Search by Keyword

Search returned 112 items for : C

KeywordYear PubArticleTitleAuthors
campus crime2020ViewUnderstanding Campus Crime with a Multi-University Analytics System Iheadindu, Kline, Vetter, Clark
campus life2012ViewSocial Networking Systems and Campus Life Sgambato, Petkov, Wolf
capital expenditures2014ViewA Study of Information Technology Operating and Capital Expenditures and Their Effect on Positive Firm Outcomes Peslak
Case studies2008ViewThe Importance of Business Process Alignment for IT Project Management of Commercial Software with Case Studies Kraft
Case study2023ViewInfluence of Reporting structure and Perception of Role of Information Technology on Decision-making: A Qualitative Study Pandey, Mishra
Case study2021ViewCase Study of Blockchain Applications in Supply Chain Management- Opportunities and Challenges Smith, Xiong, Medlin
Case study2021ViewDoes the Executive Perception of the Value of Information Technology (IT) Influence the IT strategy? A Case Study Pandey, Mishra
Case study2021ViewInterpreting Organizational Security Governance Objectives for Strategic Security Planning Mishra
Case study2020ViewAn Empirical Study of Post-Production Software Code Quality When Employing the Agile Rapid Delivery Methodology Poe, Seeman
Case study2013ViewThe Impact of Regulatory Changes on IS Strategy: An Exploratory Study Reinicke, Ward
cell phones2012ViewTalk to Text: Changing Communication Patterns Pinchot, Douglas, Paullet, Rota
cell phones2011ViewHow Mobile Technology is Changing Our Culture Pinchot, Paullet, Rota
Central limit theorem2013ViewEarly Stage Probabilistic Software Project Schedule Estimation Kwon, Hammell II
Certifications2023ViewAn Exploration of the Benefits of Certifications and their Relationship to Salaries in IS/IT Matthews, Cummings, Janicki
Chatbot2024ViewAn Action Research Approach to Building an Enterprise-Specific Chatbot (ESCB) Wood, Stoker
Classification2023ViewIdentification of Stressed Wolf Populations Based on Hormone Levels Using Support Vector Machines (SVM) Stewart, Davis
client-server systems2013ViewCreating an Audio Conferencing Application Sun, Vetter, Reinicke
Cloud2022ViewA Scalable Amazon Review Collection System Woodall, Kline, Vetter, Modaresnezhad
Cloud computing2023ViewA Predictive Unmanned Aerial Vehicle Maintenance Method: Using Low-Code and Cloud-Based Data Visualization Kim, Chung, Ju, Maeng
Cloud computing2022ViewA Comparison of Internationalization and Localization Solutions for Web and Mobile Applications Wang, Chung, Yoon
Cloud computing2018ViewCloud Computing: Implications for Information Systems Development Service Providers and Practitioners Mew, Money
Cloud computing2018ViewExploratory Study of Organizational Adoption of Cloud based Big Data Analytics Ghosh
Cloud computing2017ViewThe Effects of Perceived Functionality and Usability on Privacy and Security Concerns about Adopting Cloud Applications Nakayama, Chen, Taylor
Cloud computing2015ViewA Cloud Computing Methodology Study of Platform-as-a-Service (PaaS) in the Financial Industry Lawler, Howell-Barber, Joseph
Cloud computing2014ViewA Feasibility Study of Platform-as-a-Service Using Cloud Computing for a Global Service Organization Gai, Steenkamp
Cloud computing2014ViewA Study of Cloud Computing Infrastructure-as-a-Service (IaaS) in Financial Firms Lawler, Howell-Barber, Joseph, Narula
Cloud computing2013ViewA Study of Cloud Computing Software-as-a-Service (SaaS) in Financial Firms Lawler, Howell-Barber, Desai, Joseph
Cloud computing2013ViewLet’s Look at the Cloud from a Risk Management Perspective Vignos, Kim, Metzer
Cloud computing2012ViewUsing the cloud: Keeping Enterprise Data Private Cronin, Pauli, Ham
Cloud computing2011ViewThe Potential Reality of Service-Oriented Architecture (SOA) in a Cloud Computing Strategy Lawler
cloud deployment methods2014ViewA Study of Cloud Computing Infrastructure-as-a-Service (IaaS) in Financial Firms Lawler, Howell-Barber, Joseph, Narula
Cloud, Apps2015ViewIdentifying User Behavior from Residual Data in Cloud-based Synchronized Apps Grispos, Glisson, Pardue, Dickson
Cloud-Based2023ViewImpact of Emergent Technologies on US Workforce: Exploratory Analysis Toskin
Cloud-Based Predictive UAV Maintenance Method2023ViewA Predictive Unmanned Aerial Vehicle Maintenance Method: Using Low-Code and Cloud-Based Data Visualization Kim, Chung, Ju, Maeng
Cluster analysis2024ViewSocial Media Users Only Have Two Clusters: A United States Analysis Peslak, Kovalchick, Menon
CMMC2022ViewCybersecurity Maturity Model Certification Initial Impact on the Defense Industrial Base Strohmier, Stoker, Vanajakumari, Clark, Cummings, Modaresnezhad
CNN image classifier2023ViewOptimizing a Convolutional Neural Network Model in Amazon SageMaker for an Autism Detection Tool, EZ Autism Screener Ata, Chung, Maeng
Co-Creation2012ViewCo-Creating Value in Systems Development: A Shift towards Service-Dominant Logic Babb, Keith
code quality2020ViewAn Empirical Study of Post-Production Software Code Quality When Employing the Agile Rapid Delivery Methodology Poe, Seeman
Cognitive load2023ViewMeasuring Learners’ Cognitive Load When Engaged with an Algorithm Visualization Tool Fathi, Teresco, Regan
Collaboration2010ViewAn Exploratory Study of Relationships between Workforce Characteristics Totterdale
colleges/universities2022ViewAnalysis of Security Features and Vulnerabilities in Public/Open Wi-Fi James
Commercial Drones2019ViewSecurity, Privacy, and Legislation Issues related to Commercial Drone Deliveries Vannoy, Medlin
commercial software2008ViewThe Importance of Business Process Alignment for IT Project Management of Commercial Software with Case Studies Kraft
Commitment2018ViewAn Exploratory Analysis of Gender Differences in IT Project Commitment, Continuation, and Escalation Korzaan, Harris, Brooks
Communication2024ViewMobile Technology Has Changed Our Culture Paullet, Pinchot
Communication2012ViewTalk to Text: Changing Communication Patterns Pinchot, Douglas, Paullet, Rota
Communication2011ViewHow Mobile Technology is Changing Our Culture Pinchot, Paullet, Rota
Communication System2009ViewResearch Design for a Natural Disaster Management Communication System: Local Indiana Government Agency Model Nicolai, Puntillo, Bilow
Communication Technology2010ViewA Study of the Perceptions of Students on Privacy and Security on Social Networking Sites (SNS) on the Internet Lawler, Molluzzo
Community Health2020ViewDeveloping a GIS Dashboard Tool to Inform Non-Profit Hospitals of Community Health Needs at the Neighborhood Level Copello, Smith, Mease, Umapathy, Richard, Knight, Albertie, Hamadi, Spaulding, Apatu
community informatics2012ViewSocial Networking Systems and Campus Life Sgambato, Petkov, Wolf
Community Type2016ViewAn Expanded Analysis of Internet Dependencies by Demographic Variables Peslak
company size2012ViewDoes Size Matter in IT? An exploratory analysis of critical issues facing organizations based on company size Peslak
Comparison case study2014ViewMicrosoft vs Apple: Which is Great by Choice? Sena, Olsen
Compensation 2023ViewThe Effect of Mental Illness on Compensation for IT Developers Peslak, Ceccucci, Jones, Leonard
Competition Theory2017ViewThe Effects of Discount Pricing Strategy on Sales of Software-as-a-Service (SaaS): Online Video Game Market Context Choi, Medlin, Hunsinger
competitive advantage2013ViewBuilding a Competitive Edge through Social Media Aimiuwu
compression2019ViewThe use of Snap Length in Lossy Network Traffic Compression for Network Intrusion Detection Applications Smith, Hammell II
Computer science2008ViewComputing Professional Association Membership: An Exploration of Membership Needs and Motivations Ritzhaupt, Umapathy, Jamba
Computer security2012ViewThe New Tech Effect: Analyzing Juror Credibility Davis, Paullet, Kraeer, Grant
Computing professionals2010ViewFactors that Persuade and Deter Membership in Professional Computing Associations Umapathy, Jamba, Ritzhaupt
concept based retrieval2012ViewStudy of User Behavior in Image Retrieval and Implications for Content Versus Concept Based Access Schultz
Conceptual model2016ViewDriving Inside Sales Performance with Lead Management Systems: A Conceptual Model Ohiomah, Benyoucef, Andreev
conceptual solution2008ViewThe Importance of Business Process Alignment for IT Project Management of Commercial Software with Case Studies Kraft
Conceptualization2020ViewConceptualization of Blockchain-based Applications: Technical Background and Social Perspective Xiong, Tang, Medlin
constant comparative method2010ViewFactors that Persuade and Deter Membership in Professional Computing Associations Umapathy, Jamba, Ritzhaupt
Contact Tracing2021ViewExploring Sentiment Towards Contact Tracing Crable, Sena
Content analysis2021ViewInternet of Things (IoT): An Analysis of the Research Jourdan, Corley, Ryan, Anderson
Content analysis2017ViewSentiment Analysis and Opinion Mining: Current State of the Art and Review of Google and Yahoo Search Engines’ Privacy Policies Peslak
content based retrieval2012ViewStudy of User Behavior in Image Retrieval and Implications for Content Versus Concept Based Access Schultz
Contractual Governance2016ViewGovernance of Outsourcing: Building a Better Relationship Babin, Saunderson
Contractual Governance2017ViewBuilding Client Vendor Alignment Capability in Strategic Information Systems Outsourcing Ghosh
contribution2021ViewOpen Source Software: A Detailed Analysis of Contributions and Quality Peslak, Hunsinger
Controls2020ViewExamining Organizational Security Governance (OSG) Objectives: How is strategic planning for Security is undertaken at ABC Corporation? Mishra
corporate social responsibility2014ViewPerformance and Corporate Social Responsibility in the Information Technology Industry Cowan, Parzinger, Welch, Welch
corpus linguistics2014ViewDecision-Making via Visual Analysis using the Natural Language Toolkit and R Jafar, Babb, Dana
COTS2008ViewThe Importance of Business Process Alignment for IT Project Management of Commercial Software with Case Studies Kraft
country development2013ViewGlobal Diffusion of Virtual Social Networks: A Pyramid Model of Cultural, Developmental and Regulatory Foundations Wang, Sun
Covid2022ViewThe COVID-19 Pandemic’s Impact on Information Technology Employment, Salaries, and Career Opportunities Sendall, Peslak, Ceccucci, Hunsinger
COVID-192024ViewInsights for the next viral outbreak: An information systems applied research based on lessons from COVID-19 D'Souza, Mishra
COVID-192023ViewShort Stay Healthcare Quality in Skilled Nursing Facilities: Occupancy, Nurse Staff Mix, and COVID-19 Winston, Xiong, Medlin, Pelaez
COVID-192022ViewThe COVID-19 Pandemic’s Impact on Information Technology Employment, Salaries, and Career Opportunities Sendall, Peslak, Ceccucci, Hunsinger
COVID-192021ViewExploring Sentiment Towards Contact Tracing Crable, Sena
creative writing2020ViewLiterary Analysis Tool: Text Analytics for Creative Writers Grimsman, Kline, Vetter, Guinn
critical issues2012ViewDoes Size Matter in IT? An exploratory analysis of critical issues facing organizations based on company size Peslak
Critical success factors2017ViewIdentifying the Critical Success Factors for Information Systems to Manage Sponsored Research Activities at Institutions of Higher Education Lehman, Ruzich
Cross-Site Scripting (XSS)2023ViewA Comparative Analysis of Web Application Vulnerability Tools Garcia, Abraham, Kepic, Cankaya
Crowdsourcing2017ViewCrowdsourcing Surveys: Alternative Approaches to Survey Collection Cummings, Sibona
Cryptocurrency2020ViewConceptualization of Blockchain-based Applications: Technical Background and Social Perspective Xiong, Tang, Medlin
CSR2008ViewAssessing the Role of CSR in Outsourcing Decisions Babin
Culture2024ViewMobile Technology Has Changed Our Culture Paullet, Pinchot
Culture2011ViewHow Mobile Technology is Changing Our Culture Pinchot, Paullet, Rota
Culture2009ViewCross-Cultural View of Handheld Wireless Media Usage Lind, Anyansi-Archibong, Anyansi
Curriculum design2010ViewA Study of the Perceptions of Students on Privacy and Security on Social Networking Sites (SNS) on the Internet Lawler, Molluzzo
customer interaction2013ViewBuilding a Competitive Edge through Social Media Aimiuwu
Customer satisfaction2013ViewBuilding a Competitive Edge through Social Media Aimiuwu
Customer satisfaction2012ViewMost Popular Package Design Miah
Customization2015ViewERP Customization vs. Business Process Reengineering: Technical and Functional Perceptions Fryling
Cyber2022ViewSecurity Control Techniques: Cybersecurity & Medical Wearable Devices Sambasivam, Deal
cyber abuse2017ViewCauses of cyberbullying in multi-player online gaming environments: Gamer perceptions Cotler, Fryling, Rivituso
cyber abuse2015ViewCyberbullying or normal game play? Impact of age, gender, and experience on cyberbullying in multi-player online gaming environments: Perceptions from one gaming forum Fryling, Cotler, Rivituso, Mathews, Pratico
Cyber Security2021ViewDocumenting the Process of Hijacking a Raspberry Pi User Login Credentials via Remote Code Execution Patel, Wimmer, Powell
Cyber Security2019ViewAdversarial Machine Learning for Cyber Security De Lucia, Cotton
Cyber Security2015ViewCyber Security Best Practices: What to do? Kleinberg, Reinicke, Cummings
Cyber-Bullying2010ViewA Study of the Perceptions of Students on Privacy and Security on Social Networking Sites (SNS) on the Internet Lawler, Molluzzo
Cyber-Stalking2010ViewA Study of the Perceptions of Students on Privacy and Security on Social Networking Sites (SNS) on the Internet Lawler, Molluzzo
cyberbullying2017ViewCauses of cyberbullying in multi-player online gaming environments: Gamer perceptions Cotler, Fryling, Rivituso
cyberbullying2015ViewCyberbullying or normal game play? Impact of age, gender, and experience on cyberbullying in multi-player online gaming environments: Perceptions from one gaming forum Fryling, Cotler, Rivituso, Mathews, Pratico
Cybersecurity2021ViewTowards a Leader-Driven Supply Chain Cybersecurity Framework Vanajakumari, Mittal, Stoker, Clark, Miller
Cybersecurity Maturity Model Certification2022ViewCybersecurity Maturity Model Certification Initial Impact on the Defense Industrial Base Strohmier, Stoker, Vanajakumari, Clark, Cummings, Modaresnezhad
cybersecurity risks2023ViewQR Code Hacking – Detecting Multiple Vulnerabilities in Android Scanning Software Homan, Breese