Search by Authors

Search returned 43 items for : R


Conf YearArticleTitleAuthors
2011ViewPay-What-You-Want Pricing for Mobile Applications: The Effect of Privacy Assurances and Social Information Racherla, Keith, Babb
2015ViewVariation in Best-Case and Worst-Case Performance for Sorting Algorithms McMaster, Sambasivam, Rague, Wolthuis
2009ViewSome Observations on the Occurrences of Data Breaches Guerra, Joseph, Ramirez, Koong, Liu
2019ViewEvaluating Evasion Attack Methods on Binary Network Traffic Classifiers Shah, Gaston, Harvey, McNamara, Ramos, You, Alhajjar
2014ViewReview of Web Service Specifications for Long-running Conversations Rana, Umapathy
2021ViewHarvesting Intrinsically Verifiable Trust to Build a Honey Traceability System for Sustainable Development Runzel, Hassler, Hadley, Ratcliffe, Wilkes, Cazier
2009ViewTowards an Abstract Model for Mhlanga, Vardiman, Reames
2020ViewAn International Review and Study on Perceptions of Security, Adoption, and Implementation of Electronic Health Records Aliyu, Wimmer, Powell, Rebman Jr.
2019ViewAn Exploratory Study of the Perceptions of Library Faculty and Patrons on Library Resources Herman, Wimmer, Rebman Jr.
2018ViewUsing Twitter Sentiment Analysis to Analyze Self-Sentiment of the POTUS White, Wimmer, Rebman Jr., Nwankwo
2015ViewInformation Technology in Patient Care: Challenges of using IT in Small Ambulatory Healthcare Organizations. Reddy
2014ViewCyber Security Best Practices: What to do? Kleinberg, Reinicke, Cummings
2013ViewCan Social Media aid Software Development? Reinicke, Cummings
2012ViewCreating an Audio Conferencing Application Sun, Vetter, Reinicke
2012ViewThe Impact of Regulatory Changes on IS Strategy: An Exploratory Study Reinicke, Ward
2010ViewCreating a Framework for Research on Virtual Organizations Reinicke
2009ViewVirtual Organizations: A Definitional Framework Reinicke
2017ViewA Business Multi-Case Study of Change Management in Software Implementation Holtel, Paddock, Reiter, Riley, Havelka
2008ViewAn Information Technology Project Funding Process Kline, Renninger, Guinn, Sackley, Scott
2018ViewERP Rigidity and the Cloud Computing Effect Revenaugh, Schweigert
2019ViewDeveloping a GIS Dashboard Tool to Inform Non-Profit Hospitals of Community Health Needs at the Neighborhood Level Copello, Smith, Mease, Umapathy, Richard, Knight, Albertie, Hamadi, Spaulding, Apatu
2009ViewThe Impact of Electronic Data Interchange Information Technology on External Auditors Ricks, Schwieger, Henry, Almohsen
2017ViewA Business Multi-Case Study of Change Management in Software Implementation Holtel, Paddock, Reiter, Riley, Havelka
2009ViewSome Observations on the Occurrences of Phishing Lara, Rios, Salazar, Koong, Liu
2009ViewFactors that Persuade and Deter Membership in Professional Computing Associations Umapathy, Jamba, Ritzhaupt
2008ViewComputing Professional Association Membership: An Exploration of Membership Needs and Motivations Ritzhaupt, Umapathy, Jamba
2016ViewCauses of cyberbullying in multi-player online gaming environments: Gamer perceptions Cotler, Fryling, Rivituso
2014ViewCyberbullying or normal game play? Impact of age, gender, and experience on cyberbullying in multi-player online gaming environments: Perceptions from one gaming forum Fryling, Cotler, Rivituso, Mathews, Pratico
2012ViewA Quantitative Analysis of Computing Jobs in 2012 Robin, Roggio
2009ViewSuperfund Site Analysis Using Web 2.0 Technologies Anderson, Jafar, Rogers
2013ViewA Comparison of Software Testing Using the Object-Oriented Paradigm and Traditional Testing Gordon, Roggio
2013ViewTaxonomy of Common Software Testing Terminology: Framework for Key Software Engineering Testing Concepts Roggio, Gordon, Comer
2012ViewA Quantitative Analysis of Computing Jobs in 2012 Robin, Roggio
2022ViewDecision-Making Tool for Procurement for Brazilian Airlines Torres, Halawi, Rojas, Bico, Marinho
2008ViewA STUDY OF THE INFORMATION TECHNOLOGY TRADE BETWEEN THE UNITED STATES AND ASIA PACIFIC ECONOMIES COOPERATION NATIONS Roman, Blakely, Koong, Liu
2013ViewThe De-Escalation of the DHS HSIN Next Gen Project Rosenhauer, Korzaan
2011ViewTalk to Text: Changing Communication Patterns Pinchot, Douglas, Paullet, Rota
2010ViewHow Mobile Technology is Changing Our Culture Pinchot, Paullet, Rota
2021ViewHarvesting Intrinsically Verifiable Trust to Build a Honey Traceability System for Sustainable Development Runzel, Hassler, Hadley, Ratcliffe, Wilkes, Cazier
2018ViewStandardizing Public Utility Data: A Case Study of a Rural Mid-Size Utility Hassler, Cazier, Russell, Mueller, Paprocki
2016ViewIdentifying the Critical Success Factors for Information Systems to Manage Sponsored Research Activities at Institutions of Higher Education Lehman, Ruzich
2020ViewInternet of Things (IoT): An Analysis of the Research Jourdan, Corley, Ryan, Anderson
2009ViewComponent-Based Software Development: Life Cycles and Design Science-Based Recommendations Sharp, Ryan