Keyword | Conf Year | Article | Title | Authors |
Dashboards | 2019 | View | Developing a GIS Dashboard Tool to Inform Non-Profit Hospitals of Community Health Needs at the Neighborhood Level |
Copello, Smith, Mease, Umapathy, Richard, Knight, Albertie, Hamadi, Spaulding, Apatu
|
Data | 2010 | View | What is Missing From the Current Disaster Model |
Bilow, Nicolai
|
Data analytics | 2022 | View | Classification of Wolf Subjects Based on Hunting-Stressed Physiological Effects Using Support Vector Machines (SVM) |
Stewart, Davis
|
Data analytics | 2022 | View | Data Analytics for Societal Challenges: Understanding Student Participation in the National School Lunch Program |
Northey, Desai
|
Data analytics | 2022 | View | Measuring Analytics Maturity and Culture: The LDIS+™ Analytics Impact Framework |
Fowler, Sambasivam
|
Data analytics | 2019 | View | Big Data, Algorithmic Classification, and False Positives: Consequences for Information Privacy |
Lauer
|
Data analytics | 2019 | View | Detection and Analysis of Hard Landing and Near Miss based on Cessna 172G Flight Data and Utilization of Flight Data Monitoring |
Sorab
|
Data analytics | 2016 | View | Achieving Effective Data Analytics: An Agile Framework |
Castro, Jain
|
data breaches | 2009 | View | Some Observations on the Occurrences of Data Breaches |
Guerra, Joseph, Ramirez, Koong, Liu
|
data breaches characteristics | 2009 | View | Some Observations on the Occurrences of Data Breaches |
Guerra, Joseph, Ramirez, Koong, Liu
|
data breaches trends | 2009 | View | Some Observations on the Occurrences of Data Breaches |
Guerra, Joseph, Ramirez, Koong, Liu
|
Data cleansing | 2009 | View | Superfund Site Analysis Using Web 2.0 Technologies |
Anderson, Jafar, Rogers
|
Data coding schemes | 2012 | View | Readiness for Transitioning to ICD-10 Coding: |
Litton, Humphrey, Schwieger
|
data culture | 2022 | View | Measuring Analytics Maturity and Culture: The LDIS+™ Analytics Impact Framework |
Fowler, Sambasivam
|
Data Exposure | 2021 | View | Data Sharing and Exposure: Findings from Descriptive and Network Analysis of Instant Games on Facebook |
Nicholson, Chakraborty, Ali-Gombe, Hammell II
|
Data governance | 2022 | View | Measurement, reporting, and monitoring organizational security governance: A qualitative analysis of security professionals’ experiences |
Slonka, Mishra, Draus, Bromall
|
Data governance | 2021 | View | Resolving Pressure and Stress on Governance Models from Robotic Process Automation Technologies |
Money
|
Data integration | 2016 | View | Patient Healthcare Smart Card System: A Unified Medical Record for Access and Analytics |
Hussein, Ariyachandra, Frolick
|
data literacy | 2022 | View | Measuring Analytics Maturity and Culture: The LDIS+™ Analytics Impact Framework |
Fowler, Sambasivam
|
Data loss | 2009 | View | Contingency Planning: Disaster Recovery Strategies for Successful Educational Continuity |
Omar, Udeh, Mantha
|
Data management | 2019 | View | Privacy Considerations Throughout the Data Life Cycle |
Pomykalski
|
Data mining | 2022 | View | Classification of Wolf Subjects Based on Hunting-Stressed Physiological Effects Using Support Vector Machines (SVM) |
Stewart, Davis
|
Data mining | 2021 | View | Using Physiological Effects and K-Nearest Neighbor
to Identify Membership in Hunting-Stressed Wolf Populations
|
Stewart, Davis, Igoche
|
Data mining | 2018 | View | A Machine Learning Approach to Optimizing Diabetes Healthcare Management Using SAS Analytic Suite |
Ajani, Habek
|
Data mining | 2016 | View | Proposal for Kelly Criterion-Inspired Lossy Network Compression for Network Intrusion Applications |
Smith, Hammell II
|
Data mining | 2015 | View | A Comparison of Open Source Tools for Data Science |
Wimmer, Powell
|
Data mining | 2013 | View | Predicting the Terminal Ballistics of Kinetic Energy Projectiles Using Artificial Neural Networks |
Auten, Hammell II
|
Data mining | 2012 | View | Building Baseline Preprocessed Common Data Sets for Multiple Follow-on Data Mining Algorithms |
Fowler, Hammell II
|
Data mining | 2008 | View | Knowledge Discovery and Data Mining of Biomedical Data with Decision Trees |
McClelland
|
Data Pipeline | 2021 | View | A Cloud-Based System for Scraping Data from Amazon Product Reviews at Scale |
Woodall, Kline, Vetter, Modaresnezhad
|
data privacy | 2022 | View | Are Companies Responsible for Internet of Things (IoT) Data Privacy? A Survey of IoT User Perceptions |
Paullet, Pinchot, Chawdhry
|
data privacy | 2022 | View | Children's Privacy:
An Evaluation of EdTech Privacy Policies |
West
|
data privacy | 2014 | View | Use of Preventative Measures to Protect Data Privacy on Mobile Devices |
Pinchot, Paullet
|
data science | 2019 | View | Developing a GIS Dashboard Tool to Inform Non-Profit Hospitals of Community Health Needs at the Neighborhood Level |
Copello, Smith, Mease, Umapathy, Richard, Knight, Albertie, Hamadi, Spaulding, Apatu
|
Data Science Tools | 2015 | View | A Comparison of Open Source Tools for Data Science |
Wimmer, Powell
|
data security | 2016 | View | Patient Healthcare Smart Card System: A Unified Medical Record for Access and Analytics |
Hussein, Ariyachandra, Frolick
|
Data sharing | 2021 | View | Data Sharing and Exposure: Findings from Descriptive and Network Analysis of Instant Games on Facebook |
Nicholson, Chakraborty, Ali-Gombe, Hammell II
|
Data Standardization | 2018 | View | Standardizing Public Utility Data: A Case Study of a Rural Mid-Size Utility |
Hassler, Cazier, Russell, Mueller, Paprocki
|
Data visualization | 2022 | View | Visual Layering and Visual Clustering –
A Model of Graph Complexity for Business Data
|
Chen, Zhang
|
Data visualization | 2021 | View | Targeted Data Visualization and Reporting Approaches for Vulnerability Management at Enterprise Organizations |
Painter
|
Data visualization | 2019 | View | Digital Transformation and Geospatial Analytics |
Abot, Ariyachandra
|
Data visualization | 2018 | View | Geospatial Analytics: Why is Geographic Information Systems a Technology Critical to any Organization? |
Abot, Ariyachandra, Frolick
|
Data visualization | 2013 | View | Decision-Making via Visual Analysis using the Natural Language Toolkit and R |
Jafar, Babb, Dana
|
Data visualization | 2012 | View | A Framework for an Interactive Word-Cloud Ap-proach for Visual Analysis of Digital Text using NLTK |
Jafar, Babb, Dana
|
Data warehouse | 2019 | View | Understanding Campus Crime with a Multi-University Analytics System |
Iheadindu, Kline, Vetter, Clark
|
Data warehouse | 2009 | View | Can Management Predict Information Security Threats by Utilizing a Data Warehouse? |
Kim, Steen
|
Data Warehouse Loading | 2012 | View | ETL Evolution for Real-Time Data Warehousing |
Kakish, Kraft
|
Database | 2010 | View | What is Missing From the Current Disaster Model |
Bilow, Nicolai
|
Database | 2008 | View | Creating the Pilot AJAX Enabled Query Tool |
Ford, Dollinger
|
Database | 2008 | View | Test Driven Development in the .Net Framework |
Lee, Mehta, Shah
|
Database development | 2017 | View | Cloud Computing: Implications for Information Systems Development Service Providers and Practitioners |
Mew, Money
|
Database management | 2019 | View | Understanding Campus Crime with a Multi-University Analytics System |
Iheadindu, Kline, Vetter, Clark
|
database tracking system | 2010 | View | The Use of Mobile Units |
McGinley, Nicolai
|
database tracking system | 2008 | View | Research Design for a Natural Disaster Management Communication System: |
Nicolai, Puntillo, Bilow
|
databases | 2011 | View | Plan to Throw one Away: Lessons Learned |
Battig, Commo
|
databases | 2011 | View | Study of User Behavior in Image Retrieval and Implications for Content Versus Concept Based Access |
Schultz
|
datasets | 2019 | View | Exploring Strategies Computer Science Educators need to use to Prepare Machine-Learning Datasets for Predicting Dropout Rates in MOOCs |
Nafed, Lotfy, Sambasivam
|
DBI | 2008 | View | Comparison of Dynamic Web Content Processing Languages Performance |
Jafar, Anderson, Abdullat
|
DDoS | 2017 | View | Protecting IoT Devices from the Mirai Botnet |
Frank, Nance, Jarocki, Pauli
|
de-escalation | 2013 | View | The De-Escalation of the DHS HSIN Next Gen Project |
Rosenhauer, Korzaan
|
Decentralization | 2019 | View | Conceptualization of Blockchain-based Applications: Technical Background and Social Perspective |
Xiong, Tang, Medlin
|
Decimal Scaling | 2018 | View | Effects of Normalization Techniques on Logistic Regression in Data Science |
Adeyemo, Wimmer, Powell
|
Decision support systems | 2014 | View | On Adapting a Military Combat Discrete Event Simulation with Big Data and Geospatial Modeling Toward a Predictive Model Ecosystem for Interpersonal Violence |
Mhlanga, Perry, Kirchner
|
Decision Tree | 2018 | View | A Machine Learning Approach to Optimizing Diabetes Healthcare Management Using SAS Analytic Suite |
Ajani, Habek
|
Decision Tree | 2008 | View | Knowledge Discovery and Data Mining of Biomedical Data with Decision Trees |
McClelland
|
Decision Tree Algorithms | 2017 | View | Open vs. Close Source Decision Tree Algorithms: Comparing Performance Measures of Accuracy, Sensitivity and Specificity |
Khan, Wimmer, Powell
|
Decision-making | 2020 | View | Decision-Making Model Transparency for SaMD Machine Learning Algorithms |
Woodside
|
Decision-making | 2019 | View | Developing a GIS Dashboard Tool to Inform Non-Profit Hospitals of Community Health Needs at the Neighborhood Level |
Copello, Smith, Mease, Umapathy, Richard, Knight, Albertie, Hamadi, Spaulding, Apatu
|
Decision-making | 2012 | View | Examining the Effects of the Value of Information on Intelligence Analyst Performance |
Newcomb, Hammell II
|
Decision-making | 2009 | View | Factors that Persuade and Deter Membership in Professional Computing Associations |
Umapathy, Jamba, Ritzhaupt
|
Definitions | 2009 | View | Virtual Organizations: A Definitional Framework |
Reinicke
|
degrees | 2012 | View | A Quantitative Analysis of Computing Jobs in 2012 |
Robin, Roggio
|
Delphi technique | 2019 | View | Project Management Skills
Needed for Mobile App Development |
McCoy
|
Delphi technique | 2016 | View | Identifying the Critical Success Factors for Information Systems to Manage Sponsored Research Activities at Institutions of Higher Education |
Lehman, Ruzich
|
Dependence | 2015 | View | An Expanded Analysis of Internet Dependencies by Demographic Variables |
Peslak
|
deployment pipeline | 2012 | View | The Deployment Pipeline |
Mikita, DeHondt, Nezlek
|
Descriptive Sharing Analysis | 2021 | View | Data Sharing and Exposure: Findings from Descriptive and Network Analysis of Instant Games on Facebook |
Nicholson, Chakraborty, Ali-Gombe, Hammell II
|
Design Science | 2009 | View | Component-Based Software Development: Life Cycles and Design Science-Based Recommendations |
Sharp, Ryan
|
Design Science | 2009 | View | ON DESIGN SCIENCE, MCDM AND IS OUTSOURCING DECISIONS |
Petkov, Petkova
|
detection | 2017 | View | Protecting IoT Devices from the Mirai Botnet |
Frank, Nance, Jarocki, Pauli
|
deterring factors | 2009 | View | Factors that Persuade and Deter Membership in Professional Computing Associations |
Umapathy, Jamba, Ritzhaupt
|
developer | 2015 | View | Moving Beyond Coding: Why Secure Coding Should be Implemented |
Grover, Cummings, Janicki
|
development life-cycle | 2015 | View | Moving Beyond Coding: Why Secure Coding Should be Implemented |
Grover, Cummings, Janicki
|
development life-cycle | 2009 | View | Synchronizing Development Life-Cycles: Rationale and Integrative Approach to Construction of eLearning Systems and Online Courses at a Tier 1 Research Institution |
Conn, Macedo, Meese
|
DHS HSIN Next Gen | 2013 | View | The De-Escalation of the DHS HSIN Next Gen Project |
Rosenhauer, Korzaan
|
DI | 2010 | View | An Empirical Study of Social Networking Behavior Using Diffusion of Innovation Theory |
Ceccucci, Peslak, Sendall
|
DI | 2009 | View | An Empirical Study of Text Messaging |
Peslak, Ceccucci, Sendall
|
DI | 2008 | View | An Empirical Study of Instant Messaging Behavior Using Diffusion of Innovation Theory |
Peslak, Ceccucci, Sendall
|
Diffusion of Innovation | 2017 | View | Text Messaging Today: A Longitudinal Study of Variables Influencing Text Messaging from 2009 to 2016 |
Peslak, Hunsinger, Kruck
|
Diffusion of Innovation | 2012 | View | Analysis of the Variables That Affect Frequency of Use and Time Spent on Social Networking |
Peslak, Sendall, Ceccucci
|
Diffusion of Innovation | 2010 | View | An Empirical Study of Social Networking Behavior Using Diffusion of Innovation Theory |
Ceccucci, Peslak, Sendall
|
Diffusion of Innovation | 2009 | View | An Empirical Study of Text Messaging |
Peslak, Ceccucci, Sendall
|
Diffusion of Innovation | 2009 | View | Women's Technology Acceptance of Mentoring on the Internet |
Gibson, GIBSON
|
Diffusion of Innovation | 2008 | View | An Empirical Study of Instant Messaging Behavior Using Diffusion of Innovation Theory |
Peslak, Ceccucci, Sendall
|
Digital Commerce | 2016 | View | Analysis of the Risks of NFC Mobile Payment Systems |
Kakish, Shah
|
digital culture | 2015 | View | Case Study: Can Interpersonal-Cultural Communication Sustain Another Innovation? |
Spangler , Breese, Borkovich
|
Digital Currency | 2022 | View | Exploring Methods Cybersecurity Managers Need to Implement to Minimize Cyber-Frauds in Mobile Money Services in Ghana |
Sambasivam, Siaw Afriyie
|
digital divide | 2012 | View | Global Diffusion of Virtual Social Networks: A Pyramid Model |
Wang, Sun
|
Digital Forensics | 2014 | View | Identifying User Behavior from Residual Data in Cloud-based Synchronized Apps |
Grispos, Glisson, Pardue, Dickson
|
Digital Forensics | 2011 | View | The New Tech Effect: Analyzing Juror Credibility |
Davis, Paullet, Kraeer, Grant
|
digital natives | 2015 | View | Case Study: Can Interpersonal-Cultural Communication Sustain Another Innovation? |
Spangler , Breese, Borkovich
|
digital piracy | 2013 | View | Does File Sharing Lead to Legal Sales? Student Attitudes on Music Piracy |
Siegfried
|
digital supply chain | 2022 | View | Big Data Analytics in Supply Chain Management: A Review and Recommendations
|
Ouyang, Hwang, Cham, Chen
|
Digital transformation | 2019 | View | Digital Transformation and Geospatial Analytics |
Abot, Ariyachandra
|
Disabled end-users | 2008 | View | The Accessibility of College and University Home Pages in the State of New York |
DiLallo, Siegfried
|
disaster | 2010 | View | What is Missing From the Current Disaster Model |
Bilow, Nicolai
|
Disaster management system | 2010 | View | The Use of Mobile Units |
McGinley, Nicolai
|
Disaster management system | 2008 | View | Research Design for a Natural Disaster Management Communication System: |
Nicolai, Puntillo, Bilow
|
disaster recovery | 2020 | View | A Comparative Study on Information Technology (IT) Infrastructure and Disaster Recovery Methodology |
Sambasivam, Brown Jr
|
Disaster Recovery Plan | 2009 | View | Contingency Planning: Disaster Recovery Strategies for Successful Educational Continuity |
Omar, Udeh, Mantha
|
Discount Pricing | 2016 | View | An Empirical Study on the Impact of Price Discount on Sales in Software-as-a-Service (SaaS) Market |
Choi, Medlin, Hunsinger
|
Discrete Event Simulation | 2014 | View | On Adapting a Military Combat Discrete Event Simulation with Big Data and Geospatial Modeling Toward a Predictive Model Ecosystem for Interpersonal Violence |
Mhlanga, Perry, Kirchner
|
Displacement Theory | 2017 | View | Phubbing: Communication in the Attention Economy |
Pendergrass
|
disruptive technology | 2016 | View | Finding the “Radicalness” in Radical Innovation Adoption |
Sharma, Thomas, Konsynski
|
Distracted Driving | 2018 | View | Driving Distractions and Multi-tasking: An Investigative Study |
Choi, Xiong, Medlin
|
Distributed Computing | 2020 | View | A Prototype for Distributed Computing Platform using Smartphones |
Wagner, Cao
|
distributed workflow enactment | 2009 | View | Workflow Automation and Management Services in Web 2.0: An Object-Based Approach to Distributed Workflow Enactment |
Wu
|
Diversity | 2021 | View | Augmented Reality & Artificial Intelligence Model: Optimizing Workforce Diversity
|
Aimiuwu
|
Docker | 2021 | View | An Initial Exploration of Multi-Node Open Cloud Infrastructure Testbed |
Liu, Lui, Li, Embuldeniya, Garcia, McAllister, Schwieger
|
document subsets | 2021 | View |
Selecting Subsets of Amazon Reviews
|
Gokce, Kline, Cummings, Vetter
|
Dormant Accounts | 2009 | View | Results of Implementing a Knowledge Management Initiative to Enhance Network Access Controls |
Kim, Nelson
|
dot,com | 2012 | View | Traffic on the Information Super Highway -- Use vs. Useful? |
Grant, Middleton
|
DR-CAFTA | 2008 | View | A Study of the Information Technology Trade between The United States and the Dominican Republic-Central America Free Trade Agreement Nations |
Pena, Aguirre, Saenz, Koong, Liu
|
drone | 2018 | View | Drone Delivery Services: An Evaluation of Personal Innovativeness, Opinion Passing and Key Information Technology Adoption Factors |
Chen, Choi, Charoen
|
drone delivery | 2022 | View | Understanding Gen Z’s Switching Intention to E-Commerce Drone Delivery: An Updated Diffusion of Innovation |
Kaleta, Xie, Chen
|
Drones | 2020 | View | The New Frontier in Home and Commercial Deliveries: Drones
|
Fowler, Vannoy, Eggers, Medlin
|
Dropbox | 2012 | View | An Examination of the Factors Influencing Student Usage of Dropbox, a File Hosting Service |
Hunsinger, Corley
|
dropout rates of students | 2019 | View | Exploring Strategies Computer Science Educators need to use to Prepare Machine-Learning Datasets for Predicting Dropout Rates in MOOCs |
Nafed, Lotfy, Sambasivam
|
drug samples | 2017 | View | Information Sharing Increases Drug Sample Inventory Management Efficiency in Healthcare Clinics: Evidence from a Quasi-Experiment |
Lang, Chahal
|
dual license | 2011 | View | Open Source Software in the Vertical Market: an Open Niche? |
Conlon
|
dyanmic testing | 2013 | View | Taxonomy of Common Software Testing Terminology: Framework for Key Software Engineering Testing Concepts |
Roggio, Gordon, Comer
|
dynamic panel data analysis | 2008 | View | The Impact of Technology Diffusion on Employment and Compensation: Evidence from the Telecommunications Sector |
Clark, Moussawi
|
Dynamic Web Content Processor | 2008 | View | Comparison of Dynamic Web Content Processing Languages Performance |
Jafar, Anderson, Abdullat
|