Search by Keyword

Search returned 232 items for : S


KeywordConf YearArticleTitleAuthors
SaaS2016ViewAn Empirical Study on the Impact of Price Discount on Sales in Software-as-a-Service (SaaS) Market Choi, Medlin, Hunsinger
SaaS2012ViewLet’s Look at the Cloud from a Risk Management Perspective Vignos, Kim, Metzer
SACU2008ViewA STUDY OF THE INFORMATION TECHNOLOGY TRADE BETWEEN UNITED STATES AND THE SOUTHERN AFRICAN CUSTOM UNION Saenz, Flores, Koong, Liu
Safe Driving2018ViewDriving Distractions and Multi-tasking: An Investigative Study Choi, Xiong, Medlin
Salaries2022ViewAn Exploration of the Benefits of Certifications and their Relationship to Salaries in IS/IT Matthews, Cummings, Janicki
Sales Performance2015ViewDriving Inside Sales Performance with Lead Management Systems: A Conceptual Model Ohiomah, Benyoucef, Andreev
SaMD2020ViewDecision-Making Model Transparency for SaMD Machine Learning Algorithms Woodside
Sample2016ViewCrowdsourcing Surveys: Alternative Approaches to Survey Collection Cummings, Sibona
Samsung Pay2016ViewAnalysis of the Risks of NFC Mobile Payment Systems Kakish, Shah
SAS2018ViewA Machine Learning Approach to Optimizing Diabetes Healthcare Management Using SAS Analytic Suite Ajani, Habek
SBKM-ID2009ViewKnowledge Mapping in a Not-For-Profit Firm: A Case Study Nelson, Woratschek
scale development2013ViewCreating A Semantic Differential Scale For Measuring Users’ Perception and Attitude To Emerging Technologies Ajani, Stork
scanner panel data2011ViewUsing Market Basket Analysis to Estimate Potential Revenue Increases for a Small University Bookstore Hoanca, Mock
schedule visualization2011ViewVisualizing Capacity and Load: A Production Planning Information System for Metal Ingot Casting Wu, Acharya
school lunch programs2022ViewData Analytics for Societal Challenges: Understanding Student Participation in the National School Lunch Program Northey, Desai
SCM2012ViewRocky Relationships: Enterprise Resource Planning and Supply Chain Management Crumbly, Fryling
scope linguistic hedges2011ViewComputational Linguistic Hedges Applied to a Project Critical Path McQuighan, Hammell II
SDM2008ViewSYSTEM DEVELOPMENT METHODOLOGY USAGE IN INDUSTRY: A REVIEW AND ANALYSIS Griffin, Brandyberry
search engines2016ViewSentiment Analysis and Opinion Mining: Current State of the Art and Review of Google and Yahoo Search Engines’ Privacy Policies Peslak
search-engine2013ViewBizprojet: The co-design of an affinities and skills search-engine. Team building around an innovative project: New knowledge shared? Lombardo, Agostinelli, Ouvrard, Arvanitakis, Metge, Linscott
secure coding2015ViewMoving Beyond Coding: Why Secure Coding Should be Implemented Grover, Cummings, Janicki
Security2021ViewCombating Private Blockchain Fraud: A Virtual Reality & Artificial Intelligence Model Aimiuwu
Security2021ViewResolving Pressure and Stress on Governance Models from Robotic Process Automation Technologies Money
Security2021ViewSecurity Control Techniques: Cybersecurity & Medical Wearable Devices Sambasivam, Deal
Security2020ViewAn International Review and Study on Perceptions of Security, Adoption, and Implementation of Electronic Health Records Aliyu, Wimmer, Powell, Rebman Jr.
Security2020ViewAnalysis of Security Features and Vulnerabilities in Public/Open Wi-Fi James
Security2020ViewThe New Frontier in Home and Commercial Deliveries: Drones Fowler, Vannoy, Eggers, Medlin
Security2018ViewCommercial Drone Activity: Security, Privacy, and Legislation Issues Vannoy, Medlin
Security2017ViewInformation Security and Privacy Legislation: Current State and Future Direction Dunlap, Cummings, Janicki
Security2016ViewThe Effects of Perceived Functionality and Usability on Privacy and Security Concerns about Adopting Cloud Applications Nakayama, Chen, Taylor
Security2014ViewCyber Security Best Practices: What to do? Kleinberg, Reinicke, Cummings
Security2012ViewCloud Computing: Should I Stay or Should I Cloud? Muhleman, Kim, Homan, Breese
Security2010ViewPassword Security Risk versus Effort: An Exploratory Study on User-Perceived Risk and the Intention to Use Online Applications Gebauer, Kline, He
Security2009ViewA Study of the Perceptions of Students on Lawler, Molluzzo
Security2009ViewE-Commerce Security Kraft
Security Awareness2022ViewQR Code Hacking – Detecting Multiple Vulnerabilities in Android Scanning Software Homan, Breese
Security Breaches2009ViewCan Management Predict Information Security Threats by Utilizing a Data Warehouse? Kim, Steen
Security Effectiveness2015ViewExploring Relationships between the Strategic Importance of IT and the Effectiveness of IT Security and Mobile Device Management Stanko, Sena, Sena
Security management2015ViewExploring Relationships between the Strategic Importance of IT and the Effectiveness of IT Security and Mobile Device Management Stanko, Sena, Sena
Security management2009ViewCan Management Predict Information Security Threats by Utilizing a Data Warehouse? Kim, Steen
Security Threats2013ViewRisk Assessment & Management in Merchant Capture Systems: A Threat Analysis Perspective Streff, Shrestha, Delzer
SEERS2017ViewOpen vs. Close Source Decision Tree Algorithms: Comparing Performance Measures of Accuracy, Sensitivity and Specificity Khan, Wimmer, Powell
SEM2008ViewAn Empirical Study of Instant Messaging Behavior Using Diffusion of Innovation Theory Peslak, Ceccucci, Sendall
semantic differential scale2018ViewUsing Twitter Sentiment Analysis to Analyze Self-Sentiment of the POTUS White, Wimmer, Rebman Jr., Nwankwo
semantic differential scale2013ViewCreating A Semantic Differential Scale For Measuring Users’ Perception and Attitude To Emerging Technologies Ajani, Stork
semantic library web2019ViewAn Exploratory Study of the Perceptions of Library Faculty and Patrons on Library Resources Herman, Wimmer, Rebman Jr.
Semiotics2011ViewSemiotics as a Theoretical Foundation of Information Design Sharp
Seniors2010ViewSeniors and Social Networking Lewis, Ariyachandra
Sentiment analysis2020ViewExploring Sentiment Towards Contact Tracing Crable, Sena
Sentiment analysis2019ViewA Longitudinal Study of Google Privacy Policies Peslak, Kovalchick, Conforti
Sentiment analysis2018ViewUsing Twitter Sentiment Analysis to Analyze Self-Sentiment of the POTUS White, Wimmer, Rebman Jr., Nwankwo
Sentiment analysis2017ViewFacebook Fanatics: A Linguistic and Sentiment Analysis of the Most “Fanned” Facebook Pages Peslak
Serverless2022ViewA Serverless Real-Time Data Streaming Architecture for Synchronous Online Math Competition Liu, Chung
Serverless2021ViewLow Maintenance, Low Cost, Highly Secure, and Highly Manageable Serverless Solutions for Software Reverse Engineering Nguyen, Chung
Service Deployment2021ViewAn Initial Exploration of Multi-Node Open Cloud Infrastructure Testbed Liu, Lui, Li, Embuldeniya, Garcia, McAllister, Schwieger
Service-Dominant Logic2011ViewCo-Creating Value in Systems Development: A Shift towards Service-Dominant Logic Babb, Keith
Service-oriented architecture (SOA)2010ViewThe Potential Reality of Service-Oriented Architecture (SOA) in a Cloud Computing Strategy Lawler
service-oriented computing (SOC)2010ViewThe Potential Reality of Service-Oriented Architecture (SOA) in a Cloud Computing Strategy Lawler
service-oriented enterprise (SOE)2010ViewThe Potential Reality of Service-Oriented Architecture (SOA) in a Cloud Computing Strategy Lawler
setiment analysis2016ViewSentiment Analysis and Opinion Mining: Current State of the Art and Review of Google and Yahoo Search Engines’ Privacy Policies Peslak
setup sensitive machine2011ViewVisualizing Capacity and Load: A Production Planning Information System for Metal Ingot Casting Wu, Acharya
Sharepoint2009ViewAn Exploratory Study of Relationships between Workforce Characteristics and the Use of Collaboration and Social Networking Tools in a Global Tchnology Firm Totterdale
Short Stay Quality Measures2022ViewExploring Short Stay Health Care Quality: Skilled Nursing Facilities during the COVID-19 Era Winston, Xiong, Medlin, Pelaez
signature tree2011ViewMaximizing Visibility in Skylines Miah
Similarity2013ViewSimilarity and Ties in Social Networks Afrasiabi Rad, Benyoucef
Simulation2015ViewVariation in Best-Case and Worst-Case Performance for Sorting Algorithms McMaster, Sambasivam, Rague, Wolthuis
Simulation2011ViewPlan to Throw one Away: Lessons Learned Battig, Commo
situational awareness2012ViewExamining the Effects of the Value of Information on Intelligence Analyst Performance Newcomb, Hammell II
Skilled Nursing Facilities2022ViewExploring Short Stay Health Care Quality: Skilled Nursing Facilities during the COVID-19 Era Winston, Xiong, Medlin, Pelaez
skylines2011ViewMaximizing Visibility in Skylines Miah
Small Business Development Corporation2009ViewTowards an Abstract Model for Mhlanga, Vardiman, Reames
small towns2009ViewAnalyzing Community Websites: A Main Street Perspective Schoenacher
Smart contract2019ViewConceptualization of Blockchain-based Applications: Technical Background and Social Perspective Xiong, Tang, Medlin
smart devices2015ViewInformation Technology in Patient Care: Challenges of using IT in Small Ambulatory Healthcare Organizations. Reddy
smart home2022ViewSmart Homes Privacy Metrics Etezady
smart sourcing2011ViewOutsourcing Best Practices Mikita, DeHondt
Smartphone2020ViewA Prototype for Distributed Computing Platform using Smartphones Wagner, Cao
Smartphone2015ViewCase Study: Can Interpersonal-Cultural Communication Sustain Another Innovation? Spangler , Breese, Borkovich
smartphones2019ViewGame Theory Through Smartphone App Use In Support of For-Hire Transportation Network Companies Pendergrass
smartphones2017ViewPhubbing: Communication in the Attention Economy Pendergrass
smartphones2011ViewMobile Telephone Usage and Perception During Group Meetings. Bajko
SME2008ViewFormal Information Security Standards in Medium Enterprises Sambasivam, Kluge
SMS2012ViewAnalysis of the Variables That Affect Frequency of Use and Time Spent on Social Networking Peslak, Sendall, Ceccucci
SMS2009ViewAn Empirical Study of Text Messaging Peslak, Ceccucci, Sendall
snap length2018ViewThe use of Snap Length in Lossy Network Traffic Compression for Network Intrusion Detection Applications Smith, Hammell II
Snort2019ViewThe Use of Tainted Flows in Network Compression for Distributed Network Intrusion Detection Smith, Hammell II
Snort2018ViewThe use of Snap Length in Lossy Network Traffic Compression for Network Intrusion Detection Applications Smith, Hammell II
SOAP2012ViewComparing Performance of Web Service Interaction Styles: SOAP vs. REST Kumar, Ahuja, Umapathy, Prodanoff
Soccer2021ViewUsing Analytics to understand Performance and Wellness for a Women’s College Soccer Team Njunge, Witman, Holmberg, Canacoo
Social capital2012ViewThe Impact of Intra-Organizational Social Cummings
Social capital2011ViewSocial Networking Systems and Campus Life Sgambato, Petkov, Wolf
Social Commerce2010ViewA Model for Understanding Social Commerce Afrasiabi Rad, Benyoucef
Social Contract Theory2009ViewA Study of the Perceptions of Students on Lawler, Molluzzo
Social Curation2016ViewUnderstanding User Behavior on Pinterest: Findings and Insights Wei, Zhang
social information2011ViewPay-What-You-Want Pricing for Mobile Applications: The Effect of Privacy Assurances and Social Information Racherla, Keith, Babb
Social Link Types2011ViewMeasuring Propagation in Online Social Networks: The case of YouTube Afrasiabi Rad, Benyoucef
Social media2018ViewCan Social Media Accounts Have an Impact on Hiring Decisions? Guidelines for Appropriate Use Kim, Homan
Social media2017ViewPhubbing: Communication in the Attention Economy Pendergrass
Social media2015ViewBlurred Lines: Defining the Motives for Mobile and Social Media Use for Marketing Strategy Kim, Homan, Breese-Vitelli, Metzer
Social media2013ViewCan Social Media aid Software Development? Reinicke, Cummings
Social media2013ViewDecision-Making via Visual Analysis using the Natural Language Toolkit and R Jafar, Babb, Dana
Social media2012ViewSocial Media: Building a Competitive Edge Aimiuwu
Social Network Analysis2013ViewSimilarity and Ties in Social Networks Afrasiabi Rad, Benyoucef
social network builders2019ViewStrategies Needed by Social Network Builders to Develop Information Privacy Azzouz, Sambasivam
social network platforms and applications2019ViewStrategies Needed by Social Network Builders to Develop Information Privacy Azzouz, Sambasivam
social network privacy2019ViewStrategies Needed by Social Network Builders to Develop Information Privacy Azzouz, Sambasivam
social network providers2019ViewStrategies Needed by Social Network Builders to Develop Information Privacy Azzouz, Sambasivam
Social networking2013ViewData Privacy: Are We Accidentally Sharing Too Much Information? Chawdhry, Paullet, Douglas
Social networking2012ViewAnalysis of the Variables That Affect Frequency of Use and Time Spent on Social Networking Peslak, Sendall, Ceccucci
Social networking2012ViewInformation Technology (IT) professional perceptions regarding the value of communication, collaboration, and the use of social networking technologies in the workplace: a case study Fryling, Trubitt
Social networking2010ViewAn Empirical Study of Social Networking Behavior Using Diffusion of Innovation Theory Ceccucci, Peslak, Sendall
Social networking2009ViewA Study of the Perceptions of Students on Lawler, Molluzzo
Social networking2009ViewAn Exploratory Study of Relationships between Workforce Characteristics and the Use of Collaboration and Social Networking Tools in a Global Tchnology Firm Totterdale
Social Networking (SNS)2009ViewA Study of the Perceptions of Students on Lawler, Molluzzo
Social Networking Site2013ViewCan Social Media aid Software Development? Reinicke, Cummings
Social networking sites2016ViewCrowdsourcing Surveys: Alternative Approaches to Survey Collection Cummings, Sibona
Social networking sites2011ViewSocial Networking Systems and Campus Life Sgambato, Petkov, Wolf
Social Networking Use2010ViewSeniors and Social Networking Lewis, Ariyachandra
Social networks2011ViewMeasuring Propagation in Online Social Networks: The case of YouTube Afrasiabi Rad, Benyoucef
Social Responsibility2015ViewSocial Responsibility Trends and Perceptions in Global IT Outsourcing Babin, Myers
Social Ties2013ViewSimilarity and Ties in Social Networks Afrasiabi Rad, Benyoucef
Social Web2010ViewA Model for Understanding Social Commerce Afrasiabi Rad, Benyoucef
Software2010ViewWhat is Missing From the Current Disaster Model Bilow, Nicolai
Software Architecture2021ViewDecreasing the Barrier to Entry for an Open-Source Full-Stack Web Development Ngo, Chung, Chang
Software as a Medical Device2020ViewDecision-Making Model Transparency for SaMD Machine Learning Algorithms Woodside
Software as a Service (SaaS)2011ViewUsing the cloud: How to keep your data private Cronin, Pauli, Ham
Software Deployment2009ViewBusiness Requirements Knowledge Management Ontology to Support a Software Deployment Process Steenkamp, Alomari
Software development2015ViewMoving Beyond Coding: Why Secure Coding Should be Implemented Grover, Cummings, Janicki
Software development2014ViewThe Silent Treatment in IT Projects: Gender Differences in Inclinations to Communicate Project Status Information Korzaan, Brooks
Software development2012ViewEvaluating the South African software industry as a key component for economic development using an Irish framework Dehinbo, Dehinbo
Software development2011ViewPlan to Throw one Away: Lessons Learned Battig, Commo
Software development2009ViewThe Impact of Transition Costs on Offshore Systems Development DeHondt, Leidig
software development lifecycle2014ViewOpen Source Web Application Vulnerability Scanners: The Cost Effective Choice McQuade
Software Documentation2021ViewDecreasing the Barrier to Entry for an Open-Source Full-Stack Web Development Ngo, Chung, Chang
Software engineering2019ViewAn Empirical Study of Post-Production Software Code Quality When Employing the Agile Rapid Delivery Methodology Poe, Seeman
Software engineering2013ViewSoftware Engineering: accessing IT core concepts Davis, Kmetz
Software engineers2020ViewJob and Career Satisfaction of Software Engineers Peslak, Ceccucci, Sendall
software project complexity2015ViewToward a Better Understanding of Factors Affecting Software Project Complexity Petkova, Petkov
Software project schedule estimation2012ViewEarly Stage Probabilistic Software Project Schedule Estimation Kwon, Hammell II
Software Reverse Engineering2021ViewLow Maintenance, Low Cost, Highly Secure, and Highly Manageable Serverless Solutions for Software Reverse Engineering Nguyen, Chung
Software testing2013ViewTaxonomy of Common Software Testing Terminology: Framework for Key Software Engineering Testing Concepts Roggio, Gordon, Comer
software-as-a-service2012ViewA Study of Cloud Computing Software-as-a-Service (SaaS) in Financial Firms Lawler, Howell-Barber, Desai, Joseph
Soil Conductivity2020ViewPredicting Soil Conditions Using Machine Learning Algorithms Gondi, Hua, Bajracharya
sorting2015ViewVariation in Best-Case and Worst-Case Performance for Sorting Algorithms McMaster, Sambasivam, Rague, Wolthuis
sorting2014ViewMeasuring Algorithm Performance With Java: Patterns of Variation McMaster, Sambasivam, Wolthuis
South Africa2014ViewAligning Information Systems strategy with the Business Strategy in a South African Banking Environment Kekwaletswe, Mathebula
Spatial Data Analytics2020ViewSpatial Data Analytics For The Pandemic Wu, Igoche
spatial data processing2012ViewVicinities for Spatial Data Processing: Wu, Acharya
spatial interpolation2009ViewSpatial Interpolation for a Wireless Sensor Network of Chemical Point Detectors: Preliminary Results Schafer, Hammell II
Specification Analysis2014ViewReview of Web Service Specifications for Long-running Conversations Rana, Umapathy
sports analytics2021ViewUsing Analytics to understand Performance and Wellness for a Women’s College Soccer Team Njunge, Witman, Holmberg, Canacoo
Spyware2009ViewSpyware: What Influences College Students to Use Anti-Spyware Tools? Ward, Hunsinger
SQL Injection2022ViewVulnerability Assessment for Web Applications Garcia, Abraham, Kepic, Cankaya
stalking2018ViewUnderstanding Cyberstalking through the Analysis of Student's Online Activity Paullet, Chawdhry
Standard(s)/standardization2015ViewA Practice Based Examination of Standardization, and its Relationship with the Design and Use of Healthcare IS alsekait, Chakraborty
standards2014ViewReview of Web Service Specifications for Long-running Conversations Rana, Umapathy
static testing2013ViewTaxonomy of Common Software Testing Terminology: Framework for Key Software Engineering Testing Concepts Roggio, Gordon, Comer
statistical analysis2011ViewApplying Business Intelligence Concepts to Medicaid Claim Fraud Detection Copeland, Edberg, Wendel
Steganography2022ViewExploring the Strategic Cybersecurity Defense Information Technology Managers Can Implement to Reduce Healthcare Data Breaches Mawel, Sambasivam
Steubenville2014ViewA Case Study Analysis of KnightSec and the Steubenville Rape Case Pendergrass, Wright
strategic2020ViewInterpreting Organizational Security Governance Objectives for Strategic Security Planning Mishra
strategic alignment model2014ViewAligning Information Systems strategy with the Business Strategy in a South African Banking Environment Kekwaletswe, Mathebula
Strategic Choice2012ViewThe Adoption of Green IT/IS: Sharma
strategic IT2022ViewInfluence of Executive Perception of Role of Information Technology: A financial institution perspective Pandey, Mishra
Strategic planning2019ViewExamining Organizational Security Governance (OSG) Objectives: How is strategic planning for Security is undertaken at ABC Corporation? Mishra
strategic use of IT2010ViewMake or Buy: A comparative assessment of organizations that develop software internally versus those that purchase software Sena, Sena
strategy2019ViewPrivacy Considerations Throughout the Data Life Cycle Pomykalski
strategy2015ViewBlurred Lines: Defining the Motives for Mobile and Social Media Use for Marketing Strategy Kim, Homan, Breese-Vitelli, Metzer
strategy2014ViewA Cloud Computing Methodology Study of Platform-as-a-Service (PaaS) in the Financial Industry Lawler, Howell-Barber, Joseph
strategy2013ViewA Study of Cloud Computing Infrastructure-as-a-Service (IaaS) in Financial Firms Lawler, Howell-Barber, Joseph, Narula
strategy2012ViewA Study of Cloud Computing Software-as-a-Service (SaaS) in Financial Firms Lawler, Howell-Barber, Desai, Joseph
strategy2012ViewSocial Media: Building a Competitive Edge Aimiuwu
Stream Processing2019ViewA Comparative Study on Common Errors in Rules Governing Complex Event Processing Systems Dennis, Sambasivam
structural2020ViewInterpreting Organizational Security Governance Objectives for Strategic Security Planning Mishra
structural equation modeling2010ViewAn Empirical Study of Social Networking Behavior Using Diffusion of Innovation Theory Ceccucci, Peslak, Sendall
structural equation modeling2008ViewAn Empirical Study of Instant Messaging Behavior Using Diffusion of Innovation Theory Peslak, Ceccucci, Sendall
Student attitudes2013ViewDoes File Sharing Lead to Legal Sales? Student Attitudes on Music Piracy Siegfried
student data2022ViewChildren's Privacy: An Evaluation of EdTech Privacy Policies West
Student Learning Outcomes2020ViewEnhancing Learning Analytics: The Rise of Institutional Research Perkins, Ariyachandra
subjective norm2016ViewSubjective norm and measuring its impact on information security behavioral intention in organizations. Etezady
subset of attributes2011ViewMaximizing Visibility in Skylines Miah
subset optimization2021View Selecting Subsets of Amazon Reviews Gokce, Kline, Cummings, Vetter
Subset selection2021View Selecting Subsets of Amazon Reviews Gokce, Kline, Cummings, Vetter
success2010ViewA Study of Information Technology Integration Peslak
Success factor for virtual teams2009ViewElements of Technology and Success in Virtual Teams Balazs, White
success factors2016ViewBuilding Client Vendor Alignment Capability in Strategic Information Systems Outsourcing Ghosh
supply chain2020ViewLeader-Driven Supply Chain Cybersecurity Framework Vanajakumari, Mittal, Stoker, Clark, Miller
supply chain2016ViewE-commerce Adoption: A Revelatory Case Study in the German Oncology Pharmaceutical Supply Chain Sultanow, Chircu, Chircu
Supply chain management2022ViewBig Data Analytics in Supply Chain Management: A Review and Recommendations Ouyang, Hwang, Cham, Chen
Supply chain management2020ViewCase Study of Blockchain Applications in Supply Chain Management- Opportunities and Challenges Smith, Xiong, Medlin
Supply chain management2020ViewThe New Frontier in Home and Commercial Deliveries: Drones Fowler, Vannoy, Eggers, Medlin
Supply chain management2012ViewRocky Relationships: Enterprise Resource Planning and Supply Chain Management Crumbly, Fryling
Support Vector Machine (SVM).2020ViewPredicting Soil Conditions Using Machine Learning Algorithms Gondi, Hua, Bajracharya
Support Vector Machines2022ViewClassification of Wolf Subjects Based on Hunting-Stressed Physiological Effects Using Support Vector Machines (SVM) Stewart, Davis
surveillance2019ViewBig Data, Algorithmic Classification, and False Positives: Consequences for Information Privacy Lauer
Survey2021ViewBarriers and Drivers to Adoption of Electronic Health Record Systems Du, Sturgill
Survey2017ViewStudent Intentions and Behaviors Related to Email Security: An Application of the Health Belief Model Schymik, Du
Survey2009ViewFactors that Persuade and Deter Membership in Professional Computing Associations Umapathy, Jamba, Ritzhaupt
Surveys2016ViewCrowdsourcing Surveys: Alternative Approaches to Survey Collection Cummings, Sibona
Sustainability2021ViewHarvesting Intrinsically Verifiable Trust to Build a Honey Traceability System for Sustainable Development Runzel, Hassler, Hadley, Ratcliffe, Wilkes, Cazier
Sustainability2019ViewTrash to Treasure: Predicting Landfill Gas Flow to Optimize Electricity Generation Hassler, Emery, Hoyle, Cazier
Sustainability2018ViewStandardizing Public Utility Data: A Case Study of a Rural Mid-Size Utility Hassler, Cazier, Russell, Mueller, Paprocki
Sustainability2015ViewSocial Responsibility Trends and Perceptions in Global IT Outsourcing Babin, Myers
Sustainability2012ViewThe Adoption of Green IT/IS: Sharma
Sustainability2009ViewSustainability and Greening through D'Onofrio, Jarmoszko, Lee-Partridge, Petkova
Sustainability2008ViewAssessing the Role of CSR in Outsourcing Decisions Babin
sustainable development2010ViewOn Conceptual Models of Collaborative Partnerships and the Infusion of Knowledge Workers in the Local IT Sector Vardiman, Mhlanga
switching behavior2022ViewUnderstanding Gen Z’s Switching Intention to E-Commerce Drone Delivery: An Updated Diffusion of Innovation Kaleta, Xie, Chen
Synchronous Online Math Competition2022ViewA Serverless Real-Time Data Streaming Architecture for Synchronous Online Math Competition Liu, Chung
system analysis2008ViewAn Information Technology Project Funding Process Kline, Renninger, Guinn, Sackley, Scott
system based knowledge management2009ViewKnowledge Mapping in a Not-For-Profit Firm: A Case Study Nelson, Woratschek
System Development2019ViewKnowledge Management System Development Approaches: Evolution or Stagnation? Mew, Money
System Development Methodology2008ViewSYSTEM DEVELOPMENT METHODOLOGY USAGE IN INDUSTRY: A REVIEW AND ANALYSIS Griffin, Brandyberry
System Dynamics2014ViewERP Customization vs. Business Process Reengineering: Technical and Functional Perceptions Fryling
System integration2016ViewIdentifying the Critical Success Factors for Information Systems to Manage Sponsored Research Activities at Institutions of Higher Education Lehman, Ruzich
Systematic Review2017ViewA Review of Big Data Predictive Analytics in Information Systems Research Ohiomah, Andreev, Benyoucef
Systemic Intervention2014ViewA Case Study on Achieving Legitimation in Information Systems Action Research Projects Petkova, Petkov
Systems2010ViewNATIS: Novel Architecture Framework for Sambasivam, Liang, Liao
Systems2009ViewSynchronizing Development Life-Cycles: Rationale and Integrative Approach to Construction of eLearning Systems and Online Courses at a Tier 1 Research Institution Conn, Macedo, Meese
Systems analysis2017ViewCloud Computing: Implications for Information Systems Development Service Providers and Practitioners Mew, Money
Systems analysis & design2017ViewUsing Systems Analysis and Design to Enhance the Business Understanding Stage in CRISP-DM Pomykalski, Buzydlowski
Systems analysis & design2015ViewCASE Tools’ Acceptance in Higher Education – Assessment and Enhanced UTAUT Model Marcinkowski, Wrycza
Systems analysis & design2013ViewCan Social Media aid Software Development? Reinicke, Cummings
Systems analysis & design2008ViewSome Suggestions for Further Diffusion of Work System Method Ideas in Systems Analysis and Design Petkov, Misra, Petkova
Systems development2017ViewCloud Computing: Implications for Information Systems Development Service Providers and Practitioners Mew, Money
Systems development2013ViewCan Social Media aid Software Development? Reinicke, Cummings
Systems development2009ViewComponent-Based Software Development: Life Cycles and Design Science-Based Recommendations Sharp, Ryan
Systems development2008ViewSome Suggestions for Further Diffusion of Work System Method Ideas in Systems Analysis and Design Petkov, Misra, Petkova
Systems development methods2011ViewCo-Creating Value in Systems Development: A Shift towards Service-Dominant Logic Babb, Keith
systems integration2010ViewA Study of Information Technology Integration Peslak
Systems thinking2018ViewDelineating Legacy System IT Artifacts – Applying a Systems Thinking-based Framework Stachofsky
Systems thinking2016ViewA Multi-Criteria Network Assessment Model of IT Offshoring Risks from Service Provider’s Perspective Petkov, Petkova