Search by Keyword

Search returned 52 items for : I

KeywordYear PubArticleTitleAuthors
ICT Labour 2008ViewAssessing the Role of CSR in Outsourcing Decisions Babin
image retrieval2012ViewStudy of User Behavior in Image Retrieval and Implications for Content Versus Concept Based Access Schultz
Import2009ViewA Study of the Information Technology Trade between the United States and the Dominican Republic-Central America Free Trade Agreement Nations Pena, Aguirre, Saenz, Koong, Liu
impression formation2013ViewThe Impact of Intra-Organizational Social Cummings
Influence2014ViewSimilarity and Ties in Social Networks Afrasiabi Rad, Benyoucef
Information Assurance2009ViewAn Examination of Information Security in Mobile Banking Architectures Streff, Haar
Information Propagation2012ViewMeasuring Propagation in Online Social Networks: The case of YouTube Afrasiabi Rad, Benyoucef
Information Security2014ViewInformation Security in Nonprofits: A First Glance at the State of Security in Two Illinois Regions Imboden, Phillips, Seib, Fiorentino
Information Security2013ViewInformation Security Blueprint Clark, Benli, Mitchell, Vetter
Information Security2012ViewThe New Tech Effect: Analyzing Juror Credibility Davis, Paullet, Kraeer, Grant
Information Security2010ViewCan Management Predict Information Security Threats by Utilizing a Data Warehouse? Kim, Steen
Information System Development Methodologies2011ViewA Methodology Tailoring Model for Practitioner Based Information Systems Development Informed by the Principles of General Systems Theory Burns, Deek
Information Systems2017ViewIdentifying the Critical Success Factors for Information Systems to Manage Sponsored Research Activities at Institutions of Higher Education Lehman, Ruzich
Information Systems2015ViewA Cloud Computing Methodology Study of Platform-as-a-Service (PaaS) in the Financial Industry Lawler, Howell-Barber, Joseph
Information Systems2014ViewA Study of Cloud Computing Infrastructure-as-a-Service (IaaS) in Financial Firms Lawler, Howell-Barber, Joseph, Narula
Information Systems2013ViewA Study of Cloud Computing Software-as-a-Service (SaaS) in Financial Firms Lawler, Howell-Barber, Desai, Joseph
Information Systems2008ViewComputing Professional Association Membership: An Exploration of Membership Needs and Motivations Ritzhaupt, Umapathy, Jamba
Information Systems Outsourcing2017ViewBuilding Client Vendor Alignment Capability in Strategic Information Systems Outsourcing Ghosh
Information Technology2014ViewA Study of Information Technology Operating and Capital Expenditures and Their Effect on Positive Firm Outcomes Peslak
Information Technology2014ViewInformation Security in Nonprofits: A First Glance at the State of Security in Two Illinois Regions Imboden, Phillips, Seib, Fiorentino
Information Technology2011ViewA Study of Information Technology Integration Peslak
Information Technology2010ViewAn Exploratory Study of Relationships between Workforce Characteristics Totterdale
Information Technology2008ViewComputing Professional Association Membership: An Exploration of Membership Needs and Motivations Ritzhaupt, Umapathy, Jamba
information technology and computing2010ViewTowards an Abstract Model for Academia and Information Technology Sector Collaborative Partnerships: Responding to the “West Texas Coalition for Innovation and Commercialization” Initiative Mhlanga, Vardiman, Reames
information technology issues2012ViewDoes Size Matter in IT? An exploratory analysis of critical issues facing organizations based on company size Peslak
information technology management2012ViewDoes Size Matter in IT? An exploratory analysis of critical issues facing organizations based on company size Peslak
Information Technology outsourcing2012ViewOutsourcing Best Practices Mikita, DeHondt
Information Technology outsourcing2010ViewOn Design Science, MCDM, and Outsourcing Decision Making Petkov, Petkova
information technology strategy2012ViewDoes Size Matter in IT? An exploratory analysis of critical issues facing organizations based on company size Peslak
infrastructure as a service2012ViewUsing the cloud: Keeping Enterprise Data Private Cronin, Pauli, Ham
infrastructure-as-a-service (IaaS)2014ViewA Study of Cloud Computing Infrastructure-as-a-Service (IaaS) in Financial Firms Lawler, Howell-Barber, Joseph, Narula
Inside Sales2016ViewDriving Inside Sales Performance with Lead Management Systems: A Conceptual Model Ohiomah, Benyoucef, Andreev
Instant Messaging2010ViewAn Empirical Study of Instant Messaging Behavior Using Diffusion of Innovation Theory Peslak, Ceccucci, Sendall
Integration2011ViewA Study of Information Technology Integration Peslak
Interaction Style2013ViewComparing Performance of Web Service Interaction Styles: SOAP vs. REST Kumar, Ahuja, Umapathy, Prodanoff
interface design2010ViewSuperfund Site Analysis Using Web 2.0 Technologies Anderson, Jafar, Rogers
internet2016ViewAn Expanded Analysis of Internet Dependencies by Demographic Variables Peslak
Interpersonal Violence2015ViewOn Adapting a War-Gaming Discrete Event Simulator with Big Data and Geospatial Modeling Toward a Predictive Model Ecosystem for Interpersonal Violence Mhlanga, Perry, Kirchner
interruptions2012ViewThe Effects of Interruptions on Remembering Task Information Lenox, Pilarski, Leathers
intra-organizational social networking sites2013ViewThe Impact of Intra-Organizational Social Cummings
iPhone Forensics2016ViewLeakage of Geolocation Data by Mobile Ad Networks Snow, Hayes, Dwyer
IS 2002 Model Curriculum2010ViewNetwork Growing Pains Clark, Mahar, Moussawi
IS 2002 Model Curriculum2010ViewNetwork Growing Pains Clark, Mahar, Moussawi
IS Strategy2013ViewThe Impact of Regulatory Changes on IS Strategy: An Exploratory Study Reinicke, Ward
IS Success2013ViewRocky Relationships: Enterprise Resource Planning and Supply Chain Management Crumbly, Fryling
IT Audit2010ViewThe Results of Implementing a Knowledge Management Initiative to Enhance Network Access Controls Kim, Nelson
IT Components2009ViewA Study of the Information Technology Trade between the United States and the Dominican Republic-Central America Free Trade Agreement Nations Pena, Aguirre, Saenz, Koong, Liu
IT Effectiveness2016ViewExploring Relationships between the Strategic Importance of IT and the Effectiveness of IT Security and Mobile Device Management Stanko, Sena, Sena
IT offshoring risks2017ViewA Multi-Criteria Network Assessment Model of IT Offshoring Risks from Service Provider's Perspective Petkov, Petkova
IT strategy2016ViewExploring Relationships between the Strategic Importance of IT and the Effectiveness of IT Security and Mobile Device Management Stanko, Sena, Sena
IT Technologies2014ViewShifting Technological Landscape: IT Departments and Anticipated Technological Changes Cummings, Janicki, Kline
IT/IS Skills2014ViewShifting Technological Landscape: IT Departments and Anticipated Technological Changes Cummings, Janicki, Kline