A New Multi-Attribute Group Decision-Making Approach Based on Fermatean Fuzzy Power Hamy Mean Operator and Novel Score Function........................................1 Authors: Lan Li & Chunliang Ji
E-Banking: An Empirical Study on Customer Satisfaction......................27 Authors: Ajitha Angusamy, Cha Jie Yee & Jayanty Kuppusamy
An Empirical Study on the Influence of Service Quality of Association on Customer Satisfaction: the Moderating Effect of Willingness to Participate......................39 Author: Seung-Wan Ju
A Proposed Churn Window for Non-Contractual Purchases......................57 Authors: Sunther Ganeson, Lew Sook Ling & Siti Fatimah Abdul Razak
Crisis Management during the COVID-19 Pandemic: A Case Study of Ctrip......................69 Authors: Yuanzhao Song, Myeongcheol Choi, Hannearl Kim
Implementation Approach of Unit and Integration Testing Method Based on Recent Advancements in Functional Software Testing......................85 Authors: Zheng Yang Joel Tan, Mohammed Mahedi Hasa, Man Yi Wong, R Kanesaraj Ramasamy
Unified Perspective of Technology Readiness Index (TRI) and Technology Acceptance Model (TAM) for Adoption of Digital Pills......................101 Authors: Tabe Ekouka Elvis & Ha-Kyun Kim
Cognitive Interview for Knowledge Creation in IT Projects to Accelerate Digital Innovation......................115 Authors: Soon Seng Tung, Magiswary Dorasamy & Ruzanna Ab Razak
Gap Analysis between Hype Cycles and Trends in Digital Media......................130 Authors: Dong-Hoon Woo, Woon-Kyo Lee & Ja-Hee Kim
Integrated Marketing Communications for Fintech Products: Empirical Study on Agribank eMobile Banking by VNPAY......................147 Authors: Phan Minh Duc, Dang Tran Nam & Duong Ngoc Anh
Impact of Dynamic Capability on Enterprise Growth Performance under Environmental Dynamism......................175 Authors: Yan Chao & Yoonhee Kang
Security Risk Analysis for Information Asset......................191 Authors: Muhammad Afif Fathullah & Anusuyah Subbarao
The Impact of IT Governance Mechanism on Firm Performance: An Empirical Study......................205 Authors: Ahmad Nurul Fajar & Mahfudz Amri
Behavioral Intention to Use Cryptocurrency as an Electronic Payment in Malaysia......................219 Authors: Kaniz Farhana & Saravanan Muthaiyah
Cashierless Checkout Vision System for Smart Retail using Deep Learning......................232 Authors: Ren-Yi Lee, Sing-Yee Chua, Yen-Lung Lai, Tong-Yuen Chai, Sim Yee Wai & Su-Cheng Haw
Improving Machine Learning Algorithms for Breast Cancer Prediction......................251 Authors: Yoon-Teck Bau, Tishanthini Sasidaran, Chien-Le Goh
A Preliminary Study in Rationalizing the Need for the Goldilocks Principle in Manufacturing SMEs......................267 Authors: Jian Ai Yeow, Poh Kiat Ng, Yu Jin Ng
A Conceptual Game-based Design Model: Game Elements for Enhancing User Motivation......................281 Authors: Nur Ain Mohamad Yahaya, Dayang Rohaya Awang Rambli & Suziah Sulaiman
An Integrated Model for Predicting the User Continuance Intention towards Utilizing Open Government Data......................295
Authors: Omar Al-Jamili, Huda Ibrahim & Rahayu Ahmad
The Influence of Technology Support, Digital Literacy, Culture Intelligence, and Leadership on Virtual Collaboration in University Settings....................324 Authors: Kustiyono, Daniel Manongga & Liely Suharti
Are Farmers Ready to Switch Using Precision Agriculture.............347 Authors: Andi Wiliam, Mts Arief, Agustinus Bandur & Viany Utami Tjhin
Integrating PLS-SEM with Importance Performance Matrix Analysis to Exploring the Role of Provincial Competitiveness Index to Growth............365 Authors: Tam Ho Dan Doan, Quan Thai Thuong Le, Quyen Le Hoang Thuy To Nguyen, Phong Thanh Nguyen & The Thi Ngoc Dang
Hybrid Pigeon Inspired Optimizer-Gray Wolf Optimization for Network Intrusion Detection.....383 Authors: Sasikumar Gurumurthy, Hemalatha K. L., D. Pamela, Upendra Roy & Vishwanath P.
Dirichlet Feature Embedding with Adaptive Long Short Term Memory Model for Intrusion Detection System.............398 Authors: R. Sivakami, G Uday Kiran, M. Arun, Leo Gertrude David & M. Manohar
A Technique of Data Security using DNA Cryptography with Optimized Data Storage......412 Authors: M.K. Padmapriya & Pamela Vinitha Eric