Search by Keyword

Search returned 80 items for : T


KeywordConf YearArticleTitleAuthors
TAM2020ViewThe Sting of Adoption: The Technology Acceptance Model (TAM) with Actual Usage in a Hazardous Environment Hassler, MacDonald, Cazier, Wilkes
TAM2009ViewAn Empirical Study of Text Messaging Peslak, Ceccucci, Sendall
Task-Technology Fit Theory2018ViewImprove the Loyalty of Mobile Payment Users in China by Increasing the Fit between Skill, Technology and Task Chen, Choi, Xiong, Tang
Taxonomy2010ViewA Process for Assessing Voting System Risk Using Threat Trees Yasinisac, Pardue
Tcpdump2019ViewThe Use of Tainted Flows in Network Compression for Distributed Network Intrusion Detection Smith, Hammell II
Tcpdump2018ViewThe use of Snap Length in Lossy Network Traffic Compression for Network Intrusion Detection Applications Smith, Hammell II
Team management2021ViewAugmented Reality & Artificial Intelligence Model: Optimizing Workforce Diversity Aimiuwu
Team performance2019ViewThe Impact of Analytics Adoption on Team Performance in Professional Sports: A Longitudinal Analysis of the Lag in Observable Results Freeman
team practice2013ViewBizprojet: The co-design of an affinities and skills search-engine. Team building around an innovative project: New knowledge shared? Lombardo, Agostinelli, Ouvrard, Arvanitakis, Metge, Linscott
Technology2022ViewImpact of New Technology Use on Workforce: Exploratory Analysis Toskin
Technology2021ViewResolving Pressure and Stress on Governance Models from Robotic Process Automation Technologies Money
Technology2010ViewWhat is Missing From the Current Disaster Model Bilow, Nicolai
Technology acceptance2012ViewInformation Technology (IT) professional perceptions regarding the value of communication, collaboration, and the use of social networking technologies in the workplace: a case study Fryling, Trubitt
Technology acceptance2009ViewWomen's Technology Acceptance of Mentoring on the Internet Gibson, GIBSON
Technology Acceptance Model2020ViewThe Sting of Adoption: The Technology Acceptance Model (TAM) with Actual Usage in a Hazardous Environment Hassler, MacDonald, Cazier, Wilkes
Technology acceptance model (TAM)2017ViewText Messaging Today: A Longitudinal Study of Variables Influencing Text Messaging from 2009 to 2016 Peslak, Hunsinger, Kruck
Technology acceptance model (TAM)2015ViewExploratory Study of Effects of eLearning System Acceptance on Learning Outcomes Ghosh
Technology acceptance model (TAM)2012ViewAnalysis of the Variables That Affect Frequency of Use and Time Spent on Social Networking Peslak, Sendall, Ceccucci
Technology acceptance model (TAM)2010ViewWhat Influences People to Use Linux? Hunsinger, Fransen
Technology acceptance model (TAM)2009ViewAn Empirical Study of Text Messaging Peslak, Ceccucci, Sendall
Technology acceptance model (TAM)2008ViewAnalysis of the Factors that Influence Online Purchasing Amoroso, Hunsinger
Technology Acceptance Model Modifications2015ViewCASE Tools’ Acceptance in Higher Education – Assessment and Enhanced UTAUT Model Marcinkowski, Wrycza
Technology adoption2020ViewCase Study of Blockchain Applications in Supply Chain Management- Opportunities and Challenges Smith, Xiong, Medlin
Technology adoption2016ViewE-commerce Adoption: A Revelatory Case Study in the German Oncology Pharmaceutical Supply Chain Sultanow, Chircu, Chircu
Technology Awareness2009ViewSpyware: What Influences College Students to Use Anti-Spyware Tools? Ward, Hunsinger
technology diffusion2008ViewThe Impact of Technology Diffusion on Employment and Compensation: Evidence from the Telecommunications Sector Clark, Moussawi
Technology-mediated Learning2015ViewExploratory Study of Effects of eLearning System Acceptance on Learning Outcomes Ghosh
technology-organization-environment (TOE) framewor2016ViewE-commerce Adoption: A Revelatory Case Study in the German Oncology Pharmaceutical Supply Chain Sultanow, Chircu, Chircu
technology-skill complementarity2008ViewThe Impact of Technology Diffusion on Employment and Compensation: Evidence from the Telecommunications Sector Clark, Moussawi
telecommunication regulation2012ViewGlobal Diffusion of Virtual Social Networks: A Pyramid Model Wang, Sun
Terminal Ballistics2015ViewComparing the Prediction Capabilities of an Artificial Neural Network vs a Phenomenological Model for Predicting the Terminal Ballistics of Kinetic Energy Projectiles Auten, Hammell II
Terminal Ballistics2013ViewPredicting the Terminal Ballistics of Kinetic Energy Projectiles Using Artificial Neural Networks Auten, Hammell II
Test Driven Development2008ViewTest Driven Development in the .Net Framework Lee, Mehta, Shah
testing levels2013ViewA Comparison of Software Testing Using the Object-Oriented Paradigm and Traditional Testing Gordon, Roggio
Texas Emerging Technology Fund2009ViewTowards an Abstract Model for Mhlanga, Vardiman, Reames
Text Analytics2021View Selecting Subsets of Amazon Reviews Gokce, Kline, Cummings, Vetter
Text Analytics2019ViewLiterary Analysis Tool: Text Analytics for Creative Writers Grimsman, Kline, Vetter, Guinn
Text Messaging2017ViewText Messaging Today: A Longitudinal Study of Variables Influencing Text Messaging from 2009 to 2016 Peslak, Hunsinger, Kruck
Text Messaging2011ViewTalk to Text: Changing Communication Patterns Pinchot, Douglas, Paullet, Rota
Text Messaging2009ViewAn Empirical Study of Text Messaging Peslak, Ceccucci, Sendall
Text Prediction2022ViewText Prediction Using Artificial Intelligence: An Analysis of Two Text Prediction Systems Wimmer, Du, Heri
text summarization.2021View Selecting Subsets of Amazon Reviews Gokce, Kline, Cummings, Vetter
texting2013ViewData Privacy: Are We Accidentally Sharing Too Much Information? Chawdhry, Paullet, Douglas
texting2012ViewAnalysis of the Variables That Affect Frequency of Use and Time Spent on Social Networking Peslak, Sendall, Ceccucci
texting2011ViewTalk to Text: Changing Communication Patterns Pinchot, Douglas, Paullet, Rota
thematic analysis2019ViewAddressing issues with EMR resulting in workarounds: An exploratory study Mishra, Slonka, Draus, Bromall, Slonka
theoretical foundation2011ViewSemiotics as a Theoretical Foundation of Information Design Sharp
Theory of planned behavior2017ViewText Messaging Today: A Longitudinal Study of Variables Influencing Text Messaging from 2009 to 2016 Peslak, Hunsinger, Kruck
Theory of planned behavior2016ViewSubjective norm and measuring its impact on information security behavioral intention in organizations. Etezady
Theory of planned behavior2012ViewAn Examination of the Factors Influencing Student Usage of Dropbox, a File Hosting Service Hunsinger, Corley
Theory of planned behavior2011ViewWhy are People Using Google's Corley, Hunsinger
Theory of planned behavior2010ViewWhat Influences People to Use Linux? Hunsinger, Fransen
Theory of planned behavior2009ViewSpyware: What Influences College Students to Use Anti-Spyware Tools? Ward, Hunsinger
Theory of reasoned action2017ViewText Messaging Today: A Longitudinal Study of Variables Influencing Text Messaging from 2009 to 2016 Peslak, Hunsinger, Kruck
Theory of reasoned action2012ViewAnalysis of the Variables That Affect Frequency of Use and Time Spent on Social Networking Peslak, Sendall, Ceccucci
Theory of reasoned action2009ViewAn Empirical Study of Text Messaging Peslak, Ceccucci, Sendall
threat trees2010ViewA Process for Assessing Voting System Risk Using Threat Trees Yasinisac, Pardue
time based tradeoff2011ViewUsing the cloud: How to keep your data private Cronin, Pauli, Ham
time-evolving network2022ViewDeveloping a Data-Driven Emerging Skill Network Analytics Framework for Automated Employment Advert Evaluation Liu, Schwieger
Timeline2008ViewSYSTEM DEVELOPMENT METHODOLOGY USAGE IN INDUSTRY: A REVIEW AND ANALYSIS Griffin, Brandyberry
Tobin's Q2013ViewPerformance and Corporate Social Responsibility in the Information Technology Industry Cowan, Parzinger, Welch, Welch
TOE Framework2017ViewExploratory Study of Organizational Adoption of Cloud based Big Data Analytics Ghosh
TOPSIS2021ViewEffect of Normalization on TOPSIS and Fuzzy TOPSIS Sarraf, McGuire
Total Cost of Ownership2014ViewERP Customization vs. Business Process Reengineering: Technical and Functional Perceptions Fryling
Total Cost of Ownership2012ViewCloud Computing: Should I Stay or Should I Cloud? Muhleman, Kim, Homan, Breese
TRA2009ViewAn Empirical Study of Text Messaging Peslak, Ceccucci, Sendall
Trading2010ViewNATIS: Novel Architecture Framework for Sambasivam, Liang, Liao
traditional backup2020ViewA Comparative Study on Information Technology (IT) Infrastructure and Disaster Recovery Methodology Sambasivam, Brown Jr
traditional testing2013ViewA Comparison of Software Testing Using the Object-Oriented Paradigm and Traditional Testing Gordon, Roggio
Traffic Analysis2018ViewImportance of Features in Adversarial Machine Learning for Cyber Security De Lucia, Cotton
Transactions2014ViewReview of Web Service Specifications for Long-running Conversations Rana, Umapathy
transition cost2009ViewThe Impact of Transition Costs on Offshore Systems Development DeHondt, Leidig
Trump2018ViewUsing Twitter Sentiment Analysis to Analyze Self-Sentiment of the POTUS White, Wimmer, Rebman Jr., Nwankwo
Trust2021ViewBarriers and Drivers to Adoption of Electronic Health Record Systems Du, Sturgill
Trust2021ViewHarvesting Intrinsically Verifiable Trust to Build a Honey Traceability System for Sustainable Development Runzel, Hassler, Hadley, Ratcliffe, Wilkes, Cazier
Trust2012ViewInformation Technology (IT) professional perceptions regarding the value of communication, collaboration, and the use of social networking technologies in the workplace: a case study Fryling, Trubitt
Trust2008ViewAnalysis of the Factors that Influence Online Purchasing Amoroso, Hunsinger
Twitter2020ViewExploring Sentiment Towards Contact Tracing Crable, Sena
Twitter2018ViewUsing Twitter Sentiment Analysis to Analyze Self-Sentiment of the POTUS White, Wimmer, Rebman Jr., Nwankwo
Twitter Data2016ViewAn Interactive Toolbox for Twitter Content Analytics Jafar, Waldman