Conf Year | Article | Title | Authors |
2013 | View | Decision-Making via Visual Analysis using the Natural Language Toolkit and R |
Jafar, Babb, Dana
|
2012 | View | A Framework for an Interactive Word-Cloud Ap-proach for Visual Analysis of Digital Text using NLTK |
Jafar, Babb, Dana
|
2012 | View | Evolving Mobile Architectures: A Case Study in the Development of a Location Privacy Application |
Babb, Dana, Keith, Jafar
|
2011 | View | Co-Creating Value in Systems Development: A Shift towards Service-Dominant Logic |
Babb, Keith
|
2011 | View | Pay-What-You-Want Pricing for Mobile Applications: The Effect of Privacy Assurances and Social Information |
Racherla, Keith, Babb
|
2015 | View | Governance of Outsourcing: Building a Better Relationship |
Babin, Saunderson
|
2015 | View | Social Responsibility Trends and Perceptions in Global IT Outsourcing |
Babin, Myers
|
2008 | View | Assessing the Role of CSR in Outsourcing Decisions |
Babin
|
2011 | View | Mobile Telephone Usage and Perception During Group Meetings. |
Bajko
|
2020 | View | Predicting Soil Conditions Using Machine Learning Algorithms |
Gondi, Hua, Bajracharya
|
2009 | View | Elements of Technology and Success in Virtual Teams |
Balazs, White
|
2008 | View | Determining Information Technology Project Status using Recognition-primed Decision Making enabled Collaborative Agents Simulating Teamwork (R-CAST) |
Barnes, Hammell II
|
2009 | View | Difficulties in quantifying IT projects |
Oliver, Janicki, Barrick
|
2011 | View | Plan to Throw one Away: Lessons Learned |
Battig, Commo
|
2009 | View | A FOLLOW-UP STUDY OF DETECTING PHISHING EMAILS |
Bekkering, Werner, Hutchison
|
2012 | View | Information Security Blueprint |
Clark, Benli, Mitchell, Vetter
|
2017 | View | A Review of Big Data Predictive Analytics in Information Systems Research
|
Ohiomah, Andreev, Benyoucef
|
2015 | View | Driving Inside Sales Performance with Lead Management Systems: A Conceptual Model |
Ohiomah, Benyoucef, Andreev
|
2013 | View | Similarity and Ties in Social Networks |
Afrasiabi Rad, Benyoucef
|
2012 | View | Adding Social Features to E-commerce |
Huang, Yoon, Benyoucef
|
2011 | View | Measuring Propagation in Online Social Networks: The case of YouTube |
Afrasiabi Rad, Benyoucef
|
2010 | View | A Model for Understanding Social Commerce |
Afrasiabi Rad, Benyoucef
|
2017 | View | Predictive Models for Apportioning 911 Fund |
Berghammer, Douglas, Corley, Chen
|
2009 | View | An Ontological Characterization of the ‘Structured Information Flow’ (SIF) Model |
Bhatia, Arthur
|
2022 | View | Decision-Making Tool for Procurement for Brazilian Airlines |
Torres, Halawi, Rojas, Bico, Marinho
|
2010 | View | What is Missing From the Current Disaster Model |
Bilow, Nicolai
|
2008 | View | Research Design for a Natural Disaster Management Communication System: |
Nicolai, Puntillo, Bilow
|
2008 | View | A STUDY OF THE INFORMATION TECHNOLOGY TRADE BETWEEN THE UNITED STATES AND ASIA PACIFIC ECONOMIES COOPERATION NATIONS |
Roman, Blakely, Koong, Liu
|
2015 | View | Case Study: Can Interpersonal-Cultural Communication Sustain Another Innovation? |
Spangler , Breese, Borkovich
|
2008 | View | SYSTEM DEVELOPMENT METHODOLOGY USAGE IN INDUSTRY: A REVIEW AND ANALYSIS |
Griffin, Brandyberry
|
2022 | View | QR Code Hacking – Detecting Multiple Vulnerabilities in Android Scanning Software |
Homan, Breese
|
2015 | View | Case Study: Can Interpersonal-Cultural Communication Sustain Another Innovation? |
Spangler , Breese, Borkovich
|
2012 | View | Cloud Computing: Should I Stay or Should I Cloud? |
Muhleman, Kim, Homan, Breese
|
2015 | View | Blurred Lines: Defining the Motives for Mobile and Social Media Use for Marketing Strategy |
Kim, Homan, Breese-Vitelli, Metzer
|
2022 | View | Measurement, reporting, and monitoring organizational security governance: A qualitative analysis of security professionals’ experiences |
Slonka, Mishra, Draus, Bromall
|
2019 | View | Addressing issues with EMR resulting in workarounds: An exploratory study
|
Mishra, Slonka, Draus, Bromall, Slonka
|
2017 | View | An Exploratory Analysis of Gender Differences in IT Project Commitment, Continuation, and Escalation |
Korzaan, Harris, Brooks
|
2014 | View | The Silent Treatment in IT Projects: Gender Differences in Inclinations to Communicate Project Status Information |
Korzaan, Brooks
|
2011 | View | Building a Real-Time Bus Tracking Data Display System |
Dudley, Vetter, Brown, Janicki
|
2011 | View | CMobile: A Mobile Photo Capture Application for Construction Imaging |
Martin, Vetter, Brown, Janicki
|
2020 | View | A Comparative Study on Information Technology (IT) Infrastructure and Disaster Recovery Methodology |
Sambasivam, Brown Jr
|
2012 | View | Ethical Data Mining: An Obstacle or Opportunity for Loyalty Programs |
Smith, Burns
|
2010 | View | A Methodology Tailoring Model for Practitioner Based Information Systems Development Informed by the Principles of General Systems Theory |
Burns, Deek
|
2017 | View | Using Systems Analysis and Design to Enhance the Business Understanding Stage in CRISP-DM |
Pomykalski, Buzydlowski
|