Year Pub | Article | Title | Authors |
2022 | View | Using Analytics to understand Performance and Wellness for a Women’s College Soccer Team |
Njunge, Witman, Holmberg, Canacoo
|
2021 | View | Enterprise Architecture Transformation Process from a Federal Government Perspective |
Canada, Halawi
|
2023 | View | A Comparative Analysis of Web Application Vulnerability Tools |
Garcia, Abraham, Kepic, Cankaya
|
2021 | View | A Prototype for Distributed Computing Platform using Smartphones |
Wagner, Cao
|
2013 | View | Open Source Software Volunteerism vs. |
Carpenter
|
2022 | View | Harvesting Intrinsically Verifiable Trust: Building a Honey Traceability System for Sustainable Development |
Runzel, Hassler, Hadley, Ratcliffe, Wilkes, Cazier
|
2021 | View | The Sting of Adoption: The Technology Acceptance Model (TAM) with Actual Usage in a Hazardous Environment |
Hassler, MacDonald, Cazier, Wilkes
|
2020 | View | Trash to Treasure: Predicting Landfill Gas Flow to Optimize Electricity Generation |
Hassler, Emery, Hoyle, Cazier
|
2019 | View | Standardizing Public Utility Data: A Case Study of a Rural Mid-Size Utility |
Hassler, Cazier, Russell, Mueller, Paprocki
|
2024 | View | Investigating the Relationship between Developer Job Satisfaction and Life Satisfaction: A Global Analysis |
Peslak, Ceccucci, Jones, Leonard
|
2023 | View | The Effect of Mental Illness on Compensation for IT Developers |
Peslak, Ceccucci, Jones, Leonard
|
2022 | View | The COVID-19 Pandemic’s Impact on Information Technology Employment, Salaries, and Career Opportunities |
Sendall, Peslak, Ceccucci, Hunsinger
|
2021 | View | Job and Career Satisfaction of Software Engineers |
Peslak, Ceccucci, Sendall
|
2012 | View | An Empirical Study of Social Networking Behavior Using Theory of Reasoned Action |
Peslak, Ceccucci, Sendall
|
2010 | View | An Empirical Study of Instant Messaging Behavior Using Diffusion of Innovation Theory |
Peslak, Ceccucci, Sendall
|
2010 | View | An Empirical Study of Text Messaging Behavioral Intention and Usage |
Peslak, Ceccucci, Sendall
|
2021 | View | Privacy Concerns and Data Sharing Habits of Personal Fitness Information Collected via Activity Trackers |
Pinchot, Cellante
|
2018 | View | Information Sharing Increases Drug Sample Inventory Management Efficiency in Healthcare Clinics: Evidence from a Quasi-Experiment |
Lang, Chahal
|
2019 | View | Drone Delivery Services: An Evaluation of Personal Innovativeness, Opinion Passing and Key Information Technology Adoption Factors |
Chen, Choi, Charoen
|
2023 | View | Are Companies Responsible for Internet of Things (IoT) Data Privacy? A Survey of IoT User Perceptions |
Paullet, Pinchot, Chawdhry
|
2018 | View | What’s “Appening” to our Privacy?
A Students Perspective on Downloading Mobile Apps
|
Paullet, Chawdhry, Douglas, Compomizzi
|
2017 | View | Downloading Mobile Applications - Are Students Protecting Themselves |
Chawdhry, Paullet, Douglas, Compomizzi
|
2023 | View | E-Commerce Drone Delivery Acceptance: A Study of Gen Z's Switching Intention |
Kaleta, Xie, Chen
|
2019 | View | Aligning the Factors of Skill, Technology and Task to Influence the Continued Use of Mobile Payment Users in China |
Chen, Choi, Xiong, Tang
|
2019 | View | Drone Delivery Services: An Evaluation of Personal Innovativeness, Opinion Passing and Key Information Technology Adoption Factors |
Chen, Choi, Charoen
|
2017 | View | The Effects of Perceived Functionality and Usability on Privacy and Security Concerns about Adopting Cloud Applications |
Nakayama, Chen, Taylor
|
2019 | View | Aligning the Factors of Skill, Technology and Task to Influence the Continued Use of Mobile Payment Users in China |
Chen, Choi, Xiong, Tang
|
2019 | View | Driving Distractions and Multi-tasking: An Investigative Study |
Choi, Xiong, Medlin
|
2019 | View | Drone Delivery Services: An Evaluation of Personal Innovativeness, Opinion Passing and Key Information Technology Adoption Factors |
Chen, Choi, Charoen
|
2017 | View | The Effects of Discount Pricing Strategy on Sales of Software-as-a-Service (SaaS):
Online Video Game Market Context |
Choi, Medlin, Hunsinger
|
2023 | View | A Predictive Unmanned Aerial Vehicle Maintenance Method: Using Low-Code and Cloud-Based Data Visualization
|
Kim, Chung, Ju, Maeng
|
2023 | View | A Serverless Real-Time Data Streaming Architecture for Synchronous Online Math Competition |
Liu, Chung
|
2023 | View | Optimizing a Convolutional Neural Network Model in Amazon SageMaker for an Autism Detection Tool, EZ Autism Screener |
Ata, Chung, Maeng
|
2022 | View | A Comparison of Internationalization and Localization Solutions for Web and Mobile Applications |
Wang, Chung, Yoon
|
2022 | View | Cybersecurity Maturity Model Certification Initial Impact on the Defense Industrial Base
|
Strohmier, Stoker, Vanajakumari, Clark, Cummings, Modaresnezhad
|
2021 | View | Towards a Leader-Driven Supply Chain Cybersecurity Framework |
Vanajakumari, Mittal, Stoker, Clark, Miller
|
2020 | View | Understanding Campus Crime with a Multi-University Analytics System |
Iheadindu, Kline, Vetter, Clark
|
2013 | View | Analysis of Electronic Health |
Mitchell, Clark
|
2013 | View | Information Security Blueprint |
Clark, Benli, Mitchell, Vetter
|
2010 | View | Network Growing Pains |
Clark, Mahar, Moussawi
|
2009 | View | Anticipated Changes to Technologies |
Janicki, Clark, Mahar, Logan
|
2009 | View | The Impact of Technology Diffusion on Employment, Compensation, and Productivity: Evidence from the Telecommunications Sector |
Clark, Moussawi
|
2011 | View | Development of an Evaluation Model for XBRL-enabled Tools Intended for Investors |
Clements, Schwieger, Surendran
|
2020 | View | Geographic Information System and Gerrymandering
|
Wu, DePlato, Combs
|
2014 | View | Taxonomy of Common Software Testing Terminology: Framework for Key Software Engineering Testing Concepts |
Roggio, Gordon, Comer
|
2018 | View | What’s “Appening” to our Privacy?
A Students Perspective on Downloading Mobile Apps
|
Paullet, Chawdhry, Douglas, Compomizzi
|
2017 | View | Downloading Mobile Applications - Are Students Protecting Themselves |
Chawdhry, Paullet, Douglas, Compomizzi
|
2020 | View | A Longitudinal Study of Google Privacy Policies |
Peslak, Kovalchick, Conforti
|
2012 | View | Open Source Software in the Vertical Market: an Open Niche? |
Conlon
|
2010 | View | Teaching Knowledge Management (KM) in Criminal Justice Education: The Influence of Information Systems |
Conn, Thies
|
2012 | View | Applying Business Intelligence Concepts to Medicaid Claim Fraud Detection |
Copeland, Edberg, Wendel
|
2020 | View | Developing a GIS Dashboard Tool to Inform Non-Profit Hospitals of Community Health Needs at the Neighborhood Level |
Copello, Smith, Mease, Umapathy, Richard, Knight, Albertie, Hamadi, Spaulding, Apatu
|
2021 | View | Internet of Things (IoT): An Analysis of the Research |
Jourdan, Corley, Ryan, Anderson
|
2013 | View | What Influences Students to Use Dropbox? |
Hunsinger, Corley
|
2012 | View | Google Chrome and the Paradigm Shifts in the Browser Market Among Users |
Corley, Hunsinger
|
2017 | View | Causes of cyberbullying in multi-player online gaming environments: Gamer perceptions |
Cotler, Fryling, Rivituso
|
2015 | View | Cyberbullying or normal game play? Impact of age, gender, and experience on cyberbullying in multi-player online gaming environments: Perceptions from one gaming forum |
Fryling, Cotler, Rivituso, Mathews, Pratico
|
2019 | View | Adversarial Machine Learning for Cyber Security |
De Lucia, Cotton
|
2014 | View | Performance and Corporate Social Responsibility in the Information Technology Industry |
Cowan, Parzinger, Welch, Welch
|
2021 | View | Exploring Sentiment Towards Contact Tracing |
Crable, Sena
|
2012 | View | Using the cloud: Keeping Enterprise Data Private |
Cronin, Pauli, Ham
|
2013 | View | Rocky Relationships: Enterprise Resource Planning and Supply Chain Management |
Crumbly, Fryling
|
2023 | View | An Exploration of the Benefits of Certifications and their Relationship to Salaries in IS/IT |
Matthews, Cummings, Janicki
|
2022 | View | Cybersecurity Maturity Model Certification Initial Impact on the Defense Industrial Base
|
Strohmier, Stoker, Vanajakumari, Clark, Cummings, Modaresnezhad
|
2019 | View | Changes in the Information Technology Field: A Survey of Current Technologies and Future Importance
|
Cummings, Janicki
|
2018 | View | Information Security and Privacy Legislation:
Current State and Future Direction |
Dunlap, Cummings, Janicki
|
2017 | View | Crowdsourcing Surveys: Alternative Approaches to Survey Collection |
Cummings, Sibona
|
2016 | View | Moving Beyond Coding: Why Secure Coding Should be Implemented |
Grover, Cummings, Janicki
|
2015 | View | Cyber Security Best Practices: What to do? |
Kleinberg, Reinicke, Cummings
|
2014 | View | Can Social Media aid Software Development? |
Reinicke, Cummings
|
2014 | View | Shifting Technological Landscape: IT Departments and Anticipated Technological Changes |
Cummings, Janicki, Kline
|
2013 | View | The Impact of Intra-Organizational Social |
Cummings
|