Conf Year | Article | Title | Authors |
2020 | View | The Sting of Adoption: The Technology Acceptance Model (TAM) with Actual Usage in a Hazardous Environment |
Hassler, MacDonald, Cazier, Wilkes
|
2009 | View | Synchronizing Development Life-Cycles: Rationale and Integrative Approach to Construction of eLearning Systems and Online Courses at a Tier 1 Research Institution |
Conn, Macedo, Meese
|
2022 | View | A Predictive Unmanned Aerial Vehicle Maintenance Method: Using Low-Code and Cloud-Based Data Visualization |
Kim, Chung, Ju, Maeng
|
2022 | View | Convolutional Neural Network Binary Image Classifier via Mobile Devices: EZ Autism Screener |
Ata, Chung, Maeng
|
2022 | View | The Importance and Value of Personal Identifying Information: Towards Information Worth |
Kaleta, Mahadevan, Thackston
|
2008 | View | Anticipated changes to technologies |
Janicki, Clark, Mahar, Logan
|
2009 | View | Contingency Planning: Disaster Recovery Strategies for Successful Educational Continuity |
Omar, Udeh, Mantha
|
2015 | View | CASE Tools’ Acceptance in Higher Education – Assessment and Enhanced UTAUT Model |
Marcinkowski, Wrycza
|
2022 | View | Decision-Making Tool for Procurement for Brazilian Airlines |
Torres, Halawi, Rojas, Bico, Marinho
|
2014 | View | Evaluating Information Security Practices, Knowledge, and Attitudes of Information Technology Student Workers |
Imboden, Martin, Woodward, Nehrkorn
|
2011 | View | CMobile: A Mobile Photo Capture Application for Construction Imaging |
Martin, Vetter, Brown, Janicki
|
2014 | View | Aligning Information Systems strategy with the Business Strategy in a South African Banking Environment |
Kekwaletswe, Mathebula
|
2014 | View | Cyberbullying or normal game play? Impact of age, gender, and experience on cyberbullying in multi-player online gaming environments: Perceptions from one gaming forum |
Fryling, Cotler, Rivituso, Mathews, Pratico
|
2022 | View | An Exploration of the Benefits of Certifications and their Relationship to Salaries in IS/IT |
Matthews, Cummings, Janicki
|
2022 | View | Exploring the Strategic Cybersecurity Defense Information Technology Managers Can Implement to Reduce Healthcare Data Breaches |
Mawel, Sambasivam
|
2021 | View | An Initial Exploration of Multi-Node Open Cloud Infrastructure Testbed |
Liu, Lui, Li, Embuldeniya, Garcia, McAllister, Schwieger
|
2015 | View | A Multi-National Study of Attitudes and Policies of Military Personnel about Smart Phone Applications |
Fruehauf, McCann, Al-Khalifa
|
2018 | View | Where We are with Enterprise Architecture |
Halawi, McCarthy, farah
|
2008 | View | Knowledge Discovery and Data Mining of Biomedical Data with Decision Trees |
McClelland
|
2019 | View | Project Management Skills
Needed for Mobile App Development |
McCoy
|
2010 | View | The Use of Mobile Units |
McGinley, Nicolai
|
2021 | View | Effect of Normalization on TOPSIS and Fuzzy TOPSIS |
Sarraf, McGuire
|
2015 | View | Variation in Best-Case and Worst-Case Performance for Sorting Algorithms |
McMaster, Sambasivam, Rague, Wolthuis
|
2014 | View | Measuring Algorithm Performance With Java: Patterns of Variation |
McMaster, Sambasivam, Wolthuis
|
2019 | View | Evaluating Evasion Attack Methods on Binary
Network Traffic Classifiers |
Shah, Gaston, Harvey, McNamara, Ramos, You, Alhajjar
|
2014 | View | Open Source Web Application Vulnerability Scanners: The Cost Effective Choice |
McQuade
|
2011 | View | Computational Linguistic Hedges Applied to a Project Critical Path |
McQuighan, Hammell II
|
2019 | View | Developing a GIS Dashboard Tool to Inform Non-Profit Hospitals of Community Health Needs at the Neighborhood Level |
Copello, Smith, Mease, Umapathy, Richard, Knight, Albertie, Hamadi, Spaulding, Apatu
|
2022 | View | Exploring Short Stay Health Care Quality: Skilled Nursing Facilities during the COVID-19 Era
|
Winston, Xiong, Medlin, Pelaez
|
2020 | View | Case Study of Blockchain Applications in Supply Chain Management- Opportunities and Challenges |
Smith, Xiong, Medlin
|
2020 | View | The New Frontier in Home and Commercial Deliveries: Drones
|
Fowler, Vannoy, Eggers, Medlin
|
2019 | View | Conceptualization of Blockchain-based Applications: Technical Background and Social Perspective |
Xiong, Tang, Medlin
|
2018 | View | Commercial Drone Activity: Security, Privacy, and Legislation Issues |
Vannoy, Medlin
|
2018 | View | Driving Distractions and Multi-tasking: An Investigative Study |
Choi, Xiong, Medlin
|
2017 | View | Multitasking Behaviors: Distracted Driving Threats Beyond Texting |
Medlin, Choi, Xiong
|
2016 | View | An Empirical Study on the Impact of Price Discount on Sales in Software-as-a-Service (SaaS) Market |
Choi, Medlin, Hunsinger
|
2009 | View | Synchronizing Development Life-Cycles: Rationale and Integrative Approach to Construction of eLearning Systems and Online Courses at a Tier 1 Research Institution |
Conn, Macedo, Meese
|
2008 | View | Test Driven Development in the .Net Framework |
Lee, Mehta, Shah
|
2008 | View | Incorporation of Information Technology into Assisted Health Care: An empirical study |
Merrill, White
|
2013 | View | Bizprojet: The co-design of an affinities and skills search-engine. Team building around an innovative project: New knowledge shared? |
Lombardo, Agostinelli, Ouvrard, Arvanitakis, Metge, Linscott
|
2015 | View | Blurred Lines: Defining the Motives for Mobile and Social Media Use for Marketing Strategy |
Kim, Homan, Breese-Vitelli, Metzer
|
2012 | View | Let’s Look at the Cloud from a Risk Management Perspective |
Vignos, Kim, Metzer
|
2019 | View | Knowledge Management System Development Approaches: Evolution or Stagnation? |
Mew, Money
|
2017 | View | Cloud Computing: Implications for Information Systems Development Service Providers and Practitioners |
Mew, Money
|
2014 | View | On Adapting a Military Combat Discrete Event Simulation with Big Data and Geospatial Modeling Toward a Predictive Model Ecosystem for Interpersonal Violence |
Mhlanga, Perry, Kirchner
|
2010 | View | On Conceptual Models of Collaborative Partnerships and the Infusion of Knowledge Workers in the Local IT Sector |
Vardiman, Mhlanga
|
2009 | View | Towards an Abstract Model for |
Mhlanga, Vardiman, Reames
|
2012 | View | A Portal-Based Web Service Development Using a Mashup Approach |
Miah, Debuse, Gammack, Pigott
|
2011 | View | Maximizing Visibility in Skylines |
Miah
|
2011 | View | Most Popular Package Design |
Miah
|
2011 | View | Survey of Data Mining Methods in Emergency Evacuation Planning |
Miah
|
2012 | View | Traffic on the Information Super Highway -- Use vs. Useful? |
Grant, Middleton
|
2012 | View | The Deployment Pipeline |
Mikita, DeHondt, Nezlek
|
2011 | View | Outsourcing Best Practices |
Mikita, DeHondt
|
2020 | View | Leader-Driven Supply Chain Cybersecurity Framework |
Vanajakumari, Mittal, Stoker, Clark, Miller
|
2022 | View | Influence of Executive Perception of Role of Information Technology: A financial institution perspective |
Pandey, Mishra
|
2022 | View | Measurement, reporting, and monitoring organizational security governance: A qualitative analysis of security professionals’ experiences |
Slonka, Mishra, Draus, Bromall
|
2020 | View | Does the Executive Perception of the Value of Information Technology (IT) Influence the IT strategy? A Case Study |
Pandey, Mishra
|
2020 | View | Interpreting Organizational Security Governance Objectives for Strategic Security Planning |
Mishra
|
2019 | View | Addressing issues with EMR resulting in workarounds: An exploratory study
|
Mishra, Slonka, Draus, Bromall, Slonka
|
2019 | View | Examining Organizational Security Governance (OSG) Objectives: How is strategic planning for Security is undertaken at ABC Corporation? |
Mishra
|
2008 | View | Some Suggestions for Further Diffusion of Work System Method Ideas in Systems Analysis and Design |
Petkov, Misra, Petkova
|
2012 | View | Analysis of Electronic Health |
Mitchell, Clark
|
2012 | View | Information Security Blueprint |
Clark, Benli, Mitchell, Vetter
|
2020 | View | Leader-Driven Supply Chain Cybersecurity Framework |
Vanajakumari, Mittal, Stoker, Clark, Miller
|
2011 | View | Using Market Basket Analysis to Estimate Potential Revenue Increases for a Small University Bookstore |
Hoanca, Mock
|
2021 | View | A Cloud-Based System for Scraping Data from Amazon Product Reviews at Scale |
Woodall, Kline, Vetter, Modaresnezhad
|
2021 | View | Cybersecurity Maturity Model Certification Initial Impact on the Defense Industrial Base
|
Strohmier, Stoker, Vanajakumari, Clark, Cummings, Modaresnezhad
|
2017 | View | Blockchain Technology: Challenges and Opportunities |
Modaresnezhad, Cummings
|
2009 | View | A Study of the Perceptions of Students on |
Lawler, Molluzzo
|
2021 | View | Resolving Pressure and Stress on Governance Models from Robotic Process Automation Technologies |
Money
|
2020 | View | Integration of Information Systems: Robotic Process Automation |
Money
|
2019 | View | Knowledge Management System Development Approaches: Evolution or Stagnation? |
Mew, Money
|
2017 | View | Cloud Computing: Implications for Information Systems Development Service Providers and Practitioners |
Mew, Money
|
2014 | View | Roadmaps and Maturity Models: |
Moore
|
2008 | View | The Impact of Technology Diffusion on Employment and Compensation: Evidence from the Telecommunications Sector |
Clark, Moussawi
|
2018 | View | Standardizing Public Utility Data: A Case Study of a Rural Mid-Size Utility |
Hassler, Cazier, Russell, Mueller, Paprocki
|
2012 | View | Cloud Computing: Should I Stay or Should I Cloud? |
Muhleman, Kim, Homan, Breese
|
2019 | View | Improving Information Security Awareness one Faction at a Time |
Mutchler
|
2021 | View | Impact of Review Valence and Perceived Uncertainty on Purchase of Time-Constrained and Discounted Search Goods |
Muzumdar
|
2015 | View | Social Responsibility Trends and Perceptions in Global IT Outsourcing |
Babin, Myers
|