Search by Keyword

Search returned 51 items for : G


KeywordConf YearArticleTitleAuthors
Game theory2019ViewGame Theory Through Smartphone App Use In Support of For-Hire Transportation Network Companies Pendergrass
gaming2014ViewCyberbullying or normal game play? Impact of age, gender, and experience on cyberbullying in multi-player online gaming environments: Perceptions from one gaming forum Fryling, Cotler, Rivituso, Mathews, Pratico
GDPR2018ViewPrivacy and Security Issues Associated with Mobile Dating Applications Hayes
Gen X2009ViewAn Exploratory Study of Relationships between Workforce Characteristics and the Use of Collaboration and Social Networking Tools in a Global Tchnology Firm Totterdale
Gen Y2009ViewAn Exploratory Study of Relationships between Workforce Characteristics and the Use of Collaboration and Social Networking Tools in a Global Tchnology Firm Totterdale
Gender2022ViewThe Effect of Mental Illness on Compensation for IT Developers Peslak, Ceccucci, Jones, Leonard
Gender2020ViewJob and Career Satisfaction of Software Engineers Peslak, Ceccucci, Sendall
Gender2017ViewAn Exploratory Analysis of Gender Differences in IT Project Commitment, Continuation, and Escalation Korzaan, Harris, Brooks
Gender2015ViewAn Expanded Analysis of Internet Dependencies by Demographic Variables Peslak
Gender2014ViewCyberbullying or normal game play? Impact of age, gender, and experience on cyberbullying in multi-player online gaming environments: Perceptions from one gaming forum Fryling, Cotler, Rivituso, Mathews, Pratico
Gender2009ViewThe Effect of Gender on the Application of Peslak, Krisanda
Gene Identification2020ViewA Prototype for Distributed Computing Platform using Smartphones Wagner, Cao
general purpose technology2008ViewThe Impact of Technology Diffusion on Employment and Compensation: Evidence from the Telecommunications Sector Clark, Moussawi
General Systems Theory2010ViewA Methodology Tailoring Model for Practitioner Based Information Systems Development Informed by the Principles of General Systems Theory Burns, Deek
Geodata2015ViewLeakage of Geolocation Data by Mobile Ad Networks Snow, Hayes, Dwyer
Geographic Information System2021ViewGIS for Democracy: Toward A Solution Against Gerrymandering Wu, Igoche
Geographic Information System2020ViewSpatial Data Analytics For The Pandemic Wu, Igoche
Geographic Information System2019ViewGeographic Information System For and Against Gerrymandering Wu, DePlato, Combs
Geographic Information Systems2018ViewGeospatial Analytics: Why is Geographic Information Systems a Technology Critical to any Organization? Abot, Ariyachandra, Frolick
geographic information systems (GIS)2019ViewDeveloping a GIS Dashboard Tool to Inform Non-Profit Hospitals of Community Health Needs at the Neighborhood Level Copello, Smith, Mease, Umapathy, Richard, Knight, Albertie, Hamadi, Spaulding, Apatu
geolocation2017ViewGeolocation Tracking and Privacy Issues Associated with the Uber Mobile Application Hayes, Snow, Altuwayjiri
Geospatial Analytics2019ViewDigital Transformation and Geospatial Analytics Abot, Ariyachandra
Geospatial Analytics2018ViewGeospatial Analytics: Why is Geographic Information Systems a Technology Critical to any Organization? Abot, Ariyachandra, Frolick
Gerrymandering2021ViewGIS for Democracy: Toward A Solution Against Gerrymandering Wu, Igoche
Gerrymandering2019ViewGeographic Information System For and Against Gerrymandering Wu, DePlato, Combs
GIS2021ViewGIS for Democracy: Toward A Solution Against Gerrymandering Wu, Igoche
GIS2020ViewSpatial Data Analytics For The Pandemic Wu, Igoche
GIS2019ViewGeographic Information System For and Against Gerrymandering Wu, DePlato, Combs
GIS2016View Location Analysis of Mina Site: One of the Most Crowded Areas at Hajj alluhaidan, Alredhaiman
global diffusion2012ViewGlobal Diffusion of Virtual Social Networks: A Pyramid Model Wang, Sun
Global IT2008ViewA STUDY OF THE INFORMATION TECHNOLOGY TRADE BETWEEN THE UNITED STATES AND ASIA PACIFIC ECONOMIES COOPERATION NATIONS Roman, Blakely, Koong, Liu
Global IT Trade2008ViewA Study of the Information Technology Trade between The United States and the Dominican Republic-Central America Free Trade Agreement Nations Pena, Aguirre, Saenz, Koong, Liu
Global IT Trade2008ViewA STUDY OF THE INFORMATION TECHNOLOGY TRADE BETWEEN UNITED STATES AND THE SOUTHERN AFRICAN CUSTOM UNION Saenz, Flores, Koong, Liu
global positioning2011ViewBuilding a Real-Time Bus Tracking Data Display System Dudley, Vetter, Brown, Janicki
Global sensor networks2013ViewCreating A Semantic Differential Scale For Measuring Users’ Perception and Attitude To Emerging Technologies Ajani, Stork
Globalization2008ViewAssessing the Role of CSR in Outsourcing Decisions Babin
Google2019ViewA Longitudinal Study of Google Privacy Policies Peslak, Kovalchick, Conforti
Google Chrome2011ViewWhy are People Using Google's Corley, Hunsinger
Google Docs2016ViewThe Effects of Perceived Functionality and Usability on Privacy and Security Concerns about Adopting Cloud Applications Nakayama, Chen, Taylor
Google Vision2018ViewEvaluation of Google Vision API for Object Detection in General Subject Images Schultz, Adams
Governance2021ViewResolving Pressure and Stress on Governance Models from Robotic Process Automation Technologies Money
Governance2015ViewGovernance of Outsourcing: Building a Better Relationship Babin, Saunderson
government information systems2011ViewApplying Business Intelligence Concepts to Medicaid Claim Fraud Detection Copeland, Edberg, Wendel
graph complexity2022ViewVisual Layering and Visual Clustering – A Model of Graph Complexity for Business Data Chen, Zhang
Graph mining2022ViewDeveloping a Data-Driven Emerging Skill Network Analytics Framework for Automated Employment Advert Evaluation Liu, Schwieger
Great by Choice2013ViewMicrosoft vs Apple: Which is Great by Choice? Sena, Olsen
Green IS/IT2012ViewThe Adoption of Green IT/IS: Sharma
Greening2009ViewSustainability and Greening through D'Onofrio, Jarmoszko, Lee-Partridge, Petkova
Group Meetings2011ViewMobile Telephone Usage and Perception During Group Meetings. Bajko
Group Support Systems2009ViewUSING A GROUP SUPPORT SYSTEM Nepal, Petkov
guest based encryption2012ViewUsing the Cloud: The Cost of Encryption in IaaS Cronin, Pauli, Ham