The purpose of this study was to investigate preservice science teachers' proficiency levels regarding their practical knowledge of technological pedagogical content knowledge (TPACK-P). A sample of 103 third- and fourth-year...
To understand the water balance and environmental effects under climate change condition, hydrological models are always used to simulate the hydrological cycle and predict future scenarios by using global climate models (GCMs)...
Network security and network forensics technologies for the Internet of Things (IoT) need special consideration due to resource-constraints. Cybercrimes conducted in IoT focus on network information and energy sources. Graph...
In order to solve the problem that the privacy preserving algorithm based on slicing technology is incapable of dealing with packet loss, this paper presents the redundancy algorithm for privacy preserving. The algorithm...
W⊕X is a protection mechanism against control-flow hijacking attacks. Return-oriented programming (ROP) can perform a specific function by searching for appropriate assembly instruction fragments (gadgets) in a code segment and...
The purpose of this paper is to investigate the influential factors of online social network advertising in three different cultural areas, being China, India, and the US. This study uses the Social Capital Theory (SCT), and...
Discovering entity synonymous relations is an important work for many entity-based applications. Existing entity synonymous relation extraction approaches are mainly based on lexical patterns or distributional corpus-level...
This paper constructs an online community organizational double-layer learning structure model based on exploration-exploitation models. In this way, the authors examine the effect how double-layer online community learning as...
Green supply chain management means integrating environmental awareness into supply chain management, including product design, raw material acquisition and selection, the manufacturing process, the distribution of final...
A quantitative study involving Mainland China (the PRC), Taiwan, India, the UAE, and the US, five areas with 852 responses of IT/IS personnel data towards building a more suitable Circumplex Career Anchor Model for IT/IS...
With the aim of exploring how digital transformation impacts enterprise development in China, this study takes Chinese A-share listed enterprises from 2007 to 2020 as the research sample and constructs a digital transformation...
Agriculture is transforming from traditional agriculture to smart agriculture. To realize the intelligent, precise, and scientific management of agricultural production, it is necessary to conduct real-time, accurate, and...
In this paper, Artificial Intelligence assisted rule-based confidence metric (AI-CRBM) framework has been introduced for analyzing environmental governance expense prediction reform. A metric method is to assess a level of...
Enterprise financial risks are analyzed utilizing the theory of organizational behavior, and a financial risk management system is constructed to improve the design and algorithm of the enterprise risk management system. Base on...
The micro-task crowdsourcing marketplace, as a novel platform, has provided firms with a new way to recruit employees at a reasonable cost and with a fast turnaround. This research explores how different types of motivations...
The authors examine the information-driven trades and informed traders' order size strategies in China's stock market. They find the aggregate U-shaped informed trading is not only explained by the time-of-day effect but is also...
The Chinese government implemented the payment system for plastic shopping bags in 2008 and 2020. This study aims to analyze consumers' perceptions and purchase willingness of plastic shopping bags. Using information technology...
With the rapid development of information technology, information security has been gaining attention. The International Organization for Standardization (ISO) has issued international standards and technical reports related to...
Video-based person re-identification (re-id) has recently attracted widespread attentions because extra space-time information and more appearance cues in videos can be used to improve the performance of image-based person...
The COVID-19 pandemic has heightened the necessity for pervasive data and system interoperability to manage healthcare information and knowledge. There is an urgent need to better understand the role of interoperability in...
This article examines the policy implementation literature using a text mining technique, known as a structural topic model (STM), to conduct a comprehensive analysis of 547 articles published by 11 major journals between 2000...
The proposed Energy East pipeline project has raised concerns about potential oil spills in Saint John, New Brunswick, due to increased tanker traffic. While environmental conditions such as strong tide and current could pose...
With the deepening of theoretical research and social practice, hospital employee performance management has developed into a mature knowledge system. Therefore, systematic review of the research results in this field is...
This study aims to integrate perceived risk into elaboration likelihood model, develop a comprehensive research model to explain dual routes of persuasive communication through various factors affecting individual acceptance and...
While career anchors have mainly studied in the US society; this study demonstrates the difference in the career anchors of the information technology/information system (IT/IS) personnel rooted in different cultures. The survey...