Institution | Year Pub | Article | Title | Authors |
Saginaw Valley State University | 2011 | View | Password Security Risk versus Effort: An Exploratory Study on User-Perceived Risk and the Intention to Use Online Applications |
Gebauer, Kline, He
|
Saint Francis University | 2020 | View | Addressing issues with EMR resulting in workarounds: An exploratory study
|
Mishra, Slonka, Draus, Bromall, Slonka
|
Saint Joseph's University | 2010 | View | The Results of Implementing a Knowledge Management Initiative to Enhance Network Access Controls |
Kim, Nelson
|
Seton Hill University | 2010 | View | Women's Technology Acceptance of Mentoring on the Internet |
Gibson, GIBSON
|
Siena College | 2023 | View | Measuring Learners’ Cognitive Load When Engaged with an Algorithm Visualization Tool |
Fathi, Teresco, Regan
|
Siena College | 2017 | View | Causes of cyberbullying in multi-player online gaming environments: Gamer perceptions |
Cotler, Fryling, Rivituso
|
Siena College | 2015 | View | Cyberbullying or normal game play? Impact of age, gender, and experience on cyberbullying in multi-player online gaming environments: Perceptions from one gaming forum |
Fryling, Cotler, Rivituso, Mathews, Pratico
|
Siena College | 2015 | View | ERP Customization vs. Business Process Reengineering: Technical and Functional Perceptions |
Fryling
|
Siena College | 2013 | View | Rocky Relationships: Enterprise Resource Planning and Supply Chain Management |
Crumbly, Fryling
|
Slippery Rock University | 2012 | View | Open Source Software in the Vertical Market: an Open Niche? |
Conlon
|
Smith College | 2023 | View | Measuring Learners’ Cognitive Load When Engaged with an Algorithm Visualization Tool |
Fathi, Teresco, Regan
|
Southeast Missouri State University | 2011 | View | Development of an Evaluation Model for XBRL-enabled Tools Intended for Investors |
Clements, Schwieger, Surendran
|
Southern Connecticut State University | 2023 | View | Impact of Emergent Technologies on US Workforce: Exploratory Analysis |
Toskin
|
Southern Illinois University | 2014 | View | Information Security in Nonprofits: A First Glance at the State of Security in Two Illinois Regions |
Imboden, Phillips, Seib, Fiorentino
|
Southern Polytechnic State University | 2010 | View | Teaching Knowledge Management (KM) in Criminal Justice Education: The Influence of Information Systems |
Conn, Thies
|
Southern University at New Orleans | 2010 | View | Contingency Planning: Disaster Recovery Strategies for Successful Educational Continuity |
Omar, Udeh, Mantha
|
St. Mary's University | 2014 | View | Performance and Corporate Social Responsibility in the Information Technology Industry |
Cowan, Parzinger, Welch, Welch
|
State University of New York - Buffalo | 2023 | View | Measuring Learners’ Cognitive Load When Engaged with an Algorithm Visualization Tool |
Fathi, Teresco, Regan
|
State University of New York at Cobleskill | 2017 | View | Causes of cyberbullying in multi-player online gaming environments: Gamer perceptions |
Cotler, Fryling, Rivituso
|
State University of New York at Cobleskill | 2015 | View | Cyberbullying or normal game play? Impact of age, gender, and experience on cyberbullying in multi-player online gaming environments: Perceptions from one gaming forum |
Fryling, Cotler, Rivituso, Mathews, Pratico
|
SUNY Brockport | 2024 | View | Integrating Virtual and Augmented Reality with Brain-Computer Interfaces for ADHD and ASD Management: A Preliminary Review |
Streeter, Li, Li, Zhang, Tian, He
|
Susquehanna University | 2020 | View | Privacy Considerations Throughout the Data Life Cycle |
Pomykalski
|