Unlocking Health Insights with SDoH Data: A Comprehensive Open-Access Database and SDoH-EHR Linkage Tool.
,
,
,
,
,
,
,
,
,
,
CoRR, March, 2025
Transparent AI: Developing an Explainable Interface for Predicting Postoperative Complications.
,
,
,
,
,
,
,
,
,
,
,
,
CoRR, 2024
The influence of educational and emotional support on e-learning acceptance: An integration of social support theory and TAM.
Educ. Inf. Technol., September, 2023
Toward dialogue through a holistic measuring framework - the impact of social media on risk communication in the COVID-19.
Inf. Technol. People, 2022
Digital financial literacy as a business model: The case study of a FinTech start-up.
Proceedings of the International Conference on Electronic Business, 2022
Evaluating and selecting features via information theoretic lower bounds of feature inner correlations for high-dimensional data.
Eur. J. Oper. Res., 2021
Revisiting the Determinant Factors of E-Commerce Adoption in the Wake of the Pandemic: The New Landscape of Digital Transformation for SMEs in North West UK.
Proceedings of the Australasian Conference on Information Systems, 2021
Privacy-deprived e-commerce: the efficacy of consumer privacy policies on China's e-commerce websites from a legal perspective.
Inf. Technol. People, 2020
The China Unionpay Way: Why Bank Card Cross-Border Transaction Dispute Resolution is Difficult.
Proceedings of the 20th Pacific Asia Conference on Information Systems, 2016
A Conceptual Model of Virtual Bank I.S. Security Meta-Policy from a Network Perspective.
Proceedings of the 20th Pacific Asia Conference on Information Systems, 2016
Privacy and Identity Theft Recovery Planning: An Onion Skin Model.
Proceedings of the 49th Hawaii International Conference on System Sciences, 2016
An Initial Study of Customer Internet Banking Security Awareness and Behaviour in China.
Proceedings of the 19th Pacific Asia Conference on Information Systems, 2015
A Proposed Framework for Examining Information Systems Security Research.
Proceedings of the Information Systems Development: Transforming Healthcare through Information Systems, 2015
Typology of information systems security research: A methodological perspective.
Proceedings of the 2015 Second International Conference on Information Security and Cyber Forensics, 2015