A framework that delineates the relationships between learner control and learning effectiveness is absent. This study aims to fill this void. Unlike previous research, this study...
1 Ensuring the accuracy of intelligence assessments is made difficult by the pervasiveness of uncertainty in intelligence information and the demand to fuse information from multip...
In recent years, peer-to-peer systems have become more and more popular, especially with some successful applications like Napter, Kazaa and edoney. However, how to motivate user ...
The concept of relevance has been heatedly debated in last decade. Not satisfied with the narrow and technical definition of system relevance, researchers turn to the subjective a...
Web content mining is intended to help people discover valuable information from large amount of unstructured data on the web. Movie review mining classifies movie reviews into tw...
This study explores the readiness factors for the adoption of Internet-based inter-organizational systems (IOS) via a case analysis of fifteen Taiwanese firms. By proposing a thre...
While dedicated technologies such as e.g., Sun’s J2ME MIDP offer a simple programming model for mobile applications, appropriate support for modularizing the implementation of t...
1 On the Internet, digitally active small and medium sized enterprises (SME) face numerous security risks. When SMEs join networks, business ideas and malicious activities may inte...