Search by Authors

Search returned 32 items for : S

Year PubArticleTitleAuthors
2009ViewA Study of the Information Technology Trade between the United States and the Dominican Republic-Central America Free Trade Agreement Nations Pena, Aguirre, Saenz, Koong, Liu
2015ViewMeasuring Algorithm Performance With Java: Patterns of Variation McMaster, Sambasivam, Wolthuis
2016ViewGovernance of Outsourcing: Building a Better Relationship Babin, Saunderson
2012ViewStudy of User Behavior in Image Retrieval and Implications for Content Versus Concept Based Access Schultz
2011ViewDevelopment of an Evaluation Model for XBRL-enabled Tools Intended for Investors Clements, Schwieger, Surendran
2014ViewInformation Security in Nonprofits: A First Glance at the State of Security in Two Illinois Regions Imboden, Phillips, Seib, Fiorentino
2016ViewExploring Relationships between the Strategic Importance of IT and the Effectiveness of IT Security and Mobile Device Management Stanko, Sena, Sena
2016ViewExploring Relationships between the Strategic Importance of IT and the Effectiveness of IT Security and Mobile Device Management Stanko, Sena, Sena
2014ViewMicrosoft vs Apple: Which is Great by Choice? Sena, Olsen
2011ViewMake or Buy: A comparative assessment of organizations that develop software internally versus those that purchase software Sena, Sena
2011ViewMake or Buy: A comparative assessment of organizations that develop software internally versus those that purchase software Sena, Sena
2012ViewAn Empirical Study of Social Networking Behavior Using Theory of Reasoned Action Peslak, Ceccucci, Sendall
2010ViewAn Empirical Study of Instant Messaging Behavior Using Diffusion of Innovation Theory Peslak, Ceccucci, Sendall
2010ViewAn Empirical Study of Text Messaging Behavioral Intention and Usage Peslak, Ceccucci, Sendall
2012ViewSocial Networking Systems and Campus Life Sgambato, Petkov, Wolf
2017ViewFinding the “Radicalness” in Radical Innovation Adoption Sharma, Thomas, Konsynski
2014ViewLooking Backwards to Look Ahead: Lessons from Barcode Adoption for RFID Adoption and Implementation Sharma, Thomas
2014ViewRisk Assessment & Management in Merchant Capture Systems: A Threat Analysis Perspective Streff, Shrestha, Delzer
2017ViewCrowdsourcing Surveys: Alternative Approaches to Survey Collection Cummings, Sibona
2009ViewThe Accessibility of College and University Home Pages DiLallo, Siegfried
2017ViewProposal for Kelly Criterion-Inspired Lossy Network Compression for Network Intrusion Applications Smith, Hammell II
2016ViewLeakage of Geolocation Data by Mobile Ad Networks Snow, Hayes, Dwyer
2016ViewExploring Relationships between the Strategic Importance of IT and the Effectiveness of IT Security and Mobile Device Management Stanko, Sena, Sena
2010ViewCan Management Predict Information Security Threats by Utilizing a Data Warehouse? Kim, Steen
2014ViewA Feasibility Study of Platform-as-a-Service Using Cloud Computing for a Global Service Organization Gai, Steenkamp
2014ViewDeveloping a Semantic Differential Scale for Measuring Users’ Attitudes toward Sensor based Decision Support Technologies for the Environment. Ajani, Stork
2014ViewRisk Assessment & Management in Merchant Capture Systems: A Threat Analysis Perspective Streff, Shrestha, Delzer
2009ViewAn Examination of Information Security in Mobile Banking Architectures Streff, Haar
2014ViewOnline versus In-Store: Price Differentiation for Multi-Channel Retailers Flores, Sun
2013ViewCreating an Audio Conferencing Application Sun, Vetter, Reinicke
2013ViewGlobal Diffusion of Virtual Social Networks: A Pyramid Model of Cultural, Developmental and Regulatory Foundations Wang, Sun
2011ViewDevelopment of an Evaluation Model for XBRL-enabled Tools Intended for Investors Clements, Schwieger, Surendran