Behaviour & Information Technology
IF
1.78
Papers
2196
Papers 2278
1 page of 228 pages (2,278 results)
Newest
Understanding users' individual differences may provide clues to help identify computer users who are prone to act insecurely. We examine factors that impact home users' reported computer security ...
Source
Billion-dollar investment has been made globally in different industries, and hence, protection of organisational assets against theft or leakage of confidential information becomes a prime objecti...
Source
A smart bracelet that reacts to a person's heartbeat. A smart bench that invites passers-by to sit close. These and others are smart things, part of the Internet of Things (IoT) and people's lives....
Source
#1Muneeb Imtiaz Ahmad (Swansea University)H-Index: 8
#2Yuan Gao (Uppsala University)
Last. Omar Mubin (USYD: University of Sydney)H-Index: 18
view all 5 authors...
In this paper, we propose a reinforcement learning (RL) mechanism for social robots to select an action based on users’ learning performance and social engagement. We applied this behavior selectio...
Source
#1Thomas Herrmann (RUB: Ruhr University Bochum)H-Index: 40
#2Isa Jahnke (MU: University of Missouri)H-Index: 18
Last. Alexander Nolte (UT: University of Tartu)H-Index: 9
view all 3 authors...
With ubiquitous, mobile computing, health care systems, and smart factories, socio-technical phenomena continue to emerge that challenge traditional design and evaluation methods. We perceive such ...
Source
#1Sang-Soo Kim (Yong In University)H-Index: 4
#2Yong Jin Kim (Sogang University)H-Index: 54
Under today’s complex and ever-changing regulatory environment, only forcing employees into compliance by wielding control or imposing punishment does not automatically lead to improved compliance ...
Source
#1Meng-Meng Wang (NUIST: Nanjing University of Information Science and Technology)
In the context of crowdsourcing contest through which seekers attempt to obtain creative solutions by tapping into the wisdom of crowds with a competition-based reward system, this study investigat...
Source
#1Jie Lou (SZPT: Shenzhen Polytechnic)
#2Lingzhao Deng (SZPT: Shenzhen Polytechnic)
Last. Dong Wang (SZPT: Shenzhen Polytechnic)
view all 3 authors...
Users rely heavily on mobile phones as multi-purpose devices to support all kinds of tasks. This study conceptualises mobile phone deep structure use and aims at unveiling such behaviour. Towards t...
Source
#1Suzanne Derks (VU: VU University Amsterdam)H-Index: 1
#2Agnes M. Willemen (VU: VU University Amsterdam)H-Index: 12
Last. Paula SterkenburgH-Index: 10
view all 5 authors...
Interventions to support mentalizing abilities are relevant for all people to enhance social skills and well-being. For people with mild to borderline intellectual disabilities, learning mentalizin...
Source
#1Nadia Barberis (Magna Græcia University)
#2Marco Cannavò (UNIME: University of Messina)H-Index: 1
Last. Francesca Cuzzocrea (Magna Græcia University)H-Index: 14
view all 4 authors...
Drawing on the self-determination theory (SDT) framework and the dualistic model of passion, the current study sought to test a model in which psychological basic needs differently predicted harmon...
Source
12345678910
Top fields of study
Human–computer interaction
Engineering
Psychology
Usability
Computer science
Knowledge management
Social psychology