Search by Keyword

Search returned 89 items for : S

KeywordYear PubArticleTitleAuthors
SaaS2017ViewThe Effects of Discount Pricing Strategy on Sales of Software-as-a-Service (SaaS): Online Video Game Market Context Choi, Medlin, Hunsinger
SaaS2013ViewLet’s Look at the Cloud from a Risk Management Perspective Vignos, Kim, Metzer
Sales Performance2016ViewDriving Inside Sales Performance with Lead Management Systems: A Conceptual Model Ohiomah, Benyoucef, Andreev
Sample2017ViewCrowdsourcing Surveys: Alternative Approaches to Survey Collection Cummings, Sibona
scale development2014ViewDeveloping a Semantic Differential Scale for Measuring Users’ Attitudes toward Sensor based Decision Support Technologies for the Environment. Ajani, Stork
SCM2013ViewRocky Relationships: Enterprise Resource Planning and Supply Chain Management Crumbly, Fryling
SDM2010ViewSystem Development Methodology Usage in Industry: A Review and Analysis Griffin, Brandyberry
search engines2017ViewSentiment Analysis and Opinion Mining: Current State of the Art and Review of Google and Yahoo Search Engines’ Privacy Policies Peslak
secure coding2016ViewMoving Beyond Coding: Why Secure Coding Should be Implemented Grover, Cummings, Janicki
Security2017ViewThe Effects of Perceived Functionality and Usability on Privacy and Security Concerns about Adopting Cloud Applications Nakayama, Chen, Taylor
Security2015ViewCyber Security Best Practices: What to do? Kleinberg, Reinicke, Cummings
Security2011ViewPassword Security Risk versus Effort: An Exploratory Study on User-Perceived Risk and the Intention to Use Online Applications Gebauer, Kline, He
Security2010ViewA Study of the Perceptions of Students on Privacy and Security on Social Networking Sites (SNS) on the Internet Lawler, Molluzzo
Security Breaches2010ViewCan Management Predict Information Security Threats by Utilizing a Data Warehouse? Kim, Steen
Security Effectiveness2016ViewExploring Relationships between the Strategic Importance of IT and the Effectiveness of IT Security and Mobile Device Management Stanko, Sena, Sena
Security Management2016ViewExploring Relationships between the Strategic Importance of IT and the Effectiveness of IT Security and Mobile Device Management Stanko, Sena, Sena
Security Management2010ViewCan Management Predict Information Security Threats by Utilizing a Data Warehouse? Kim, Steen
Security Threats2014ViewRisk Assessment & Management in Merchant Capture Systems: A Threat Analysis Perspective Streff, Shrestha, Delzer
SEM2010ViewAn Empirical Study of Instant Messaging Behavior Using Diffusion of Innovation Theory Peslak, Ceccucci, Sendall
semantic differential scale2014ViewDeveloping a Semantic Differential Scale for Measuring Users’ Attitudes toward Sensor based Decision Support Technologies for the Environment. Ajani, Stork
Seniors2011ViewSeniors and Social Networking Lewis, Ariyachandra
Service-Dominant Logic2012ViewCo-Creating Value in Systems Development: A Shift towards Service-Dominant Logic Babb, Keith
service-oriented architecture (SOA)2011ViewThe Potential Reality of Service-Oriented Architecture (SOA) in a Cloud Computing Strategy Lawler
service-oriented computing (SOC)2011ViewThe Potential Reality of Service-Oriented Architecture (SOA) in a Cloud Computing Strategy Lawler
service-oriented enterprise (SOE)2011ViewThe Potential Reality of Service-Oriented Architecture (SOA) in a Cloud Computing Strategy Lawler
setiment analysis2017ViewSentiment Analysis and Opinion Mining: Current State of the Art and Review of Google and Yahoo Search Engines’ Privacy Policies Peslak
Sharepoint2010ViewAn Exploratory Study of Relationships between Workforce Characteristics Totterdale
signature tree2012ViewMaximizing Visibility in Skylines Miah
Similarity2014ViewSimilarity and Ties in Social Networks Afrasiabi Rad, Benyoucef
skylines2012ViewMaximizing Visibility in Skylines Miah
Small Business Development Corporation2010ViewTowards an Abstract Model for Academia and Information Technology Sector Collaborative Partnerships: Responding to the “West Texas Coalition for Innovation and Commercialization” Initiative Mhlanga, Vardiman, Reames
smart sourcing2012ViewOutsourcing Best Practices Mikita, DeHondt
smartphones2012ViewMobile Telephone Usage, Attitude, and Behavior During Group Meetings. Bajko
SMS2010ViewAn Empirical Study of Text Messaging Behavioral Intention and Usage Peslak, Ceccucci, Sendall
SOAP2013ViewComparing Performance of Web Service Interaction Styles: SOAP vs. REST Kumar, Ahuja, Umapathy, Prodanoff
Social Capital2013ViewThe Impact of Intra-Organizational Social Cummings
Social Capital2012ViewSocial Networking Systems and Campus Life Sgambato, Petkov, Wolf
Social Commerce2011ViewA Model for Understanding Social Commerce Afrasiabi Rad, Benyoucef
Social Contract Theory2010ViewA Study of the Perceptions of Students on Privacy and Security on Social Networking Sites (SNS) on the Internet Lawler, Molluzzo
Social Link Types2012ViewMeasuring Propagation in Online Social Networks: The case of YouTube Afrasiabi Rad, Benyoucef
social media2014ViewCan Social Media aid Software Development? Reinicke, Cummings
social media2014ViewDecision-Making via Visual Analysis using the Natural Language Toolkit and R Jafar, Babb, Dana
social media2013ViewBuilding a Competitive Edge through Social Media Aimiuwu
social media2012ViewAn Empirical Study of Social Networking Behavior Using Theory of Reasoned Action Peslak, Ceccucci, Sendall
Social Network Analysis2014ViewSimilarity and Ties in Social Networks Afrasiabi Rad, Benyoucef
Social Networking2012ViewAn Empirical Study of Social Networking Behavior Using Theory of Reasoned Action Peslak, Ceccucci, Sendall
Social Networking2010ViewA Study of the Perceptions of Students on Privacy and Security on Social Networking Sites (SNS) on the Internet Lawler, Molluzzo
Social Networking2010ViewAn Exploratory Study of Relationships between Workforce Characteristics Totterdale
Social Networking (SNS)2010ViewA Study of the Perceptions of Students on Privacy and Security on Social Networking Sites (SNS) on the Internet Lawler, Molluzzo
Social Networking Site2014ViewCan Social Media aid Software Development? Reinicke, Cummings
social networking sites2017ViewCrowdsourcing Surveys: Alternative Approaches to Survey Collection Cummings, Sibona
social networking sites2012ViewSocial Networking Systems and Campus Life Sgambato, Petkov, Wolf
Social Networking Use2011ViewSeniors and Social Networking Lewis, Ariyachandra
Social Networks2012ViewMeasuring Propagation in Online Social Networks: The case of YouTube Afrasiabi Rad, Benyoucef
Social Ties2014ViewSimilarity and Ties in Social Networks Afrasiabi Rad, Benyoucef
Social Web2011ViewA Model for Understanding Social Commerce Afrasiabi Rad, Benyoucef
Software as a Service (SaaS)2012ViewUsing the cloud: Keeping Enterprise Data Private Cronin, Pauli, Ham
software development2016ViewMoving Beyond Coding: Why Secure Coding Should be Implemented Grover, Cummings, Janicki
software development2015ViewThe Silent Treatment in IT Projects: Gender Differences in Inclinations to Communicate Project Status Information Korzaan, Brooks
software development2010ViewThe Impact of Transition Costs on Offshore Systems Development DeHondt, Leidig
Software project schedule estimation2013ViewEarly Stage Probabilistic Software Project Schedule Estimation Kwon, Hammell II
software testing2014ViewTaxonomy of Common Software Testing Terminology: Framework for Key Software Engineering Testing Concepts Roggio, Gordon, Comer
software-as-a-service2013ViewA Study of Cloud Computing Software-as-a-Service (SaaS) in Financial Firms Lawler, Howell-Barber, Desai, Joseph
sorting2015ViewMeasuring Algorithm Performance With Java: Patterns of Variation McMaster, Sambasivam, Wolthuis
Spyware2010ViewSpyware: What Influences College Students to Use Anti-Spyware Tools? Ward, Hunsinger
static testing2014ViewTaxonomy of Common Software Testing Terminology: Framework for Key Software Engineering Testing Concepts Roggio, Gordon, Comer
statistical analysis2012ViewApplying Business Intelligence Concepts to Medicaid Claim Fraud Detection Copeland, Edberg, Wendel
strategic use of IT2011ViewMake or Buy: A comparative assessment of organizations that develop software internally versus those that purchase software Sena, Sena
strategy2015ViewA Cloud Computing Methodology Study of Platform-as-a-Service (PaaS) in the Financial Industry Lawler, Howell-Barber, Joseph
strategy2014ViewA Study of Cloud Computing Infrastructure-as-a-Service (IaaS) in Financial Firms Lawler, Howell-Barber, Joseph, Narula
strategy2013ViewA Study of Cloud Computing Software-as-a-Service (SaaS) in Financial Firms Lawler, Howell-Barber, Desai, Joseph
strategy2013ViewBuilding a Competitive Edge through Social Media Aimiuwu
structural equation modeling2012ViewAn Empirical Study of Social Networking Behavior Using Theory of Reasoned Action Peslak, Ceccucci, Sendall
structural equation modeling2010ViewAn Empirical Study of Instant Messaging Behavior Using Diffusion of Innovation Theory Peslak, Ceccucci, Sendall
subset of attributes2012ViewMaximizing Visibility in Skylines Miah
success2011ViewA Study of Information Technology Integration Peslak
success factors2017ViewBuilding Client Vendor Alignment Capability in Strategic Information Systems Outsourcing Ghosh
Supply Chain Management2013ViewRocky Relationships: Enterprise Resource Planning and Supply Chain Management Crumbly, Fryling
survey2010ViewFactors that Persuade and Deter Membership in Professional Computing Associations Umapathy, Jamba, Ritzhaupt
Surveys2017ViewCrowdsourcing Surveys: Alternative Approaches to Survey Collection Cummings, Sibona
Sustainability2008ViewAssessing the Role of CSR in Outsourcing Decisions Babin
System Development Methodology2010ViewSystem Development Methodology Usage in Industry: A Review and Analysis Griffin, Brandyberry
System Dynamics2015ViewERP Customization vs. Business Process Reengineering: Technical and Functional Perceptions Fryling
System integration2017ViewIdentifying the Critical Success Factors for Information Systems to Manage Sponsored Research Activities at Institutions of Higher Education Lehman, Ruzich
Systems Analysis and Design2014ViewCan Social Media aid Software Development? Reinicke, Cummings
systems development2014ViewCan Social Media aid Software Development? Reinicke, Cummings
Systems development methods2012ViewCo-Creating Value in Systems Development: A Shift towards Service-Dominant Logic Babb, Keith
systems integration2011ViewA Study of Information Technology Integration Peslak
systems thinking2017ViewA Multi-Criteria Network Assessment Model of IT Offshoring Risks from Service Provider's Perspective Petkov, Petkova