Akademska digitalna zbirka SLovenije - logo

Rezultati iskanja

Osnovno iskanje    Ukazno iskanje   

Trenutno NISTE avtorizirani za dostop do e-virov konzorcija SI. Za polni dostop se PRIJAVITE.

1 2 3 4
zadetkov: 31
1.
  • Evaluating replicability of... Evaluating replicability of laboratory experiments in economics
    Camerer, Colin F.; Dreber, Anna; Forsell, Eskil ... Science, 03/2016, Letnik: 351, Številka: 6280
    Journal Article
    Recenzirano
    Odprti dostop

    The replicability of some scientific findings has recently been called into question. To contribute data about replicability in economics, we replicated 18 studies published in the American Economic ...
Celotno besedilo
Dostopno za: BFBNIB, NMLJ, NUK, ODKLJ, PNG, SAZU, UL, UM, UPUK

PDF
2.
  • Evaluating the replicabilit... Evaluating the replicability of social science experiments in Nature and Science between 2010 and 2015
    Camerer, Colin F; Dreber, Anna; Holzmeister, Felix ... Nature human behaviour, 09/2018, Letnik: 2, Številka: 9
    Journal Article
    Recenzirano
    Odprti dostop

    Being able to replicate scientific findings is crucial for scientific progress . We replicate 21 systematically selected experimental studies in the social sciences published in Nature and Science ...
Celotno besedilo
Dostopno za: NUK, ODKLJ

PDF
3.
  • Measuring Source Credibilit... Measuring Source Credibility of Social Engineering Attackers on Facebook
    Algarni, Abdullah; Yue Xu; Taizan Chan 2016 49th Hawaii International Conference on System Sciences (HICSS), 01/2016
    Conference Proceeding, Journal Article
    Odprti dostop

    Past research has suggested that social networking sites are the most common source for social engineering-based attacks. Persuasion research shows that people are more likely to obey and accept a ...
Celotno besedilo
Dostopno za: IJS, NUK, UL, UM
4.
  • An empirical study on the s... An empirical study on the susceptibility to social engineering in social networking sites: the case of Facebook
    Algarni, Abdullah; Xu, Yue; Chan, Taizan European journal of information systems, 11/2017, Letnik: 26, Številka: 6
    Journal Article
    Recenzirano
    Odprti dostop

    Research suggests that social engineering attacks pose a significant security risk, with social networking sites (SNSs) being the most common source of these attacks. Recent studies showed that ...
Celotno besedilo
Dostopno za: BFBNIB, CEKLJ, GIS, IJS, KISLJ, NUK, PNG, UL, UM, UPUK

PDF
5.
  • Barriers to Formal IT Gover... Barriers to Formal IT Governance Practice -- Insights from a Qualitative Study
    Othman, M. F. I.; Taizan Chan 2013 46th Hawaii International Conference on System Sciences, 2013-Jan.
    Conference Proceeding

    IT Governance (ITG) continues to be a top priority for organizations, public and non-public. While the level of awareness towards ITG is evident, it is hardly manifested in practice. The purpose of ...
Celotno besedilo
Dostopno za: IJS, NUK, UL, UM
6.
  • Information support for hea... Information support for health management in regional Sri Lanka: Health managers' perspectives
    Ranasinghe, Kaduruwane Indika; Chan, Taizan; Yaralagadda, Prasad Health Information Management Journal, 10/2012, Letnik: 41, Številka: 3
    Journal Article
    Recenzirano
    Odprti dostop

    Good management, supported by accurate, timely and reliable health information, is vital for increasing the effectiveness of Health Information Systems (HIS). When it comes to managing the ...
Celotno besedilo
Dostopno za: DOBA, IZUM, KILJ, NUK, OILJ, PILJ, PNG, SAZU, SIK, UILJ, UKNU, UL, UM, UPUK, VSZLJ

PDF
7.
  • Re-conceptualizing Informat... Re-conceptualizing Information System Success: The IS-Impact Measurement Model
    Gable, Guy; Sedera, Darshana; Chan, Taizan Journal of the Association for Information Systems, 07/2008, Letnik: 9, Številka: 7
    Journal Article
    Recenzirano
    Odprti dostop

    This paper re-conceptualizes "information system success" as a formative, multidimensional index. Such a validated and widely accepted index would facilitate cumulative research on the impacts of IS, ...
Celotno besedilo
Dostopno za: CEKLJ, IZUM, KILJ, NUK, PILJ, SAZU, UL, UM, UPUK
8.
  • Discovery of dependency rel... Discovery of dependency relations in sequential data flow
    Aldahami, Abdulelah; Li, Yuefeng; Chan, Taizan Web Intelligence, 01/2017, Letnik: 15, Številka: 1
    Journal Article
    Recenzirano

    The idea of extracting knowledge from log data for both data mining and process mining emphasises data flow and relations among data items in the data. Unfortunately, challenges have been encountered ...
Celotno besedilo
Dostopno za: DOBA, IZUM, KILJ, NUK, PILJ, PNG, SAZU, UILJ, UKNU, UL, UM, UPUK
9.
  • Identification and Analysis... Identification and Analysis of Business and Software Services-A Consolidated Approach
    Kohlborn, T.; Korthaus, A.; Chan, T. ... IEEE transactions on services computing, 2009-Jan.-March, 2009-01-00, 20090101, Letnik: 2, Številka: 1
    Journal Article
    Recenzirano
    Odprti dostop

    Although the benefits of service orientation are prevalent in literature, a review, analysis, and evaluation of the 30 existing service analysis approaches presented in this paper have shown that a ...
Celotno besedilo
Dostopno za: IJS, NUK, UL
10.
  • Using a Flow Graph to Represent Data Flow and Dependency in Event Logs
    Aldahami, Abdulelah; Yuefeng Li; Taizan Chan 2015 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology (WI-IAT), 2015-Dec., Letnik: 1
    Conference Proceeding

    The idea of extracting knowledge in process mining is a descendant of data mining. Both mining disciplines emphasise data flow and relations among elements in the data. Unfortunately, challenges have ...
Celotno besedilo
Dostopno za: IJS, NUK, UL, UM
1 2 3 4
zadetkov: 31

Nalaganje filtrov