Update search
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
NARROW
Format
Journal
Type
Date
Availability
1-4 of 4
Keywords: Machine learning
Close
Follow your search
Access your saved searches in your account
Would you like to receive an alert when new items match your search?
Sort by
Journal Articles
Classification of discussants on cyber-violence incidents
Available to Purchase
Journal:
Information Technology & People
Information Technology & People (2026) 39 (3): 1197–1223.
Published: 01 July 2025
... thematic characteristics, and subjective emotional characteristics. It then employs a range of classification techniques—including traditional machine learning, deep learning, ensemble methods, and hybrid models—to perform group classification of discussants. Findings The best-performing model achieves...
Journal Articles
Explanatory and predictive analysis of smartphone security using protection motivation theory: a hybrid SEM-AI approach
Available to Purchase
Journal:
Information Technology & People
Information Technology & People (2025) 38 (4): 2041–2068.
Published: 28 May 2024
... Artificial intelligence Machine learning The literature review in this study comprises of smartphone security research in terms of Bring Your Own Device (BYOD) security policy compliance and smartphone security in general settings. In order to capture smartphone security studies extensively...
Journal Articles
Artificial intelligence (AI) for user experience (UX) design: a systematic literature review and future research agenda
Available to Purchase
Journal:
Information Technology & People
Information Technology & People (2024) 37 (6): 2324–2352.
Published: 29 August 2023
... rights only Artificial intelligence Machine learning User experience User interface Design User-centred design process Systematic literature review When developing a digital artefact or service, designers need to create an overall user experience (UX) that meets end-user requirements...
Journal Articles
E-book adoption behaviors through an online sharing platform: A multi-relational network perspective
Available to Purchase
Journal:
Information Technology & People
Information Technology & People (2020) 33 (3): 1011–1035.
Published: 03 September 2019
... of user-generated products on the platform. Design/methodology/approach The study conducted multi-relational network analyses of five different sub-networks in identifying influential factors for e-book adoption. Meanwhile, the study adopted machine learning methods with different classification...
