Keyword | Conf Year | Article | Title | Authors |
package design | 2011 | View | Most Popular Package Design |
Miah
|
Packaged Software | 2008 | View | Test Driven Development in the .Net Framework |
Lee, Mehta, Shah
|
pandemic | 2021 | View | The COVID Effect: Information Technology Jobs in the Pandemic |
Sendall, Peslak, Ceccucci, Hunsinger
|
pandemic | 2010 | View | What is Missing From the Current Disaster Model |
Bilow, Nicolai
|
pandemic tracking system | 2010 | View | The Use of Mobile Units |
McGinley, Nicolai
|
Panel Data | 2016 | View | An Empirical Study on the Impact of Price Discount on Sales in Software-as-a-Service (SaaS) Market |
Choi, Medlin, Hunsinger
|
paperless office | 2009 | View | An Ontological Characterization of the ‘Structured Information Flow’ (SIF) Model |
Bhatia, Arthur
|
Paradigm Shift | 2019 | View | Knowledge Management System Development Approaches: Evolution or Stagnation? |
Mew, Money
|
password strategy | 2010 | View | Password Security Risk versus Effort: An Exploratory Study on User-Perceived Risk and the Intention to Use Online Applications |
Gebauer, Kline, He
|
pay-what-you-want | 2011 | View | Pay-What-You-Want Pricing for Mobile Applications: The Effect of Privacy Assurances and Social Information |
Racherla, Keith, Babb
|
payloads | 2020 | View | Documenting the Process of Hijacking a Raspberry Pi User Login Credentials via Remote Code Execution |
Patel, Wimmer, Powell
|
PCA | 2016 | View | Principle Component Analysis for Feature Reduction and Data Preprocessing in Data Science |
Wimmer, Powell
|
Penetration testing | 2022 | View | Vulnerability Assessment for Web Applications |
Garcia, Abraham, Kepic, Cankaya
|
Perceived Behavioral Control | 2009 | View | Spyware: What Influences College Students to Use Anti-Spyware Tools? |
Ward, Hunsinger
|
perceived ease of use | 2018 | View | Drone Delivery Services: An Evaluation of Personal Innovativeness, Opinion Passing and Key Information Technology Adoption Factors |
Chen, Choi, Charoen
|
Perceived radicalness | 2016 | View | Finding the “Radicalness” in Radical Innovation Adoption |
Sharma, Thomas, Konsynski
|
perceived risk | 2008 | View | Analysis of the Factors that Influence Online Purchasing |
Amoroso, Hunsinger
|
Perceived Uncertainty | 2021 | View | Impact of Review Valence and Perceived Uncertainty on Purchase of Time-Constrained and Discounted Search Goods |
Muzumdar
|
Perceived usefulness | 2018 | View | Drone Delivery Services: An Evaluation of Personal Innovativeness, Opinion Passing and Key Information Technology Adoption Factors |
Chen, Choi, Charoen
|
Perceived usefulness | 2018 | View | Improve the Loyalty of Mobile Payment Users in China by Increasing the Fit between Skill, Technology and Task |
Chen, Choi, Xiong, Tang
|
Perceived Value | 2016 | View | An Empirical Study on the Impact of Price Discount on Sales in Software-as-a-Service (SaaS) Market |
Choi, Medlin, Hunsinger
|
perception | 2017 | View | Minimalism in Data Visualization: Perceptions of Beauty, Clarity, Effectiveness, and Simplicity |
Hill, Wray, Sibona
|
Performance | 2021 | View | Using Analytics to understand Performance and Wellness for a Women’s College Soccer Team |
Njunge, Witman, Holmberg, Canacoo
|
Performance | 2015 | View | An Optimized Intelligent Home Network Model |
Kevin, Ndlovu, Lall, Kogeda
|
Performance | 2015 | View | Variation in Best-Case and Worst-Case Performance for Sorting Algorithms |
McMaster, Sambasivam, Rague, Wolthuis
|
Performance | 2014 | View | Measuring Algorithm Performance With Java: Patterns of Variation |
McMaster, Sambasivam, Wolthuis
|
performance management | 2019 | View | Understanding Campus Crime with a Multi-University Analytics System |
Iheadindu, Kline, Vetter, Clark
|
Performance task | 2012 | View | Comparing Performance of Web Service Interaction Styles: SOAP vs. REST |
Kumar, Ahuja, Umapathy, Prodanoff
|
Perl | 2008 | View | Comparison of Dynamic Web Content Processing Languages Performance |
Jafar, Anderson, Abdullat
|
personal fitness information | 2020 | View | Privacy Concerns and Data Sharing Habits of Personal Fitness Information Collected via Activity Trackers |
Pinchot, Cellante
|
personal identifying information (PII) | 2022 | View | The Importance and Value of Personal Identifying Information: Towards Information Worth |
Kaleta, Mahadevan, Thackston
|
personal innovativeness | 2018 | View | Drone Delivery Services: An Evaluation of Personal Innovativeness, Opinion Passing and Key Information Technology Adoption Factors |
Chen, Choi, Charoen
|
persuading factors | 2009 | View | Factors that Persuade and Deter Membership in Professional Computing Associations |
Umapathy, Jamba, Ritzhaupt
|
Persuasive Strategies | 2015 | View | Introducing A Change Resistance Factor in Knowledge Management Model: A Concentration in Organizational Culture |
Abaoud, alluhaidan
|
pharmaceutical industry | 2016 | View | E-commerce Adoption: A Revelatory Case Study in the German Oncology Pharmaceutical Supply Chain |
Sultanow, Chircu, Chircu
|
Phishing | 2009 | View | A FOLLOW-UP STUDY OF DETECTING PHISHING EMAILS |
Bekkering, Werner, Hutchison
|
Phishing | 2009 | View | Some Observations on the Occurrences of Phishing |
Lara, Rios, Salazar, Koong, Liu
|
photographic images | 2009 | View | The Two Leading Freeware Image Editing Applications – An Overview, Comparative Evaluation and Guide for the IS Community |
Scher
|
Photoscape | 2009 | View | The Two Leading Freeware Image Editing Applications – An Overview, Comparative Evaluation and Guide for the IS Community |
Scher
|
PHP | 2008 | View | Comparison of Dynamic Web Content Processing Languages Performance |
Jafar, Anderson, Abdullat
|
Phubbing | 2017 | View | Phubbing: Communication in the Attention Economy |
Pendergrass
|
physiological indicators | 2022 | View | Classification of Wolf Subjects Based on Hunting-Stressed Physiological Effects Using Support Vector Machines (SVM) |
Stewart, Davis
|
physiological indicators | 2021 | View | Using Physiological Effects and K-Nearest Neighbor
to Identify Membership in Hunting-Stressed Wolf Populations
|
Stewart, Davis, Igoche
|
PII Importance | 2022 | View | The Importance and Value of Personal Identifying Information: Towards Information Worth |
Kaleta, Mahadevan, Thackston
|
PII value | 2022 | View | The Importance and Value of Personal Identifying Information: Towards Information Worth |
Kaleta, Mahadevan, Thackston
|
PII worth | 2022 | View | The Importance and Value of Personal Identifying Information: Towards Information Worth |
Kaleta, Mahadevan, Thackston
|
Pinterest | 2016 | View | Understanding User Behavior on Pinterest: Findings and Insights |
Wei, Zhang
|
Planning | 2017 | View | Using Systems Analysis and Design to Enhance the Business Understanding Stage in CRISP-DM |
Pomykalski, Buzydlowski
|
Platform as a Service (PaaS) | 2013 | View | Feasibility of a Platform-as-a-Service Implementation using Cloud Computing for a Global Service Organization |
Gai, Steenkamp
|
Platform Innovation | 2013 | View | Looking Backwards to Look Ahead: Lessons from Barcode Adoption for RFID Adoption and Implementation |
Sharma, Thomas
|
platform-as-a-service (PaaS) | 2014 | View | A Cloud Computing Methodology Study of Platform-as-a-Service (PaaS) in the Financial Industry |
Lawler, Howell-Barber, Joseph
|
playfulness | 2013 | View | Web Recruitment: |
Parzinger, Ward, Langford
|
PLS-analysis | 2010 | View | Password Security Risk versus Effort: An Exploratory Study on User-Perceived Risk and the Intention to Use Online Applications |
Gebauer, Kline, He
|
point sampling sensor networks | 2009 | View | Spatial Interpolation for a Wireless Sensor Network of Chemical Point Detectors: Preliminary Results |
Schafer, Hammell II
|
police mental health call response | 2021 | View | Mental Health Call Triage: Coding Systems and Opportunities for Research |
Hashmi, Thomas, Nandan
|
policy | 2019 | View | Examining Organizational Security Governance (OSG) Objectives: How is strategic planning for Security is undertaken at ABC Corporation? |
Mishra
|
Political Redistricting | 2021 | View | GIS for Democracy:
Toward A Solution Against Gerrymandering
|
Wu, Igoche
|
popular package | 2011 | View | Most Popular Package Design |
Miah
|
population model | 2016 | View | Evidence of Wikipedia usage during the school year: A numerical study |
Snyder
|
Post-Implementation | 2012 | View | Rocky Relationships: Enterprise Resource Planning and Supply Chain Management |
Crumbly, Fryling
|
Postings | 2012 | View | A Quantitative Analysis of Computing Jobs in 2012 |
Robin, Roggio
|
POTUS | 2018 | View | Using Twitter Sentiment Analysis to Analyze Self-Sentiment of the POTUS |
White, Wimmer, Rebman Jr., Nwankwo
|
Powerful Member | 2020 | View | Leader-Driven Supply Chain Cybersecurity Framework |
Vanajakumari, Mittal, Stoker, Clark, Miller
|
Practice Lens | 2015 | View | A Practice Based Examination of Standardization, and its Relationship with the Design and Use of Healthcare IS |
alsekait, Chakraborty
|
Practice vs Performance | 2013 | View | Microsoft vs Apple: Which is Great by Choice? |
Sena, Olsen
|
predicting | 2019 | View | Exploring Strategies Computer Science Educators need to use to Prepare Machine-Learning Datasets for Predicting Dropout Rates in MOOCs |
Nafed, Lotfy, Sambasivam
|
Prediction Analytics | 2020 | View | Predicting Soil Conditions Using Machine Learning Algorithms |
Gondi, Hua, Bajracharya
|
Predictive | 2014 | View | On Adapting a Military Combat Discrete Event Simulation with Big Data and Geospatial Modeling Toward a Predictive Model Ecosystem for Interpersonal Violence |
Mhlanga, Perry, Kirchner
|
Predictive Analytics | 2019 | View | Digital Transformation and Geospatial Analytics |
Abot, Ariyachandra
|
Predictive Analytics | 2018 | View | Geospatial Analytics: Why is Geographic Information Systems a Technology Critical to any Organization? |
Abot, Ariyachandra, Frolick
|
Predictive Analytics | 2017 | View | A Review of Big Data Predictive Analytics in Information Systems Research
|
Ohiomah, Andreev, Benyoucef
|
Predictive Analytics | 2015 | View | A Comparison of Open Source Tools for Data Science |
Wimmer, Powell
|
Predictive Modeling | 2017 | View | Open vs. Close Source Decision Tree Algorithms: Comparing Performance Measures of Accuracy, Sensitivity and Specificity |
Khan, Wimmer, Powell
|
Predictive Security Model | 2009 | View | Can Management Predict Information Security Threats by Utilizing a Data Warehouse? |
Kim, Steen
|
Prescriptive Analytics | 2019 | View | Digital Transformation and Geospatial Analytics |
Abot, Ariyachandra
|
Prescriptive Analytics | 2018 | View | Geospatial Analytics: Why is Geographic Information Systems a Technology Critical to any Organization? |
Abot, Ariyachandra, Frolick
|
prevention | 2009 | View | A FOLLOW-UP STUDY OF DETECTING PHISHING EMAILS |
Bekkering, Werner, Hutchison
|
Price differentiation | 2013 | View | Online versus In-Store: Price Differentiation for Multi-Channel Retailers |
Flores, Sun
|
Price Fairness | 2016 | View | An Empirical Study on the Impact of Price Discount on Sales in Software-as-a-Service (SaaS) Market |
Choi, Medlin, Hunsinger
|
Principal component analysis | 2016 | View | Principle Component Analysis for Feature Reduction and Data Preprocessing in Data Science |
Wimmer, Powell
|
Privacy | 2022 | View | Are Companies Responsible for Internet of Things (IoT) Data Privacy? A Survey of IoT User Perceptions |
Paullet, Pinchot, Chawdhry
|
Privacy | 2021 | View | Data Sharing and Exposure: Findings from Descriptive and Network Analysis of Instant Games on Facebook |
Nicholson, Chakraborty, Ali-Gombe, Hammell II
|
Privacy | 2020 | View | Exploring Sentiment Towards Contact Tracing |
Crable, Sena
|
Privacy | 2020 | View | Privacy Concerns and Data Sharing Habits of Personal Fitness Information Collected via Activity Trackers |
Pinchot, Cellante
|
Privacy | 2020 | View | The New Frontier in Home and Commercial Deliveries: Drones
|
Fowler, Vannoy, Eggers, Medlin
|
Privacy | 2019 | View | Big Data, Algorithmic Classification, and False Positives: Consequences for Information Privacy |
Lauer
|
Privacy | 2019 | View | Privacy Considerations Throughout the Data Life Cycle |
Pomykalski
|
Privacy | 2018 | View | Commercial Drone Activity: Security, Privacy, and Legislation Issues |
Vannoy, Medlin
|
Privacy | 2018 | View | Privacy and Security Issues Associated with Mobile Dating Applications |
Hayes
|
Privacy | 2017 | View | Geolocation Tracking and Privacy Issues Associated with the Uber Mobile Application |
Hayes, Snow, Altuwayjiri
|
Privacy | 2017 | View | Information Security and Privacy Legislation:
Current State and Future Direction |
Dunlap, Cummings, Janicki
|
Privacy | 2016 | View | The Effects of Perceived Functionality and Usability on Privacy and Security Concerns about Adopting Cloud Applications |
Nakayama, Chen, Taylor
|
Privacy | 2013 | View | Data Privacy: Are We Accidentally Sharing Too Much Information? |
Chawdhry, Paullet, Douglas
|
Privacy | 2009 | View | A Study of the Perceptions of Students on |
Lawler, Molluzzo
|
Privacy | 2009 | View | E-Commerce Security |
Kraft
|
Privacy | 2008 | View | Analysis of the Factors that Influence Online Purchasing |
Amoroso, Hunsinger
|
privacy assurance | 2011 | View | Pay-What-You-Want Pricing for Mobile Applications: The Effect of Privacy Assurances and Social Information |
Racherla, Keith, Babb
|
Privacy Enhancing Technology | 2009 | View | E-Commerce Security |
Kraft
|
privacy metrics | 2022 | View | Smart Homes Privacy Metrics |
Etezady
|
Privacy Paradox | 2022 | View | The Importance and Value of Personal Identifying Information: Towards Information Worth |
Kaleta, Mahadevan, Thackston
|
privacy risk | 2022 | View | Children's Privacy:
An Evaluation of EdTech Privacy Policies |
West
|
problem structuring methods | 2015 | View | Toward a Better Understanding of Factors Affecting Software Project Complexity |
Petkova, Petkov
|
process performance matrix | 2013 | View | Feasibility of a Platform-as-a-Service Implementation using Cloud Computing for a Global Service Organization |
Gai, Steenkamp
|
processes | 2020 | View | Integration of Information Systems: Robotic Process Automation |
Money
|
processual | 2020 | View | Interpreting Organizational Security Governance Objectives for Strategic Security Planning |
Mishra
|
procurement process | 2022 | View | Decision-Making Tool for Procurement for Brazilian Airlines |
Torres, Halawi, Rojas, Bico, Marinho
|
Procurement tool | 2022 | View | Decision-Making Tool for Procurement for Brazilian Airlines |
Torres, Halawi, Rojas, Bico, Marinho
|
production planning | 2011 | View | Visualizing Capacity and Load: A Production Planning Information System for Metal Ingot Casting |
Wu, Acharya
|
productivity paradox | 2013 | View | A Study of Information Technology Operating and Capital Expenditures and Their Effect on Positive Firm Outcomes |
Peslak
|
professional associations | 2009 | View | Factors that Persuade and Deter Membership in Professional Computing Associations |
Umapathy, Jamba, Ritzhaupt
|
professional associations | 2008 | View | Computing Professional Association Membership: An Exploration of Membership Needs and Motivations |
Ritzhaupt, Umapathy, Jamba
|
Professional sports | 2019 | View | The Impact of Analytics Adoption on Team Performance in Professional Sports: A Longitudinal Analysis of the Lag in Observable Results |
Freeman
|
program management methodology | 2010 | View | The Potential Reality of Service-Oriented Architecture (SOA) in a Cloud Computing Strategy |
Lawler
|
programmer | 2012 | View | Open Source Software Volunteerism vs. |
Carpenter
|
Programming | 2010 | View | What is Missing From the Current Disaster Model |
Bilow, Nicolai
|
Project | 2017 | View | A Business Multi-Case Study of Change Management in Software Implementation |
Holtel, Paddock, Reiter, Riley, Havelka
|
Project Continuation | 2017 | View | An Exploratory Analysis of Gender Differences in IT Project Commitment, Continuation, and Escalation |
Korzaan, Harris, Brooks
|
Project Intangible Benefits | 2009 | View | Difficulties in quantifying IT projects |
Oliver, Janicki, Barrick
|
Project management | 2019 | View | Project Management Skills
Needed for Mobile App Development |
McCoy
|
Project management | 2014 | View | The Silent Treatment in IT Projects: Gender Differences in Inclinations to Communicate Project Status Information |
Korzaan, Brooks
|
Project management | 2013 | View | The De-Escalation of the DHS HSIN Next Gen Project |
Rosenhauer, Korzaan
|
Project management | 2009 | View | THE RELATIONSHIP BETWEEN INFORMATION TECHNOLOGY CRITICAL SUCCESS FACTORS AND PROJECT PERFORMANCE |
Lind, Culler
|
Project management | 2008 | View | An Information Technology Project Funding Process |
Kline, Renninger, Guinn, Sackley, Scott
|
Project management | 2008 | View | Determining Information Technology Project Status using Recognition-primed Decision Making enabled Collaborative Agents Simulating Teamwork (R-CAST) |
Barnes, Hammell II
|
Project management | 2008 | View | The Importance of Business Process Alignment |
Kraft
|
project scope status | 2011 | View | Computational Linguistic Hedges Applied to a Project Critical Path |
McQuighan, Hammell II
|
project selection | 2008 | View | An Information Technology Project Funding Process |
Kline, Renninger, Guinn, Sackley, Scott
|
project size | 2009 | View | THE RELATIONSHIP BETWEEN INFORMATION TECHNOLOGY CRITICAL SUCCESS FACTORS AND PROJECT PERFORMANCE |
Lind, Culler
|
Project Status Reporting | 2014 | View | The Silent Treatment in IT Projects: Gender Differences in Inclinations to Communicate Project Status Information |
Korzaan, Brooks
|
Project teams | 2012 | View | Using the Layered Model to Understand Employee Selection of Information and Communication Channels for Information and Knowledge Sharing in Project Teams |
Lee-Partridge, Snyder
|
protective concentration levels | 2009 | View | Superfund Site Analysis Using Web 2.0 Technologies |
Anderson, Jafar, Rogers
|
Prototype | 2020 | View | A Prototype for Distributed Computing Platform using Smartphones |
Wagner, Cao
|
public cloud | 2012 | View | Let’s Look at the Cloud from a Risk Management Perspective |
Vignos, Kim, Metzer
|
public health | 2013 | View | Creating A Semantic Differential Scale For Measuring Users’ Perception and Attitude To Emerging Technologies |
Ajani, Stork
|
public safety answering point mental health call | 2021 | View | Mental Health Call Triage: Coding Systems and Opportunities for Research |
Hashmi, Thomas, Nandan
|
Public Safety Answering Points (PSAPs) | 2017 | View | Predictive Models for Apportioning 911 Fund |
Berghammer, Douglas, Corley, Chen
|
Pure-play online retailers | 2013 | View | Online versus In-Store: Price Differentiation for Multi-Channel Retailers |
Flores, Sun
|
Python | 2008 | View | Comparison of Dynamic Web Content Processing Languages Performance |
Jafar, Anderson, Abdullat
|