Search by Keyword

Search returned 45 items for : M

KeywordYear PubArticleTitleAuthors
M-Commerce2009ViewAn Examination of Information Security in Mobile Banking Architectures Streff, Haar
make vs. buy2011ViewMake or Buy: A comparative assessment of organizations that develop software internally versus those that purchase software Sena, Sena
malvertising2017ViewMalvertising - A Rising Threat To The Online Ecosystem Dwyer, Kanguri
Malware detection2017ViewMalvertising - A Rising Threat To The Online Ecosystem Dwyer, Kanguri
Management2010ViewAn Exploratory Study of Relationships between Workforce Characteristics Totterdale
Management Best Practices2014ViewMicrosoft vs Apple: Which is Great by Choice? Sena, Olsen
maximize visibility2012ViewMaximizing Visibility in Skylines Miah
maximize visibility2012ViewMost Popular Package Design Miah
MCDM2010ViewOn Design Science, MCDM, and Outsourcing Decision Making Petkov, Petkova
medical records2017ViewGateway to Clinical Intelligence and Operational Excellence through a Patient Healthcare Smart Card System Hussein, Ariyachandra, Frolick
membership2010ViewFactors that Persuade and Deter Membership in Professional Computing Associations Umapathy, Jamba, Ritzhaupt
membership2008ViewComputing Professional Association Membership: An Exploration of Membership Needs and Motivations Ritzhaupt, Umapathy, Jamba
Merchant Capture System (MCS)2014ViewRisk Assessment & Management in Merchant Capture Systems: A Threat Analysis Perspective Streff, Shrestha, Delzer
Method Engineering2011ViewA Methodology Tailoring Model for Practitioner Based Information Systems Development Informed by the Principles of General Systems Theory Burns, Deek
Methodology Tailoring2011ViewA Methodology Tailoring Model for Practitioner Based Information Systems Development Informed by the Principles of General Systems Theory Burns, Deek
MMORPG2017ViewCauses of cyberbullying in multi-player online gaming environments: Gamer perceptions Cotler, Fryling, Rivituso
MMORPG2015ViewCyberbullying or normal game play? Impact of age, gender, and experience on cyberbullying in multi-player online gaming environments: Perceptions from one gaming forum Fryling, Cotler, Rivituso, Mathews, Pratico
Mobile Advertisements2016ViewLeakage of Geolocation Data by Mobile Ad Networks Snow, Hayes, Dwyer
mobile application development2012ViewCMobile: A Mobile Photo Capture Application for Construction Imaging Martin, Vetter, Brown, Janicki
Mobile applications2017ViewDownloading Mobile Applications - Are Students Protecting Themselves Chawdhry, Paullet, Douglas, Compimizzi
mobile apps2015ViewUse of Preventative Measures to Protect Data Privacy on Mobile Devices Pinchot, Paullet
Mobile Banking2009ViewAn Examination of Information Security in Mobile Banking Architectures Streff, Haar
Mobile Commerce2009ViewAn Examination of Information Security in Mobile Banking Architectures Streff, Haar
Mobile Communication2012ViewMobile Telephone Usage, Attitude, and Behavior During Group Meetings. Bajko
Mobile Computing2012ViewMobile Telephone Usage, Attitude, and Behavior During Group Meetings. Bajko
Mobile Development2013ViewCreating an Audio Conferencing Application Sun, Vetter, Reinicke
Mobile Devices2017ViewDownloading Mobile Applications - Are Students Protecting Themselves Chawdhry, Paullet, Douglas, Compimizzi
Mobile Devices2016ViewExploring Relationships between the Strategic Importance of IT and the Effectiveness of IT Security and Mobile Device Management Stanko, Sena, Sena
Mobile Devices2015ViewUse of Preventative Measures to Protect Data Privacy on Mobile Devices Pinchot, Paullet
Mobile Phone2012ViewMobile Telephone Usage, Attitude, and Behavior During Group Meetings. Bajko
Mobile Privacy2016ViewLeakage of Geolocation Data by Mobile Ad Networks Snow, Hayes, Dwyer
mobile security2017ViewDownloading Mobile Applications - Are Students Protecting Themselves Chawdhry, Paullet, Douglas, Compimizzi
mobile security2015ViewUse of Preventative Measures to Protect Data Privacy on Mobile Devices Pinchot, Paullet
mobile security2015ViewUse of Preventative Measures to Protect Data Privacy on Mobile Devices Pinchot, Paullet
mobile technology2012ViewTalk to Text: Changing Communication Patterns Pinchot, Douglas, Paullet, Rota
mobile technology2011ViewHow Mobile Technology is Changing Our Culture Pinchot, Paullet, Rota
Mobile telephony2012ViewMobile Telephone Usage, Attitude, and Behavior During Group Meetings. Bajko
mobile web development2012ViewBuilding a Real-Time Bus Tracking Data Display System Dudley, Vetter, Brown, Janicki
Monitoring and sensing devices2010ViewIncorporation of Information Technology into Assisted Health Care: An Empirical Study Merrill, White
Motivation2013ViewOpen Source Software Volunteerism vs. Carpenter
Motivation2008ViewComputing Professional Association Membership: An Exploration of Membership Needs and Motivations Ritzhaupt, Umapathy, Jamba
Multi-channel retailers2014ViewOnline versus In-Store: Price Differentiation for Multi-Channel Retailers Flores, Sun
multi-payer system2017ViewGateway to Clinical Intelligence and Operational Excellence through a Patient Healthcare Smart Card System Hussein, Ariyachandra, Frolick
multiple regression analysis2010ViewAn Empirical Study of Instant Messaging Behavior Using Diffusion of Innovation Theory Peslak, Ceccucci, Sendall
MySQL2008ViewComparison of Dynamic Web Content Processing Language Performance Under a LAMP Architecture Jafar, Anderson, Abdullat