default search action
Hsieh-Hong Huang
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j15]Jian-Wei Lin, Hsieh-Hong Huang, Hong-Ren Chen:
Team-based learning with group awareness: impact on students with different self-regulated learning levels. Interact. Learn. Environ. 32(8): 4009-4019 (2024) - [c6]Hsieh-Hong Huang, Jian-Wei Lin, Jack Shih-Chieh Hsu:
Effects of Stress and Self-Efficacy on Information Security Policy Compliance. PACIS 2024 - 2023
- [j14]Hsieh-Hong Huang, Chun-Nan Lin:
Influencing factors of mobile instant messaging applications between single- and multi- platform use cases. Comput. Stand. Interfaces 83: 103658 (2023) - [j13]Chun-Nan Lin, Hsieh-Hong Huang:
Exploring users' switching intention and behavior on social networking sites: Linear and nonlinear perspectives. Comput. Stand. Interfaces 83: 103660 (2023) - [j12]Jian-Wei Lin, Hsieh-Hong Huang, Chia-Wen Tsai:
Mobile collaborative learning with social network awareness. J. Comput. Assist. Learn. 39(5): 1690-1700 (2023) - 2022
- [j11]Chi-Lun Liu, Hsieh-Hong Huang, David C. Yen:
The Effects of Navigation Cues and Involvement of Highly Innovative Consumers on Attitudes Toward Mobile Application Stores. J. Electron. Commer. Organ. 20(1): 1-20 (2022) - 2020
- [c5]Hsiao-Ting Tseng, Hsieh-Hong Huang, Chen-Chiung Hsieh:
Active Aging AI Community Care Ecosystem Design. HCI (28) 2020: 196-208
2010 – 2019
- 2019
- [j10]Hsieh-Hong Huang, Jian-Wei Lin, Chia-Hsuan Lin:
Data Re-Identification - A Case of Retrieving Masked Data from Electronic Toll Collection. Symmetry 11(4): 550 (2019) - [c4]Hsieh-Hong Huang, Hsiao-Ting Tseng, Chia-Lun Lo:
A Study of Email Deception Based on Situation Awareness Theory. PACIS 2019: 211 - 2018
- [c3]Hsieh-Hong Huang, Chi-Lun Liu:
Study on the Effectiveness of Organizational Citizenship Behavior and Engagement on Information Security Policy. PACIS 2018: 138 - 2016
- [c2]Chi-Lun Liu, Hsieh-Hong Huang:
Ontology-Based Adaptive and Customizable Navigation Method in Online Retailing Websites. HCI (21) 2016: 228-237 - 2015
- [j9]Hsieh-Hong Huang, Ming-Che Kuo:
Looks familiar, appears more valid? The moderating role of computer-supported warnings between information repetition and decision outcome. Behav. Inf. Technol. 34(11): 1119-1128 (2015) - [j8]Jian-Wei Lin, Hsieh-Hong Huang, Yuh-Shy Chuang:
The impacts of network centrality and self-regulation on an e-learning environment with the support of social network awareness. Br. J. Educ. Technol. 46(1): 32-44 (2015) - 2014
- [j7]Yu Wen Hung, Jack Shih-Chieh Hsu, Zhi-Yuan Su, Hsieh-Hong Huang:
Countering user risk in information system development projects. Int. J. Inf. Manag. 34(4): 533-545 (2014) - [c1]Chi-Lun Liu, Hsieh-Hong Huang:
A Preliminary Study on Social Cues Design in Mobile Check-in Based Advertisement. HCI (18) 2014: 744-753 - 2012
- [j6]Hsieh-Hong Huang, Jack Shih-Chieh Hsu, Cheng-Yuan Ku:
Understanding the role of computer-mediated counter-argument in countering confirmation bias. Decis. Support Syst. 53(3): 438-447 (2012) - 2011
- [j5]Jack Shih-Chieh Hsu, Hsieh-Hong Huang, Lars P. Linden:
Computer-mediated Counter-Arguments and Individual Learning. J. Educ. Technol. Soc. 14(4): 111-123 (2011)
2000 – 2009
- 2009
- [j4]Fan Wu, Pei-Ran Sun, His-Kun Ke, Hsieh-Hong Huang, Yungyen Chiang:
A Study of Pre-Decision Evaluation Using Influence Diagram: An Estimation of the Benefits of Influenza Vaccination. J. Medical Syst. 33(1): 19-25 (2009) - [j3]Hsieh-Hong Huang, Cheng-Yuan Ku:
A RFID Grouping Proof Protocol for Medication Safety of Inpatient. J. Medical Syst. 33(6): 467-474 (2009) - 2006
- [j2]Huan-Ming Sheng, Jih-Chang Wang, Hsieh-Hong Huang, David C. Yen:
Fuzzy measure on vehicle routing problem of hospital materials. Expert Syst. Appl. 30(2): 367-377 (2006) - 2005
- [j1]Hsieh-Hong Huang, Jack Shih-Chieh Hsu:
An Evaluation of Publication Productivity in Information Systems: 1999 to 2003. Commun. Assoc. Inf. Syst. 15: 31 (2005)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-02 22:27 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint