Keyword | Conf Year | Article | Title | Authors |
IaaS | 2012 | View | Using the Cloud: The Cost of Encryption in IaaS |
Cronin, Pauli, Ham
|
IBM SPSS | 2020 | View | Predicting Soil Conditions Using Machine Learning Algorithms |
Gondi, Hua, Bajracharya
|
ICD-10 | 2012 | View | Readiness for Transitioning to ICD-10 Coding: |
Litton, Humphrey, Schwieger
|
ICT Labour | 2008 | View | Assessing the Role of CSR in Outsourcing Decisions |
Babin
|
Identity Theft | 2009 | View | E-Commerce Security |
Kraft
|
image editing | 2009 | View | The Two Leading Freeware Image Editing Applications – An Overview, Comparative Evaluation and Guide for the IS Community |
Scher
|
image retrieval | 2018 | View | Evaluation of Google Vision API for Object Detection in General Subject Images |
Schultz, Adams
|
image retrieval | 2011 | View | Study of User Behavior in Image Retrieval and Implications for Content Versus Concept Based Access |
Schultz
|
images | 2009 | View | The Two Leading Freeware Image Editing Applications – An Overview, Comparative Evaluation and Guide for the IS Community |
Scher
|
implementation | 2017 | View | A Business Multi-Case Study of Change Management in Software Implementation |
Holtel, Paddock, Reiter, Riley, Havelka
|
Import | 2008 | View | A STUDY OF THE INFORMATION TECHNOLOGY TRADE BETWEEN THE UNITED STATES AND ASIA PACIFIC ECONOMIES COOPERATION NATIONS |
Roman, Blakely, Koong, Liu
|
Import | 2008 | View | A Study of the Information Technology Trade between The United States and the Dominican Republic-Central America Free Trade Agreement Nations |
Pena, Aguirre, Saenz, Koong, Liu
|
Import | 2008 | View | A STUDY OF THE INFORMATION TECHNOLOGY TRADE BETWEEN UNITED STATES AND THE SOUTHERN AFRICAN CUSTOM UNION |
Saenz, Flores, Koong, Liu
|
impression formation | 2012 | View | The Impact of Intra-Organizational Social |
Cummings
|
Individual characteristics | 2022 | View | The Effects of Individual Characteristics and Mastery Goal Orientation on IT Project Continuation Intentions |
Totty, Zaza, Greer, Korzaan
|
Influence | 2013 | View | Similarity and Ties in Social Networks |
Afrasiabi Rad, Benyoucef
|
influence diagram | 2009 | View | Knowledge Mapping in a Not-For-Profit Firm: A Case Study |
Nelson, Woratschek
|
Information | 2010 | View | NATIS: Novel Architecture Framework for |
Sambasivam, Liang, Liao
|
Information | 2009 | View | Synchronizing Development Life-Cycles: Rationale and Integrative Approach to Construction of eLearning Systems and Online Courses at a Tier 1 Research Institution |
Conn, Macedo, Meese
|
information access | 2009 | View | Analyzing Community Websites: A Main Street Perspective |
Schoenacher
|
information aggregation | 2017 | View | Aggregating Complementary and Contradictory Information for Military Decision Making |
Etesamipour, Hammell II
|
Information Assurance | 2008 | View | An Examination of Information Security in Mobile Banking Architectures |
Streff, Haar
|
information design | 2011 | View | Semiotics as a Theoretical Foundation of Information Design |
Sharp
|
Information Flow Automation Model | 2009 | View | An Ontological Characterization of the ‘Structured Information Flow’ (SIF) Model |
Bhatia, Arthur
|
information flow framework | 2009 | View | An Ontological Characterization of the ‘Structured Information Flow’ (SIF) Model |
Bhatia, Arthur
|
Information Privacy | 2019 | View | Strategies Needed by Social Network Builders to Develop Information Privacy |
Azzouz, Sambasivam
|
Information Propagation | 2011 | View | Measuring Propagation in Online Social Networks: The case of YouTube |
Afrasiabi Rad, Benyoucef
|
information retrieval | 2010 | View | On the utility of HCI practices in improving a commercial information retrieval system |
Honeycutt, Kolpack, Honeycutt, Talbert
|
Information security | 2017 | View | Information Security and Privacy Legislation:
Current State and Future Direction |
Dunlap, Cummings, Janicki
|
Information security | 2016 | View | Subjective norm and measuring its impact on information security behavioral intention in organizations. |
Etezady
|
Information security | 2013 | View | Information Security in Nonprofits: A First Glance at the State of Security in Two Illinois Regions |
Imboden, Phillips, Seib, Fiorentino
|
Information security | 2012 | View | Information Security Blueprint |
Clark, Benli, Mitchell, Vetter
|
Information security | 2011 | View | The New Tech Effect: Analyzing Juror Credibility |
Davis, Paullet, Kraeer, Grant
|
Information security | 2009 | View | A FOLLOW-UP STUDY OF DETECTING PHISHING EMAILS |
Bekkering, Werner, Hutchison
|
Information security | 2009 | View | Can Management Predict Information Security Threats by Utilizing a Data Warehouse? |
Kim, Steen
|
Information security | 2008 | View | Formal Information Security Standards in Medium Enterprises |
Sambasivam, Kluge
|
information sharing | 2017 | View | Information Sharing Increases Drug Sample Inventory Management Efficiency in Healthcare Clinics: Evidence from a Quasi-Experiment |
Lang, Chahal
|
Information System Development Methodologies | 2010 | View | A Methodology Tailoring Model for Practitioner Based Information Systems Development Informed by the Principles of General Systems Theory |
Burns, Deek
|
Information systems | 2016 | View | Identifying the Critical Success Factors for Information Systems to Manage Sponsored Research Activities at Institutions of Higher Education |
Lehman, Ruzich
|
Information systems | 2014 | View | A Case Study on Achieving Legitimation in Information Systems Action Research Projects |
Petkova, Petkov
|
Information systems | 2014 | View | A Cloud Computing Methodology Study of Platform-as-a-Service (PaaS) in the Financial Industry |
Lawler, Howell-Barber, Joseph
|
Information systems | 2013 | View | A Study of Cloud Computing Infrastructure-as-a-Service (IaaS) in Financial Firms |
Lawler, Howell-Barber, Joseph, Narula
|
Information systems | 2012 | View | A Study of Cloud Computing Software-as-a-Service (SaaS) in Financial Firms |
Lawler, Howell-Barber, Desai, Joseph
|
Information systems | 2011 | View | Plan to Throw one Away: Lessons Learned |
Battig, Commo
|
Information systems | 2008 | View | Computing Professional Association Membership: An Exploration of Membership Needs and Motivations |
Ritzhaupt, Umapathy, Jamba
|
Information Systems Outsourcing | 2016 | View | Building Client Vendor Alignment Capability in Strategic Information Systems Outsourcing |
Ghosh
|
information systems services | 2017 | View | Cloud Computing: Implications for Information Systems Development Service Providers and Practitioners |
Mew, Money
|
Information Systems Theory | 2018 | View | Delineating Legacy System IT Artifacts – Applying a Systems Thinking-based Framework |
Stachofsky
|
Information technology | 2021 | View | The COVID Effect: Information Technology Jobs in the Pandemic |
Sendall, Peslak, Ceccucci, Hunsinger
|
Information technology | 2020 | View | A Comparative Study on Information Technology (IT) Infrastructure and Disaster Recovery Methodology |
Sambasivam, Brown Jr
|
Information technology | 2020 | View | Job and Career Satisfaction of Software Engineers |
Peslak, Ceccucci, Sendall
|
Information technology | 2013 | View | A Study of Information Technology Operating and Capital Expenditures and Their Effect on Positive Firm Outcomes |
Peslak
|
Information technology | 2013 | View | Data Privacy: Are We Accidentally Sharing Too Much Information? |
Chawdhry, Paullet, Douglas
|
Information technology | 2013 | View | Information Security in Nonprofits: A First Glance at the State of Security in Two Illinois Regions |
Imboden, Phillips, Seib, Fiorentino
|
Information technology | 2012 | View | Information Technology (IT) professional perceptions regarding the value of communication, collaboration, and the use of social networking technologies in the workplace: a case study |
Fryling, Trubitt
|
Information technology | 2010 | View | A Study of Information Technology Integration |
Peslak
|
Information technology | 2009 | View | An Exploratory Study of Relationships between Workforce Characteristics and the Use of Collaboration and Social Networking Tools in a Global Tchnology Firm |
Totterdale
|
Information technology | 2009 | View | Sustainability and Greening through |
D'Onofrio, Jarmoszko, Lee-Partridge, Petkova
|
Information technology | 2009 | View | The Effect of Gender on the Application of |
Peslak, Krisanda
|
Information technology | 2008 | View | Computing Professional Association Membership: An Exploration of Membership Needs and Motivations |
Ritzhaupt, Umapathy, Jamba
|
information technology (sector) | 2010 | View | On Conceptual Models of Collaborative Partnerships and the Infusion of Knowledge Workers in the Local IT Sector |
Vardiman, Mhlanga
|
information technology and computing | 2009 | View | Towards an Abstract Model for |
Mhlanga, Vardiman, Reames
|
information technology issues | 2011 | View | Does Size Matter in IT? An exploratory analysis of critical issues facing organizations based on company size |
Peslak
|
information technology management | 2011 | View | Does Size Matter in IT? An exploratory analysis of critical issues facing organizations based on company size |
Peslak
|
Information Technology outsourcing | 2011 | View | Outsourcing Best Practices |
Mikita, DeHondt
|
Information Technology outsourcing | 2009 | View | ON DESIGN SCIENCE, MCDM AND IS OUTSOURCING DECISIONS |
Petkov, Petkova
|
information technology strategy | 2011 | View | Does Size Matter in IT? An exploratory analysis of critical issues facing organizations based on company size |
Peslak
|
infrastructure as a service | 2012 | View | Using the Cloud: The Cost of Encryption in IaaS |
Cronin, Pauli, Ham
|
infrastructure as a service | 2011 | View | Using the cloud: How to keep your data private |
Cronin, Pauli, Ham
|
infrastructure-as-a-service (IaaS) | 2013 | View | A Study of Cloud Computing Infrastructure-as-a-Service (IaaS) in Financial Firms |
Lawler, Howell-Barber, Joseph, Narula
|
initial affective reactions | 2013 | View | Web Recruitment: |
Parzinger, Ward, Langford
|
Innovation | 2022 | View | Understanding Gen Z’s Switching Intention to E-Commerce Drone Delivery: An Updated Diffusion of Innovation |
Kaleta, Xie, Chen
|
Innovation | 2012 | View | Traffic on the Information Super Highway -- Use vs. Useful? |
Grant, Middleton
|
Innovation Attributes | 2021 | View | Innovation Attributes as Determinants of the Application of Artificial Intelligence: A Proposed Study |
Iwuanyanwu, Igoche
|
Innovative security models | 2022 | View | Exploring the Strategic Cybersecurity Defense Information Technology Managers Can Implement to Reduce Healthcare Data Breaches |
Mawel, Sambasivam
|
Inside Sales | 2015 | View | Driving Inside Sales Performance with Lead Management Systems: A Conceptual Model |
Ohiomah, Benyoucef, Andreev
|
inspire | 2010 | View | On the utility of HCI practices in improving a commercial information retrieval system |
Honeycutt, Kolpack, Honeycutt, Talbert
|
Instant Games | 2021 | View | Data Sharing and Exposure: Findings from Descriptive and Network Analysis of Instant Games on Facebook |
Nicholson, Chakraborty, Ali-Gombe, Hammell II
|
Instant messaging | 2008 | View | An Empirical Study of Instant Messaging Behavior Using Diffusion of Innovation Theory |
Peslak, Ceccucci, Sendall
|
Institutional Resources | 2020 | View | Enhancing Learning Analytics: The Rise of Institutional Research |
Perkins, Ariyachandra
|
Institutional theory | 2012 | View | The Adoption of Green IT/IS: |
Sharma
|
Integration | 2020 | View | Integration of Information Systems: Robotic Process Automation |
Money
|
Integration | 2010 | View | A Study of Information Technology Integration |
Peslak
|
Integration Skills | 2019 | View | Project Management Skills
Needed for Mobile App Development |
McCoy
|
Intellectual property | 2016 | View | 3D Printing: The Future Crime of the Present |
Fruehauf, Hartle, Al-Khalifa
|
Intellectual property | 2013 | View | Does File Sharing Lead to Legal Sales? Student Attitudes on Music Piracy |
Siegfried
|
intellectual property right | 2013 | View | Does File Sharing Lead to Legal Sales? Student Attitudes on Music Piracy |
Siegfried
|
intelligence analysis | 2012 | View | Examining the Effects of the Value of Information on Intelligence Analyst Performance |
Newcomb, Hammell II
|
intelligent networks | 2015 | View | An Optimized Intelligent Home Network Model |
Kevin, Ndlovu, Lall, Kogeda
|
intention to continue | 2022 | View | The Effects of Individual Characteristics and Mastery Goal Orientation on IT Project Continuation Intentions |
Totty, Zaza, Greer, Korzaan
|
intentions | 2017 | View | Student Intentions and Behaviors Related to Email Security: An Application of the Health Belief Model |
Schymik, Du
|
Interaction Style | 2012 | View | Comparing Performance of Web Service Interaction Styles: SOAP vs. REST |
Kumar, Ahuja, Umapathy, Prodanoff
|
interactive decision support | 2011 | View | Visualizing Capacity and Load: A Production Planning Information System for Metal Ingot Casting |
Wu, Acharya
|
interface design | 2009 | View | Superfund Site Analysis Using Web 2.0 Technologies |
Anderson, Jafar, Rogers
|
Internal Load | 2021 | View | Using Analytics to understand Performance and Wellness for a Women’s College Soccer Team |
Njunge, Witman, Holmberg, Canacoo
|
international | 2020 | View | An International Review and Study on Perceptions of Security, Adoption, and Implementation of Electronic Health Records |
Aliyu, Wimmer, Powell, Rebman Jr.
|
Internationalization | 2021 | View | Internationalization and Localization for Web and Mobile Applications |
Wang, Chung, Yoon
|
Internet | 2015 | View | An Expanded Analysis of Internet Dependencies by Demographic Variables |
Peslak
|
Internet Based Technology | 2009 | View | E-Commerce Security |
Kraft
|
Internet of Things | 2022 | View | Are Companies Responsible for Internet of Things (IoT) Data Privacy? A Survey of IoT User Perceptions |
Paullet, Pinchot, Chawdhry
|
Internet of Things | 2022 | View | Smart Homes Privacy Metrics |
Etezady
|
Internet of Things | 2020 | View | Internet of Things (IoT): An Analysis of the Research |
Jourdan, Corley, Ryan, Anderson
|
Internet of Things | 2020 | View | Privacy Concerns and Data Sharing Habits of Personal Fitness Information Collected via Activity Trackers |
Pinchot, Cellante
|
Internet of Things hacking | 2022 | View | QR Code Hacking – Detecting Multiple Vulnerabilities in Android Scanning Software |
Homan, Breese
|
Interoperability | 2022 | View | Exploring the Strategic Cybersecurity Defense Information Technology Managers Can Implement to Reduce Healthcare Data Breaches |
Mawel, Sambasivam
|
Interpersonal Violence | 2014 | View | On Adapting a Military Combat Discrete Event Simulation with Big Data and Geospatial Modeling Toward a Predictive Model Ecosystem for Interpersonal Violence |
Mhlanga, Perry, Kirchner
|
Interpretive Case Research | 2015 | View | A Practice Based Examination of Standardization, and its Relationship with the Design and Use of Healthcare IS |
alsekait, Chakraborty
|
interruptions | 2011 | View | The Effects of Interruptions on Remembering Task Information |
Lenox, Pilarski, Leathers
|
interviews | 2019 | View | Addressing issues with EMR resulting in workarounds: An exploratory study
|
Mishra, Slonka, Draus, Bromall, Slonka
|
intra-organizational social networking sites | 2012 | View | The Impact of Intra-Organizational Social |
Cummings
|
Intrusion Detection Systems | 2019 | View | Evaluating Evasion Attack Methods on Binary
Network Traffic Classifiers |
Shah, Gaston, Harvey, McNamara, Ramos, You, Alhajjar
|
Intrusion Detection Systems | 2012 | View | Building Baseline Preprocessed Common Data Sets for Multiple Follow-on Data Mining Algorithms |
Fowler, Hammell II
|
Investment | 2009 | View | Difficulties in quantifying IT projects |
Oliver, Janicki, Barrick
|
IoT | 2022 | View | Smart Homes Privacy Metrics |
Etezady
|
IoT | 2021 | View | Security Control Techniques: Cybersecurity & Medical Wearable Devices |
Sambasivam, Deal
|
IoT | 2017 | View | Protecting IoT Devices from the Mirai Botnet |
Frank, Nance, Jarocki, Pauli
|
iPhone Forensics | 2015 | View | Leakage of Geolocation Data by Mobile Ad Networks |
Snow, Hayes, Dwyer
|
Irfanview | 2009 | View | The Two Leading Freeware Image Editing Applications – An Overview, Comparative Evaluation and Guide for the IS Community |
Scher
|
IS Strategy | 2014 | View | Aligning Information Systems strategy with the Business Strategy in a South African Banking Environment |
Kekwaletswe, Mathebula
|
IS Strategy | 2012 | View | The Impact of Regulatory Changes on IS Strategy: An Exploratory Study |
Reinicke, Ward
|
IS success | 2012 | View | Rocky Relationships: Enterprise Resource Planning and Supply Chain Management |
Crumbly, Fryling
|
ISO 27001 | 2008 | View | Formal Information Security Standards in Medium Enterprises |
Sambasivam, Kluge
|
IT | 2015 | View | Information Technology in Patient Care: Challenges of using IT in Small Ambulatory Healthcare Organizations. |
Reddy
|
IT Artifact | 2018 | View | Delineating Legacy System IT Artifacts – Applying a Systems Thinking-based Framework |
Stachofsky
|
IT Audit | 2019 | View | Examining Organizational Security Governance (OSG) Objectives: How is strategic planning for Security is undertaken at ABC Corporation? |
Mishra
|
IT Audit | 2009 | View | Results of Implementing a Knowledge Management Initiative to Enhance Network Access Controls |
Kim, Nelson
|
IT auditing | 2017 | View | IT Audit Literature: A Future-Looking Research Agenda
|
Klinkenborg, Streff, Nzailu
|
IT Components | 2008 | View | A STUDY OF THE INFORMATION TECHNOLOGY TRADE BETWEEN THE UNITED STATES AND ASIA PACIFIC ECONOMIES COOPERATION NATIONS |
Roman, Blakely, Koong, Liu
|
IT Components | 2008 | View | A Study of the Information Technology Trade between The United States and the Dominican Republic-Central America Free Trade Agreement Nations |
Pena, Aguirre, Saenz, Koong, Liu
|
IT Components | 2008 | View | A STUDY OF THE INFORMATION TECHNOLOGY TRADE BETWEEN UNITED STATES AND THE SOUTHERN AFRICAN CUSTOM UNION |
Saenz, Flores, Koong, Liu
|
IT Effectiveness | 2015 | View | Exploring Relationships between the Strategic Importance of IT and the Effectiveness of IT Security and Mobile Device Management |
Stanko, Sena, Sena
|
IT enabler | 2022 | View | Influence of Executive Perception of Role of Information Technology: A financial institution perspective |
Pandey, Mishra
|
IT facilitator | 2022 | View | Influence of Executive Perception of Role of Information Technology: A financial institution perspective |
Pandey, Mishra
|
IT governance | 2020 | View | Does the Executive Perception of the Value of Information Technology (IT) Influence the IT strategy? A Case Study |
Pandey, Mishra
|
IT industries | 2012 | View | Evaluating the South African software industry as a key component for economic development using an Irish framework |
Dehinbo, Dehinbo
|
IT jobs | 2021 | View | The COVID Effect: Information Technology Jobs in the Pandemic |
Sendall, Peslak, Ceccucci, Hunsinger
|
IT offshoring risks | 2016 | View | A Multi-Criteria Network Assessment Model of IT Offshoring Risks from Service Provider’s Perspective
|
Petkov, Petkova
|
IT performance | 2009 | View | THE RELATIONSHIP BETWEEN INFORMATION TECHNOLOGY CRITICAL SUCCESS FACTORS AND PROJECT PERFORMANCE |
Lind, Culler
|
IT project failure | 2014 | View | Roadmaps and Maturity Models: |
Moore
|
IT Project Justification | 2009 | View | Difficulties in quantifying IT projects |
Oliver, Janicki, Barrick
|
IT project management | 2022 | View | The Effects of Individual Characteristics and Mastery Goal Orientation on IT Project Continuation Intentions |
Totty, Zaza, Greer, Korzaan
|
IT Projects | 2017 | View | An Exploratory Analysis of Gender Differences in IT Project Commitment, Continuation, and Escalation |
Korzaan, Harris, Brooks
|
IT role | 2022 | View | Influence of Executive Perception of Role of Information Technology: A financial institution perspective |
Pandey, Mishra
|
IT skills | 2018 | View | Changes in the Information Technology Field: A Survey of Current Technologies and Future Importance
|
Cummings, Janicki
|
IT strategy | 2020 | View | Does the Executive Perception of the Value of Information Technology (IT) Influence the IT strategy? A Case Study |
Pandey, Mishra
|
IT strategy | 2015 | View | Exploring Relationships between the Strategic Importance of IT and the Effectiveness of IT Security and Mobile Device Management |
Stanko, Sena, Sena
|
IT strategy | 2008 | View | An Information Technology Project Funding Process |
Kline, Renninger, Guinn, Sackley, Scott
|
IT support | 2022 | View | Influence of Executive Perception of Role of Information Technology: A financial institution perspective |
Pandey, Mishra
|
IT Technologies | 2018 | View | Changes in the Information Technology Field: A Survey of Current Technologies and Future Importance
|
Cummings, Janicki
|
IT Technologies | 2013 | View | Shifting Technological Landscape: IT Departments and Anticipated Technological Changes |
Cummings, Janicki, Kline
|
IT/IS Skills | 2013 | View | Shifting Technological Landscape: IT Departments and Anticipated Technological Changes |
Cummings, Janicki, Kline
|