebtypo.dmz1.zbw/10011821990
Saved in:
Cover Image
Mobile application development, usability, and security
Mukherjea, Sougata (ed.) - 2017
"This book provides a thorough overview on the different facets of mobile technology management and its integration into modern society, highlighting issues related to analytics, cloud computing, and different types of application development"--Provided by publisher.
Preview
Preview
Persistent link: https://ebtypo.dmz1.zbw/10012395070
Saved in:
Cover Image
Customer perception and behavioral intention to use biometric-enabled e-banking services in India
Varma, Siddharth; Gupta, Ruchika - In: Business analytics and cyber security management in …, (pp. 137-146). 2017
Persistent link: https://ebtypo.dmz1.zbw/10011586306
Saved in:
Cover Image
Continuous user authentication on touch-screen mobile phones : toward more secure and usable m-commerce
Zhang, Dongsong; Kang, Yin; Zhou, Lina; Lai, Jianwei - In: Internetworked world : 15th Workshop on e-Business, WeB …, (pp. 225-236). 2017
Persistent link: https://ebtypo.dmz1.zbw/10011758993
Saved in:
Cover Image
Reducing underage alcohol and tobacco use: Evidence from the introduction of vertical identification cards
Bellou, Andriana; Bhatt, Rachana - 2012
From 1994-2009, forty-three states changed the design of their driver's license/state identification cards in an effort to reduce underage access to and consumption of alcohol and tobacco. In these states, individuals under the age of 21 are issued licenses that are vertically oriented, whereas...
Persistent link: https://ebtypo.dmz1.zbw/10010289904
Saved in:
Cover Image
Reducing underage alcohol and tobacco use : evidence from the introduction of vertical identification cards
Bellou, Andriana; Bhatt, Rachana - 2012
From 1994-2009, forty-three states changed the design of their driver's license/state identification cards in an effort to reduce underage access to and consumption of alcohol and tobacco. In these states, individuals under the age of 21 are issued licenses that are vertically oriented, whereas...
Persistent link: https://ebtypo.dmz1.zbw/10009656636
Saved in:
Cover Image
Reducing Underage Alcohol and Tobacco Use : Evidence from the Introduction of Vertical Identification Cards
Bellou, Andriana - 2012
From 1994-2009, forty-three states changed the design of their driver's license/state identification cards in an effort to reduce underage access to and consumption of alcohol and tobacco. In these states, individuals under the age of 21 are issued licenses that are vertically oriented, whereas...
Persistent link: https://ebtypo.dmz1.zbw/10013098816
Saved in:
Cover Image
A novel approach to design A5/1 stream cipher using power analysis attack resistant reversible logic gates
Saravanan, P.; Kalpana, P. - In: International journal of enterprise network management 7 (2016) 1, pp. 70-85
Persistent link: https://ebtypo.dmz1.zbw/10011592516
Saved in:
Cover Image
Konvergenz und Divergenz der sicheren Authentifizierung im browserbasierten Online-Banking und E-Government in Deutschland
Diederich, Günther - 2015
Persistent link: https://ebtypo.dmz1.zbw/10011545702
Saved in:
Cover Image
Onlineidentifikation : medienbruchfreies Multikanalmanagement
Fürst, Franz Thomas; Jorga, Frank Stefan - In: Multi- und Omnichannel-Management in Banken und …, (pp. 363-375). 2015
Persistent link: https://ebtypo.dmz1.zbw/10011305192
Saved in:
Cover Image
Legislative Responses to Data Breaches and Information Security Failures
Keitel, Philip Lehman - 2009
On July 23, 2008, the Payment Cards Center of the Federal Reserve Bank of Philadelphia hosted a workshop to discuss federal and state legislative responses to data breaches. The workshop addressed several laws and legislative initiatives designed to create greater safeguards for personal...
Persistent link: https://ebtypo.dmz1.zbw/10012719460
Saved in:
Cover Image
On the design of a privacy aware authorization engine for collaborative environments
Gogoulos, Fotius I.; Antonakopoulou, Anna; Lioudakis, … - In: Electronic markets : the international journal on … 24 (2014) 2, pp. 101-112
Persistent link: https://ebtypo.dmz1.zbw/10010367264
Saved in:
Cover Image
Biometric authentication : verifying a user's identity using a frequentist probability model of keystroke intervals
Voloshin, Mikhail - In: Emerging methods in predictive analytics : risk …, (pp. 254-269). 2014
Persistent link: https://ebtypo.dmz1.zbw/10010367399
Saved in:
Cover Image
Ownership, access, and sequential
Mai, Maxim; Smirnov, Vladimir; Wait, Andrew - In: The Canadian journal of economics 47 (2014) 1, pp. 203-231
Persistent link: https://ebtypo.dmz1.zbw/10010373271
Saved in:
Cover Image
The impact of digital fingerprinting and identity verification on data quality : duplication detection is not a perfect science
Courtright, Melanie; Pashupati, Kartik - In: Journal of advertising research 54 (2014) 3, pp. 263-269
Persistent link: https://ebtypo.dmz1.zbw/10010419829
Saved in:
Cover Image
Real-time Security Extensions for EPCglobal Networks : Case Study for the Pharmaceutical Industry
Schapranow, Matthieu-P. - 2014
Introduction -- Related Work -- Security in EPCglobal Networks -- Device-level Extensions -- Business-level Extensions for Event Repositories -- Qualitative and Quantitative Discussion -- Evaluation -- Conclusion -- Appendices.
Preview
Preview
Persistent link: https://ebtypo.dmz1.zbw/10014016802
Saved in:
Cover Image
Data breaches and identity theft
Roberds, William; Schreft, Stacey L. - 2008
This paper presents a monetary-theoretic model to study the implications of networks' collection of personal identifying data and data security on each other's incidence and costs of identity theft. To facilitate trade, agents join clubs (networks) that compile and secure data. Too much data...
Persistent link: https://ebtypo.dmz1.zbw/10010292313
Saved in:
Cover Image
The cost impact of spam filters: measuring the effect of information system technologies in organizations
Caliendo, Marco; Clement, Michel; Papies, Dominik; … - 2008
More than 70% of global e-mail traffic consists of unsolicited and commercial direct marketing, also known as spam. Dealing with spam incurs high costs for organizations, prompting efforts to try to reduce spam-related costs by installing spam filters. Using modern econometric methods to reduce...
Persistent link: https://ebtypo.dmz1.zbw/10010269043
Saved in:
Cover Image
The cost impact of spam filters : measuring the effect of information system technologies in organizations
Caliendo, Marco; Clement, Michel; Papies, Dominik; … - 2008
More than 70% of global e-mail traffic consists of unsolicited and commercial direct marketing, also known as spam. Dealing with spam incurs high costs for organizations, prompting efforts to try to reduce spam-related costs by installing spam filters. Using modern econometric methods to reduce...
Preview
Preview
Persistent link: https://ebtypo.dmz1.zbw/10003762188
Saved in:
Cover Image
Data breaches and identity theft
Roberds, William (contributor);  … - 2008
Preview
Preview
Persistent link: https://ebtypo.dmz1.zbw/10003768483
Saved in:
Cover Image
Reducing underage alcohol and tobacco use : evidence from the introduction of vertical identification cards
Bellou, Andriana; Bhatt, Rachana - In: Journal of health economics 32 (2013) 2, pp. 353-366
Persistent link: https://ebtypo.dmz1.zbw/10009735035
Saved in:
Cover Image
Advanced biometric technology : reinforcing security within payment systems
Coetzee, Marius - In: Journal of payments strategy & systems 7 (2013/14) 1, pp. 73-89
Persistent link: https://ebtypo.dmz1.zbw/10009740326
Saved in:
Cover Image
Ground access to airports, case study : Port Columbus International Airport
Akar, Gulsah - In: Journal of air transport management 30 (2013), pp. 25-31
Persistent link: https://ebtypo.dmz1.zbw/10009772856
Saved in:
Cover Image
Methodenunterstützte Berechtigungsvergabe : Neugestaltung und Anpassung bestehender Berechtigungskonzepte auf Basis realer Anforderungen
Füller, Marlon - 2013 - 1., Aufl
Preview
Preview
Persistent link: https://ebtypo.dmz1.zbw/10009722033
Saved in:
Cover Image
Enterprise identity management : towards an investment decision support approach
Royer, Denis - 2013
Preview
Preview
Persistent link: https://ebtypo.dmz1.zbw/10009728017
Saved in:
Cover Image
Qualitätssicherung im Identity- und Access Management
Fuchs, Ludwig; Pernul, Günther - In: HMD : Praxis der Wirtschaftsinformatik 50 (2013) 289, pp. 88-97
Persistent link: https://ebtypo.dmz1.zbw/10009730921
Saved in:
Cover Image
Enterprise Identity Management : Towards an Investment Decision Support Approach
Royer, Denis - 2013
Introduction -- Scientific Positioning and Research Approach -- EIdM: Concepts, Technologies, and Application Fields -- Evaluation of EIdMS Investments -- A Decision Support Model for the Introduction of EIdMS Systems -- Prototype Implementation of an EIdMS Decision Support System -- Empirical...
Preview
Preview
Persistent link: https://ebtypo.dmz1.zbw/10014016570
Saved in:
Cover Image
Transaktionskosten der Nutzung des Internet durch Missbrauch (Spamming) und Regulierungsmöglichkeiten
Büllingen, Franz; Hillebrand, Annette; Stamm, Peter - 2006
Persistent link: https://ebtypo.dmz1.zbw/10012320684
Saved in:
Cover Image
A mediated access control infrastructure for dynamic service selection
Fritsch, Christoph - 2012
Preview
Preview
Persistent link: https://ebtypo.dmz1.zbw/10009576112
Saved in:
Cover Image
Context-sensitive access control model for government services
Gostojić, Stevan; Sladić, Goran; Milosavljević, Branko; … - In: Journal of organizational computing and electronic commerce 22 (2012) 2, pp. 184-213
Persistent link: https://ebtypo.dmz1.zbw/10009557660
Saved in:
Cover Image
Negotiation of weighted RTML credentials on mobile devices
Bistarelli, Stefano; Martinelli, Fabio; Roperti, Francesco - In: Information systems : crossroads for organization, …, (pp. 429-438). 2012
Persistent link: https://ebtypo.dmz1.zbw/10009577615
Saved in:
Cover Image
Prioritizing role engineering objectives using the analytic hierarchy process
Colantonio, Alessandro - In: Information systems : crossroads for organization, …, (pp. 419-427). 2012
Persistent link: https://ebtypo.dmz1.zbw/10009577617
Saved in:
Cover Image
Towards improving usability of authentication systesm using smartphones for logical and physical resource access in a single sign-on environment
Carullo, Giuliana; Ferrucci, Filomena; Sarro, Federica - In: Information systems : crossroads for organization, …, (pp. 145-153). 2012
Persistent link: https://ebtypo.dmz1.zbw/10009577680
Saved in:
Cover Image
Decentralised privacy preservation in social networks
Chinaei, Amir H.; Adl, Rosa Karimi; Liang, Chenen; … - In: International journal of business information systems : … 9 (2012) 4, pp. 402-414
Persistent link: https://ebtypo.dmz1.zbw/10009513969
Saved in:
Cover Image
MyBank : creating and launching a pan-European e-authorisation solution for e-commerce transactions
Broxis, John - In: Journal of payments strategy & systems 6 (2012/13) 4, pp. 345-351
Persistent link: https://ebtypo.dmz1.zbw/10009718096
Saved in:
Cover Image
Modeling airport employees commuting mode choice
Tsamboulas, Dimitrios; Evmorfopoulos, A. P.; Moraiti, P. - In: Journal of air transport management 18 (2012) 1, pp. 74-77
Persistent link: https://ebtypo.dmz1.zbw/10009701765
Saved in:
Cover Image
Automatic editing rights management in Wikipedia
Wöhner, Thomas; Köhler, Sebastian; Peters, Ralf - 2011
Preview
Preview
Persistent link: https://ebtypo.dmz1.zbw/10009240935
Saved in:
Cover Image
Mit dem E-Perso in die Wolke
Reisner, Stefan - In: Wirtschaftsinformatik & Management : WuM ; die … 3 (2011) 3, pp. 68-70
Persistent link: https://ebtypo.dmz1.zbw/10009158830
Saved in:
Cover Image
A conditional role-involved purpose-based access control model
Kabir, Md. Enamul; Wang, Hua; Bertino, Elisa - In: Journal of organizational computing and electronic commerce 21 (2011) 1, pp. 71-91
Persistent link: https://ebtypo.dmz1.zbw/10008908836
Saved in:
  • 1
  • 2
  • 3
  • Next
  • Last
A service of the
zbw
  • Sitemap
  • Plain language
  • Accessibility
  • Contact us
  • Imprint
  • Privacy

Loading...