Search by Keyword

Search returned 34 items for : A

KeywordYear PubArticleTitleAuthors
Access control.2010ViewThe Results of Implementing a Knowledge Management Initiative to Enhance Network Access Controls Kim, Nelson
accessibility2009ViewThe Accessibility of College and University Home Pages DiLallo, Siegfried
accounting measures2014ViewPerformance and Corporate Social Responsibility in the Information Technology Industry Cowan, Parzinger, Welch, Welch
ad blockers2017ViewMalvertising - A Rising Threat To The Online Ecosystem Dwyer, Kanguri
adoption2017ViewFinding the “Radicalness” in Radical Innovation Adoption Sharma, Thomas, Konsynski
adoption2014ViewLooking Backwards to Look Ahead: Lessons from Barcode Adoption for RFID Adoption and Implementation Sharma, Thomas
adoption2010ViewSystem Development Methodology Usage in Industry: A Review and Analysis Griffin, Brandyberry
Affect2013ViewWhat Influences Students to Use Dropbox? Hunsinger, Corley
Affect2012ViewGoogle Chrome and the Paradigm Shifts in the Browser Market Among Users Corley, Hunsinger
Age2016ViewAn Expanded Analysis of Internet Dependencies by Demographic Variables Peslak
aggression2017ViewCauses of cyberbullying in multi-player online gaming environments: Gamer perceptions Cotler, Fryling, Rivituso
Agile2012ViewCo-Creating Value in Systems Development: A Shift towards Service-Dominant Logic Babb, Keith
agile development methodology2012ViewCMobile: A Mobile Photo Capture Application for Construction Imaging Martin, Vetter, Brown, Janicki
AHP2017ViewA Multi-Criteria Network Assessment Model of IT Offshoring Risks from Service Provider's Perspective Petkov, Petkova
AHP2010ViewOn Design Science, MCDM, and Outsourcing Decision Making Petkov, Petkova
AITP2010ViewFactors that Persuade and Deter Membership in Professional Computing Associations Umapathy, Jamba, Ritzhaupt
AITP2008ViewComputing Professional Association Membership: An Exploration of Membership Needs and Motivations Ritzhaupt, Umapathy, Jamba
AJAX2010ViewCreating the Pilot AJAX Enabled Query Tool Ford, Dollinger
AJAX2010ViewSuperfund Site Analysis Using Web 2.0 Technologies Anderson, Jafar, Rogers
algorithm2015ViewMeasuring Algorithm Performance With Java: Patterns of Variation McMaster, Sambasivam, Wolthuis
algorithm2012ViewMaximizing Visibility in Skylines Miah
algorithm2012ViewMost Popular Package Design Miah
Alignment2017ViewBuilding Client Vendor Alignment Capability in Strategic Information Systems Outsourcing Ghosh
Amazon Mechanical Turk2017ViewCrowdsourcing Surveys: Alternative Approaches to Survey Collection Cummings, Sibona
Android Development2013ViewCreating an Audio Conferencing Application Sun, Vetter, Reinicke
anomaly detection2017ViewProposal for Kelly Criterion-Inspired Lossy Network Compression for Network Intrusion Applications Smith, Hammell II
ANP2017ViewA Multi-Criteria Network Assessment Model of IT Offshoring Risks from Service Provider's Perspective Petkov, Petkova
APACHE2008ViewComparison of Dynamic Web Content Processing Language Performance Under a LAMP Architecture Jafar, Anderson, Abdullat
Apple vs Microsoft2014ViewMicrosoft vs Apple: Which is Great by Choice? Sena, Olsen
Apps2017ViewDownloading Mobile Applications - Are Students Protecting Themselves Chawdhry, Paullet, Douglas, Compimizzi
Artificial Neural Networks2014ViewPredicting the Terminal Ballistics of Kinetic Energy Projectiles Using Artificial Neural Networks Auten, Hammell II
attitude2010ViewSpyware: What Influences College Students to Use Anti-Spyware Tools? Ward, Hunsinger
attitudes2014ViewDeveloping a Semantic Differential Scale for Measuring Users’ Attitudes toward Sensor based Decision Support Technologies for the Environment. Ajani, Stork
Automatic Identification2014ViewLooking Backwards to Look Ahead: Lessons from Barcode Adoption for RFID Adoption and Implementation Sharma, Thomas