Search by Authors

Search returned 110 items for : S


Conf YearArticleTitleAuthors
2008ViewAn Information Technology Project Funding Process Kline, Renninger, Guinn, Sackley, Scott
2008ViewA Study of the Information Technology Trade between The United States and the Dominican Republic-Central America Free Trade Agreement Nations Pena, Aguirre, Saenz, Koong, Liu
2008ViewA STUDY OF THE INFORMATION TECHNOLOGY TRADE BETWEEN UNITED STATES AND THE SOUTHERN AFRICAN CUSTOM UNION Saenz, Flores, Koong, Liu
2009ViewA Conceptual Model of Knowledge Elicitation Sagheb-Tehrani
2009ViewSome Observations on the Occurrences of Phishing Lara, Rios, Salazar, Koong, Liu
2022ViewExploring Methods Cybersecurity Managers Need to Implement to Minimize Cyber-Frauds in Mobile Money Services in Ghana Sambasivam, Siaw Afriyie
2022ViewExploring the Strategic Cybersecurity Defense Information Technology Managers Can Implement to Reduce Healthcare Data Breaches Mawel, Sambasivam
2022ViewMeasuring Analytics Maturity and Culture: The LDIS+™ Analytics Impact Framework Fowler, Sambasivam
2021View Examining Cloud Data Security Vulnerabilities During Usage Sambasivam, Amoah
2021ViewSecurity Control Techniques: Cybersecurity & Medical Wearable Devices Sambasivam, Deal
2020ViewA Comparative Study on Information Technology (IT) Infrastructure and Disaster Recovery Methodology Sambasivam, Brown Jr
2019ViewA Comparative Study on Common Errors in Rules Governing Complex Event Processing Systems Dennis, Sambasivam
2019ViewExploring Strategies Computer Science Educators need to use to Prepare Machine-Learning Datasets for Predicting Dropout Rates in MOOCs Nafed, Lotfy, Sambasivam
2019ViewStrategies Needed by Social Network Builders to Develop Information Privacy Azzouz, Sambasivam
2015ViewVariation in Best-Case and Worst-Case Performance for Sorting Algorithms McMaster, Sambasivam, Rague, Wolthuis
2014ViewMeasuring Algorithm Performance With Java: Patterns of Variation McMaster, Sambasivam, Wolthuis
2010ViewNATIS: Novel Architecture Framework for Sambasivam, Liang, Liao
2008ViewFormal Information Security Standards in Medium Enterprises Sambasivam, Kluge
2020ViewAgile Project Management: Project managers' perspective Sanchez-Morcilio, Quiles-Torres, Aparicio-Carrasco
2021ViewEffect of Normalization on TOPSIS and Fuzzy TOPSIS Sarraf, McGuire
2015ViewGovernance of Outsourcing: Building a Better Relationship Babin, Saunderson
2009ViewSpatial Interpolation for a Wireless Sensor Network of Chemical Point Detectors: Preliminary Results Schafer, Hammell II
2009ViewThe Two Leading Freeware Image Editing Applications – An Overview, Comparative Evaluation and Guide for the IS Community Scher
2009ViewAnalyzing Community Websites: A Main Street Perspective Schoenacher
2018ViewEvaluation of Google Vision API for Object Detection in General Subject Images Schultz, Adams
2011ViewStudy of User Behavior in Image Retrieval and Implications for Content Versus Concept Based Access Schultz
2018ViewERP Rigidity and the Cloud Computing Effect Revenaugh, Schweigert
2022ViewDeveloping a Data-Driven Emerging Skill Network Analytics Framework for Automated Employment Advert Evaluation Liu, Schwieger
2021ViewAn Initial Exploration of Multi-Node Open Cloud Infrastructure Testbed Liu, Lui, Li, Embuldeniya, Garcia, McAllister, Schwieger
2012ViewReadiness for Transitioning to ICD-10 Coding: Litton, Humphrey, Schwieger
2010ViewDevelopment of an Evaluation Model for XBRL-enabled Tools Intended for Investors Clements, Schwieger, Surendran
2009ViewThe Impact of Electronic Data Interchange Information Technology on External Auditors Ricks, Schwieger, Henry, Almohsen
2017ViewStudent Intentions and Behaviors Related to Email Security: An Application of the Health Belief Model Schymik, Du
2016ViewA Simulation Modeling Approach to Improve JIT Implementation in a Highly Dynamic Manufacturing Environment Wray, Scott
2008ViewAn Information Technology Project Funding Process Kline, Renninger, Guinn, Sackley, Scott
2019ViewAn Empirical Study of Post-Production Software Code Quality When Employing the Agile Rapid Delivery Methodology Poe, Seeman
2013ViewInformation Security in Nonprofits: A First Glance at the State of Security in Two Illinois Regions Imboden, Phillips, Seib, Fiorentino
2020ViewExploring Sentiment Towards Contact Tracing Crable, Sena
2015ViewExploring Relationships between the Strategic Importance of IT and the Effectiveness of IT Security and Mobile Device Management Stanko, Sena, Sena
2015ViewExploring Relationships between the Strategic Importance of IT and the Effectiveness of IT Security and Mobile Device Management Stanko, Sena, Sena
2013ViewMicrosoft vs Apple: Which is Great by Choice? Sena, Olsen
2010ViewMake or Buy: A comparative assessment of organizations that develop software internally versus those that purchase software Sena, Sena
2010ViewMake or Buy: A comparative assessment of organizations that develop software internally versus those that purchase software Sena, Sena
2021ViewThe COVID Effect: Information Technology Jobs in the Pandemic Sendall, Peslak, Ceccucci, Hunsinger
2020ViewJob and Career Satisfaction of Software Engineers Peslak, Ceccucci, Sendall
2016ViewA Comprehensive Current Review of Text Messaging Usage Peslak, Ceccucci, Hunsinger, Kruck, Sendall
2012ViewAnalysis of the Variables That Affect Frequency of Use and Time Spent on Social Networking Peslak, Sendall, Ceccucci
2010ViewAn Empirical Study of Social Networking Behavior Using Diffusion of Innovation Theory Ceccucci, Peslak, Sendall
2009ViewAn Empirical Study of Text Messaging Peslak, Ceccucci, Sendall
2008ViewAn Empirical Study of Instant Messaging Behavior Using Diffusion of Innovation Theory Peslak, Ceccucci, Sendall
2011ViewSocial Networking Systems and Campus Life Sgambato, Petkov, Wolf
2019ViewEvaluating Evasion Attack Methods on Binary Network Traffic Classifiers Shah, Gaston, Harvey, McNamara, Ramos, You, Alhajjar
2016ViewAnalysis of the Risks of NFC Mobile Payment Systems Kakish, Shah
2011ViewThe Era of Digital Activism Sivitanides, Shah
2008ViewTest Driven Development in the .Net Framework Lee, Mehta, Shah
2016ViewFinding the “Radicalness” in Radical Innovation Adoption Sharma, Thomas, Konsynski
2013ViewLooking Backwards to Look Ahead: Lessons from Barcode Adoption for RFID Adoption and Implementation Sharma, Thomas
2012ViewThe Adoption of Green IT/IS: Sharma
2011ViewSemiotics as a Theoretical Foundation of Information Design Sharp
2009ViewComponent-Based Software Development: Life Cycles and Design Science-Based Recommendations Sharp, Ryan
2013ViewRisk Assessment & Management in Merchant Capture Systems: A Threat Analysis Perspective Streff, Shrestha, Delzer
2022ViewExploring Methods Cybersecurity Managers Need to Implement to Minimize Cyber-Frauds in Mobile Money Services in Ghana Sambasivam, Siaw Afriyie
2017ViewMinimalism in Data Visualization: Perceptions of Beauty, Clarity, Effectiveness, and Simplicity Hill, Wray, Sibona
2016ViewCrowdsourcing Surveys: Alternative Approaches to Survey Collection Cummings, Sibona
2014ViewAre College Home Pages More Accessible? A Longitudinal Study of the Accessibility of United States College Home Pages Siegfried, Featherston
2013ViewDoes File Sharing Lead to Legal Sales? Student Attitudes on Music Piracy Siegfried
2008ViewThe Accessibility of College and University Home Pages in the State of New York DiLallo, Siegfried
2017ViewDoes Your Beer Taste Like Big Data? Sirinanda, Ariyachandra, Frolick
2011ViewThe Era of Digital Activism Sivitanides, Shah
2022ViewMeasurement, reporting, and monitoring organizational security governance: A qualitative analysis of security professionals’ experiences Slonka, Mishra, Draus, Bromall
2019ViewAddressing issues with EMR resulting in workarounds: An exploratory study Mishra, Slonka, Draus, Bromall, Slonka
2019ViewAddressing issues with EMR resulting in workarounds: An exploratory study Mishra, Slonka, Draus, Bromall, Slonka
2020ViewCase Study of Blockchain Applications in Supply Chain Management- Opportunities and Challenges Smith, Xiong, Medlin
2019ViewDeveloping a GIS Dashboard Tool to Inform Non-Profit Hospitals of Community Health Needs at the Neighborhood Level Copello, Smith, Mease, Umapathy, Richard, Knight, Albertie, Hamadi, Spaulding, Apatu
2019ViewThe Use of Tainted Flows in Network Compression for Distributed Network Intrusion Detection Smith, Hammell II
2018ViewThe use of Snap Length in Lossy Network Traffic Compression for Network Intrusion Detection Applications Smith, Hammell II
2016ViewProposal for Kelly Criterion-Inspired Lossy Network Compression for Network Intrusion Applications Smith, Hammell II
2012ViewEthical Data Mining: An Obstacle or Opportunity for Loyalty Programs Smith, Burns
2017ViewGeolocation Tracking and Privacy Issues Associated with the Uber Mobile Application Hayes, Snow, Altuwayjiri
2015ViewLeakage of Geolocation Data by Mobile Ad Networks Snow, Hayes, Dwyer
2016ViewEvidence of Wikipedia usage during the school year: A numerical study Snyder
2012ViewUsing the Layered Model to Understand Employee Selection of Information and Communication Channels for Information and Knowledge Sharing in Project Teams Lee-Partridge, Snyder
2008ViewPlanning and Implementation of an ERP system in a University in USA: Some Insights and Guidelines Somarajan, Weber, Surendran
2019ViewDetection and Analysis of Hard Landing and Near Miss based on Cessna 172G Flight Data and Utilization of Flight Data Monitoring Sorab
2015ViewCase Study: Can Interpersonal-Cultural Communication Sustain Another Innovation? Spangler , Breese, Borkovich
2019ViewDeveloping a GIS Dashboard Tool to Inform Non-Profit Hospitals of Community Health Needs at the Neighborhood Level Copello, Smith, Mease, Umapathy, Richard, Knight, Albertie, Hamadi, Spaulding, Apatu
2018ViewDelineating Legacy System IT Artifacts – Applying a Systems Thinking-based Framework Stachofsky
2015ViewExploring Relationships between the Strategic Importance of IT and the Effectiveness of IT Security and Mobile Device Management Stanko, Sena, Sena
2009ViewCan Management Predict Information Security Threats by Utilizing a Data Warehouse? Kim, Steen
2009ViewEthic and Moral Implications of Affective Computing Steen
2013ViewFeasibility of a Platform-as-a-Service Implementation using Cloud Computing for a Global Service Organization Gai, Steenkamp
2011ViewAn Approach for Developing Business Architecture, an Essential Enabler for Business and IT Alignment Li, Steenkamp
2009ViewBusiness Requirements Knowledge Management Ontology to Support a Software Deployment Process Steenkamp, Alomari
2022ViewClassification of Wolf Subjects Based on Hunting-Stressed Physiological Effects Using Support Vector Machines (SVM) Stewart, Davis
2021ViewUsing Physiological Effects and K-Nearest Neighbor to Identify Membership in Hunting-Stressed Wolf Populations Stewart, Davis, Igoche
2021ViewCybersecurity Maturity Model Certification Initial Impact on the Defense Industrial Base Strohmier, Stoker, Vanajakumari, Clark, Cummings, Modaresnezhad
2021ViewSome Analysis of Common Vulnerabilities and Exposures (CVE) Data from the National Vulnerability Database (NVD) Glyder, Stoker, Threatt, Franks, Adams
2020ViewLeader-Driven Supply Chain Cybersecurity Framework Vanajakumari, Mittal, Stoker, Clark, Miller
2013ViewCreating A Semantic Differential Scale For Measuring Users’ Perception and Attitude To Emerging Technologies Ajani, Stork
2017ViewIT Audit Literature: A Future-Looking Research Agenda Klinkenborg, Streff, Nzailu
2013ViewRisk Assessment & Management in Merchant Capture Systems: A Threat Analysis Perspective Streff, Shrestha, Delzer
2008ViewAn Examination of Information Security in Mobile Banking Architectures Streff, Haar
2021ViewCybersecurity Maturity Model Certification Initial Impact on the Defense Industrial Base Strohmier, Stoker, Vanajakumari, Clark, Cummings, Modaresnezhad
2021ViewBarriers and Drivers to Adoption of Electronic Health Record Systems Du, Sturgill
2016ViewE-commerce Adoption: A Revelatory Case Study in the German Oncology Pharmaceutical Supply Chain Sultanow, Chircu, Chircu
2013ViewOnline versus In-Store: Price Differentiation for Multi-Channel Retailers Flores, Sun
2012ViewCreating an Audio Conferencing Application Sun, Vetter, Reinicke
2012ViewGlobal Diffusion of Virtual Social Networks: A Pyramid Model Wang, Sun
2010ViewDevelopment of an Evaluation Model for XBRL-enabled Tools Intended for Investors Clements, Schwieger, Surendran
2008ViewPlanning and Implementation of an ERP system in a University in USA: Some Insights and Guidelines Somarajan, Weber, Surendran