Keyword | Conf Year | Article | Title | Authors |
Landfill Gas | 2019 | View | Trash to Treasure: Predicting Landfill Gas Flow to Optimize Electricity Generation |
Hassler, Emery, Hoyle, Cazier
|
laws | 2017 | View | Information Security and Privacy Legislation:
Current State and Future Direction |
Dunlap, Cummings, Janicki
|
Lead Management Systems | 2015 | View | Driving Inside Sales Performance with Lead Management Systems: A Conceptual Model |
Ohiomah, Benyoucef, Andreev
|
leadership | 2013 | View | Microsoft vs Apple: Which is Great by Choice? |
Sena, Olsen
|
Learning analytics | 2020 | View | Enhancing Learning Analytics: The Rise of Institutional Research |
Perkins, Ariyachandra
|
Learning outcomes | 2015 | View | Exploratory Study of Effects of eLearning System Acceptance on Learning Outcomes |
Ghosh
|
Legacy Information Systems | 2018 | View | Delineating Legacy System IT Artifacts – Applying a Systems Thinking-based Framework |
Stachofsky
|
legal | 2011 | View | The New Tech Effect: Analyzing Juror Credibility |
Davis, Paullet, Kraeer, Grant
|
legal risk | 2018 | View | Can Social Media Accounts Have an Impact on Hiring Decisions? Guidelines for Appropriate Use |
Kim, Homan
|
Legislation | 2020 | View | The New Frontier in Home and Commercial Deliveries: Drones
|
Fowler, Vannoy, Eggers, Medlin
|
Legislation | 2018 | View | Commercial Drone Activity: Security, Privacy, and Legislation Issues |
Vannoy, Medlin
|
Legitimacy | 2014 | View | A Case Study on Achieving Legitimation in Information Systems Action Research Projects |
Petkova, Petkov
|
Legitimation | 2014 | View | A Case Study on Achieving Legitimation in Information Systems Action Research Projects |
Petkova, Petkov
|
library space | 2019 | View | An Exploratory Study of the Perceptions of Library Faculty and Patrons on Library Resources |
Herman, Wimmer, Rebman Jr.
|
life cycle model | 2009 | View | Component-Based Software Development: Life Cycles and Design Science-Based Recommendations |
Sharp, Ryan
|
Linguistic analysis | 2019 | View | A Longitudinal Study of Google Privacy Policies |
Peslak, Kovalchick, Conforti
|
Linguistic analysis | 2017 | View | Facebook Fanatics: A Linguistic and Sentiment Analysis of the Most “Fanned” Facebook Pages |
Peslak
|
Linux | 2010 | View | What Influences People to Use Linux? |
Hunsinger, Fransen
|
Linux | 2008 | View | Comparison of Dynamic Web Content Processing Languages Performance |
Jafar, Anderson, Abdullat
|
literary analysis | 2019 | View | Literary Analysis Tool: Text Analytics for Creative Writers |
Grimsman, Kline, Vetter, Guinn
|
Literature Review | 2020 | View | Internet of Things (IoT): An Analysis of the Research |
Jourdan, Corley, Ryan, Anderson
|
Literature Review | 2008 | View | SYSTEM DEVELOPMENT METHODOLOGY USAGE IN INDUSTRY: A REVIEW AND ANALYSIS |
Griffin, Brandyberry
|
LIWC | 2019 | View | A Longitudinal Study of Google Privacy Policies |
Peslak, Kovalchick, Conforti
|
LIWC | 2017 | View | Facebook Fanatics: A Linguistic and Sentiment Analysis of the Most “Fanned” Facebook Pages |
Peslak
|
LIWC | 2017 | View | IT Audit Literature: A Future-Looking Research Agenda
|
Klinkenborg, Streff, Nzailu
|
local exchange carriers | 2008 | View | The Impact of Technology Diffusion on Employment and Compensation: Evidence from the Telecommunications Sector |
Clark, Moussawi
|
Localization | 2021 | View | Internationalization and Localization for Web and Mobile Applications |
Wang, Chung, Yoon
|
Location Privacy | 2012 | View | Evolving Mobile Architectures: A Case Study in the Development of a Location Privacy Application |
Babb, Dana, Keith, Jafar
|
location-based services | 2012 | View | Evolving Mobile Architectures: A Case Study in the Development of a Location Privacy Application |
Babb, Dana, Keith, Jafar
|
location-based services | 2011 | View | Pay-What-You-Want Pricing for Mobile Applications: The Effect of Privacy Assurances and Social Information |
Racherla, Keith, Babb
|
Logistic regression | 2022 | View | Data Analytics for Societal Challenges: Understanding Student Participation in the National School Lunch Program |
Northey, Desai
|
Logistic regression | 2018 | View | Effects of Normalization Techniques on Logistic Regression in Data Science |
Adeyemo, Wimmer, Powell
|
Logistics | 2020 | View | The New Frontier in Home and Commercial Deliveries: Drones
|
Fowler, Vannoy, Eggers, Medlin
|
Long-running Conversations | 2014 | View | Review of Web Service Specifications for Long-running Conversations |
Rana, Umapathy
|
lossy compression | 2019 | View | The Use of Tainted Flows in Network Compression for Distributed Network Intrusion Detection |
Smith, Hammell II
|
lossy compression | 2016 | View | Proposal for Kelly Criterion-Inspired Lossy Network Compression for Network Intrusion Applications |
Smith, Hammell II
|
Low-Code Development Platform | 2022 | View | A Predictive Unmanned Aerial Vehicle Maintenance Method: Using Low-Code and Cloud-Based Data Visualization |
Kim, Chung, Ju, Maeng
|
Loyalty | 2018 | View | Improve the Loyalty of Mobile Payment Users in China by Increasing the Fit between Skill, Technology and Task |
Chen, Choi, Xiong, Tang
|
Lyft | 2019 | View | Game Theory Through Smartphone App Use In Support of For-Hire Transportation Network Companies |
Pendergrass
|