Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleOctober 2024JUST ACCEPTED
IT Service Disruptions and Provider Choice
ACM Transactions on Management Information Systems (TMIS), Just Accepted https://doi.org/10.1145/3701040Digital supply chains are increasingly interconnected and vulnerable to disruption, causing service interruptions impacting many firms and their customers. Combating threats to the digital supply chain is the top challenge for leaders in most supply chain ...
- research-articleSeptember 2024
Exploring How UK Public Authorities Use Redaction to Protect Personal Information
ACM Transactions on Management Information Systems (TMIS), Volume 15, Issue 3Article No.: 11, Pages 1–23https://doi.org/10.1145/3651989Document redaction has become increasingly important for individuals and organizations. This article investigates public-sector information redaction practices in order to determine if they adequately protect personal information from accidental ...
- research-articleJune 2024
A Psycholinguistics-inspired Method to Counter IP Theft Using Fake Documents
- Natalia Denisenko,
- Youzhi Zhang,
- Chiara Pulice,
- Shohini Bhattasali,
- Sushil Jajodia,
- Philip Resnik,
- V.S. Subrahmanian
ACM Transactions on Management Information Systems (TMIS), Volume 15, Issue 2Article No.: 7, Pages 1–25https://doi.org/10.1145/3651313Intellectual property (IP) theft is a growing problem. We build on prior work to deter IP theft by generating n fake versions of a technical document so a thief has to expend time and effort in identifying the correct document. Our new SbFAKE framework ...
- research-articleMarch 2023
Don’t Need All Eggs in One Basket: Reconstructing Composite Embeddings of Customers from Individual-Domain Embeddings
ACM Transactions on Management Information Systems (TMIS), Volume 14, Issue 2Article No.: 20, Pages 1–30https://doi.org/10.1145/3578710Although building a 360-degree comprehensive view of a customer has been a long-standing goal in marketing, this challenge has not been successfully addressed in many marketing applications because fractured customer data stored across different “silos” ...
- research-articleJanuary 2023
The Opportunity in Difficulty: A Dynamic Privacy Budget Allocation Mechanism for Privacy-Preserving Multi-dimensional Data Collection
ACM Transactions on Management Information Systems (TMIS), Volume 14, Issue 1Article No.: 8, Pages 1–24https://doi.org/10.1145/3569944Data collection under local differential privacy (LDP) has been gradually on the stage. Compared with the implementation of LDP on the single attribute data collection, that on multi-dimensional data faces great challenges as follows: (1) Communication ...
-
- research-articleAugust 2022
User-empowered Privacy-preserving Authentication Protocol for Electric Vehicle Charging Based on Decentralized Identity and Verifiable Credential
ACM Transactions on Management Information Systems (TMIS), Volume 13, Issue 4Article No.: 44, Pages 1–21https://doi.org/10.1145/3532869The use of Electric Vehicles (EVs) has been gaining traction in recent years due to various reasons. While charging their EVs, users expose their identity and personal details, and an adversary being able to identify and track where users charge their EVs ...
- research-articleApril 2022
A Quantitative Comparative Study of Data-oriented Trust Management Schemes in Internet of Things
ACM Transactions on Management Information Systems (TMIS), Volume 13, Issue 3Article No.: 24, Pages 1–30https://doi.org/10.1145/3476248In the Internet of Things (IoT) paradigm, all entities in the IoT network, whether home users or industrial things, receive data from other things to make decisions. However, in the decentralized, heterogeneous, and rapidly changing IoT network with ...
- research-articleApril 2022
How Customer Demand Reactions Impact Technology Innovation and Security
ACM Transactions on Management Information Systems (TMIS), Volume 13, Issue 3Article No.: 32, Pages 1–17https://doi.org/10.1145/3505227Innovation is a very important concern for both managers and governmental policy makers. There is an important interplay between security and technology innovation that is largely unrecognized in the literature. This research considers the case where ...
- research-articleFebruary 2022
Anomaly Detection in Cybersecurity Datasets via Cooperative Co-evolution-based Feature Selection
ACM Transactions on Management Information Systems (TMIS), Volume 13, Issue 3Article No.: 29, Pages 1–39https://doi.org/10.1145/3495165Anomaly detection from Big Cybersecurity Datasets is very important; however, this is a very challenging and computationally expensive task. Feature selection (FS) is an approach to remove irrelevant and redundant features and select a subset of features, ...
- research-articleOctober 2021
Machine Learning for Automated Industrial IoT Attack Detection: An Efficiency-Complexity Trade-off
ACM Transactions on Management Information Systems (TMIS), Volume 12, Issue 4Article No.: 37, Pages 1–28https://doi.org/10.1145/3460822Critical city infrastructures that depend on smart Industrial Internet of Things (IoT) devices have been increasingly becoming a target of cyberterrorist or hacker attacks. Although this has led to multiple studies in the recent past, there exists a ...
- research-articleOctober 2021
Machine Learning and Survey-based Predictors of InfoSec Non-Compliance
ACM Transactions on Management Information Systems (TMIS), Volume 13, Issue 2Article No.: 13, Pages 1–20https://doi.org/10.1145/3466689Survey items developed in behavioral Information Security (InfoSec) research should be practically useful in identifying individuals who are likely to create risk by failing to comply with InfoSec guidance. The literature shows that attitudes, beliefs, ...
- research-articleOctober 2021
Detecting Android Malware and Classifying Its Families in Large-scale Datasets
ACM Transactions on Management Information Systems (TMIS), Volume 13, Issue 2Article No.: 12, Pages 1–21https://doi.org/10.1145/3464323To relieve the burden of security analysts, Android malware detection and its family classification need to be automated. There are many previous works focusing on using machine (or deep) learning technology to tackle these two important issues, but as ...
- opinionOctober 2021
Privacy and Confidentiality in Process Mining: Threats and Research Challenges
- Gamal Elkoumy,
- Stephan A. Fahrenkrog-Petersen,
- Mohammadreza Fani Sani,
- Agnes Koschmider,
- Felix Mannhardt,
- Saskia Nuñez Von Voigt,
- Majid Rafiei,
- Leopold Von Waldthausen
ACM Transactions on Management Information Systems (TMIS), Volume 13, Issue 1Article No.: 11, Pages 1–17https://doi.org/10.1145/3468877Privacy and confidentiality are very important prerequisites for applying process mining to comply with regulations and keep company secrets. This article provides a foundation for future research on privacy-preserving and confidential process mining ...
- research-articleOctober 2021
Key Factors Affecting User Adoption of Open-Access Data Repositories in Intelligence and Security Informatics: An Affordance Perspective
ACM Transactions on Management Information Systems (TMIS), Volume 13, Issue 1Article No.: 10, Pages 1–24https://doi.org/10.1145/3460823Rich, diverse cybersecurity data are critical for efforts by the intelligence and security informatics (ISI) community. Although open-access data repositories (OADRs) provide tremendous benefits for ISI researchers and practitioners, determinants of their ...
- research-articleJune 2021
Automated Feature Selection for Anomaly Detection in Network Traffic Data
ACM Transactions on Management Information Systems (TMIS), Volume 12, Issue 3Article No.: 18, Pages 1–28https://doi.org/10.1145/3446636Variable selection (also known as feature selection) is essential to optimize the learning complexity by prioritizing features, particularly for a massive, high-dimensional dataset like network traffic data. In reality, however, it is not an easy task to ...
- research-articleJune 2021
Anonymous Blockchain-based System for Consortium
ACM Transactions on Management Information Systems (TMIS), Volume 12, Issue 3Article No.: 26, Pages 1–25https://doi.org/10.1145/3459087Blockchain records transactions with various protection techniques against tampering. To meet the requirements on cooperation and anonymity of companies and organizations, researchers have developed a few solutions. Ring signature-based schemes allow ...
- research-articleJune 2021
Anonymization of Daily Activity Data by Using ℓ-diversity Privacy Model
ACM Transactions on Management Information Systems (TMIS), Volume 12, Issue 3Article No.: 23, Pages 1–21https://doi.org/10.1145/3456876In the age of IoT, collection of activity data has become ubiquitous. Publishing activity data can be quite useful for various purposes such as estimating the level of assistance required by older adults and facilitating early diagnosis and treatment of ...
- research-articleMay 2021
Will Catastrophic Cyber-Risk Aggregation Thrive in the IoT Age? A Cautionary Economics Tale for (Re-)Insurers and Likes
- Ranjan Pal,
- Ziyuan Huang,
- Sergey Lototsky,
- Xinlong Yin,
- Mingyan Liu,
- Jon Crowcroft,
- Nishanth Sastry,
- Swades De,
- Bodhibrata Nag
ACM Transactions on Management Information Systems (TMIS), Volume 12, Issue 2Article No.: 17, Pages 1–36https://doi.org/10.1145/3446635Service liability interconnections among networked IT and IoT-driven service organizations create potential channels for cascading service disruptions due to modern cybercrimes such as DDoS, APT, and ransomware attacks. These attacks are known to inflict ...
- research-articleMarch 2021
A Multi-Disciplinary Perspective for Conducting Artificial Intelligence-enabled Privacy Analytics: Connecting Data, Algorithms, and Systems
ACM Transactions on Management Information Systems (TMIS), Volume 12, Issue 1Article No.: 1, Pages 1–18https://doi.org/10.1145/3447507Events such as Facebook-Cambridge Analytica scandal and data aggregation efforts by technology providers have illustrated how fragile modern society is to privacy violations. Internationally recognized entities such as the National Science Foundation (...
- research-articleFebruary 2021
Assessing the Moderating Effect of Security Technologies on Employees Compliance with Cybersecurity Control Procedures
ACM Transactions on Management Information Systems (TMIS), Volume 12, Issue 2Article No.: 11, Pages 1–29https://doi.org/10.1145/3424282The increase in cybersecurity threats and the challenges for organisations to protect their information technology assets has made adherence to organisational security control processes and procedures a critical issue that needs to be adequately ...