JCT - Faculty Research Profile - 2017-2021

26 8. D. Mughaz, M. Cohen, S. Mejahez, T. Ades and D. Bouhnik. From an Artificial Neural Network to Teaching. Interdisciplinary Journal of e-Skills and Lifelong Learning, Vol 16, 1-17. (2020) 9. M. Weinberger, D. Bouhnik. The Strive for Preserving Online Anonymity as a Trigger for Online Identity Falsification. Systemics, Cybernetics and Informatics, 7(2), 22-24. (2019), Rank=Q3 10. M. Weinberger, D. Bouhnik. Place determinants for the personalization-privacy tradeoff among students. Interdisciplinary Journal of e-Skills and Lifelong Learning, 15, 79-95. (2018). 11. D. Bouhnik, G. Carmi. Interface Application Comprehensive Analysis of Ghostery. International Journal of Computer Systems (IJCS). 5(3), 4-10. (2018) 12. M. Weinberger, M. Zhitomirsky-Geffet, D. Bouhnik. Factors affecting users' online privacy literacy among students in Israel. Online Information Review. Vol. 41 Issue: 5, pp.655-671. (2017). IF=1.91, Rank=Q1 13. M. Weinberger, M. Zhitomirsky-Geffet, D. Bouhnik. Sex differences in attitudes towards online privacy and anonymity among Israeli students with different technical backgrounds. Information Research, 22(4), paper 777. (2017). IF=0.84, Rank= Q2 14. D. Bouhnik, Y. Giat, and I. Zarruk. (2017). The informing needs of procurement officers in Israel. Informing Science. The International Journal of an Emerging Transdiscipline, 20, 149-165. (H Index 10) 15. M. Weinberger, D. Bouhnik, M. Zhitomirsky-Geffet. Factors affecting students' privacy paradox and privacy protection behavior. Open Information Science. 1(1), 1– 18. (2017). Retrieved 1 Jul. 2017, from doi:10.1515/opis-2017-0001 16. D. Bouhnik, Y. Giat and I. Zarruk. Supplier Selection and Assessment by University Procurement Officers, International Journal of Information Systems and Supply Chain Management (IJISSCM), Vol. 10, Issue 1, (2017).Rank=Q3. Peer-Reviewed Papers in Refereed Conference Proceedings 1. D. Bouhnik, Y.Giat. Information Needs for Procurement Officers in Israel. InSITE 2017: Informing Science + IT Education Conferences: Ho Chi Minh, Vietnam. August 2017. 2. D. Bouhnik Predictors of Online Privacy Paradox Behavior among Students. Poster. IConference 2017: Wuhan, China. 2017. 3. D. Bouhnik, L.Abrahas, O.Madar. Optimal ULD Treatment Algorithm as a Function of the Number of ULD, AWB and System Constraints. ACM DL. 3rd International Conference on Information Management and Data Mining (ICISDM 2017). South Africa, February 2017. 4. D. Bouhnik, A.Admoni. The Stranger: Infiltration Techniques of Trojan Horse in his First Decade (1972-1983). CCVPR 2018: International Joint Conference on Computer Vision and Pattern Recognition, Wellington, New Zealand, December 2018. 5. D. Bouhnik, G.Prebor, M. Zitomirsky-Gefet. DH2018: Digital Humanities: Mexico City, June 2018. A New Methodology for Error Detection and Data Completion in a Large Historical Catalogue Based on an Event Ontology and Network Analysis.

RkJQdWJsaXNoZXIy MjgzNzA=