Conf Year | Article | Title | Authors |
2016 | View | Analysis of the Risks of NFC Mobile Payment Systems |
Kakish, Shah
|
2012 | View | ETL Evolution for Real-Time Data Warehousing |
Kakish, Kraft
|
2022 | View | The Importance and Value of Personal Identifying Information: Towards Information Worth |
Kaleta, Mahadevan, Thackston
|
2022 | View | Understanding Gen Z’s Switching Intention to E-Commerce Drone Delivery: An Updated Diffusion of Innovation |
Kaleta, Xie, Chen
|
2016 | View | Malvertising - A Rising Threat To The Online Ecosystem |
Dwyer, Kanguri
|
2012 | View | Evolving Mobile Architectures: A Case Study in the Development of a Location Privacy Application |
Babb, Dana, Keith, Jafar
|
2011 | View | Co-Creating Value in Systems Development: A Shift towards Service-Dominant Logic |
Babb, Keith
|
2011 | View | Pay-What-You-Want Pricing for Mobile Applications: The Effect of Privacy Assurances and Social Information |
Racherla, Keith, Babb
|
2014 | View | Aligning Information Systems strategy with the Business Strategy in a South African Banking Environment |
Kekwaletswe, Mathebula
|
2022 | View | Vulnerability Assessment for Web Applications |
Garcia, Abraham, Kepic, Cankaya
|
2015 | View | An Optimized Intelligent Home Network Model |
Kevin, Ndlovu, Lall, Kogeda
|
2017 | View | Open vs. Close Source Decision Tree Algorithms: Comparing Performance Measures of Accuracy, Sensitivity and Specificity |
Khan, Wimmer, Powell
|
2022 | View | A Predictive Unmanned Aerial Vehicle Maintenance Method: Using Low-Code and Cloud-Based Data Visualization |
Kim, Chung, Ju, Maeng
|
2019 | View | Infobesity: Do Facebook Users Actually Use Those Bookmarked Posts? |
Kim
|
2018 | View | Can Social Media Accounts Have an Impact on Hiring Decisions? Guidelines for Appropriate Use |
Kim, Homan
|
2015 | View | Blurred Lines: Defining the Motives for Mobile and Social Media Use for Marketing Strategy |
Kim, Homan, Breese-Vitelli, Metzer
|
2012 | View | Cloud Computing: Should I Stay or Should I Cloud? |
Muhleman, Kim, Homan, Breese
|
2012 | View | Let’s Look at the Cloud from a Risk Management Perspective |
Vignos, Kim, Metzer
|
2009 | View | Can Management Predict Information Security Threats by Utilizing a Data Warehouse? |
Kim, Steen
|
2009 | View | Results of Implementing a Knowledge Management Initiative to Enhance Network Access Controls |
Kim, Nelson
|
2014 | View | On Adapting a Military Combat Discrete Event Simulation with Big Data and Geospatial Modeling Toward a Predictive Model Ecosystem for Interpersonal Violence |
Mhlanga, Perry, Kirchner
|
2014 | View | Cyber Security Best Practices: What to do? |
Kleinberg, Reinicke, Cummings
|
2021 | View |
Selecting Subsets of Amazon Reviews
|
Gokce, Kline, Cummings, Vetter
|
2021 | View | A Cloud-Based System for Scraping Data from Amazon Product Reviews at Scale |
Woodall, Kline, Vetter, Modaresnezhad
|
2019 | View | Literary Analysis Tool: Text Analytics for Creative Writers |
Grimsman, Kline, Vetter, Guinn
|
2019 | View | Understanding Campus Crime with a Multi-University Analytics System |
Iheadindu, Kline, Vetter, Clark
|
2019 | View | Which Amazon Reviews Should You Read? |
Gokce, Kline, Vetter, Cummings
|
2016 | View | System Analysis of the Infrastructure of an IT services provider |
Krishnappa, Kline
|
2013 | View | Shifting Technological Landscape: IT Departments and Anticipated Technological Changes |
Cummings, Janicki, Kline
|
2010 | View | Password Security Risk versus Effort: An Exploratory Study on User-Perceived Risk and the Intention to Use Online Applications |
Gebauer, Kline, He
|
2008 | View | An Information Technology Project Funding Process |
Kline, Renninger, Guinn, Sackley, Scott
|
2017 | View | IT Audit Literature: A Future-Looking Research Agenda
|
Klinkenborg, Streff, Nzailu
|
2008 | View | Formal Information Security Standards in Medium Enterprises |
Sambasivam, Kluge
|
2013 | View | Software Engineering: accessing IT core concepts |
Davis, Kmetz
|
2019 | View | Developing a GIS Dashboard Tool to Inform Non-Profit Hospitals of Community Health Needs at the Neighborhood Level |
Copello, Smith, Mease, Umapathy, Richard, Knight, Albertie, Hamadi, Spaulding, Apatu
|
2015 | View | An Optimized Intelligent Home Network Model |
Kevin, Ndlovu, Lall, Kogeda
|
2010 | View | On the utility of HCI practices in improving a commercial information retrieval system |
Honeycutt, Kolpack, Honeycutt, Talbert
|
2016 | View | Finding the “Radicalness” in Radical Innovation Adoption |
Sharma, Thomas, Konsynski
|
2009 | View | Some Observations on the Occurrences of Data Breaches |
Guerra, Joseph, Ramirez, Koong, Liu
|
2009 | View | Some Observations on the Occurrences of Phishing |
Lara, Rios, Salazar, Koong, Liu
|
2008 | View | A STUDY OF THE INFORMATION TECHNOLOGY TRADE BETWEEN THE UNITED STATES AND ASIA PACIFIC ECONOMIES COOPERATION NATIONS |
Roman, Blakely, Koong, Liu
|
2008 | View | A Study of the Information Technology Trade between The United States and the Dominican Republic-Central America Free Trade Agreement Nations |
Pena, Aguirre, Saenz, Koong, Liu
|
2008 | View | A STUDY OF THE INFORMATION TECHNOLOGY TRADE BETWEEN UNITED STATES AND THE SOUTHERN AFRICAN CUSTOM UNION |
Saenz, Flores, Koong, Liu
|
2022 | View | The Effects of Individual Characteristics and Mastery Goal Orientation on IT Project Continuation Intentions |
Totty, Zaza, Greer, Korzaan
|
2017 | View | An Exploratory Analysis of Gender Differences in IT Project Commitment, Continuation, and Escalation |
Korzaan, Harris, Brooks
|
2014 | View | The Silent Treatment in IT Projects: Gender Differences in Inclinations to Communicate Project Status Information |
Korzaan, Brooks
|
2013 | View | The De-Escalation of the DHS HSIN Next Gen Project |
Rosenhauer, Korzaan
|
2019 | View | A Longitudinal Study of Google Privacy Policies |
Peslak, Kovalchick, Conforti
|
2011 | View | The New Tech Effect: Analyzing Juror Credibility |
Davis, Paullet, Kraeer, Grant
|
2012 | View | ETL Evolution for Real-Time Data Warehousing |
Kakish, Kraft
|
2009 | View | E-Commerce Security |
Kraft
|
2008 | View | The Importance of Business Process Alignment |
Kraft
|
2009 | View | The Effect of Gender on the Application of |
Peslak, Krisanda
|
2016 | View | System Analysis of the Infrastructure of an IT services provider |
Krishnappa, Kline
|
2017 | View | Text Messaging Today: A Longitudinal Study of Variables Influencing Text Messaging from 2009 to 2016 |
Peslak, Hunsinger, Kruck
|
2016 | View | A Comprehensive Current Review of Text Messaging Usage |
Peslak, Ceccucci, Hunsinger, Kruck, Sendall
|
2012 | View | Comparing Performance of Web Service Interaction Styles: SOAP vs. REST |
Kumar, Ahuja, Umapathy, Prodanoff
|
2019 | View | Munging and liking it: wrangling patient time-related data with IPython |
Kunene
|
2012 | View | Early Stage Probabilistic Software Project Schedule Estimation |
Kwon, Hammell II
|