Keyword | Year Pub | Article | Title | Authors |
TAM | 2021 | View | The Sting of Adoption: The Technology Acceptance Model (TAM) with Actual Usage in a Hazardous Environment |
Hassler, MacDonald, Cazier, Wilkes
|
TAM | 2010 | View | An Empirical Study of Text Messaging Behavioral Intention and Usage |
Peslak, Ceccucci, Sendall
|
Task-Technology Fit Theory | 2019 | View | Aligning the Factors of Skill, Technology and Task to Influence the Continued Use of Mobile Payment Users in China |
Chen, Choi, Xiong, Tang
|
Taxonomy | 2011 | View | A Process for Assessing Voting System Risk Using Threat Trees |
Yasinisac, Pardue
|
Tcpdump | 2019 | View | The use of Snap Length in Lossy Network Traffic Compression for Network Intrusion Detection Applications |
Smith, Hammell II
|
Technology | 2023 | View | Impact of Emergent Technologies on US Workforce: Exploratory Analysis |
Toskin
|
Technology acceptance | 2010 | View | Women's Technology Acceptance of Mentoring on the Internet |
Gibson, GIBSON
|
Technology Acceptance Model | 2021 | View | The Sting of Adoption: The Technology Acceptance Model (TAM) with Actual Usage in a Hazardous Environment |
Hassler, MacDonald, Cazier, Wilkes
|
Technology acceptance model (TAM) | 2018 | View | Text Messaging Today: A Longitudinal Study of Variables Influencing Text Messaging from 2009 to 2016 |
Peslak, Hunsinger, Kruck
|
Technology acceptance model (TAM) | 2016 | View | Exploratory Study of Effects of eLearning System Acceptance on Learning Outcomes |
Ghosh
|
Technology acceptance model (TAM) | 2011 | View | Factors Influencing People to Use Linux |
Hunsinger, Fransen
|
Technology acceptance model (TAM) | 2010 | View | An Empirical Study of Text Messaging Behavioral Intention and Usage |
Peslak, Ceccucci, Sendall
|
Technology acceptance model (TAM) | 2009 | View | Analysis of the Factors that Influence Online Purchasing |
Amoroso, Hunsinger
|
Technology adoption | 2021 | View | Case Study of Blockchain Applications in Supply Chain Management- Opportunities and Challenges |
Smith, Xiong, Medlin
|
Technology Awareness | 2010 | View | Spyware: What Influences College Students to Use Anti-Spyware Tools? |
Ward, Hunsinger
|
technology diffusion | 2009 | View | The Impact of Technology Diffusion on Employment, Compensation, and Productivity: Evidence from the Telecommunications Sector |
Clark, Moussawi
|
Technology Threat Avoidance Theory | 2024 | View | U.S. Healthcare System’s Electronic Health Records Security Threat Avoidance |
Woldeyohannis, Lind
|
Technology-mediated Learning | 2016 | View | Exploratory Study of Effects of eLearning System Acceptance on Learning Outcomes |
Ghosh
|
technology-skill complementarity | 2009 | View | The Impact of Technology Diffusion on Employment, Compensation, and Productivity: Evidence from the Telecommunications Sector |
Clark, Moussawi
|
telecommunication regulation | 2013 | View | Global Diffusion of Virtual Social Networks: A Pyramid Model of Cultural, Developmental and Regulatory Foundations |
Wang, Sun
|
term frequency | 2024 | View | Using Textual Analytics to Process Information Overload of Cyber Security Subreddits |
Omakwu , Wimmer, Rebman Jr.
|
Terminal Ballistics | 2014 | View | Predicting the Terminal Ballistics of Kinetic Energy Projectiles Using Artificial Neural Networks |
Auten, Hammell II
|
testing levels | 2014 | View | A Comparison of Software Testing Using the Object-Oriented Paradigm and Traditional Testing |
Gordon, Roggio
|
Texas Emerging Technology Fund | 2010 | View | Towards an Abstract Model for Academia and Information Technology Sector Collaborative Partnerships: Responding to the “West Texas Coalition for Innovation and Commercialization” Initiative |
Mhlanga, Vardiman, Reames
|
Text Analytics | 2024 | View | Using Textual Analytics to Process Information Overload of Cyber Security Subreddits |
Omakwu , Wimmer, Rebman Jr.
|
Text Analytics | 2020 | View | Literary Analysis Tool: Text Analytics for Creative Writers |
Grimsman, Kline, Vetter, Guinn
|
Text Messaging | 2018 | View | Text Messaging Today: A Longitudinal Study of Variables Influencing Text Messaging from 2009 to 2016 |
Peslak, Hunsinger, Kruck
|
Text Messaging | 2012 | View | Talk to Text: Changing Communication Patterns |
Pinchot, Douglas, Paullet, Rota
|
Text Messaging | 2010 | View | An Empirical Study of Text Messaging Behavioral Intention and Usage |
Peslak, Ceccucci, Sendall
|
Text Prediction | 2023 | View | Text Prediction Using Artificial Intelligence: An Analysis of Two Text Prediction Systems |
Wimmer, Du, Heri
|
texting | 2012 | View | Talk to Text: Changing Communication Patterns |
Pinchot, Douglas, Paullet, Rota
|
thematic analysis | 2020 | View | Addressing issues with EMR resulting in workarounds: An exploratory study
|
Mishra, Slonka, Draus, Bromall, Slonka
|
Theory of planned behavior | 2018 | View | Text Messaging Today: A Longitudinal Study of Variables Influencing Text Messaging from 2009 to 2016 |
Peslak, Hunsinger, Kruck
|
Theory of planned behavior | 2013 | View | What Influences Students to Use Dropbox? |
Hunsinger, Corley
|
Theory of planned behavior | 2012 | View | Google Chrome and the Paradigm Shifts in the Browser Market Among Users |
Corley, Hunsinger
|
Theory of planned behavior | 2011 | View | Factors Influencing People to Use Linux |
Hunsinger, Fransen
|
Theory of planned behavior | 2010 | View | Spyware: What Influences College Students to Use Anti-Spyware Tools? |
Ward, Hunsinger
|
Theory of reasoned action | 2018 | View | Text Messaging Today: A Longitudinal Study of Variables Influencing Text Messaging from 2009 to 2016 |
Peslak, Hunsinger, Kruck
|
Theory of reasoned action | 2012 | View | An Empirical Study of Social Networking Behavior Using Theory of Reasoned Action |
Peslak, Ceccucci, Sendall
|
Theory of reasoned action | 2010 | View | An Empirical Study of Text Messaging Behavioral Intention and Usage |
Peslak, Ceccucci, Sendall
|
threat trees | 2011 | View | A Process for Assessing Voting System Risk Using Threat Trees |
Yasinisac, Pardue
|
TikTok | 2024 | View | Social Media Users Only Have Two Clusters: A United States Analysis |
Peslak, Kovalchick, Menon
|
time based tradeoff | 2012 | View | Using the cloud: Keeping Enterprise Data Private |
Cronin, Pauli, Ham
|
Timeline | 2010 | View | System Development Methodology Usage in Industry: A Review and Analysis |
Griffin, Brandyberry
|
Tobin's Q | 2014 | View | Performance and Corporate Social Responsibility in the Information Technology Industry |
Cowan, Parzinger, Welch, Welch
|
TOE Framework | 2018 | View | Exploratory Study of Organizational Adoption of Cloud based Big Data Analytics |
Ghosh
|
Total Cost of Ownership | 2015 | View | ERP Customization vs. Business Process Reengineering: Technical and Functional Perceptions |
Fryling
|
TRA | 2012 | View | An Empirical Study of Social Networking Behavior Using Theory of Reasoned Action |
Peslak, Ceccucci, Sendall
|
TRA | 2010 | View | An Empirical Study of Text Messaging Behavioral Intention and Usage |
Peslak, Ceccucci, Sendall
|
traditional backup | 2021 | View | A Comparative Study on Information Technology (IT) Infrastructure and Disaster Recovery Methodology |
Sambasivam, Brown Jr
|
traditional testing | 2014 | View | A Comparison of Software Testing Using the Object-Oriented Paradigm and Traditional Testing |
Gordon, Roggio
|
Traffic Analysis | 2019 | View | Adversarial Machine Learning for Cyber Security |
De Lucia, Cotton
|
transition cost | 2010 | View | The Impact of Transition Costs on Offshore Systems Development |
DeHondt, Leidig
|
Trust | 2022 | View | Determinants of Health Professionals’ Intention to Adopt Electronic Health Record Systems |
Du, Sturgill
|
Trust | 2022 | View | Harvesting Intrinsically Verifiable Trust: Building a Honey Traceability System for Sustainable Development |
Runzel, Hassler, Hadley, Ratcliffe, Wilkes, Cazier
|
Trust | 2009 | View | Analysis of the Factors that Influence Online Purchasing |
Amoroso, Hunsinger
|
Twitter | 2021 | View | Exploring Sentiment Towards Contact Tracing |
Crable, Sena
|
Twitter Data | 2017 | View | An Interactive Toolbox for Twitter Content Analytics |
Jafar, Waldman
|