Search by Keyword

Search returned 38 items for : E

KeywordYear PubArticleTitleAuthors
E-commerce 2011ViewA Model for Understanding Social Commerce Afrasiabi Rad, Benyoucef
e-loyalty2009ViewAnalysis of the Factors that Influence Online Purchasing Amoroso, Hunsinger
e-mentoring2010ViewWomen's Technology Acceptance of Mentoring on the Internet Gibson, GIBSON
e-satisfaction2009ViewAnalysis of the Factors that Influence Online Purchasing Amoroso, Hunsinger
ease of use2009ViewCross-Cultural View of Handheld Wireless Media Usage Lind, Anyansi-Archibong
Education2016ViewAn Expanded Analysis of Internet Dependencies by Demographic Variables Peslak
Educational Model2010ViewContingency Planning: Disaster Recovery Strategies for Successful Educational Continuity Omar, Udeh, Mantha
Educational software2010ViewCreating the Pilot AJAX Enabled Query Tool Ford, Dollinger
Edward Snowden2016ViewLeakage of Geolocation Data by Mobile Ad Networks Snow, Hayes, Dwyer
Effort estimation2013ViewEarly Stage Probabilistic Software Project Schedule Estimation Kwon, Hammell II
EHR2013ViewAnalysis of Electronic Health Mitchell, Clark
electronic bullying2017ViewCauses of cyberbullying in multi-player online gaming environments: Gamer perceptions Cotler, Fryling, Rivituso
electronic bullying2015ViewCyberbullying or normal game play? Impact of age, gender, and experience on cyberbullying in multi-player online gaming environments: Perceptions from one gaming forum Fryling, Cotler, Rivituso, Mathews, Pratico
Electronic Business2009ViewAn Examination of Information Security in Mobile Banking Architectures Streff, Haar
electronic health rec2013ViewInformation Security Blueprint Clark, Benli, Mitchell, Vetter
Electronic health records2013ViewAnalysis of Electronic Health Mitchell, Clark
Electronic health records2010ViewIncorporation of Information Technology into Assisted Health Care: An Empirical Study Merrill, White
electronic voting systems2011ViewA Process for Assessing Voting System Risk Using Threat Trees Yasinisac, Pardue
email security behavior2018ViewStudent Intentions and Behaviors Related to Email Security: An Application of the Health Belief Model Schymik, Du
Emerging technologies2014ViewDeveloping a Semantic Differential Scale for Measuring Users’ Attitudes toward Sensor based Decision Support Technologies for the Environment. Ajani, Stork
Emerging Technology2014ViewLooking Backwards to Look Ahead: Lessons from Barcode Adoption for RFID Adoption and Implementation Sharma, Thomas
empirical study2011ViewPassword Security Risk versus Effort: An Exploratory Study on User-Perceived Risk and the Intention to Use Online Applications Gebauer, Kline, He
employee relations2014ViewPerformance and Corporate Social Responsibility in the Information Technology Industry Cowan, Parzinger, Welch, Welch
Employment2009ViewThe Impact of Technology Diffusion on Employment, Compensation, and Productivity: Evidence from the Telecommunications Sector Clark, Moussawi
Encryption2012ViewUsing the cloud: Keeping Enterprise Data Private Cronin, Pauli, Ham
End User Computer Satisfaction2018ViewText Messaging Today: A Longitudinal Study of Variables Influencing Text Messaging from 2009 to 2016 Peslak, Hunsinger, Kruck
Enterprise resource planning2015ViewERP Customization vs. Business Process Reengineering: Technical and Functional Perceptions Fryling
Enterprise resource planning2013ViewRocky Relationships: Enterprise Resource Planning and Supply Chain Management Crumbly, Fryling
entity resolution2010ViewSuperfund Site Analysis Using Web 2.0 Technologies Anderson, Jafar, Rogers
Entrepreneurship2010ViewTowards an Abstract Model for Academia and Information Technology Sector Collaborative Partnerships: Responding to the “West Texas Coalition for Innovation and Commercialization” Initiative Mhlanga, Vardiman, Reames
Environmentalism2008ViewAssessing the Role of CSR in Outsourcing Decisions Babin
ERP2015ViewERP Customization vs. Business Process Reengineering: Technical and Functional Perceptions Fryling
ERP2013ViewRocky Relationships: Enterprise Resource Planning and Supply Chain Management Crumbly, Fryling
Escalation2018ViewAn Exploratory Analysis of Gender Differences in IT Project Commitment, Continuation, and Escalation Korzaan, Harris, Brooks
estimating arrival times2012ViewBuilding a Real-Time Bus Tracking Data Display System Dudley, Vetter, Brown, Janicki
Evaluation rubric2011ViewDevelopment of an Evaluation Model for XBRL-enabled Tools Intended for Investors Clements, Schwieger, Surendran
experience knowledge base (EKB)2009ViewDetermining Information Technology Project Status using Recognition-primed Decision-making enabled Collaborative Agents for Simulating Teamwork (R-CAST) Barnes, Hammell II
Export2009ViewA Study of the Information Technology Trade between the United States and the Dominican Republic-Central America Free Trade Agreement Nations Pena, Aguirre, Saenz, Koong, Liu