Conf Year | Article | Title | Authors |
2021 | View | Using Analytics to understand Performance and Wellness for a Women’s College Soccer Team |
Njunge, Witman, Holmberg, Canacoo
|
2020 | View | Enterprise Architecture Transformation Process from a Federal Government Perspective |
Canada, Halawi
|
2022 | View | Vulnerability Assessment for Web Applications |
Garcia, Abraham, Kepic, Cankaya
|
2020 | View | A Prototype for Distributed Computing Platform using Smartphones |
Wagner, Cao
|
2012 | View | Open Source Software Volunteerism vs. |
Carpenter
|
2016 | View | Achieving Effective Data Analytics: An Agile Framework |
Castro, Jain
|
2021 | View | Harvesting Intrinsically Verifiable Trust to Build a Honey Traceability System for Sustainable Development |
Runzel, Hassler, Hadley, Ratcliffe, Wilkes, Cazier
|
2020 | View | The Sting of Adoption: The Technology Acceptance Model (TAM) with Actual Usage in a Hazardous Environment |
Hassler, MacDonald, Cazier, Wilkes
|
2019 | View | Trash to Treasure: Predicting Landfill Gas Flow to Optimize Electricity Generation |
Hassler, Emery, Hoyle, Cazier
|
2018 | View | Standardizing Public Utility Data: A Case Study of a Rural Mid-Size Utility |
Hassler, Cazier, Russell, Mueller, Paprocki
|
2022 | View | The Effect of Mental Illness on Compensation for IT Developers |
Peslak, Ceccucci, Jones, Leonard
|
2021 | View | The COVID Effect: Information Technology Jobs in the Pandemic |
Sendall, Peslak, Ceccucci, Hunsinger
|
2020 | View | Job and Career Satisfaction of Software Engineers |
Peslak, Ceccucci, Sendall
|
2016 | View | A Comprehensive Current Review of Text Messaging Usage |
Peslak, Ceccucci, Hunsinger, Kruck, Sendall
|
2012 | View | Analysis of the Variables That Affect Frequency of Use and Time Spent on Social Networking |
Peslak, Sendall, Ceccucci
|
2010 | View | An Empirical Study of Social Networking Behavior Using Diffusion of Innovation Theory |
Ceccucci, Peslak, Sendall
|
2009 | View | An Empirical Study of Text Messaging |
Peslak, Ceccucci, Sendall
|
2008 | View | An Empirical Study of Instant Messaging Behavior Using Diffusion of Innovation Theory |
Peslak, Ceccucci, Sendall
|
2020 | View | Privacy Concerns and Data Sharing Habits of Personal Fitness Information Collected via Activity Trackers |
Pinchot, Cellante
|
2017 | View | Information Sharing Increases Drug Sample Inventory Management Efficiency in Healthcare Clinics: Evidence from a Quasi-Experiment |
Lang, Chahal
|
2021 | View | Data Sharing and Exposure: Findings from Descriptive and Network Analysis of Instant Games on Facebook |
Nicholson, Chakraborty, Ali-Gombe, Hammell II
|
2015 | View | A Practice Based Examination of Standardization, and its Relationship with the Design and Use of Healthcare IS |
alsekait, Chakraborty
|
2022 | View | Big Data Analytics in Supply Chain Management: A Review and Recommendations
|
Ouyang, Hwang, Cham, Chen
|
2021 | View | Decreasing the Barrier to Entry for an Open-Source Full-Stack Web Development |
Ngo, Chung, Chang
|
2018 | View | Drone Delivery Services: An Evaluation of Personal Innovativeness, Opinion Passing and Key Information Technology Adoption Factors |
Chen, Choi, Charoen
|
2022 | View | Are Companies Responsible for Internet of Things (IoT) Data Privacy? A Survey of IoT User Perceptions |
Paullet, Pinchot, Chawdhry
|
2018 | View | Understanding Cyberstalking through the Analysis of Student's Online Activity |
Paullet, Chawdhry
|
2017 | View | What’s “Appening” to our Privacy?
A Students Perspective on Downloading Mobile Apps
|
Paullet, Chawdhry, Douglas, Compomizzi
|
2016 | View | Are Students Using Security Measures to Protect their Data when Downloading Mobile Applications? |
Chawdhry, Paullet, Douglas, Compomizzi
|
2013 | View | Data Privacy: Are We Accidentally Sharing Too Much Information? |
Chawdhry, Paullet, Douglas
|
2022 | View | Big Data Analytics in Supply Chain Management: A Review and Recommendations
|
Ouyang, Hwang, Cham, Chen
|
2022 | View | Understanding Gen Z’s Switching Intention to E-Commerce Drone Delivery: An Updated Diffusion of Innovation |
Kaleta, Xie, Chen
|
2022 | View | Visual Layering and Visual Clustering –
A Model of Graph Complexity for Business Data
|
Chen, Zhang
|
2018 | View | Drone Delivery Services: An Evaluation of Personal Innovativeness, Opinion Passing and Key Information Technology Adoption Factors |
Chen, Choi, Charoen
|
2018 | View | Improve the Loyalty of Mobile Payment Users in China by Increasing the Fit between Skill, Technology and Task |
Chen, Choi, Xiong, Tang
|
2017 | View | Predictive Models for Apportioning 911 Fund |
Berghammer, Douglas, Corley, Chen
|
2016 | View | The Effects of Perceived Functionality and Usability on Privacy and Security Concerns about Adopting Cloud Applications |
Nakayama, Chen, Taylor
|
2016 | View | E-commerce Adoption: A Revelatory Case Study in the German Oncology Pharmaceutical Supply Chain |
Sultanow, Chircu, Chircu
|
2016 | View | E-commerce Adoption: A Revelatory Case Study in the German Oncology Pharmaceutical Supply Chain |
Sultanow, Chircu, Chircu
|
2018 | View | Driving Distractions and Multi-tasking: An Investigative Study |
Choi, Xiong, Medlin
|
2018 | View | Drone Delivery Services: An Evaluation of Personal Innovativeness, Opinion Passing and Key Information Technology Adoption Factors |
Chen, Choi, Charoen
|
2018 | View | Improve the Loyalty of Mobile Payment Users in China by Increasing the Fit between Skill, Technology and Task |
Chen, Choi, Xiong, Tang
|
2017 | View | Multitasking Behaviors: Distracted Driving Threats Beyond Texting |
Medlin, Choi, Xiong
|
2016 | View | An Empirical Study on the Impact of Price Discount on Sales in Software-as-a-Service (SaaS) Market |
Choi, Medlin, Hunsinger
|
2022 | View | A Predictive Unmanned Aerial Vehicle Maintenance Method: Using Low-Code and Cloud-Based Data Visualization |
Kim, Chung, Ju, Maeng
|
2022 | View | A Serverless Real-Time Data Streaming Architecture for Synchronous Online Math Competition |
Liu, Chung
|
2022 | View | Convolutional Neural Network Binary Image Classifier via Mobile Devices: EZ Autism Screener |
Ata, Chung, Maeng
|
2021 | View | Decreasing the Barrier to Entry for an Open-Source Full-Stack Web Development |
Ngo, Chung, Chang
|
2021 | View | Internationalization and Localization for Web and Mobile Applications |
Wang, Chung, Yoon
|
2021 | View | Low Maintenance, Low Cost, Highly Secure, and Highly Manageable Serverless Solutions for Software Reverse Engineering |
Nguyen, Chung
|
2021 | View | Cybersecurity Maturity Model Certification Initial Impact on the Defense Industrial Base
|
Strohmier, Stoker, Vanajakumari, Clark, Cummings, Modaresnezhad
|
2020 | View | Leader-Driven Supply Chain Cybersecurity Framework |
Vanajakumari, Mittal, Stoker, Clark, Miller
|
2019 | View | Understanding Campus Crime with a Multi-University Analytics System |
Iheadindu, Kline, Vetter, Clark
|
2012 | View | Analysis of Electronic Health |
Mitchell, Clark
|
2012 | View | Information Security Blueprint |
Clark, Benli, Mitchell, Vetter
|
2008 | View | Anticipated changes to technologies |
Janicki, Clark, Mahar, Logan
|
2008 | View | The Impact of Technology Diffusion on Employment and Compensation: Evidence from the Telecommunications Sector |
Clark, Moussawi
|
2010 | View | Development of an Evaluation Model for XBRL-enabled Tools Intended for Investors |
Clements, Schwieger, Surendran
|
2019 | View | Geographic Information System For and Against Gerrymandering
|
Wu, DePlato, Combs
|
2013 | View | Taxonomy of Common Software Testing Terminology: Framework for Key Software Engineering Testing Concepts |
Roggio, Gordon, Comer
|
2011 | View | Plan to Throw one Away: Lessons Learned |
Battig, Commo
|
2017 | View | What’s “Appening” to our Privacy?
A Students Perspective on Downloading Mobile Apps
|
Paullet, Chawdhry, Douglas, Compomizzi
|
2016 | View | Are Students Using Security Measures to Protect their Data when Downloading Mobile Applications? |
Chawdhry, Paullet, Douglas, Compomizzi
|
2019 | View | A Longitudinal Study of Google Privacy Policies |
Peslak, Kovalchick, Conforti
|
2011 | View | Open Source Software in the Vertical Market: an Open Niche? |
Conlon
|
2009 | View | Synchronizing Development Life-Cycles: Rationale and Integrative Approach to Construction of eLearning Systems and Online Courses at a Tier 1 Research Institution |
Conn, Macedo, Meese
|
2008 | View | Teaching Knowledge Management (KM) in Criminal Justice Education: The Influence of Information Systems |
Conn, Thies
|
2011 | View | Applying Business Intelligence Concepts to Medicaid Claim Fraud Detection |
Copeland, Edberg, Wendel
|
2019 | View | Developing a GIS Dashboard Tool to Inform Non-Profit Hospitals of Community Health Needs at the Neighborhood Level |
Copello, Smith, Mease, Umapathy, Richard, Knight, Albertie, Hamadi, Spaulding, Apatu
|
2020 | View | Internet of Things (IoT): An Analysis of the Research |
Jourdan, Corley, Ryan, Anderson
|
2017 | View | Predictive Models for Apportioning 911 Fund |
Berghammer, Douglas, Corley, Chen
|
2012 | View | An Examination of the Factors Influencing Student Usage of Dropbox, a File Hosting Service |
Hunsinger, Corley
|
2011 | View | Why are People Using Google's |
Corley, Hunsinger
|
2016 | View | Causes of cyberbullying in multi-player online gaming environments: Gamer perceptions |
Cotler, Fryling, Rivituso
|
2014 | View | Cyberbullying or normal game play? Impact of age, gender, and experience on cyberbullying in multi-player online gaming environments: Perceptions from one gaming forum |
Fryling, Cotler, Rivituso, Mathews, Pratico
|
2018 | View | Importance of Features in Adversarial Machine Learning for Cyber Security
|
De Lucia, Cotton
|
2013 | View | Performance and Corporate Social Responsibility in the Information Technology Industry |
Cowan, Parzinger, Welch, Welch
|
2020 | View | Exploring Sentiment Towards Contact Tracing |
Crable, Sena
|
2012 | View | Using the Cloud: The Cost of Encryption in IaaS |
Cronin, Pauli, Ham
|
2011 | View | Using the cloud: How to keep your data private |
Cronin, Pauli, Ham
|
2012 | View | Rocky Relationships: Enterprise Resource Planning and Supply Chain Management |
Crumbly, Fryling
|
2009 | View | THE RELATIONSHIP BETWEEN INFORMATION TECHNOLOGY CRITICAL SUCCESS FACTORS AND PROJECT PERFORMANCE |
Lind, Culler
|
2022 | View | An Exploration of the Benefits of Certifications and their Relationship to Salaries in IS/IT |
Matthews, Cummings, Janicki
|
2021 | View |
Selecting Subsets of Amazon Reviews
|
Gokce, Kline, Cummings, Vetter
|
2021 | View | Cybersecurity Maturity Model Certification Initial Impact on the Defense Industrial Base
|
Strohmier, Stoker, Vanajakumari, Clark, Cummings, Modaresnezhad
|
2019 | View | Which Amazon Reviews Should You Read? |
Gokce, Kline, Vetter, Cummings
|
2018 | View | Changes in the Information Technology Field: A Survey of Current Technologies and Future Importance
|
Cummings, Janicki
|
2017 | View | Blockchain Technology: Challenges and Opportunities |
Modaresnezhad, Cummings
|
2017 | View | Information Security and Privacy Legislation:
Current State and Future Direction |
Dunlap, Cummings, Janicki
|
2016 | View | Crowdsourcing Surveys: Alternative Approaches to Survey Collection |
Cummings, Sibona
|
2015 | View | Moving Beyond Coding: Why Secure Coding Should be Implemented |
Grover, Cummings, Janicki
|
2014 | View | Cyber Security Best Practices: What to do? |
Kleinberg, Reinicke, Cummings
|
2013 | View | Can Social Media aid Software Development? |
Reinicke, Cummings
|
2013 | View | Shifting Technological Landscape: IT Departments and Anticipated Technological Changes |
Cummings, Janicki, Kline
|
2012 | View | The Impact of Intra-Organizational Social |
Cummings
|