• Home
  • About
    • About the Journal
    • Editorial Team
    • Review Process
    • Open access
    • Digital Archiving Policy
    • Right and License
    • Reviewer Guideline
  • Submissions
  • Current Issue
  • Archives
  • Announcements
  • Contact
  • Login
  • Register
logo
  • Login
  • Register
Skip to main content Skip to main navigation menu Skip to site footer
logo
  • Home
  • About
    • About the Journal
    • Editorial Team
    • Review Process
    • Open access
    • Digital Archiving Policy
    • Right and License
    • Reviewer Guideline
  • Submissions
  • Current Issue
  • Archives
  • Announcements
  • Contact
ISSN : 2321-3418
  1. Home /
  2. Search

Search

Advanced filters
1 - 25 of 39 items 1 2 > >> 

Identity and Image of A Private University After Incorporation Process: Students' Perception

DOI:https://doi.org/10.18535/ijsrm/v13i03.em04
Tamara Almeida Damasceno (1)
8553-8566
Abstract : 422
PDF : 28
DOI:https://doi.org/10.18535/ijsrm/v13i03.em04

Authentication Revolution using Bring Your Own Identity

Supriya N. Kolambkar1 , Prof. RakeshSuryawanshi2 (1)
Abstract : 32
PDF : 31
DOI:

Different perspectives on Latin American identity

DOI:https://doi.org/10.18535/ijsrm/v12i07.sh03
Marizabel Vásquez Bedoya (1)
1908-1915
Abstract : 138
PDF : 67
DOI:https://doi.org/10.18535/ijsrm/v12i07.sh03

Postcolonial Identity Crisis in the Mimic Men a Novel by V.S.Naipaul

DOI:https://doi.org/10.18535/ijsrm/v7i3.el02
Saman Abdulqadir Hussein Dizayi (1)
920-926
Abstract : 396
PDF : 109 XML : 54
DOI:https://doi.org/10.18535/ijsrm/v7i3.el02

L’ÉCRITURE COMME FORME D’IDENTITE CULTURELLE DANS LA LITTÉRATURE FRANCOPHONE À TRAVERS LE BAC DE CABRI MORT DE MAHAMADOU KONATÉ

DOI:https://doi.org/10.18535/ijsrm/v12i01.sh02
Diafar ISSIAKA (1), Yaya BAYOKO (2), Youssouf Coulibaly (3), Soungalo ZOROME (4)
1644-1648
Abstract : 383
PDF : 173
DOI:https://doi.org/10.18535/ijsrm/v12i01.sh02

Nativization of Fear and Anxiety as Identity in Selected Fiction of East African Asians

DOI:https://doi.org/10.18535/ijsrm/v10i10.sh03
Makhakha Joseph Wangila (1)
1253-1262
Abstract : 101
PDF : 52
DOI:https://doi.org/10.18535/ijsrm/v10i10.sh03

Zero Trust Security: Reimagining Cyber Defense for Modern Organizations

DOI:https://doi.org/10.18535/ijsrm/v10i4.ec11
FNU Jimmy (1)
887-905
Abstract : 349
PDF : 112
DOI:https://doi.org/10.18535/ijsrm/v10i4.ec11

A study of personality factors (Openness and Conscientiousness) and perceived level of career success in married individuals.

Rajashree Kapure (1)
Abstract : 42
PDF : 81
DOI:

Use of Stream of Consciousness in Brick Lane: A Psychoanalytical Approach to Study Nazneen’s Evolution

DOI:https://doi.org/10.18535/ijsrm/v10i10.el02
Manfath Jabin Haque (1)
2531-2541
Abstract : 188
PDF : 198
DOI:https://doi.org/10.18535/ijsrm/v10i10.el02

A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in the Cloud by using Identity based Encryption

DOI:https://doi.org/10.18535/ijsrm/v5i7.08
Mutyala Ramya Krishna Vankamamidi S Naresh (1)
5833-5841
Abstract : 55
PDF : 26
DOI:https://doi.org/10.18535/ijsrm/v5i7.08

Development of the Recognisable Logo Design Guideline for Startup Brands

DOI:https://doi.org/10.18535/ijsrm/v7i5.sh01
MARIAH JOHARI (1), Raja Ahmad Azmeer (2), Mohd Shahrizal Dolah (3)
469-474
Abstract : 139
PDF : 70 XML : 40
DOI:https://doi.org/10.18535/ijsrm/v7i5.sh01

Face Recognition Technology: Benefits, Applications, and Challenges

DOI:https://doi.org/10.18535/ijsrm/v13i03.ec05
Zulhadi Zakaria (1)
2096-2102
Abstract : 198
PDF : 53
DOI:https://doi.org/10.18535/ijsrm/v13i03.ec05

Use of social network sites and compulsive buying behavior: Litterature review using PRISMA

DOI:https://doi.org/10.18535/ijsrm/v13i03.em06
Aicha Boulala (1), Hasnaa GABER (2), Adil BOULAHOUAL (3)
8576-8582
Abstract : 281
PDF : 46
DOI:https://doi.org/10.18535/ijsrm/v13i03.em06

Blockchain technology impact HR hiring and off-boarding practices in the Telco sector in Hong Kong

DOI:https://doi.org/10.18535/ijsrm/v8i04.em02
Candy So Suk Yi (Candice) (1), Eric Yung (2), Dr. Samuel Lee (3), Dr. Christopher Fong (4), Shilpi Tripathi (5)
1695-1702
Abstract : 121
PDF : 149
DOI:https://doi.org/10.18535/ijsrm/v8i04.em02

Looking for Employees Efficiency? Change the System through Value Stream Mapping

DOI:https://doi.org/10.18535/ijsrm/v7i3.sh02
Jayantha K. (1), Tharangani D. P. (2)
431-439
Abstract : 59
PDF : 53
DOI:https://doi.org/10.18535/ijsrm/v7i3.sh02

Research for the Investigation of Consumer Attitudes towards Online Shopping in Niğde Province

DOI:https://doi.org/10.18535/ijsrm/v6i9.sh02
Hatice Elanur Kaplan (1)
SH-2018-257-260
Abstract : 55
PDF : 51 XML : 28
DOI:https://doi.org/10.18535/ijsrm/v6i9.sh02

The Effect of Personality, Organizational Climate and Job Satisfaction on Teachers Organizational Citizenship Behavior at Public Vocational High School in DKI Jakarta Province

DOI:https://doi.org/10.18535/ijsrm/v6i4.el02
Asari . (1), Thamrin Abdullah (2), Wibowo . (3)
EL-2018-191-197
Abstract : 268
PDF : 72 XML : 40
DOI:https://doi.org/10.18535/ijsrm/v6i4.el02

Revitalizing Cooperative Human Resources: An Education and Perspective Analysis, Study at Medan Municipal City; Indonesia

DOI:https://doi.org/10.18535/ijsrm/v6i3.sh03
Karlonta Nainggolan (1), Tohap Parulian (2)
SH-2018-19-36
Abstract : 258
PDF : 67 XML : 37
DOI:https://doi.org/10.18535/ijsrm/v6i3.sh03

A Study on Role and Applications of ICT in Development of Rural Areas

DOI:https://doi.org/10.18535/ijsrm/v5i8.24
Waseem Akram Mir Rakesh Kumar (1)
6758-6763
Abstract : 46
PDF : 24
DOI:https://doi.org/10.18535/ijsrm/v5i8.24

Enhancing Cloud Security: Implementing Zero Trust Architectures in Multi-Cloud Environments

DOI:https://doi.org/10.18535/ijsrm/v4i9.22
Pavan Muralidhara (1), Vaishnavi Janardhan (2)
4636-4664
Abstract : 110
PDF : 61
DOI:https://doi.org/10.18535/ijsrm/v4i9.22

Machine Learning for Enhancing Mortgage Origination Processes: Streamlining and Improving Efficiency

DOI:https://doi.org/10.18535/ijsrm/v08i4.ec02
Hariharan Pappil Kothandapani (1)
Abstract : 151
PDF : 43
DOI:https://doi.org/10.18535/ijsrm/v08i4.ec02

An Efficient Privacy Preserving Technique Using Decoy Passwords

Gannamaneni Siri Venkata Bhanu Vankamamidi S Naresh (1)
Abstract : 30
PDF : 8
DOI:

An Efficient Privacy Preserving Technique Using Decoy Passwords

DOI:https://doi.org/10.18535/ijsrm/v5i6.36
Gannamaneni Siri Venkata Bhanu, Vankamamidi S Naresh (1)
Abstract : 44
PDF : 31
DOI:https://doi.org/10.18535/ijsrm/v5i6.36

Proficient Cloud Based Authenticated Database Scheme for Web services

Mrs. Evangeline. S #1 , Mr. S.Vijayanand *2 , Ms. Abirami.S., @3 (1)
Abstract : 28
PDF : 21
DOI:

Protection on Social Network Data Using Sensitive and NonSensitive Labels

Prabhanjana Konni Balaka Ramesh Naidu (1)
Abstract : 30
PDF : 20
DOI:
1 - 25 of 39 items 1 2 > >> 

Metrics

Citations 3245
2yr mean_citedness 0.323
h index 21
i10 index 67

Whatsapp

Join IJSRM.NET Channel

Make a Submission

Make a Submission

Author Desk

Author Guidelines Call for paper Publication fee Mode of Payment Indexing Publication Ethics Review Process Right and License Digital Archiving

Download

Manuscript Template Copyright form Journal Cover Page

i

Impact Factor : 6.997

Indexig

Indexing

  • WorldCat
  • Google Schloar
  • OpenAlex.
  • ResearchGate
  • LivRe
  • Index Copernicus
  • ROAD
  • CrossRef Member
  • ScienceGate
  • Scite_ Index
  • Academia.Edu
  • Exaly
  • Advanced Sciences Index

Information

  • For Readers
  • For Authors
  • For Librarians

ABOUT US
IJSRM, the premier online destination for researchers, scholars, and innovators. Our platform provides a global network of professionals and experts....

HEAD OFFICE
24 Kialash Vihar
Mandsaur Near R.T.O. Office Mandsaur (M.P.) 458001 India
 
 
 

Quick Menu

  • Home
  • About Us
  • Current Issue
  • Archive
  • Open Access
  • Support & FAQs

Information for

  • Authors
  • Editors
  • Reviewers
  • Librarians
  • Researchers
  • Societies

Journal & Policies

  • Publication Ethics
  • Review Policy
  • Publication Ethics
  • Licensing and Copyright
  • Open Access Policy
  • Plagiarism Policy

Copyright © International Journal of Scientific Research and Management (IJSRM) - All Rights Reserved