Search by Keyword

Search returned 138 items for : P


KeywordConf YearArticleTitleAuthors
package design2011ViewMost Popular Package Design Miah
Packaged Software2008ViewTest Driven Development in the .Net Framework Lee, Mehta, Shah
pandemic2021ViewThe COVID Effect: Information Technology Jobs in the Pandemic Sendall, Peslak, Ceccucci, Hunsinger
pandemic2010ViewWhat is Missing From the Current Disaster Model Bilow, Nicolai
pandemic tracking system2010ViewThe Use of Mobile Units McGinley, Nicolai
Panel Data2016ViewAn Empirical Study on the Impact of Price Discount on Sales in Software-as-a-Service (SaaS) Market Choi, Medlin, Hunsinger
paperless office2009ViewAn Ontological Characterization of the ‘Structured Information Flow’ (SIF) Model Bhatia, Arthur
Paradigm Shift2019ViewKnowledge Management System Development Approaches: Evolution or Stagnation? Mew, Money
password strategy2010ViewPassword Security Risk versus Effort: An Exploratory Study on User-Perceived Risk and the Intention to Use Online Applications Gebauer, Kline, He
pay-what-you-want2011ViewPay-What-You-Want Pricing for Mobile Applications: The Effect of Privacy Assurances and Social Information Racherla, Keith, Babb
payloads2020ViewDocumenting the Process of Hijacking a Raspberry Pi User Login Credentials via Remote Code Execution Patel, Wimmer, Powell
PCA2016ViewPrinciple Component Analysis for Feature Reduction and Data Preprocessing in Data Science Wimmer, Powell
Penetration testing2022ViewVulnerability Assessment for Web Applications Garcia, Abraham, Kepic, Cankaya
Perceived Behavioral Control2009ViewSpyware: What Influences College Students to Use Anti-Spyware Tools? Ward, Hunsinger
perceived ease of use2018ViewDrone Delivery Services: An Evaluation of Personal Innovativeness, Opinion Passing and Key Information Technology Adoption Factors Chen, Choi, Charoen
Perceived radicalness2016ViewFinding the “Radicalness” in Radical Innovation Adoption Sharma, Thomas, Konsynski
perceived risk2008ViewAnalysis of the Factors that Influence Online Purchasing Amoroso, Hunsinger
Perceived Uncertainty2021ViewImpact of Review Valence and Perceived Uncertainty on Purchase of Time-Constrained and Discounted Search Goods Muzumdar
Perceived usefulness2018ViewDrone Delivery Services: An Evaluation of Personal Innovativeness, Opinion Passing and Key Information Technology Adoption Factors Chen, Choi, Charoen
Perceived usefulness2018ViewImprove the Loyalty of Mobile Payment Users in China by Increasing the Fit between Skill, Technology and Task Chen, Choi, Xiong, Tang
Perceived Value2016ViewAn Empirical Study on the Impact of Price Discount on Sales in Software-as-a-Service (SaaS) Market Choi, Medlin, Hunsinger
perception2017ViewMinimalism in Data Visualization: Perceptions of Beauty, Clarity, Effectiveness, and Simplicity Hill, Wray, Sibona
Performance2021ViewUsing Analytics to understand Performance and Wellness for a Women’s College Soccer Team Njunge, Witman, Holmberg, Canacoo
Performance2015ViewAn Optimized Intelligent Home Network Model Kevin, Ndlovu, Lall, Kogeda
Performance2015ViewVariation in Best-Case and Worst-Case Performance for Sorting Algorithms McMaster, Sambasivam, Rague, Wolthuis
Performance2014ViewMeasuring Algorithm Performance With Java: Patterns of Variation McMaster, Sambasivam, Wolthuis
performance management2019ViewUnderstanding Campus Crime with a Multi-University Analytics System Iheadindu, Kline, Vetter, Clark
Performance task2012ViewComparing Performance of Web Service Interaction Styles: SOAP vs. REST Kumar, Ahuja, Umapathy, Prodanoff
Perl2008ViewComparison of Dynamic Web Content Processing Languages Performance Jafar, Anderson, Abdullat
personal fitness information2020ViewPrivacy Concerns and Data Sharing Habits of Personal Fitness Information Collected via Activity Trackers Pinchot, Cellante
personal identifying information (PII)2022ViewThe Importance and Value of Personal Identifying Information: Towards Information Worth Kaleta, Mahadevan, Thackston
personal innovativeness2018ViewDrone Delivery Services: An Evaluation of Personal Innovativeness, Opinion Passing and Key Information Technology Adoption Factors Chen, Choi, Charoen
persuading factors2009ViewFactors that Persuade and Deter Membership in Professional Computing Associations Umapathy, Jamba, Ritzhaupt
Persuasive Strategies2015ViewIntroducing A Change Resistance Factor in Knowledge Management Model: A Concentration in Organizational Culture Abaoud, alluhaidan
pharmaceutical industry2016ViewE-commerce Adoption: A Revelatory Case Study in the German Oncology Pharmaceutical Supply Chain Sultanow, Chircu, Chircu
Phishing2009ViewA FOLLOW-UP STUDY OF DETECTING PHISHING EMAILS Bekkering, Werner, Hutchison
Phishing2009ViewSome Observations on the Occurrences of Phishing Lara, Rios, Salazar, Koong, Liu
photographic images2009ViewThe Two Leading Freeware Image Editing Applications – An Overview, Comparative Evaluation and Guide for the IS Community Scher
Photoscape2009ViewThe Two Leading Freeware Image Editing Applications – An Overview, Comparative Evaluation and Guide for the IS Community Scher
PHP2008ViewComparison of Dynamic Web Content Processing Languages Performance Jafar, Anderson, Abdullat
Phubbing2017ViewPhubbing: Communication in the Attention Economy Pendergrass
physiological indicators2022ViewClassification of Wolf Subjects Based on Hunting-Stressed Physiological Effects Using Support Vector Machines (SVM) Stewart, Davis
physiological indicators2021ViewUsing Physiological Effects and K-Nearest Neighbor to Identify Membership in Hunting-Stressed Wolf Populations Stewart, Davis, Igoche
PII Importance2022ViewThe Importance and Value of Personal Identifying Information: Towards Information Worth Kaleta, Mahadevan, Thackston
PII value2022ViewThe Importance and Value of Personal Identifying Information: Towards Information Worth Kaleta, Mahadevan, Thackston
PII worth2022ViewThe Importance and Value of Personal Identifying Information: Towards Information Worth Kaleta, Mahadevan, Thackston
Pinterest2016ViewUnderstanding User Behavior on Pinterest: Findings and Insights Wei, Zhang
Planning2017ViewUsing Systems Analysis and Design to Enhance the Business Understanding Stage in CRISP-DM Pomykalski, Buzydlowski
Platform as a Service (PaaS)2013ViewFeasibility of a Platform-as-a-Service Implementation using Cloud Computing for a Global Service Organization Gai, Steenkamp
Platform Innovation2013ViewLooking Backwards to Look Ahead: Lessons from Barcode Adoption for RFID Adoption and Implementation Sharma, Thomas
platform-as-a-service (PaaS)2014ViewA Cloud Computing Methodology Study of Platform-as-a-Service (PaaS) in the Financial Industry Lawler, Howell-Barber, Joseph
playfulness2013ViewWeb Recruitment: Parzinger, Ward, Langford
PLS-analysis2010ViewPassword Security Risk versus Effort: An Exploratory Study on User-Perceived Risk and the Intention to Use Online Applications Gebauer, Kline, He
point sampling sensor networks2009ViewSpatial Interpolation for a Wireless Sensor Network of Chemical Point Detectors: Preliminary Results Schafer, Hammell II
police mental health call response2021ViewMental Health Call Triage: Coding Systems and Opportunities for Research Hashmi, Thomas, Nandan
policy2019ViewExamining Organizational Security Governance (OSG) Objectives: How is strategic planning for Security is undertaken at ABC Corporation? Mishra
Political Redistricting2021ViewGIS for Democracy: Toward A Solution Against Gerrymandering Wu, Igoche
popular package2011ViewMost Popular Package Design Miah
population model2016ViewEvidence of Wikipedia usage during the school year: A numerical study Snyder
Post-Implementation2012ViewRocky Relationships: Enterprise Resource Planning and Supply Chain Management Crumbly, Fryling
Postings2012ViewA Quantitative Analysis of Computing Jobs in 2012 Robin, Roggio
POTUS2018ViewUsing Twitter Sentiment Analysis to Analyze Self-Sentiment of the POTUS White, Wimmer, Rebman Jr., Nwankwo
Powerful Member2020ViewLeader-Driven Supply Chain Cybersecurity Framework Vanajakumari, Mittal, Stoker, Clark, Miller
Practice Lens2015ViewA Practice Based Examination of Standardization, and its Relationship with the Design and Use of Healthcare IS alsekait, Chakraborty
Practice vs Performance2013ViewMicrosoft vs Apple: Which is Great by Choice? Sena, Olsen
predicting2019ViewExploring Strategies Computer Science Educators need to use to Prepare Machine-Learning Datasets for Predicting Dropout Rates in MOOCs Nafed, Lotfy, Sambasivam
Prediction Analytics2020ViewPredicting Soil Conditions Using Machine Learning Algorithms Gondi, Hua, Bajracharya
Predictive2014ViewOn Adapting a Military Combat Discrete Event Simulation with Big Data and Geospatial Modeling Toward a Predictive Model Ecosystem for Interpersonal Violence Mhlanga, Perry, Kirchner
Predictive Analytics2019ViewDigital Transformation and Geospatial Analytics Abot, Ariyachandra
Predictive Analytics2018ViewGeospatial Analytics: Why is Geographic Information Systems a Technology Critical to any Organization? Abot, Ariyachandra, Frolick
Predictive Analytics2017ViewA Review of Big Data Predictive Analytics in Information Systems Research Ohiomah, Andreev, Benyoucef
Predictive Analytics2015ViewA Comparison of Open Source Tools for Data Science Wimmer, Powell
Predictive Modeling2017ViewOpen vs. Close Source Decision Tree Algorithms: Comparing Performance Measures of Accuracy, Sensitivity and Specificity Khan, Wimmer, Powell
Predictive Security Model2009ViewCan Management Predict Information Security Threats by Utilizing a Data Warehouse? Kim, Steen
Prescriptive Analytics2019ViewDigital Transformation and Geospatial Analytics Abot, Ariyachandra
Prescriptive Analytics2018ViewGeospatial Analytics: Why is Geographic Information Systems a Technology Critical to any Organization? Abot, Ariyachandra, Frolick
prevention2009ViewA FOLLOW-UP STUDY OF DETECTING PHISHING EMAILS Bekkering, Werner, Hutchison
Price differentiation2013ViewOnline versus In-Store: Price Differentiation for Multi-Channel Retailers Flores, Sun
Price Fairness2016ViewAn Empirical Study on the Impact of Price Discount on Sales in Software-as-a-Service (SaaS) Market Choi, Medlin, Hunsinger
Principal component analysis2016ViewPrinciple Component Analysis for Feature Reduction and Data Preprocessing in Data Science Wimmer, Powell
Privacy2022ViewAre Companies Responsible for Internet of Things (IoT) Data Privacy? A Survey of IoT User Perceptions Paullet, Pinchot, Chawdhry
Privacy2021ViewData Sharing and Exposure: Findings from Descriptive and Network Analysis of Instant Games on Facebook Nicholson, Chakraborty, Ali-Gombe, Hammell II
Privacy2020ViewExploring Sentiment Towards Contact Tracing Crable, Sena
Privacy2020ViewPrivacy Concerns and Data Sharing Habits of Personal Fitness Information Collected via Activity Trackers Pinchot, Cellante
Privacy2020ViewThe New Frontier in Home and Commercial Deliveries: Drones Fowler, Vannoy, Eggers, Medlin
Privacy2019ViewBig Data, Algorithmic Classification, and False Positives: Consequences for Information Privacy Lauer
Privacy2019ViewPrivacy Considerations Throughout the Data Life Cycle Pomykalski
Privacy2018ViewCommercial Drone Activity: Security, Privacy, and Legislation Issues Vannoy, Medlin
Privacy2018ViewPrivacy and Security Issues Associated with Mobile Dating Applications Hayes
Privacy2017ViewGeolocation Tracking and Privacy Issues Associated with the Uber Mobile Application Hayes, Snow, Altuwayjiri
Privacy2017ViewInformation Security and Privacy Legislation: Current State and Future Direction Dunlap, Cummings, Janicki
Privacy2016ViewThe Effects of Perceived Functionality and Usability on Privacy and Security Concerns about Adopting Cloud Applications Nakayama, Chen, Taylor
Privacy2013ViewData Privacy: Are We Accidentally Sharing Too Much Information? Chawdhry, Paullet, Douglas
Privacy2009ViewA Study of the Perceptions of Students on Lawler, Molluzzo
Privacy2009ViewE-Commerce Security Kraft
Privacy2008ViewAnalysis of the Factors that Influence Online Purchasing Amoroso, Hunsinger
privacy assurance2011ViewPay-What-You-Want Pricing for Mobile Applications: The Effect of Privacy Assurances and Social Information Racherla, Keith, Babb
Privacy Enhancing Technology2009ViewE-Commerce Security Kraft
privacy metrics2022ViewSmart Homes Privacy Metrics Etezady
Privacy Paradox2022ViewThe Importance and Value of Personal Identifying Information: Towards Information Worth Kaleta, Mahadevan, Thackston
privacy risk2022ViewChildren's Privacy: An Evaluation of EdTech Privacy Policies West
problem structuring methods2015ViewToward a Better Understanding of Factors Affecting Software Project Complexity Petkova, Petkov
process performance matrix2013ViewFeasibility of a Platform-as-a-Service Implementation using Cloud Computing for a Global Service Organization Gai, Steenkamp
processes2020ViewIntegration of Information Systems: Robotic Process Automation Money
processual2020ViewInterpreting Organizational Security Governance Objectives for Strategic Security Planning Mishra
procurement process2022ViewDecision-Making Tool for Procurement for Brazilian Airlines Torres, Halawi, Rojas, Bico, Marinho
Procurement tool2022ViewDecision-Making Tool for Procurement for Brazilian Airlines Torres, Halawi, Rojas, Bico, Marinho
production planning2011ViewVisualizing Capacity and Load: A Production Planning Information System for Metal Ingot Casting Wu, Acharya
productivity paradox2013ViewA Study of Information Technology Operating and Capital Expenditures and Their Effect on Positive Firm Outcomes Peslak
professional associations2009ViewFactors that Persuade and Deter Membership in Professional Computing Associations Umapathy, Jamba, Ritzhaupt
professional associations2008ViewComputing Professional Association Membership: An Exploration of Membership Needs and Motivations Ritzhaupt, Umapathy, Jamba
Professional sports2019ViewThe Impact of Analytics Adoption on Team Performance in Professional Sports: A Longitudinal Analysis of the Lag in Observable Results Freeman
program management methodology2010ViewThe Potential Reality of Service-Oriented Architecture (SOA) in a Cloud Computing Strategy Lawler
programmer2012ViewOpen Source Software Volunteerism vs. Carpenter
Programming2010ViewWhat is Missing From the Current Disaster Model Bilow, Nicolai
Project2017ViewA Business Multi-Case Study of Change Management in Software Implementation Holtel, Paddock, Reiter, Riley, Havelka
Project Continuation2017ViewAn Exploratory Analysis of Gender Differences in IT Project Commitment, Continuation, and Escalation Korzaan, Harris, Brooks
Project Intangible Benefits2009ViewDifficulties in quantifying IT projects Oliver, Janicki, Barrick
Project management2019ViewProject Management Skills Needed for Mobile App Development McCoy
Project management2014ViewThe Silent Treatment in IT Projects: Gender Differences in Inclinations to Communicate Project Status Information Korzaan, Brooks
Project management2013ViewThe De-Escalation of the DHS HSIN Next Gen Project Rosenhauer, Korzaan
Project management2009ViewTHE RELATIONSHIP BETWEEN INFORMATION TECHNOLOGY CRITICAL SUCCESS FACTORS AND PROJECT PERFORMANCE Lind, Culler
Project management2008ViewAn Information Technology Project Funding Process Kline, Renninger, Guinn, Sackley, Scott
Project management2008ViewDetermining Information Technology Project Status using Recognition-primed Decision Making enabled Collaborative Agents Simulating Teamwork (R-CAST) Barnes, Hammell II
Project management2008ViewThe Importance of Business Process Alignment Kraft
project scope status2011ViewComputational Linguistic Hedges Applied to a Project Critical Path McQuighan, Hammell II
project selection2008ViewAn Information Technology Project Funding Process Kline, Renninger, Guinn, Sackley, Scott
project size2009ViewTHE RELATIONSHIP BETWEEN INFORMATION TECHNOLOGY CRITICAL SUCCESS FACTORS AND PROJECT PERFORMANCE Lind, Culler
Project Status Reporting2014ViewThe Silent Treatment in IT Projects: Gender Differences in Inclinations to Communicate Project Status Information Korzaan, Brooks
Project teams2012ViewUsing the Layered Model to Understand Employee Selection of Information and Communication Channels for Information and Knowledge Sharing in Project Teams Lee-Partridge, Snyder
protective concentration levels2009ViewSuperfund Site Analysis Using Web 2.0 Technologies Anderson, Jafar, Rogers
Prototype2020ViewA Prototype for Distributed Computing Platform using Smartphones Wagner, Cao
public cloud2012ViewLet’s Look at the Cloud from a Risk Management Perspective Vignos, Kim, Metzer
public health2013ViewCreating A Semantic Differential Scale For Measuring Users’ Perception and Attitude To Emerging Technologies Ajani, Stork
public safety answering point mental health call2021ViewMental Health Call Triage: Coding Systems and Opportunities for Research Hashmi, Thomas, Nandan
Public Safety Answering Points (PSAPs)2017ViewPredictive Models for Apportioning 911 Fund Berghammer, Douglas, Corley, Chen
Pure-play online retailers2013ViewOnline versus In-Store: Price Differentiation for Multi-Channel Retailers Flores, Sun
Python2008ViewComparison of Dynamic Web Content Processing Languages Performance Jafar, Anderson, Abdullat