default search action
Isaac Wiafe
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c17]Akon O. Ekpezu, Isaac Wiafe, Harri Oinas-Kukkonen:
Technological Factors that Influence User Compliance with Behavior Change Support Systems: A Systematic Review. HICSS 2024: 3434-3443 - [c16]Akon O. Ekpezu, Charles Nutrokpor, Isaac Wiafe, Harri Oinas-Kukkonen:
Examining Continuance Intention to Exercise in a Virtual Reality Environment. HICSS 2024: 3527-3536 - 2023
- [c15]Akon Obu Ekpezu, Harri Oinas-Kukkonen, Isaac Wiafe:
Investigating the Determinants of Compliance Intention in Behavior Change Support Systems. AMCIS 2023 - [c14]Isaac Wiafe, Elikem Doe Atsakpo, Charles Nutrokpor, Jaap Ham, Stephen R. Gulliver:
Design and Evaluation of a Persuasive Road Marking System for Controlling Speeding Behavior. MindTrek 2023: 35-44 - [c13]Felix Nti Koranteng, Uwe Matzat, Isaac Wiafe, Jaap Ham:
Credibility in Persuasive Systems: A Systematic Review. PERSUASIVE 2023: 389-409 - 2022
- [j13]Isaac Wiafe, Felix Nti Koranteng, Ferdinand Apietu Kastriku, Gifty Oforiwaa Gyamera:
Assessing the impact of persuasive features on user's intention to continuous use: the case of academic social networking sites. Behav. Inf. Technol. 41(4): 712-730 (2022) - [j12]Felix Nti Koranteng, Jaap Ham, Isaac Wiafe, Uwe Matzat:
The role of usability, aesthetics, usefulness and primary task support in predicting the perceived credibility of academic social networking sites. Behav. Inf. Technol. 41(16): 3617-3632 (2022) - [j11]Akon O. Ekpezu, Ferdinand Apietu Katsriku, Winfred Yaokumah, Isaac Wiafe:
The Use of Machine Learning Algorithms in the Classification of Sound: A Systematic Review. Int. J. Serv. Sci. Manag. Eng. Technol. 13(2): 1-28 (2022) - [c12]Felix Nti Koranteng, Jaap Ham, Uwe Matzat, Isaac Wiafe:
Supporting to be Credible: Investigating Perceived Social Support as a Determinant of Perceived Credibility. PERSUASIVE 2022: 109-119 - 2021
- [j10]Isaac Wiafe, Felix Nti Koranteng, Ebenezer Owusu, Samuel Alimo:
Factors that influence user perception of ubiquitous monitoring environments: An empirical study in a developing country. J. Ambient Intell. Smart Environ. 13(2): 117-131 (2021) - [j9]Ebenezer Owusu, Isaac Wiafe:
An advance ensemble classification for object recognition. Neural Comput. Appl. 33(18): 11661-11672 (2021) - [j8]Frank Kataka Banaseka, Hervé Franklin, Ferdinand Apietu Katsriku, Jamal-Deen Abdulai, Akon O. Ekpezu, Isaac Wiafe:
Soil Medium Electromagnetic Scattering Model for the Study of Wireless Underground Sensor Networks. Wirel. Commun. Mob. Comput. 2021: 8842508:1-8842508:11 (2021) - [c11]Charles Nutrokpor, Akon O. Ekpezu, Abigail Wiafe, Isaac Wiafe:
Exploring the Impact of Persuasive System Features on User Sentiments in Health and Fitness Apps. BCSS@PERSUASIVE 2021: 25-39 - [c10]Felix Nti Koranteng, Jaap Ham, Isaac Wiafe:
Investigating User Perceptions of Persuasive Design Elements that Influence Perceived Credibility. PERSUASIVE 2021: 164-177 - [c9]Muna M. Alhammad, Isaac Wiafe, Stephen R. Gulliver:
Exploring the Impact of Persuasive Features on Customer Satisfaction Levels of E-Commerce Websites Based on the Kano Model. PERSUASIVE 2021: 178-192 - 2020
- [j7]Isaac Wiafe, Felix Nti Koranteng, Emmanuel Nyarko Obeng, Nana Assyne, Abigail Wiafe, Stephen R. Gulliver:
Artificial Intelligence for Cybersecurity: A Systematic Mapping of Literature. IEEE Access 8: 146598-146612 (2020) - [j6]Isaac Wiafe, Felix Nti Koranteng, Abigail Wiafe, Emmanuel Nyarko Obeng, Winfred Yaokumah:
The role of norms in information security policy compliance. Inf. Comput. Secur. 28(5): 743-761 (2020) - [j5]Isaac Wiafe, Felix Nti Koranteng, Ebenezer Owusu, Akon O. Ekpezu, Samuel Adu Gyamfi:
Persuasive social features that promote knowledge sharing among tertiary students on social networking sites: An empirical study. J. Comput. Assist. Learn. 36(5): 636-645 (2020) - [j4]Isaac Wiafe, Felix Nti Koranteng, Thomasina Tettey, Ferdinand Apietu Kastriku, Jamal-Deen Abdulai:
Factors that affect acceptance and use of information systems within the Maritime industry in developing countries. J. Syst. Inf. Technol. 22(1): 21-45 (2020)
2010 – 2019
- 2019
- [j3]Felix Nti Koranteng, Isaac Wiafe:
Factors that Promote Knowledge Sharing on Academic Social Networking Sites: An Empirical Study. Educ. Inf. Technol. 24(2): 1211-1236 (2019) - [c8]Nana Assyne, Isaac Wiafe:
A Dynamic Software Startup Competency Model. ICSOB 2019: 419-422 - 2018
- [c7]Jonathan Dabi, Isaac Wiafe, Agnis Stibe, Jamal-Deen Abdulai:
Can an Enterprise System Persuade? The Role of Perceived Effectiveness and Social Influence. PERSUASIVE 2018: 45-55 - 2017
- [c6]Eric Kuada, Isaac Wiafe, Daniel Addo, Emmanuel Djaba:
Privacy enhancing national identification card system. AFRICON 2017: 867-872 - 2015
- [c5]Isaac Wiafe, Dorothy A. Frempong:
Enhancing Persuasive Features of Behaviour Change Support Systems: The Role of U-FADE. BCSS@PERSUASIVE 2015: 17-27 - 2014
- [j2]Isaac Wiafe, Keiichi Nakata, Stephen R. Gulliver:
Categorizing users in behavior change support systems based on cognitive dissonance. Pers. Ubiquitous Comput. 18(7): 1677-1687 (2014) - 2013
- [j1]Isaac Wiafe:
U-FADE: A Unified Approach To Persuasive Systems Development. Int. J. Concept. Struct. Smart Appl. 1(2): 6-16 (2013) - 2012
- [c4]Isaac Wiafe, Muna M. Alhammad, Keiichi Nakata, Stephen R. Gulliver:
Analyzing the Persuasion Context of the Persuasive Systems Design Model with the 3D-RAB Model. PERSUASIVE 2012: 193-202 - 2011
- [c3]Isaac Wiafe, Keiichi Nakata, Stuart Moran, Stephen R. Gulliver:
Considering user attitude and behaviour in persuasive systems design: the 3d-rab model. ECIS 2011: 186 - [c2]Stuart Moran, Isaac Wiafe, Keiichi Nakata:
Ubiquitous Monitoring and User Perceptions as a Persuasive Strategy. Web Intelligence/IAT Workshops 2011: 41-44 - 2010
- [c1]Isaac Wiafe, Keiichi Nakata:
A Semiotic Analysis of Persuasive Technology - An Application to Obesity Management. ICISO 2010: 157-164
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:16 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint