3
3D Printing: The Future Crime of the Present
(4274)
|
A
Achieving Effective Data Analytics: An Agile Framework
(4269)
|
An Empirical Study on the Impact of Price Discount on Sales in Software-as-a-Service (SaaS) Market
(4264)
|
An Interactive Toolbox for Twitter Content Analytics
(4259)
|
Analysis of the Risks of NFC Mobile Payment Systems
(4279)
|
Are Students Using Security Measures to Protect their Data when Downloading Mobile Applications?
(4268)
|
B
Building Client Vendor Alignment Capability in Strategic Information Systems Outsourcing
(4252)
|
C
Causes of cyberbullying in multi-player online gaming environments: Gamer perceptions
(4258)
|
Crowdsourcing Surveys: Alternative Approaches to Survey Collection
(4260)
|
E
E-commerce Adoption: A Revelatory Case Study in the German Oncology Pharmaceutical Supply Chain
(4273)
|
Evidence of Wikipedia usage during the school year: A numerical study
(4263)
|
I
Identifying the Critical Success Factors for Information Systems to Manage Sponsored Research Activities at Institutions of Higher Education
(4272)
|
M
Malvertising - A Rising Threat To The Online Ecosystem
(4266)
|
O
On Assessment of Risks in Offshore Outsourcing of Information Technology
(4267)
|
P
Patient Healthcare Smart Card System: A Unified Medical Record for Access and Analytics
(4275)
|
Principle Component Analysis for Feature Reduction and Data Preprocessing in Data Science
(4257)
|
Proposal for Kelly Criterion-Inspired Lossy Network Compression for Network Intrusion Applications
(4265)
|
S
Subjective norm and measuring its impact on information security behavioral intention in organizations.
(4253)
|
Sentiment Analysis and Opinion Mining: Current State of the Art and Review of Google and Yahoo Search Engines’ Privacy Policies
(4254)
|
T
The Effects of Perceived Functionality and Usability on Privacy and Security Concerns about Adopting Cloud Applications
(4255)
|
U
Understanding User Behavior on Pinterest: Findings and Insights
(4277)
|