Search by Keyword

Search returned 121 items for : A


KeywordConf YearArticleTitleAuthors
Absorptive Capacity2014ViewRoadmaps and Maturity Models: Moore
academic library2019ViewAn Exploratory Study of the Perceptions of Library Faculty and Patrons on Library Resources Herman, Wimmer, Rebman Jr.
academic planning2009ViewUSING A GROUP SUPPORT SYSTEM Nepal, Petkov
Access control.2009ViewResults of Implementing a Knowledge Management Initiative to Enhance Network Access Controls Kim, Nelson
Accessibility2014ViewAre College Home Pages More Accessible? A Longitudinal Study of the Accessibility of United States College Home Pages Siegfried, Featherston
Accessibility2013ViewSoftware Engineering: accessing IT core concepts Davis, Kmetz
Accessibility2008ViewThe Accessibility of College and University Home Pages in the State of New York DiLallo, Siegfried
accounting measures2013ViewPerformance and Corporate Social Responsibility in the Information Technology Industry Cowan, Parzinger, Welch, Welch
Action research2014ViewA Case Study on Achieving Legitimation in Information Systems Action Research Projects Petkova, Petkov
activity trackers2020ViewPrivacy Concerns and Data Sharing Habits of Personal Fitness Information Collected via Activity Trackers Pinchot, Cellante
ad blockers2016ViewMalvertising - A Rising Threat To The Online Ecosystem Dwyer, Kanguri
addiction2019ViewGame Theory Through Smartphone App Use In Support of For-Hire Transportation Network Companies Pendergrass
ADO.Net2008ViewTest Driven Development in the .Net Framework Lee, Mehta, Shah
adoption2021ViewBarriers and Drivers to Adoption of Electronic Health Record Systems Du, Sturgill
adoption2020ViewOpen Source Software: A Detailed Analysis of Contributions and Quality Peslak, Hunsinger
adoption2016ViewFinding the “Radicalness” in Radical Innovation Adoption Sharma, Thomas, Konsynski
adoption2013ViewLooking Backwards to Look Ahead: Lessons from Barcode Adoption for RFID Adoption and Implementation Sharma, Thomas
adoption2012ViewThe Adoption of Green IT/IS: Sharma
adoption2008ViewSYSTEM DEVELOPMENT METHODOLOGY USAGE IN INDUSTRY: A REVIEW AND ANALYSIS Griffin, Brandyberry
adoption roadmap2014ViewRoadmaps and Maturity Models: Moore
Adversarial Machine Learning2019ViewEvaluating Evasion Attack Methods on Binary Network Traffic Classifiers Shah, Gaston, Harvey, McNamara, Ramos, You, Alhajjar
Adversarial Machine Learning2018ViewImportance of Features in Adversarial Machine Learning for Cyber Security De Lucia, Cotton
aesthetics2013ViewWeb Recruitment: Parzinger, Ward, Langford
Affect2012ViewAn Examination of the Factors Influencing Student Usage of Dropbox, a File Hosting Service Hunsinger, Corley
Affect2011ViewWhy are People Using Google's Corley, Hunsinger
affinity2013ViewBizprojet: The co-design of an affinities and skills search-engine. Team building around an innovative project: New knowledge shared? Lombardo, Agostinelli, Ouvrard, Arvanitakis, Metge, Linscott
Age2015ViewAn Expanded Analysis of Internet Dependencies by Demographic Variables Peslak
aggression2016ViewCauses of cyberbullying in multi-player online gaming environments: Gamer perceptions Cotler, Fryling, Rivituso
Agile2019ViewAn Empirical Study of Post-Production Software Code Quality When Employing the Agile Rapid Delivery Methodology Poe, Seeman
Agile2016ViewAchieving Effective Data Analytics: An Agile Framework Castro, Jain
Agile2011ViewCo-Creating Value in Systems Development: A Shift towards Service-Dominant Logic Babb, Keith
agile development methodology2011ViewCMobile: A Mobile Photo Capture Application for Construction Imaging Martin, Vetter, Brown, Janicki
agile main factors2020ViewAgile Project Management: Project managers' perspective Sanchez-Morcilio, Quiles-Torres, Aparicio-Carrasco
Agile Project Management2020ViewAgile Project Management: Project managers' perspective Sanchez-Morcilio, Quiles-Torres, Aparicio-Carrasco
agile strategy2020ViewAgile Project Management: Project managers' perspective Sanchez-Morcilio, Quiles-Torres, Aparicio-Carrasco
agility2016ViewAchieving Effective Data Analytics: An Agile Framework Castro, Jain
AHP2016ViewA Multi-Criteria Network Assessment Model of IT Offshoring Risks from Service Provider’s Perspective Petkov, Petkova
AHP2015ViewToward a Better Understanding of Factors Affecting Software Project Complexity Petkova, Petkov
AHP2009ViewON DESIGN SCIENCE, MCDM AND IS OUTSOURCING DECISIONS Petkov, Petkova
AI2019ViewA Neural Networks Primer For USMA Cadets Alhajjar
airlines2022ViewDecision-Making Tool for Procurement for Brazilian Airlines Torres, Halawi, Rojas, Bico, Marinho
AITP2009ViewFactors that Persuade and Deter Membership in Professional Computing Associations Umapathy, Jamba, Ritzhaupt
AITP2008ViewComputing Professional Association Membership: An Exploration of Membership Needs and Motivations Ritzhaupt, Umapathy, Jamba
AJAX2009ViewSuperfund Site Analysis Using Web 2.0 Technologies Anderson, Jafar, Rogers
AJAX2008ViewCreating the Pilot AJAX Enabled Query Tool Ford, Dollinger
AKDS2010ViewOn the utility of HCI practices in improving a commercial information retrieval system Honeycutt, Kolpack, Honeycutt, Talbert
algorithm2019ViewBig Data, Algorithmic Classification, and False Positives: Consequences for Information Privacy Lauer
algorithm2015ViewVariation in Best-Case and Worst-Case Performance for Sorting Algorithms McMaster, Sambasivam, Rague, Wolthuis
algorithm2014ViewMeasuring Algorithm Performance With Java: Patterns of Variation McMaster, Sambasivam, Wolthuis
algorithm2011ViewMaximizing Visibility in Skylines Miah
algorithm2011ViewMost Popular Package Design Miah
algorithm2010ViewNATIS: Novel Architecture Framework for Sambasivam, Liang, Liao
algorithm analysis2012ViewVicinities for Spatial Data Processing: Wu, Acharya
algorithm design2012ViewVicinities for Spatial Data Processing: Wu, Acharya
Alignment2016ViewBuilding Client Vendor Alignment Capability in Strategic Information Systems Outsourcing Ghosh
Alternate Payment Methods2016ViewAnalysis of the Risks of NFC Mobile Payment Systems Kakish, Shah
Amazon Mechanical Turk2016ViewCrowdsourcing Surveys: Alternative Approaches to Survey Collection Cummings, Sibona
Amazon Reviews2021View Selecting Subsets of Amazon Reviews Gokce, Kline, Cummings, Vetter
Amazon Reviews2021ViewA Cloud-Based System for Scraping Data from Amazon Product Reviews at Scale Woodall, Kline, Vetter, Modaresnezhad
analysis2009ViewThe Effect of Gender on the Application of Peslak, Krisanda
Analytic Network Process2015ViewToward a Better Understanding of Factors Affecting Software Project Complexity Petkova, Petkov
analytics2021ViewUsing Analytics to understand Performance and Wellness for a Women’s College Soccer Team Njunge, Witman, Holmberg, Canacoo
analytics2020ViewEnhancing Learning Analytics: The Rise of Institutional Research Perkins, Ariyachandra
analytics2019ViewThe Impact of Analytics Adoption on Team Performance in Professional Sports: A Longitudinal Analysis of the Lag in Observable Results Freeman
analytics2019ViewTrash to Treasure: Predicting Landfill Gas Flow to Optimize Electricity Generation Hassler, Emery, Hoyle, Cazier
analytics2019ViewUnderstanding Campus Crime with a Multi-University Analytics System Iheadindu, Kline, Vetter, Clark
analytics2018ViewStandardizing Public Utility Data: A Case Study of a Rural Mid-Size Utility Hassler, Cazier, Russell, Mueller, Paprocki
analytics2017ViewMinimalism in Data Visualization: Perceptions of Beauty, Clarity, Effectiveness, and Simplicity Hill, Wray, Sibona
analytics2017ViewPredictive Models for Apportioning 911 Fund Berghammer, Douglas, Corley, Chen
analytics2017ViewUsing Systems Analysis and Design to Enhance the Business Understanding Stage in CRISP-DM Pomykalski, Buzydlowski
analytics2016ViewUnderstanding User Behavior on Pinterest: Findings and Insights Wei, Zhang
Analytics adoption2019ViewThe Impact of Analytics Adoption on Team Performance in Professional Sports: A Longitudinal Analysis of the Lag in Observable Results Freeman
analytics maturity2022ViewMeasuring Analytics Maturity and Culture: The LDIS+™ Analytics Impact Framework Fowler, Sambasivam
Android2018ViewGeospatial Analytics: Why is Geographic Information Systems a Technology Critical to any Organization? Abot, Ariyachandra, Frolick
Android2018ViewPrivacy and Security Issues Associated with Mobile Dating Applications Hayes
Android Development2012ViewCreating an Audio Conferencing Application Sun, Vetter, Reinicke
Android smartphones2022ViewQR Code Hacking – Detecting Multiple Vulnerabilities in Android Scanning Software Homan, Breese
anomaly detection2016ViewProposal for Kelly Criterion-Inspired Lossy Network Compression for Network Intrusion Applications Smith, Hammell II
Anonymous2014ViewA Case Study Analysis of KnightSec and the Steubenville Rape Case Pendergrass, Wright
ANP2016ViewA Multi-Criteria Network Assessment Model of IT Offshoring Risks from Service Provider’s Perspective Petkov, Petkova
APACHE2008ViewComparison of Dynamic Web Content Processing Languages Performance Jafar, Anderson, Abdullat
Apiary Management2020ViewThe Sting of Adoption: The Technology Acceptance Model (TAM) with Actual Usage in a Hazardous Environment Hassler, MacDonald, Cazier, Wilkes
Apple Pay2016ViewAnalysis of the Risks of NFC Mobile Payment Systems Kakish, Shah
Apple vs Microsoft2013ViewMicrosoft vs Apple: Which is Great by Choice? Sena, Olsen
applicant attraction2013ViewWeb Recruitment: Parzinger, Ward, Langford
application of semiotics2011ViewSemiotics as a Theoretical Foundation of Information Design Sharp
application privacy2017ViewWhat’s “Appening” to our Privacy? A Students Perspective on Downloading Mobile Apps Paullet, Chawdhry, Douglas, Compomizzi
application security2014ViewOpen Source Web Application Vulnerability Scanners: The Cost Effective Choice McQuade
Applications2015ViewCase Study: Can Interpersonal-Cultural Communication Sustain Another Innovation? Spangler , Breese, Borkovich
Apps2017ViewWhat’s “Appening” to our Privacy? A Students Perspective on Downloading Mobile Apps Paullet, Chawdhry, Douglas, Compomizzi
Apps2016ViewAre Students Using Security Measures to Protect their Data when Downloading Mobile Applications? Chawdhry, Paullet, Douglas, Compomizzi
Architecture2010ViewNATIS: Novel Architecture Framework for Sambasivam, Liang, Liao
arrays2008ViewA Computing Research Example: Following a Question Frank
arrays2008ViewA Computing Research Example: Following a Question Frank
Artificial intelligence2022ViewImpact of New Technology Use on Workforce: Exploratory Analysis Toskin
Artificial intelligence2022ViewText Prediction Using Artificial Intelligence: An Analysis of Two Text Prediction Systems Wimmer, Du, Heri
Artificial intelligence2021ViewAugmented Reality & Artificial Intelligence Model: Optimizing Workforce Diversity Aimiuwu
Artificial intelligence2021ViewCombating Private Blockchain Fraud: A Virtual Reality & Artificial Intelligence Model Aimiuwu
Artificial intelligence2021ViewInnovation Attributes as Determinants of the Application of Artificial Intelligence: A Proposed Study Iwuanyanwu, Igoche
Artificial intelligence2020ViewDecision-Making Model Transparency for SaMD Machine Learning Algorithms Woodside
Artificial intelligence2017ViewDoes Your Beer Taste Like Big Data? Sirinanda, Ariyachandra, Frolick
Artificial intelligence2009ViewA Conceptual Model of Knowledge Elicitation Sagheb-Tehrani
Artificial Neural Network2015ViewComparing the Prediction Capabilities of an Artificial Neural Network vs a Phenomenological Model for Predicting the Terminal Ballistics of Kinetic Energy Projectiles Auten, Hammell II
Artificial Neural Networks2013ViewPredicting the Terminal Ballistics of Kinetic Energy Projectiles Using Artificial Neural Networks Auten, Hammell II
Attention Economy2017ViewPhubbing: Communication in the Attention Economy Pendergrass
attitude2009ViewSpyware: What Influences College Students to Use Anti-Spyware Tools? Ward, Hunsinger
attitudes2013ViewCreating A Semantic Differential Scale For Measuring Users’ Perception and Attitude To Emerging Technologies Ajani, Stork
auditing2017ViewIT Audit Literature: A Future-Looking Research Agenda Klinkenborg, Streff, Nzailu
auditing2009ViewThe Impact of Electronic Data Interchange Information Technology on External Auditors Ricks, Schwieger, Henry, Almohsen
auditing2009ViewThe Impact of Electronic Data Interchange Information Technology on External Auditors Ricks, Schwieger, Henry, Almohsen
Augmented reality2021ViewAugmented Reality & Artificial Intelligence Model: Optimizing Workforce Diversity Aimiuwu
autism detection2022ViewConvolutional Neural Network Binary Image Classifier via Mobile Devices: EZ Autism Screener Ata, Chung, Maeng
autism facial features2022ViewConvolutional Neural Network Binary Image Classifier via Mobile Devices: EZ Autism Screener Ata, Chung, Maeng
autism facial recognition2022ViewConvolutional Neural Network Binary Image Classifier via Mobile Devices: EZ Autism Screener Ata, Chung, Maeng
autism screening2022ViewConvolutional Neural Network Binary Image Classifier via Mobile Devices: EZ Autism Screener Ata, Chung, Maeng
Automatic Identification2013ViewLooking Backwards to Look Ahead: Lessons from Barcode Adoption for RFID Adoption and Implementation Sharma, Thomas
automation2020ViewIntegration of Information Systems: Robotic Process Automation Money
Aviation Management2019ViewDetection and Analysis of Hard Landing and Near Miss based on Cessna 172G Flight Data and Utilization of Flight Data Monitoring Sorab
awareness2018ViewCan Social Media Accounts Have an Impact on Hiring Decisions? Guidelines for Appropriate Use Kim, Homan
AWS SageMaker image classifier2022ViewConvolutional Neural Network Binary Image Classifier via Mobile Devices: EZ Autism Screener Ata, Chung, Maeng
Azure2021ViewA Cloud-Based System for Scraping Data from Amazon Product Reviews at Scale Woodall, Kline, Vetter, Modaresnezhad