A New Multi-Attribute
Group Decision-Making Approach Based on Fermatean Fuzzy Power Hamy Mean
Operator and Novel Score Function........................................1
Authors: Lan Li & Chunliang Ji
E-Banking: An Empirical
Study on Customer Satisfaction......................27
Authors: Ajitha Angusamy, Cha Jie Yee & Jayanty Kuppusamy
An Empirical Study on the
Influence of Service Quality of Association on Customer Satisfaction: the
Moderating Effect of Willingness to Participate......................39
Author: Seung-Wan Ju
A Proposed Churn Window
for Non-Contractual Purchases......................57
Authors: Sunther Ganeson, Lew Sook Ling & Siti Fatimah Abdul Razak
Crisis Management during
the COVID-19 Pandemic: A Case Study of Ctrip......................69
Authors: Yuanzhao Song, Myeongcheol Choi, Hannearl Kim
Implementation Approach
of Unit and Integration Testing Method Based on Recent Advancements in
Functional Software Testing......................85
Authors: Zheng Yang Joel Tan, Mohammed Mahedi Hasa, Man Yi Wong, R Kanesaraj
Ramasamy
Unified Perspective of
Technology Readiness Index (TRI) and Technology Acceptance Model (TAM) for
Adoption of Digital Pills......................101
Authors: Tabe Ekouka Elvis & Ha-Kyun Kim
Cognitive Interview for
Knowledge Creation in IT Projects to Accelerate Digital
Innovation......................115
Authors: Soon Seng Tung, Magiswary Dorasamy & Ruzanna Ab Razak
Gap Analysis between Hype
Cycles and Trends in Digital Media......................130
Authors: Dong-Hoon Woo, Woon-Kyo Lee & Ja-Hee Kim
Integrated Marketing
Communications for Fintech Products: Empirical Study on Agribank eMobile
Banking by VNPAY......................147
Authors: Phan Minh Duc, Dang Tran Nam & Duong Ngoc Anh
Impact of Dynamic
Capability on Enterprise Growth Performance under Environmental
Dynamism......................175
Authors: Yan Chao & Yoonhee Kang
Security Risk Analysis
for Information Asset......................191
Authors: Muhammad Afif Fathullah & Anusuyah Subbarao
The Impact of IT
Governance Mechanism on Firm Performance: An Empirical
Study......................205
Authors: Ahmad Nurul Fajar & Mahfudz Amri
Behavioral Intention to
Use Cryptocurrency as an Electronic Payment in
Malaysia......................219
Authors: Kaniz Farhana & Saravanan Muthaiyah
Cashierless Checkout
Vision System for Smart Retail using Deep Learning......................232
Authors: Ren-Yi Lee, Sing-Yee Chua, Yen-Lung Lai, Tong-Yuen Chai, Sim Yee
Wai & Su-Cheng Haw
Improving Machine
Learning Algorithms for Breast Cancer Prediction......................251
Authors: Yoon-Teck Bau, Tishanthini Sasidaran, Chien-Le Goh
A Preliminary Study in
Rationalizing the Need for the Goldilocks Principle in Manufacturing
SMEs......................267
Authors: Jian Ai Yeow, Poh Kiat Ng, Yu Jin Ng
A Conceptual Game-based
Design Model: Game Elements for Enhancing User
Motivation......................281
Authors: Nur Ain Mohamad Yahaya, Dayang Rohaya Awang Rambli & Suziah
Sulaiman
An Integrated Model for
Predicting the User Continuance Intention towards Utilizing Open Government
Data......................295
Authors: Omar Al-Jamili, Huda Ibrahim & Rahayu Ahmad
The Influence of
Technology Support, Digital Literacy, Culture Intelligence, and Leadership
on Virtual Collaboration in University Settings....................324
Authors: Kustiyono, Daniel Manongga & Liely Suharti
Are Farmers Ready to
Switch Using Precision Agriculture.............347
Authors: Andi Wiliam, Mts Arief, Agustinus Bandur & Viany Utami Tjhin
Integrating PLS-SEM
with Importance Performance Matrix Analysis to Exploring the Role of
Provincial Competitiveness Index to Growth............365
Authors: Tam Ho Dan Doan, Quan Thai Thuong Le, Quyen Le Hoang Thuy To
Nguyen, Phong Thanh Nguyen & The Thi Ngoc Dang
Hybrid Pigeon Inspired
Optimizer-Gray Wolf Optimization for Network Intrusion Detection.....383
Authors: Sasikumar Gurumurthy, Hemalatha K. L., D. Pamela, Upendra Roy &
Vishwanath P.
Dirichlet Feature
Embedding with Adaptive Long Short Term Memory Model for Intrusion Detection
System.............398
Authors: R. Sivakami, G Uday Kiran, M. Arun, Leo Gertrude David & M. Manohar
A Technique of Data
Security using DNA Cryptography with Optimized Data Storage......412
Authors: M.K. Padmapriya & Pamela Vinitha Eric
|