Home > Publications

Publications

41076 - 41100 out of 42,821Page size: 25
  1. Published

    Use of Satisfaction-Satisfaction Matrix (SSM) to evaluate E-Government services from the perspective of Japanese citizens and government service providers

    Wong, K., Nishimoto, H., Nishigaki, Y. & Jackson, S., 2013, 24th Australasian Conference on Information Systems, Melbourne, AU, 04 - 06 Dec.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  2. Published

    Use of Satisfaction‑Satisfaction Matrix (SSM) to Evaluate Japanese E‑Government Services

    Wong, M. S., Nishimoto, H., Nishigaki, Y. & Jackson, S., Jul 2017, In: Electronic Journal of Information Systems Evaluation. 20, 1, p. 3-10 8 p.

    Research output: Contribution to journalArticlepeer-review

  3. E-pub ahead of print

    Use of Small Animal Models for Duchenne and Parameters to Assess Efficiency upon Antisense Treatment

    Lu-Nguyen, N., Malerba, A. & Popplewell, L., 25 Feb 2022, (E-pub ahead of print) In: Methods in Molecular Biology. 2434, p. 301-313 13 p.

    Research output: Contribution to journalArticlepeer-review

  4. Published

    Use of Systematic, Palaeoflood and Historical data for the improvement of flood risk estimation. Review of scientifc methods

    Benito, G., Lang, M., Barriendos, M., Llasat, M-C., Francés, F., Ouarda, T., Thorndycraft, V., Enzel, Y., Bardossy, A., Coeur, D. & Bobée, B., 2004, In: Natural Hazards. 31, p. 623-643

    Research output: Contribution to journalArticlepeer-review

  5. Published

    Useful Scientific Theories are Useful: A Reply to Rouder, Pratte and Morey (2010).

    Wixted, J. & Mickes, L., 2010, In: Psychonomic Bulletin and Review.

    Research output: Contribution to journalComment/debatepeer-review

  6. Published

    User acceptance of electronic commerce: lessons learned from the Bled eConference

    van der Heijden, H., 2012, 25th Special Anniversary Proceedings of the Bled eConference,. Bled, Slovenia

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  7. Published

    User acceptance of emergency alert technology: A case study

    Wu, P. F., 1 Jan 2009, ISCRAM 2009 - 6th International Conference on Information Systems for Crisis Response and Management: Boundary Spanning Initiatives and New Perspectives. Information Systems for Crisis Response and Management, ISCRAM

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  8. Published

    User acceptance of hedonic information systems

    van der Heijden, H., Dec 2004, In: MIS Quarterly. 28, 4, p. 695-704

    Research output: Contribution to journalArticlepeer-review

  9. Published

    User Access Privacy in OAuth 2.0 and OpenID Connect

    Li, W. & Mitchell, C. J., 22 Oct 2020, Proceedings of 2020 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW). IEEE Press, p. 664-672 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  10. Published

    User Centric Security Model for Tamper-Resistant Devices

    Akram, R. N., Markantonakis, K. & Mayes, K., 1 Oct 2011, 8th IEEE International Conference on e-Business Engineering (ICEBE 2011). Li, J. & Chung, J-Y. (eds.). IEEE Computer Society Press

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  11. Published

    User needs in sustainability accounting: Perspectives of stakeholders in Ireland

    O'Dwyer, B., Unerman, J. & Hession, E., 2005, In: European Accounting Review. 14, 4, p. 759-787

    Research output: Contribution to journalArticlepeer-review

  12. Published

    User perspective of DITIS: Virtual collaborative teams for home-healthcare

    Pitsillides, B., Pitsillides, A., Samaras, G., Andreou, P., Georgiadis, D., Christodoulou, E. & Panteli, N., 2004, Studies in Health Technology and Informatics. Vol. 100. p. 205-216 12 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  13. Published

    User Preference Analysis of Internet Social Media services

    Pant, V., Harindranath, G. & Wagner, W. P., 13 Jan 2016, 2015 International Conference on Information Resource Management (Conf-IRM), Ottawa, Canada, May.. Vol. 34.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  14. Published

    User satisfaction evaluation of Malaysian e-government education services

    Wong, M. S. & Jackson, S., 5 Feb 2018, 23rd IEEE International Technology Management Conference, Madeira Island, Portugal. IEEE, p. 1-7 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  15. Published

    User-friendly and certificate-free grid security infrastructure

    Crampton, J., Lim, H. W., Paterson, K. G. & Price, G., 2011, In: International Journal of Information Security. 10, 3, p. 137-153 17 p.

    Research output: Contribution to journalArticlepeer-review

  16. Published

    User-Generated Place Brand Equity on Twitter: The Dynamics of Brand Associations in Social Media.

    Andéhn, M., Kazeminia, A., Lucarelli, A. & Sevin, E., 2014, In: Place Branding and Public Diplomacy. 10, 2, p. 132-144

    Research output: Contribution to journalArticlepeer-review

  17. Unpublished

    User-generated Video as a New Genre of Documentary

    Said Mahfouz, M., 2012, (Unpublished) 198 p.

    Research output: ThesisDoctoral Thesis

  18. Published

    U-series isochron dating of immature and mature calcretes as a basis for constructing Quaternary landform chronologies: Examples from the Sorbas basin, southeast Spain

    Candy, I., Black, S. & Sellwood, B., 2005, In: Quaternary Research. 64, p. 100-111 12 p.

    Research output: Contribution to journalArticlepeer-review

  19. Published

    User's guide to cryptography and standards

    Dent, A. W. & Mitchell, C. J., 2005, Artech House.

    Research output: Book/ReportBook

  20. Published

    'Users Rights and the Probation Service: some opportunities and obstacles'

    Broad, B. & Denney, D., 1996, In: The Howard Journal of Criminal Justice. 35, 1, p. 61-76.

    Research output: Contribution to journalArticlepeer-review

  21. Published

    Uses and misuses of meta-analysis in plant ecology

    Koricheva, J. & Gurevitch, J., 2014, In: Journal of Ecology. 102, p. 828–844

    Research output: Contribution to journalArticlepeer-review

  22. Published

    Uses of the operatic canon: Verdi and Wagner

    Berry, M. & Cormac, N., Aug 2020, The Oxford Handbook of the Operatic Canon. Oxford University Press

    Research output: Chapter in Book/Report/Conference proceedingChapter

  23. Published

    Uses, benefits and challenges of using rural community telecentres as tools for development: the Case of Vikwa Community Telecentre in Kasungu, Malawi

    Kapondera, S. K. & Namusanya, D. M., 2017, In: Journal of Development and Communication Studies. 5, 1, p. 1-21 21 p.

    Research output: Contribution to journalArticlepeer-review

  24. Published

    Using 3G network components to enable NFC mobile transactions and authentication

    Chen, W., Hancke, G., Mayes, K., Lien, Y. & Chiu, J-H., 1 Dec 2010, Progress in Informatics and Computing (PIC), 2010 IEEE International Conference on. IEEE COMPUTER SOC, Vol. 1. p. 441 -448

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  25. Forthcoming