default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 20 matches
- 2023
- Nizar Mohammad Alsharari, Fidelis M. Ikem:
Digital accounting systems and information technology in the public sector: mutual interaction. J. Syst. Inf. Technol. 25(1): 53-73 (2023) - Ali Balapour, Rajiv Sabherwal, Varun Grover:
The relationship between immersive experience and shelf life of mobile apps: an empirical study of a gaming application. J. Syst. Inf. Technol. 25(4): 364-394 (2023) - Lilly Marie Baltruschat, Vikas Jaiman, Visara Urovi:
User acceptability of blockchain technology for enabling electronic health record exchange. J. Syst. Inf. Technol. 25(3): 268-295 (2023) - Rajat Kumar Behera, Pradip Kumar Bala, Prabin Kumar Panigrahi, Shilpee A. Dasgupta:
Adoption of cognitive computing decision support system in the assessment of health-care policymaking. J. Syst. Inf. Technol. 25(4): 395-439 (2023) - Annye Braca, Pierpaolo Dondio:
Persuasive communication systems: a machine learning approach to predict the effect of linguistic styles and persuasion techniques. J. Syst. Inf. Technol. 25(2): 160-191 (2023) - Amal Dabbous, Karine Aoun Barakat:
The influence of emotions on online information sharing behavior. J. Syst. Inf. Technol. 25(4): 341-363 (2023) - Parinda Doshi, Priti Nigam, Bikramjit Rishi:
System quality features and continuous usage intention of social network users: a multi-group analysis with gender. J. Syst. Inf. Technol. 25(4): 480-501 (2023) - Matti Haverila, Eric Li, Jenny Carita Twyford, Caitlin McLaughlin:
The quality of big data marketing analytics (BDMA), user satisfaction, value for money and reinvestment intentions of marketing professionals. J. Syst. Inf. Technol. 25(1): 30-52 (2023) - Muneza Kagzi, Sayantan Khanra, Sanjoy Kumar Paul:
Machine learning for sustainable development: leveraging technology for a greener future. J. Syst. Inf. Technol. 25(4): 440-479 (2023) - Xuan Cu Le:
Inducing AI-powered chatbot use for customer purchase: the role of information value and innovative technology. J. Syst. Inf. Technol. 25(2): 219-241 (2023) - Seng Boon Lim, Kamalia Azma Kamaruddin:
Violated factors in building citizen-centric e-government websites: insights from the performance of the federal, state and local governments websites in Malaysia. J. Syst. Inf. Technol. 25(1): 109-132 (2023) - Arif Mahmud, Mohd Najwadi Yusoff, Mohd Heikal Husin:
Generation Z's adoption of IoT: protection motivation theory as the underlying model and gender as a moderator. J. Syst. Inf. Technol. 25(2): 133-159 (2023) - Gediminas Marcinkevicius, Mantas Vilkas:
The affordances of digital technologies for business processes integration. J. Syst. Inf. Technol. 25(1): 74-90 (2023) - Luis Hernan Contreras Pinochet, Stefani da Silva Santos, Vanessa Itacaramby Pardim, Cesar Alexandre de Souza:
Watch out for nomophobia, so it does not catch you! Effects of digital dependence syndrome on mental health. J. Syst. Inf. Technol. 25(3): 296-318 (2023) - Alexandra Poulovassilis, Valeri Katerinchuk, Fiona Candlin:
Designing a system to chart the development of the UK museum sector: an iterative approach. J. Syst. Inf. Technol. 25(2): 192-218 (2023) - Noor Fareen Abdul Rahim, Ghazanfar Ali Abbasi, Mohammad Iranmanesh, Nwakaji Christopher, Azlan Amran:
Determinants of continuous intention to use e-government services: an extension of technology continuance theory. J. Syst. Inf. Technol. 25(3): 245-267 (2023) - Shubham Singh, Paul C. Hong, Sandeep Jagani:
Technology-enabled leadership and performance enhancement outcomes: an empirical investigation from the dynamic capabilities perspective. J. Syst. Inf. Technol. 25(3): 319-340 (2023) - Yuling Wei, Jhanghiz Syahrivar, Hanif Adinugroho Widyanto:
Using facial enhancement technology (FET) in online sales of branded color cosmetics. J. Syst. Inf. Technol. 25(4): 502-530 (2023) - Colleen Carraher Wolverton, Rudy Hirschheim:
Utilizing expectation disconfirmation theory to develop a higher-order model of outsourcing success factors. J. Syst. Inf. Technol. 25(1): 1-29 (2023) - Zhangxiang Zhu, Kening Yang:
Virtual community users' travel information-seeking continuance intention: an empirical study based on the cognitive load theory and flow theory. J. Syst. Inf. Technol. 25(1): 91-108 (2023)
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-12-23 20:28 CET from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint