| Keyword | Year Pub | Article | Title | Authors |
| campus crime | 2020 | View | Understanding Campus Crime with a Multi-University Analytics System |
Iheadindu, Kline, Vetter, Clark
|
| campus life | 2012 | View | Social Networking Systems and Campus Life |
Sgambato, Petkov, Wolf
|
| capital expenditures | 2014 | View | A Study of Information Technology Operating and Capital Expenditures and Their Effect on Positive Firm Outcomes |
Peslak
|
| Case studies | 2008 | View | The Importance of Business Process Alignment for IT Project Management of Commercial Software with Case Studies |
Kraft
|
| Case study | 2025 | View | User Experiences in a RAG-Empowered Application |
Kise, Chung
|
| Case study | 2023 | View | Influence of Reporting structure and Perception of Role of Information Technology on Decision-making: A Qualitative Study |
Pandey, Mishra
|
| Case study | 2021 | View | Case Study of Blockchain Applications in Supply Chain Management- Opportunities and Challenges |
Smith, Xiong, Medlin
|
| Case study | 2021 | View | Does the Executive Perception of the Value of Information Technology (IT) Influence the IT strategy? A Case Study |
Pandey, Mishra
|
| Case study | 2021 | View | Interpreting Organizational Security Governance Objectives for Strategic Security Planning |
Mishra
|
| Case study | 2020 | View | An Empirical Study of Post-Production Software Code Quality When Employing the Agile Rapid Delivery Methodology |
Poe, Seeman
|
| Case study | 2013 | View | The Impact of Regulatory Changes on IS Strategy: An Exploratory Study |
Reinicke, Ward
|
| cell phones | 2012 | View | Talk to Text: Changing Communication Patterns |
Pinchot, Douglas, Paullet, Rota
|
| cell phones | 2011 | View | How Mobile Technology is Changing Our Culture |
Pinchot, Paullet, Rota
|
| census datasets | 2025 | View | Affordable Housing in Florida: Systematic Literature Review and Exploratory County-Level Data Analysis |
Kulkarni, Kothareddy, Umapathy
|
| Central limit theorem | 2013 | View | Early Stage Probabilistic Software Project Schedule Estimation |
Kwon, Hammell II
|
| Certifications | 2023 | View | An Exploration of the Benefits of Certifications and their Relationship to Salaries in IS/IT |
Matthews, Cummings, Janicki
|
| Chatbot | 2025 | View | Action Research to Enhance Enterprise-Specific Chatbot (ESCB) Security & Performance
|
Wood, Stoker
|
| Chatbot | 2024 | View | An Action Research Approach to Building an Enterprise-Specific Chatbot (ESCB) |
Wood, Stoker
|
| ChatGPT | 2025 | View | A Proposed Study of Factors Moderating Degree of Trust in LLM and ChatGPT-like Outputs |
Money, Thanetsunthorn
|
| Classification | 2023 | View | Identification of Stressed Wolf Populations Based on Hormone Levels Using Support Vector Machines (SVM) |
Stewart, Davis
|
| client-server systems | 2013 | View | Creating an Audio Conferencing Application |
Sun, Vetter, Reinicke
|
| Cloud | 2022 | View | A Scalable Amazon Review Collection System |
Woodall, Kline, Vetter, Modaresnezhad
|
| Cloud computing | 2023 | View | A Predictive Unmanned Aerial Vehicle Maintenance Method: Using Low-Code and Cloud-Based Data Visualization
|
Kim, Chung, Ju, Maeng
|
| Cloud computing | 2022 | View | A Comparison of Internationalization and Localization Solutions for Web and Mobile Applications |
Wang, Chung, Yoon
|
| Cloud computing | 2018 | View | Cloud Computing: Implications for Information Systems Development Service Providers and Practitioners |
Mew, Money
|
| Cloud computing | 2018 | View | Exploratory Study of Organizational Adoption of Cloud based Big Data Analytics |
Ghosh
|
| Cloud computing | 2017 | View | The Effects of Perceived Functionality and Usability on Privacy and Security Concerns about Adopting Cloud Applications |
Nakayama, Chen, Taylor
|
| Cloud computing | 2015 | View | A Cloud Computing Methodology Study of Platform-as-a-Service (PaaS) in the Financial Industry |
Lawler, Howell-Barber, Joseph
|
| Cloud computing | 2014 | View | A Feasibility Study of Platform-as-a-Service Using Cloud Computing for a Global Service Organization |
Gai, Steenkamp
|
| Cloud computing | 2014 | View | A Study of Cloud Computing Infrastructure-as-a-Service (IaaS) in Financial Firms |
Lawler, Howell-Barber, Joseph, Narula
|
| Cloud computing | 2013 | View | A Study of Cloud Computing Software-as-a-Service (SaaS) in Financial Firms |
Lawler, Howell-Barber, Desai, Joseph
|
| Cloud computing | 2013 | View | Let’s Look at the Cloud from a Risk Management Perspective |
Vignos, Kim, Metzer
|
| Cloud computing | 2012 | View | Using the cloud: Keeping Enterprise Data Private |
Cronin, Pauli, Ham
|
| Cloud computing | 2011 | View | The Potential Reality of Service-Oriented Architecture (SOA) in a Cloud Computing Strategy |
Lawler
|
| cloud deployment methods | 2014 | View | A Study of Cloud Computing Infrastructure-as-a-Service (IaaS) in Financial Firms |
Lawler, Howell-Barber, Joseph, Narula
|
| Cloud, Apps | 2015 | View | Identifying User Behavior from Residual Data in Cloud-based Synchronized Apps |
Grispos, Glisson, Pardue, Dickson
|
| Cloud-Based | 2023 | View | Impact of Emergent Technologies on US Workforce: Exploratory Analysis |
Toskin
|
| Cloud-Based Predictive UAV Maintenance Method | 2023 | View | A Predictive Unmanned Aerial Vehicle Maintenance Method: Using Low-Code and Cloud-Based Data Visualization
|
Kim, Chung, Ju, Maeng
|
| Cluster analysis | 2024 | View | Social Media Users Only Have Two Clusters: A United States Analysis |
Peslak, Kovalchick, Menon
|
| CMMC | 2022 | View | Cybersecurity Maturity Model Certification Initial Impact on the Defense Industrial Base
|
Strohmier, Stoker, Vanajakumari, Clark, Cummings, Modaresnezhad
|
| CNN image classifier | 2023 | View | Optimizing a Convolutional Neural Network Model in Amazon SageMaker for an Autism Detection Tool, EZ Autism Screener |
Ata, Chung, Maeng
|
| Co-Creation | 2012 | View | Co-Creating Value in Systems Development: A Shift towards Service-Dominant Logic |
Babb, Keith
|
| code quality | 2020 | View | An Empirical Study of Post-Production Software Code Quality When Employing the Agile Rapid Delivery Methodology |
Poe, Seeman
|
| Cognitive load | 2023 | View | Measuring Learners’ Cognitive Load When Engaged with an Algorithm Visualization Tool |
Fathi, Teresco, Regan
|
| Collaboration | 2010 | View | An Exploratory Study of Relationships between Workforce Characteristics |
Totterdale
|
| colleges/universities | 2022 | View | Analysis of Security Features and Vulnerabilities in Public/Open Wi-Fi |
James
|
| Commercial Drones | 2019 | View | Security, Privacy, and Legislation Issues related to Commercial Drone Deliveries |
Vannoy, Medlin
|
| commercial software | 2008 | View | The Importance of Business Process Alignment for IT Project Management of Commercial Software with Case Studies |
Kraft
|
| Commitment | 2018 | View | An Exploratory Analysis of Gender Differences in IT Project Commitment, Continuation, and Escalation |
Korzaan, Harris, Brooks
|
| Communication | 2024 | View | Mobile Technology Has Changed Our Culture |
Paullet, Pinchot
|
| Communication | 2012 | View | Talk to Text: Changing Communication Patterns |
Pinchot, Douglas, Paullet, Rota
|
| Communication | 2011 | View | How Mobile Technology is Changing Our Culture |
Pinchot, Paullet, Rota
|
| Communication System | 2009 | View | Research Design for a Natural Disaster Management Communication System: Local Indiana Government Agency Model |
Nicolai, Puntillo, Bilow
|
| Communication Technology | 2010 | View | A Study of the Perceptions of Students on Privacy and Security on Social Networking Sites (SNS) on the Internet |
Lawler, Molluzzo
|
| Community Health | 2020 | View | Developing a GIS Dashboard Tool to Inform Non-Profit Hospitals of Community Health Needs at the Neighborhood Level |
Copello, Smith, Mease, Umapathy, Richard, Knight, Albertie, Hamadi, Spaulding, Apatu
|
| community informatics | 2012 | View | Social Networking Systems and Campus Life |
Sgambato, Petkov, Wolf
|
| Community Type | 2016 | View | An Expanded Analysis of Internet Dependencies by Demographic Variables |
Peslak
|
| company size | 2012 | View | Does Size Matter in IT? An exploratory analysis of critical issues facing organizations based on company size |
Peslak
|
| Comparison case study | 2014 | View | Microsoft vs Apple: Which is Great by Choice? |
Sena, Olsen
|
| Compensation | 2023 | View | The Effect of Mental Illness on Compensation for IT Developers |
Peslak, Ceccucci, Jones, Leonard
|
| Competition Theory | 2017 | View | The Effects of Discount Pricing Strategy on Sales of Software-as-a-Service (SaaS):
Online Video Game Market Context |
Choi, Medlin, Hunsinger
|
| competitive advantage | 2013 | View | Building a Competitive Edge through Social Media |
Aimiuwu
|
| compression | 2019 | View | The use of Snap Length in Lossy Network Traffic Compression for Network Intrusion Detection Applications |
Smith, Hammell II
|
| Computer science | 2008 | View | Computing Professional Association Membership: An Exploration of Membership Needs and Motivations |
Ritzhaupt, Umapathy, Jamba
|
| Computer security | 2012 | View | The New Tech Effect: Analyzing Juror Credibility |
Davis, Paullet, Kraeer, Grant
|
| Computing professionals | 2010 | View | Factors that Persuade and Deter Membership in Professional Computing Associations |
Umapathy, Jamba, Ritzhaupt
|
| concept based retrieval | 2012 | View | Study of User Behavior in Image Retrieval and Implications for Content Versus Concept Based Access |
Schultz
|
| Conceptual model | 2016 | View | Driving Inside Sales Performance with Lead Management Systems: A Conceptual Model |
Ohiomah, Benyoucef, Andreev
|
| conceptual solution | 2008 | View | The Importance of Business Process Alignment for IT Project Management of Commercial Software with Case Studies |
Kraft
|
| Conceptualization | 2020 | View | Conceptualization of Blockchain-based Applications: Technical Background and Social Perspective |
Xiong, Tang, Medlin
|
| constant comparative method | 2010 | View | Factors that Persuade and Deter Membership in Professional Computing Associations |
Umapathy, Jamba, Ritzhaupt
|
| Contact Tracing | 2021 | View | Exploring Sentiment Towards Contact Tracing |
Crable, Sena
|
| Content analysis | 2021 | View | Internet of Things (IoT): An Analysis of the Research |
Jourdan, Corley, Ryan, Anderson
|
| Content analysis | 2017 | View | Sentiment Analysis and Opinion Mining: Current State of the Art and Review of Google and Yahoo Search Engines’ Privacy Policies |
Peslak
|
| content based retrieval | 2012 | View | Study of User Behavior in Image Retrieval and Implications for Content Versus Concept Based Access |
Schultz
|
| Contractual Governance | 2016 | View | Governance of Outsourcing: Building a Better Relationship |
Babin, Saunderson
|
| Contractual Governance | 2017 | View | Building Client Vendor Alignment Capability in Strategic Information Systems Outsourcing |
Ghosh
|
| contribution | 2021 | View | Open Source Software: A Detailed Analysis of Contributions and Quality |
Peslak, Hunsinger
|
| control | 2025 | View | A Proposed Study of Factors Moderating Degree of Trust in LLM and ChatGPT-like Outputs |
Money, Thanetsunthorn
|
| Controls | 2020 | View | Examining Organizational Security Governance (OSG) Objectives: How is strategic planning for Security is undertaken at ABC Corporation? |
Mishra
|
| Coral | 2025 | View | A Comparison of Large Language Models for Oncology Clinical Text Summarization |
Izuchukwu , Wimmer, Rebman Jr.
|
| corporate social responsibility | 2014 | View | Performance and Corporate Social Responsibility in the Information Technology Industry |
Cowan, Parzinger, Welch, Welch
|
| corpus linguistics | 2014 | View | Decision-Making via Visual Analysis using the Natural Language Toolkit and R |
Jafar, Babb, Dana
|
| COTS | 2008 | View | The Importance of Business Process Alignment for IT Project Management of Commercial Software with Case Studies |
Kraft
|
| country development | 2013 | View | Global Diffusion of Virtual Social Networks: A Pyramid Model of Cultural, Developmental and Regulatory Foundations |
Wang, Sun
|
| Course Selection | 2025 | View | Thirty-time Speed-up for Course Selecting by Using the Power of Machine |
Li, Yuan, Nobel
|
| Covid | 2025 | View |
Are Employers Resistant to Change the Traditional Work Environment? A Pilot Study of Employer Perceptions on Remote Work and a Shortened Work Weeks
|
Kim, Harker, Breese
|
| Covid | 2022 | View | The COVID-19 Pandemic’s Impact on Information Technology Employment, Salaries, and Career Opportunities |
Sendall, Peslak, Ceccucci, Hunsinger
|
| COVID-19 | 2024 | View | Insights for the next viral outbreak: An information systems applied research based on lessons from COVID-19 |
D'Souza, Mishra
|
| COVID-19 | 2023 | View | Short Stay Healthcare Quality in Skilled Nursing Facilities: Occupancy, Nurse Staff Mix, and COVID-19
|
Winston, Xiong, Medlin, Pelaez
|
| COVID-19 | 2022 | View | The COVID-19 Pandemic’s Impact on Information Technology Employment, Salaries, and Career Opportunities |
Sendall, Peslak, Ceccucci, Hunsinger
|
| COVID-19 | 2021 | View | Exploring Sentiment Towards Contact Tracing |
Crable, Sena
|
| creative writing | 2020 | View | Literary Analysis Tool: Text Analytics for Creative Writers |
Grimsman, Kline, Vetter, Guinn
|
| Credibility | 2025 | View | A Proposed Study of Factors Moderating Degree of Trust in LLM and ChatGPT-like Outputs |
Money, Thanetsunthorn
|
| Credit Card Fraud | 2025 | View | A Comparative Analysis of Oversampling Methods for Predicting Credit Card Default with Logistic Regression |
Tourt, Booker, Rebman Jr., Jin
|
| critical issues | 2012 | View | Does Size Matter in IT? An exploratory analysis of critical issues facing organizations based on company size |
Peslak
|
| Critical success factors | 2017 | View | Identifying the Critical Success Factors for Information Systems to Manage Sponsored Research Activities at Institutions of Higher Education |
Lehman, Ruzich
|
| Cross-Site Scripting (XSS) | 2023 | View | A Comparative Analysis of Web Application Vulnerability Tools |
Garcia, Abraham, Kepic, Cankaya
|
| Crowdsourcing | 2017 | View | Crowdsourcing Surveys: Alternative Approaches to Survey Collection |
Cummings, Sibona
|
| Cryptocurrency | 2025 | View | CryptoProphet: Building a Cryptocurrency Portfolio App with Integrated Market Predictive Models |
Shewarade, Aly, Yoon, Chung
|
| Cryptocurrency | 2020 | View | Conceptualization of Blockchain-based Applications: Technical Background and Social Perspective |
Xiong, Tang, Medlin
|
| CSR | 2008 | View | Assessing the Role of CSR in Outsourcing Decisions |
Babin
|
| Culture | 2024 | View | Mobile Technology Has Changed Our Culture |
Paullet, Pinchot
|
| Culture | 2011 | View | How Mobile Technology is Changing Our Culture |
Pinchot, Paullet, Rota
|
| Culture | 2009 | View | Cross-Cultural View of Handheld Wireless Media Usage |
Lind, Anyansi-Archibong, Anyansi
|
| Curriculum design | 2010 | View | A Study of the Perceptions of Students on Privacy and Security on Social Networking Sites (SNS) on the Internet |
Lawler, Molluzzo
|
| customer interaction | 2013 | View | Building a Competitive Edge through Social Media |
Aimiuwu
|
| Customer satisfaction | 2013 | View | Building a Competitive Edge through Social Media |
Aimiuwu
|
| Customer satisfaction | 2012 | View | Most Popular Package Design |
Miah
|
| Customization | 2015 | View | ERP Customization vs. Business Process Reengineering: Technical and Functional Perceptions |
Fryling
|
| Cyber | 2022 | View | Security Control Techniques: Cybersecurity & Medical Wearable Devices |
Sambasivam, Deal
|
| cyber abuse | 2017 | View | Causes of cyberbullying in multi-player online gaming environments: Gamer perceptions |
Cotler, Fryling, Rivituso
|
| cyber abuse | 2015 | View | Cyberbullying or normal game play? Impact of age, gender, and experience on cyberbullying in multi-player online gaming environments: Perceptions from one gaming forum |
Fryling, Cotler, Rivituso, Mathews, Pratico
|
| Cyber Security | 2021 | View | Documenting the Process of Hijacking a Raspberry Pi User Login Credentials via Remote Code Execution |
Patel, Wimmer, Powell
|
| Cyber Security | 2019 | View | Adversarial Machine Learning for Cyber Security |
De Lucia, Cotton
|
| Cyber Security | 2015 | View | Cyber Security Best Practices: What to do? |
Kleinberg, Reinicke, Cummings
|
| Cyber-Bullying | 2010 | View | A Study of the Perceptions of Students on Privacy and Security on Social Networking Sites (SNS) on the Internet |
Lawler, Molluzzo
|
| Cyber-Stalking | 2010 | View | A Study of the Perceptions of Students on Privacy and Security on Social Networking Sites (SNS) on the Internet |
Lawler, Molluzzo
|
| cyberbullying | 2017 | View | Causes of cyberbullying in multi-player online gaming environments: Gamer perceptions |
Cotler, Fryling, Rivituso
|
| cyberbullying | 2015 | View | Cyberbullying or normal game play? Impact of age, gender, and experience on cyberbullying in multi-player online gaming environments: Perceptions from one gaming forum |
Fryling, Cotler, Rivituso, Mathews, Pratico
|
| Cybersecurity | 2021 | View | Towards a Leader-Driven Supply Chain Cybersecurity Framework |
Vanajakumari, Mittal, Stoker, Clark, Miller
|
| Cybersecurity Maturity Model Certification | 2022 | View | Cybersecurity Maturity Model Certification Initial Impact on the Defense Industrial Base
|
Strohmier, Stoker, Vanajakumari, Clark, Cummings, Modaresnezhad
|
| cybersecurity risks | 2023 | View | QR Code Hacking – Detecting Multiple Vulnerabilities in Android Scanning Software |
Homan, Breese
|