Search by Authors

Search returned 33 items for : P

Year PubArticleTitleAuthors
2015ViewIdentifying User Behavior from Residual Data in Cloud-based Synchronized Apps Grispos, Glisson, Pardue, Dickson
2011ViewA Process for Assessing Voting System Risk Using Threat Trees Yasinisac, Pardue
2014ViewPerformance and Corporate Social Responsibility in the Information Technology Industry Cowan, Parzinger, Welch, Welch
2012ViewUsing the cloud: Keeping Enterprise Data Private Cronin, Pauli, Ham
2017ViewDownloading Mobile Applications - Are Students Protecting Themselves Chawdhry, Paullet, Douglas, Compimizzi
2015ViewUse of Preventative Measures to Protect Data Privacy on Mobile Devices Pinchot, Paullet
2012ViewTalk to Text: Changing Communication Patterns Pinchot, Douglas, Paullet, Rota
2012ViewThe New Tech Effect: Analyzing Juror Credibility Davis, Paullet, Kraeer, Grant
2011ViewHow Mobile Technology is Changing Our Culture Pinchot, Paullet, Rota
2009ViewA Study of the Information Technology Trade between the United States and the Dominican Republic-Central America Free Trade Agreement Nations Pena, Aguirre, Saenz, Koong, Liu
2015ViewOn Adapting a War-Gaming Discrete Event Simulator with Big Data and Geospatial Modeling Toward a Predictive Model Ecosystem for Interpersonal Violence Mhlanga, Perry, Kirchner
2017ViewSentiment Analysis and Opinion Mining: Current State of the Art and Review of Google and Yahoo Search Engines’ Privacy Policies Peslak
2016ViewAn Expanded Analysis of Internet Dependencies by Demographic Variables Peslak
2014ViewA Study of Information Technology Operating and Capital Expenditures and Their Effect on Positive Firm Outcomes Peslak
2012ViewAn Empirical Study of Social Networking Behavior Using Theory of Reasoned Action Peslak, Ceccucci, Sendall
2012ViewDoes Size Matter in IT? An exploratory analysis of critical issues facing organizations based on company size Peslak
2011ViewA Study of Information Technology Integration Peslak
2010ViewAn Empirical Study of Instant Messaging Behavior Using Diffusion of Innovation Theory Peslak, Ceccucci, Sendall
2010ViewAn Empirical Study of Text Messaging Behavioral Intention and Usage Peslak, Ceccucci, Sendall
2017ViewA Multi-Criteria Network Assessment Model of IT Offshoring Risks from Service Provider's Perspective Petkov, Petkova
2012ViewSocial Networking Systems and Campus Life Sgambato, Petkov, Wolf
2010ViewOn Design Science, MCDM, and Outsourcing Decision Making Petkov, Petkova
2017ViewA Multi-Criteria Network Assessment Model of IT Offshoring Risks from Service Provider's Perspective Petkov, Petkova
2010ViewOn Design Science, MCDM, and Outsourcing Decision Making Petkov, Petkova
2014ViewInformation Security in Nonprofits: A First Glance at the State of Security in Two Illinois Regions Imboden, Phillips, Seib, Fiorentino
2012ViewThe Effects of Interruptions on Remembering Task Information Lenox, Pilarski, Leathers
2015ViewUse of Preventative Measures to Protect Data Privacy on Mobile Devices Pinchot, Paullet
2012ViewTalk to Text: Changing Communication Patterns Pinchot, Douglas, Paullet, Rota
2011ViewHow Mobile Technology is Changing Our Culture Pinchot, Paullet, Rota
2016ViewA Comparison of Open Source Tools for Data Science Wimmer, Powell
2015ViewCyberbullying or normal game play? Impact of age, gender, and experience on cyberbullying in multi-player online gaming environments: Perceptions from one gaming forum Fryling, Cotler, Rivituso, Mathews, Pratico
2013ViewComparing Performance of Web Service Interaction Styles: SOAP vs. REST Kumar, Ahuja, Umapathy, Prodanoff
2009ViewResearch Design for a Natural Disaster Management Communication System: Local Indiana Government Agency Model Nicolai, Puntillo, Bilow