Search by Authors

Search returned 19 items for : D

Year PubArticleTitleAuthors
2014ViewDecision-Making via Visual Analysis using the Natural Language Toolkit and R Jafar, Babb, Dana
2012ViewThe New Tech Effect: Analyzing Juror Credibility Davis, Paullet, Kraeer, Grant
2011ViewA Methodology Tailoring Model for Practitioner Based Information Systems Development Informed by the Principles of General Systems Theory Burns, Deek
2012ViewOutsourcing Best Practices Mikita, DeHondt
2010ViewThe Impact of Transition Costs on Offshore Systems Development DeHondt, Leidig
2014ViewRisk Assessment & Management in Merchant Capture Systems: A Threat Analysis Perspective Streff, Shrestha, Delzer
2013ViewA Study of Cloud Computing Software-as-a-Service (SaaS) in Financial Firms Lawler, Howell-Barber, Desai, Joseph
2015ViewIdentifying User Behavior from Residual Data in Cloud-based Synchronized Apps Grispos, Glisson, Pardue, Dickson
2009ViewThe Accessibility of College and University Home Pages DiLallo, Siegfried
2010ViewCreating the Pilot AJAX Enabled Query Tool Ford, Dollinger
2018ViewWhat’s “Appening” to our Privacy? A Students Perspective on Downloading Mobile Apps Paullet, Chawdhry, Douglas, Compomizzi
2017ViewDownloading Mobile Applications - Are Students Protecting Themselves Chawdhry, Paullet, Douglas, Compomizzi
2012ViewTalk to Text: Changing Communication Patterns Pinchot, Douglas, Paullet, Rota
2018ViewStudent Intentions and Behaviors Related to Email Security: An Application of the Health Belief Model Schymik, Du
2015ViewBuilding a Better Stockbroker: Managing Big (Financial) Data by Constructing an Ontology-Based Framework Westrick, Du, Wolffe
2012ViewBuilding a Real-Time Bus Tracking Data Display System Dudley, Vetter, Brown, Janicki
2018ViewInformation Security and Privacy Legislation: Current State and Future Direction Dunlap, Cummings, Janicki
2017ViewMalvertising - A Rising Threat To The Online Ecosystem Dwyer, Kanguri
2016ViewLeakage of Geolocation Data by Mobile Ad Networks Snow, Hayes, Dwyer