Abstract:A fundamental problem in many disciplines is the classification of objects in a domain of interest into a taxonomy. Developing a taxonomy, however, is a complex process that has not been adequately addressed in the information systems (IS) literature. The purpose of this paper is to present a method for taxonomy development that can be used in IS. First, this paper demonstrates through a comprehensive literature survey that taxonomy development in IS has largely been ad hoc. Then the paper defines the problem … Show more
“…To develop a taxonomy of data collaborative forms we used the Taxonomy Development Method formulated by Nickerson, et al [8]. According to these authors, this is the first comprehensive effort to formalize the process of taxonomy development in Information Systems as a method.…”
Section: Methodsmentioning
confidence: 99%
“…The purpose of this research is to develop a taxonomy which distinguishes among different forms of data collaboratives. A taxonomy (also sometimes referred to as a typology or classification) is a system for grouping objects of interest in a domain based on common characteristics [8]. We expect the taxonomy to be useful to three user groups: researchers, policy-makers, and companies potentially interested to (learn how to) share data.…”
“…To develop a taxonomy of data collaborative forms we used the Taxonomy Development Method formulated by Nickerson, et al [8]. According to these authors, this is the first comprehensive effort to formalize the process of taxonomy development in Information Systems as a method.…”
Section: Methodsmentioning
confidence: 99%
“…The purpose of this research is to develop a taxonomy which distinguishes among different forms of data collaboratives. A taxonomy (also sometimes referred to as a typology or classification) is a system for grouping objects of interest in a domain based on common characteristics [8]. We expect the taxonomy to be useful to three user groups: researchers, policy-makers, and companies potentially interested to (learn how to) share data.…”
“…Research conducted by Nickerson et al (2009) provides a detailed description for developing a new taxonomy of mobile applications, and demonstrates "how a mobile app taxonomy can be used to analyze current and future applications" (p. 2). In their report, they propose that a useful taxonomy has the following desirable attributes:…”
Section: Taxonomymentioning
confidence: 99%
“…(Nickerson et al, 2009). These "additional conceptualizations" were established as subcategories, which help to further define the specific role the applications play in planning activities.…”
“…Static and dynamic are related to the locational dimension of the applications: some applications provide customized information or functionality based on the user's location, whereas other applications do not depend on where the user is located. (Nickerson et al, 2009). For our purposes we have labeled "location-based" applications as "dynamic," and nonlocation based applications as "static," since they do not use the user's location to modify the user interaction.…”
Blockchain technology has gained significant attention and adoption due to its decentralized nature, and promising secure and immutable transactions. The interpretation of Blockchain's components has been presented in an innovative manner, illustrating the features they enable or manage. However, its networks do not appear so immune to vulnerabilities like any other technological system. Among the typical weaknesses, endpoint vulnerabilities refer to weaknesses in the endpoints that interact with the blockchain network. They pose a significant risk to the security and integrity of the entire system. These vulnerabilities can affect blockchain networks including smart contract vulnerabilities, wallet vulnerabilities, and communication vulnerabilities. In view of the absence of any viable taxonomic description and associated value, we attempted a novel comprehensive classification of endpoint vulnerabilities. The proposed taxonomy is designed to logically categorize and classify the various endpoint vulnerabilities through a pictorial representation. It encompasses wallet vulnerabilities, malware, cryptojacking and human negligence. Additionally, this paper proposes a novel approach to mapping endpoint vulnerabilities to the blockchain abstract layer. It gives a unique way to study the vulnerabilities and layers' relation. Finally, the corresponding violated principles behind the vulnerabilities have been identified and indicated. By providing a structured taxonomy of endpoint vulnerabilities, this paper aims to enhance the understanding of the security challenges associated with blockchain applications. By understanding and addressing the taxonomy of endpoint vulnerabilities, blockchain practitioners and researchers can enhance blockchain networks' overall security and trustworthiness, paving the way for broader adoption and utilization of this transformative technology. It may have implications in terms of identifying, linking, developing control, and finally mitigating endpoint vulnerabilities in the rapidly changing environment.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.