2019
DOI: 10.14488/bjopm.2019.v16.n2.a9
|View full text |Cite
|
Sign up to set email alerts
|

Blockchain Based MFA Solution: the use of hydro raindrop MFA for information security on WordPress websites

Abstract: Goal: The present work aims to present how the use of a blockchain two-factor authentication solution 2FA on a page developed on WordPress can contribute to the information security regarding user authentication. Design/Methodology/Approach: The research method employed is characterized as an exploratory research, since all the analysis is based on the theoretical reference data available on the subject. A field research was carried out in relation to the implementation of the multi-factor authentication… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 9 publications
(4 citation statements)
references
References 19 publications
0
4
0
Order By: Relevance
“…The blockchain theme, which first appeared in this time slice, is located in the basic theme quadrant close to the motor theme quadrant. In this period, studies on blockchain have focused on the effects of blockchain on supply chain ripple effects (Ivanov et al, 2019), trust issues among supply chain partners (Longo et al, 2019), reduction of carbon emissions (Fu et al, 2018), improvement in energy productivity (Mohamed et al, 2019), cognitive manufacturing processes (Chung et al, 2019), and improvement in information security (Cardoso et al, 2019).…”
Section: Thematic Evolutionmentioning
confidence: 99%
“…The blockchain theme, which first appeared in this time slice, is located in the basic theme quadrant close to the motor theme quadrant. In this period, studies on blockchain have focused on the effects of blockchain on supply chain ripple effects (Ivanov et al, 2019), trust issues among supply chain partners (Longo et al, 2019), reduction of carbon emissions (Fu et al, 2018), improvement in energy productivity (Mohamed et al, 2019), cognitive manufacturing processes (Chung et al, 2019), and improvement in information security (Cardoso et al, 2019).…”
Section: Thematic Evolutionmentioning
confidence: 99%
“…The latter selected works cover the implementation of the Hydro Raindrop multifactor authentication solution on a WordPress page (named 2FA) [50], a sample system data exchange between sample participants using smart contracts (called FabRec) [51], a middleware approach for utilizing BCT services by integrating IIoT embedded in a robot, manufacturing CPS, cloud and fog manufacturing for a smart manufacturing solution (called Man4Ware) [52], BSeIn [53] and FAR-EDGE [43]. The author in [50] presents how the usage of a BCT two-factor authentication solution (2FA) on a page developed on WordPress can contribute to information security regarding user authentication. The research method employed is characterized as exploratory research, since all the analysis is based on the theoretical reference data available on the subject.…”
Section: Related Work Based On Bct For Industry 40mentioning
confidence: 99%
“…With that, the employee becomes aware of information security norms and policies practiced in the company. This movement must be continuous, through training and communication (Cardoso et al, 2019). Training the new employee in guidelines and best information security practices, according to Nazareth and Choi (2015), raises IS governance maturity.…”
Section: Proposals Of Is Governance Guidelinesmentioning
confidence: 99%
“…Cyber attacks are increasingly more sophisticated and complex, leading companies to financial collapse and degradation of their image. Thus, areas like Information Security (IS) start to play a crucial role in organizations' corporate strategy (Alencar et al, 2018), becoming vital for any industry that wants to protect its data (Cardoso et al, 2019). IS, over the years, could no longer be addressed with a technical view alone, and showed the need of an approach turned to the business and integrated to the strategic management in order to reach the whole organization with well structured norms and policies (Carcary et al, 2016).…”
Section: Introductionmentioning
confidence: 99%