From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Understanding User Behavior towards Passwords through Acceptance and Use Modelling., , и . Int. J. Inf. Secur. Priv., 3 (1): 11-29 (2009)Incremental submission of programming code using object-oriented classes., , и . ACM SIGCSE Bull., 41 (4): 66-70 (2009)From Beliefs to Success: Utilizing an Expanded TAM to Predict Web Page Development Success., и . Int. J. Technol. Hum. Interact., 3 (3): 36-53 (2007)How Good Are Students at Assessing the Quality of Their Applications?, , и . Informing Sci. Int. J. an Emerg. Transdiscipl., (1998)Information Technology Certification: A Student Perspective., и . Int. J. Inf. Commun. Technol. Educ., 1 (1): 19-30 (2005)Student Perceptions of Flipped Learning., , и . ACE, том 160 из CRPIT, стр. 57-62. Australian Computer Society, (2015)Integrating Research into Information Technology Education., , и . ACE, стр. 1-10. ACM, (2020)Data Communications and E-Learning., , и . Encyclopedia of Information Science and Technology (II), Idea Group, (2005)Use of the Internet by Small to Medium Enterprises in Singapore., , и . WebNet, AACE, (1998)Integrating a networking simulation package into a data communications course to enhance student learning., , , и . ACSE, том 1 из ACM International Conference Proceeding Series, стр. 159-163. ACM, (1996)