Browsing Accounting & Information Systems by Title
Now showing items 311-330 of 486
-
Metaverse Security: Issues, Challenges and a Viable ZTA Model
( Multidisciplinary Digital Publishing Institute (MDPI) , 2023 , Article)The metaverse is touted as an exciting new technology amalgamation facilitating next-level immersive experiences for users. However, initial experiences indicate that a host of privacy, security and control issues will ... -
Mobile Commerce Adoption From Consumers Perspective: The Case of Jordan
( IGI Global , 2018 , Article)In response, to little research focused on how Jordanians perceive and respond to m-commerce and the main factors that govern its adoption and use, this article proposes a conceptual model that extends the technology ... -
Mobile government adoption: Citizen-centric approach
( Association for Information Systems , 2018 , Conference Paper)Despite government attempts to increase citizens' interaction with e-government services provided through governmental websites, to guarantee a high level of involvement by citizens in government services, more governmental ... -
Mobile government services and resident satisfaction: Evaluation of Kahramaa mobile services
( IGI Global , 2019 , Article)The success of any mobile service depends on the perceived efficiency and effectiveness of using the service. This research article attempts to evaluate the factors influencing the effectiveness and efficiency of the ... -
Mobile-phone users’ attitudes towards’ mobile commerce & services in the Gulf Cooperation Council countries: Case study
( IEEE , 2008 , Conference Paper)As the number of mobile phone users is growing, purchasing products and services using mobile phones and other mobile devices are also increasing. The purpose of this study was to provide the status of mobile-commerce in ... -
Modelling Features-Based Birthmarks for Security of End-to-End Communication System
( Hindawi , 2020 , Article)Feature-based software birthmark is an essential property of software that can be used for the detection of software theft and many other purposes like to assess the security in end-to-end communication systems. Research ... -
The moderating effect of individual differences on the acceptance and use of internet banking: A developing country perspective
( IGI Global , 2020 , Article)This research examines factors influencing the acceptance of internet banking (IB) in Lebanon. It extends the unified theory of acceptance and use of technology (UTAUT) model by including trust as a proxy and then investigates ... -
Motivations for using social media: comparative study based on cultural differences between American and Jordanian students
( Inderscience , 2017 , Article)Social network sites (SNSs) have gained popularity over the last decade. Students use SNSs according to their personal differences, which are influenced by cultural and demographic factors. This paper proposed a model that ... -
Muslim CEO, Women on Boards and Corporate Responsibility Reporting: Some Evidence from Malaysia
( Emerald , 2019 , Article)Purpose: Very limited research has been devoted to answering the question of whether the religious beliefs of the upper echelons of management and gender diversity have any impacts on the communication of corporate social ... -
New development: Enabling enterprise risk management maturity in public sector organizations
( Taylor & Francis , 2020 , Article)Public sector reforms have led to risk management gaining prominence as a means for effective service delivery and a tool for accountability. The public sector has seen regulatory changes intended to empower managers to ... -
New development: Enabling enterprise risk management maturity in public sector organizations
( Taylor & Francis , 2020 , Article)Public sector reforms have led to risk management gaining prominence as a means for effective service delivery and a tool for accountability. The public sector has seen regulatory changes intended to empower managers to ... -
A Novel Deep Learning and Ensemble Learning Mechanism for Delta-Type COVID-19 Detection
( Frontiers , 2022 , Article)Recently, the novel coronavirus disease 2019 (COVID-19) has posed many challenges to the research community by presenting grievous severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2) that results in a huge number ... -
A novel proof of useful work for a blockchain storing transportation transactions
( Elsevier , 2022 , Article)Proof-of-Work (PoW) is a common mechanism used to validate peer-to-peer transactions and maintain highly secured immutability of the blockchain. However, this mechanism has been criticized due to its inefficient use of ... -
A Novel Steganography Technique for Digital Images Using the Least Significant Bit Substitution Method
( Institute of Electrical and Electronics Engineers Inc. (IEEE) , 2022 , Article)Communication has become a lot easier in this era of technology, development of high-speed computer networks, and the inexpensive uses of Internet. Therefore, data transmission has become vulnerable to and unsafe from ... -
Offline Pashto Characters Dataset for OCR Systems
( Hindawi , 2021 , Article)In computer vision and artificial intelligence, text recognition and analysis based on images play a key role in the text retrieving process. Enabling a machine learning technique to recognize handwritten characters of a ... -
Online banking: A comparative study of Chinese and Saudi customers perceptions of service quality
( ARRAY Development (Canada) Inc. , 2016 , Article)Level of service quality (SQ) provided by an organization creates and develops company competitive advantage for it in the market place. The increasing technological service facilitators (e-services) create a new platform ... -
An optimized algorithm for optimal power flow based on deep learning
( Elsevier , 2021 , Article)With the increasing requirements for power system transient stability assessment, the research on power system transient stability assessment theory and methods requires not only qualitative conclusions about system transient ... -
An Optimized Feature Selection Technique in Diversified Natural Scene Text for Classification Using Genetic Algorithm
( IEEE , 2021 , Article)Natural scene text classification is considered to be a challenging task because of diversified set of image contents, presence of degradations including noise, low contrast/resolution and the random appearance of foreground ... -
Organizing ERP research: a knowledge-centric approach
( Emerald Group Publishing Ltd. , 2016 , Article)Purpose: The purpose of this paper is to gain insight into enterprise resource planning (ERP) research by framing ERP intellectual contributions using a knowledge-centric taxonomy that was originally proposed as an organizing ... -
Ownership Structure and Firm Performance in the Middle East: A Meta-Analysis
( MDPI , 2021 , Article)This paper applies a meta-analysis method to investigate the moderating impact of political stability on the relationship between ownership identities and firm performance in the Middle Eastern countries (i.e., the Arab ...