Search by Keyword

Search returned 72 items for : A

KeywordYear PubArticleTitleAuthors
academic library2020ViewAn Exploratory Study of the Perceptions of Library Faculty and Patrons on Library Resources Herman, Wimmer, Rebman Jr.
Access control.2010ViewThe Results of Implementing a Knowledge Management Initiative to Enhance Network Access Controls Kim, Nelson
Accessibility2009ViewThe Accessibility of College and University Home Pages DiLallo, Siegfried
accounting measures2014ViewPerformance and Corporate Social Responsibility in the Information Technology Industry Cowan, Parzinger, Welch, Welch
Action research2024ViewAn Action Research Approach to Building an Enterprise-Specific Chatbot (ESCB) Wood, Stoker
activity trackers2021ViewPrivacy Concerns and Data Sharing Habits of Personal Fitness Information Collected via Activity Trackers Pinchot, Cellante
ad blockers2017ViewMalvertising - A Rising Threat To The Online Ecosystem Dwyer, Kanguri
ADHD2024ViewIntegrating Virtual and Augmented Reality with Brain-Computer Interfaces for ADHD and ASD Management: A Preliminary Review Streeter, Li, Li, Zhang, Tian, He
adoption2022ViewDeterminants of Health Professionals’ Intention to Adopt Electronic Health Record Systems Du, Sturgill
adoption2021ViewOpen Source Software: A Detailed Analysis of Contributions and Quality Peslak, Hunsinger
adoption2017ViewFinding the “Radicalness” in Radical Innovation Adoption Sharma, Thomas, Konsynski
adoption2014ViewLooking Backwards to Look Ahead: Lessons from Barcode Adoption for RFID Adoption and Implementation Sharma, Thomas
adoption2010ViewSystem Development Methodology Usage in Industry: A Review and Analysis Griffin, Brandyberry
Adversarial Machine Learning2019ViewAdversarial Machine Learning for Cyber Security De Lucia, Cotton
Affect2013ViewWhat Influences Students to Use Dropbox? Hunsinger, Corley
Affect2012ViewGoogle Chrome and the Paradigm Shifts in the Browser Market Among Users Corley, Hunsinger
Age2016ViewAn Expanded Analysis of Internet Dependencies by Demographic Variables Peslak
aggression2017ViewCauses of cyberbullying in multi-player online gaming environments: Gamer perceptions Cotler, Fryling, Rivituso
Agile2020ViewAn Empirical Study of Post-Production Software Code Quality When Employing the Agile Rapid Delivery Methodology Poe, Seeman
Agile2012ViewCo-Creating Value in Systems Development: A Shift towards Service-Dominant Logic Babb, Keith
agile development methodology2012ViewCMobile: A Mobile Photo Capture Application for Construction Imaging Martin, Vetter, Brown, Janicki
AHP2017ViewA Multi-Criteria Network Assessment Model of IT Offshoring Risks from Service Provider's Perspective Petkov, Petkova
AHP2010ViewOn Design Science, MCDM, and Outsourcing Decision Making Petkov, Petkova
AI2024ViewAn Action Research Approach to Building an Enterprise-Specific Chatbot (ESCB) Wood, Stoker
AITP2010ViewFactors that Persuade and Deter Membership in Professional Computing Associations Umapathy, Jamba, Ritzhaupt
AITP2008ViewComputing Professional Association Membership: An Exploration of Membership Needs and Motivations Ritzhaupt, Umapathy, Jamba
AJAX2010ViewCreating the Pilot AJAX Enabled Query Tool Ford, Dollinger
AJAX2010ViewSuperfund Site Analysis Using Web 2.0 Technologies Anderson, Jafar, Rogers
algorithm2015ViewMeasuring Algorithm Performance With Java: Patterns of Variation McMaster, Sambasivam, Wolthuis
algorithm2012ViewMaximizing Visibility in Skylines Miah
algorithm2012ViewMost Popular Package Design Miah
Algorithm visualization2023ViewMeasuring Learners’ Cognitive Load When Engaged with an Algorithm Visualization Tool Fathi, Teresco, Regan
Alignment2017ViewBuilding Client Vendor Alignment Capability in Strategic Information Systems Outsourcing Ghosh
Amazon Mechanical Turk2017ViewCrowdsourcing Surveys: Alternative Approaches to Survey Collection Cummings, Sibona
Amazon Reviews2022ViewA Scalable Amazon Review Collection System Woodall, Kline, Vetter, Modaresnezhad
analytic model2024ViewWest Nile Virus in Colorado: Analytic and Geospatial Models of the Virus in Colorado Snyder
analytics2022ViewUsing Analytics to understand Performance and Wellness for a Women’s College Soccer Team Njunge, Witman, Holmberg, Canacoo
analytics2021ViewEnhancing Learning Analytics: The Rise of Institutional Research Perkins, Ariyachandra
analytics2020ViewTrash to Treasure: Predicting Landfill Gas Flow to Optimize Electricity Generation Hassler, Emery, Hoyle, Cazier
analytics2020ViewUnderstanding Campus Crime with a Multi-University Analytics System Iheadindu, Kline, Vetter, Clark
analytics2019ViewStandardizing Public Utility Data: A Case Study of a Rural Mid-Size Utility Hassler, Cazier, Russell, Mueller, Paprocki
analytics2018ViewMinimalism in Data Visualization: Perceptions of Beauty, Clarity, Effectiveness, and Simplicity Hill, Wray, Sibona
analytics maturity2023ViewMeasuring Analytics Maturity and Culture: The LDIS+™ Analytics Impact Framework Fowler, Sambasivam
analytics tools2024ViewTools for Success: Their Impact on Salaries in the Data Analytics Job Market Hartzel, Ozturk
Android Development2013ViewCreating an Audio Conferencing Application Sun, Vetter, Reinicke
Android smartphones2023ViewQR Code Hacking – Detecting Multiple Vulnerabilities in Android Scanning Software Homan, Breese
anomaly detection2017ViewProposal for Kelly Criterion-Inspired Lossy Network Compression for Network Intrusion Applications Smith, Hammell II
ANP2017ViewA Multi-Criteria Network Assessment Model of IT Offshoring Risks from Service Provider's Perspective Petkov, Petkova
APACHE2008ViewComparison of Dynamic Web Content Processing Language Performance Under a LAMP Architecture Jafar, Anderson, Abdullat
Apiary Management2021ViewThe Sting of Adoption: The Technology Acceptance Model (TAM) with Actual Usage in a Hazardous Environment Hassler, MacDonald, Cazier, Wilkes
Apple vs Microsoft2014ViewMicrosoft vs Apple: Which is Great by Choice? Sena, Olsen
application privacy2018ViewWhat’s “Appening” to our Privacy? A Students Perspective on Downloading Mobile Apps Paullet, Chawdhry, Douglas, Compomizzi
Apps2018ViewWhat’s “Appening” to our Privacy? A Students Perspective on Downloading Mobile Apps Paullet, Chawdhry, Douglas, Compomizzi
Apps2017ViewDownloading Mobile Applications - Are Students Protecting Themselves Chawdhry, Paullet, Douglas, Compomizzi
Artificial intelligence2023ViewImpact of Emergent Technologies on US Workforce: Exploratory Analysis Toskin
Artificial intelligence2023ViewText Prediction Using Artificial Intelligence: An Analysis of Two Text Prediction Systems Wimmer, Du, Heri
Artificial intelligence2022ViewCombating Private Blockchain Fraud: A Virtual Reality & Artificial Intelligence Model Aimiuwu
Artificial Neural Networks2014ViewPredicting the Terminal Ballistics of Kinetic Energy Projectiles Using Artificial Neural Networks Auten, Hammell II
ASD2024ViewIntegrating Virtual and Augmented Reality with Brain-Computer Interfaces for ADHD and ASD Management: A Preliminary Review Streeter, Li, Li, Zhang, Tian, He
attitude2010ViewSpyware: What Influences College Students to Use Anti-Spyware Tools? Ward, Hunsinger
attitudes2014ViewDeveloping a Semantic Differential Scale for Measuring Users’ Attitudes toward Sensor based Decision Support Technologies for the Environment. Ajani, Stork
Augmented reality2024ViewIntegrating Virtual and Augmented Reality with Brain-Computer Interfaces for ADHD and ASD Management: A Preliminary Review Streeter, Li, Li, Zhang, Tian, He
autism detection2023ViewOptimizing a Convolutional Neural Network Model in Amazon SageMaker for an Autism Detection Tool, EZ Autism Screener Ata, Chung, Maeng
autism facial features2023ViewOptimizing a Convolutional Neural Network Model in Amazon SageMaker for an Autism Detection Tool, EZ Autism Screener Ata, Chung, Maeng
autism facial recognition2023ViewOptimizing a Convolutional Neural Network Model in Amazon SageMaker for an Autism Detection Tool, EZ Autism Screener Ata, Chung, Maeng
autism screening2023ViewOptimizing a Convolutional Neural Network Model in Amazon SageMaker for an Autism Detection Tool, EZ Autism Screener Ata, Chung, Maeng
Automatic Identification2014ViewLooking Backwards to Look Ahead: Lessons from Barcode Adoption for RFID Adoption and Implementation Sharma, Thomas
automation2021ViewIntegration of Information Systems: Robotic Process Automation Money
AWS2024ViewNetwork Intrusion Detection system with Machine learning Intrusion Detection System with Machine Learning As a Service Kangethe , Wimmer, Rebman Jr.
AWS SageMaker image classifier2023ViewOptimizing a Convolutional Neural Network Model in Amazon SageMaker for an Autism Detection Tool, EZ Autism Screener Ata, Chung, Maeng
Azure2022ViewA Scalable Amazon Review Collection System Woodall, Kline, Vetter, Modaresnezhad
Azure Machine Learing2024ViewNetwork Intrusion Detection system with Machine learning Intrusion Detection System with Machine Learning As a Service Kangethe , Wimmer, Rebman Jr.