Modeling signal-based decisions in online search environments: A non-recursive forward-looking approach Fulltext Access 20 Pages 2016
Privileged contextual information for context-aware recommender systems Fulltext Access 20 Pages 2016
A multi-agent conversational system with heterogeneous data sources access Fulltext Access 20 Pages 2016
Velocity Bounded Boolean Particle Swarm Optimization for improved feature selection in liver and kidney disease diagnosis Fulltext Access 20 Pages 2016
SFEM: Structural feature extraction methodology for the detection of malicious office documents using machine learning methods Fulltext Access 20 Pages 2016
Complex log file synthesis for rapid sandbox-benchmarking of security- and computer network analysis tools Fulltext Access 21 Pages 2016
Property specification, process verification, and reporting – A case study with vehicle-commissioning processes Fulltext Access 21 Pages 2016
Assessing personal disposition of individuals towards technology adoption Fulltext Access 21 Pages 2016
Communication and control in outsourced IS development projects: Mapping to COBIT domains Fulltext Access 21 Pages 2016
Combining high frequency data with non-linear models for forecasting energy market volatility Fulltext Access 21 Pages 2016
Do context and personality matter? Trust and privacy concerns in disclosing private information online Fulltext Access 21 Pages 2016
Efficient task assignment for spatial crowdsourcing: A combinatorial fractional optimization approach with semi-bandit learning Fulltext Access 21 Pages 2016
Routine interdependencies as a source of stability and flexibility. A study of agile software development teams Fulltext Access 21 Pages 2016
Diagnosing behavioral differences between business process models: An approach based on event structures Fulltext Access 22 Pages 2016
Does mutuality matter? Examining the bilateral nature and effects of CEO–CIO mutual understanding Fulltext Access 23 Pages 2016
A general process mining framework for correlating, predicting and clustering dynamic behavior based on event logs Fulltext Access 23 Pages 2016
Leveraging spatial abstraction in traffic analysis and forecasting with visual analytics Fulltext Access 23 Pages 2016
Sticky costs in cost behavior of the largest companies in Brazil, Chile and Mexico Fulltext Access 23 Pages 2016
A rapid-prototyping framework for extracting small-scale incident-related information in microblogs: Application of multi-label classification on tweets Fulltext Access 23 Pages 2016
An adaptive HVS based video watermarking scheme for multiple watermarks using BAM neural networks and fuzzy inference system Fulltext Access 23 Pages 2016
Linked Open Models: Extending Linked Open Data with conceptual model information Fulltext Access 24 Pages 2016
IT outsourcing research from 1992 to 2013: A literature review based on main path analysis Fulltext Access 25 Pages 2016
Knowledge maps: A systematic literature review and directions for future research Fulltext Access 25 Pages 2016
A systematic review of knowledge sharing challenges and practices in global software development Fulltext Access 25 Pages 2016
An efficient cuckoo search algorithm based multilevel thresholding for segmentation of satellite images using different objective functions Fulltext Access 26 Pages 2016
Estimation of deficiency risk and prioritization of information security controls: A data-centric approach Fulltext Access 27 Pages 2016
Assessment of a credit scoring system for popular bank savings and credit Fulltext Access 27 Pages 2016
Is SAM still alive? A bibliometric and interpretive mapping of the strategic alignment research field Fulltext Access 29 Pages 2016
An agent based approach for the implementation of cooperative proactive S-Metaheuristics Fulltext Access 31 Pages 2016
Inteligencia de negocios: estrategia para el desarrollo de competitividad en empresas de base tecnológica Fulltext Access 32 Pages 2016
Combining unit and specification-based testing for meta-model validation and verification Fulltext Access 32 Pages 2016
Global financial crisis, ownership and bank profit efficiency in the Bangladesh's state owned and private commercial banks Fulltext Access 41 Pages 2016
Cloud computing procurement and implementation: Lessons learnt from a United Kingdom case study Fulltext Access 5 Pages 2015
Citizenship, trust, and behavioural intentions to use public e-services: The case of Lebanon Fulltext Access 6 Pages 2015
Case analysis of imitative innovation in Chinese manufacturing SMEs: Products, features, barriers and competences for transition Fulltext Access 6 Pages 2015
Measuring scholarly use of government information: An altmetrics analysis of federal statistics Fulltext Access 7 Pages 2015
Identifying management factors for digital incident responses on Machine-to-Machine services Fulltext Access 7 Pages 2015
Information culture and its influences in knowledge creation: Evidence from university teams engaged in collaborative innovation projects Fulltext Access 7 Pages 2015
Gold price volatility: A forecasting approach using the Artificial Neural Network–GARCH model Fulltext Access 7 Pages 2015
Government data does not mean data governance: Lessons learned from a public sector application audit Fulltext Access 7 Pages 2015
Compliance of Section 508 in public library systems with the largest percentage of underserved populations Fulltext Access 7 Pages 2015
Investigating evidence of mobile phone usage by drivers in road traffic accidents Fulltext Access 8 Pages 2015
Covert communication by means of email spam: A challenge for digital investigation Fulltext Access 8 Pages 2015
Public libraries and residential broadband adoption: Do more computers lead to higher rates? Fulltext Access 8 Pages 2015
Electronic surveillance on Social Networking Sites. A critical case study of the usage of SNSs by students in Sassari, Italy Fulltext Access 8 Pages 2015
The effects of reasoned shared decision-making on consultation outcomes: Results of a randomized controlled experiment among a student population Fulltext Access 8 Pages 2015
Is ICT a new essential for national economic growth in an information society? Fulltext Access 8 Pages 2015
How much does broadband infrastructure matter? Decomposing the metro–non-metro adoption gap with the help of the National Broadband Map Fulltext Access 9 Pages 2015
Political efficacy, community collective efficacy, trust and extroversion in the information society: Differences between online and offline civic/political activities Fulltext Access 9 Pages 2015
Political determinants of e-government performance revisited: Comparing democracies and autocracies Fulltext Access 9 Pages 2015
Local engagement online: Municipal Facebook pages as hubs of interaction Fulltext Access 9 Pages 2015
A sentiment analysis of U.S. local government tweets: The connection between tone and citizen involvement Fulltext Access 9 Pages 2015
A metatheory of e-government: Creating some order in a fragmented research field Fulltext Access 9 Pages 2015
Willingness to communicate about politics (WTCAP): A novel measure of interpersonal political discussion Fulltext Access 9 Pages 2015
Quality press and voter turnout: Evidence for causal effects and its underlying mechanisms Fulltext Access 9 Pages 2015
Adopting open source software in public administration: The importance of boundary spanners and political commitment Fulltext Access 9 Pages 2015
EXPRS: An extended pagerank method for product feature extraction from online consumer reviews Fulltext Access 9 Pages 2015
Leveraging CybOX™ to standardize representation and exchange of digital forensic information Fulltext Access 9 Pages 2015
A note on an architecture for integrating cloud computing and enterprise systems using REA Fulltext Access 9 Pages 2015
Determinants of multi-service smartcard success for smart cities development: A study based on citizens’ privacy and security perceptions Fulltext Access 10 Pages 2015
Why users contribute knowledge to online communities: An empirical study of an online social Q&A community Fulltext Access 10 Pages 2015
An empirical analysis of users’ privacy disclosure behaviors on social network sites Fulltext Access 10 Pages 2015
The impact of interactivity of electronic word of mouth systems and E-Quality on decision support in the context of the e-marketplace Fulltext Access 10 Pages 2015
Designing robustness and resilience in digital investigation laboratories Fulltext Access 10 Pages 2015
Redenschreiber in Schweizer Organisationen: Tätigkeiten, Rollen und Entwicklungen Fulltext Access 10 Pages 2015
Citizen's adoption of an e-government system: Validating extended social cognitive theory (SCT) Fulltext Access 10 Pages 2015
‘Cyber Gurus’: A rhetorical analysis of the language of cybersecurity specialists and the implications for security policy and critical infrastructure protection Fulltext Access 10 Pages 2015
Technology as we do not know it: The extended practice of global software development Fulltext Access 10 Pages 2015
Macroeconomic factors and foreign portfolio investment volatility: A case of South Asian countries Fulltext Access 10 Pages 2015
A typology of hackers: Classifying cyber malfeasance using a weighted arc circumplex model Fulltext Access 10 Pages 2015
An analysis of open government portals: A perspective of transparency for accountability Fulltext Access 10 Pages 2015
Hviz: HTTP(S) traffic aggregation and visualization for network forensics Fulltext Access 11 Pages 2015
Descrambling data on solid-state disks by reverse-engineering the firmware Fulltext Access 11 Pages 2015
Adaptive photo-response non-uniformity noise removal against image source attribution Fulltext Access 11 Pages 2015