Institution | Conf Year | Article | Title | Authors |
Zayed University | 2022 | View | A Predictive Unmanned Aerial Vehicle Maintenance Method: Using Low-Code and Cloud-Based Data Visualization |
Kim, Chung, Ju, Maeng
|
Zayed University | 2022 | View | A Serverless Real-Time Data Streaming Architecture for Synchronous Online Math Competition |
Liu, Chung
|
Zayed University | 2022 | View | An Exploration of the Benefits of Certifications and their Relationship to Salaries in IS/IT |
Matthews, Cummings, Janicki
|
Zayed University | 2022 | View | Are Companies Responsible for Internet of Things (IoT) Data Privacy? A Survey of IoT User Perceptions |
Paullet, Pinchot, Chawdhry
|
Zayed University | 2022 | View | Big Data Analytics in Supply Chain Management: A Review and Recommendations
|
Ouyang, Hwang, Cham, Chen
|
Zayed University | 2022 | View | Children's Privacy:
An Evaluation of EdTech Privacy Policies |
West
|
Zayed University | 2022 | View | Classification of Wolf Subjects Based on Hunting-Stressed Physiological Effects Using Support Vector Machines (SVM) |
Stewart, Davis
|
Zayed University | 2022 | View | Convolutional Neural Network Binary Image Classifier via Mobile Devices: EZ Autism Screener |
Ata, Chung, Maeng
|
Zayed University | 2022 | View | Data Analytics for Societal Challenges: Understanding Student Participation in the National School Lunch Program |
Northey, Desai
|
Zayed University | 2022 | View | Decision-Making Tool for Procurement for Brazilian Airlines |
Torres, Halawi, Rojas, Bico, Marinho
|
Zayed University | 2022 | View | Developing a Data-Driven Emerging Skill Network Analytics Framework for Automated Employment Advert Evaluation |
Liu, Schwieger
|
Zayed University | 2022 | View | Exploring Methods Cybersecurity Managers Need to Implement to Minimize Cyber-Frauds in Mobile Money Services in Ghana |
Sambasivam, Siaw Afriyie
|
Zayed University | 2022 | View | Exploring Short Stay Health Care Quality: Skilled Nursing Facilities during the COVID-19 Era
|
Winston, Xiong, Medlin, Pelaez
|
Zayed University | 2022 | View | Exploring the Strategic Cybersecurity Defense Information Technology Managers Can Implement to Reduce Healthcare Data Breaches |
Mawel, Sambasivam
|
Zayed University | 2022 | View | Impact of New Technology Use on Workforce: Exploratory Analysis |
Toskin
|
Zayed University | 2022 | View | Influence of Executive Perception of Role of Information Technology: A financial institution perspective |
Pandey, Mishra
|
Zayed University | 2022 | View | Measurement, reporting, and monitoring organizational security governance: A qualitative analysis of security professionals’ experiences |
Slonka, Mishra, Draus, Bromall
|
Zayed University | 2022 | View | Measuring Analytics Maturity and Culture: The LDIS+™ Analytics Impact Framework |
Fowler, Sambasivam
|
Zayed University | 2022 | View | QR Code Hacking – Detecting Multiple Vulnerabilities in Android Scanning Software |
Homan, Breese
|
Zayed University | 2022 | View | Smart Homes Privacy Metrics |
Etezady
|
Zayed University | 2022 | View | Text Prediction Using Artificial Intelligence: An Analysis of Two Text Prediction Systems |
Wimmer, Du, Heri
|
Zayed University | 2022 | View | The Effect of Mental Illness on Compensation for IT Developers |
Peslak, Ceccucci, Jones, Leonard
|
Zayed University | 2022 | View | The Effects of Individual Characteristics and Mastery Goal Orientation on IT Project Continuation Intentions |
Totty, Zaza, Greer, Korzaan
|
Zayed University | 2022 | View | The Importance and Value of Personal Identifying Information: Towards Information Worth |
Kaleta, Mahadevan, Thackston
|
Zayed University | 2022 | View | Understanding Gen Z’s Switching Intention to E-Commerce Drone Delivery: An Updated Diffusion of Innovation |
Kaleta, Xie, Chen
|
Zayed University | 2022 | View | Visual Layering and Visual Clustering –
A Model of Graph Complexity for Business Data
|
Chen, Zhang
|
Zayed University | 2022 | View | Vulnerability Assessment for Web Applications |
Garcia, Abraham, Kepic, Cankaya
|
Zayed University | 2021 | View |
Selecting Subsets of Amazon Reviews
|
Gokce, Kline, Cummings, Vetter
|
Zayed University | 2021 | View | Examining Cloud Data Security
Vulnerabilities During Usage |
Sambasivam, Amoah
|
Zayed University | 2021 | View | A Cloud-Based System for Scraping Data from Amazon Product Reviews at Scale |
Woodall, Kline, Vetter, Modaresnezhad
|
Zayed University | 2021 | View | An Initial Exploration of Multi-Node Open Cloud Infrastructure Testbed |
Liu, Lui, Li, Embuldeniya, Garcia, McAllister, Schwieger
|
Zayed University | 2021 | View | Augmented Reality & Artificial Intelligence Model: Optimizing Workforce Diversity
|
Aimiuwu
|
Zayed University | 2021 | View | Barriers and Drivers to Adoption of Electronic Health Record Systems |
Du, Sturgill
|
Zayed University | 2021 | View | Combating Private Blockchain Fraud: A Virtual Reality & Artificial Intelligence Model
|
Aimiuwu
|
Zayed University | 2021 | View | Cybersecurity Maturity Model Certification Initial Impact on the Defense Industrial Base
|
Strohmier, Stoker, Vanajakumari, Clark, Cummings, Modaresnezhad
|
Zayed University | 2021 | View | Data Sharing and Exposure: Findings from Descriptive and Network Analysis of Instant Games on Facebook |
Nicholson, Chakraborty, Ali-Gombe, Hammell II
|
Zayed University | 2021 | View | Decreasing the Barrier to Entry for an Open-Source Full-Stack Web Development |
Ngo, Chung, Chang
|
Zayed University | 2021 | View | Effect of Normalization on TOPSIS and Fuzzy TOPSIS |
Sarraf, McGuire
|
Zayed University | 2021 | View | GIS for Democracy:
Toward A Solution Against Gerrymandering
|
Wu, Igoche
|
Zayed University | 2021 | View | Harvesting Intrinsically Verifiable Trust to Build a Honey Traceability System for Sustainable Development |
Runzel, Hassler, Hadley, Ratcliffe, Wilkes, Cazier
|
Zayed University | 2021 | View | Impact of Review Valence and Perceived Uncertainty on Purchase of Time-Constrained and Discounted Search Goods |
Muzumdar
|
Zayed University | 2021 | View | Innovation Attributes as Determinants of the Application of Artificial Intelligence: A Proposed Study |
Iwuanyanwu, Igoche
|
Zayed University | 2021 | View | Internationalization and Localization for Web and Mobile Applications |
Wang, Chung, Yoon
|
Zayed University | 2021 | View | Low Maintenance, Low Cost, Highly Secure, and Highly Manageable Serverless Solutions for Software Reverse Engineering |
Nguyen, Chung
|
Zayed University | 2021 | View | Mental Health Call Triage: Coding Systems and Opportunities for Research |
Hashmi, Thomas, Nandan
|
Zayed University | 2021 | View | Resolving Pressure and Stress on Governance Models from Robotic Process Automation Technologies |
Money
|
Zayed University | 2021 | View | Security Control Techniques: Cybersecurity & Medical Wearable Devices |
Sambasivam, Deal
|
Zayed University | 2021 | View | Some Analysis of Common Vulnerabilities and Exposures (CVE) Data from the National Vulnerability Database (NVD) |
Glyder, Stoker, Threatt, Franks, Adams
|
Zayed University | 2021 | View | Targeted Data Visualization and Reporting Approaches for Vulnerability Management at Enterprise Organizations |
Painter
|
Zayed University | 2021 | View | The COVID Effect: Information Technology Jobs in the Pandemic |
Sendall, Peslak, Ceccucci, Hunsinger
|
Zayed University | 2021 | View | Using Analytics to understand Performance and Wellness for a Women’s College Soccer Team |
Njunge, Witman, Holmberg, Canacoo
|
Zayed University | 2021 | View | Using Physiological Effects and K-Nearest Neighbor
to Identify Membership in Hunting-Stressed Wolf Populations
|
Stewart, Davis, Igoche
|
Zayed University | 2020 | View | A Comparative Study on Information Technology (IT) Infrastructure and Disaster Recovery Methodology |
Sambasivam, Brown Jr
|
Zayed University | 2020 | View | A Prototype for Distributed Computing Platform using Smartphones |
Wagner, Cao
|
Zayed University | 2020 | View | Agile Project Management: Project managers' perspective
|
Sanchez-Morcilio, Quiles-Torres, Aparicio-Carrasco
|
Zayed University | 2020 | View | An International Review and Study on Perceptions of Security, Adoption, and Implementation of Electronic Health Records |
Aliyu, Wimmer, Powell, Rebman Jr.
|
Zayed University | 2020 | View | Analysis of Security Features and Vulnerabilities in Public/Open Wi-Fi |
James
|
Zayed University | 2020 | View | Case Study of Blockchain Applications in Supply Chain Management- Opportunities and Challenges |
Smith, Xiong, Medlin
|
Zayed University | 2020 | View | Decision-Making Model Transparency for SaMD Machine Learning Algorithms |
Woodside
|
Zayed University | 2020 | View | Documenting the Process of Hijacking a Raspberry Pi User Login Credentials via Remote Code Execution |
Patel, Wimmer, Powell
|
Zayed University | 2020 | View | Does the Executive Perception of the Value of Information Technology (IT) Influence the IT strategy? A Case Study |
Pandey, Mishra
|
Zayed University | 2020 | View | Enhancing Learning Analytics: The Rise of Institutional Research |
Perkins, Ariyachandra
|
Zayed University | 2020 | View | Enterprise Architecture Transformation Process from a Federal Government Perspective |
Canada, Halawi
|
Zayed University | 2020 | View | Exploring Sentiment Towards Contact Tracing |
Crable, Sena
|
Zayed University | 2020 | View | Integration of Information Systems: Robotic Process Automation |
Money
|
Zayed University | 2020 | View | Internet of Things (IoT): An Analysis of the Research |
Jourdan, Corley, Ryan, Anderson
|
Zayed University | 2020 | View | Interpreting Organizational Security Governance Objectives for Strategic Security Planning |
Mishra
|
Zayed University | 2020 | View | Job and Career Satisfaction of Software Engineers |
Peslak, Ceccucci, Sendall
|
Zayed University | 2020 | View | Leader-Driven Supply Chain Cybersecurity Framework |
Vanajakumari, Mittal, Stoker, Clark, Miller
|
Zayed University | 2020 | View | Open Source Software: A Detailed Analysis of Contributions and Quality |
Peslak, Hunsinger
|
Zayed University | 2020 | View | Predicting Soil Conditions Using Machine Learning Algorithms |
Gondi, Hua, Bajracharya
|
Zayed University | 2020 | View | Privacy Concerns and Data Sharing Habits of Personal Fitness Information Collected via Activity Trackers |
Pinchot, Cellante
|
Zayed University | 2020 | View | Spatial Data Analytics For The Pandemic |
Wu, Igoche
|
Zayed University | 2020 | View | The New Frontier in Home and Commercial Deliveries: Drones
|
Fowler, Vannoy, Eggers, Medlin
|
Zayed University | 2020 | View | The Sting of Adoption: The Technology Acceptance Model (TAM) with Actual Usage in a Hazardous Environment |
Hassler, MacDonald, Cazier, Wilkes
|
Zayed University | 2019 | View | A Comparative Study on Common Errors in Rules Governing Complex Event Processing Systems |
Dennis, Sambasivam
|
Zayed University | 2019 | View | A Longitudinal Study of Google Privacy Policies |
Peslak, Kovalchick, Conforti
|
Zayed University | 2019 | View | A Neural Networks Primer For USMA Cadets |
Alhajjar
|
Zayed University | 2019 | View | Addressing issues with EMR resulting in workarounds: An exploratory study
|
Mishra, Slonka, Draus, Bromall, Slonka
|
Zayed University | 2019 | View | An Empirical Study of Post-Production Software Code Quality When Employing the Agile Rapid Delivery Methodology |
Poe, Seeman
|
Zayed University | 2019 | View | An Exploratory Study of the Perceptions of Library Faculty and Patrons on Library Resources |
Herman, Wimmer, Rebman Jr.
|
Zayed University | 2019 | View | Analyzing Drug Overdoses in a Community Using R |
Gondi
|
Zayed University | 2019 | View | Big Data, Algorithmic Classification, and False Positives: Consequences for Information Privacy |
Lauer
|
Zayed University | 2019 | View | Conceptualization of Blockchain-based Applications: Technical Background and Social Perspective |
Xiong, Tang, Medlin
|
Zayed University | 2019 | View | Detection and Analysis of Hard Landing and Near Miss based on Cessna 172G Flight Data and Utilization of Flight Data Monitoring |
Sorab
|
Zayed University | 2019 | View | Developing a GIS Dashboard Tool to Inform Non-Profit Hospitals of Community Health Needs at the Neighborhood Level |
Copello, Smith, Mease, Umapathy, Richard, Knight, Albertie, Hamadi, Spaulding, Apatu
|
Zayed University | 2019 | View | Digital Transformation and Geospatial Analytics |
Abot, Ariyachandra
|
Zayed University | 2019 | View | Evaluating Evasion Attack Methods on Binary
Network Traffic Classifiers |
Shah, Gaston, Harvey, McNamara, Ramos, You, Alhajjar
|
Zayed University | 2019 | View | Examining Organizational Security Governance (OSG) Objectives: How is strategic planning for Security is undertaken at ABC Corporation? |
Mishra
|
Zayed University | 2019 | View | Exploring Strategies Computer Science Educators need to use to Prepare Machine-Learning Datasets for Predicting Dropout Rates in MOOCs |
Nafed, Lotfy, Sambasivam
|
Zayed University | 2019 | View | Game Theory Through Smartphone App Use In Support of For-Hire Transportation Network Companies |
Pendergrass
|
Zayed University | 2019 | View | Geographic Information System For and Against Gerrymandering
|
Wu, DePlato, Combs
|
Zayed University | 2019 | View | Improving Information Security Awareness one Faction at a Time |
Mutchler
|
Zayed University | 2019 | View | Infobesity: Do Facebook Users Actually Use Those Bookmarked Posts? |
Kim
|
Zayed University | 2019 | View | Knowledge Management System Development Approaches: Evolution or Stagnation? |
Mew, Money
|
Zayed University | 2019 | View | Literary Analysis Tool: Text Analytics for Creative Writers |
Grimsman, Kline, Vetter, Guinn
|
Zayed University | 2019 | View | Munging and liking it: wrangling patient time-related data with IPython |
Kunene
|
Zayed University | 2019 | View | Privacy Considerations Throughout the Data Life Cycle |
Pomykalski
|
Zayed University | 2019 | View | Project Management Skills
Needed for Mobile App Development |
McCoy
|
Zayed University | 2019 | View | Strategies Needed by Social Network Builders to Develop Information Privacy |
Azzouz, Sambasivam
|
Zayed University | 2019 | View | The Impact of Analytics Adoption on Team Performance in Professional Sports: A Longitudinal Analysis of the Lag in Observable Results |
Freeman
|
Zayed University | 2019 | View | The Use of Tainted Flows in Network Compression for Distributed Network Intrusion Detection |
Smith, Hammell II
|
Zayed University | 2019 | View | Trash to Treasure: Predicting Landfill Gas Flow to Optimize Electricity Generation |
Hassler, Emery, Hoyle, Cazier
|
Zayed University | 2019 | View | Understanding Campus Crime with a Multi-University Analytics System |
Iheadindu, Kline, Vetter, Clark
|
Zayed University | 2019 | View | Web Designer or Web Developer? A Detailed Comparison of Job Requirements |
Peslak
|
Zayed University | 2019 | View | Which Amazon Reviews Should You Read? |
Gokce, Kline, Vetter, Cummings
|
Zayed University | 2018 | View | A Machine Learning Approach to Optimizing Diabetes Healthcare Management Using SAS Analytic Suite |
Ajani, Habek
|
Zayed University | 2018 | View | Can Social Media Accounts Have an Impact on Hiring Decisions? Guidelines for Appropriate Use |
Kim, Homan
|
Zayed University | 2018 | View | Changes in the Information Technology Field: A Survey of Current Technologies and Future Importance
|
Cummings, Janicki
|
Zayed University | 2018 | View | Commercial Drone Activity: Security, Privacy, and Legislation Issues |
Vannoy, Medlin
|
Zayed University | 2018 | View | Delineating Legacy System IT Artifacts – Applying a Systems Thinking-based Framework |
Stachofsky
|
Zayed University | 2018 | View | Driving Distractions and Multi-tasking: An Investigative Study |
Choi, Xiong, Medlin
|
Zayed University | 2018 | View | Drone Delivery Services: An Evaluation of Personal Innovativeness, Opinion Passing and Key Information Technology Adoption Factors |
Chen, Choi, Charoen
|
Zayed University | 2018 | View | Effects of Normalization Techniques on Logistic Regression in Data Science |
Adeyemo, Wimmer, Powell
|
Zayed University | 2018 | View | ERP Rigidity and the Cloud Computing Effect |
Revenaugh, Schweigert
|
Zayed University | 2018 | View | Evaluation of Google Vision API for Object Detection in General Subject Images |
Schultz, Adams
|
Zayed University | 2018 | View | Geospatial Analytics: Why is Geographic Information Systems a Technology Critical to any Organization? |
Abot, Ariyachandra, Frolick
|
Zayed University | 2018 | View | Importance of Features in Adversarial Machine Learning for Cyber Security
|
De Lucia, Cotton
|
Zayed University | 2018 | View | Improve the Loyalty of Mobile Payment Users in China by Increasing the Fit between Skill, Technology and Task |
Chen, Choi, Xiong, Tang
|
Zayed University | 2018 | View | Privacy and Security Issues Associated with Mobile Dating Applications |
Hayes
|
Zayed University | 2018 | View | Standardizing Public Utility Data: A Case Study of a Rural Mid-Size Utility |
Hassler, Cazier, Russell, Mueller, Paprocki
|
Zayed University | 2018 | View | The use of Snap Length in Lossy Network Traffic Compression for Network Intrusion Detection Applications |
Smith, Hammell II
|
Zayed University | 2018 | View | Understanding Cyberstalking through the Analysis of Student's Online Activity |
Paullet, Chawdhry
|
Zayed University | 2018 | View | Using Twitter Sentiment Analysis to Analyze Self-Sentiment of the POTUS |
White, Wimmer, Rebman Jr., Nwankwo
|
Zayed University | 2018 | View | Where We are with Enterprise Architecture |
Halawi, McCarthy, farah
|
Zayed University | 2017 | View | A Business Multi-Case Study of Change Management in Software Implementation |
Holtel, Paddock, Reiter, Riley, Havelka
|
Zayed University | 2017 | View | A Review of Big Data Predictive Analytics in Information Systems Research
|
Ohiomah, Andreev, Benyoucef
|
Zayed University | 2017 | View | Aggregating Complementary and Contradictory Information for Military Decision Making |
Etesamipour, Hammell II
|
Zayed University | 2017 | View | An Exploratory Analysis of Gender Differences in IT Project Commitment, Continuation, and Escalation |
Korzaan, Harris, Brooks
|
Zayed University | 2017 | View | Blockchain Technology: Challenges and Opportunities |
Modaresnezhad, Cummings
|
Zayed University | 2017 | View | Cloud Computing: Implications for Information Systems Development Service Providers and Practitioners |
Mew, Money
|
Zayed University | 2017 | View | Does Your Beer Taste Like Big Data? |
Sirinanda, Ariyachandra, Frolick
|
Zayed University | 2017 | View | Exploratory Study of Organizational Adoption of Cloud based Big Data Analytics |
Ghosh
|
Zayed University | 2017 | View | Facebook Fanatics: A Linguistic and Sentiment Analysis of the Most “Fanned” Facebook Pages |
Peslak
|
Zayed University | 2017 | View | Geolocation Tracking and Privacy Issues Associated with the Uber Mobile Application |
Hayes, Snow, Altuwayjiri
|
Zayed University | 2017 | View | Information Security and Privacy Legislation:
Current State and Future Direction |
Dunlap, Cummings, Janicki
|
Zayed University | 2017 | View | Information Sharing Increases Drug Sample Inventory Management Efficiency in Healthcare Clinics: Evidence from a Quasi-Experiment |
Lang, Chahal
|
Zayed University | 2017 | View | IT Audit Literature: A Future-Looking Research Agenda
|
Klinkenborg, Streff, Nzailu
|
Zayed University | 2017 | View | Minimalism in Data Visualization: Perceptions of Beauty, Clarity, Effectiveness, and Simplicity |
Hill, Wray, Sibona
|
Zayed University | 2017 | View | Multitasking Behaviors: Distracted Driving Threats Beyond Texting |
Medlin, Choi, Xiong
|
Zayed University | 2017 | View | Open vs. Close Source Decision Tree Algorithms: Comparing Performance Measures of Accuracy, Sensitivity and Specificity |
Khan, Wimmer, Powell
|
Zayed University | 2017 | View | Phubbing: Communication in the Attention Economy |
Pendergrass
|
Zayed University | 2017 | View | Predictive Models for Apportioning 911 Fund |
Berghammer, Douglas, Corley, Chen
|
Zayed University | 2017 | View | Protecting IoT Devices from the Mirai Botnet |
Frank, Nance, Jarocki, Pauli
|
Zayed University | 2017 | View | Student Intentions and Behaviors Related to Email Security: An Application of the Health Belief Model |
Schymik, Du
|
Zayed University | 2017 | View | Text Messaging Today: A Longitudinal Study of Variables Influencing Text Messaging from 2009 to 2016 |
Peslak, Hunsinger, Kruck
|
Zayed University | 2017 | View | Towards a better understanding of the justification of choice of methods to be mixed in the same intervention during Action Design Research |
Petkov, Petkova
|
Zayed University | 2017 | View | Using Systems Analysis and Design to Enhance the Business Understanding Stage in CRISP-DM |
Pomykalski, Buzydlowski
|
Zayed University | 2017 | View | What’s “Appening” to our Privacy?
A Students Perspective on Downloading Mobile Apps
|
Paullet, Chawdhry, Douglas, Compomizzi
|
Zayed University | 2016 | View |
Location Analysis of Mina Site: One of the Most Crowded Areas at Hajj
|
alluhaidan, Alredhaiman
|
Zayed University | 2016 | View | 3D Printing: The Future Crime of the Present |
Fruehauf, Hartle, Al-Khalifa
|
Zayed University | 2016 | View | A Comprehensive Current Review of Text Messaging Usage |
Peslak, Ceccucci, Hunsinger, Kruck, Sendall
|
Zayed University | 2016 | View | A Multi-Criteria Network Assessment Model of IT Offshoring Risks from Service Provider’s Perspective
|
Petkov, Petkova
|
Zayed University | 2016 | View | A Simulation Modeling Approach to Improve JIT Implementation in a Highly Dynamic Manufacturing Environment |
Wray, Scott
|
Zayed University | 2016 | View | Achieving Effective Data Analytics: An Agile Framework |
Castro, Jain
|
Zayed University | 2016 | View | An Empirical Study on the Impact of Price Discount on Sales in Software-as-a-Service (SaaS) Market |
Choi, Medlin, Hunsinger
|
Zayed University | 2016 | View | An Interactive Toolbox for Twitter Content Analytics |
Jafar, Waldman
|
Zayed University | 2016 | View | Analysis of the Risks of NFC Mobile Payment Systems |
Kakish, Shah
|
Zayed University | 2016 | View | Are Students Using Security Measures to Protect their Data when Downloading Mobile Applications? |
Chawdhry, Paullet, Douglas, Compomizzi
|
Zayed University | 2016 | View | Building Client Vendor Alignment Capability in Strategic Information Systems Outsourcing |
Ghosh
|
Zayed University | 2016 | View | Causes of cyberbullying in multi-player online gaming environments: Gamer perceptions |
Cotler, Fryling, Rivituso
|
Zayed University | 2016 | View | Crowdsourcing Surveys: Alternative Approaches to Survey Collection |
Cummings, Sibona
|
Zayed University | 2016 | View | E-commerce Adoption: A Revelatory Case Study in the German Oncology Pharmaceutical Supply Chain |
Sultanow, Chircu, Chircu
|
Zayed University | 2016 | View | Evidence of Wikipedia usage during the school year: A numerical study |
Snyder
|
Zayed University | 2016 | View | Finding the “Radicalness” in Radical Innovation Adoption |
Sharma, Thomas, Konsynski
|
Zayed University | 2016 | View | Identifying the Critical Success Factors for Information Systems to Manage Sponsored Research Activities at Institutions of Higher Education |
Lehman, Ruzich
|
Zayed University | 2016 | View | Malvertising - A Rising Threat To The Online Ecosystem |
Dwyer, Kanguri
|
Zayed University | 2016 | View | Patient Healthcare Smart Card System: A Unified Medical Record for Access and Analytics |
Hussein, Ariyachandra, Frolick
|
Zayed University | 2016 | View | Principle Component Analysis for Feature Reduction and Data Preprocessing in Data Science |
Wimmer, Powell
|
Zayed University | 2016 | View | Proposal for Kelly Criterion-Inspired Lossy Network Compression for Network Intrusion Applications |
Smith, Hammell II
|
Zayed University | 2016 | View | Prototype to Production: A Case Study |
Fabbri
|
Zayed University | 2016 | View | Sentiment Analysis and Opinion Mining: Current State of the Art and Review of Google and Yahoo Search Engines’ Privacy Policies |
Peslak
|
Zayed University | 2016 | View | Subjective norm and measuring its impact on information security behavioral intention in organizations. |
Etezady
|
Zayed University | 2016 | View | System Analysis of the Infrastructure of an IT services provider |
Krishnappa, Kline
|
Zayed University | 2016 | View | The Effects of Perceived Functionality and Usability on Privacy and Security Concerns about Adopting Cloud Applications |
Nakayama, Chen, Taylor
|
Zayed University | 2016 | View | Understanding User Behavior on Pinterest: Findings and Insights |
Wei, Zhang
|
Zayed University | 2015 | View | A Comparison of Open Source Tools for Data Science |
Wimmer, Powell
|
Zayed University | 2015 | View | A Multi-National Study of Attitudes and Policies of Military Personnel about Smart Phone Applications |
Fruehauf, McCann, Al-Khalifa
|
Zayed University | 2015 | View | A Practice Based Examination of Standardization, and its Relationship with the Design and Use of Healthcare IS |
alsekait, Chakraborty
|
Zayed University | 2015 | View | An Expanded Analysis of Internet Dependencies by Demographic Variables |
Peslak
|
Zayed University | 2015 | View | An Optimized Intelligent Home Network Model |
Kevin, Ndlovu, Lall, Kogeda
|
Zayed University | 2015 | View | Assessing Cultural Aspects of Organizations for Knowledge Management Initiatives |
Fruehauf, Lehman
|
Zayed University | 2015 | View | Blurred Lines: Defining the Motives for Mobile and Social Media Use for Marketing Strategy |
Kim, Homan, Breese-Vitelli, Metzer
|
Zayed University | 2015 | View | Case Study: Can Interpersonal-Cultural Communication Sustain Another Innovation? |
Spangler , Breese, Borkovich
|
Zayed University | 2015 | View | CASE Tools’ Acceptance in Higher Education – Assessment and Enhanced UTAUT Model |
Marcinkowski, Wrycza
|
Zayed University | 2015 | View | Comparing the Prediction Capabilities of an Artificial Neural Network vs a Phenomenological Model for Predicting the Terminal Ballistics of Kinetic Energy Projectiles |
Auten, Hammell II
|
Zayed University | 2015 | View | Driving Inside Sales Performance with Lead Management Systems: A Conceptual Model |
Ohiomah, Benyoucef, Andreev
|
Zayed University | 2015 | View | Exploratory Study of Effects of eLearning System Acceptance on Learning Outcomes |
Ghosh
|
Zayed University | 2015 | View | Exploring Relationships between the Strategic Importance of IT and the Effectiveness of IT Security and Mobile Device Management |
Stanko, Sena, Sena
|
Zayed University | 2015 | View | Governance of Outsourcing: Building a Better Relationship |
Babin, Saunderson
|
Zayed University | 2015 | View | Information Technology in Patient Care: Challenges of using IT in Small Ambulatory Healthcare Organizations. |
Reddy
|
Zayed University | 2015 | View | Introducing A Change Resistance Factor in Knowledge Management Model: A Concentration in Organizational Culture |
Abaoud, alluhaidan
|
Zayed University | 2015 | View | Leakage of Geolocation Data by Mobile Ad Networks |
Snow, Hayes, Dwyer
|
Zayed University | 2015 | View | Moving Beyond Coding: Why Secure Coding Should be Implemented |
Grover, Cummings, Janicki
|
Zayed University | 2015 | View | Social Responsibility Trends and Perceptions in Global IT Outsourcing |
Babin, Myers
|
Zayed University | 2015 | View | Toward a Better Understanding of Factors Affecting Software Project Complexity |
Petkova, Petkov
|
Zayed University | 2015 | View | Utilizing Finite State Machines in the Classroom to Introduce Verified Software |
Finkbine
|
Zayed University | 2015 | View | Variation in Best-Case and Worst-Case Performance for Sorting Algorithms |
McMaster, Sambasivam, Rague, Wolthuis
|
Zayed University | 2014 | View | A Case Study Analysis of KnightSec and the Steubenville Rape Case |
Pendergrass, Wright
|
Zayed University | 2014 | View | A Case Study on Achieving Legitimation in Information Systems Action Research Projects |
Petkova, Petkov
|
Zayed University | 2014 | View | A Cloud Computing Methodology Study of Platform-as-a-Service (PaaS) in the Financial Industry |
Lawler, Howell-Barber, Joseph
|
Zayed University | 2014 | View | Aligning Information Systems strategy with the Business Strategy in a South African Banking Environment |
Kekwaletswe, Mathebula
|
Zayed University | 2014 | View | Are College Home Pages More Accessible? A Longitudinal Study of the Accessibility of United States College Home Pages |
Siegfried, Featherston
|
Zayed University | 2014 | View | Building a Better Stockbroker: Managing Big (Financial) Data by Constructing an Ontology-Based Framework |
Westrick, Du, Wolffe
|
Zayed University | 2014 | View | Cyber Security Best Practices: What to do? |
Kleinberg, Reinicke, Cummings
|
Zayed University | 2014 | View | Cyberbullying or normal game play? Impact of age, gender, and experience on cyberbullying in multi-player online gaming environments: Perceptions from one gaming forum |
Fryling, Cotler, Rivituso, Mathews, Pratico
|
Zayed University | 2014 | View | ERP Customization vs. Business Process Reengineering: Technical and Functional Perceptions |
Fryling
|
Zayed University | 2014 | View | Evaluating Information Security Practices, Knowledge, and Attitudes of Information Technology Student Workers |
Imboden, Martin, Woodward, Nehrkorn
|
Zayed University | 2014 | View | Identifying User Behavior from Residual Data in Cloud-based Synchronized Apps |
Grispos, Glisson, Pardue, Dickson
|
Zayed University | 2014 | View | Measuring Algorithm Performance With Java: Patterns of Variation |
McMaster, Sambasivam, Wolthuis
|
Zayed University | 2014 | View | On Adapting a Military Combat Discrete Event Simulation with Big Data and Geospatial Modeling Toward a Predictive Model Ecosystem for Interpersonal Violence |
Mhlanga, Perry, Kirchner
|
Zayed University | 2014 | View | Open Source Web Application Vulnerability Scanners: The Cost Effective Choice |
McQuade
|
Zayed University | 2014 | View | Review of Web Service Specifications for Long-running Conversations |
Rana, Umapathy
|
Zayed University | 2014 | View | Roadmaps and Maturity Models: |
Moore
|
Zayed University | 2014 | View | The Silent Treatment in IT Projects: Gender Differences in Inclinations to Communicate Project Status Information |
Korzaan, Brooks
|
Zayed University | 2014 | View | Use of Preventative Measures to Protect Data Privacy on Mobile Devices |
Pinchot, Paullet
|
Zayed University | 2013 | View | A Comparison of Software Testing Using the Object-Oriented Paradigm and Traditional Testing |
Gordon, Roggio
|
Zayed University | 2013 | View | A Study of Cloud Computing Infrastructure-as-a-Service (IaaS) in Financial Firms |
Lawler, Howell-Barber, Joseph, Narula
|
Zayed University | 2013 | View | A Study of Information Technology Operating and Capital Expenditures and Their Effect on Positive Firm Outcomes |
Peslak
|
Zayed University | 2013 | View | Bizprojet: The co-design of an affinities and skills search-engine. Team building around an innovative project: New knowledge shared? |
Lombardo, Agostinelli, Ouvrard, Arvanitakis, Metge, Linscott
|
Zayed University | 2013 | View | Can Social Media aid Software Development? |
Reinicke, Cummings
|
Zayed University | 2013 | View | Creating A Semantic Differential Scale For Measuring Users’ Perception and Attitude To Emerging Technologies |
Ajani, Stork
|
Zayed University | 2013 | View | Data Privacy: Are We Accidentally Sharing Too Much Information? |
Chawdhry, Paullet, Douglas
|
Zayed University | 2013 | View | Decision-Making via Visual Analysis using the Natural Language Toolkit and R |
Jafar, Babb, Dana
|
Zayed University | 2013 | View | Does File Sharing Lead to Legal Sales? Student Attitudes on Music Piracy |
Siegfried
|
Zayed University | 2013 | View | Feasibility of a Platform-as-a-Service Implementation using Cloud Computing for a Global Service Organization |
Gai, Steenkamp
|
Zayed University | 2013 | View | Information Security in Nonprofits: A First Glance at the State of Security in Two Illinois Regions |
Imboden, Phillips, Seib, Fiorentino
|
Zayed University | 2013 | View | Looking Backwards to Look Ahead: Lessons from Barcode Adoption for RFID Adoption and Implementation |
Sharma, Thomas
|
Zayed University | 2013 | View | Microsoft vs Apple: Which is Great by Choice? |
Sena, Olsen
|
Zayed University | 2013 | View | Online versus In-Store: Price Differentiation for Multi-Channel Retailers |
Flores, Sun
|
Zayed University | 2013 | View | Performance and Corporate Social Responsibility in the Information Technology Industry |
Cowan, Parzinger, Welch, Welch
|
Zayed University | 2013 | View | Predicting the Terminal Ballistics of Kinetic Energy Projectiles Using Artificial Neural Networks |
Auten, Hammell II
|
Zayed University | 2013 | View | Risk Assessment & Management in Merchant Capture Systems: A Threat Analysis Perspective |
Streff, Shrestha, Delzer
|
Zayed University | 2013 | View | Shifting Technological Landscape: IT Departments and Anticipated Technological Changes |
Cummings, Janicki, Kline
|
Zayed University | 2013 | View | Similarity and Ties in Social Networks |
Afrasiabi Rad, Benyoucef
|
Zayed University | 2013 | View | Software Engineering: accessing IT core concepts |
Davis, Kmetz
|
Zayed University | 2013 | View | Some Comparisons between SSM and the Activity Analysis and Development (ActAD) framework applied to IS development |
Petkova, Petkov
|
Zayed University | 2013 | View | Taxonomy of Common Software Testing Terminology: Framework for Key Software Engineering Testing Concepts |
Roggio, Gordon, Comer
|
Zayed University | 2013 | View | The De-Escalation of the DHS HSIN Next Gen Project |
Rosenhauer, Korzaan
|
Zayed University | 2013 | View | Web Recruitment: |
Parzinger, Ward, Langford
|
Zayed University | 2012 | View | A Framework for an Interactive Word-Cloud Ap-proach for Visual Analysis of Digital Text using NLTK |
Jafar, Babb, Dana
|
Zayed University | 2012 | View | A Portal-Based Web Service Development Using a Mashup Approach |
Miah, Debuse, Gammack, Pigott
|
Zayed University | 2012 | View | A Quantitative Analysis of Computing Jobs in 2012 |
Robin, Roggio
|
Zayed University | 2012 | View | A Study of Cloud Computing Software-as-a-Service (SaaS) in Financial Firms |
Lawler, Howell-Barber, Desai, Joseph
|
Zayed University | 2012 | View | Adding Social Features to E-commerce |
Huang, Yoon, Benyoucef
|
Zayed University | 2012 | View | An Examination of the Factors Influencing Student Usage of Dropbox, a File Hosting Service |
Hunsinger, Corley
|
Zayed University | 2012 | View | Analysis of Electronic Health |
Mitchell, Clark
|
Zayed University | 2012 | View | Analysis of the Variables That Affect Frequency of Use and Time Spent on Social Networking |
Peslak, Sendall, Ceccucci
|
Zayed University | 2012 | View | Building Baseline Preprocessed Common Data Sets for Multiple Follow-on Data Mining Algorithms |
Fowler, Hammell II
|
Zayed University | 2012 | View | Cloud Computing: Should I Stay or Should I Cloud? |
Muhleman, Kim, Homan, Breese
|
Zayed University | 2012 | View | Comparing Performance of Web Service Interaction Styles: SOAP vs. REST |
Kumar, Ahuja, Umapathy, Prodanoff
|
Zayed University | 2012 | View | Creating an Audio Conferencing Application |
Sun, Vetter, Reinicke
|
Zayed University | 2012 | View | Cybercrime: The Unintentional Effects of Oversharing Information on Facebook |
Paullet, Pinchot
|
Zayed University | 2012 | View | Do experiments using immersive and interactive 3D structures improve memorization? |
Lombardo, Angelini
|
Zayed University | 2012 | View | Early Stage Probabilistic Software Project Schedule Estimation |
Kwon, Hammell II
|
Zayed University | 2012 | View | Ethical Data Mining: An Obstacle or Opportunity for Loyalty Programs |
Smith, Burns
|
Zayed University | 2012 | View | ETL Evolution for Real-Time Data Warehousing |
Kakish, Kraft
|
Zayed University | 2012 | View | Evaluating the South African software industry as a key component for economic development using an Irish framework |
Dehinbo, Dehinbo
|
Zayed University | 2012 | View | Evolving Mobile Architectures: A Case Study in the Development of a Location Privacy Application |
Babb, Dana, Keith, Jafar
|
Zayed University | 2012 | View | Examining the Effects of the Value of Information on Intelligence Analyst Performance |
Newcomb, Hammell II
|
Zayed University | 2012 | View | Global Diffusion of Virtual Social Networks: A Pyramid Model |
Wang, Sun
|
Zayed University | 2012 | View | Information Security Blueprint |
Clark, Benli, Mitchell, Vetter
|
Zayed University | 2012 | View | Information Technology (IT) professional perceptions regarding the value of communication, collaboration, and the use of social networking technologies in the workplace: a case study |
Fryling, Trubitt
|
Zayed University | 2012 | View | Let’s Look at the Cloud from a Risk Management Perspective |
Vignos, Kim, Metzer
|
Zayed University | 2012 | View | Open Source Software Volunteerism vs. |
Carpenter
|
Zayed University | 2012 | View | Possible Lessons for the Field of Information Systems from the Work of Russel Ackoff |
Petkov, Petkova
|
Zayed University | 2012 | View | Readiness for Transitioning to ICD-10 Coding: |
Litton, Humphrey, Schwieger
|
Zayed University | 2012 | View | Rocky Relationships: Enterprise Resource Planning and Supply Chain Management |
Crumbly, Fryling
|
Zayed University | 2012 | View | Social Media: Building a Competitive Edge |
Aimiuwu
|
Zayed University | 2012 | View | The Adoption of Green IT/IS: |
Sharma
|
Zayed University | 2012 | View | The Deployment Pipeline |
Mikita, DeHondt, Nezlek
|
Zayed University | 2012 | View | The Impact of Intra-Organizational Social |
Cummings
|
Zayed University | 2012 | View | The Impact of Regulatory Changes on IS Strategy: An Exploratory Study |
Reinicke, Ward
|
Zayed University | 2012 | View | Traffic on the Information Super Highway -- Use vs. Useful? |
Grant, Middleton
|
Zayed University | 2012 | View | Using the Cloud: The Cost of Encryption in IaaS |
Cronin, Pauli, Ham
|
Zayed University | 2012 | View | Using the Layered Model to Understand Employee Selection of Information and Communication Channels for Information and Knowledge Sharing in Project Teams |
Lee-Partridge, Snyder
|
Zayed University | 2012 | View | Vicinities for Spatial Data Processing: |
Wu, Acharya
|
Zayed University | 2011 | View | An Approach for Developing Business Architecture, an Essential Enabler for Business and IT Alignment |
Li, Steenkamp
|
Zayed University | 2011 | View | Applying Business Intelligence Concepts to Medicaid Claim Fraud Detection |
Copeland, Edberg, Wendel
|
Zayed University | 2011 | View | Building a Real-Time Bus Tracking Data Display System |
Dudley, Vetter, Brown, Janicki
|
Zayed University | 2011 | View | CMobile: A Mobile Photo Capture Application for Construction Imaging |
Martin, Vetter, Brown, Janicki
|
Zayed University | 2011 | View | Co-Creating Value in Systems Development: A Shift towards Service-Dominant Logic |
Babb, Keith
|
Zayed University | 2011 | View | Computational Linguistic Hedges Applied to a Project Critical Path |
McQuighan, Hammell II
|
Zayed University | 2011 | View | Does Size Matter in IT? An exploratory analysis of critical issues facing organizations based on company size |
Peslak
|
Zayed University | 2011 | View | Maximizing Visibility in Skylines |
Miah
|
Zayed University | 2011 | View | Measuring Propagation in Online Social Networks: The case of YouTube |
Afrasiabi Rad, Benyoucef
|
Zayed University | 2011 | View | Mobile Telephone Usage and Perception During Group Meetings. |
Bajko
|
Zayed University | 2011 | View | Most Popular Package Design |
Miah
|
Zayed University | 2011 | View | On a Systemic Understanding of Software Development Contexts |
Petkov, Alter, Petkova
|
Zayed University | 2011 | View | Open Source Software in the Vertical Market: an Open Niche? |
Conlon
|
Zayed University | 2011 | View | Outsourcing Best Practices |
Mikita, DeHondt
|
Zayed University | 2011 | View | Pay-What-You-Want Pricing for Mobile Applications: The Effect of Privacy Assurances and Social Information |
Racherla, Keith, Babb
|
Zayed University | 2011 | View | Plan to Throw one Away: Lessons Learned |
Battig, Commo
|
Zayed University | 2011 | View | Semiotics as a Theoretical Foundation of Information Design |
Sharp
|
Zayed University | 2011 | View | Social Networking Systems and Campus Life |
Sgambato, Petkov, Wolf
|
Zayed University | 2011 | View | Study of User Behavior in Image Retrieval and Implications for Content Versus Concept Based Access |
Schultz
|
Zayed University | 2011 | View | Survey of Data Mining Methods in Emergency Evacuation Planning |
Miah
|
Zayed University | 2011 | View | Talk to Text: Changing Communication Patterns |
Pinchot, Douglas, Paullet, Rota
|
Zayed University | 2011 | View | The Effects of Interruptions on Remembering Task Information |
Lenox, Pilarski, Leathers
|
Zayed University | 2011 | View | The Era of Digital Activism |
Sivitanides, Shah
|
Zayed University | 2011 | View | The impact of Organizational Culture in managing the change to the use of FOSS at a South African University |
Dehinbo, Alexander
|
Zayed University | 2011 | View | The New Tech Effect: Analyzing Juror Credibility |
Davis, Paullet, Kraeer, Grant
|
Zayed University | 2011 | View | Using Market Basket Analysis to Estimate Potential Revenue Increases for a Small University Bookstore |
Hoanca, Mock
|
Zayed University | 2011 | View | Using the cloud: How to keep your data private |
Cronin, Pauli, Ham
|
Zayed University | 2011 | View | Visualizing Capacity and Load: A Production Planning Information System for Metal Ingot Casting |
Wu, Acharya
|
Zayed University | 2011 | View | Why are People Using Google's |
Corley, Hunsinger
|
Zayed University | 2010 | View | A Methodology Tailoring Model for Practitioner Based Information Systems Development Informed by the Principles of General Systems Theory |
Burns, Deek
|
Zayed University | 2010 | View | A Model for Understanding Social Commerce |
Afrasiabi Rad, Benyoucef
|
Zayed University | 2010 | View | A Process for Assessing Voting System Risk Using Threat Trees |
Yasinisac, Pardue
|
Zayed University | 2010 | View | A Study of Information Technology Integration |
Peslak
|
Zayed University | 2010 | View | An Empirical Study of Social Networking Behavior Using Diffusion of Innovation Theory |
Ceccucci, Peslak, Sendall
|
Zayed University | 2010 | View | Creating a Framework for Research on Virtual Organizations |
Reinicke
|
Zayed University | 2010 | View | Development of an Evaluation Model for XBRL-enabled Tools Intended for Investors |
Clements, Schwieger, Surendran
|
Zayed University | 2010 | View | How Mobile Technology is Changing Our Culture |
Pinchot, Paullet, Rota
|
Zayed University | 2010 | View | Make or Buy: A comparative assessment of organizations that develop software internally versus those that purchase software |
Sena, Sena
|
Zayed University | 2010 | View | NATIS: Novel Architecture Framework for |
Sambasivam, Liang, Liao
|
Zayed University | 2010 | View | On Conceptual Models of Collaborative Partnerships and the Infusion of Knowledge Workers in the Local IT Sector |
Vardiman, Mhlanga
|
Zayed University | 2010 | View | On the utility of HCI practices in improving a commercial information retrieval system |
Honeycutt, Kolpack, Honeycutt, Talbert
|
Zayed University | 2010 | View | Password Security Risk versus Effort: An Exploratory Study on User-Perceived Risk and the Intention to Use Online Applications |
Gebauer, Kline, He
|
Zayed University | 2010 | View | Seniors and Social Networking |
Lewis, Ariyachandra
|
Zayed University | 2010 | View | The Potential Reality of Service-Oriented Architecture (SOA) in a Cloud Computing Strategy |
Lawler
|
Zayed University | 2010 | View | The Use of Mobile Units |
McGinley, Nicolai
|
Zayed University | 2010 | View | What Influences People to Use Linux? |
Hunsinger, Fransen
|
Zayed University | 2010 | View | What is Missing From the Current Disaster Model |
Bilow, Nicolai
|
Zayed University | 2009 | View | A Conceptual Model of Knowledge Elicitation |
Sagheb-Tehrani
|
Zayed University | 2009 | View | A FOLLOW-UP STUDY OF DETECTING PHISHING EMAILS |
Bekkering, Werner, Hutchison
|
Zayed University | 2009 | View | A Study of the Perceptions of Students on |
Lawler, Molluzzo
|
Zayed University | 2009 | View | An Empirical Study of Text Messaging |
Peslak, Ceccucci, Sendall
|
Zayed University | 2009 | View | An Exploratory Study of Relationships between Workforce Characteristics and the Use of Collaboration and Social Networking Tools in a Global Tchnology Firm |
Totterdale
|
Zayed University | 2009 | View | An Ontological Characterization of the ‘Structured Information Flow’ (SIF) Model |
Bhatia, Arthur
|
Zayed University | 2009 | View | Analyzing Community Websites: A Main Street Perspective |
Schoenacher
|
Zayed University | 2009 | View | Business Requirements Knowledge Management Ontology to Support a Software Deployment Process |
Steenkamp, Alomari
|
Zayed University | 2009 | View | Can Management Predict Information Security Threats by Utilizing a Data Warehouse? |
Kim, Steen
|
Zayed University | 2009 | View | Component-Based Software Development: Life Cycles and Design Science-Based Recommendations |
Sharp, Ryan
|
Zayed University | 2009 | View | Contingency Planning: Disaster Recovery Strategies for Successful Educational Continuity |
Omar, Udeh, Mantha
|
Zayed University | 2009 | View | Difficulties in quantifying IT projects |
Oliver, Janicki, Barrick
|
Zayed University | 2009 | View | E-Commerce Security |
Kraft
|
Zayed University | 2009 | View | Elements of Technology and Success in Virtual Teams |
Balazs, White
|
Zayed University | 2009 | View | Ethic and Moral Implications of Affective Computing |
Steen
|
Zayed University | 2009 | View | Factors that Persuade and Deter Membership in Professional Computing Associations |
Umapathy, Jamba, Ritzhaupt
|
Zayed University | 2009 | View | Knowledge Mapping in a Not-For-Profit Firm: A Case Study |
Nelson, Woratschek
|
Zayed University | 2009 | View | Object Reuse and Integration |
Wang
|
Zayed University | 2009 | View | ON DESIGN SCIENCE, MCDM AND IS OUTSOURCING DECISIONS |
Petkov, Petkova
|
Zayed University | 2009 | View | Results of Implementing a Knowledge Management Initiative to Enhance Network Access Controls |
Kim, Nelson
|
Zayed University | 2009 | View | Some Observations on the Occurrences of Data Breaches |
Guerra, Joseph, Ramirez, Koong, Liu
|
Zayed University | 2009 | View | Some Observations on the Occurrences of Phishing |
Lara, Rios, Salazar, Koong, Liu
|
Zayed University | 2009 | View | Spatial Interpolation for a Wireless Sensor Network of Chemical Point Detectors: Preliminary Results |
Schafer, Hammell II
|
Zayed University | 2009 | View | Spyware: What Influences College Students to Use Anti-Spyware Tools? |
Ward, Hunsinger
|
Zayed University | 2009 | View | Superfund Site Analysis Using Web 2.0 Technologies |
Anderson, Jafar, Rogers
|
Zayed University | 2009 | View | Sustainability and Greening through |
D'Onofrio, Jarmoszko, Lee-Partridge, Petkova
|
Zayed University | 2009 | View | Synchronizing Development Life-Cycles: Rationale and Integrative Approach to Construction of eLearning Systems and Online Courses at a Tier 1 Research Institution |
Conn, Macedo, Meese
|
Zayed University | 2009 | View | The Effect of Gender on the Application of |
Peslak, Krisanda
|
Zayed University | 2009 | View | The Impact of Electronic Data Interchange Information Technology on External Auditors |
Ricks, Schwieger, Henry, Almohsen
|
Zayed University | 2009 | View | The Impact of Transition Costs on Offshore Systems Development |
DeHondt, Leidig
|
Zayed University | 2009 | View | THE RELATIONSHIP BETWEEN INFORMATION TECHNOLOGY CRITICAL SUCCESS FACTORS AND PROJECT PERFORMANCE |
Lind, Culler
|
Zayed University | 2009 | View | The Two Leading Freeware Image Editing Applications – An Overview, Comparative Evaluation and Guide for the IS Community |
Scher
|
Zayed University | 2009 | View | Towards an Abstract Model for |
Mhlanga, Vardiman, Reames
|
Zayed University | 2009 | View | USING A GROUP SUPPORT SYSTEM |
Nepal, Petkov
|
Zayed University | 2009 | View | Virtual Organizations: A Definitional Framework |
Reinicke
|
Zayed University | 2009 | View | Women's Technology Acceptance of Mentoring on the Internet |
Gibson, GIBSON
|
Zayed University | 2009 | View | Workflow Automation and Management Services in Web 2.0: An Object-Based Approach to Distributed Workflow Enactment |
Wu
|
Zayed University | 2008 | View | A Computing Research Example: Following a Question |
Frank
|
Zayed University | 2008 | View | A STUDY OF THE INFORMATION TECHNOLOGY TRADE BETWEEN THE UNITED STATES AND ASIA PACIFIC ECONOMIES COOPERATION NATIONS |
Roman, Blakely, Koong, Liu
|
Zayed University | 2008 | View | A Study of the Information Technology Trade between The United States and the Dominican Republic-Central America Free Trade Agreement Nations |
Pena, Aguirre, Saenz, Koong, Liu
|
Zayed University | 2008 | View | A STUDY OF THE INFORMATION TECHNOLOGY TRADE BETWEEN UNITED STATES AND THE SOUTHERN AFRICAN CUSTOM UNION |
Saenz, Flores, Koong, Liu
|
Zayed University | 2008 | View | An Empirical Study of Instant Messaging Behavior Using Diffusion of Innovation Theory |
Peslak, Ceccucci, Sendall
|
Zayed University | 2008 | View | An Examination of Information Security in Mobile Banking Architectures |
Streff, Haar
|
Zayed University | 2008 | View | An Information Technology Project Funding Process |
Kline, Renninger, Guinn, Sackley, Scott
|
Zayed University | 2008 | View | Analysis of the Factors that Influence Online Purchasing |
Amoroso, Hunsinger
|
Zayed University | 2008 | View | Anticipated changes to technologies |
Janicki, Clark, Mahar, Logan
|
Zayed University | 2008 | View | Assessing the Role of CSR in Outsourcing Decisions |
Babin
|
Zayed University | 2008 | View | Comparison of Dynamic Web Content Processing Languages Performance |
Jafar, Anderson, Abdullat
|
Zayed University | 2008 | View | Computing Professional Association Membership: An Exploration of Membership Needs and Motivations |
Ritzhaupt, Umapathy, Jamba
|
Zayed University | 2008 | View | Creating the Pilot AJAX Enabled Query Tool |
Ford, Dollinger
|
Zayed University | 2008 | View | Determining Information Technology Project Status using Recognition-primed Decision Making enabled Collaborative Agents Simulating Teamwork (R-CAST) |
Barnes, Hammell II
|
Zayed University | 2008 | View | Factors Driving Handheld Wireless Media Usage |
Lind, Anyansi-Archibong, Anyansi
|
Zayed University | 2008 | View | Formal Information Security Standards in Medium Enterprises |
Sambasivam, Kluge
|
Zayed University | 2008 | View | Incorporation of Information Technology into Assisted Health Care: An empirical study |
Merrill, White
|
Zayed University | 2008 | View | Knowledge Discovery and Data Mining of Biomedical Data with Decision Trees |
McClelland
|
Zayed University | 2008 | View | Planning and Implementation of an ERP system in a University in USA: Some Insights and Guidelines |
Somarajan, Weber, Surendran
|
Zayed University | 2008 | View | Research Design for a Natural Disaster Management Communication System: |
Nicolai, Puntillo, Bilow
|
Zayed University | 2008 | View | Some Suggestions for Further Diffusion of Work System Method Ideas in Systems Analysis and Design |
Petkov, Misra, Petkova
|
Zayed University | 2008 | View | SYSTEM DEVELOPMENT METHODOLOGY USAGE IN INDUSTRY: A REVIEW AND ANALYSIS |
Griffin, Brandyberry
|
Zayed University | 2008 | View | Teaching Knowledge Management (KM) in Criminal Justice Education: The Influence of Information Systems |
Conn, Thies
|
Zayed University | 2008 | View | Test Driven Development in the .Net Framework |
Lee, Mehta, Shah
|
Zayed University | 2008 | View | The Accessibility of College and University Home Pages in the State of New York |
DiLallo, Siegfried
|
Zayed University | 2008 | View | The Impact of Technology Diffusion on Employment and Compensation: Evidence from the Telecommunications Sector |
Clark, Moussawi
|
Zayed University | 2008 | View | The Importance of Business Process Alignment |
Kraft
|