An improved SAO network-based method for technology trend analysis: A case study of graphene Fulltext Access 16 Pages 2018
Bi-directional h-index: A new measure of node centrality in weighted and directed networks Fulltext Access 16 Pages 2018
Race to the top: Does competition in the DSL market matter for fibre penetration? Fulltext Access 16 Pages 2018
Author-level metrics in the new academic profile platforms: The online behaviour of the Bibliometrics community Fulltext Access 16 Pages 2018
A robust HDR images watermarking method using artificial bee colony algorithm Fulltext Access 16 Pages 2018
Content analysis of e-petitions with topic modeling: How to train and evaluate LDA models? Fulltext Access 16 Pages 2018
ICT mediated rumor beliefs and resulting user actions during a community crisis Fulltext Access 16 Pages 2018
The cost, coverage and rollout implications of 5G infrastructure in Britain Fulltext Access 17 Pages 2018
Understanding crowdsourcing projects: A systematic review of tendencies, workflow, and quality management Fulltext Access 17 Pages 2018
DRI-RCNN: An approach to deceptive review identification using recurrent convolutional neural network Fulltext Access 17 Pages 2018
Secure authentication scheme to thwart RT MITM, CR MITM and malicious browser extension based phishing attacks Fulltext Access 17 Pages 2018
SQL Injection Attack classification through the feature extraction of SQL query strings using a Gap-Weighted String Subsequence Kernel Fulltext Access 18 Pages 2018
A study on the deployment of high-speed broadband networks in NUTS3 regions within the framework of digital agenda for Europe Fulltext Access 18 Pages 2018
IT-enabled awareness and self-directed leadership behaviors in virtual teams Fulltext Access 18 Pages 2018
Google Scholar, Web of Science, and Scopus: A systematic comparison of citations in 252 subject categories Fulltext Access 18 Pages 2018
Does deep learning help topic extraction? A kernel k-means clustering method with word embedding Fulltext Access 19 Pages 2018
Measuring the inefficiency of Chinese research universities based on a two-stage network DEA model Fulltext Access 21 Pages 2018
Querytogether: Enabling entity-centric exploration in multi-device collaborative search Fulltext Access 21 Pages 2018
Verbosity normalized pseudo-relevance feedback in information retrieval Fulltext Access 21 Pages 2018
Assessing R&D efficiency using a two-stage dynamic DEA model: A case study of research institutes in the Chinese Academy of Sciences Fulltext Access 22 Pages 2018
Evidence of open access of scientific publications in Google Scholar: A large-scale analysis Fulltext Access 23 Pages 2018
CLAIRE: A combinatorial visual analytics system for information retrieval evaluation Fulltext Access 24 Pages 2018
Leadership with 5G in Europe: Two contrasting images of the future, with policy and regulatory implications Fulltext Access 25 Pages 2018
PERSON: Personalized information retrieval evaluation based on citation networks Fulltext Access 27 Pages 2018
The influence of gender, and race/ethnicity on advancement in information technology (IT) Fulltext Access 36 Pages 2018
When social scientists disagree: Comments on the Butler-van den Besselaar debate Fulltext Access 4 Pages 2017
RF fingerprint extraction for GNSS anti-spoofing using axial integrated Wigner bispectrum Fulltext Access 4 Pages 2017
Erratum to “Editorial: Optimising Spectrum Use” [Telecommunications Policy 41 (5-6) (2017) iii-vi] Fulltext Access 4 Pages 2017
Editorial - patent information, Intellectual Property (IP) management and information retrieval Fulltext Access 4 Pages 2017
On tit for tat: Franceschini and Maisano versus ANVUR regarding the Italian research assessment exercise VQR 2011-2014 Fulltext Access 5 Pages 2017
Creating value through IT-enabled integration in public organizations: A case study of a prefectural Chinese Center for Disease Control and Prevention Fulltext Access 6 Pages 2017
Nurturing a FinTech ecosystem: The case of a youth microloan startup in China Fulltext Access 6 Pages 2017
Development and Validation of the Metacognitive Strategies for Library Research Skills Scale (MS-LRSS) Fulltext Access 6 Pages 2017
Comment on “Using multi-level frontiers in DEA models to grade countries/territories” by G.-l. Yang et al. [Journal of Informetrics 10(1) (2016), 238-253] Fulltext Access 6 Pages 2017
Designing the 7D patent management maturity model - A capability based approach Fulltext Access 7 Pages 2017
A literature analysis of the use of Absorptive Capacity construct in IS research Fulltext Access 7 Pages 2017
On the implementation of open government information in Xuhui District, Shanghai Fulltext Access 7 Pages 2017
Lightweight adaptive Random-Forest for IoT rule generation and execution Fulltext Access 7 Pages 2017
Utilizing an interpersonal communication framework to understand information behaviors involved in HIV disclosure Fulltext Access 7 Pages 2017
Design and analysis of pairing protocol for bluetooth enabled devices using R-LWE Lattice-based cryptography Fulltext Access 7 Pages 2017
MTL 2.0: A Report on the Social Media Usage and User Engagement of the “Big Four” Academic Libraries in Montréal Fulltext Access 8 Pages 2017
What factors drive open innovation in China's public sector? A case study of official document exchange via microblogging (ODEM) in Haining Fulltext Access 8 Pages 2017
Antecedents of student MOOC revisit intention: Moderation effect of course difficulty Fulltext Access 8 Pages 2017
Understanding User-Librarian Interaction Types in Academic Library Microblogging: A Comparison Study in Twitter and Weibo Fulltext Access 8 Pages 2017
Citation success index â An intuitive pair-wise journal comparison metric Fulltext Access 9 Pages 2017
Secure pseudonymisation for privacy-preserving probabilistic record linkage Fulltext Access 9 Pages 2017
An IoT notion-based authentication and key agreement scheme ensuring user anonymity for heterogeneous ad hoc wireless sensor networks Fulltext Access 9 Pages 2017
Policy Management Engine (PME): A policy-based schema to classify and manage sensitive data in cloud storages Fulltext Access 9 Pages 2017
Patent data mining in fisheries sector: An analysis using Questel-Orbit and Espacenet Fulltext Access 9 Pages 2017
Slowcomm: Design, development and performance evaluation of a new slow DoS attack Fulltext Access 9 Pages 2017
A content service deployment plan for metaverse museum exhibitions-Centering on the combination of beacons and HMDs Fulltext Access 9 Pages 2017
The supply side of IP management: Understanding firms' choices regarding IP intermediaries Fulltext Access 9 Pages 2017
Patent landscape: Technology development behind science in the flavor and fragrances (F&F) area Fulltext Access 9 Pages 2017
Intellectual property and trademark legal framework in BRICS countries: A comparative study Fulltext Access 9 Pages 2017
Who is the 'Journal Grand Master'? A new ranking based on the Elo rating system Fulltext Access 10 Pages 2017
A pragmatic approach to managing enterprise IT infrastructures in the era of consumerization and individualization of IT Fulltext Access 10 Pages 2017
TACTICS: Validation of the security framework developed for tactical SOA Fulltext Access 10 Pages 2017
An efficient provably-secure identity-based authentication scheme using bilinear pairings for Ad hoc network Fulltext Access 10 Pages 2017
When technological superiority is not enough: The struggle to impose the SIM card as the NFC Secure Element for mobile payment platforms Fulltext Access 10 Pages 2017
The effects of successful ICT-based smart city services: From citizens' perspectives Fulltext Access 10 Pages 2017
The role of competition and regulation in stimulating innovation - Telecommunications Fulltext Access 11 Pages 2017
On the integration of model-based feature information in Product Lifecycle Management systems Fulltext Access 11 Pages 2017
Service quality explains why people use freemium services but not if they go premium: An empirical study in free-to-play games Fulltext Access 11 Pages 2017
A SEM-neural network approach for predicting antecedents of m-commerce acceptance Fulltext Access 11 Pages 2017
Towards quantification and evaluation of security of Cloud Service Providers Fulltext Access 11 Pages 2017
Blockchain's roles in strengthening cybersecurity and protecting privacy Fulltext Access 12 Pages 2017
How and what to study about IoT: Research trends and future directions from the perspective of social science Fulltext Access 12 Pages 2017
Estimating willingness-to-pay for broadband attributes among low-income consumers: Results from two FCC lifeline pilot projects Fulltext Access 12 Pages 2017
Suitability of Google Scholar as a source of scientific information and as a source of data for scientific evaluation-Review of the Literature Fulltext Access 12 Pages 2017
Next generation of radio spectrum management: Licensed shared access for 5G Fulltext Access 12 Pages 2017
SecureNoSQL: An approach for secure search of encrypted NoSQL databases in the public cloud Fulltext Access 12 Pages 2017
Can the journal impact factor be used as a criterion for the selection of junior researchers? A large-scale empirical study based on ResearcherID data Fulltext Access 12 Pages 2017
Robust optimal position detection scheme for relational database watermarking through HOLPSOFA algorithm Fulltext Access 12 Pages 2017
CBR-based negotiation RBAC model for enhancing ubiquitous resources management Fulltext Access 12 Pages 2017
Factors influencing adoption of mobile banking by Jordanian bank customers: Extending UTAUT2 with trust Fulltext Access 12 Pages 2017