Search by Keyword

Search returned 133 items for : D


KeywordConf YearArticleTitleAuthors
Dashboards2019ViewDeveloping a GIS Dashboard Tool to Inform Non-Profit Hospitals of Community Health Needs at the Neighborhood Level Copello, Smith, Mease, Umapathy, Richard, Knight, Albertie, Hamadi, Spaulding, Apatu
Data2010ViewWhat is Missing From the Current Disaster Model Bilow, Nicolai
Data analytics2022ViewClassification of Wolf Subjects Based on Hunting-Stressed Physiological Effects Using Support Vector Machines (SVM) Stewart, Davis
Data analytics2022ViewData Analytics for Societal Challenges: Understanding Student Participation in the National School Lunch Program Northey, Desai
Data analytics2022ViewMeasuring Analytics Maturity and Culture: The LDIS+™ Analytics Impact Framework Fowler, Sambasivam
Data analytics2019ViewBig Data, Algorithmic Classification, and False Positives: Consequences for Information Privacy Lauer
Data analytics2019ViewDetection and Analysis of Hard Landing and Near Miss based on Cessna 172G Flight Data and Utilization of Flight Data Monitoring Sorab
Data analytics2016ViewAchieving Effective Data Analytics: An Agile Framework Castro, Jain
data breaches2009ViewSome Observations on the Occurrences of Data Breaches Guerra, Joseph, Ramirez, Koong, Liu
data breaches characteristics2009ViewSome Observations on the Occurrences of Data Breaches Guerra, Joseph, Ramirez, Koong, Liu
data breaches trends2009ViewSome Observations on the Occurrences of Data Breaches Guerra, Joseph, Ramirez, Koong, Liu
Data cleansing2009ViewSuperfund Site Analysis Using Web 2.0 Technologies Anderson, Jafar, Rogers
Data coding schemes2012ViewReadiness for Transitioning to ICD-10 Coding: Litton, Humphrey, Schwieger
data culture2022ViewMeasuring Analytics Maturity and Culture: The LDIS+™ Analytics Impact Framework Fowler, Sambasivam
Data Exposure2021ViewData Sharing and Exposure: Findings from Descriptive and Network Analysis of Instant Games on Facebook Nicholson, Chakraborty, Ali-Gombe, Hammell II
Data governance2022ViewMeasurement, reporting, and monitoring organizational security governance: A qualitative analysis of security professionals’ experiences Slonka, Mishra, Draus, Bromall
Data governance2021ViewResolving Pressure and Stress on Governance Models from Robotic Process Automation Technologies Money
Data integration2016ViewPatient Healthcare Smart Card System: A Unified Medical Record for Access and Analytics Hussein, Ariyachandra, Frolick
data literacy2022ViewMeasuring Analytics Maturity and Culture: The LDIS+™ Analytics Impact Framework Fowler, Sambasivam
Data loss2009ViewContingency Planning: Disaster Recovery Strategies for Successful Educational Continuity Omar, Udeh, Mantha
Data management2019ViewPrivacy Considerations Throughout the Data Life Cycle Pomykalski
Data mining2022ViewClassification of Wolf Subjects Based on Hunting-Stressed Physiological Effects Using Support Vector Machines (SVM) Stewart, Davis
Data mining2021ViewUsing Physiological Effects and K-Nearest Neighbor to Identify Membership in Hunting-Stressed Wolf Populations Stewart, Davis, Igoche
Data mining2018ViewA Machine Learning Approach to Optimizing Diabetes Healthcare Management Using SAS Analytic Suite Ajani, Habek
Data mining2016ViewProposal for Kelly Criterion-Inspired Lossy Network Compression for Network Intrusion Applications Smith, Hammell II
Data mining2015ViewA Comparison of Open Source Tools for Data Science Wimmer, Powell
Data mining2013ViewPredicting the Terminal Ballistics of Kinetic Energy Projectiles Using Artificial Neural Networks Auten, Hammell II
Data mining2012ViewBuilding Baseline Preprocessed Common Data Sets for Multiple Follow-on Data Mining Algorithms Fowler, Hammell II
Data mining2008ViewKnowledge Discovery and Data Mining of Biomedical Data with Decision Trees McClelland
Data Pipeline2021ViewA Cloud-Based System for Scraping Data from Amazon Product Reviews at Scale Woodall, Kline, Vetter, Modaresnezhad
data privacy2022ViewAre Companies Responsible for Internet of Things (IoT) Data Privacy? A Survey of IoT User Perceptions Paullet, Pinchot, Chawdhry
data privacy2022ViewChildren's Privacy: An Evaluation of EdTech Privacy Policies West
data privacy2014ViewUse of Preventative Measures to Protect Data Privacy on Mobile Devices Pinchot, Paullet
data science2019ViewDeveloping a GIS Dashboard Tool to Inform Non-Profit Hospitals of Community Health Needs at the Neighborhood Level Copello, Smith, Mease, Umapathy, Richard, Knight, Albertie, Hamadi, Spaulding, Apatu
Data Science Tools2015ViewA Comparison of Open Source Tools for Data Science Wimmer, Powell
data security2016ViewPatient Healthcare Smart Card System: A Unified Medical Record for Access and Analytics Hussein, Ariyachandra, Frolick
Data sharing2021ViewData Sharing and Exposure: Findings from Descriptive and Network Analysis of Instant Games on Facebook Nicholson, Chakraborty, Ali-Gombe, Hammell II
Data Standardization2018ViewStandardizing Public Utility Data: A Case Study of a Rural Mid-Size Utility Hassler, Cazier, Russell, Mueller, Paprocki
Data visualization2022ViewVisual Layering and Visual Clustering – A Model of Graph Complexity for Business Data Chen, Zhang
Data visualization2021ViewTargeted Data Visualization and Reporting Approaches for Vulnerability Management at Enterprise Organizations Painter
Data visualization2019ViewDigital Transformation and Geospatial Analytics Abot, Ariyachandra
Data visualization2018ViewGeospatial Analytics: Why is Geographic Information Systems a Technology Critical to any Organization? Abot, Ariyachandra, Frolick
Data visualization2013ViewDecision-Making via Visual Analysis using the Natural Language Toolkit and R Jafar, Babb, Dana
Data visualization2012ViewA Framework for an Interactive Word-Cloud Ap-proach for Visual Analysis of Digital Text using NLTK Jafar, Babb, Dana
Data warehouse2019ViewUnderstanding Campus Crime with a Multi-University Analytics System Iheadindu, Kline, Vetter, Clark
Data warehouse2009ViewCan Management Predict Information Security Threats by Utilizing a Data Warehouse? Kim, Steen
Data Warehouse Loading2012ViewETL Evolution for Real-Time Data Warehousing Kakish, Kraft
Database2010ViewWhat is Missing From the Current Disaster Model Bilow, Nicolai
Database2008ViewCreating the Pilot AJAX Enabled Query Tool Ford, Dollinger
Database2008ViewTest Driven Development in the .Net Framework Lee, Mehta, Shah
Database development2017ViewCloud Computing: Implications for Information Systems Development Service Providers and Practitioners Mew, Money
Database management2019ViewUnderstanding Campus Crime with a Multi-University Analytics System Iheadindu, Kline, Vetter, Clark
database tracking system2010ViewThe Use of Mobile Units McGinley, Nicolai
database tracking system2008ViewResearch Design for a Natural Disaster Management Communication System: Nicolai, Puntillo, Bilow
databases2011ViewPlan to Throw one Away: Lessons Learned Battig, Commo
databases2011ViewStudy of User Behavior in Image Retrieval and Implications for Content Versus Concept Based Access Schultz
datasets2019ViewExploring Strategies Computer Science Educators need to use to Prepare Machine-Learning Datasets for Predicting Dropout Rates in MOOCs Nafed, Lotfy, Sambasivam
DBI2008ViewComparison of Dynamic Web Content Processing Languages Performance Jafar, Anderson, Abdullat
DDoS2017ViewProtecting IoT Devices from the Mirai Botnet Frank, Nance, Jarocki, Pauli
de-escalation2013ViewThe De-Escalation of the DHS HSIN Next Gen Project Rosenhauer, Korzaan
Decentralization2019ViewConceptualization of Blockchain-based Applications: Technical Background and Social Perspective Xiong, Tang, Medlin
Decimal Scaling2018ViewEffects of Normalization Techniques on Logistic Regression in Data Science Adeyemo, Wimmer, Powell
Decision support systems2014ViewOn Adapting a Military Combat Discrete Event Simulation with Big Data and Geospatial Modeling Toward a Predictive Model Ecosystem for Interpersonal Violence Mhlanga, Perry, Kirchner
Decision Tree2018ViewA Machine Learning Approach to Optimizing Diabetes Healthcare Management Using SAS Analytic Suite Ajani, Habek
Decision Tree2008ViewKnowledge Discovery and Data Mining of Biomedical Data with Decision Trees McClelland
Decision Tree Algorithms2017ViewOpen vs. Close Source Decision Tree Algorithms: Comparing Performance Measures of Accuracy, Sensitivity and Specificity Khan, Wimmer, Powell
Decision-making2020ViewDecision-Making Model Transparency for SaMD Machine Learning Algorithms Woodside
Decision-making2019ViewDeveloping a GIS Dashboard Tool to Inform Non-Profit Hospitals of Community Health Needs at the Neighborhood Level Copello, Smith, Mease, Umapathy, Richard, Knight, Albertie, Hamadi, Spaulding, Apatu
Decision-making2012ViewExamining the Effects of the Value of Information on Intelligence Analyst Performance Newcomb, Hammell II
Decision-making2009ViewFactors that Persuade and Deter Membership in Professional Computing Associations Umapathy, Jamba, Ritzhaupt
Definitions2009ViewVirtual Organizations: A Definitional Framework Reinicke
degrees2012ViewA Quantitative Analysis of Computing Jobs in 2012 Robin, Roggio
Delphi technique2019ViewProject Management Skills Needed for Mobile App Development McCoy
Delphi technique2016ViewIdentifying the Critical Success Factors for Information Systems to Manage Sponsored Research Activities at Institutions of Higher Education Lehman, Ruzich
Dependence2015ViewAn Expanded Analysis of Internet Dependencies by Demographic Variables Peslak
deployment pipeline2012ViewThe Deployment Pipeline Mikita, DeHondt, Nezlek
Descriptive Sharing Analysis2021ViewData Sharing and Exposure: Findings from Descriptive and Network Analysis of Instant Games on Facebook Nicholson, Chakraborty, Ali-Gombe, Hammell II
Design Science2009ViewComponent-Based Software Development: Life Cycles and Design Science-Based Recommendations Sharp, Ryan
Design Science2009ViewON DESIGN SCIENCE, MCDM AND IS OUTSOURCING DECISIONS Petkov, Petkova
detection2017ViewProtecting IoT Devices from the Mirai Botnet Frank, Nance, Jarocki, Pauli
deterring factors2009ViewFactors that Persuade and Deter Membership in Professional Computing Associations Umapathy, Jamba, Ritzhaupt
developer2015ViewMoving Beyond Coding: Why Secure Coding Should be Implemented Grover, Cummings, Janicki
development life-cycle2015ViewMoving Beyond Coding: Why Secure Coding Should be Implemented Grover, Cummings, Janicki
development life-cycle2009ViewSynchronizing Development Life-Cycles: Rationale and Integrative Approach to Construction of eLearning Systems and Online Courses at a Tier 1 Research Institution Conn, Macedo, Meese
DHS HSIN Next Gen2013ViewThe De-Escalation of the DHS HSIN Next Gen Project Rosenhauer, Korzaan
DI2010ViewAn Empirical Study of Social Networking Behavior Using Diffusion of Innovation Theory Ceccucci, Peslak, Sendall
DI2009ViewAn Empirical Study of Text Messaging Peslak, Ceccucci, Sendall
DI2008ViewAn Empirical Study of Instant Messaging Behavior Using Diffusion of Innovation Theory Peslak, Ceccucci, Sendall
Diffusion of Innovation2017ViewText Messaging Today: A Longitudinal Study of Variables Influencing Text Messaging from 2009 to 2016 Peslak, Hunsinger, Kruck
Diffusion of Innovation2012ViewAnalysis of the Variables That Affect Frequency of Use and Time Spent on Social Networking Peslak, Sendall, Ceccucci
Diffusion of Innovation2010ViewAn Empirical Study of Social Networking Behavior Using Diffusion of Innovation Theory Ceccucci, Peslak, Sendall
Diffusion of Innovation2009ViewAn Empirical Study of Text Messaging Peslak, Ceccucci, Sendall
Diffusion of Innovation2009ViewWomen's Technology Acceptance of Mentoring on the Internet Gibson, GIBSON
Diffusion of Innovation2008ViewAn Empirical Study of Instant Messaging Behavior Using Diffusion of Innovation Theory Peslak, Ceccucci, Sendall
Digital Commerce2016ViewAnalysis of the Risks of NFC Mobile Payment Systems Kakish, Shah
digital culture2015ViewCase Study: Can Interpersonal-Cultural Communication Sustain Another Innovation? Spangler , Breese, Borkovich
Digital Currency2022ViewExploring Methods Cybersecurity Managers Need to Implement to Minimize Cyber-Frauds in Mobile Money Services in Ghana Sambasivam, Siaw Afriyie
digital divide2012ViewGlobal Diffusion of Virtual Social Networks: A Pyramid Model Wang, Sun
Digital Forensics2014ViewIdentifying User Behavior from Residual Data in Cloud-based Synchronized Apps Grispos, Glisson, Pardue, Dickson
Digital Forensics2011ViewThe New Tech Effect: Analyzing Juror Credibility Davis, Paullet, Kraeer, Grant
digital natives2015ViewCase Study: Can Interpersonal-Cultural Communication Sustain Another Innovation? Spangler , Breese, Borkovich
digital piracy2013ViewDoes File Sharing Lead to Legal Sales? Student Attitudes on Music Piracy Siegfried
digital supply chain2022ViewBig Data Analytics in Supply Chain Management: A Review and Recommendations Ouyang, Hwang, Cham, Chen
Digital transformation2019ViewDigital Transformation and Geospatial Analytics Abot, Ariyachandra
Disabled end-users2008ViewThe Accessibility of College and University Home Pages in the State of New York DiLallo, Siegfried
disaster2010ViewWhat is Missing From the Current Disaster Model Bilow, Nicolai
Disaster management system2010ViewThe Use of Mobile Units McGinley, Nicolai
Disaster management system2008ViewResearch Design for a Natural Disaster Management Communication System: Nicolai, Puntillo, Bilow
disaster recovery2020ViewA Comparative Study on Information Technology (IT) Infrastructure and Disaster Recovery Methodology Sambasivam, Brown Jr
Disaster Recovery Plan2009ViewContingency Planning: Disaster Recovery Strategies for Successful Educational Continuity Omar, Udeh, Mantha
Discount Pricing2016ViewAn Empirical Study on the Impact of Price Discount on Sales in Software-as-a-Service (SaaS) Market Choi, Medlin, Hunsinger
Discrete Event Simulation2014ViewOn Adapting a Military Combat Discrete Event Simulation with Big Data and Geospatial Modeling Toward a Predictive Model Ecosystem for Interpersonal Violence Mhlanga, Perry, Kirchner
Displacement Theory2017ViewPhubbing: Communication in the Attention Economy Pendergrass
disruptive technology2016ViewFinding the “Radicalness” in Radical Innovation Adoption Sharma, Thomas, Konsynski
Distracted Driving2018ViewDriving Distractions and Multi-tasking: An Investigative Study Choi, Xiong, Medlin
Distributed Computing2020ViewA Prototype for Distributed Computing Platform using Smartphones Wagner, Cao
distributed workflow enactment2009ViewWorkflow Automation and Management Services in Web 2.0: An Object-Based Approach to Distributed Workflow Enactment Wu
Diversity2021ViewAugmented Reality & Artificial Intelligence Model: Optimizing Workforce Diversity Aimiuwu
Docker2021ViewAn Initial Exploration of Multi-Node Open Cloud Infrastructure Testbed Liu, Lui, Li, Embuldeniya, Garcia, McAllister, Schwieger
document subsets2021View Selecting Subsets of Amazon Reviews Gokce, Kline, Cummings, Vetter
Dormant Accounts2009ViewResults of Implementing a Knowledge Management Initiative to Enhance Network Access Controls Kim, Nelson
dot,com2012ViewTraffic on the Information Super Highway -- Use vs. Useful? Grant, Middleton
DR-CAFTA2008ViewA Study of the Information Technology Trade between The United States and the Dominican Republic-Central America Free Trade Agreement Nations Pena, Aguirre, Saenz, Koong, Liu
drone2018ViewDrone Delivery Services: An Evaluation of Personal Innovativeness, Opinion Passing and Key Information Technology Adoption Factors Chen, Choi, Charoen
drone delivery2022ViewUnderstanding Gen Z’s Switching Intention to E-Commerce Drone Delivery: An Updated Diffusion of Innovation Kaleta, Xie, Chen
Drones2020ViewThe New Frontier in Home and Commercial Deliveries: Drones Fowler, Vannoy, Eggers, Medlin
Dropbox2012ViewAn Examination of the Factors Influencing Student Usage of Dropbox, a File Hosting Service Hunsinger, Corley
dropout rates of students2019ViewExploring Strategies Computer Science Educators need to use to Prepare Machine-Learning Datasets for Predicting Dropout Rates in MOOCs Nafed, Lotfy, Sambasivam
drug samples2017ViewInformation Sharing Increases Drug Sample Inventory Management Efficiency in Healthcare Clinics: Evidence from a Quasi-Experiment Lang, Chahal
dual license2011ViewOpen Source Software in the Vertical Market: an Open Niche? Conlon
dyanmic testing2013ViewTaxonomy of Common Software Testing Terminology: Framework for Key Software Engineering Testing Concepts Roggio, Gordon, Comer
dynamic panel data analysis2008ViewThe Impact of Technology Diffusion on Employment and Compensation: Evidence from the Telecommunications Sector Clark, Moussawi
Dynamic Web Content Processor2008ViewComparison of Dynamic Web Content Processing Languages Performance Jafar, Anderson, Abdullat