Search by Keyword

Search returned 63 items for : B


KeywordConf YearArticleTitleAuthors
backup2009ViewContingency Planning: Disaster Recovery Strategies for Successful Educational Continuity Omar, Udeh, Mantha
banking environment2014ViewAligning Information Systems strategy with the Business Strategy in a South African Banking Environment Kekwaletswe, Mathebula
Banking industry2013ViewRisk Assessment & Management in Merchant Capture Systems: A Threat Analysis Perspective Streff, Shrestha, Delzer
Bar codes2013ViewLooking Backwards to Look Ahead: Lessons from Barcode Adoption for RFID Adoption and Implementation Sharma, Thomas
batch operation machine2011ViewVisualizing Capacity and Load: A Production Planning Information System for Metal Ingot Casting Wu, Acharya
Bayesian decision making2017ViewAggregating Complementary and Contradictory Information for Military Decision Making Etesamipour, Hammell II
Beekeeping2020ViewThe Sting of Adoption: The Technology Acceptance Model (TAM) with Actual Usage in a Hazardous Environment Hassler, MacDonald, Cazier, Wilkes
behavior-driven development2012ViewThe Deployment Pipeline Mikita, DeHondt, Nezlek
Behavioral Intention2018ViewDrone Delivery Services: An Evaluation of Personal Innovativeness, Opinion Passing and Key Information Technology Adoption Factors Chen, Choi, Charoen
Behavioral Intention2012ViewAn Examination of the Factors Influencing Student Usage of Dropbox, a File Hosting Service Hunsinger, Corley
Behavioral Intention2011ViewWhy are People Using Google's Corley, Hunsinger
Behavioral Intention2009ViewSpyware: What Influences College Students to Use Anti-Spyware Tools? Ward, Hunsinger
best practices2014ViewCyber Security Best Practices: What to do? Kleinberg, Reinicke, Cummings
BI infrastructure2020ViewEnhancing Learning Analytics: The Rise of Institutional Research Perkins, Ariyachandra
Big data2022ViewBig Data Analytics in Supply Chain Management: A Review and Recommendations Ouyang, Hwang, Cham, Chen
Big data2021ViewA Cloud-Based System for Scraping Data from Amazon Product Reviews at Scale Woodall, Kline, Vetter, Modaresnezhad
Big data2019ViewBig Data, Algorithmic Classification, and False Positives: Consequences for Information Privacy Lauer
Big data2018ViewPrivacy and Security Issues Associated with Mobile Dating Applications Hayes
Big data2018ViewStandardizing Public Utility Data: A Case Study of a Rural Mid-Size Utility Hassler, Cazier, Russell, Mueller, Paprocki
Big data2017ViewA Review of Big Data Predictive Analytics in Information Systems Research Ohiomah, Andreev, Benyoucef
Big data2017ViewDoes Your Beer Taste Like Big Data? Sirinanda, Ariyachandra, Frolick
Big data2017ViewExploratory Study of Organizational Adoption of Cloud based Big Data Analytics Ghosh
Big data2016ViewAchieving Effective Data Analytics: An Agile Framework Castro, Jain
Big data2014ViewBuilding a Better Stockbroker: Managing Big (Financial) Data by Constructing an Ontology-Based Framework Westrick, Du, Wolffe
Big data2014ViewRoadmaps and Maturity Models: Moore
big data analytics2022ViewBig Data Analytics in Supply Chain Management: A Review and Recommendations Ouyang, Hwang, Cham, Chen
biomedical informatics2008ViewKnowledge Discovery and Data Mining of Biomedical Data with Decision Trees McClelland
Bitcoin2019ViewConceptualization of Blockchain-based Applications: Technical Background and Social Perspective Xiong, Tang, Medlin
black-box testing2013ViewTaxonomy of Common Software Testing Terminology: Framework for Key Software Engineering Testing Concepts Roggio, Gordon, Comer
Blockchain2021ViewCombating Private Blockchain Fraud: A Virtual Reality & Artificial Intelligence Model Aimiuwu
Blockchain2021ViewHarvesting Intrinsically Verifiable Trust to Build a Honey Traceability System for Sustainable Development Runzel, Hassler, Hadley, Ratcliffe, Wilkes, Cazier
Blockchain2020ViewCase Study of Blockchain Applications in Supply Chain Management- Opportunities and Challenges Smith, Xiong, Medlin
Blockchain2019ViewConceptualization of Blockchain-based Applications: Technical Background and Social Perspective Xiong, Tang, Medlin
Blog2013ViewCan Social Media aid Software Development? Reinicke, Cummings
Bloom filter2019ViewThe Use of Tainted Flows in Network Compression for Distributed Network Intrusion Detection Smith, Hammell II
Bolman and Deal Four Frames Model2015ViewAssessing Cultural Aspects of Organizations for Knowledge Management Initiatives Fruehauf, Lehman
botnet2017ViewProtecting IoT Devices from the Mirai Botnet Frank, Nance, Jarocki, Pauli
Brazil2022ViewDecision-Making Tool for Procurement for Brazilian Airlines Torres, Halawi, Rojas, Bico, Marinho
Bricks-and-mortar retailers2013ViewOnline versus In-Store: Price Differentiation for Multi-Channel Retailers Flores, Sun
Bring Your Own Device (BYOD)2014ViewIdentifying User Behavior from Residual Data in Cloud-based Synchronized Apps Grispos, Glisson, Pardue, Dickson
broadband technology2008ViewThe Impact of Technology Diffusion on Employment and Compensation: Evidence from the Telecommunications Sector Clark, Moussawi
bus tracking2011ViewBuilding a Real-Time Bus Tracking Data Display System Dudley, Vetter, Brown, Janicki
Business analytics2017ViewExploratory Study of Organizational Adoption of Cloud based Big Data Analytics Ghosh
Business analytics2017ViewPredictive Models for Apportioning 911 Fund Berghammer, Douglas, Corley, Chen
Business and IT Alignment2011ViewAn Approach for Developing Business Architecture, an Essential Enabler for Business and IT Alignment Li, Steenkamp
Business Architecture Development Approach2011ViewAn Approach for Developing Business Architecture, an Essential Enabler for Business and IT Alignment Li, Steenkamp
Business Architecture Framework2011ViewAn Approach for Developing Business Architecture, an Essential Enabler for Business and IT Alignment Li, Steenkamp
Business Architecture Methodology2011ViewAn Approach for Developing Business Architecture, an Essential Enabler for Business and IT Alignment Li, Steenkamp
Business Architecture Process Model2011ViewAn Approach for Developing Business Architecture, an Essential Enabler for Business and IT Alignment Li, Steenkamp
Business intelligence2017ViewA Review of Big Data Predictive Analytics in Information Systems Research Ohiomah, Andreev, Benyoucef
Business intelligence2016ViewAchieving Effective Data Analytics: An Agile Framework Castro, Jain
Business intelligence2015ViewA Comparison of Open Source Tools for Data Science Wimmer, Powell
Business intelligence2012ViewETL Evolution for Real-Time Data Warehousing Kakish, Kraft
Business intelligence2011ViewApplying Business Intelligence Concepts to Medicaid Claim Fraud Detection Copeland, Edberg, Wendel
Business models2012ViewTraffic on the Information Super Highway -- Use vs. Useful? Grant, Middleton
Business process2008ViewThe Importance of Business Process Alignment Kraft
business process improvement2013ViewFeasibility of a Platform-as-a-Service Implementation using Cloud Computing for a Global Service Organization Gai, Steenkamp
Business process reengineering2014ViewERP Customization vs. Business Process Reengineering: Technical and Functional Perceptions Fryling
Business processes2008ViewAn Information Technology Project Funding Process Kline, Renninger, Guinn, Sackley, Scott
business strategy2014ViewAligning Information Systems strategy with the Business Strategy in a South African Banking Environment Kekwaletswe, Mathebula
Business Value of IT2020ViewDoes the Executive Perception of the Value of Information Technology (IT) Influence the IT strategy? A Case Study Pandey, Mishra
business-IS strategic alignment2014ViewAligning Information Systems strategy with the Business Strategy in a South African Banking Environment Kekwaletswe, Mathebula
business-to-business (B2B)2016ViewE-commerce Adoption: A Revelatory Case Study in the German Oncology Pharmaceutical Supply Chain Sultanow, Chircu, Chircu