Past Issue
- Table of Contests
[Pages 0~0]
- The Effect of Cloud-based IT Architecture on IT Exploration and Exploitation: Enabling Role of Modularity and Virtuality
Insoo Son, Dongwon Lee, Gwanhoo Lee, Youngjin Yoo [Pages 240~257]
- To Reveal or Conceal? Understanding the Notion of Privacy among Individuals
Sana Ansari, Sumeet Gupta [Pages 258~273]
- Individual Differences in Online Privacy Concern
Yeolib Kim, Boreum Choi, Yoonhyuk Jung [Pages 274~289]
- The Mobile Wallet Explosion in Thailand: Factors towards Predicting Consumer Loyalty
Donald L. Amoroso, Pajaree Ackaradejruangsri [Pages 290~307]
- Predictive Analysis of Financial Fraud Detection using Azure and Spark ML
Priyanka Purushu, Niklas Melcher, Bhagyashree Bhagwat, Jongwook Woo [Pages 308~319]
- An Integrated Framework for Modeling the Influential Factors Affecting the Use of Voice-Enabled IoT Devices: A Case Study of Amazon Echo
Temidayo Oluwapelumi Shofolahan, Juyoung Kang [Pages 320~349]
- Table of Contents
[Pages 0~0]
- The Value of Personal Information: An Exploratory Study for Types of Personal Information and Its Value
Minjung Park, Sangmi Chai [Pages 154~166]
- The Role of IT Usage in Mediating the Relationship between Knowledge Sharing and Academics Performance
Naief G Azyabi [Pages 167~182]
¢¸1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10¢º