nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Accelerating AI Adoption with Responsible AI Signals and Employee Engagement Mechanisms in Health Care
|
Wang, Weisha |
|
|
|
6 |
p. 2239-2256 |
artikel |
2 |
A cross-country model of contextual factors impacting cloud computing adoption at universities in sub-Saharan Africa
|
Sabi, Humphrey M. |
|
2017 |
|
6 |
p. 1381-1404 |
artikel |
3 |
A cultural theory analysis of e-government: Insights from a local government council in Malaysia
|
Jackson, Stephen |
|
2016 |
|
6 |
p. 1391-1405 |
artikel |
4 |
Adaptive approach to restraining content pollution in peer-to-peer networks
|
Hawa, Mohammed |
|
2016 |
|
6 |
p. 1373-1390 |
artikel |
5 |
Advancing the Understanding of the Role of Responsible AI in the Continued Use of IoMT in Healthcare
|
Al-Dhaen, Fatema |
|
|
|
6 |
p. 2159-2178 |
artikel |
6 |
A fast and scalable approach for IoT service selection based on a physical service model
|
Jin, Xiongnan |
|
2016 |
|
6 |
p. 1357-1372 |
artikel |
7 |
A little Birdie told me: Social media, organizational legitimacy, and underpricing in initial public offerings
|
Lundmark, Leif W. |
|
2016 |
|
6 |
p. 1407-1422 |
artikel |
8 |
A Meta-Analysis of Deterrence Theory in Information Security Policy Compliance Research
|
Trang, Simon |
|
|
|
6 |
p. 1265-1284 |
artikel |
9 |
An AHP-IFT Integrated Model for Performance Evaluation of E-Commerce Web Sites
|
Rouyendegh, Babak Daneshvar |
|
|
|
6 |
p. 1345-1355 |
artikel |
10 |
Analyzing social choice and group ranking of online games for product mix innovation
|
Tung, Wei-Feng |
|
2017 |
|
6 |
p. 1301-1309 |
artikel |
11 |
An intelligent approach to data extraction and task identification for process mining
|
Li, Jiexun |
|
2015 |
|
6 |
p. 1195-1208 |
artikel |
12 |
An Ontology and Multi-Agent Based Decision Support Framework for Prefabricated Component Supply Chain
|
Du, Juan |
|
|
|
6 |
p. 1467-1485 |
artikel |
13 |
A Novel Approach for Learning How to Automatically Match Job Offers and Candidate Profiles
|
Martinez-Gil, Jorge |
|
|
|
6 |
p. 1265-1274 |
artikel |
14 |
A Novel Ensemble-based Classifier for Detecting the COVID-19 Disease for Infected Patients
|
Singh, Prabh Deep |
|
|
|
6 |
p. 1385-1401 |
artikel |
15 |
Antecedents and Outcome of Deficient Self-Regulation in Unknown Wireless Networks Use Context: An Exploratory Study
|
Ayaburi, Emmanuel W. |
|
|
|
6 |
p. 1213-1229 |
artikel |
16 |
Antecedents to the Adoption of Mobile Payment in China and Italy: an Integration of UTAUT2 and Innovation Resistance Theory
|
Migliore, Giacomo |
|
|
|
6 |
p. 2099-2122 |
artikel |
17 |
Applying and Understanding an Advanced, Novel Deep Learning Approach: A Covid 19, Text Based, Emotions Analysis Study
|
Choudrie, Jyoti |
|
|
|
6 |
p. 1431-1465 |
artikel |
18 |
A Predictive Analytics-Based Decision Support System for Drug Courts
|
Zolbanin, Hamed M. |
|
|
|
6 |
p. 1323-1342 |
artikel |
19 |
A Proposed Sentiment Analysis Deep Learning Algorithm for Analyzing COVID-19 Tweets
|
Kaur, Harleen |
|
|
|
6 |
p. 1417-1429 |
artikel |
20 |
A Responsible AI Framework for Mitigating the Ramifications of the Organ Donation Crisis
|
Tutun, Salih |
|
|
|
6 |
p. 2301-2316 |
artikel |
21 |
A special issue on knowledge and competence management: Developing Enterprise solutions
|
Vasconcelos, José Braga de |
|
2016 |
|
6 |
p. 1035-1039 |
artikel |
22 |
Assimilation of Big Data Innovation: Investigating the Roles of IT, Social Media, and Relational Capital
|
Bharati, Pratyush |
|
|
|
6 |
p. 1357-1368 |
artikel |
23 |
A structural-semantic web service selection approach to improve retrievability of web services
|
Garriga, Martin |
|
2016 |
|
6 |
p. 1319-1344 |
artikel |
24 |
A study on the author collaboration network in big data*
|
Peng, Yufang |
|
2017 |
|
6 |
p. 1329-1342 |
artikel |
25 |
A system framework for gamified Cost Engineering
|
Zimmerling, Eric |
|
2016 |
|
6 |
p. 1063-1084 |
artikel |
26 |
A Techno-Business Platform to Improve Customer Experience Following the Brand Crisis Recovery: A B2B Perspective
|
Behera, Rajat Kumar |
|
|
|
6 |
p. 2027-2051 |
artikel |
27 |
Attack and Defense Strategies in Cyber War Involving Production and Stockpiling of Zero-Day Cyber Exploits
|
Hausken, Kjell |
|
|
|
6 |
p. 1609-1620 |
artikel |
28 |
Big Data Analytics and Business Intelligence in Industry
|
Huang, Shih-Chia |
|
2017 |
|
6 |
p. 1229-1232 |
artikel |
29 |
Characterization of Cloud Computing Reversibility as Explored by the DELPHI Method
|
Bouaynaya, Wafa |
|
|
|
6 |
p. 1505-1518 |
artikel |
30 |
Chasing Metaverses: Reflecting on Existing Literature to Understand the Business Value of Metaverses
|
Polyviou, Ariana |
|
|
|
6 |
p. 2417-2438 |
artikel |
31 |
Collaborative personal profiling for web service ranking and recommendation
|
Rong, Wenge |
|
2014 |
|
6 |
p. 1265-1282 |
artikel |
32 |
Combining Spatial Optimization and Multi-Agent Temporal Difference Learning for Task Assignment in Uncertain Crowdsourcing
|
Sun, Yong |
|
|
|
6 |
p. 1447-1465 |
artikel |
33 |
Competence management in knowledge intensive organizations using consensual knowledge and ontologies
|
Kimble, Chris |
|
2016 |
|
6 |
p. 1119-1130 |
artikel |
34 |
Consequences of Cyberbullying and Social Overload while Using SNSs: A Study of Users’ Discontinuous Usage Behavior in SNSs
|
Cao, Xiongfei |
|
|
|
6 |
p. 1343-1356 |
artikel |
35 |
Correlates of using the billing system of a mobile network operator to pay for digital goods and services
|
Gerpott, Torsten J. |
|
2016 |
|
6 |
p. 1265-1283 |
artikel |
36 |
COVID_SCREENET: COVID-19 Screening in Chest Radiography Images Using Deep Transfer Stacking
|
Elakkiya, R. |
|
|
|
6 |
p. 1369-1383 |
artikel |
37 |
Crowdsourcing roles, methods and tools for data-intensive disaster management
|
Poblet, Marta |
|
2017 |
|
6 |
p. 1363-1379 |
artikel |
38 |
Crowdsourcing social network service for social enterprise innovation
|
Tung, Wei-Feng |
|
2017 |
|
6 |
p. 1311-1327 |
artikel |
39 |
Data Governance, Consumer Privacy, and Project Status Reporting: Remembering H. Jeff Smith
|
Keil, Mark |
|
|
|
6 |
p. 1207-1212 |
artikel |
40 |
Diffusion of deception in social media: Social contagion effects and its antecedents
|
Vishwanath, Arun |
|
2014 |
|
6 |
p. 1353-1367 |
artikel |
41 |
Diffusion of Innovations: Mobile Money Utility and Financial Inclusion in Nigeria. Insights from Agents and Unbanked Poor End Users
|
David-West, Olayinka |
|
|
|
6 |
p. 1753-1773 |
artikel |
42 |
Digital Transformation in Health Care: Augmented Reality for Hands-Free Service Innovation
|
Klinker, Kai |
|
|
|
6 |
p. 1419-1431 |
artikel |
43 |
Disaster Management Knowledge Analysis Framework Validated
|
Inan, Dedi I. |
|
|
|
6 |
p. 2077-2097 |
artikel |
44 |
Does Information Systems Support for Creativity Enhance Effective Information Systems Use and Job Satisfaction in Virtual Work?
|
Cho, Jeewon |
|
|
|
6 |
p. 1865-1886 |
artikel |
45 |
Does Social Capital Arise from Enterprise or Public Social Media Use? A Model of Social Media Antecedents and Consequences
|
Saraf, Nilesh |
|
|
|
6 |
p. 2353-2375 |
artikel |
46 |
Do we Fully Understand Information Systems Failure? An Exploratory Study of the Cognitive Schema of IS Professionals
|
Kim, Jong Uk |
|
|
|
6 |
p. 1385-1419 |
artikel |
47 |
Dynamics of Negative Evaluations in the Information Exchange of Interactive Decision-Making Teams: Advancing the Design of Technology-Augmented GDSS
|
Silver, Steven D. |
|
|
|
6 |
p. 1621-1642 |
artikel |
48 |
E-commerce web site loyalty: A cross cultural comparison
|
Chen, Jengchung Victor |
|
2014 |
|
6 |
p. 1283-1299 |
artikel |
49 |
Editorial on Machine Learning, AI and Big Data Methods and Findings for COVID-19
|
Chang, Victor |
|
|
|
6 |
p. 1363-1367 |
artikel |
50 |
Editorial: Special issue on cyber security, privacy and ethics of information systems
|
Acquisti, Alessandro |
|
|
|
6 |
p. 1203-1205 |
artikel |
51 |
Effect of New Bundled Services on Doctors’ Online Social and Economic Returns: Evidence from an Online Health Community
|
Yin, Qiuju |
|
|
|
6 |
p. 2393-2416 |
artikel |
52 |
Employee knowledge profiles – a mixed-research methods approach
|
Sousa, Maria José |
|
2016 |
|
6 |
p. 1103-1117 |
artikel |
53 |
Enablers and Inhibitors of Mobile Payments in Rural India: a Dual-Factor Theory Perspective
|
Sharma, Sujeet Kumar |
|
|
|
6 |
p. 2335-2351 |
artikel |
54 |
Estimating trust value: A social network perspective
|
Chang, Wei-Lun |
|
2014 |
|
6 |
p. 1381-1400 |
artikel |
55 |
Examining micro-level knowledge sharing discussions in online communities
|
Wang, G. Alan |
|
2015 |
|
6 |
p. 1227-1238 |
artikel |
56 |
Examining the infusion of mobile technology by healthcare practitioners in a hospital setting
|
O’ Connor, Yvonne |
|
2016 |
|
6 |
p. 1297-1317 |
artikel |
57 |
Exploring the antecedents and consequences of technology and knowledge integration mechanisms in the context of NPD
|
Chang, Hsin Hsin |
|
2016 |
|
6 |
p. 1165-1189 |
artikel |
58 |
Fear of Online Consumer Identity Theft: Cross-Country Application and Short Scale Development
|
Walsh, Gianfranco |
|
|
|
6 |
p. 1251-1264 |
artikel |
59 |
FedDPGAN: Federated Differentially Private Generative Adversarial Networks Framework for the Detection of COVID-19 Pneumonia
|
Zhang, Longling |
|
|
|
6 |
p. 1403-1415 |
artikel |
60 |
Formation of Consumers’ Perceived Information Security: Examining the Transfer of Trust in Online Retailers
|
Mohr, Henner |
|
|
|
6 |
p. 1231-1250 |
artikel |
61 |
Framework for the Classification of Imbalanced Structured Data Using Under-sampling and Convolutional Neural Network
|
Lee, Yoon Sang |
|
|
|
6 |
p. 1795-1809 |
artikel |
62 |
Fraud detection using fraud triangle risk factors
|
Huang, Shaio Yan |
|
2016 |
|
6 |
p. 1343-1356 |
artikel |
63 |
From Groups to Communities: A Resource Mobilization Theory Perspective on the Emergence of Communities
|
Angelopoulos, Spyros |
|
|
|
6 |
p. 2457-2474 |
artikel |
64 |
Grammatical facial expression recognition in sign language discourse: a study at the syntax level
|
Freitas, Fernando A. |
|
2017 |
|
6 |
p. 1243-1259 |
artikel |
65 |
Green information systems use in social enterprise: the case of a community-led eco-localization website in the West Midlands region of the UK
|
Gholami, Roya |
|
2017 |
|
6 |
p. 1345-1361 |
artikel |
66 |
Guest Editorial: Behavioral-Data Mining in Information Systems and the Big Data Era
|
Boratto, Ludovico |
|
2018 |
|
6 |
p. 1153-1156 |
artikel |
67 |
How Data Protection Regulation Affects Startup Innovation
|
Martin, Nicholas |
|
|
|
6 |
p. 1307-1324 |
artikel |
68 |
How user relationships affect user perceived value propositions of enterprises on social commerce platforms
|
Zheng, Chengde |
|
2017 |
|
6 |
p. 1261-1271 |
artikel |
69 |
iGen User (over) Attachment to Social Media: Reframing the Policy Intervention Conversation
|
Smith, Kane J. |
|
|
|
6 |
p. 1989-2006 |
artikel |
70 |
Impact of object manipulation, customization and social loafing on competencies management in 3D Virtual Worlds
|
Bououd, Ikram |
|
2016 |
|
6 |
p. 1191-1203 |
artikel |
71 |
Impact of Smartphones on Quality of Life: A Health Information Behavior Perspective
|
Ghahramani, Fereshteh |
|
|
|
6 |
p. 1275-1290 |
artikel |
72 |
Individual Decision-Performance Using Spatial Decision Support Systems: A Geospatial Reasoning Ability and Perceived Task-Technology Fit Perspective
|
Erskine, Michael A. |
|
|
|
6 |
p. 1369-1384 |
artikel |
73 |
Inducing Personalities and Values from Language Use in Social Network Communities
|
Kumar, Upendra |
|
2017 |
|
6 |
p. 1219-1240 |
artikel |
74 |
Influence of Culture on Knowledge Sharing Attitude among Academic Staff in eLearning Virtual Communities in Saudi Arabia
|
Chandran, Daniel |
|
|
|
6 |
p. 1563-1572 |
artikel |
75 |
Information management model for competencies and learning outcomes in an educational context
|
Gonçalves, Maria José Angélico |
|
2016 |
|
6 |
p. 1051-1061 |
artikel |
76 |
Information Technology Governance Institutionalization and the Behavior of Individuals in the Context of Public Organizations
|
Wiedenhöft, Guilherme C. |
|
|
|
6 |
p. 1487-1504 |
artikel |
77 |
Institutional Perspectives on the Process of Enterprise Architecture Adoption
|
Dang, Duong |
|
|
|
6 |
p. 1433-1445 |
artikel |
78 |
Investigating the Impact of Personality Traits of Social Network Sites Users on Information Disclosure in China: the Moderating Role of Gender
|
Mouakket, Samar |
|
|
|
6 |
p. 1305-1321 |
artikel |
79 |
Investigating the Security Divide between SME and Large Companies: How SME Characteristics Influence Organizational IT Security Investments
|
Heidt, Margareta |
|
|
|
6 |
p. 1285-1305 |
artikel |
80 |
Is There a Place for Responsible Artificial Intelligence in Pandemics? A Tale of Two Countries
|
El-Haddadeh, Ramzi |
|
|
|
6 |
p. 2221-2237 |
artikel |
81 |
Levels of EMR Adoption in U.S. Hospitals: An Empirical Examination of Absorptive Capacity, Institutional Pressures, Top Management Beliefs, and Participation
|
Gopalakrishna-Remani, Venugopal |
|
|
|
6 |
p. 1325-1344 |
artikel |
82 |
Linking Drivers and Outcomes of Innovation in IT Firms: The Role of Partnerships
|
Jha, Ashish Kumar |
|
|
|
6 |
p. 1593-1607 |
artikel |
83 |
Management of National eID Infrastructure as a State-Critical Asset and Public-private Partnership: Learning from the Case of Estonia
|
Lips, Silvia |
|
|
|
6 |
p. 2439-2456 |
artikel |
84 |
Middleware for mobile medical data management with minimal latency
|
Lomotey, Richard K. |
|
2016 |
|
6 |
p. 1281-1296 |
artikel |
85 |
Mining Reusable Software Components from Object-Oriented Source Code using Discrete PSO and Modeling Them as Java Beans
|
Rathee, Amit |
|
|
|
6 |
p. 1519-1537 |
artikel |
86 |
Mining variable fragments from process event logs
|
Pourmasoumi, Asef |
|
2016 |
|
6 |
p. 1423-1443 |
artikel |
87 |
Multi-level Team Assignment in Social Business Processes: An Algorithm and Simulation Study
|
Liu, Rong |
|
|
|
6 |
p. 1949-1969 |
artikel |
88 |
New Insights into e-Loyalty of Internet Banking Users in an Emerging Market Context: A Multilevel Analysis
|
Malhotra, Neeru |
|
|
|
6 |
p. 1521-1536 |
artikel |
89 |
Online Black-Markets: An Investigation of a Digital Infrastructure in the Dark
|
Spagnoletti, Paolo |
|
|
|
6 |
p. 1811-1826 |
artikel |
90 |
Online knowledge sharing mechanisms: a systematic review of the state of the art literature and recommendations for future research
|
Charband, Yeganeh |
|
2016 |
|
6 |
p. 1131-1151 |
artikel |
91 |
Online Users’ Identity Theft and Coping Strategies, Attribution and Sense of Urgency: A Non-Linear Quadratic Effect Assessment
|
Salam, A. F. |
|
|
|
6 |
p. 1929-1948 |
artikel |
92 |
Organizational Structure for the IT Department: Profit Center or Cost Center?
|
Vithayathil, Joseph |
|
|
|
6 |
p. 2053-2076 |
artikel |
93 |
Personality, User Preferences and Behavior in Recommender systems
|
Karumur, Raghav Pavan |
|
2017 |
|
6 |
p. 1241-1265 |
artikel |
94 |
Quantum Secured Internet Transport
|
Hubermann, Bernardo A. |
|
|
|
6 |
p. 1561-1567 |
artikel |
95 |
RecSys Issues Ontology: A Knowledge Classification of Issues for Recommender Systems Researchers
|
Bunnell, Lawrence |
|
|
|
6 |
p. 1377-1418 |
artikel |
96 |
Reliable and efficient big service selection
|
Huang, Ling |
|
2017 |
|
6 |
p. 1273-1282 |
artikel |
97 |
Responsible AI for Digital Health: a Synthesis and a Research Agenda
|
Trocin, Cristina |
|
|
|
6 |
p. 2139-2157 |
artikel |
98 |
Responsible Artificial Intelligence (AI) for Digital Health and Medical Analytics
|
Sivarajah, Uthayasankar |
|
|
|
6 |
p. 2117-2122 |
artikel |
99 |
Responsible Artificial Intelligence (AI) for Value Formation and Market Performance in Healthcare: the Mediating Role of Patient’s Cognitive Engagement
|
Kumar, Pradeep |
|
|
|
6 |
p. 2197-2220 |
artikel |
100 |
Responsible Artificial Intelligence as a Secret Ingredient for Digital Health: Bibliometric Analysis, Insights, and Research Directions
|
Fosso Wamba, Samuel |
|
|
|
6 |
p. 2123-2138 |
artikel |
101 |
Responsible Artificial Intelligence in Healthcare: Predicting and Preventing Insurance Claim Denials for Economic and Social Wellbeing
|
Johnson, Marina |
|
|
|
6 |
p. 2179-2195 |
artikel |
102 |
Revealing determinant factors for early breast cancer recurrence by decision tree
|
Guo, Jimin |
|
2017 |
|
6 |
p. 1233-1241 |
artikel |
103 |
RFID in production and service systems: Technology, applications and issues
|
Fescioglu-Unver, Nilgun |
|
2014 |
|
6 |
p. 1369-1380 |
artikel |
104 |
Role of Risks in the Development of Responsible Artificial Intelligence in the Digital Healthcare Domain
|
Gupta, Shivam |
|
|
|
6 |
p. 2257-2274 |
artikel |
105 |
Rough set based classification of real world Web services
|
Own, Hala S. |
|
2014 |
|
6 |
p. 1301-1311 |
artikel |
106 |
Scaling Up Integrated Structural and Content-Based Network Analysis
|
Golbeck, Jennifer |
|
2017 |
|
6 |
p. 1191-1202 |
artikel |
107 |
Semantics-based event log aggregation for process mining and analytics
|
Deokar, Amit V. |
|
2015 |
|
6 |
p. 1209-1226 |
artikel |
108 |
Sentiment analysis for Chinese reviews of movies in multi-genre based on morpheme-based features and collocations
|
Yang, Heng-Li |
|
2014 |
|
6 |
p. 1335-1352 |
artikel |
109 |
Smart Tourism Technologies’ Ambidexterity: Balancing Tourist’s Worries and Novelty Seeking for Travel Satisfaction
|
Goo, Jahyun |
|
|
|
6 |
p. 2139-2158 |
artikel |
110 |
Social Commerce in Emerging Markets and its Impact on Online Community Engagement
|
Algharabat, Raed S. |
|
|
|
6 |
p. 1499-1520 |
artikel |
111 |
Source Credibility Theory: SME Hospitality Sector Blog Posting During the Covid-19 Pandemic
|
Serman, Zehra Ece |
|
|
|
6 |
p. 2317-2334 |
artikel |
112 |
Special section on business process analytics
|
Lang, Karl R. |
|
2015 |
|
6 |
p. 1191-1194 |
artikel |
113 |
Testing the Relationship Between Information and Knowledge in Computer-Aided Decision-Making
|
Li, Yuan |
|
|
|
6 |
p. 1827-1843 |
artikel |
114 |
The Application of the Principles of Responsible AI on Social Media Marketing for Digital Health
|
Liu, Rui |
|
|
|
6 |
p. 2275-2299 |
artikel |
115 |
The classification of hackers by knowledge exchange behaviors
|
Zhang, Xiong |
|
2015 |
|
6 |
p. 1239-1251 |
artikel |
116 |
The Co-construct/ Co-evolving Process between Organization’s Absorptive Capacity and Enterprise System Practice under Changing Context: The Case of ERP Practice
|
Wu, Kai |
|
|
|
6 |
p. 2123-2138 |
artikel |
117 |
The contributing factors of continuance usage of social media: An empirical analysis
|
Idemudia, Efosa Carroll |
|
2016 |
|
6 |
p. 1267-1280 |
artikel |
118 |
The Dark Side of Mobile Learning via Social Media: How Bad Can It Get?
|
Loh, Xiu-Kin |
|
|
|
6 |
p. 1887-1904 |
artikel |
119 |
The design of a cloud-based tracker platform based on system-of-systems service architecture
|
Chu, Victor W. |
|
2017 |
|
6 |
p. 1283-1299 |
artikel |
120 |
The development and application of e-Geoscience in China
|
Zhu, Yunqiang |
|
2015 |
|
6 |
p. 1217-1231 |
artikel |
121 |
The effect of an individual’s age on the perceived importance and usage intensity of communications services—A Bayesian Network analysis
|
Kekolahti, Pekka |
|
2014 |
|
6 |
p. 1313-1333 |
artikel |
122 |
The Emerging Liquid IT Workforce: Theorizing Their Personal Competitive Advantage
|
Marjanovic, Olivera |
|
|
|
6 |
p. 1775-1793 |
artikel |
123 |
The Engagement of Complementors and the Role of Platform Boundary Resources in e-Commerce Platform Ecosystems
|
Engert, Martin |
|
|
|
6 |
p. 2007-2025 |
artikel |
124 |
The Impact of Geographic Distance on Online Social Interactions
|
Laniado, David |
|
2017 |
|
6 |
p. 1203-1218 |
artikel |
125 |
The Impact of Revenue Models on Anti-Counterfeiting Measures for Online Intermediaries
|
Zhang, Xiong |
|
|
|
6 |
p. 1905-1928 |
artikel |
126 |
The Moderating Effect of Management Review in Enhancing Software Reliability: A Partial Least Square Approach
|
Verma, Vibha |
|
|
|
6 |
p. 1845-1863 |
artikel |
127 |
The Role of Artificial Intelligence in Fighting the COVID-19 Pandemic
|
Piccialli, Francesco |
|
|
|
6 |
p. 1467-1497 |
artikel |
128 |
The Structured Process Modeling Theory (SPMT) a cognitive view on why and how modelers benefit from structuring the process of process modeling
|
Claes, Jan |
|
2015 |
|
6 |
p. 1401-1425 |
artikel |
129 |
The value of the CIO in the top management team on performance in the case of information security breaches
|
Zafar, Humayun |
|
2015 |
|
6 |
p. 1205-1215 |
artikel |
130 |
TL-NER: A Transfer Learning Model for Chinese Named Entity Recognition
|
Peng, DunLu |
|
|
|
6 |
p. 1291-1304 |
artikel |
131 |
Toward an Understanding of the Antecedents to Health Information Privacy Concern: A Mixed Methods Study
|
Fox, Grace |
|
|
|
6 |
p. 1537-1562 |
artikel |
132 |
Towards a construction of an intelligent business process based on cloud services and driven by degree of similarity and QoS
|
Lacheheub, Mohammed Nassim |
|
2016 |
|
6 |
p. 1085-1102 |
artikel |
133 |
TV-Program Retrieval and Classification: A Comparison of Approaches based on Machine Learning
|
Narducci, Fedelucio |
|
2017 |
|
6 |
p. 1157-1171 |
artikel |
134 |
Uncovering hidden process assets: A case study
|
Sánchez-Segura, Maria-Isabel |
|
2016 |
|
6 |
p. 1041-1049 |
artikel |
135 |
Understanding Factors Influencing Employees’ Consumptive and Contributive Use of Enterprise Social Networks
|
Chin, Pei Yee |
|
|
|
6 |
p. 1357-1376 |
artikel |
136 |
Understanding governance, risk and compliance information systems (GRC IS): The experts view
|
Papazafeiropoulou, Anastasia |
|
2015 |
|
6 |
p. 1251-1263 |
artikel |
137 |
Understanding Online Music Piracy Behavior via Private Communication Channels
|
Park, Soomin |
|
|
|
6 |
p. 2377-2392 |
artikel |
138 |
Understanding the Order Effect of Online Reviews: A Text Mining Perspective
|
Tripathi, Sambit |
|
|
|
6 |
p. 1971-1988 |
artikel |
139 |
User Personality and User Satisfaction with Recommender Systems
|
Nguyen, Tien T. |
|
2017 |
|
6 |
p. 1173-1189 |
artikel |
140 |
Using Mobile Phone Data for Emergency Management: a Systematic Literature Review
|
Wang, Yanxin |
|
|
|
6 |
p. 1539-1559 |
artikel |
141 |
Using serious games to manage knowledge and competencies: The seven-step development process
|
Allal-Chérif, Oihab |
|
2016 |
|
6 |
p. 1153-1163 |
artikel |
142 |
When Ambiguity Rules: The Emergence of Adaptive Governance from (In)Congruent Frames of Knowledge Sharing Technology
|
Wang, Cancan |
|
|
|
6 |
p. 1573-1591 |
artikel |
143 |
Workflow-aware attention tracking to enhance collaboration management
|
Fan, Shaokun |
|
2015 |
|
6 |
p. 1253-1264 |
artikel |
144 |
Workgroup Collective Efficacy to Information Security Management: Manifestation of its Antecedents and Empirical Examination
|
Yoo, Chul Woo |
|
|
|
6 |
p. 2475-2491 |
artikel |
145 |
XHQE: A hybrid system for scalable selectivity estimation of XML queries
|
El-Alfy, E.-S. M. |
|
2015 |
|
6 |
p. 1233-1249 |
artikel |