Journal: Behaviour & IT

Volume 41, Issue 5

905 -- 921Joni Salminen, Soon-Gyo Jung, Ahmed Mohamed Sayed Kamel, João M. Santos, Bernard J. Jansen. Using artificially generated pictures in customer-facing systems: an evaluation study with data-driven personas
922 -- 933Ron S. Hirschprung, Shay Tayro, Eti Reznik. Optimising technological literacy acquirement to protect privacy and security
934 -- 945Lydia Qianqian Li, Jing Gao, Zhihong Shi, Wenjing Song. The influence of self-construal on frequency of user activities and advertising involvement in Msg-SN
946 -- 958Taehyun Ha, Young June Sah, Yuri Park, Sangwon Lee. Examining the effects of power status of an explainable artificial intelligence system on users' perceptions
959 -- 980Christine Van Toorn, Samuel Nathan Kirshner, James Gabb. Gamification of query-driven knowledge sharing systems
981 -- 1001Joe Cutting, Paul A. Cairns. Investigating game attention using the Distraction Recognition Paradigm
1002 -- 1018Arghya Ray, Pradip Kumar Bala, Yogesh K. Dwivedi. Exploring barriers affecting eLearning usage intentions: an NLP-based multi-method approach
1019 -- 1034Qian Yi, Mengyao Xu, Shuping Yi, Shiquan Xiong. Identifying untrusted interactive behaviour in Enterprise Resource Planning systems based on a big data pattern recognition method using behavioural analytics
1035 -- 1051Gianluca Schiavo, Ornella Mich, Michela Ferron, Nadia Mana. Trade-offs in the design of multimodal interaction for older adults
1052 -- 1064Lenka Dedkova, David Smahel, Mike Just. Digital security in families: the sources of information relate to the active mediation of internet safety and parental internet skills
1065 -- 1079Joan Torrent-Sellens, Natàlia Cugueró-Escofet, Myriam Ertz. Motivations of collaborative obtainers and providers in Europe
1080 -- 1114Shilpi Jain, Swanand J. Deodhar. Social mechanisms in crowdsourcing contests: a literature review
1115 -- 1131Mahdi Nasrullah Al-Ameen, Sonali Tukaram Marne, Kanis Fatema, Matthew Wright 0001, Shannon Scielzo. On improving the memorability of system-assigned recognition-based passwords