Keyword | Year Pub | Article | Title | Authors |
E-commerce | 2011 | View | A Model for Understanding Social Commerce |
Afrasiabi Rad, Benyoucef
|
e-loyalty | 2009 | View | Analysis of the Factors that Influence Online Purchasing |
Amoroso, Hunsinger
|
e-mentoring | 2010 | View | Women's Technology Acceptance of Mentoring on the Internet |
Gibson, GIBSON
|
e-satisfaction | 2009 | View | Analysis of the Factors that Influence Online Purchasing |
Amoroso, Hunsinger
|
EA Frameworks | 2021 | View | Enterprise Architecture Transformation Process from a Federal Government Perspective |
Canada, Halawi
|
ease of use | 2009 | View | Cross-Cultural View of Handheld Wireless Media Usage |
Lind, Anyansi-Archibong, Anyansi
|
Economic development | 2022 | View | Harvesting Intrinsically Verifiable Trust: Building a Honey Traceability System for Sustainable Development |
Runzel, Hassler, Hadley, Ratcliffe, Wilkes, Cazier
|
economic regions | 2023 | View | An Exploration of the Benefits of Certifications and their Relationship to Salaries in IS/IT |
Matthews, Cummings, Janicki
|
Education | 2023 | View | The Effect of Mental Illness on Compensation for IT Developers |
Peslak, Ceccucci, Jones, Leonard
|
Education | 2016 | View | An Expanded Analysis of Internet Dependencies by Demographic Variables |
Peslak
|
Educational Model | 2010 | View | Contingency Planning: Disaster Recovery Strategies for Successful Educational Continuity |
Omar, Udeh, Mantha
|
Educational software | 2010 | View | Creating the Pilot AJAX Enabled Query Tool |
Ford, Dollinger
|
Edward Snowden | 2016 | View | Leakage of Geolocation Data by Mobile Ad Networks |
Snow, Hayes, Dwyer
|
Efficiency | 2021 | View | Does the Executive Perception of the Value of Information Technology (IT) Influence the IT strategy? A Case Study |
Pandey, Mishra
|
Effort estimation | 2013 | View | Early Stage Probabilistic Software Project Schedule Estimation |
Kwon, Hammell II
|
EHR | 2013 | View | Analysis of Electronic Health |
Mitchell, Clark
|
elaboration likelihood | 2024 | View | Information Adoption of User-Generated Content: An Applied Model for COVID Pandemic Case |
Xie, Dhillon
|
electronic bullying | 2017 | View | Causes of cyberbullying in multi-player online gaming environments: Gamer perceptions |
Cotler, Fryling, Rivituso
|
electronic bullying | 2015 | View | Cyberbullying or normal game play? Impact of age, gender, and experience on cyberbullying in multi-player online gaming environments: Perceptions from one gaming forum |
Fryling, Cotler, Rivituso, Mathews, Pratico
|
Electronic Business | 2009 | View | An Examination of Information Security in Mobile Banking Architectures |
Streff, Haar
|
electronic health rec | 2013 | View | Information Security Blueprint |
Clark, Benli, Mitchell, Vetter
|
Electronic Health Record | 2022 | View | Determinants of Health Professionals’ Intention to Adopt Electronic Health Record Systems |
Du, Sturgill
|
Electronic health records | 2024 | View | U.S. Healthcare System’s Electronic Health Records Security Threat Avoidance |
Woldeyohannis, Lind
|
Electronic health records | 2021 | View | An International Review and Study on Perceptions of Security, Adoption, and Implementation of Electronic Health Records |
Aliyu, Wimmer, Powell, Rebman Jr.
|
Electronic health records | 2013 | View | Analysis of Electronic Health |
Mitchell, Clark
|
Electronic health records | 2010 | View | Incorporation of Information Technology into Assisted Health Care: An Empirical Study |
Merrill, White
|
electronic medical records | 2020 | View | Addressing issues with EMR resulting in workarounds: An exploratory study
|
Mishra, Slonka, Draus, Bromall, Slonka
|
electronic voting systems | 2011 | View | A Process for Assessing Voting System Risk Using Threat Trees |
Yasinisac, Pardue
|
email security behavior | 2018 | View | Student Intentions and Behaviors Related to Email Security: An Application of the Health Belief Model |
Schymik, Du
|
Emerging technologies | 2014 | View | Developing a Semantic Differential Scale for Measuring Users’ Attitudes toward Sensor based Decision Support Technologies for the Environment. |
Ajani, Stork
|
Emerging Technology | 2014 | View | Looking Backwards to Look Ahead: Lessons from Barcode Adoption for RFID Adoption and Implementation |
Sharma, Thomas
|
empirical study | 2011 | View | Password Security Risk versus Effort: An Exploratory Study on User-Perceived Risk and the Intention to Use Online Applications |
Gebauer, Kline, He
|
employee relations | 2014 | View | Performance and Corporate Social Responsibility in the Information Technology Industry |
Cowan, Parzinger, Welch, Welch
|
Employee Reviews | 2024 | View | Using Topic Modeling to Identify Factors Influencing Job Satisfaction in the IT Industry
|
Kosar, Lee
|
Employment | 2009 | View | The Impact of Technology Diffusion on Employment, Compensation, and Productivity: Evidence from the Telecommunications Sector |
Clark, Moussawi
|
Encryption | 2012 | View | Using the cloud: Keeping Enterprise Data Private |
Cronin, Pauli, Ham
|
End User Computer Satisfaction | 2018 | View | Text Messaging Today: A Longitudinal Study of Variables Influencing Text Messaging from 2009 to 2016 |
Peslak, Hunsinger, Kruck
|
Energy Analytics | 2019 | View | Standardizing Public Utility Data: A Case Study of a Rural Mid-Size Utility |
Hassler, Cazier, Russell, Mueller, Paprocki
|
enterprise architecture | 2021 | View | Enterprise Architecture Transformation Process from a Federal Government Perspective |
Canada, Halawi
|
enterprise architecture | 2019 | View | Where We are with Enterprise Architecture |
Halawi, McCarthy, farah
|
Enterprise resource planning | 2015 | View | ERP Customization vs. Business Process Reengineering: Technical and Functional Perceptions |
Fryling
|
Enterprise resource planning | 2013 | View | Rocky Relationships: Enterprise Resource Planning and Supply Chain Management |
Crumbly, Fryling
|
entity resolution | 2010 | View | Superfund Site Analysis Using Web 2.0 Technologies |
Anderson, Jafar, Rogers
|
Entrepreneurship | 2010 | View | Towards an Abstract Model for Academia and Information Technology Sector Collaborative Partnerships: Responding to the “West Texas Coalition for Innovation and Commercialization” Initiative |
Mhlanga, Vardiman, Reames
|
Environmentalism | 2008 | View | Assessing the Role of CSR in Outsourcing Decisions |
Babin
|
ERP | 2015 | View | ERP Customization vs. Business Process Reengineering: Technical and Functional Perceptions |
Fryling
|
ERP | 2013 | View | Rocky Relationships: Enterprise Resource Planning and Supply Chain Management |
Crumbly, Fryling
|
Escalation | 2018 | View | An Exploratory Analysis of Gender Differences in IT Project Commitment, Continuation, and Escalation |
Korzaan, Harris, Brooks
|
estimating arrival times | 2012 | View | Building a Real-Time Bus Tracking Data Display System |
Dudley, Vetter, Brown, Janicki
|
Ethics | 2023 | View | Are Companies Responsible for Internet of Things (IoT) Data Privacy? A Survey of IoT User Perceptions |
Paullet, Pinchot, Chawdhry
|
Evaluation rubric | 2011 | View | Development of an Evaluation Model for XBRL-enabled Tools Intended for Investors |
Clements, Schwieger, Surendran
|
experience knowledge base (EKB) | 2009 | View | Determining Information Technology Project Status using Recognition-primed Decision-making enabled Collaborative Agents for Simulating Teamwork (R-CAST) |
Barnes, Hammell II
|
Export | 2009 | View | A Study of the Information Technology Trade between the United States and the Dominican Republic-Central America Free Trade Agreement Nations |
Pena, Aguirre, Saenz, Koong, Liu
|