Keyword | Conf Year | Article | Title | Authors |
backup | 2009 | View | Contingency Planning: Disaster Recovery Strategies for Successful Educational Continuity |
Omar, Udeh, Mantha
|
banking environment | 2014 | View | Aligning Information Systems strategy with the Business Strategy in a South African Banking Environment |
Kekwaletswe, Mathebula
|
Banking industry | 2013 | View | Risk Assessment & Management in Merchant Capture Systems: A Threat Analysis Perspective |
Streff, Shrestha, Delzer
|
Bar codes | 2013 | View | Looking Backwards to Look Ahead: Lessons from Barcode Adoption for RFID Adoption and Implementation |
Sharma, Thomas
|
batch operation machine | 2011 | View | Visualizing Capacity and Load: A Production Planning Information System for Metal Ingot Casting |
Wu, Acharya
|
Bayesian decision making | 2017 | View | Aggregating Complementary and Contradictory Information for Military Decision Making |
Etesamipour, Hammell II
|
Beekeeping | 2020 | View | The Sting of Adoption: The Technology Acceptance Model (TAM) with Actual Usage in a Hazardous Environment |
Hassler, MacDonald, Cazier, Wilkes
|
behavior-driven development | 2012 | View | The Deployment Pipeline |
Mikita, DeHondt, Nezlek
|
Behavioral Intention | 2018 | View | Drone Delivery Services: An Evaluation of Personal Innovativeness, Opinion Passing and Key Information Technology Adoption Factors |
Chen, Choi, Charoen
|
Behavioral Intention | 2012 | View | An Examination of the Factors Influencing Student Usage of Dropbox, a File Hosting Service |
Hunsinger, Corley
|
Behavioral Intention | 2011 | View | Why are People Using Google's |
Corley, Hunsinger
|
Behavioral Intention | 2009 | View | Spyware: What Influences College Students to Use Anti-Spyware Tools? |
Ward, Hunsinger
|
best practices | 2014 | View | Cyber Security Best Practices: What to do? |
Kleinberg, Reinicke, Cummings
|
BI infrastructure | 2020 | View | Enhancing Learning Analytics: The Rise of Institutional Research |
Perkins, Ariyachandra
|
Big data | 2022 | View | Big Data Analytics in Supply Chain Management: A Review and Recommendations
|
Ouyang, Hwang, Cham, Chen
|
Big data | 2021 | View | A Cloud-Based System for Scraping Data from Amazon Product Reviews at Scale |
Woodall, Kline, Vetter, Modaresnezhad
|
Big data | 2019 | View | Big Data, Algorithmic Classification, and False Positives: Consequences for Information Privacy |
Lauer
|
Big data | 2018 | View | Privacy and Security Issues Associated with Mobile Dating Applications |
Hayes
|
Big data | 2018 | View | Standardizing Public Utility Data: A Case Study of a Rural Mid-Size Utility |
Hassler, Cazier, Russell, Mueller, Paprocki
|
Big data | 2017 | View | A Review of Big Data Predictive Analytics in Information Systems Research
|
Ohiomah, Andreev, Benyoucef
|
Big data | 2017 | View | Does Your Beer Taste Like Big Data? |
Sirinanda, Ariyachandra, Frolick
|
Big data | 2017 | View | Exploratory Study of Organizational Adoption of Cloud based Big Data Analytics |
Ghosh
|
Big data | 2016 | View | Achieving Effective Data Analytics: An Agile Framework |
Castro, Jain
|
Big data | 2014 | View | Building a Better Stockbroker: Managing Big (Financial) Data by Constructing an Ontology-Based Framework |
Westrick, Du, Wolffe
|
Big data | 2014 | View | Roadmaps and Maturity Models: |
Moore
|
big data analytics | 2022 | View | Big Data Analytics in Supply Chain Management: A Review and Recommendations
|
Ouyang, Hwang, Cham, Chen
|
biomedical informatics | 2008 | View | Knowledge Discovery and Data Mining of Biomedical Data with Decision Trees |
McClelland
|
Bitcoin | 2019 | View | Conceptualization of Blockchain-based Applications: Technical Background and Social Perspective |
Xiong, Tang, Medlin
|
black-box testing | 2013 | View | Taxonomy of Common Software Testing Terminology: Framework for Key Software Engineering Testing Concepts |
Roggio, Gordon, Comer
|
Blockchain | 2021 | View | Combating Private Blockchain Fraud: A Virtual Reality & Artificial Intelligence Model
|
Aimiuwu
|
Blockchain | 2021 | View | Harvesting Intrinsically Verifiable Trust to Build a Honey Traceability System for Sustainable Development |
Runzel, Hassler, Hadley, Ratcliffe, Wilkes, Cazier
|
Blockchain | 2020 | View | Case Study of Blockchain Applications in Supply Chain Management- Opportunities and Challenges |
Smith, Xiong, Medlin
|
Blockchain | 2019 | View | Conceptualization of Blockchain-based Applications: Technical Background and Social Perspective |
Xiong, Tang, Medlin
|
Blog | 2013 | View | Can Social Media aid Software Development? |
Reinicke, Cummings
|
Bloom filter | 2019 | View | The Use of Tainted Flows in Network Compression for Distributed Network Intrusion Detection |
Smith, Hammell II
|
Bolman and Deal Four Frames Model | 2015 | View | Assessing Cultural Aspects of Organizations for Knowledge Management Initiatives |
Fruehauf, Lehman
|
botnet | 2017 | View | Protecting IoT Devices from the Mirai Botnet |
Frank, Nance, Jarocki, Pauli
|
Brazil | 2022 | View | Decision-Making Tool for Procurement for Brazilian Airlines |
Torres, Halawi, Rojas, Bico, Marinho
|
Bricks-and-mortar retailers | 2013 | View | Online versus In-Store: Price Differentiation for Multi-Channel Retailers |
Flores, Sun
|
Bring Your Own Device (BYOD) | 2014 | View | Identifying User Behavior from Residual Data in Cloud-based Synchronized Apps |
Grispos, Glisson, Pardue, Dickson
|
broadband technology | 2008 | View | The Impact of Technology Diffusion on Employment and Compensation: Evidence from the Telecommunications Sector |
Clark, Moussawi
|
bus tracking | 2011 | View | Building a Real-Time Bus Tracking Data Display System |
Dudley, Vetter, Brown, Janicki
|
Business analytics | 2017 | View | Exploratory Study of Organizational Adoption of Cloud based Big Data Analytics |
Ghosh
|
Business analytics | 2017 | View | Predictive Models for Apportioning 911 Fund |
Berghammer, Douglas, Corley, Chen
|
Business and IT Alignment | 2011 | View | An Approach for Developing Business Architecture, an Essential Enabler for Business and IT Alignment |
Li, Steenkamp
|
Business Architecture Development Approach | 2011 | View | An Approach for Developing Business Architecture, an Essential Enabler for Business and IT Alignment |
Li, Steenkamp
|
Business Architecture Framework | 2011 | View | An Approach for Developing Business Architecture, an Essential Enabler for Business and IT Alignment |
Li, Steenkamp
|
Business Architecture Methodology | 2011 | View | An Approach for Developing Business Architecture, an Essential Enabler for Business and IT Alignment |
Li, Steenkamp
|
Business Architecture Process Model | 2011 | View | An Approach for Developing Business Architecture, an Essential Enabler for Business and IT Alignment |
Li, Steenkamp
|
Business intelligence | 2017 | View | A Review of Big Data Predictive Analytics in Information Systems Research
|
Ohiomah, Andreev, Benyoucef
|
Business intelligence | 2016 | View | Achieving Effective Data Analytics: An Agile Framework |
Castro, Jain
|
Business intelligence | 2015 | View | A Comparison of Open Source Tools for Data Science |
Wimmer, Powell
|
Business intelligence | 2012 | View | ETL Evolution for Real-Time Data Warehousing |
Kakish, Kraft
|
Business intelligence | 2011 | View | Applying Business Intelligence Concepts to Medicaid Claim Fraud Detection |
Copeland, Edberg, Wendel
|
Business models | 2012 | View | Traffic on the Information Super Highway -- Use vs. Useful? |
Grant, Middleton
|
Business process | 2008 | View | The Importance of Business Process Alignment |
Kraft
|
business process improvement | 2013 | View | Feasibility of a Platform-as-a-Service Implementation using Cloud Computing for a Global Service Organization |
Gai, Steenkamp
|
Business process reengineering | 2014 | View | ERP Customization vs. Business Process Reengineering: Technical and Functional Perceptions |
Fryling
|
Business processes | 2008 | View | An Information Technology Project Funding Process |
Kline, Renninger, Guinn, Sackley, Scott
|
business strategy | 2014 | View | Aligning Information Systems strategy with the Business Strategy in a South African Banking Environment |
Kekwaletswe, Mathebula
|
Business Value of IT | 2020 | View | Does the Executive Perception of the Value of Information Technology (IT) Influence the IT strategy? A Case Study |
Pandey, Mishra
|
business-IS strategic alignment | 2014 | View | Aligning Information Systems strategy with the Business Strategy in a South African Banking Environment |
Kekwaletswe, Mathebula
|
business-to-business (B2B) | 2016 | View | E-commerce Adoption: A Revelatory Case Study in the German Oncology Pharmaceutical Supply Chain |
Sultanow, Chircu, Chircu
|