Search by Authors

Search returned 32 items for : K

Year PubArticleTitleAuthors
2023ViewE-Commerce Drone Delivery Acceptance: A Study of Gen Z's Switching Intention Kaleta, Xie, Chen
2023ViewInformation Worth: Investigating the Differences in the Importance and Value of Personally Identifiable Information Kaleta, Mahadevan, Thackston
2024ViewNetwork Intrusion Detection system with Machine learning Intrusion Detection System with Machine Learning As a Service Kangethe , Wimmer, Rebman Jr.
2017ViewMalvertising - A Rising Threat To The Online Ecosystem Dwyer, Kanguri
2012ViewCo-Creating Value in Systems Development: A Shift towards Service-Dominant Logic Babb, Keith
2023ViewA Comparative Analysis of Web Application Vulnerability Tools Garcia, Abraham, Kepic, Cankaya
2023ViewA Predictive Unmanned Aerial Vehicle Maintenance Method: Using Low-Code and Cloud-Based Data Visualization Kim, Chung, Ju, Maeng
2013ViewLet’s Look at the Cloud from a Risk Management Perspective Vignos, Kim, Metzer
2010ViewCan Management Predict Information Security Threats by Utilizing a Data Warehouse? Kim, Steen
2010ViewThe Results of Implementing a Knowledge Management Initiative to Enhance Network Access Controls Kim, Nelson
2015ViewOn Adapting a War-Gaming Discrete Event Simulator with Big Data and Geospatial Modeling Toward a Predictive Model Ecosystem for Interpersonal Violence Mhlanga, Perry, Kirchner
2015ViewCyber Security Best Practices: What to do? Kleinberg, Reinicke, Cummings
2022ViewA Scalable Amazon Review Collection System Woodall, Kline, Vetter, Modaresnezhad
2020ViewLiterary Analysis Tool: Text Analytics for Creative Writers Grimsman, Kline, Vetter, Guinn
2020ViewUnderstanding Campus Crime with a Multi-University Analytics System Iheadindu, Kline, Vetter, Clark
2014ViewShifting Technological Landscape: IT Departments and Anticipated Technological Changes Cummings, Janicki, Kline
2011ViewPassword Security Risk versus Effort: An Exploratory Study on User-Perceived Risk and the Intention to Use Online Applications Gebauer, Kline, He
2020ViewDeveloping a GIS Dashboard Tool to Inform Non-Profit Hospitals of Community Health Needs at the Neighborhood Level Copello, Smith, Mease, Umapathy, Richard, Knight, Albertie, Hamadi, Spaulding, Apatu
2017ViewFinding the “Radicalness” in Radical Innovation Adoption Sharma, Thomas, Konsynski
2009ViewA Study of the Information Technology Trade between the United States and the Dominican Republic-Central America Free Trade Agreement Nations Pena, Aguirre, Saenz, Koong, Liu
2023ViewHow Firms Can Impact IT Project Continuation Intentions: A Human Capital Perspective Totty, Zaza, Greer, Korzaan
2018ViewAn Exploratory Analysis of Gender Differences in IT Project Commitment, Continuation, and Escalation Korzaan, Harris, Brooks
2015ViewThe Silent Treatment in IT Projects: Gender Differences in Inclinations to Communicate Project Status Information Korzaan, Brooks
2014ViewThe De-Escalation of the DHS HSIN Next Gen Project Rosenhauer, Korzaan
2024ViewUsing Topic Modeling to Identify Factors Influencing Job Satisfaction in the IT Industry Kosar, Lee
2024ViewSocial Media Users Only Have Two Clusters: A United States Analysis Peslak, Kovalchick, Menon
2020ViewA Longitudinal Study of Google Privacy Policies Peslak, Kovalchick, Conforti
2012ViewThe New Tech Effect: Analyzing Juror Credibility Davis, Paullet, Kraeer, Grant
2008ViewThe Importance of Business Process Alignment for IT Project Management of Commercial Software with Case Studies Kraft
2018ViewText Messaging Today: A Longitudinal Study of Variables Influencing Text Messaging from 2009 to 2016 Peslak, Hunsinger, Kruck
2013ViewComparing Performance of Web Service Interaction Styles: SOAP vs. REST Kumar, Ahuja, Umapathy, Prodanoff
2013ViewEarly Stage Probabilistic Software Project Schedule Estimation Kwon, Hammell II