Keyword | Conf Year | Article | Title | Authors |
E-commerce | 2010 | View | A Model for Understanding Social Commerce |
Afrasiabi Rad, Benyoucef
|
E-commerce | 2009 | View | E-Commerce Security |
Kraft
|
E-health | 2015 | View | A Practice Based Examination of Standardization, and its Relationship with the Design and Use of Healthcare IS |
alsekait, Chakraborty
|
e-loyalty | 2008 | View | Analysis of the Factors that Influence Online Purchasing |
Amoroso, Hunsinger
|
e-mentoring | 2009 | View | Women's Technology Acceptance of Mentoring on the Internet |
Gibson, GIBSON
|
e-satisfaction | 2008 | View | Analysis of the Factors that Influence Online Purchasing |
Amoroso, Hunsinger
|
EA Frameworks | 2020 | View | Enterprise Architecture Transformation Process from a Federal Government Perspective |
Canada, Halawi
|
ease of use | 2008 | View | Factors Driving Handheld Wireless Media Usage |
Lind, Anyansi-Archibong, Anyansi
|
ECN | 2010 | View | NATIS: Novel Architecture Framework for |
Sambasivam, Liang, Liao
|
Economic development | 2021 | View | Harvesting Intrinsically Verifiable Trust to Build a Honey Traceability System for Sustainable Development |
Runzel, Hassler, Hadley, Ratcliffe, Wilkes, Cazier
|
Economic development | 2012 | View | Evaluating the South African software industry as a key component for economic development using an Irish framework |
Dehinbo, Dehinbo
|
economic regions | 2022 | View | An Exploration of the Benefits of Certifications and their Relationship to Salaries in IS/IT |
Matthews, Cummings, Janicki
|
EDI | 2009 | View | The Impact of Electronic Data Interchange Information Technology on External Auditors |
Ricks, Schwieger, Henry, Almohsen
|
EdTech tools | 2022 | View | Children's Privacy:
An Evaluation of EdTech Privacy Policies |
West
|
Education | 2022 | View | The Effect of Mental Illness on Compensation for IT Developers |
Peslak, Ceccucci, Jones, Leonard
|
Education | 2015 | View | An Expanded Analysis of Internet Dependencies by Demographic Variables |
Peslak
|
Educational Model | 2009 | View | Contingency Planning: Disaster Recovery Strategies for Successful Educational Continuity |
Omar, Udeh, Mantha
|
Educational software | 2011 | View | Plan to Throw one Away: Lessons Learned |
Battig, Commo
|
Educational software | 2008 | View | Creating the Pilot AJAX Enabled Query Tool |
Ford, Dollinger
|
Edward Snowden | 2015 | View | Leakage of Geolocation Data by Mobile Ad Networks |
Snow, Hayes, Dwyer
|
Efficiency | 2020 | View | Does the Executive Perception of the Value of Information Technology (IT) Influence the IT strategy? A Case Study |
Pandey, Mishra
|
Effort estimation | 2012 | View | Early Stage Probabilistic Software Project Schedule Estimation |
Kwon, Hammell II
|
EHR | 2012 | View | Analysis of Electronic Health |
Mitchell, Clark
|
eLearning | 2009 | View | Synchronizing Development Life-Cycles: Rationale and Integrative Approach to Construction of eLearning Systems and Online Courses at a Tier 1 Research Institution |
Conn, Macedo, Meese
|
electronic bullying | 2016 | View | Causes of cyberbullying in multi-player online gaming environments: Gamer perceptions |
Cotler, Fryling, Rivituso
|
electronic bullying | 2014 | View | Cyberbullying or normal game play? Impact of age, gender, and experience on cyberbullying in multi-player online gaming environments: Perceptions from one gaming forum |
Fryling, Cotler, Rivituso, Mathews, Pratico
|
Electronic Business | 2009 | View | E-Commerce Security |
Kraft
|
Electronic Business | 2008 | View | An Examination of Information Security in Mobile Banking Architectures |
Streff, Haar
|
electronic coimmunication | 2018 | View | Understanding Cyberstalking through the Analysis of Student's Online Activity |
Paullet, Chawdhry
|
Electronic commerce | 2016 | View | E-commerce Adoption: A Revelatory Case Study in the German Oncology Pharmaceutical Supply Chain |
Sultanow, Chircu, Chircu
|
electronic health rec | 2012 | View | Information Security Blueprint |
Clark, Benli, Mitchell, Vetter
|
Electronic Health Record | 2021 | View | Barriers and Drivers to Adoption of Electronic Health Record Systems |
Du, Sturgill
|
Electronic health records | 2020 | View | An International Review and Study on Perceptions of Security, Adoption, and Implementation of Electronic Health Records |
Aliyu, Wimmer, Powell, Rebman Jr.
|
Electronic health records | 2012 | View | Analysis of Electronic Health |
Mitchell, Clark
|
Electronic health records | 2008 | View | Incorporation of Information Technology into Assisted Health Care: An empirical study |
Merrill, White
|
electronic information flow | 2009 | View | An Ontological Characterization of the ‘Structured Information Flow’ (SIF) Model |
Bhatia, Arthur
|
electronic medical records | 2019 | View | Addressing issues with EMR resulting in workarounds: An exploratory study
|
Mishra, Slonka, Draus, Bromall, Slonka
|
electronic voting systems | 2010 | View | A Process for Assessing Voting System Risk Using Threat Trees |
Yasinisac, Pardue
|
Email | 2013 | View | Data Privacy: Are We Accidentally Sharing Too Much Information? |
Chawdhry, Paullet, Douglas
|
email security behavior | 2017 | View | Student Intentions and Behaviors Related to Email Security: An Application of the Health Belief Model |
Schymik, Du
|
emerging job skills analysis framework | 2022 | View | Developing a Data-Driven Emerging Skill Network Analytics Framework for Automated Employment Advert Evaluation |
Liu, Schwieger
|
Emerging technologies | 2013 | View | Creating A Semantic Differential Scale For Measuring Users’ Perception and Attitude To Emerging Technologies |
Ajani, Stork
|
Emerging Technology | 2013 | View | Looking Backwards to Look Ahead: Lessons from Barcode Adoption for RFID Adoption and Implementation |
Sharma, Thomas
|
empirical study | 2010 | View | Password Security Risk versus Effort: An Exploratory Study on User-Perceived Risk and the Intention to Use Online Applications |
Gebauer, Kline, He
|
employee relations | 2013 | View | Performance and Corporate Social Responsibility in the Information Technology Industry |
Cowan, Parzinger, Welch, Welch
|
employers | 2018 | View | Can Social Media Accounts Have an Impact on Hiring Decisions? Guidelines for Appropriate Use |
Kim, Homan
|
Employment | 2008 | View | The Impact of Technology Diffusion on Employment and Compensation: Evidence from the Telecommunications Sector |
Clark, Moussawi
|
Encryption | 2011 | View | Using the cloud: How to keep your data private |
Cronin, Pauli, Ham
|
end user | 2012 | View | A Portal-Based Web Service Development Using a Mashup Approach |
Miah, Debuse, Gammack, Pigott
|
End User Computer Satisfaction | 2017 | View | Text Messaging Today: A Longitudinal Study of Variables Influencing Text Messaging from 2009 to 2016 |
Peslak, Hunsinger, Kruck
|
End-to-End Information Flow | 2009 | View | An Ontological Characterization of the ‘Structured Information Flow’ (SIF) Model |
Bhatia, Arthur
|
endogenous and exogenous factors | 2012 | View | Evaluating the South African software industry as a key component for economic development using an Irish framework |
Dehinbo, Dehinbo
|
Energy Analytics | 2018 | View | Standardizing Public Utility Data: A Case Study of a Rural Mid-Size Utility |
Hassler, Cazier, Russell, Mueller, Paprocki
|
enterprise architecture | 2020 | View | Enterprise Architecture Transformation Process from a Federal Government Perspective |
Canada, Halawi
|
enterprise architecture | 2018 | View | Where We are with Enterprise Architecture |
Halawi, McCarthy, farah
|
Enterprise resource planning | 2014 | View | ERP Customization vs. Business Process Reengineering: Technical and Functional Perceptions |
Fryling
|
Enterprise resource planning | 2012 | View | Rocky Relationships: Enterprise Resource Planning and Supply Chain Management |
Crumbly, Fryling
|
entity resolution | 2009 | View | Superfund Site Analysis Using Web 2.0 Technologies |
Anderson, Jafar, Rogers
|
Entrepreneurship | 2010 | View | On Conceptual Models of Collaborative Partnerships and the Infusion of Knowledge Workers in the Local IT Sector |
Vardiman, Mhlanga
|
Entrepreneurship | 2009 | View | Towards an Abstract Model for |
Mhlanga, Vardiman, Reames
|
environmental analysis | 2012 | View | Evaluating the South African software industry as a key component for economic development using an Irish framework |
Dehinbo, Dehinbo
|
Environmentalism | 2008 | View | Assessing the Role of CSR in Outsourcing Decisions |
Babin
|
ERP | 2014 | View | ERP Customization vs. Business Process Reengineering: Technical and Functional Perceptions |
Fryling
|
ERP | 2012 | View | Cloud Computing: Should I Stay or Should I Cloud? |
Muhleman, Kim, Homan, Breese
|
ERP | 2012 | View | Rocky Relationships: Enterprise Resource Planning and Supply Chain Management |
Crumbly, Fryling
|
ERP Planning in Academia | 2008 | View | Planning and Implementation of an ERP system in a University in USA: Some Insights and Guidelines |
Somarajan, Weber, Surendran
|
Escalation | 2017 | View | An Exploratory Analysis of Gender Differences in IT Project Commitment, Continuation, and Escalation |
Korzaan, Harris, Brooks
|
estimating arrival times | 2011 | View | Building a Real-Time Bus Tracking Data Display System |
Dudley, Vetter, Brown, Janicki
|
Ethics | 2022 | View | Are Companies Responsible for Internet of Things (IoT) Data Privacy? A Survey of IoT User Perceptions |
Paullet, Pinchot, Chawdhry
|
Ethics | 2019 | View | Big Data, Algorithmic Classification, and False Positives: Consequences for Information Privacy |
Lauer
|
Ethics | 2009 | View | The Effect of Gender on the Application of |
Peslak, Krisanda
|
ETL | 2012 | View | ETL Evolution for Real-Time Data Warehousing |
Kakish, Kraft
|
Evaluation rubric | 2010 | View | Development of an Evaluation Model for XBRL-enabled Tools Intended for Investors |
Clements, Schwieger, Surendran
|
Event Management System | 2021 | View | Low Maintenance, Low Cost, Highly Secure, and Highly Manageable Serverless Solutions for Software Reverse Engineering |
Nguyen, Chung
|
experience knowledge base (EKB) | 2008 | View | Determining Information Technology Project Status using Recognition-primed Decision Making enabled Collaborative Agents Simulating Teamwork (R-CAST) |
Barnes, Hammell II
|
Expert systems | 2011 | View | Plan to Throw one Away: Lessons Learned |
Battig, Commo
|
Expert systems | 2009 | View | A Conceptual Model of Knowledge Elicitation |
Sagheb-Tehrani
|
Export | 2008 | View | A STUDY OF THE INFORMATION TECHNOLOGY TRADE BETWEEN THE UNITED STATES AND ASIA PACIFIC ECONOMIES COOPERATION NATIONS |
Roman, Blakely, Koong, Liu
|
Export | 2008 | View | A Study of the Information Technology Trade between The United States and the Dominican Republic-Central America Free Trade Agreement Nations |
Pena, Aguirre, Saenz, Koong, Liu
|
Export | 2008 | View | A STUDY OF THE INFORMATION TECHNOLOGY TRADE BETWEEN UNITED STATES AND THE SOUTHERN AFRICAN CUSTOM UNION |
Saenz, Flores, Koong, Liu
|
Extract, Transform, Load | 2012 | View | ETL Evolution for Real-Time Data Warehousing |
Kakish, Kraft
|