UNI-MB - logo
UMNIK - logo
 

Rezultati iskanja

Osnovno iskanje    Izbirno iskanje   
Iskalna
zahteva
Knjižnica

Trenutno NISTE avtorizirani za dostop do e-virov UM. Za polni dostop se PRIJAVITE.

1 2 3 4 5
zadetkov: 1.660
1.
  • Social media? It's serious!... Social media? It's serious! Understanding the dark side of social media
    Baccarella, Christian V.; Wagner, Timm F.; Kietzmann, Jan H. ... European management journal, 08/2018, Letnik: 36, Številka: 4
    Journal Article
    Recenzirano

    Research and practice have mostly focused on the “bright side” of social media, aiming to understand and help in leveraging the manifold opportunities afforded by this technology. However, it is ...
Celotno besedilo
2.
  • Technostress: Technological... Technostress: Technological Antecedents and Implications
    Ayyagari, Ramakrishna; Grover, Varun; Purvis, Russell MIS quarterly, 12/2011, Letnik: 35, Številka: 4
    Journal Article
    Recenzirano

    With the proliferation and ubiquity of information and communication technologies (ICTs), it is becoming imperative for individuals to constantly engage with these technologies in order to get work ...
Celotno besedilo
3.
  • Words matter: How privacy c... Words matter: How privacy concerns and conspiracy theories spread on twitter
    Visentin, Marco; Tuan, Annamaria; Di Domenico, Giandomenico Psychology & marketing, October 2021, 2021-10-00, 20211001, Letnik: 38, Številka: 10
    Journal Article
    Recenzirano
    Odprti dostop

    The use of contact‐tracing apps to curb the spreading of the COVID‐19 pandemic has stimulated social media debates on consumers' privacy concerns about the use and storage of sensitive data and on ...
Celotno besedilo

PDF
4.
  • Methods for a feminist tech... Methods for a feminist technoscience of information practice: Design justice and speculative futurities
    Floegel, Diana; Costello, Kaitlin L. Journal of the Association for Information Science and Technology, April 2022, 2022-04-00, Letnik: 73, Številka: 4
    Journal Article
    Recenzirano

    This article builds on the argument that feminist technoscience will advance information practice scholarship beyond its current limitations. These limitations reflect neoliberalism in the field of ...
Celotno besedilo
5.
  • The balancing mechanism of ... The balancing mechanism of social networking overuse and rational usage
    Yao, Jingjing; Cao, Xiongfei Computers in human behavior, October 2017, 2017-10-00, 20171001, Letnik: 75
    Journal Article
    Recenzirano

    Previous studies on excessive use of social networking services (SNSs) have relied on behavioral addiction theory to explain how users react when they face stress from overusing SNSs. Scholars have ...
Celotno besedilo
6.
  • Korenblum maximum principle... Korenblum maximum principle in mixed norm spaces
    Karapetrović, Boban Archiv der Mathematik, 05/2022, Letnik: 118, Številka: 5
    Journal Article
    Recenzirano

    It is well known that the Korenblum maximum principle holds in Bergman spaces A p if and only if p ≥ 1 . In this note, we improve this result by proving that the Korenblum maximum principle holds in ...
Celotno besedilo
7.
  • Number plate recognition on... Number plate recognition on vehicle using YOLO - Darknet
    Setiyono, Budi; Amini, Dyah Ayu; Sulistyaningrum, Dwi Ratna Journal of physics. Conference series, 03/2021, Letnik: 1821, Številka: 1
    Journal Article
    Recenzirano
    Odprti dostop

    Abstract Character recognition is one of the steps in the number plate recognition system. Character recognition is done to get text character data. The method used is YOLOv3 (You Only Look Once), ...
Celotno besedilo

PDF
8.
  • Enhancing the Description-t... Enhancing the Description-to-Behavior Fidelity in Android Apps with Privacy Policy
    Yu, Le; Luo, Xiapu; Qian, Chenxiong ... IEEE transactions on software engineering, 09/2018, Letnik: 44, Številka: 9
    Journal Article
    Recenzirano

    Since more than 96 percent of mobile malware targets the Android platform, various techniques based on static code analysis or dynamic behavior analysis have been proposed to detect malicious apps. ...
Celotno besedilo
9.
  • The privacy paradox applies... The privacy paradox applies to IoT devices too: A Saudi Arabian study
    Aleisa, Noura; Renaud, Karen; Bongiovanni, Ivano Computers & security, September 2020, 2020-09-00, 20200901, Letnik: 96
    Journal Article
    Recenzirano
    Odprti dostop

    The “privacy paradox” is the term used to describe the disconnect between self-reported privacy value attributions and actions actually taken to protect and preserve personal privacy. This phenomenon ...
Celotno besedilo

PDF
10.
  • I’ll Be Watching You: Shopp... I’ll Be Watching You: Shoppers’ Reactions to Perceptions of Being Watched by Employees
    Esmark, Carol L.; Noble, Stephanie M.; Breazeale, Michael J. Journal of retailing, 09/2017, Letnik: 93, Številka: 3
    Journal Article
    Recenzirano

    Display omitted •A model of privacy while shopping for embarrassing products is proposed.•Perceptions of being watched lead a shopper to feel less in control of his/her privacy.•Control of privacy ...
Celotno besedilo
1 2 3 4 5
zadetkov: 1.660

Nalaganje filtrov