Conf Year | Article | Title | Authors |
2008 | View | An Information Technology Project Funding Process |
Kline, Renninger, Guinn, Sackley, Scott
|
2008 | View | A Study of the Information Technology Trade between The United States and the Dominican Republic-Central America Free Trade Agreement Nations |
Pena, Aguirre, Saenz, Koong, Liu
|
2008 | View | A STUDY OF THE INFORMATION TECHNOLOGY TRADE BETWEEN UNITED STATES AND THE SOUTHERN AFRICAN CUSTOM UNION |
Saenz, Flores, Koong, Liu
|
2009 | View | A Conceptual Model of Knowledge Elicitation |
Sagheb-Tehrani
|
2009 | View | Some Observations on the Occurrences of Phishing |
Lara, Rios, Salazar, Koong, Liu
|
2022 | View | Exploring Methods Cybersecurity Managers Need to Implement to Minimize Cyber-Frauds in Mobile Money Services in Ghana |
Sambasivam, Siaw Afriyie
|
2022 | View | Exploring the Strategic Cybersecurity Defense Information Technology Managers Can Implement to Reduce Healthcare Data Breaches |
Mawel, Sambasivam
|
2022 | View | Measuring Analytics Maturity and Culture: The LDIS+™ Analytics Impact Framework |
Fowler, Sambasivam
|
2021 | View | Examining Cloud Data Security
Vulnerabilities During Usage |
Sambasivam, Amoah
|
2021 | View | Security Control Techniques: Cybersecurity & Medical Wearable Devices |
Sambasivam, Deal
|
2020 | View | A Comparative Study on Information Technology (IT) Infrastructure and Disaster Recovery Methodology |
Sambasivam, Brown Jr
|
2019 | View | A Comparative Study on Common Errors in Rules Governing Complex Event Processing Systems |
Dennis, Sambasivam
|
2019 | View | Exploring Strategies Computer Science Educators need to use to Prepare Machine-Learning Datasets for Predicting Dropout Rates in MOOCs |
Nafed, Lotfy, Sambasivam
|
2019 | View | Strategies Needed by Social Network Builders to Develop Information Privacy |
Azzouz, Sambasivam
|
2015 | View | Variation in Best-Case and Worst-Case Performance for Sorting Algorithms |
McMaster, Sambasivam, Rague, Wolthuis
|
2014 | View | Measuring Algorithm Performance With Java: Patterns of Variation |
McMaster, Sambasivam, Wolthuis
|
2010 | View | NATIS: Novel Architecture Framework for |
Sambasivam, Liang, Liao
|
2008 | View | Formal Information Security Standards in Medium Enterprises |
Sambasivam, Kluge
|
2020 | View | Agile Project Management: Project managers' perspective
|
Sanchez-Morcilio, Quiles-Torres, Aparicio-Carrasco
|
2021 | View | Effect of Normalization on TOPSIS and Fuzzy TOPSIS |
Sarraf, McGuire
|
2015 | View | Governance of Outsourcing: Building a Better Relationship |
Babin, Saunderson
|
2009 | View | Spatial Interpolation for a Wireless Sensor Network of Chemical Point Detectors: Preliminary Results |
Schafer, Hammell II
|
2009 | View | The Two Leading Freeware Image Editing Applications – An Overview, Comparative Evaluation and Guide for the IS Community |
Scher
|
2009 | View | Analyzing Community Websites: A Main Street Perspective |
Schoenacher
|
2018 | View | Evaluation of Google Vision API for Object Detection in General Subject Images |
Schultz, Adams
|
2011 | View | Study of User Behavior in Image Retrieval and Implications for Content Versus Concept Based Access |
Schultz
|
2018 | View | ERP Rigidity and the Cloud Computing Effect |
Revenaugh, Schweigert
|
2022 | View | Developing a Data-Driven Emerging Skill Network Analytics Framework for Automated Employment Advert Evaluation |
Liu, Schwieger
|
2021 | View | An Initial Exploration of Multi-Node Open Cloud Infrastructure Testbed |
Liu, Lui, Li, Embuldeniya, Garcia, McAllister, Schwieger
|
2012 | View | Readiness for Transitioning to ICD-10 Coding: |
Litton, Humphrey, Schwieger
|
2010 | View | Development of an Evaluation Model for XBRL-enabled Tools Intended for Investors |
Clements, Schwieger, Surendran
|
2009 | View | The Impact of Electronic Data Interchange Information Technology on External Auditors |
Ricks, Schwieger, Henry, Almohsen
|
2017 | View | Student Intentions and Behaviors Related to Email Security: An Application of the Health Belief Model |
Schymik, Du
|
2016 | View | A Simulation Modeling Approach to Improve JIT Implementation in a Highly Dynamic Manufacturing Environment |
Wray, Scott
|
2008 | View | An Information Technology Project Funding Process |
Kline, Renninger, Guinn, Sackley, Scott
|
2019 | View | An Empirical Study of Post-Production Software Code Quality When Employing the Agile Rapid Delivery Methodology |
Poe, Seeman
|
2013 | View | Information Security in Nonprofits: A First Glance at the State of Security in Two Illinois Regions |
Imboden, Phillips, Seib, Fiorentino
|
2020 | View | Exploring Sentiment Towards Contact Tracing |
Crable, Sena
|
2015 | View | Exploring Relationships between the Strategic Importance of IT and the Effectiveness of IT Security and Mobile Device Management |
Stanko, Sena, Sena
|
2015 | View | Exploring Relationships between the Strategic Importance of IT and the Effectiveness of IT Security and Mobile Device Management |
Stanko, Sena, Sena
|
2013 | View | Microsoft vs Apple: Which is Great by Choice? |
Sena, Olsen
|
2010 | View | Make or Buy: A comparative assessment of organizations that develop software internally versus those that purchase software |
Sena, Sena
|
2010 | View | Make or Buy: A comparative assessment of organizations that develop software internally versus those that purchase software |
Sena, Sena
|
2021 | View | The COVID Effect: Information Technology Jobs in the Pandemic |
Sendall, Peslak, Ceccucci, Hunsinger
|
2020 | View | Job and Career Satisfaction of Software Engineers |
Peslak, Ceccucci, Sendall
|
2016 | View | A Comprehensive Current Review of Text Messaging Usage |
Peslak, Ceccucci, Hunsinger, Kruck, Sendall
|
2012 | View | Analysis of the Variables That Affect Frequency of Use and Time Spent on Social Networking |
Peslak, Sendall, Ceccucci
|
2010 | View | An Empirical Study of Social Networking Behavior Using Diffusion of Innovation Theory |
Ceccucci, Peslak, Sendall
|
2009 | View | An Empirical Study of Text Messaging |
Peslak, Ceccucci, Sendall
|
2008 | View | An Empirical Study of Instant Messaging Behavior Using Diffusion of Innovation Theory |
Peslak, Ceccucci, Sendall
|
2011 | View | Social Networking Systems and Campus Life |
Sgambato, Petkov, Wolf
|
2019 | View | Evaluating Evasion Attack Methods on Binary
Network Traffic Classifiers |
Shah, Gaston, Harvey, McNamara, Ramos, You, Alhajjar
|
2016 | View | Analysis of the Risks of NFC Mobile Payment Systems |
Kakish, Shah
|
2011 | View | The Era of Digital Activism |
Sivitanides, Shah
|
2008 | View | Test Driven Development in the .Net Framework |
Lee, Mehta, Shah
|
2016 | View | Finding the “Radicalness” in Radical Innovation Adoption |
Sharma, Thomas, Konsynski
|
2013 | View | Looking Backwards to Look Ahead: Lessons from Barcode Adoption for RFID Adoption and Implementation |
Sharma, Thomas
|
2012 | View | The Adoption of Green IT/IS: |
Sharma
|
2011 | View | Semiotics as a Theoretical Foundation of Information Design |
Sharp
|
2009 | View | Component-Based Software Development: Life Cycles and Design Science-Based Recommendations |
Sharp, Ryan
|
2013 | View | Risk Assessment & Management in Merchant Capture Systems: A Threat Analysis Perspective |
Streff, Shrestha, Delzer
|
2022 | View | Exploring Methods Cybersecurity Managers Need to Implement to Minimize Cyber-Frauds in Mobile Money Services in Ghana |
Sambasivam, Siaw Afriyie
|
2017 | View | Minimalism in Data Visualization: Perceptions of Beauty, Clarity, Effectiveness, and Simplicity |
Hill, Wray, Sibona
|
2016 | View | Crowdsourcing Surveys: Alternative Approaches to Survey Collection |
Cummings, Sibona
|
2014 | View | Are College Home Pages More Accessible? A Longitudinal Study of the Accessibility of United States College Home Pages |
Siegfried, Featherston
|
2013 | View | Does File Sharing Lead to Legal Sales? Student Attitudes on Music Piracy |
Siegfried
|
2008 | View | The Accessibility of College and University Home Pages in the State of New York |
DiLallo, Siegfried
|
2017 | View | Does Your Beer Taste Like Big Data? |
Sirinanda, Ariyachandra, Frolick
|
2011 | View | The Era of Digital Activism |
Sivitanides, Shah
|
2022 | View | Measurement, reporting, and monitoring organizational security governance: A qualitative analysis of security professionals’ experiences |
Slonka, Mishra, Draus, Bromall
|
2019 | View | Addressing issues with EMR resulting in workarounds: An exploratory study
|
Mishra, Slonka, Draus, Bromall, Slonka
|
2019 | View | Addressing issues with EMR resulting in workarounds: An exploratory study
|
Mishra, Slonka, Draus, Bromall, Slonka
|
2020 | View | Case Study of Blockchain Applications in Supply Chain Management- Opportunities and Challenges |
Smith, Xiong, Medlin
|
2019 | View | Developing a GIS Dashboard Tool to Inform Non-Profit Hospitals of Community Health Needs at the Neighborhood Level |
Copello, Smith, Mease, Umapathy, Richard, Knight, Albertie, Hamadi, Spaulding, Apatu
|
2019 | View | The Use of Tainted Flows in Network Compression for Distributed Network Intrusion Detection |
Smith, Hammell II
|
2018 | View | The use of Snap Length in Lossy Network Traffic Compression for Network Intrusion Detection Applications |
Smith, Hammell II
|
2016 | View | Proposal for Kelly Criterion-Inspired Lossy Network Compression for Network Intrusion Applications |
Smith, Hammell II
|
2012 | View | Ethical Data Mining: An Obstacle or Opportunity for Loyalty Programs |
Smith, Burns
|
2017 | View | Geolocation Tracking and Privacy Issues Associated with the Uber Mobile Application |
Hayes, Snow, Altuwayjiri
|
2015 | View | Leakage of Geolocation Data by Mobile Ad Networks |
Snow, Hayes, Dwyer
|
2016 | View | Evidence of Wikipedia usage during the school year: A numerical study |
Snyder
|
2012 | View | Using the Layered Model to Understand Employee Selection of Information and Communication Channels for Information and Knowledge Sharing in Project Teams |
Lee-Partridge, Snyder
|
2008 | View | Planning and Implementation of an ERP system in a University in USA: Some Insights and Guidelines |
Somarajan, Weber, Surendran
|
2019 | View | Detection and Analysis of Hard Landing and Near Miss based on Cessna 172G Flight Data and Utilization of Flight Data Monitoring |
Sorab
|
2015 | View | Case Study: Can Interpersonal-Cultural Communication Sustain Another Innovation? |
Spangler , Breese, Borkovich
|
2019 | View | Developing a GIS Dashboard Tool to Inform Non-Profit Hospitals of Community Health Needs at the Neighborhood Level |
Copello, Smith, Mease, Umapathy, Richard, Knight, Albertie, Hamadi, Spaulding, Apatu
|
2018 | View | Delineating Legacy System IT Artifacts – Applying a Systems Thinking-based Framework |
Stachofsky
|
2015 | View | Exploring Relationships between the Strategic Importance of IT and the Effectiveness of IT Security and Mobile Device Management |
Stanko, Sena, Sena
|
2009 | View | Can Management Predict Information Security Threats by Utilizing a Data Warehouse? |
Kim, Steen
|
2009 | View | Ethic and Moral Implications of Affective Computing |
Steen
|
2013 | View | Feasibility of a Platform-as-a-Service Implementation using Cloud Computing for a Global Service Organization |
Gai, Steenkamp
|
2011 | View | An Approach for Developing Business Architecture, an Essential Enabler for Business and IT Alignment |
Li, Steenkamp
|
2009 | View | Business Requirements Knowledge Management Ontology to Support a Software Deployment Process |
Steenkamp, Alomari
|
2022 | View | Classification of Wolf Subjects Based on Hunting-Stressed Physiological Effects Using Support Vector Machines (SVM) |
Stewart, Davis
|
2021 | View | Using Physiological Effects and K-Nearest Neighbor
to Identify Membership in Hunting-Stressed Wolf Populations
|
Stewart, Davis, Igoche
|
2021 | View | Cybersecurity Maturity Model Certification Initial Impact on the Defense Industrial Base
|
Strohmier, Stoker, Vanajakumari, Clark, Cummings, Modaresnezhad
|
2021 | View | Some Analysis of Common Vulnerabilities and Exposures (CVE) Data from the National Vulnerability Database (NVD) |
Glyder, Stoker, Threatt, Franks, Adams
|
2020 | View | Leader-Driven Supply Chain Cybersecurity Framework |
Vanajakumari, Mittal, Stoker, Clark, Miller
|
2013 | View | Creating A Semantic Differential Scale For Measuring Users’ Perception and Attitude To Emerging Technologies |
Ajani, Stork
|
2017 | View | IT Audit Literature: A Future-Looking Research Agenda
|
Klinkenborg, Streff, Nzailu
|
2013 | View | Risk Assessment & Management in Merchant Capture Systems: A Threat Analysis Perspective |
Streff, Shrestha, Delzer
|
2008 | View | An Examination of Information Security in Mobile Banking Architectures |
Streff, Haar
|
2021 | View | Cybersecurity Maturity Model Certification Initial Impact on the Defense Industrial Base
|
Strohmier, Stoker, Vanajakumari, Clark, Cummings, Modaresnezhad
|
2021 | View | Barriers and Drivers to Adoption of Electronic Health Record Systems |
Du, Sturgill
|
2016 | View | E-commerce Adoption: A Revelatory Case Study in the German Oncology Pharmaceutical Supply Chain |
Sultanow, Chircu, Chircu
|
2013 | View | Online versus In-Store: Price Differentiation for Multi-Channel Retailers |
Flores, Sun
|
2012 | View | Creating an Audio Conferencing Application |
Sun, Vetter, Reinicke
|
2012 | View | Global Diffusion of Virtual Social Networks: A Pyramid Model |
Wang, Sun
|
2010 | View | Development of an Evaluation Model for XBRL-enabled Tools Intended for Investors |
Clements, Schwieger, Surendran
|
2008 | View | Planning and Implementation of an ERP system in a University in USA: Some Insights and Guidelines |
Somarajan, Weber, Surendran
|