Search by Authors

Search returned 59 items for : K


Conf YearArticleTitleAuthors
2016ViewAnalysis of the Risks of NFC Mobile Payment Systems Kakish, Shah
2012ViewETL Evolution for Real-Time Data Warehousing Kakish, Kraft
2022ViewThe Importance and Value of Personal Identifying Information: Towards Information Worth Kaleta, Mahadevan, Thackston
2022ViewUnderstanding Gen Z’s Switching Intention to E-Commerce Drone Delivery: An Updated Diffusion of Innovation Kaleta, Xie, Chen
2016ViewMalvertising - A Rising Threat To The Online Ecosystem Dwyer, Kanguri
2012ViewEvolving Mobile Architectures: A Case Study in the Development of a Location Privacy Application Babb, Dana, Keith, Jafar
2011ViewCo-Creating Value in Systems Development: A Shift towards Service-Dominant Logic Babb, Keith
2011ViewPay-What-You-Want Pricing for Mobile Applications: The Effect of Privacy Assurances and Social Information Racherla, Keith, Babb
2014ViewAligning Information Systems strategy with the Business Strategy in a South African Banking Environment Kekwaletswe, Mathebula
2022ViewVulnerability Assessment for Web Applications Garcia, Abraham, Kepic, Cankaya
2015ViewAn Optimized Intelligent Home Network Model Kevin, Ndlovu, Lall, Kogeda
2017ViewOpen vs. Close Source Decision Tree Algorithms: Comparing Performance Measures of Accuracy, Sensitivity and Specificity Khan, Wimmer, Powell
2022ViewA Predictive Unmanned Aerial Vehicle Maintenance Method: Using Low-Code and Cloud-Based Data Visualization Kim, Chung, Ju, Maeng
2019ViewInfobesity: Do Facebook Users Actually Use Those Bookmarked Posts? Kim
2018ViewCan Social Media Accounts Have an Impact on Hiring Decisions? Guidelines for Appropriate Use Kim, Homan
2015ViewBlurred Lines: Defining the Motives for Mobile and Social Media Use for Marketing Strategy Kim, Homan, Breese-Vitelli, Metzer
2012ViewCloud Computing: Should I Stay or Should I Cloud? Muhleman, Kim, Homan, Breese
2012ViewLet’s Look at the Cloud from a Risk Management Perspective Vignos, Kim, Metzer
2009ViewCan Management Predict Information Security Threats by Utilizing a Data Warehouse? Kim, Steen
2009ViewResults of Implementing a Knowledge Management Initiative to Enhance Network Access Controls Kim, Nelson
2014ViewOn Adapting a Military Combat Discrete Event Simulation with Big Data and Geospatial Modeling Toward a Predictive Model Ecosystem for Interpersonal Violence Mhlanga, Perry, Kirchner
2014ViewCyber Security Best Practices: What to do? Kleinberg, Reinicke, Cummings
2021View Selecting Subsets of Amazon Reviews Gokce, Kline, Cummings, Vetter
2021ViewA Cloud-Based System for Scraping Data from Amazon Product Reviews at Scale Woodall, Kline, Vetter, Modaresnezhad
2019ViewLiterary Analysis Tool: Text Analytics for Creative Writers Grimsman, Kline, Vetter, Guinn
2019ViewUnderstanding Campus Crime with a Multi-University Analytics System Iheadindu, Kline, Vetter, Clark
2019ViewWhich Amazon Reviews Should You Read? Gokce, Kline, Vetter, Cummings
2016ViewSystem Analysis of the Infrastructure of an IT services provider Krishnappa, Kline
2013ViewShifting Technological Landscape: IT Departments and Anticipated Technological Changes Cummings, Janicki, Kline
2010ViewPassword Security Risk versus Effort: An Exploratory Study on User-Perceived Risk and the Intention to Use Online Applications Gebauer, Kline, He
2008ViewAn Information Technology Project Funding Process Kline, Renninger, Guinn, Sackley, Scott
2017ViewIT Audit Literature: A Future-Looking Research Agenda Klinkenborg, Streff, Nzailu
2008ViewFormal Information Security Standards in Medium Enterprises Sambasivam, Kluge
2013ViewSoftware Engineering: accessing IT core concepts Davis, Kmetz
2019ViewDeveloping a GIS Dashboard Tool to Inform Non-Profit Hospitals of Community Health Needs at the Neighborhood Level Copello, Smith, Mease, Umapathy, Richard, Knight, Albertie, Hamadi, Spaulding, Apatu
2015ViewAn Optimized Intelligent Home Network Model Kevin, Ndlovu, Lall, Kogeda
2010ViewOn the utility of HCI practices in improving a commercial information retrieval system Honeycutt, Kolpack, Honeycutt, Talbert
2016ViewFinding the “Radicalness” in Radical Innovation Adoption Sharma, Thomas, Konsynski
2009ViewSome Observations on the Occurrences of Data Breaches Guerra, Joseph, Ramirez, Koong, Liu
2009ViewSome Observations on the Occurrences of Phishing Lara, Rios, Salazar, Koong, Liu
2008ViewA STUDY OF THE INFORMATION TECHNOLOGY TRADE BETWEEN THE UNITED STATES AND ASIA PACIFIC ECONOMIES COOPERATION NATIONS Roman, Blakely, Koong, Liu
2008ViewA Study of the Information Technology Trade between The United States and the Dominican Republic-Central America Free Trade Agreement Nations Pena, Aguirre, Saenz, Koong, Liu
2008ViewA STUDY OF THE INFORMATION TECHNOLOGY TRADE BETWEEN UNITED STATES AND THE SOUTHERN AFRICAN CUSTOM UNION Saenz, Flores, Koong, Liu
2022ViewThe Effects of Individual Characteristics and Mastery Goal Orientation on IT Project Continuation Intentions Totty, Zaza, Greer, Korzaan
2017ViewAn Exploratory Analysis of Gender Differences in IT Project Commitment, Continuation, and Escalation Korzaan, Harris, Brooks
2014ViewThe Silent Treatment in IT Projects: Gender Differences in Inclinations to Communicate Project Status Information Korzaan, Brooks
2013ViewThe De-Escalation of the DHS HSIN Next Gen Project Rosenhauer, Korzaan
2019ViewA Longitudinal Study of Google Privacy Policies Peslak, Kovalchick, Conforti
2011ViewThe New Tech Effect: Analyzing Juror Credibility Davis, Paullet, Kraeer, Grant
2012ViewETL Evolution for Real-Time Data Warehousing Kakish, Kraft
2009ViewE-Commerce Security Kraft
2008ViewThe Importance of Business Process Alignment Kraft
2009ViewThe Effect of Gender on the Application of Peslak, Krisanda
2016ViewSystem Analysis of the Infrastructure of an IT services provider Krishnappa, Kline
2017ViewText Messaging Today: A Longitudinal Study of Variables Influencing Text Messaging from 2009 to 2016 Peslak, Hunsinger, Kruck
2016ViewA Comprehensive Current Review of Text Messaging Usage Peslak, Ceccucci, Hunsinger, Kruck, Sendall
2012ViewComparing Performance of Web Service Interaction Styles: SOAP vs. REST Kumar, Ahuja, Umapathy, Prodanoff
2019ViewMunging and liking it: wrangling patient time-related data with IPython Kunene
2012ViewEarly Stage Probabilistic Software Project Schedule Estimation Kwon, Hammell II