nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
An Empirical Investigation on Business Analytics in Software and Systems Development Projects
|
Ahmad, Muhammad Ovais |
|
|
25 |
2 |
p. 917-927 |
artikel |
2 |
An Information Security Performance Measurement Tool for Senior Managers: Balanced Scorecard Integration for Security Governance and Control Frameworks
|
Herath, Tejaswini C. |
|
|
25 |
2 |
p. 681-721 |
artikel |
3 |
Artificial Intelligence and Blockchain Integration in Business: Trends from a Bibliometric-Content Analysis
|
Kumar, Satish |
|
|
25 |
2 |
p. 871-896 |
artikel |
4 |
A Task-Technology-Identity Fit Model of Smartwatch Utilisation and User Satisfaction: A Hybrid SEM-Neural Network Approach
|
El-Masri, Mazen |
|
|
25 |
2 |
p. 835-852 |
artikel |
5 |
A Theory-based Deep-Learning Approach to Detecting Disinformation in Financial Social Media
|
Chung, Wingyan |
|
|
25 |
2 |
p. 473-492 |
artikel |
6 |
Continuance Intention of Mobile Payment: TTF Model with Trust in an African Context
|
Franque, Frank Bivar |
|
|
25 |
2 |
p. 775-793 |
artikel |
7 |
Deep Reinforcement Learning in the Advanced Cybersecurity Threat Detection and Protection
|
Sewak, Mohit |
|
|
25 |
2 |
p. 589-611 |
artikel |
8 |
Design Principles for User Interfaces in AI-Based Decision Support Systems: The Case of Explainable Hate Speech Detection
|
Meske, Christian |
|
|
25 |
2 |
p. 743-773 |
artikel |
9 |
Does Fake News in Different Languages Tell the Same Story? An Analysis of Multi-level Thematic and Emotional Characteristics of News about COVID-19
|
Zhou, Lina |
|
|
25 |
2 |
p. 493-512 |
artikel |
10 |
Do Social Media Marketing Activities Improve Brand Loyalty? An Empirical Study on Luxury Fashion Brands
|
Fetais, Abdulla H. |
|
|
25 |
2 |
p. 795-817 |
artikel |
11 |
DyPolDroid: Protecting Against Permission-Abuse Attacks in Android
|
Rubio-Medrano, Carlos E. |
|
|
25 |
2 |
p. 529-548 |
artikel |
12 |
Heterogeneous Information Fusion based Topic Detection from Social Media Data
|
Rani, Seema |
|
|
25 |
2 |
p. 513-528 |
artikel |
13 |
I Like My Anonymity: An Empirical Investigation of the Effect of Multidimensional Review Text and Role Anonymity on Helpfulness of Employer Reviews
|
Parameswaran, Srikanth |
|
|
25 |
2 |
p. 853-870 |
artikel |
14 |
Investigating the Market Success of Software-as-a-Service Providers: the Multivariate Latent Growth Curve Model Approach
|
Lee, Sun-Pyo |
|
|
25 |
2 |
p. 639-658 |
artikel |
15 |
Key Factors in Achieving Service Level Agreements (SLA) for Information Technology (IT) Incident Resolution
|
Swain, Ajaya K. |
|
|
25 |
2 |
p. 819-834 |
artikel |
16 |
Password and Passphrase Guessing with Recurrent Neural Networks
|
Nosenko, Alex |
|
|
25 |
2 |
p. 549-565 |
artikel |
17 |
RQ Labs: A Cybersecurity Workforce Skills Development Framework
|
Daniel, Clinton |
|
|
25 |
2 |
p. 431-450 |
artikel |
18 |
Secure Knowledge Management and Cybersecurity in the Era of Artificial Intelligence
|
Samtani, Sagar |
|
|
25 |
2 |
p. 425-429 |
artikel |
19 |
Social Media Sustainability Communication: An Analysis of Firm Behaviour and Stakeholder Responses
|
Jha, Ashish Kumar |
|
|
25 |
2 |
p. 723-742 |
artikel |
20 |
The Application of Role-Based Framework in Preventing Internal Identity Theft Related Crimes: A Qualitative Case Study of UK Retail Companies
|
Okeke, Romanus Izuchukwu |
|
|
25 |
2 |
p. 451-472 |
artikel |
21 |
The challenges of entering the metaverse: An experiment on the effect of extended reality on workload
|
Xi, Nannan |
|
|
25 |
2 |
p. 659-680 |
artikel |
22 |
Towards Adversarially Superior Malware Detection Models: An Adversary Aware Proactive Approach using Adversarial Attacks and Defenses
|
Rathore, Hemant |
|
|
25 |
2 |
p. 567-587 |
artikel |
23 |
Trends and Trajectories in the Software Industry: implications for the future of work
|
Laato, Samuli |
|
|
25 |
2 |
p. 929-944 |
artikel |
24 |
Using Multi-Factor Authentication for Online Account Security: Examining the Influence of Anticipated Regret
|
Ogbanufe, Obi M. |
|
|
25 |
2 |
p. 897-916 |
artikel |
25 |
Visualizing Convolutional Neural Network Models’ Sensitivity to Nonnatural Data Order
|
Klepetko, Randy |
|
|
25 |
2 |
p. 613-638 |
artikel |