Keyword | Year Pub | Article | Title | Authors |
academic library | 2020 | View | An Exploratory Study of the Perceptions of Library Faculty and Patrons on Library Resources |
Herman, Wimmer, Rebman Jr.
|
Access control. | 2010 | View | The Results of Implementing a Knowledge Management Initiative to Enhance Network Access Controls |
Kim, Nelson
|
Accessibility | 2009 | View | The Accessibility of College and University Home Pages |
DiLallo, Siegfried
|
accounting measures | 2014 | View | Performance and Corporate Social Responsibility in the Information Technology Industry |
Cowan, Parzinger, Welch, Welch
|
Action research | 2024 | View | An Action Research Approach to Building an Enterprise-Specific Chatbot (ESCB) |
Wood, Stoker
|
activity trackers | 2021 | View | Privacy Concerns and Data Sharing Habits of Personal Fitness Information Collected via Activity Trackers |
Pinchot, Cellante
|
ad blockers | 2017 | View | Malvertising - A Rising Threat To The Online Ecosystem |
Dwyer, Kanguri
|
ADHD | 2024 | View | Integrating Virtual and Augmented Reality with Brain-Computer Interfaces for ADHD and ASD Management: A Preliminary Review |
Streeter, Li, Li, Zhang, Tian, He
|
adoption | 2022 | View | Determinants of Health Professionals’ Intention to Adopt Electronic Health Record Systems |
Du, Sturgill
|
adoption | 2021 | View | Open Source Software: A Detailed Analysis of Contributions and Quality |
Peslak, Hunsinger
|
adoption | 2017 | View | Finding the “Radicalness” in Radical Innovation Adoption |
Sharma, Thomas, Konsynski
|
adoption | 2014 | View | Looking Backwards to Look Ahead: Lessons from Barcode Adoption for RFID Adoption and Implementation |
Sharma, Thomas
|
adoption | 2010 | View | System Development Methodology Usage in Industry: A Review and Analysis |
Griffin, Brandyberry
|
Adversarial Machine Learning | 2019 | View | Adversarial Machine Learning for Cyber Security |
De Lucia, Cotton
|
Affect | 2013 | View | What Influences Students to Use Dropbox? |
Hunsinger, Corley
|
Affect | 2012 | View | Google Chrome and the Paradigm Shifts in the Browser Market Among Users |
Corley, Hunsinger
|
Age | 2016 | View | An Expanded Analysis of Internet Dependencies by Demographic Variables |
Peslak
|
aggression | 2017 | View | Causes of cyberbullying in multi-player online gaming environments: Gamer perceptions |
Cotler, Fryling, Rivituso
|
Agile | 2020 | View | An Empirical Study of Post-Production Software Code Quality When Employing the Agile Rapid Delivery Methodology |
Poe, Seeman
|
Agile | 2012 | View | Co-Creating Value in Systems Development: A Shift towards Service-Dominant Logic |
Babb, Keith
|
agile development methodology | 2012 | View | CMobile: A Mobile Photo Capture Application for Construction Imaging |
Martin, Vetter, Brown, Janicki
|
AHP | 2017 | View | A Multi-Criteria Network Assessment Model of IT Offshoring Risks from Service Provider's Perspective |
Petkov, Petkova
|
AHP | 2010 | View | On Design Science, MCDM, and Outsourcing Decision Making |
Petkov, Petkova
|
AI | 2024 | View | An Action Research Approach to Building an Enterprise-Specific Chatbot (ESCB) |
Wood, Stoker
|
AITP | 2010 | View | Factors that Persuade and Deter Membership in Professional Computing Associations |
Umapathy, Jamba, Ritzhaupt
|
AITP | 2008 | View | Computing Professional Association Membership: An Exploration of Membership Needs and Motivations |
Ritzhaupt, Umapathy, Jamba
|
AJAX | 2010 | View | Creating the Pilot AJAX Enabled Query Tool |
Ford, Dollinger
|
AJAX | 2010 | View | Superfund Site Analysis Using Web 2.0 Technologies |
Anderson, Jafar, Rogers
|
algorithm | 2015 | View | Measuring Algorithm Performance With Java: Patterns of Variation |
McMaster, Sambasivam, Wolthuis
|
algorithm | 2012 | View | Maximizing Visibility in Skylines |
Miah
|
algorithm | 2012 | View | Most Popular Package Design |
Miah
|
Algorithm visualization | 2023 | View | Measuring Learners’ Cognitive Load When Engaged with an Algorithm Visualization Tool |
Fathi, Teresco, Regan
|
Alignment | 2017 | View | Building Client Vendor Alignment Capability in Strategic Information Systems Outsourcing |
Ghosh
|
Amazon Mechanical Turk | 2017 | View | Crowdsourcing Surveys: Alternative Approaches to Survey Collection |
Cummings, Sibona
|
Amazon Reviews | 2022 | View | A Scalable Amazon Review Collection System |
Woodall, Kline, Vetter, Modaresnezhad
|
analytic model | 2024 | View | West Nile Virus in Colorado: Analytic and
Geospatial Models of the Virus in Colorado
|
Snyder
|
analytics | 2022 | View | Using Analytics to understand Performance and Wellness for a Women’s College Soccer Team |
Njunge, Witman, Holmberg, Canacoo
|
analytics | 2021 | View | Enhancing Learning Analytics: The Rise of Institutional Research |
Perkins, Ariyachandra
|
analytics | 2020 | View | Trash to Treasure: Predicting Landfill Gas Flow to Optimize Electricity Generation |
Hassler, Emery, Hoyle, Cazier
|
analytics | 2020 | View | Understanding Campus Crime with a Multi-University Analytics System |
Iheadindu, Kline, Vetter, Clark
|
analytics | 2019 | View | Standardizing Public Utility Data: A Case Study of a Rural Mid-Size Utility |
Hassler, Cazier, Russell, Mueller, Paprocki
|
analytics | 2018 | View | Minimalism in Data Visualization: Perceptions of Beauty, Clarity, Effectiveness, and Simplicity |
Hill, Wray, Sibona
|
analytics maturity | 2023 | View | Measuring Analytics Maturity and Culture: The LDIS+™ Analytics Impact Framework |
Fowler, Sambasivam
|
analytics tools | 2024 | View | Tools for Success: Their Impact on Salaries in the Data Analytics Job Market |
Hartzel, Ozturk
|
Android Development | 2013 | View | Creating an Audio Conferencing Application |
Sun, Vetter, Reinicke
|
Android smartphones | 2023 | View | QR Code Hacking – Detecting Multiple Vulnerabilities in Android Scanning Software |
Homan, Breese
|
anomaly detection | 2017 | View | Proposal for Kelly Criterion-Inspired Lossy Network Compression for Network Intrusion Applications |
Smith, Hammell II
|
ANP | 2017 | View | A Multi-Criteria Network Assessment Model of IT Offshoring Risks from Service Provider's Perspective |
Petkov, Petkova
|
APACHE | 2008 | View | Comparison of Dynamic Web Content Processing Language Performance Under a LAMP Architecture |
Jafar, Anderson, Abdullat
|
Apiary Management | 2021 | View | The Sting of Adoption: The Technology Acceptance Model (TAM) with Actual Usage in a Hazardous Environment |
Hassler, MacDonald, Cazier, Wilkes
|
Apple vs Microsoft | 2014 | View | Microsoft vs Apple: Which is Great by Choice? |
Sena, Olsen
|
application privacy | 2018 | View | What’s “Appening” to our Privacy?
A Students Perspective on Downloading Mobile Apps
|
Paullet, Chawdhry, Douglas, Compomizzi
|
Apps | 2018 | View | What’s “Appening” to our Privacy?
A Students Perspective on Downloading Mobile Apps
|
Paullet, Chawdhry, Douglas, Compomizzi
|
Apps | 2017 | View | Downloading Mobile Applications - Are Students Protecting Themselves |
Chawdhry, Paullet, Douglas, Compomizzi
|
Artificial intelligence | 2023 | View | Impact of Emergent Technologies on US Workforce: Exploratory Analysis |
Toskin
|
Artificial intelligence | 2023 | View | Text Prediction Using Artificial Intelligence: An Analysis of Two Text Prediction Systems |
Wimmer, Du, Heri
|
Artificial intelligence | 2022 | View | Combating Private Blockchain Fraud: A Virtual Reality & Artificial Intelligence Model
|
Aimiuwu
|
Artificial Neural Networks | 2014 | View | Predicting the Terminal Ballistics of Kinetic Energy Projectiles Using Artificial Neural Networks |
Auten, Hammell II
|
ASD | 2024 | View | Integrating Virtual and Augmented Reality with Brain-Computer Interfaces for ADHD and ASD Management: A Preliminary Review |
Streeter, Li, Li, Zhang, Tian, He
|
attitude | 2010 | View | Spyware: What Influences College Students to Use Anti-Spyware Tools? |
Ward, Hunsinger
|
attitudes | 2014 | View | Developing a Semantic Differential Scale for Measuring Users’ Attitudes toward Sensor based Decision Support Technologies for the Environment. |
Ajani, Stork
|
Augmented reality | 2024 | View | Integrating Virtual and Augmented Reality with Brain-Computer Interfaces for ADHD and ASD Management: A Preliminary Review |
Streeter, Li, Li, Zhang, Tian, He
|
autism detection | 2023 | View | Optimizing a Convolutional Neural Network Model in Amazon SageMaker for an Autism Detection Tool, EZ Autism Screener |
Ata, Chung, Maeng
|
autism facial features | 2023 | View | Optimizing a Convolutional Neural Network Model in Amazon SageMaker for an Autism Detection Tool, EZ Autism Screener |
Ata, Chung, Maeng
|
autism facial recognition | 2023 | View | Optimizing a Convolutional Neural Network Model in Amazon SageMaker for an Autism Detection Tool, EZ Autism Screener |
Ata, Chung, Maeng
|
autism screening | 2023 | View | Optimizing a Convolutional Neural Network Model in Amazon SageMaker for an Autism Detection Tool, EZ Autism Screener |
Ata, Chung, Maeng
|
Automatic Identification | 2014 | View | Looking Backwards to Look Ahead: Lessons from Barcode Adoption for RFID Adoption and Implementation |
Sharma, Thomas
|
automation | 2021 | View | Integration of Information Systems: Robotic Process Automation |
Money
|
AWS | 2024 | View | Network Intrusion Detection system with Machine learning Intrusion Detection System with Machine Learning As a Service |
Kangethe , Wimmer, Rebman Jr.
|
AWS SageMaker image classifier | 2023 | View | Optimizing a Convolutional Neural Network Model in Amazon SageMaker for an Autism Detection Tool, EZ Autism Screener |
Ata, Chung, Maeng
|
Azure | 2022 | View | A Scalable Amazon Review Collection System |
Woodall, Kline, Vetter, Modaresnezhad
|
Azure Machine Learing | 2024 | View | Network Intrusion Detection system with Machine learning Intrusion Detection System with Machine Learning As a Service |
Kangethe , Wimmer, Rebman Jr.
|