Search by Authors

Search returned 58 items for : S

Year PubArticleTitleAuthors
2009ViewA Study of the Information Technology Trade between the United States and the Dominican Republic-Central America Free Trade Agreement Nations Pena, Aguirre, Saenz, Koong, Liu
2023ViewMeasuring Analytics Maturity and Culture: The LDIS+™ Analytics Impact Framework Fowler, Sambasivam
2022View Examining Cloud Data Security Vulnerabilities During Usage Sambasivam, Amoah
2022ViewSecurity Control Techniques: Cybersecurity & Medical Wearable Devices Sambasivam, Deal
2021ViewA Comparative Study on Information Technology (IT) Infrastructure and Disaster Recovery Methodology Sambasivam, Brown Jr
2015ViewMeasuring Algorithm Performance With Java: Patterns of Variation McMaster, Sambasivam, Wolthuis
2016ViewGovernance of Outsourcing: Building a Better Relationship Babin, Saunderson
2012ViewStudy of User Behavior in Image Retrieval and Implications for Content Versus Concept Based Access Schultz
2011ViewDevelopment of an Evaluation Model for XBRL-enabled Tools Intended for Investors Clements, Schwieger, Surendran
2018ViewStudent Intentions and Behaviors Related to Email Security: An Application of the Health Belief Model Schymik, Du
2020ViewAn Empirical Study of Post-Production Software Code Quality When Employing the Agile Rapid Delivery Methodology Poe, Seeman
2014ViewInformation Security in Nonprofits: A First Glance at the State of Security in Two Illinois Regions Imboden, Phillips, Seib, Fiorentino
2021ViewExploring Sentiment Towards Contact Tracing Crable, Sena
2016ViewExploring Relationships between the Strategic Importance of IT and the Effectiveness of IT Security and Mobile Device Management Stanko, Sena, Sena
2016ViewExploring Relationships between the Strategic Importance of IT and the Effectiveness of IT Security and Mobile Device Management Stanko, Sena, Sena
2014ViewMicrosoft vs Apple: Which is Great by Choice? Sena, Olsen
2011ViewMake or Buy: A comparative assessment of organizations that develop software internally versus those that purchase software Sena, Sena
2011ViewMake or Buy: A comparative assessment of organizations that develop software internally versus those that purchase software Sena, Sena
2022ViewThe COVID-19 Pandemic’s Impact on Information Technology Employment, Salaries, and Career Opportunities Sendall, Peslak, Ceccucci, Hunsinger
2021ViewJob and Career Satisfaction of Software Engineers Peslak, Ceccucci, Sendall
2012ViewAn Empirical Study of Social Networking Behavior Using Theory of Reasoned Action Peslak, Ceccucci, Sendall
2010ViewAn Empirical Study of Instant Messaging Behavior Using Diffusion of Innovation Theory Peslak, Ceccucci, Sendall
2010ViewAn Empirical Study of Text Messaging Behavioral Intention and Usage Peslak, Ceccucci, Sendall
2012ViewSocial Networking Systems and Campus Life Sgambato, Petkov, Wolf
2017ViewFinding the “Radicalness” in Radical Innovation Adoption Sharma, Thomas, Konsynski
2014ViewLooking Backwards to Look Ahead: Lessons from Barcode Adoption for RFID Adoption and Implementation Sharma, Thomas
2014ViewRisk Assessment & Management in Merchant Capture Systems: A Threat Analysis Perspective Streff, Shrestha, Delzer
2018ViewMinimalism in Data Visualization: Perceptions of Beauty, Clarity, Effectiveness, and Simplicity Hill, Wray, Sibona
2017ViewCrowdsourcing Surveys: Alternative Approaches to Survey Collection Cummings, Sibona
2009ViewThe Accessibility of College and University Home Pages DiLallo, Siegfried
2020ViewAddressing issues with EMR resulting in workarounds: An exploratory study Mishra, Slonka, Draus, Bromall, Slonka
2020ViewAddressing issues with EMR resulting in workarounds: An exploratory study Mishra, Slonka, Draus, Bromall, Slonka
2021ViewCase Study of Blockchain Applications in Supply Chain Management- Opportunities and Challenges Smith, Xiong, Medlin
2020ViewDeveloping a GIS Dashboard Tool to Inform Non-Profit Hospitals of Community Health Needs at the Neighborhood Level Copello, Smith, Mease, Umapathy, Richard, Knight, Albertie, Hamadi, Spaulding, Apatu
2019ViewThe use of Snap Length in Lossy Network Traffic Compression for Network Intrusion Detection Applications Smith, Hammell II
2017ViewProposal for Kelly Criterion-Inspired Lossy Network Compression for Network Intrusion Applications Smith, Hammell II
2018ViewA Dynamic and Static Analysis of the Uber Mobile Application from a Privacy Perspective Hayes, Snow, Altuwayjiri
2016ViewLeakage of Geolocation Data by Mobile Ad Networks Snow, Hayes, Dwyer
2024ViewWest Nile Virus in Colorado: Analytic and Geospatial Models of the Virus in Colorado Snyder
2020ViewDeveloping a GIS Dashboard Tool to Inform Non-Profit Hospitals of Community Health Needs at the Neighborhood Level Copello, Smith, Mease, Umapathy, Richard, Knight, Albertie, Hamadi, Spaulding, Apatu
2016ViewExploring Relationships between the Strategic Importance of IT and the Effectiveness of IT Security and Mobile Device Management Stanko, Sena, Sena
2010ViewCan Management Predict Information Security Threats by Utilizing a Data Warehouse? Kim, Steen
2014ViewA Feasibility Study of Platform-as-a-Service Using Cloud Computing for a Global Service Organization Gai, Steenkamp
2023ViewIdentification of Stressed Wolf Populations Based on Hormone Levels Using Support Vector Machines (SVM) Stewart, Davis
2022ViewClassification of Hunting-Stressed Wolf Populations Using Machine Learning Stewart, Davis, Igoche
2024ViewAn Action Research Approach to Building an Enterprise-Specific Chatbot (ESCB) Wood, Stoker
2022ViewCybersecurity Maturity Model Certification Initial Impact on the Defense Industrial Base Strohmier, Stoker, Vanajakumari, Clark, Cummings, Modaresnezhad
2021ViewTowards a Leader-Driven Supply Chain Cybersecurity Framework Vanajakumari, Mittal, Stoker, Clark, Miller
2014ViewDeveloping a Semantic Differential Scale for Measuring Users’ Attitudes toward Sensor based Decision Support Technologies for the Environment. Ajani, Stork
2024ViewIntegrating Virtual and Augmented Reality with Brain-Computer Interfaces for ADHD and ASD Management: A Preliminary Review Streeter, Li, Li, Zhang, Tian, He
2014ViewRisk Assessment & Management in Merchant Capture Systems: A Threat Analysis Perspective Streff, Shrestha, Delzer
2009ViewAn Examination of Information Security in Mobile Banking Architectures Streff, Haar
2022ViewCybersecurity Maturity Model Certification Initial Impact on the Defense Industrial Base Strohmier, Stoker, Vanajakumari, Clark, Cummings, Modaresnezhad
2022ViewDeterminants of Health Professionals’ Intention to Adopt Electronic Health Record Systems Du, Sturgill
2014ViewOnline versus In-Store: Price Differentiation for Multi-Channel Retailers Flores, Sun
2013ViewCreating an Audio Conferencing Application Sun, Vetter, Reinicke
2013ViewGlobal Diffusion of Virtual Social Networks: A Pyramid Model of Cultural, Developmental and Regulatory Foundations Wang, Sun
2011ViewDevelopment of an Evaluation Model for XBRL-enabled Tools Intended for Investors Clements, Schwieger, Surendran