Search by Authors

Search returned 95 items for : C


Conf YearArticleTitleAuthors
2021ViewUsing Analytics to understand Performance and Wellness for a Women’s College Soccer Team Njunge, Witman, Holmberg, Canacoo
2020ViewEnterprise Architecture Transformation Process from a Federal Government Perspective Canada, Halawi
2022ViewVulnerability Assessment for Web Applications Garcia, Abraham, Kepic, Cankaya
2020ViewA Prototype for Distributed Computing Platform using Smartphones Wagner, Cao
2012ViewOpen Source Software Volunteerism vs. Carpenter
2016ViewAchieving Effective Data Analytics: An Agile Framework Castro, Jain
2021ViewHarvesting Intrinsically Verifiable Trust to Build a Honey Traceability System for Sustainable Development Runzel, Hassler, Hadley, Ratcliffe, Wilkes, Cazier
2020ViewThe Sting of Adoption: The Technology Acceptance Model (TAM) with Actual Usage in a Hazardous Environment Hassler, MacDonald, Cazier, Wilkes
2019ViewTrash to Treasure: Predicting Landfill Gas Flow to Optimize Electricity Generation Hassler, Emery, Hoyle, Cazier
2018ViewStandardizing Public Utility Data: A Case Study of a Rural Mid-Size Utility Hassler, Cazier, Russell, Mueller, Paprocki
2022ViewThe Effect of Mental Illness on Compensation for IT Developers Peslak, Ceccucci, Jones, Leonard
2021ViewThe COVID Effect: Information Technology Jobs in the Pandemic Sendall, Peslak, Ceccucci, Hunsinger
2020ViewJob and Career Satisfaction of Software Engineers Peslak, Ceccucci, Sendall
2016ViewA Comprehensive Current Review of Text Messaging Usage Peslak, Ceccucci, Hunsinger, Kruck, Sendall
2012ViewAnalysis of the Variables That Affect Frequency of Use and Time Spent on Social Networking Peslak, Sendall, Ceccucci
2010ViewAn Empirical Study of Social Networking Behavior Using Diffusion of Innovation Theory Ceccucci, Peslak, Sendall
2009ViewAn Empirical Study of Text Messaging Peslak, Ceccucci, Sendall
2008ViewAn Empirical Study of Instant Messaging Behavior Using Diffusion of Innovation Theory Peslak, Ceccucci, Sendall
2020ViewPrivacy Concerns and Data Sharing Habits of Personal Fitness Information Collected via Activity Trackers Pinchot, Cellante
2017ViewInformation Sharing Increases Drug Sample Inventory Management Efficiency in Healthcare Clinics: Evidence from a Quasi-Experiment Lang, Chahal
2021ViewData Sharing and Exposure: Findings from Descriptive and Network Analysis of Instant Games on Facebook Nicholson, Chakraborty, Ali-Gombe, Hammell II
2015ViewA Practice Based Examination of Standardization, and its Relationship with the Design and Use of Healthcare IS alsekait, Chakraborty
2022ViewBig Data Analytics in Supply Chain Management: A Review and Recommendations Ouyang, Hwang, Cham, Chen
2021ViewDecreasing the Barrier to Entry for an Open-Source Full-Stack Web Development Ngo, Chung, Chang
2018ViewDrone Delivery Services: An Evaluation of Personal Innovativeness, Opinion Passing and Key Information Technology Adoption Factors Chen, Choi, Charoen
2022ViewAre Companies Responsible for Internet of Things (IoT) Data Privacy? A Survey of IoT User Perceptions Paullet, Pinchot, Chawdhry
2018ViewUnderstanding Cyberstalking through the Analysis of Student's Online Activity Paullet, Chawdhry
2017ViewWhat’s “Appening” to our Privacy? A Students Perspective on Downloading Mobile Apps Paullet, Chawdhry, Douglas, Compomizzi
2016ViewAre Students Using Security Measures to Protect their Data when Downloading Mobile Applications? Chawdhry, Paullet, Douglas, Compomizzi
2013ViewData Privacy: Are We Accidentally Sharing Too Much Information? Chawdhry, Paullet, Douglas
2022ViewBig Data Analytics in Supply Chain Management: A Review and Recommendations Ouyang, Hwang, Cham, Chen
2022ViewUnderstanding Gen Z’s Switching Intention to E-Commerce Drone Delivery: An Updated Diffusion of Innovation Kaleta, Xie, Chen
2022ViewVisual Layering and Visual Clustering – A Model of Graph Complexity for Business Data Chen, Zhang
2018ViewDrone Delivery Services: An Evaluation of Personal Innovativeness, Opinion Passing and Key Information Technology Adoption Factors Chen, Choi, Charoen
2018ViewImprove the Loyalty of Mobile Payment Users in China by Increasing the Fit between Skill, Technology and Task Chen, Choi, Xiong, Tang
2017ViewPredictive Models for Apportioning 911 Fund Berghammer, Douglas, Corley, Chen
2016ViewThe Effects of Perceived Functionality and Usability on Privacy and Security Concerns about Adopting Cloud Applications Nakayama, Chen, Taylor
2016ViewE-commerce Adoption: A Revelatory Case Study in the German Oncology Pharmaceutical Supply Chain Sultanow, Chircu, Chircu
2016ViewE-commerce Adoption: A Revelatory Case Study in the German Oncology Pharmaceutical Supply Chain Sultanow, Chircu, Chircu
2018ViewDriving Distractions and Multi-tasking: An Investigative Study Choi, Xiong, Medlin
2018ViewDrone Delivery Services: An Evaluation of Personal Innovativeness, Opinion Passing and Key Information Technology Adoption Factors Chen, Choi, Charoen
2018ViewImprove the Loyalty of Mobile Payment Users in China by Increasing the Fit between Skill, Technology and Task Chen, Choi, Xiong, Tang
2017ViewMultitasking Behaviors: Distracted Driving Threats Beyond Texting Medlin, Choi, Xiong
2016ViewAn Empirical Study on the Impact of Price Discount on Sales in Software-as-a-Service (SaaS) Market Choi, Medlin, Hunsinger
2022ViewA Predictive Unmanned Aerial Vehicle Maintenance Method: Using Low-Code and Cloud-Based Data Visualization Kim, Chung, Ju, Maeng
2022ViewA Serverless Real-Time Data Streaming Architecture for Synchronous Online Math Competition Liu, Chung
2022ViewConvolutional Neural Network Binary Image Classifier via Mobile Devices: EZ Autism Screener Ata, Chung, Maeng
2021ViewDecreasing the Barrier to Entry for an Open-Source Full-Stack Web Development Ngo, Chung, Chang
2021ViewInternationalization and Localization for Web and Mobile Applications Wang, Chung, Yoon
2021ViewLow Maintenance, Low Cost, Highly Secure, and Highly Manageable Serverless Solutions for Software Reverse Engineering Nguyen, Chung
2021ViewCybersecurity Maturity Model Certification Initial Impact on the Defense Industrial Base Strohmier, Stoker, Vanajakumari, Clark, Cummings, Modaresnezhad
2020ViewLeader-Driven Supply Chain Cybersecurity Framework Vanajakumari, Mittal, Stoker, Clark, Miller
2019ViewUnderstanding Campus Crime with a Multi-University Analytics System Iheadindu, Kline, Vetter, Clark
2012ViewAnalysis of Electronic Health Mitchell, Clark
2012ViewInformation Security Blueprint Clark, Benli, Mitchell, Vetter
2008ViewAnticipated changes to technologies Janicki, Clark, Mahar, Logan
2008ViewThe Impact of Technology Diffusion on Employment and Compensation: Evidence from the Telecommunications Sector Clark, Moussawi
2010ViewDevelopment of an Evaluation Model for XBRL-enabled Tools Intended for Investors Clements, Schwieger, Surendran
2019ViewGeographic Information System For and Against Gerrymandering Wu, DePlato, Combs
2013ViewTaxonomy of Common Software Testing Terminology: Framework for Key Software Engineering Testing Concepts Roggio, Gordon, Comer
2011ViewPlan to Throw one Away: Lessons Learned Battig, Commo
2017ViewWhat’s “Appening” to our Privacy? A Students Perspective on Downloading Mobile Apps Paullet, Chawdhry, Douglas, Compomizzi
2016ViewAre Students Using Security Measures to Protect their Data when Downloading Mobile Applications? Chawdhry, Paullet, Douglas, Compomizzi
2019ViewA Longitudinal Study of Google Privacy Policies Peslak, Kovalchick, Conforti
2011ViewOpen Source Software in the Vertical Market: an Open Niche? Conlon
2009ViewSynchronizing Development Life-Cycles: Rationale and Integrative Approach to Construction of eLearning Systems and Online Courses at a Tier 1 Research Institution Conn, Macedo, Meese
2008ViewTeaching Knowledge Management (KM) in Criminal Justice Education: The Influence of Information Systems Conn, Thies
2011ViewApplying Business Intelligence Concepts to Medicaid Claim Fraud Detection Copeland, Edberg, Wendel
2019ViewDeveloping a GIS Dashboard Tool to Inform Non-Profit Hospitals of Community Health Needs at the Neighborhood Level Copello, Smith, Mease, Umapathy, Richard, Knight, Albertie, Hamadi, Spaulding, Apatu
2020ViewInternet of Things (IoT): An Analysis of the Research Jourdan, Corley, Ryan, Anderson
2017ViewPredictive Models for Apportioning 911 Fund Berghammer, Douglas, Corley, Chen
2012ViewAn Examination of the Factors Influencing Student Usage of Dropbox, a File Hosting Service Hunsinger, Corley
2011ViewWhy are People Using Google's Corley, Hunsinger
2016ViewCauses of cyberbullying in multi-player online gaming environments: Gamer perceptions Cotler, Fryling, Rivituso
2014ViewCyberbullying or normal game play? Impact of age, gender, and experience on cyberbullying in multi-player online gaming environments: Perceptions from one gaming forum Fryling, Cotler, Rivituso, Mathews, Pratico
2018ViewImportance of Features in Adversarial Machine Learning for Cyber Security De Lucia, Cotton
2013ViewPerformance and Corporate Social Responsibility in the Information Technology Industry Cowan, Parzinger, Welch, Welch
2020ViewExploring Sentiment Towards Contact Tracing Crable, Sena
2012ViewUsing the Cloud: The Cost of Encryption in IaaS Cronin, Pauli, Ham
2011ViewUsing the cloud: How to keep your data private Cronin, Pauli, Ham
2012ViewRocky Relationships: Enterprise Resource Planning and Supply Chain Management Crumbly, Fryling
2009ViewTHE RELATIONSHIP BETWEEN INFORMATION TECHNOLOGY CRITICAL SUCCESS FACTORS AND PROJECT PERFORMANCE Lind, Culler
2022ViewAn Exploration of the Benefits of Certifications and their Relationship to Salaries in IS/IT Matthews, Cummings, Janicki
2021View Selecting Subsets of Amazon Reviews Gokce, Kline, Cummings, Vetter
2021ViewCybersecurity Maturity Model Certification Initial Impact on the Defense Industrial Base Strohmier, Stoker, Vanajakumari, Clark, Cummings, Modaresnezhad
2019ViewWhich Amazon Reviews Should You Read? Gokce, Kline, Vetter, Cummings
2018ViewChanges in the Information Technology Field: A Survey of Current Technologies and Future Importance Cummings, Janicki
2017ViewBlockchain Technology: Challenges and Opportunities Modaresnezhad, Cummings
2017ViewInformation Security and Privacy Legislation: Current State and Future Direction Dunlap, Cummings, Janicki
2016ViewCrowdsourcing Surveys: Alternative Approaches to Survey Collection Cummings, Sibona
2015ViewMoving Beyond Coding: Why Secure Coding Should be Implemented Grover, Cummings, Janicki
2014ViewCyber Security Best Practices: What to do? Kleinberg, Reinicke, Cummings
2013ViewCan Social Media aid Software Development? Reinicke, Cummings
2013ViewShifting Technological Landscape: IT Departments and Anticipated Technological Changes Cummings, Janicki, Kline
2012ViewThe Impact of Intra-Organizational Social Cummings