Search

Your search keyword '"Computer users"' showing total 862 results

Search Constraints

Start Over You searched for: Descriptor "Computer users" Remove constraint Descriptor: "Computer users" Topic information technology Remove constraint Topic: information technology
862 results on '"Computer users"'

Search Results

1. Study of Eye Problems among Long Term Computer users in Ahmedabad City.

3. The Drivers in the Use of Online Whistle-Blowing Reporting Systems.

4. Wishful Thinking and IT Threat Avoidance: An Extension to the Technology Threat Avoidance Theory.

5. Rapid Information Technology Change, Coping Mechanisms, and the Emerging Technologies Group.

7. THE IMPACT OF COMPUTER GENERATED INFORMATION ON THE CHOICE ACTIVITY OF DECISION-MAKERS.

8. A Short-From Measure of User Information Satisfaction: A Psychometric Evaluation and Notes on Use.

9. An Investigation of the Effects of Age, Size, and Hardware Option on the Critical Success Factors Applicable to Information Centers.

10. A SYSTEMATIC APPROACH IN MANAGING POST-DEPLOYMENT SYSTEM CHANGES.

11. BEYOND STEREOTYPES OF IT PROFESSIONALS: IMPLICATIONS FOR IT HR PRACTICES.

12. A CLOSER LOOK AT ATTENTION TO DETAIL.

13. EXPERIENTIAL COMPUTING.

14. Augmented reality: a new way of seeing.

15. Who Are We?

16. ULTRA-HIGH-DENSITY DATA STORAGE.

17. ASSESSMENT OF SUITABILITY OF E-SERVICES FOR ILLITERATE USERS.

18. Recurrent spatio-temporal modeling of check-ins in location-based social networks.

19. A Measuring Method for User Similarity based on Interest Topic.

20. ASSISTING USERS IN OPEN DATA INFRASTRUCTURES: A MANAGEMENT PERSPECTIVE.

22. Digital eye strain: prevalence and associated factors among information technology professionals, Egypt

23. A Numerical Approach for Assigning a Reputation to Users of an IoT Framework.

24. Object Language and Impression Management.

25. Evaluating Personal Information Management Behaviors and Tools.

26. Wishful Thinking and IT Threat Avoidance: An Extension to the Technology Threat Avoidance Theory

27. Technology and Information Sharing in Disaster Relief.

28. Information technology service management models applied to medium and small organizations: A systematic literature review.

29. Impact of information and communication technology on child health.

30. Integrated dimensionality reduction technique for mixed-type data involving categorical values.

31. Scholars and learners: a case study of new library spaces at Indiana University.

32. Guaranteeing Rights for the User.

33. COMPARATIVE STUDY BETWEEN EXISTING CLOUD SERVICE PROVIDERS.

35. Calendar of Events.

36. NEITHER RAIN, NOR SLEET, NOR COMPUTER GLITCHES...

37. Guidelines Aimed at Reducing the Risks of User Acceptance Delay in the Context of an IT Service Project Management Plan.

38. Model checking as support for inspecting compliance to rules in flexible processes.

39. Media Processing Technology for Achieving Hospitality in Information Search.

40. The missing links: cultural, software, task and personal influences on computer self-efficacy.

41. A Hybrid Recommender System Based on User-Recommender Interaction.

42. Breaking the Myths of the IT Productivity Paradox.

43. Automatic Background Knowledge Selection for Matching Biomedical Ontologies.

44. Computer network security countermeasures based on big data

45. ITIL and the creation of a Service Management Office (SMO): a new challenge for IT professionals: An exploratory study of Latin American Companies.

46. Geek Jeremiads: Speaking the Crisis of Job Loss by Opposing Offshored and H-1B Labor.

47. Incident Response and User Awareness.

48. Inclusive Design in Practice: A Study of Participatory Design, Customer and User Involvement in Agile Software Development.

49. Are Fit Tables Really Talking? A Series of Experiments to Understand whether Fit Tables are Useful during Evolution Tasks.

50. DySy: Dynamic Symbolic Execution for Invariant Inference.

Catalog

Books, media, physical & digital resources