Search by Keyword

Search returned 116 items for : M


KeywordConf YearArticleTitleAuthors
M-Commerce2008ViewAn Examination of Information Security in Mobile Banking Architectures Streff, Haar
Machine Learning2022ViewClassification of Wolf Subjects Based on Hunting-Stressed Physiological Effects Using Support Vector Machines (SVM) Stewart, Davis
Machine Learning2021ViewUsing Physiological Effects and K-Nearest Neighbor to Identify Membership in Hunting-Stressed Wolf Populations Stewart, Davis, Igoche
Machine Learning2020ViewDecision-Making Model Transparency for SaMD Machine Learning Algorithms Woodside
Machine Learning2019ViewExploring Strategies Computer Science Educators need to use to Prepare Machine-Learning Datasets for Predicting Dropout Rates in MOOCs Nafed, Lotfy, Sambasivam
Machine Learning2019ViewTrash to Treasure: Predicting Landfill Gas Flow to Optimize Electricity Generation Hassler, Emery, Hoyle, Cazier
Machine Learning2018ViewA Machine Learning Approach to Optimizing Diabetes Healthcare Management Using SAS Analytic Suite Ajani, Habek
Machine Learning2018ViewImportance of Features in Adversarial Machine Learning for Cyber Security De Lucia, Cotton
Machine learning algorithms2020ViewPredicting Soil Conditions Using Machine Learning Algorithms Gondi, Hua, Bajracharya
Main Streets2009ViewAnalyzing Community Websites: A Main Street Perspective Schoenacher
make vs. buy2010ViewMake or Buy: A comparative assessment of organizations that develop software internally versus those that purchase software Sena, Sena
malvertising2016ViewMalvertising - A Rising Threat To The Online Ecosystem Dwyer, Kanguri
Malware2017ViewProtecting IoT Devices from the Mirai Botnet Frank, Nance, Jarocki, Pauli
Malware detection2016ViewMalvertising - A Rising Threat To The Online Ecosystem Dwyer, Kanguri
Management2010ViewNATIS: Novel Architecture Framework for Sambasivam, Liang, Liao
Management2009ViewAn Exploratory Study of Relationships between Workforce Characteristics and the Use of Collaboration and Social Networking Tools in a Global Tchnology Firm Totterdale
Management Best Practices2013ViewMicrosoft vs Apple: Which is Great by Choice? Sena, Olsen
market basket analysis2011ViewUsing Market Basket Analysis to Estimate Potential Revenue Increases for a Small University Bookstore Hoanca, Mock
marketing2016ViewUnderstanding User Behavior on Pinterest: Findings and Insights Wei, Zhang
marketing2015ViewBlurred Lines: Defining the Motives for Mobile and Social Media Use for Marketing Strategy Kim, Homan, Breese-Vitelli, Metzer
Marketing Management2017ViewDoes Your Beer Taste Like Big Data? Sirinanda, Ariyachandra, Frolick
mashups2012ViewA Portal-Based Web Service Development Using a Mashup Approach Miah, Debuse, Gammack, Pigott
Massive Open Online Courses2019ViewExploring Strategies Computer Science Educators need to use to Prepare Machine-Learning Datasets for Predicting Dropout Rates in MOOCs Nafed, Lotfy, Sambasivam
mastery goal orientation2022ViewThe Effects of Individual Characteristics and Mastery Goal Orientation on IT Project Continuation Intentions Totty, Zaza, Greer, Korzaan
mathematical model2016ViewEvidence of Wikipedia usage during the school year: A numerical study Snyder
Maturity Model2014ViewRoadmaps and Maturity Models: Moore
maximize visibility2011ViewMaximizing Visibility in Skylines Miah
maximize visibility2011ViewMost Popular Package Design Miah
MCDM2009ViewON DESIGN SCIENCE, MCDM AND IS OUTSOURCING DECISIONS Petkov, Petkova
MEAN 2021ViewDecreasing the Barrier to Entry for an Open-Source Full-Stack Web Development Ngo, Chung, Chang
Measurement2022ViewMeasurement, reporting, and monitoring organizational security governance: A qualitative analysis of security professionals’ experiences Slonka, Mishra, Draus, Bromall
Medical Data,2016ViewPrinciple Component Analysis for Feature Reduction and Data Preprocessing in Data Science Wimmer, Powell
medical records2016ViewPatient Healthcare Smart Card System: A Unified Medical Record for Access and Analytics Hussein, Ariyachandra, Frolick
Medical Wearable Devices2021ViewSecurity Control Techniques: Cybersecurity & Medical Wearable Devices Sambasivam, Deal
membership2009ViewFactors that Persuade and Deter Membership in Professional Computing Associations Umapathy, Jamba, Ritzhaupt
membership2008ViewComputing Professional Association Membership: An Exploration of Membership Needs and Motivations Ritzhaupt, Umapathy, Jamba
Mental health crises 911 call response2021ViewMental Health Call Triage: Coding Systems and Opportunities for Research Hashmi, Thomas, Nandan
Mental Illness2022ViewThe Effect of Mental Illness on Compensation for IT Developers Peslak, Ceccucci, Jones, Leonard
Merchant Capture System (MCS)2013ViewRisk Assessment & Management in Merchant Capture Systems: A Threat Analysis Perspective Streff, Shrestha, Delzer
metal ingot casting2011ViewVisualizing Capacity and Load: A Production Planning Information System for Metal Ingot Casting Wu, Acharya
Methane Prediction2019ViewTrash to Treasure: Predicting Landfill Gas Flow to Optimize Electricity Generation Hassler, Emery, Hoyle, Cazier
Method Engineering2010ViewA Methodology Tailoring Model for Practitioner Based Information Systems Development Informed by the Principles of General Systems Theory Burns, Deek
Methodology2009ViewSynchronizing Development Life-Cycles: Rationale and Integrative Approach to Construction of eLearning Systems and Online Courses at a Tier 1 Research Institution Conn, Macedo, Meese
Methodology Tailoring2010ViewA Methodology Tailoring Model for Practitioner Based Information Systems Development Informed by the Principles of General Systems Theory Burns, Deek
Microsoft Decision Trees2017ViewOpen vs. Close Source Decision Tree Algorithms: Comparing Performance Measures of Accuracy, Sensitivity and Specificity Khan, Wimmer, Powell
military decision making2017ViewAggregating Complementary and Contradictory Information for Military Decision Making Etesamipour, Hammell II
Mina2016View Location Analysis of Mina Site: One of the Most Crowded Areas at Hajj alluhaidan, Alredhaiman
minimalism2017ViewMinimalism in Data Visualization: Perceptions of Beauty, Clarity, Effectiveness, and Simplicity Hill, Wray, Sibona
MIoT2021ViewSecurity Control Techniques: Cybersecurity & Medical Wearable Devices Sambasivam, Deal
Mirai2017ViewProtecting IoT Devices from the Mirai Botnet Frank, Nance, Jarocki, Pauli
MIS services2017ViewCloud Computing: Implications for Information Systems Development Service Providers and Practitioners Mew, Money
MMORPG2016ViewCauses of cyberbullying in multi-player online gaming environments: Gamer perceptions Cotler, Fryling, Rivituso
MMORPG2014ViewCyberbullying or normal game play? Impact of age, gender, and experience on cyberbullying in multi-player online gaming environments: Perceptions from one gaming forum Fryling, Cotler, Rivituso, Mathews, Pratico
Mobile Advertisements2015ViewLeakage of Geolocation Data by Mobile Ad Networks Snow, Hayes, Dwyer
Mobile Advertising2018ViewPrivacy and Security Issues Associated with Mobile Dating Applications Hayes
mobile app development2019ViewProject Management Skills Needed for Mobile App Development McCoy
Mobile Application2021ViewInternationalization and Localization for Web and Mobile Applications Wang, Chung, Yoon
mobile application development2011ViewCMobile: A Mobile Photo Capture Application for Construction Imaging Martin, Vetter, Brown, Janicki
Mobile applications2017ViewWhat’s “Appening” to our Privacy? A Students Perspective on Downloading Mobile Apps Paullet, Chawdhry, Douglas, Compomizzi
Mobile applications2016ViewAre Students Using Security Measures to Protect their Data when Downloading Mobile Applications? Chawdhry, Paullet, Douglas, Compomizzi
Mobile applications2012ViewEvolving Mobile Architectures: A Case Study in the Development of a Location Privacy Application Babb, Dana, Keith, Jafar
Mobile applications2011ViewPay-What-You-Want Pricing for Mobile Applications: The Effect of Privacy Assurances and Social Information Racherla, Keith, Babb
mobile apps2017ViewGeolocation Tracking and Privacy Issues Associated with the Uber Mobile Application Hayes, Snow, Altuwayjiri
mobile apps2014ViewUse of Preventative Measures to Protect Data Privacy on Mobile Devices Pinchot, Paullet
Mobile Architectures2012ViewEvolving Mobile Architectures: A Case Study in the Development of a Location Privacy Application Babb, Dana, Keith, Jafar
Mobile Banking2008ViewAn Examination of Information Security in Mobile Banking Architectures Streff, Haar
Mobile Commerce2008ViewAn Examination of Information Security in Mobile Banking Architectures Streff, Haar
Mobile Communication2011ViewMobile Telephone Usage and Perception During Group Meetings. Bajko
Mobile computing2015ViewBlurred Lines: Defining the Motives for Mobile and Social Media Use for Marketing Strategy Kim, Homan, Breese-Vitelli, Metzer
Mobile computing2012ViewEvolving Mobile Architectures: A Case Study in the Development of a Location Privacy Application Babb, Dana, Keith, Jafar
Mobile computing2011ViewMobile Telephone Usage and Perception During Group Meetings. Bajko
Mobile Development2012ViewCreating an Audio Conferencing Application Sun, Vetter, Reinicke
mobile device2020ViewA Prototype for Distributed Computing Platform using Smartphones Wagner, Cao
mobile device2017ViewWhat’s “Appening” to our Privacy? A Students Perspective on Downloading Mobile Apps Paullet, Chawdhry, Douglas, Compomizzi
Mobile Devices2022ViewAre Companies Responsible for Internet of Things (IoT) Data Privacy? A Survey of IoT User Perceptions Paullet, Pinchot, Chawdhry
Mobile Devices2016ViewAre Students Using Security Measures to Protect their Data when Downloading Mobile Applications? Chawdhry, Paullet, Douglas, Compomizzi
Mobile Devices2015ViewExploring Relationships between the Strategic Importance of IT and the Effectiveness of IT Security and Mobile Device Management Stanko, Sena, Sena
Mobile Devices2014ViewUse of Preventative Measures to Protect Data Privacy on Mobile Devices Pinchot, Paullet
Mobile Distractions2018ViewDriving Distractions and Multi-tasking: An Investigative Study Choi, Xiong, Medlin
mobile forensics2018ViewPrivacy and Security Issues Associated with Mobile Dating Applications Hayes
mobile forensics2017ViewGeolocation Tracking and Privacy Issues Associated with the Uber Mobile Application Hayes, Snow, Altuwayjiri
Mobile Money Fraud2022ViewExploring Methods Cybersecurity Managers Need to Implement to Minimize Cyber-Frauds in Mobile Money Services in Ghana Sambasivam, Siaw Afriyie
Mobile Network and Financial Service2022ViewExploring Methods Cybersecurity Managers Need to Implement to Minimize Cyber-Frauds in Mobile Money Services in Ghana Sambasivam, Siaw Afriyie
Mobile Payment Service2018ViewImprove the Loyalty of Mobile Payment Users in China by Increasing the Fit between Skill, Technology and Task Chen, Choi, Xiong, Tang
Mobile Payment Systems2016ViewAnalysis of the Risks of NFC Mobile Payment Systems Kakish, Shah
Mobile Phone2011ViewMobile Telephone Usage and Perception During Group Meetings. Bajko
Mobile Phones2018ViewDriving Distractions and Multi-tasking: An Investigative Study Choi, Xiong, Medlin
Mobile Privacy2015ViewLeakage of Geolocation Data by Mobile Ad Networks Snow, Hayes, Dwyer
mobile security2017ViewWhat’s “Appening” to our Privacy? A Students Perspective on Downloading Mobile Apps Paullet, Chawdhry, Douglas, Compomizzi
mobile security2016ViewAre Students Using Security Measures to Protect their Data when Downloading Mobile Applications? Chawdhry, Paullet, Douglas, Compomizzi
mobile security2014ViewUse of Preventative Measures to Protect Data Privacy on Mobile Devices Pinchot, Paullet
mobile security2014ViewUse of Preventative Measures to Protect Data Privacy on Mobile Devices Pinchot, Paullet
Mobile Security Architecture2022ViewExploring Methods Cybersecurity Managers Need to Implement to Minimize Cyber-Frauds in Mobile Money Services in Ghana Sambasivam, Siaw Afriyie
Mobile technology2015ViewCase Study: Can Interpersonal-Cultural Communication Sustain Another Innovation? Spangler , Breese, Borkovich
Mobile technology2011ViewTalk to Text: Changing Communication Patterns Pinchot, Douglas, Paullet, Rota
Mobile technology2010ViewHow Mobile Technology is Changing Our Culture Pinchot, Paullet, Rota
Mobile telephony2011ViewMobile Telephone Usage and Perception During Group Meetings. Bajko
mobile unit2010ViewThe Use of Mobile Units McGinley, Nicolai
mobile web development2011ViewBuilding a Real-Time Bus Tracking Data Display System Dudley, Vetter, Brown, Janicki
Model Interchange2015ViewCASE Tools’ Acceptance in Higher Education – Assessment and Enhanced UTAUT Model Marcinkowski, Wrycza
Model of Visual Clustering and Visual Layering2022ViewVisual Layering and Visual Clustering – A Model of Graph Complexity for Business Data Chen, Zhang
monitoring2022ViewMeasurement, reporting, and monitoring organizational security governance: A qualitative analysis of security professionals’ experiences Slonka, Mishra, Draus, Bromall
Monitoring and sensing devices2008ViewIncorporation of Information Technology into Assisted Health Care: An empirical study Merrill, White
Motivation2012ViewOpen Source Software Volunteerism vs. Carpenter
Motivation2008ViewComputing Professional Association Membership: An Exploration of Membership Needs and Motivations Ritzhaupt, Umapathy, Jamba
Motives2015ViewBlurred Lines: Defining the Motives for Mobile and Social Media Use for Marketing Strategy Kim, Homan, Breese-Vitelli, Metzer
Multi-Agent Systems2012ViewBuilding Baseline Preprocessed Common Data Sets for Multiple Follow-on Data Mining Algorithms Fowler, Hammell II
multi-case2017ViewA Business Multi-Case Study of Change Management in Software Implementation Holtel, Paddock, Reiter, Riley, Havelka
Multi-channel retailers2013ViewOnline versus In-Store: Price Differentiation for Multi-Channel Retailers Flores, Sun
Multi-criteria decision-making methods2021ViewEffect of Normalization on TOPSIS and Fuzzy TOPSIS Sarraf, McGuire
multi-payer system2016ViewPatient Healthcare Smart Card System: A Unified Medical Record for Access and Analytics Hussein, Ariyachandra, Frolick
multiple regression analysis2010ViewAn Empirical Study of Social Networking Behavior Using Diffusion of Innovation Theory Ceccucci, Peslak, Sendall
multiple regression analysis2008ViewAn Empirical Study of Instant Messaging Behavior Using Diffusion of Innovation Theory Peslak, Ceccucci, Sendall
Multitasking2018ViewDriving Distractions and Multi-tasking: An Investigative Study Choi, Xiong, Medlin
music piracy2013ViewDoes File Sharing Lead to Legal Sales? Student Attitudes on Music Piracy Siegfried
MySQL2008ViewComparison of Dynamic Web Content Processing Languages Performance Jafar, Anderson, Abdullat