Browsing "JISTaP" byTitles :

All A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
or enter first few letters:
  • Sort by:
  • In order:
  • Results/Page
  • Authors/Record:

Showing results 272 to 283 of 283

This table browses all dspace content
FileIssue DateTitleAuthor(s)View
E1JSCH_2017_v5n1_6.pdf.jpg2017-03-30Understanding Information Culture: Conceptual and Implementation IssuesGillian Oliver1080
E1JSCH_2017_v5n4_26.pdf.jpg2017-12-29Understanding Information Sharing Among Scientists Through a Professional Online Community: Analyses on Interaction Patterns and ContentsEun-Ja ShinGuiohk LeeHeeyoon Choi997
Tan_Na_Duraisamy_v7n1_52-71.pdf.jpg2019-03-30Unified Psycholinguistic Framework: An Unobtrusive Psychological Analysis Approach Towards Insider Threat Prevention and DetectionTan, Sang-SangNa, Jin-CheonDuraisamy, Santhiya1051
E1JSCH_2017_v5n4_6.pdf.jpg2017-12-29Users' Understanding of Search Engine AdvertisementsDirk Lewandowski1117
Using Ontology to Represent Cultural Aspects of Local Products for Supporting Local Community Enterprise in Thailand.pdf.jpg2022-03-30Using Ontology to Represent Cultural Aspects of Local Products for Supporting Local Community Enterprise in ThailandPlirdpring, PhakharachRuangrajitpakorn, Taneth672
Using Practice Context Models to Knowledge Management in Proof-of-Concept Activities_ A Contribution of Knowledge Networks and Percolation Theory.pdf.jpg2021-03-30Using Practice Context Models to Knowledge Management in Proof-of-Concept Activities: A Contribution of Knowledge Networks and Percolation TheoryNeto, Antonio Jose RodriguesBorges, Maria ManuelRoque, Licinio911
Utilization of Log Data Reflecting User Information- Seeking Behavior in the Digital Library.pdf.jpg2022-03-30Utilization of Log Data Reflecting User Information- Seeking Behavior in the Digital LibraryLee, SeonheeLee, Jee Yeon706
Virtual Reality-Based Library User Education Program Development.pdf.jpg2021-12-30Virtual Reality-Based Library User Education Program DevelopmentLim, Seong-Kwan1564
E1JSCH_2016_v4n3_6.pdf.jpg2016-09-30Virtual World-Based Information Security Learning: Design and EvaluationJungwoo RyooDongwon LeeAngsana A. Techatassanasoontorn1104
E1JSCH_2017_v5n3_48.pdf.jpg2017-09-30Who are Tweeting Research Articles and Why?Tint Hla Hla HtooNa Jin-Cheon1056
Who Reads Indian and Chinese LIS Articles on Mendeley - Scoping and Comparing User Categories Through Altmetrics.pdf.jpg2021-12-30Who Reads Indian and Chinese LIS Articles on Mendeley? Scoping and Comparing User Categories Through AltmetricsVysakh, C.Babu, H. Rajendra1670
Word Embeddings-Based Pseudo Relevance Feedback Using Deep Averaging Networks for Arabic Document Retrieval.pdf.jpg2021-06-30Word Embeddings-Based Pseudo Relevance Feedback Using Deep Averaging Networks for Arabic Document RetrievalFarhan, Yasir HadiNoah, Shahrul Azman MohdMohd, MasnizahAtwan, Jaffar925
110 11 12 13 14 15

Browse