default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 31 matches
- 2024
- Yasir Afaq, Ankush Manocha:
Blockchain and Deep Learning Integration for Various Application: A Review. J. Comput. Inf. Syst. 64(1): 92-105 (2024) - Kalyan Prasad Agrawal, Ashis K. Pani, Anuj Sharma, Nripendra P. Rana:
Process Virtualization Goes Mainstream: Diving into its Normalization. J. Comput. Inf. Syst. 64(3): 453-468 (2024) - Cheuk Hang (Allen) Au, Wen Shou Hsu, Po-Hsu Shieh, Lin Yue:
Can Stablecoins Foster Cryptocurrencies Adoption? J. Comput. Inf. Syst. 64(3): 360-369 (2024) - Gaurav Bansal, Zhuoli Axelton:
Impact of Cybersecurity Disclosures on Stakeholder Intentions. J. Comput. Inf. Syst. 64(1): 78-91 (2024) - Tat Huei Cham, Boon Liat Cheng, Eugene Cheng-Xi Aw, Garry Wei-Han Tan, Xiu-Ming Loh, Keng-Boon Ooi:
Counteracting the Impact of Online Fake News on Brands. J. Comput. Inf. Syst. 64(2): 245-264 (2024) - Chuleeporn Changchit, Robert Cutshall, Joseph Mollick:
A Three Country Comparative Study of Social Commerce Adoption. J. Comput. Inf. Syst. 64(1): 1-16 (2024) - David C. Chou, Binshan Lin:
Social Entrepreneurship Success: Relevance to Social Mediating Technologies. J. Comput. Inf. Syst. 64(3): 329-341 (2024) - Smita Dange, Prashant Nitnaware:
Secure Share: Optimal Blockchain Integration in IoT Systems. J. Comput. Inf. Syst. 64(2): 265-277 (2024) - Sophia Xiaoxia Duan, Hepu Deng, Santoso Wibowo:
Technology Affordances for Enhancing Job Performance in Digital Work. J. Comput. Inf. Syst. 64(2): 232-244 (2024) - Sahar Farshadkhah, Michele Maasberg, T. Selwyn Ellis, Craig Van Slyke:
An Empirical Examination of Employee Information Security Advice Sharing. J. Comput. Inf. Syst. 64(1): 31-46 (2024) - Anna Górska, Pawel Korzynski, Grzegorz Mazurek:
The Effects of USR and Its Communication on Faculty Satisfaction. J. Comput. Inf. Syst. 64(2): 289-300 (2024) - Amy H. Harris, Carol Clark:
Understanding the Diffusion of Business Analysis Responsibilities. J. Comput. Inf. Syst. 64(2): 278-288 (2024) - Dae-Kyoo Kim, Yeasun K. Chung:
Addressing Class Imbalances in Software Defect Detection. J. Comput. Inf. Syst. 64(2): 219-231 (2024) - Galit Klein, Moti Zwilling:
The Weakest Link: Employee Cyber-Defense Behaviors While Working from Home. J. Comput. Inf. Syst. 64(3): 408-422 (2024) - Zhunzhun Liu, Ruidong Zhang:
An Empirical Study on Herd Behavior in Cryptocurrency Trading. J. Comput. Inf. Syst. 64(3): 438-452 (2024) - Richard McGregor, Carmen Reaiche, Stephen Boyle, Graciela Corral de Zubielqui:
Cyberspace and Personal Cyber Insurance: A Systematic Review. J. Comput. Inf. Syst. 64(1): 157-171 (2024) - Neelesh Kumar Mishra, Alok Raj, Anand Jeyaraj, Riya Gupta:
Antecedents and Outcomes of Blockchain Technology Adoption: Meta-Analysis. J. Comput. Inf. Syst. 64(3): 342-359 (2024) - Yogesh Mungra, Ritu Srivastava, Anuj Sharma, Diptiman Banerji, Neela Gollapudi:
Impact of Digital Competence on Employees' Flourishing Through Basic Psychological Needs Satisfaction. J. Comput. Inf. Syst. 64(1): 47-61 (2024) - Purnima Naik, Salomi Nelaballi, Venkata Sai Pusuluri, Dae-Kyoo Kim:
Deep Learning-Based Code Refactoring: A Review of Current Knowledge. J. Comput. Inf. Syst. 64(2): 314-328 (2024) - T. N. Nisha, Dhanya Pramod:
Insider Intrusion Detection Techniques: A State-of-the-Art Review. J. Comput. Inf. Syst. 64(1): 106-123 (2024) - Rathika Palanisamy, Azah Anir Norman, Miss Laiha Mat Kiah:
Employees' BYOD Security Policy Compliance in the Public Sector. J. Comput. Inf. Syst. 64(1): 62-77 (2024) - Aruna Polisetty, Debarun Chakraborty, Sowmya G, Arpan Kumar Kar, Subhajit Pahari:
What Determines AI Adoption in Companies? Mixed-Method Evidence. J. Comput. Inf. Syst. 64(3): 370-387 (2024) - Arun Amaithi Rajan, V. Vetriselvi:
Systematic Survey: Secure and Privacy-Preserving Big Data Analytics in Cloud. J. Comput. Inf. Syst. 64(1): 136-156 (2024) - Sandip Rakshit, Anand Jeyaraj, Tripti Paul:
SME Performance Through Blockchain Technologies. J. Comput. Inf. Syst. 64(2): 204-218 (2024) - Jiwat Ram:
Using Social Media in Projects: Information Management Challenges and Recommendations. J. Comput. Inf. Syst. 64(2): 187-203 (2024) - Carol Springer Sargent, Jennifer L. Breese:
Blockchain Barriers in Supply Chain: A Literature Review. J. Comput. Inf. Syst. 64(1): 124-135 (2024) - Sihem Ben Sassi, Nacim Yanes:
Data Science with Semantic Technologies: Application to Information Systems Development. J. Comput. Inf. Syst. 64(3): 388-407 (2024) - Fatemeh Shapouri, Kerry Ward, Tenace Setor:
Determinants of Software as a Service (SaaS) Adoption. J. Comput. Inf. Syst. 64(2): 301-313 (2024) - Sujeet Kumar Sharma, Yogesh K. Dwivedi, Santosh K. Misra, Nripendra P. Rana:
Conjoint Analysis of Blockchain Adoption Challenges in Government. J. Comput. Inf. Syst. 64(2): 173-186 (2024) - Kane J. Smith:
Bad Employees: Examining Deviant Security Behaviors. J. Comput. Inf. Syst. 64(1): 17-30 (2024)
skipping 1 more match
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-09-14 21:49 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint