Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content
This study presents a conceptual framework that combines perceived ease of use, perceived usefulness, innovativeness and trust in order to examine their influence on the mobile services’ adoption intention in the Greek environment. A... more
    • by 
    • Mobile Technology
    • by 
    •   4  
      Information SystemsMarketingSEMElectronic Commerce
    • by  and +1
    •   4  
      Development EconomicsMigrationNetworksPanel Data
    • by  and +1
    •   3  
      Information SystemsMarketingElectronic Commerce
    • by 
    • Information Systems and Business Analytics
    • by 
    • Strategic Innovative Marketing
    • by 
    •   2  
      Information SystemsMarketing
    • by 
    •   6  
      Computer ScienceDevelopment EconomicsMigrationNetworks
COVID-19 pandemic crisis has brought extraordinary changes to almost all human activities. This unfamiliar situation has affected, among others, the working conditions, under which employees should keep doing their job while protecting... more
    • by 
    •   7  
      BusinessMarketingPublic RelationsBusiness Management
The operational characteristics of ubiquitous computing environments (UbiCom) generate new access control requirements which existing classical access control models fail to support efficiently. However, the Usage Control (UCON) family of... more
    • by  and +2
    •   15  
      Machine LearningData MiningUbiquitous ComputingAccess Control
The security related characteristics of entities, the contextual information that describes them and the previous or concurrent usages exercised in the system are the criteria that the Usage CONtrol (UCON) family of models utilizes in the... more
    • by  and +2
    •   4  
      Access ControlUsage ControlUCONUseCON
Usage CONtrol (UCON) is a next generation access control model enhanced with capabilities presented in trust and digital rights management. However, modern computing environments are usually introducing complex usage scenarios. Such a... more
    • by  and +2
    •   6  
      Ubiquitous ComputingAccess ControlComputer SecurityUsage Control
    • by 
    •   13  
      Machine LearningData MiningAccess ControlCloud Computing
    • by 
    • by 
    • by 
    • by 
    • by 
    • by 
    • by