Search by Keyword

Search returned 85 items for : P

KeywordYear PubArticleTitleAuthors
package design2012ViewMost Popular Package Design Miah
pandemic2024ViewInsights for the next viral outbreak: An information systems applied research based on lessons from COVID-19 D'Souza, Mishra
pandemic2024ViewResilience During Times of Disruption: The Role of Data Analytics in a Healthcare System Pohana, Ariyachandra
pandemic2022ViewThe COVID-19 Pandemic’s Impact on Information Technology Employment, Salaries, and Career Opportunities Sendall, Peslak, Ceccucci, Hunsinger
Panel Data2017ViewThe Effects of Discount Pricing Strategy on Sales of Software-as-a-Service (SaaS): Online Video Game Market Context Choi, Medlin, Hunsinger
Paradigm Shift2020ViewKnowledge Management System Development: Handling Evolution from Explicit to Tacit and Social Mew, Money
password strategy2011ViewPassword Security Risk versus Effort: An Exploratory Study on User-Perceived Risk and the Intention to Use Online Applications Gebauer, Kline, He
payloads2021ViewDocumenting the Process of Hijacking a Raspberry Pi User Login Credentials via Remote Code Execution Patel, Wimmer, Powell
Penetration testing2023ViewA Comparative Analysis of Web Application Vulnerability Tools Garcia, Abraham, Kepic, Cankaya
Perceived Behavioral Control2010ViewSpyware: What Influences College Students to Use Anti-Spyware Tools? Ward, Hunsinger
perceived ease of use2019ViewDrone Delivery Services: An Evaluation of Personal Innovativeness, Opinion Passing and Key Information Technology Adoption Factors Chen, Choi, Charoen
Perceived radicalness2017ViewFinding the “Radicalness” in Radical Innovation Adoption Sharma, Thomas, Konsynski
perceived risk2009ViewAnalysis of the Factors that Influence Online Purchasing Amoroso, Hunsinger
Perceived Uncertainty2022ViewImpact of Review Valence and Perceived Uncertainty on Purchase of Time-Constrained and Discounted Search Goods Muzumdar
Perceived usefulness2019ViewAligning the Factors of Skill, Technology and Task to Influence the Continued Use of Mobile Payment Users in China Chen, Choi, Xiong, Tang
Perceived usefulness2019ViewDrone Delivery Services: An Evaluation of Personal Innovativeness, Opinion Passing and Key Information Technology Adoption Factors Chen, Choi, Charoen
Perceived Value2017ViewThe Effects of Discount Pricing Strategy on Sales of Software-as-a-Service (SaaS): Online Video Game Market Context Choi, Medlin, Hunsinger
perception2018ViewMinimalism in Data Visualization: Perceptions of Beauty, Clarity, Effectiveness, and Simplicity Hill, Wray, Sibona
Performance2022ViewUsing Analytics to understand Performance and Wellness for a Women’s College Soccer Team Njunge, Witman, Holmberg, Canacoo
Performance2015ViewMeasuring Algorithm Performance With Java: Patterns of Variation McMaster, Sambasivam, Wolthuis
Performance Expectancy2024ViewExamining Factors Influencing the Acceptance of Big Data Analytics in Healthcare Mohammed, Lind
performance management2020ViewUnderstanding Campus Crime with a Multi-University Analytics System Iheadindu, Kline, Vetter, Clark
Performance task2013ViewComparing Performance of Web Service Interaction Styles: SOAP vs. REST Kumar, Ahuja, Umapathy, Prodanoff
Perl2008ViewComparison of Dynamic Web Content Processing Language Performance Under a LAMP Architecture Jafar, Anderson, Abdullat
personal fitness information2021ViewPrivacy Concerns and Data Sharing Habits of Personal Fitness Information Collected via Activity Trackers Pinchot, Cellante
personal identifying information (PII)2023ViewInformation Worth: Investigating the Differences in the Importance and Value of Personally Identifiable Information Kaleta, Mahadevan, Thackston
personal innovativeness2019ViewDrone Delivery Services: An Evaluation of Personal Innovativeness, Opinion Passing and Key Information Technology Adoption Factors Chen, Choi, Charoen
persuading factors2010ViewFactors that Persuade and Deter Membership in Professional Computing Associations Umapathy, Jamba, Ritzhaupt
phenomenology2024ViewInsights for the next viral outbreak: An information systems applied research based on lessons from COVID-19 D'Souza, Mishra
PHP2008ViewComparison of Dynamic Web Content Processing Language Performance Under a LAMP Architecture Jafar, Anderson, Abdullat
physiological indicators2023ViewIdentification of Stressed Wolf Populations Based on Hormone Levels Using Support Vector Machines (SVM) Stewart, Davis
physiological indicators2022ViewClassification of Hunting-Stressed Wolf Populations Using Machine Learning Stewart, Davis, Igoche
PII Importance2023ViewInformation Worth: Investigating the Differences in the Importance and Value of Personally Identifiable Information Kaleta, Mahadevan, Thackston
PII value2023ViewInformation Worth: Investigating the Differences in the Importance and Value of Personally Identifiable Information Kaleta, Mahadevan, Thackston
PII worth2023ViewInformation Worth: Investigating the Differences in the Importance and Value of Personally Identifiable Information Kaleta, Mahadevan, Thackston
Platform as a Service (PaaS)2014ViewA Feasibility Study of Platform-as-a-Service Using Cloud Computing for a Global Service Organization Gai, Steenkamp
Platform Innovation2014ViewLooking Backwards to Look Ahead: Lessons from Barcode Adoption for RFID Adoption and Implementation Sharma, Thomas
platform-as-a-service (PaaS)2015ViewA Cloud Computing Methodology Study of Platform-as-a-Service (PaaS) in the Financial Industry Lawler, Howell-Barber, Joseph
PLS-analysis2011ViewPassword Security Risk versus Effort: An Exploratory Study on User-Perceived Risk and the Intention to Use Online Applications Gebauer, Kline, He
policy2020ViewExamining Organizational Security Governance (OSG) Objectives: How is strategic planning for Security is undertaken at ABC Corporation? Mishra
Political Redistricting2022ViewGIS for Democracy: Toward A Solution Against Gerrymandering Wu, Igoche
popular package2012ViewMost Popular Package Design Miah
Post-Implementation2013ViewRocky Relationships: Enterprise Resource Planning and Supply Chain Management Crumbly, Fryling
Powerful Member2021ViewTowards a Leader-Driven Supply Chain Cybersecurity Framework Vanajakumari, Mittal, Stoker, Clark, Miller
Practice vs Performance2014ViewMicrosoft vs Apple: Which is Great by Choice? Sena, Olsen
Predictive2015ViewOn Adapting a War-Gaming Discrete Event Simulator with Big Data and Geospatial Modeling Toward a Predictive Model Ecosystem for Interpersonal Violence Mhlanga, Perry, Kirchner
Predictive Analytics2020ViewDigital Transformation and Geospatial Analytics Abot, Ariyachandra
Predictive Analytics2016ViewA Comparison of Open Source Tools for Data Science Wimmer, Powell
Predictive Security Model2010ViewCan Management Predict Information Security Threats by Utilizing a Data Warehouse? Kim, Steen
Prescriptive Analytics2020ViewDigital Transformation and Geospatial Analytics Abot, Ariyachandra
Price differentiation2014ViewOnline versus In-Store: Price Differentiation for Multi-Channel Retailers Flores, Sun
Price Fairness2017ViewThe Effects of Discount Pricing Strategy on Sales of Software-as-a-Service (SaaS): Online Video Game Market Context Choi, Medlin, Hunsinger
Privacy2023ViewAre Companies Responsible for Internet of Things (IoT) Data Privacy? A Survey of IoT User Perceptions Paullet, Pinchot, Chawdhry
Privacy2021ViewExploring Sentiment Towards Contact Tracing Crable, Sena
Privacy2021ViewPrivacy Concerns and Data Sharing Habits of Personal Fitness Information Collected via Activity Trackers Pinchot, Cellante
Privacy2021ViewThe Promise and Perild of Drone Delivery Systems Fowler, Vannoy, Eggers, Medlin
Privacy2020ViewPrivacy Considerations Throughout the Data Life Cycle Pomykalski
Privacy2019ViewSecurity, Privacy, and Legislation Issues related to Commercial Drone Deliveries Vannoy, Medlin
Privacy2018ViewA Dynamic and Static Analysis of the Uber Mobile Application from a Privacy Perspective Hayes, Snow, Altuwayjiri
Privacy2018ViewInformation Security and Privacy Legislation: Current State and Future Direction Dunlap, Cummings, Janicki
Privacy2017ViewThe Effects of Perceived Functionality and Usability on Privacy and Security Concerns about Adopting Cloud Applications Nakayama, Chen, Taylor
Privacy2010ViewA Study of the Perceptions of Students on Privacy and Security on Social Networking Sites (SNS) on the Internet Lawler, Molluzzo
Privacy2009ViewAnalysis of the Factors that Influence Online Purchasing Amoroso, Hunsinger
Privacy Paradox2023ViewInformation Worth: Investigating the Differences in the Importance and Value of Personally Identifiable Information Kaleta, Mahadevan, Thackston
process performance matrix2014ViewA Feasibility Study of Platform-as-a-Service Using Cloud Computing for a Global Service Organization Gai, Steenkamp
processes2021ViewIntegration of Information Systems: Robotic Process Automation Money
processual2021ViewInterpreting Organizational Security Governance Objectives for Strategic Security Planning Mishra
productivity paradox2014ViewA Study of Information Technology Operating and Capital Expenditures and Their Effect on Positive Firm Outcomes Peslak
professional associations2010ViewFactors that Persuade and Deter Membership in Professional Computing Associations Umapathy, Jamba, Ritzhaupt
professional associations2008ViewComputing Professional Association Membership: An Exploration of Membership Needs and Motivations Ritzhaupt, Umapathy, Jamba
program management methodology2011ViewThe Potential Reality of Service-Oriented Architecture (SOA) in a Cloud Computing Strategy Lawler
programmer2013ViewOpen Source Software Volunteerism vs. Carpenter
Project Continuation2018ViewAn Exploratory Analysis of Gender Differences in IT Project Commitment, Continuation, and Escalation Korzaan, Harris, Brooks
Project management2015ViewThe Silent Treatment in IT Projects: Gender Differences in Inclinations to Communicate Project Status Information Korzaan, Brooks
Project management2014ViewThe De-Escalation of the DHS HSIN Next Gen Project Rosenhauer, Korzaan
Project management2009ViewDetermining Information Technology Project Status using Recognition-primed Decision-making enabled Collaborative Agents for Simulating Teamwork (R-CAST) Barnes, Hammell II
Project management2008ViewThe Importance of Business Process Alignment for IT Project Management of Commercial Software with Case Studies Kraft
Project Status Reporting2015ViewThe Silent Treatment in IT Projects: Gender Differences in Inclinations to Communicate Project Status Information Korzaan, Brooks
Proprietary Data2024ViewAn Action Research Approach to Building an Enterprise-Specific Chatbot (ESCB) Wood, Stoker
protective concentration levels2010ViewSuperfund Site Analysis Using Web 2.0 Technologies Anderson, Jafar, Rogers
Prototype2021ViewA Prototype for Distributed Computing Platform using Smartphones Wagner, Cao
public cloud2013ViewLet’s Look at the Cloud from a Risk Management Perspective Vignos, Kim, Metzer
public health2014ViewDeveloping a Semantic Differential Scale for Measuring Users’ Attitudes toward Sensor based Decision Support Technologies for the Environment. Ajani, Stork
Pure-play online retailers2014ViewOnline versus In-Store: Price Differentiation for Multi-Channel Retailers Flores, Sun
Python2008ViewComparison of Dynamic Web Content Processing Language Performance Under a LAMP Architecture Jafar, Anderson, Abdullat