{"status":"ok","message-type":"work-list","message-version":"1.0.0","message":{"facets":{},"total-results":9305146,"items":[{"indexed":{"date-parts":[[2022,4,2]],"date-time":"2022-04-02T19:56:33Z","timestamp":1648929393133},"reference-count":0,"publisher":"Interregional Academy of Personnel Management","content-domain":{"domain":[],"crossmark-restriction":false},"DOI":"10.32689\/maup.it","type":"journal","created":{"date-parts":[[2021,11,3]],"date-time":"2021-11-03T12:55:23Z","timestamp":1635944123000},"source":"Crossref","is-referenced-by-count":0,"title":["INFORMATION TECHNOLOGY AND SOCIETY"],"prefix":"10.32689","member":"17924","deposited":{"date-parts":[[2021,11,3]],"date-time":"2021-11-03T12:55:23Z","timestamp":1635944123000},"score":12.50724,"resource":{"primary":{"URL":"http:\/\/journals.maup.com.ua\/index.php\/it\/index"}},"short-title":["INFORMATION TECHNOLOGY AND SOCIETY"],"issued":{"date-parts":[[null]]},"references-count":0,"URL":"https:\/\/doi.org\/10.32689\/maup.it"},{"indexed":{"date-parts":[[2024,8,14]],"date-time":"2024-08-14T00:28:15Z","timestamp":1723595295455},"reference-count":0,"publisher":"Interregional Academy of Personnel Management","content-domain":{"domain":[],"crossmark-restriction":false},"DOI":"10.32689\/maup.it\/","type":"journal","created":{"date-parts":[[2024,8,13]],"date-time":"2024-08-13T19:17:53Z","timestamp":1723576673000},"source":"Crossref","is-referenced-by-count":0,"title":["Information Technology and Society"],"prefix":"10.32689","member":"17924","deposited":{"date-parts":[[2024,8,13]],"date-time":"2024-08-13T19:17:54Z","timestamp":1723576674000},"score":12.50724,"resource":{"primary":{"URL":"http:\/\/journals.maup.com.ua\/index.php\/it\/index"}},"short-title":["Information Technology and Society"],"issued":{"date-parts":[[null]]},"references-count":0,"URL":"https:\/\/doi.org\/10.32689\/maup.it\/"},{"indexed":{"date-parts":[[2025,7,30]],"date-time":"2025-07-30T15:39:55Z","timestamp":1753889995994,"version":"3.41.2"},"reference-count":10,"publisher":"i-manager Publications","issue":"3","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["JIT"],"published-print":{"date-parts":[[2016]]},"DOI":"10.26634\/jit.5.3.8135","type":"journal-article","created":{"date-parts":[[2018,5,15]],"date-time":"2018-05-15T08:45:41Z","timestamp":1526373941000},"page":"1","source":"Crossref","is-referenced-by-count":1,"title":["DESIGN AND ANALYSIS OF SECURE AND EFFICIENT IMAGE WITH EMBEDDED SENSITIVE INFORMATION TRANSFERRING TECHNIQUE USING BLOWFISH ALGORITHM"],"prefix":"10.26634","volume":"5","author":[{"given":"PRASAD","family":"KAKI LEELA","sequence":"first","affiliation":[]},{"name":"Department of Information Technology, Vignan's Institute of Information Technology, Visakhapatnam, India.","sequence":"additional","affiliation":[]},{"given":"ANUSHA","family":"P","sequence":"additional","affiliation":[]},{"name":"Department of Information Technology, Vignan's Institute of Information Technology, Visakhapatnam, India.","sequence":"additional","affiliation":[]},{"given":"JYOTHI","family":"G","sequence":"additional","affiliation":[]},{"name":"Department of Information Technology, Vignan's Institute of Information Technology, Visakhapatnam, India.","sequence":"additional","affiliation":[]},{"given":"DILEEPKUMAR","family":"K","sequence":"additional","affiliation":[]},{"name":"Department of Information Technology, Vignan's Institute of Information Technology, Visakhapatnam, India.","sequence":"additional","affiliation":[]}],"member":"11168","published-online":{"date-parts":[[2016]]},"reference":[{"key":"key-10.26634\/8135-1","unstructured":"Bin B. Zhu, Jeff Yan, Guanbo Bao, Maowei Yang, and Ning Xu, (2014). \u201cACM Captcha as Graphical Passwords-A New Security Primitive Based on Hard AI Problems\u201d. IEEE Transaction on Information Forensic and Security, Vol. 9, No. 6."},{"key":"key-10.26634\/8135-2","unstructured":"G. Sudheer Reddy, G. Venkata Prasad, and V. Hari Prasad, (2014). \u201cGraphical Secure Password Method against Online Password Hackers (Guessing Attacks)\u201d. IJCSNS International Journal of Computer Science and Network Security, Vol. 14, No. 8."},{"key":"key-10.26634\/8135-3","unstructured":"Brijesh Kumar Singh, Nidhi Sharma, Neha Singla, Nikita Sharma, and Neetu Choudhary, (2014). \u201cImage Encryption Using Block-Based Transformation Algorithm\u201d. IJISET- International Journal of Innovative, Science, Engineering and Technology, Vol. 1, No. 3."},{"key":"key-10.26634\/8135-4","unstructured":"Vinay Sahu, and Kamlesh Lahre, (2013). \u201cA New Technique for enhancing Image Protection Using Digital Watermarking\u201d. IJITEE, Vol. 3."},{"key":"key-10.26634\/8135-5","doi-asserted-by":"crossref","unstructured":"Prerna Parmar, and Neeru Jindal, (2014). \u201cImage Security with Integrated Watermarking and Encryption\u201d. IOSR-JECE, Vol. 9.","DOI":"10.9790\/2834-09352429"},{"key":"key-10.26634\/8135-6","unstructured":"Gurmeet Kaur and Aarti Kochhar, (2012). \u201cA Steganography Implementation based on LSB&DCT\u201d. IJSETT, Vol. 4, No. 1, pp. 35-41"},{"key":"key-10.26634\/8135-7","unstructured":"Israa Tahseen and Shatha Habeeb, (2012). \u201cProposal New Approach for Blowfish Algorithm by Using Random Key Generator\u201d. Journal of Madent Alelem College, Vol. 4, No. 1, pp. 1-10"},{"key":"key-10.26634\/8135-8","unstructured":"Ratinder Kaur and V. K. Banga, (2012). \u201cImage Security using Encryption based Algorithm\u201d. International Conference on Trends in Electrical, Electronics and Power Engineering (ICTEEP'2012), pp. 110-112"},{"key":"key-10.26634\/8135-9","doi-asserted-by":"crossref","unstructured":"B. Geethavani, E.V. Prasad and R. Roopa, (2013). \u201cA New Approach for Secure Data Transfer in Audio Signals Using DWT\u201d. IEEE.","DOI":"10.1109\/ICACT.2013.6710492"},{"key":"key-10.26634\/8135-10","unstructured":"Monika Agrawal and Pradeep Mishra, (2012). \"A Modified Approach for Symmetric Key Cryptography Based on Blowfish Algorithm\u201d. International Journal of Engineering and Advanced Technology, Vol. 1, No. 6, pp.79-83."}],"container-title":["i-manager's Journal on Information Technology"],"language":"en","deposited":{"date-parts":[[2019,10,18]],"date-time":"2019-10-18T01:53:06Z","timestamp":1571363586000},"score":12.494274,"resource":{"primary":{"URL":"http:\/\/www.imanagerpublications.com\/article\/8135"}},"issued":{"date-parts":[[2016]]},"references-count":10,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2016]]},"published-print":{"date-parts":[[2016]]}},"URL":"https:\/\/doi.org\/10.26634\/jit.5.3.8135","ISSN":["2277-5110","2277-5250"],"issn-type":[{"type":"print","value":"2277-5110"},{"type":"electronic","value":"2277-5250"}],"published":{"date-parts":[[2016]]},"article-number":"JIT.5.3.8135"},{"indexed":{"date-parts":[[2024,5,3]],"date-time":"2024-05-03T16:31:55Z","timestamp":1714753915915},"reference-count":0,"publisher":"Elsevier","isbn-type":[{"value":"9780750601412","type":"print"}],"content-domain":{"domain":[],"crossmark-restriction":false},"published-print":{"date-parts":[[1991]]},"DOI":"10.1016\/b978-0-7506-0141-2.50001-1","type":"book-chapter","created":{"date-parts":[[2013,11,18]],"date-time":"2013-11-18T13:10:31Z","timestamp":1384780231000},"page":"i","source":"Crossref","is-referenced-by-count":0,"title":["Information Technology"],"prefix":"10.1016","member":"78","container-title":["Information Technology"],"language":"en","deposited":{"date-parts":[[2018,10,10]],"date-time":"2018-10-10T04:57:10Z","timestamp":1539147430000},"score":12.4814415,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/B9780750601412500011"}},"issued":{"date-parts":[[1991]]},"ISBN":["9780750601412"],"references-count":0,"URL":"https:\/\/doi.org\/10.1016\/b978-0-7506-0141-2.50001-1","published":{"date-parts":[[1991]]}},{"indexed":{"date-parts":[[2025,1,26]],"date-time":"2025-01-26T05:22:10Z","timestamp":1737868930241,"version":"3.33.0"},"reference-count":21,"publisher":"Blue Eyes Intelligence Engineering and Sciences Engineering and Sciences Publication - BEIESP","issue":"1","content-domain":{"domain":["www.ijies.org"],"crossmark-restriction":true},"short-container-title":["IJIES"],"abstract":"<jats:p>In the light of increasing criminal activities, it is become important that everyone should concern about individual safety. It has been seen those criminal activities near criminal hot spot happening frequently. Road safety is of paramount significance, as people frequently need to travel often through unfamiliar areas via various modes of transport, such as walking, public transport, private vehicles, auto rickshaws, or cabs. It is observed this incident are more often when victims are likely to be individual. This paper aims to enhance the safety of people. It analyzed criminal records happened recently and aims to take individual feedback regarding certain incident in particular area. This System intended to take geographical locations as input, to identify the safest route between a given source and destination at a particular time. The approach uses optimized A algorithm to determine optimized route considering crime rate severity and proximity. Open-Source Routing Machine (OSRM) to handle the real-time mapping and routing data. OSRM provides efficient and accurate routing, allowing the system to dynamically calculate the shortest and safest routes based on real world road networks. The system offers three types of routes fastest, safest, and optimized using a modified A algorithm that balances travel efficiency with safety.<\/jats:p>","DOI":"10.35940\/ijies.k1095.12010125","type":"journal-article","created":{"date-parts":[[2025,1,25]],"date-time":"2025-01-25T05:48:04Z","timestamp":1737784084000},"page":"29-37","update-policy":"https:\/\/doi.org\/10.35940\/beiesp.crossmarkpolicy","source":"Crossref","is-referenced-by-count":0,"title":["Enhancing Road Safety through Crime Hotspot Detection and Secure Route Planning"],"prefix":"10.35940","volume":"12","author":[{"name":"Department of Information Technology, Vishwakarma Institute of Information Technology, Pune (Maharashtra), India.","sequence":"first","affiliation":[]},{"given":"Shrey","family":"Ingole","sequence":"first","affiliation":[]},{"given":"Shailesh","family":"Yerawad","sequence":"additional","affiliation":[]},{"name":"Department of Information Technology, Vishwakarma Institute of Information Technology, Pune (Maharashtra), India.","sequence":"additional","affiliation":[]},{"given":"Soham","family":"Godkar","sequence":"additional","affiliation":[]},{"name":"Department of Information Technology, Vishwakarma Institute of Information Technology, Pune (Maharashtra), India.","sequence":"additional","affiliation":[]},{"given":"Pranav","family":"Waklekar","sequence":"additional","affiliation":[]},{"name":"Department of Information Technology, Vishwakarma Institute of Information Technology, Pune (Maharashtra), India.","sequence":"additional","affiliation":[]},{"given":"Dr. Suruchi","family":"Dedgaonkar","sequence":"additional","affiliation":[]},{"name":"Department of Information Technology, Vishwakarma Institute of Information Technology, Pune (Maharashtra), India.","sequence":"additional","affiliation":[]},{"given":"Dr. Pravin","family":"Futane","sequence":"additional","affiliation":[]},{"name":"Department of Information Technology, Vishwakarma Institute of Information Technology, Pune (Maharashtra), India.","sequence":"additional","affiliation":[]}],"member":"21590","published-online":{"date-parts":[[2025,1,30]]},"reference":[{"key":"ref0","doi-asserted-by":"publisher","unstructured":"Leni Marlina, Aswandi, Dedi Gunawan \"Implementation of the A Star Heuristic Search Algorithm in Determining the Shortest Path\" International Journal of Computer Sciences and Mathematics Engineering Vol. 2 No. 1 (2023). DOI: https:\/\/doi.org\/10.61306\/ijecom.v2i1.20","DOI":"10.61306\/ijecom.v2i1.20"},{"key":"ref1","unstructured":"Yash S Asawa, Varun V, Samarth R Gupta, Nikhil J Jain \"User Specific Safe Route Recommendation System\" International Journal of Engineering Research & Technology (IJERT)ISSN: 2278-0181. https:\/\/www.ijert.org\/research\/user-specific-safe-route-recommendation-system-IJERTV9IS100268.pdf"},{"key":"ref2","doi-asserted-by":"publisher","unstructured":"Murat Da\u011flar, U\u011fur Argun \"Crime Mapping and Geographical Information Systems in Crime Analysis\" International Journal of Human Science Volume: 13 Issue: 1 Year: 2016. DOI: http:\/\/dx.doi.org\/10.14687\/ijhs.v13i1.3736","DOI":"10.14687\/ijhs.v13i1.3736"},{"key":"ref3","doi-asserted-by":"publisher","unstructured":"Soraia Fel\u0131cioa, Joana Hora, Marta Campos Ferreira, Diogo Abrantes, Paulo Dias Costa, Camila D'angelo, Jorge Silva, Teresa Galv \"Handling OpenStreetMap geo-referenced data for route planning\" . DOI: http:\/\/dx.doi.org\/10.1016\/j.trpro.2022.02.024","DOI":"10.1016\/j.trpro.2022.02.024"},{"key":"ref4","doi-asserted-by":"publisher","unstructured":"Priyanka Sudhakara and Velappa Ganapathy \"Trajectory Planning of a Mobile Robot using Enhanced A-Star Algorithm\" Indian Journal of Science and Technology, Vol9(41), November 2016 DOI: https:\/\/doi.org\/10.17485\/ijst\/2016\/v9i41\/93816","DOI":"10.17485\/ijst\/2016\/v9i41\/93816"},{"key":"ref5","doi-asserted-by":"publisher","unstructured":"Rados\u0142aw Belka and Mateusz Godlewski \"Vehicle Routing Optimization System with Smart Geopositioning Updates\" DOI: https:\/\/doi.org\/10.3390\/app112210933","DOI":"10.3390\/app112210933"},{"key":"ref6","doi-asserted-by":"publisher","unstructured":"Suhaib Al-Ansarry, Salah Al-Darraji \"Hybrid RRT-A*: An Improved Path Planning Method for an Autonomous Mobile Robots\"Iraqi Journal for Electrical and Electronic Engineering Vol. 17 | Issue 1 | June 2021. DOI: http:\/\/dx.doi.org\/10.37917\/ijeee.17.1.13","DOI":"10.37917\/ijeee.17.1.13"},{"key":"ref7","doi-asserted-by":"publisher","unstructured":"L. Bilashini Chanu, Ngangbam Romeji, Rajkumari Kajal \"Crime Pattern Analysis and Hot Spot Analysis in Bishnupur District of Manipur\" International Journal of Science, Engineering and Management (IJSEM),Vol 9, Issue 3, March 2022. DOI: http:\/\/dx.doi.org\/10.36647\/IJSEM\/09.03.A003","DOI":"10.36647\/IJSEM\/09.03.A003"},{"key":"ref8","doi-asserted-by":"publisher","unstructured":"Centre National de la Recherche Scientifique \"osrm: Interface Between R and the OpenStreetMap-Based Routing Service OSRM \"The journal of Open Source Software. DOI: https:\/\/doi.org\/10.21105\/joss.04574","DOI":"10.21105\/joss.04574"},{"key":"ref9","doi-asserted-by":"publisher","unstructured":"OUARDI AMINEAND MESTARI MOHAMMED \"Generating A-Star Algorithm Admissible Heuristics Using a Dynamic Data Loader on Neural Networks, Enhanced With Genetic Algorithms, on Distributed Architecture\" IEEE ACCESS Digital Object Identifier. DOI: https:\/\/doi.org\/10.1109\/ACCESS.2023.3247773","DOI":"10.1109\/ACCESS.2023.3247773"},{"key":"ref10","unstructured":"QGIS Development Team. QGIS Geographic Information System. Open Source Geospatial Foundation Project. (2024). https:\/\/qgis.org"},{"key":"ref11","unstructured":"OpenCage. OpenCage Geocoding API. Retrieved from (2024). https:\/\/opencagedata.com"},{"key":"ref12","doi-asserted-by":"publisher","unstructured":"Boeing, G. OSMnx: New Methods for Acquiring, Constructing, Analyzing, and Visualizing Complex Street Networks. Department of City and Regional Planning, University of California, Berkeley (2017). DOI: http:\/\/dx.doi.org\/10.1016\/j.compenvurbsys.2017.05.004","DOI":"10.1016\/j.compenvurbsys.2017.05.004"},{"key":"ref13","doi-asserted-by":"publisher","unstructured":"Giraud, T. osrm: Interface Between R and the OpenStreetMap-Based Routing Service OSRM. Centre National de la Recherche Scientifique, France (2022). DOI: http:\/\/dx.doi.org\/10.21105\/joss.04574","DOI":"10.21105\/joss.04574"},{"key":"ref14","doi-asserted-by":"publisher","unstructured":"Rachmawati, D., & Gustin, L. Analysis of Dijkstra's Algorithm and A Algorithm in Shortest Path Problem. Departemen Ilmu Komputer, Fakultas Ilmu Komputer dan Teknologi Informasi, Universitas Sumatera Utara (2024). DOI: http:\/\/dx.doi.org\/10.1088\/1742-6596\/1566\/1\/012061","DOI":"10.1088\/1742-6596\/1566\/1\/012061"},{"key":"ref15","doi-asserted-by":"publisher","unstructured":"Arjun, R. K., Reddy, P., Shama, & Yamuna, M. Research on the Optimization of Dijkstra's Algorithm and its Applications. International Journal of Science, Technology & Management, 4(Special Issue 1), 304. Vellore Institute of Technology, Tamil Nadu, India. (2015). DOI: http:\/\/dx.doi.org\/10.1007\/978-3-642-25992-0_55","DOI":"10.1007\/978-3-642-25992-0_55"},{"key":"ref16","doi-asserted-by":"publisher","unstructured":"Juliet A., Dr. N. M., K., A. S., S., B., & R., P. (2020). Safe Route Discovery for Vehicles using VANET. In International Journal of Recent Technology and Engineering (IJRTE) (Vol. 8, Issue 6, pp. 3802-3805). DOI: https:\/\/doi.org\/10.35940\/ijrte.f8718.038620","DOI":"10.35940\/ijrte.F8718.038620"},{"key":"ref17","doi-asserted-by":"publisher","unstructured":"Kripa Sekaran, Priyanka K, Pooja R, Route Recommendation System based on Safety Metrics and Route Profiling. (2019). In International Journal of Innovative Technology and Exploring Engineering (Vol. 9, Issue 2S, pp. 259-261). DOI: https:\/\/doi.org\/10.35940\/ijitee.b1011.1292s19","DOI":"10.35940\/ijitee.B1011.1292S19"},{"key":"ref18","unstructured":"Hotkar, D. S., & Biradar, Dr. S. R. (2019). QoS Routing Protocol (QoRP) to Enhance Road Safety in VANETs. In International Journal of Engineering and Advanced Technology"},{"key":"ref19","doi-asserted-by":"publisher","unstructured":"(Vol. 8, Issue 6, pp. 1882-1885). DOI: https:\/\/doi.org\/10.35940\/ijeat.f7913.088619","DOI":"10.35940\/ijeat.F7913.088619"},{"key":"ref20","doi-asserted-by":"publisher","unstructured":"Sumith, Karthik K, V., & Dr. Sandhya S. (2024). Implementation of A Delay-Tolerant Routing Protocol in the Network Simulator NS-3. In International Journal of Emerging Science and Engineering (Vol. 12, Issue 11, pp. 13-17). DOI: https:\/\/doi.org\/10.35940\/ijese.k2586.12111024","DOI":"10.35940\/ijese.K2586.12111024"}],"container-title":["International Journal of Inventive Engineering and Sciences"],"deposited":{"date-parts":[[2025,1,25]],"date-time":"2025-01-25T05:48:14Z","timestamp":1737784094000},"score":12.436628,"resource":{"primary":{"URL":"https:\/\/www.ijies.org\/portfolio-item\/K109511111124\/"}},"issued":{"date-parts":[[2025,1,30]]},"references-count":21,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2025,1,30]]}},"URL":"https:\/\/doi.org\/10.35940\/ijies.k1095.12010125","ISSN":["2319-9598"],"issn-type":[{"value":"2319-9598","type":"electronic"}],"published":{"date-parts":[[2025,1,30]]},"assertion":[{"value":"International Journal of Inventive Engineering and Sciences (IJIES)","URL":"https:\/\/www.ijies.org\/","order":0,"name":"Journal","label":"Journal Name","explanation":{"URL":"Published On"},"group":{"name":"Journal","label":"Published On"}},{"value":"Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP)","URL":"https:\/\/www.blueeyesintelligence.org\/","order":1,"name":"Publisher","label":"Publisher Name","explanation":{"URL":"Publisher By"},"group":{"name":"Publisher","label":"Publisher By"}},{"value":"Based on my understanding, this article has no conflicts of interest.","order":2,"name":"Declaration","label":"Conflicts of Interest","explanation":{"URL":"Declaration"},"group":{"name":"Declaration","label":"Declaration"}},{"value":"This article has not been sponsored or funded by any organization or agency. The independence of this research is a crucial factor in affirming its impartiality, as it has been conducted without any external sway.","order":3,"name":"Declaration","label":"Funding Support","explanation":{"URL":"Declaration"},"group":{"name":"Declaration","label":"Declaration"}},{"value":"The data provided in this article is exempt from the requirement for ethical approval or participant consent.","order":4,"name":"Declaration","label":"Ethical Approval and Consent to Participate","explanation":{"URL":"Declaration"},"group":{"name":"Declaration","label":"Declaration"}},{"value":"The adequate resources of this article are publicly accessible.","order":5,"name":"Declaration","label":"Data Access Statement and Material Availability","explanation":{"URL":"Declaration"},"group":{"name":"Declaration","label":"Declaration"}},{"value":"The authorship of this article is contributed equally to all participating individuals.","order":6,"name":"Declaration","label":"Authors Contributions","explanation":{"URL":"Declaration"},"group":{"name":"Declaration","label":"Declaration"}}]},{"indexed":{"date-parts":[[2025,9,19]],"date-time":"2025-09-19T10:42:53Z","timestamp":1758278573915},"edition-number":"1","reference-count":0,"publisher":"Cornell University Press","isbn-type":[{"value":"9781501749568","type":"print"},{"value":"9781501749582","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"published-print":{"date-parts":[[2020,7,15]]},"abstract":"<p>Militaries with state-of-the-art information technology sometimes bog down in confusing conflicts. To understand why, it is important to understand the micro-foundations of military power in the information age, and this is exactly what this book gives us. As the book shows, digital systems now mediate almost every effort to gather, store, display, analyze, and communicate information in military organizations. The book highlights how personnel now struggle with their own information systems as much as with the enemy. Throughout this foray into networked technology in military operations, we see how information practice shapes the effectiveness of military performance. The quality of information practice depends on the interaction between strategic problems and organizational solutions. The book explores information practice through a series of detailed historical cases and ethnographic studies of military organizations at war. The book explains why the US military, despite all its technological advantages, has struggled for so long in unconventional conflicts against weaker adversaries. This same perspective suggests that the US retains important advantages against advanced competitors like China that are less prepared to cope with the complexity of information systems in wartime. The book argues convincingly that a better understanding of how personnel actually use technology can inform the design of command and control, improve the net assessment of military power, and promote reforms to improve military performance. Warfighting problems and technical solutions keep on changing, but information practice is always stuck in between.<\/p>","DOI":"10.7591\/cornell\/9781501749568.001.0001","type":"edited-book","created":{"date-parts":[[2021,1,23]],"date-time":"2021-01-23T14:42:23Z","timestamp":1611412943000},"source":"Crossref","is-referenced-by-count":4,"title":["Information Technology and Military Power"],"prefix":"10.7591","author":[{"given":"Jon R.","family":"Lindsay","sequence":"first","affiliation":[]}],"member":"4434","published-online":{"date-parts":[[2021,1,21]]},"original-title":["Information Technology and Military Power"],"language":"en","deposited":{"date-parts":[[2022,7,28]],"date-time":"2022-07-28T19:04:50Z","timestamp":1659035090000},"score":12.347664,"resource":{"primary":{"URL":"https:\/\/academic.oup.com\/cornell-scholarship-online\/book\/37913"}},"subtitle":["Information Technology and Military Power"],"issued":{"date-parts":[[2020,7,15]]},"ISBN":["9781501749568","9781501749582"],"references-count":0,"URL":"https:\/\/doi.org\/10.7591\/cornell\/9781501749568.001.0001","relation":{"is-identical-to":[{"id-type":"doi","id":"10.1515\/9781501749582","asserted-by":"subject"}]},"published":{"date-parts":[[2020,7,15]]}},{"indexed":{"date-parts":[[2026,3,28]],"date-time":"2026-03-28T15:00:28Z","timestamp":1774710028870,"version":"3.50.1"},"reference-count":45,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2025,6,20]],"date-time":"2025-06-20T00:00:00Z","timestamp":1750377600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2025,6,20]],"date-time":"2025-06-20T00:00:00Z","timestamp":1750377600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/501100002183","name":"Department of Electronics and Information Technology, Ministry of Communications and Information Technology","doi-asserted-by":"publisher","award":["Cohort-2QCAL"],"award-info":[{"award-number":["Cohort-2QCAL"]}],"id":[{"id":"10.13039\/501100002183","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100002183","name":"Department of Electronics and Information Technology, Ministry of Communications and Information Technology","doi-asserted-by":"publisher","award":["Cohort-2QCAL"],"award-info":[{"award-number":["Cohort-2QCAL"]}],"id":[{"id":"10.13039\/501100002183","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100002183","name":"Department of Electronics and Information Technology, Ministry of Communications and Information Technology","doi-asserted-by":"publisher","award":["Cohort-2QCAL"],"award-info":[{"award-number":["Cohort-2QCAL"]}],"id":[{"id":"10.13039\/501100002183","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100002183","name":"Department of Electronics and Information Technology, Ministry of Communications and Information Technology","doi-asserted-by":"publisher","award":["Cohort-2QCAL"],"award-info":[{"award-number":["Cohort-2QCAL"]}],"id":[{"id":"10.13039\/501100002183","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100002183","name":"Department of Electronics and Information Technology, Ministry of Communications and Information Technology","doi-asserted-by":"publisher","award":["Cohort-2QCAL"],"award-info":[{"award-number":["Cohort-2QCAL"]}],"id":[{"id":"10.13039\/501100002183","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100002183","name":"Department of Electronics and Information Technology, Ministry of Communications and Information Technology","doi-asserted-by":"publisher","award":["Cohort-2QCAL"],"award-info":[{"award-number":["Cohort-2QCAL"]}],"id":[{"id":"10.13039\/501100002183","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100019904","name":"Vellore Institute of Technology, Chennai","doi-asserted-by":"crossref","id":[{"id":"10.13039\/100019904","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["EPJ Quantum Technol."],"published-print":{"date-parts":[[2025,12]]},"abstract":"<jats:title>Abstract<\/jats:title>\n          <jats:p>The rise of advanced networking and mobile technologies has improved flexibility in Software Defined Networking (SDN) management and mobile ecosystems but it has also introduced vulnerabilities like Distributed Denial of Service (DDoS) attacks and Android malware. In this research, we propose a Hybrid Quantum Classical Neural Network (HQCNN) framework that operates with a Dressed Quantum Circuit (DQC) to achieve efficient detection and classification of threats. The input pipeline of the HQCNN integrates Wavelet Transforms based feature pre-processing, Convolutional Neural Network based feature extraction, Linear Discriminant Analysis (LDA) for dimensionality reduction, and quantum layers for enhanced classification with less computational complexity. Experiments were conducted on the SDN DDoS Attack Dataset and the CCCS-CIC-AndMal2020 Static Dataset. Two different model variants were devised for binary and multiclass classification problems addressing various cybersecurity issues. The binary HQCNN model for SDN-based DDoS detection was implemented on AWS Braket\u2019s real Quantum Processing Unit (QPU), achieving 99.86% accuracy, 99.85% precision, 100% recall, and a 99.88% F1-score, thereby outperforming the classical Convolutional Neural Network (CNN). The multiclass HQCNN, on the other hand, attains accuracy of 93.56%, 94.38%, and 95.13% on the 15-class, 14-class, and 12-class versions of CCCS-CIC-AndMal2020 Static, respectively, hence outperforms all existing methods. These results show that HQCNN is efficient, scalable, and very much applicable in cybersecurity, validating its real-world use effectiveness applicability in threat detection.<\/jats:p>","DOI":"10.1140\/epjqt\/s40507-025-00380-z","type":"journal-article","created":{"date-parts":[[2025,6,20]],"date-time":"2025-06-20T07:16:31Z","timestamp":1750403791000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Unified hybrid quantum classical neural network framework for detecting distributed denial of service and Android mobile malware attacks"],"prefix":"10.1140","volume":"12","author":[{"given":"Sridevi","family":"S","sequence":"first","affiliation":[]},{"given":"Indira","family":"B","sequence":"additional","affiliation":[]},{"given":"Geetha","family":"S","sequence":"additional","affiliation":[]},{"given":"Balachandran","family":"S","sequence":"additional","affiliation":[]},{"given":"Gorkem","family":"Kar","sequence":"additional","affiliation":[]},{"given":"Shangirne","family":"Kharbanda","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,6,20]]},"reference":[{"key":"380_CR1","doi-asserted-by":"publisher","first-page":"145","DOI":"10.1109\/CiSt56084.2023.10409955","volume-title":"2023 7th IEEE Congress on Information Science and Technology (CiSt)","author":"J Hatim","year":"2023","unstructured":"Hatim J, Chaimae S, Habiba C. Sdn\/nfv security challenges and proposed architecture. In: 2023 7th IEEE Congress on Information Science and Technology (CiSt). IEEE; 2023. p. 145\u20139."},{"key":"380_CR2","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1109\/SERVICES.2018.00031","volume-title":"2018 IEEE world congress on services (SERVICES)","author":"S Alzahrani","year":"2018","unstructured":"Alzahrani S, Hong L. Detection of distributed denial of service (ddos) attacks using artificial intelligence on cloud. In: 2018 IEEE world congress on services (SERVICES). IEEE; 2018. p. 35\u20136."},{"key":"380_CR3","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1109\/ICCMSO58359.2022.00025","volume-title":"2022 International Conference on Computational Modelling, Simulation and Optimization (ICCMSO)","author":"S Jain","year":"2022","unstructured":"Jain S, Gandhi A, Singla S, Garg L, Mehla S. Quantum machine learning and quantum communication networks: the 2030s and the future. In: 2022 International Conference on Computational Modelling, Simulation and Optimization (ICCMSO). IEEE; 2022. p. 59\u201366."},{"key":"380_CR4","doi-asserted-by":"crossref","unstructured":"Umeano C, Paine AE, Elfving VE, Kyriienko O. What can we learn from quantum convolutional neural networks? Adv Quantum Technol. 2023;2400325.","DOI":"10.1002\/qute.202400325"},{"key":"380_CR5","doi-asserted-by":"publisher","DOI":"10.1016\/j.physa.2023.128554","volume":"614","author":"K Yu","year":"2023","unstructured":"Yu K, Lin S, Guo G-D. Quantum dimensionality reduction by linear discriminant analysis. Phys A, Stat Mech Appl. 2023;614:128554.","journal-title":"Phys A, Stat Mech Appl"},{"issue":"1","key":"380_CR6","volume":"2022","author":"W Li","year":"2022","unstructured":"Li W, Chu P-C, Liu G-Z, Tian Y-B, Qiu T-H, Wang S-M. An image classification algorithm based on hybrid quantum classical convolutional neural network. Quantum Eng. 2022;2022(1):5701479.","journal-title":"Quantum Eng"},{"key":"380_CR7","doi-asserted-by":"crossref","unstructured":"Wang H, Li Y. Overview of ddos attack detection in software-defined networks. IEEE Access. 2024.","DOI":"10.1109\/ACCESS.2024.3375395"},{"issue":"1","key":"380_CR8","doi-asserted-by":"publisher","DOI":"10.1186\/s42400-024-00219-7","volume":"7","author":"UB Clinton","year":"2024","unstructured":"Clinton UB, Hoque N, Robindro Singh K. Classification of ddos attack traffic on sdn network environment using deep learning. J Cybersecurity. 2024;7(1):23.","journal-title":"J Cybersecurity"},{"issue":"1","key":"380_CR9","volume":"2023","author":"TG Gebremeskel","year":"2023","unstructured":"Gebremeskel TG, Gemeda KA, Krishna TG, Ramulu PJ. Ddos attack detection and classification using hybrid model for multicontroller sdn. Wirel Commun Mob Comput. 2023;2023(1):9965945.","journal-title":"Wirel Commun Mob Comput"},{"key":"380_CR10","doi-asserted-by":"crossref","unstructured":"Fiky AHE, Shenawy AE, Madkour MA. Android malware category and family detection and identification using machine learning. 2021. arXiv preprint arXiv:2107.01927.","DOI":"10.1109\/MIUCC52538.2021.9447661"},{"key":"380_CR11","first-page":"575","volume-title":"IET conference proceedings CP870","author":"F Nawshin","year":"2023","unstructured":"Nawshin F, Gad R, Unal D, Suganthan P. Android malware detection and classification using stacked machine learning. In: IET conference proceedings CP870. vol.\u00a02023. IET; 2023. p. 575\u201384."},{"key":"380_CR12","doi-asserted-by":"publisher","first-page":"401","DOI":"10.1109\/IWCMC55113.2022.9824225","volume-title":"2022 International Wireless Communications and Mobile Computing (IWCMC)","author":"S Khalid","year":"2022","unstructured":"Khalid S, Hussain FB. Evaluating dynamic analysis features for Android malware categorization. In: 2022 International Wireless Communications and Mobile Computing (IWCMC). IEEE; 2022. p. 401\u20136."},{"key":"380_CR13","first-page":"1","volume-title":"2016 11th international conference on malicious and unwanted software (MALWARE)","author":"S Morales-Ortega","year":"2016","unstructured":"Morales-Ortega S, Escamilla-Ambrosio PJ, Rodriguez-Mota A, Coronado-De-Alba LD. Native malware detection in smartphones with Android os using static analysis, feature selection and ensemble classifiers. In: 2016 11th international conference on malicious and unwanted software (MALWARE). IEEE; 2016. p. 1\u20138."},{"key":"380_CR14","doi-asserted-by":"crossref","unstructured":"Batouche A, Jahankhani H. A comprehensive approach to Android malware detection using machine learning. Inf Secur Technol Control Pandemics. 2021. 171\u2013212.","DOI":"10.1007\/978-3-030-72120-6_7"},{"issue":"01","key":"380_CR15","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1142\/S0218194019500037","volume":"29","author":"RS Arslan","year":"2019","unstructured":"Arslan RS, Do\u011fru \u0130A, Bari\u015f\u00e7i N. Permission-based malware detection system for Android using machine learning techniques. Int J Softw Eng Knowl Eng. 2019;29(01):43\u201361.","journal-title":"Int J Softw Eng Knowl Eng"},{"key":"380_CR16","doi-asserted-by":"publisher","first-page":"70","DOI":"10.1145\/3442520.3442522","volume-title":"Proceedings of the 2020 10th international conference on communication and network security","author":"A Rahali","year":"2020","unstructured":"Rahali A, Lashkari AH, Kaur G, Taheri L, Gagnon F, Massicotte F. Didroid: Android malware classification and characterization using deep image learning. In: Proceedings of the 2020 10th international conference on communication and network security. 2020. p. 70\u201382."},{"issue":"4","key":"380_CR17","doi-asserted-by":"publisher","DOI":"10.3390\/s19040974","volume":"19","author":"X Liu","year":"2019","unstructured":"Liu X, Du X, Zhang X, Zhu Q, Wang H, Guizani M. Adversarial samples on Android malware detection systems for iot systems. Sensors. 2019;19(4):974.","journal-title":"Sensors"},{"issue":"6","key":"380_CR18","first-page":"1276","volume":"71","author":"M Ficco","year":"2021","unstructured":"Ficco M. Malware analysis by combining multiple detectors and observation windows. IEEE Trans Comput. 2021;71(6):1276\u201390.","journal-title":"IEEE Trans Comput"},{"issue":"1","key":"380_CR19","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-024-66907-z","volume":"14","author":"K Wang","year":"2024","unstructured":"Wang K, Fu Y, Duan X, Liu T. Detection and mitigation of ddos attacks based on multi-dimensional characteristics in sdn. Sci Rep. 2024;14(1):16421.","journal-title":"Sci Rep"},{"issue":"2","key":"380_CR20","doi-asserted-by":"publisher","first-page":"1577","DOI":"10.1007\/s11760-023-02871-x","volume":"18","author":"SSP Sadam","year":"2024","unstructured":"Sadam SSP, Nalini N. Epileptic seizure detection using scalogram-based hybrid cnn model on eeg signals. Signal Image Video Process. 2024;18(2):1577\u201388.","journal-title":"Signal Image Video Process"},{"key":"380_CR21","unstructured":"Priya SS, Nalini N. Eeg signal analysis for epileptic seizure using scaleogram based transfer learning. J Pharm Negat Results. 2022. 2825\u20132834."},{"key":"380_CR22","first-page":"1","volume-title":"2022 International Conference on Innovative Trends in Information Technology (ICITIIT)","author":"S Sridevi","year":"2022","unstructured":"Sridevi S, Kanimozhi T, Issac K, Sudha M. Quanvolution neural network to recognize arrhythmia from 2d scaleogram features of ecg signals. In: 2022 International Conference on Innovative Trends in Information Technology (ICITIIT). IEEE; 2022. p. 1\u20135."},{"key":"380_CR23","doi-asserted-by":"publisher","DOI":"10.1016\/j.epsr.2022.108834","volume":"214","author":"RS Salles","year":"2023","unstructured":"Salles RS, Ribeiro PF. The use of deep learning and 2-d wavelet scalograms for power quality disturbances classification. Electr Power Syst Res. 2023;214:108834.","journal-title":"Electr Power Syst Res"},{"key":"380_CR24","doi-asserted-by":"crossref","unstructured":"Sahoo R, Karmakar S. Effectiveness of wavelet scalogram on partial discharge pattern classification of xlpe cable insulation. IEEE Trans Instrum Meas. 2024.","DOI":"10.1109\/TIM.2024.3363790"},{"issue":"11","key":"380_CR25","doi-asserted-by":"publisher","DOI":"10.3390\/s23115255","volume":"23","author":"W Zaman","year":"2023","unstructured":"Zaman W, Ahmad Z, Siddique MF, Ullah N, Kim J-M. Centrifugal pump fault diagnosis based on a novel sobeledge scalogram and cnn. Sensors. 2023;23(11):5255.","journal-title":"Sensors"},{"key":"380_CR26","doi-asserted-by":"publisher","first-page":"223","DOI":"10.1016\/j.procs.2021.12.135","volume":"197","author":"H Suryotrisongko","year":"2022","unstructured":"Suryotrisongko H, Musashi Y. Evaluating hybrid quantum-classical deep learning for cybersecurity botnet dga detection. Proc Comput Sci. 2022;197:223\u20139.","journal-title":"Proc Comput Sci"},{"key":"380_CR27","doi-asserted-by":"publisher","first-page":"1057","DOI":"10.1109\/COMPSAC57700.2023.00161","volume-title":"2023 IEEE 47th annual computers, software, and applications conference (COMPSAC)","author":"MS Akter","year":"2023","unstructured":"Akter MS, Shahriar H, Ahamed SI, Gupta KD, Rahman M, Mohamed A, Rahman M, Rahman A, Wu F. Case study-based approach of quantum machine learning in cybersecurity: quantum support vector machine for malware classification and protection. In: 2023 IEEE 47th annual computers, software, and applications conference (COMPSAC). IEEE; 2023. p. 1057\u201363."},{"key":"380_CR28","doi-asserted-by":"crossref","unstructured":"Salek MS, Biswas PK, Pollard J, Hales J, Shen Z, Dixit V, Chowdhury M, Khan SM, Wang Y. A novel hybrid quantum-classical framework for an in-vehicle controller area network intrusion detection. IEEE Access. 2023.","DOI":"10.36227\/techrxiv.21907443"},{"key":"380_CR29","first-page":"1","volume-title":"2023 International Joint Conference on Neural Networks (IJCNN)","author":"G Ciaramella","year":"2023","unstructured":"Ciaramella G, Martinelli F, Mercaldo F, Santone A. Exploring quantum machine learning for explainable malware detection. In: 2023 International Joint Conference on Neural Networks (IJCNN). IEEE; 2023. p. 1\u20136."},{"issue":"1","key":"380_CR30","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1007\/s11416-022-00435-0","volume":"19","author":"M Kalinin","year":"2023","unstructured":"Kalinin M, Krundyshev V. Security intrusion detection using quantum machine learning techniques. J Comput Virol Hacking Tech. 2023;19(1):125\u201336.","journal-title":"J Comput Virol Hacking Tech"},{"key":"380_CR31","first-page":"1","volume-title":"Proceedings of the 17th international conference on availability, reliability and security","author":"G Ciaramella","year":"2022","unstructured":"Ciaramella G, Iadarola G, Mercaldo F, Storto M, Santone A, Martinelli F. Introducing quantum computing in mobile malware detection. In: Proceedings of the 17th international conference on availability, reliability and security. 2022. p. 1\u20138."},{"key":"380_CR32","unstructured":"Suryotrisongko H, Musashi Y. Hybrid quantum deep learning and variational quantum classifier-based model for botnet dga attack detection. Int J Intell Eng Syst. 2022;15(3)."},{"issue":"8","key":"380_CR33","doi-asserted-by":"publisher","DOI":"10.3390\/en16083572","volume":"16","author":"D Said","year":"2023","unstructured":"Said D. Quantum computing and machine learning for cybersecurity: distributed denial of service (ddos) attack detection on smart micro-grid. Energies. 2023;16(8):3572.","journal-title":"Energies"},{"key":"380_CR34","doi-asserted-by":"crossref","unstructured":"Alomari A, Kumar SA. Deqsvc: dimensionality reduction and encoding technique for quantum support vector classifier approach to detect ddos attacks. IEEE Access. 2023.","DOI":"10.1109\/ACCESS.2023.3322723"},{"issue":"3","key":"380_CR35","doi-asserted-by":"publisher","first-page":"2365","DOI":"10.1007\/s11277-021-08805-5","volume":"127","author":"A Saritha","year":"2022","unstructured":"Saritha A, Reddy BR, Babu AS. Qemdd: quantum inspired ensemble model to detect and mitigate ddos attacks at various layers of sdn architecture. Wirel Pers Commun. 2022;127(3):2365\u201390.","journal-title":"Wirel Pers Commun"},{"issue":"5","key":"380_CR36","doi-asserted-by":"publisher","first-page":"2836","DOI":"10.11591\/eei.v11i5.4155","volume":"11","author":"AJ Altamemi","year":"2022","unstructured":"Altamemi AJ, Abdulhassan A, Obeis NT. Ddos attack detection in software defined networking controller using machine learning techniques. Bull Electr Eng Inform. 2022;11(5):2836\u201344.","journal-title":"Bull Electr Eng Inform"},{"key":"380_CR37","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2023.103661","volume":"138","author":"V Hnamte","year":"2024","unstructured":"Hnamte V, Najar AA, Nhung-Nguyen H, Hussain J, Sugali MN. Ddos attack detection and mitigation using deep neural network in sdn environment. Comput Secur. 2024;138:103661.","journal-title":"Comput Secur"},{"key":"380_CR38","first-page":"1","volume-title":"2023 International Conference on Networking and Communications (ICNWC)","author":"B Ganesh","year":"2023","unstructured":"Ganesh B, Sridevi S. Analysis of hybrid deep learning models for efficient intrusion detection. In: 2023 International Conference on Networking and Communications (ICNWC). IEEE; 2023. p. 1\u20136."},{"key":"380_CR39","volume":"1","author":"N Ahuja","year":"2020","unstructured":"Ahuja N, Singal G, Mukhopadhyay D. Ddos attack sdn dataset. Mendeley Data. 2020;1:17632.","journal-title":"Mendeley Data"},{"key":"380_CR40","first-page":"1","volume-title":"2021 Reconciling Data Analytics, Automation, Privacy, and Security: A Big Data Challenge (RDAAPS)","author":"DS Keyes","year":"2021","unstructured":"Keyes DS, Li B, Kaur G, Lashkari AH, Gagnon F, Massicotte F. Entroplyzer: Android malware classification and characterization using entropy analysis of dynamic characteristics. In: 2021 Reconciling Data Analytics, Automation, Privacy, and Security: A Big Data Challenge (RDAAPS). IEEE; 2021. p. 1\u201312."},{"issue":"1","key":"380_CR41","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1109\/10.362922","volume":"42","author":"C Li","year":"1995","unstructured":"Li C, Zheng C, Tai C. Detection of ecg characteristic points using wavelet transforms. IEEE Trans Biomed Eng. 1995;42(1):21\u20138.","journal-title":"IEEE Trans Biomed Eng"},{"key":"380_CR42","doi-asserted-by":"crossref","unstructured":"Niyaz Q, Sun W, Javaid AY. A deep learning based ddos detection system in software-defined networking (sdn). 2016. arXiv preprint arXiv:1611.07400.","DOI":"10.4108\/eai.28-12-2017.153515"},{"key":"380_CR43","first-page":"1","volume-title":"2025 IEEE 4th International Conference on AI in Cybersecurity (ICAIC)","author":"S Tripathi","year":"2025","unstructured":"Tripathi S, Upadhyay H, Soni J. Quantum long sort-term memory-based identification of distributed denial of service attacks. In: 2025 IEEE 4th International Conference on AI in Cybersecurity (ICAIC). IEEE; 2025. p. 1\u20138."},{"key":"380_CR44","doi-asserted-by":"publisher","first-page":"100","DOI":"10.1016\/j.iotcps.2023.03.001","volume":"3","author":"R Islam","year":"2023","unstructured":"Islam R, Sayed MI, Saha S, Hossain MJ, Masud MA. Android malware classification using optimum feature selection and ensemble machine learning. Internet of Things Cyber-Phys Syst. 2023;3:100\u201311.","journal-title":"Internet of Things Cyber-Phys Syst"},{"issue":"10","key":"380_CR45","doi-asserted-by":"publisher","first-page":"8560","DOI":"10.1109\/JIOT.2022.3194881","volume":"10","author":"P Musikawan","year":"2022","unstructured":"Musikawan P, Kongsorot Y, You I, So-In C. An enhanced deep learning neural network for the detection and identification of Android malware. IEEE Internet Things J. 2022;10(10):8560\u201377.","journal-title":"IEEE Internet Things J"}],"container-title":["EPJ Quantum Technology"],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1140\/epjqt\/s40507-025-00380-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1140\/epjqt\/s40507-025-00380-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1140\/epjqt\/s40507-025-00380-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,20]],"date-time":"2025-06-20T07:16:39Z","timestamp":1750403799000},"score":12.284807,"resource":{"primary":{"URL":"https:\/\/epjquantumtechnology.springeropen.com\/articles\/10.1140\/epjqt\/s40507-025-00380-z"}},"issued":{"date-parts":[[2025,6,20]]},"references-count":45,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2025,12]]}},"alternative-id":["380"],"URL":"https:\/\/doi.org\/10.1140\/epjqt\/s40507-025-00380-z","ISSN":["2662-4400","2196-0763"],"issn-type":[{"value":"2662-4400","type":"print"},{"value":"2196-0763","type":"electronic"}],"published":{"date-parts":[[2025,6,20]]},"assertion":[{"value":"21 February 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 June 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 June 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"77"},{"indexed":{"date-parts":[[2024,8,7]],"date-time":"2024-08-07T17:12:16Z","timestamp":1723050736034},"reference-count":0,"publisher":"Blue Eyes Intelligence Engineering and Sciences Engineering and Sciences Publication - BEIESP","issue":"5","content-domain":{"domain":["www.ijeat.org"],"crossmark-restriction":true},"short-container-title":["IJEAT"],"abstract":"<jats:p>Nearly every organization needs solution to handle sensitive data. Though there are different systems to store and transmit electronic records, users often deal with missing or tampered information when they distribute it in a public network. When the data is distributed, the traceability and governance of it throughout the globe is impractical. The evolving world of Data Security demands healthcare industry to have an infrastructure in place to deal with patient records. Regardless of the nature of present and future security risks, Blockchain Technology will play a vital role to maintain the originality of the digital data. Blockchain stores data in a decentralized, distributed ledger for achieving immutability and transparency. The system analyses a case study which aims at maintaining Healthcare records in Blockchain ledger to facilitate secure storage of the patient\u2019s details. For efficient prediction of diabetes the Blockchain and machine learning algorithms are integrated. The various other applications of combining Blockchain technology with machine learning algorithms are Smart city applications, Forensic information storage systems, Energy data management systems, banking and finance management systems.<\/jats:p>","DOI":"10.35940\/ijeat.e9944.069520","type":"journal-article","created":{"date-parts":[[2020,7,10]],"date-time":"2020-07-10T05:54:34Z","timestamp":1594360474000},"page":"1149-1154","update-policy":"http:\/\/dx.doi.org\/10.35940\/beiesp.crossmarkpolicy","source":"Crossref","is-referenced-by-count":1,"title":["A Robust Blockchain Framework for Healthcare Information System"],"prefix":"10.35940","volume":"9","author":[{"name":"Information Technology, PSG College of Technology, Coimbatore, India.","sequence":"first","affiliation":[]},{"given":"D.","family":"Dharani","sequence":"first","affiliation":[]},{"given":"K. Anitha","family":"Kumari","sequence":"additional","affiliation":[]},{"name":"Information Technology, PSG College of Technology, Coimbatore, India","sequence":"additional","affiliation":[]},{"given":"S.","family":"Aishwarya","sequence":"additional","affiliation":[]},{"name":"Information Technology, PSG College of Technology, Coimbatore, India","sequence":"additional","affiliation":[]},{"given":"G. M.","family":"Sangavi","sequence":"additional","affiliation":[]},{"name":", Information Technology, PSG College of Technology, Coimbatore, India.","sequence":"additional","affiliation":[]},{"given":"N.","family":"Lavanya","sequence":"additional","affiliation":[]},{"name":"Information Technology, PSG College of Technology, Coimbatore, India.","sequence":"additional","affiliation":[]}],"member":"21590","published-online":{"date-parts":[[2020,6,30]]},"container-title":["International Journal of Engineering and Advanced Technology"],"deposited":{"date-parts":[[2021,9,22]],"date-time":"2021-09-22T02:19:56Z","timestamp":1632277196000},"score":12.278107,"resource":{"primary":{"URL":"https:\/\/www.ijeat.org\/wp-content\/uploads\/papers\/v9i5\/E9944069520.pdf"}},"issued":{"date-parts":[[2020,6,30]]},"references-count":0,"journal-issue":{"issue":"5","published-online":{"date-parts":[[2020,6,30]]}},"URL":"https:\/\/doi.org\/10.35940\/ijeat.e9944.069520","ISSN":["2249-8958"],"issn-type":[{"type":"electronic","value":"2249-8958"}],"published":{"date-parts":[[2020,6,30]]}},{"indexed":{"date-parts":[[2024,12,10]],"date-time":"2024-12-10T23:18:35Z","timestamp":1733872715774,"version":"3.30.1"},"reference-count":0,"publisher":"International Journal Of Advanced Research","issue":"5","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IJAR"],"DOI":"10.21474\/ijar01\/497","type":"journal-article","created":{"date-parts":[[2016,6,14]],"date-time":"2016-06-14T10:07:43Z","timestamp":1465898863000},"page":"176-184","source":"Crossref","is-referenced-by-count":0,"title":["SENTIMENT ANALYSIS OF SOCIAL MEDIA DATA USING NAIVE BAYESIAN CLASSIFIER IN HADOOP AND HIVE."],"prefix":"10.21474","volume":"4","author":[{"name":"Department of Information Technology, Vignan\u2019s Institute of Information Technology, Visakhapatnam, India.","sequence":"first","affiliation":[]},{"given":"G.","family":"Mani","sequence":"first","affiliation":[]},{"given":"G.","family":"Jyothi","sequence":"additional","affiliation":[]},{"name":"Department of Information Technology, Vignan\u2019s Institute of Information Technology, Visakhapatnam, India.","sequence":"additional","affiliation":[]},{"given":"G.","family":"Swathi","sequence":"additional","affiliation":[]},{"name":"Department of Information Technology, Vignan\u2019s Institute of Information Technology, Visakhapatnam, India.","sequence":"additional","affiliation":[]},{"given":"Ravuri","family":"Daniel.","sequence":"additional","affiliation":[]},{"name":"Department of Information Technology, Vignan\u2019s Institute of Information Technology, Visakhapatnam, India.","sequence":"additional","affiliation":[]}],"member":"8913","published-online":{"date-parts":[[2016,5,31]]},"container-title":["International Journal of Advanced Research"],"deposited":{"date-parts":[[2016,6,14]],"date-time":"2016-06-14T10:07:46Z","timestamp":1465898866000},"score":12.2752285,"resource":{"primary":{"URL":"http:\/\/www.journalijar.com\/article\/9206\/sentiment-analysis-of-social-media-data-using-naive-bayesian-classifier-in-hadoop-and-hive.\/"}},"issued":{"date-parts":[[2016,5,31]]},"references-count":0,"journal-issue":{"issue":"5","published-online":{"date-parts":[[2016,5,31]]}},"URL":"https:\/\/doi.org\/10.21474\/ijar01\/497","ISSN":["2320-5407"],"issn-type":[{"type":"electronic","value":"2320-5407"}],"published":{"date-parts":[[2016,5,31]]}},{"indexed":{"date-parts":[[2025,10,13]],"date-time":"2025-10-13T09:20:21Z","timestamp":1760347221513},"publisher-location":"London","standards-body":{"name":"BSI British Standards","acronym":"BSI"},"reference-count":0,"publisher":"BSI British Standards","content-domain":{"domain":[],"crossmark-restriction":false},"DOI":"10.3403\/03173211u","type":"standard","created":{"date-parts":[[2015,6,9]],"date-time":"2015-06-09T17:25:49Z","timestamp":1433870749000},"source":"Crossref","is-referenced-by-count":0,"title":["Information technology. Security techniques. Management of information and communications technology security"],"prefix":"10.3403","member":"1988","deposited":{"date-parts":[[2017,12,5]],"date-time":"2017-12-05T08:46:03Z","timestamp":1512463563000},"score":12.272052,"resource":{"primary":{"URL":"https:\/\/linkresolver.bsigroup.com\/junction\/resolve\/000000000030081400?restype=undated"}},"subtitle":["Concepts and models for information and communications technology security management"],"issued":{"date-parts":[[null]]},"references-count":0,"URL":"https:\/\/doi.org\/10.3403\/03173211u"},{"indexed":{"date-parts":[[2026,3,19]],"date-time":"2026-03-19T07:54:19Z","timestamp":1773906859852,"version":"3.50.1"},"reference-count":31,"publisher":"SAGE Publications","issue":"7","license":[{"start":{"date-parts":[[2021,6,23]],"date-time":"2021-06-23T00:00:00Z","timestamp":1624406400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"funder":[{"DOI":"10.13039\/100000093","name":"Center for Information Technology","doi-asserted-by":"publisher","award":["CTSA Grant Number UL1TR001863"],"award-info":[{"award-number":["CTSA Grant Number UL1TR001863"]}],"id":[{"id":"10.13039\/100000093","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000093","name":"Center for Information Technology","doi-asserted-by":"publisher","award":["P30-CA16359"],"award-info":[{"award-number":["P30-CA16359"]}],"id":[{"id":"10.13039\/100000093","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000093","name":"Center for Information Technology","doi-asserted-by":"publisher","award":["P50-CA121974"],"award-info":[{"award-number":["P50-CA121974"]}],"id":[{"id":"10.13039\/100000093","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000093","name":"Center for Information Technology","doi-asserted-by":"publisher","award":["P50-CA196530"],"award-info":[{"award-number":["P50-CA196530"]}],"id":[{"id":"10.13039\/100000093","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000093","name":"Center for Information Technology","doi-asserted-by":"publisher","award":["R01-CA168733"],"award-info":[{"award-number":["R01-CA168733"]}],"id":[{"id":"10.13039\/100000093","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000093","name":"Center for Information Technology","doi-asserted-by":"publisher","award":["R01-CA177719"],"award-info":[{"award-number":["R01-CA177719"]}],"id":[{"id":"10.13039\/100000093","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000093","name":"Center for Information Technology","doi-asserted-by":"publisher","award":["R01-CA223481"],"award-info":[{"award-number":["R01-CA223481"]}],"id":[{"id":"10.13039\/100000093","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000093","name":"Center for Information Technology","doi-asserted-by":"publisher","award":["R01-ES005775"],"award-info":[{"award-number":["R01-ES005775"]}],"id":[{"id":"10.13039\/100000093","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000093","name":"Center for Information Technology","doi-asserted-by":"publisher","award":["R35CA197574"],"award-info":[{"award-number":["R35CA197574"]}],"id":[{"id":"10.13039\/100000093","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000093","name":"Center for Information Technology","doi-asserted-by":"publisher","award":["R41-A120546"],"award-info":[{"award-number":["R41-A120546"]}],"id":[{"id":"10.13039\/100000093","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000093","name":"Center for Information Technology","doi-asserted-by":"publisher","award":["U01-CA235747"],"award-info":[{"award-number":["U01-CA235747"]}],"id":[{"id":"10.13039\/100000093","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000093","name":"Center for Information Technology","doi-asserted-by":"publisher","award":["U48-DP005023"],"award-info":[{"award-number":["U48-DP005023"]}],"id":[{"id":"10.13039\/100000093","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Pilot Grant from Yale Cancer Center"}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["Stat Methods Med Res"],"published-print":{"date-parts":[[2021,7]]},"abstract":"<jats:p> Adaptive designs are gaining popularity in early phase clinical trials because they enable investigators to change the course of a study in response to accumulating data. We propose a novel design to simultaneously monitor several endpoints. These include efficacy, futility, toxicity and other outcomes in early phase, single-arm studies. We construct a recursive relationship to compute the exact probabilities of stopping for any combination of endpoints without the need for simulation, given pre-specified decision rules. The proposed design is flexible in the number and timing of interim analyses. A R Shiny app with user-friendly web interface has been created to facilitate the implementation of the proposed design. <\/jats:p>","DOI":"10.1177\/09622802211013062","type":"journal-article","created":{"date-parts":[[2021,6,23]],"date-time":"2021-06-23T10:59:47Z","timestamp":1624445987000},"page":"1575-1588","update-policy":"https:\/\/doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":3,"title":["Unified exact design with early stopping rules for single arm clinical trials with multiple endpoints"],"prefix":"10.1177","volume":"30","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1263-5620","authenticated-orcid":false,"given":"Wei","family":"Wei","sequence":"first","affiliation":[{"name":"Department of Biostatistics, Yale School of Public Health, New Haven, CT, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1326-9618","authenticated-orcid":false,"given":"Denise","family":"Esserman","sequence":"additional","affiliation":[{"name":"Department of Biostatistics, Yale School of Public Health, New Haven, CT, USA"}]},{"given":"Michael","family":"Kane","sequence":"additional","affiliation":[{"name":"Department of Biostatistics, Yale School of Public Health, New Haven, CT, USA"}]},{"given":"Daniel","family":"Zelterman","sequence":"additional","affiliation":[{"name":"Department of Biostatistics, Yale School of Public Health, New Haven, CT, USA"}]}],"member":"179","published-online":{"date-parts":[[2021,6,23]]},"reference":[{"key":"bibr1-09622802211013062","first-page":"48","volume":"3","author":"Rubinstein L.","year":"2014","journal-title":"Chin Clin Oncol"},{"key":"bibr2-09622802211013062","doi-asserted-by":"publisher","DOI":"10.1200\/JCO.2012.47.9949"},{"key":"bibr3-09622802211013062","doi-asserted-by":"crossref","unstructured":"Theoret MR, Pai-Scherf LH, Chuk MK, et\u00a0al. Expansion cohorts in first-in-human solid tumor oncology trials. Clin Cancer Res 2015; 21: 4545\u20134551.","DOI":"10.1158\/1078-0432.CCR-14-3244"},{"key":"bibr4-09622802211013062","doi-asserted-by":"publisher","DOI":"10.1200\/JCO.2012.47.4957"},{"key":"bibr5-09622802211013062","doi-asserted-by":"publisher","DOI":"10.1093\/jnci\/dju429"},{"key":"bibr6-09622802211013062","doi-asserted-by":"publisher","DOI":"10.1002\/sim.1600"},{"key":"bibr7-09622802211013062","doi-asserted-by":"publisher","DOI":"10.2307\/2533268"},{"key":"bibr8-09622802211013062","doi-asserted-by":"publisher","DOI":"10.1016\/j.cct.2010.07.008"},{"key":"bibr9-09622802211013062","doi-asserted-by":"publisher","DOI":"10.1002\/pst.496"},{"key":"bibr10-09622802211013062","doi-asserted-by":"publisher","DOI":"10.1080\/03610926.2017.1400054"},{"key":"bibr11-09622802211013062","doi-asserted-by":"publisher","DOI":"10.1002\/bimj.201800320"},{"key":"bibr12-09622802211013062","doi-asserted-by":"publisher","DOI":"10.1016\/j.cct.2013.03.006"},{"key":"bibr13-09622802211013062","unstructured":"Law M, Grayling MJ, Mander AP. Optimal curtailed designs for single arm phase II clinical trials. arXiv preprint. 2019; arXiv:1909.03017. https:\/\/arxiv.org\/abs\/1909.03017."},{"key":"bibr14-09622802211013062","doi-asserted-by":"publisher","DOI":"10.1111\/j.1541-0420.2005.00311.x"},{"key":"bibr15-09622802211013062","doi-asserted-by":"publisher","DOI":"10.1214\/aoms\/1177731118"},{"key":"bibr16-09622802211013062","doi-asserted-by":"publisher","DOI":"10.2307\/2533377"},{"key":"bibr17-09622802211013062","doi-asserted-by":"publisher","DOI":"10.1177\/1740774508089279"},{"key":"bibr18-09622802211013062","doi-asserted-by":"publisher","DOI":"10.1111\/j.1467-9876.2011.01006.x"},{"key":"bibr19-09622802211013062","doi-asserted-by":"publisher","DOI":"10.1002\/sim.4780140404"},{"key":"bibr20-09622802211013062","doi-asserted-by":"publisher","DOI":"10.1002\/(SICI)1097-0258(19980730)17:14<1563::AID-SIM873>3.0.CO;2-L"},{"key":"bibr21-09622802211013062","doi-asserted-by":"publisher","DOI":"10.1002\/sim.7338"},{"key":"bibr22-09622802211013062","doi-asserted-by":"publisher","DOI":"10.1093\/jnci\/djz049"},{"key":"bibr23-09622802211013062","doi-asserted-by":"publisher","DOI":"10.1016\/j.csda.2018.06.015"},{"key":"bibr24-09622802211013062","doi-asserted-by":"publisher","DOI":"10.1002\/sim.6550"},{"key":"bibr25-09622802211013062","doi-asserted-by":"publisher","DOI":"10.1002\/sim.5477"},{"key":"bibr26-09622802211013062","doi-asserted-by":"publisher","DOI":"10.2307\/2529393"},{"key":"bibr27-09622802211013062","doi-asserted-by":"publisher","DOI":"10.1200\/JCO.2017.77.6385"},{"key":"bibr28-09622802211013062","doi-asserted-by":"publisher","DOI":"10.2307\/2530704"},{"key":"bibr29-09622802211013062","doi-asserted-by":"publisher","DOI":"10.1200\/JCO.2013.50.3201"},{"key":"bibr30-09622802211013062","doi-asserted-by":"publisher","DOI":"10.1634\/theoncologist.2011-0163"},{"key":"bibr31-09622802211013062","doi-asserted-by":"publisher","DOI":"10.1002\/sim.7082"}],"container-title":["Statistical Methods in Medical Research"],"language":"en","link":[{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/09622802211013062","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/full-xml\/10.1177\/09622802211013062","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/09622802211013062","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,2]],"date-time":"2025-03-02T15:41:22Z","timestamp":1740930082000},"score":12.269015,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/10.1177\/09622802211013062"}},"issued":{"date-parts":[[2021,6,23]]},"references-count":31,"journal-issue":{"issue":"7","published-print":{"date-parts":[[2021,7]]}},"alternative-id":["10.1177\/09622802211013062"],"URL":"https:\/\/doi.org\/10.1177\/09622802211013062","ISSN":["0962-2802","1477-0334"],"issn-type":[{"value":"0962-2802","type":"print"},{"value":"1477-0334","type":"electronic"}],"published":{"date-parts":[[2021,6,23]]}},{"indexed":{"date-parts":[[2025,10,17]],"date-time":"2025-10-17T13:49:33Z","timestamp":1760708973825},"reference-count":0,"publisher":"Science & Engineering Research Support soCiety","content-domain":{"domain":[],"crossmark-restriction":false},"published-print":{"date-parts":[[2014,2,18]]},"DOI":"10.14257\/astl.2014.45.21","type":"proceedings-article","created":{"date-parts":[[2015,12,29]],"date-time":"2015-12-29T04:17:24Z","timestamp":1451362644000},"page":"112-116","source":"Crossref","is-referenced-by-count":4,"title":["Development and Research of Digital Campus System Based on Android"],"prefix":"10.14257","author":[{"name":"Nanjing University of Information Science & Technology","sequence":"first","affiliation":[]},{"given":"Li","family":"Ma","sequence":"first","affiliation":[]},{"given":"Yu","family":"Zhou","sequence":"additional","affiliation":[]},{"name":"Nanjing University of Information Science & Technology","sequence":"additional","affiliation":[]},{"given":"Kuo","family":"Liao","sequence":"additional","affiliation":[]},{"name":"Nanjing University of Information Science & Technology","sequence":"additional","affiliation":[]},{"given":"Shen","family":"Liu","sequence":"additional","affiliation":[]},{"name":"Nanjing University of Information Science & Technology","sequence":"additional","affiliation":[]},{"given":"Jie","family":"Qiao","sequence":"additional","affiliation":[]},{"name":"Nanjing University of Information Science & Technology","sequence":"additional","affiliation":[]},{"given":"Zhenyu","family":"Han","sequence":"additional","affiliation":[]},{"name":"Nanjing University of Information Science & Technology","sequence":"additional","affiliation":[]},{"given":"Jin","family":"Wang","sequence":"additional","affiliation":[]},{"name":"Nanjing University of Information Science & Technology","sequence":"additional","affiliation":[]}],"member":"5371","published-online":{"date-parts":[[2014,2,20]]},"event":{"name":"AST 2014"},"container-title":["Advanced Science and Technology Letters"],"deposited":{"date-parts":[[2015,12,29]],"date-time":"2015-12-29T04:17:25Z","timestamp":1451362645000},"score":12.209097,"resource":{"primary":{"URL":"http:\/\/onlinepresent.org\/proceedings\/vol45_2014\/21.pdf"}},"issued":{"date-parts":[[2014,2,18]]},"references-count":0,"URL":"https:\/\/doi.org\/10.14257\/astl.2014.45.21","published":{"date-parts":[[2014,2,18]]}},{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T06:51:16Z","timestamp":1725432676212},"reference-count":0,"publisher":"IEEE Comput. Soc","content-domain":{"domain":[],"crossmark-restriction":false},"DOI":"10.1109\/jcit.1990.128331","type":"proceedings-article","created":{"date-parts":[[2002,12,4]],"date-time":"2002-12-04T17:06:04Z","timestamp":1039021564000},"page":"586-587","source":"Crossref","is-referenced-by-count":0,"title":["Using information technology"],"prefix":"10.1109","author":[{"given":"A.D.","family":"Wohl","sequence":"first","affiliation":[]}],"member":"263","event":{"name":"5th Jerusalem Conference on Information Technology, 1990. 'Next Decade in Information Technology'","location":"Jerusalem, Israel"},"container-title":["Proceedings of the 5th Jerusalem Conference on Information Technology, 1990. 'Next Decade in Information Technology'"],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx2\/307\/3595\/00128331.pdf?arnumber=128331","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,9]],"date-time":"2017-03-09T04:26:53Z","timestamp":1489033613000},"score":12.188895,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/128331\/"}},"issued":{"date-parts":[[null]]},"references-count":0,"URL":"https:\/\/doi.org\/10.1109\/jcit.1990.128331"},{"indexed":{"date-parts":[[2024,5,11]],"date-time":"2024-05-11T19:59:48Z","timestamp":1715457588765},"reference-count":0,"publisher":"Cornell University Press","isbn-type":[{"value":"9781501749568","type":"print"},{"value":"9781501749582","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"published-print":{"date-parts":[[2020,7,15]]},"abstract":"<p>This chapter explains that a richer understanding of the microfoundations of military power in the information age has important implications for defense strategy and policy. This book offers both negative correctives and positive suggestions. On the negative side, it cautions against the uncritical acceptance of the technology theory of victory. On the positive side, the book offers some hope that warfighters can find better ways to use their information technologies. A fundamental leadership challenge for organizations today is to develop an institutional support system that can both encourage user innovation and limit its liabilities. The chapter then sketches out a synthesis of top-down management and bottom-up adaptation which can be called adaptive management. It also discusses the strategic limits to adaptive management at the low and high ends of the conflict spectrum, which are exemplified by irregular warfare and nuclear warfighting, respectively. Cybersecurity, furthermore, is relevant across the spectrum because it uses information practice to protect or exploit information practice itself.<\/p>","DOI":"10.7591\/cornell\/9781501749568.003.0008","type":"book-chapter","created":{"date-parts":[[2021,1,23]],"date-time":"2021-01-23T14:46:56Z","timestamp":1611413216000},"page":"212-242","source":"Crossref","is-referenced-by-count":0,"title":["Practical Implications of Information Practice"],"prefix":"10.7591","author":[{"given":"Jon R.","family":"Lindsay","sequence":"first","affiliation":[]}],"member":"4434","published-online":{"date-parts":[[2021,1,21]]},"container-title":["Information Technology and Military Power"],"original-title":["Practical Implications of Information Practice"],"language":"en","deposited":{"date-parts":[[2022,7,28]],"date-time":"2022-07-28T19:04:53Z","timestamp":1659035093000},"score":12.160949,"resource":{"primary":{"URL":"https:\/\/academic.oup.com\/cornell-scholarship-online\/book\/37913\/chapter\/332422473"}},"issued":{"date-parts":[[2020,7,15]]},"ISBN":["9781501749568","9781501749582"],"references-count":0,"URL":"https:\/\/doi.org\/10.7591\/cornell\/9781501749568.003.0008","published":{"date-parts":[[2020,7,15]]}},{"indexed":{"date-parts":[[2024,5,11]],"date-time":"2024-05-11T20:00:11Z","timestamp":1715457611681},"reference-count":0,"publisher":"Cornell University Press","isbn-type":[{"value":"9781501749568","type":"print"},{"value":"9781501749582","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"published-print":{"date-parts":[[2020,7,15]]},"abstract":"<p>This chapter presents a framework for understanding information practice. In the language of social science, the \u201cdependent variable\u201d is information practice, which coordinates an organization's representations with its world. Practice itself is an intervening process that shapes military innovation and battlefield performance. The \u201cindependent variables\u201d are the external problems posed by the operational environment and the internal solution adopted by the military organization. The basic argument is that the interaction between operational problems and organizational solutions gives rise to four different patterns of information practice, two of which improve and two of which undermine performance. Ultimately, an information system should be understood as not just the computing devices and software applications in an organization, but also the people and processes that generate, transform, and communicate information.<\/p>","DOI":"10.7591\/cornell\/9781501749568.003.0003","type":"book-chapter","created":{"date-parts":[[2021,1,23]],"date-time":"2021-01-23T14:48:58Z","timestamp":1611413338000},"page":"32-70","source":"Crossref","is-referenced-by-count":0,"title":["A Framework for Understanding Information Practice"],"prefix":"10.7591","author":[{"given":"Jon R.","family":"Lindsay","sequence":"first","affiliation":[]}],"member":"4434","published-online":{"date-parts":[[2021,1,21]]},"container-title":["Information Technology and Military Power"],"original-title":["A Framework for Understanding Information Practice"],"language":"en","deposited":{"date-parts":[[2022,7,28]],"date-time":"2022-07-28T19:04:51Z","timestamp":1659035091000},"score":12.13088,"resource":{"primary":{"URL":"https:\/\/academic.oup.com\/cornell-scholarship-online\/book\/37913\/chapter\/332421672"}},"issued":{"date-parts":[[2020,7,15]]},"ISBN":["9781501749568","9781501749582"],"references-count":0,"URL":"https:\/\/doi.org\/10.7591\/cornell\/9781501749568.003.0003","published":{"date-parts":[[2020,7,15]]}},{"indexed":{"date-parts":[[2024,5,11]],"date-time":"2024-05-11T19:59:50Z","timestamp":1715457590585},"reference-count":0,"publisher":"Cornell University Press","isbn-type":[{"value":"9781501749568","type":"print"},{"value":"9781501749582","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"published-print":{"date-parts":[[2020,7,15]]},"abstract":"<p>This chapter discusses the technology theory of victory. A theory of victory is an intellectual concept that describes how military organizations can prevail in war. It reflects intuitions or folk theories about what war will be like and how militaries will fight it. Concepts may be codified in doctrinal manuals and strategy documents, or they may just be shared beliefs in a military community of practice. The technology theory of victory has run afoul of operational and political problems. Decades of effort to substitute information for mass have culminated in cyberwarfare and drone operations, but decisive victory remains elusive. New variants of technology theory are already emerging in response to advances in machine learning, embedded computing, and quantum computing. Skeptics have highlighted numerous practical and conceptual shortcomings of technology theory. Scholars have offered more nuanced perspectives on the social factors that shape the adoption and employment of material capabilities. The chapter argues that all of these different strands of debate reflect different perspectives on the same underlying phenomenon: the historically increasing complexity of information practice.<\/p>","DOI":"10.7591\/cornell\/9781501749568.003.0002","type":"book-chapter","created":{"date-parts":[[2021,1,23]],"date-time":"2021-01-23T14:52:02Z","timestamp":1611413522000},"page":"13-31","source":"Crossref","is-referenced-by-count":0,"title":["The Technology Theory of Victory"],"prefix":"10.7591","author":[{"given":"Jon R.","family":"Lindsay","sequence":"first","affiliation":[]}],"member":"4434","published-online":{"date-parts":[[2021,1,21]]},"container-title":["Information Technology and Military Power"],"original-title":["The Technology Theory of Victory"],"language":"en","deposited":{"date-parts":[[2022,7,28]],"date-time":"2022-07-28T19:04:51Z","timestamp":1659035091000},"score":12.12548,"resource":{"primary":{"URL":"https:\/\/academic.oup.com\/cornell-scholarship-online\/book\/37913\/chapter\/332421579"}},"issued":{"date-parts":[[2020,7,15]]},"ISBN":["9781501749568","9781501749582"],"references-count":0,"URL":"https:\/\/doi.org\/10.7591\/cornell\/9781501749568.003.0002","published":{"date-parts":[[2020,7,15]]}},{"indexed":{"date-parts":[[2022,4,4]],"date-time":"2022-04-04T20:11:44Z","timestamp":1649103104632},"reference-count":0,"publisher":"Interregional Academy of Personnel Management","issue":"2","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["INFORMATION TECHNOLOGY AND SOCIETY"],"published-print":{"date-parts":[[2021]]},"DOI":"10.32689\/maup.it.2021.2","type":"journal-issue","created":{"date-parts":[[2021,11,3]],"date-time":"2021-11-03T12:55:24Z","timestamp":1635944124000},"source":"Crossref","is-referenced-by-count":0,"prefix":"10.32689","member":"17924","published-online":{"date-parts":[[2021]]},"container-title":["INFORMATION TECHNOLOGY AND SOCIETY"],"deposited":{"date-parts":[[2021,11,3]],"date-time":"2021-11-03T12:55:24Z","timestamp":1635944124000},"score":12.109409,"resource":{"primary":{"URL":"http:\/\/journals.maup.com.ua\/index.php\/it\/issue\/view\/166"}},"issued":{"date-parts":[[2021]]},"references-count":0,"journal-issue":{"issue":"2","published-online":{"date-parts":[[2021]]},"published-print":{"date-parts":[[2021]]}},"URL":"https:\/\/doi.org\/10.32689\/maup.it.2021.2","published":{"date-parts":[[2021]]}},{"indexed":{"date-parts":[[2024,9,11]],"date-time":"2024-09-11T17:43:17Z","timestamp":1726076597665},"edition-number":"0","reference-count":0,"publisher":"CRC Press","isbn-type":[{"type":"electronic","value":"9780429081552"}],"content-domain":{"domain":[],"crossmark-restriction":false},"published-print":{"date-parts":[[2003,12,8]]},"DOI":"10.1201\/9781482273014-14","type":"book-chapter","created":{"date-parts":[[2020,7,9]],"date-time":"2020-07-09T17:42:43Z","timestamp":1594316563000},"page":"85-96","source":"Crossref","is-referenced-by-count":0,"title":["Utilization of information technology in navigational decision-making"],"prefix":"10.1201","member":"301","container-title":["Cooperative Process Management: Cognition And Information Technology"],"language":"en","deposited":{"date-parts":[[2020,12,22]],"date-time":"2020-12-22T12:58:52Z","timestamp":1608641932000},"score":12.102102,"resource":{"primary":{"URL":"https:\/\/www.taylorfrancis.com\/books\/9781482273014\/chapters\/10.1201\/9781482273014-14"}},"issued":{"date-parts":[[2003,12,8]]},"ISBN":["9780429081552"],"references-count":0,"URL":"https:\/\/doi.org\/10.1201\/9781482273014-14","published":{"date-parts":[[2003,12,8]]}},{"indexed":{"date-parts":[[2026,3,6]],"date-time":"2026-03-06T14:09:22Z","timestamp":1772806162459,"version":"3.50.1"},"reference-count":103,"publisher":"SAGE Publications","issue":"4","license":[{"start":{"date-parts":[[1998,12,1]],"date-time":"1998-12-01T00:00:00Z","timestamp":912470400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Journal of Information Technology"],"published-print":{"date-parts":[[1998,12]]},"abstract":"<jats:p> This paper argues that interpretive researchers need to consciously adopt a critical and reflective stance in relation to the role that the information technologies which they describe play in maintaining social orders and power relations in organizations. The concern of the paper is to highlight potential shortcomings in the treatment of technology in interpretive research on information systems, but also to present a specific approach to studying information technology and organization which may overcome these weaknesses. By utilizing a perspective drawn from the discursive and disciplinary work of Foucault and recent work on the sociology of technology, we can complement the thick description of interpretive research with the broader sweep of critical social theory. <\/jats:p>","DOI":"10.1177\/026839629801300408","type":"journal-article","created":{"date-parts":[[2018,12,21]],"date-time":"2018-12-21T14:24:32Z","timestamp":1545402272000},"page":"301-311","source":"Crossref","is-referenced-by-count":47,"title":["Information Technology as Disciplinary Technology: Being Critical in Interpretive Research on Information Systems"],"prefix":"10.1177","volume":"13","author":[{"given":"Bill","family":"Doolin","sequence":"first","affiliation":[]}],"member":"179","published-online":{"date-parts":[[1998,12,1]]},"reference":[{"key":"bibr1-026839629801300408","volume-title":"The Professional Stranger: An Informal Introduction to Ethnography","author":"Agar M.H.","year":"1980"},{"key":"bibr2-026839629801300408","first-page":"15","volume-title":"Transforming Organizations With Information Technology","author":"Applegate L.M.","year":"1994"},{"key":"bibr3-026839629801300408","volume-title":"Shaping Technology\/Building Society: Studies in Sociotechnical Change","author":"Bijker W.E.","year":"1992"},{"key":"bibr4-026839629801300408","doi-asserted-by":"publisher","DOI":"10.1177\/030631291021004004"},{"key":"bibr5-026839629801300408","doi-asserted-by":"publisher","DOI":"10.1177\/135050849523012"},{"key":"bibr6-026839629801300408","doi-asserted-by":"publisher","DOI":"10.1111\/j.1467-6486.1992.tb00674.x"},{"key":"bibr7-026839629801300408","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-34872-8_22"},{"key":"bibr8-026839629801300408","first-page":"143","volume-title":"The Management of Information and Communication Technologies: Emerging Patterns of Control","author":"Bloomfield B.P.","year":"1994"},{"key":"bibr9-026839629801300408","first-page":"135","volume-title":"Information Management in Health Services","author":"Bloomfield B.P.","year":"1994"},{"key":"bibr10-026839629801300408","doi-asserted-by":"publisher","DOI":"10.1016\/0361-3682(79)90017-5"},{"key":"bibr11-026839629801300408","doi-asserted-by":"publisher","DOI":"10.1016\/0361-3682(83)90030-2"},{"key":"bibr12-026839629801300408","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-34872-8_19"},{"key":"bibr13-026839629801300408","doi-asserted-by":"publisher","DOI":"10.14452\/MR-026-03-1974-07_1"},{"key":"bibr14-026839629801300408","doi-asserted-by":"publisher","DOI":"10.1177\/017084068800900205"},{"key":"bibr15-026839629801300408","volume-title":"Sociological Paradigms and Organisational Analysis: Elements of the Sociology of Corporate Life","author":"Burrell G.","year":"1979"},{"key":"bibr16-026839629801300408","first-page":"343","volume-title":"Science as Practice and Culture","author":"Callon M.","year":"1992"},{"issue":"4","key":"bibr17-026839629801300408","first-page":"601","volume":"61","author":"Chua W.F.","year":"1986","journal-title":"The Accounting Review"},{"key":"bibr18-026839629801300408","doi-asserted-by":"publisher","DOI":"10.1108\/EUM0000000004624"},{"key":"bibr19-026839629801300408","doi-asserted-by":"publisher","DOI":"10.1016\/0361-3682(93)90018-2"},{"key":"bibr20-026839629801300408","doi-asserted-by":"publisher","DOI":"10.4135\/9781446279267"},{"key":"bibr21-026839629801300408","doi-asserted-by":"publisher","DOI":"10.1177\/017084069201300106"},{"key":"bibr22-026839629801300408","doi-asserted-by":"publisher","DOI":"10.1016\/0361-3682(93)90025-2"},{"key":"bibr23-026839629801300408","first-page":"84","volume-title":"The Politics of Quality in the Public Sector: The Management of Change","author":"Davies A.","year":"1995"},{"key":"bibr24-026839629801300408","doi-asserted-by":"publisher","DOI":"10.1108\/09513559410070597"},{"key":"bibr25-026839629801300408","first-page":"286","volume-title":"The Paradigm Dialog","author":"Dobbert M.L.","year":"1990"},{"issue":"2","key":"bibr26-026839629801300408","first-page":"21","volume":"3","author":"Doolin B.","year":"1996","journal-title":"Australian Journal of Information Systems"},{"key":"bibr27-026839629801300408","volume-title":"Discourse, technology and organisation in a New Zealand Crown Health Enterprise.","author":"Doolin B.","year":"1998"},{"key":"bibr28-026839629801300408","volume-title":"Michel Foucault: Beyond Structuralism and Hermeneutics","author":"Dreyfus H.L.","year":"1982"},{"key":"bibr29-026839629801300408","first-page":"45","volume":"66","author":"Drucker P.F.","year":"1988","journal-title":"Harvard Business Review"},{"key":"bibr30-026839629801300408","doi-asserted-by":"publisher","DOI":"10.2307\/258920"},{"key":"bibr31-026839629801300408","doi-asserted-by":"publisher","DOI":"10.2190\/5N2R-MWAN-FWY2-JVHQ"},{"key":"bibr32-026839629801300408","volume-title":"Discipline and Punish: The Birth of the Prison","author":"Foucault M.","year":"1977"},{"key":"bibr33-026839629801300408","volume-title":"Power\/Knowledge: Selected Interviews and Other Writings 1972\u20131977","author":"Foucault M.","year":"1980"},{"key":"bibr34-026839629801300408","volume-title":"The History of Sexuality: An Introduction","author":"Foucault M.","year":"1981"},{"key":"bibr35-026839629801300408","doi-asserted-by":"publisher","DOI":"10.1086\/448181"},{"key":"bibr36-026839629801300408","first-page":"17","volume-title":"The Paradigm Dialog","author":"Guba E.G.","year":"1990"},{"key":"bibr37-026839629801300408","first-page":"139","volume-title":"What is a Case? Exploring the Foundations of Social Inquiry","author":"Harper D.","year":"1992"},{"key":"bibr38-026839629801300408","doi-asserted-by":"publisher","DOI":"10.1108\/09593849510098244"},{"key":"bibr39-026839629801300408","first-page":"14","volume-title":"Social Research: Philosophy, Politics and Practice","author":"Henwood K.L.","year":"1993"},{"key":"bibr40-026839629801300408","volume-title":"Discourses of Power: From Hobbes to Foucault","author":"Hindess B.","year":"1996"},{"key":"bibr41-026839629801300408","volume-title":"The Philosophy of Social Research","author":"Hughes J.A.","year":"1990"},{"key":"bibr42-026839629801300408","doi-asserted-by":"publisher","DOI":"10.1016\/S0959-8022(97)00007-6"},{"key":"bibr43-026839629801300408","doi-asserted-by":"publisher","DOI":"10.1108\/09513579310042542"},{"key":"bibr44-026839629801300408","doi-asserted-by":"publisher","DOI":"10.1177\/017084069801900301"},{"key":"bibr45-026839629801300408","first-page":"139","volume-title":"Foucault's New Domains","author":"Johnson T.","year":"1993"},{"key":"bibr46-026839629801300408","volume-title":"Information Systems Research: Contemporary Approaches and Emergent Traditions","author":"J\u00f6nsson S.","year":"1991"},{"key":"bibr47-026839629801300408","doi-asserted-by":"publisher","DOI":"10.1016\/S0361-3682(96)00040-2"},{"key":"bibr48-026839629801300408","doi-asserted-by":"publisher","DOI":"10.2307\/249133"},{"key":"bibr49-026839629801300408","first-page":"157","volume-title":"The Management of Information and Communication Technologies: Emerging Patterns of Control.","author":"Kimble C.","year":"1994"},{"key":"bibr50-026839629801300408","doi-asserted-by":"publisher","DOI":"10.1145\/356802.356806"},{"issue":"2","key":"bibr51-026839629801300408","first-page":"230","volume":"2","author":"Knights D.","year":"1995","journal-title":"Technology Studies"},{"key":"bibr52-026839629801300408","doi-asserted-by":"publisher","DOI":"10.1177\/017084069101200205"},{"key":"bibr53-026839629801300408","volume-title":"Managers Divided: Organization Politics and Information Technology Management","author":"Knights D.","year":"1994"},{"key":"bibr54-026839629801300408","doi-asserted-by":"publisher","DOI":"10.1177\/0038038589023004003"},{"key":"bibr55-026839629801300408","first-page":"103","volume-title":"A Sociology of Monsters: Essays on Power, Technology and Domination","author":"Latour B.","year":"1991"},{"issue":"2","key":"bibr56-026839629801300408","first-page":"29","volume":"3","author":"Latour B.","year":"1994","journal-title":"Common Knowledge"},{"key":"bibr57-026839629801300408","first-page":"1","volume-title":"A Sociology of Monsters: Essays on Power, Technology and Domination","author":"Law J.","year":"1991"},{"key":"bibr58-026839629801300408","doi-asserted-by":"publisher","DOI":"10.1007\/BF01059830"},{"key":"bibr59-026839629801300408","volume-title":"Organizing Modernity","author":"Law J.","year":"1994"},{"key":"bibr60-026839629801300408","doi-asserted-by":"publisher","DOI":"10.1111\/j.1467-954X.1995.tb00604.x"},{"key":"bibr61-026839629801300408","doi-asserted-by":"publisher","DOI":"10.1287\/orsc.2.4.342"},{"key":"bibr62-026839629801300408","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-35309-8"},{"key":"bibr63-026839629801300408","doi-asserted-by":"publisher","DOI":"10.1016\/0147-1767(85)90062-8"},{"key":"bibr64-026839629801300408","doi-asserted-by":"publisher","DOI":"10.1006\/mare.1993.1013"},{"key":"bibr65-026839629801300408","volume-title":"The Information Society","author":"Lyon D.","year":"1988"},{"key":"bibr66-026839629801300408","volume-title":"The Social Shaping of Technology","author":"MacKenzie D.C.","year":"1985"},{"key":"bibr67-026839629801300408","first-page":"203","volume":"1","author":"Markus M.L.","year":"1981","journal-title":"Systems, Objectives, Solutions"},{"key":"bibr68-026839629801300408","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.34.5.583"},{"key":"bibr69-026839629801300408","doi-asserted-by":"publisher","DOI":"10.2307\/41165202"},{"key":"bibr70-026839629801300408","volume-title":"Domination and Power","author":"Miller P.","year":"1987"},{"key":"bibr71-026839629801300408","first-page":"239","volume-title":"Rethinking Objectivity","author":"Miller P.","year":"1994"},{"key":"bibr72-026839629801300408","doi-asserted-by":"publisher","DOI":"10.1080\/03085149000000001"},{"key":"bibr73-026839629801300408","doi-asserted-by":"publisher","DOI":"10.1108\/09513579310045675"},{"key":"bibr74-026839629801300408","doi-asserted-by":"publisher","DOI":"10.1145\/358568.358592"},{"key":"bibr75-026839629801300408","volume-title":"Computer Systems in Work Design \u2013 the ETHICS Method: Effective Technical and Human Implementation of Computer Systems","author":"Mumford E.","year":"1979"},{"key":"bibr76-026839629801300408","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-35309-8_15"},{"key":"bibr77-026839629801300408","doi-asserted-by":"publisher","DOI":"10.1108\/09593849710178225"},{"key":"bibr78-026839629801300408","doi-asserted-by":"publisher","DOI":"10.1046\/j.1365-2575.1997.00013.x"},{"key":"bibr79-026839629801300408","doi-asserted-by":"publisher","DOI":"10.2307\/591050"},{"key":"bibr80-026839629801300408","doi-asserted-by":"publisher","DOI":"10.1016\/0959-8022(91)90011-3"},{"key":"bibr81-026839629801300408","doi-asserted-by":"publisher","DOI":"10.1287\/orsc.3.3.398"},{"key":"bibr82-026839629801300408","doi-asserted-by":"publisher","DOI":"10.1287\/isre.2.1.1"},{"key":"bibr83-026839629801300408","volume-title":"Hospitals in Transition: The Resource Management Experiment","author":"Packwood T.","year":"1991"},{"key":"bibr84-026839629801300408","doi-asserted-by":"publisher","DOI":"10.1177\/003803857200600202"},{"key":"bibr85-026839629801300408","volume-title":"Managing with Power","author":"Pfeffer J.","year":"1994"},{"key":"bibr86-026839629801300408","first-page":"31","volume-title":"Communication and Organizations: An Interpretive Approach","author":"Putman L.L.","year":"1983"},{"key":"bibr87-026839629801300408","first-page":"15","volume-title":"The Human Costs of Managerialism: Advocating the Recovery of Humanity","author":"Rees S.","year":"1995"},{"key":"bibr88-026839629801300408","volume-title":"The Corporation of the 1990s","author":"Rockart J.F.","year":"1991"},{"key":"bibr89-026839629801300408","doi-asserted-by":"publisher","DOI":"10.2307\/591464"},{"key":"bibr90-026839629801300408","volume-title":"Technology and Organization: Power, Meaning and Design","author":"Scarbrough H.","year":"1992"},{"key":"bibr91-026839629801300408","doi-asserted-by":"crossref","DOI":"10.1093\/oso\/9780195063585.001.0001","volume-title":"The Corporation of the 1990s","author":"Scott Morton M.","year":"1991"},{"key":"bibr92-026839629801300408","doi-asserted-by":"publisher","DOI":"10.1177\/0038038592026002009"},{"key":"bibr93-026839629801300408","doi-asserted-by":"publisher","DOI":"10.4135\/9781412983945"},{"key":"bibr94-026839629801300408","doi-asserted-by":"publisher","DOI":"10.1108\/09513579810207292"},{"key":"bibr95-026839629801300408","volume-title":"Social change and theoretical structures in MIS.","author":"Tinker T.","year":"1994"},{"key":"bibr96-026839629801300408","volume-title":"Interpreting Information Systems in Organizations","author":"Walsham G.","year":"1993"},{"key":"bibr97-026839629801300408","doi-asserted-by":"publisher","DOI":"10.1287\/isre.6.4.376"},{"key":"bibr98-026839629801300408","doi-asserted-by":"publisher","DOI":"10.1007\/BF00183386"},{"key":"bibr99-026839629801300408","doi-asserted-by":"publisher","DOI":"10.1177\/0038038593027002004"},{"key":"bibr100-026839629801300408","doi-asserted-by":"publisher","DOI":"10.1111\/j.1467-6486.1994.tb00641.x"},{"key":"bibr101-026839629801300408","unstructured":"WillmottH. (1996). \u2018Smart Machine derailed\u2019 \u2013 engineers accuse passengers. Electronic Journal of Radical Organisational Theory, 2(2) at http:\/\/www.mngt.waikato.ac.nz\/depts\/sm&l\/journal\/vol_3\/willmott.htm."},{"issue":"1","key":"bibr102-026839629801300408","first-page":"121","volume":"109","author":"Winner L.","year":"1980","journal-title":"Daedalus"},{"key":"bibr103-026839629801300408","volume-title":"In the Age of the Smart Machine: The Future of Work and Power","author":"Zuboff S.","year":"1988"}],"container-title":["Journal of Information Technology"],"language":"en","link":[{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/026839629801300408","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/026839629801300408","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,2]],"date-time":"2025-03-02T05:57:55Z","timestamp":1740895075000},"score":12.0925665,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/10.1177\/026839629801300408"}},"issued":{"date-parts":[[1998,12]]},"references-count":103,"journal-issue":{"issue":"4","published-print":{"date-parts":[[1998,12]]}},"alternative-id":["10.1177\/026839629801300408"],"URL":"https:\/\/doi.org\/10.1177\/026839629801300408","ISSN":["0268-3962","1466-4437"],"issn-type":[{"value":"0268-3962","type":"print"},{"value":"1466-4437","type":"electronic"}],"published":{"date-parts":[[1998,12]]}},{"indexed":{"date-parts":[[2025,7,30]],"date-time":"2025-07-30T15:39:16Z","timestamp":1753889956290,"version":"3.41.2"},"reference-count":19,"publisher":"i-manager Publications","issue":"1","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["JIT"],"published-print":{"date-parts":[[2020]]},"DOI":"10.26634\/jit.9.1.17288","type":"journal-article","created":{"date-parts":[[2021,2,4]],"date-time":"2021-02-04T11:13:18Z","timestamp":1612437198000},"page":"22","source":"Crossref","is-referenced-by-count":0,"title":["A USSD BASED CASHLESS REVENUE COLLECTION SYSTEM:\n      TARGETING THE INFORMAL SECTOR"],"prefix":"10.26634","volume":"9","author":[{"given":"ABUBAKAR ZUBAIRU","family":"HUSSAINI","sequence":"first","affiliation":[]},{"name":"Department of Information and Media Technology, School of Information and Communication Technology, Federal University of\n        Technology, Minna, Niger, Nigeria","sequence":"additional","affiliation":[]},{"given":"AHMAD DAUDU","family":"SULEIMAN","sequence":"additional","affiliation":[]},{"name":"Department of Information and Media Technology, School of Information and Communication Technology, Federal University of\n        Technology, Minna, Niger, Nigeria","sequence":"additional","affiliation":[]},{"given":"OLUYEMI ETUK","family":"STELLA","sequence":"additional","affiliation":[]},{"name":"Department of Information and Media Technology, School of Information and Communication Technology, Federal University of\n        Technology, Minna, Niger, Nigeria","sequence":"additional","affiliation":[]},{"given":"BABAKANO JADA","family":"FAIZA","sequence":"additional","affiliation":[]},{"name":"Department of Information and Media Technology, School of Information and Communication Technology, Federal University of\n        Technology, Minna, Niger, Nigeria","sequence":"additional","affiliation":[]},{"given":"MOHAMMED KOLO","family":"IDRIS","sequence":"additional","affiliation":[]},{"name":"Department of Computer Science, School of Information and Communication Technology, Federal University of Technology,\n        Minna, Niger, Nigeria","sequence":"additional","affiliation":[]}],"member":"11168","published-online":{"date-parts":[[2020]]},"reference":[{"key":"ref1","unstructured":"Akobundu, C. I., Agu, M., & Nnakwuzie, D. N. (2015). Development of mobile payment system: An\n          implementation of cashless economy. International\n          Journal of Engineering and Computer Science, 4(06),\n          12859-12876."},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1504\/IJEWM.2020.105352"},{"key":"ref3","unstructured":"CISLAC, (2016). Expanding the Tax Base in the\n          Informal Sector in Nigeria. https:\/\/maketaxfair.net\/policybrief-\n          on-expanding-the-tax-base-in-the-nigerianinformal-\n          sector\/"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.12691\/jcsa-5-2-5"},{"key":"ref5","unstructured":"Hamilton, C., (2018). A Tale of Two Economies. https:\/\/\n          www.brainstormmag.co.za\/verticals\/14268-a-tale-oftwo-\n          economies"},{"key":"ref6","unstructured":"Hanouch, M. (2015). What is USSD & Why Does it\n          Matter for Mobile Financial Services?. https:\/\/www.cgap.\n          org\/blog\/what-ussd-why-does-it-matter-mobile-financial-services"},{"key":"ref7","unstructured":"ITU. (2017). ICT Regulatory Tracker 2018. Nigeria\n          Country Card. https:\/\/www.itu.int\/net4\/itu-d\/irt\/#\/countrycard\/\n          NGA"},{"key":"ref8","unstructured":"Izhar, A., Khan, A., Khiyal, M. S. H., Javed, W., & Baig, S.\n          (2011). Designing and implementation of electronic\n          payment gateway for developing countries, Journal of\n          Theoretical and Applied Information Technology, 26(2),\n          84-90"},{"key":"ref9","unstructured":"Munyoro, G., & Matinde, M. (2016). The significance\n          of plastic money to the hospitality industry: A case study of\n          rainbow towers group of hotels (RTG). Journal of\n          Economics, 4(5), 167 \u2013 170"},{"key":"ref10","unstructured":"Ngotho, J., & Kerongo, F. (2014). Determinants of revenue collection in developing countries: Kenya's tax\n          collection perspective. Journal of Management and\n          Business Administration, 1(1)."},{"key":"ref11","unstructured":"Ojong, C. M., Anthony, O., & Arikpo, O. F. (2016). The\n          impact of tax revenue on economic growth: Evidence\n          from Nigeria. IOSR Journal of Economics and Finance,\n          7(1), 32-38."},{"key":"ref12","unstructured":"Olaoye, C.O., Asaolu, T. O. & Adewoye, J. O. (2009).\n          A review of revenue generation in nigerian local\n          government: A case study of Ekiti State. International\n          Business Management, 3(3), 54-60."},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1111\/j.\n          2040-0209.2010.00341_1.x"},{"key":"ref14","unstructured":"Rane, M., Sarang, P. & Patil, A. (2017). Swift cash:\n          One card for all user payment and identity needs,\n          International Journal for Research in Applied Science &\n          Engineering Technology, 5(12), 1658 \u2013 1660."},{"key":"ref15","unstructured":"Research ICT Africa (RIA), (2017). RIA Africa Mobile\n          Pricing (RAMP) Indices Portal. https:\/\/researchictafrica.\n          net\/ramp_indices_portal\/"},{"key":"ref16","unstructured":"Smith, C. (2016). SARS Boss Concerned About Illicit\n          Money Flows. https:\/\/www.news24.com\/fin24\/economy\/\n          sars-boss-concerned-about-illicit-money-flows-20161109"},{"key":"ref17","unstructured":"Udoh, E. J. (2015). Taxing the informal economy in\n          Nigeria: Issues, challenges and opportunities.\n          International Journal of Business and Social Science,\n          6(10), 160-175."},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.5897\/AJBM11.2213"},{"key":"ref19","unstructured":"United Nations (2016). E-Government Survey, UNO,\n          New York. https:\/\/www.un.org\/development\/desa\/\n          publications\/2016-e-government-survey.html"}],"container-title":["i-manager's Journal on Information Technology"],"language":"en","deposited":{"date-parts":[[2021,2,4]],"date-time":"2021-02-04T11:16:43Z","timestamp":1612437403000},"score":12.084152,"resource":{"primary":{"URL":"https:\/\/www.imanagerpublications.com\/article\/17288"}},"issued":{"date-parts":[[2020]]},"references-count":19,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2020]]},"published-print":{"date-parts":[[2020]]}},"URL":"https:\/\/doi.org\/10.26634\/jit.9.1.17288","ISSN":["2277-5110","2277-5250"],"issn-type":[{"type":"print","value":"2277-5110"},{"type":"electronic","value":"2277-5250"}],"published":{"date-parts":[[2020]]},"article-number":"jit.9.1.17288"}],"items-per-page":20,"query":{"start-index":0,"search-terms":"Information+technology"}}}