-
221
-
222
-
223
Designing the strategic model of online banking relational marketing in the fourth industrial revolution with the foundation's data approach.
Published 2025-03-01“…Theoretical Framework Relational marketing Relational marketing consists of Creating, maintaining, and promoting relationships with customers and stakeholders of the company, which is achieved through building trust as a result of fulfilling obligations. In fact, relational marketing is defined as a type of marketing that attracts, develops, maintains, and promotes relationships with customers. …”
Get full text
Article -
224
Design and validation of consumer behavior model based on user-generated content in the banking industry
Published 2024-09-01“…In fact, any form of content, which is produced outside of professional structures, is called user-generated content, usually disseminated in social platforms and technologies including social networks, social computing, web 2, collective action tools, social web, read/write web, Customer-generated networks, virtual communities, computer-mediated communication, socio-technical systems (Koivisto & Mattila, 2018). …”
Get full text
Article -
225
-
226
-
227
-
228
An End-to-End Rumor Detection Model Based on Feature Aggregation
Published 2021-01-01Get full text
Article -
229
-
230
Improving the experience of health services for trans and gender-diverse young people and their families: an exploratory qualitative study
Published 2025-02-01“…The recent decision to restructure gender services for young people, and close the long established Gender Identity Development Service at the Tavistock and Portman NHS Foundation Trust, is leading to further uncertainty. In order to cope and thrive against so many challenges, online resources and spaces have become increasingly important for trans youth. …”
Get full text
Article -
231
Similarity Property and Slide Attack of Block Cipher FESH
Published 2023-01-01Get full text
Article -
232
PATS: Let Parties Have a Say in Threshold Group Key Sharing
Published 2024-01-01Get full text
Article -
233
A Novel Authentication Management for the Data Security of Smart Grid
Published 2024-01-01Get full text
Article -
234
Efficient Privacy-Preserving Protocol for k-NN Search over Encrypted Data in Location-Based Service
Published 2017-01-01“…The proposed scheme performs the secret circular shift of the encrypted POIs information to hide the location of the user without a trusted third party. To reduce the computation and communication cost, we dynamically divide the table of the POIs information according to the value of k. …”
Get full text
Article -
235
Efficient oblivious transfer with membership verification
Published 2019-09-01Get full text
Article -
236
A Blockchain-Based Protocol for Fair Delivery for Receipts
Published 2024-12-01Get full text
Article -
237
-
238
-
239
Detection of Illegal Movement in Radioactive Material Transportation Security Systems
Published 2021-01-01Get full text
Article -
240
Inverse Design of Centrifugal Compressor Stages Using a Meanline Approach
Published 2004-01-01“…As an alternative to commercially available inverse design codes, this tool is intended for exclusive OEM use and calls a trusted database of loss models for individual stage components, such as impellers, guide vanes, diffusers, etc. …”
Get full text
Article