Institution | Year Pub | Article | Title | Authors |
U Texas | 2010 | View | Incorporation of Information Technology into Assisted Health Care: An Empirical Study |
Merrill, White
|
University of Delaware | 2019 | View | Adversarial Machine Learning for Cyber Security |
De Lucia, Cotton
|
University of Electronic Science and Technology of China | 2020 | View | Conceptualization of Blockchain-based Applications: Technical Background and Social Perspective |
Xiong, Tang, Medlin
|
University of Electronic Science and Technology of China | 2019 | View | Aligning the Factors of Skill, Technology and Task to Influence the Continued Use of Mobile Payment Users in China |
Chen, Choi, Xiong, Tang
|
University of Glasgow | 2015 | View | Identifying User Behavior from Residual Data in Cloud-based Synchronized Apps |
Grispos, Glisson, Pardue, Dickson
|
University of Michigan - Flint | 2008 | View | The Importance of Business Process Alignment for IT Project Management of Commercial Software with Case Studies |
Kraft
|
University of Nebraska Omaha | 2013 | View | The Impact of Regulatory Changes on IS Strategy: An Exploratory Study |
Reinicke, Ward
|
University of Nevada, Reno | 2012 | View | Applying Business Intelligence Concepts to Medicaid Claim Fraud Detection |
Copeland, Edberg, Wendel
|
University of North Carolina Wilmington | 2024 | View | An Action Research Approach to Building an Enterprise-Specific Chatbot (ESCB) |
Wood, Stoker
|
University of North Carolina Wilmington | 2023 | View | An Exploration of the Benefits of Certifications and their Relationship to Salaries in IS/IT |
Matthews, Cummings, Janicki
|
University of North Carolina Wilmington | 2022 | View | A Scalable Amazon Review Collection System |
Woodall, Kline, Vetter, Modaresnezhad
|
University of North Carolina Wilmington | 2022 | View | Cybersecurity Maturity Model Certification Initial Impact on the Defense Industrial Base
|
Strohmier, Stoker, Vanajakumari, Clark, Cummings, Modaresnezhad
|
University of North Carolina Wilmington | 2021 | View | Towards a Leader-Driven Supply Chain Cybersecurity Framework |
Vanajakumari, Mittal, Stoker, Clark, Miller
|
University of North Carolina Wilmington | 2020 | View | Literary Analysis Tool: Text Analytics for Creative Writers |
Grimsman, Kline, Vetter, Guinn
|
University of North Carolina Wilmington | 2020 | View | Understanding Campus Crime with a Multi-University Analytics System |
Iheadindu, Kline, Vetter, Clark
|
University of North Carolina Wilmington | 2019 | View | Changes in the Information Technology Field: A Survey of Current Technologies and Future Importance
|
Cummings, Janicki
|
University of North Carolina Wilmington | 2018 | View | Information Security and Privacy Legislation:
Current State and Future Direction |
Dunlap, Cummings, Janicki
|
University of North Carolina Wilmington | 2018 | View | Minimalism in Data Visualization: Perceptions of Beauty, Clarity, Effectiveness, and Simplicity |
Hill, Wray, Sibona
|
University of North Carolina Wilmington | 2017 | View | Crowdsourcing Surveys: Alternative Approaches to Survey Collection |
Cummings, Sibona
|
University of North Carolina Wilmington | 2016 | View | Moving Beyond Coding: Why Secure Coding Should be Implemented |
Grover, Cummings, Janicki
|
University of North Carolina Wilmington | 2015 | View | Cyber Security Best Practices: What to do? |
Kleinberg, Reinicke, Cummings
|
University of North Carolina Wilmington | 2014 | View | Can Social Media aid Software Development? |
Reinicke, Cummings
|
University of North Carolina Wilmington | 2014 | View | Shifting Technological Landscape: IT Departments and Anticipated Technological Changes |
Cummings, Janicki, Kline
|
University of North Carolina Wilmington | 2013 | View | Analysis of Electronic Health |
Mitchell, Clark
|
University of North Carolina Wilmington | 2013 | View | Creating an Audio Conferencing Application |
Sun, Vetter, Reinicke
|
University of North Carolina Wilmington | 2013 | View | Information Security Blueprint |
Clark, Benli, Mitchell, Vetter
|
University of North Carolina Wilmington | 2013 | View | The Impact of Intra-Organizational Social |
Cummings
|
University of North Carolina Wilmington | 2012 | View | Building a Real-Time Bus Tracking Data Display System |
Dudley, Vetter, Brown, Janicki
|
University of North Carolina Wilmington | 2012 | View | CMobile: A Mobile Photo Capture Application for Construction Imaging |
Martin, Vetter, Brown, Janicki
|
University of North Carolina Wilmington | 2011 | View | Password Security Risk versus Effort: An Exploratory Study on User-Perceived Risk and the Intention to Use Online Applications |
Gebauer, Kline, He
|
University of North Carolina Wilmington | 2010 | View | Factors that Persuade and Deter Membership in Professional Computing Associations |
Umapathy, Jamba, Ritzhaupt
|
University of North Carolina Wilmington | 2010 | View | Network Growing Pains |
Clark, Mahar, Moussawi
|
University of North Carolina Wilmington | 2009 | View | Anticipated Changes to Technologies |
Janicki, Clark, Mahar, Logan
|
University of North Carolina Wilmington | 2009 | View | The Impact of Technology Diffusion on Employment, Compensation, and Productivity: Evidence from the Telecommunications Sector |
Clark, Moussawi
|
University of North Carolina Wilmington | 2008 | View | Computing Professional Association Membership: An Exploration of Membership Needs and Motivations |
Ritzhaupt, Umapathy, Jamba
|
University of North Florida | 2020 | View | Developing a GIS Dashboard Tool to Inform Non-Profit Hospitals of Community Health Needs at the Neighborhood Level |
Copello, Smith, Mease, Umapathy, Richard, Knight, Albertie, Hamadi, Spaulding, Apatu
|
University of North Florida | 2014 | View | A Comparison of Software Testing Using the Object-Oriented Paradigm and Traditional Testing |
Gordon, Roggio
|
University of North Florida | 2014 | View | Taxonomy of Common Software Testing Terminology: Framework for Key Software Engineering Testing Concepts |
Roggio, Gordon, Comer
|
University of North Florida | 2013 | View | Comparing Performance of Web Service Interaction Styles: SOAP vs. REST |
Kumar, Ahuja, Umapathy, Prodanoff
|
University of North Florida | 2010 | View | Factors that Persuade and Deter Membership in Professional Computing Associations |
Umapathy, Jamba, Ritzhaupt
|
University of North Florida | 2008 | View | Computing Professional Association Membership: An Exploration of Membership Needs and Motivations |
Ritzhaupt, Umapathy, Jamba
|
University of North Texas | 2024 | View | Information Adoption of User-Generated Content: An Applied Model for COVID Pandemic Case |
Xie, Dhillon
|
University of Ottawa | 2016 | View | Driving Inside Sales Performance with Lead Management Systems: A Conceptual Model |
Ohiomah, Benyoucef, Andreev
|
University of Ottawa | 2014 | View | Similarity and Ties in Social Networks |
Afrasiabi Rad, Benyoucef
|
University of Ottawa | 2012 | View | Measuring Propagation in Online Social Networks: The case of YouTube |
Afrasiabi Rad, Benyoucef
|
University of Ottawa | 2011 | View | A Model for Understanding Social Commerce |
Afrasiabi Rad, Benyoucef
|
University of Richmond | 2020 | View | Knowledge Management System Development: Handling Evolution from Explicit to Tacit and Social |
Mew, Money
|
University of Richmond | 2018 | View | Cloud Computing: Implications for Information Systems Development Service Providers and Practitioners |
Mew, Money
|
University of San Diego | 2024 | View | Network Intrusion Detection system with Machine learning Intrusion Detection System with Machine Learning As a Service |
Kangethe , Wimmer, Rebman Jr.
|
University of San Diego | 2024 | View | Using Textual Analytics to Process Information Overload of Cyber Security Subreddits |
Omakwu , Wimmer, Rebman Jr.
|
University of San Diego | 2021 | View | An International Review and Study on Perceptions of Security, Adoption, and Implementation of Electronic Health Records |
Aliyu, Wimmer, Powell, Rebman Jr.
|
University of San Diego | 2020 | View | An Exploratory Study of the Perceptions of Library Faculty and Patrons on Library Resources |
Herman, Wimmer, Rebman Jr.
|
University of South Alabama | 2015 | View | Identifying User Behavior from Residual Data in Cloud-based Synchronized Apps |
Grispos, Glisson, Pardue, Dickson
|
University of South Alabama | 2011 | View | A Process for Assessing Voting System Risk Using Threat Trees |
Yasinisac, Pardue
|
University of South Carolina Upstate | 2023 | View | Measuring Analytics Maturity and Culture: The LDIS+™ Analytics Impact Framework |
Fowler, Sambasivam
|
University of South Florida | 2022 | View | Impact of Review Valence and Perceived Uncertainty on Purchase of Time-Constrained and Discounted Search Goods |
Muzumdar
|
University of Texas - Dallas | 2023 | View | A Comparative Analysis of Web Application Vulnerability Tools |
Garcia, Abraham, Kepic, Cankaya
|
University of Texas at San Antonio | 2014 | View | Performance and Corporate Social Responsibility in the Information Technology Industry |
Cowan, Parzinger, Welch, Welch
|
University of Texas Pan American | 2014 | View | Online versus In-Store: Price Differentiation for Multi-Channel Retailers |
Flores, Sun
|
University of Texas Pan American | 2013 | View | Global Diffusion of Virtual Social Networks: A Pyramid Model of Cultural, Developmental and Regulatory Foundations |
Wang, Sun
|
University of Texas Pan American | 2009 | View | A Study of the Information Technology Trade between the United States and the Dominican Republic-Central America Free Trade Agreement Nations |
Pena, Aguirre, Saenz, Koong, Liu
|
University of Texas, Dallas | 2009 | View | The Impact of Technology Diffusion on Employment, Compensation, and Productivity: Evidence from the Telecommunications Sector |
Clark, Moussawi
|
University of the Cumberlands | 2024 | View | Examining Factors Influencing the Acceptance of Big Data Analytics in Healthcare
|
Mohammed, Lind
|
University of the Cumberlands | 2024 | View | U.S. Healthcare System’s Electronic Health Records Security Threat Avoidance |
Woldeyohannis, Lind
|
University of the Virgin Islands | 2010 | View | Towards an Abstract Model for Academia and Information Technology Sector Collaborative Partnerships: Responding to the “West Texas Coalition for Innovation and Commercialization” Initiative |
Mhlanga, Vardiman, Reames
|
University of Tulsa | 2024 | View | Investigating the Relationship between Developer Job Satisfaction and Life Satisfaction: A Global Analysis |
Peslak, Ceccucci, Jones, Leonard
|
University of Tulsa | 2023 | View | The Effect of Mental Illness on Compensation for IT Developers |
Peslak, Ceccucci, Jones, Leonard
|
University of Wisconsin Stevens Point | 2010 | View | Creating the Pilot AJAX Enabled Query Tool |
Ford, Dollinger
|
Unknown | 2023 | View | QR Code Hacking – Detecting Multiple Vulnerabilities in Android Scanning Software |
Homan, Breese
|
US Army Research Laboratory | 2019 | View | The use of Snap Length in Lossy Network Traffic Compression for Network Intrusion Detection Applications |
Smith, Hammell II
|
US Army Research Laboratory | 2017 | View | Proposal for Kelly Criterion-Inspired Lossy Network Compression for Network Intrusion Applications |
Smith, Hammell II
|