Year Pub | Article | Title | Authors |
2014 | View | A Feasibility Study of Platform-as-a-Service Using Cloud Computing for a Global Service Organization |
Gai, Steenkamp
|
2023 | View | A Comparative Analysis of Web Application Vulnerability Tools |
Garcia, Abraham, Kepic, Cankaya
|
2011 | View | Password Security Risk versus Effort: An Exploratory Study on User-Perceived Risk and the Intention to Use Online Applications |
Gebauer, Kline, He
|
2022 | View | Grounded Theory Investigation into Cognitive Outcomes with Project-Based Learning |
Ghosh
|
2018 | View | Exploratory Study of Organizational Adoption of Cloud based Big Data Analytics |
Ghosh
|
2017 | View | Building Client Vendor Alignment Capability in Strategic Information Systems Outsourcing |
Ghosh
|
2016 | View | Exploratory Study of Effects of eLearning System Acceptance on Learning Outcomes |
Ghosh
|
2010 | View | Women's Technology Acceptance of Mentoring on the Internet |
Gibson, GIBSON
|
2010 | View | Women's Technology Acceptance of Mentoring on the Internet |
Gibson, GIBSON
|
2015 | View | Identifying User Behavior from Residual Data in Cloud-based Synchronized Apps |
Grispos, Glisson, Pardue, Dickson
|
2014 | View | A Comparison of Software Testing Using the Object-Oriented Paradigm and Traditional Testing |
Gordon, Roggio
|
2014 | View | Taxonomy of Common Software Testing Terminology: Framework for Key Software Engineering Testing Concepts |
Roggio, Gordon, Comer
|
2012 | View | The New Tech Effect: Analyzing Juror Credibility |
Davis, Paullet, Kraeer, Grant
|
2023 | View | How Firms Can Impact IT Project Continuation Intentions: A Human Capital Perspective |
Totty, Zaza, Greer, Korzaan
|
2010 | View | System Development Methodology Usage in Industry: A Review and Analysis |
Griffin, Brandyberry
|
2020 | View | Literary Analysis Tool: Text Analytics for Creative Writers |
Grimsman, Kline, Vetter, Guinn
|
2015 | View | Identifying User Behavior from Residual Data in Cloud-based Synchronized Apps |
Grispos, Glisson, Pardue, Dickson
|
2016 | View | Moving Beyond Coding: Why Secure Coding Should be Implemented |
Grover, Cummings, Janicki
|
2020 | View | Literary Analysis Tool: Text Analytics for Creative Writers |
Grimsman, Kline, Vetter, Guinn
|