Search by Keyword

Search returned 81 items for : E


KeywordConf YearArticleTitleAuthors
E-commerce 2010ViewA Model for Understanding Social Commerce Afrasiabi Rad, Benyoucef
E-commerce 2009ViewE-Commerce Security Kraft
E-health2015ViewA Practice Based Examination of Standardization, and its Relationship with the Design and Use of Healthcare IS alsekait, Chakraborty
e-loyalty2008ViewAnalysis of the Factors that Influence Online Purchasing Amoroso, Hunsinger
e-mentoring2009ViewWomen's Technology Acceptance of Mentoring on the Internet Gibson, GIBSON
e-satisfaction2008ViewAnalysis of the Factors that Influence Online Purchasing Amoroso, Hunsinger
EA Frameworks2020ViewEnterprise Architecture Transformation Process from a Federal Government Perspective Canada, Halawi
ease of use2008ViewFactors Driving Handheld Wireless Media Usage Lind, Anyansi-Archibong, Anyansi
ECN2010ViewNATIS: Novel Architecture Framework for Sambasivam, Liang, Liao
Economic development2021ViewHarvesting Intrinsically Verifiable Trust to Build a Honey Traceability System for Sustainable Development Runzel, Hassler, Hadley, Ratcliffe, Wilkes, Cazier
Economic development2012ViewEvaluating the South African software industry as a key component for economic development using an Irish framework Dehinbo, Dehinbo
economic regions2022ViewAn Exploration of the Benefits of Certifications and their Relationship to Salaries in IS/IT Matthews, Cummings, Janicki
EDI2009ViewThe Impact of Electronic Data Interchange Information Technology on External Auditors Ricks, Schwieger, Henry, Almohsen
EdTech tools2022ViewChildren's Privacy: An Evaluation of EdTech Privacy Policies West
Education2022ViewThe Effect of Mental Illness on Compensation for IT Developers Peslak, Ceccucci, Jones, Leonard
Education2015ViewAn Expanded Analysis of Internet Dependencies by Demographic Variables Peslak
Educational Model2009ViewContingency Planning: Disaster Recovery Strategies for Successful Educational Continuity Omar, Udeh, Mantha
Educational software2011ViewPlan to Throw one Away: Lessons Learned Battig, Commo
Educational software2008ViewCreating the Pilot AJAX Enabled Query Tool Ford, Dollinger
Edward Snowden2015ViewLeakage of Geolocation Data by Mobile Ad Networks Snow, Hayes, Dwyer
Efficiency2020ViewDoes the Executive Perception of the Value of Information Technology (IT) Influence the IT strategy? A Case Study Pandey, Mishra
Effort estimation2012ViewEarly Stage Probabilistic Software Project Schedule Estimation Kwon, Hammell II
EHR2012ViewAnalysis of Electronic Health Mitchell, Clark
eLearning2009ViewSynchronizing Development Life-Cycles: Rationale and Integrative Approach to Construction of eLearning Systems and Online Courses at a Tier 1 Research Institution Conn, Macedo, Meese
electronic bullying2016ViewCauses of cyberbullying in multi-player online gaming environments: Gamer perceptions Cotler, Fryling, Rivituso
electronic bullying2014ViewCyberbullying or normal game play? Impact of age, gender, and experience on cyberbullying in multi-player online gaming environments: Perceptions from one gaming forum Fryling, Cotler, Rivituso, Mathews, Pratico
Electronic Business2009ViewE-Commerce Security Kraft
Electronic Business2008ViewAn Examination of Information Security in Mobile Banking Architectures Streff, Haar
electronic coimmunication2018ViewUnderstanding Cyberstalking through the Analysis of Student's Online Activity Paullet, Chawdhry
Electronic commerce2016ViewE-commerce Adoption: A Revelatory Case Study in the German Oncology Pharmaceutical Supply Chain Sultanow, Chircu, Chircu
electronic health rec2012ViewInformation Security Blueprint Clark, Benli, Mitchell, Vetter
Electronic Health Record2021ViewBarriers and Drivers to Adoption of Electronic Health Record Systems Du, Sturgill
Electronic health records2020ViewAn International Review and Study on Perceptions of Security, Adoption, and Implementation of Electronic Health Records Aliyu, Wimmer, Powell, Rebman Jr.
Electronic health records2012ViewAnalysis of Electronic Health Mitchell, Clark
Electronic health records2008ViewIncorporation of Information Technology into Assisted Health Care: An empirical study Merrill, White
electronic information flow2009ViewAn Ontological Characterization of the ‘Structured Information Flow’ (SIF) Model Bhatia, Arthur
electronic medical records2019ViewAddressing issues with EMR resulting in workarounds: An exploratory study Mishra, Slonka, Draus, Bromall, Slonka
electronic voting systems2010ViewA Process for Assessing Voting System Risk Using Threat Trees Yasinisac, Pardue
Email2013ViewData Privacy: Are We Accidentally Sharing Too Much Information? Chawdhry, Paullet, Douglas
email security behavior2017ViewStudent Intentions and Behaviors Related to Email Security: An Application of the Health Belief Model Schymik, Du
emerging job skills analysis framework2022ViewDeveloping a Data-Driven Emerging Skill Network Analytics Framework for Automated Employment Advert Evaluation Liu, Schwieger
Emerging technologies2013ViewCreating A Semantic Differential Scale For Measuring Users’ Perception and Attitude To Emerging Technologies Ajani, Stork
Emerging Technology2013ViewLooking Backwards to Look Ahead: Lessons from Barcode Adoption for RFID Adoption and Implementation Sharma, Thomas
empirical study2010ViewPassword Security Risk versus Effort: An Exploratory Study on User-Perceived Risk and the Intention to Use Online Applications Gebauer, Kline, He
employee relations2013ViewPerformance and Corporate Social Responsibility in the Information Technology Industry Cowan, Parzinger, Welch, Welch
employers2018ViewCan Social Media Accounts Have an Impact on Hiring Decisions? Guidelines for Appropriate Use Kim, Homan
Employment2008ViewThe Impact of Technology Diffusion on Employment and Compensation: Evidence from the Telecommunications Sector Clark, Moussawi
Encryption2011ViewUsing the cloud: How to keep your data private Cronin, Pauli, Ham
end user2012ViewA Portal-Based Web Service Development Using a Mashup Approach Miah, Debuse, Gammack, Pigott
End User Computer Satisfaction2017ViewText Messaging Today: A Longitudinal Study of Variables Influencing Text Messaging from 2009 to 2016 Peslak, Hunsinger, Kruck
End-to-End Information Flow2009ViewAn Ontological Characterization of the ‘Structured Information Flow’ (SIF) Model Bhatia, Arthur
endogenous and exogenous factors2012ViewEvaluating the South African software industry as a key component for economic development using an Irish framework Dehinbo, Dehinbo
Energy Analytics2018ViewStandardizing Public Utility Data: A Case Study of a Rural Mid-Size Utility Hassler, Cazier, Russell, Mueller, Paprocki
enterprise architecture2020ViewEnterprise Architecture Transformation Process from a Federal Government Perspective Canada, Halawi
enterprise architecture2018ViewWhere We are with Enterprise Architecture Halawi, McCarthy, farah
Enterprise resource planning2014ViewERP Customization vs. Business Process Reengineering: Technical and Functional Perceptions Fryling
Enterprise resource planning2012ViewRocky Relationships: Enterprise Resource Planning and Supply Chain Management Crumbly, Fryling
entity resolution2009ViewSuperfund Site Analysis Using Web 2.0 Technologies Anderson, Jafar, Rogers
Entrepreneurship2010ViewOn Conceptual Models of Collaborative Partnerships and the Infusion of Knowledge Workers in the Local IT Sector Vardiman, Mhlanga
Entrepreneurship2009ViewTowards an Abstract Model for Mhlanga, Vardiman, Reames
environmental analysis2012ViewEvaluating the South African software industry as a key component for economic development using an Irish framework Dehinbo, Dehinbo
Environmentalism2008ViewAssessing the Role of CSR in Outsourcing Decisions Babin
ERP2014ViewERP Customization vs. Business Process Reengineering: Technical and Functional Perceptions Fryling
ERP2012ViewCloud Computing: Should I Stay or Should I Cloud? Muhleman, Kim, Homan, Breese
ERP2012ViewRocky Relationships: Enterprise Resource Planning and Supply Chain Management Crumbly, Fryling
ERP Planning in Academia2008ViewPlanning and Implementation of an ERP system in a University in USA: Some Insights and Guidelines Somarajan, Weber, Surendran
Escalation2017ViewAn Exploratory Analysis of Gender Differences in IT Project Commitment, Continuation, and Escalation Korzaan, Harris, Brooks
estimating arrival times2011ViewBuilding a Real-Time Bus Tracking Data Display System Dudley, Vetter, Brown, Janicki
Ethics2022ViewAre Companies Responsible for Internet of Things (IoT) Data Privacy? A Survey of IoT User Perceptions Paullet, Pinchot, Chawdhry
Ethics2019ViewBig Data, Algorithmic Classification, and False Positives: Consequences for Information Privacy Lauer
Ethics2009ViewThe Effect of Gender on the Application of Peslak, Krisanda
ETL2012ViewETL Evolution for Real-Time Data Warehousing Kakish, Kraft
Evaluation rubric2010ViewDevelopment of an Evaluation Model for XBRL-enabled Tools Intended for Investors Clements, Schwieger, Surendran
Event Management System 2021ViewLow Maintenance, Low Cost, Highly Secure, and Highly Manageable Serverless Solutions for Software Reverse Engineering Nguyen, Chung
experience knowledge base (EKB)2008ViewDetermining Information Technology Project Status using Recognition-primed Decision Making enabled Collaborative Agents Simulating Teamwork (R-CAST) Barnes, Hammell II
Expert systems2011ViewPlan to Throw one Away: Lessons Learned Battig, Commo
Expert systems2009ViewA Conceptual Model of Knowledge Elicitation Sagheb-Tehrani
Export2008ViewA STUDY OF THE INFORMATION TECHNOLOGY TRADE BETWEEN THE UNITED STATES AND ASIA PACIFIC ECONOMIES COOPERATION NATIONS Roman, Blakely, Koong, Liu
Export2008ViewA Study of the Information Technology Trade between The United States and the Dominican Republic-Central America Free Trade Agreement Nations Pena, Aguirre, Saenz, Koong, Liu
Export2008ViewA STUDY OF THE INFORMATION TECHNOLOGY TRADE BETWEEN UNITED STATES AND THE SOUTHERN AFRICAN CUSTOM UNION Saenz, Flores, Koong, Liu
Extract, Transform, Load2012ViewETL Evolution for Real-Time Data Warehousing Kakish, Kraft