default search action
Jason Watson
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j15]Sea Jung Im, Yue Xu, Jason Watson:
Learning medical concept representation based on semantic information in medical textural data. Expert Syst. Appl. 238(Part E): 122123 (2024) - 2023
- [j14]Stevanus Wisnu Wijaya, Jason Watson, Christine Bruce:
A virtual ethnography study of Indonesian migrant domestic workers' empowerment in online communities. Behav. Inf. Technol. 42(7): 921-939 (2023) - 2022
- [j13]Reihaneh Bidar, Alistair Barros, Jason Watson:
Co-creation of services: an online network perspective. Internet Res. 32(3): 897-915 (2022) - [c31]Sea Jung Im, Yue Xu, Jason Watson:
Semantic-based Attention model for Hospital Readmission Prediction. IEEE Big Data 2022: 1836-1841 - 2021
- [j12]Atae Rezaei Aghdam, Jason Watson, Shah Jahan Miah, Cynthia Cliff:
A novel information sharing framework for people living with type-2 diabetes in the context of a group education program. Health Inf. Sci. Syst. 9(1) (2021) - [c30]Sea Jung Im, Yue Xu, Jason Watson:
Hospital Readmission Prediction Using Semantic Relations Between Medical Codes. AusDM 2021: 62-71 - [i3]Samuel Spencer, Thomas Armstrong, Jason Watson, Salvatore Mangano, Yves Renier, Garret Cotter:
Deep learning with photosensor timing information as a background rejection method for the Cherenkov Telescope Array. CoRR abs/2103.06054 (2021) - 2020
- [j11]Mostafa Kamalpour, Jason Watson, Laurie Buys:
How Can Online Communities Support Resilience Factors among Older Adults. Int. J. Hum. Comput. Interact. 36(14): 1342-1353 (2020) - [j10]Andrew Besmer, Jason Watson, M. Shane Banks:
Investigating User Perceptions of Mobile App Privacy: An Analysis of User-Submitted App Reviews. Int. J. Inf. Secur. Priv. 14(4): 74-91 (2020) - [c29]Atae Rezaei Aghdam, Jason Watson, Shah Jahan Miah, Cynthia Cliff:
Towards Empowering People Living with Type-2 Diabetes: A perspective on self-management in the context of a group-based education program. ACIS 2020: 43 - [c28]Sea Jung Im, Yue Xu, Jason Watson, Ann Bonner, Helen Healy, Wendy Hoy:
Hospital Readmission Prediction using Discriminative patterns. SSCI 2020: 50-57 - [i2]Atae Rezaei Aghdam, Jason Watson, Shah Jahan Miah, Cynthia Cliff:
Towards Empowering Diabetic Patients: A perspective on self-management in the context of a group-based education program. CoRR abs/2010.13276 (2020)
2010 – 2019
- 2019
- [j9]Elham Sayyad Abdi, Helen Partridge, Christine Bruce, Jason Watson:
Skilled immigrants: a resettlement information literacy framework. J. Documentation 75(4): 892-908 (2019) - [c27]Shilpa Kochar, Jason Watson, Chun Ouyang:
Network Ties and Their Effect on Employee Collaboration in Enterprise Social Networks: A Review and Research Agenda. ACIS 2019: 76 - 2018
- [j8]Stevanus Wisnu Wijaya, Jason Watson, Christine Bruce:
Understanding Empowerment in Social Media Context: Lessons from Indonesian Migrant Domestic Workers. Int. J. Web Based Communities 14(2): 172-195 (2018) - [c26]Atae Rezaei Aghdam, Jason Watson, Hasti Ziaimatin:
A Systematic Review of Online Value Co-Creation in the Healthcare Service Ecosystem. ACIS 2018: 51 - [c25]Paul Mathiesen, Jason Watson, Wasana Bandara:
Social Technology Affordances for Business Process Improvement. Business Process Management Workshops 2018: 73-84 - [c24]Bandar Alghamdi, Yue Xu, Jason Watson:
A Hybrid Approach for Detecting Spammers in Online Social Networks. WISE (1) 2018: 189-198 - 2017
- [j7]Mohammad Badiul Islam, Jason Watson, Renato Iannella, Shlomo Geva:
A greater understanding of social networks privacy requirements: The user perspective. J. Inf. Secur. Appl. 33: 30-44 (2017) - [c23]Melinda D'Cruz, Jason Watson, Greg Timbrell:
Digital Government Strategy Derivation: A Matter of Design. ACIS 2017: 11 - [c22]Mythreyi Velmurugan, Jason Watson:
Online mediated sobriety: a conceptualization of the peer to peer social support mechanisms in an online "Stop Drinking" community. ACIS 2017: 53 - [c21]Bandar Alghamdi, Yue Xu, Jason Watson:
Malicious Behaviour Analysis on Twitter Through the Lens of User Interest. AusDM 2017: 233-249 - 2016
- [j6]Sirous Panahi, Jason Watson, Helen Partridge:
Social media and physicians: Exploring the benefits and challenges. Health Informatics J. 22(2): 99-112 (2016) - [j5]Sirous Panahi, Jason Watson, Helen Partridge:
Information encountering on social media and tacit knowledge sharing. J. Inf. Sci. 42(4): 539-550 (2016) - [j4]Sirous Panahi, Jason Watson, Helen Partridge:
Conceptualising social media support for tacit knowledge sharing: physicians' perspectives and experiences. J. Knowl. Manag. 20(2): 344-363 (2016) - [c20]Reihaneh Bidar, Jason Watson, Alistair Barros:
Literature Review to determine Environmental and Cognitive Factors underlying User Value Cocreation behaviour. PACIS 2016: 327 - [c19]Bandar Alghamdi, Jason Watson, Yue Xu:
Toward Detecting Malicious Links in Online Social Networks through User Behavior. WI Workshops 2016: 5-8 - [i1]Melinda D'Cruz, Greg Timbrell, Jason Watson:
Strategy in a Digital World. CoRR abs/1606.03530 (2016) - 2015
- [j3]Mohammad Badiul Islam, Renato Iannella, Jason Watson, Shlomo Geva:
Privacy architectures in social networks' state-of-the-art survey. Int. J. Inf. Priv. Secur. Integr. 2(2): 102-137 (2015) - [j2]Jason Watson, Heather Richter Lipford, Andrew Besmer:
Mapping User Preference to Privacy Default Settings. ACM Trans. Comput. Hum. Interact. 22(6): 32:1-32:20 (2015) - [c18]Melinda D'Cruz, Greg Timbrell, Jason Watson:
Strategy in a Digital World. ACIS 2015: 157 - [c17]Jason Watson:
Predicting privacy settings with a user-centered approach. CTS 2015: 499-500 - 2014
- [c16]Fayez Hussain Alqahtani, Jason Watson, Helen Partridge:
Organizational support and Enterprise Web 2.0 adoption: a qualitative study. AMCIS 2014 - [c15]Andrew Heathcote, Ami Eidels, Joseph Houpt, James R. Coleman, Jason Watson, David L. Strayer:
Multitasking in Working Memory. CogSci 2014 - [c14]Fayez Hussain Alqahtani, Jason Watson, Helen Partridge:
Web 2.0 within organisations: Bridging the gap between KM technology-centred and people-centred approaches. CTS 2014: 570-573 - 2013
- [j1]Sirous Panahi, Jason Watson, Helen Partridge:
Towards tacit knowledge sharing over social web tools. J. Knowl. Manag. 17(3): 379-397 (2013) - [c13]Majid Aldraehim, Sylvia L. Edwards, Jason Watson, Taizan Chan:
Cultural impact on e-service use in Saudi Arabia: The need for Service Oriented Culture. AMCIS 2013 - [c12]Bhuva Narayan, Bazilah A. Talip, Jason Watson, Sylvia L. Edwards:
Social Media as Online Information Grounds: A Preliminary Conceptual Framework. ICADL 2013: 127-131 - [c11]Paul Mathiesen, Wasana Bandara, Jason Watson:
The Affordances of Social Technology: a BPM Perspective. ICIS 2013 - [c10]Fayez Hussain Alqahtani, Jason Watson, Helen Partridge:
Employees' Adoption of Enterprise Web 2.0: The Role of Technological Attributes. PACIS 2013: 222 - 2012
- [c9]Sirous Panahi, Jason Watson, Helen Partridge:
Potentials of social media for tacit knowledge sharing among clinicians: Preliminary findings. ACIS 2012 - [c8]Majid Aldraehim, Sylvia L. Edwards, Jason Watson:
Cultural Impact on e-service Use in Saudi Arabia: Results from Focus Groups. ITNG 2012: 744-750 - [c7]Jason Watson, Andrew Besmer, Heather Richter Lipford:
+Your circles: sharing behavior on Google+. SOUPS 2012: 12 - 2011
- [c6]Paul Mathiesen, Jason Watson, Wasana Bandara, Michael Rosemann:
Applying Social Technology to Business Process Lifecycle Management. Business Process Management Workshops (1) 2011: 231-241 - 2010
- [c5]Heather Richter Lipford, Jason Watson, Michael Whitney, Katherine Froiland, Robert W. Reeder:
Visual vs. compact: a comparison of privacy policy interfaces. CHI 2010: 1111-1114 - [c4]Andrew Besmer, Jason Watson, Heather Richter Lipford:
The impact of social navigation on privacy policy configuration. SOUPS 2010
2000 – 2009
- 2009
- [c3]Heather Richter Lipford, Gordon Hull, Celine Latulipe, Andrew Besmer, Jason Watson:
Visible Flows: Contextual Integrity and the Design of Privacy Mechanisms on Social Network Sites. CSE (4) 2009: 985-989 - [c2]Jason Watson, Michael Whitney, Heather Richter Lipford:
Configuring audience-oriented privacy policies. SafeConfig 2009: 71-78 - 2008
- [c1]Heather Richter Lipford, Andrew Besmer, Jason Watson:
Understanding Privacy Settings in Facebook with an Audience View. UPSEC 2008
1990 – 1999
- 1999
- [b1]Jason Watson:
Monitoring computer-based training over computer networks. University of Huddersfield, UK, 1999
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-06-10 20:29 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint