Keyword | Conf Year | Article | Title | Authors |
C4.5 | 2017 | View | Open vs. Close Source Decision Tree Algorithms: Comparing Performance Measures of Accuracy, Sensitivity and Specificity |
Khan, Wimmer, Powell
|
campus crime | 2019 | View | Understanding Campus Crime with a Multi-University Analytics System |
Iheadindu, Kline, Vetter, Clark
|
campus life | 2011 | View | Social Networking Systems and Campus Life |
Sgambato, Petkov, Wolf
|
Capability Maturity Model | 2009 | View | Sustainability and Greening through |
D'Onofrio, Jarmoszko, Lee-Partridge, Petkova
|
capital expenditures | 2013 | View | A Study of Information Technology Operating and Capital Expenditures and Their Effect on Positive Firm Outcomes |
Peslak
|
CART | 2017 | View | Open vs. Close Source Decision Tree Algorithms: Comparing Performance Measures of Accuracy, Sensitivity and Specificity |
Khan, Wimmer, Powell
|
Case studies | 2008 | View | The Importance of Business Process Alignment |
Kraft
|
Case study | 2022 | View | Influence of Executive Perception of Role of Information Technology: A financial institution perspective |
Pandey, Mishra
|
Case study | 2020 | View | Case Study of Blockchain Applications in Supply Chain Management- Opportunities and Challenges |
Smith, Xiong, Medlin
|
Case study | 2020 | View | Does the Executive Perception of the Value of Information Technology (IT) Influence the IT strategy? A Case Study |
Pandey, Mishra
|
Case study | 2020 | View | Interpreting Organizational Security Governance Objectives for Strategic Security Planning |
Mishra
|
Case study | 2019 | View | An Empirical Study of Post-Production Software Code Quality When Employing the Agile Rapid Delivery Methodology |
Poe, Seeman
|
Case study | 2012 | View | The Impact of Regulatory Changes on IS Strategy: An Exploratory Study |
Reinicke, Ward
|
Case study | 2011 | View | An Approach for Developing Business Architecture, an Essential Enabler for Business and IT Alignment |
Li, Steenkamp
|
CASE tools | 2015 | View | CASE Tools’ Acceptance in Higher Education – Assessment and Enhanced UTAUT Model |
Marcinkowski, Wrycza
|
cell phones | 2011 | View | Talk to Text: Changing Communication Patterns |
Pinchot, Douglas, Paullet, Rota
|
cell phones | 2010 | View | How Mobile Technology is Changing Our Culture |
Pinchot, Paullet, Rota
|
Central limit theorem | 2012 | View | Early Stage Probabilistic Software Project Schedule Estimation |
Kwon, Hammell II
|
Certification | 2008 | View | Formal Information Security Standards in Medium Enterprises |
Sambasivam, Kluge
|
Certifications | 2022 | View | An Exploration of the Benefits of Certifications and their Relationship to Salaries in IS/IT |
Matthews, Cummings, Janicki
|
Challenges | 2015 | View | Information Technology in Patient Care: Challenges of using IT in Small Ambulatory Healthcare Organizations. |
Reddy
|
change management | 2011 | View | The impact of Organizational Culture in managing the change to the use of FOSS at a South African University |
Dehinbo, Alexander
|
Change resistance | 2015 | View | Introducing A Change Resistance Factor in Knowledge Management Model: A Concentration in Organizational Culture |
Abaoud, alluhaidan
|
chemical detector array | 2009 | View | Spatial Interpolation for a Wireless Sensor Network of Chemical Point Detectors: Preliminary Results |
Schafer, Hammell II
|
chemical vapor point detection | 2009 | View | Spatial Interpolation for a Wireless Sensor Network of Chemical Point Detectors: Preliminary Results |
Schafer, Hammell II
|
childhood hunger | 2022 | View | Data Analytics for Societal Challenges: Understanding Student Participation in the National School Lunch Program |
Northey, Desai
|
choice | 2012 | View | Using the Layered Model to Understand Employee Selection of Information and Communication Channels for Information and Knowledge Sharing in Project Teams |
Lee-Partridge, Snyder
|
Classification | 2022 | View | Classification of Wolf Subjects Based on Hunting-Stressed Physiological Effects Using Support Vector Machines (SVM) |
Stewart, Davis
|
Classification | 2015 | View | Comparing the Prediction Capabilities of an Artificial Neural Network vs a Phenomenological Model for Predicting the Terminal Ballistics of Kinetic Energy Projectiles |
Auten, Hammell II
|
client-server systems | 2012 | View | Creating an Audio Conferencing Application |
Sun, Vetter, Reinicke
|
Clinical Decision Support | 2020 | View | Decision-Making Model Transparency for SaMD Machine Learning Algorithms |
Woodside
|
Cloud | 2021 | View | A Cloud-Based System for Scraping Data from Amazon Product Reviews at Scale |
Woodall, Kline, Vetter, Modaresnezhad
|
Cloud computing | 2022 | View | A Predictive Unmanned Aerial Vehicle Maintenance Method: Using Low-Code and Cloud-Based Data Visualization |
Kim, Chung, Ju, Maeng
|
Cloud computing | 2021 | View | An Initial Exploration of Multi-Node Open Cloud Infrastructure Testbed |
Liu, Lui, Li, Embuldeniya, Garcia, McAllister, Schwieger
|
Cloud computing | 2021 | View | Internationalization and Localization for Web and Mobile Applications |
Wang, Chung, Yoon
|
Cloud computing | 2021 | View | Low Maintenance, Low Cost, Highly Secure, and Highly Manageable Serverless Solutions for Software Reverse Engineering |
Nguyen, Chung
|
Cloud computing | 2017 | View | Cloud Computing: Implications for Information Systems Development Service Providers and Practitioners |
Mew, Money
|
Cloud computing | 2017 | View | Exploratory Study of Organizational Adoption of Cloud based Big Data Analytics |
Ghosh
|
Cloud computing | 2016 | View | The Effects of Perceived Functionality and Usability on Privacy and Security Concerns about Adopting Cloud Applications |
Nakayama, Chen, Taylor
|
Cloud computing | 2014 | View | A Cloud Computing Methodology Study of Platform-as-a-Service (PaaS) in the Financial Industry |
Lawler, Howell-Barber, Joseph
|
Cloud computing | 2013 | View | A Study of Cloud Computing Infrastructure-as-a-Service (IaaS) in Financial Firms |
Lawler, Howell-Barber, Joseph, Narula
|
Cloud computing | 2013 | View | Feasibility of a Platform-as-a-Service Implementation using Cloud Computing for a Global Service Organization |
Gai, Steenkamp
|
Cloud computing | 2012 | View | A Study of Cloud Computing Software-as-a-Service (SaaS) in Financial Firms |
Lawler, Howell-Barber, Desai, Joseph
|
Cloud computing | 2012 | View | Cloud Computing: Should I Stay or Should I Cloud? |
Muhleman, Kim, Homan, Breese
|
Cloud computing | 2012 | View | Let’s Look at the Cloud from a Risk Management Perspective |
Vignos, Kim, Metzer
|
Cloud computing | 2012 | View | Using the Cloud: The Cost of Encryption in IaaS |
Cronin, Pauli, Ham
|
Cloud computing | 2011 | View | Using the cloud: How to keep your data private |
Cronin, Pauli, Ham
|
Cloud computing | 2010 | View | The Potential Reality of Service-Oriented Architecture (SOA) in a Cloud Computing Strategy |
Lawler
|
cloud deployment methods | 2013 | View | A Study of Cloud Computing Infrastructure-as-a-Service (IaaS) in Financial Firms |
Lawler, Howell-Barber, Joseph, Narula
|
Cloud Testbed | 2021 | View | An Initial Exploration of Multi-Node Open Cloud Infrastructure Testbed |
Liu, Lui, Li, Embuldeniya, Garcia, McAllister, Schwieger
|
Cloud, Apps | 2014 | View | Identifying User Behavior from Residual Data in Cloud-based Synchronized Apps |
Grispos, Glisson, Pardue, Dickson
|
Cloud-Based | 2022 | View | Impact of New Technology Use on Workforce: Exploratory Analysis |
Toskin
|
Cloud-Based Predictive UAV Maintenance Method | 2022 | View | A Predictive Unmanned Aerial Vehicle Maintenance Method: Using Low-Code and Cloud-Based Data Visualization |
Kim, Chung, Ju, Maeng
|
CMMC | 2021 | View | Cybersecurity Maturity Model Certification Initial Impact on the Defense Industrial Base
|
Strohmier, Stoker, Vanajakumari, Clark, Cummings, Modaresnezhad
|
CMMI | 2014 | View | Roadmaps and Maturity Models: |
Moore
|
CNN image classifier | 2022 | View | Convolutional Neural Network Binary Image Classifier via Mobile Devices: EZ Autism Screener |
Ata, Chung, Maeng
|
Co-Creation | 2011 | View | Co-Creating Value in Systems Development: A Shift towards Service-Dominant Logic |
Babb, Keith
|
code quality | 2019 | View | An Empirical Study of Post-Production Software Code Quality When Employing the Agile Rapid Delivery Methodology |
Poe, Seeman
|
Cognition | 2013 | View | Software Engineering: accessing IT core concepts |
Davis, Kmetz
|
Collaboration | 2012 | View | Information Technology (IT) professional perceptions regarding the value of communication, collaboration, and the use of social networking technologies in the workplace: a case study |
Fryling, Trubitt
|
Collaboration | 2009 | View | An Exploratory Study of Relationships between Workforce Characteristics and the Use of Collaboration and Social Networking Tools in a Global Tchnology Firm |
Totterdale
|
collaborative partnerships | 2010 | View | On Conceptual Models of Collaborative Partnerships and the Infusion of Knowledge Workers in the Local IT Sector |
Vardiman, Mhlanga
|
colleges/universities | 2020 | View | Analysis of Security Features and Vulnerabilities in Public/Open Wi-Fi |
James
|
Commercial Drones | 2018 | View | Commercial Drone Activity: Security, Privacy, and Legislation Issues |
Vannoy, Medlin
|
commercial software | 2008 | View | The Importance of Business Process Alignment |
Kraft
|
Commitment | 2017 | View | An Exploratory Analysis of Gender Differences in IT Project Commitment, Continuation, and Escalation |
Korzaan, Harris, Brooks
|
Communication | 2015 | View | Case Study: Can Interpersonal-Cultural Communication Sustain Another Innovation? |
Spangler , Breese, Borkovich
|
Communication | 2012 | View | Information Technology (IT) professional perceptions regarding the value of communication, collaboration, and the use of social networking technologies in the workplace: a case study |
Fryling, Trubitt
|
Communication | 2011 | View | Talk to Text: Changing Communication Patterns |
Pinchot, Douglas, Paullet, Rota
|
Communication | 2010 | View | How Mobile Technology is Changing Our Culture |
Pinchot, Paullet, Rota
|
Communication | 2010 | View | NATIS: Novel Architecture Framework for |
Sambasivam, Liang, Liao
|
Communication | 2009 | View | Synchronizing Development Life-Cycles: Rationale and Integrative Approach to Construction of eLearning Systems and Online Courses at a Tier 1 Research Institution |
Conn, Macedo, Meese
|
communication channels | 2012 | View | Using the Layered Model to Understand Employee Selection of Information and Communication Channels for Information and Knowledge Sharing in Project Teams |
Lee-Partridge, Snyder
|
Communication System | 2010 | View | The Use of Mobile Units |
McGinley, Nicolai
|
Communication System | 2008 | View | Research Design for a Natural Disaster Management Communication System: |
Nicolai, Puntillo, Bilow
|
Communication Technology | 2009 | View | A Study of the Perceptions of Students on |
Lawler, Molluzzo
|
Communications | 2017 | View | Phubbing: Communication in the Attention Economy |
Pendergrass
|
Community Health | 2019 | View | Developing a GIS Dashboard Tool to Inform Non-Profit Hospitals of Community Health Needs at the Neighborhood Level |
Copello, Smith, Mease, Umapathy, Richard, Knight, Albertie, Hamadi, Spaulding, Apatu
|
community informatics | 2011 | View | Social Networking Systems and Campus Life |
Sgambato, Petkov, Wolf
|
Community Type | 2015 | View | An Expanded Analysis of Internet Dependencies by Demographic Variables |
Peslak
|
community websites | 2009 | View | Analyzing Community Websites: A Main Street Perspective |
Schoenacher
|
company size | 2011 | View | Does Size Matter in IT? An exploratory analysis of critical issues facing organizations based on company size |
Peslak
|
Comparison case study | 2013 | View | Microsoft vs Apple: Which is Great by Choice? |
Sena, Olsen
|
Compensation | 2022 | View | The Effect of Mental Illness on Compensation for IT Developers |
Peslak, Ceccucci, Jones, Leonard
|
competence | 2013 | View | Bizprojet: The co-design of an affinities and skills search-engine. Team building around an innovative project: New knowledge shared? |
Lombardo, Agostinelli, Ouvrard, Arvanitakis, Metge, Linscott
|
Competition Theory | 2016 | View | An Empirical Study on the Impact of Price Discount on Sales in Software-as-a-Service (SaaS) Market |
Choi, Medlin, Hunsinger
|
competitive advantage | 2012 | View | Social Media: Building a Competitive Edge |
Aimiuwu
|
Complex Event Processing | 2019 | View | A Comparative Study on Common Errors in Rules Governing Complex Event Processing Systems |
Dennis, Sambasivam
|
Complex Length | 2008 | View | A Computing Research Example: Following a Question |
Frank
|
Compliance | 2022 | View | Children's Privacy:
An Evaluation of EdTech Privacy Policies |
West
|
component-based software development | 2009 | View | Component-Based Software Development: Life Cycles and Design Science-Based Recommendations |
Sharp, Ryan
|
compression | 2018 | View | The use of Snap Length in Lossy Network Traffic Compression for Network Intrusion Detection Applications |
Smith, Hammell II
|
computational intelligence | 2011 | View | Computational Linguistic Hedges Applied to a Project Critical Path |
McQuighan, Hammell II
|
Computer Competencies | 2019 | View | Project Management Skills
Needed for Mobile App Development |
McCoy
|
Computer Crime | 2009 | View | Some Observations on the Occurrences of Phishing |
Lara, Rios, Salazar, Koong, Liu
|
Computer ethics | 2013 | View | Does File Sharing Lead to Legal Sales? Student Attitudes on Music Piracy |
Siegfried
|
Computer literacy | 2009 | View | A FOLLOW-UP STUDY OF DETECTING PHISHING EMAILS |
Bekkering, Werner, Hutchison
|
Computer science | 2008 | View | Computing Professional Association Membership: An Exploration of Membership Needs and Motivations |
Ritzhaupt, Umapathy, Jamba
|
computer science educators. | 2019 | View | Exploring Strategies Computer Science Educators need to use to Prepare Machine-Learning Datasets for Predicting Dropout Rates in MOOCs |
Nafed, Lotfy, Sambasivam
|
Computer security | 2011 | View | The New Tech Effect: Analyzing Juror Credibility |
Davis, Paullet, Kraeer, Grant
|
Computer security | 2009 | View | Some Observations on the Occurrences of Data Breaches |
Guerra, Joseph, Ramirez, Koong, Liu
|
Computer security | 2009 | View | Some Observations on the Occurrences of Phishing |
Lara, Rios, Salazar, Koong, Liu
|
Computer Vision | 2018 | View | Evaluation of Google Vision API for Object Detection in General Subject Images |
Schultz, Adams
|
Computing | 2012 | View | A Quantitative Analysis of Computing Jobs in 2012 |
Robin, Roggio
|
Computing professionals | 2009 | View | Factors that Persuade and Deter Membership in Professional Computing Associations |
Umapathy, Jamba, Ritzhaupt
|
concept based retrieval | 2011 | View | Study of User Behavior in Image Retrieval and Implications for Content Versus Concept Based Access |
Schultz
|
Conceptual model | 2015 | View | Driving Inside Sales Performance with Lead Management Systems: A Conceptual Model |
Ohiomah, Benyoucef, Andreev
|
conceptual models | 2010 | View | On Conceptual Models of Collaborative Partnerships and the Infusion of Knowledge Workers in the Local IT Sector |
Vardiman, Mhlanga
|
conceptual solution | 2008 | View | The Importance of Business Process Alignment |
Kraft
|
Conceptualization | 2019 | View | Conceptualization of Blockchain-based Applications: Technical Background and Social Perspective |
Xiong, Tang, Medlin
|
configuration management | 2012 | View | The Deployment Pipeline |
Mikita, DeHondt, Nezlek
|
constant comparative method | 2009 | View | Factors that Persuade and Deter Membership in Professional Computing Associations |
Umapathy, Jamba, Ritzhaupt
|
Contact Tracing | 2020 | View | Exploring Sentiment Towards Contact Tracing |
Crable, Sena
|
Content analysis | 2020 | View | Internet of Things (IoT): An Analysis of the Research |
Jourdan, Corley, Ryan, Anderson
|
Content analysis | 2016 | View | Sentiment Analysis and Opinion Mining: Current State of the Art and Review of Google and Yahoo Search Engines’ Privacy Policies |
Peslak
|
content based retrieval | 2011 | View | Study of User Behavior in Image Retrieval and Implications for Content Versus Concept Based Access |
Schultz
|
continuous integration | 2012 | View | The Deployment Pipeline |
Mikita, DeHondt, Nezlek
|
Contractual Governance | 2015 | View | Governance of Outsourcing: Building a Better Relationship |
Babin, Saunderson
|
Contractual Governance | 2016 | View | Building Client Vendor Alignment Capability in Strategic Information Systems Outsourcing |
Ghosh
|
contribution | 2020 | View | Open Source Software: A Detailed Analysis of Contributions and Quality |
Peslak, Hunsinger
|
Controls | 2019 | View | Examining Organizational Security Governance (OSG) Objectives: How is strategic planning for Security is undertaken at ABC Corporation? |
Mishra
|
corporate social responsibility | 2013 | View | Performance and Corporate Social Responsibility in the Information Technology Industry |
Cowan, Parzinger, Welch, Welch
|
corpus linguistics | 2013 | View | Decision-Making via Visual Analysis using the Natural Language Toolkit and R |
Jafar, Babb, Dana
|
corpus linguistics | 2012 | View | A Framework for an Interactive Word-Cloud Ap-proach for Visual Analysis of Digital Text using NLTK |
Jafar, Babb, Dana
|
COTS | 2008 | View | The Importance of Business Process Alignment |
Kraft
|
country development | 2012 | View | Global Diffusion of Virtual Social Networks: A Pyramid Model |
Wang, Sun
|
course | 2009 | View | Synchronizing Development Life-Cycles: Rationale and Integrative Approach to Construction of eLearning Systems and Online Courses at a Tier 1 Research Institution |
Conn, Macedo, Meese
|
Covid | 2021 | View | The COVID Effect: Information Technology Jobs in the Pandemic |
Sendall, Peslak, Ceccucci, Hunsinger
|
COVID-19 | 2022 | View | Exploring Short Stay Health Care Quality: Skilled Nursing Facilities during the COVID-19 Era
|
Winston, Xiong, Medlin, Pelaez
|
COVID-19 | 2021 | View | The COVID Effect: Information Technology Jobs in the Pandemic |
Sendall, Peslak, Ceccucci, Hunsinger
|
COVID-19 | 2020 | View | Exploring Sentiment Towards Contact Tracing |
Crable, Sena
|
craft beer | 2017 | View | Does Your Beer Taste Like Big Data? |
Sirinanda, Ariyachandra, Frolick
|
creative writing | 2019 | View | Literary Analysis Tool: Text Analytics for Creative Writers |
Grimsman, Kline, Vetter, Guinn
|
Crimeware | 2009 | View | A FOLLOW-UP STUDY OF DETECTING PHISHING EMAILS |
Bekkering, Werner, Hutchison
|
CRISP-DM | 2017 | View | Using Systems Analysis and Design to Enhance the Business Understanding Stage in CRISP-DM |
Pomykalski, Buzydlowski
|
critical issues | 2011 | View | Does Size Matter in IT? An exploratory analysis of critical issues facing organizations based on company size |
Peslak
|
critical path scope | 2011 | View | Computational Linguistic Hedges Applied to a Project Critical Path |
McQuighan, Hammell II
|
Critical success factors | 2016 | View | Identifying the Critical Success Factors for Information Systems to Manage Sponsored Research Activities at Institutions of Higher Education |
Lehman, Ruzich
|
Critical success factors | 2009 | View | THE RELATIONSHIP BETWEEN INFORMATION TECHNOLOGY CRITICAL SUCCESS FACTORS AND PROJECT PERFORMANCE |
Lind, Culler
|
CRM | 2012 | View | Cloud Computing: Should I Stay or Should I Cloud? |
Muhleman, Kim, Homan, Breese
|
Cross-Site Scripting (XSS) | 2022 | View | Vulnerability Assessment for Web Applications |
Garcia, Abraham, Kepic, Cankaya
|
Crowd | 2016 | View |
Location Analysis of Mina Site: One of the Most Crowded Areas at Hajj
|
alluhaidan, Alredhaiman
|
Crowdsourcing | 2016 | View | Crowdsourcing Surveys: Alternative Approaches to Survey Collection |
Cummings, Sibona
|
Cryptocurrency | 2019 | View | Conceptualization of Blockchain-based Applications: Technical Background and Social Perspective |
Xiong, Tang, Medlin
|
Cryptography | 2022 | View | Exploring Methods Cybersecurity Managers Need to Implement to Minimize Cyber-Frauds in Mobile Money Services in Ghana |
Sambasivam, Siaw Afriyie
|
CSR | 2015 | View | Social Responsibility Trends and Perceptions in Global IT Outsourcing |
Babin, Myers
|
CSR | 2008 | View | Assessing the Role of CSR in Outsourcing Decisions |
Babin
|
Culture | 2010 | View | How Mobile Technology is Changing Our Culture |
Pinchot, Paullet, Rota
|
Culture | 2008 | View | Factors Driving Handheld Wireless Media Usage |
Lind, Anyansi-Archibong, Anyansi
|
Curriculum design | 2009 | View | A Study of the Perceptions of Students on |
Lawler, Molluzzo
|
customer interaction | 2012 | View | Social Media: Building a Competitive Edge |
Aimiuwu
|
Customer Product relationship | 2017 | View | Does Your Beer Taste Like Big Data? |
Sirinanda, Ariyachandra, Frolick
|
Customer satisfaction | 2012 | View | Social Media: Building a Competitive Edge |
Aimiuwu
|
Customer satisfaction | 2011 | View | Most Popular Package Design |
Miah
|
Customization | 2014 | View | ERP Customization vs. Business Process Reengineering: Technical and Functional Perceptions |
Fryling
|
CVE | 2021 | View | Some Analysis of Common Vulnerabilities and Exposures (CVE) Data from the National Vulnerability Database (NVD) |
Glyder, Stoker, Threatt, Franks, Adams
|
Cyber | 2021 | View | Security Control Techniques: Cybersecurity & Medical Wearable Devices |
Sambasivam, Deal
|
cyber abuse | 2016 | View | Causes of cyberbullying in multi-player online gaming environments: Gamer perceptions |
Cotler, Fryling, Rivituso
|
cyber abuse | 2014 | View | Cyberbullying or normal game play? Impact of age, gender, and experience on cyberbullying in multi-player online gaming environments: Perceptions from one gaming forum |
Fryling, Cotler, Rivituso, Mathews, Pratico
|
cyber crime | 2016 | View | 3D Printing: The Future Crime of the Present |
Fruehauf, Hartle, Al-Khalifa
|
cyber crime | 2012 | View | Cybercrime: The Unintentional Effects of Oversharing Information on Facebook |
Paullet, Pinchot
|
Cyber Security | 2020 | View | Documenting the Process of Hijacking a Raspberry Pi User Login Credentials via Remote Code Execution |
Patel, Wimmer, Powell
|
Cyber Security | 2018 | View | Importance of Features in Adversarial Machine Learning for Cyber Security
|
De Lucia, Cotton
|
Cyber Security | 2016 | View | 3D Printing: The Future Crime of the Present |
Fruehauf, Hartle, Al-Khalifa
|
Cyber Security | 2014 | View | Cyber Security Best Practices: What to do? |
Kleinberg, Reinicke, Cummings
|
Cyber-Bullying | 2009 | View | A Study of the Perceptions of Students on |
Lawler, Molluzzo
|
Cyber-Stalking | 2009 | View | A Study of the Perceptions of Students on |
Lawler, Molluzzo
|
cyberbullying | 2016 | View | Causes of cyberbullying in multi-player online gaming environments: Gamer perceptions |
Cotler, Fryling, Rivituso
|
cyberbullying | 2014 | View | Cyberbullying or normal game play? Impact of age, gender, and experience on cyberbullying in multi-player online gaming environments: Perceptions from one gaming forum |
Fryling, Cotler, Rivituso, Mathews, Pratico
|
cybercrime | 2012 | View | Cybercrime: The Unintentional Effects of Oversharing Information on Facebook |
Paullet, Pinchot
|
Cybersecurity | 2022 | View | Children's Privacy:
An Evaluation of EdTech Privacy Policies |
West
|
Cybersecurity | 2020 | View | Leader-Driven Supply Chain Cybersecurity Framework |
Vanajakumari, Mittal, Stoker, Clark, Miller
|
Cybersecurity Maturity Model Certification | 2021 | View | Cybersecurity Maturity Model Certification Initial Impact on the Defense Industrial Base
|
Strohmier, Stoker, Vanajakumari, Clark, Cummings, Modaresnezhad
|
cybersecurity risks | 2022 | View | QR Code Hacking – Detecting Multiple Vulnerabilities in Android Scanning Software |
Homan, Breese
|
cyberstalking | 2018 | View | Understanding Cyberstalking through the Analysis of Student's Online Activity |
Paullet, Chawdhry
|