Vol. 5 No. 1 (2014)

Published: 2014-08-28

Regular Articles

  • OPTIMIZING RECOMMENDATIONS WITH AN RFID-BASED APPROACH FOR THE TAIWAN TRAINQUALI DOCUMENT MANAGEMENT SYSTEM

    Chao-Tsong Fangtsou, Rui-Yang Chen, Ming-Hung Yang
    1-26
    DOI: https://doi.org/10.7903/ijecs.1148
  • WHY EXPECT LOWER PRICES ONLINE? EMPIRICAL EXAMINATION IN ONLINE AND STORE-BASED RETAILERS

    Shao-Kang Lo, Ai-Yun Hsieh, Yu-Ping Chiu
    27-38
    DOI: https://doi.org/10.7903/ijecs.1191
  • THE VALUE OF IT HABIT IN MICROBLOGS ON BRAND LOYALTY

    Hong Zhang, Kem Z.K. Zhang, Matthew K.O. Lee, Feng Feng
    63-80
    DOI: https://doi.org/10.7903/ijecs.1069
  • AUTHENTICATION AND LOOKUP FOR NETWORK SERVICES

    Daniel J. Buehrer, Tzu-Yang Wang
    81-90
    DOI: https://doi.org/10.7903/ijecs.1040
  • USING TEXT MINING TECHNIQUES TO ANALYZE HOW MOVIE FORUMS AFFECT THE BOX OFFICE

    I-ping Chiang, Yean-Fu Wen, Ming-Chien Li, Chiao-Ying Hsu, Yu-Chun Luo
    91-96
    DOI: https://doi.org/10.7903/ijecs.1027
  • NIHON-SEI : COMPUTER-AIDED INSTRUCTION THAT TEACHES BASIC JAPANESE

    Daryl L. Montalbo, Rhea R. Regis, Crystal Gail S. Quijano, Melie Jim F. Sarmiento
    103-108
    DOI: https://doi.org/10.7903/ijecs.1034
  • INTEGRATING FACEBOOK AND ALUMNI INTO THE SOCIAL NETWORK MOBILE PLATFORM

    Tzuo-Ming Chen, Chi-Tsai Yeh
    109-114
    DOI: https://doi.org/10.7903/ijecs.1031
  • FAULT TOLERANCE IN MOBILE GRID COMPUTING

    Aghila Rajagopal, M.A. Maluk Mohamed
    115-122
    DOI: https://doi.org/10.7903/ijecs.1107
  • TECHNOLOGY OF FEDERATED IDENTITY AND SECURE LOGGINGS IN CLOUD COMPUTING

    Takashi Shitamichi, Ryoichi Sasaki
    39-62
    DOI: https://doi.org/10.7903/ijecs.1157
  • UNDERSTANDING THE EFFECTS OF EWOM ON COSMETIC CONSUMER BEHAVIORAL INTENTION

    Chien-Wen Chen, Wei-Cyuan Chen, Wen-Kuo Chen
    97-102
    DOI: https://doi.org/10.7903/ijecs.1030