How robust is the UTAUT theory in explaining the usage intention of e-government services in an unstable security context?: A study in Iraq. | 0 | 0.34 | 2019 |
Detection algorithm for internet worms scanning that used user datagram protocol. | 0 | 0.34 | 2019 |
A meta-analysis of the unified theory of acceptance and use of technology studies among several countries. | 1 | 0.34 | 2013 |
A Requirement Model for Baghdad University's E-magazine System for Scientific Research | 0 | 0.34 | 2009 |