Keyword | Year Pub | Article | Title | Authors |
ICT Labour | 2008 | View | Assessing the Role of CSR in Outsourcing Decisions |
Babin
|
image retrieval | 2012 | View | Study of User Behavior in Image Retrieval and Implications for Content Versus Concept Based Access |
Schultz
|
Import | 2009 | View | A Study of the Information Technology Trade between the United States and the Dominican Republic-Central America Free Trade Agreement Nations |
Pena, Aguirre, Saenz, Koong, Liu
|
impression formation | 2013 | View | The Impact of Intra-Organizational Social |
Cummings
|
Individual characteristics | 2023 | View | How Firms Can Impact IT Project Continuation Intentions: A Human Capital Perspective |
Totty, Zaza, Greer, Korzaan
|
Influence | 2014 | View | Similarity and Ties in Social Networks |
Afrasiabi Rad, Benyoucef
|
Information Assurance | 2009 | View | An Examination of Information Security in Mobile Banking Architectures |
Streff, Haar
|
Information display | 2024 | View | Decisional Guidance to Promote Motivation in Supply Chain Decision Making |
Haines, Hodges
|
Information overload | 2024 | View | Using Textual Analytics to Process Information Overload of Cyber Security Subreddits |
Omakwu , Wimmer, Rebman Jr.
|
Information Propagation | 2012 | View | Measuring Propagation in Online Social Networks: The case of YouTube |
Afrasiabi Rad, Benyoucef
|
Information security | 2018 | View | Information Security and Privacy Legislation:
Current State and Future Direction |
Dunlap, Cummings, Janicki
|
Information security | 2014 | View | Information Security in Nonprofits: A First Glance at the State of Security in Two Illinois Regions |
Imboden, Phillips, Seib, Fiorentino
|
Information security | 2013 | View | Information Security Blueprint |
Clark, Benli, Mitchell, Vetter
|
Information security | 2012 | View | The New Tech Effect: Analyzing Juror Credibility |
Davis, Paullet, Kraeer, Grant
|
Information security | 2010 | View | Can Management Predict Information Security Threats by Utilizing a Data Warehouse? |
Kim, Steen
|
information sharing | 2018 | View | Information Sharing Increases Drug Sample Inventory Management Efficiency in Healthcare Clinics: Evidence from a Quasi-Experiment |
Lang, Chahal
|
Information System Development Methodologies | 2011 | View | A Methodology Tailoring Model for Practitioner Based Information Systems Development Informed by the Principles of General Systems Theory |
Burns, Deek
|
Information systems | 2017 | View | Identifying the Critical Success Factors for Information Systems to Manage Sponsored Research Activities at Institutions of Higher Education |
Lehman, Ruzich
|
Information systems | 2015 | View | A Cloud Computing Methodology Study of Platform-as-a-Service (PaaS) in the Financial Industry |
Lawler, Howell-Barber, Joseph
|
Information systems | 2014 | View | A Study of Cloud Computing Infrastructure-as-a-Service (IaaS) in Financial Firms |
Lawler, Howell-Barber, Joseph, Narula
|
Information systems | 2013 | View | A Study of Cloud Computing Software-as-a-Service (SaaS) in Financial Firms |
Lawler, Howell-Barber, Desai, Joseph
|
Information systems | 2008 | View | Computing Professional Association Membership: An Exploration of Membership Needs and Motivations |
Ritzhaupt, Umapathy, Jamba
|
Information Systems Outsourcing | 2017 | View | Building Client Vendor Alignment Capability in Strategic Information Systems Outsourcing |
Ghosh
|
information systems services | 2018 | View | Cloud Computing: Implications for Information Systems Development Service Providers and Practitioners |
Mew, Money
|
Information technology | 2022 | View | The COVID-19 Pandemic’s Impact on Information Technology Employment, Salaries, and Career Opportunities |
Sendall, Peslak, Ceccucci, Hunsinger
|
Information technology | 2021 | View | A Comparative Study on Information Technology (IT) Infrastructure and Disaster Recovery Methodology |
Sambasivam, Brown Jr
|
Information technology | 2021 | View | Job and Career Satisfaction of Software Engineers |
Peslak, Ceccucci, Sendall
|
Information technology | 2014 | View | A Study of Information Technology Operating and Capital Expenditures and Their Effect on Positive Firm Outcomes |
Peslak
|
Information technology | 2014 | View | Information Security in Nonprofits: A First Glance at the State of Security in Two Illinois Regions |
Imboden, Phillips, Seib, Fiorentino
|
Information technology | 2011 | View | A Study of Information Technology Integration |
Peslak
|
Information technology | 2010 | View | An Exploratory Study of Relationships between Workforce Characteristics |
Totterdale
|
Information technology | 2008 | View | Computing Professional Association Membership: An Exploration of Membership Needs and Motivations |
Ritzhaupt, Umapathy, Jamba
|
information technology and computing | 2010 | View | Towards an Abstract Model for Academia and Information Technology Sector Collaborative Partnerships: Responding to the “West Texas Coalition for Innovation and Commercialization” Initiative |
Mhlanga, Vardiman, Reames
|
information technology issues | 2012 | View | Does Size Matter in IT? An exploratory analysis of critical issues facing organizations based on company size |
Peslak
|
information technology management | 2012 | View | Does Size Matter in IT? An exploratory analysis of critical issues facing organizations based on company size |
Peslak
|
Information Technology outsourcing | 2012 | View | Outsourcing Best Practices |
Mikita, DeHondt
|
Information Technology outsourcing | 2010 | View | On Design Science, MCDM, and Outsourcing Decision Making |
Petkov, Petkova
|
information technology strategy | 2012 | View | Does Size Matter in IT? An exploratory analysis of critical issues facing organizations based on company size |
Peslak
|
infrastructure as a service | 2012 | View | Using the cloud: Keeping Enterprise Data Private |
Cronin, Pauli, Ham
|
infrastructure-as-a-service (IaaS) | 2014 | View | A Study of Cloud Computing Infrastructure-as-a-Service (IaaS) in Financial Firms |
Lawler, Howell-Barber, Joseph, Narula
|
Innovation | 2023 | View | E-Commerce Drone Delivery Acceptance: A Study of Gen Z's Switching Intention |
Kaleta, Xie, Chen
|
Inside Sales | 2016 | View | Driving Inside Sales Performance with Lead Management Systems: A Conceptual Model |
Ohiomah, Benyoucef, Andreev
|
Instant messaging | 2010 | View | An Empirical Study of Instant Messaging Behavior Using Diffusion of Innovation Theory |
Peslak, Ceccucci, Sendall
|
Institutional Resources | 2021 | View | Enhancing Learning Analytics: The Rise of Institutional Research |
Perkins, Ariyachandra
|
Integration | 2021 | View | Integration of Information Systems: Robotic Process Automation |
Money
|
Integration | 2011 | View | A Study of Information Technology Integration |
Peslak
|
intention to continue | 2023 | View | How Firms Can Impact IT Project Continuation Intentions: A Human Capital Perspective |
Totty, Zaza, Greer, Korzaan
|
intentions | 2018 | View | Student Intentions and Behaviors Related to Email Security: An Application of the Health Belief Model |
Schymik, Du
|
Interaction Style | 2013 | View | Comparing Performance of Web Service Interaction Styles: SOAP vs. REST |
Kumar, Ahuja, Umapathy, Prodanoff
|
interface design | 2010 | View | Superfund Site Analysis Using Web 2.0 Technologies |
Anderson, Jafar, Rogers
|
Internal Load | 2022 | View | Using Analytics to understand Performance and Wellness for a Women’s College Soccer Team |
Njunge, Witman, Holmberg, Canacoo
|
international | 2021 | View | An International Review and Study on Perceptions of Security, Adoption, and Implementation of Electronic Health Records |
Aliyu, Wimmer, Powell, Rebman Jr.
|
Internationalization | 2022 | View | A Comparison of Internationalization and Localization Solutions for Web and Mobile Applications |
Wang, Chung, Yoon
|
Internet | 2016 | View | An Expanded Analysis of Internet Dependencies by Demographic Variables |
Peslak
|
Internet of Things | 2023 | View | Are Companies Responsible for Internet of Things (IoT) Data Privacy? A Survey of IoT User Perceptions |
Paullet, Pinchot, Chawdhry
|
Internet of Things | 2021 | View | Internet of Things (IoT): An Analysis of the Research |
Jourdan, Corley, Ryan, Anderson
|
Internet of Things | 2021 | View | Privacy Concerns and Data Sharing Habits of Personal Fitness Information Collected via Activity Trackers |
Pinchot, Cellante
|
Internet of Things hacking | 2023 | View | QR Code Hacking – Detecting Multiple Vulnerabilities in Android Scanning Software |
Homan, Breese
|
Interpersonal Violence | 2015 | View | On Adapting a War-Gaming Discrete Event Simulator with Big Data and Geospatial Modeling Toward a Predictive Model Ecosystem for Interpersonal Violence |
Mhlanga, Perry, Kirchner
|
interruptions | 2012 | View | The Effects of Interruptions on Remembering Task Information |
Lenox, Pilarski, Leathers
|
interviews | 2020 | View | Addressing issues with EMR resulting in workarounds: An exploratory study
|
Mishra, Slonka, Draus, Bromall, Slonka
|
intra-organizational social networking sites | 2013 | View | The Impact of Intra-Organizational Social |
Cummings
|
Intrinsic motivation | 2024 | View | Decisional Guidance to Promote Motivation in Supply Chain Decision Making |
Haines, Hodges
|
IoT | 2022 | View | Security Control Techniques: Cybersecurity & Medical Wearable Devices |
Sambasivam, Deal
|
IoT | 2018 | View | Protecting IoT from Mirai botnets; IoT device hardening |
Frank, Nance, Jarocki, Pauli
|
iPhone Forensics | 2016 | View | Leakage of Geolocation Data by Mobile Ad Networks |
Snow, Hayes, Dwyer
|
IS 2002 model curriculum | 2010 | View | Network Growing Pains |
Clark, Mahar, Moussawi
|
IS 2002 model curriculum | 2010 | View | Network Growing Pains |
Clark, Mahar, Moussawi
|
IS Strategy | 2013 | View | The Impact of Regulatory Changes on IS Strategy: An Exploratory Study |
Reinicke, Ward
|
IS success | 2013 | View | Rocky Relationships: Enterprise Resource Planning and Supply Chain Management |
Crumbly, Fryling
|
IT Audit | 2020 | View | Examining Organizational Security Governance (OSG) Objectives: How is strategic planning for Security is undertaken at ABC Corporation? |
Mishra
|
IT Audit | 2010 | View | The Results of Implementing a Knowledge Management Initiative to Enhance Network Access Controls |
Kim, Nelson
|
IT Components | 2009 | View | A Study of the Information Technology Trade between the United States and the Dominican Republic-Central America Free Trade Agreement Nations |
Pena, Aguirre, Saenz, Koong, Liu
|
IT Effectiveness | 2016 | View | Exploring Relationships between the Strategic Importance of IT and the Effectiveness of IT Security and Mobile Device Management |
Stanko, Sena, Sena
|
IT enabler | 2023 | View | Influence of Reporting structure and Perception of Role of Information Technology on Decision-making: A Qualitative Study |
Pandey, Mishra
|
IT facilitator | 2023 | View | Influence of Reporting structure and Perception of Role of Information Technology on Decision-making: A Qualitative Study |
Pandey, Mishra
|
IT governance | 2021 | View | Does the Executive Perception of the Value of Information Technology (IT) Influence the IT strategy? A Case Study |
Pandey, Mishra
|
IT industry | 2024 | View | Using Topic Modeling to Identify Factors Influencing Job Satisfaction in the IT Industry
|
Kosar, Lee
|
IT jobs | 2022 | View | The COVID-19 Pandemic’s Impact on Information Technology Employment, Salaries, and Career Opportunities |
Sendall, Peslak, Ceccucci, Hunsinger
|
IT offshoring risks | 2017 | View | A Multi-Criteria Network Assessment Model of IT Offshoring Risks from Service Provider's Perspective |
Petkov, Petkova
|
IT project management | 2023 | View | How Firms Can Impact IT Project Continuation Intentions: A Human Capital Perspective |
Totty, Zaza, Greer, Korzaan
|
IT Projects | 2018 | View | An Exploratory Analysis of Gender Differences in IT Project Commitment, Continuation, and Escalation |
Korzaan, Harris, Brooks
|
IT role | 2023 | View | Influence of Reporting structure and Perception of Role of Information Technology on Decision-making: A Qualitative Study |
Pandey, Mishra
|
IT skills | 2019 | View | Changes in the Information Technology Field: A Survey of Current Technologies and Future Importance
|
Cummings, Janicki
|
IT strategy | 2021 | View | Does the Executive Perception of the Value of Information Technology (IT) Influence the IT strategy? A Case Study |
Pandey, Mishra
|
IT strategy | 2016 | View | Exploring Relationships between the Strategic Importance of IT and the Effectiveness of IT Security and Mobile Device Management |
Stanko, Sena, Sena
|
IT support | 2023 | View | Influence of Reporting structure and Perception of Role of Information Technology on Decision-making: A Qualitative Study |
Pandey, Mishra
|
IT Technologies | 2019 | View | Changes in the Information Technology Field: A Survey of Current Technologies and Future Importance
|
Cummings, Janicki
|
IT Technologies | 2014 | View | Shifting Technological Landscape: IT Departments and Anticipated Technological Changes |
Cummings, Janicki, Kline
|
IT/IS Skills | 2014 | View | Shifting Technological Landscape: IT Departments and Anticipated Technological Changes |
Cummings, Janicki, Kline
|