Keyword | Conf Year | Article | Title | Authors |
M-Commerce | 2008 | View | An Examination of Information Security in Mobile Banking Architectures |
Streff, Haar
|
Machine Learning | 2022 | View | Classification of Wolf Subjects Based on Hunting-Stressed Physiological Effects Using Support Vector Machines (SVM) |
Stewart, Davis
|
Machine Learning | 2021 | View | Using Physiological Effects and K-Nearest Neighbor
to Identify Membership in Hunting-Stressed Wolf Populations
|
Stewart, Davis, Igoche
|
Machine Learning | 2020 | View | Decision-Making Model Transparency for SaMD Machine Learning Algorithms |
Woodside
|
Machine Learning | 2019 | View | Exploring Strategies Computer Science Educators need to use to Prepare Machine-Learning Datasets for Predicting Dropout Rates in MOOCs |
Nafed, Lotfy, Sambasivam
|
Machine Learning | 2019 | View | Trash to Treasure: Predicting Landfill Gas Flow to Optimize Electricity Generation |
Hassler, Emery, Hoyle, Cazier
|
Machine Learning | 2018 | View | A Machine Learning Approach to Optimizing Diabetes Healthcare Management Using SAS Analytic Suite |
Ajani, Habek
|
Machine Learning | 2018 | View | Importance of Features in Adversarial Machine Learning for Cyber Security
|
De Lucia, Cotton
|
Machine learning algorithms | 2020 | View | Predicting Soil Conditions Using Machine Learning Algorithms |
Gondi, Hua, Bajracharya
|
Main Streets | 2009 | View | Analyzing Community Websites: A Main Street Perspective |
Schoenacher
|
make vs. buy | 2010 | View | Make or Buy: A comparative assessment of organizations that develop software internally versus those that purchase software |
Sena, Sena
|
malvertising | 2016 | View | Malvertising - A Rising Threat To The Online Ecosystem |
Dwyer, Kanguri
|
Malware | 2017 | View | Protecting IoT Devices from the Mirai Botnet |
Frank, Nance, Jarocki, Pauli
|
Malware detection | 2016 | View | Malvertising - A Rising Threat To The Online Ecosystem |
Dwyer, Kanguri
|
Management | 2010 | View | NATIS: Novel Architecture Framework for |
Sambasivam, Liang, Liao
|
Management | 2009 | View | An Exploratory Study of Relationships between Workforce Characteristics and the Use of Collaboration and Social Networking Tools in a Global Tchnology Firm |
Totterdale
|
Management Best Practices | 2013 | View | Microsoft vs Apple: Which is Great by Choice? |
Sena, Olsen
|
market basket analysis | 2011 | View | Using Market Basket Analysis to Estimate Potential Revenue Increases for a Small University Bookstore |
Hoanca, Mock
|
marketing | 2016 | View | Understanding User Behavior on Pinterest: Findings and Insights |
Wei, Zhang
|
marketing | 2015 | View | Blurred Lines: Defining the Motives for Mobile and Social Media Use for Marketing Strategy |
Kim, Homan, Breese-Vitelli, Metzer
|
Marketing Management | 2017 | View | Does Your Beer Taste Like Big Data? |
Sirinanda, Ariyachandra, Frolick
|
mashups | 2012 | View | A Portal-Based Web Service Development Using a Mashup Approach |
Miah, Debuse, Gammack, Pigott
|
Massive Open Online Courses | 2019 | View | Exploring Strategies Computer Science Educators need to use to Prepare Machine-Learning Datasets for Predicting Dropout Rates in MOOCs |
Nafed, Lotfy, Sambasivam
|
mastery goal orientation | 2022 | View | The Effects of Individual Characteristics and Mastery Goal Orientation on IT Project Continuation Intentions |
Totty, Zaza, Greer, Korzaan
|
mathematical model | 2016 | View | Evidence of Wikipedia usage during the school year: A numerical study |
Snyder
|
Maturity Model | 2014 | View | Roadmaps and Maturity Models: |
Moore
|
maximize visibility | 2011 | View | Maximizing Visibility in Skylines |
Miah
|
maximize visibility | 2011 | View | Most Popular Package Design |
Miah
|
MCDM | 2009 | View | ON DESIGN SCIENCE, MCDM AND IS OUTSOURCING DECISIONS |
Petkov, Petkova
|
MEAN | 2021 | View | Decreasing the Barrier to Entry for an Open-Source Full-Stack Web Development |
Ngo, Chung, Chang
|
Measurement | 2022 | View | Measurement, reporting, and monitoring organizational security governance: A qualitative analysis of security professionals’ experiences |
Slonka, Mishra, Draus, Bromall
|
Medical Data, | 2016 | View | Principle Component Analysis for Feature Reduction and Data Preprocessing in Data Science |
Wimmer, Powell
|
medical records | 2016 | View | Patient Healthcare Smart Card System: A Unified Medical Record for Access and Analytics |
Hussein, Ariyachandra, Frolick
|
Medical Wearable Devices | 2021 | View | Security Control Techniques: Cybersecurity & Medical Wearable Devices |
Sambasivam, Deal
|
membership | 2009 | View | Factors that Persuade and Deter Membership in Professional Computing Associations |
Umapathy, Jamba, Ritzhaupt
|
membership | 2008 | View | Computing Professional Association Membership: An Exploration of Membership Needs and Motivations |
Ritzhaupt, Umapathy, Jamba
|
Mental health crises 911 call response | 2021 | View | Mental Health Call Triage: Coding Systems and Opportunities for Research |
Hashmi, Thomas, Nandan
|
Mental Illness | 2022 | View | The Effect of Mental Illness on Compensation for IT Developers |
Peslak, Ceccucci, Jones, Leonard
|
Merchant Capture System (MCS) | 2013 | View | Risk Assessment & Management in Merchant Capture Systems: A Threat Analysis Perspective |
Streff, Shrestha, Delzer
|
metal ingot casting | 2011 | View | Visualizing Capacity and Load: A Production Planning Information System for Metal Ingot Casting |
Wu, Acharya
|
Methane Prediction | 2019 | View | Trash to Treasure: Predicting Landfill Gas Flow to Optimize Electricity Generation |
Hassler, Emery, Hoyle, Cazier
|
Method Engineering | 2010 | View | A Methodology Tailoring Model for Practitioner Based Information Systems Development Informed by the Principles of General Systems Theory |
Burns, Deek
|
Methodology | 2009 | View | Synchronizing Development Life-Cycles: Rationale and Integrative Approach to Construction of eLearning Systems and Online Courses at a Tier 1 Research Institution |
Conn, Macedo, Meese
|
Methodology Tailoring | 2010 | View | A Methodology Tailoring Model for Practitioner Based Information Systems Development Informed by the Principles of General Systems Theory |
Burns, Deek
|
Microsoft Decision Trees | 2017 | View | Open vs. Close Source Decision Tree Algorithms: Comparing Performance Measures of Accuracy, Sensitivity and Specificity |
Khan, Wimmer, Powell
|
military decision making | 2017 | View | Aggregating Complementary and Contradictory Information for Military Decision Making |
Etesamipour, Hammell II
|
Mina | 2016 | View |
Location Analysis of Mina Site: One of the Most Crowded Areas at Hajj
|
alluhaidan, Alredhaiman
|
minimalism | 2017 | View | Minimalism in Data Visualization: Perceptions of Beauty, Clarity, Effectiveness, and Simplicity |
Hill, Wray, Sibona
|
MIoT | 2021 | View | Security Control Techniques: Cybersecurity & Medical Wearable Devices |
Sambasivam, Deal
|
Mirai | 2017 | View | Protecting IoT Devices from the Mirai Botnet |
Frank, Nance, Jarocki, Pauli
|
MIS services | 2017 | View | Cloud Computing: Implications for Information Systems Development Service Providers and Practitioners |
Mew, Money
|
MMORPG | 2016 | View | Causes of cyberbullying in multi-player online gaming environments: Gamer perceptions |
Cotler, Fryling, Rivituso
|
MMORPG | 2014 | View | Cyberbullying or normal game play? Impact of age, gender, and experience on cyberbullying in multi-player online gaming environments: Perceptions from one gaming forum |
Fryling, Cotler, Rivituso, Mathews, Pratico
|
Mobile Advertisements | 2015 | View | Leakage of Geolocation Data by Mobile Ad Networks |
Snow, Hayes, Dwyer
|
Mobile Advertising | 2018 | View | Privacy and Security Issues Associated with Mobile Dating Applications |
Hayes
|
mobile app development | 2019 | View | Project Management Skills
Needed for Mobile App Development |
McCoy
|
Mobile Application | 2021 | View | Internationalization and Localization for Web and Mobile Applications |
Wang, Chung, Yoon
|
mobile application development | 2011 | View | CMobile: A Mobile Photo Capture Application for Construction Imaging |
Martin, Vetter, Brown, Janicki
|
Mobile applications | 2017 | View | What’s “Appening” to our Privacy?
A Students Perspective on Downloading Mobile Apps
|
Paullet, Chawdhry, Douglas, Compomizzi
|
Mobile applications | 2016 | View | Are Students Using Security Measures to Protect their Data when Downloading Mobile Applications? |
Chawdhry, Paullet, Douglas, Compomizzi
|
Mobile applications | 2012 | View | Evolving Mobile Architectures: A Case Study in the Development of a Location Privacy Application |
Babb, Dana, Keith, Jafar
|
Mobile applications | 2011 | View | Pay-What-You-Want Pricing for Mobile Applications: The Effect of Privacy Assurances and Social Information |
Racherla, Keith, Babb
|
mobile apps | 2017 | View | Geolocation Tracking and Privacy Issues Associated with the Uber Mobile Application |
Hayes, Snow, Altuwayjiri
|
mobile apps | 2014 | View | Use of Preventative Measures to Protect Data Privacy on Mobile Devices |
Pinchot, Paullet
|
Mobile Architectures | 2012 | View | Evolving Mobile Architectures: A Case Study in the Development of a Location Privacy Application |
Babb, Dana, Keith, Jafar
|
Mobile Banking | 2008 | View | An Examination of Information Security in Mobile Banking Architectures |
Streff, Haar
|
Mobile Commerce | 2008 | View | An Examination of Information Security in Mobile Banking Architectures |
Streff, Haar
|
Mobile Communication | 2011 | View | Mobile Telephone Usage and Perception During Group Meetings. |
Bajko
|
Mobile computing | 2015 | View | Blurred Lines: Defining the Motives for Mobile and Social Media Use for Marketing Strategy |
Kim, Homan, Breese-Vitelli, Metzer
|
Mobile computing | 2012 | View | Evolving Mobile Architectures: A Case Study in the Development of a Location Privacy Application |
Babb, Dana, Keith, Jafar
|
Mobile computing | 2011 | View | Mobile Telephone Usage and Perception During Group Meetings. |
Bajko
|
Mobile Development | 2012 | View | Creating an Audio Conferencing Application |
Sun, Vetter, Reinicke
|
mobile device | 2020 | View | A Prototype for Distributed Computing Platform using Smartphones |
Wagner, Cao
|
mobile device | 2017 | View | What’s “Appening” to our Privacy?
A Students Perspective on Downloading Mobile Apps
|
Paullet, Chawdhry, Douglas, Compomizzi
|
Mobile Devices | 2022 | View | Are Companies Responsible for Internet of Things (IoT) Data Privacy? A Survey of IoT User Perceptions |
Paullet, Pinchot, Chawdhry
|
Mobile Devices | 2016 | View | Are Students Using Security Measures to Protect their Data when Downloading Mobile Applications? |
Chawdhry, Paullet, Douglas, Compomizzi
|
Mobile Devices | 2015 | View | Exploring Relationships between the Strategic Importance of IT and the Effectiveness of IT Security and Mobile Device Management |
Stanko, Sena, Sena
|
Mobile Devices | 2014 | View | Use of Preventative Measures to Protect Data Privacy on Mobile Devices |
Pinchot, Paullet
|
Mobile Distractions | 2018 | View | Driving Distractions and Multi-tasking: An Investigative Study |
Choi, Xiong, Medlin
|
mobile forensics | 2018 | View | Privacy and Security Issues Associated with Mobile Dating Applications |
Hayes
|
mobile forensics | 2017 | View | Geolocation Tracking and Privacy Issues Associated with the Uber Mobile Application |
Hayes, Snow, Altuwayjiri
|
Mobile Money Fraud | 2022 | View | Exploring Methods Cybersecurity Managers Need to Implement to Minimize Cyber-Frauds in Mobile Money Services in Ghana |
Sambasivam, Siaw Afriyie
|
Mobile Network and Financial Service | 2022 | View | Exploring Methods Cybersecurity Managers Need to Implement to Minimize Cyber-Frauds in Mobile Money Services in Ghana |
Sambasivam, Siaw Afriyie
|
Mobile Payment Service | 2018 | View | Improve the Loyalty of Mobile Payment Users in China by Increasing the Fit between Skill, Technology and Task |
Chen, Choi, Xiong, Tang
|
Mobile Payment Systems | 2016 | View | Analysis of the Risks of NFC Mobile Payment Systems |
Kakish, Shah
|
Mobile Phone | 2011 | View | Mobile Telephone Usage and Perception During Group Meetings. |
Bajko
|
Mobile Phones | 2018 | View | Driving Distractions and Multi-tasking: An Investigative Study |
Choi, Xiong, Medlin
|
Mobile Privacy | 2015 | View | Leakage of Geolocation Data by Mobile Ad Networks |
Snow, Hayes, Dwyer
|
mobile security | 2017 | View | What’s “Appening” to our Privacy?
A Students Perspective on Downloading Mobile Apps
|
Paullet, Chawdhry, Douglas, Compomizzi
|
mobile security | 2016 | View | Are Students Using Security Measures to Protect their Data when Downloading Mobile Applications? |
Chawdhry, Paullet, Douglas, Compomizzi
|
mobile security | 2014 | View | Use of Preventative Measures to Protect Data Privacy on Mobile Devices |
Pinchot, Paullet
|
mobile security | 2014 | View | Use of Preventative Measures to Protect Data Privacy on Mobile Devices |
Pinchot, Paullet
|
Mobile Security Architecture | 2022 | View | Exploring Methods Cybersecurity Managers Need to Implement to Minimize Cyber-Frauds in Mobile Money Services in Ghana |
Sambasivam, Siaw Afriyie
|
Mobile technology | 2015 | View | Case Study: Can Interpersonal-Cultural Communication Sustain Another Innovation? |
Spangler , Breese, Borkovich
|
Mobile technology | 2011 | View | Talk to Text: Changing Communication Patterns |
Pinchot, Douglas, Paullet, Rota
|
Mobile technology | 2010 | View | How Mobile Technology is Changing Our Culture |
Pinchot, Paullet, Rota
|
Mobile telephony | 2011 | View | Mobile Telephone Usage and Perception During Group Meetings. |
Bajko
|
mobile unit | 2010 | View | The Use of Mobile Units |
McGinley, Nicolai
|
mobile web development | 2011 | View | Building a Real-Time Bus Tracking Data Display System |
Dudley, Vetter, Brown, Janicki
|
Model Interchange | 2015 | View | CASE Tools’ Acceptance in Higher Education – Assessment and Enhanced UTAUT Model |
Marcinkowski, Wrycza
|
Model of Visual Clustering and Visual Layering | 2022 | View | Visual Layering and Visual Clustering –
A Model of Graph Complexity for Business Data
|
Chen, Zhang
|
monitoring | 2022 | View | Measurement, reporting, and monitoring organizational security governance: A qualitative analysis of security professionals’ experiences |
Slonka, Mishra, Draus, Bromall
|
Monitoring and sensing devices | 2008 | View | Incorporation of Information Technology into Assisted Health Care: An empirical study |
Merrill, White
|
Motivation | 2012 | View | Open Source Software Volunteerism vs. |
Carpenter
|
Motivation | 2008 | View | Computing Professional Association Membership: An Exploration of Membership Needs and Motivations |
Ritzhaupt, Umapathy, Jamba
|
Motives | 2015 | View | Blurred Lines: Defining the Motives for Mobile and Social Media Use for Marketing Strategy |
Kim, Homan, Breese-Vitelli, Metzer
|
Multi-Agent Systems | 2012 | View | Building Baseline Preprocessed Common Data Sets for Multiple Follow-on Data Mining Algorithms |
Fowler, Hammell II
|
multi-case | 2017 | View | A Business Multi-Case Study of Change Management in Software Implementation |
Holtel, Paddock, Reiter, Riley, Havelka
|
Multi-channel retailers | 2013 | View | Online versus In-Store: Price Differentiation for Multi-Channel Retailers |
Flores, Sun
|
Multi-criteria decision-making methods | 2021 | View | Effect of Normalization on TOPSIS and Fuzzy TOPSIS |
Sarraf, McGuire
|
multi-payer system | 2016 | View | Patient Healthcare Smart Card System: A Unified Medical Record for Access and Analytics |
Hussein, Ariyachandra, Frolick
|
multiple regression analysis | 2010 | View | An Empirical Study of Social Networking Behavior Using Diffusion of Innovation Theory |
Ceccucci, Peslak, Sendall
|
multiple regression analysis | 2008 | View | An Empirical Study of Instant Messaging Behavior Using Diffusion of Innovation Theory |
Peslak, Ceccucci, Sendall
|
Multitasking | 2018 | View | Driving Distractions and Multi-tasking: An Investigative Study |
Choi, Xiong, Medlin
|
music piracy | 2013 | View | Does File Sharing Lead to Legal Sales? Student Attitudes on Music Piracy |
Siegfried
|
MySQL | 2008 | View | Comparison of Dynamic Web Content Processing Languages Performance |
Jafar, Anderson, Abdullat
|