Skip to content

Hamed Taherdoost

Make Your BIG ON!

  • C.V
  • Biography
  • Publication
  • Contact
Search

Hamed Taherdoost

Make Your BIG ON!

Close menu
  • C.V
  • Biography
  • Publication
  • Contact

Hamed Taherdoost

Make Your BIG ON!

Search Toggle menu
May 14, 2016February 9, 2020Information Security, Web Mining

Criminal Communities Mining on the Web

Criminal Communities Mining on the Web Abstract Authors:-Full Text

April 28, 2016February 9, 2020Marketing Management

Marketing vs E-Marketing

Marketing vs E-Marketing Abstract Hamed Taherdooost Keywords:- Traditional Marketing, Online Marketing, E – Marketing, Internet Marketing

April 12, 2016February 9, 2020Analytical Hierarchical Process Technique, Performance Management, Project Management

The Analytic Network Process Approach to Select Location for Industrial Area for Projects

The Analytic Network Process Approach to Select Location for Industrial Area for Projects Abstract Neda Jalaliyoon, Nooh Abu Bakar, Hamed Taherdoost and Mohammad Mobin Rupani Keywords:- Multiple Criteria Decision Making (Mcdm), Locating,Industrial Zone, Analytic Network Process (ANP)

April 9, 2016February 9, 2020Artificial Intelligence, E-service, Information Security

How Security Issues Can Influence on Usage of Electronic Services

How Security Issues Can Influence on Usage of Electronic Services Abstract Hamed Taherdoost, Shamsul Sahibuddin, and Neda Jalaliyoon Keywords:- Web – Based Service, Electronic Service, Security Factor, Adoption, Acceptance, Security and Exploratory Factor Analysis

March 11, 2016February 9, 2020E-service

Perceived Barriers and Benefits of Web Based Services

Perceived Barriers and Benefits of Web Based Services Abstract Hamed Taherdoost, Shamsul Sahibuddin and Neda Jalaliyoon Keywords:- Barriers and Benefits, Electronic Services, SWOT, Web Based Services

February 15, 2016February 9, 2020Methodology

Structure of Email Discourse in a Selected Iranian Organization

Structure of Email Discourse in a Selected Iranian Organization Abstract Mitra Madanchian and Hamed Taherdoost Keywords:- Computer – Mediated Communication (CMC), E – Mail Discourse, Organization

February 11, 2016February 9, 2020Artificial Intelligence, Steganography

An Artificial-Intelligence-Based Approach for Audio Steganography

An Artificial-Intelligence-Based Approach for Audio Steganography Abstract Mazdak Zamani, Hamed Taherdoost, Azizah A. Manaf, Rabiah B. Ahmad, and Akram M. Zeki Keywords:- Data Hiding, Substitution Techniques, Audio Steganography, Artificial Intelligence, Genetic Algorithm

February 5, 2016February 9, 2020Technology Acceptance, Web Mining

Information Mining on the Web: E-business Application

Information Mining on the Web: E-business Application Abstract Hamed Taherdoost and Javad Hosseinkhani Keywords:- Application, Crowler, E-Business, Framework, Information Mining, Search Engine, Web Mining

January 18, 2016February 9, 2020E-service, Information Security

Classification of Web based Service User Types

Classification of Web based Service User Types Abstract Hamed Taherdoost, Shamsul Sahibuddin, Neda Jalaliyoon and Javad Hosseinkhani Keywords:- Electronic Services, User Acceptance And E-Service User, Classification, User Experience, Web Based Services

December 27, 2015February 9, 2020Information Security

E-Services Usage Evaluation; Applications? level of Co-Creation and Digitalization

E-Services Usage Evaluation; Applications? level of Co-Creation and Digitalization Abstract Hamed Taherdoost, Shamsul Sahibuddin, Neda Jalaliyoon Keywords:- E-Service, Digitalization, Co-Creation, E-Commerce, Classification Of Service

Posts pagination

< 1 … 5 6 7 … 10 >
© 2026 Hamed Taherdoost. Proudly powered by Sydney