Suchergebnisse
Katalog
Mehr
Suchmaske
Suchergebnisse einschränken oder erweitern
Aktive Suchfilter
Weniger Treffer
Art der Quelle
Thema
- security 6 Treffer
- 신뢰 5 Treffer
- access control 2 Treffer
- cloud computing 2 Treffer
- e-commerce 2 Treffer
-
45 weitere Werte:
- privacy 2 Treffer
- privacy protection 2 Treffer
- reputation 2 Treffer
- satisfaction 2 Treffer
- vanet 2 Treffer
- 만족 2 Treffer
- acceptance 1 Treffer
- affective commitment 1 Treffer
- analytic hierarchy 1 Treffer
- aodv 1 Treffer
- authentication 1 Treffer
- autonomy 1 Treffer
- behavioral control 1 Treffer
- cloud security 1 Treffer
- cognitive knowledge 1 Treffer
- consumer delight 1 Treffer
- consumer knowledge 1 Treffer
- convenience 1 Treffer
- e-loyalty 1 Treffer
- experience sharing 1 Treffer
- flow experience 1 Treffer
- fuzzy clustering 1 Treffer
- heap 1 Treffer
- heterogeneity 1 Treffer
- hmr 1 Treffer
- hotel 1 Treffer
- idt(innovation diffusion theory) 1 Treffer
- immersion 1 Treffer
- information asymmetry 1 Treffer
- information security 1 Treffer
- information sharing 1 Treffer
- information theory 1 Treffer
- keys 1 Treffer
- leader-member exchange 1 Treffer
- malicious attack 1 Treffer
- mobile banking service 1 Treffer
- mobile cloud computing 1 Treffer
- mobile p2p 1 Treffer
- multi-domain 1 Treffer
- opportunism 1 Treffer
- organizational citizenship behavior 1 Treffer
- organizational support 1 Treffer
- perceived ease of use 1 Treffer
- practical knowledge 1 Treffer
- qos 1 Treffer
Verlag
Publikation
- international journal of security and its applications 13 Treffer
- international journal of hybrid information technology 2 Treffer
- jitam 2 Treffer
- international journal of u- and e- service, science and technology 1 Treffer
- the international journal of advanced smart convergence 1 Treffer
- 7 weitere Werte:
Inhaltsanbieter
26 Treffer
-
In: The International Journal of Advanced Smart Convergence, Jg. 12 (2023-12-31), Heft 4, S. 224-236academicJournalZugriff:
-
In: 한국스포츠학회지, Jg. 17 (2019-12-31), Heft 4, S. 257-267academicJournalZugriff:
-
In: International Journal of u- and e- Service, Science and Technology, Jg. 9 (2016-04-30), Heft 4, S. 175-184academicJournalZugriff:
-
In: 국제경영리뷰, Jg. 17 (2013-06-30), Heft 2, S. 141-164academicJournalZugriff:
-
In: JITAM, Jg. 19 (2012-06-30), Heft 2, S. 17-38academicJournalZugriff:
-
In: JITAM, Jg. 17 (2010-09-30), Heft 3, S. 121-134academicJournalZugriff:
-
In: 소비자정책교육연구, Jg. 16 (2020-03-30), Heft 1, S. 89-108academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-12-31), Heft 12, S. 283-288academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-12-31), Heft 12, S. 153-172academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-11-30), Heft 11, S. 187-200academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-04-30), Heft 4, S. 63-70academicJournalZugriff:
-
In: International Journal of Hybrid Information Technology, Jg. 8 (2015-07-30), Heft 7, S. 335-344academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 9 (2015-04-30), Heft 4, S. 107-116academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 9 (2015-03-30), Heft 3, S. 113-120academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 8 (2014-12-30), Heft 6, S. 375-388academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 8 (2014-09-30), Heft 5, S. 149-160academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 7 (2013-05-30), Heft 3, S. 259-270academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 7 (2013-05-30), Heft 3, S. 85-98academicJournalZugriff:
-
In: 정보화연구, Jg. 9 (2012-12-31), Heft 4, S. 365-376academicJournalZugriff:
-
In: 동북아관광연구, Jg. 8 (2012-11-30), Heft 4, S. 51-68academicJournalZugriff: