Conf Year | Article | Title | Authors |
2013 | View | Decision-Making via Visual Analysis using the Natural Language Toolkit and R |
Jafar, Babb, Dana
|
2012 | View | A Framework for an Interactive Word-Cloud Ap-proach for Visual Analysis of Digital Text using NLTK |
Jafar, Babb, Dana
|
2012 | View | Evolving Mobile Architectures: A Case Study in the Development of a Location Privacy Application |
Babb, Dana, Keith, Jafar
|
2022 | View | Classification of Wolf Subjects Based on Hunting-Stressed Physiological Effects Using Support Vector Machines (SVM) |
Stewart, Davis
|
2021 | View | Using Physiological Effects and K-Nearest Neighbor
to Identify Membership in Hunting-Stressed Wolf Populations
|
Stewart, Davis, Igoche
|
2013 | View | Software Engineering: accessing IT core concepts |
Davis, Kmetz
|
2011 | View | The New Tech Effect: Analyzing Juror Credibility |
Davis, Paullet, Kraeer, Grant
|
2018 | View | Importance of Features in Adversarial Machine Learning for Cyber Security
|
De Lucia, Cotton
|
2021 | View | Security Control Techniques: Cybersecurity & Medical Wearable Devices |
Sambasivam, Deal
|
2012 | View | A Portal-Based Web Service Development Using a Mashup Approach |
Miah, Debuse, Gammack, Pigott
|
2010 | View | A Methodology Tailoring Model for Practitioner Based Information Systems Development Informed by the Principles of General Systems Theory |
Burns, Deek
|
2012 | View | Evaluating the South African software industry as a key component for economic development using an Irish framework |
Dehinbo, Dehinbo
|
2012 | View | Evaluating the South African software industry as a key component for economic development using an Irish framework |
Dehinbo, Dehinbo
|
2011 | View | The impact of Organizational Culture in managing the change to the use of FOSS at a South African University |
Dehinbo, Alexander
|
2012 | View | The Deployment Pipeline |
Mikita, DeHondt, Nezlek
|
2011 | View | Outsourcing Best Practices |
Mikita, DeHondt
|
2009 | View | The Impact of Transition Costs on Offshore Systems Development |
DeHondt, Leidig
|
2013 | View | Risk Assessment & Management in Merchant Capture Systems: A Threat Analysis Perspective |
Streff, Shrestha, Delzer
|
2019 | View | A Comparative Study on Common Errors in Rules Governing Complex Event Processing Systems |
Dennis, Sambasivam
|
2019 | View | Geographic Information System For and Against Gerrymandering
|
Wu, DePlato, Combs
|
2022 | View | Data Analytics for Societal Challenges: Understanding Student Participation in the National School Lunch Program |
Northey, Desai
|
2012 | View | A Study of Cloud Computing Software-as-a-Service (SaaS) in Financial Firms |
Lawler, Howell-Barber, Desai, Joseph
|
2014 | View | Identifying User Behavior from Residual Data in Cloud-based Synchronized Apps |
Grispos, Glisson, Pardue, Dickson
|
2008 | View | The Accessibility of College and University Home Pages in the State of New York |
DiLallo, Siegfried
|
2008 | View | Creating the Pilot AJAX Enabled Query Tool |
Ford, Dollinger
|
2009 | View | Sustainability and Greening through |
D'Onofrio, Jarmoszko, Lee-Partridge, Petkova
|
2017 | View | Predictive Models for Apportioning 911 Fund |
Berghammer, Douglas, Corley, Chen
|
2017 | View | What’s “Appening” to our Privacy?
A Students Perspective on Downloading Mobile Apps
|
Paullet, Chawdhry, Douglas, Compomizzi
|
2016 | View | Are Students Using Security Measures to Protect their Data when Downloading Mobile Applications? |
Chawdhry, Paullet, Douglas, Compomizzi
|
2013 | View | Data Privacy: Are We Accidentally Sharing Too Much Information? |
Chawdhry, Paullet, Douglas
|
2011 | View | Talk to Text: Changing Communication Patterns |
Pinchot, Douglas, Paullet, Rota
|
2022 | View | Measurement, reporting, and monitoring organizational security governance: A qualitative analysis of security professionals’ experiences |
Slonka, Mishra, Draus, Bromall
|
2019 | View | Addressing issues with EMR resulting in workarounds: An exploratory study
|
Mishra, Slonka, Draus, Bromall, Slonka
|
2022 | View | Text Prediction Using Artificial Intelligence: An Analysis of Two Text Prediction Systems |
Wimmer, Du, Heri
|
2021 | View | Barriers and Drivers to Adoption of Electronic Health Record Systems |
Du, Sturgill
|
2017 | View | Student Intentions and Behaviors Related to Email Security: An Application of the Health Belief Model |
Schymik, Du
|
2014 | View | Building a Better Stockbroker: Managing Big (Financial) Data by Constructing an Ontology-Based Framework |
Westrick, Du, Wolffe
|
2011 | View | Building a Real-Time Bus Tracking Data Display System |
Dudley, Vetter, Brown, Janicki
|
2017 | View | Information Security and Privacy Legislation:
Current State and Future Direction |
Dunlap, Cummings, Janicki
|
2016 | View | Malvertising - A Rising Threat To The Online Ecosystem |
Dwyer, Kanguri
|
2015 | View | Leakage of Geolocation Data by Mobile Ad Networks |
Snow, Hayes, Dwyer
|