⚠ Vui lòng bật JavaScript để có trải nghiệm tốt nhất trên website này!

100+ LUẬN VĂN THẠC SĨ Công Nghệ Thông Tin

Effect of cooperation on players’ immersion and enjoyment - Effect of cooperation on players' immersion and enjoyment
Effect of cooperation on players' immersion and enjoyment
Miễn phí

TABLE OF CONTENTS ABSTRACT ……………………………………………………………………………………………………….. iii ACKNOWLEDGMENTS ……………………………………………………………………………………. iv LIST OF ILLUSTRATIONS ……………………………………………………………………………….. vii LIST OF TABLES …………………………………………………………………………………………….. viii SECTION 1. INTRODUCTION ………………………………………………………………………………………… 1 2. LITERATURE REVIEW ………………………………………………………………………………. 3 2.1. COOPERATIVE PLAY AND ENJOYMENT …………………………………………… 3 2.2. PRIOR RESEARCH ON IMMERSION …………………………………………………… 4 3. THEORETICAL...

☆☆☆☆☆ (0 sao, 0 phiếu bầu) - 13 lượt xem
Miễn phí
Tải về
Using eye-tracking to understand user behavior in deception detection system interaction - Using eye-tracking to understand user behavior in deception detection system interaction
Using eye-tracking to understand user behavior in deception detection system interaction
Miễn phí

TABLE OF CONTENTS ABSTRACT ……………………………………………………………………………………………………….. iii ACKNOWLEDGMENTS ……………………………………………………………………………………. iv LIST OF FIGURES …………………………………………………………………………………………….. vi LIST OF TABLES ……………………………………………………………………………………………… vii SECTION 1. INTRODUCTION ………………………………………………………………………………………. 1 2. LITERATURE REVIEW …………………………………………………………………………….. 3 3. RESEARCH METHODOLOGY ………………………………………………………………….. 8 3.1. EXPERIMENTAL DESIGN …………………………………………………………….. 8 3.2. EXPERIMENT PROCEDURES ……………………………………………………….. 8 4....

☆☆☆☆☆ (0 sao, 0 phiếu bầu) - 8 lượt xem
Miễn phí
Tải về
Impact of framing and priming on users’ behavior in cybersecurity - Impact of framing and priming on users' behavior in cybersecurity
Impact of framing and priming on users' behavior in cybersecurity
Miễn phí

TABLE OF CONTENTS ABSTRACT ……………………………………………………………………………………………………….. iii ACKNOWLEDGMENTS ……………………………………………………………………………………. iv LIST OF ILLUSTRATIONS ………………………………………………………………………………. viii LIST OF TABLES ………………………………………………………………………………………………. ix SECTION 1. INTRODUCTION ……………………………………………………………………………………….1 2. LITERATURE REVIEW ……………………………………………………………………………..3 2.1. USERS’ BEHAVIOR IN CYBERSECURITY …………………………………………3 2.2. LITERATURE REVIEW ON MESSAGE FRAMING ……………………………..4 2.3. LITERATURE REVIEW ON PRIMING...

☆☆☆☆☆ (0 sao, 0 phiếu bầu) - 8 lượt xem
Miễn phí
Tải về
Sentiment analytics – Lexicons construction and analysis - Sentiment analytics - Lexicons construction and analysis
Sentiment analytics - Lexicons construction and analysis
Miễn phí

TABLE OF CONTENTS ABSTRACT ……………………………………………………………………………………………………….. iii ACKNOWLEDGMENTS ……………………………………………………………………………………. iv LIST OF ILLUSTRATIONS ………………………………………………………………………………… vi LIST OF TABLES ……………………………………………………………………………………………… vii NOMENCLATURE ………………………………………………………………………………………….. viii SECTION 1. INTRODUCTION ………………………………………………………………………………………… 1 1.1. SENTIMENT ANALYSIS …………………………………………………………………….. 1 1.2. SENTIMENT LEXICON ……………………………………………………………………….. 1 1.3. DESIGN SCIENCE ……………………………………………………………………………….. 2 2. LITERATURE REVIEW...

☆☆☆☆☆ (0 sao, 0 phiếu bầu) - 9 lượt xem
Miễn phí
Tải về
Neural correlates of flow, boredom, and anxiety in gaming – An electroencephalogram study - Neural correlates of flow, boredom, and anxiety in gaming - An electroencephalogram study
Neural correlates of flow, boredom, and anxiety in gaming - An electroencephalogram study
Miễn phí

TABLE OF CONTENTS ABSTRACT ……………………………………………………………………………………………………….. iii ACKNOWLEDGMENTS ……………………………………………………………………………………. iv LIST OF ILLUSTRATIONS ………………………………………………………………………………. viii LIST OF TABLES ……………………………………………………………………………………………….. x SECTION 1. INTRODUCTION ………………………………………………………………………………………… 1 2. LITERATURE REVIEW ………………………………………………………………………………. 5 2.1. FLOW STATE AS OPTIMAL EXPERIENCE …………………………………………. 5 2.2. DEFINITION AND CORRELATES OF BOREDOM STATE ………………….....

☆☆☆☆☆ (0 sao, 0 phiếu bầu) - 10 lượt xem
Miễn phí
Tải về
Impact of probable and guaranteed monetary value on cybersecurity behavior of users - Impact of probable and guaranteed monetary value on cybersecurity behavior of users
Impact of probable and guaranteed monetary value on cybersecurity behavior of users
Miễn phí

TABLE OF CONTENTS ABSTRACT ……………………………………………………………………………………………………….. iii ACKNOWLEDGMENTS ……………………………………………………………………………………. iv LIST OF ILLUSTRATIONS ………………………………………………………………………………. viii LIST OF TABLES ………………………………………………………………………………………………. ix SECTION 1. INTRODUCTION ……………………………………………………………………………………….1 2. LITERATURE REVIEW ……………………………………………………………………………..3 2.1. EFFECT OF USER BEHAVIOR ON INFORMATION SECURITY ………….3 2.2. MESSAGE FRAMING …………………………………………………………………………8 3. THEORETICAL FOUNDATION AND HYPOTHESES...

☆☆☆☆☆ (0 sao, 0 phiếu bầu) - 8 lượt xem
Miễn phí
Tải về
Classification of EEG signals of user states in gaming using machine learning - Classification of EEG signals of user states in gaming using machine learning
Classification of EEG signals of user states in gaming using machine learning
Miễn phí

TABLE OF CONTENTS ABSTRACT ………………………………………………………………………………………………………………… iii ACKNOWLEDGMENTS …………………………………………………………………………………………… iv LIST OF ILLUSTRATIONS. …………………………………………………………………………………….. vii LIST OF TABLES…………………………………………………………………………….viii SECTION 1. INTRODUCTION ………………………………………………………………………………………………… 1 2. LITERATURE REVIEW ……………………………………………………………………………………… 3 2.1. USER STATES ……………………………………………………………………………………………… 3 2.2. ELECTROENCEPHALOGRAM (EEG)…………………………………………..4 2.3. RELATED WORK …………………………………………………………………..5 3. RESEARCH METHODOLOGY ………………………………………………………………….. 12 3.1....

☆☆☆☆☆ (0 sao, 0 phiếu bầu) - 9 lượt xem
Miễn phí
Tải về
Impact of framing and base size of computer security risk information on user behavior - Impact of framing and base size of computer security risk information on user behavior
Impact of framing and base size of computer security risk information on user behavior
Miễn phí

TABLE OF CONTENTS ABSTRACT ……………………………………………………………………………………………………….. iii ACKNOWLEDGMENTS ……………………………………………………………………………………. iv LIST OF ILLUSTRATIONS ………………………………………………………………………………. viii LIST OF TABLES ………………………………………………………………………………………………. ix SECTION 1. INTRODUCTION ……………………………………………………………………………………….. 1 2. LITERATURE REVIEW ……………………………………………………………………………… 3 2.1. COMPUTER SECURITY DECISION-MAKING …………………………………….. 3 2.2. SUSCEPTIBILITY TO COMPUTER SECURITY THREATS …………………… 4 2.3. FRAMING...

☆☆☆☆☆ (0 sao, 0 phiếu bầu) - 12 lượt xem
Miễn phí
Tải về
The Difficulty With Introducing Project Management Techniques in Digital Startups - The Difficulty With Introducing Project Management Techniques in Digital Startups
The Difficulty With Introducing Project Management Techniques in Digital Startups
Miễn phí

Table of Contents Introduction ……………………………………………………………………………………………………………………. 4 Problem Statement and Justification ………………………………………………………………………………….. 5 Literature Review ……………………………………………………………………………………………………………. 7 Proposed Solution Approach …………………………………………………………………………………………… 16 Results and Findings ……………………………………………………………………………………………………… 21 Conclusion ……………………………………………………………………………………………………………………. 28 References ……………………………………………………………………………………………………………………. 30

☆☆☆☆☆ (0 sao, 0 phiếu bầu) - 6 lượt xem
Miễn phí
Tải về
Ebook nghiên cứu về ngành Công nghệ thông tin - Ebook nghiên cứu về ngành Công nghệ thông tin
Ebook nghiên cứu về ngành Công nghệ thông tin
Miễn phí

Ebook nghiên cứu về ngành Công nghệ thông tin

☆☆☆☆☆ (0 sao, 0 phiếu bầu) - 11 lượt xem
Miễn phí
Tải về