Keyword | Year Pub | Article | Title | Authors |
SaaS | 2017 | View | The Effects of Discount Pricing Strategy on Sales of Software-as-a-Service (SaaS):
Online Video Game Market Context |
Choi, Medlin, Hunsinger
|
SaaS | 2013 | View | Let’s Look at the Cloud from a Risk Management Perspective |
Vignos, Kim, Metzer
|
Safe Driving | 2019 | View | Driving Distractions and Multi-tasking: An Investigative Study |
Choi, Xiong, Medlin
|
SageMaker | 2024 | View | Network Intrusion Detection system with Machine learning Intrusion Detection System with Machine Learning As a Service |
Kangethe , Wimmer, Rebman Jr.
|
Salaries | 2023 | View | An Exploration of the Benefits of Certifications and their Relationship to Salaries in IS/IT |
Matthews, Cummings, Janicki
|
salary | 2024 | View | Tools for Success: Their Impact on Salaries in the Data Analytics Job Market |
Hartzel, Ozturk
|
Sales Performance | 2016 | View | Driving Inside Sales Performance with Lead Management Systems: A Conceptual Model |
Ohiomah, Benyoucef, Andreev
|
Sample | 2017 | View | Crowdsourcing Surveys: Alternative Approaches to Survey Collection |
Cummings, Sibona
|
SAS | 2019 | View | A Machine Learning Approach to Optimizing Diabetes Healthcare Management Using SAS Analytic Suite |
Ajani, Habek
|
scale development | 2014 | View | Developing a Semantic Differential Scale for Measuring Users’ Attitudes toward Sensor based Decision Support Technologies for the Environment. |
Ajani, Stork
|
SCM | 2013 | View | Rocky Relationships: Enterprise Resource Planning and Supply Chain Management |
Crumbly, Fryling
|
SDM | 2010 | View | System Development Methodology Usage in Industry: A Review and Analysis |
Griffin, Brandyberry
|
search engines | 2017 | View | Sentiment Analysis and Opinion Mining: Current State of the Art and Review of Google and Yahoo Search Engines’ Privacy Policies |
Peslak
|
secure coding | 2016 | View | Moving Beyond Coding: Why Secure Coding Should be Implemented |
Grover, Cummings, Janicki
|
Security | 2022 | View | Analysis of Security Features and Vulnerabilities in Public/Open Wi-Fi |
James
|
Security | 2022 | View | Combating Private Blockchain Fraud: A Virtual Reality & Artificial Intelligence Model
|
Aimiuwu
|
Security | 2022 | View | Security Control Techniques: Cybersecurity & Medical Wearable Devices |
Sambasivam, Deal
|
Security | 2021 | View | An International Review and Study on Perceptions of Security, Adoption, and Implementation of Electronic Health Records |
Aliyu, Wimmer, Powell, Rebman Jr.
|
Security | 2021 | View | The Promise and Perild of Drone Delivery Systems |
Fowler, Vannoy, Eggers, Medlin
|
Security | 2019 | View | Security, Privacy, and Legislation Issues related to Commercial Drone Deliveries |
Vannoy, Medlin
|
Security | 2018 | View | Information Security and Privacy Legislation:
Current State and Future Direction |
Dunlap, Cummings, Janicki
|
Security | 2017 | View | The Effects of Perceived Functionality and Usability on Privacy and Security Concerns about Adopting Cloud Applications |
Nakayama, Chen, Taylor
|
Security | 2015 | View | Cyber Security Best Practices: What to do? |
Kleinberg, Reinicke, Cummings
|
Security | 2011 | View | Password Security Risk versus Effort: An Exploratory Study on User-Perceived Risk and the Intention to Use Online Applications |
Gebauer, Kline, He
|
Security | 2010 | View | A Study of the Perceptions of Students on Privacy and Security on Social Networking Sites (SNS) on the Internet |
Lawler, Molluzzo
|
Security Awareness | 2023 | View | QR Code Hacking – Detecting Multiple Vulnerabilities in Android Scanning Software |
Homan, Breese
|
Security Breaches | 2010 | View | Can Management Predict Information Security Threats by Utilizing a Data Warehouse? |
Kim, Steen
|
Security Effectiveness | 2016 | View | Exploring Relationships between the Strategic Importance of IT and the Effectiveness of IT Security and Mobile Device Management |
Stanko, Sena, Sena
|
Security management | 2016 | View | Exploring Relationships between the Strategic Importance of IT and the Effectiveness of IT Security and Mobile Device Management |
Stanko, Sena, Sena
|
Security management | 2010 | View | Can Management Predict Information Security Threats by Utilizing a Data Warehouse? |
Kim, Steen
|
Security Threats | 2014 | View | Risk Assessment & Management in Merchant Capture Systems: A Threat Analysis Perspective |
Streff, Shrestha, Delzer
|
SEM | 2010 | View | An Empirical Study of Instant Messaging Behavior Using Diffusion of Innovation Theory |
Peslak, Ceccucci, Sendall
|
semantic differential scale | 2014 | View | Developing a Semantic Differential Scale for Measuring Users’ Attitudes toward Sensor based Decision Support Technologies for the Environment. |
Ajani, Stork
|
semantic library web | 2020 | View | An Exploratory Study of the Perceptions of Library Faculty and Patrons on Library Resources |
Herman, Wimmer, Rebman Jr.
|
Semantic Search | 2024 | View | An Action Research Approach to Building an Enterprise-Specific Chatbot (ESCB) |
Wood, Stoker
|
Seniors | 2011 | View | Seniors and Social Networking |
Lewis, Ariyachandra
|
Sentiment analysis | 2024 | View | Using Textual Analytics to Process Information Overload of Cyber Security Subreddits |
Omakwu , Wimmer, Rebman Jr.
|
Sentiment analysis | 2024 | View | Using Topic Modeling to Identify Factors Influencing Job Satisfaction in the IT Industry
|
Kosar, Lee
|
Sentiment analysis | 2021 | View | Exploring Sentiment Towards Contact Tracing |
Crable, Sena
|
Sentiment analysis | 2020 | View | A Longitudinal Study of Google Privacy Policies |
Peslak, Kovalchick, Conforti
|
Sentiment analysis | 2018 | View | Facebook Fanatics: A Linguistic and Sentiment Analysis of the Most “Fanned” Facebook Pages |
Peslak
|
Serverless | 2023 | View | A Serverless Real-Time Data Streaming Architecture for Synchronous Online Math Competition |
Liu, Chung
|
Service-Dominant Logic | 2012 | View | Co-Creating Value in Systems Development: A Shift towards Service-Dominant Logic |
Babb, Keith
|
Service-oriented architecture (SOA) | 2011 | View | The Potential Reality of Service-Oriented Architecture (SOA) in a Cloud Computing Strategy |
Lawler
|
service-oriented computing (SOC) | 2011 | View | The Potential Reality of Service-Oriented Architecture (SOA) in a Cloud Computing Strategy |
Lawler
|
service-oriented enterprise (SOE) | 2011 | View | The Potential Reality of Service-Oriented Architecture (SOA) in a Cloud Computing Strategy |
Lawler
|
setiment analysis | 2017 | View | Sentiment Analysis and Opinion Mining: Current State of the Art and Review of Google and Yahoo Search Engines’ Privacy Policies |
Peslak
|
Sharepoint | 2010 | View | An Exploratory Study of Relationships between Workforce Characteristics |
Totterdale
|
Short Stay Quality Measures | 2023 | View | Short Stay Healthcare Quality in Skilled Nursing Facilities: Occupancy, Nurse Staff Mix, and COVID-19
|
Winston, Xiong, Medlin, Pelaez
|
signature tree | 2012 | View | Maximizing Visibility in Skylines |
Miah
|
Similarity | 2014 | View | Similarity and Ties in Social Networks |
Afrasiabi Rad, Benyoucef
|
Skilled Nursing Facilities | 2023 | View | Short Stay Healthcare Quality in Skilled Nursing Facilities: Occupancy, Nurse Staff Mix, and COVID-19
|
Winston, Xiong, Medlin, Pelaez
|
skylines | 2012 | View | Maximizing Visibility in Skylines |
Miah
|
Small Business Development Corporation | 2010 | View | Towards an Abstract Model for Academia and Information Technology Sector Collaborative Partnerships: Responding to the “West Texas Coalition for Innovation and Commercialization” Initiative |
Mhlanga, Vardiman, Reames
|
Smart contract | 2020 | View | Conceptualization of Blockchain-based Applications: Technical Background and Social Perspective |
Xiong, Tang, Medlin
|
smart sourcing | 2012 | View | Outsourcing Best Practices |
Mikita, DeHondt
|
Smartphone | 2021 | View | A Prototype for Distributed Computing Platform using Smartphones |
Wagner, Cao
|
smartphones | 2024 | View | Mobile Technology Has Changed Our Culture |
Paullet, Pinchot
|
smartphones | 2012 | View | Mobile Telephone Usage, Attitude, and Behavior During Group Meetings. |
Bajko
|
SMS | 2010 | View | An Empirical Study of Text Messaging Behavioral Intention and Usage |
Peslak, Ceccucci, Sendall
|
snap length | 2019 | View | The use of Snap Length in Lossy Network Traffic Compression for Network Intrusion Detection Applications |
Smith, Hammell II
|
Snort | 2019 | View | The use of Snap Length in Lossy Network Traffic Compression for Network Intrusion Detection Applications |
Smith, Hammell II
|
SOAP | 2013 | View | Comparing Performance of Web Service Interaction Styles: SOAP vs. REST |
Kumar, Ahuja, Umapathy, Prodanoff
|
Soccer | 2022 | View | Using Analytics to understand Performance and Wellness for a Women’s College Soccer Team |
Njunge, Witman, Holmberg, Canacoo
|
Social capital | 2013 | View | The Impact of Intra-Organizational Social |
Cummings
|
Social capital | 2012 | View | Social Networking Systems and Campus Life |
Sgambato, Petkov, Wolf
|
Social Commerce | 2011 | View | A Model for Understanding Social Commerce |
Afrasiabi Rad, Benyoucef
|
Social Contract Theory | 2010 | View | A Study of the Perceptions of Students on Privacy and Security on Social Networking Sites (SNS) on the Internet |
Lawler, Molluzzo
|
Social Link Types | 2012 | View | Measuring Propagation in Online Social Networks: The case of YouTube |
Afrasiabi Rad, Benyoucef
|
Social media | 2024 | View | Social Media Users Only Have Two Clusters: A United States Analysis |
Peslak, Kovalchick, Menon
|
Social media | 2014 | View | Can Social Media aid Software Development? |
Reinicke, Cummings
|
Social media | 2014 | View | Decision-Making via Visual Analysis using the Natural Language Toolkit and R |
Jafar, Babb, Dana
|
Social media | 2013 | View | Building a Competitive Edge through Social Media |
Aimiuwu
|
Social media | 2012 | View | An Empirical Study of Social Networking Behavior Using Theory of Reasoned Action |
Peslak, Ceccucci, Sendall
|
Social Network Analysis | 2014 | View | Similarity and Ties in Social Networks |
Afrasiabi Rad, Benyoucef
|
Social networking | 2024 | View | Social Media Users Only Have Two Clusters: A United States Analysis |
Peslak, Kovalchick, Menon
|
Social networking | 2012 | View | An Empirical Study of Social Networking Behavior Using Theory of Reasoned Action |
Peslak, Ceccucci, Sendall
|
Social networking | 2010 | View | A Study of the Perceptions of Students on Privacy and Security on Social Networking Sites (SNS) on the Internet |
Lawler, Molluzzo
|
Social networking | 2010 | View | An Exploratory Study of Relationships between Workforce Characteristics |
Totterdale
|
Social Networking (SNS) | 2010 | View | A Study of the Perceptions of Students on Privacy and Security on Social Networking Sites (SNS) on the Internet |
Lawler, Molluzzo
|
Social Networking Site | 2014 | View | Can Social Media aid Software Development? |
Reinicke, Cummings
|
Social networking sites | 2017 | View | Crowdsourcing Surveys: Alternative Approaches to Survey Collection |
Cummings, Sibona
|
Social networking sites | 2012 | View | Social Networking Systems and Campus Life |
Sgambato, Petkov, Wolf
|
Social Networking Use | 2011 | View | Seniors and Social Networking |
Lewis, Ariyachandra
|
Social networks | 2012 | View | Measuring Propagation in Online Social Networks: The case of YouTube |
Afrasiabi Rad, Benyoucef
|
Social Ties | 2014 | View | Similarity and Ties in Social Networks |
Afrasiabi Rad, Benyoucef
|
Social Web | 2011 | View | A Model for Understanding Social Commerce |
Afrasiabi Rad, Benyoucef
|
Software as a Service (SaaS) | 2012 | View | Using the cloud: Keeping Enterprise Data Private |
Cronin, Pauli, Ham
|
Software development | 2016 | View | Moving Beyond Coding: Why Secure Coding Should be Implemented |
Grover, Cummings, Janicki
|
Software development | 2015 | View | The Silent Treatment in IT Projects: Gender Differences in Inclinations to Communicate Project Status Information |
Korzaan, Brooks
|
Software development | 2010 | View | The Impact of Transition Costs on Offshore Systems Development |
DeHondt, Leidig
|
Software engineering | 2020 | View | An Empirical Study of Post-Production Software Code Quality When Employing the Agile Rapid Delivery Methodology |
Poe, Seeman
|
Software engineers | 2021 | View | Job and Career Satisfaction of Software Engineers |
Peslak, Ceccucci, Sendall
|
Software project schedule estimation | 2013 | View | Early Stage Probabilistic Software Project Schedule Estimation |
Kwon, Hammell II
|
Software testing | 2014 | View | Taxonomy of Common Software Testing Terminology: Framework for Key Software Engineering Testing Concepts |
Roggio, Gordon, Comer
|
software-as-a-service | 2013 | View | A Study of Cloud Computing Software-as-a-Service (SaaS) in Financial Firms |
Lawler, Howell-Barber, Desai, Joseph
|
sorting | 2015 | View | Measuring Algorithm Performance With Java: Patterns of Variation |
McMaster, Sambasivam, Wolthuis
|
special education | 2023 | View | Virtual Reality in Special Education: An Application Review
|
Li, Li, Zhang
|
sports analytics | 2022 | View | Using Analytics to understand Performance and Wellness for a Women’s College Soccer Team |
Njunge, Witman, Holmberg, Canacoo
|
Spyware | 2010 | View | Spyware: What Influences College Students to Use Anti-Spyware Tools? |
Ward, Hunsinger
|
SQL Injection | 2023 | View | A Comparative Analysis of Web Application Vulnerability Tools |
Garcia, Abraham, Kepic, Cankaya
|
static testing | 2014 | View | Taxonomy of Common Software Testing Terminology: Framework for Key Software Engineering Testing Concepts |
Roggio, Gordon, Comer
|
statistical analysis | 2012 | View | Applying Business Intelligence Concepts to Medicaid Claim Fraud Detection |
Copeland, Edberg, Wendel
|
strategic | 2021 | View | Interpreting Organizational Security Governance Objectives for Strategic Security Planning |
Mishra
|
strategic IT | 2023 | View | Influence of Reporting structure and Perception of Role of Information Technology on Decision-making: A Qualitative Study |
Pandey, Mishra
|
Strategic planning | 2020 | View | Examining Organizational Security Governance (OSG) Objectives: How is strategic planning for Security is undertaken at ABC Corporation? |
Mishra
|
strategic use of IT | 2011 | View | Make or Buy: A comparative assessment of organizations that develop software internally versus those that purchase software |
Sena, Sena
|
strategy | 2020 | View | Privacy Considerations Throughout the Data Life Cycle |
Pomykalski
|
strategy | 2015 | View | A Cloud Computing Methodology Study of Platform-as-a-Service (PaaS) in the Financial Industry |
Lawler, Howell-Barber, Joseph
|
strategy | 2014 | View | A Study of Cloud Computing Infrastructure-as-a-Service (IaaS) in Financial Firms |
Lawler, Howell-Barber, Joseph, Narula
|
strategy | 2013 | View | A Study of Cloud Computing Software-as-a-Service (SaaS) in Financial Firms |
Lawler, Howell-Barber, Desai, Joseph
|
strategy | 2013 | View | Building a Competitive Edge through Social Media |
Aimiuwu
|
structural | 2021 | View | Interpreting Organizational Security Governance Objectives for Strategic Security Planning |
Mishra
|
structural equation modeling | 2012 | View | An Empirical Study of Social Networking Behavior Using Theory of Reasoned Action |
Peslak, Ceccucci, Sendall
|
structural equation modeling | 2010 | View | An Empirical Study of Instant Messaging Behavior Using Diffusion of Innovation Theory |
Peslak, Ceccucci, Sendall
|
Student engagement | 2023 | View | Measuring Learners’ Cognitive Load When Engaged with an Algorithm Visualization Tool |
Fathi, Teresco, Regan
|
Student learning | 2023 | View | Measuring Learners’ Cognitive Load When Engaged with an Algorithm Visualization Tool |
Fathi, Teresco, Regan
|
Student Learning Outcomes | 2021 | View | Enhancing Learning Analytics: The Rise of Institutional Research |
Perkins, Ariyachandra
|
subset of attributes | 2012 | View | Maximizing Visibility in Skylines |
Miah
|
success | 2011 | View | A Study of Information Technology Integration |
Peslak
|
success factors | 2017 | View | Building Client Vendor Alignment Capability in Strategic Information Systems Outsourcing |
Ghosh
|
supply chain | 2021 | View | Towards a Leader-Driven Supply Chain Cybersecurity Framework |
Vanajakumari, Mittal, Stoker, Clark, Miller
|
Supply chain management | 2021 | View | Case Study of Blockchain Applications in Supply Chain Management- Opportunities and Challenges |
Smith, Xiong, Medlin
|
Supply chain management | 2021 | View | The Promise and Perild of Drone Delivery Systems |
Fowler, Vannoy, Eggers, Medlin
|
Supply chain management | 2013 | View | Rocky Relationships: Enterprise Resource Planning and Supply Chain Management |
Crumbly, Fryling
|
supply chain performance | 2024 | View | Decisional Guidance to Promote Motivation in Supply Chain Decision Making |
Haines, Hodges
|
Support Vector Machines | 2023 | View | Identification of Stressed Wolf Populations Based on Hormone Levels Using Support Vector Machines (SVM) |
Stewart, Davis
|
Survey | 2022 | View | Determinants of Health Professionals’ Intention to Adopt Electronic Health Record Systems |
Du, Sturgill
|
Survey | 2018 | View | Student Intentions and Behaviors Related to Email Security: An Application of the Health Belief Model |
Schymik, Du
|
Survey | 2010 | View | Factors that Persuade and Deter Membership in Professional Computing Associations |
Umapathy, Jamba, Ritzhaupt
|
Surveys | 2017 | View | Crowdsourcing Surveys: Alternative Approaches to Survey Collection |
Cummings, Sibona
|
Sustainability | 2022 | View | Harvesting Intrinsically Verifiable Trust: Building a Honey Traceability System for Sustainable Development |
Runzel, Hassler, Hadley, Ratcliffe, Wilkes, Cazier
|
Sustainability | 2020 | View | Trash to Treasure: Predicting Landfill Gas Flow to Optimize Electricity Generation |
Hassler, Emery, Hoyle, Cazier
|
Sustainability | 2019 | View | Standardizing Public Utility Data: A Case Study of a Rural Mid-Size Utility |
Hassler, Cazier, Russell, Mueller, Paprocki
|
Sustainability | 2008 | View | Assessing the Role of CSR in Outsourcing Decisions |
Babin
|
switching behavior | 2023 | View | E-Commerce Drone Delivery Acceptance: A Study of Gen Z's Switching Intention |
Kaleta, Xie, Chen
|
Synchronous Online Math Competition | 2023 | View | A Serverless Real-Time Data Streaming Architecture for Synchronous Online Math Competition |
Liu, Chung
|
System Development | 2020 | View | Knowledge Management System Development: Handling Evolution from Explicit to Tacit and Social |
Mew, Money
|
System Development Methodology | 2010 | View | System Development Methodology Usage in Industry: A Review and Analysis |
Griffin, Brandyberry
|
System Dynamics | 2015 | View | ERP Customization vs. Business Process Reengineering: Technical and Functional Perceptions |
Fryling
|
System integration | 2017 | View | Identifying the Critical Success Factors for Information Systems to Manage Sponsored Research Activities at Institutions of Higher Education |
Lehman, Ruzich
|
Systems analysis | 2018 | View | Cloud Computing: Implications for Information Systems Development Service Providers and Practitioners |
Mew, Money
|
Systems analysis & design | 2014 | View | Can Social Media aid Software Development? |
Reinicke, Cummings
|
Systems development | 2018 | View | Cloud Computing: Implications for Information Systems Development Service Providers and Practitioners |
Mew, Money
|
Systems development | 2014 | View | Can Social Media aid Software Development? |
Reinicke, Cummings
|
Systems development methods | 2012 | View | Co-Creating Value in Systems Development: A Shift towards Service-Dominant Logic |
Babb, Keith
|
systems integration | 2011 | View | A Study of Information Technology Integration |
Peslak
|
Systems thinking | 2017 | View | A Multi-Criteria Network Assessment Model of IT Offshoring Risks from Service Provider's Perspective |
Petkov, Petkova
|