Search

Results: 30
IoT Privacy and Security
Privacy and security are among the significant challenges of the Internet of Things (IoT). Improper device updates, lack of efficient and robust security protocols, user unawareness, and famous active device monitoring are among...
IoT Privacy and Security
Privacy and security are among the significant challenges of the Internet of Things (IoT). Improper device updates, lack of efficient and robust security protocols, user unawareness, and famous active device monitoring are among...
IoT Privacy and Security
Privacy and security are among the significant challenges of the Internet of Things (IoT). Improper device updates, lack of efficient and robust security protocols, user unawareness, and famous active device monitoring are among...
On the Micro-Colonial
Fadi Abou-Rihan
Nov 12, 2021
I want to give him a name, one that extends beyond the clinical conventions of the arbitrary and anonymizing initial, a name that safeguards the confi- dentiality of the analytic space as it sheds light on the why and the what...
On the Micro-Colonial
Fadi Abou-Rihan
Nov 12, 2021
I want to give him a name, one that extends beyond the clinical conventions of the arbitrary and anonymizing initial, a name that safeguards the confi- dentiality of the analytic space as it sheds light on the why and the what...
Data Analytics in the Pharmacology Domain
Data mining approaches such as natural language processing play a fundamental role in the healthcare sector and, exclusively, the pharmacology domain. The substantial feedback and experiences shared by the patients on different...
Consumer Intention Toward Participation in Proximity Marketing
This study investigates the factors affecting consumers' attitudes toward proximity marketing and their participation intention. An online survey was conducted in the USA to test the research hypotheses, and the data were...
Determinants of Employees' E-HRM Continuous Intention to Use
This work intends to examine the determinants of employees' continuous intention to utilize electronic human resource management (e-HRM) based on the technology continuous theory. Furthermore, it scrutinizes the direct and...
Privacy Behavior in Smart Cities
In this article, the authors present exploratory research about privacy behaviour in a smart city. They ask if and why people share personal data in a smart city environment. They designed a gamified survey that offers realistic...
The Psychological Impact of the COVID-19 Pandemic on Jordanian Healthcare Workers
Introduction: Healthcare workers face incomparable work and psychological demands that are amplified throughout the COVID-19 pandemic. Aim: This study aimed to investigate the psychological impact of the COVID-19 pandemic on...
Evaluating Usability and User Experience Amid COVID-19
This research evaluates e-commerce platforms (ECP) amid the COVID-19 pandemic and investigates the relationship between usability and user experience (UX) and e-commerce platforms performance (ECPP) by testing online customer's...
Crime Analyses Using Data Analytics
One potential approach for crime analysis that has shown promising results is data analytics, particularly descriptive and predictive techniques. Data analytics can explore former criminal incidents seeking hidden correlations...
The Effect of Brand Heritage on Social Commerce Site Privacy Risk, Brand Equity, and Brand Advocacy
This study applies the Stimuli-Organism-Response (S-O-R) Theory to examine the impact of brand heritage of social commerce sites on consumers' perceived privacy risk, and the impact of this perceived risk on brand equity and...
Utilization of Transfer Learning Model in Detecting COVID-19 Cases From Chest X-Ray Images
Diagnosis of COVID-19 pneumonia using patients’ chest X-Ray images is new but yet important task in the field of medicine. Researchers from different parts of the globe have developed many deep learning models to classify...

|<

<

1

2

>

>|