3 3D Printing: The Future Crime of the Present (4274) |
A Achieving Effective Data Analytics: An Agile Framework (4269) |
| An Empirical Study on the Impact of Price Discount on Sales in Software-as-a-Service (SaaS) Market (4264) |
| An Interactive Toolbox for Twitter Content Analytics (4259) |
| Analysis of the Risks of NFC Mobile Payment Systems (4279) |
| Are Students Using Security Measures to Protect their Data when Downloading Mobile Applications? (4268) |
B Building Client Vendor Alignment Capability in Strategic Information Systems Outsourcing (4252) |
C Causes of cyberbullying in multi-player online gaming environments: Gamer perceptions (4258) |
| Crowdsourcing Surveys: Alternative Approaches to Survey Collection (4260) |
E E-commerce Adoption: A Revelatory Case Study in the German Oncology Pharmaceutical Supply Chain (4273) |
| Evidence of Wikipedia usage during the school year: A numerical study (4263) |
I Identifying the Critical Success Factors for Information Systems to Manage Sponsored Research Activities at Institutions of Higher Education (4272) |
M Malvertising – A Rising Threat To The Online Ecosystem (4266) |
O On Assessment of Risks in Offshore Outsourcing of Information Technology (4267) |
P Patient Healthcare Smart Card System: A Unified Medical Record for Access and Analytics (4275) |
| Principle Component Analysis for Feature Reduction and Data Preprocessing in Data Science (4257) |
| Proposal for Kelly Criterion-Inspired Lossy Network Compression for Network Intrusion Applications (4265) |
S Subjective norm and measuring its impact on information security behavioral intention in organizations. (4253) |
| Sentiment Analysis and Opinion Mining: Current State of the Art and Review of Google and Yahoo Search Engines’ Privacy Policies (4254) |
T The Effects of Perceived Functionality and Usability on Privacy and Security Concerns about Adopting Cloud Applications (4255) |
U Understanding User Behavior on Pinterest: Findings and Insights (4277) |