Search by Institutions

Search returned 67 items for : U

InstitutionYear PubArticleTitleAuthors
U Texas2010ViewIncorporation of Information Technology into Assisted Health Care: An Empirical Study Merrill, White
University of Delaware2019ViewAdversarial Machine Learning for Cyber Security De Lucia, Cotton
University of Electronic Science and Technology of China2020ViewConceptualization of Blockchain-based Applications: Technical Background and Social Perspective Xiong, Tang, Medlin
University of Electronic Science and Technology of China2019ViewAligning the Factors of Skill, Technology and Task to Influence the Continued Use of Mobile Payment Users in China Chen, Choi, Xiong, Tang
University of Glasgow2015ViewIdentifying User Behavior from Residual Data in Cloud-based Synchronized Apps Grispos, Glisson, Pardue, Dickson
University of Michigan - Flint2008ViewThe Importance of Business Process Alignment for IT Project Management of Commercial Software with Case Studies Kraft
University of Nebraska Omaha2013ViewThe Impact of Regulatory Changes on IS Strategy: An Exploratory Study Reinicke, Ward
University of Nevada, Reno2012ViewApplying Business Intelligence Concepts to Medicaid Claim Fraud Detection Copeland, Edberg, Wendel
University of North Carolina Wilmington2024ViewAn Action Research Approach to Building an Enterprise-Specific Chatbot (ESCB) Wood, Stoker
University of North Carolina Wilmington2023ViewAn Exploration of the Benefits of Certifications and their Relationship to Salaries in IS/IT Matthews, Cummings, Janicki
University of North Carolina Wilmington2022ViewA Scalable Amazon Review Collection System Woodall, Kline, Vetter, Modaresnezhad
University of North Carolina Wilmington2022ViewCybersecurity Maturity Model Certification Initial Impact on the Defense Industrial Base Strohmier, Stoker, Vanajakumari, Clark, Cummings, Modaresnezhad
University of North Carolina Wilmington2021ViewTowards a Leader-Driven Supply Chain Cybersecurity Framework Vanajakumari, Mittal, Stoker, Clark, Miller
University of North Carolina Wilmington2020ViewLiterary Analysis Tool: Text Analytics for Creative Writers Grimsman, Kline, Vetter, Guinn
University of North Carolina Wilmington2020ViewUnderstanding Campus Crime with a Multi-University Analytics System Iheadindu, Kline, Vetter, Clark
University of North Carolina Wilmington2019ViewChanges in the Information Technology Field: A Survey of Current Technologies and Future Importance Cummings, Janicki
University of North Carolina Wilmington2018ViewInformation Security and Privacy Legislation: Current State and Future Direction Dunlap, Cummings, Janicki
University of North Carolina Wilmington2018ViewMinimalism in Data Visualization: Perceptions of Beauty, Clarity, Effectiveness, and Simplicity Hill, Wray, Sibona
University of North Carolina Wilmington2017ViewCrowdsourcing Surveys: Alternative Approaches to Survey Collection Cummings, Sibona
University of North Carolina Wilmington2016ViewMoving Beyond Coding: Why Secure Coding Should be Implemented Grover, Cummings, Janicki
University of North Carolina Wilmington2015ViewCyber Security Best Practices: What to do? Kleinberg, Reinicke, Cummings
University of North Carolina Wilmington2014ViewCan Social Media aid Software Development? Reinicke, Cummings
University of North Carolina Wilmington2014ViewShifting Technological Landscape: IT Departments and Anticipated Technological Changes Cummings, Janicki, Kline
University of North Carolina Wilmington2013ViewAnalysis of Electronic Health Mitchell, Clark
University of North Carolina Wilmington2013ViewCreating an Audio Conferencing Application Sun, Vetter, Reinicke
University of North Carolina Wilmington2013ViewInformation Security Blueprint Clark, Benli, Mitchell, Vetter
University of North Carolina Wilmington2013ViewThe Impact of Intra-Organizational Social Cummings
University of North Carolina Wilmington2012ViewBuilding a Real-Time Bus Tracking Data Display System Dudley, Vetter, Brown, Janicki
University of North Carolina Wilmington2012ViewCMobile: A Mobile Photo Capture Application for Construction Imaging Martin, Vetter, Brown, Janicki
University of North Carolina Wilmington2011ViewPassword Security Risk versus Effort: An Exploratory Study on User-Perceived Risk and the Intention to Use Online Applications Gebauer, Kline, He
University of North Carolina Wilmington2010ViewFactors that Persuade and Deter Membership in Professional Computing Associations Umapathy, Jamba, Ritzhaupt
University of North Carolina Wilmington2010ViewNetwork Growing Pains Clark, Mahar, Moussawi
University of North Carolina Wilmington2009ViewAnticipated Changes to Technologies Janicki, Clark, Mahar, Logan
University of North Carolina Wilmington2009ViewThe Impact of Technology Diffusion on Employment, Compensation, and Productivity: Evidence from the Telecommunications Sector Clark, Moussawi
University of North Carolina Wilmington2008ViewComputing Professional Association Membership: An Exploration of Membership Needs and Motivations Ritzhaupt, Umapathy, Jamba
University of North Florida2020ViewDeveloping a GIS Dashboard Tool to Inform Non-Profit Hospitals of Community Health Needs at the Neighborhood Level Copello, Smith, Mease, Umapathy, Richard, Knight, Albertie, Hamadi, Spaulding, Apatu
University of North Florida2014ViewA Comparison of Software Testing Using the Object-Oriented Paradigm and Traditional Testing Gordon, Roggio
University of North Florida2014ViewTaxonomy of Common Software Testing Terminology: Framework for Key Software Engineering Testing Concepts Roggio, Gordon, Comer
University of North Florida2013ViewComparing Performance of Web Service Interaction Styles: SOAP vs. REST Kumar, Ahuja, Umapathy, Prodanoff
University of North Florida2010ViewFactors that Persuade and Deter Membership in Professional Computing Associations Umapathy, Jamba, Ritzhaupt
University of North Florida2008ViewComputing Professional Association Membership: An Exploration of Membership Needs and Motivations Ritzhaupt, Umapathy, Jamba
University of Ottawa2016ViewDriving Inside Sales Performance with Lead Management Systems: A Conceptual Model Ohiomah, Benyoucef, Andreev
University of Ottawa2014ViewSimilarity and Ties in Social Networks Afrasiabi Rad, Benyoucef
University of Ottawa2012ViewMeasuring Propagation in Online Social Networks: The case of YouTube Afrasiabi Rad, Benyoucef
University of Ottawa2011ViewA Model for Understanding Social Commerce Afrasiabi Rad, Benyoucef
University of Richmond2020ViewKnowledge Management System Development: Handling Evolution from Explicit to Tacit and Social Mew, Money
University of Richmond2018ViewCloud Computing: Implications for Information Systems Development Service Providers and Practitioners Mew, Money
University of San Diego2024ViewUsing Textual Analytics to Process Information Overload of Cyber Security Subreddits Omakwu , Wimmer, Rebman
University of San Diego2021ViewAn International Review and Study on Perceptions of Security, Adoption, and Implementation of Electronic Health Records Aliyu, Wimmer, Powell, Rebman
University of San Diego2020ViewAn Exploratory Study of the Perceptions of Library Faculty and Patrons on Library Resources Herman, Wimmer, Rebman
University of South Alabama2015ViewIdentifying User Behavior from Residual Data in Cloud-based Synchronized Apps Grispos, Glisson, Pardue, Dickson
University of South Alabama2011ViewA Process for Assessing Voting System Risk Using Threat Trees Yasinisac, Pardue
University of South Florida2022ViewImpact of Review Valence and Perceived Uncertainty on Purchase of Time-Constrained and Discounted Search Goods Muzumdar
University of Texas - Dallas2023ViewA Comparative Analysis of Web Application Vulnerability Tools Garcia, Abraham, Kepic, Cankaya
University of Texas at San Antonio2014ViewPerformance and Corporate Social Responsibility in the Information Technology Industry Cowan, Parzinger, Welch, Welch
University of Texas Pan American2014ViewOnline versus In-Store: Price Differentiation for Multi-Channel Retailers Flores, Sun
University of Texas Pan American2013ViewGlobal Diffusion of Virtual Social Networks: A Pyramid Model of Cultural, Developmental and Regulatory Foundations Wang, Sun
University of Texas Pan American2009ViewA Study of the Information Technology Trade between the United States and the Dominican Republic-Central America Free Trade Agreement Nations Pena, Aguirre, Saenz, Koong, Liu
University of Texas, Dallas2009ViewThe Impact of Technology Diffusion on Employment, Compensation, and Productivity: Evidence from the Telecommunications Sector Clark, Moussawi
University of the Cumberlands2024ViewExamining Factors Influencing the Acceptance of Big Data Analytics in Healthcare Mohammed, Lind
University of the Virgin Islands2010ViewTowards an Abstract Model for Academia and Information Technology Sector Collaborative Partnerships: Responding to the “West Texas Coalition for Innovation and Commercialization” Initiative Mhlanga, Vardiman, Reames
University of Tulsa2024ViewInvestigating the Relationship between Developer Job Satisfaction and Life Satisfaction: A Global Analysis Peslak, Ceccucci, Jones, Leonard
University of Tulsa2023ViewThe Effect of Mental Illness on Compensation for IT Developers Peslak, Ceccucci, Jones, Leonard
University of Wisconsin Stevens Point2010ViewCreating the Pilot AJAX Enabled Query Tool Ford, Dollinger
Unknown2023ViewQR Code Hacking – Detecting Multiple Vulnerabilities in Android Scanning Software Homan, Breese
US Army Research Laboratory2019ViewThe use of Snap Length in Lossy Network Traffic Compression for Network Intrusion Detection Applications Smith, Hammell II
US Army Research Laboratory2017ViewProposal for Kelly Criterion-Inspired Lossy Network Compression for Network Intrusion Applications Smith, Hammell II