default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 86 matches
- 2018
- Akhlaq Ahmad, Md. Abdur Rahman, Mohamed Ridza Wahiddin, Faizan Ur Rehman, Abdelmajid Khelil, Ahmed Lbath:
Context-aware services based on spatio-temporal zoning and crowdsourcing. Behav. Inf. Technol. 37(7): 736-760 (2018) - Ezgi Akar, Tevfik Dalgic:
Understanding online consumers' purchase intentions: a contribution from social network theory. Behav. Inf. Technol. 37(5): 473-487 (2018) - Omar Ali, Jeffrey Soar, Anup Shrestha:
Perceived potential for value creation from cloud computing: a study of the Australian regional government sector. Behav. Inf. Technol. 37(12): 1157-1176 (2018) - Sulaiman Alqahtani, Tomayess Issa:
Barriers to the adoption of social networking sites in Saudi Arabia's higher education. Behav. Inf. Technol. 37(10-11): 1072-1082 (2018) - Dorit Alt, Meyran Boniel-Nissim:
Using multidimensional scaling and PLS-SEM to assess the relationships between personality traits, problematic internet use, and fear of missing out. Behav. Inf. Technol. 37(12): 1264-1276 (2018) - Raman Amirtha, V. J. Sivakumar:
Does family life cycle stage influence e-shopping acceptance by Indian women? An examination using the technology acceptance model. Behav. Inf. Technol. 37(3): 267-294 (2018) - Zeeshan Ahmed Bhatti, Serge Baile, Hina Mahboob Yasin:
Assessing enterprise wiki success from the perspective of end-users: an empirical approach. Behav. Inf. Technol. 37(12): 1177-1193 (2018) - Stephane Bignoux, Kristian J. Sund:
Tutoring executives online: what drives perceived quality? Behav. Inf. Technol. 37(7): 703-713 (2018) - Kim Borg, Liam Smith:
Digital inclusion and online behaviour: five typologies of Australian internet users. Behav. Inf. Technol. 37(4): 367-380 (2018) - Hani Brdesee:
A mixed method analysis of the online information course withdrawal system. Behav. Inf. Technol. 37(10-11): 1037-1054 (2018) - Raúl Cabestrero, Pilar Quirós, Olga C. Santos, Sergio Salmeron-Majadas, Raul Uria-Rivas, Jesús González-Boticario, David Arnau, Miguel Arevalillo-Herráez, Francesc J. Ferri:
Some insights into the impact of affective information when delivering feedback to students. Behav. Inf. Technol. 37(12): 1252-1263 (2018) - Marçal Mora Cantallops, Miguel-Ángel Sicilia:
Exploring player experience in ranked League of Legends. Behav. Inf. Technol. 37(12): 1224-1236 (2018) - Alexandru Capatina, Gianita Bleoju, Elisa Rancati, Emilie Hoareau:
Tracking precursors of learning analytics over serious game team performance ranking. Behav. Inf. Technol. 37(10-11): 1008-1020 (2018) - Chi-Cheng Chang:
Outdoor ubiquitous learning or indoor CAL? Achievement and different cognitive loads of college students. Behav. Inf. Technol. 37(1): 38-49 (2018) - Chia-Chi Chang, Po-Yu Chen:
Analysis of critical factors for social games based on extended technology acceptance model: a DEMATEL approach. Behav. Inf. Technol. 37(8): 774-785 (2018) - Chi-Cheng Chang, Chaoyun Liang, Pao-Nan Chou, Yueh-Mai Liao:
Using e-portfolio for learning goal setting to facilitate self-regulated learning of high school students. Behav. Inf. Technol. 37(12): 1237-1251 (2018) - Alev Ates Çobanoglu:
Student teachers' satisfaction for blended learning via Edmodo learning management system. Behav. Inf. Technol. 37(2): 133-144 (2018) - Héctor Yago Corral, Julia Clemente, Daniel Rodríguez:
Competence-based recommender systems: a systematic literature review. Behav. Inf. Technol. 37(10-11): 958-977 (2018) - Liliana Vale Costa, Ana Isabel Veloso, Michael Loizou, Sylvester Arnab:
Games for active ageing, well-being and quality of life: a pilot study. Behav. Inf. Technol. 37(8): 842-854 (2018) - Suresh Cuganesan, Cara Steele, Alison Hart:
How senior management and workplace norms influence information security attitudes and self-efficacy. Behav. Inf. Technol. 37(1): 50-65 (2018) - Gonca Gokce Menekse Dalveren, Nergiz Ercil Cagiltay:
Insights from surgeons' eye-movement data in a virtual simulation surgical training environment: effect of experience level and hand conditions. Behav. Inf. Technol. 37(5): 517-537 (2018) - Milad Dehghani:
Exploring the motivational factors on continuous usage intention of smartwatches among actual users. Behav. Inf. Technol. 37(2): 145-158 (2018) - H. Andaç Demirtas-Madran:
Relationship among Facebook jealousy, aggression, and personal and relationship variables. Behav. Inf. Technol. 37(5): 462-472 (2018) - Eleni Dermentzi, Savvas Papagiannidis:
UK public's intention to engage with academia via online technologies. Behav. Inf. Technol. 37(2): 120-132 (2018) - Wei Gao, Yamei Liu, Zhaopeng Liu, Jingyuan Li:
How does presence influence purchase intention in online shopping markets? An explanation based on self-determination theory. Behav. Inf. Technol. 37(8): 786-799 (2018) - Kimia Ghaffari, Mohammad Lagzian:
Exploring users' experiences of using personal cloud storage services: a phenomenological study. Behav. Inf. Technol. 37(3): 295-309 (2018) - Khalid Hafeez, Pantea Foroudi, Bang Nguyen, Suraksha Gupta, Fathalla M. Alghatas:
How do entrepreneurs learn and engage in an online community-of-practice? A case study approach. Behav. Inf. Technol. 37(7): 714-735 (2018) - Bo Han, Chris Myers:
Perceptions of overuse, underuse, and change of use of a social media site: definition, measurement instrument, and their managerial impacts. Behav. Inf. Technol. 37(3): 247-257 (2018) - Marie-Christin Harre, Sebastian Feuerstack:
The Konect value - a quantitative method for estimating perception time and accuracy for HMI designs. Behav. Inf. Technol. 37(9): 894-903 (2018) - Jarkko Hautala, Carita Kiili, Yvonne Kammerer, Otto Loberg, Sanna Hokkanen, Paavo H. T. Leppänen:
Sixth graders' evaluation strategies when reading Internet search results: an eye-tracking study. Behav. Inf. Technol. 37(8): 761-773 (2018)
skipping 56 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-12-16 19:16 CET from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint