Year Pub | Article | Title | Authors |
2009 | View | An Examination of Information Security in Mobile Banking Architectures |
Streff, Haar
|
2019 | View | A Machine Learning Approach to Optimizing Diabetes Healthcare Management Using SAS Analytic Suite |
Ajani, Habek
|
2022 | View | Harvesting Intrinsically Verifiable Trust: Building a Honey Traceability System for Sustainable Development |
Runzel, Hassler, Hadley, Ratcliffe, Wilkes, Cazier
|
2024 | View | Decisional Guidance to Promote Motivation in Supply Chain Decision Making |
Haines, Hodges
|
2021 | View | Enterprise Architecture Transformation Process from a Federal Government Perspective |
Canada, Halawi
|
2019 | View | Where We are with Enterprise Architecture |
Halawi, McCarthy, farah
|
2012 | View | Using the cloud: Keeping Enterprise Data Private |
Cronin, Pauli, Ham
|
2020 | View | Developing a GIS Dashboard Tool to Inform Non-Profit Hospitals of Community Health Needs at the Neighborhood Level |
Copello, Smith, Mease, Umapathy, Richard, Knight, Albertie, Hamadi, Spaulding, Apatu
|
2019 | View | The use of Snap Length in Lossy Network Traffic Compression for Network Intrusion Detection Applications |
Smith, Hammell II
|
2017 | View | Proposal for Kelly Criterion-Inspired Lossy Network Compression for Network Intrusion Applications |
Smith, Hammell II
|
2014 | View | Predicting the Terminal Ballistics of Kinetic Energy Projectiles Using Artificial Neural Networks |
Auten, Hammell II
|
2013 | View | Early Stage Probabilistic Software Project Schedule Estimation |
Kwon, Hammell II
|
2009 | View | Determining Information Technology Project Status using Recognition-primed Decision-making enabled Collaborative Agents for Simulating Teamwork (R-CAST) |
Barnes, Hammell II
|
2018 | View | An Exploratory Analysis of Gender Differences in IT Project Commitment, Continuation, and Escalation |
Korzaan, Harris, Brooks
|
2024 | View | Tools for Success: Their Impact on Salaries in the Data Analytics Job Market |
Hartzel, Ozturk
|
2022 | View | Harvesting Intrinsically Verifiable Trust: Building a Honey Traceability System for Sustainable Development |
Runzel, Hassler, Hadley, Ratcliffe, Wilkes, Cazier
|
2021 | View | The Sting of Adoption: The Technology Acceptance Model (TAM) with Actual Usage in a Hazardous Environment |
Hassler, MacDonald, Cazier, Wilkes
|
2020 | View | Trash to Treasure: Predicting Landfill Gas Flow to Optimize Electricity Generation |
Hassler, Emery, Hoyle, Cazier
|
2019 | View | Standardizing Public Utility Data: A Case Study of a Rural Mid-Size Utility |
Hassler, Cazier, Russell, Mueller, Paprocki
|
2018 | View | A Dynamic and Static Analysis of the Uber Mobile Application from a Privacy Perspective |
Hayes, Snow, Altuwayjiri
|
2016 | View | Leakage of Geolocation Data by Mobile Ad Networks |
Snow, Hayes, Dwyer
|
2024 | View | Integrating Virtual and Augmented Reality with Brain-Computer Interfaces for ADHD and ASD Management: A Preliminary Review |
Streeter, Li, Li, Zhang, Tian, He
|
2011 | View | Password Security Risk versus Effort: An Exploratory Study on User-Perceived Risk and the Intention to Use Online Applications |
Gebauer, Kline, He
|
2023 | View | Text Prediction Using Artificial Intelligence: An Analysis of Two Text Prediction Systems |
Wimmer, Du, Heri
|
2020 | View | An Exploratory Study of the Perceptions of Library Faculty and Patrons on Library Resources |
Herman, Wimmer, Rebman Jr.
|
2018 | View | Minimalism in Data Visualization: Perceptions of Beauty, Clarity, Effectiveness, and Simplicity |
Hill, Wray, Sibona
|
2024 | View | Decisional Guidance to Promote Motivation in Supply Chain Decision Making |
Haines, Hodges
|
2022 | View | Using Analytics to understand Performance and Wellness for a Women’s College Soccer Team |
Njunge, Witman, Holmberg, Canacoo
|
2023 | View | QR Code Hacking – Detecting Multiple Vulnerabilities in Android Scanning Software |
Homan, Breese
|
2015 | View | A Cloud Computing Methodology Study of Platform-as-a-Service (PaaS) in the Financial Industry |
Lawler, Howell-Barber, Joseph
|
2014 | View | A Study of Cloud Computing Infrastructure-as-a-Service (IaaS) in Financial Firms |
Lawler, Howell-Barber, Joseph, Narula
|
2013 | View | A Study of Cloud Computing Software-as-a-Service (SaaS) in Financial Firms |
Lawler, Howell-Barber, Desai, Joseph
|
2020 | View | Trash to Treasure: Predicting Landfill Gas Flow to Optimize Electricity Generation |
Hassler, Emery, Hoyle, Cazier
|
2022 | View | The COVID-19 Pandemic’s Impact on Information Technology Employment, Salaries, and Career Opportunities |
Sendall, Peslak, Ceccucci, Hunsinger
|
2021 | View | Open Source Software: A Detailed Analysis of Contributions and Quality |
Peslak, Hunsinger
|
2018 | View | Text Messaging Today: A Longitudinal Study of Variables Influencing Text Messaging from 2009 to 2016 |
Peslak, Hunsinger, Kruck
|
2017 | View | The Effects of Discount Pricing Strategy on Sales of Software-as-a-Service (SaaS):
Online Video Game Market Context |
Choi, Medlin, Hunsinger
|
2013 | View | What Influences Students to Use Dropbox? |
Hunsinger, Corley
|
2012 | View | Google Chrome and the Paradigm Shifts in the Browser Market Among Users |
Corley, Hunsinger
|
2011 | View | Factors Influencing People to Use Linux |
Hunsinger, Fransen
|
2010 | View | Spyware: What Influences College Students to Use Anti-Spyware Tools? |
Ward, Hunsinger
|
2009 | View | Analysis of the Factors that Influence Online Purchasing |
Amoroso, Hunsinger
|
2017 | View | Gateway to Clinical Intelligence and Operational Excellence through a Patient Healthcare Smart Card System |
Hussein, Ariyachandra, Frolick
|