default search action
International Journal of Electronic Business, Volume 15
Volume 15, Number 1, 2019
- Alex Zarifis, Xusen Cheng, Julia Kroenung:
Collaborative consumption for low and high trust requiring business models: from fare sharing to supporting the elderly and people with disability. 1-20 - Teresa Fernandes, João Guerra:
Drivers and deterrents of music streaming services purchase intention. 21-42 - Marc-Julian Thomas, Bernd W. Wirtz, Jan C. Weyerer:
Influencing factors of online reviews: an empirical analysis of determinants of purchase intention. 43-71 - Parag Uma Kosalge, Suzanne Crampton, Ashok Kumar:
Blogs: are they headed downwards in social networking? An empirical analysis. 72-91
Volume 15, Number 2, 2020
- Rand H. Al-Dmour, Zaid Mohammad Obeidat:
The drivers of user responses to social media campaigns: a field study. 93-108 - Imtiaz Arif, Wajeeha Aslam, Hira Siddiqui:
Influence of brand related user-generated content through Facebook on consumer behaviour: a stimulus-organism-response framework. 109-132 - Olivia Fachrunnisa, Farookh Khadeer Hussain:
A methodology for creating sustainable communities based on dynamic factors in virtual environments. 133-159 - Rajat Gera, Priyanka Chadha, Vandana Ahuja:
Mobile app usage and adoption: a literature review. 160-195
Volume 15, Number 3, 2020
- Mohammad Reza Keyvanpour, Mehrnoush Barani Shirzad, Maryam Ghaderi:
AD-C: a new node anomaly detection based on community detection in social networks. 199-222 - T. Satyanarayana Murthy, N. P. Gopalan, T. R. Athira:
Hiding critical transactions using a modified un-realisation approach. 223-234 - Ashalatha. R, Jayashree Agarkhed, Siddarama R. Patil:
Providing a public auditing cryptographic approach in cloud computing. 235-248 - Nadya el Moussaid, Maryam el Azhari:
Enhance the security properties and information flow control. 249-274 - Harshad Suryakant Wadkar, Arun Mishra:
Hardening web browser security configuration using machine learning technique. 275-295
Volume 15, Number 4, 2020
- Reijo M. Savola, Markku Kylänpää, Habtamu Abie:
Risk-driven security metrics for an Android smartphone application. 297-324 - Da-Yu Kao, Shou-Ching Hsiao, Raylin Tso:
Intelligence-led response: turning theory into law enforcement practice in cyber security incidents. 325-350 - Huanhuan Wang, Long Yu, Shengwei Tian, Shiqi Luo, Xin-jun Pei:
Malicious webpages analysis and detection algorithm based on BiLSTM. 351-367 - Mohammad Moradi, Mohammad Reza Keyvanpour:
A novel CAPTCHA scheme based on facial expression reconstruction. 368-388 - Hadi Ezaldeen, Rachita Misra, Rawaa Alatrash, Rojalina Priyadarshini:
Semantically enhanced machine learning approach to recommend e-learning content. 389-413
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.