Content
Undated
- 1-24 A Cross Industry Study of Institutional Pressures on Organizational Effort to Raise Information Security Awareness
by Hwee-Joo Kam & Thomas Mattson & Sanjay Goel - 1-24 Economic valuation for information security investment: a systematic literature review
by Daniel Schatz & Rabih Bashroush - 1-24 A cross-country model of contextual factors impacting cloud computing adoption at universities in sub-Saharan Africa
by Humphrey M. Sabi & Faith-Michael E. Uzoka & Kehbuma Langmia & Felix N. Njeh & Clive K. Tsuma - 1-24 Open data value capability architecture
by Fatemeh Ahmadi Zeleti & Adegboyega Ojo - 1-24 Borrower Learning Effects: Do Prior Experiences Promote Continuous Successes in Peer-to-Peer Lending?
by Qun Chen & Ji-Wen Li & Jian-Guo Liu & Jing-Ti Han & Yun Shi & Xun-Hua Guo - 1-24 The Effect of Electronic Word of Mouth Communications on Intention to Buy: A Meta-Analysis
by Elvira Ismagilova & Emma L. Slade & Nripendra P. Rana & Yogesh K. Dwivedi - 1-24 A viability theory for digital businesses: Exploring the evolutionary changes of revenue mechanisms to support managerial decisions
by Michaela Sprenger & Tobias Mettler & Robert Winter - 1-24 Examining the role of initial trust in user adoption of mobile payment services: an empirical investigation
by Lingling Gao & Kerem Aksel Waechter - 1-25 Quarry: A User-centered Big Data Integration Platform
by Petar Jovanovic & Sergi Nadal & Oscar Romero & Alberto Abelló & Besim Bilalli - 1-25 A model to analyze the challenge of using cyber insurance
by Tridib Bandyopadhyay & Vijay Mookerjee - 1-26 A structural-semantic web service selection approach to improve retrievability of web services
by Martin Garriga & Alan De Renzis & Ignacio Lizarralde & Andres Flores & Cristian Mateos & Alejandra Cechich & Alejandro Zunino - 1-27 Virtual Machine Placement with Disk Anti-colocation Constraints Using Variable Neighborhood Search Heuristic
by Ameni Hbaieb & Mahdi Khemakhem & Maher Ben Jemaa - 1-27 Normalization-Based Task Scheduling Algorithms for Heterogeneous Multi-Cloud Environment
by Sanjaya K. Panda & Prasanta K. Jana - 1-27 Enhancing service system design: An entity interaction pattern approach
by Soe-Tsyr Daphne Yuan & Shiou-Tian Hsu - 1-27 Scaling for agility: A reference model for hybrid traditional-agile software development methodologies
by Asif Qumer Gill & Brian Henderson-Sellers & Mahmood Niazi - 1-28 Evaluating Queries and Updates on Big XML Documents
by Nicole Bidoit & Dario Colazzo & Noor Malla & Carlo Sartiani - 1-28 Fostering distributed business logic in Open Collaborative Networks: an integrated approach based on semantic and swarm coordination
by Francesco P. Appio & Mario G. C. A. Cimino & Alessandro Lazzeri & Antonella Martini & Gigliola Vaglini - 1-29 Object-stack: An object-oriented approach for top-k keyword querying over fuzzy XML
by Ting Li & Zongmin Ma - 1-29 Business process flexibility - a systematic literature review with a software systems perspective
by Riccardo Cognini & Flavio Corradini & Stefania Gnesi & Andrea Polini & Barbara Re - 1-29 A Hybrid Genetic Algorithm for Software Architecture Re-Modularization
by Lifeng Mu & Vijayan Sugumaran & Fangyuan Wang - 1-40 Enterprise security investment through time when facing different types of vulnerabilities
by Yosra Miaoui & Noureddine Boudriga - 1-42 RecSys Issues Ontology: A Knowledge Classification of Issues for Recommender Systems Researchers
by Lawrence Bunnell & Kweku-Muata Osei-Bryson & Victoria Y. Yoon