Search by Keyword

Search returned 46 items for : F


KeywordConf YearArticleTitleAuthors
Facebook2017ViewFacebook Fanatics: A Linguistic and Sentiment Analysis of the Most “Fanned” Facebook Pages Peslak
Facebook2012ViewCybercrime: The Unintentional Effects of Oversharing Information on Facebook Paullet, Pinchot
Facebook2011ViewSocial Networking Systems and Campus Life Sgambato, Petkov, Wolf
facilitation2020ViewInterpreting Organizational Security Governance Objectives for Strategic Security Planning Mishra
facilitation2009ViewUSING A GROUP SUPPORT SYSTEM Nepal, Petkov
factor analysis2010ViewAn Empirical Study of Social Networking Behavior Using Diffusion of Innovation Theory Ceccucci, Peslak, Sendall
factor analysis2008ViewAn Empirical Study of Instant Messaging Behavior Using Diffusion of Innovation Theory Peslak, Ceccucci, Sendall
failed projects2013ViewThe De-Escalation of the DHS HSIN Next Gen Project Rosenhauer, Korzaan
Feature Reduction2016ViewPrinciple Component Analysis for Feature Reduction and Data Preprocessing in Data Science Wimmer, Powell
Features2018ViewImportance of Features in Adversarial Machine Learning for Cyber Security De Lucia, Cotton
Federal Government2020ViewEnterprise Architecture Transformation Process from a Federal Government Perspective Canada, Halawi
financial budgeting2008ViewAn Information Technology Project Funding Process Kline, Renninger, Guinn, Sackley, Scott
financial decision support systems2014ViewBuilding a Better Stockbroker: Managing Big (Financial) Data by Constructing an Ontology-Based Framework Westrick, Du, Wolffe
financial industry2014ViewA Cloud Computing Methodology Study of Platform-as-a-Service (PaaS) in the Financial Industry Lawler, Howell-Barber, Joseph
financial industry2013ViewA Study of Cloud Computing Infrastructure-as-a-Service (IaaS) in Financial Firms Lawler, Howell-Barber, Joseph, Narula
firm-level capabilities2012ViewA Study of Cloud Computing Software-as-a-Service (SaaS) in Financial Firms Lawler, Howell-Barber, Desai, Joseph
firm-level capabilities2008ViewThe Impact of Technology Diffusion on Employment and Compensation: Evidence from the Telecommunications Sector Clark, Moussawi
fit2010ViewPassword Security Risk versus Effort: An Exploratory Study on User-Perceived Risk and the Intention to Use Online Applications Gebauer, Kline, He
fitness trackers2020ViewPrivacy Concerns and Data Sharing Habits of Personal Fitness Information Collected via Activity Trackers Pinchot, Cellante
Flight Data Monitoring2019ViewDetection and Analysis of Hard Landing and Near Miss based on Cessna 172G Flight Data and Utilization of Flight Data Monitoring Sorab
Flow2008ViewFactors Driving Handheld Wireless Media Usage Lind, Anyansi-Archibong, Anyansi
Flow Theory2018ViewImprove the Loyalty of Mobile Payment Users in China by Increasing the Fit between Skill, Technology and Task Chen, Choi, Xiong, Tang
food insecurity2022ViewData Analytics for Societal Challenges: Understanding Student Participation in the National School Lunch Program Northey, Desai
forecasting revenue increases2011ViewUsing Market Basket Analysis to Estimate Potential Revenue Increases for a Small University Bookstore Hoanca, Mock
forensics2011ViewThe New Tech Effect: Analyzing Juror Credibility Davis, Paullet, Kraeer, Grant
Formal Standards2008ViewFormal Information Security Standards in Medium Enterprises Sambasivam, Kluge
FOSS2011ViewThe impact of Organizational Culture in managing the change to the use of FOSS at a South African University Dehinbo, Alexander
Fractional dimension2008ViewA Computing Research Example: Following a Question Frank
Framework2020ViewLeader-Driven Supply Chain Cybersecurity Framework Vanajakumari, Mittal, Stoker, Clark, Miller
Framework2016ViewAchieving Effective Data Analytics: An Agile Framework Castro, Jain
Framework2010ViewCreating a Framework for Research on Virtual Organizations Reinicke
Framework2010ViewNATIS: Novel Architecture Framework for Sambasivam, Liang, Liao
Framework2009ViewVirtual Organizations: A Definitional Framework Reinicke
frameworks2018ViewWhere We are with Enterprise Architecture Halawi, McCarthy, farah
fraud2021ViewCombating Private Blockchain Fraud: A Virtual Reality & Artificial Intelligence Model Aimiuwu
fraud2011ViewApplying Business Intelligence Concepts to Medicaid Claim Fraud Detection Copeland, Edberg, Wendel
Free and Open Source Software2011ViewThe impact of Organizational Culture in managing the change to the use of FOSS at a South African University Dehinbo, Alexander
freeware2009ViewThe Two Leading Freeware Image Editing Applications – An Overview, Comparative Evaluation and Guide for the IS Community Scher
frontier analysis2019ViewUnderstanding Campus Crime with a Multi-University Analytics System Iheadindu, Kline, Vetter, Clark
Full-Stack2021ViewDecreasing the Barrier to Entry for an Open-Source Full-Stack Web Development Ngo, Chung, Chang
fun2008ViewFactors Driving Handheld Wireless Media Usage Lind, Anyansi-Archibong, Anyansi
Function point2012ViewEarly Stage Probabilistic Software Project Schedule Estimation Kwon, Hammell II
Functional Affordance2015ViewA Practice Based Examination of Standardization, and its Relationship with the Design and Use of Healthcare IS alsekait, Chakraborty
Funding Models2017ViewPredictive Models for Apportioning 911 Fund Berghammer, Douglas, Corley, Chen
fuzzy logic2012ViewExamining the Effects of the Value of Information on Intelligence Analyst Performance Newcomb, Hammell II
fuzzy TOPSIS2021ViewEffect of Normalization on TOPSIS and Fuzzy TOPSIS Sarraf, McGuire