Search by Authors

Search returned 68 items for : H


Conf YearArticleTitleAuthors
2008ViewAn Examination of Information Security in Mobile Banking Architectures Streff, Haar
2018ViewA Machine Learning Approach to Optimizing Diabetes Healthcare Management Using SAS Analytic Suite Ajani, Habek
2021ViewHarvesting Intrinsically Verifiable Trust to Build a Honey Traceability System for Sustainable Development Runzel, Hassler, Hadley, Ratcliffe, Wilkes, Cazier
2022ViewDecision-Making Tool for Procurement for Brazilian Airlines Torres, Halawi, Rojas, Bico, Marinho
2020ViewEnterprise Architecture Transformation Process from a Federal Government Perspective Canada, Halawi
2018ViewWhere We are with Enterprise Architecture Halawi, McCarthy, farah
2012ViewUsing the Cloud: The Cost of Encryption in IaaS Cronin, Pauli, Ham
2011ViewUsing the cloud: How to keep your data private Cronin, Pauli, Ham
2019ViewDeveloping a GIS Dashboard Tool to Inform Non-Profit Hospitals of Community Health Needs at the Neighborhood Level Copello, Smith, Mease, Umapathy, Richard, Knight, Albertie, Hamadi, Spaulding, Apatu
2021ViewData Sharing and Exposure: Findings from Descriptive and Network Analysis of Instant Games on Facebook Nicholson, Chakraborty, Ali-Gombe, Hammell II
2019ViewThe Use of Tainted Flows in Network Compression for Distributed Network Intrusion Detection Smith, Hammell II
2018ViewThe use of Snap Length in Lossy Network Traffic Compression for Network Intrusion Detection Applications Smith, Hammell II
2017ViewAggregating Complementary and Contradictory Information for Military Decision Making Etesamipour, Hammell II
2016ViewProposal for Kelly Criterion-Inspired Lossy Network Compression for Network Intrusion Applications Smith, Hammell II
2015ViewComparing the Prediction Capabilities of an Artificial Neural Network vs a Phenomenological Model for Predicting the Terminal Ballistics of Kinetic Energy Projectiles Auten, Hammell II
2013ViewPredicting the Terminal Ballistics of Kinetic Energy Projectiles Using Artificial Neural Networks Auten, Hammell II
2012ViewBuilding Baseline Preprocessed Common Data Sets for Multiple Follow-on Data Mining Algorithms Fowler, Hammell II
2012ViewEarly Stage Probabilistic Software Project Schedule Estimation Kwon, Hammell II
2012ViewExamining the Effects of the Value of Information on Intelligence Analyst Performance Newcomb, Hammell II
2011ViewComputational Linguistic Hedges Applied to a Project Critical Path McQuighan, Hammell II
2009ViewSpatial Interpolation for a Wireless Sensor Network of Chemical Point Detectors: Preliminary Results Schafer, Hammell II
2008ViewDetermining Information Technology Project Status using Recognition-primed Decision Making enabled Collaborative Agents Simulating Teamwork (R-CAST) Barnes, Hammell II
2017ViewAn Exploratory Analysis of Gender Differences in IT Project Commitment, Continuation, and Escalation Korzaan, Harris, Brooks
2016View3D Printing: The Future Crime of the Present Fruehauf, Hartle, Al-Khalifa
2019ViewEvaluating Evasion Attack Methods on Binary Network Traffic Classifiers Shah, Gaston, Harvey, McNamara, Ramos, You, Alhajjar
2021ViewMental Health Call Triage: Coding Systems and Opportunities for Research Hashmi, Thomas, Nandan
2021ViewHarvesting Intrinsically Verifiable Trust to Build a Honey Traceability System for Sustainable Development Runzel, Hassler, Hadley, Ratcliffe, Wilkes, Cazier
2020ViewThe Sting of Adoption: The Technology Acceptance Model (TAM) with Actual Usage in a Hazardous Environment Hassler, MacDonald, Cazier, Wilkes
2019ViewTrash to Treasure: Predicting Landfill Gas Flow to Optimize Electricity Generation Hassler, Emery, Hoyle, Cazier
2018ViewStandardizing Public Utility Data: A Case Study of a Rural Mid-Size Utility Hassler, Cazier, Russell, Mueller, Paprocki
2017ViewA Business Multi-Case Study of Change Management in Software Implementation Holtel, Paddock, Reiter, Riley, Havelka
2018ViewPrivacy and Security Issues Associated with Mobile Dating Applications Hayes
2017ViewGeolocation Tracking and Privacy Issues Associated with the Uber Mobile Application Hayes, Snow, Altuwayjiri
2015ViewLeakage of Geolocation Data by Mobile Ad Networks Snow, Hayes, Dwyer
2010ViewPassword Security Risk versus Effort: An Exploratory Study on User-Perceived Risk and the Intention to Use Online Applications Gebauer, Kline, He
2009ViewThe Impact of Electronic Data Interchange Information Technology on External Auditors Ricks, Schwieger, Henry, Almohsen
2022ViewText Prediction Using Artificial Intelligence: An Analysis of Two Text Prediction Systems Wimmer, Du, Heri
2019ViewAn Exploratory Study of the Perceptions of Library Faculty and Patrons on Library Resources Herman, Wimmer, Rebman Jr.
2017ViewMinimalism in Data Visualization: Perceptions of Beauty, Clarity, Effectiveness, and Simplicity Hill, Wray, Sibona
2011ViewUsing Market Basket Analysis to Estimate Potential Revenue Increases for a Small University Bookstore Hoanca, Mock
2021ViewUsing Analytics to understand Performance and Wellness for a Women’s College Soccer Team Njunge, Witman, Holmberg, Canacoo
2017ViewA Business Multi-Case Study of Change Management in Software Implementation Holtel, Paddock, Reiter, Riley, Havelka
2022ViewQR Code Hacking – Detecting Multiple Vulnerabilities in Android Scanning Software Homan, Breese
2018ViewCan Social Media Accounts Have an Impact on Hiring Decisions? Guidelines for Appropriate Use Kim, Homan
2015ViewBlurred Lines: Defining the Motives for Mobile and Social Media Use for Marketing Strategy Kim, Homan, Breese-Vitelli, Metzer
2012ViewCloud Computing: Should I Stay or Should I Cloud? Muhleman, Kim, Homan, Breese
2010ViewOn the utility of HCI practices in improving a commercial information retrieval system Honeycutt, Kolpack, Honeycutt, Talbert
2010ViewOn the utility of HCI practices in improving a commercial information retrieval system Honeycutt, Kolpack, Honeycutt, Talbert
2014ViewA Cloud Computing Methodology Study of Platform-as-a-Service (PaaS) in the Financial Industry Lawler, Howell-Barber, Joseph
2013ViewA Study of Cloud Computing Infrastructure-as-a-Service (IaaS) in Financial Firms Lawler, Howell-Barber, Joseph, Narula
2012ViewA Study of Cloud Computing Software-as-a-Service (SaaS) in Financial Firms Lawler, Howell-Barber, Desai, Joseph
2019ViewTrash to Treasure: Predicting Landfill Gas Flow to Optimize Electricity Generation Hassler, Emery, Hoyle, Cazier
2020ViewPredicting Soil Conditions Using Machine Learning Algorithms Gondi, Hua, Bajracharya
2012ViewAdding Social Features to E-commerce Huang, Yoon, Benyoucef
2012ViewReadiness for Transitioning to ICD-10 Coding: Litton, Humphrey, Schwieger
2021ViewThe COVID Effect: Information Technology Jobs in the Pandemic Sendall, Peslak, Ceccucci, Hunsinger
2020ViewOpen Source Software: A Detailed Analysis of Contributions and Quality Peslak, Hunsinger
2017ViewText Messaging Today: A Longitudinal Study of Variables Influencing Text Messaging from 2009 to 2016 Peslak, Hunsinger, Kruck
2016ViewA Comprehensive Current Review of Text Messaging Usage Peslak, Ceccucci, Hunsinger, Kruck, Sendall
2016ViewAn Empirical Study on the Impact of Price Discount on Sales in Software-as-a-Service (SaaS) Market Choi, Medlin, Hunsinger
2012ViewAn Examination of the Factors Influencing Student Usage of Dropbox, a File Hosting Service Hunsinger, Corley
2011ViewWhy are People Using Google's Corley, Hunsinger
2010ViewWhat Influences People to Use Linux? Hunsinger, Fransen
2009ViewSpyware: What Influences College Students to Use Anti-Spyware Tools? Ward, Hunsinger
2008ViewAnalysis of the Factors that Influence Online Purchasing Amoroso, Hunsinger
2016ViewPatient Healthcare Smart Card System: A Unified Medical Record for Access and Analytics Hussein, Ariyachandra, Frolick
2009ViewA FOLLOW-UP STUDY OF DETECTING PHISHING EMAILS Bekkering, Werner, Hutchison
2022ViewBig Data Analytics in Supply Chain Management: A Review and Recommendations Ouyang, Hwang, Cham, Chen