Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
The Siege Effect: Exploring the Characteristics of Youth Consumption Behavior and Its Influencing Factors in the Chinese Short Drama Market
(Articles)
Longlong Duan
,
Yongsha Ma
,
Hongshu He
,
Siying Li
,
Yuxin Song
,
Zhan Wu
Theoretical Economics Letters
Vol.15 No.2
,April 30, 2025
DOI:
10.4236/tel.2025.152030
60
Downloads
504
Views
Citations
Decision-Making During the Process of Buying a House in Mongolia
(Articles)
Nergui Ariunjargal
,
Gonchigjav Boldbaatar
,
Myagmarsuren Odonchimeg
,
Erdenebileg Odgerel
Open Journal of Business and Management
Vol.13 No.4
,July 11, 2025
DOI:
10.4236/ojbm.2025.134140
11
Downloads
55
Views
Citations
Exploring Consumer Behavior towards Social Impact Apps for Food Waste Reduction
(Articles)
Aidan Gershengoren
,
Nymisha Bandi
Open Journal of Business and Management
Vol.13 No.4
,July 21, 2025
DOI:
10.4236/ojbm.2025.134149
9
Downloads
65
Views
Citations
On the Denial of Consumer Identity and Protection of People Who Knowingly Buy Fake Products
—Taking Chinese Market as an Example
(Articles)
Yong Li
,
Xiongbiao Ye
Beijing Law Review
Vol.13 No.3
,September 5, 2022
DOI:
10.4236/blr.2022.133034
165
Downloads
782
Views
Citations
When Should Suppliers Adopt Augmented Reality Technology in a Dual-Channel Supply Chain?
(Articles)
Shuai Xiang
,
Xiuli Yang
Theoretical Economics Letters
Vol.14 No.6
,December 2, 2024
DOI:
10.4236/tel.2024.146117
45
Downloads
248
Views
Citations
The Impact of Personalized AI-Generated Video Ads on Consumer Click-Through Rates
(Articles)
Nada Querch
,
Pingli Zhu
Open Access Library Journal
Vol.12 No.6
,June 30, 2025
DOI:
10.4236/oalib.1113607
29
Downloads
201
Views
Citations
A Direct Trust dependent Link State Routing Protocol Using Route Trusts for WSNs (DTLSRP)
(Articles)
Shaik Sahil Babu
,
Arnab Raha
,
Mrinal Kanti Naskar
Wireless Sensor Network
Vol.3 No.4
,March 31, 2011
DOI:
10.4236/wsn.2011.34015
6,654
Downloads
14,123
Views
Citations
A Novel Approach to Improve the Security of P2P File-Sharing Systems
(Articles)
Cuihua ZUO
,
Ruixuan LI
,
Zhengding LU
Int'l J. of Communications, Network and System Sciences
Vol.2 No.3
,June 21, 2009
DOI:
10.4236/ijcns.2009.23025
5,278
Downloads
9,485
Views
Citations
Issues in Global Software Development: A Critical Review
(Articles)
Sami ul Haq
,
Mushtaq Raza
,
Asraf Zia
,
M. Naeem Ahmed Khan
Journal of Software Engineering and Applications
Vol.4 No.10
,October 11, 2011
DOI:
10.4236/jsea.2011.410069
8,101
Downloads
17,336
Views
Citations
Power, the Hidden Factor in Development Cooperation. An Example of Community Forestry in Cameroon
(Articles)
Mbolo C. Yufanyi Movuh
,
Carsten Schusser
Open Journal of Forestry
Vol.2 No.4
,October 30, 2012
DOI:
10.4236/ojf.2012.24030
4,676
Downloads
8,449
Views
Citations
Shifting Private Timberland Ownership in South Carolina: Implications for Management Intensity
(Articles)
John E. Hatcher Jr.
,
Thomas J. Straka
,
Richard A. Harper
,
Tim O. Adams
Open Journal of Forestry
Vol.2 No.4
,October 30, 2012
DOI:
10.4236/ojf.2012.24035
7,374
Downloads
16,767
Views
Citations
Behind HumanBoost: Analysis of Users’ Trust Decision Patterns for Identifying Fraudulent Websites
(Articles)
Daisuke Miyamoto
,
Hiroaki Hazeyama
,
Youki Kadobayashi
,
Takeshi Takahashi
Journal of Intelligent Learning Systems and Applications
Vol.4 No.4
,November 28, 2012
DOI:
10.4236/jilsa.2012.44033
4,110
Downloads
6,721
Views
Citations
Trust and Security on Semantic HIM (Health Information Management)
(Articles)
Nasim Khozouei
,
Razie Vanda
,
Peyman Khozouei
Intelligent Information Management
Vol.4 No.6
,November 30, 2012
DOI:
10.4236/iim.2012.46045
4,551
Downloads
7,552
Views
Citations
A Heuristic Reputation Based System to Detect Spam Activities in a Social Networking Platform, HRSSSNP
(Articles)
Manoj Rameshchandra Thakur
,
Sugata Sanyal
Social Networking
Vol.2 No.1
,January 30, 2013
DOI:
10.4236/sn.2013.21005
3,025
Downloads
5,788
Views
Citations
The Mediating Role of Customer Trust on Customer Loyalty
(Articles)
Nha Nguyen
,
André Leclerc
,
Gaston LeBlanc
Journal of Service Science and Management
Vol.6 No.1
,March 25, 2013
DOI:
10.4236/jssm.2013.61010
24,664
Downloads
40,024
Views
Citations
Reference Point Based TR-PSO for Multi-Objective Environmental/Economic Dispatch
(Articles)
Ahmed Ahmed El-Sawy
,
Zeinab Mohamed Hendawy
,
Mohamed A. El-Shorbagy
Applied Mathematics
Vol.4 No.5
,May 20, 2013
DOI:
10.4236/am.2013.45110
5,498
Downloads
8,410
Views
Citations
Distributed and Cooperative Anomaly Detection Scheme for Mobile Ad Hoc Networks
(Articles)
Hisham Mustafa
,
Yan Xiong
,
Khalid Elaalim
Journal of Computer and Communications
Vol.2 No.3
,February 14, 2014
DOI:
10.4236/jcc.2014.23001
3,011
Downloads
5,904
Views
Citations
SCP-Trust Reasoning Strategy Based on Preference and Its Service Composition Process of Context-Aware Process
(Articles)
Xiaona Xia
,
Jiguo Yu
,
Baoxiang Cao
Journal of Computer and Communications
Vol.2 No.9
,July 11, 2014
DOI:
10.4236/jcc.2014.29006
2,633
Downloads
3,626
Views
Citations
Dysfunctional Outsider Executives’ Rule and the Terra Incognita of Concealed Managerial Ignorance
(Articles)
Reuven Shapira
Open Journal of Leadership
Vol.4 No.1
,February 27, 2015
DOI:
10.4236/ojl.2015.41002
3,553
Downloads
4,854
Views
Citations
A Non-Monotone Trust Region Method with Non-Monotone Wolfe-Type Line Search Strategy for Unconstrained Optimization
(Articles)
Changyuan Li
,
Qinghua Zhou
,
Xiao Wu
Journal of Applied Mathematics and Physics
Vol.3 No.6
,June 30, 2015
DOI:
10.4236/jamp.2015.36084
2,885
Downloads
3,827
Views
Citations
<
...
14
15
16
...
>
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2025 Scientific Research Publishing Inc. All Rights Reserved.
Top