Conf Year | Article | Title | Authors |
2017 | View | A Business Multi-Case Study of Change Management in Software Implementation |
Holtel, Paddock, Reiter, Riley, Havelka
|
2021 | View | Targeted Data Visualization and Reporting Approaches for Vulnerability Management at Enterprise Organizations |
Painter
|
2022 | View | Influence of Executive Perception of Role of Information Technology: A financial institution perspective |
Pandey, Mishra
|
2020 | View | Does the Executive Perception of the Value of Information Technology (IT) Influence the IT strategy? A Case Study |
Pandey, Mishra
|
2018 | View | Standardizing Public Utility Data: A Case Study of a Rural Mid-Size Utility |
Hassler, Cazier, Russell, Mueller, Paprocki
|
2014 | View | Identifying User Behavior from Residual Data in Cloud-based Synchronized Apps |
Grispos, Glisson, Pardue, Dickson
|
2010 | View | A Process for Assessing Voting System Risk Using Threat Trees |
Yasinisac, Pardue
|
2013 | View | Performance and Corporate Social Responsibility in the Information Technology Industry |
Cowan, Parzinger, Welch, Welch
|
2013 | View | Web Recruitment: |
Parzinger, Ward, Langford
|
2020 | View | Documenting the Process of Hijacking a Raspberry Pi User Login Credentials via Remote Code Execution |
Patel, Wimmer, Powell
|
2017 | View | Protecting IoT Devices from the Mirai Botnet |
Frank, Nance, Jarocki, Pauli
|
2012 | View | Using the Cloud: The Cost of Encryption in IaaS |
Cronin, Pauli, Ham
|
2011 | View | Using the cloud: How to keep your data private |
Cronin, Pauli, Ham
|
2022 | View | Are Companies Responsible for Internet of Things (IoT) Data Privacy? A Survey of IoT User Perceptions |
Paullet, Pinchot, Chawdhry
|
2018 | View | Understanding Cyberstalking through the Analysis of Student's Online Activity |
Paullet, Chawdhry
|
2017 | View | What’s “Appening” to our Privacy?
A Students Perspective on Downloading Mobile Apps
|
Paullet, Chawdhry, Douglas, Compomizzi
|
2016 | View | Are Students Using Security Measures to Protect their Data when Downloading Mobile Applications? |
Chawdhry, Paullet, Douglas, Compomizzi
|
2014 | View | Use of Preventative Measures to Protect Data Privacy on Mobile Devices |
Pinchot, Paullet
|
2013 | View | Data Privacy: Are We Accidentally Sharing Too Much Information? |
Chawdhry, Paullet, Douglas
|
2012 | View | Cybercrime: The Unintentional Effects of Oversharing Information on Facebook |
Paullet, Pinchot
|
2011 | View | Talk to Text: Changing Communication Patterns |
Pinchot, Douglas, Paullet, Rota
|
2011 | View | The New Tech Effect: Analyzing Juror Credibility |
Davis, Paullet, Kraeer, Grant
|
2010 | View | How Mobile Technology is Changing Our Culture |
Pinchot, Paullet, Rota
|
2022 | View | Exploring Short Stay Health Care Quality: Skilled Nursing Facilities during the COVID-19 Era
|
Winston, Xiong, Medlin, Pelaez
|
2008 | View | A Study of the Information Technology Trade between The United States and the Dominican Republic-Central America Free Trade Agreement Nations |
Pena, Aguirre, Saenz, Koong, Liu
|
2019 | View | Game Theory Through Smartphone App Use In Support of For-Hire Transportation Network Companies |
Pendergrass
|
2017 | View | Phubbing: Communication in the Attention Economy |
Pendergrass
|
2014 | View | A Case Study Analysis of KnightSec and the Steubenville Rape Case |
Pendergrass, Wright
|
2020 | View | Enhancing Learning Analytics: The Rise of Institutional Research |
Perkins, Ariyachandra
|
2014 | View | On Adapting a Military Combat Discrete Event Simulation with Big Data and Geospatial Modeling Toward a Predictive Model Ecosystem for Interpersonal Violence |
Mhlanga, Perry, Kirchner
|
2022 | View | The Effect of Mental Illness on Compensation for IT Developers |
Peslak, Ceccucci, Jones, Leonard
|
2021 | View | The COVID Effect: Information Technology Jobs in the Pandemic |
Sendall, Peslak, Ceccucci, Hunsinger
|
2020 | View | Job and Career Satisfaction of Software Engineers |
Peslak, Ceccucci, Sendall
|
2020 | View | Open Source Software: A Detailed Analysis of Contributions and Quality |
Peslak, Hunsinger
|
2019 | View | A Longitudinal Study of Google Privacy Policies |
Peslak, Kovalchick, Conforti
|
2019 | View | Web Designer or Web Developer? A Detailed Comparison of Job Requirements |
Peslak
|
2017 | View | Facebook Fanatics: A Linguistic and Sentiment Analysis of the Most “Fanned” Facebook Pages |
Peslak
|
2017 | View | Text Messaging Today: A Longitudinal Study of Variables Influencing Text Messaging from 2009 to 2016 |
Peslak, Hunsinger, Kruck
|
2016 | View | A Comprehensive Current Review of Text Messaging Usage |
Peslak, Ceccucci, Hunsinger, Kruck, Sendall
|
2016 | View | Sentiment Analysis and Opinion Mining: Current State of the Art and Review of Google and Yahoo Search Engines’ Privacy Policies |
Peslak
|
2015 | View | An Expanded Analysis of Internet Dependencies by Demographic Variables |
Peslak
|
2013 | View | A Study of Information Technology Operating and Capital Expenditures and Their Effect on Positive Firm Outcomes |
Peslak
|
2012 | View | Analysis of the Variables That Affect Frequency of Use and Time Spent on Social Networking |
Peslak, Sendall, Ceccucci
|
2011 | View | Does Size Matter in IT? An exploratory analysis of critical issues facing organizations based on company size |
Peslak
|
2010 | View | A Study of Information Technology Integration |
Peslak
|
2010 | View | An Empirical Study of Social Networking Behavior Using Diffusion of Innovation Theory |
Ceccucci, Peslak, Sendall
|
2009 | View | An Empirical Study of Text Messaging |
Peslak, Ceccucci, Sendall
|
2009 | View | The Effect of Gender on the Application of |
Peslak, Krisanda
|
2008 | View | An Empirical Study of Instant Messaging Behavior Using Diffusion of Innovation Theory |
Peslak, Ceccucci, Sendall
|
2017 | View | Towards a better understanding of the justification of choice of methods to be mixed in the same intervention during Action Design Research |
Petkov, Petkova
|
2016 | View | A Multi-Criteria Network Assessment Model of IT Offshoring Risks from Service Provider’s Perspective
|
Petkov, Petkova
|
2015 | View | Toward a Better Understanding of Factors Affecting Software Project Complexity |
Petkova, Petkov
|
2014 | View | A Case Study on Achieving Legitimation in Information Systems Action Research Projects |
Petkova, Petkov
|
2013 | View | Some Comparisons between SSM and the Activity Analysis and Development (ActAD) framework applied to IS development |
Petkova, Petkov
|
2012 | View | Possible Lessons for the Field of Information Systems from the Work of Russel Ackoff |
Petkov, Petkova
|
2011 | View | On a Systemic Understanding of Software Development Contexts |
Petkov, Alter, Petkova
|
2011 | View | Social Networking Systems and Campus Life |
Sgambato, Petkov, Wolf
|
2009 | View | ON DESIGN SCIENCE, MCDM AND IS OUTSOURCING DECISIONS |
Petkov, Petkova
|
2009 | View | USING A GROUP SUPPORT SYSTEM |
Nepal, Petkov
|
2008 | View | Some Suggestions for Further Diffusion of Work System Method Ideas in Systems Analysis and Design |
Petkov, Misra, Petkova
|
2017 | View | Towards a better understanding of the justification of choice of methods to be mixed in the same intervention during Action Design Research |
Petkov, Petkova
|
2016 | View | A Multi-Criteria Network Assessment Model of IT Offshoring Risks from Service Provider’s Perspective
|
Petkov, Petkova
|
2015 | View | Toward a Better Understanding of Factors Affecting Software Project Complexity |
Petkova, Petkov
|
2014 | View | A Case Study on Achieving Legitimation in Information Systems Action Research Projects |
Petkova, Petkov
|
2013 | View | Some Comparisons between SSM and the Activity Analysis and Development (ActAD) framework applied to IS development |
Petkova, Petkov
|
2012 | View | Possible Lessons for the Field of Information Systems from the Work of Russel Ackoff |
Petkov, Petkova
|
2011 | View | On a Systemic Understanding of Software Development Contexts |
Petkov, Alter, Petkova
|
2009 | View | ON DESIGN SCIENCE, MCDM AND IS OUTSOURCING DECISIONS |
Petkov, Petkova
|
2009 | View | Sustainability and Greening through |
D'Onofrio, Jarmoszko, Lee-Partridge, Petkova
|
2008 | View | Some Suggestions for Further Diffusion of Work System Method Ideas in Systems Analysis and Design |
Petkov, Misra, Petkova
|
2013 | View | Information Security in Nonprofits: A First Glance at the State of Security in Two Illinois Regions |
Imboden, Phillips, Seib, Fiorentino
|
2012 | View | A Portal-Based Web Service Development Using a Mashup Approach |
Miah, Debuse, Gammack, Pigott
|
2011 | View | The Effects of Interruptions on Remembering Task Information |
Lenox, Pilarski, Leathers
|
2022 | View | Are Companies Responsible for Internet of Things (IoT) Data Privacy? A Survey of IoT User Perceptions |
Paullet, Pinchot, Chawdhry
|
2020 | View | Privacy Concerns and Data Sharing Habits of Personal Fitness Information Collected via Activity Trackers |
Pinchot, Cellante
|
2014 | View | Use of Preventative Measures to Protect Data Privacy on Mobile Devices |
Pinchot, Paullet
|
2012 | View | Cybercrime: The Unintentional Effects of Oversharing Information on Facebook |
Paullet, Pinchot
|
2011 | View | Talk to Text: Changing Communication Patterns |
Pinchot, Douglas, Paullet, Rota
|
2010 | View | How Mobile Technology is Changing Our Culture |
Pinchot, Paullet, Rota
|
2019 | View | An Empirical Study of Post-Production Software Code Quality When Employing the Agile Rapid Delivery Methodology |
Poe, Seeman
|
2019 | View | Privacy Considerations Throughout the Data Life Cycle |
Pomykalski
|
2017 | View | Using Systems Analysis and Design to Enhance the Business Understanding Stage in CRISP-DM |
Pomykalski, Buzydlowski
|
2020 | View | An International Review and Study on Perceptions of Security, Adoption, and Implementation of Electronic Health Records |
Aliyu, Wimmer, Powell, Rebman Jr.
|
2020 | View | Documenting the Process of Hijacking a Raspberry Pi User Login Credentials via Remote Code Execution |
Patel, Wimmer, Powell
|
2018 | View | Effects of Normalization Techniques on Logistic Regression in Data Science |
Adeyemo, Wimmer, Powell
|
2017 | View | Open vs. Close Source Decision Tree Algorithms: Comparing Performance Measures of Accuracy, Sensitivity and Specificity |
Khan, Wimmer, Powell
|
2016 | View | Principle Component Analysis for Feature Reduction and Data Preprocessing in Data Science |
Wimmer, Powell
|
2015 | View | A Comparison of Open Source Tools for Data Science |
Wimmer, Powell
|
2014 | View | Cyberbullying or normal game play? Impact of age, gender, and experience on cyberbullying in multi-player online gaming environments: Perceptions from one gaming forum |
Fryling, Cotler, Rivituso, Mathews, Pratico
|
2012 | View | Comparing Performance of Web Service Interaction Styles: SOAP vs. REST |
Kumar, Ahuja, Umapathy, Prodanoff
|
2008 | View | Research Design for a Natural Disaster Management Communication System: |
Nicolai, Puntillo, Bilow
|