Search dblp for Publications

export results for "toc:db/journals/itd/itd20.bht:"

 download as .bib file

@article{DBLP:journals/itd/Andoh-BaidooOK14,
  author       = {Francis Kofi Andoh{-}Baidoo and
                  Babajide Osatuyi and
                  K. Niki Kunene},
  title        = {{ICT} Capacity as the Investment and Use of {ICT:} Exploring its Antecedents
                  in Africa},
  journal      = {Inf. Technol. Dev.},
  volume       = {20},
  number       = {1},
  pages        = {44--59},
  year         = {2014},
  url          = {https://doi.org/10.1080/02681102.2013.804399},
  doi          = {10.1080/02681102.2013.804399},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/itd/Andoh-BaidooOK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/itd/Andoh-BaidooOK14a,
  author       = {Francis Kofi Andoh{-}Baidoo and
                  Babajide Osatuyi and
                  K. Niki Kunene},
  title        = {Architecture for Managing Knowledge on Cybersecurity in Sub-Saharan
                  Africa},
  journal      = {Inf. Technol. Dev.},
  volume       = {20},
  number       = {2},
  pages        = {140--164},
  year         = {2014},
  url          = {https://doi.org/10.1080/02681102.2013.832127},
  doi          = {10.1080/02681102.2013.832127},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/itd/Andoh-BaidooOK14a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/itd/AyansoCL14,
  author       = {Anteneh Ayanso and
                  Danny I. Cho and
                  Kaveepan Lertwachara},
  title        = {Information and Communications Technology Development and the Digital
                  Divide: {A} Global and Regional Assessment},
  journal      = {Inf. Technol. Dev.},
  volume       = {20},
  number       = {1},
  pages        = {60--77},
  year         = {2014},
  url          = {https://doi.org/10.1080/02681102.2013.797378},
  doi          = {10.1080/02681102.2013.797378},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/itd/AyansoCL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/itd/Baker14,
  author       = {Elizabeth White Baker},
  title        = {A Model for the Impact of Cybersecurity Infrastructure on Economic
                  Development in Emerging Economies: Evaluating the Contrasting Cases
                  of India and Pakistan},
  journal      = {Inf. Technol. Dev.},
  volume       = {20},
  number       = {2},
  pages        = {122--139},
  year         = {2014},
  url          = {https://doi.org/10.1080/02681102.2013.832131},
  doi          = {10.1080/02681102.2013.832131},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/itd/Baker14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/itd/Barclay14,
  author       = {Corlane Barclay},
  title        = {Using Frugal Innovations to Support Cybercrime Legislations in Small
                  Developing States: Introducing the Cyber-Legislation Development and
                  Implementation Process Model (CyberLeg-DPM)},
  journal      = {Inf. Technol. Dev.},
  volume       = {20},
  number       = {2},
  pages        = {165--195},
  year         = {2014},
  url          = {https://doi.org/10.1080/02681102.2013.841630},
  doi          = {10.1080/02681102.2013.841630},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/itd/Barclay14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/itd/ChoucriMF14,
  author       = {Nazli Choucri and
                  Stuart E. Madnick and
                  James A. Ferwerda},
  title        = {Institutions for Cyber Security: International Responses and Global
                  Imperatives},
  journal      = {Inf. Technol. Dev.},
  volume       = {20},
  number       = {2},
  pages        = {96--121},
  year         = {2014},
  url          = {https://doi.org/10.1080/02681102.2013.836699},
  doi          = {10.1080/02681102.2013.836699},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/itd/ChoucriMF14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/itd/Gomez14,
  author       = {Ricardo G{\'{o}}mez},
  title        = {When You Do Not Have a Computer: Public-Access Computing in Developing
                  Countries},
  journal      = {Inf. Technol. Dev.},
  volume       = {20},
  number       = {3},
  pages        = {274--291},
  year         = {2014},
  url          = {https://doi.org/10.1080/02681102.2012.751573},
  doi          = {10.1080/02681102.2012.751573},
  timestamp    = {Thu, 03 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/itd/Gomez14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/itd/Hwang14,
  author       = {Yujong Hwang},
  title        = {Understanding the Electronic Recruiting Marketplace Strategy: The
                  Case of JobKorea},
  journal      = {Inf. Technol. Dev.},
  volume       = {20},
  number       = {4},
  pages        = {353--361},
  year         = {2014},
  url          = {https://doi.org/10.1080/02681102.2013.795463},
  doi          = {10.1080/02681102.2013.795463},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/itd/Hwang14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/itd/JenkinsGPL14,
  author       = {Jeffrey L. Jenkins and
                  G. Mark Grimes and
                  Jeffrey Gainer Proudfoot and
                  Paul Benjamin Lowry},
  title        = {Improving Password Cybersecurity Through Inexpensive and Minimally
                  Invasive Means: Detecting and Deterring Password Reuse Through Keystroke-Dynamics
                  Monitoring and Just-in-Time Fear Appeals},
  journal      = {Inf. Technol. Dev.},
  volume       = {20},
  number       = {2},
  pages        = {196--213},
  year         = {2014},
  url          = {https://doi.org/10.1080/02681102.2013.814040},
  doi          = {10.1080/02681102.2013.814040},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/itd/JenkinsGPL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/itd/Kamel14,
  author       = {Sherif H. Kamel},
  title        = {Egypt's Ongoing Uprising and the Role of Social Media: Is there Development?},
  journal      = {Inf. Technol. Dev.},
  volume       = {20},
  number       = {1},
  pages        = {78--91},
  year         = {2014},
  url          = {https://doi.org/10.1080/02681102.2013.840948},
  doi          = {10.1080/02681102.2013.840948},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/itd/Kamel14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/itd/Kenny14,
  author       = {Kate M. Kenny},
  title        = {Power and the Construction of Independence in {ICTD} Organizations},
  journal      = {Inf. Technol. Dev.},
  volume       = {20},
  number       = {1},
  pages        = {6--22},
  year         = {2014},
  url          = {https://doi.org/10.1080/02681102.2013.809684},
  doi          = {10.1080/02681102.2013.809684},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/itd/Kenny14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/itd/KockG14,
  author       = {Ned Kock and
                  Leebrian Gaskins},
  title        = {The Mediating Role of Voice and Accountability in the Relationship
                  Between Internet Diffusion and Government Corruption in Latin America
                  and Sub-Saharan Africa},
  journal      = {Inf. Technol. Dev.},
  volume       = {20},
  number       = {1},
  pages        = {23--43},
  year         = {2014},
  url          = {https://doi.org/10.1080/02681102.2013.832129},
  doi          = {10.1080/02681102.2013.832129},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/itd/KockG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/itd/Osei-BrysonV14,
  author       = {Kweku{-}Muata Osei{-}Bryson and
                  Doug Vogel},
  title        = {Special Issue on Cyber-Security for Development},
  journal      = {Inf. Technol. Dev.},
  volume       = {20},
  number       = {2},
  pages        = {93--95},
  year         = {2014},
  url          = {https://doi.org/10.1080/02681102.2014.883115},
  doi          = {10.1080/02681102.2014.883115},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/itd/Osei-BrysonV14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/itd/ParkKKOC14,
  author       = {Eunil Park and
                  Sang Jib Kwon and
                  Heetae Kim and
                  Jay Ohm and
                  Hyun Joon Chang},
  title        = {What is the Right R{\&}D Strategy for Overcoming the Difficulties
                  of the South Korean {IT} Industry?},
  journal      = {Inf. Technol. Dev.},
  volume       = {20},
  number       = {4},
  pages        = {339--352},
  year         = {2014},
  url          = {https://doi.org/10.1080/02681102.2013.856282},
  doi          = {10.1080/02681102.2013.856282},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/itd/ParkKKOC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/itd/PickGS14,
  author       = {James B. Pick and
                  Kamala Gollakota and
                  Manju Singh},
  title        = {Technology for Development: Understanding Influences on use of Rural
                  Telecenters in India},
  journal      = {Inf. Technol. Dev.},
  volume       = {20},
  number       = {4},
  pages        = {296--323},
  year         = {2014},
  url          = {https://doi.org/10.1080/02681102.2013.837806},
  doi          = {10.1080/02681102.2013.837806},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/itd/PickGS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/itd/Qureshi14,
  author       = {Sajda Qureshi},
  title        = {Lessons from the Age of Nelson Mandela: Information and Communication
                  Technology in the Quest for Equality, Freedom and Justice},
  journal      = {Inf. Technol. Dev.},
  volume       = {20},
  number       = {1},
  pages        = {1--5},
  year         = {2014},
  url          = {https://doi.org/10.1080/02681102.2014.886369},
  doi          = {10.1080/02681102.2014.886369},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/itd/Qureshi14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/itd/Qureshi14a,
  author       = {Sajda Qureshi},
  title        = {Overcoming Technological Determinism in Understanding the Digital
                  Divide: Where Do We Go From Here?},
  journal      = {Inf. Technol. Dev.},
  volume       = {20},
  number       = {3},
  pages        = {215--217},
  year         = {2014},
  url          = {https://doi.org/10.1080/02681102.2014.930981},
  doi          = {10.1080/02681102.2014.930981},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/itd/Qureshi14a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/itd/Qureshi14b,
  author       = {Sajda Qureshi},
  title        = {Theory to Inform Practice to Build Theory: Are Emerging Economies
                  in a Cyclical Relationship with their Information and Communication
                  Technologies?},
  journal      = {Inf. Technol. Dev.},
  volume       = {20},
  number       = {4},
  pages        = {293--295},
  year         = {2014},
  url          = {https://doi.org/10.1080/02681102.2014.962939},
  doi          = {10.1080/02681102.2014.962939},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/itd/Qureshi14b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/itd/Samoilenko14,
  author       = {Sergey Samoilenko},
  title        = {Investigating the Impact of Investments in Telecoms on Microeconomic
                  Outcomes: Conceptual Framework and Empirical Investigation in the
                  Context of Transition Economies},
  journal      = {Inf. Technol. Dev.},
  volume       = {20},
  number       = {3},
  pages        = {251--273},
  year         = {2014},
  url          = {https://doi.org/10.1080/02681102.2012.751572},
  doi          = {10.1080/02681102.2012.751572},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/itd/Samoilenko14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/itd/SkaletskySG14,
  author       = {Maria Skaletsky and
                  Olumayokun Soremekun and
                  Robert D. Galliers},
  title        = {The Changing - and Unchanging - Face of the Digital Divide: an Application
                  of Kohonen Self-Organizing Maps},
  journal      = {Inf. Technol. Dev.},
  volume       = {20},
  number       = {3},
  pages        = {218--250},
  year         = {2014},
  url          = {https://doi.org/10.1080/02681102.2013.804396},
  doi          = {10.1080/02681102.2013.804396},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/itd/SkaletskySG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/itd/ZhangC14,
  author       = {Weiyu Zhang and
                  Arul Chib},
  title        = {Internet Studies and Development Discourses: The Cases of China and
                  India},
  journal      = {Inf. Technol. Dev.},
  volume       = {20},
  number       = {4},
  pages        = {324--338},
  year         = {2014},
  url          = {https://doi.org/10.1080/02681102.2013.796546},
  doi          = {10.1080/02681102.2013.796546},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/itd/ZhangC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics