Keyword | Conf Year | Article | Title | Authors |
Absorptive Capacity | 2014 | View | Roadmaps and Maturity Models: |
Moore
|
academic library | 2019 | View | An Exploratory Study of the Perceptions of Library Faculty and Patrons on Library Resources |
Herman, Wimmer, Rebman Jr.
|
academic planning | 2009 | View | USING A GROUP SUPPORT SYSTEM |
Nepal, Petkov
|
Access control. | 2009 | View | Results of Implementing a Knowledge Management Initiative to Enhance Network Access Controls |
Kim, Nelson
|
Accessibility | 2014 | View | Are College Home Pages More Accessible? A Longitudinal Study of the Accessibility of United States College Home Pages |
Siegfried, Featherston
|
Accessibility | 2013 | View | Software Engineering: accessing IT core concepts |
Davis, Kmetz
|
Accessibility | 2008 | View | The Accessibility of College and University Home Pages in the State of New York |
DiLallo, Siegfried
|
accounting measures | 2013 | View | Performance and Corporate Social Responsibility in the Information Technology Industry |
Cowan, Parzinger, Welch, Welch
|
Action research | 2014 | View | A Case Study on Achieving Legitimation in Information Systems Action Research Projects |
Petkova, Petkov
|
activity trackers | 2020 | View | Privacy Concerns and Data Sharing Habits of Personal Fitness Information Collected via Activity Trackers |
Pinchot, Cellante
|
ad blockers | 2016 | View | Malvertising - A Rising Threat To The Online Ecosystem |
Dwyer, Kanguri
|
addiction | 2019 | View | Game Theory Through Smartphone App Use In Support of For-Hire Transportation Network Companies |
Pendergrass
|
ADO.Net | 2008 | View | Test Driven Development in the .Net Framework |
Lee, Mehta, Shah
|
adoption | 2021 | View | Barriers and Drivers to Adoption of Electronic Health Record Systems |
Du, Sturgill
|
adoption | 2020 | View | Open Source Software: A Detailed Analysis of Contributions and Quality |
Peslak, Hunsinger
|
adoption | 2016 | View | Finding the “Radicalness” in Radical Innovation Adoption |
Sharma, Thomas, Konsynski
|
adoption | 2013 | View | Looking Backwards to Look Ahead: Lessons from Barcode Adoption for RFID Adoption and Implementation |
Sharma, Thomas
|
adoption | 2012 | View | The Adoption of Green IT/IS: |
Sharma
|
adoption | 2008 | View | SYSTEM DEVELOPMENT METHODOLOGY USAGE IN INDUSTRY: A REVIEW AND ANALYSIS |
Griffin, Brandyberry
|
adoption roadmap | 2014 | View | Roadmaps and Maturity Models: |
Moore
|
Adversarial Machine Learning | 2019 | View | Evaluating Evasion Attack Methods on Binary
Network Traffic Classifiers |
Shah, Gaston, Harvey, McNamara, Ramos, You, Alhajjar
|
Adversarial Machine Learning | 2018 | View | Importance of Features in Adversarial Machine Learning for Cyber Security
|
De Lucia, Cotton
|
aesthetics | 2013 | View | Web Recruitment: |
Parzinger, Ward, Langford
|
Affect | 2012 | View | An Examination of the Factors Influencing Student Usage of Dropbox, a File Hosting Service |
Hunsinger, Corley
|
Affect | 2011 | View | Why are People Using Google's |
Corley, Hunsinger
|
affinity | 2013 | View | Bizprojet: The co-design of an affinities and skills search-engine. Team building around an innovative project: New knowledge shared? |
Lombardo, Agostinelli, Ouvrard, Arvanitakis, Metge, Linscott
|
Age | 2015 | View | An Expanded Analysis of Internet Dependencies by Demographic Variables |
Peslak
|
aggression | 2016 | View | Causes of cyberbullying in multi-player online gaming environments: Gamer perceptions |
Cotler, Fryling, Rivituso
|
Agile | 2019 | View | An Empirical Study of Post-Production Software Code Quality When Employing the Agile Rapid Delivery Methodology |
Poe, Seeman
|
Agile | 2016 | View | Achieving Effective Data Analytics: An Agile Framework |
Castro, Jain
|
Agile | 2011 | View | Co-Creating Value in Systems Development: A Shift towards Service-Dominant Logic |
Babb, Keith
|
agile development methodology | 2011 | View | CMobile: A Mobile Photo Capture Application for Construction Imaging |
Martin, Vetter, Brown, Janicki
|
agile main factors | 2020 | View | Agile Project Management: Project managers' perspective
|
Sanchez-Morcilio, Quiles-Torres, Aparicio-Carrasco
|
Agile Project Management | 2020 | View | Agile Project Management: Project managers' perspective
|
Sanchez-Morcilio, Quiles-Torres, Aparicio-Carrasco
|
agile strategy | 2020 | View | Agile Project Management: Project managers' perspective
|
Sanchez-Morcilio, Quiles-Torres, Aparicio-Carrasco
|
agility | 2016 | View | Achieving Effective Data Analytics: An Agile Framework |
Castro, Jain
|
AHP | 2016 | View | A Multi-Criteria Network Assessment Model of IT Offshoring Risks from Service Provider’s Perspective
|
Petkov, Petkova
|
AHP | 2015 | View | Toward a Better Understanding of Factors Affecting Software Project Complexity |
Petkova, Petkov
|
AHP | 2009 | View | ON DESIGN SCIENCE, MCDM AND IS OUTSOURCING DECISIONS |
Petkov, Petkova
|
AI | 2019 | View | A Neural Networks Primer For USMA Cadets |
Alhajjar
|
airlines | 2022 | View | Decision-Making Tool for Procurement for Brazilian Airlines |
Torres, Halawi, Rojas, Bico, Marinho
|
AITP | 2009 | View | Factors that Persuade and Deter Membership in Professional Computing Associations |
Umapathy, Jamba, Ritzhaupt
|
AITP | 2008 | View | Computing Professional Association Membership: An Exploration of Membership Needs and Motivations |
Ritzhaupt, Umapathy, Jamba
|
AJAX | 2009 | View | Superfund Site Analysis Using Web 2.0 Technologies |
Anderson, Jafar, Rogers
|
AJAX | 2008 | View | Creating the Pilot AJAX Enabled Query Tool |
Ford, Dollinger
|
AKDS | 2010 | View | On the utility of HCI practices in improving a commercial information retrieval system |
Honeycutt, Kolpack, Honeycutt, Talbert
|
algorithm | 2019 | View | Big Data, Algorithmic Classification, and False Positives: Consequences for Information Privacy |
Lauer
|
algorithm | 2015 | View | Variation in Best-Case and Worst-Case Performance for Sorting Algorithms |
McMaster, Sambasivam, Rague, Wolthuis
|
algorithm | 2014 | View | Measuring Algorithm Performance With Java: Patterns of Variation |
McMaster, Sambasivam, Wolthuis
|
algorithm | 2011 | View | Maximizing Visibility in Skylines |
Miah
|
algorithm | 2011 | View | Most Popular Package Design |
Miah
|
algorithm | 2010 | View | NATIS: Novel Architecture Framework for |
Sambasivam, Liang, Liao
|
algorithm analysis | 2012 | View | Vicinities for Spatial Data Processing: |
Wu, Acharya
|
algorithm design | 2012 | View | Vicinities for Spatial Data Processing: |
Wu, Acharya
|
Alignment | 2016 | View | Building Client Vendor Alignment Capability in Strategic Information Systems Outsourcing |
Ghosh
|
Alternate Payment Methods | 2016 | View | Analysis of the Risks of NFC Mobile Payment Systems |
Kakish, Shah
|
Amazon Mechanical Turk | 2016 | View | Crowdsourcing Surveys: Alternative Approaches to Survey Collection |
Cummings, Sibona
|
Amazon Reviews | 2021 | View |
Selecting Subsets of Amazon Reviews
|
Gokce, Kline, Cummings, Vetter
|
Amazon Reviews | 2021 | View | A Cloud-Based System for Scraping Data from Amazon Product Reviews at Scale |
Woodall, Kline, Vetter, Modaresnezhad
|
analysis | 2009 | View | The Effect of Gender on the Application of |
Peslak, Krisanda
|
Analytic Network Process | 2015 | View | Toward a Better Understanding of Factors Affecting Software Project Complexity |
Petkova, Petkov
|
analytics | 2021 | View | Using Analytics to understand Performance and Wellness for a Women’s College Soccer Team |
Njunge, Witman, Holmberg, Canacoo
|
analytics | 2020 | View | Enhancing Learning Analytics: The Rise of Institutional Research |
Perkins, Ariyachandra
|
analytics | 2019 | View | The Impact of Analytics Adoption on Team Performance in Professional Sports: A Longitudinal Analysis of the Lag in Observable Results |
Freeman
|
analytics | 2019 | View | Trash to Treasure: Predicting Landfill Gas Flow to Optimize Electricity Generation |
Hassler, Emery, Hoyle, Cazier
|
analytics | 2019 | View | Understanding Campus Crime with a Multi-University Analytics System |
Iheadindu, Kline, Vetter, Clark
|
analytics | 2018 | View | Standardizing Public Utility Data: A Case Study of a Rural Mid-Size Utility |
Hassler, Cazier, Russell, Mueller, Paprocki
|
analytics | 2017 | View | Minimalism in Data Visualization: Perceptions of Beauty, Clarity, Effectiveness, and Simplicity |
Hill, Wray, Sibona
|
analytics | 2017 | View | Predictive Models for Apportioning 911 Fund |
Berghammer, Douglas, Corley, Chen
|
analytics | 2017 | View | Using Systems Analysis and Design to Enhance the Business Understanding Stage in CRISP-DM |
Pomykalski, Buzydlowski
|
analytics | 2016 | View | Understanding User Behavior on Pinterest: Findings and Insights |
Wei, Zhang
|
Analytics adoption | 2019 | View | The Impact of Analytics Adoption on Team Performance in Professional Sports: A Longitudinal Analysis of the Lag in Observable Results |
Freeman
|
analytics maturity | 2022 | View | Measuring Analytics Maturity and Culture: The LDIS+™ Analytics Impact Framework |
Fowler, Sambasivam
|
Android | 2018 | View | Geospatial Analytics: Why is Geographic Information Systems a Technology Critical to any Organization? |
Abot, Ariyachandra, Frolick
|
Android | 2018 | View | Privacy and Security Issues Associated with Mobile Dating Applications |
Hayes
|
Android Development | 2012 | View | Creating an Audio Conferencing Application |
Sun, Vetter, Reinicke
|
Android smartphones | 2022 | View | QR Code Hacking – Detecting Multiple Vulnerabilities in Android Scanning Software |
Homan, Breese
|
anomaly detection | 2016 | View | Proposal for Kelly Criterion-Inspired Lossy Network Compression for Network Intrusion Applications |
Smith, Hammell II
|
Anonymous | 2014 | View | A Case Study Analysis of KnightSec and the Steubenville Rape Case |
Pendergrass, Wright
|
ANP | 2016 | View | A Multi-Criteria Network Assessment Model of IT Offshoring Risks from Service Provider’s Perspective
|
Petkov, Petkova
|
APACHE | 2008 | View | Comparison of Dynamic Web Content Processing Languages Performance |
Jafar, Anderson, Abdullat
|
Apiary Management | 2020 | View | The Sting of Adoption: The Technology Acceptance Model (TAM) with Actual Usage in a Hazardous Environment |
Hassler, MacDonald, Cazier, Wilkes
|
Apple Pay | 2016 | View | Analysis of the Risks of NFC Mobile Payment Systems |
Kakish, Shah
|
Apple vs Microsoft | 2013 | View | Microsoft vs Apple: Which is Great by Choice? |
Sena, Olsen
|
applicant attraction | 2013 | View | Web Recruitment: |
Parzinger, Ward, Langford
|
application of semiotics | 2011 | View | Semiotics as a Theoretical Foundation of Information Design |
Sharp
|
application privacy | 2017 | View | What’s “Appening” to our Privacy?
A Students Perspective on Downloading Mobile Apps
|
Paullet, Chawdhry, Douglas, Compomizzi
|
application security | 2014 | View | Open Source Web Application Vulnerability Scanners: The Cost Effective Choice |
McQuade
|
Applications | 2015 | View | Case Study: Can Interpersonal-Cultural Communication Sustain Another Innovation? |
Spangler , Breese, Borkovich
|
Apps | 2017 | View | What’s “Appening” to our Privacy?
A Students Perspective on Downloading Mobile Apps
|
Paullet, Chawdhry, Douglas, Compomizzi
|
Apps | 2016 | View | Are Students Using Security Measures to Protect their Data when Downloading Mobile Applications? |
Chawdhry, Paullet, Douglas, Compomizzi
|
Architecture | 2010 | View | NATIS: Novel Architecture Framework for |
Sambasivam, Liang, Liao
|
arrays | 2008 | View | A Computing Research Example: Following a Question |
Frank
|
arrays | 2008 | View | A Computing Research Example: Following a Question |
Frank
|
Artificial intelligence | 2022 | View | Impact of New Technology Use on Workforce: Exploratory Analysis |
Toskin
|
Artificial intelligence | 2022 | View | Text Prediction Using Artificial Intelligence: An Analysis of Two Text Prediction Systems |
Wimmer, Du, Heri
|
Artificial intelligence | 2021 | View | Augmented Reality & Artificial Intelligence Model: Optimizing Workforce Diversity
|
Aimiuwu
|
Artificial intelligence | 2021 | View | Combating Private Blockchain Fraud: A Virtual Reality & Artificial Intelligence Model
|
Aimiuwu
|
Artificial intelligence | 2021 | View | Innovation Attributes as Determinants of the Application of Artificial Intelligence: A Proposed Study |
Iwuanyanwu, Igoche
|
Artificial intelligence | 2020 | View | Decision-Making Model Transparency for SaMD Machine Learning Algorithms |
Woodside
|
Artificial intelligence | 2017 | View | Does Your Beer Taste Like Big Data? |
Sirinanda, Ariyachandra, Frolick
|
Artificial intelligence | 2009 | View | A Conceptual Model of Knowledge Elicitation |
Sagheb-Tehrani
|
Artificial Neural Network | 2015 | View | Comparing the Prediction Capabilities of an Artificial Neural Network vs a Phenomenological Model for Predicting the Terminal Ballistics of Kinetic Energy Projectiles |
Auten, Hammell II
|
Artificial Neural Networks | 2013 | View | Predicting the Terminal Ballistics of Kinetic Energy Projectiles Using Artificial Neural Networks |
Auten, Hammell II
|
Attention Economy | 2017 | View | Phubbing: Communication in the Attention Economy |
Pendergrass
|
attitude | 2009 | View | Spyware: What Influences College Students to Use Anti-Spyware Tools? |
Ward, Hunsinger
|
attitudes | 2013 | View | Creating A Semantic Differential Scale For Measuring Users’ Perception and Attitude To Emerging Technologies |
Ajani, Stork
|
auditing | 2017 | View | IT Audit Literature: A Future-Looking Research Agenda
|
Klinkenborg, Streff, Nzailu
|
auditing | 2009 | View | The Impact of Electronic Data Interchange Information Technology on External Auditors |
Ricks, Schwieger, Henry, Almohsen
|
auditing | 2009 | View | The Impact of Electronic Data Interchange Information Technology on External Auditors |
Ricks, Schwieger, Henry, Almohsen
|
Augmented reality | 2021 | View | Augmented Reality & Artificial Intelligence Model: Optimizing Workforce Diversity
|
Aimiuwu
|
autism detection | 2022 | View | Convolutional Neural Network Binary Image Classifier via Mobile Devices: EZ Autism Screener |
Ata, Chung, Maeng
|
autism facial features | 2022 | View | Convolutional Neural Network Binary Image Classifier via Mobile Devices: EZ Autism Screener |
Ata, Chung, Maeng
|
autism facial recognition | 2022 | View | Convolutional Neural Network Binary Image Classifier via Mobile Devices: EZ Autism Screener |
Ata, Chung, Maeng
|
autism screening | 2022 | View | Convolutional Neural Network Binary Image Classifier via Mobile Devices: EZ Autism Screener |
Ata, Chung, Maeng
|
Automatic Identification | 2013 | View | Looking Backwards to Look Ahead: Lessons from Barcode Adoption for RFID Adoption and Implementation |
Sharma, Thomas
|
automation | 2020 | View | Integration of Information Systems: Robotic Process Automation |
Money
|
Aviation Management | 2019 | View | Detection and Analysis of Hard Landing and Near Miss based on Cessna 172G Flight Data and Utilization of Flight Data Monitoring |
Sorab
|
awareness | 2018 | View | Can Social Media Accounts Have an Impact on Hiring Decisions? Guidelines for Appropriate Use |
Kim, Homan
|
AWS SageMaker image classifier | 2022 | View | Convolutional Neural Network Binary Image Classifier via Mobile Devices: EZ Autism Screener |
Ata, Chung, Maeng
|
Azure | 2021 | View | A Cloud-Based System for Scraping Data from Amazon Product Reviews at Scale |
Woodall, Kline, Vetter, Modaresnezhad
|