Search by Authors

Search returned 27 items for : R

Year PubArticleTitleAuthors
2022ViewHarvesting Intrinsically Verifiable Trust: Building a Honey Traceability System for Sustainable Development Runzel, Hassler, Hadley, Ratcliffe, Wilkes, Cazier
2010ViewTowards an Abstract Model for Academia and Information Technology Sector Collaborative Partnerships: Responding to the “West Texas Coalition for Innovation and Commercialization” Initiative Mhlanga, Vardiman, Reames
2024ViewNetwork Intrusion Detection system with Machine learning Intrusion Detection System with Machine Learning As a Service Kangethe , Wimmer, Rebman Jr.
2024ViewUsing Textual Analytics to Process Information Overload of Cyber Security Subreddits Omakwu , Wimmer, Rebman Jr.
2021ViewAn International Review and Study on Perceptions of Security, Adoption, and Implementation of Electronic Health Records Aliyu, Wimmer, Powell, Rebman Jr.
2020ViewAn Exploratory Study of the Perceptions of Library Faculty and Patrons on Library Resources Herman, Wimmer, Rebman Jr.
2023ViewMeasuring Learners’ Cognitive Load When Engaged with an Algorithm Visualization Tool Fathi, Teresco, Regan
2015ViewCyber Security Best Practices: What to do? Kleinberg, Reinicke, Cummings
2014ViewCan Social Media aid Software Development? Reinicke, Cummings
2013ViewCreating an Audio Conferencing Application Sun, Vetter, Reinicke
2013ViewThe Impact of Regulatory Changes on IS Strategy: An Exploratory Study Reinicke, Ward
2011ViewCreating a Framework for Research on Virtual Organizations Reinicke
2020ViewDeveloping a GIS Dashboard Tool to Inform Non-Profit Hospitals of Community Health Needs at the Neighborhood Level Copello, Smith, Mease, Umapathy, Richard, Knight, Albertie, Hamadi, Spaulding, Apatu
2010ViewFactors that Persuade and Deter Membership in Professional Computing Associations Umapathy, Jamba, Ritzhaupt
2008ViewComputing Professional Association Membership: An Exploration of Membership Needs and Motivations Ritzhaupt, Umapathy, Jamba
2017ViewCauses of cyberbullying in multi-player online gaming environments: Gamer perceptions Cotler, Fryling, Rivituso
2015ViewCyberbullying or normal game play? Impact of age, gender, and experience on cyberbullying in multi-player online gaming environments: Perceptions from one gaming forum Fryling, Cotler, Rivituso, Mathews, Pratico
2010ViewSuperfund Site Analysis Using Web 2.0 Technologies Anderson, Jafar, Rogers
2014ViewA Comparison of Software Testing Using the Object-Oriented Paradigm and Traditional Testing Gordon, Roggio
2014ViewTaxonomy of Common Software Testing Terminology: Framework for Key Software Engineering Testing Concepts Roggio, Gordon, Comer
2014ViewThe De-Escalation of the DHS HSIN Next Gen Project Rosenhauer, Korzaan
2012ViewTalk to Text: Changing Communication Patterns Pinchot, Douglas, Paullet, Rota
2011ViewHow Mobile Technology is Changing Our Culture Pinchot, Paullet, Rota
2022ViewHarvesting Intrinsically Verifiable Trust: Building a Honey Traceability System for Sustainable Development Runzel, Hassler, Hadley, Ratcliffe, Wilkes, Cazier
2019ViewStandardizing Public Utility Data: A Case Study of a Rural Mid-Size Utility Hassler, Cazier, Russell, Mueller, Paprocki
2017ViewIdentifying the Critical Success Factors for Information Systems to Manage Sponsored Research Activities at Institutions of Higher Education Lehman, Ruzich
2021ViewInternet of Things (IoT): An Analysis of the Research Jourdan, Corley, Ryan, Anderson