Opportunities and Risks of Blockchain Technologies (Dagstuhl Seminar 17132)
暂无分享,去创建一个
Juho Lindman | Matti Rossi | Virpi Kristiina Tuunainen | V. Tuunainen | Juho Lindman | M. Rossi | Roman Beck | Christian Becker
[1] Lars Nyre,et al. The mediated construction of reality , 2018, New Media Soc..
[2] Aggelos Kiayias,et al. Ouroboros: A Provably Secure Proof-of-Stake Blockchain Protocol , 2017, CRYPTO.
[3] Jürgen Bott. Central bank money and blockchain: A payments perspective , 2017 .
[4] Hubert Ritzdorf,et al. On the Security and Performance of Proof of Work Blockchains , 2016, IACR Cryptol. ePrint Arch..
[5] Jan Mendling,et al. Untrusted Business Process Monitoring and Execution Using Blockchain , 2016, BPM.
[6] Victoria L. Lemieux,et al. Trusting records: is Blockchain technology the answer? , 2016 .
[7] S. Kemp,et al. The concept of near money in loyalty programmes , 2016 .
[8] Don Tapscott,et al. Blockchain Revolution: How the Technology Behind Bitcoin Is Changing Money, Business, and the World , 2016 .
[9] Jan Marco Leimeister,et al. Why different trust relationships matter for information systems users , 2016, Eur. J. Inf. Syst..
[10] Mounaim Cortet,et al. PSD2: The digital transformation accelerator for banks , 2016 .
[11] M. Mainelli,et al. Sharing Ledgers for Sharing Economies: An Exploration of Mutual Distributed Ledgers (Aka Blockchain Technology) , 2015 .
[12] Jan Damsgaard,et al. The race to dominate the mobile payments platform: Entry and expansion strategies , 2015, Electron. Commer. Res. Appl..
[13] Stefan Henningsson,et al. The new normal: Market cooperation in the mobile payments ecosystem , 2015, Electron. Commer. Res. Appl..
[14] Christian Decker,et al. A Fast and Scalable Payment Network with Bitcoin Duplex Micropayment Channels , 2015, SSS.
[15] Jay F. Nunamaker,et al. The Last Research Mile: Achieving Both Rigor and Relevance in Information Systems Research , 2015, J. Manag. Inf. Syst..
[16] Linus Nyman,et al. Understanding Code Forking in Open Source Software: An examination of code forking, its effect on open source software, and how it is viewed and practiced by developers , 2015 .
[17] Hong Yan,et al. Examining Mobile Payment User Adoption from the Perspective of Trust , 2015 .
[18] Jonas Hedman,et al. Business Models for NFC Based Mobile Payments , 2015 .
[19] Melanie Swan,et al. Blockchain: Blueprint for a New Economy , 2015 .
[20] Randall Davenport,et al. Taking-up and pursuit of the business of insurance and reinsurance , 2014 .
[21] Kalle Lyytinen,et al. Symbolic Action Research in Information Systems: Introduction to the Special Issue , 2014, MIS Q..
[22] François-Xavier de Vaujany,et al. Applying and theorizing institutional frameworks in IS research: A systematic analysis from 1999 to 2009 , 2014, Inf. Technol. People.
[23] Norman Shaw. The mediating influence of trust in the adoption of the mobile wallet , 2014 .
[24] George M. Giaglis,et al. Towards an Agenda for Information Systems Research on Digital Currencies and Bitcoin , 2014, BIS.
[25] Göran Goldkuhl,et al. Preconditions for public sector e-infrastructure development , 2013, Inf. Organ..
[26] A. Hevner,et al. Positioning and Presenting Design Science Research for Maximum Impact , 2013, MIS Q..
[27] Robin Teigland,et al. Breaking Out of the Bank in Europe - Exploring Collective Emergent Institutional Entrepreneurship Through Bitcoin , 2013 .
[28] R. Bollen. The Legal Status of Online Currencies: Are Bitcoins the Future? , 2013 .
[29] Ola Henfridsson,et al. Balancing platform control and external contribution in third‐party development: the boundary resources model , 2013, Inf. Syst. J..
[30] Jan Marco Leimeister,et al. Understanding the Formation of Trust in IT Artifacts , 2012, ICIS.
[31] Jesús M. González-Barahona,et al. A Comprehensive Study of Software Forks: Dates, Reasons and Outcomes , 2012, OSS.
[32] Tuure Tuunanen,et al. (Hidden) social influences in switching mobile service platforms , 2012, ICEC '12.
[33] Viswanath Venkatesh,et al. Consumer Acceptance and Use of Information Technology: Extending the Unified Theory of Acceptance and Use of Technology , 2012, MIS Q..
[34] C. Foley,et al. Poultry in Motion: A Study of International Trade Finance Practices , 2011, Journal of Political Economy.
[35] Michael R. Wade,et al. A Comprehensive Review and Synthesis of Open Source Research , 2010, J. Assoc. Inf. Syst..
[36] D. Helbing. Systemic Risks in Society and Economics , 2010 .
[37] Jan Pries-Heje,et al. Explanatory Design Theory , 2010, Bus. Inf. Syst. Eng..
[38] S. Rivard,et al. Positioning the institutional perspective in information systems research , 2009, J. Inf. Technol..
[39] 吕一旭 Yixu Lu. 引言 (Introduction) , 2009, Provincial China.
[40] Robert J. Kauffman,et al. The economics of mobile payments: Understanding stakeholder issues for an emerging financial technology application , 2008, Electron. Commer. Res. Appl..
[41] Tomi Dahlberg,et al. Past, present and future of mobile payments research: A literature review , 2008, Electron. Commer. Res. Appl..
[42] Nicholas Hopper,et al. Combating Double-Spending Using Cooperative P2P Systems , 2007, 27th International Conference on Distributed Computing Systems (ICDCS '07).
[43] M. Markus. The governance of free/open source software projects: monolithic, multidimensional, or configurational? , 2007 .
[44] Jaap-Henk Hoepman,et al. Distributed Double Spending Prevention , 2007, Security Protocols Workshop.
[45] Brian Fitzgerald,et al. The Transformation of Open Source Software , 2006, MIS Q..
[46] John R. Searle,et al. Social ontology , 2006 .
[47] John R. Searle,et al. What is an institution? , 2005, Journal of Institutional Economics.
[48] George Stephanides,et al. The concept of security and trust in electronic payments , 2005, Comput. Secur..
[49] Kevin Crowston,et al. Effective work practices for software engineering: free/libre open source software development , 2004, WISER '04.
[50] F. Nah. A study on tolerable waiting time: how long are Web users willing to wait? , 2004, AMCIS.
[51] B. Bruno. The Social Construction of Reality. A Treatise in the Sociol... , 2004 .
[52] Andrew Lockhart,et al. Network security hacks , 2004 .
[53] Alan R. Hevner,et al. Design Science in Information Systems Research , 2004, MIS Q..
[54] W. Scott. Institutional carriers: reviewing modes of transporting ideas over time and space and considering their consequences , 2003 .
[55] J. Rochet,et al. Platform competition in two sided markets , 2003 .
[56] J. Tirole,et al. Some Simple Economics of Open Source , 2002 .
[57] Melissa A. Schilling. Technology Success and Failure in Winner-Take-All Markets: The Impact of Learning Orientation, Timing, and Network Externalities , 2002 .
[58] Anol Bhattacherjee,et al. Understanding Information Systems Continuance: An Expectation-Confirmation Model , 2001, MIS Q..
[59] D. Snow,et al. Framing Processes and Social Movements: An Overview and Assessment , 2000 .
[60] Edgar A. Whitley,et al. The Construction of Social Reality , 1999 .
[61] Eric S. Raymond,et al. The cathedral and the bazaar , 1998, First Monday.
[62] David Lorge Parnas,et al. Software aging , 1994, Proceedings of 16th International Conference on Software Engineering.
[63] Moni Naor,et al. Pricing via Processing or Combatting Junk Mail , 1992, CRYPTO.
[64] Stuart Haber,et al. How to time-stamp a digital document , 1990, Journal of Cryptology.
[65] M. Fischer,et al. Impossibility of distributed consensus with one faulty process , 1985, JACM.
[66] R. Shostak,et al. The Byzantine Generals Problem , 1982, TOPL.
[67] E. A. Akkoyunlu,et al. Some constraints and tradeoffs in the design of network communications , 1975, SOSP.
[68] David Laidler,et al. The Definition of Money: Theoretical and Empirical Problems , 1969 .
[69] Roman Beck,et al. Blockchain - the Gateway to Trust-Free Cryptographic Transactions , 2016, ECIS.
[70] Robin Teigland,et al. Jumping on the Blockchain Bandwagon: Lessons of the Past and Outlook to the Future , 2016, ICIS.
[71] P. Sestoft,et al. An Actuarial Programming Language for Life Insurance and Pensions , 2013 .
[72] Robert Viseur,et al. Forks impacts and motivations in free and open source projects , 2012 .
[73] Ashley A. Bush,et al. Platform Evolution: Coevolution of Platform Architecture, Governance, and Environmental Dynamics , 2010 .
[74] Steve Evans,et al. Succeeding through service innovation : a service perspective for education, research, business and government , 2008 .
[75] S. Nakamoto,et al. Bitcoin: A Peer-to-Peer Electronic Cash System , 2008 .
[76] Qweak Collaboration Willem T. H. van Oers. The Institutions , 2007 .
[77] Izak Benbasat,et al. A Descriptive Content Analysis of Trust-Building Measures in B2B Electronic Marketplaces , 2006, Commun. Assoc. Inf. Syst..
[78] S. van der Hof,et al. Code As Law , 2006 .
[79] George Kesidis,et al. Denial-of-service attack-detection techniques , 2006, IEEE Internet Computing.
[80] Leon van der Torre,et al. Analyzing Control Trust in Normative Multiagent Systems , 2005, Bled eConference.
[81] K. Lertwachara,et al. NET Institute* www.NETinst.org , 2005 .
[82] J. Juga,et al. Problems and Prospects for Intermodal Transport: Theoretical Tools for Practical Breakthroughs? , 2001 .
[83] D. Eastlake,et al. Secure Hash Algorithm-1 , 2001 .
[84] General Agreement on Tariffs and Trade,et al. International trade. Statistics , 1993 .
[85] Manuel Blum,et al. Non-interactive zero-knowledge and its applications , 1988, STOC '88.
[86] N. Luhmann. Vertrauen : ein Mechanismus der Reduktion sozialer Komplexität , 1973 .
[87] 13-th IEEE International Conference on Peer-to-Peer Computing Information Propagation in the Bitcoin Network , 2022 .
[88] 13-th IEEE International Conference on Peer-to-Peer Computing Have a Snack, Pay with Bitcoins , 2022 .