Year Pub | Article | Title | Authors |
2023 | View | Influence of Reporting structure and Perception of Role of Information Technology on Decision-making: A Qualitative Study |
Pandey, Mishra
|
2021 | View | Does the Executive Perception of the Value of Information Technology (IT) Influence the IT strategy? A Case Study |
Pandey, Mishra
|
2019 | View | Standardizing Public Utility Data: A Case Study of a Rural Mid-Size Utility |
Hassler, Cazier, Russell, Mueller, Paprocki
|
2015 | View | Identifying User Behavior from Residual Data in Cloud-based Synchronized Apps |
Grispos, Glisson, Pardue, Dickson
|
2011 | View | A Process for Assessing Voting System Risk Using Threat Trees |
Yasinisac, Pardue
|
2014 | View | Performance and Corporate Social Responsibility in the Information Technology Industry |
Cowan, Parzinger, Welch, Welch
|
2021 | View | Documenting the Process of Hijacking a Raspberry Pi User Login Credentials via Remote Code Execution |
Patel, Wimmer, Powell
|
2018 | View | Protecting IoT from Mirai botnets; IoT device hardening |
Frank, Nance, Jarocki, Pauli
|
2012 | View | Using the cloud: Keeping Enterprise Data Private |
Cronin, Pauli, Ham
|
2024 | View | Mobile Technology Has Changed Our Culture |
Paullet, Pinchot
|
2023 | View | Are Companies Responsible for Internet of Things (IoT) Data Privacy? A Survey of IoT User Perceptions |
Paullet, Pinchot, Chawdhry
|
2018 | View | What’s “Appening” to our Privacy?
A Students Perspective on Downloading Mobile Apps
|
Paullet, Chawdhry, Douglas, Compomizzi
|
2017 | View | Downloading Mobile Applications - Are Students Protecting Themselves |
Chawdhry, Paullet, Douglas, Compomizzi
|
2015 | View | Use of Preventative Measures to Protect Data Privacy on Mobile Devices |
Pinchot, Paullet
|
2012 | View | Talk to Text: Changing Communication Patterns |
Pinchot, Douglas, Paullet, Rota
|
2012 | View | The New Tech Effect: Analyzing Juror Credibility |
Davis, Paullet, Kraeer, Grant
|
2011 | View | How Mobile Technology is Changing Our Culture |
Pinchot, Paullet, Rota
|
2023 | View | Short Stay Healthcare Quality in Skilled Nursing Facilities: Occupancy, Nurse Staff Mix, and COVID-19
|
Winston, Xiong, Medlin, Pelaez
|
2009 | View | A Study of the Information Technology Trade between the United States and the Dominican Republic-Central America Free Trade Agreement Nations |
Pena, Aguirre, Saenz, Koong, Liu
|
2021 | View | Enhancing Learning Analytics: The Rise of Institutional Research |
Perkins, Ariyachandra
|
2015 | View | On Adapting a War-Gaming Discrete Event Simulator with Big Data and Geospatial Modeling Toward a Predictive Model Ecosystem for Interpersonal Violence |
Mhlanga, Perry, Kirchner
|
2024 | View | Investigating the Relationship between Developer Job Satisfaction and Life Satisfaction: A Global Analysis |
Peslak, Ceccucci, Jones, Leonard
|
2024 | View | Social Media Users Only Have Two Clusters: A United States Analysis |
Peslak, Kovalchick, Menon
|
2023 | View | The Effect of Mental Illness on Compensation for IT Developers |
Peslak, Ceccucci, Jones, Leonard
|
2022 | View | The COVID-19 Pandemic’s Impact on Information Technology Employment, Salaries, and Career Opportunities |
Sendall, Peslak, Ceccucci, Hunsinger
|
2021 | View | Job and Career Satisfaction of Software Engineers |
Peslak, Ceccucci, Sendall
|
2021 | View | Open Source Software: A Detailed Analysis of Contributions and Quality |
Peslak, Hunsinger
|
2020 | View | A Longitudinal Study of Google Privacy Policies |
Peslak, Kovalchick, Conforti
|
2018 | View | Facebook Fanatics: A Linguistic and Sentiment Analysis of the Most “Fanned” Facebook Pages |
Peslak
|
2018 | View | Text Messaging Today: A Longitudinal Study of Variables Influencing Text Messaging from 2009 to 2016 |
Peslak, Hunsinger, Kruck
|
2017 | View | Sentiment Analysis and Opinion Mining: Current State of the Art and Review of Google and Yahoo Search Engines’ Privacy Policies |
Peslak
|
2016 | View | An Expanded Analysis of Internet Dependencies by Demographic Variables |
Peslak
|
2014 | View | A Study of Information Technology Operating and Capital Expenditures and Their Effect on Positive Firm Outcomes |
Peslak
|
2012 | View | An Empirical Study of Social Networking Behavior Using Theory of Reasoned Action |
Peslak, Ceccucci, Sendall
|
2012 | View | Does Size Matter in IT? An exploratory analysis of critical issues facing organizations based on company size |
Peslak
|
2011 | View | A Study of Information Technology Integration |
Peslak
|
2010 | View | An Empirical Study of Instant Messaging Behavior Using Diffusion of Innovation Theory |
Peslak, Ceccucci, Sendall
|
2010 | View | An Empirical Study of Text Messaging Behavioral Intention and Usage |
Peslak, Ceccucci, Sendall
|
2017 | View | A Multi-Criteria Network Assessment Model of IT Offshoring Risks from Service Provider's Perspective |
Petkov, Petkova
|
2012 | View | Social Networking Systems and Campus Life |
Sgambato, Petkov, Wolf
|
2010 | View | On Design Science, MCDM, and Outsourcing Decision Making |
Petkov, Petkova
|
2017 | View | A Multi-Criteria Network Assessment Model of IT Offshoring Risks from Service Provider's Perspective |
Petkov, Petkova
|
2010 | View | On Design Science, MCDM, and Outsourcing Decision Making |
Petkov, Petkova
|
2014 | View | Information Security in Nonprofits: A First Glance at the State of Security in Two Illinois Regions |
Imboden, Phillips, Seib, Fiorentino
|
2012 | View | The Effects of Interruptions on Remembering Task Information |
Lenox, Pilarski, Leathers
|
2024 | View | Mobile Technology Has Changed Our Culture |
Paullet, Pinchot
|
2023 | View | Are Companies Responsible for Internet of Things (IoT) Data Privacy? A Survey of IoT User Perceptions |
Paullet, Pinchot, Chawdhry
|
2021 | View | Privacy Concerns and Data Sharing Habits of Personal Fitness Information Collected via Activity Trackers |
Pinchot, Cellante
|
2015 | View | Use of Preventative Measures to Protect Data Privacy on Mobile Devices |
Pinchot, Paullet
|
2012 | View | Talk to Text: Changing Communication Patterns |
Pinchot, Douglas, Paullet, Rota
|
2011 | View | How Mobile Technology is Changing Our Culture |
Pinchot, Paullet, Rota
|
2020 | View | An Empirical Study of Post-Production Software Code Quality When Employing the Agile Rapid Delivery Methodology |
Poe, Seeman
|
2024 | View | Resilience During Times of Disruption: The Role of Data Analytics in a Healthcare System |
Pohana, Ariyachandra
|
2020 | View | Privacy Considerations Throughout the Data Life Cycle |
Pomykalski
|
2021 | View | An International Review and Study on Perceptions of Security, Adoption, and Implementation of Electronic Health Records |
Aliyu, Wimmer, Powell, Rebman Jr.
|
2021 | View | Documenting the Process of Hijacking a Raspberry Pi User Login Credentials via Remote Code Execution |
Patel, Wimmer, Powell
|
2019 | View | Effects of Normalization Techniques on Logistic Regression in Data Science |
Adeyemo, Wimmer, Powell
|
2016 | View | A Comparison of Open Source Tools for Data Science |
Wimmer, Powell
|
2015 | View | Cyberbullying or normal game play? Impact of age, gender, and experience on cyberbullying in multi-player online gaming environments: Perceptions from one gaming forum |
Fryling, Cotler, Rivituso, Mathews, Pratico
|
2013 | View | Comparing Performance of Web Service Interaction Styles: SOAP vs. REST |
Kumar, Ahuja, Umapathy, Prodanoff
|
2009 | View | Research Design for a Natural Disaster Management Communication System: Local Indiana Government Agency Model |
Nicolai, Puntillo, Bilow
|