ICISIA 2022: INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS AND INTELLIGENT APPLICATIONS
TALK KEYWORD INDEX

This page contains an index consisting of author-provided keywords.

A
Accelerators
adoption
affective recommender system
agency theory
AI
ANOVA
Artificial Intelligence
Attacks
Augmented Reality
Authentication
B
B-learning
Bags of Words
barking recognition
Bayesian Model Averaging
Benchmarking
BENEFITS Factors
Big Data
Big Data Adoption
BIM Adoption
BIM Adoption in the Construction industry
BIM Awareness
BIM in Developing counties
Blended Learning
Blockchain
Building Information Modelling
Business Intelligence
C
C4.5
CALL
Cashless society
CHALLENGES Factors
Classification
Cloud computing
Co-Creation
Co-working Spaces
Coding
colleges and universities
Computer Assisted Cooperative Learning
Construction
construction companies
Constructivism
Consumer Behavior
Continuance intention to use
Contrastive analysis
Covid 19
COVID-19
Covid-19 Vaccination
cracking
Customer Acceptance
Customer Engagement Valence
Cyber Security
Cybercrime Victimization
D
Data mining
Decision tree
deep learning
diffusion of innovation
Dropout
E
e-learning
E-wallet
Early age
Early warning system
ECG
Ecosystems
EDM
education
Elderlies
emotion recognition model
Entanglement Probability
entrepreneurial digital competencies
Entrepreneurial Intention
Environmental concern
ESG practices
Events
Experimental Evaluation
F
face-to-face interaction
Factor
fear of missing out
Financial Reports Disclosure Quality
fit-viability model
Flege Speech learning model
Food Consumption
Fractional order derivatives
Functional Barriers
G
gender
Green
Green Innovation
Green IT/IS
Green office
H
hash
Health-ITUES
higher education
higher education institutes
Higher Education Institutions
Home IDS
Hospital Information System
Human-computer interaction
I
Incubators
Indoor navigation
information
information culture
Information Technology
Innovation capability
Intangible assets
interactive reading model
Internet of Things
Internet of things (IoT)
interoperability
Interrelations
J
John
Jordan
K
K-NN
Knowledge
Knowledge Management
Knowledge Management Process
L
Learning Management System
longitudinal study
LWC Cryptography
M
Machine Learning
managerial ownership
Marketing
Mentors
Mitigation
ML-Agents
mobile application
Mobile Banking
Mobile Check-in
Mobile wallet
Motivation
N
Naive Bayes
Nautical applications
Nautical digital platforms
Naïve-Bayes
network
Network Function Virtualization
Network Slicing
Nurse
Nurses
O
Online Knowledge Sharing
Online learning
Online Platforms
ontology integration
Opinion Mining
P
Palestine
Pandemic
Panic
parameters for ECG
password
Perceived Ease of Use
Perceived Enjoyment
Perceived Technical System Quality
Perceived Trust
Perceived Usefulness
performance
pet social network
Phonemic contrast
PLS
Polarity
Prediction Quality Measurements
privacy paradox
Process Innovation
Product Innovation
Product Ontology engineering
Programming
project
Proximal Policy Optimization
psychological distress
Psychology
Q
QR Codes
Quantum Internet
Quantum Network
Quantum simulation
Qubits
R
Random forest
reading skills
Reinforcement Learning
Reliability
remote learning
Repeated measures design
Reputation
Resistance
Resource allocation
resource-based view theory
Risk Barriers
room booking
Rule JRIP
S
SAM
Satisfaction Level
Self-disclosure
Self-regulation skills
SEM
semantic mapping
Sentiment Analysis
Service co-creation
Service co-destruction
Service Robots
Siri
Situational Visual Impairments
Slice Security
Slicing Implementation
smart campus
Smart Societies
SMEs
SNS needs
social connectedness
Social media
social network sites
Social Network Sites (SNS)
social spider algorithm
Software-Defined Networking
SOR Theory
Sports Anatomy
sports technology
SQL injection
Startups
Students’ satisfaction
Supply Chain dynamism
supply chain performance
supply chains Resilience
Survey
Sustainability
Sustainable information technology
SVM
Systematic Literature Review
T
TAM
TAM-3
Tank-game
Teaching
Technology
Technology acceptance
Technology Acceptance Modal
Technology Acceptance Theories
Technology Adoption
The Entrepreneurial Event Model
Theory of planned behavior
TOE
Tourism
Tourism Entrepreneurship Performance
Tree LMT
Twitter Text Analysis
Tynker
U
Ultrasonic Range Sensor
university student
University Students
Usability
USB attack
User Authenticity
User Interface Design
UTAUT
UTAUT2
V
Validation
virtual reality
Virtual Reality Technology
Voice Assistance
W
Web Applications Security
Y
Yemen
Yemeni EFL learners
Yemeni ESL learners
Young adult