Keyword | Conf Year | Article | Title | Authors |
TAM | 2020 | View | The Sting of Adoption: The Technology Acceptance Model (TAM) with Actual Usage in a Hazardous Environment |
Hassler, MacDonald, Cazier, Wilkes
|
TAM | 2009 | View | An Empirical Study of Text Messaging |
Peslak, Ceccucci, Sendall
|
Task-Technology Fit Theory | 2018 | View | Improve the Loyalty of Mobile Payment Users in China by Increasing the Fit between Skill, Technology and Task |
Chen, Choi, Xiong, Tang
|
Taxonomy | 2010 | View | A Process for Assessing Voting System Risk Using Threat Trees |
Yasinisac, Pardue
|
Tcpdump | 2019 | View | The Use of Tainted Flows in Network Compression for Distributed Network Intrusion Detection |
Smith, Hammell II
|
Tcpdump | 2018 | View | The use of Snap Length in Lossy Network Traffic Compression for Network Intrusion Detection Applications |
Smith, Hammell II
|
Team management | 2021 | View | Augmented Reality & Artificial Intelligence Model: Optimizing Workforce Diversity
|
Aimiuwu
|
Team performance | 2019 | View | The Impact of Analytics Adoption on Team Performance in Professional Sports: A Longitudinal Analysis of the Lag in Observable Results |
Freeman
|
team practice | 2013 | View | Bizprojet: The co-design of an affinities and skills search-engine. Team building around an innovative project: New knowledge shared? |
Lombardo, Agostinelli, Ouvrard, Arvanitakis, Metge, Linscott
|
Technology | 2022 | View | Impact of New Technology Use on Workforce: Exploratory Analysis |
Toskin
|
Technology | 2021 | View | Resolving Pressure and Stress on Governance Models from Robotic Process Automation Technologies |
Money
|
Technology | 2010 | View | What is Missing From the Current Disaster Model |
Bilow, Nicolai
|
Technology acceptance | 2012 | View | Information Technology (IT) professional perceptions regarding the value of communication, collaboration, and the use of social networking technologies in the workplace: a case study |
Fryling, Trubitt
|
Technology acceptance | 2009 | View | Women's Technology Acceptance of Mentoring on the Internet |
Gibson, GIBSON
|
Technology Acceptance Model | 2020 | View | The Sting of Adoption: The Technology Acceptance Model (TAM) with Actual Usage in a Hazardous Environment |
Hassler, MacDonald, Cazier, Wilkes
|
Technology acceptance model (TAM) | 2017 | View | Text Messaging Today: A Longitudinal Study of Variables Influencing Text Messaging from 2009 to 2016 |
Peslak, Hunsinger, Kruck
|
Technology acceptance model (TAM) | 2015 | View | Exploratory Study of Effects of eLearning System Acceptance on Learning Outcomes |
Ghosh
|
Technology acceptance model (TAM) | 2012 | View | Analysis of the Variables That Affect Frequency of Use and Time Spent on Social Networking |
Peslak, Sendall, Ceccucci
|
Technology acceptance model (TAM) | 2010 | View | What Influences People to Use Linux? |
Hunsinger, Fransen
|
Technology acceptance model (TAM) | 2009 | View | An Empirical Study of Text Messaging |
Peslak, Ceccucci, Sendall
|
Technology acceptance model (TAM) | 2008 | View | Analysis of the Factors that Influence Online Purchasing |
Amoroso, Hunsinger
|
Technology Acceptance Model Modifications | 2015 | View | CASE Tools’ Acceptance in Higher Education – Assessment and Enhanced UTAUT Model |
Marcinkowski, Wrycza
|
Technology adoption | 2020 | View | Case Study of Blockchain Applications in Supply Chain Management- Opportunities and Challenges |
Smith, Xiong, Medlin
|
Technology adoption | 2016 | View | E-commerce Adoption: A Revelatory Case Study in the German Oncology Pharmaceutical Supply Chain |
Sultanow, Chircu, Chircu
|
Technology Awareness | 2009 | View | Spyware: What Influences College Students to Use Anti-Spyware Tools? |
Ward, Hunsinger
|
technology diffusion | 2008 | View | The Impact of Technology Diffusion on Employment and Compensation: Evidence from the Telecommunications Sector |
Clark, Moussawi
|
Technology-mediated Learning | 2015 | View | Exploratory Study of Effects of eLearning System Acceptance on Learning Outcomes |
Ghosh
|
technology-organization-environment (TOE) framewor | 2016 | View | E-commerce Adoption: A Revelatory Case Study in the German Oncology Pharmaceutical Supply Chain |
Sultanow, Chircu, Chircu
|
technology-skill complementarity | 2008 | View | The Impact of Technology Diffusion on Employment and Compensation: Evidence from the Telecommunications Sector |
Clark, Moussawi
|
telecommunication regulation | 2012 | View | Global Diffusion of Virtual Social Networks: A Pyramid Model |
Wang, Sun
|
Terminal Ballistics | 2015 | View | Comparing the Prediction Capabilities of an Artificial Neural Network vs a Phenomenological Model for Predicting the Terminal Ballistics of Kinetic Energy Projectiles |
Auten, Hammell II
|
Terminal Ballistics | 2013 | View | Predicting the Terminal Ballistics of Kinetic Energy Projectiles Using Artificial Neural Networks |
Auten, Hammell II
|
Test Driven Development | 2008 | View | Test Driven Development in the .Net Framework |
Lee, Mehta, Shah
|
testing levels | 2013 | View | A Comparison of Software Testing Using the Object-Oriented Paradigm and Traditional Testing |
Gordon, Roggio
|
Texas Emerging Technology Fund | 2009 | View | Towards an Abstract Model for |
Mhlanga, Vardiman, Reames
|
Text Analytics | 2021 | View |
Selecting Subsets of Amazon Reviews
|
Gokce, Kline, Cummings, Vetter
|
Text Analytics | 2019 | View | Literary Analysis Tool: Text Analytics for Creative Writers |
Grimsman, Kline, Vetter, Guinn
|
Text Messaging | 2017 | View | Text Messaging Today: A Longitudinal Study of Variables Influencing Text Messaging from 2009 to 2016 |
Peslak, Hunsinger, Kruck
|
Text Messaging | 2011 | View | Talk to Text: Changing Communication Patterns |
Pinchot, Douglas, Paullet, Rota
|
Text Messaging | 2009 | View | An Empirical Study of Text Messaging |
Peslak, Ceccucci, Sendall
|
Text Prediction | 2022 | View | Text Prediction Using Artificial Intelligence: An Analysis of Two Text Prediction Systems |
Wimmer, Du, Heri
|
text summarization. | 2021 | View |
Selecting Subsets of Amazon Reviews
|
Gokce, Kline, Cummings, Vetter
|
texting | 2013 | View | Data Privacy: Are We Accidentally Sharing Too Much Information? |
Chawdhry, Paullet, Douglas
|
texting | 2012 | View | Analysis of the Variables That Affect Frequency of Use and Time Spent on Social Networking |
Peslak, Sendall, Ceccucci
|
texting | 2011 | View | Talk to Text: Changing Communication Patterns |
Pinchot, Douglas, Paullet, Rota
|
thematic analysis | 2019 | View | Addressing issues with EMR resulting in workarounds: An exploratory study
|
Mishra, Slonka, Draus, Bromall, Slonka
|
theoretical foundation | 2011 | View | Semiotics as a Theoretical Foundation of Information Design |
Sharp
|
Theory of planned behavior | 2017 | View | Text Messaging Today: A Longitudinal Study of Variables Influencing Text Messaging from 2009 to 2016 |
Peslak, Hunsinger, Kruck
|
Theory of planned behavior | 2016 | View | Subjective norm and measuring its impact on information security behavioral intention in organizations. |
Etezady
|
Theory of planned behavior | 2012 | View | An Examination of the Factors Influencing Student Usage of Dropbox, a File Hosting Service |
Hunsinger, Corley
|
Theory of planned behavior | 2011 | View | Why are People Using Google's |
Corley, Hunsinger
|
Theory of planned behavior | 2010 | View | What Influences People to Use Linux? |
Hunsinger, Fransen
|
Theory of planned behavior | 2009 | View | Spyware: What Influences College Students to Use Anti-Spyware Tools? |
Ward, Hunsinger
|
Theory of reasoned action | 2017 | View | Text Messaging Today: A Longitudinal Study of Variables Influencing Text Messaging from 2009 to 2016 |
Peslak, Hunsinger, Kruck
|
Theory of reasoned action | 2012 | View | Analysis of the Variables That Affect Frequency of Use and Time Spent on Social Networking |
Peslak, Sendall, Ceccucci
|
Theory of reasoned action | 2009 | View | An Empirical Study of Text Messaging |
Peslak, Ceccucci, Sendall
|
threat trees | 2010 | View | A Process for Assessing Voting System Risk Using Threat Trees |
Yasinisac, Pardue
|
time based tradeoff | 2011 | View | Using the cloud: How to keep your data private |
Cronin, Pauli, Ham
|
time-evolving network | 2022 | View | Developing a Data-Driven Emerging Skill Network Analytics Framework for Automated Employment Advert Evaluation |
Liu, Schwieger
|
Timeline | 2008 | View | SYSTEM DEVELOPMENT METHODOLOGY USAGE IN INDUSTRY: A REVIEW AND ANALYSIS |
Griffin, Brandyberry
|
Tobin's Q | 2013 | View | Performance and Corporate Social Responsibility in the Information Technology Industry |
Cowan, Parzinger, Welch, Welch
|
TOE Framework | 2017 | View | Exploratory Study of Organizational Adoption of Cloud based Big Data Analytics |
Ghosh
|
TOPSIS | 2021 | View | Effect of Normalization on TOPSIS and Fuzzy TOPSIS |
Sarraf, McGuire
|
Total Cost of Ownership | 2014 | View | ERP Customization vs. Business Process Reengineering: Technical and Functional Perceptions |
Fryling
|
Total Cost of Ownership | 2012 | View | Cloud Computing: Should I Stay or Should I Cloud? |
Muhleman, Kim, Homan, Breese
|
TRA | 2009 | View | An Empirical Study of Text Messaging |
Peslak, Ceccucci, Sendall
|
Trading | 2010 | View | NATIS: Novel Architecture Framework for |
Sambasivam, Liang, Liao
|
traditional backup | 2020 | View | A Comparative Study on Information Technology (IT) Infrastructure and Disaster Recovery Methodology |
Sambasivam, Brown Jr
|
traditional testing | 2013 | View | A Comparison of Software Testing Using the Object-Oriented Paradigm and Traditional Testing |
Gordon, Roggio
|
Traffic Analysis | 2018 | View | Importance of Features in Adversarial Machine Learning for Cyber Security
|
De Lucia, Cotton
|
Transactions | 2014 | View | Review of Web Service Specifications for Long-running Conversations |
Rana, Umapathy
|
transition cost | 2009 | View | The Impact of Transition Costs on Offshore Systems Development |
DeHondt, Leidig
|
Trump | 2018 | View | Using Twitter Sentiment Analysis to Analyze Self-Sentiment of the POTUS |
White, Wimmer, Rebman Jr., Nwankwo
|
Trust | 2021 | View | Barriers and Drivers to Adoption of Electronic Health Record Systems |
Du, Sturgill
|
Trust | 2021 | View | Harvesting Intrinsically Verifiable Trust to Build a Honey Traceability System for Sustainable Development |
Runzel, Hassler, Hadley, Ratcliffe, Wilkes, Cazier
|
Trust | 2012 | View | Information Technology (IT) professional perceptions regarding the value of communication, collaboration, and the use of social networking technologies in the workplace: a case study |
Fryling, Trubitt
|
Trust | 2008 | View | Analysis of the Factors that Influence Online Purchasing |
Amoroso, Hunsinger
|
Twitter | 2020 | View | Exploring Sentiment Towards Contact Tracing |
Crable, Sena
|
Twitter | 2018 | View | Using Twitter Sentiment Analysis to Analyze Self-Sentiment of the POTUS |
White, Wimmer, Rebman Jr., Nwankwo
|
Twitter Data | 2016 | View | An Interactive Toolbox for Twitter Content Analytics |
Jafar, Waldman
|