Year Pub | Article | Title | Authors |
2014 | View | Decision-Making via Visual Analysis using the Natural Language Toolkit and R |
Jafar, Babb, Dana
|
2023 | View | Identification of Stressed Wolf Populations Based on Hormone Levels Using Support Vector Machines (SVM) |
Stewart, Davis
|
2022 | View | Classification of Hunting-Stressed Wolf Populations Using Machine Learning
|
Stewart, Davis, Igoche
|
2012 | View | The New Tech Effect: Analyzing Juror Credibility |
Davis, Paullet, Kraeer, Grant
|
2019 | View | Adversarial Machine Learning for Cyber Security |
De Lucia, Cotton
|
2022 | View | Security Control Techniques: Cybersecurity & Medical Wearable Devices |
Sambasivam, Deal
|
2011 | View | A Methodology Tailoring Model for Practitioner Based Information Systems Development Informed by the Principles of General Systems Theory |
Burns, Deek
|
2012 | View | Outsourcing Best Practices |
Mikita, DeHondt
|
2010 | View | The Impact of Transition Costs on Offshore Systems Development |
DeHondt, Leidig
|
2014 | View | Risk Assessment & Management in Merchant Capture Systems: A Threat Analysis Perspective |
Streff, Shrestha, Delzer
|
2020 | View | Geographic Information System and Gerrymandering
|
Wu, DePlato, Combs
|
2013 | View | A Study of Cloud Computing Software-as-a-Service (SaaS) in Financial Firms |
Lawler, Howell-Barber, Desai, Joseph
|
2024 | View | Information Adoption of User-Generated Content: An Applied Model for COVID Pandemic Case |
Xie, Dhillon
|
2015 | View | Identifying User Behavior from Residual Data in Cloud-based Synchronized Apps |
Grispos, Glisson, Pardue, Dickson
|
2009 | View | The Accessibility of College and University Home Pages |
DiLallo, Siegfried
|
2010 | View | Creating the Pilot AJAX Enabled Query Tool |
Ford, Dollinger
|
2018 | View | What’s “Appening” to our Privacy?
A Students Perspective on Downloading Mobile Apps
|
Paullet, Chawdhry, Douglas, Compomizzi
|
2017 | View | Downloading Mobile Applications - Are Students Protecting Themselves |
Chawdhry, Paullet, Douglas, Compomizzi
|
2012 | View | Talk to Text: Changing Communication Patterns |
Pinchot, Douglas, Paullet, Rota
|
2020 | View | Addressing issues with EMR resulting in workarounds: An exploratory study
|
Mishra, Slonka, Draus, Bromall, Slonka
|
2024 | View | Insights for the next viral outbreak: An information systems applied research based on lessons from COVID-19 |
D'Souza, Mishra
|
2023 | View | Text Prediction Using Artificial Intelligence: An Analysis of Two Text Prediction Systems |
Wimmer, Du, Heri
|
2022 | View | Determinants of Health Professionals’ Intention to Adopt Electronic Health Record Systems |
Du, Sturgill
|
2018 | View | Student Intentions and Behaviors Related to Email Security: An Application of the Health Belief Model |
Schymik, Du
|
2015 | View | Building a Better Stockbroker: Managing Big (Financial) Data by Constructing an Ontology-Based Framework |
Westrick, Du, Wolffe
|
2012 | View | Building a Real-Time Bus Tracking Data Display System |
Dudley, Vetter, Brown, Janicki
|
2018 | View | Information Security and Privacy Legislation:
Current State and Future Direction |
Dunlap, Cummings, Janicki
|
2017 | View | Malvertising - A Rising Threat To The Online Ecosystem |
Dwyer, Kanguri
|
2016 | View | Leakage of Geolocation Data by Mobile Ad Networks |
Snow, Hayes, Dwyer
|