


Остановите войну!
for scientists:


default search action
Journal of Organizational and End User Computing, Volume 32
Volume 32, Number 1, 2020
- Camille Grange, Henri Barki:
The Nature and Role of User Beliefs Regarding a Website's Design Quality. 75-96
Volume 32, Number 2, 2020
- Stoney L. Brooks, Xuequn Wang
, Christoph Schneider:
Technology Addictions and Technostress: An Examination of the U.S. and China. 1-19 - Dong Hwan Cho:
A Contingent Approach to Facilitating Conflict Resolution in Software Development Outsourcing Projects. 20-41 - Mahmoud Zaher, Abdulaziz Shehab
, Mohamed Elhoseny
, Farahat Farag Farahat:
Unsupervised Model for Detecting Plagiarism in Internet-based Handwritten Arabic Documents. 42-66 - Muhammad Sharif, Muhammad Attique Khan, Muhammad Zeeshan Tahir, Mussarat Yasmin, Tanzila Saba
, Urcun John Tanik:
A Machine Learning Method with Threshold Based Parallel Feature Fusion and Feature Selection for Automated Gait Recognition. 67-92 - Sheng-Feng Sung, Pei-Ju Lee, Cheng-Yang Hsieh
, Wan-Lun Zheng:
Medication Use and the Risk of Newly Diagnosed Diabetes in Patients with Epilepsy: A Data Mining Application on a Healthcare Database. 93-108
Volume 32, Number 3, 2020
- Ramu Naresh, Pandi Vijayakumar, Lazarus Jegatha Deborah
, Sivakumar Radhakrishnan:
A Novel Trust Model for Secure Group Communication in Distributed Computing. 1-14 - Sukhpal Singh Gill
, Arash Shaghaghi:
Security-Aware Autonomic Allocation of Cloud Resources: A Model, Research Trends, and Future Directions. 15-22 - Kanniga Devi Rangaswamy, Murugaboopathi Gurusamy, Vijayakumar P.:
An Efficient Cloud Data Center Allocation to the Source of Requests. 23-36 - Ziwei Ye, Yuanbo Guo, Ankang Ju
, Fushan Wei, Ruijie Zhang, Jun Ma:
A Risk Analysis Framework for Social Engineering Attack Based on User Profiling. 37-49 - Ahmad Karim, Victor Chang
, Ahmad Firdaus:
Android Botnets: A Proof-of-Concept Using Hybrid Analysis Approach. 50-67
Volume 32, Number 4, 2020
- Shwu-Min Horng
:
How Does Social Identification Moderate the Repurchase Intention?: From the Perspect of OGB. 1-25 - Silas Formunyuy Verkijika:
Assessing the Role of Simplicity in the Continuous Use of Mobile Apps. 26-42 - Xuan Wang
, Helmut Schneider, Kenneth R. Walsh:
A Predictive Analytics Approach to Building a Decision Support System for Improving Graduation Rates at a Four-Year College. 43-62 - John R. Drake
, Christopher P. Furner
:
Screening Job Candidates With Social Media: A Manipulation of Disclosure Requests. 63-84 - Brij B. Gupta, Pooja Chaudhary
, Shashank Gupta
:
Designing a XSS Defensive Framework for Web Servers Deployed in the Existing Smart City Infrastructure. 85-111 - Mamta, Brij B. Gupta:
Secure Fine-Grained Keyword Search With Efficient User Revocation and Traitor Tracing in the Cloud. 112-137 - Xiaofeng Chen, Keng Siau
:
Business Analytics/Business Intelligence and IT Infrastructure: Impact on Organizational Agility. 138-161 - Ming Chen
, Yidan Huang, Shih-Heng Yu, Chia-Huei Wu
:
Lucky Reply Effect: How a Company's Online Replies to Consumers' Online Comments Affect Consumers' Predictions of Randomly Determined Associated Rewards. 162-174

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.