


default search action
Internet Research, Volume 16
Volume 16, Number 1, 2006
- Kathryn Waite

:
Task scenario effects on bank web site expectations. 7-22 - Marie-Claude Boudreau

, Richard T. Watson:
Internet advertising strategy alignment. 23-37 - Evangelos Moustakas

, C. Ranganathan, Penny Duquenoy:
E-mail marketing at the crossroads: A stakeholder analysis of unsolicited commercial e-mail (spam). 38-52 - Paula M. C. Swatman, Cornelia C. Krueger, Kornelia van der Beek:

The changing digital content landscape: An evaluation of e-business model development in European online news and music. 53-80 - Tom M. Y. Lin, Heng-Hui Wu, Chun-Wei Liao, Tzu-Hsin Liu:

Why are some e-mails forwarded and others not? 81-93 - Ana Rosa del Aguila Obra

, Antonio Padilla-Meléndez
:
Organizational factors affecting Internet technology adoption. 94-110
Volume 16, Number 2, 2006
- Vicente Benjumea

, Javier López
, José M. Troya:
Anonymous attribute certificates based on traceable signatures. 120-139 - Evangelia Kavakli, Christos Kalloniatis, Pericles Loucopoulos

, Stefanos Gritzalis
:
Incorporating privacy requirements into the system design process: The PriS conceptual framework. 140-158 - Krzysztof Piotrowski

, Peter Langendörfer
, Oliver Maye, Zoya Dyka
:
Protecting privacy in e-cash schemes by securing hidden identity approaches against statistical attacks. 159-169 - Leonidas Kazatzopoulos, Constantinos Delakouridis, Giannis F. Marias, Panagiotis Georgiadis:

An incentive-based architecture to enable privacy in dynamic environments. 171-189 - Aameek Singh, Bugra Gedik, Ling Liu:

Agyaat: mutual anonymity over structured P2P networks. 189-212 - Jinqiao Shi, Binxing Fang, Li-Jie Shao:

n-1) attack.">Regroup-And-Go mixes to counter the (n-1) attack. 213-223
Volume 16, Number 3, 2006
- Carlos Flavián

, Raquel Gurrea:
The choice of digital newspapers: influence of reader goals and user experience. 231-247 - Mamata Jenamani

, Pratap K. J. Mohapatra, Sujoy Ghose:
Design benchmarking, user behavior analysis and link-structure personalization in commercial web sites. 248-266 - Pradeep K. Korgaonkar

, Ronnie Silverblatt, Tulay Girard:
Online retailing, product classifications, and consumer preferences. 267-288 - Matthew K. O. Lee

, Christy M. K. Cheung
, Kai H. Lim
, Choon-Ling Sia
:
Understanding customer knowledge sharing in web-based discussion boards: An exploratory study. 289-303 - Katariina Mäenpää:

Clustering the consumers on the basis of their perceptions of the Internet banking services. 304-322 - Huseyin Cenk Özmutlu, Fatih Çavdur

, Seda Özmutlu:
Automatic new topic identification in search engine transaction logs. 323-338 - Jennifer E. Rowley:

An analysis of the e-service literature: towards a research agenda. 339-359
Volume 16, Number 4, 2006
- Hsin-Pin Fu, Tien-Hsiang Chang, Pei Chao, Chyou-Huey Chiou:

A collaborative model for service provision by multiple public-sector agencies. 365-379 - Carla Ruiz-Mafé, Silvia Sanz-Blas:

Explaining Internet dependency: An exploratory study of future purchase intention of Spanish Internet users. 380-397 - Rong-An Shang

, Yu-Chen Chen, Hsueh-Jung Liao:
The value of participation in virtual consumer communities on brand loyalty. 398-418 - Amanda Spink, Bernard J. Jansen

, Vinish Kathuria, Sherry Koshman:
Overlap among major web search engines. 419-426 - Yu-Hui Tao, Chu-Chen Rosa Yeh, Sheng-I Sun:

Improving training needs assessment processes via the Internet: system design and qualitative study. 427-449 - Pablo Zoghbi Manrique de Lara

, Domingo Verano Tacoronte
, Jyh-Ming Ting Ding:
Do current anti-cyberloafing disciplinary practices have a replica in research findings?: A study of the effects of coercive strategies on workplace Internet misuse. 450-467
Volume 16, Number 5, 2006
- Leisheng Peng, Duminda Wijesekera, Thomas C. Wingfield, James Bret Michael:

An ontology-based distributed whiteboard to determine legal responses to online cyber attacks. 475-490 - Michael Hafner, Ruth Breu, Berthold Agreiter, Andrea Nowak:

Sectet: an extensible framework for the realization of secure inter-organizational workflows. 491-506 - Charlott Eliasson, André Zúquete

:
An electronic voting system supporting vote weights. 507-518 - David Garcia Rosado

, Carlos Gutiérrez, Eduardo Fernández-Medina
, Mario Piattini
:
Security patterns and requirements for internet-based applications. 519-536 - Gi Woong Yun, Jay Ford, Robert P. Hawkins, Suzanne Pingree, Fiona McTavish, David H. Gustafson, Haile Berhe:

On the validity of client-side vs server-side web log data analysis. 537-552 - Dong Hee Shin:

Distributed inter-organizational systems and innovation processes. 553-572

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














