Domain name and site hosting preferences: empirical evidence
At the Multimedia University, Malaysia, a first-year undergraduate course in electronic commerce was given the task of evaluating commercial Web sites. The existence of the host was verified when it was added to the sample, and again six months later. The sample was then analysed for correlation bet...
| Main Authors: | O’Daniel, Thomas, Chew, Kok Wai |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
MCB UP Ltd
2000
|
| Subjects: | |
| Online Access: | http://shdl.mmu.edu.my/2727/ http://shdl.mmu.edu.my/2727/1/Domain%20name%20and%20site%20hosting%20preferences%20empirical%20evidence.pdf |
Similar Items
Rule-Based Approach For Detecting Botnet Based On Domain Name System
by: Alieyan, Kamal Ibrahim Ahmed
Published: (2018)
by: Alieyan, Kamal Ibrahim Ahmed
Published: (2018)
Semantic Lexical Alignment For Domain-Specific Ontologies.
by: Abu-Shareha, Ahmad Adel, et al.
Published: (2009)
by: Abu-Shareha, Ahmad Adel, et al.
Published: (2009)
Key usability factors of service-oriented web sites for students: an empirical study
by: Nathan, Robert J., et al.
Published: (2008)
by: Nathan, Robert J., et al.
Published: (2008)
The Dynamic Host Configuration Protocol Version 6 Security And Privacy Mechanism
by: Ibrahim, Ayman Khallel
Published: (2020)
by: Ibrahim, Ayman Khallel
Published: (2020)
Robust Video Watermarking Based On 3D-DWT Domain.
by: A.M .Al-Taweel, Sadik., et al.
Published: (2009)
by: A.M .Al-Taweel, Sadik., et al.
Published: (2009)
An Open-Domain Question Answering System Using Annotated Web Feeds.
by: Ismail, Bukhary Ikhwan, et al.
Published: (2007)
by: Ismail, Bukhary Ikhwan, et al.
Published: (2007)
Stego Keys Performance on Feature Based Coding Method in Text Domain
by: Din, Roshidi, et al.
Published: (2017)
by: Din, Roshidi, et al.
Published: (2017)
Similarity-Based Weights For
Cross-Domain Sentiment Classification Of Product Reviews
by: Gupta, Aditi
Published: (2023)
by: Gupta, Aditi
Published: (2023)
Impact of Redhat IPv6 router on heterogeneous host connections
by: Syed Mohamed, Sulaiman, et al.
Published: (2007)
by: Syed Mohamed, Sulaiman, et al.
Published: (2007)
Tile-Level Parallelism For H.264/Avc Codec Using Parallel Domain Decomposition Algorithm On Shared Memory Architecture
by: Eessa, Mohammed F.
Published: (2015)
by: Eessa, Mohammed F.
Published: (2015)
KM implementation in Malaysian telecommunication industry: An empirical analysis
by: Chong, Chin Wei, et al.
Published: (2006)
by: Chong, Chin Wei, et al.
Published: (2006)
A practical implementation of a 3-D game engine
by: Cheah, Thomas C. S., et al.
Published: (2005)
by: Cheah, Thomas C. S., et al.
Published: (2005)
E-book design preferences: A case study
by: Lim, Yan Peng, et al.
Published: (2008)
by: Lim, Yan Peng, et al.
Published: (2008)
Empirical Analysis on Factors Impacting on Intention to Use M-learning in Basic Education in Egypt
by: Ali, Reham Adel, et al.
Published: (2018)
by: Ali, Reham Adel, et al.
Published: (2018)
Autonomous and deterministic clustering for evidence-theoretic classifier
by: Poh, , Chen Li, et al.
Published: (2006)
by: Poh, , Chen Li, et al.
Published: (2006)
VHDL modelling of the open short tester
by: Pang, Wai Leong, et al.
Published: (2007)
by: Pang, Wai Leong, et al.
Published: (2007)
Theoretic evidence k-nearest neighbourhood classifiers in a bimodal biometric verification system
by: Jin, , ATB, et al.
Published: (2003)
by: Jin, , ATB, et al.
Published: (2003)
Quantitative Computational Framework For Analyzing Evidence To Identify Attack Intention And Strategy In Network Forensics
by: Mosa, Mohammad Rasmi Hassun
Published: (2013)
by: Mosa, Mohammad Rasmi Hassun
Published: (2013)
A Markovian inventory system with random shelf time and back orders
by: CHAKRAVARTHY, S, et al.
Published: (2004)
by: CHAKRAVARTHY, S, et al.
Published: (2004)
Automated Federation Of Virtual Organization In Grid Using Select, Match, Negotiate And Expand (SMNE) Protocol [QA76.9.C58 C518 2008 f rb].
by: Cheng, Wai Khuen
Published: (2007)
by: Cheng, Wai Khuen
Published: (2007)
White-Matter Lesion Segmentation In Brain Mri Using Adaptive Trimmed Mean Approach
by: Ong , Kok Haur
Published: (2011)
by: Ong , Kok Haur
Published: (2011)
An Empirical Study of Learning Object Acceptance in Multimedia Learning Environment
by: Lau, Siong Hoe, et al.
Published: (2008)
by: Lau, Siong Hoe, et al.
Published: (2008)
AN EMPIRICAL INVESTIGATION OF METHODS, FOR TEACHING DESIGN PATTERNS WITHIN, OBJECT-ORIENTED FRAMEWORKS
by: HO, SIN BAN, et al.
Published: (2007)
by: HO, SIN BAN, et al.
Published: (2007)
Mobile Phone Use in a Developing Country: A Malaysian Empirical Study
by: Heng, Paul Ping Yeow, et al.
Published: (2008)
by: Heng, Paul Ping Yeow, et al.
Published: (2008)
Coinware for Multilingual Passphrase Generation and Its Application for Chinese Language Password
by: Lee, Kok-wah, et al.
Published: (2006)
by: Lee, Kok-wah, et al.
Published: (2006)
A Bayesian approach to classify conference papers
by: Khor, , Kok-Chin, et al.
Published: (2006)
by: Khor, , Kok-Chin, et al.
Published: (2006)
Evolutionary Data Mining Design to Visualize the Examination Timetabling Data at a University: A First Round Development.
by: Thomas, J. Joshua, et al.
Published: (2007)
by: Thomas, J. Joshua, et al.
Published: (2007)
Adoption of interorganizational system standards in supply chains - An empirical analysis of RosettaNet standards
by: Alain Chong Yee, Loong, et al.
Published: (2008)
by: Alain Chong Yee, Loong, et al.
Published: (2008)
Data Mining Approach on Nationwide School Exam System
by: ONG Wai Kit, Janson Luke, et al.
Published: (2004)
by: ONG Wai Kit, Janson Luke, et al.
Published: (2004)
A cascaded classifier approach for improving detection rates on rare attack categories in network intrusion detection
by: Khor, Kok Chin, et al.
Published: (2012)
by: Khor, Kok Chin, et al.
Published: (2012)
Clustering In Fingerprint Recognition System.
by: Ooi, Boon Yaik, et al.
Published: (2004)
by: Ooi, Boon Yaik, et al.
Published: (2004)
Design and Implementation of an XML Firewall
by: Loh, Yin-soon, et al.
Published: (2006)
by: Loh, Yin-soon, et al.
Published: (2006)
Knowledge Sharing in an Electronics Manufacturing Firm: Evidence from Malaysia
by: Mohammed, Nurliza Fathi, et al.
Published: (2009)
by: Mohammed, Nurliza Fathi, et al.
Published: (2009)
On An Improved Parallel Construction Of Suffix Arrays For Low Bandwidth Pc-Cluster.
by: Kok, Jun Lee, et al.
Published: (2003)
by: Kok, Jun Lee, et al.
Published: (2003)
Statistical analyses on time complexity and rank consistency between singular value decomposition and the duality approach in AHP: A case study of faculty member selection
by: MAMAT, N, et al.
Published: (2007)
by: MAMAT, N, et al.
Published: (2007)
An Empirical Study of Internet-Based ICT Adoption Among Malaysian SMEs
by: Khong Sin, Tan, et al.
Published: (2008)
by: Khong Sin, Tan, et al.
Published: (2008)
The Control Environment, Employee Fraud and Counterproductive Workplace Behaviour: An Empirical Analysis
by: Zauwiyah, Ahmad, et al.
Published: (2008)
by: Zauwiyah, Ahmad, et al.
Published: (2008)
The Control Environment, Employee Fraud and Counterproductive Workplace Behaviour: An Empirical Analysis
by: Zauwiyah, Ahmad, et al.
Published: (2008)
by: Zauwiyah, Ahmad, et al.
Published: (2008)
An empirical study of website adoption among Small and Medium Enterprises (SMEs) in Malaysia
by: Narayanasamy, Kogilah, et al.
Published: (2008)
by: Narayanasamy, Kogilah, et al.
Published: (2008)
Passphrase with semantic noises and a proof on its higher information rate
by: Lee, Kok-Wah, et al.
Published: (2007)
by: Lee, Kok-Wah, et al.
Published: (2007)
Similar Items
-
Rule-Based Approach For Detecting Botnet Based On Domain Name System
by: Alieyan, Kamal Ibrahim Ahmed
Published: (2018) -
Semantic Lexical Alignment For Domain-Specific Ontologies.
by: Abu-Shareha, Ahmad Adel, et al.
Published: (2009) -
Key usability factors of service-oriented web sites for students: an empirical study
by: Nathan, Robert J., et al.
Published: (2008) -
The Dynamic Host Configuration Protocol Version 6 Security And Privacy Mechanism
by: Ibrahim, Ayman Khallel
Published: (2020) -
Robust Video Watermarking Based On 3D-DWT Domain.
by: A.M .Al-Taweel, Sadik., et al.
Published: (2009)