Search by Institutions

Search returned 388 items for : Z


InstitutionConf YearArticleTitleAuthors
Zayed University2022ViewA Predictive Unmanned Aerial Vehicle Maintenance Method: Using Low-Code and Cloud-Based Data Visualization Kim, Chung, Ju, Maeng
Zayed University2022ViewA Serverless Real-Time Data Streaming Architecture for Synchronous Online Math Competition Liu, Chung
Zayed University2022ViewAn Exploration of the Benefits of Certifications and their Relationship to Salaries in IS/IT Matthews, Cummings, Janicki
Zayed University2022ViewAre Companies Responsible for Internet of Things (IoT) Data Privacy? A Survey of IoT User Perceptions Paullet, Pinchot, Chawdhry
Zayed University2022ViewBig Data Analytics in Supply Chain Management: A Review and Recommendations Ouyang, Hwang, Cham, Chen
Zayed University2022ViewChildren's Privacy: An Evaluation of EdTech Privacy Policies West
Zayed University2022ViewClassification of Wolf Subjects Based on Hunting-Stressed Physiological Effects Using Support Vector Machines (SVM) Stewart, Davis
Zayed University2022ViewConvolutional Neural Network Binary Image Classifier via Mobile Devices: EZ Autism Screener Ata, Chung, Maeng
Zayed University2022ViewData Analytics for Societal Challenges: Understanding Student Participation in the National School Lunch Program Northey, Desai
Zayed University2022ViewDecision-Making Tool for Procurement for Brazilian Airlines Torres, Halawi, Rojas, Bico, Marinho
Zayed University2022ViewDeveloping a Data-Driven Emerging Skill Network Analytics Framework for Automated Employment Advert Evaluation Liu, Schwieger
Zayed University2022ViewExploring Methods Cybersecurity Managers Need to Implement to Minimize Cyber-Frauds in Mobile Money Services in Ghana Sambasivam, Siaw Afriyie
Zayed University2022ViewExploring Short Stay Health Care Quality: Skilled Nursing Facilities during the COVID-19 Era Winston, Xiong, Medlin, Pelaez
Zayed University2022ViewExploring the Strategic Cybersecurity Defense Information Technology Managers Can Implement to Reduce Healthcare Data Breaches Mawel, Sambasivam
Zayed University2022ViewImpact of New Technology Use on Workforce: Exploratory Analysis Toskin
Zayed University2022ViewInfluence of Executive Perception of Role of Information Technology: A financial institution perspective Pandey, Mishra
Zayed University2022ViewMeasurement, reporting, and monitoring organizational security governance: A qualitative analysis of security professionals’ experiences Slonka, Mishra, Draus, Bromall
Zayed University2022ViewMeasuring Analytics Maturity and Culture: The LDIS+™ Analytics Impact Framework Fowler, Sambasivam
Zayed University2022ViewQR Code Hacking – Detecting Multiple Vulnerabilities in Android Scanning Software Homan, Breese
Zayed University2022ViewSmart Homes Privacy Metrics Etezady
Zayed University2022ViewText Prediction Using Artificial Intelligence: An Analysis of Two Text Prediction Systems Wimmer, Du, Heri
Zayed University2022ViewThe Effect of Mental Illness on Compensation for IT Developers Peslak, Ceccucci, Jones, Leonard
Zayed University2022ViewThe Effects of Individual Characteristics and Mastery Goal Orientation on IT Project Continuation Intentions Totty, Zaza, Greer, Korzaan
Zayed University2022ViewThe Importance and Value of Personal Identifying Information: Towards Information Worth Kaleta, Mahadevan, Thackston
Zayed University2022ViewUnderstanding Gen Z’s Switching Intention to E-Commerce Drone Delivery: An Updated Diffusion of Innovation Kaleta, Xie, Chen
Zayed University2022ViewVisual Layering and Visual Clustering – A Model of Graph Complexity for Business Data Chen, Zhang
Zayed University2022ViewVulnerability Assessment for Web Applications Garcia, Abraham, Kepic, Cankaya
Zayed University2021View Selecting Subsets of Amazon Reviews Gokce, Kline, Cummings, Vetter
Zayed University2021View Examining Cloud Data Security Vulnerabilities During Usage Sambasivam, Amoah
Zayed University2021ViewA Cloud-Based System for Scraping Data from Amazon Product Reviews at Scale Woodall, Kline, Vetter, Modaresnezhad
Zayed University2021ViewAn Initial Exploration of Multi-Node Open Cloud Infrastructure Testbed Liu, Lui, Li, Embuldeniya, Garcia, McAllister, Schwieger
Zayed University2021ViewAugmented Reality & Artificial Intelligence Model: Optimizing Workforce Diversity Aimiuwu
Zayed University2021ViewBarriers and Drivers to Adoption of Electronic Health Record Systems Du, Sturgill
Zayed University2021ViewCombating Private Blockchain Fraud: A Virtual Reality & Artificial Intelligence Model Aimiuwu
Zayed University2021ViewCybersecurity Maturity Model Certification Initial Impact on the Defense Industrial Base Strohmier, Stoker, Vanajakumari, Clark, Cummings, Modaresnezhad
Zayed University2021ViewData Sharing and Exposure: Findings from Descriptive and Network Analysis of Instant Games on Facebook Nicholson, Chakraborty, Ali-Gombe, Hammell II
Zayed University2021ViewDecreasing the Barrier to Entry for an Open-Source Full-Stack Web Development Ngo, Chung, Chang
Zayed University2021ViewEffect of Normalization on TOPSIS and Fuzzy TOPSIS Sarraf, McGuire
Zayed University2021ViewGIS for Democracy: Toward A Solution Against Gerrymandering Wu, Igoche
Zayed University2021ViewHarvesting Intrinsically Verifiable Trust to Build a Honey Traceability System for Sustainable Development Runzel, Hassler, Hadley, Ratcliffe, Wilkes, Cazier
Zayed University2021ViewImpact of Review Valence and Perceived Uncertainty on Purchase of Time-Constrained and Discounted Search Goods Muzumdar
Zayed University2021ViewInnovation Attributes as Determinants of the Application of Artificial Intelligence: A Proposed Study Iwuanyanwu, Igoche
Zayed University2021ViewInternationalization and Localization for Web and Mobile Applications Wang, Chung, Yoon
Zayed University2021ViewLow Maintenance, Low Cost, Highly Secure, and Highly Manageable Serverless Solutions for Software Reverse Engineering Nguyen, Chung
Zayed University2021ViewMental Health Call Triage: Coding Systems and Opportunities for Research Hashmi, Thomas, Nandan
Zayed University2021ViewResolving Pressure and Stress on Governance Models from Robotic Process Automation Technologies Money
Zayed University2021ViewSecurity Control Techniques: Cybersecurity & Medical Wearable Devices Sambasivam, Deal
Zayed University2021ViewSome Analysis of Common Vulnerabilities and Exposures (CVE) Data from the National Vulnerability Database (NVD) Glyder, Stoker, Threatt, Franks, Adams
Zayed University2021ViewTargeted Data Visualization and Reporting Approaches for Vulnerability Management at Enterprise Organizations Painter
Zayed University2021ViewThe COVID Effect: Information Technology Jobs in the Pandemic Sendall, Peslak, Ceccucci, Hunsinger
Zayed University2021ViewUsing Analytics to understand Performance and Wellness for a Women’s College Soccer Team Njunge, Witman, Holmberg, Canacoo
Zayed University2021ViewUsing Physiological Effects and K-Nearest Neighbor to Identify Membership in Hunting-Stressed Wolf Populations Stewart, Davis, Igoche
Zayed University2020ViewA Comparative Study on Information Technology (IT) Infrastructure and Disaster Recovery Methodology Sambasivam, Brown Jr
Zayed University2020ViewA Prototype for Distributed Computing Platform using Smartphones Wagner, Cao
Zayed University2020ViewAgile Project Management: Project managers' perspective Sanchez-Morcilio, Quiles-Torres, Aparicio-Carrasco
Zayed University2020ViewAn International Review and Study on Perceptions of Security, Adoption, and Implementation of Electronic Health Records Aliyu, Wimmer, Powell, Rebman Jr.
Zayed University2020ViewAnalysis of Security Features and Vulnerabilities in Public/Open Wi-Fi James
Zayed University2020ViewCase Study of Blockchain Applications in Supply Chain Management- Opportunities and Challenges Smith, Xiong, Medlin
Zayed University2020ViewDecision-Making Model Transparency for SaMD Machine Learning Algorithms Woodside
Zayed University2020ViewDocumenting the Process of Hijacking a Raspberry Pi User Login Credentials via Remote Code Execution Patel, Wimmer, Powell
Zayed University2020ViewDoes the Executive Perception of the Value of Information Technology (IT) Influence the IT strategy? A Case Study Pandey, Mishra
Zayed University2020ViewEnhancing Learning Analytics: The Rise of Institutional Research Perkins, Ariyachandra
Zayed University2020ViewEnterprise Architecture Transformation Process from a Federal Government Perspective Canada, Halawi
Zayed University2020ViewExploring Sentiment Towards Contact Tracing Crable, Sena
Zayed University2020ViewIntegration of Information Systems: Robotic Process Automation Money
Zayed University2020ViewInternet of Things (IoT): An Analysis of the Research Jourdan, Corley, Ryan, Anderson
Zayed University2020ViewInterpreting Organizational Security Governance Objectives for Strategic Security Planning Mishra
Zayed University2020ViewJob and Career Satisfaction of Software Engineers Peslak, Ceccucci, Sendall
Zayed University2020ViewLeader-Driven Supply Chain Cybersecurity Framework Vanajakumari, Mittal, Stoker, Clark, Miller
Zayed University2020ViewOpen Source Software: A Detailed Analysis of Contributions and Quality Peslak, Hunsinger
Zayed University2020ViewPredicting Soil Conditions Using Machine Learning Algorithms Gondi, Hua, Bajracharya
Zayed University2020ViewPrivacy Concerns and Data Sharing Habits of Personal Fitness Information Collected via Activity Trackers Pinchot, Cellante
Zayed University2020ViewSpatial Data Analytics For The Pandemic Wu, Igoche
Zayed University2020ViewThe New Frontier in Home and Commercial Deliveries: Drones Fowler, Vannoy, Eggers, Medlin
Zayed University2020ViewThe Sting of Adoption: The Technology Acceptance Model (TAM) with Actual Usage in a Hazardous Environment Hassler, MacDonald, Cazier, Wilkes
Zayed University2019ViewA Comparative Study on Common Errors in Rules Governing Complex Event Processing Systems Dennis, Sambasivam
Zayed University2019ViewA Longitudinal Study of Google Privacy Policies Peslak, Kovalchick, Conforti
Zayed University2019ViewA Neural Networks Primer For USMA Cadets Alhajjar
Zayed University2019ViewAddressing issues with EMR resulting in workarounds: An exploratory study Mishra, Slonka, Draus, Bromall, Slonka
Zayed University2019ViewAn Empirical Study of Post-Production Software Code Quality When Employing the Agile Rapid Delivery Methodology Poe, Seeman
Zayed University2019ViewAn Exploratory Study of the Perceptions of Library Faculty and Patrons on Library Resources Herman, Wimmer, Rebman Jr.
Zayed University2019ViewAnalyzing Drug Overdoses in a Community Using R Gondi
Zayed University2019ViewBig Data, Algorithmic Classification, and False Positives: Consequences for Information Privacy Lauer
Zayed University2019ViewConceptualization of Blockchain-based Applications: Technical Background and Social Perspective Xiong, Tang, Medlin
Zayed University2019ViewDetection and Analysis of Hard Landing and Near Miss based on Cessna 172G Flight Data and Utilization of Flight Data Monitoring Sorab
Zayed University2019ViewDeveloping a GIS Dashboard Tool to Inform Non-Profit Hospitals of Community Health Needs at the Neighborhood Level Copello, Smith, Mease, Umapathy, Richard, Knight, Albertie, Hamadi, Spaulding, Apatu
Zayed University2019ViewDigital Transformation and Geospatial Analytics Abot, Ariyachandra
Zayed University2019ViewEvaluating Evasion Attack Methods on Binary Network Traffic Classifiers Shah, Gaston, Harvey, McNamara, Ramos, You, Alhajjar
Zayed University2019ViewExamining Organizational Security Governance (OSG) Objectives: How is strategic planning for Security is undertaken at ABC Corporation? Mishra
Zayed University2019ViewExploring Strategies Computer Science Educators need to use to Prepare Machine-Learning Datasets for Predicting Dropout Rates in MOOCs Nafed, Lotfy, Sambasivam
Zayed University2019ViewGame Theory Through Smartphone App Use In Support of For-Hire Transportation Network Companies Pendergrass
Zayed University2019ViewGeographic Information System For and Against Gerrymandering Wu, DePlato, Combs
Zayed University2019ViewImproving Information Security Awareness one Faction at a Time Mutchler
Zayed University2019ViewInfobesity: Do Facebook Users Actually Use Those Bookmarked Posts? Kim
Zayed University2019ViewKnowledge Management System Development Approaches: Evolution or Stagnation? Mew, Money
Zayed University2019ViewLiterary Analysis Tool: Text Analytics for Creative Writers Grimsman, Kline, Vetter, Guinn
Zayed University2019ViewMunging and liking it: wrangling patient time-related data with IPython Kunene
Zayed University2019ViewPrivacy Considerations Throughout the Data Life Cycle Pomykalski
Zayed University2019ViewProject Management Skills Needed for Mobile App Development McCoy
Zayed University2019ViewStrategies Needed by Social Network Builders to Develop Information Privacy Azzouz, Sambasivam
Zayed University2019ViewThe Impact of Analytics Adoption on Team Performance in Professional Sports: A Longitudinal Analysis of the Lag in Observable Results Freeman
Zayed University2019ViewThe Use of Tainted Flows in Network Compression for Distributed Network Intrusion Detection Smith, Hammell II
Zayed University2019ViewTrash to Treasure: Predicting Landfill Gas Flow to Optimize Electricity Generation Hassler, Emery, Hoyle, Cazier
Zayed University2019ViewUnderstanding Campus Crime with a Multi-University Analytics System Iheadindu, Kline, Vetter, Clark
Zayed University2019ViewWeb Designer or Web Developer? A Detailed Comparison of Job Requirements Peslak
Zayed University2019ViewWhich Amazon Reviews Should You Read? Gokce, Kline, Vetter, Cummings
Zayed University2018ViewA Machine Learning Approach to Optimizing Diabetes Healthcare Management Using SAS Analytic Suite Ajani, Habek
Zayed University2018ViewCan Social Media Accounts Have an Impact on Hiring Decisions? Guidelines for Appropriate Use Kim, Homan
Zayed University2018ViewChanges in the Information Technology Field: A Survey of Current Technologies and Future Importance Cummings, Janicki
Zayed University2018ViewCommercial Drone Activity: Security, Privacy, and Legislation Issues Vannoy, Medlin
Zayed University2018ViewDelineating Legacy System IT Artifacts – Applying a Systems Thinking-based Framework Stachofsky
Zayed University2018ViewDriving Distractions and Multi-tasking: An Investigative Study Choi, Xiong, Medlin
Zayed University2018ViewDrone Delivery Services: An Evaluation of Personal Innovativeness, Opinion Passing and Key Information Technology Adoption Factors Chen, Choi, Charoen
Zayed University2018ViewEffects of Normalization Techniques on Logistic Regression in Data Science Adeyemo, Wimmer, Powell
Zayed University2018ViewERP Rigidity and the Cloud Computing Effect Revenaugh, Schweigert
Zayed University2018ViewEvaluation of Google Vision API for Object Detection in General Subject Images Schultz, Adams
Zayed University2018ViewGeospatial Analytics: Why is Geographic Information Systems a Technology Critical to any Organization? Abot, Ariyachandra, Frolick
Zayed University2018ViewImportance of Features in Adversarial Machine Learning for Cyber Security De Lucia, Cotton
Zayed University2018ViewImprove the Loyalty of Mobile Payment Users in China by Increasing the Fit between Skill, Technology and Task Chen, Choi, Xiong, Tang
Zayed University2018ViewPrivacy and Security Issues Associated with Mobile Dating Applications Hayes
Zayed University2018ViewStandardizing Public Utility Data: A Case Study of a Rural Mid-Size Utility Hassler, Cazier, Russell, Mueller, Paprocki
Zayed University2018ViewThe use of Snap Length in Lossy Network Traffic Compression for Network Intrusion Detection Applications Smith, Hammell II
Zayed University2018ViewUnderstanding Cyberstalking through the Analysis of Student's Online Activity Paullet, Chawdhry
Zayed University2018ViewUsing Twitter Sentiment Analysis to Analyze Self-Sentiment of the POTUS White, Wimmer, Rebman Jr., Nwankwo
Zayed University2018ViewWhere We are with Enterprise Architecture Halawi, McCarthy, farah
Zayed University2017ViewA Business Multi-Case Study of Change Management in Software Implementation Holtel, Paddock, Reiter, Riley, Havelka
Zayed University2017ViewA Review of Big Data Predictive Analytics in Information Systems Research Ohiomah, Andreev, Benyoucef
Zayed University2017ViewAggregating Complementary and Contradictory Information for Military Decision Making Etesamipour, Hammell II
Zayed University2017ViewAn Exploratory Analysis of Gender Differences in IT Project Commitment, Continuation, and Escalation Korzaan, Harris, Brooks
Zayed University2017ViewBlockchain Technology: Challenges and Opportunities Modaresnezhad, Cummings
Zayed University2017ViewCloud Computing: Implications for Information Systems Development Service Providers and Practitioners Mew, Money
Zayed University2017ViewDoes Your Beer Taste Like Big Data? Sirinanda, Ariyachandra, Frolick
Zayed University2017ViewExploratory Study of Organizational Adoption of Cloud based Big Data Analytics Ghosh
Zayed University2017ViewFacebook Fanatics: A Linguistic and Sentiment Analysis of the Most “Fanned” Facebook Pages Peslak
Zayed University2017ViewGeolocation Tracking and Privacy Issues Associated with the Uber Mobile Application Hayes, Snow, Altuwayjiri
Zayed University2017ViewInformation Security and Privacy Legislation: Current State and Future Direction Dunlap, Cummings, Janicki
Zayed University2017ViewInformation Sharing Increases Drug Sample Inventory Management Efficiency in Healthcare Clinics: Evidence from a Quasi-Experiment Lang, Chahal
Zayed University2017ViewIT Audit Literature: A Future-Looking Research Agenda Klinkenborg, Streff, Nzailu
Zayed University2017ViewMinimalism in Data Visualization: Perceptions of Beauty, Clarity, Effectiveness, and Simplicity Hill, Wray, Sibona
Zayed University2017ViewMultitasking Behaviors: Distracted Driving Threats Beyond Texting Medlin, Choi, Xiong
Zayed University2017ViewOpen vs. Close Source Decision Tree Algorithms: Comparing Performance Measures of Accuracy, Sensitivity and Specificity Khan, Wimmer, Powell
Zayed University2017ViewPhubbing: Communication in the Attention Economy Pendergrass
Zayed University2017ViewPredictive Models for Apportioning 911 Fund Berghammer, Douglas, Corley, Chen
Zayed University2017ViewProtecting IoT Devices from the Mirai Botnet Frank, Nance, Jarocki, Pauli
Zayed University2017ViewStudent Intentions and Behaviors Related to Email Security: An Application of the Health Belief Model Schymik, Du
Zayed University2017ViewText Messaging Today: A Longitudinal Study of Variables Influencing Text Messaging from 2009 to 2016 Peslak, Hunsinger, Kruck
Zayed University2017ViewTowards a better understanding of the justification of choice of methods to be mixed in the same intervention during Action Design Research Petkov, Petkova
Zayed University2017ViewUsing Systems Analysis and Design to Enhance the Business Understanding Stage in CRISP-DM Pomykalski, Buzydlowski
Zayed University2017ViewWhat’s “Appening” to our Privacy? A Students Perspective on Downloading Mobile Apps Paullet, Chawdhry, Douglas, Compomizzi
Zayed University2016View Location Analysis of Mina Site: One of the Most Crowded Areas at Hajj alluhaidan, Alredhaiman
Zayed University2016View3D Printing: The Future Crime of the Present Fruehauf, Hartle, Al-Khalifa
Zayed University2016ViewA Comprehensive Current Review of Text Messaging Usage Peslak, Ceccucci, Hunsinger, Kruck, Sendall
Zayed University2016ViewA Multi-Criteria Network Assessment Model of IT Offshoring Risks from Service Provider’s Perspective Petkov, Petkova
Zayed University2016ViewA Simulation Modeling Approach to Improve JIT Implementation in a Highly Dynamic Manufacturing Environment Wray, Scott
Zayed University2016ViewAchieving Effective Data Analytics: An Agile Framework Castro, Jain
Zayed University2016ViewAn Empirical Study on the Impact of Price Discount on Sales in Software-as-a-Service (SaaS) Market Choi, Medlin, Hunsinger
Zayed University2016ViewAn Interactive Toolbox for Twitter Content Analytics Jafar, Waldman
Zayed University2016ViewAnalysis of the Risks of NFC Mobile Payment Systems Kakish, Shah
Zayed University2016ViewAre Students Using Security Measures to Protect their Data when Downloading Mobile Applications? Chawdhry, Paullet, Douglas, Compomizzi
Zayed University2016ViewBuilding Client Vendor Alignment Capability in Strategic Information Systems Outsourcing Ghosh
Zayed University2016ViewCauses of cyberbullying in multi-player online gaming environments: Gamer perceptions Cotler, Fryling, Rivituso
Zayed University2016ViewCrowdsourcing Surveys: Alternative Approaches to Survey Collection Cummings, Sibona
Zayed University2016ViewE-commerce Adoption: A Revelatory Case Study in the German Oncology Pharmaceutical Supply Chain Sultanow, Chircu, Chircu
Zayed University2016ViewEvidence of Wikipedia usage during the school year: A numerical study Snyder
Zayed University2016ViewFinding the “Radicalness” in Radical Innovation Adoption Sharma, Thomas, Konsynski
Zayed University2016ViewIdentifying the Critical Success Factors for Information Systems to Manage Sponsored Research Activities at Institutions of Higher Education Lehman, Ruzich
Zayed University2016ViewMalvertising - A Rising Threat To The Online Ecosystem Dwyer, Kanguri
Zayed University2016ViewPatient Healthcare Smart Card System: A Unified Medical Record for Access and Analytics Hussein, Ariyachandra, Frolick
Zayed University2016ViewPrinciple Component Analysis for Feature Reduction and Data Preprocessing in Data Science Wimmer, Powell
Zayed University2016ViewProposal for Kelly Criterion-Inspired Lossy Network Compression for Network Intrusion Applications Smith, Hammell II
Zayed University2016ViewPrototype to Production: A Case Study Fabbri
Zayed University2016ViewSentiment Analysis and Opinion Mining: Current State of the Art and Review of Google and Yahoo Search Engines’ Privacy Policies Peslak
Zayed University2016ViewSubjective norm and measuring its impact on information security behavioral intention in organizations. Etezady
Zayed University2016ViewSystem Analysis of the Infrastructure of an IT services provider Krishnappa, Kline
Zayed University2016ViewThe Effects of Perceived Functionality and Usability on Privacy and Security Concerns about Adopting Cloud Applications Nakayama, Chen, Taylor
Zayed University2016ViewUnderstanding User Behavior on Pinterest: Findings and Insights Wei, Zhang
Zayed University2015ViewA Comparison of Open Source Tools for Data Science Wimmer, Powell
Zayed University2015ViewA Multi-National Study of Attitudes and Policies of Military Personnel about Smart Phone Applications Fruehauf, McCann, Al-Khalifa
Zayed University2015ViewA Practice Based Examination of Standardization, and its Relationship with the Design and Use of Healthcare IS alsekait, Chakraborty
Zayed University2015ViewAn Expanded Analysis of Internet Dependencies by Demographic Variables Peslak
Zayed University2015ViewAn Optimized Intelligent Home Network Model Kevin, Ndlovu, Lall, Kogeda
Zayed University2015ViewAssessing Cultural Aspects of Organizations for Knowledge Management Initiatives Fruehauf, Lehman
Zayed University2015ViewBlurred Lines: Defining the Motives for Mobile and Social Media Use for Marketing Strategy Kim, Homan, Breese-Vitelli, Metzer
Zayed University2015ViewCase Study: Can Interpersonal-Cultural Communication Sustain Another Innovation? Spangler , Breese, Borkovich
Zayed University2015ViewCASE Tools’ Acceptance in Higher Education – Assessment and Enhanced UTAUT Model Marcinkowski, Wrycza
Zayed University2015ViewComparing the Prediction Capabilities of an Artificial Neural Network vs a Phenomenological Model for Predicting the Terminal Ballistics of Kinetic Energy Projectiles Auten, Hammell II
Zayed University2015ViewDriving Inside Sales Performance with Lead Management Systems: A Conceptual Model Ohiomah, Benyoucef, Andreev
Zayed University2015ViewExploratory Study of Effects of eLearning System Acceptance on Learning Outcomes Ghosh
Zayed University2015ViewExploring Relationships between the Strategic Importance of IT and the Effectiveness of IT Security and Mobile Device Management Stanko, Sena, Sena
Zayed University2015ViewGovernance of Outsourcing: Building a Better Relationship Babin, Saunderson
Zayed University2015ViewInformation Technology in Patient Care: Challenges of using IT in Small Ambulatory Healthcare Organizations. Reddy
Zayed University2015ViewIntroducing A Change Resistance Factor in Knowledge Management Model: A Concentration in Organizational Culture Abaoud, alluhaidan
Zayed University2015ViewLeakage of Geolocation Data by Mobile Ad Networks Snow, Hayes, Dwyer
Zayed University2015ViewMoving Beyond Coding: Why Secure Coding Should be Implemented Grover, Cummings, Janicki
Zayed University2015ViewSocial Responsibility Trends and Perceptions in Global IT Outsourcing Babin, Myers
Zayed University2015ViewToward a Better Understanding of Factors Affecting Software Project Complexity Petkova, Petkov
Zayed University2015ViewUtilizing Finite State Machines in the Classroom to Introduce Verified Software Finkbine
Zayed University2015ViewVariation in Best-Case and Worst-Case Performance for Sorting Algorithms McMaster, Sambasivam, Rague, Wolthuis
Zayed University2014ViewA Case Study Analysis of KnightSec and the Steubenville Rape Case Pendergrass, Wright
Zayed University2014ViewA Case Study on Achieving Legitimation in Information Systems Action Research Projects Petkova, Petkov
Zayed University2014ViewA Cloud Computing Methodology Study of Platform-as-a-Service (PaaS) in the Financial Industry Lawler, Howell-Barber, Joseph
Zayed University2014ViewAligning Information Systems strategy with the Business Strategy in a South African Banking Environment Kekwaletswe, Mathebula
Zayed University2014ViewAre College Home Pages More Accessible? A Longitudinal Study of the Accessibility of United States College Home Pages Siegfried, Featherston
Zayed University2014ViewBuilding a Better Stockbroker: Managing Big (Financial) Data by Constructing an Ontology-Based Framework Westrick, Du, Wolffe
Zayed University2014ViewCyber Security Best Practices: What to do? Kleinberg, Reinicke, Cummings
Zayed University2014ViewCyberbullying or normal game play? Impact of age, gender, and experience on cyberbullying in multi-player online gaming environments: Perceptions from one gaming forum Fryling, Cotler, Rivituso, Mathews, Pratico
Zayed University2014ViewERP Customization vs. Business Process Reengineering: Technical and Functional Perceptions Fryling
Zayed University2014ViewEvaluating Information Security Practices, Knowledge, and Attitudes of Information Technology Student Workers Imboden, Martin, Woodward, Nehrkorn
Zayed University2014ViewIdentifying User Behavior from Residual Data in Cloud-based Synchronized Apps Grispos, Glisson, Pardue, Dickson
Zayed University2014ViewMeasuring Algorithm Performance With Java: Patterns of Variation McMaster, Sambasivam, Wolthuis
Zayed University2014ViewOn Adapting a Military Combat Discrete Event Simulation with Big Data and Geospatial Modeling Toward a Predictive Model Ecosystem for Interpersonal Violence Mhlanga, Perry, Kirchner
Zayed University2014ViewOpen Source Web Application Vulnerability Scanners: The Cost Effective Choice McQuade
Zayed University2014ViewReview of Web Service Specifications for Long-running Conversations Rana, Umapathy
Zayed University2014ViewRoadmaps and Maturity Models: Moore
Zayed University2014ViewThe Silent Treatment in IT Projects: Gender Differences in Inclinations to Communicate Project Status Information Korzaan, Brooks
Zayed University2014ViewUse of Preventative Measures to Protect Data Privacy on Mobile Devices Pinchot, Paullet
Zayed University2013ViewA Comparison of Software Testing Using the Object-Oriented Paradigm and Traditional Testing Gordon, Roggio
Zayed University2013ViewA Study of Cloud Computing Infrastructure-as-a-Service (IaaS) in Financial Firms Lawler, Howell-Barber, Joseph, Narula
Zayed University2013ViewA Study of Information Technology Operating and Capital Expenditures and Their Effect on Positive Firm Outcomes Peslak
Zayed University2013ViewBizprojet: The co-design of an affinities and skills search-engine. Team building around an innovative project: New knowledge shared? Lombardo, Agostinelli, Ouvrard, Arvanitakis, Metge, Linscott
Zayed University2013ViewCan Social Media aid Software Development? Reinicke, Cummings
Zayed University2013ViewCreating A Semantic Differential Scale For Measuring Users’ Perception and Attitude To Emerging Technologies Ajani, Stork
Zayed University2013ViewData Privacy: Are We Accidentally Sharing Too Much Information? Chawdhry, Paullet, Douglas
Zayed University2013ViewDecision-Making via Visual Analysis using the Natural Language Toolkit and R Jafar, Babb, Dana
Zayed University2013ViewDoes File Sharing Lead to Legal Sales? Student Attitudes on Music Piracy Siegfried
Zayed University2013ViewFeasibility of a Platform-as-a-Service Implementation using Cloud Computing for a Global Service Organization Gai, Steenkamp
Zayed University2013ViewInformation Security in Nonprofits: A First Glance at the State of Security in Two Illinois Regions Imboden, Phillips, Seib, Fiorentino
Zayed University2013ViewLooking Backwards to Look Ahead: Lessons from Barcode Adoption for RFID Adoption and Implementation Sharma, Thomas
Zayed University2013ViewMicrosoft vs Apple: Which is Great by Choice? Sena, Olsen
Zayed University2013ViewOnline versus In-Store: Price Differentiation for Multi-Channel Retailers Flores, Sun
Zayed University2013ViewPerformance and Corporate Social Responsibility in the Information Technology Industry Cowan, Parzinger, Welch, Welch
Zayed University2013ViewPredicting the Terminal Ballistics of Kinetic Energy Projectiles Using Artificial Neural Networks Auten, Hammell II
Zayed University2013ViewRisk Assessment & Management in Merchant Capture Systems: A Threat Analysis Perspective Streff, Shrestha, Delzer
Zayed University2013ViewShifting Technological Landscape: IT Departments and Anticipated Technological Changes Cummings, Janicki, Kline
Zayed University2013ViewSimilarity and Ties in Social Networks Afrasiabi Rad, Benyoucef
Zayed University2013ViewSoftware Engineering: accessing IT core concepts Davis, Kmetz
Zayed University2013ViewSome Comparisons between SSM and the Activity Analysis and Development (ActAD) framework applied to IS development Petkova, Petkov
Zayed University2013ViewTaxonomy of Common Software Testing Terminology: Framework for Key Software Engineering Testing Concepts Roggio, Gordon, Comer
Zayed University2013ViewThe De-Escalation of the DHS HSIN Next Gen Project Rosenhauer, Korzaan
Zayed University2013ViewWeb Recruitment: Parzinger, Ward, Langford
Zayed University2012ViewA Framework for an Interactive Word-Cloud Ap-proach for Visual Analysis of Digital Text using NLTK Jafar, Babb, Dana
Zayed University2012ViewA Portal-Based Web Service Development Using a Mashup Approach Miah, Debuse, Gammack, Pigott
Zayed University2012ViewA Quantitative Analysis of Computing Jobs in 2012 Robin, Roggio
Zayed University2012ViewA Study of Cloud Computing Software-as-a-Service (SaaS) in Financial Firms Lawler, Howell-Barber, Desai, Joseph
Zayed University2012ViewAdding Social Features to E-commerce Huang, Yoon, Benyoucef
Zayed University2012ViewAn Examination of the Factors Influencing Student Usage of Dropbox, a File Hosting Service Hunsinger, Corley
Zayed University2012ViewAnalysis of Electronic Health Mitchell, Clark
Zayed University2012ViewAnalysis of the Variables That Affect Frequency of Use and Time Spent on Social Networking Peslak, Sendall, Ceccucci
Zayed University2012ViewBuilding Baseline Preprocessed Common Data Sets for Multiple Follow-on Data Mining Algorithms Fowler, Hammell II
Zayed University2012ViewCloud Computing: Should I Stay or Should I Cloud? Muhleman, Kim, Homan, Breese
Zayed University2012ViewComparing Performance of Web Service Interaction Styles: SOAP vs. REST Kumar, Ahuja, Umapathy, Prodanoff
Zayed University2012ViewCreating an Audio Conferencing Application Sun, Vetter, Reinicke
Zayed University2012ViewCybercrime: The Unintentional Effects of Oversharing Information on Facebook Paullet, Pinchot
Zayed University2012ViewDo experiments using immersive and interactive 3D structures improve memorization? Lombardo, Angelini
Zayed University2012ViewEarly Stage Probabilistic Software Project Schedule Estimation Kwon, Hammell II
Zayed University2012ViewEthical Data Mining: An Obstacle or Opportunity for Loyalty Programs Smith, Burns
Zayed University2012ViewETL Evolution for Real-Time Data Warehousing Kakish, Kraft
Zayed University2012ViewEvaluating the South African software industry as a key component for economic development using an Irish framework Dehinbo, Dehinbo
Zayed University2012ViewEvolving Mobile Architectures: A Case Study in the Development of a Location Privacy Application Babb, Dana, Keith, Jafar
Zayed University2012ViewExamining the Effects of the Value of Information on Intelligence Analyst Performance Newcomb, Hammell II
Zayed University2012ViewGlobal Diffusion of Virtual Social Networks: A Pyramid Model Wang, Sun
Zayed University2012ViewInformation Security Blueprint Clark, Benli, Mitchell, Vetter
Zayed University2012ViewInformation Technology (IT) professional perceptions regarding the value of communication, collaboration, and the use of social networking technologies in the workplace: a case study Fryling, Trubitt
Zayed University2012ViewLet’s Look at the Cloud from a Risk Management Perspective Vignos, Kim, Metzer
Zayed University2012ViewOpen Source Software Volunteerism vs. Carpenter
Zayed University2012ViewPossible Lessons for the Field of Information Systems from the Work of Russel Ackoff Petkov, Petkova
Zayed University2012ViewReadiness for Transitioning to ICD-10 Coding: Litton, Humphrey, Schwieger
Zayed University2012ViewRocky Relationships: Enterprise Resource Planning and Supply Chain Management Crumbly, Fryling
Zayed University2012ViewSocial Media: Building a Competitive Edge Aimiuwu
Zayed University2012ViewThe Adoption of Green IT/IS: Sharma
Zayed University2012ViewThe Deployment Pipeline Mikita, DeHondt, Nezlek
Zayed University2012ViewThe Impact of Intra-Organizational Social Cummings
Zayed University2012ViewThe Impact of Regulatory Changes on IS Strategy: An Exploratory Study Reinicke, Ward
Zayed University2012ViewTraffic on the Information Super Highway -- Use vs. Useful? Grant, Middleton
Zayed University2012ViewUsing the Cloud: The Cost of Encryption in IaaS Cronin, Pauli, Ham
Zayed University2012ViewUsing the Layered Model to Understand Employee Selection of Information and Communication Channels for Information and Knowledge Sharing in Project Teams Lee-Partridge, Snyder
Zayed University2012ViewVicinities for Spatial Data Processing: Wu, Acharya
Zayed University2011ViewAn Approach for Developing Business Architecture, an Essential Enabler for Business and IT Alignment Li, Steenkamp
Zayed University2011ViewApplying Business Intelligence Concepts to Medicaid Claim Fraud Detection Copeland, Edberg, Wendel
Zayed University2011ViewBuilding a Real-Time Bus Tracking Data Display System Dudley, Vetter, Brown, Janicki
Zayed University2011ViewCMobile: A Mobile Photo Capture Application for Construction Imaging Martin, Vetter, Brown, Janicki
Zayed University2011ViewCo-Creating Value in Systems Development: A Shift towards Service-Dominant Logic Babb, Keith
Zayed University2011ViewComputational Linguistic Hedges Applied to a Project Critical Path McQuighan, Hammell II
Zayed University2011ViewDoes Size Matter in IT? An exploratory analysis of critical issues facing organizations based on company size Peslak
Zayed University2011ViewMaximizing Visibility in Skylines Miah
Zayed University2011ViewMeasuring Propagation in Online Social Networks: The case of YouTube Afrasiabi Rad, Benyoucef
Zayed University2011ViewMobile Telephone Usage and Perception During Group Meetings. Bajko
Zayed University2011ViewMost Popular Package Design Miah
Zayed University2011ViewOn a Systemic Understanding of Software Development Contexts Petkov, Alter, Petkova
Zayed University2011ViewOpen Source Software in the Vertical Market: an Open Niche? Conlon
Zayed University2011ViewOutsourcing Best Practices Mikita, DeHondt
Zayed University2011ViewPay-What-You-Want Pricing for Mobile Applications: The Effect of Privacy Assurances and Social Information Racherla, Keith, Babb
Zayed University2011ViewPlan to Throw one Away: Lessons Learned Battig, Commo
Zayed University2011ViewSemiotics as a Theoretical Foundation of Information Design Sharp
Zayed University2011ViewSocial Networking Systems and Campus Life Sgambato, Petkov, Wolf
Zayed University2011ViewStudy of User Behavior in Image Retrieval and Implications for Content Versus Concept Based Access Schultz
Zayed University2011ViewSurvey of Data Mining Methods in Emergency Evacuation Planning Miah
Zayed University2011ViewTalk to Text: Changing Communication Patterns Pinchot, Douglas, Paullet, Rota
Zayed University2011ViewThe Effects of Interruptions on Remembering Task Information Lenox, Pilarski, Leathers
Zayed University2011ViewThe Era of Digital Activism Sivitanides, Shah
Zayed University2011ViewThe impact of Organizational Culture in managing the change to the use of FOSS at a South African University Dehinbo, Alexander
Zayed University2011ViewThe New Tech Effect: Analyzing Juror Credibility Davis, Paullet, Kraeer, Grant
Zayed University2011ViewUsing Market Basket Analysis to Estimate Potential Revenue Increases for a Small University Bookstore Hoanca, Mock
Zayed University2011ViewUsing the cloud: How to keep your data private Cronin, Pauli, Ham
Zayed University2011ViewVisualizing Capacity and Load: A Production Planning Information System for Metal Ingot Casting Wu, Acharya
Zayed University2011ViewWhy are People Using Google's Corley, Hunsinger
Zayed University2010ViewA Methodology Tailoring Model for Practitioner Based Information Systems Development Informed by the Principles of General Systems Theory Burns, Deek
Zayed University2010ViewA Model for Understanding Social Commerce Afrasiabi Rad, Benyoucef
Zayed University2010ViewA Process for Assessing Voting System Risk Using Threat Trees Yasinisac, Pardue
Zayed University2010ViewA Study of Information Technology Integration Peslak
Zayed University2010ViewAn Empirical Study of Social Networking Behavior Using Diffusion of Innovation Theory Ceccucci, Peslak, Sendall
Zayed University2010ViewCreating a Framework for Research on Virtual Organizations Reinicke
Zayed University2010ViewDevelopment of an Evaluation Model for XBRL-enabled Tools Intended for Investors Clements, Schwieger, Surendran
Zayed University2010ViewHow Mobile Technology is Changing Our Culture Pinchot, Paullet, Rota
Zayed University2010ViewMake or Buy: A comparative assessment of organizations that develop software internally versus those that purchase software Sena, Sena
Zayed University2010ViewNATIS: Novel Architecture Framework for Sambasivam, Liang, Liao
Zayed University2010ViewOn Conceptual Models of Collaborative Partnerships and the Infusion of Knowledge Workers in the Local IT Sector Vardiman, Mhlanga
Zayed University2010ViewOn the utility of HCI practices in improving a commercial information retrieval system Honeycutt, Kolpack, Honeycutt, Talbert
Zayed University2010ViewPassword Security Risk versus Effort: An Exploratory Study on User-Perceived Risk and the Intention to Use Online Applications Gebauer, Kline, He
Zayed University2010ViewSeniors and Social Networking Lewis, Ariyachandra
Zayed University2010ViewThe Potential Reality of Service-Oriented Architecture (SOA) in a Cloud Computing Strategy Lawler
Zayed University2010ViewThe Use of Mobile Units McGinley, Nicolai
Zayed University2010ViewWhat Influences People to Use Linux? Hunsinger, Fransen
Zayed University2010ViewWhat is Missing From the Current Disaster Model Bilow, Nicolai
Zayed University2009ViewA Conceptual Model of Knowledge Elicitation Sagheb-Tehrani
Zayed University2009ViewA FOLLOW-UP STUDY OF DETECTING PHISHING EMAILS Bekkering, Werner, Hutchison
Zayed University2009ViewA Study of the Perceptions of Students on Lawler, Molluzzo
Zayed University2009ViewAn Empirical Study of Text Messaging Peslak, Ceccucci, Sendall
Zayed University2009ViewAn Exploratory Study of Relationships between Workforce Characteristics and the Use of Collaboration and Social Networking Tools in a Global Tchnology Firm Totterdale
Zayed University2009ViewAn Ontological Characterization of the ‘Structured Information Flow’ (SIF) Model Bhatia, Arthur
Zayed University2009ViewAnalyzing Community Websites: A Main Street Perspective Schoenacher
Zayed University2009ViewBusiness Requirements Knowledge Management Ontology to Support a Software Deployment Process Steenkamp, Alomari
Zayed University2009ViewCan Management Predict Information Security Threats by Utilizing a Data Warehouse? Kim, Steen
Zayed University2009ViewComponent-Based Software Development: Life Cycles and Design Science-Based Recommendations Sharp, Ryan
Zayed University2009ViewContingency Planning: Disaster Recovery Strategies for Successful Educational Continuity Omar, Udeh, Mantha
Zayed University2009ViewDifficulties in quantifying IT projects Oliver, Janicki, Barrick
Zayed University2009ViewE-Commerce Security Kraft
Zayed University2009ViewElements of Technology and Success in Virtual Teams Balazs, White
Zayed University2009ViewEthic and Moral Implications of Affective Computing Steen
Zayed University2009ViewFactors that Persuade and Deter Membership in Professional Computing Associations Umapathy, Jamba, Ritzhaupt
Zayed University2009ViewKnowledge Mapping in a Not-For-Profit Firm: A Case Study Nelson, Woratschek
Zayed University2009ViewObject Reuse and Integration Wang
Zayed University2009ViewON DESIGN SCIENCE, MCDM AND IS OUTSOURCING DECISIONS Petkov, Petkova
Zayed University2009ViewResults of Implementing a Knowledge Management Initiative to Enhance Network Access Controls Kim, Nelson
Zayed University2009ViewSome Observations on the Occurrences of Data Breaches Guerra, Joseph, Ramirez, Koong, Liu
Zayed University2009ViewSome Observations on the Occurrences of Phishing Lara, Rios, Salazar, Koong, Liu
Zayed University2009ViewSpatial Interpolation for a Wireless Sensor Network of Chemical Point Detectors: Preliminary Results Schafer, Hammell II
Zayed University2009ViewSpyware: What Influences College Students to Use Anti-Spyware Tools? Ward, Hunsinger
Zayed University2009ViewSuperfund Site Analysis Using Web 2.0 Technologies Anderson, Jafar, Rogers
Zayed University2009ViewSustainability and Greening through D'Onofrio, Jarmoszko, Lee-Partridge, Petkova
Zayed University2009ViewSynchronizing Development Life-Cycles: Rationale and Integrative Approach to Construction of eLearning Systems and Online Courses at a Tier 1 Research Institution Conn, Macedo, Meese
Zayed University2009ViewThe Effect of Gender on the Application of Peslak, Krisanda
Zayed University2009ViewThe Impact of Electronic Data Interchange Information Technology on External Auditors Ricks, Schwieger, Henry, Almohsen
Zayed University2009ViewThe Impact of Transition Costs on Offshore Systems Development DeHondt, Leidig
Zayed University2009ViewTHE RELATIONSHIP BETWEEN INFORMATION TECHNOLOGY CRITICAL SUCCESS FACTORS AND PROJECT PERFORMANCE Lind, Culler
Zayed University2009ViewThe Two Leading Freeware Image Editing Applications – An Overview, Comparative Evaluation and Guide for the IS Community Scher
Zayed University2009ViewTowards an Abstract Model for Mhlanga, Vardiman, Reames
Zayed University2009ViewUSING A GROUP SUPPORT SYSTEM Nepal, Petkov
Zayed University2009ViewVirtual Organizations: A Definitional Framework Reinicke
Zayed University2009ViewWomen's Technology Acceptance of Mentoring on the Internet Gibson, GIBSON
Zayed University2009ViewWorkflow Automation and Management Services in Web 2.0: An Object-Based Approach to Distributed Workflow Enactment Wu
Zayed University2008ViewA Computing Research Example: Following a Question Frank
Zayed University2008ViewA STUDY OF THE INFORMATION TECHNOLOGY TRADE BETWEEN THE UNITED STATES AND ASIA PACIFIC ECONOMIES COOPERATION NATIONS Roman, Blakely, Koong, Liu
Zayed University2008ViewA Study of the Information Technology Trade between The United States and the Dominican Republic-Central America Free Trade Agreement Nations Pena, Aguirre, Saenz, Koong, Liu
Zayed University2008ViewA STUDY OF THE INFORMATION TECHNOLOGY TRADE BETWEEN UNITED STATES AND THE SOUTHERN AFRICAN CUSTOM UNION Saenz, Flores, Koong, Liu
Zayed University2008ViewAn Empirical Study of Instant Messaging Behavior Using Diffusion of Innovation Theory Peslak, Ceccucci, Sendall
Zayed University2008ViewAn Examination of Information Security in Mobile Banking Architectures Streff, Haar
Zayed University2008ViewAn Information Technology Project Funding Process Kline, Renninger, Guinn, Sackley, Scott
Zayed University2008ViewAnalysis of the Factors that Influence Online Purchasing Amoroso, Hunsinger
Zayed University2008ViewAnticipated changes to technologies Janicki, Clark, Mahar, Logan
Zayed University2008ViewAssessing the Role of CSR in Outsourcing Decisions Babin
Zayed University2008ViewComparison of Dynamic Web Content Processing Languages Performance Jafar, Anderson, Abdullat
Zayed University2008ViewComputing Professional Association Membership: An Exploration of Membership Needs and Motivations Ritzhaupt, Umapathy, Jamba
Zayed University2008ViewCreating the Pilot AJAX Enabled Query Tool Ford, Dollinger
Zayed University2008ViewDetermining Information Technology Project Status using Recognition-primed Decision Making enabled Collaborative Agents Simulating Teamwork (R-CAST) Barnes, Hammell II
Zayed University2008ViewFactors Driving Handheld Wireless Media Usage Lind, Anyansi-Archibong, Anyansi
Zayed University2008ViewFormal Information Security Standards in Medium Enterprises Sambasivam, Kluge
Zayed University2008ViewIncorporation of Information Technology into Assisted Health Care: An empirical study Merrill, White
Zayed University2008ViewKnowledge Discovery and Data Mining of Biomedical Data with Decision Trees McClelland
Zayed University2008ViewPlanning and Implementation of an ERP system in a University in USA: Some Insights and Guidelines Somarajan, Weber, Surendran
Zayed University2008ViewResearch Design for a Natural Disaster Management Communication System: Nicolai, Puntillo, Bilow
Zayed University2008ViewSome Suggestions for Further Diffusion of Work System Method Ideas in Systems Analysis and Design Petkov, Misra, Petkova
Zayed University2008ViewSYSTEM DEVELOPMENT METHODOLOGY USAGE IN INDUSTRY: A REVIEW AND ANALYSIS Griffin, Brandyberry
Zayed University2008ViewTeaching Knowledge Management (KM) in Criminal Justice Education: The Influence of Information Systems Conn, Thies
Zayed University2008ViewTest Driven Development in the .Net Framework Lee, Mehta, Shah
Zayed University2008ViewThe Accessibility of College and University Home Pages in the State of New York DiLallo, Siegfried
Zayed University2008ViewThe Impact of Technology Diffusion on Employment and Compensation: Evidence from the Telecommunications Sector Clark, Moussawi
Zayed University2008ViewThe Importance of Business Process Alignment Kraft