Your search for 20605 returns 5649 document(s) |
The differential use and effect of knowledge-based system explanations in novice and expert judgement decisions, page 79-97 |
Author: Vicky Arnold, Nicole Clark, Philip A. Collier, Stewart A. Leech, and Steve G. Sutton | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
The Business of being a user: the role of the reference actor in shaping packaged enterprise system acquisition and development , page 473-496 |
Author: Neil Pollock and Sampsa Hyysalo | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Distributed Tuning of Boundary Resources: The Case of Apple’s iOS Service System, page 217-243 |
Author: Ben Eaton, Silvia Elaluf-Calderwood, Carsten Sorensen, and Yougnjin Yoo | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Transfiguration Work and the System of Transfiguration: How Employees Represent and Misrepresent Their Work, Page 873-894 |
Author: Joao Cunha and Andrea Carugati | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
System Dynamics Modeling for Information Systems Research: Theory of Development and Practical Application, Page 1303-1329 |
Author: Yulin Fang, Kai H. Lim, Ying Qian, and Bo Feng | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Knowledge Management System Use and Job Performance: A Multilevel Contingency Model, Page 811-840 |
Author: Xiaojun Zhang | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Explaining Post-Implementation Employee System Use and Job Performance: Impacts of the Content and Source of Social Network Ties, Page 917-936 |
Author: Tracy Ann Sykes and Viswanath Venkatesh | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Formal analysis of an authentication protocol for UMTS (Universal Mobile Telecommunications systems) Using AVISPA |
Author: Ilham W. Kurnia; L. Yohanes Stefanus; Ari Saptawijaya | Call Number: Jurnal Ilmu Komputer dan Informasi (JIKI) Vol. 1 No. 2 Juni 2008 | Type: UI-ana Indek Artikel
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Secure smartcard-based fingerprint authentication using gabor filter and fuzzy vault, Hal. 442-446 |
Author: Rifki Sadikin, Esa Prakasa; | Call Number: SEM-276 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Media-intependent watermarking classification and need for combining digital video and audio watermarking for media authentication, Hal. 62-67 |
Author: Jana Dittmann, Anirban Mukherjee; Martin Steinebach; | Call Number: SEM-259 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|