A
A Case Study Analysis of KnightSec and the Steubenville Rape Case
(3306)
|
A Case Study on Achieving Legitimation in Information Systems Action Research Projects
(3325)
|
A Cloud Computing Methodology Study of Platform-as-a-Service (PaaS) in the Financial Industry
(3303)
|
Aligning Information Systems strategy with the Business Strategy in a South African Banking Environment
(3321)
|
Are College Home Pages More Accessible? A Longitudinal Study of the Accessibility of United States College Home Pages
(3324)
|
B
Building a Better Stockbroker: Managing Big (Financial) Data by Constructing an Ontology-Based Framework
(3314)
|
C
Cyber Security Best Practices: What to do?
(3309)
|
Cyberbullying or normal game play? Impact of age, gender, and experience on cyberbullying in multi-player online gaming environments: Perceptions from one gaming forum
(3307)
|
E
ERP Customization vs. Business Process Reengineering: Technical and Functional Perceptions
(3316)
|
I
Identifying User Behavior from Residual Data in Cloud-based Synchronized Apps
(3310)
|
M
Measuring Algorithm Performance With Java: Patterns of Variation
(3043)
|
O
On Adapting a War-Gaming Discrete Event Simulator with Big Data and Geospatial Modeling Toward a Predictive Model Ecosystem for Interpersonal Violence
(3305)
|
Open Source Web Application Vulnerability Scanners: The Cost Effective Choice
(3319)
|
R
Review of Web Service Specifications for Long-running Conversations
(3318)
|
Roadmaps and Maturity Models:
Pathways toward Adopting Big Data
(3302)
|
T
The Silent Treatment in IT Projects: Gender Differences in Inclinations to Communicate Project Status Information
(3312)
|
U
Use of Preventative Measures to Protect Data Privacy on Mobile Devices
(3317)
|