Search by Institutions

Search returned 776 items for : X


InstitutionConf YearArticleTitleAuthors
Xavier University2022ViewA Predictive Unmanned Aerial Vehicle Maintenance Method: Using Low-Code and Cloud-Based Data Visualization Kim, Chung, Ju, Maeng
Xavier University2022ViewA Serverless Real-Time Data Streaming Architecture for Synchronous Online Math Competition Liu, Chung
Xavier University2022ViewAn Exploration of the Benefits of Certifications and their Relationship to Salaries in IS/IT Matthews, Cummings, Janicki
Xavier University2022ViewAre Companies Responsible for Internet of Things (IoT) Data Privacy? A Survey of IoT User Perceptions Paullet, Pinchot, Chawdhry
Xavier University2022ViewBig Data Analytics in Supply Chain Management: A Review and Recommendations Ouyang, Hwang, Cham, Chen
Xavier University2022ViewChildren's Privacy: An Evaluation of EdTech Privacy Policies West
Xavier University2022ViewClassification of Wolf Subjects Based on Hunting-Stressed Physiological Effects Using Support Vector Machines (SVM) Stewart, Davis
Xavier University2022ViewConvolutional Neural Network Binary Image Classifier via Mobile Devices: EZ Autism Screener Ata, Chung, Maeng
Xavier University2022ViewData Analytics for Societal Challenges: Understanding Student Participation in the National School Lunch Program Northey, Desai
Xavier University2022ViewDecision-Making Tool for Procurement for Brazilian Airlines Torres, Halawi, Rojas, Bico, Marinho
Xavier University2022ViewDeveloping a Data-Driven Emerging Skill Network Analytics Framework for Automated Employment Advert Evaluation Liu, Schwieger
Xavier University2022ViewExploring Methods Cybersecurity Managers Need to Implement to Minimize Cyber-Frauds in Mobile Money Services in Ghana Sambasivam, Siaw Afriyie
Xavier University2022ViewExploring Short Stay Health Care Quality: Skilled Nursing Facilities during the COVID-19 Era Winston, Xiong, Medlin, Pelaez
Xavier University2022ViewExploring the Strategic Cybersecurity Defense Information Technology Managers Can Implement to Reduce Healthcare Data Breaches Mawel, Sambasivam
Xavier University2022ViewImpact of New Technology Use on Workforce: Exploratory Analysis Toskin
Xavier University2022ViewInfluence of Executive Perception of Role of Information Technology: A financial institution perspective Pandey, Mishra
Xavier University2022ViewMeasurement, reporting, and monitoring organizational security governance: A qualitative analysis of security professionals’ experiences Slonka, Mishra, Draus, Bromall
Xavier University2022ViewMeasuring Analytics Maturity and Culture: The LDIS+™ Analytics Impact Framework Fowler, Sambasivam
Xavier University2022ViewQR Code Hacking – Detecting Multiple Vulnerabilities in Android Scanning Software Homan, Breese
Xavier University2022ViewSmart Homes Privacy Metrics Etezady
Xavier University2022ViewText Prediction Using Artificial Intelligence: An Analysis of Two Text Prediction Systems Wimmer, Du, Heri
Xavier University2022ViewThe Effect of Mental Illness on Compensation for IT Developers Peslak, Ceccucci, Jones, Leonard
Xavier University2022ViewThe Effects of Individual Characteristics and Mastery Goal Orientation on IT Project Continuation Intentions Totty, Zaza, Greer, Korzaan
Xavier University2022ViewThe Importance and Value of Personal Identifying Information: Towards Information Worth Kaleta, Mahadevan, Thackston
Xavier University2022ViewUnderstanding Gen Z’s Switching Intention to E-Commerce Drone Delivery: An Updated Diffusion of Innovation Kaleta, Xie, Chen
Xavier University2022ViewVisual Layering and Visual Clustering – A Model of Graph Complexity for Business Data Chen, Zhang
Xavier University2022ViewVulnerability Assessment for Web Applications Garcia, Abraham, Kepic, Cankaya
Xavier University2021View Selecting Subsets of Amazon Reviews Gokce, Kline, Cummings, Vetter
Xavier University2021View Examining Cloud Data Security Vulnerabilities During Usage Sambasivam, Amoah
Xavier University2021ViewA Cloud-Based System for Scraping Data from Amazon Product Reviews at Scale Woodall, Kline, Vetter, Modaresnezhad
Xavier University2021ViewAn Initial Exploration of Multi-Node Open Cloud Infrastructure Testbed Liu, Lui, Li, Embuldeniya, Garcia, McAllister, Schwieger
Xavier University2021ViewAugmented Reality & Artificial Intelligence Model: Optimizing Workforce Diversity Aimiuwu
Xavier University2021ViewBarriers and Drivers to Adoption of Electronic Health Record Systems Du, Sturgill
Xavier University2021ViewCombating Private Blockchain Fraud: A Virtual Reality & Artificial Intelligence Model Aimiuwu
Xavier University2021ViewCybersecurity Maturity Model Certification Initial Impact on the Defense Industrial Base Strohmier, Stoker, Vanajakumari, Clark, Cummings, Modaresnezhad
Xavier University2021ViewData Sharing and Exposure: Findings from Descriptive and Network Analysis of Instant Games on Facebook Nicholson, Chakraborty, Ali-Gombe, Hammell II
Xavier University2021ViewDecreasing the Barrier to Entry for an Open-Source Full-Stack Web Development Ngo, Chung, Chang
Xavier University2021ViewEffect of Normalization on TOPSIS and Fuzzy TOPSIS Sarraf, McGuire
Xavier University2021ViewGIS for Democracy: Toward A Solution Against Gerrymandering Wu, Igoche
Xavier University2021ViewHarvesting Intrinsically Verifiable Trust to Build a Honey Traceability System for Sustainable Development Runzel, Hassler, Hadley, Ratcliffe, Wilkes, Cazier
Xavier University2021ViewImpact of Review Valence and Perceived Uncertainty on Purchase of Time-Constrained and Discounted Search Goods Muzumdar
Xavier University2021ViewInnovation Attributes as Determinants of the Application of Artificial Intelligence: A Proposed Study Iwuanyanwu, Igoche
Xavier University2021ViewInternationalization and Localization for Web and Mobile Applications Wang, Chung, Yoon
Xavier University2021ViewLow Maintenance, Low Cost, Highly Secure, and Highly Manageable Serverless Solutions for Software Reverse Engineering Nguyen, Chung
Xavier University2021ViewMental Health Call Triage: Coding Systems and Opportunities for Research Hashmi, Thomas, Nandan
Xavier University2021ViewResolving Pressure and Stress on Governance Models from Robotic Process Automation Technologies Money
Xavier University2021ViewSecurity Control Techniques: Cybersecurity & Medical Wearable Devices Sambasivam, Deal
Xavier University2021ViewSome Analysis of Common Vulnerabilities and Exposures (CVE) Data from the National Vulnerability Database (NVD) Glyder, Stoker, Threatt, Franks, Adams
Xavier University2021ViewTargeted Data Visualization and Reporting Approaches for Vulnerability Management at Enterprise Organizations Painter
Xavier University2021ViewThe COVID Effect: Information Technology Jobs in the Pandemic Sendall, Peslak, Ceccucci, Hunsinger
Xavier University2021ViewUsing Analytics to understand Performance and Wellness for a Women’s College Soccer Team Njunge, Witman, Holmberg, Canacoo
Xavier University2021ViewUsing Physiological Effects and K-Nearest Neighbor to Identify Membership in Hunting-Stressed Wolf Populations Stewart, Davis, Igoche
Xavier University2020ViewA Comparative Study on Information Technology (IT) Infrastructure and Disaster Recovery Methodology Sambasivam, Brown Jr
Xavier University2020ViewA Prototype for Distributed Computing Platform using Smartphones Wagner, Cao
Xavier University2020ViewAgile Project Management: Project managers' perspective Sanchez-Morcilio, Quiles-Torres, Aparicio-Carrasco
Xavier University2020ViewAn International Review and Study on Perceptions of Security, Adoption, and Implementation of Electronic Health Records Aliyu, Wimmer, Powell, Rebman Jr.
Xavier University2020ViewAnalysis of Security Features and Vulnerabilities in Public/Open Wi-Fi James
Xavier University2020ViewCase Study of Blockchain Applications in Supply Chain Management- Opportunities and Challenges Smith, Xiong, Medlin
Xavier University2020ViewDecision-Making Model Transparency for SaMD Machine Learning Algorithms Woodside
Xavier University2020ViewDocumenting the Process of Hijacking a Raspberry Pi User Login Credentials via Remote Code Execution Patel, Wimmer, Powell
Xavier University2020ViewDoes the Executive Perception of the Value of Information Technology (IT) Influence the IT strategy? A Case Study Pandey, Mishra
Xavier University2020ViewEnhancing Learning Analytics: The Rise of Institutional Research Perkins, Ariyachandra
Xavier University2020ViewEnterprise Architecture Transformation Process from a Federal Government Perspective Canada, Halawi
Xavier University2020ViewExploring Sentiment Towards Contact Tracing Crable, Sena
Xavier University2020ViewIntegration of Information Systems: Robotic Process Automation Money
Xavier University2020ViewInternet of Things (IoT): An Analysis of the Research Jourdan, Corley, Ryan, Anderson
Xavier University2020ViewInterpreting Organizational Security Governance Objectives for Strategic Security Planning Mishra
Xavier University2020ViewJob and Career Satisfaction of Software Engineers Peslak, Ceccucci, Sendall
Xavier University2020ViewLeader-Driven Supply Chain Cybersecurity Framework Vanajakumari, Mittal, Stoker, Clark, Miller
Xavier University2020ViewOpen Source Software: A Detailed Analysis of Contributions and Quality Peslak, Hunsinger
Xavier University2020ViewPredicting Soil Conditions Using Machine Learning Algorithms Gondi, Hua, Bajracharya
Xavier University2020ViewPrivacy Concerns and Data Sharing Habits of Personal Fitness Information Collected via Activity Trackers Pinchot, Cellante
Xavier University2020ViewSpatial Data Analytics For The Pandemic Wu, Igoche
Xavier University2020ViewThe New Frontier in Home and Commercial Deliveries: Drones Fowler, Vannoy, Eggers, Medlin
Xavier University2020ViewThe Sting of Adoption: The Technology Acceptance Model (TAM) with Actual Usage in a Hazardous Environment Hassler, MacDonald, Cazier, Wilkes
Xavier University2019ViewA Comparative Study on Common Errors in Rules Governing Complex Event Processing Systems Dennis, Sambasivam
Xavier University2019ViewA Longitudinal Study of Google Privacy Policies Peslak, Kovalchick, Conforti
Xavier University2019ViewA Neural Networks Primer For USMA Cadets Alhajjar
Xavier University2019ViewAddressing issues with EMR resulting in workarounds: An exploratory study Mishra, Slonka, Draus, Bromall, Slonka
Xavier University2019ViewAn Empirical Study of Post-Production Software Code Quality When Employing the Agile Rapid Delivery Methodology Poe, Seeman
Xavier University2019ViewAn Exploratory Study of the Perceptions of Library Faculty and Patrons on Library Resources Herman, Wimmer, Rebman Jr.
Xavier University2019ViewAnalyzing Drug Overdoses in a Community Using R Gondi
Xavier University2019ViewBig Data, Algorithmic Classification, and False Positives: Consequences for Information Privacy Lauer
Xavier University2019ViewConceptualization of Blockchain-based Applications: Technical Background and Social Perspective Xiong, Tang, Medlin
Xavier University2019ViewDetection and Analysis of Hard Landing and Near Miss based on Cessna 172G Flight Data and Utilization of Flight Data Monitoring Sorab
Xavier University2019ViewDeveloping a GIS Dashboard Tool to Inform Non-Profit Hospitals of Community Health Needs at the Neighborhood Level Copello, Smith, Mease, Umapathy, Richard, Knight, Albertie, Hamadi, Spaulding, Apatu
Xavier University2019ViewDigital Transformation and Geospatial Analytics Abot, Ariyachandra
Xavier University2019ViewEvaluating Evasion Attack Methods on Binary Network Traffic Classifiers Shah, Gaston, Harvey, McNamara, Ramos, You, Alhajjar
Xavier University2019ViewExamining Organizational Security Governance (OSG) Objectives: How is strategic planning for Security is undertaken at ABC Corporation? Mishra
Xavier University2019ViewExploring Strategies Computer Science Educators need to use to Prepare Machine-Learning Datasets for Predicting Dropout Rates in MOOCs Nafed, Lotfy, Sambasivam
Xavier University2019ViewGame Theory Through Smartphone App Use In Support of For-Hire Transportation Network Companies Pendergrass
Xavier University2019ViewGeographic Information System For and Against Gerrymandering Wu, DePlato, Combs
Xavier University2019ViewImproving Information Security Awareness one Faction at a Time Mutchler
Xavier University2019ViewInfobesity: Do Facebook Users Actually Use Those Bookmarked Posts? Kim
Xavier University2019ViewKnowledge Management System Development Approaches: Evolution or Stagnation? Mew, Money
Xavier University2019ViewLiterary Analysis Tool: Text Analytics for Creative Writers Grimsman, Kline, Vetter, Guinn
Xavier University2019ViewMunging and liking it: wrangling patient time-related data with IPython Kunene
Xavier University2019ViewPrivacy Considerations Throughout the Data Life Cycle Pomykalski
Xavier University2019ViewProject Management Skills Needed for Mobile App Development McCoy
Xavier University2019ViewStrategies Needed by Social Network Builders to Develop Information Privacy Azzouz, Sambasivam
Xavier University2019ViewThe Impact of Analytics Adoption on Team Performance in Professional Sports: A Longitudinal Analysis of the Lag in Observable Results Freeman
Xavier University2019ViewThe Use of Tainted Flows in Network Compression for Distributed Network Intrusion Detection Smith, Hammell II
Xavier University2019ViewTrash to Treasure: Predicting Landfill Gas Flow to Optimize Electricity Generation Hassler, Emery, Hoyle, Cazier
Xavier University2019ViewUnderstanding Campus Crime with a Multi-University Analytics System Iheadindu, Kline, Vetter, Clark
Xavier University2019ViewWeb Designer or Web Developer? A Detailed Comparison of Job Requirements Peslak
Xavier University2019ViewWhich Amazon Reviews Should You Read? Gokce, Kline, Vetter, Cummings
Xavier University2018ViewA Machine Learning Approach to Optimizing Diabetes Healthcare Management Using SAS Analytic Suite Ajani, Habek
Xavier University2018ViewCan Social Media Accounts Have an Impact on Hiring Decisions? Guidelines for Appropriate Use Kim, Homan
Xavier University2018ViewChanges in the Information Technology Field: A Survey of Current Technologies and Future Importance Cummings, Janicki
Xavier University2018ViewCommercial Drone Activity: Security, Privacy, and Legislation Issues Vannoy, Medlin
Xavier University2018ViewDelineating Legacy System IT Artifacts – Applying a Systems Thinking-based Framework Stachofsky
Xavier University2018ViewDriving Distractions and Multi-tasking: An Investigative Study Choi, Xiong, Medlin
Xavier University2018ViewDrone Delivery Services: An Evaluation of Personal Innovativeness, Opinion Passing and Key Information Technology Adoption Factors Chen, Choi, Charoen
Xavier University2018ViewEffects of Normalization Techniques on Logistic Regression in Data Science Adeyemo, Wimmer, Powell
Xavier University2018ViewERP Rigidity and the Cloud Computing Effect Revenaugh, Schweigert
Xavier University2018ViewEvaluation of Google Vision API for Object Detection in General Subject Images Schultz, Adams
Xavier University2018ViewGeospatial Analytics: Why is Geographic Information Systems a Technology Critical to any Organization? Abot, Ariyachandra, Frolick
Xavier University2018ViewImportance of Features in Adversarial Machine Learning for Cyber Security De Lucia, Cotton
Xavier University2018ViewImprove the Loyalty of Mobile Payment Users in China by Increasing the Fit between Skill, Technology and Task Chen, Choi, Xiong, Tang
Xavier University2018ViewPrivacy and Security Issues Associated with Mobile Dating Applications Hayes
Xavier University2018ViewStandardizing Public Utility Data: A Case Study of a Rural Mid-Size Utility Hassler, Cazier, Russell, Mueller, Paprocki
Xavier University2018ViewThe use of Snap Length in Lossy Network Traffic Compression for Network Intrusion Detection Applications Smith, Hammell II
Xavier University2018ViewUnderstanding Cyberstalking through the Analysis of Student's Online Activity Paullet, Chawdhry
Xavier University2018ViewUsing Twitter Sentiment Analysis to Analyze Self-Sentiment of the POTUS White, Wimmer, Rebman Jr., Nwankwo
Xavier University2018ViewWhere We are with Enterprise Architecture Halawi, McCarthy, farah
Xavier University2017ViewA Business Multi-Case Study of Change Management in Software Implementation Holtel, Paddock, Reiter, Riley, Havelka
Xavier University2017ViewA Review of Big Data Predictive Analytics in Information Systems Research Ohiomah, Andreev, Benyoucef
Xavier University2017ViewAggregating Complementary and Contradictory Information for Military Decision Making Etesamipour, Hammell II
Xavier University2017ViewAn Exploratory Analysis of Gender Differences in IT Project Commitment, Continuation, and Escalation Korzaan, Harris, Brooks
Xavier University2017ViewBlockchain Technology: Challenges and Opportunities Modaresnezhad, Cummings
Xavier University2017ViewCloud Computing: Implications for Information Systems Development Service Providers and Practitioners Mew, Money
Xavier University2017ViewDoes Your Beer Taste Like Big Data? Sirinanda, Ariyachandra, Frolick
Xavier University2017ViewExploratory Study of Organizational Adoption of Cloud based Big Data Analytics Ghosh
Xavier University2017ViewFacebook Fanatics: A Linguistic and Sentiment Analysis of the Most “Fanned” Facebook Pages Peslak
Xavier University2017ViewGeolocation Tracking and Privacy Issues Associated with the Uber Mobile Application Hayes, Snow, Altuwayjiri
Xavier University2017ViewInformation Security and Privacy Legislation: Current State and Future Direction Dunlap, Cummings, Janicki
Xavier University2017ViewInformation Sharing Increases Drug Sample Inventory Management Efficiency in Healthcare Clinics: Evidence from a Quasi-Experiment Lang, Chahal
Xavier University2017ViewIT Audit Literature: A Future-Looking Research Agenda Klinkenborg, Streff, Nzailu
Xavier University2017ViewMinimalism in Data Visualization: Perceptions of Beauty, Clarity, Effectiveness, and Simplicity Hill, Wray, Sibona
Xavier University2017ViewMultitasking Behaviors: Distracted Driving Threats Beyond Texting Medlin, Choi, Xiong
Xavier University2017ViewOpen vs. Close Source Decision Tree Algorithms: Comparing Performance Measures of Accuracy, Sensitivity and Specificity Khan, Wimmer, Powell
Xavier University2017ViewPhubbing: Communication in the Attention Economy Pendergrass
Xavier University2017ViewPredictive Models for Apportioning 911 Fund Berghammer, Douglas, Corley, Chen
Xavier University2017ViewProtecting IoT Devices from the Mirai Botnet Frank, Nance, Jarocki, Pauli
Xavier University2017ViewStudent Intentions and Behaviors Related to Email Security: An Application of the Health Belief Model Schymik, Du
Xavier University2017ViewText Messaging Today: A Longitudinal Study of Variables Influencing Text Messaging from 2009 to 2016 Peslak, Hunsinger, Kruck
Xavier University2017ViewTowards a better understanding of the justification of choice of methods to be mixed in the same intervention during Action Design Research Petkov, Petkova
Xavier University2017ViewUsing Systems Analysis and Design to Enhance the Business Understanding Stage in CRISP-DM Pomykalski, Buzydlowski
Xavier University2017ViewWhat’s “Appening” to our Privacy? A Students Perspective on Downloading Mobile Apps Paullet, Chawdhry, Douglas, Compomizzi
Xavier University2016View Location Analysis of Mina Site: One of the Most Crowded Areas at Hajj alluhaidan, Alredhaiman
Xavier University2016View3D Printing: The Future Crime of the Present Fruehauf, Hartle, Al-Khalifa
Xavier University2016ViewA Comprehensive Current Review of Text Messaging Usage Peslak, Ceccucci, Hunsinger, Kruck, Sendall
Xavier University2016ViewA Multi-Criteria Network Assessment Model of IT Offshoring Risks from Service Provider’s Perspective Petkov, Petkova
Xavier University2016ViewA Simulation Modeling Approach to Improve JIT Implementation in a Highly Dynamic Manufacturing Environment Wray, Scott
Xavier University2016ViewAchieving Effective Data Analytics: An Agile Framework Castro, Jain
Xavier University2016ViewAn Empirical Study on the Impact of Price Discount on Sales in Software-as-a-Service (SaaS) Market Choi, Medlin, Hunsinger
Xavier University2016ViewAn Interactive Toolbox for Twitter Content Analytics Jafar, Waldman
Xavier University2016ViewAnalysis of the Risks of NFC Mobile Payment Systems Kakish, Shah
Xavier University2016ViewAre Students Using Security Measures to Protect their Data when Downloading Mobile Applications? Chawdhry, Paullet, Douglas, Compomizzi
Xavier University2016ViewBuilding Client Vendor Alignment Capability in Strategic Information Systems Outsourcing Ghosh
Xavier University2016ViewCauses of cyberbullying in multi-player online gaming environments: Gamer perceptions Cotler, Fryling, Rivituso
Xavier University2016ViewCrowdsourcing Surveys: Alternative Approaches to Survey Collection Cummings, Sibona
Xavier University2016ViewE-commerce Adoption: A Revelatory Case Study in the German Oncology Pharmaceutical Supply Chain Sultanow, Chircu, Chircu
Xavier University2016ViewEvidence of Wikipedia usage during the school year: A numerical study Snyder
Xavier University2016ViewFinding the “Radicalness” in Radical Innovation Adoption Sharma, Thomas, Konsynski
Xavier University2016ViewIdentifying the Critical Success Factors for Information Systems to Manage Sponsored Research Activities at Institutions of Higher Education Lehman, Ruzich
Xavier University2016ViewMalvertising - A Rising Threat To The Online Ecosystem Dwyer, Kanguri
Xavier University2016ViewPatient Healthcare Smart Card System: A Unified Medical Record for Access and Analytics Hussein, Ariyachandra, Frolick
Xavier University2016ViewPrinciple Component Analysis for Feature Reduction and Data Preprocessing in Data Science Wimmer, Powell
Xavier University2016ViewProposal for Kelly Criterion-Inspired Lossy Network Compression for Network Intrusion Applications Smith, Hammell II
Xavier University2016ViewPrototype to Production: A Case Study Fabbri
Xavier University2016ViewSentiment Analysis and Opinion Mining: Current State of the Art and Review of Google and Yahoo Search Engines’ Privacy Policies Peslak
Xavier University2016ViewSubjective norm and measuring its impact on information security behavioral intention in organizations. Etezady
Xavier University2016ViewSystem Analysis of the Infrastructure of an IT services provider Krishnappa, Kline
Xavier University2016ViewThe Effects of Perceived Functionality and Usability on Privacy and Security Concerns about Adopting Cloud Applications Nakayama, Chen, Taylor
Xavier University2016ViewUnderstanding User Behavior on Pinterest: Findings and Insights Wei, Zhang
Xavier University2015ViewA Comparison of Open Source Tools for Data Science Wimmer, Powell
Xavier University2015ViewA Multi-National Study of Attitudes and Policies of Military Personnel about Smart Phone Applications Fruehauf, McCann, Al-Khalifa
Xavier University2015ViewA Practice Based Examination of Standardization, and its Relationship with the Design and Use of Healthcare IS alsekait, Chakraborty
Xavier University2015ViewAn Expanded Analysis of Internet Dependencies by Demographic Variables Peslak
Xavier University2015ViewAn Optimized Intelligent Home Network Model Kevin, Ndlovu, Lall, Kogeda
Xavier University2015ViewAssessing Cultural Aspects of Organizations for Knowledge Management Initiatives Fruehauf, Lehman
Xavier University2015ViewBlurred Lines: Defining the Motives for Mobile and Social Media Use for Marketing Strategy Kim, Homan, Breese-Vitelli, Metzer
Xavier University2015ViewCase Study: Can Interpersonal-Cultural Communication Sustain Another Innovation? Spangler , Breese, Borkovich
Xavier University2015ViewCASE Tools’ Acceptance in Higher Education – Assessment and Enhanced UTAUT Model Marcinkowski, Wrycza
Xavier University2015ViewComparing the Prediction Capabilities of an Artificial Neural Network vs a Phenomenological Model for Predicting the Terminal Ballistics of Kinetic Energy Projectiles Auten, Hammell II
Xavier University2015ViewDriving Inside Sales Performance with Lead Management Systems: A Conceptual Model Ohiomah, Benyoucef, Andreev
Xavier University2015ViewExploratory Study of Effects of eLearning System Acceptance on Learning Outcomes Ghosh
Xavier University2015ViewExploring Relationships between the Strategic Importance of IT and the Effectiveness of IT Security and Mobile Device Management Stanko, Sena, Sena
Xavier University2015ViewGovernance of Outsourcing: Building a Better Relationship Babin, Saunderson
Xavier University2015ViewInformation Technology in Patient Care: Challenges of using IT in Small Ambulatory Healthcare Organizations. Reddy
Xavier University2015ViewIntroducing A Change Resistance Factor in Knowledge Management Model: A Concentration in Organizational Culture Abaoud, alluhaidan
Xavier University2015ViewLeakage of Geolocation Data by Mobile Ad Networks Snow, Hayes, Dwyer
Xavier University2015ViewMoving Beyond Coding: Why Secure Coding Should be Implemented Grover, Cummings, Janicki
Xavier University2015ViewSocial Responsibility Trends and Perceptions in Global IT Outsourcing Babin, Myers
Xavier University2015ViewToward a Better Understanding of Factors Affecting Software Project Complexity Petkova, Petkov
Xavier University2015ViewUtilizing Finite State Machines in the Classroom to Introduce Verified Software Finkbine
Xavier University2015ViewVariation in Best-Case and Worst-Case Performance for Sorting Algorithms McMaster, Sambasivam, Rague, Wolthuis
Xavier University2014ViewA Case Study Analysis of KnightSec and the Steubenville Rape Case Pendergrass, Wright
Xavier University2014ViewA Case Study on Achieving Legitimation in Information Systems Action Research Projects Petkova, Petkov
Xavier University2014ViewA Cloud Computing Methodology Study of Platform-as-a-Service (PaaS) in the Financial Industry Lawler, Howell-Barber, Joseph
Xavier University2014ViewAligning Information Systems strategy with the Business Strategy in a South African Banking Environment Kekwaletswe, Mathebula
Xavier University2014ViewAre College Home Pages More Accessible? A Longitudinal Study of the Accessibility of United States College Home Pages Siegfried, Featherston
Xavier University2014ViewBuilding a Better Stockbroker: Managing Big (Financial) Data by Constructing an Ontology-Based Framework Westrick, Du, Wolffe
Xavier University2014ViewCyber Security Best Practices: What to do? Kleinberg, Reinicke, Cummings
Xavier University2014ViewCyberbullying or normal game play? Impact of age, gender, and experience on cyberbullying in multi-player online gaming environments: Perceptions from one gaming forum Fryling, Cotler, Rivituso, Mathews, Pratico
Xavier University2014ViewERP Customization vs. Business Process Reengineering: Technical and Functional Perceptions Fryling
Xavier University2014ViewEvaluating Information Security Practices, Knowledge, and Attitudes of Information Technology Student Workers Imboden, Martin, Woodward, Nehrkorn
Xavier University2014ViewIdentifying User Behavior from Residual Data in Cloud-based Synchronized Apps Grispos, Glisson, Pardue, Dickson
Xavier University2014ViewMeasuring Algorithm Performance With Java: Patterns of Variation McMaster, Sambasivam, Wolthuis
Xavier University2014ViewOn Adapting a Military Combat Discrete Event Simulation with Big Data and Geospatial Modeling Toward a Predictive Model Ecosystem for Interpersonal Violence Mhlanga, Perry, Kirchner
Xavier University2014ViewOpen Source Web Application Vulnerability Scanners: The Cost Effective Choice McQuade
Xavier University2014ViewReview of Web Service Specifications for Long-running Conversations Rana, Umapathy
Xavier University2014ViewRoadmaps and Maturity Models: Moore
Xavier University2014ViewThe Silent Treatment in IT Projects: Gender Differences in Inclinations to Communicate Project Status Information Korzaan, Brooks
Xavier University2014ViewUse of Preventative Measures to Protect Data Privacy on Mobile Devices Pinchot, Paullet
Xavier University2013ViewA Comparison of Software Testing Using the Object-Oriented Paradigm and Traditional Testing Gordon, Roggio
Xavier University2013ViewA Study of Cloud Computing Infrastructure-as-a-Service (IaaS) in Financial Firms Lawler, Howell-Barber, Joseph, Narula
Xavier University2013ViewA Study of Information Technology Operating and Capital Expenditures and Their Effect on Positive Firm Outcomes Peslak
Xavier University2013ViewBizprojet: The co-design of an affinities and skills search-engine. Team building around an innovative project: New knowledge shared? Lombardo, Agostinelli, Ouvrard, Arvanitakis, Metge, Linscott
Xavier University2013ViewCan Social Media aid Software Development? Reinicke, Cummings
Xavier University2013ViewCreating A Semantic Differential Scale For Measuring Users’ Perception and Attitude To Emerging Technologies Ajani, Stork
Xavier University2013ViewData Privacy: Are We Accidentally Sharing Too Much Information? Chawdhry, Paullet, Douglas
Xavier University2013ViewDecision-Making via Visual Analysis using the Natural Language Toolkit and R Jafar, Babb, Dana
Xavier University2013ViewDoes File Sharing Lead to Legal Sales? Student Attitudes on Music Piracy Siegfried
Xavier University2013ViewFeasibility of a Platform-as-a-Service Implementation using Cloud Computing for a Global Service Organization Gai, Steenkamp
Xavier University2013ViewInformation Security in Nonprofits: A First Glance at the State of Security in Two Illinois Regions Imboden, Phillips, Seib, Fiorentino
Xavier University2013ViewLooking Backwards to Look Ahead: Lessons from Barcode Adoption for RFID Adoption and Implementation Sharma, Thomas
Xavier University2013ViewMicrosoft vs Apple: Which is Great by Choice? Sena, Olsen
Xavier University2013ViewOnline versus In-Store: Price Differentiation for Multi-Channel Retailers Flores, Sun
Xavier University2013ViewPerformance and Corporate Social Responsibility in the Information Technology Industry Cowan, Parzinger, Welch, Welch
Xavier University2013ViewPredicting the Terminal Ballistics of Kinetic Energy Projectiles Using Artificial Neural Networks Auten, Hammell II
Xavier University2013ViewRisk Assessment & Management in Merchant Capture Systems: A Threat Analysis Perspective Streff, Shrestha, Delzer
Xavier University2013ViewShifting Technological Landscape: IT Departments and Anticipated Technological Changes Cummings, Janicki, Kline
Xavier University2013ViewSimilarity and Ties in Social Networks Afrasiabi Rad, Benyoucef
Xavier University2013ViewSoftware Engineering: accessing IT core concepts Davis, Kmetz
Xavier University2013ViewSome Comparisons between SSM and the Activity Analysis and Development (ActAD) framework applied to IS development Petkova, Petkov
Xavier University2013ViewTaxonomy of Common Software Testing Terminology: Framework for Key Software Engineering Testing Concepts Roggio, Gordon, Comer
Xavier University2013ViewThe De-Escalation of the DHS HSIN Next Gen Project Rosenhauer, Korzaan
Xavier University2013ViewWeb Recruitment: Parzinger, Ward, Langford
Xavier University2012ViewA Framework for an Interactive Word-Cloud Ap-proach for Visual Analysis of Digital Text using NLTK Jafar, Babb, Dana
Xavier University2012ViewA Portal-Based Web Service Development Using a Mashup Approach Miah, Debuse, Gammack, Pigott
Xavier University2012ViewA Quantitative Analysis of Computing Jobs in 2012 Robin, Roggio
Xavier University2012ViewA Study of Cloud Computing Software-as-a-Service (SaaS) in Financial Firms Lawler, Howell-Barber, Desai, Joseph
Xavier University2012ViewAdding Social Features to E-commerce Huang, Yoon, Benyoucef
Xavier University2012ViewAn Examination of the Factors Influencing Student Usage of Dropbox, a File Hosting Service Hunsinger, Corley
Xavier University2012ViewAnalysis of Electronic Health Mitchell, Clark
Xavier University2012ViewAnalysis of the Variables That Affect Frequency of Use and Time Spent on Social Networking Peslak, Sendall, Ceccucci
Xavier University2012ViewBuilding Baseline Preprocessed Common Data Sets for Multiple Follow-on Data Mining Algorithms Fowler, Hammell II
Xavier University2012ViewCloud Computing: Should I Stay or Should I Cloud? Muhleman, Kim, Homan, Breese
Xavier University2012ViewComparing Performance of Web Service Interaction Styles: SOAP vs. REST Kumar, Ahuja, Umapathy, Prodanoff
Xavier University2012ViewCreating an Audio Conferencing Application Sun, Vetter, Reinicke
Xavier University2012ViewCybercrime: The Unintentional Effects of Oversharing Information on Facebook Paullet, Pinchot
Xavier University2012ViewDo experiments using immersive and interactive 3D structures improve memorization? Lombardo, Angelini
Xavier University2012ViewEarly Stage Probabilistic Software Project Schedule Estimation Kwon, Hammell II
Xavier University2012ViewEthical Data Mining: An Obstacle or Opportunity for Loyalty Programs Smith, Burns
Xavier University2012ViewETL Evolution for Real-Time Data Warehousing Kakish, Kraft
Xavier University2012ViewEvaluating the South African software industry as a key component for economic development using an Irish framework Dehinbo, Dehinbo
Xavier University2012ViewEvolving Mobile Architectures: A Case Study in the Development of a Location Privacy Application Babb, Dana, Keith, Jafar
Xavier University2012ViewExamining the Effects of the Value of Information on Intelligence Analyst Performance Newcomb, Hammell II
Xavier University2012ViewGlobal Diffusion of Virtual Social Networks: A Pyramid Model Wang, Sun
Xavier University2012ViewInformation Security Blueprint Clark, Benli, Mitchell, Vetter
Xavier University2012ViewInformation Technology (IT) professional perceptions regarding the value of communication, collaboration, and the use of social networking technologies in the workplace: a case study Fryling, Trubitt
Xavier University2012ViewLet’s Look at the Cloud from a Risk Management Perspective Vignos, Kim, Metzer
Xavier University2012ViewOpen Source Software Volunteerism vs. Carpenter
Xavier University2012ViewPossible Lessons for the Field of Information Systems from the Work of Russel Ackoff Petkov, Petkova
Xavier University2012ViewReadiness for Transitioning to ICD-10 Coding: Litton, Humphrey, Schwieger
Xavier University2012ViewRocky Relationships: Enterprise Resource Planning and Supply Chain Management Crumbly, Fryling
Xavier University2012ViewSocial Media: Building a Competitive Edge Aimiuwu
Xavier University2012ViewThe Adoption of Green IT/IS: Sharma
Xavier University2012ViewThe Deployment Pipeline Mikita, DeHondt, Nezlek
Xavier University2012ViewThe Impact of Intra-Organizational Social Cummings
Xavier University2012ViewThe Impact of Regulatory Changes on IS Strategy: An Exploratory Study Reinicke, Ward
Xavier University2012ViewTraffic on the Information Super Highway -- Use vs. Useful? Grant, Middleton
Xavier University2012ViewUsing the Cloud: The Cost of Encryption in IaaS Cronin, Pauli, Ham
Xavier University2012ViewUsing the Layered Model to Understand Employee Selection of Information and Communication Channels for Information and Knowledge Sharing in Project Teams Lee-Partridge, Snyder
Xavier University2012ViewVicinities for Spatial Data Processing: Wu, Acharya
Xavier University2011ViewAn Approach for Developing Business Architecture, an Essential Enabler for Business and IT Alignment Li, Steenkamp
Xavier University2011ViewApplying Business Intelligence Concepts to Medicaid Claim Fraud Detection Copeland, Edberg, Wendel
Xavier University2011ViewBuilding a Real-Time Bus Tracking Data Display System Dudley, Vetter, Brown, Janicki
Xavier University2011ViewCMobile: A Mobile Photo Capture Application for Construction Imaging Martin, Vetter, Brown, Janicki
Xavier University2011ViewCo-Creating Value in Systems Development: A Shift towards Service-Dominant Logic Babb, Keith
Xavier University2011ViewComputational Linguistic Hedges Applied to a Project Critical Path McQuighan, Hammell II
Xavier University2011ViewDoes Size Matter in IT? An exploratory analysis of critical issues facing organizations based on company size Peslak
Xavier University2011ViewMaximizing Visibility in Skylines Miah
Xavier University2011ViewMeasuring Propagation in Online Social Networks: The case of YouTube Afrasiabi Rad, Benyoucef
Xavier University2011ViewMobile Telephone Usage and Perception During Group Meetings. Bajko
Xavier University2011ViewMost Popular Package Design Miah
Xavier University2011ViewOn a Systemic Understanding of Software Development Contexts Petkov, Alter, Petkova
Xavier University2011ViewOpen Source Software in the Vertical Market: an Open Niche? Conlon
Xavier University2011ViewOutsourcing Best Practices Mikita, DeHondt
Xavier University2011ViewPay-What-You-Want Pricing for Mobile Applications: The Effect of Privacy Assurances and Social Information Racherla, Keith, Babb
Xavier University2011ViewPlan to Throw one Away: Lessons Learned Battig, Commo
Xavier University2011ViewSemiotics as a Theoretical Foundation of Information Design Sharp
Xavier University2011ViewSocial Networking Systems and Campus Life Sgambato, Petkov, Wolf
Xavier University2011ViewStudy of User Behavior in Image Retrieval and Implications for Content Versus Concept Based Access Schultz
Xavier University2011ViewSurvey of Data Mining Methods in Emergency Evacuation Planning Miah
Xavier University2011ViewTalk to Text: Changing Communication Patterns Pinchot, Douglas, Paullet, Rota
Xavier University2011ViewThe Effects of Interruptions on Remembering Task Information Lenox, Pilarski, Leathers
Xavier University2011ViewThe Era of Digital Activism Sivitanides, Shah
Xavier University2011ViewThe impact of Organizational Culture in managing the change to the use of FOSS at a South African University Dehinbo, Alexander
Xavier University2011ViewThe New Tech Effect: Analyzing Juror Credibility Davis, Paullet, Kraeer, Grant
Xavier University2011ViewUsing Market Basket Analysis to Estimate Potential Revenue Increases for a Small University Bookstore Hoanca, Mock
Xavier University2011ViewUsing the cloud: How to keep your data private Cronin, Pauli, Ham
Xavier University2011ViewVisualizing Capacity and Load: A Production Planning Information System for Metal Ingot Casting Wu, Acharya
Xavier University2011ViewWhy are People Using Google's Corley, Hunsinger
Xavier University2010ViewA Methodology Tailoring Model for Practitioner Based Information Systems Development Informed by the Principles of General Systems Theory Burns, Deek
Xavier University2010ViewA Model for Understanding Social Commerce Afrasiabi Rad, Benyoucef
Xavier University2010ViewA Process for Assessing Voting System Risk Using Threat Trees Yasinisac, Pardue
Xavier University2010ViewA Study of Information Technology Integration Peslak
Xavier University2010ViewAn Empirical Study of Social Networking Behavior Using Diffusion of Innovation Theory Ceccucci, Peslak, Sendall
Xavier University2010ViewCreating a Framework for Research on Virtual Organizations Reinicke
Xavier University2010ViewDevelopment of an Evaluation Model for XBRL-enabled Tools Intended for Investors Clements, Schwieger, Surendran
Xavier University2010ViewHow Mobile Technology is Changing Our Culture Pinchot, Paullet, Rota
Xavier University2010ViewMake or Buy: A comparative assessment of organizations that develop software internally versus those that purchase software Sena, Sena
Xavier University2010ViewNATIS: Novel Architecture Framework for Sambasivam, Liang, Liao
Xavier University2010ViewOn Conceptual Models of Collaborative Partnerships and the Infusion of Knowledge Workers in the Local IT Sector Vardiman, Mhlanga
Xavier University2010ViewOn the utility of HCI practices in improving a commercial information retrieval system Honeycutt, Kolpack, Honeycutt, Talbert
Xavier University2010ViewPassword Security Risk versus Effort: An Exploratory Study on User-Perceived Risk and the Intention to Use Online Applications Gebauer, Kline, He
Xavier University2010ViewSeniors and Social Networking Lewis, Ariyachandra
Xavier University2010ViewThe Potential Reality of Service-Oriented Architecture (SOA) in a Cloud Computing Strategy Lawler
Xavier University2010ViewThe Use of Mobile Units McGinley, Nicolai
Xavier University2010ViewWhat Influences People to Use Linux? Hunsinger, Fransen
Xavier University2010ViewWhat is Missing From the Current Disaster Model Bilow, Nicolai
Xavier University2009ViewA Conceptual Model of Knowledge Elicitation Sagheb-Tehrani
Xavier University2009ViewA FOLLOW-UP STUDY OF DETECTING PHISHING EMAILS Bekkering, Werner, Hutchison
Xavier University2009ViewA Study of the Perceptions of Students on Lawler, Molluzzo
Xavier University2009ViewAn Empirical Study of Text Messaging Peslak, Ceccucci, Sendall
Xavier University2009ViewAn Exploratory Study of Relationships between Workforce Characteristics and the Use of Collaboration and Social Networking Tools in a Global Tchnology Firm Totterdale
Xavier University2009ViewAn Ontological Characterization of the ‘Structured Information Flow’ (SIF) Model Bhatia, Arthur
Xavier University2009ViewAnalyzing Community Websites: A Main Street Perspective Schoenacher
Xavier University2009ViewBusiness Requirements Knowledge Management Ontology to Support a Software Deployment Process Steenkamp, Alomari
Xavier University2009ViewCan Management Predict Information Security Threats by Utilizing a Data Warehouse? Kim, Steen
Xavier University2009ViewComponent-Based Software Development: Life Cycles and Design Science-Based Recommendations Sharp, Ryan
Xavier University2009ViewContingency Planning: Disaster Recovery Strategies for Successful Educational Continuity Omar, Udeh, Mantha
Xavier University2009ViewDifficulties in quantifying IT projects Oliver, Janicki, Barrick
Xavier University2009ViewE-Commerce Security Kraft
Xavier University2009ViewElements of Technology and Success in Virtual Teams Balazs, White
Xavier University2009ViewEthic and Moral Implications of Affective Computing Steen
Xavier University2009ViewFactors that Persuade and Deter Membership in Professional Computing Associations Umapathy, Jamba, Ritzhaupt
Xavier University2009ViewKnowledge Mapping in a Not-For-Profit Firm: A Case Study Nelson, Woratschek
Xavier University2009ViewObject Reuse and Integration Wang
Xavier University2009ViewON DESIGN SCIENCE, MCDM AND IS OUTSOURCING DECISIONS Petkov, Petkova
Xavier University2009ViewResults of Implementing a Knowledge Management Initiative to Enhance Network Access Controls Kim, Nelson
Xavier University2009ViewSome Observations on the Occurrences of Data Breaches Guerra, Joseph, Ramirez, Koong, Liu
Xavier University2009ViewSome Observations on the Occurrences of Phishing Lara, Rios, Salazar, Koong, Liu
Xavier University2009ViewSpatial Interpolation for a Wireless Sensor Network of Chemical Point Detectors: Preliminary Results Schafer, Hammell II
Xavier University2009ViewSpyware: What Influences College Students to Use Anti-Spyware Tools? Ward, Hunsinger
Xavier University2009ViewSuperfund Site Analysis Using Web 2.0 Technologies Anderson, Jafar, Rogers
Xavier University2009ViewSustainability and Greening through D'Onofrio, Jarmoszko, Lee-Partridge, Petkova
Xavier University2009ViewSynchronizing Development Life-Cycles: Rationale and Integrative Approach to Construction of eLearning Systems and Online Courses at a Tier 1 Research Institution Conn, Macedo, Meese
Xavier University2009ViewThe Effect of Gender on the Application of Peslak, Krisanda
Xavier University2009ViewThe Impact of Electronic Data Interchange Information Technology on External Auditors Ricks, Schwieger, Henry, Almohsen
Xavier University2009ViewThe Impact of Transition Costs on Offshore Systems Development DeHondt, Leidig
Xavier University2009ViewTHE RELATIONSHIP BETWEEN INFORMATION TECHNOLOGY CRITICAL SUCCESS FACTORS AND PROJECT PERFORMANCE Lind, Culler
Xavier University2009ViewThe Two Leading Freeware Image Editing Applications – An Overview, Comparative Evaluation and Guide for the IS Community Scher
Xavier University2009ViewTowards an Abstract Model for Mhlanga, Vardiman, Reames
Xavier University2009ViewUSING A GROUP SUPPORT SYSTEM Nepal, Petkov
Xavier University2009ViewVirtual Organizations: A Definitional Framework Reinicke
Xavier University2009ViewWomen's Technology Acceptance of Mentoring on the Internet Gibson, GIBSON
Xavier University2009ViewWorkflow Automation and Management Services in Web 2.0: An Object-Based Approach to Distributed Workflow Enactment Wu
Xavier University2008ViewA Computing Research Example: Following a Question Frank
Xavier University2008ViewA STUDY OF THE INFORMATION TECHNOLOGY TRADE BETWEEN THE UNITED STATES AND ASIA PACIFIC ECONOMIES COOPERATION NATIONS Roman, Blakely, Koong, Liu
Xavier University2008ViewA Study of the Information Technology Trade between The United States and the Dominican Republic-Central America Free Trade Agreement Nations Pena, Aguirre, Saenz, Koong, Liu
Xavier University2008ViewA STUDY OF THE INFORMATION TECHNOLOGY TRADE BETWEEN UNITED STATES AND THE SOUTHERN AFRICAN CUSTOM UNION Saenz, Flores, Koong, Liu
Xavier University2008ViewAn Empirical Study of Instant Messaging Behavior Using Diffusion of Innovation Theory Peslak, Ceccucci, Sendall
Xavier University2008ViewAn Examination of Information Security in Mobile Banking Architectures Streff, Haar
Xavier University2008ViewAn Information Technology Project Funding Process Kline, Renninger, Guinn, Sackley, Scott
Xavier University2008ViewAnalysis of the Factors that Influence Online Purchasing Amoroso, Hunsinger
Xavier University2008ViewAnticipated changes to technologies Janicki, Clark, Mahar, Logan
Xavier University2008ViewAssessing the Role of CSR in Outsourcing Decisions Babin
Xavier University2008ViewComparison of Dynamic Web Content Processing Languages Performance Jafar, Anderson, Abdullat
Xavier University2008ViewComputing Professional Association Membership: An Exploration of Membership Needs and Motivations Ritzhaupt, Umapathy, Jamba
Xavier University2008ViewCreating the Pilot AJAX Enabled Query Tool Ford, Dollinger
Xavier University2008ViewDetermining Information Technology Project Status using Recognition-primed Decision Making enabled Collaborative Agents Simulating Teamwork (R-CAST) Barnes, Hammell II
Xavier University2008ViewFactors Driving Handheld Wireless Media Usage Lind, Anyansi-Archibong, Anyansi
Xavier University2008ViewFormal Information Security Standards in Medium Enterprises Sambasivam, Kluge
Xavier University2008ViewIncorporation of Information Technology into Assisted Health Care: An empirical study Merrill, White
Xavier University2008ViewKnowledge Discovery and Data Mining of Biomedical Data with Decision Trees McClelland
Xavier University2008ViewPlanning and Implementation of an ERP system in a University in USA: Some Insights and Guidelines Somarajan, Weber, Surendran
Xavier University2008ViewResearch Design for a Natural Disaster Management Communication System: Nicolai, Puntillo, Bilow
Xavier University2008ViewSome Suggestions for Further Diffusion of Work System Method Ideas in Systems Analysis and Design Petkov, Misra, Petkova
Xavier University2008ViewSYSTEM DEVELOPMENT METHODOLOGY USAGE IN INDUSTRY: A REVIEW AND ANALYSIS Griffin, Brandyberry
Xavier University2008ViewTeaching Knowledge Management (KM) in Criminal Justice Education: The Influence of Information Systems Conn, Thies
Xavier University2008ViewTest Driven Development in the .Net Framework Lee, Mehta, Shah
Xavier University2008ViewThe Accessibility of College and University Home Pages in the State of New York DiLallo, Siegfried
Xavier University2008ViewThe Impact of Technology Diffusion on Employment and Compensation: Evidence from the Telecommunications Sector Clark, Moussawi
Xavier University2008ViewThe Importance of Business Process Alignment Kraft
Xavier University of Louisiana2022ViewA Predictive Unmanned Aerial Vehicle Maintenance Method: Using Low-Code and Cloud-Based Data Visualization Kim, Chung, Ju, Maeng
Xavier University of Louisiana2022ViewA Serverless Real-Time Data Streaming Architecture for Synchronous Online Math Competition Liu, Chung
Xavier University of Louisiana2022ViewAn Exploration of the Benefits of Certifications and their Relationship to Salaries in IS/IT Matthews, Cummings, Janicki
Xavier University of Louisiana2022ViewAre Companies Responsible for Internet of Things (IoT) Data Privacy? A Survey of IoT User Perceptions Paullet, Pinchot, Chawdhry
Xavier University of Louisiana2022ViewBig Data Analytics in Supply Chain Management: A Review and Recommendations Ouyang, Hwang, Cham, Chen
Xavier University of Louisiana2022ViewChildren's Privacy: An Evaluation of EdTech Privacy Policies West
Xavier University of Louisiana2022ViewClassification of Wolf Subjects Based on Hunting-Stressed Physiological Effects Using Support Vector Machines (SVM) Stewart, Davis
Xavier University of Louisiana2022ViewConvolutional Neural Network Binary Image Classifier via Mobile Devices: EZ Autism Screener Ata, Chung, Maeng
Xavier University of Louisiana2022ViewData Analytics for Societal Challenges: Understanding Student Participation in the National School Lunch Program Northey, Desai
Xavier University of Louisiana2022ViewDecision-Making Tool for Procurement for Brazilian Airlines Torres, Halawi, Rojas, Bico, Marinho
Xavier University of Louisiana2022ViewDeveloping a Data-Driven Emerging Skill Network Analytics Framework for Automated Employment Advert Evaluation Liu, Schwieger
Xavier University of Louisiana2022ViewExploring Methods Cybersecurity Managers Need to Implement to Minimize Cyber-Frauds in Mobile Money Services in Ghana Sambasivam, Siaw Afriyie
Xavier University of Louisiana2022ViewExploring Short Stay Health Care Quality: Skilled Nursing Facilities during the COVID-19 Era Winston, Xiong, Medlin, Pelaez
Xavier University of Louisiana2022ViewExploring the Strategic Cybersecurity Defense Information Technology Managers Can Implement to Reduce Healthcare Data Breaches Mawel, Sambasivam
Xavier University of Louisiana2022ViewImpact of New Technology Use on Workforce: Exploratory Analysis Toskin
Xavier University of Louisiana2022ViewInfluence of Executive Perception of Role of Information Technology: A financial institution perspective Pandey, Mishra
Xavier University of Louisiana2022ViewMeasurement, reporting, and monitoring organizational security governance: A qualitative analysis of security professionals’ experiences Slonka, Mishra, Draus, Bromall
Xavier University of Louisiana2022ViewMeasuring Analytics Maturity and Culture: The LDIS+™ Analytics Impact Framework Fowler, Sambasivam
Xavier University of Louisiana2022ViewQR Code Hacking – Detecting Multiple Vulnerabilities in Android Scanning Software Homan, Breese
Xavier University of Louisiana2022ViewSmart Homes Privacy Metrics Etezady
Xavier University of Louisiana2022ViewText Prediction Using Artificial Intelligence: An Analysis of Two Text Prediction Systems Wimmer, Du, Heri
Xavier University of Louisiana2022ViewThe Effect of Mental Illness on Compensation for IT Developers Peslak, Ceccucci, Jones, Leonard
Xavier University of Louisiana2022ViewThe Effects of Individual Characteristics and Mastery Goal Orientation on IT Project Continuation Intentions Totty, Zaza, Greer, Korzaan
Xavier University of Louisiana2022ViewThe Importance and Value of Personal Identifying Information: Towards Information Worth Kaleta, Mahadevan, Thackston
Xavier University of Louisiana2022ViewUnderstanding Gen Z’s Switching Intention to E-Commerce Drone Delivery: An Updated Diffusion of Innovation Kaleta, Xie, Chen
Xavier University of Louisiana2022ViewVisual Layering and Visual Clustering – A Model of Graph Complexity for Business Data Chen, Zhang
Xavier University of Louisiana2022ViewVulnerability Assessment for Web Applications Garcia, Abraham, Kepic, Cankaya
Xavier University of Louisiana2021View Selecting Subsets of Amazon Reviews Gokce, Kline, Cummings, Vetter
Xavier University of Louisiana2021View Examining Cloud Data Security Vulnerabilities During Usage Sambasivam, Amoah
Xavier University of Louisiana2021ViewA Cloud-Based System for Scraping Data from Amazon Product Reviews at Scale Woodall, Kline, Vetter, Modaresnezhad
Xavier University of Louisiana2021ViewAn Initial Exploration of Multi-Node Open Cloud Infrastructure Testbed Liu, Lui, Li, Embuldeniya, Garcia, McAllister, Schwieger
Xavier University of Louisiana2021ViewAugmented Reality & Artificial Intelligence Model: Optimizing Workforce Diversity Aimiuwu
Xavier University of Louisiana2021ViewBarriers and Drivers to Adoption of Electronic Health Record Systems Du, Sturgill
Xavier University of Louisiana2021ViewCombating Private Blockchain Fraud: A Virtual Reality & Artificial Intelligence Model Aimiuwu
Xavier University of Louisiana2021ViewCybersecurity Maturity Model Certification Initial Impact on the Defense Industrial Base Strohmier, Stoker, Vanajakumari, Clark, Cummings, Modaresnezhad
Xavier University of Louisiana2021ViewData Sharing and Exposure: Findings from Descriptive and Network Analysis of Instant Games on Facebook Nicholson, Chakraborty, Ali-Gombe, Hammell II
Xavier University of Louisiana2021ViewDecreasing the Barrier to Entry for an Open-Source Full-Stack Web Development Ngo, Chung, Chang
Xavier University of Louisiana2021ViewEffect of Normalization on TOPSIS and Fuzzy TOPSIS Sarraf, McGuire
Xavier University of Louisiana2021ViewGIS for Democracy: Toward A Solution Against Gerrymandering Wu, Igoche
Xavier University of Louisiana2021ViewHarvesting Intrinsically Verifiable Trust to Build a Honey Traceability System for Sustainable Development Runzel, Hassler, Hadley, Ratcliffe, Wilkes, Cazier
Xavier University of Louisiana2021ViewImpact of Review Valence and Perceived Uncertainty on Purchase of Time-Constrained and Discounted Search Goods Muzumdar
Xavier University of Louisiana2021ViewInnovation Attributes as Determinants of the Application of Artificial Intelligence: A Proposed Study Iwuanyanwu, Igoche
Xavier University of Louisiana2021ViewInternationalization and Localization for Web and Mobile Applications Wang, Chung, Yoon
Xavier University of Louisiana2021ViewLow Maintenance, Low Cost, Highly Secure, and Highly Manageable Serverless Solutions for Software Reverse Engineering Nguyen, Chung
Xavier University of Louisiana2021ViewMental Health Call Triage: Coding Systems and Opportunities for Research Hashmi, Thomas, Nandan
Xavier University of Louisiana2021ViewResolving Pressure and Stress on Governance Models from Robotic Process Automation Technologies Money
Xavier University of Louisiana2021ViewSecurity Control Techniques: Cybersecurity & Medical Wearable Devices Sambasivam, Deal
Xavier University of Louisiana2021ViewSome Analysis of Common Vulnerabilities and Exposures (CVE) Data from the National Vulnerability Database (NVD) Glyder, Stoker, Threatt, Franks, Adams
Xavier University of Louisiana2021ViewTargeted Data Visualization and Reporting Approaches for Vulnerability Management at Enterprise Organizations Painter
Xavier University of Louisiana2021ViewThe COVID Effect: Information Technology Jobs in the Pandemic Sendall, Peslak, Ceccucci, Hunsinger
Xavier University of Louisiana2021ViewUsing Analytics to understand Performance and Wellness for a Women’s College Soccer Team Njunge, Witman, Holmberg, Canacoo
Xavier University of Louisiana2021ViewUsing Physiological Effects and K-Nearest Neighbor to Identify Membership in Hunting-Stressed Wolf Populations Stewart, Davis, Igoche
Xavier University of Louisiana2020ViewA Comparative Study on Information Technology (IT) Infrastructure and Disaster Recovery Methodology Sambasivam, Brown Jr
Xavier University of Louisiana2020ViewA Prototype for Distributed Computing Platform using Smartphones Wagner, Cao
Xavier University of Louisiana2020ViewAgile Project Management: Project managers' perspective Sanchez-Morcilio, Quiles-Torres, Aparicio-Carrasco
Xavier University of Louisiana2020ViewAn International Review and Study on Perceptions of Security, Adoption, and Implementation of Electronic Health Records Aliyu, Wimmer, Powell, Rebman Jr.
Xavier University of Louisiana2020ViewAnalysis of Security Features and Vulnerabilities in Public/Open Wi-Fi James
Xavier University of Louisiana2020ViewCase Study of Blockchain Applications in Supply Chain Management- Opportunities and Challenges Smith, Xiong, Medlin
Xavier University of Louisiana2020ViewDecision-Making Model Transparency for SaMD Machine Learning Algorithms Woodside
Xavier University of Louisiana2020ViewDocumenting the Process of Hijacking a Raspberry Pi User Login Credentials via Remote Code Execution Patel, Wimmer, Powell
Xavier University of Louisiana2020ViewDoes the Executive Perception of the Value of Information Technology (IT) Influence the IT strategy? A Case Study Pandey, Mishra
Xavier University of Louisiana2020ViewEnhancing Learning Analytics: The Rise of Institutional Research Perkins, Ariyachandra
Xavier University of Louisiana2020ViewEnterprise Architecture Transformation Process from a Federal Government Perspective Canada, Halawi
Xavier University of Louisiana2020ViewExploring Sentiment Towards Contact Tracing Crable, Sena
Xavier University of Louisiana2020ViewIntegration of Information Systems: Robotic Process Automation Money
Xavier University of Louisiana2020ViewInternet of Things (IoT): An Analysis of the Research Jourdan, Corley, Ryan, Anderson
Xavier University of Louisiana2020ViewInterpreting Organizational Security Governance Objectives for Strategic Security Planning Mishra
Xavier University of Louisiana2020ViewJob and Career Satisfaction of Software Engineers Peslak, Ceccucci, Sendall
Xavier University of Louisiana2020ViewLeader-Driven Supply Chain Cybersecurity Framework Vanajakumari, Mittal, Stoker, Clark, Miller
Xavier University of Louisiana2020ViewOpen Source Software: A Detailed Analysis of Contributions and Quality Peslak, Hunsinger
Xavier University of Louisiana2020ViewPredicting Soil Conditions Using Machine Learning Algorithms Gondi, Hua, Bajracharya
Xavier University of Louisiana2020ViewPrivacy Concerns and Data Sharing Habits of Personal Fitness Information Collected via Activity Trackers Pinchot, Cellante
Xavier University of Louisiana2020ViewSpatial Data Analytics For The Pandemic Wu, Igoche
Xavier University of Louisiana2020ViewThe New Frontier in Home and Commercial Deliveries: Drones Fowler, Vannoy, Eggers, Medlin
Xavier University of Louisiana2020ViewThe Sting of Adoption: The Technology Acceptance Model (TAM) with Actual Usage in a Hazardous Environment Hassler, MacDonald, Cazier, Wilkes
Xavier University of Louisiana2019ViewA Comparative Study on Common Errors in Rules Governing Complex Event Processing Systems Dennis, Sambasivam
Xavier University of Louisiana2019ViewA Longitudinal Study of Google Privacy Policies Peslak, Kovalchick, Conforti
Xavier University of Louisiana2019ViewA Neural Networks Primer For USMA Cadets Alhajjar
Xavier University of Louisiana2019ViewAddressing issues with EMR resulting in workarounds: An exploratory study Mishra, Slonka, Draus, Bromall, Slonka
Xavier University of Louisiana2019ViewAn Empirical Study of Post-Production Software Code Quality When Employing the Agile Rapid Delivery Methodology Poe, Seeman
Xavier University of Louisiana2019ViewAn Exploratory Study of the Perceptions of Library Faculty and Patrons on Library Resources Herman, Wimmer, Rebman Jr.
Xavier University of Louisiana2019ViewAnalyzing Drug Overdoses in a Community Using R Gondi
Xavier University of Louisiana2019ViewBig Data, Algorithmic Classification, and False Positives: Consequences for Information Privacy Lauer
Xavier University of Louisiana2019ViewConceptualization of Blockchain-based Applications: Technical Background and Social Perspective Xiong, Tang, Medlin
Xavier University of Louisiana2019ViewDetection and Analysis of Hard Landing and Near Miss based on Cessna 172G Flight Data and Utilization of Flight Data Monitoring Sorab
Xavier University of Louisiana2019ViewDeveloping a GIS Dashboard Tool to Inform Non-Profit Hospitals of Community Health Needs at the Neighborhood Level Copello, Smith, Mease, Umapathy, Richard, Knight, Albertie, Hamadi, Spaulding, Apatu
Xavier University of Louisiana2019ViewDigital Transformation and Geospatial Analytics Abot, Ariyachandra
Xavier University of Louisiana2019ViewEvaluating Evasion Attack Methods on Binary Network Traffic Classifiers Shah, Gaston, Harvey, McNamara, Ramos, You, Alhajjar
Xavier University of Louisiana2019ViewExamining Organizational Security Governance (OSG) Objectives: How is strategic planning for Security is undertaken at ABC Corporation? Mishra
Xavier University of Louisiana2019ViewExploring Strategies Computer Science Educators need to use to Prepare Machine-Learning Datasets for Predicting Dropout Rates in MOOCs Nafed, Lotfy, Sambasivam
Xavier University of Louisiana2019ViewGame Theory Through Smartphone App Use In Support of For-Hire Transportation Network Companies Pendergrass
Xavier University of Louisiana2019ViewGeographic Information System For and Against Gerrymandering Wu, DePlato, Combs
Xavier University of Louisiana2019ViewImproving Information Security Awareness one Faction at a Time Mutchler
Xavier University of Louisiana2019ViewInfobesity: Do Facebook Users Actually Use Those Bookmarked Posts? Kim
Xavier University of Louisiana2019ViewKnowledge Management System Development Approaches: Evolution or Stagnation? Mew, Money
Xavier University of Louisiana2019ViewLiterary Analysis Tool: Text Analytics for Creative Writers Grimsman, Kline, Vetter, Guinn
Xavier University of Louisiana2019ViewMunging and liking it: wrangling patient time-related data with IPython Kunene
Xavier University of Louisiana2019ViewPrivacy Considerations Throughout the Data Life Cycle Pomykalski
Xavier University of Louisiana2019ViewProject Management Skills Needed for Mobile App Development McCoy
Xavier University of Louisiana2019ViewStrategies Needed by Social Network Builders to Develop Information Privacy Azzouz, Sambasivam
Xavier University of Louisiana2019ViewThe Impact of Analytics Adoption on Team Performance in Professional Sports: A Longitudinal Analysis of the Lag in Observable Results Freeman
Xavier University of Louisiana2019ViewThe Use of Tainted Flows in Network Compression for Distributed Network Intrusion Detection Smith, Hammell II
Xavier University of Louisiana2019ViewTrash to Treasure: Predicting Landfill Gas Flow to Optimize Electricity Generation Hassler, Emery, Hoyle, Cazier
Xavier University of Louisiana2019ViewUnderstanding Campus Crime with a Multi-University Analytics System Iheadindu, Kline, Vetter, Clark
Xavier University of Louisiana2019ViewWeb Designer or Web Developer? A Detailed Comparison of Job Requirements Peslak
Xavier University of Louisiana2019ViewWhich Amazon Reviews Should You Read? Gokce, Kline, Vetter, Cummings
Xavier University of Louisiana2018ViewA Machine Learning Approach to Optimizing Diabetes Healthcare Management Using SAS Analytic Suite Ajani, Habek
Xavier University of Louisiana2018ViewCan Social Media Accounts Have an Impact on Hiring Decisions? Guidelines for Appropriate Use Kim, Homan
Xavier University of Louisiana2018ViewChanges in the Information Technology Field: A Survey of Current Technologies and Future Importance Cummings, Janicki
Xavier University of Louisiana2018ViewCommercial Drone Activity: Security, Privacy, and Legislation Issues Vannoy, Medlin
Xavier University of Louisiana2018ViewDelineating Legacy System IT Artifacts – Applying a Systems Thinking-based Framework Stachofsky
Xavier University of Louisiana2018ViewDriving Distractions and Multi-tasking: An Investigative Study Choi, Xiong, Medlin
Xavier University of Louisiana2018ViewDrone Delivery Services: An Evaluation of Personal Innovativeness, Opinion Passing and Key Information Technology Adoption Factors Chen, Choi, Charoen
Xavier University of Louisiana2018ViewEffects of Normalization Techniques on Logistic Regression in Data Science Adeyemo, Wimmer, Powell
Xavier University of Louisiana2018ViewERP Rigidity and the Cloud Computing Effect Revenaugh, Schweigert
Xavier University of Louisiana2018ViewEvaluation of Google Vision API for Object Detection in General Subject Images Schultz, Adams
Xavier University of Louisiana2018ViewGeospatial Analytics: Why is Geographic Information Systems a Technology Critical to any Organization? Abot, Ariyachandra, Frolick
Xavier University of Louisiana2018ViewImportance of Features in Adversarial Machine Learning for Cyber Security De Lucia, Cotton
Xavier University of Louisiana2018ViewImprove the Loyalty of Mobile Payment Users in China by Increasing the Fit between Skill, Technology and Task Chen, Choi, Xiong, Tang
Xavier University of Louisiana2018ViewPrivacy and Security Issues Associated with Mobile Dating Applications Hayes
Xavier University of Louisiana2018ViewStandardizing Public Utility Data: A Case Study of a Rural Mid-Size Utility Hassler, Cazier, Russell, Mueller, Paprocki
Xavier University of Louisiana2018ViewThe use of Snap Length in Lossy Network Traffic Compression for Network Intrusion Detection Applications Smith, Hammell II
Xavier University of Louisiana2018ViewUnderstanding Cyberstalking through the Analysis of Student's Online Activity Paullet, Chawdhry
Xavier University of Louisiana2018ViewUsing Twitter Sentiment Analysis to Analyze Self-Sentiment of the POTUS White, Wimmer, Rebman Jr., Nwankwo
Xavier University of Louisiana2018ViewWhere We are with Enterprise Architecture Halawi, McCarthy, farah
Xavier University of Louisiana2017ViewA Business Multi-Case Study of Change Management in Software Implementation Holtel, Paddock, Reiter, Riley, Havelka
Xavier University of Louisiana2017ViewA Review of Big Data Predictive Analytics in Information Systems Research Ohiomah, Andreev, Benyoucef
Xavier University of Louisiana2017ViewAggregating Complementary and Contradictory Information for Military Decision Making Etesamipour, Hammell II
Xavier University of Louisiana2017ViewAn Exploratory Analysis of Gender Differences in IT Project Commitment, Continuation, and Escalation Korzaan, Harris, Brooks
Xavier University of Louisiana2017ViewBlockchain Technology: Challenges and Opportunities Modaresnezhad, Cummings
Xavier University of Louisiana2017ViewCloud Computing: Implications for Information Systems Development Service Providers and Practitioners Mew, Money
Xavier University of Louisiana2017ViewDoes Your Beer Taste Like Big Data? Sirinanda, Ariyachandra, Frolick
Xavier University of Louisiana2017ViewExploratory Study of Organizational Adoption of Cloud based Big Data Analytics Ghosh
Xavier University of Louisiana2017ViewFacebook Fanatics: A Linguistic and Sentiment Analysis of the Most “Fanned” Facebook Pages Peslak
Xavier University of Louisiana2017ViewGeolocation Tracking and Privacy Issues Associated with the Uber Mobile Application Hayes, Snow, Altuwayjiri
Xavier University of Louisiana2017ViewInformation Security and Privacy Legislation: Current State and Future Direction Dunlap, Cummings, Janicki
Xavier University of Louisiana2017ViewInformation Sharing Increases Drug Sample Inventory Management Efficiency in Healthcare Clinics: Evidence from a Quasi-Experiment Lang, Chahal
Xavier University of Louisiana2017ViewIT Audit Literature: A Future-Looking Research Agenda Klinkenborg, Streff, Nzailu
Xavier University of Louisiana2017ViewMinimalism in Data Visualization: Perceptions of Beauty, Clarity, Effectiveness, and Simplicity Hill, Wray, Sibona
Xavier University of Louisiana2017ViewMultitasking Behaviors: Distracted Driving Threats Beyond Texting Medlin, Choi, Xiong
Xavier University of Louisiana2017ViewOpen vs. Close Source Decision Tree Algorithms: Comparing Performance Measures of Accuracy, Sensitivity and Specificity Khan, Wimmer, Powell
Xavier University of Louisiana2017ViewPhubbing: Communication in the Attention Economy Pendergrass
Xavier University of Louisiana2017ViewPredictive Models for Apportioning 911 Fund Berghammer, Douglas, Corley, Chen
Xavier University of Louisiana2017ViewProtecting IoT Devices from the Mirai Botnet Frank, Nance, Jarocki, Pauli
Xavier University of Louisiana2017ViewStudent Intentions and Behaviors Related to Email Security: An Application of the Health Belief Model Schymik, Du
Xavier University of Louisiana2017ViewText Messaging Today: A Longitudinal Study of Variables Influencing Text Messaging from 2009 to 2016 Peslak, Hunsinger, Kruck
Xavier University of Louisiana2017ViewTowards a better understanding of the justification of choice of methods to be mixed in the same intervention during Action Design Research Petkov, Petkova
Xavier University of Louisiana2017ViewUsing Systems Analysis and Design to Enhance the Business Understanding Stage in CRISP-DM Pomykalski, Buzydlowski
Xavier University of Louisiana2017ViewWhat’s “Appening” to our Privacy? A Students Perspective on Downloading Mobile Apps Paullet, Chawdhry, Douglas, Compomizzi
Xavier University of Louisiana2016View Location Analysis of Mina Site: One of the Most Crowded Areas at Hajj alluhaidan, Alredhaiman
Xavier University of Louisiana2016View3D Printing: The Future Crime of the Present Fruehauf, Hartle, Al-Khalifa
Xavier University of Louisiana2016ViewA Comprehensive Current Review of Text Messaging Usage Peslak, Ceccucci, Hunsinger, Kruck, Sendall
Xavier University of Louisiana2016ViewA Multi-Criteria Network Assessment Model of IT Offshoring Risks from Service Provider’s Perspective Petkov, Petkova
Xavier University of Louisiana2016ViewA Simulation Modeling Approach to Improve JIT Implementation in a Highly Dynamic Manufacturing Environment Wray, Scott
Xavier University of Louisiana2016ViewAchieving Effective Data Analytics: An Agile Framework Castro, Jain
Xavier University of Louisiana2016ViewAn Empirical Study on the Impact of Price Discount on Sales in Software-as-a-Service (SaaS) Market Choi, Medlin, Hunsinger
Xavier University of Louisiana2016ViewAn Interactive Toolbox for Twitter Content Analytics Jafar, Waldman
Xavier University of Louisiana2016ViewAnalysis of the Risks of NFC Mobile Payment Systems Kakish, Shah
Xavier University of Louisiana2016ViewAre Students Using Security Measures to Protect their Data when Downloading Mobile Applications? Chawdhry, Paullet, Douglas, Compomizzi
Xavier University of Louisiana2016ViewBuilding Client Vendor Alignment Capability in Strategic Information Systems Outsourcing Ghosh
Xavier University of Louisiana2016ViewCauses of cyberbullying in multi-player online gaming environments: Gamer perceptions Cotler, Fryling, Rivituso
Xavier University of Louisiana2016ViewCrowdsourcing Surveys: Alternative Approaches to Survey Collection Cummings, Sibona
Xavier University of Louisiana2016ViewE-commerce Adoption: A Revelatory Case Study in the German Oncology Pharmaceutical Supply Chain Sultanow, Chircu, Chircu
Xavier University of Louisiana2016ViewEvidence of Wikipedia usage during the school year: A numerical study Snyder
Xavier University of Louisiana2016ViewFinding the “Radicalness” in Radical Innovation Adoption Sharma, Thomas, Konsynski
Xavier University of Louisiana2016ViewIdentifying the Critical Success Factors for Information Systems to Manage Sponsored Research Activities at Institutions of Higher Education Lehman, Ruzich
Xavier University of Louisiana2016ViewMalvertising - A Rising Threat To The Online Ecosystem Dwyer, Kanguri
Xavier University of Louisiana2016ViewPatient Healthcare Smart Card System: A Unified Medical Record for Access and Analytics Hussein, Ariyachandra, Frolick
Xavier University of Louisiana2016ViewPrinciple Component Analysis for Feature Reduction and Data Preprocessing in Data Science Wimmer, Powell
Xavier University of Louisiana2016ViewProposal for Kelly Criterion-Inspired Lossy Network Compression for Network Intrusion Applications Smith, Hammell II
Xavier University of Louisiana2016ViewPrototype to Production: A Case Study Fabbri
Xavier University of Louisiana2016ViewSentiment Analysis and Opinion Mining: Current State of the Art and Review of Google and Yahoo Search Engines’ Privacy Policies Peslak
Xavier University of Louisiana2016ViewSubjective norm and measuring its impact on information security behavioral intention in organizations. Etezady
Xavier University of Louisiana2016ViewSystem Analysis of the Infrastructure of an IT services provider Krishnappa, Kline
Xavier University of Louisiana2016ViewThe Effects of Perceived Functionality and Usability on Privacy and Security Concerns about Adopting Cloud Applications Nakayama, Chen, Taylor
Xavier University of Louisiana2016ViewUnderstanding User Behavior on Pinterest: Findings and Insights Wei, Zhang
Xavier University of Louisiana2015ViewA Comparison of Open Source Tools for Data Science Wimmer, Powell
Xavier University of Louisiana2015ViewA Multi-National Study of Attitudes and Policies of Military Personnel about Smart Phone Applications Fruehauf, McCann, Al-Khalifa
Xavier University of Louisiana2015ViewA Practice Based Examination of Standardization, and its Relationship with the Design and Use of Healthcare IS alsekait, Chakraborty
Xavier University of Louisiana2015ViewAn Expanded Analysis of Internet Dependencies by Demographic Variables Peslak
Xavier University of Louisiana2015ViewAn Optimized Intelligent Home Network Model Kevin, Ndlovu, Lall, Kogeda
Xavier University of Louisiana2015ViewAssessing Cultural Aspects of Organizations for Knowledge Management Initiatives Fruehauf, Lehman
Xavier University of Louisiana2015ViewBlurred Lines: Defining the Motives for Mobile and Social Media Use for Marketing Strategy Kim, Homan, Breese-Vitelli, Metzer
Xavier University of Louisiana2015ViewCase Study: Can Interpersonal-Cultural Communication Sustain Another Innovation? Spangler , Breese, Borkovich
Xavier University of Louisiana2015ViewCASE Tools’ Acceptance in Higher Education – Assessment and Enhanced UTAUT Model Marcinkowski, Wrycza
Xavier University of Louisiana2015ViewComparing the Prediction Capabilities of an Artificial Neural Network vs a Phenomenological Model for Predicting the Terminal Ballistics of Kinetic Energy Projectiles Auten, Hammell II
Xavier University of Louisiana2015ViewDriving Inside Sales Performance with Lead Management Systems: A Conceptual Model Ohiomah, Benyoucef, Andreev
Xavier University of Louisiana2015ViewExploratory Study of Effects of eLearning System Acceptance on Learning Outcomes Ghosh
Xavier University of Louisiana2015ViewExploring Relationships between the Strategic Importance of IT and the Effectiveness of IT Security and Mobile Device Management Stanko, Sena, Sena
Xavier University of Louisiana2015ViewGovernance of Outsourcing: Building a Better Relationship Babin, Saunderson
Xavier University of Louisiana2015ViewInformation Technology in Patient Care: Challenges of using IT in Small Ambulatory Healthcare Organizations. Reddy
Xavier University of Louisiana2015ViewIntroducing A Change Resistance Factor in Knowledge Management Model: A Concentration in Organizational Culture Abaoud, alluhaidan
Xavier University of Louisiana2015ViewLeakage of Geolocation Data by Mobile Ad Networks Snow, Hayes, Dwyer
Xavier University of Louisiana2015ViewMoving Beyond Coding: Why Secure Coding Should be Implemented Grover, Cummings, Janicki
Xavier University of Louisiana2015ViewSocial Responsibility Trends and Perceptions in Global IT Outsourcing Babin, Myers
Xavier University of Louisiana2015ViewToward a Better Understanding of Factors Affecting Software Project Complexity Petkova, Petkov
Xavier University of Louisiana2015ViewUtilizing Finite State Machines in the Classroom to Introduce Verified Software Finkbine
Xavier University of Louisiana2015ViewVariation in Best-Case and Worst-Case Performance for Sorting Algorithms McMaster, Sambasivam, Rague, Wolthuis
Xavier University of Louisiana2014ViewA Case Study Analysis of KnightSec and the Steubenville Rape Case Pendergrass, Wright
Xavier University of Louisiana2014ViewA Case Study on Achieving Legitimation in Information Systems Action Research Projects Petkova, Petkov
Xavier University of Louisiana2014ViewA Cloud Computing Methodology Study of Platform-as-a-Service (PaaS) in the Financial Industry Lawler, Howell-Barber, Joseph
Xavier University of Louisiana2014ViewAligning Information Systems strategy with the Business Strategy in a South African Banking Environment Kekwaletswe, Mathebula
Xavier University of Louisiana2014ViewAre College Home Pages More Accessible? A Longitudinal Study of the Accessibility of United States College Home Pages Siegfried, Featherston
Xavier University of Louisiana2014ViewBuilding a Better Stockbroker: Managing Big (Financial) Data by Constructing an Ontology-Based Framework Westrick, Du, Wolffe
Xavier University of Louisiana2014ViewCyber Security Best Practices: What to do? Kleinberg, Reinicke, Cummings
Xavier University of Louisiana2014ViewCyberbullying or normal game play? Impact of age, gender, and experience on cyberbullying in multi-player online gaming environments: Perceptions from one gaming forum Fryling, Cotler, Rivituso, Mathews, Pratico
Xavier University of Louisiana2014ViewERP Customization vs. Business Process Reengineering: Technical and Functional Perceptions Fryling
Xavier University of Louisiana2014ViewEvaluating Information Security Practices, Knowledge, and Attitudes of Information Technology Student Workers Imboden, Martin, Woodward, Nehrkorn
Xavier University of Louisiana2014ViewIdentifying User Behavior from Residual Data in Cloud-based Synchronized Apps Grispos, Glisson, Pardue, Dickson
Xavier University of Louisiana2014ViewMeasuring Algorithm Performance With Java: Patterns of Variation McMaster, Sambasivam, Wolthuis
Xavier University of Louisiana2014ViewOn Adapting a Military Combat Discrete Event Simulation with Big Data and Geospatial Modeling Toward a Predictive Model Ecosystem for Interpersonal Violence Mhlanga, Perry, Kirchner
Xavier University of Louisiana2014ViewOpen Source Web Application Vulnerability Scanners: The Cost Effective Choice McQuade
Xavier University of Louisiana2014ViewReview of Web Service Specifications for Long-running Conversations Rana, Umapathy
Xavier University of Louisiana2014ViewRoadmaps and Maturity Models: Moore
Xavier University of Louisiana2014ViewThe Silent Treatment in IT Projects: Gender Differences in Inclinations to Communicate Project Status Information Korzaan, Brooks
Xavier University of Louisiana2014ViewUse of Preventative Measures to Protect Data Privacy on Mobile Devices Pinchot, Paullet
Xavier University of Louisiana2013ViewA Comparison of Software Testing Using the Object-Oriented Paradigm and Traditional Testing Gordon, Roggio
Xavier University of Louisiana2013ViewA Study of Cloud Computing Infrastructure-as-a-Service (IaaS) in Financial Firms Lawler, Howell-Barber, Joseph, Narula
Xavier University of Louisiana2013ViewA Study of Information Technology Operating and Capital Expenditures and Their Effect on Positive Firm Outcomes Peslak
Xavier University of Louisiana2013ViewBizprojet: The co-design of an affinities and skills search-engine. Team building around an innovative project: New knowledge shared? Lombardo, Agostinelli, Ouvrard, Arvanitakis, Metge, Linscott
Xavier University of Louisiana2013ViewCan Social Media aid Software Development? Reinicke, Cummings
Xavier University of Louisiana2013ViewCreating A Semantic Differential Scale For Measuring Users’ Perception and Attitude To Emerging Technologies Ajani, Stork
Xavier University of Louisiana2013ViewData Privacy: Are We Accidentally Sharing Too Much Information? Chawdhry, Paullet, Douglas
Xavier University of Louisiana2013ViewDecision-Making via Visual Analysis using the Natural Language Toolkit and R Jafar, Babb, Dana
Xavier University of Louisiana2013ViewDoes File Sharing Lead to Legal Sales? Student Attitudes on Music Piracy Siegfried
Xavier University of Louisiana2013ViewFeasibility of a Platform-as-a-Service Implementation using Cloud Computing for a Global Service Organization Gai, Steenkamp
Xavier University of Louisiana2013ViewInformation Security in Nonprofits: A First Glance at the State of Security in Two Illinois Regions Imboden, Phillips, Seib, Fiorentino
Xavier University of Louisiana2013ViewLooking Backwards to Look Ahead: Lessons from Barcode Adoption for RFID Adoption and Implementation Sharma, Thomas
Xavier University of Louisiana2013ViewMicrosoft vs Apple: Which is Great by Choice? Sena, Olsen
Xavier University of Louisiana2013ViewOnline versus In-Store: Price Differentiation for Multi-Channel Retailers Flores, Sun
Xavier University of Louisiana2013ViewPerformance and Corporate Social Responsibility in the Information Technology Industry Cowan, Parzinger, Welch, Welch
Xavier University of Louisiana2013ViewPredicting the Terminal Ballistics of Kinetic Energy Projectiles Using Artificial Neural Networks Auten, Hammell II
Xavier University of Louisiana2013ViewRisk Assessment & Management in Merchant Capture Systems: A Threat Analysis Perspective Streff, Shrestha, Delzer
Xavier University of Louisiana2013ViewShifting Technological Landscape: IT Departments and Anticipated Technological Changes Cummings, Janicki, Kline
Xavier University of Louisiana2013ViewSimilarity and Ties in Social Networks Afrasiabi Rad, Benyoucef
Xavier University of Louisiana2013ViewSoftware Engineering: accessing IT core concepts Davis, Kmetz
Xavier University of Louisiana2013ViewSome Comparisons between SSM and the Activity Analysis and Development (ActAD) framework applied to IS development Petkova, Petkov
Xavier University of Louisiana2013ViewTaxonomy of Common Software Testing Terminology: Framework for Key Software Engineering Testing Concepts Roggio, Gordon, Comer
Xavier University of Louisiana2013ViewThe De-Escalation of the DHS HSIN Next Gen Project Rosenhauer, Korzaan
Xavier University of Louisiana2013ViewWeb Recruitment: Parzinger, Ward, Langford
Xavier University of Louisiana2012ViewA Framework for an Interactive Word-Cloud Ap-proach for Visual Analysis of Digital Text using NLTK Jafar, Babb, Dana
Xavier University of Louisiana2012ViewA Portal-Based Web Service Development Using a Mashup Approach Miah, Debuse, Gammack, Pigott
Xavier University of Louisiana2012ViewA Quantitative Analysis of Computing Jobs in 2012 Robin, Roggio
Xavier University of Louisiana2012ViewA Study of Cloud Computing Software-as-a-Service (SaaS) in Financial Firms Lawler, Howell-Barber, Desai, Joseph
Xavier University of Louisiana2012ViewAdding Social Features to E-commerce Huang, Yoon, Benyoucef
Xavier University of Louisiana2012ViewAn Examination of the Factors Influencing Student Usage of Dropbox, a File Hosting Service Hunsinger, Corley
Xavier University of Louisiana2012ViewAnalysis of Electronic Health Mitchell, Clark
Xavier University of Louisiana2012ViewAnalysis of the Variables That Affect Frequency of Use and Time Spent on Social Networking Peslak, Sendall, Ceccucci
Xavier University of Louisiana2012ViewBuilding Baseline Preprocessed Common Data Sets for Multiple Follow-on Data Mining Algorithms Fowler, Hammell II
Xavier University of Louisiana2012ViewCloud Computing: Should I Stay or Should I Cloud? Muhleman, Kim, Homan, Breese
Xavier University of Louisiana2012ViewComparing Performance of Web Service Interaction Styles: SOAP vs. REST Kumar, Ahuja, Umapathy, Prodanoff
Xavier University of Louisiana2012ViewCreating an Audio Conferencing Application Sun, Vetter, Reinicke
Xavier University of Louisiana2012ViewCybercrime: The Unintentional Effects of Oversharing Information on Facebook Paullet, Pinchot
Xavier University of Louisiana2012ViewDo experiments using immersive and interactive 3D structures improve memorization? Lombardo, Angelini
Xavier University of Louisiana2012ViewEarly Stage Probabilistic Software Project Schedule Estimation Kwon, Hammell II
Xavier University of Louisiana2012ViewEthical Data Mining: An Obstacle or Opportunity for Loyalty Programs Smith, Burns
Xavier University of Louisiana2012ViewETL Evolution for Real-Time Data Warehousing Kakish, Kraft
Xavier University of Louisiana2012ViewEvaluating the South African software industry as a key component for economic development using an Irish framework Dehinbo, Dehinbo
Xavier University of Louisiana2012ViewEvolving Mobile Architectures: A Case Study in the Development of a Location Privacy Application Babb, Dana, Keith, Jafar
Xavier University of Louisiana2012ViewExamining the Effects of the Value of Information on Intelligence Analyst Performance Newcomb, Hammell II
Xavier University of Louisiana2012ViewGlobal Diffusion of Virtual Social Networks: A Pyramid Model Wang, Sun
Xavier University of Louisiana2012ViewInformation Security Blueprint Clark, Benli, Mitchell, Vetter
Xavier University of Louisiana2012ViewInformation Technology (IT) professional perceptions regarding the value of communication, collaboration, and the use of social networking technologies in the workplace: a case study Fryling, Trubitt
Xavier University of Louisiana2012ViewLet’s Look at the Cloud from a Risk Management Perspective Vignos, Kim, Metzer
Xavier University of Louisiana2012ViewOpen Source Software Volunteerism vs. Carpenter
Xavier University of Louisiana2012ViewPossible Lessons for the Field of Information Systems from the Work of Russel Ackoff Petkov, Petkova
Xavier University of Louisiana2012ViewReadiness for Transitioning to ICD-10 Coding: Litton, Humphrey, Schwieger
Xavier University of Louisiana2012ViewRocky Relationships: Enterprise Resource Planning and Supply Chain Management Crumbly, Fryling
Xavier University of Louisiana2012ViewSocial Media: Building a Competitive Edge Aimiuwu
Xavier University of Louisiana2012ViewThe Adoption of Green IT/IS: Sharma
Xavier University of Louisiana2012ViewThe Deployment Pipeline Mikita, DeHondt, Nezlek
Xavier University of Louisiana2012ViewThe Impact of Intra-Organizational Social Cummings
Xavier University of Louisiana2012ViewThe Impact of Regulatory Changes on IS Strategy: An Exploratory Study Reinicke, Ward
Xavier University of Louisiana2012ViewTraffic on the Information Super Highway -- Use vs. Useful? Grant, Middleton
Xavier University of Louisiana2012ViewUsing the Cloud: The Cost of Encryption in IaaS Cronin, Pauli, Ham
Xavier University of Louisiana2012ViewUsing the Layered Model to Understand Employee Selection of Information and Communication Channels for Information and Knowledge Sharing in Project Teams Lee-Partridge, Snyder
Xavier University of Louisiana2012ViewVicinities for Spatial Data Processing: Wu, Acharya
Xavier University of Louisiana2011ViewAn Approach for Developing Business Architecture, an Essential Enabler for Business and IT Alignment Li, Steenkamp
Xavier University of Louisiana2011ViewApplying Business Intelligence Concepts to Medicaid Claim Fraud Detection Copeland, Edberg, Wendel
Xavier University of Louisiana2011ViewBuilding a Real-Time Bus Tracking Data Display System Dudley, Vetter, Brown, Janicki
Xavier University of Louisiana2011ViewCMobile: A Mobile Photo Capture Application for Construction Imaging Martin, Vetter, Brown, Janicki
Xavier University of Louisiana2011ViewCo-Creating Value in Systems Development: A Shift towards Service-Dominant Logic Babb, Keith
Xavier University of Louisiana2011ViewComputational Linguistic Hedges Applied to a Project Critical Path McQuighan, Hammell II
Xavier University of Louisiana2011ViewDoes Size Matter in IT? An exploratory analysis of critical issues facing organizations based on company size Peslak
Xavier University of Louisiana2011ViewMaximizing Visibility in Skylines Miah
Xavier University of Louisiana2011ViewMeasuring Propagation in Online Social Networks: The case of YouTube Afrasiabi Rad, Benyoucef
Xavier University of Louisiana2011ViewMobile Telephone Usage and Perception During Group Meetings. Bajko
Xavier University of Louisiana2011ViewMost Popular Package Design Miah
Xavier University of Louisiana2011ViewOn a Systemic Understanding of Software Development Contexts Petkov, Alter, Petkova
Xavier University of Louisiana2011ViewOpen Source Software in the Vertical Market: an Open Niche? Conlon
Xavier University of Louisiana2011ViewOutsourcing Best Practices Mikita, DeHondt
Xavier University of Louisiana2011ViewPay-What-You-Want Pricing for Mobile Applications: The Effect of Privacy Assurances and Social Information Racherla, Keith, Babb
Xavier University of Louisiana2011ViewPlan to Throw one Away: Lessons Learned Battig, Commo
Xavier University of Louisiana2011ViewSemiotics as a Theoretical Foundation of Information Design Sharp
Xavier University of Louisiana2011ViewSocial Networking Systems and Campus Life Sgambato, Petkov, Wolf
Xavier University of Louisiana2011ViewStudy of User Behavior in Image Retrieval and Implications for Content Versus Concept Based Access Schultz
Xavier University of Louisiana2011ViewSurvey of Data Mining Methods in Emergency Evacuation Planning Miah
Xavier University of Louisiana2011ViewTalk to Text: Changing Communication Patterns Pinchot, Douglas, Paullet, Rota
Xavier University of Louisiana2011ViewThe Effects of Interruptions on Remembering Task Information Lenox, Pilarski, Leathers
Xavier University of Louisiana2011ViewThe Era of Digital Activism Sivitanides, Shah
Xavier University of Louisiana2011ViewThe impact of Organizational Culture in managing the change to the use of FOSS at a South African University Dehinbo, Alexander
Xavier University of Louisiana2011ViewThe New Tech Effect: Analyzing Juror Credibility Davis, Paullet, Kraeer, Grant
Xavier University of Louisiana2011ViewUsing Market Basket Analysis to Estimate Potential Revenue Increases for a Small University Bookstore Hoanca, Mock
Xavier University of Louisiana2011ViewUsing the cloud: How to keep your data private Cronin, Pauli, Ham
Xavier University of Louisiana2011ViewVisualizing Capacity and Load: A Production Planning Information System for Metal Ingot Casting Wu, Acharya
Xavier University of Louisiana2011ViewWhy are People Using Google's Corley, Hunsinger
Xavier University of Louisiana2010ViewA Methodology Tailoring Model for Practitioner Based Information Systems Development Informed by the Principles of General Systems Theory Burns, Deek
Xavier University of Louisiana2010ViewA Model for Understanding Social Commerce Afrasiabi Rad, Benyoucef
Xavier University of Louisiana2010ViewA Process for Assessing Voting System Risk Using Threat Trees Yasinisac, Pardue
Xavier University of Louisiana2010ViewA Study of Information Technology Integration Peslak
Xavier University of Louisiana2010ViewAn Empirical Study of Social Networking Behavior Using Diffusion of Innovation Theory Ceccucci, Peslak, Sendall
Xavier University of Louisiana2010ViewCreating a Framework for Research on Virtual Organizations Reinicke
Xavier University of Louisiana2010ViewDevelopment of an Evaluation Model for XBRL-enabled Tools Intended for Investors Clements, Schwieger, Surendran
Xavier University of Louisiana2010ViewHow Mobile Technology is Changing Our Culture Pinchot, Paullet, Rota
Xavier University of Louisiana2010ViewMake or Buy: A comparative assessment of organizations that develop software internally versus those that purchase software Sena, Sena
Xavier University of Louisiana2010ViewNATIS: Novel Architecture Framework for Sambasivam, Liang, Liao
Xavier University of Louisiana2010ViewOn Conceptual Models of Collaborative Partnerships and the Infusion of Knowledge Workers in the Local IT Sector Vardiman, Mhlanga
Xavier University of Louisiana2010ViewOn the utility of HCI practices in improving a commercial information retrieval system Honeycutt, Kolpack, Honeycutt, Talbert
Xavier University of Louisiana2010ViewPassword Security Risk versus Effort: An Exploratory Study on User-Perceived Risk and the Intention to Use Online Applications Gebauer, Kline, He
Xavier University of Louisiana2010ViewSeniors and Social Networking Lewis, Ariyachandra
Xavier University of Louisiana2010ViewThe Potential Reality of Service-Oriented Architecture (SOA) in a Cloud Computing Strategy Lawler
Xavier University of Louisiana2010ViewThe Use of Mobile Units McGinley, Nicolai
Xavier University of Louisiana2010ViewWhat Influences People to Use Linux? Hunsinger, Fransen
Xavier University of Louisiana2010ViewWhat is Missing From the Current Disaster Model Bilow, Nicolai
Xavier University of Louisiana2009ViewA Conceptual Model of Knowledge Elicitation Sagheb-Tehrani
Xavier University of Louisiana2009ViewA FOLLOW-UP STUDY OF DETECTING PHISHING EMAILS Bekkering, Werner, Hutchison
Xavier University of Louisiana2009ViewA Study of the Perceptions of Students on Lawler, Molluzzo
Xavier University of Louisiana2009ViewAn Empirical Study of Text Messaging Peslak, Ceccucci, Sendall
Xavier University of Louisiana2009ViewAn Exploratory Study of Relationships between Workforce Characteristics and the Use of Collaboration and Social Networking Tools in a Global Tchnology Firm Totterdale
Xavier University of Louisiana2009ViewAn Ontological Characterization of the ‘Structured Information Flow’ (SIF) Model Bhatia, Arthur
Xavier University of Louisiana2009ViewAnalyzing Community Websites: A Main Street Perspective Schoenacher
Xavier University of Louisiana2009ViewBusiness Requirements Knowledge Management Ontology to Support a Software Deployment Process Steenkamp, Alomari
Xavier University of Louisiana2009ViewCan Management Predict Information Security Threats by Utilizing a Data Warehouse? Kim, Steen
Xavier University of Louisiana2009ViewComponent-Based Software Development: Life Cycles and Design Science-Based Recommendations Sharp, Ryan
Xavier University of Louisiana2009ViewContingency Planning: Disaster Recovery Strategies for Successful Educational Continuity Omar, Udeh, Mantha
Xavier University of Louisiana2009ViewDifficulties in quantifying IT projects Oliver, Janicki, Barrick
Xavier University of Louisiana2009ViewE-Commerce Security Kraft
Xavier University of Louisiana2009ViewElements of Technology and Success in Virtual Teams Balazs, White
Xavier University of Louisiana2009ViewEthic and Moral Implications of Affective Computing Steen
Xavier University of Louisiana2009ViewFactors that Persuade and Deter Membership in Professional Computing Associations Umapathy, Jamba, Ritzhaupt
Xavier University of Louisiana2009ViewKnowledge Mapping in a Not-For-Profit Firm: A Case Study Nelson, Woratschek
Xavier University of Louisiana2009ViewObject Reuse and Integration Wang
Xavier University of Louisiana2009ViewON DESIGN SCIENCE, MCDM AND IS OUTSOURCING DECISIONS Petkov, Petkova
Xavier University of Louisiana2009ViewResults of Implementing a Knowledge Management Initiative to Enhance Network Access Controls Kim, Nelson
Xavier University of Louisiana2009ViewSome Observations on the Occurrences of Data Breaches Guerra, Joseph, Ramirez, Koong, Liu
Xavier University of Louisiana2009ViewSome Observations on the Occurrences of Phishing Lara, Rios, Salazar, Koong, Liu
Xavier University of Louisiana2009ViewSpatial Interpolation for a Wireless Sensor Network of Chemical Point Detectors: Preliminary Results Schafer, Hammell II
Xavier University of Louisiana2009ViewSpyware: What Influences College Students to Use Anti-Spyware Tools? Ward, Hunsinger
Xavier University of Louisiana2009ViewSuperfund Site Analysis Using Web 2.0 Technologies Anderson, Jafar, Rogers
Xavier University of Louisiana2009ViewSustainability and Greening through D'Onofrio, Jarmoszko, Lee-Partridge, Petkova
Xavier University of Louisiana2009ViewSynchronizing Development Life-Cycles: Rationale and Integrative Approach to Construction of eLearning Systems and Online Courses at a Tier 1 Research Institution Conn, Macedo, Meese
Xavier University of Louisiana2009ViewThe Effect of Gender on the Application of Peslak, Krisanda
Xavier University of Louisiana2009ViewThe Impact of Electronic Data Interchange Information Technology on External Auditors Ricks, Schwieger, Henry, Almohsen
Xavier University of Louisiana2009ViewThe Impact of Transition Costs on Offshore Systems Development DeHondt, Leidig
Xavier University of Louisiana2009ViewTHE RELATIONSHIP BETWEEN INFORMATION TECHNOLOGY CRITICAL SUCCESS FACTORS AND PROJECT PERFORMANCE Lind, Culler
Xavier University of Louisiana2009ViewThe Two Leading Freeware Image Editing Applications – An Overview, Comparative Evaluation and Guide for the IS Community Scher
Xavier University of Louisiana2009ViewTowards an Abstract Model for Mhlanga, Vardiman, Reames
Xavier University of Louisiana2009ViewUSING A GROUP SUPPORT SYSTEM Nepal, Petkov
Xavier University of Louisiana2009ViewVirtual Organizations: A Definitional Framework Reinicke
Xavier University of Louisiana2009ViewWomen's Technology Acceptance of Mentoring on the Internet Gibson, GIBSON
Xavier University of Louisiana2009ViewWorkflow Automation and Management Services in Web 2.0: An Object-Based Approach to Distributed Workflow Enactment Wu
Xavier University of Louisiana2008ViewA Computing Research Example: Following a Question Frank
Xavier University of Louisiana2008ViewA STUDY OF THE INFORMATION TECHNOLOGY TRADE BETWEEN THE UNITED STATES AND ASIA PACIFIC ECONOMIES COOPERATION NATIONS Roman, Blakely, Koong, Liu
Xavier University of Louisiana2008ViewA Study of the Information Technology Trade between The United States and the Dominican Republic-Central America Free Trade Agreement Nations Pena, Aguirre, Saenz, Koong, Liu
Xavier University of Louisiana2008ViewA STUDY OF THE INFORMATION TECHNOLOGY TRADE BETWEEN UNITED STATES AND THE SOUTHERN AFRICAN CUSTOM UNION Saenz, Flores, Koong, Liu
Xavier University of Louisiana2008ViewAn Empirical Study of Instant Messaging Behavior Using Diffusion of Innovation Theory Peslak, Ceccucci, Sendall
Xavier University of Louisiana2008ViewAn Examination of Information Security in Mobile Banking Architectures Streff, Haar
Xavier University of Louisiana2008ViewAn Information Technology Project Funding Process Kline, Renninger, Guinn, Sackley, Scott
Xavier University of Louisiana2008ViewAnalysis of the Factors that Influence Online Purchasing Amoroso, Hunsinger
Xavier University of Louisiana2008ViewAnticipated changes to technologies Janicki, Clark, Mahar, Logan
Xavier University of Louisiana2008ViewAssessing the Role of CSR in Outsourcing Decisions Babin
Xavier University of Louisiana2008ViewComparison of Dynamic Web Content Processing Languages Performance Jafar, Anderson, Abdullat
Xavier University of Louisiana2008ViewComputing Professional Association Membership: An Exploration of Membership Needs and Motivations Ritzhaupt, Umapathy, Jamba
Xavier University of Louisiana2008ViewCreating the Pilot AJAX Enabled Query Tool Ford, Dollinger
Xavier University of Louisiana2008ViewDetermining Information Technology Project Status using Recognition-primed Decision Making enabled Collaborative Agents Simulating Teamwork (R-CAST) Barnes, Hammell II
Xavier University of Louisiana2008ViewFactors Driving Handheld Wireless Media Usage Lind, Anyansi-Archibong, Anyansi
Xavier University of Louisiana2008ViewFormal Information Security Standards in Medium Enterprises Sambasivam, Kluge
Xavier University of Louisiana2008ViewIncorporation of Information Technology into Assisted Health Care: An empirical study Merrill, White
Xavier University of Louisiana2008ViewKnowledge Discovery and Data Mining of Biomedical Data with Decision Trees McClelland
Xavier University of Louisiana2008ViewPlanning and Implementation of an ERP system in a University in USA: Some Insights and Guidelines Somarajan, Weber, Surendran
Xavier University of Louisiana2008ViewResearch Design for a Natural Disaster Management Communication System: Nicolai, Puntillo, Bilow
Xavier University of Louisiana2008ViewSome Suggestions for Further Diffusion of Work System Method Ideas in Systems Analysis and Design Petkov, Misra, Petkova
Xavier University of Louisiana2008ViewSYSTEM DEVELOPMENT METHODOLOGY USAGE IN INDUSTRY: A REVIEW AND ANALYSIS Griffin, Brandyberry
Xavier University of Louisiana2008ViewTeaching Knowledge Management (KM) in Criminal Justice Education: The Influence of Information Systems Conn, Thies
Xavier University of Louisiana2008ViewTest Driven Development in the .Net Framework Lee, Mehta, Shah
Xavier University of Louisiana2008ViewThe Accessibility of College and University Home Pages in the State of New York DiLallo, Siegfried
Xavier University of Louisiana2008ViewThe Impact of Technology Diffusion on Employment and Compensation: Evidence from the Telecommunications Sector Clark, Moussawi
Xavier University of Louisiana2008ViewThe Importance of Business Process Alignment Kraft