Year Pub | Article | Title | Authors |
2022 | View | Harvesting Intrinsically Verifiable Trust: Building a Honey Traceability System for Sustainable Development |
Runzel, Hassler, Hadley, Ratcliffe, Wilkes, Cazier
|
2010 | View | Towards an Abstract Model for Academia and Information Technology Sector Collaborative Partnerships: Responding to the “West Texas Coalition for Innovation and Commercialization” Initiative |
Mhlanga, Vardiman, Reames
|
2024 | View | Network Intrusion Detection system with Machine learning Intrusion Detection System with Machine Learning As a Service |
Kangethe , Wimmer, Rebman Jr.
|
2024 | View | Using Textual Analytics to Process Information Overload of Cyber Security Subreddits |
Omakwu , Wimmer, Rebman Jr.
|
2021 | View | An International Review and Study on Perceptions of Security, Adoption, and Implementation of Electronic Health Records |
Aliyu, Wimmer, Powell, Rebman Jr.
|
2020 | View | An Exploratory Study of the Perceptions of Library Faculty and Patrons on Library Resources |
Herman, Wimmer, Rebman Jr.
|
2023 | View | Measuring Learners’ Cognitive Load When Engaged with an Algorithm Visualization Tool |
Fathi, Teresco, Regan
|
2015 | View | Cyber Security Best Practices: What to do? |
Kleinberg, Reinicke, Cummings
|
2014 | View | Can Social Media aid Software Development? |
Reinicke, Cummings
|
2013 | View | Creating an Audio Conferencing Application |
Sun, Vetter, Reinicke
|
2013 | View | The Impact of Regulatory Changes on IS Strategy: An Exploratory Study |
Reinicke, Ward
|
2011 | View | Creating a Framework for Research on Virtual Organizations |
Reinicke
|
2020 | View | Developing a GIS Dashboard Tool to Inform Non-Profit Hospitals of Community Health Needs at the Neighborhood Level |
Copello, Smith, Mease, Umapathy, Richard, Knight, Albertie, Hamadi, Spaulding, Apatu
|
2010 | View | Factors that Persuade and Deter Membership in Professional Computing Associations |
Umapathy, Jamba, Ritzhaupt
|
2008 | View | Computing Professional Association Membership: An Exploration of Membership Needs and Motivations |
Ritzhaupt, Umapathy, Jamba
|
2017 | View | Causes of cyberbullying in multi-player online gaming environments: Gamer perceptions |
Cotler, Fryling, Rivituso
|
2015 | View | Cyberbullying or normal game play? Impact of age, gender, and experience on cyberbullying in multi-player online gaming environments: Perceptions from one gaming forum |
Fryling, Cotler, Rivituso, Mathews, Pratico
|
2010 | View | Superfund Site Analysis Using Web 2.0 Technologies |
Anderson, Jafar, Rogers
|
2014 | View | A Comparison of Software Testing Using the Object-Oriented Paradigm and Traditional Testing |
Gordon, Roggio
|
2014 | View | Taxonomy of Common Software Testing Terminology: Framework for Key Software Engineering Testing Concepts |
Roggio, Gordon, Comer
|
2014 | View | The De-Escalation of the DHS HSIN Next Gen Project |
Rosenhauer, Korzaan
|
2012 | View | Talk to Text: Changing Communication Patterns |
Pinchot, Douglas, Paullet, Rota
|
2011 | View | How Mobile Technology is Changing Our Culture |
Pinchot, Paullet, Rota
|
2022 | View | Harvesting Intrinsically Verifiable Trust: Building a Honey Traceability System for Sustainable Development |
Runzel, Hassler, Hadley, Ratcliffe, Wilkes, Cazier
|
2019 | View | Standardizing Public Utility Data: A Case Study of a Rural Mid-Size Utility |
Hassler, Cazier, Russell, Mueller, Paprocki
|
2017 | View | Identifying the Critical Success Factors for Information Systems to Manage Sponsored Research Activities at Institutions of Higher Education |
Lehman, Ruzich
|
2021 | View | Internet of Things (IoT): An Analysis of the Research |
Jourdan, Corley, Ryan, Anderson
|