Search by Keyword

Search returned 71 items for : M

KeywordYear PubArticleTitleAuthors
M-Commerce2009ViewAn Examination of Information Security in Mobile Banking Architectures Streff, Haar
Machine Learning2023ViewIdentification of Stressed Wolf Populations Based on Hormone Levels Using Support Vector Machines (SVM) Stewart, Davis
Machine Learning2022ViewClassification of Hunting-Stressed Wolf Populations Using Machine Learning Stewart, Davis, Igoche
Machine Learning2020ViewTrash to Treasure: Predicting Landfill Gas Flow to Optimize Electricity Generation Hassler, Emery, Hoyle, Cazier
Machine Learning2019ViewA Machine Learning Approach to Optimizing Diabetes Healthcare Management Using SAS Analytic Suite Ajani, Habek
Machine Learning2019ViewAdversarial Machine Learning for Cyber Security De Lucia, Cotton
make vs. buy2011ViewMake or Buy: A comparative assessment of organizations that develop software internally versus those that purchase software Sena, Sena
malvertising2017ViewMalvertising - A Rising Threat To The Online Ecosystem Dwyer, Kanguri
Malware2018ViewProtecting IoT from Mirai botnets; IoT device hardening Frank, Nance, Jarocki, Pauli
Malware detection2017ViewMalvertising - A Rising Threat To The Online Ecosystem Dwyer, Kanguri
Management2010ViewAn Exploratory Study of Relationships between Workforce Characteristics Totterdale
Management Best Practices2014ViewMicrosoft vs Apple: Which is Great by Choice? Sena, Olsen
mastery goal orientation2023ViewHow Firms Can Impact IT Project Continuation Intentions: A Human Capital Perspective Totty, Zaza, Greer, Korzaan
maximize visibility2012ViewMaximizing Visibility in Skylines Miah
maximize visibility2012ViewMost Popular Package Design Miah
MCDM2010ViewOn Design Science, MCDM, and Outsourcing Decision Making Petkov, Petkova
medical records2017ViewGateway to Clinical Intelligence and Operational Excellence through a Patient Healthcare Smart Card System Hussein, Ariyachandra, Frolick
Medical Wearable Devices2022ViewSecurity Control Techniques: Cybersecurity & Medical Wearable Devices Sambasivam, Deal
membership2010ViewFactors that Persuade and Deter Membership in Professional Computing Associations Umapathy, Jamba, Ritzhaupt
membership2008ViewComputing Professional Association Membership: An Exploration of Membership Needs and Motivations Ritzhaupt, Umapathy, Jamba
Mental Illness2023ViewThe Effect of Mental Illness on Compensation for IT Developers Peslak, Ceccucci, Jones, Leonard
Merchant Capture System (MCS)2014ViewRisk Assessment & Management in Merchant Capture Systems: A Threat Analysis Perspective Streff, Shrestha, Delzer
Methane Prediction2020ViewTrash to Treasure: Predicting Landfill Gas Flow to Optimize Electricity Generation Hassler, Emery, Hoyle, Cazier
Method Engineering2011ViewA Methodology Tailoring Model for Practitioner Based Information Systems Development Informed by the Principles of General Systems Theory Burns, Deek
Methodology Tailoring2011ViewA Methodology Tailoring Model for Practitioner Based Information Systems Development Informed by the Principles of General Systems Theory Burns, Deek
minimalism2018ViewMinimalism in Data Visualization: Perceptions of Beauty, Clarity, Effectiveness, and Simplicity Hill, Wray, Sibona
MIoT2022ViewSecurity Control Techniques: Cybersecurity & Medical Wearable Devices Sambasivam, Deal
Mirai2018ViewProtecting IoT from Mirai botnets; IoT device hardening Frank, Nance, Jarocki, Pauli
MIS services2018ViewCloud Computing: Implications for Information Systems Development Service Providers and Practitioners Mew, Money
MMORPG2017ViewCauses of cyberbullying in multi-player online gaming environments: Gamer perceptions Cotler, Fryling, Rivituso
MMORPG2015ViewCyberbullying or normal game play? Impact of age, gender, and experience on cyberbullying in multi-player online gaming environments: Perceptions from one gaming forum Fryling, Cotler, Rivituso, Mathews, Pratico
Mobile Advertisements2016ViewLeakage of Geolocation Data by Mobile Ad Networks Snow, Hayes, Dwyer
Mobile Application2022ViewA Comparison of Internationalization and Localization Solutions for Web and Mobile Applications Wang, Chung, Yoon
mobile application development2012ViewCMobile: A Mobile Photo Capture Application for Construction Imaging Martin, Vetter, Brown, Janicki
Mobile applications2018ViewWhat’s “Appening” to our Privacy? A Students Perspective on Downloading Mobile Apps Paullet, Chawdhry, Douglas, Compomizzi
Mobile applications2017ViewDownloading Mobile Applications - Are Students Protecting Themselves Chawdhry, Paullet, Douglas, Compomizzi
mobile apps2018ViewA Dynamic and Static Analysis of the Uber Mobile Application from a Privacy Perspective Hayes, Snow, Altuwayjiri
mobile apps2015ViewUse of Preventative Measures to Protect Data Privacy on Mobile Devices Pinchot, Paullet
Mobile Banking2009ViewAn Examination of Information Security in Mobile Banking Architectures Streff, Haar
Mobile Commerce2009ViewAn Examination of Information Security in Mobile Banking Architectures Streff, Haar
Mobile Communication2012ViewMobile Telephone Usage, Attitude, and Behavior During Group Meetings. Bajko
Mobile computing2012ViewMobile Telephone Usage, Attitude, and Behavior During Group Meetings. Bajko
Mobile Development2013ViewCreating an Audio Conferencing Application Sun, Vetter, Reinicke
mobile device2021ViewA Prototype for Distributed Computing Platform using Smartphones Wagner, Cao
mobile device2018ViewWhat’s “Appening” to our Privacy? A Students Perspective on Downloading Mobile Apps Paullet, Chawdhry, Douglas, Compomizzi
Mobile Devices2023ViewAre Companies Responsible for Internet of Things (IoT) Data Privacy? A Survey of IoT User Perceptions Paullet, Pinchot, Chawdhry
Mobile Devices2017ViewDownloading Mobile Applications - Are Students Protecting Themselves Chawdhry, Paullet, Douglas, Compomizzi
Mobile Devices2016ViewExploring Relationships between the Strategic Importance of IT and the Effectiveness of IT Security and Mobile Device Management Stanko, Sena, Sena
Mobile Devices2015ViewUse of Preventative Measures to Protect Data Privacy on Mobile Devices Pinchot, Paullet
Mobile Distractions2019ViewDriving Distractions and Multi-tasking: An Investigative Study Choi, Xiong, Medlin
mobile forensics2018ViewA Dynamic and Static Analysis of the Uber Mobile Application from a Privacy Perspective Hayes, Snow, Altuwayjiri
Mobile Payment Service2019ViewAligning the Factors of Skill, Technology and Task to Influence the Continued Use of Mobile Payment Users in China Chen, Choi, Xiong, Tang
Mobile Phone2012ViewMobile Telephone Usage, Attitude, and Behavior During Group Meetings. Bajko
Mobile Phones2019ViewDriving Distractions and Multi-tasking: An Investigative Study Choi, Xiong, Medlin
Mobile Privacy2016ViewLeakage of Geolocation Data by Mobile Ad Networks Snow, Hayes, Dwyer
mobile security2018ViewWhat’s “Appening” to our Privacy? A Students Perspective on Downloading Mobile Apps Paullet, Chawdhry, Douglas, Compomizzi
mobile security2017ViewDownloading Mobile Applications - Are Students Protecting Themselves Chawdhry, Paullet, Douglas, Compomizzi
mobile security2015ViewUse of Preventative Measures to Protect Data Privacy on Mobile Devices Pinchot, Paullet
mobile security2015ViewUse of Preventative Measures to Protect Data Privacy on Mobile Devices Pinchot, Paullet
Mobile technology2012ViewTalk to Text: Changing Communication Patterns Pinchot, Douglas, Paullet, Rota
Mobile technology2011ViewHow Mobile Technology is Changing Our Culture Pinchot, Paullet, Rota
Mobile telephony2012ViewMobile Telephone Usage, Attitude, and Behavior During Group Meetings. Bajko
mobile web development2012ViewBuilding a Real-Time Bus Tracking Data Display System Dudley, Vetter, Brown, Janicki
Monitoring and sensing devices2010ViewIncorporation of Information Technology into Assisted Health Care: An Empirical Study Merrill, White
Motivation2013ViewOpen Source Software Volunteerism vs. Carpenter
Motivation2008ViewComputing Professional Association Membership: An Exploration of Membership Needs and Motivations Ritzhaupt, Umapathy, Jamba
Multi-channel retailers2014ViewOnline versus In-Store: Price Differentiation for Multi-Channel Retailers Flores, Sun
multi-payer system2017ViewGateway to Clinical Intelligence and Operational Excellence through a Patient Healthcare Smart Card System Hussein, Ariyachandra, Frolick
multiple regression analysis2010ViewAn Empirical Study of Instant Messaging Behavior Using Diffusion of Innovation Theory Peslak, Ceccucci, Sendall
Multitasking2019ViewDriving Distractions and Multi-tasking: An Investigative Study Choi, Xiong, Medlin
MySQL2008ViewComparison of Dynamic Web Content Processing Language Performance Under a LAMP Architecture Jafar, Anderson, Abdullat