From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

User Acceptance of Business Intelligence (BI) Application: Technology, Individual Difference, Social Influence, and Situational Constraints., , и . HICSS, стр. 3758-3766. IEEE Computer Society, (2014)Improving the Effectiveness of Anti-Piracy Educational Deterrence Efforts: The Role of Message Frame, Issue Involvement, Risk Perception, and Message Evidence on Perceived Message Effectiveness., , и . J. Theor. Appl. Electron. Commer. Res., 16 (3): 298-319 (2021)Designing a hybrid approach with computational analysis and visual analytics to detect network intrusions., , и . CCWC, стр. 1-7. IEEE, (2017)Understanding sensor data with uncertainty using a visual representation., и . CCWC, стр. 1-2. IEEE, (2017)Forecasting network events to estimate attack risk: Integration of wavelet transform and vector auto regression with exogenous variables., , , , и . J. Netw. Comput. Appl., (2022)Consumer Piracy Risk: Conceptualization and Measurement in Music Sharing., , и . Int. J. Electron. Commer., 16 (3): 89-118 (2012)Leveraging Machine Learning to Analyze Semantic User Interactions in Visual Analytics., , и . Inf., 15 (6): 351 (июня 2024)User acceptance of business intelligence application: motivation to learn, technology, social influence, and situational constraints., , и . Int. J. Bus. Inf. Syst., 26 (4): 432-450 (2017)Market reaction to application service provider (ASP) adoption: An empirical investigation., и . Inf. Manag., 47 (3): 176-187 (2010)Estimating Attack Risk of Network Activities in Temporal Domain: A Wavelet Transform Approach., , , , и . UEMCON, стр. 826-832. IEEE, (2020)