default search action
International Journal of Technology and Human Interaction, Volume 12
Volume 12, Number 1, 2016
- Karim Mezghani, Faouzi Ayadi:
Factors Explaining IS Managers Attitudes toward Cloud Computing Adoption. 1-20 - Ardion Beldad:
Sealing One's Online Wall Off From Outsiders: Determinants of the Use of Facebook's Privacy Settings among Young Dutch Users. 21-34 - Liliana Vale Costa, Ana Isabel Veloso:
Factors Influencing the Adoption of Video Games in Late Adulthood: A Survey of Older Adult Gamers. 35-50 - Min-Ling Hung:
Online Learning Readiness: Its Relations to College Students' Changes over Time, and Willingness to Enroll in Future Courses. 51-62 - Olfa Bouzaabia, Rym Bouzaabia, Alexandru Capatina:
Determinants of Internet Use by Senior Generation: A Cross Cultural Study. 63-82 - Jessica Lichy, Maher Kachour:
Understanding How Students Interact With Technology For Knowledge-Sharing: The Emergence of a New 'Social' Divide in France. 83-104
Volume 12, Number 2, 2016
- Yiqun Liu, Xiaorui Wang, Jianqi Zhang, Minqing Zhang, Peng Luo, Xu An Wang:
An Improved Security 3D Watermarking Method Using Computational Integral Imaging Cryptosystem. 1-21 - Hong-Mei Huang, Lu-Ping Xu:
Design and Analysis of the Secure Scheme for Quantum Positioning based on Entangled Photon Pair. 22-35 - Xiuguang Li, Yuanyuan He, Ben Niu, Kai Yang, Hui Li:
An Exact and Efficient Privacy-Preserving Spatiotemporal Matching in Mobile Social Networks. 36-47 - Kai Yang, Shuguang Liu, Xiuguang Li, Xu An Wang:
D-S Evidence Theory Based Trust Detection Scheme in Wireless Sensor Networks. 48-59 - Yuechuan Wei, Yisheng Rong, Xu An Wang:
Security Analysis of Cipher ICEBERG against Bit-pattern Based Integral Attack. 60-71 - Wei Zhang:
A Pairing-based Homomorphic Encryption Scheme for Multi-User Settings. 72-82 - Jialin Ma, Yongjun Zhang, Zhijian Wang, Kun Yu:
A Message Topic Model for Multi-Grain SMS Spam Filtering. 83-95
Volume 12, Number 3, 2016
- Pratyush Banerjee:
Attracting Job-Seekers Through Online Job Advertisements: Application of RJPs, Blogs and Video Podcasts. 1-17 - Zhiming Wu, Tao Lin, Ningjiu Tang:
Explore the Use of Handwriting Information and Machine Learning Techniques in Evaluating Mental Workload. 18-32 - Li-Jen Wang, Ying-Tien Wu, Chiu-Ming Hu:
English Teachers' Practice and Perspectives on Using Educational Computer Games in EIL Context. 33-46 - Peerayuth Charoensukmongkol:
Contribution of Mindfulness to Individuals' Tendency to Believe and Share Social Media Content. 47-63 - Ruth Chatelain-Jardón, Jesus Carmona, Ned Kock:
An Extension to Simulated Web-Based Threats and Their Impact on Knowledge Communication Effectiveness. 64-77 - A. Y. M. Atiquil Islam:
Development and Validation of the Technology Adoption and Gratification (TAG) Model in Higher Education: A Cross-Cultural Study Between Malaysia and China. 78-105 - Chia-Ying Li:
Understanding University Students' System Acceptance Behavior: The Roles of Personality Trait and Subjective Norms. 106-125
Volume 12, Number 4, 2016
- T. S. Amer, Todd L. Johnson:
Information Technology Progress Indicators: Temporal Expectancy, User Preference, and the Perception of Process Duration. 1-14 - Yi-Fen Chen, Chia-Jung Wu:
Influence of Website Design on Consumer Emotion and Purchase Intention in Travel Websites. 15-29 - Judith Partouche-Sebban:
Online Interactions as a Terror Management Mechanism: How Death Anxiety Affects Facebook Use. 30-47 - Sylvaine Castellano, Insaf Khelladi:
Reputation, Image, and Social Media as Determinants of e-Reputation: The Case of Digital Natives and Luxury Brands. 48-64 - Vincent Dutot:
Impact of Cross-Channel Strategy on Brand's Commitment: A Case Study in an Affordable Luxury Industry. 65-81
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.