Search Result Save to File Save as CSV
Your search for 41569 returns 4102 document(s)
Using Retweets When Shaping Our Online Persona: Topic Modeling Approach, Page 501-524
Author: Hilah Geva, Gal Oestreicher-Singer, and Maytal Saar-Tsechansky | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
When Do IT Security Investments Matter? Accounting for the Influence of Institutional Factors in the Context of Healthcare Data Breaches, Page 893-916
Author: Corey M. Angst, Emily S. Block, John D’Arcy, and Ken Kelley | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
What Users Do Besides Problem-Focused Coping When Facing IT Security Threats: An Emotion-Focused Coping Perspective, Page 373-394
Author: Huigang Liang, Yajiong Xue, Alain Pinsonneault, and Yu “Andy” Wu | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
the paradox of digital preservation, page 24
Author: Su-Shing Chen | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Rethinking the digital divide, page 108
Author: Laura Briggs | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Jalan baru ke dunia digital, page 50
Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Games with a purpose (GWAPs)
Author: Lafourcade, Mathieu; | Call Number: 268.6 Laf g | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
6502 games/ Rodnay Zaks
Author: Zaks, Rodnay; | Call Number: 005.133 Zak 6 | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Games programming/ Eric solomon
Author: Solomon, Eric; | Call Number: 794.8 Sol g | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Siapkan tanda tangan digital untuk e-government, Page 78
Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   1 2 3 4 5 6 7 8 9 10  Next