Keyword | Year Pub | Article | Title | Authors |
M-Commerce | 2009 | View | An Examination of Information Security in Mobile Banking Architectures |
Streff, Haar
|
Machine Learning | 2024 | View | Network Intrusion Detection system with Machine learning Intrusion Detection System with Machine Learning As a Service |
Kangethe , Wimmer, Rebman Jr.
|
Machine Learning | 2023 | View | Identification of Stressed Wolf Populations Based on Hormone Levels Using Support Vector Machines (SVM) |
Stewart, Davis
|
Machine Learning | 2022 | View | Classification of Hunting-Stressed Wolf Populations Using Machine Learning
|
Stewart, Davis, Igoche
|
Machine Learning | 2020 | View | Trash to Treasure: Predicting Landfill Gas Flow to Optimize Electricity Generation |
Hassler, Emery, Hoyle, Cazier
|
Machine Learning | 2019 | View | A Machine Learning Approach to Optimizing Diabetes Healthcare Management Using SAS Analytic Suite |
Ajani, Habek
|
Machine Learning | 2019 | View | Adversarial Machine Learning for Cyber Security |
De Lucia, Cotton
|
make vs. buy | 2011 | View | Make or Buy: A comparative assessment of organizations that develop software internally versus those that purchase software |
Sena, Sena
|
malvertising | 2017 | View | Malvertising - A Rising Threat To The Online Ecosystem |
Dwyer, Kanguri
|
Malware | 2018 | View | Protecting IoT from Mirai botnets; IoT device hardening |
Frank, Nance, Jarocki, Pauli
|
Malware detection | 2017 | View | Malvertising - A Rising Threat To The Online Ecosystem |
Dwyer, Kanguri
|
Management | 2010 | View | An Exploratory Study of Relationships between Workforce Characteristics |
Totterdale
|
Management Best Practices | 2014 | View | Microsoft vs Apple: Which is Great by Choice? |
Sena, Olsen
|
mastery goal orientation | 2023 | View | How Firms Can Impact IT Project Continuation Intentions: A Human Capital Perspective |
Totty, Zaza, Greer, Korzaan
|
maximize visibility | 2012 | View | Maximizing Visibility in Skylines |
Miah
|
maximize visibility | 2012 | View | Most Popular Package Design |
Miah
|
MCDM | 2010 | View | On Design Science, MCDM, and Outsourcing Decision Making |
Petkov, Petkova
|
medical records | 2017 | View | Gateway to Clinical Intelligence and Operational Excellence through a Patient Healthcare Smart Card System |
Hussein, Ariyachandra, Frolick
|
Medical Wearable Devices | 2022 | View | Security Control Techniques: Cybersecurity & Medical Wearable Devices |
Sambasivam, Deal
|
membership | 2010 | View | Factors that Persuade and Deter Membership in Professional Computing Associations |
Umapathy, Jamba, Ritzhaupt
|
membership | 2008 | View | Computing Professional Association Membership: An Exploration of Membership Needs and Motivations |
Ritzhaupt, Umapathy, Jamba
|
Mental Illness | 2023 | View | The Effect of Mental Illness on Compensation for IT Developers |
Peslak, Ceccucci, Jones, Leonard
|
Merchant Capture System (MCS) | 2014 | View | Risk Assessment & Management in Merchant Capture Systems: A Threat Analysis Perspective |
Streff, Shrestha, Delzer
|
Methane Prediction | 2020 | View | Trash to Treasure: Predicting Landfill Gas Flow to Optimize Electricity Generation |
Hassler, Emery, Hoyle, Cazier
|
Method Engineering | 2011 | View | A Methodology Tailoring Model for Practitioner Based Information Systems Development Informed by the Principles of General Systems Theory |
Burns, Deek
|
Methodology Tailoring | 2011 | View | A Methodology Tailoring Model for Practitioner Based Information Systems Development Informed by the Principles of General Systems Theory |
Burns, Deek
|
minimalism | 2018 | View | Minimalism in Data Visualization: Perceptions of Beauty, Clarity, Effectiveness, and Simplicity |
Hill, Wray, Sibona
|
MIoT | 2022 | View | Security Control Techniques: Cybersecurity & Medical Wearable Devices |
Sambasivam, Deal
|
Mirai | 2018 | View | Protecting IoT from Mirai botnets; IoT device hardening |
Frank, Nance, Jarocki, Pauli
|
MIS services | 2018 | View | Cloud Computing: Implications for Information Systems Development Service Providers and Practitioners |
Mew, Money
|
MMORPG | 2017 | View | Causes of cyberbullying in multi-player online gaming environments: Gamer perceptions |
Cotler, Fryling, Rivituso
|
MMORPG | 2015 | View | Cyberbullying or normal game play? Impact of age, gender, and experience on cyberbullying in multi-player online gaming environments: Perceptions from one gaming forum |
Fryling, Cotler, Rivituso, Mathews, Pratico
|
Mobile Advertisements | 2016 | View | Leakage of Geolocation Data by Mobile Ad Networks |
Snow, Hayes, Dwyer
|
Mobile Application | 2022 | View | A Comparison of Internationalization and Localization Solutions for Web and Mobile Applications |
Wang, Chung, Yoon
|
mobile application development | 2012 | View | CMobile: A Mobile Photo Capture Application for Construction Imaging |
Martin, Vetter, Brown, Janicki
|
Mobile applications | 2018 | View | What’s “Appening” to our Privacy?
A Students Perspective on Downloading Mobile Apps
|
Paullet, Chawdhry, Douglas, Compomizzi
|
Mobile applications | 2017 | View | Downloading Mobile Applications - Are Students Protecting Themselves |
Chawdhry, Paullet, Douglas, Compomizzi
|
mobile apps | 2018 | View | A Dynamic and Static Analysis of the Uber Mobile Application from a Privacy Perspective |
Hayes, Snow, Altuwayjiri
|
mobile apps | 2015 | View | Use of Preventative Measures to Protect Data Privacy on Mobile Devices |
Pinchot, Paullet
|
Mobile Banking | 2009 | View | An Examination of Information Security in Mobile Banking Architectures |
Streff, Haar
|
Mobile Commerce | 2009 | View | An Examination of Information Security in Mobile Banking Architectures |
Streff, Haar
|
Mobile Communication | 2012 | View | Mobile Telephone Usage, Attitude, and Behavior During Group Meetings. |
Bajko
|
Mobile computing | 2012 | View | Mobile Telephone Usage, Attitude, and Behavior During Group Meetings. |
Bajko
|
Mobile Development | 2013 | View | Creating an Audio Conferencing Application |
Sun, Vetter, Reinicke
|
mobile device | 2021 | View | A Prototype for Distributed Computing Platform using Smartphones |
Wagner, Cao
|
mobile device | 2018 | View | What’s “Appening” to our Privacy?
A Students Perspective on Downloading Mobile Apps
|
Paullet, Chawdhry, Douglas, Compomizzi
|
Mobile Devices | 2023 | View | Are Companies Responsible for Internet of Things (IoT) Data Privacy? A Survey of IoT User Perceptions |
Paullet, Pinchot, Chawdhry
|
Mobile Devices | 2017 | View | Downloading Mobile Applications - Are Students Protecting Themselves |
Chawdhry, Paullet, Douglas, Compomizzi
|
Mobile Devices | 2016 | View | Exploring Relationships between the Strategic Importance of IT and the Effectiveness of IT Security and Mobile Device Management |
Stanko, Sena, Sena
|
Mobile Devices | 2015 | View | Use of Preventative Measures to Protect Data Privacy on Mobile Devices |
Pinchot, Paullet
|
Mobile Distractions | 2019 | View | Driving Distractions and Multi-tasking: An Investigative Study |
Choi, Xiong, Medlin
|
mobile forensics | 2018 | View | A Dynamic and Static Analysis of the Uber Mobile Application from a Privacy Perspective |
Hayes, Snow, Altuwayjiri
|
Mobile Payment Service | 2019 | View | Aligning the Factors of Skill, Technology and Task to Influence the Continued Use of Mobile Payment Users in China |
Chen, Choi, Xiong, Tang
|
Mobile Phone | 2012 | View | Mobile Telephone Usage, Attitude, and Behavior During Group Meetings. |
Bajko
|
Mobile Phones | 2019 | View | Driving Distractions and Multi-tasking: An Investigative Study |
Choi, Xiong, Medlin
|
Mobile Privacy | 2016 | View | Leakage of Geolocation Data by Mobile Ad Networks |
Snow, Hayes, Dwyer
|
mobile security | 2018 | View | What’s “Appening” to our Privacy?
A Students Perspective on Downloading Mobile Apps
|
Paullet, Chawdhry, Douglas, Compomizzi
|
mobile security | 2017 | View | Downloading Mobile Applications - Are Students Protecting Themselves |
Chawdhry, Paullet, Douglas, Compomizzi
|
mobile security | 2015 | View | Use of Preventative Measures to Protect Data Privacy on Mobile Devices |
Pinchot, Paullet
|
mobile security | 2015 | View | Use of Preventative Measures to Protect Data Privacy on Mobile Devices |
Pinchot, Paullet
|
Mobile technology | 2024 | View | Mobile Technology Has Changed Our Culture |
Paullet, Pinchot
|
Mobile technology | 2012 | View | Talk to Text: Changing Communication Patterns |
Pinchot, Douglas, Paullet, Rota
|
Mobile technology | 2011 | View | How Mobile Technology is Changing Our Culture |
Pinchot, Paullet, Rota
|
Mobile telephony | 2012 | View | Mobile Telephone Usage, Attitude, and Behavior During Group Meetings. |
Bajko
|
mobile web development | 2012 | View | Building a Real-Time Bus Tracking Data Display System |
Dudley, Vetter, Brown, Janicki
|
Monitoring and sensing devices | 2010 | View | Incorporation of Information Technology into Assisted Health Care: An Empirical Study |
Merrill, White
|
Motivation | 2013 | View | Open Source Software Volunteerism vs. |
Carpenter
|
Motivation | 2008 | View | Computing Professional Association Membership: An Exploration of Membership Needs and Motivations |
Ritzhaupt, Umapathy, Jamba
|
Multi-channel retailers | 2014 | View | Online versus In-Store: Price Differentiation for Multi-Channel Retailers |
Flores, Sun
|
multi-payer system | 2017 | View | Gateway to Clinical Intelligence and Operational Excellence through a Patient Healthcare Smart Card System |
Hussein, Ariyachandra, Frolick
|
multiple regression analysis | 2010 | View | An Empirical Study of Instant Messaging Behavior Using Diffusion of Innovation Theory |
Peslak, Ceccucci, Sendall
|
Multitasking | 2019 | View | Driving Distractions and Multi-tasking: An Investigative Study |
Choi, Xiong, Medlin
|
MySQL | 2008 | View | Comparison of Dynamic Web Content Processing Language Performance Under a LAMP Architecture |
Jafar, Anderson, Abdullat
|