Search by Authors

Search returned 58 items for : P

Year PubArticleTitleAuthors
2023ViewInfluence of Reporting structure and Perception of Role of Information Technology on Decision-making: A Qualitative Study Pandey, Mishra
2021ViewDoes the Executive Perception of the Value of Information Technology (IT) Influence the IT strategy? A Case Study Pandey, Mishra
2019ViewStandardizing Public Utility Data: A Case Study of a Rural Mid-Size Utility Hassler, Cazier, Russell, Mueller, Paprocki
2015ViewIdentifying User Behavior from Residual Data in Cloud-based Synchronized Apps Grispos, Glisson, Pardue, Dickson
2011ViewA Process for Assessing Voting System Risk Using Threat Trees Yasinisac, Pardue
2014ViewPerformance and Corporate Social Responsibility in the Information Technology Industry Cowan, Parzinger, Welch, Welch
2021ViewDocumenting the Process of Hijacking a Raspberry Pi User Login Credentials via Remote Code Execution Patel, Wimmer, Powell
2018ViewProtecting IoT from Mirai botnets; IoT device hardening Frank, Nance, Jarocki, Pauli
2012ViewUsing the cloud: Keeping Enterprise Data Private Cronin, Pauli, Ham
2023ViewAre Companies Responsible for Internet of Things (IoT) Data Privacy? A Survey of IoT User Perceptions Paullet, Pinchot, Chawdhry
2018ViewWhat’s “Appening” to our Privacy? A Students Perspective on Downloading Mobile Apps Paullet, Chawdhry, Douglas, Compomizzi
2017ViewDownloading Mobile Applications - Are Students Protecting Themselves Chawdhry, Paullet, Douglas, Compomizzi
2015ViewUse of Preventative Measures to Protect Data Privacy on Mobile Devices Pinchot, Paullet
2012ViewTalk to Text: Changing Communication Patterns Pinchot, Douglas, Paullet, Rota
2012ViewThe New Tech Effect: Analyzing Juror Credibility Davis, Paullet, Kraeer, Grant
2011ViewHow Mobile Technology is Changing Our Culture Pinchot, Paullet, Rota
2023ViewShort Stay Healthcare Quality in Skilled Nursing Facilities: Occupancy, Nurse Staff Mix, and COVID-19 Winston, Xiong, Medlin, Pelaez
2009ViewA Study of the Information Technology Trade between the United States and the Dominican Republic-Central America Free Trade Agreement Nations Pena, Aguirre, Saenz, Koong, Liu
2021ViewEnhancing Learning Analytics: The Rise of Institutional Research Perkins, Ariyachandra
2015ViewOn Adapting a War-Gaming Discrete Event Simulator with Big Data and Geospatial Modeling Toward a Predictive Model Ecosystem for Interpersonal Violence Mhlanga, Perry, Kirchner
2024ViewInvestigating the Relationship between Developer Job Satisfaction and Life Satisfaction: A Global Analysis Peslak, Ceccucci, Jones, Leonard
2023ViewThe Effect of Mental Illness on Compensation for IT Developers Peslak, Ceccucci, Jones, Leonard
2022ViewThe COVID-19 Pandemic’s Impact on Information Technology Employment, Salaries, and Career Opportunities Sendall, Peslak, Ceccucci, Hunsinger
2021ViewJob and Career Satisfaction of Software Engineers Peslak, Ceccucci, Sendall
2021ViewOpen Source Software: A Detailed Analysis of Contributions and Quality Peslak, Hunsinger
2020ViewA Longitudinal Study of Google Privacy Policies Peslak, Kovalchick, Conforti
2018ViewFacebook Fanatics: A Linguistic and Sentiment Analysis of the Most “Fanned” Facebook Pages Peslak
2018ViewText Messaging Today: A Longitudinal Study of Variables Influencing Text Messaging from 2009 to 2016 Peslak, Hunsinger, Kruck
2017ViewSentiment Analysis and Opinion Mining: Current State of the Art and Review of Google and Yahoo Search Engines’ Privacy Policies Peslak
2016ViewAn Expanded Analysis of Internet Dependencies by Demographic Variables Peslak
2014ViewA Study of Information Technology Operating and Capital Expenditures and Their Effect on Positive Firm Outcomes Peslak
2012ViewAn Empirical Study of Social Networking Behavior Using Theory of Reasoned Action Peslak, Ceccucci, Sendall
2012ViewDoes Size Matter in IT? An exploratory analysis of critical issues facing organizations based on company size Peslak
2011ViewA Study of Information Technology Integration Peslak
2010ViewAn Empirical Study of Instant Messaging Behavior Using Diffusion of Innovation Theory Peslak, Ceccucci, Sendall
2010ViewAn Empirical Study of Text Messaging Behavioral Intention and Usage Peslak, Ceccucci, Sendall
2017ViewA Multi-Criteria Network Assessment Model of IT Offshoring Risks from Service Provider's Perspective Petkov, Petkova
2012ViewSocial Networking Systems and Campus Life Sgambato, Petkov, Wolf
2010ViewOn Design Science, MCDM, and Outsourcing Decision Making Petkov, Petkova
2017ViewA Multi-Criteria Network Assessment Model of IT Offshoring Risks from Service Provider's Perspective Petkov, Petkova
2010ViewOn Design Science, MCDM, and Outsourcing Decision Making Petkov, Petkova
2014ViewInformation Security in Nonprofits: A First Glance at the State of Security in Two Illinois Regions Imboden, Phillips, Seib, Fiorentino
2012ViewThe Effects of Interruptions on Remembering Task Information Lenox, Pilarski, Leathers
2023ViewAre Companies Responsible for Internet of Things (IoT) Data Privacy? A Survey of IoT User Perceptions Paullet, Pinchot, Chawdhry
2021ViewPrivacy Concerns and Data Sharing Habits of Personal Fitness Information Collected via Activity Trackers Pinchot, Cellante
2015ViewUse of Preventative Measures to Protect Data Privacy on Mobile Devices Pinchot, Paullet
2012ViewTalk to Text: Changing Communication Patterns Pinchot, Douglas, Paullet, Rota
2011ViewHow Mobile Technology is Changing Our Culture Pinchot, Paullet, Rota
2020ViewAn Empirical Study of Post-Production Software Code Quality When Employing the Agile Rapid Delivery Methodology Poe, Seeman
2024ViewResilience During Times of Disruption: The Role of Data Analytics in a Healthcare System Pohana, Ariyachandra
2020ViewPrivacy Considerations Throughout the Data Life Cycle Pomykalski
2021ViewAn International Review and Study on Perceptions of Security, Adoption, and Implementation of Electronic Health Records Aliyu, Wimmer, Powell, Rebman
2021ViewDocumenting the Process of Hijacking a Raspberry Pi User Login Credentials via Remote Code Execution Patel, Wimmer, Powell
2019ViewEffects of Normalization Techniques on Logistic Regression in Data Science Adeyemo, Wimmer, Powell
2016ViewA Comparison of Open Source Tools for Data Science Wimmer, Powell
2015ViewCyberbullying or normal game play? Impact of age, gender, and experience on cyberbullying in multi-player online gaming environments: Perceptions from one gaming forum Fryling, Cotler, Rivituso, Mathews, Pratico
2013ViewComparing Performance of Web Service Interaction Styles: SOAP vs. REST Kumar, Ahuja, Umapathy, Prodanoff
2009ViewResearch Design for a Natural Disaster Management Communication System: Local Indiana Government Agency Model Nicolai, Puntillo, Bilow