A review on social spam detection: Challenges, open issues, and future directions
Abstract Online Social Networks are perpetually evolving and used in plenteous
applications such as content sharing, chatting, making friends/followers, customer …
applications such as content sharing, chatting, making friends/followers, customer …
Explainable recommendation: A survey and new perspectives
Explainable recommendation attempts to develop models that generate not only high-quality
recommendations but also intuitive explanations. The explanations may either be post-hoc …
recommendations but also intuitive explanations. The explanations may either be post-hoc …
Assessing factors influencing technology adoption for online purchasing amid COVID-19 in Qatar: moderating role of word of mouth
The COVID-19 pandemic developed new challenges for global consumers. In response to
this disaster, digital technology users have faced the necessity to adopt and use specific …
this disaster, digital technology users have faced the necessity to adopt and use specific …
Artificial intelligence-enabled personalization in interactive marketing: a customer journey perspective
Y Gao, H Liu - Journal of Research in Interactive Marketing, 2023 - emerald.com
Purpose Artificial intelligence (AI) technology has revolutionized customers' interactive
marketing experience. Although there have been a substantial number of studies exploring …
marketing experience. Although there have been a substantial number of studies exploring …
Social data: Biases, methodological pitfalls, and ethical boundaries
Social data in digital form—including user-generated content, expressed or implicit relations
between people, and behavioral traces—are at the core of popular applications and …
between people, and behavioral traces—are at the core of popular applications and …
A study on the psychology of social engineering-based cyberattacks and existing countermeasures
MA Siddiqi, W Pak, MA Siddiqi - Applied Sciences, 2022 - mdpi.com
As cybersecurity strategies become more robust and challenging, cybercriminals are
mutating cyberattacks to be more evasive. Recent studies have highlighted the use of social …
mutating cyberattacks to be more evasive. Recent studies have highlighted the use of social …
Analysing the critical factors influencing trust in e-government adoption from citizens' perspective: A systematic review and a conceptual framework
L Alzahrani, W Al-Karaghouli, V Weerakkody - International business …, 2017 - Elsevier
Although the success adoption of e-government contingent upon citizens' trust and their
willingness to use it, little consideration has been paid to explore the adoption of e …
willingness to use it, little consideration has been paid to explore the adoption of e …
A survey of trust computation models for service management in internet of things systems
In this paper we survey trust computation models for Internet of things (IoT) systems for the
purpose of service management, ie, whether or not to select an IoT device as a service …
purpose of service management, ie, whether or not to select an IoT device as a service …
Processing social media messages in mass emergency: A survey
Social media platforms provide active communication channels during mass convergence
and emergency events such as disasters caused by natural hazards. As a result, first …
and emergency events such as disasters caused by natural hazards. As a result, first …
Trust management for SOA-based IoT and its application to service composition
R Chen, J Guo, F Bao - IEEE Transactions on Services …, 2014 - ieeexplore.ieee.org
A future Internet of Things (IoT) system will connect the physical world into cyberspace
everywhere and everything via billions of smart objects. On the one hand, IoT devices are …
everywhere and everything via billions of smart objects. On the one hand, IoT devices are …