Browse Papers
From IFORS
Contact Us
English
Remember me
Login
Forgot password?
Keyword: internet
Found
592 papers
in total
Date Descending
Date Ascending
Title Descending
Title Ascending
Towards a theoretical framework of strategic decision, supporting capability and information sharing under the context of Internet of Things
2012,
Li Yuan
The effective strategy of Internet of Things (IoT) can help firms to grasp the...
Proposing a context‐aware enterprise mashup readiness assessment framework
2012,
He Wu
Web mashups have received a lot of attention recently as more enterprises are engaged...
Internet banking adoption in a developing country ‐ an empirical study
2013,
Sridharan R
The progressions in information technology have changed the operational aspects of the...
Refinement of internet banking service quality scale: a confirmatory factor analysis approach
2013,
Adil Mohd
Internet technology has changed the world since it started facilitating activities for...
Investor Sentiment, Disagreement, and the Breadth–Return Relationship
2013,
Cen Ling
We study the cross‐sectional breadth–return relation by assuming that...
Relationship between learning styles and effectiveness of online learning systems
2012,
Cao Qing
Online learning has become a popular medium to disseminate knowledge for both...
Constructing a decision support system for management of employee turnover risk
2011,
Zhang Li
In the time of knowledge economy, competency among enterprises is focused on the...
An enhanced model framework of personalized material flow services
2011,
Chen Li
A growing concern about the consumer behavior in Internet economy has spurred the...
Designing content distribution networks for optimal cost and performance
2012,
Agarwal Anurag
One strategy for alleviating excess latency (delay) in the Internet is the caching of...
The need for speed: impacts of internet connectivity on firm productivity
2012,
Grimes Arthur
Broadband access is widely considered to be a productivity‐enhancing factor,...
E‐recruiting and fairness: the applicant’s point of view
2012,
Thielsch Meinald
More and more companies currently recruit online, partly because of cost savings and...
The adoption of social networking technologies in cinema releases
2012,
Westland J
Film marketing plays a growing role in movie release due to the high cost and...
From Wires to Partners: How the Internet Has Fostered R&D Collaborations Within Firms
2012,
Forman Chris
How did the diffusion of the Internet influence research collaborations within firms?...
Accurate modeling of VoIP traffic QoS parameters in current and future networks with multifractal and Markov models
2013,
Toral-Cruz Homero
In this paper, we analyze the jitter and packet loss behavior of Voice over Internet...
Gaming in the clouds: QoE and the users’ perspective
2013,
Jarschel Michael
Cloud Gaming is a new kind of service, which combines the successful concepts of Cloud...
Indian customers' attitude towards trust and convenience dimensions of internet banking
2012,
Khare Arpita
The purpose of this research was to understand the Indian customers' attitude towards...
Instability behaviour of heterogeneous multimedia networks under dynamic adversarial attacks
2013,
Koukopoulos Dimitrios
Multimedia communication networks, such as the Internet, are heterogeneous in their...
Deriving market intelligence from microblogs
2013,
Li Yung-Ming
Given their rapidly growing popularity, microblogs have become great sources of...
Goal attainment on long tail web sites: An information foraging approach
2013,
McCart J A
The long tail has attracted substantial theoretical as well as practical interest, yet...
Untangling the antecedents of initial trust in Web‐based health information: The roles of argument quality, source expertise, and user perceptions of information quality and risk
2013,
Davis Joshua M
As the Internet develops as a medium for disseminating health‐related...
A novel method for SQL injection attack detection based on removing SQL query attribute values
2012,
Moon Jongsub
SQL injection or SQL insertion attack is a code injection technique that exploits a...
A new multistage approach to detect subtle DDoS attacks
2012,
Wang Xiaofeng
Detection of distributed denial of service (DDoS) attacks has been a challenging...
On‐the‐spot digital investigation by means of LDFS: Live Data Forensic System
2012,
Lee Sangjin
The ever growing capacity of hard drives poses a severe problem to forensic...
Through the service operations strategy looking glass: Influence of industrial sector, ownership, and service offerings on B2B e‐marketplace failures
2011,
Roth Aleda V
Consistent with emerging e‐services literature, our empirical results indicate...
First Page
9
10
11
12
13
Last Page
Papers per page:
6 Papers
12 Papers
24 Papers
36 Papers
48 Papers