default search action
Search dblp for Publications
export results for "toc:db/journals/itd/itd20.bht:"
@article{DBLP:journals/itd/Andoh-BaidooOK14, author = {Francis Kofi Andoh{-}Baidoo and Babajide Osatuyi and K. Niki Kunene}, title = {{ICT} Capacity as the Investment and Use of {ICT:} Exploring its Antecedents in Africa}, journal = {Inf. Technol. Dev.}, volume = {20}, number = {1}, pages = {44--59}, year = {2014}, url = {https://doi.org/10.1080/02681102.2013.804399}, doi = {10.1080/02681102.2013.804399}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/itd/Andoh-BaidooOK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itd/Andoh-BaidooOK14a, author = {Francis Kofi Andoh{-}Baidoo and Babajide Osatuyi and K. Niki Kunene}, title = {Architecture for Managing Knowledge on Cybersecurity in Sub-Saharan Africa}, journal = {Inf. Technol. Dev.}, volume = {20}, number = {2}, pages = {140--164}, year = {2014}, url = {https://doi.org/10.1080/02681102.2013.832127}, doi = {10.1080/02681102.2013.832127}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/itd/Andoh-BaidooOK14a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itd/AyansoCL14, author = {Anteneh Ayanso and Danny I. Cho and Kaveepan Lertwachara}, title = {Information and Communications Technology Development and the Digital Divide: {A} Global and Regional Assessment}, journal = {Inf. Technol. Dev.}, volume = {20}, number = {1}, pages = {60--77}, year = {2014}, url = {https://doi.org/10.1080/02681102.2013.797378}, doi = {10.1080/02681102.2013.797378}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/itd/AyansoCL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itd/Baker14, author = {Elizabeth White Baker}, title = {A Model for the Impact of Cybersecurity Infrastructure on Economic Development in Emerging Economies: Evaluating the Contrasting Cases of India and Pakistan}, journal = {Inf. Technol. Dev.}, volume = {20}, number = {2}, pages = {122--139}, year = {2014}, url = {https://doi.org/10.1080/02681102.2013.832131}, doi = {10.1080/02681102.2013.832131}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/itd/Baker14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itd/Barclay14, author = {Corlane Barclay}, title = {Using Frugal Innovations to Support Cybercrime Legislations in Small Developing States: Introducing the Cyber-Legislation Development and Implementation Process Model (CyberLeg-DPM)}, journal = {Inf. Technol. Dev.}, volume = {20}, number = {2}, pages = {165--195}, year = {2014}, url = {https://doi.org/10.1080/02681102.2013.841630}, doi = {10.1080/02681102.2013.841630}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/itd/Barclay14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itd/ChoucriMF14, author = {Nazli Choucri and Stuart E. Madnick and James A. Ferwerda}, title = {Institutions for Cyber Security: International Responses and Global Imperatives}, journal = {Inf. Technol. Dev.}, volume = {20}, number = {2}, pages = {96--121}, year = {2014}, url = {https://doi.org/10.1080/02681102.2013.836699}, doi = {10.1080/02681102.2013.836699}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/itd/ChoucriMF14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itd/Gomez14, author = {Ricardo Gomez}, title = {When You Do Not Have a Computer: Public-Access Computing in Developing Countries}, journal = {Inf. Technol. Dev.}, volume = {20}, number = {3}, pages = {274--291}, year = {2014}, url = {https://doi.org/10.1080/02681102.2012.751573}, doi = {10.1080/02681102.2012.751573}, timestamp = {Mon, 18 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itd/Gomez14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itd/Hwang14, author = {Yujong Hwang}, title = {Understanding the Electronic Recruiting Marketplace Strategy: The Case of JobKorea}, journal = {Inf. Technol. Dev.}, volume = {20}, number = {4}, pages = {353--361}, year = {2014}, url = {https://doi.org/10.1080/02681102.2013.795463}, doi = {10.1080/02681102.2013.795463}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/itd/Hwang14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itd/JenkinsGPL14, author = {Jeffrey L. Jenkins and G. Mark Grimes and Jeffrey Gainer Proudfoot and Paul Benjamin Lowry}, title = {Improving Password Cybersecurity Through Inexpensive and Minimally Invasive Means: Detecting and Deterring Password Reuse Through Keystroke-Dynamics Monitoring and Just-in-Time Fear Appeals}, journal = {Inf. Technol. Dev.}, volume = {20}, number = {2}, pages = {196--213}, year = {2014}, url = {https://doi.org/10.1080/02681102.2013.814040}, doi = {10.1080/02681102.2013.814040}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/itd/JenkinsGPL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itd/Kamel14, author = {Sherif H. Kamel}, title = {Egypt's Ongoing Uprising and the Role of Social Media: Is there Development?}, journal = {Inf. Technol. Dev.}, volume = {20}, number = {1}, pages = {78--91}, year = {2014}, url = {https://doi.org/10.1080/02681102.2013.840948}, doi = {10.1080/02681102.2013.840948}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/itd/Kamel14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itd/Kenny14, author = {Kate M. Kenny}, title = {Power and the Construction of Independence in {ICTD} Organizations}, journal = {Inf. Technol. Dev.}, volume = {20}, number = {1}, pages = {6--22}, year = {2014}, url = {https://doi.org/10.1080/02681102.2013.809684}, doi = {10.1080/02681102.2013.809684}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/itd/Kenny14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itd/KockG14, author = {Ned Kock and Leebrian Gaskins}, title = {The Mediating Role of Voice and Accountability in the Relationship Between Internet Diffusion and Government Corruption in Latin America and Sub-Saharan Africa}, journal = {Inf. Technol. Dev.}, volume = {20}, number = {1}, pages = {23--43}, year = {2014}, url = {https://doi.org/10.1080/02681102.2013.832129}, doi = {10.1080/02681102.2013.832129}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/itd/KockG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itd/Osei-BrysonV14, author = {Kweku{-}Muata Osei{-}Bryson and Doug Vogel}, title = {Special Issue on Cyber-Security for Development}, journal = {Inf. Technol. Dev.}, volume = {20}, number = {2}, pages = {93--95}, year = {2014}, url = {https://doi.org/10.1080/02681102.2014.883115}, doi = {10.1080/02681102.2014.883115}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/itd/Osei-BrysonV14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itd/ParkKKOC14, author = {Eunil Park and Sang Jib Kwon and Heetae Kim and Jay Ohm and Hyun Joon Chang}, title = {What is the Right R{\&}D Strategy for Overcoming the Difficulties of the South Korean {IT} Industry?}, journal = {Inf. Technol. Dev.}, volume = {20}, number = {4}, pages = {339--352}, year = {2014}, url = {https://doi.org/10.1080/02681102.2013.856282}, doi = {10.1080/02681102.2013.856282}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/itd/ParkKKOC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itd/PickGS14, author = {James B. Pick and Kamala Gollakota and Manju Singh}, title = {Technology for Development: Understanding Influences on use of Rural Telecenters in India}, journal = {Inf. Technol. Dev.}, volume = {20}, number = {4}, pages = {296--323}, year = {2014}, url = {https://doi.org/10.1080/02681102.2013.837806}, doi = {10.1080/02681102.2013.837806}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/itd/PickGS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itd/Qureshi14, author = {Sajda Qureshi}, title = {Lessons from the Age of Nelson Mandela: Information and Communication Technology in the Quest for Equality, Freedom and Justice}, journal = {Inf. Technol. Dev.}, volume = {20}, number = {1}, pages = {1--5}, year = {2014}, url = {https://doi.org/10.1080/02681102.2014.886369}, doi = {10.1080/02681102.2014.886369}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/itd/Qureshi14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itd/Qureshi14a, author = {Sajda Qureshi}, title = {Overcoming Technological Determinism in Understanding the Digital Divide: Where Do We Go From Here?}, journal = {Inf. Technol. Dev.}, volume = {20}, number = {3}, pages = {215--217}, year = {2014}, url = {https://doi.org/10.1080/02681102.2014.930981}, doi = {10.1080/02681102.2014.930981}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/itd/Qureshi14a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itd/Qureshi14b, author = {Sajda Qureshi}, title = {Theory to Inform Practice to Build Theory: Are Emerging Economies in a Cyclical Relationship with their Information and Communication Technologies?}, journal = {Inf. Technol. Dev.}, volume = {20}, number = {4}, pages = {293--295}, year = {2014}, url = {https://doi.org/10.1080/02681102.2014.962939}, doi = {10.1080/02681102.2014.962939}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/itd/Qureshi14b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itd/Samoilenko14, author = {Sergey Samoilenko}, title = {Investigating the Impact of Investments in Telecoms on Microeconomic Outcomes: Conceptual Framework and Empirical Investigation in the Context of Transition Economies}, journal = {Inf. Technol. Dev.}, volume = {20}, number = {3}, pages = {251--273}, year = {2014}, url = {https://doi.org/10.1080/02681102.2012.751572}, doi = {10.1080/02681102.2012.751572}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/itd/Samoilenko14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itd/SkaletskySG14, author = {Maria Skaletsky and Olumayokun Soremekun and Robert D. Galliers}, title = {The Changing - and Unchanging - Face of the Digital Divide: an Application of Kohonen Self-Organizing Maps}, journal = {Inf. Technol. Dev.}, volume = {20}, number = {3}, pages = {218--250}, year = {2014}, url = {https://doi.org/10.1080/02681102.2013.804396}, doi = {10.1080/02681102.2013.804396}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/itd/SkaletskySG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itd/ZhangC14, author = {Weiyu Zhang and Arul Chib}, title = {Internet Studies and Development Discourses: The Cases of China and India}, journal = {Inf. Technol. Dev.}, volume = {20}, number = {4}, pages = {324--338}, year = {2014}, url = {https://doi.org/10.1080/02681102.2013.796546}, doi = {10.1080/02681102.2013.796546}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/itd/ZhangC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.