Keyword | Year Pub | Article | Title | Authors |
campus crime | 2020 | View | Understanding Campus Crime with a Multi-University Analytics System |
Iheadindu, Kline, Vetter, Clark
|
campus life | 2012 | View | Social Networking Systems and Campus Life |
Sgambato, Petkov, Wolf
|
capital expenditures | 2014 | View | A Study of Information Technology Operating and Capital Expenditures and Their Effect on Positive Firm Outcomes |
Peslak
|
Case studies | 2008 | View | The Importance of Business Process Alignment for IT Project Management of Commercial Software with Case Studies |
Kraft
|
Case study | 2023 | View | Influence of Reporting structure and Perception of Role of Information Technology on Decision-making: A Qualitative Study |
Pandey, Mishra
|
Case study | 2021 | View | Case Study of Blockchain Applications in Supply Chain Management- Opportunities and Challenges |
Smith, Xiong, Medlin
|
Case study | 2021 | View | Does the Executive Perception of the Value of Information Technology (IT) Influence the IT strategy? A Case Study |
Pandey, Mishra
|
Case study | 2021 | View | Interpreting Organizational Security Governance Objectives for Strategic Security Planning |
Mishra
|
Case study | 2020 | View | An Empirical Study of Post-Production Software Code Quality When Employing the Agile Rapid Delivery Methodology |
Poe, Seeman
|
Case study | 2013 | View | The Impact of Regulatory Changes on IS Strategy: An Exploratory Study |
Reinicke, Ward
|
cell phones | 2012 | View | Talk to Text: Changing Communication Patterns |
Pinchot, Douglas, Paullet, Rota
|
cell phones | 2011 | View | How Mobile Technology is Changing Our Culture |
Pinchot, Paullet, Rota
|
Central limit theorem | 2013 | View | Early Stage Probabilistic Software Project Schedule Estimation |
Kwon, Hammell II
|
Certifications | 2023 | View | An Exploration of the Benefits of Certifications and their Relationship to Salaries in IS/IT |
Matthews, Cummings, Janicki
|
Chatbot | 2024 | View | An Action Research Approach to Building an Enterprise-Specific Chatbot (ESCB) |
Wood, Stoker
|
Classification | 2023 | View | Identification of Stressed Wolf Populations Based on Hormone Levels Using Support Vector Machines (SVM) |
Stewart, Davis
|
client-server systems | 2013 | View | Creating an Audio Conferencing Application |
Sun, Vetter, Reinicke
|
Cloud | 2022 | View | A Scalable Amazon Review Collection System |
Woodall, Kline, Vetter, Modaresnezhad
|
Cloud computing | 2023 | View | A Predictive Unmanned Aerial Vehicle Maintenance Method: Using Low-Code and Cloud-Based Data Visualization
|
Kim, Chung, Ju, Maeng
|
Cloud computing | 2022 | View | A Comparison of Internationalization and Localization Solutions for Web and Mobile Applications |
Wang, Chung, Yoon
|
Cloud computing | 2018 | View | Cloud Computing: Implications for Information Systems Development Service Providers and Practitioners |
Mew, Money
|
Cloud computing | 2018 | View | Exploratory Study of Organizational Adoption of Cloud based Big Data Analytics |
Ghosh
|
Cloud computing | 2017 | View | The Effects of Perceived Functionality and Usability on Privacy and Security Concerns about Adopting Cloud Applications |
Nakayama, Chen, Taylor
|
Cloud computing | 2015 | View | A Cloud Computing Methodology Study of Platform-as-a-Service (PaaS) in the Financial Industry |
Lawler, Howell-Barber, Joseph
|
Cloud computing | 2014 | View | A Feasibility Study of Platform-as-a-Service Using Cloud Computing for a Global Service Organization |
Gai, Steenkamp
|
Cloud computing | 2014 | View | A Study of Cloud Computing Infrastructure-as-a-Service (IaaS) in Financial Firms |
Lawler, Howell-Barber, Joseph, Narula
|
Cloud computing | 2013 | View | A Study of Cloud Computing Software-as-a-Service (SaaS) in Financial Firms |
Lawler, Howell-Barber, Desai, Joseph
|
Cloud computing | 2013 | View | Let’s Look at the Cloud from a Risk Management Perspective |
Vignos, Kim, Metzer
|
Cloud computing | 2012 | View | Using the cloud: Keeping Enterprise Data Private |
Cronin, Pauli, Ham
|
Cloud computing | 2011 | View | The Potential Reality of Service-Oriented Architecture (SOA) in a Cloud Computing Strategy |
Lawler
|
cloud deployment methods | 2014 | View | A Study of Cloud Computing Infrastructure-as-a-Service (IaaS) in Financial Firms |
Lawler, Howell-Barber, Joseph, Narula
|
Cloud, Apps | 2015 | View | Identifying User Behavior from Residual Data in Cloud-based Synchronized Apps |
Grispos, Glisson, Pardue, Dickson
|
Cloud-Based | 2023 | View | Impact of Emergent Technologies on US Workforce: Exploratory Analysis |
Toskin
|
Cloud-Based Predictive UAV Maintenance Method | 2023 | View | A Predictive Unmanned Aerial Vehicle Maintenance Method: Using Low-Code and Cloud-Based Data Visualization
|
Kim, Chung, Ju, Maeng
|
Cluster analysis | 2024 | View | Social Media Users Only Have Two Clusters: A United States Analysis |
Peslak, Kovalchick, Menon
|
CMMC | 2022 | View | Cybersecurity Maturity Model Certification Initial Impact on the Defense Industrial Base
|
Strohmier, Stoker, Vanajakumari, Clark, Cummings, Modaresnezhad
|
CNN image classifier | 2023 | View | Optimizing a Convolutional Neural Network Model in Amazon SageMaker for an Autism Detection Tool, EZ Autism Screener |
Ata, Chung, Maeng
|
Co-Creation | 2012 | View | Co-Creating Value in Systems Development: A Shift towards Service-Dominant Logic |
Babb, Keith
|
code quality | 2020 | View | An Empirical Study of Post-Production Software Code Quality When Employing the Agile Rapid Delivery Methodology |
Poe, Seeman
|
Cognitive load | 2023 | View | Measuring Learners’ Cognitive Load When Engaged with an Algorithm Visualization Tool |
Fathi, Teresco, Regan
|
Collaboration | 2010 | View | An Exploratory Study of Relationships between Workforce Characteristics |
Totterdale
|
colleges/universities | 2022 | View | Analysis of Security Features and Vulnerabilities in Public/Open Wi-Fi |
James
|
Commercial Drones | 2019 | View | Security, Privacy, and Legislation Issues related to Commercial Drone Deliveries |
Vannoy, Medlin
|
commercial software | 2008 | View | The Importance of Business Process Alignment for IT Project Management of Commercial Software with Case Studies |
Kraft
|
Commitment | 2018 | View | An Exploratory Analysis of Gender Differences in IT Project Commitment, Continuation, and Escalation |
Korzaan, Harris, Brooks
|
Communication | 2024 | View | Mobile Technology Has Changed Our Culture |
Paullet, Pinchot
|
Communication | 2012 | View | Talk to Text: Changing Communication Patterns |
Pinchot, Douglas, Paullet, Rota
|
Communication | 2011 | View | How Mobile Technology is Changing Our Culture |
Pinchot, Paullet, Rota
|
Communication System | 2009 | View | Research Design for a Natural Disaster Management Communication System: Local Indiana Government Agency Model |
Nicolai, Puntillo, Bilow
|
Communication Technology | 2010 | View | A Study of the Perceptions of Students on Privacy and Security on Social Networking Sites (SNS) on the Internet |
Lawler, Molluzzo
|
Community Health | 2020 | View | Developing a GIS Dashboard Tool to Inform Non-Profit Hospitals of Community Health Needs at the Neighborhood Level |
Copello, Smith, Mease, Umapathy, Richard, Knight, Albertie, Hamadi, Spaulding, Apatu
|
community informatics | 2012 | View | Social Networking Systems and Campus Life |
Sgambato, Petkov, Wolf
|
Community Type | 2016 | View | An Expanded Analysis of Internet Dependencies by Demographic Variables |
Peslak
|
company size | 2012 | View | Does Size Matter in IT? An exploratory analysis of critical issues facing organizations based on company size |
Peslak
|
Comparison case study | 2014 | View | Microsoft vs Apple: Which is Great by Choice? |
Sena, Olsen
|
Compensation | 2023 | View | The Effect of Mental Illness on Compensation for IT Developers |
Peslak, Ceccucci, Jones, Leonard
|
Competition Theory | 2017 | View | The Effects of Discount Pricing Strategy on Sales of Software-as-a-Service (SaaS):
Online Video Game Market Context |
Choi, Medlin, Hunsinger
|
competitive advantage | 2013 | View | Building a Competitive Edge through Social Media |
Aimiuwu
|
compression | 2019 | View | The use of Snap Length in Lossy Network Traffic Compression for Network Intrusion Detection Applications |
Smith, Hammell II
|
Computer science | 2008 | View | Computing Professional Association Membership: An Exploration of Membership Needs and Motivations |
Ritzhaupt, Umapathy, Jamba
|
Computer security | 2012 | View | The New Tech Effect: Analyzing Juror Credibility |
Davis, Paullet, Kraeer, Grant
|
Computing professionals | 2010 | View | Factors that Persuade and Deter Membership in Professional Computing Associations |
Umapathy, Jamba, Ritzhaupt
|
concept based retrieval | 2012 | View | Study of User Behavior in Image Retrieval and Implications for Content Versus Concept Based Access |
Schultz
|
Conceptual model | 2016 | View | Driving Inside Sales Performance with Lead Management Systems: A Conceptual Model |
Ohiomah, Benyoucef, Andreev
|
conceptual solution | 2008 | View | The Importance of Business Process Alignment for IT Project Management of Commercial Software with Case Studies |
Kraft
|
Conceptualization | 2020 | View | Conceptualization of Blockchain-based Applications: Technical Background and Social Perspective |
Xiong, Tang, Medlin
|
constant comparative method | 2010 | View | Factors that Persuade and Deter Membership in Professional Computing Associations |
Umapathy, Jamba, Ritzhaupt
|
Contact Tracing | 2021 | View | Exploring Sentiment Towards Contact Tracing |
Crable, Sena
|
Content analysis | 2021 | View | Internet of Things (IoT): An Analysis of the Research |
Jourdan, Corley, Ryan, Anderson
|
Content analysis | 2017 | View | Sentiment Analysis and Opinion Mining: Current State of the Art and Review of Google and Yahoo Search Engines’ Privacy Policies |
Peslak
|
content based retrieval | 2012 | View | Study of User Behavior in Image Retrieval and Implications for Content Versus Concept Based Access |
Schultz
|
Contractual Governance | 2016 | View | Governance of Outsourcing: Building a Better Relationship |
Babin, Saunderson
|
Contractual Governance | 2017 | View | Building Client Vendor Alignment Capability in Strategic Information Systems Outsourcing |
Ghosh
|
contribution | 2021 | View | Open Source Software: A Detailed Analysis of Contributions and Quality |
Peslak, Hunsinger
|
Controls | 2020 | View | Examining Organizational Security Governance (OSG) Objectives: How is strategic planning for Security is undertaken at ABC Corporation? |
Mishra
|
corporate social responsibility | 2014 | View | Performance and Corporate Social Responsibility in the Information Technology Industry |
Cowan, Parzinger, Welch, Welch
|
corpus linguistics | 2014 | View | Decision-Making via Visual Analysis using the Natural Language Toolkit and R |
Jafar, Babb, Dana
|
COTS | 2008 | View | The Importance of Business Process Alignment for IT Project Management of Commercial Software with Case Studies |
Kraft
|
country development | 2013 | View | Global Diffusion of Virtual Social Networks: A Pyramid Model of Cultural, Developmental and Regulatory Foundations |
Wang, Sun
|
Covid | 2022 | View | The COVID-19 Pandemic’s Impact on Information Technology Employment, Salaries, and Career Opportunities |
Sendall, Peslak, Ceccucci, Hunsinger
|
COVID-19 | 2024 | View | Insights for the next viral outbreak: An information systems applied research based on lessons from COVID-19 |
D'Souza, Mishra
|
COVID-19 | 2023 | View | Short Stay Healthcare Quality in Skilled Nursing Facilities: Occupancy, Nurse Staff Mix, and COVID-19
|
Winston, Xiong, Medlin, Pelaez
|
COVID-19 | 2022 | View | The COVID-19 Pandemic’s Impact on Information Technology Employment, Salaries, and Career Opportunities |
Sendall, Peslak, Ceccucci, Hunsinger
|
COVID-19 | 2021 | View | Exploring Sentiment Towards Contact Tracing |
Crable, Sena
|
creative writing | 2020 | View | Literary Analysis Tool: Text Analytics for Creative Writers |
Grimsman, Kline, Vetter, Guinn
|
critical issues | 2012 | View | Does Size Matter in IT? An exploratory analysis of critical issues facing organizations based on company size |
Peslak
|
Critical success factors | 2017 | View | Identifying the Critical Success Factors for Information Systems to Manage Sponsored Research Activities at Institutions of Higher Education |
Lehman, Ruzich
|
Cross-Site Scripting (XSS) | 2023 | View | A Comparative Analysis of Web Application Vulnerability Tools |
Garcia, Abraham, Kepic, Cankaya
|
Crowdsourcing | 2017 | View | Crowdsourcing Surveys: Alternative Approaches to Survey Collection |
Cummings, Sibona
|
Cryptocurrency | 2020 | View | Conceptualization of Blockchain-based Applications: Technical Background and Social Perspective |
Xiong, Tang, Medlin
|
CSR | 2008 | View | Assessing the Role of CSR in Outsourcing Decisions |
Babin
|
Culture | 2024 | View | Mobile Technology Has Changed Our Culture |
Paullet, Pinchot
|
Culture | 2011 | View | How Mobile Technology is Changing Our Culture |
Pinchot, Paullet, Rota
|
Culture | 2009 | View | Cross-Cultural View of Handheld Wireless Media Usage |
Lind, Anyansi-Archibong, Anyansi
|
Curriculum design | 2010 | View | A Study of the Perceptions of Students on Privacy and Security on Social Networking Sites (SNS) on the Internet |
Lawler, Molluzzo
|
customer interaction | 2013 | View | Building a Competitive Edge through Social Media |
Aimiuwu
|
Customer satisfaction | 2013 | View | Building a Competitive Edge through Social Media |
Aimiuwu
|
Customer satisfaction | 2012 | View | Most Popular Package Design |
Miah
|
Customization | 2015 | View | ERP Customization vs. Business Process Reengineering: Technical and Functional Perceptions |
Fryling
|
Cyber | 2022 | View | Security Control Techniques: Cybersecurity & Medical Wearable Devices |
Sambasivam, Deal
|
cyber abuse | 2017 | View | Causes of cyberbullying in multi-player online gaming environments: Gamer perceptions |
Cotler, Fryling, Rivituso
|
cyber abuse | 2015 | View | Cyberbullying or normal game play? Impact of age, gender, and experience on cyberbullying in multi-player online gaming environments: Perceptions from one gaming forum |
Fryling, Cotler, Rivituso, Mathews, Pratico
|
Cyber Security | 2021 | View | Documenting the Process of Hijacking a Raspberry Pi User Login Credentials via Remote Code Execution |
Patel, Wimmer, Powell
|
Cyber Security | 2019 | View | Adversarial Machine Learning for Cyber Security |
De Lucia, Cotton
|
Cyber Security | 2015 | View | Cyber Security Best Practices: What to do? |
Kleinberg, Reinicke, Cummings
|
Cyber-Bullying | 2010 | View | A Study of the Perceptions of Students on Privacy and Security on Social Networking Sites (SNS) on the Internet |
Lawler, Molluzzo
|
Cyber-Stalking | 2010 | View | A Study of the Perceptions of Students on Privacy and Security on Social Networking Sites (SNS) on the Internet |
Lawler, Molluzzo
|
cyberbullying | 2017 | View | Causes of cyberbullying in multi-player online gaming environments: Gamer perceptions |
Cotler, Fryling, Rivituso
|
cyberbullying | 2015 | View | Cyberbullying or normal game play? Impact of age, gender, and experience on cyberbullying in multi-player online gaming environments: Perceptions from one gaming forum |
Fryling, Cotler, Rivituso, Mathews, Pratico
|
Cybersecurity | 2021 | View | Towards a Leader-Driven Supply Chain Cybersecurity Framework |
Vanajakumari, Mittal, Stoker, Clark, Miller
|
Cybersecurity Maturity Model Certification | 2022 | View | Cybersecurity Maturity Model Certification Initial Impact on the Defense Industrial Base
|
Strohmier, Stoker, Vanajakumari, Clark, Cummings, Modaresnezhad
|
cybersecurity risks | 2023 | View | QR Code Hacking – Detecting Multiple Vulnerabilities in Android Scanning Software |
Homan, Breese
|