nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Analyzing Cryptocurrencies
|
Li, Xiaofan |
|
|
22 |
1 |
p. 17-22 |
artikel |
2 |
A Quantum Router For The Entangled Web
|
Huberman, Bernardo A. |
|
|
22 |
1 |
p. 37-43 |
artikel |
3 |
Benchmarking Methodology for Information Security Policy (BMISP): Artifact Development and Evaluation
|
Kang, Martin (Dae Youp) |
|
|
22 |
1 |
p. 221-242 |
artikel |
4 |
Blockchain in Context
|
Ehrenberg, Andrew J. |
|
|
22 |
1 |
p. 29-35 |
artikel |
5 |
Breaking the Privacy Kill Chain: Protecting Individual and Group Privacy Online
|
Kim, Jongwoo |
|
|
22 |
1 |
p. 171-185 |
artikel |
6 |
Correction to: Schema Extraction for Deep Web Query Interfaces Using Heuristics Rules
|
Jou, Chichang |
|
|
22 |
1 |
p. 273 |
artikel |
7 |
Determinants of Intention to Participate in Corporate BYOD-Programs: The Case of Digital Natives
|
Weeger, Andy |
|
|
22 |
1 |
p. 203-219 |
artikel |
8 |
Dissatisfaction, Disconfirmation, and Distrust: an Empirical Examination of Value Co-Destruction through Negative Electronic Word-of-Mouth (eWOM)
|
Nam, Kichan |
|
|
22 |
1 |
p. 113-130 |
artikel |
9 |
Emerging Frontiers in Smart Environment and Healthcare – A Vision
|
Mukherjee, Satyen |
|
|
22 |
1 |
p. 23-27 |
artikel |
10 |
Examining the Role of Tie Strength in Users’ Continuance Intention of Second-Generation Mobile Instant Messaging Services
|
Gong, Xiuyuan |
|
|
22 |
1 |
p. 149-170 |
artikel |
11 |
Exploring the influential factors of continuance intention to use mobile Apps: Extending the expectation confirmation model
|
Tam, Carlos |
|
|
22 |
1 |
p. 243-257 |
artikel |
12 |
Interdependency Analysis in Security Investment against Strategic Attacks
|
Ezhei, Mansooreh |
|
|
22 |
1 |
p. 187-201 |
artikel |
13 |
ISF Editorial 2020
|
Ramesh, R. |
|
|
22 |
1 |
p. 1-9 |
artikel |
14 |
Is Self-Citation Biased? An Investigation via the Lens of Citation Polarity, Density, and Location
|
Zhou, Lina |
|
|
22 |
1 |
p. 77-90 |
artikel |
15 |
Making Open Data more Personal Through a Social Value Perspective: a Methodological Approach
|
Cabitza, Federico |
|
|
22 |
1 |
p. 131-148 |
artikel |
16 |
Presenting Cloud Business Performance for Manufacturing Organizations
|
Chang, Victor |
|
|
22 |
1 |
p. 59-75 |
artikel |
17 |
Reconciliation of Privacy with Preventive Cybersecurity: The Bright Internet Approach
|
Lee, Jae Kyu |
|
|
22 |
1 |
p. 45-57 |
artikel |
18 |
The Productivity Vampires
|
King, John Leslie |
|
|
22 |
1 |
p. 11-15 |
artikel |
19 |
Ubiquitous Computing Capabilities and User-System Interaction Readiness: An Activity Perspective
|
Sun, Jun |
|
|
22 |
1 |
p. 259-271 |
artikel |
20 |
U.S. Healthcare Provider Capabilities and Performance: the Mediating Roles of Service Innovation and Quality
|
Thambusamy, Ravi |
|
|
22 |
1 |
p. 91-111 |
artikel |