Search by Keyword

Search returned 151 items for : I


KeywordConf YearArticleTitleAuthors
IaaS2012ViewUsing the Cloud: The Cost of Encryption in IaaS Cronin, Pauli, Ham
IBM SPSS2020ViewPredicting Soil Conditions Using Machine Learning Algorithms Gondi, Hua, Bajracharya
ICD-102012ViewReadiness for Transitioning to ICD-10 Coding: Litton, Humphrey, Schwieger
ICT Labour 2008ViewAssessing the Role of CSR in Outsourcing Decisions Babin
Identity Theft2009ViewE-Commerce Security Kraft
image editing2009ViewThe Two Leading Freeware Image Editing Applications – An Overview, Comparative Evaluation and Guide for the IS Community Scher
image retrieval2018ViewEvaluation of Google Vision API for Object Detection in General Subject Images Schultz, Adams
image retrieval2011ViewStudy of User Behavior in Image Retrieval and Implications for Content Versus Concept Based Access Schultz
images2009ViewThe Two Leading Freeware Image Editing Applications – An Overview, Comparative Evaluation and Guide for the IS Community Scher
implementation2017ViewA Business Multi-Case Study of Change Management in Software Implementation Holtel, Paddock, Reiter, Riley, Havelka
Import2008ViewA STUDY OF THE INFORMATION TECHNOLOGY TRADE BETWEEN THE UNITED STATES AND ASIA PACIFIC ECONOMIES COOPERATION NATIONS Roman, Blakely, Koong, Liu
Import2008ViewA Study of the Information Technology Trade between The United States and the Dominican Republic-Central America Free Trade Agreement Nations Pena, Aguirre, Saenz, Koong, Liu
Import2008ViewA STUDY OF THE INFORMATION TECHNOLOGY TRADE BETWEEN UNITED STATES AND THE SOUTHERN AFRICAN CUSTOM UNION Saenz, Flores, Koong, Liu
impression formation2012ViewThe Impact of Intra-Organizational Social Cummings
Individual characteristics2022ViewThe Effects of Individual Characteristics and Mastery Goal Orientation on IT Project Continuation Intentions Totty, Zaza, Greer, Korzaan
Influence2013ViewSimilarity and Ties in Social Networks Afrasiabi Rad, Benyoucef
influence diagram2009ViewKnowledge Mapping in a Not-For-Profit Firm: A Case Study Nelson, Woratschek
Information 2010ViewNATIS: Novel Architecture Framework for Sambasivam, Liang, Liao
Information 2009ViewSynchronizing Development Life-Cycles: Rationale and Integrative Approach to Construction of eLearning Systems and Online Courses at a Tier 1 Research Institution Conn, Macedo, Meese
information access2009ViewAnalyzing Community Websites: A Main Street Perspective Schoenacher
information aggregation2017ViewAggregating Complementary and Contradictory Information for Military Decision Making Etesamipour, Hammell II
Information Assurance2008ViewAn Examination of Information Security in Mobile Banking Architectures Streff, Haar
information design2011ViewSemiotics as a Theoretical Foundation of Information Design Sharp
Information Flow Automation Model2009ViewAn Ontological Characterization of the ‘Structured Information Flow’ (SIF) Model Bhatia, Arthur
information flow framework2009ViewAn Ontological Characterization of the ‘Structured Information Flow’ (SIF) Model Bhatia, Arthur
Information Privacy2019ViewStrategies Needed by Social Network Builders to Develop Information Privacy Azzouz, Sambasivam
Information Propagation2011ViewMeasuring Propagation in Online Social Networks: The case of YouTube Afrasiabi Rad, Benyoucef
information retrieval2010ViewOn the utility of HCI practices in improving a commercial information retrieval system Honeycutt, Kolpack, Honeycutt, Talbert
Information security2017ViewInformation Security and Privacy Legislation: Current State and Future Direction Dunlap, Cummings, Janicki
Information security2016ViewSubjective norm and measuring its impact on information security behavioral intention in organizations. Etezady
Information security2013ViewInformation Security in Nonprofits: A First Glance at the State of Security in Two Illinois Regions Imboden, Phillips, Seib, Fiorentino
Information security2012ViewInformation Security Blueprint Clark, Benli, Mitchell, Vetter
Information security2011ViewThe New Tech Effect: Analyzing Juror Credibility Davis, Paullet, Kraeer, Grant
Information security2009ViewA FOLLOW-UP STUDY OF DETECTING PHISHING EMAILS Bekkering, Werner, Hutchison
Information security2009ViewCan Management Predict Information Security Threats by Utilizing a Data Warehouse? Kim, Steen
Information security2008ViewFormal Information Security Standards in Medium Enterprises Sambasivam, Kluge
information sharing2017ViewInformation Sharing Increases Drug Sample Inventory Management Efficiency in Healthcare Clinics: Evidence from a Quasi-Experiment Lang, Chahal
Information System Development Methodologies2010ViewA Methodology Tailoring Model for Practitioner Based Information Systems Development Informed by the Principles of General Systems Theory Burns, Deek
Information systems2016ViewIdentifying the Critical Success Factors for Information Systems to Manage Sponsored Research Activities at Institutions of Higher Education Lehman, Ruzich
Information systems2014ViewA Case Study on Achieving Legitimation in Information Systems Action Research Projects Petkova, Petkov
Information systems2014ViewA Cloud Computing Methodology Study of Platform-as-a-Service (PaaS) in the Financial Industry Lawler, Howell-Barber, Joseph
Information systems2013ViewA Study of Cloud Computing Infrastructure-as-a-Service (IaaS) in Financial Firms Lawler, Howell-Barber, Joseph, Narula
Information systems2012ViewA Study of Cloud Computing Software-as-a-Service (SaaS) in Financial Firms Lawler, Howell-Barber, Desai, Joseph
Information systems2011ViewPlan to Throw one Away: Lessons Learned Battig, Commo
Information systems2008ViewComputing Professional Association Membership: An Exploration of Membership Needs and Motivations Ritzhaupt, Umapathy, Jamba
Information Systems Outsourcing2016ViewBuilding Client Vendor Alignment Capability in Strategic Information Systems Outsourcing Ghosh
information systems services2017ViewCloud Computing: Implications for Information Systems Development Service Providers and Practitioners Mew, Money
Information Systems Theory2018ViewDelineating Legacy System IT Artifacts – Applying a Systems Thinking-based Framework Stachofsky
Information technology2021ViewThe COVID Effect: Information Technology Jobs in the Pandemic Sendall, Peslak, Ceccucci, Hunsinger
Information technology2020ViewA Comparative Study on Information Technology (IT) Infrastructure and Disaster Recovery Methodology Sambasivam, Brown Jr
Information technology2020ViewJob and Career Satisfaction of Software Engineers Peslak, Ceccucci, Sendall
Information technology2013ViewA Study of Information Technology Operating and Capital Expenditures and Their Effect on Positive Firm Outcomes Peslak
Information technology2013ViewData Privacy: Are We Accidentally Sharing Too Much Information? Chawdhry, Paullet, Douglas
Information technology2013ViewInformation Security in Nonprofits: A First Glance at the State of Security in Two Illinois Regions Imboden, Phillips, Seib, Fiorentino
Information technology2012ViewInformation Technology (IT) professional perceptions regarding the value of communication, collaboration, and the use of social networking technologies in the workplace: a case study Fryling, Trubitt
Information technology2010ViewA Study of Information Technology Integration Peslak
Information technology2009ViewAn Exploratory Study of Relationships between Workforce Characteristics and the Use of Collaboration and Social Networking Tools in a Global Tchnology Firm Totterdale
Information technology2009ViewSustainability and Greening through D'Onofrio, Jarmoszko, Lee-Partridge, Petkova
Information technology2009ViewThe Effect of Gender on the Application of Peslak, Krisanda
Information technology2008ViewComputing Professional Association Membership: An Exploration of Membership Needs and Motivations Ritzhaupt, Umapathy, Jamba
information technology (sector)2010ViewOn Conceptual Models of Collaborative Partnerships and the Infusion of Knowledge Workers in the Local IT Sector Vardiman, Mhlanga
information technology and computing2009ViewTowards an Abstract Model for Mhlanga, Vardiman, Reames
information technology issues2011ViewDoes Size Matter in IT? An exploratory analysis of critical issues facing organizations based on company size Peslak
information technology management2011ViewDoes Size Matter in IT? An exploratory analysis of critical issues facing organizations based on company size Peslak
Information Technology outsourcing2011ViewOutsourcing Best Practices Mikita, DeHondt
Information Technology outsourcing2009ViewON DESIGN SCIENCE, MCDM AND IS OUTSOURCING DECISIONS Petkov, Petkova
information technology strategy2011ViewDoes Size Matter in IT? An exploratory analysis of critical issues facing organizations based on company size Peslak
infrastructure as a service2012ViewUsing the Cloud: The Cost of Encryption in IaaS Cronin, Pauli, Ham
infrastructure as a service2011ViewUsing the cloud: How to keep your data private Cronin, Pauli, Ham
infrastructure-as-a-service (IaaS)2013ViewA Study of Cloud Computing Infrastructure-as-a-Service (IaaS) in Financial Firms Lawler, Howell-Barber, Joseph, Narula
initial affective reactions2013ViewWeb Recruitment: Parzinger, Ward, Langford
Innovation2022ViewUnderstanding Gen Z’s Switching Intention to E-Commerce Drone Delivery: An Updated Diffusion of Innovation Kaleta, Xie, Chen
Innovation2012ViewTraffic on the Information Super Highway -- Use vs. Useful? Grant, Middleton
Innovation Attributes2021ViewInnovation Attributes as Determinants of the Application of Artificial Intelligence: A Proposed Study Iwuanyanwu, Igoche
Innovative security models2022ViewExploring the Strategic Cybersecurity Defense Information Technology Managers Can Implement to Reduce Healthcare Data Breaches Mawel, Sambasivam
Inside Sales2015ViewDriving Inside Sales Performance with Lead Management Systems: A Conceptual Model Ohiomah, Benyoucef, Andreev
inspire2010ViewOn the utility of HCI practices in improving a commercial information retrieval system Honeycutt, Kolpack, Honeycutt, Talbert
Instant Games2021ViewData Sharing and Exposure: Findings from Descriptive and Network Analysis of Instant Games on Facebook Nicholson, Chakraborty, Ali-Gombe, Hammell II
Instant messaging2008ViewAn Empirical Study of Instant Messaging Behavior Using Diffusion of Innovation Theory Peslak, Ceccucci, Sendall
Institutional Resources2020ViewEnhancing Learning Analytics: The Rise of Institutional Research Perkins, Ariyachandra
Institutional theory2012ViewThe Adoption of Green IT/IS: Sharma
Integration2020ViewIntegration of Information Systems: Robotic Process Automation Money
Integration2010ViewA Study of Information Technology Integration Peslak
Integration Skills2019ViewProject Management Skills Needed for Mobile App Development McCoy
Intellectual property2016View3D Printing: The Future Crime of the Present Fruehauf, Hartle, Al-Khalifa
Intellectual property2013ViewDoes File Sharing Lead to Legal Sales? Student Attitudes on Music Piracy Siegfried
intellectual property right2013ViewDoes File Sharing Lead to Legal Sales? Student Attitudes on Music Piracy Siegfried
intelligence analysis2012ViewExamining the Effects of the Value of Information on Intelligence Analyst Performance Newcomb, Hammell II
intelligent networks2015ViewAn Optimized Intelligent Home Network Model Kevin, Ndlovu, Lall, Kogeda
intention to continue2022ViewThe Effects of Individual Characteristics and Mastery Goal Orientation on IT Project Continuation Intentions Totty, Zaza, Greer, Korzaan
intentions2017ViewStudent Intentions and Behaviors Related to Email Security: An Application of the Health Belief Model Schymik, Du
Interaction Style2012ViewComparing Performance of Web Service Interaction Styles: SOAP vs. REST Kumar, Ahuja, Umapathy, Prodanoff
interactive decision support2011ViewVisualizing Capacity and Load: A Production Planning Information System for Metal Ingot Casting Wu, Acharya
interface design2009ViewSuperfund Site Analysis Using Web 2.0 Technologies Anderson, Jafar, Rogers
Internal Load2021ViewUsing Analytics to understand Performance and Wellness for a Women’s College Soccer Team Njunge, Witman, Holmberg, Canacoo
international2020ViewAn International Review and Study on Perceptions of Security, Adoption, and Implementation of Electronic Health Records Aliyu, Wimmer, Powell, Rebman Jr.
Internationalization2021ViewInternationalization and Localization for Web and Mobile Applications Wang, Chung, Yoon
Internet2015ViewAn Expanded Analysis of Internet Dependencies by Demographic Variables Peslak
Internet Based Technology2009ViewE-Commerce Security Kraft
Internet of Things2022ViewAre Companies Responsible for Internet of Things (IoT) Data Privacy? A Survey of IoT User Perceptions Paullet, Pinchot, Chawdhry
Internet of Things2022ViewSmart Homes Privacy Metrics Etezady
Internet of Things2020ViewInternet of Things (IoT): An Analysis of the Research Jourdan, Corley, Ryan, Anderson
Internet of Things2020ViewPrivacy Concerns and Data Sharing Habits of Personal Fitness Information Collected via Activity Trackers Pinchot, Cellante
Internet of Things hacking2022ViewQR Code Hacking – Detecting Multiple Vulnerabilities in Android Scanning Software Homan, Breese
Interoperability2022ViewExploring the Strategic Cybersecurity Defense Information Technology Managers Can Implement to Reduce Healthcare Data Breaches Mawel, Sambasivam
Interpersonal Violence2014ViewOn Adapting a Military Combat Discrete Event Simulation with Big Data and Geospatial Modeling Toward a Predictive Model Ecosystem for Interpersonal Violence Mhlanga, Perry, Kirchner
Interpretive Case Research2015ViewA Practice Based Examination of Standardization, and its Relationship with the Design and Use of Healthcare IS alsekait, Chakraborty
interruptions2011ViewThe Effects of Interruptions on Remembering Task Information Lenox, Pilarski, Leathers
interviews2019ViewAddressing issues with EMR resulting in workarounds: An exploratory study Mishra, Slonka, Draus, Bromall, Slonka
intra-organizational social networking sites2012ViewThe Impact of Intra-Organizational Social Cummings
Intrusion Detection Systems2019ViewEvaluating Evasion Attack Methods on Binary Network Traffic Classifiers Shah, Gaston, Harvey, McNamara, Ramos, You, Alhajjar
Intrusion Detection Systems2012ViewBuilding Baseline Preprocessed Common Data Sets for Multiple Follow-on Data Mining Algorithms Fowler, Hammell II
Investment2009ViewDifficulties in quantifying IT projects Oliver, Janicki, Barrick
IoT2022ViewSmart Homes Privacy Metrics Etezady
IoT2021ViewSecurity Control Techniques: Cybersecurity & Medical Wearable Devices Sambasivam, Deal
IoT2017ViewProtecting IoT Devices from the Mirai Botnet Frank, Nance, Jarocki, Pauli
iPhone Forensics2015ViewLeakage of Geolocation Data by Mobile Ad Networks Snow, Hayes, Dwyer
Irfanview2009ViewThe Two Leading Freeware Image Editing Applications – An Overview, Comparative Evaluation and Guide for the IS Community Scher
IS Strategy2014ViewAligning Information Systems strategy with the Business Strategy in a South African Banking Environment Kekwaletswe, Mathebula
IS Strategy2012ViewThe Impact of Regulatory Changes on IS Strategy: An Exploratory Study Reinicke, Ward
IS success2012ViewRocky Relationships: Enterprise Resource Planning and Supply Chain Management Crumbly, Fryling
ISO 270012008ViewFormal Information Security Standards in Medium Enterprises Sambasivam, Kluge
IT2015ViewInformation Technology in Patient Care: Challenges of using IT in Small Ambulatory Healthcare Organizations. Reddy
IT Artifact2018ViewDelineating Legacy System IT Artifacts – Applying a Systems Thinking-based Framework Stachofsky
IT Audit2019ViewExamining Organizational Security Governance (OSG) Objectives: How is strategic planning for Security is undertaken at ABC Corporation? Mishra
IT Audit2009ViewResults of Implementing a Knowledge Management Initiative to Enhance Network Access Controls Kim, Nelson
IT auditing2017ViewIT Audit Literature: A Future-Looking Research Agenda Klinkenborg, Streff, Nzailu
IT Components2008ViewA STUDY OF THE INFORMATION TECHNOLOGY TRADE BETWEEN THE UNITED STATES AND ASIA PACIFIC ECONOMIES COOPERATION NATIONS Roman, Blakely, Koong, Liu
IT Components2008ViewA Study of the Information Technology Trade between The United States and the Dominican Republic-Central America Free Trade Agreement Nations Pena, Aguirre, Saenz, Koong, Liu
IT Components2008ViewA STUDY OF THE INFORMATION TECHNOLOGY TRADE BETWEEN UNITED STATES AND THE SOUTHERN AFRICAN CUSTOM UNION Saenz, Flores, Koong, Liu
IT Effectiveness2015ViewExploring Relationships between the Strategic Importance of IT and the Effectiveness of IT Security and Mobile Device Management Stanko, Sena, Sena
IT enabler2022ViewInfluence of Executive Perception of Role of Information Technology: A financial institution perspective Pandey, Mishra
IT facilitator2022ViewInfluence of Executive Perception of Role of Information Technology: A financial institution perspective Pandey, Mishra
IT governance2020ViewDoes the Executive Perception of the Value of Information Technology (IT) Influence the IT strategy? A Case Study Pandey, Mishra
IT industries2012ViewEvaluating the South African software industry as a key component for economic development using an Irish framework Dehinbo, Dehinbo
IT jobs2021ViewThe COVID Effect: Information Technology Jobs in the Pandemic Sendall, Peslak, Ceccucci, Hunsinger
IT offshoring risks2016ViewA Multi-Criteria Network Assessment Model of IT Offshoring Risks from Service Provider’s Perspective Petkov, Petkova
IT performance2009ViewTHE RELATIONSHIP BETWEEN INFORMATION TECHNOLOGY CRITICAL SUCCESS FACTORS AND PROJECT PERFORMANCE Lind, Culler
IT project failure2014ViewRoadmaps and Maturity Models: Moore
IT Project Justification2009ViewDifficulties in quantifying IT projects Oliver, Janicki, Barrick
IT project management2022ViewThe Effects of Individual Characteristics and Mastery Goal Orientation on IT Project Continuation Intentions Totty, Zaza, Greer, Korzaan
IT Projects2017ViewAn Exploratory Analysis of Gender Differences in IT Project Commitment, Continuation, and Escalation Korzaan, Harris, Brooks
IT role2022ViewInfluence of Executive Perception of Role of Information Technology: A financial institution perspective Pandey, Mishra
IT skills2018ViewChanges in the Information Technology Field: A Survey of Current Technologies and Future Importance Cummings, Janicki
IT strategy2020ViewDoes the Executive Perception of the Value of Information Technology (IT) Influence the IT strategy? A Case Study Pandey, Mishra
IT strategy2015ViewExploring Relationships between the Strategic Importance of IT and the Effectiveness of IT Security and Mobile Device Management Stanko, Sena, Sena
IT strategy2008ViewAn Information Technology Project Funding Process Kline, Renninger, Guinn, Sackley, Scott
IT support2022ViewInfluence of Executive Perception of Role of Information Technology: A financial institution perspective Pandey, Mishra
IT Technologies2018ViewChanges in the Information Technology Field: A Survey of Current Technologies and Future Importance Cummings, Janicki
IT Technologies2013ViewShifting Technological Landscape: IT Departments and Anticipated Technological Changes Cummings, Janicki, Kline
IT/IS Skills2013ViewShifting Technological Landscape: IT Departments and Anticipated Technological Changes Cummings, Janicki, Kline