Hi, May AI help you? An analysis of the barriers impeding the implementation and use of artificial intelligence-enabled virtual assistants in retail
SZ Kamoonpuri, A Sengar - Journal of Retailing and Consumer Services, 2023 - Elsevier
Abstract Artificial Intelligence enabled Virtual Assistants (VAs) are evolving rapidly, offering
promising opportunities to provide personalized shopping assistance and 24/7 frontline …
promising opportunities to provide personalized shopping assistance and 24/7 frontline …
Revisiting software reliability
K Sahu, RK Srivastava - … Analytics and Innovation: Proceedings of ICDMAI …, 2019 - Springer
Reliability is an important issue for deciding the quality of the software. Reliability prediction
is a statistical procedure that purpose to expect the future reliability values, based on known …
is a statistical procedure that purpose to expect the future reliability values, based on known …
Code smell prioritization in object‐oriented software systems: A systematic literature review
Code smells indicate poor design and imperfection in coding style. They increase
maintenance costs and degrade software quality. Detecting and mitigating these code …
maintenance costs and degrade software quality. Detecting and mitigating these code …
An integrated approach of fuzzy logic, AHP and TOPSIS for estimating usable-security of web applications
Security and usability are often thought of as being contradictive in nature. One affects the
other negatively. The relation and trade-offs between usability and security must be detected …
other negatively. The relation and trade-offs between usability and security must be detected …
A knowledge-based integrated system of hesitant fuzzy set, AHP and TOPSIS for evaluating security-durability of web applications
There has been a phenomenal increase in the use of web applications in every facet of
human endeavor. From education, healthcare, banking, business to governance and so …
human endeavor. From education, healthcare, banking, business to governance and so …
[HTML][HTML] A hybrid fuzzy rule-based multi-criteria framework for sustainable-security assessment of web application
The present day environment of cyber-attacks is a threat to even the most secure systems.
With each passing day, the attackers are adapting new technologies to infiltrate systems and …
With each passing day, the attackers are adapting new technologies to infiltrate systems and …
Fuzzy-based symmetrical multi-criteria decision-making procedure for evaluating the impact of harmful factors of healthcare information security
Growing concern about healthcare information security in the wake of alarmingly rising
cyber-attacks is being given symmetrical priority by current researchers and cyber security …
cyber-attacks is being given symmetrical priority by current researchers and cyber security …
Evaluating the usable-security of healthcare software through unified technique of fuzzy logic, ANP and TOPSIS
FA Al-Zahrani - IEEE Access, 2020 - ieeexplore.ieee.org
The current research efforts in the security domain are essentially inspired by the intention to
ensure both healthcare software's security and usability. Practitioners are continuously …
ensure both healthcare software's security and usability. Practitioners are continuously …
Evaluating performance of Web application security through a fuzzy based hybrid multi-criteria decision-making approach: Design tactics perspective
Design of software can have a major impact on the overall security of the software.
Developing a secure website design is a challenge for architectures. It depends on different …
Developing a secure website design is a challenge for architectures. It depends on different …
Managing the secure software development
R Fujdiak, P Mlynek, P Mrnustik… - 2019 10th IFIP …, 2019 - ieeexplore.ieee.org
Nowadays, software development is a more complex process than ever was and it faces the
challenges, where security became one of the most crucial. The security issues became an …
challenges, where security became one of the most crucial. The security issues became an …