Conf Year | Article | Title | Authors |
2011 | View | Pay-What-You-Want Pricing for Mobile Applications: The Effect of Privacy Assurances and Social Information |
Racherla, Keith, Babb
|
2015 | View | Variation in Best-Case and Worst-Case Performance for Sorting Algorithms |
McMaster, Sambasivam, Rague, Wolthuis
|
2009 | View | Some Observations on the Occurrences of Data Breaches |
Guerra, Joseph, Ramirez, Koong, Liu
|
2019 | View | Evaluating Evasion Attack Methods on Binary
Network Traffic Classifiers |
Shah, Gaston, Harvey, McNamara, Ramos, You, Alhajjar
|
2014 | View | Review of Web Service Specifications for Long-running Conversations |
Rana, Umapathy
|
2021 | View | Harvesting Intrinsically Verifiable Trust to Build a Honey Traceability System for Sustainable Development |
Runzel, Hassler, Hadley, Ratcliffe, Wilkes, Cazier
|
2009 | View | Towards an Abstract Model for |
Mhlanga, Vardiman, Reames
|
2020 | View | An International Review and Study on Perceptions of Security, Adoption, and Implementation of Electronic Health Records |
Aliyu, Wimmer, Powell, Rebman Jr.
|
2019 | View | An Exploratory Study of the Perceptions of Library Faculty and Patrons on Library Resources |
Herman, Wimmer, Rebman Jr.
|
2018 | View | Using Twitter Sentiment Analysis to Analyze Self-Sentiment of the POTUS |
White, Wimmer, Rebman Jr., Nwankwo
|
2015 | View | Information Technology in Patient Care: Challenges of using IT in Small Ambulatory Healthcare Organizations. |
Reddy
|
2014 | View | Cyber Security Best Practices: What to do? |
Kleinberg, Reinicke, Cummings
|
2013 | View | Can Social Media aid Software Development? |
Reinicke, Cummings
|
2012 | View | Creating an Audio Conferencing Application |
Sun, Vetter, Reinicke
|
2012 | View | The Impact of Regulatory Changes on IS Strategy: An Exploratory Study |
Reinicke, Ward
|
2010 | View | Creating a Framework for Research on Virtual Organizations |
Reinicke
|
2009 | View | Virtual Organizations: A Definitional Framework |
Reinicke
|
2017 | View | A Business Multi-Case Study of Change Management in Software Implementation |
Holtel, Paddock, Reiter, Riley, Havelka
|
2008 | View | An Information Technology Project Funding Process |
Kline, Renninger, Guinn, Sackley, Scott
|
2018 | View | ERP Rigidity and the Cloud Computing Effect |
Revenaugh, Schweigert
|
2019 | View | Developing a GIS Dashboard Tool to Inform Non-Profit Hospitals of Community Health Needs at the Neighborhood Level |
Copello, Smith, Mease, Umapathy, Richard, Knight, Albertie, Hamadi, Spaulding, Apatu
|
2009 | View | The Impact of Electronic Data Interchange Information Technology on External Auditors |
Ricks, Schwieger, Henry, Almohsen
|
2017 | View | A Business Multi-Case Study of Change Management in Software Implementation |
Holtel, Paddock, Reiter, Riley, Havelka
|
2009 | View | Some Observations on the Occurrences of Phishing |
Lara, Rios, Salazar, Koong, Liu
|
2009 | View | Factors that Persuade and Deter Membership in Professional Computing Associations |
Umapathy, Jamba, Ritzhaupt
|
2008 | View | Computing Professional Association Membership: An Exploration of Membership Needs and Motivations |
Ritzhaupt, Umapathy, Jamba
|
2016 | View | Causes of cyberbullying in multi-player online gaming environments: Gamer perceptions |
Cotler, Fryling, Rivituso
|
2014 | View | Cyberbullying or normal game play? Impact of age, gender, and experience on cyberbullying in multi-player online gaming environments: Perceptions from one gaming forum |
Fryling, Cotler, Rivituso, Mathews, Pratico
|
2012 | View | A Quantitative Analysis of Computing Jobs in 2012 |
Robin, Roggio
|
2009 | View | Superfund Site Analysis Using Web 2.0 Technologies |
Anderson, Jafar, Rogers
|
2013 | View | A Comparison of Software Testing Using the Object-Oriented Paradigm and Traditional Testing |
Gordon, Roggio
|
2013 | View | Taxonomy of Common Software Testing Terminology: Framework for Key Software Engineering Testing Concepts |
Roggio, Gordon, Comer
|
2012 | View | A Quantitative Analysis of Computing Jobs in 2012 |
Robin, Roggio
|
2022 | View | Decision-Making Tool for Procurement for Brazilian Airlines |
Torres, Halawi, Rojas, Bico, Marinho
|
2008 | View | A STUDY OF THE INFORMATION TECHNOLOGY TRADE BETWEEN THE UNITED STATES AND ASIA PACIFIC ECONOMIES COOPERATION NATIONS |
Roman, Blakely, Koong, Liu
|
2013 | View | The De-Escalation of the DHS HSIN Next Gen Project |
Rosenhauer, Korzaan
|
2011 | View | Talk to Text: Changing Communication Patterns |
Pinchot, Douglas, Paullet, Rota
|
2010 | View | How Mobile Technology is Changing Our Culture |
Pinchot, Paullet, Rota
|
2021 | View | Harvesting Intrinsically Verifiable Trust to Build a Honey Traceability System for Sustainable Development |
Runzel, Hassler, Hadley, Ratcliffe, Wilkes, Cazier
|
2018 | View | Standardizing Public Utility Data: A Case Study of a Rural Mid-Size Utility |
Hassler, Cazier, Russell, Mueller, Paprocki
|
2016 | View | Identifying the Critical Success Factors for Information Systems to Manage Sponsored Research Activities at Institutions of Higher Education |
Lehman, Ruzich
|
2020 | View | Internet of Things (IoT): An Analysis of the Research |
Jourdan, Corley, Ryan, Anderson
|
2009 | View | Component-Based Software Development: Life Cycles and Design Science-Based Recommendations |
Sharp, Ryan
|