Digital Library
Search: "[ keyword: ACC ]" (76)
-
Jong-jin Park, Min-kyong Choi, Jong-chang Ahn, Vol. 18, No. 1, pp. 105-120, Feb. 2017
10.7472/jksii.2017.18.1.105
Keywords: Smartphones, information security, Degree of personal risk accepting, Buying intention, Android, iOS -
Deepanjal Shrestha, Seung Ryul Jeong, Vol. 17, No. 6, pp. 113-122, Dec. 2016
10.7472/jksii.2016.17.6.113
Keywords: ICT, information access, Internet, data center, tourism industry -
Yousra Abdul Alsahib S.Aldeen, Shaligram Prajapat, Mojtaba Raeisi Nejad Dobuneh, Noor Azeera Abdul Aziz, Jung-Gyu Lee, Muhammad Younas, Do Yeon Kim, Minjae Park, NurLiyanaSulaiman NurLiyanaSulaiman, Taghi Javdani Gandomani, Noorrezam Yusop, Isma Farah Siddiqui, Yoosin Kim, Mina Ziaei Nafchi, Seung-Ryul Jeong, MohdNaz'ri Mahrin, MohdAizainiMaarof MohdAizainiMaarof, Ashok Sharma, Dayang N.A. Jawawi, Imran Ghani, Mazleena Salleh, Hyun Ahn, Massila Kamalrudin, Scott Uk-Jin Lee, Ramjeevan Singh Thakur, Dayang Norhayati Abang Jawawi, Anazida Zainal, Kwanghoon Pio Kim, Sang Hyun Choi, Mokhtar Mohd Yusof, RasimahCheMohd Yusoff, Muhammad Murad Khan, Mohammed HazimAlkawaz, Safiah Sidek, Vol. 17, No. 5, pp. 9-16, Oct. 2016
10.7472/jksii.2016.17.5.09
Keywords: access control, Smart Environment, Semantic web, XACML, Security requirement, security attribute, mobile application development, Data-Intensive Workflow Validation, Workflow, BPM, K-anonymity, Privacy, L-diversity, data relocation, generalization, Global Agile Development, Cloud computing, Challenges, benefits, Framework, cloud-based agile tools, Regression Testing, Prioritization, Evolutionary Algorithm, Web Application, User Session, Automatic Variable Key (AVK), cryptanalysis, Hacker, AI, genetic algorithm, swarm intelligence, cipher, Neural Network, cryptography, Artificial neural Networks (ANN), Genetic Algorithm (GA), Swarm Intelligence (SI), Features Combinations, Opinion Target Extraction, Text sentiment analysis, Conditional Random Field and Sequence Labeling Algorithm, Process Diagram, Project Monitoring, Project Management, Context Diagram, Awareness, agile practices, agile software development methodology, Agile Software Development, Agile Methods, Agile Transformation, Agile Adoption, Transition Prerequisites, Agile Transition, Grounded Theory (GT) -
Kyoung-Jae Lee, Han-Shin Jo, Vol. 16, No. 6, pp. 1-10, Dec. 2015
10.7472/jksii.2015.16.6.01
Keywords: Heterogeneous networks, Multiple radio access technology, Adjacent channel interference ratio, Guard band, deterministic calculations -
Jaehee Cho, Sun Jin Kim, Vol. 16, No. 1, pp. 101-0, Feb. 2015
10.7472/jksii.2015.16.1.101
Keywords: Diet/Exercise Apps, Internet Information Use Efficacy, Internet Information Credibility, Channel Expansion Theory, Technology Acceptance Model -
Chang Won Jeong, Woo Hong Kim, Kwon Ha Yoon, Su Chong Joo, Vol. 16, No. 1, pp. 47-56, Feb. 2015
10.7472/jksii.2015.16.1.47
Keywords: Medical Information Dynamic Access System, Emergency Context Condition, Authorization Technology, Smart Mobile Environments -
Cheol-Joo Chae, Kwang-Nam Choi, Kiseok Choi, Yong-Hee Yae, YounJu Shin, Vol. 16, No. 1, pp. 21-28, Feb. 2015
10.7472/jksii.2015.16.1.21
Keywords: OAuth Protocol, Authorization, authentication, Access Token, E-mail Authentication -
Woochun Jun, Suk-Ki Hong, Vol. 15, No. 4, pp. 81-90, Aug. 2014
10.7472/jksii.2014.15.4.81
Keywords: Web Accessibility, the Disabled, Digital Divide -
Myong Lyol Song, Vol. 15, No. 2, pp. 19-32, Apr. 2014
10.7472/jksii.2014.15.2.19
Keywords: Interference, IEEE 802.15.4, WiFi, CSMA-CA, medium access delay, channel search -
Sudan Prasad Uprety, Seung Ryul Jeong, Vol. 14, No. 6, pp. 25-32, Dec. 2013
10.7472/jksii.2013.14.6.25
Keywords: IS personnel selection and evaluation, Fuzzy ART, ART model, Multiple Criteria Decision Making (MCDM), Jaccard choice function