|
|
|
|
|
Liang Xiao, Qibei Lu and Feipeng Guo
A mobile personalized recommendation service satisfies the needs of users and stimulates them to continue to adopt mobile commerce applications. Therefore, how to precisely provide mobile personalized recommendation service is very important for the sust...
ver más
|
|
|
|
|
|
|
|
|
|
|
Sunday Adewale Olaleye,Solomon Sunday Oyelere,Ismaila Temitayo Sanusi,Joseph Friday Agbo
Pág. pp. 4 - 20
The concept of ubiquitous computing allows the seamless: anywhere, anytime, anyone interaction of computing devices and technology. Ubiquitous commerce simply known as u-commerce is an evolution of commerce based on recent innovations and advancement in ...
ver más
|
|
|
|
|
|
|
|
|
|
|
Jelena Zdravkovic
Pág. I - II
This issue complements the previous issue in the way that it aggregates some prominent research results of the 17th International Conference on Perspectives in Business Informatics Research (BIR2018) in Stockholm, Sweden, in September 24-26, 2018 togethe...
ver más
|
|
|
|
|
|
|
|
|
|
|
Nasour Bagheri, Ygal Bendavid, Masoumeh Safkhani and Samad Rostampour
A smart grid is an electricity network that uses advanced technologies to facilitate the exchange of information and electricity between utility companies and customers. Although most of the technologies involved in such grids have reached maturity, smar...
ver más
|
|
|
|
|
|
|
|
|
|
|
Brent Pethers and Abubakar Bello
Cyber sextortion attacks are security and privacy threats delivered to victims online, to distribute sexual material in order to force the victim to act against their will. This continues to be an under-addressed concern in society. This study investigat...
ver más
|
|
|
|
|
|
|
|
|
|
|
Muhammad Asghar Khan, Hosam Alhakami, Insaf Ullah, Wajdi Alhakami, Syed Agha Hassnain Mohsan, Usman Tariq and Nisreen Innab
Security and privacy issues were long a subject of concern with drones from the past few years. This is due to the lack of security and privacy considerations in the design of the drone, which includes unsecured wireless channels and insufficient computi...
ver más
|
|
|
|
|
|
|
|
|
|
|
Ismail Bile Hassan, Masrah Azrifah Azmi Murad, Ibrahim El-Shekeil and Jigang Liu
This study validates and extends the latest unified theory of acceptance and use of technology (UTAUT2) with the privacy calculus model. To evaluate the adoption of healthcare and e-government applications, researchers have recommended?in previous litera...
ver más
|
|
|
|
|
|
|
|
|
|
|
Haokun Fang and Quan Qian
Privacy protection has been an important concern with the great success of machine learning. In this paper, it proposes a multi-party privacy preserving machine learning framework, named PFMLP, based on partially homomorphic encryption and federated lear...
ver más
|
|
|
|
|
|
|
|
|
|
|
Oluwashina Joseph Ajayi, Joseph Rafferty, Jose Santos, Matias Garcia-Constantino and Zhan Cui
The scale of Internet of Things (IoT) systems has expanded in recent times and, in tandem with this, IoT solutions have developed symbiotic relationships with technologies, such as edge Computing. IoT has leveraged edge computing capabilities to improve ...
ver más
|
|
|
|
|
|
|
|
|
|
|
Diana Florea and Silvia Florea
Despite the claimed worth and huge interest regarding the increasing volumes of complex data sets and the rewarding promise to improve research, there is, however, a growing concern regarding data privacy that affects both qualitative and quantitative hi...
ver más
|
|
|
|
|
|
|
|
|
|
|
Alessandro Marco Rosini Filho,Alessandro Marco Rosini,Angelo Palmisano
Pág. 13 - 34
With the great expansion in the volume of data created in recent years, coupled with the speed at which the most distinct information is generated from multiple and different origins, this work developed through qualitative method, based on a review and ...
ver más
|
|
|
|
|
|
|
|
|
|
|
Eko Wahyu Tyas Darmaningrat,Hanim Maria Astuti,Fadhila Alfi
Pág. 159 - 168
Background: Teenagers in Indonesia have an open nature and satisfy their desire to exist by uploading photos or videos and writing posts on Instagram. The habit of uploading photos, videos, or writings containing their personal information can be dangero...
ver más
|
|
|
|
|
|
|
|
|
|
|
Theo Lynn, Grace Fox, Anna Gourinovitch and Pierangelo Rosati
High performance computing (HPC) is widely recognized as a key enabling technology for advancing scientific progress, industrial competitiveness, national and regional security, and the quality of human life. Notwithstanding this contribution, the large ...
ver más
|
|
|
|
|
|
|
|
|
|
|
Alessandro Marco Rosini Filho,Alessandro Marco Rosini,Angelo Palmisano
Pág. 13 - 34
With the great expansion in the volume of data created in recent years, coupled with the speed at which the most distinct information is generated from multiple and different origins, this work developed through qualitative method, based on a review and ...
ver más
|
|
|
|
|
|
|
|
|
|
The Special Issue on “Human Factors in Green Building” addresses the design of indoor environment quality for users’ needs. The collected papers cover various building types and the research highlights the different needs of users. In w...
ver más
|
|
|
|
|
|
|
|
|
|
|
Wibisono Sukmo Wardhono,Nurizal Dwi Priandani,Mahardeka Tri Ananta,Komang Candra Brata,Herman Tolle
Pág. pp. 160 - 167
As social media environments become more interactive and amount of users grown tremendously, privacy is a matter of increasing concern. When personal data become a commodity, social media company can share users data to another party such as government. ...
ver más
|
|
|
|
|
|
|
|
|
|
|
Jennifer Golbeck and Matthew Louis Mauriello
Users share vast amounts of personal information online, but are they fully aware of what information they are sharing and with whom? In this paper, we focused on Facebook apps and set out to understand how concerned users are about privacy and how well-...
ver más
|
|
|
|
|
|
|
|
|
|
|
Ishan Senarathna,William Yeoh,Matthew Warren,Scott Salzman
New national infrastructure initiatives such as National Broadband Network (NBN) could enable Small and Medium-sized Enterprises (SMEs) in Australia to further embrace Cloud computing service. However, the ability of Cloud computing to store data remotel...
ver más
|
|
|
|
|
|
|
|
|
|
|
Sam Nataraj
There has been significant growth in electronic prescriptions in the last three years. E-prescribing volume has exceeded 250 million and the number of prescribers routing prescriptions has exceeded 75,000. There has been a push from the federal governmen...
ver más
|
|
|
|
|
|
|
|
|
|
|
Rosemary Stockdale,Craig Standing
This study examines the recognition and use of critical success factors by market makers in electronic marketplaces. A content analysis of e-marketplace websites enabled an examination of how these factors have been incorporated into marketplace sites. ...
ver más
|
|
|
|
|
|