بحث بسيط
السجلات المعروضة 1 -- 10 من 21
Security behaviors of smartphone users
(
Emerald Group Publishing Ltd.
, 2016 , Article)
Purpose: - This paper aims to report on the information security behaviors of smartphone users in an affuent economy of the Middle East. Design/methodology/approach: - A model based on prior research, synthesized from a ...
Change management guidelines that address barriers to technology adoption in an hei context
(
Institute of Electrical and Electronics Engineers Inc.
, 2017 , Conference Paper)
The literature reviewed, has suggested that Technology Enhanced Learning and the related domains of education, technology and business interact in a complex and contextual manner as a new emerging episteme. This is one ...
Ability and Hurdle to Provide Banking Online Services: A Case Study of Banking Employees in Nigeria
(
Institute of Electrical and Electronics Engineers Inc.
, 2016 , Conference Paper)
Identifying the employee version regarding the necessities of customers and the status of the technological initiatives is one of the latest strategies of the online banking companies. As many of the studies are limited ...
Possible effects of emoticon and emoji on sentiment analysis web services of work organisations
(
Inderscience Enterprises Ltd.
, 2019 , Conference Paper)
Work organisations are increasingly interested in using sentiment analysis algorithms to get rapid feedback from microblogging platforms such as Twitter. However, real-life posts can differ from the training data. The ...
Effectiveness of social media sentiment analysis tools with the support of emoticon/emoji
(2019 , Conference Paper)
Organizations are increasingly interested in using microblogging platforms, such as Twitter, to get rapid feedback in several domains using sentiment analysis algorithms to rate, for example, whether a target audience is ...
Violators versus non-violators of information security measures in organizations-A study of distinguishing factors
(
Taylor and Francis Inc.
, 2019 , Article)
The present study analyzes the elements that differentiate violators from non-violators of information security measures. Various elements are derived from established theories and models such as general deterrence theory, ...
Status of Internet Addiction among College Students in South Korea.
(
Australian Business & Education Research Association
, 2017 , Article)
Purpose: The purpose of this paper is to examine the status of internet Addiction among college students of South Korea. Design/method/approach: Data was collected from 426 Korean university students using a modified survey ...
Factors influence consumers' adoption of mobile payment devices in Qatar
(
Inderscience
, 2015 , Article)
This research examines the factors that influence the customers' intention in adapting Mobile Payment Device (MPD) technology in an emerging economy (Qatar). Unified Theory of Acceptance and Use of Technology Model (UTAUT) ...
Are enterprises ready for big data analytics? A survey-based approach
(
Inderscience Publishers
, 2017 , Article)
Big data analytics is a fascinating topic in the field of computer science and information systems as it challenges fundamental aspects of computation. The aim of this study is to investigate the acceptance and usage of ...
A Comparison of change management guidelines to address technology adoption barriers: A case study of higher educational institutions
(
Little Lion Scientific
, 2019 , Article)
Emerging technologies are bolstering the development in the world in all the domains of the world. Education sector is an example of such innovation, by basing on which new means of pedagogy and andragogy are being explored ...