Collection's Items (Sorted by Submit Date in Descending order): 61 to 110 of 323
Issue Date | Title | Author(s) |
2017 | Impact of access control and copyright in e-learning from user’s perspective in the United Kingdom | Akmayeva, Galina |
2018 | Technology-assisted healthcare: exploring the use of mobile 3D visualisation technology to augment home-based fall prevention assessments | Hamm, Julian J. |
2018 | Enhancing the human sensemaking process with the use of social network analysis and machine learning techniques | Marshan, Alaa |
2018 | Exploring the emergence of collaborative practices in globally distributed agile software development | Modi, Sunila |
2017 | An actor-network approach to understanding the Implementation of mobile phone-based innovations in less developed countries | Ezenwa, Chioma |
2018 | Investigating social media strategy in organisations: implementation and platform evaluation | Ogbuji, Bibian Onyinye |
2018 | Examining the role of mindfulness in mitigating technostress and its negative consequences | Ioannou, Athina |
2017 | A methodology for developing scientific software applications in science gateways: towards the easy accessibility and availability of scientific applications | Fabiyi, Adedeji Oyekanmi |
2017 | Segmentation and lesion detection in dermoscopic images | Eltayef, Khalid Ahmad A |
2017 | Enhancing student learning journeys with semantically annotated content | Dawod, Zainb |
2017 | Collaborative cyber security situational awareness | Almualla, Mohammed Humaid |
2017 | A malware threat avoidance model for online social network users | Ikhalia, Ehinome |
2018 | An empirical study on object-oriented software dependencies: logical, structural and semantic | Ajienka, Nemitari Miebaka |
2017 | A strategic approach of value identification for a big data project | Lakoju, Mike |
2018 | A mixed-method approach to investigate individual behaviour in online health communities | Tenuche, Bashir Sezuo |
2014 | The impact of communication on trust in agile methods | Hasnian, Eisha |
2017 | The interlocutory tool box: techniques for curtailing coincidental correctness | Patel, Krishna |
2016 | B2B network analysis and communities-based recommender systems for the B2B electronic marketplace | Mohamad, Abdul Hadi |
2017 | Investigation into the change management influences on user adoption of ERP systems | Tejumola, Olubusola |
2016 | Workflow framework for cloud-based distributed simulation | Chaudhry, Nauman Riaz |
2017 | An architectural framework for assessing quality of experience of web applications | Radwan, Omar Amer |
2017 | A method to disseminate and communicate IS research outputs beyond academia | Alwzinani, Faris |
2016 | The role of age and illness in the adoption of tele-health | Onyeachu, Precious |
2017 | A text-mining based approach to capturing the NHS patient experience | Bahja, Mohammed |
2013 | Factors determining e-government security | Razzaqi, Hasan Ali |
2016 | Investigating the naturalistic decision making role of business intelligence in the oil and gas industry | Swedi, Ahmed N |
2017 | Factors influencing social media adoption in small and medium enterprises (SMEs) | AL Rahbi, Hafedh Said Abdullah |
2016 | Investigation of the design of personal avatars in online shopping for effective virtual try-on applications | Blum, Rainer |
2016 | Meso-level co- innovation dynamic roadmapping for managing systemic innovations | Kamtsiou, Evanthia |
2017 | Designing a human-centred, mobile interface to support real-time flood forecasting and warning system | Alsabhan, Waleed |
2016 | Exploring gene expression and protein binding data for gene regulation | Ferdous, Mohsina Mahmuda |
2014 | Mobile digital library acceptance | Al-Faresi, Sumayyah Hassan |
2015 | Marketing Strategies and National Culture: an empirical investigation of customers’ acceptance of the online banking channel in the context of Saudi national culture | Altwaijri, Ahmad Saleh |
2015 | A Simulation-based Methodology for the Assessment of Server-based Security Architectures for Mobile Ad Hoc Networks (MANETs) | Darwish, Salaheddin |
2015 | Symbolic and practical facets in the use and production of home medical technology: the example of blood pressure monitoring | Vasileiou, Konstantina |
2015 | Good practice framework for virtual learning environment in higher education | Bin Fryan, Latefa |
2015 | Factors affecting mobile commerce acceptance in developing countries: Saudi Arabia | AbdulMohsin Sulaiman, Alkhunaizan |
2015 | The Markov multi-phase transferable belief model: A data fusion theory for enhancing cyber situational awareness | Ioannou, Georgios |
2016 | Future developments and trends in use of picture archiving and communication systems | Alhajeri, Mona |
2015 | Mobile challenges and opportunities for e-government in Saudi Arabia | Alssbaiheen, Anan |
2016 | Improving the quality of bug data in software repositories | Auwal, Bilyaminu Romo |
2015 | Adoption of online recruitment systems in Banks in Saudi Arabia: A study of employer's perspectives. | Bajri, Omar |
2016 | Level set segmentation of retinal structures | Wang, Chuang |
2016 | Applying computer-assisted assessment to auto-generating feedback on project proposals | Al-Yazeedi, Fatema |
2014 | Active offensive cyber situational awareness: theory and practice | Al-Shamisi, Ahmed |
2016 | Machine-learning approaches for modelling fish population dynamics | Trifonova, Neda |
2016 | Entanglements in the E-service of land record in Bangladesh: an action design ethnographic study | Alam, Muhammad Shahanoor |
2016 | Influences on e-WOM adoption in two female online communities: the cases of Kuwait and Saudi Arabia | Al-Haidari, Nahed |
2016 | A data-driven framework for investigating customer retention | Mgbemena, Chidozie Simon |
2015 | Investigating the usability of software systems for music production and distribution | McGrath, Sean Anthony |
Collection's Items (Sorted by Submit Date in Descending order): 61 to 110 of 323