AUTHOR |
TITLE |
CHAIR |
YEAR |
MUNTHER GHAZAWNEH |
ASSESSING ORGANIZATIONAL INVESTMENTS IN CYBERSECURITY AND FINANCIAL PERFORMANCE BEFORE AND AFTER DATA BREACH INCIDENTS OF CLOUD SAAS PLATFORMS |
LEVY |
2024 |
HOLLIS GREENBERG |
HEED THE WARNING SIGNS: THE EFFECTIVENESS OF MESSAGE POPUP WARNINGS FOR DETERRING THE SPREAD OF MISINFORMATION |
DRINGUS |
2024 |
OLADAYO LUKE |
ENHANCING SIGN LANGUAGE RECOGNITION AND HAND GESTURE DETECTION USING CONVOLUTIONAL NEURAL NETWORKS AND DATA AUGMENTATION TECHNIQUES |
MUKHERJEE |
2024 |
ARIEL LUNA |
EMPIRICAL ASSESSMENT OF REMOTE WORKERS’ CYBERSLACKING AND COMPUTER SECURITY POSTURE TO ASSESS ORGANIZATIONAL CYBERSECURITY RISKS |
LEVY |
2024 |
AARON RAMEY |
USING ONTOLOGICAL METHODS TO COMPARE CYBERSECURITY MATURITY MODEL CERTIFICATION 2.0 AND COBIT 19 |
WANG |
2024 |
DARREN WIGGINS |
UNDERSTANDING THE ROLE OF TACIT AND EXPLICIT KNOWLEDGE HIDING IN ORGANIZATIONS |
WANG |
2024 |
CONRAD BELL |
ASPECT-ADVICE INTERFERENCE: DATA INTERACTIONS IN ASPECTJ |
MITROPOULOS |
2023 |
VANESSA COOPER |
OPTIMIZING CONSTRAINT SELECTION IN A DESIGN VERIFICATION ENVIRONMENT FOR EFFICIENT COVERAGE CLOSURE |
MUKHERJEE |
2023 |
SHERI JAMES |
A STUDY OF THE EFFECT OF TYPES OF ORGANIZATIONAL CULTURE ON INFORMATION SECURITY PROCEDURAL COUNTERMEASURES |
WANG |
2023 |
JAMES LOVING |
THE APPLICATION OF GENOMIC COMPRESSION TECHNIQUES TO NETWORK TRAFFIC |
CANNADY |
2023 |
DAVID NOEL |
AN INVESTIGATION OF METHODS FOR IMPROVING SPATIAL INVARIANCE OF CONVOLUTIONAL NEURAL NETWORKS FOR IMAGE CLASSIFICATION |
MUKHERJEE |
2023 |
MICHAEL ROONEY |
AN EMPIRICAL ASSESSMENT OF THE USE OF PASSWORD WORKAROUNDS AND THE CYBERSECURITY RISK OF DATA BREACHES |
LEVY |
2023 |
JACKIE SCOTT |
COMPARING PHISHING TRAINING AND CAMPAIGN METHODS FOR MITIGATING MALICIOUS EMAILS IN ORGANIZATIONS |
LEVY |
2023 |
ANABETSY TERMINI |
ADVERSARIAL TRAINING OF DEEP NEURAL NETWORKS |
MUKHERJEE |
2023 |
ANDRE VIEIRA |
INTEGRATING THE SPATIAL PYRAMID POOLING STRATEGY INTO 3D CONVOLUTIONAL NEURAL NETWORKS FOR AUTOMATIC DETECTION OF CEREBRAL MICROBLEEDS |
MUKHERJEE |
2023 |
ENAS ALBATAINEH |
IMPROVING EMPLOYEES’ COMPLIANCE WITH PASSWORD POLICIES |
WANG |
2022 |
PATRICIA BAKER |
A UNIVERSAL CYBERSECURITY COMPETENCY FRAMEWORK FOR ORGANIZATIONAL USERS |
LEVY |
2022 |
GEORGE COOPER |
IMPACT OF KNOWLEDGE MANAGEMENT PROCESSES UPON JOB SATISFACTION AND JOB PERFORMANCE |
WANG |
2022 |
MUDASSAR GHAZI |
DIAGNOSIS OF ERRORS IN STALLED INTER-ORGANIZATIONAL WORKFLOW PROCESSES |
MITROPOULOS |
2022 |
ELJILANI HMOUDA |
A VALIDITY BASED APPROACH FOR FEATURE SELECTION IN INTRUSION DETECTION SYSTEMS |
LI |
2022 |
WINNYANNE KUNKLE |
INVESTIGATING THE USER EXPERIENCE OF A 3D VIRTUAL ANATOMY SYSTEM |
DRINGUS |
2022 |
KEVIN PARVIZ |
AN EMPIRICAL INVESTIGATION OF THE EVIDENCE RECOVERY PROCESS IN DIGITAL FORENSICS |
MUKHERJEE |
2022 |
TOMMY POLLOCK |
EXPERIMENTAL STUDY TO ASSESS THE ROLE OF ENVIRONMENT AND DEVICE TYPE ON THE SUCCESS OF SOCIAL ENGINEERING ATTACKS: THE CASE OF JUDGMENT ERRORS |
LEVY |
2022 |
AMMAR QAFFAF |
FACTORS AFFECTING CUSTOMERS’ DECISION TO SHARE PERSONAL DATA WITH MOBILE OPERATORS |
WANG |
2022 |
HARI ROOSMAN |
INFORMATION SYSTEMS SECURITY COUNTERMEASURES: AN ASSESSMENT OF OLDER WORKERS IN INDONESIAN SMALL AND MEDIUM-SIZED BUSINESSES |
SNYDER |
2022 |
HIMA BINDU SADASHIVA REDDY |
EXPLORING THE EXISTING AND UNKNOWN SIDE EFFECTS OF PRIVACY PRESERVING DATA MINING ALGORITHMS |
WANG |
2022 |
ABRAR TURKISTANI |
THE APPLICATION OF BLOCKCHAIN TECHNOLOGY TO PROTECT AUTHOR’S COPYRIGHT |
HUR |
2022 |
BRADLEY WANGIA |
SOCIAL MEDIA ANALYTICS AND INFORMATION PRIVACY DECISIONS: IMPACT OF USER INTIMATE KNOWLEDGE AND CO-OWNERSHIP PERCEPTIONS |
WANG |
2022 |
CESAR ZALZALAH |
AN APPROACH FOR EFFICIENT ROBUST ADVERSARIAL TRAINING IN DEEP NEURAL NETWORKS |
LI |
2022 |
AMY ANTONUCCI |
PAUSE FOR A CYBERSECURITY CAUSE: ASSESSING THE INFLUENCE OF A WAITING PERIOD ON USER HABITUATION IN MITIGATION OF PHISHING ATTACKS |
LEVY |
2021 |
DAVID ASON |
NEURAL NETWORK VARIATIONS FOR TIME SERIES FORECASTING |
MUKHERJEE |
2021 |
MAY BANTAN |
ASSESSING LEARNER’S PRIVACY BEHAVIORS THROUGH THE LENS OF GENDER EGALITARIANISM CULTURAL FACTOR IN A BLENDED-LEARNING CONTEXT: STUDENT’S PERSPECTIVE AT SAUDI ELECTRONIC UNIVERSITY |
WANG |
2021 |
HENRY BRUCKMAN |
AUDITORY FEEDBACK IN INTEGRATED DEVELOPMENT ENVIRONMENTS TO PROVIDE COGNITIVE SUPPORT FOR NOVICE DEVELOPERS |
LASZLO |
2021 |
CHRIS BUSH |
PROTECTING THE PROTECTOR: MAPPING THE KEY TERRAIN THAT SUPPORTS THE CONTINUOUS MONITORING MISSION OF A CYBERSECURITY SERVICE PROVIDER |
ABRAMSON |
2021 |
ERNESTO CUSTODIO |
THE CONSTRUCTION AND INTERNAL VALIDATION OF A MODEL FOR THE EFFECTIVE COLLABORATION OF DISTRIBUTED AGILE TEAMS |
SNYDER |
2021 |
ALI EL-SHARIF |
TRUSTED MACHINE LEARNING MODEL FOR CLINICAL DECISION MAKING |
MUKHERJEE |
2021 |
TITUS FOFUNG |
EXAMINATION OF THE COMPUTER SECURITY BEHAVIORS OF TELECOMMUTERS WORKING WITH CONFIDENTIAL DATA THROUGH LEVERAGING THE FACTORS FROM FEAR APPEALS MODEL (FAM) |
WANG |
2021 |
FRED GUYTON |
FEATURE SELECTION ON PERMISSIONS, INTENTS, AND APIS FOR ANDROID MALWARE DETECTION |
LI |
2021 |
DOUGLAS HALE |
INVESTIGATION OF ANT COLONY OPTIMIZATION IMPLEMENTATION STRATEGIES FOR LOW-MEMORY OPERATING ENVIRONMENTS |
MUKHERJEE |
2021 |
RAMON HURLOCKDICK |
HOW NON-COMPLIANCE IMPACTS SECURITY INCIDENTS: A PUBLIC SECTOR CASE STUDY OF APPLICATION SECURITY AND PROPER DATA GOVERNANCE |
WANG |
2021 |
ROBERT JONES |
AN ASSESSMENT OF SOCIAL MEDIA INPUTS AND COURT CASE INFORMATION WITH THE IMPACTS TO MITIGATE INSIDER THREATS |
WANG |
2021 |
CELESTINE KEMAH |
AN EMPIRICAL EXAMINATION OF THE IMPACT OF ORGANIZATIONAL INJUSTICE AND NEGATIVE AFFECT ON ATTITUDE AND NON-COMPLIANCE WITH INFORMATION SECURITY POLICY |
WANG |
2021 |
JOHN MARSH |
THE IMPACT OF INFORMATION PRIVACY CONCERNS ON ACTUAL USER PRIVACY PRESERVING BEHAVIORS |
ZINK |
2021 |
ROMAN MELNYK |
CLASSIFYING FINANCIAL SOFTWARE DEVELOPMENT DOCUMENTATION IN KNOWLEDGE DISCOVERY SYSTEMS |
SNYDER |
2021 |
NISHA PATEL |
AN EMPIRICAL ASSESSMENT OF USERS’ INFORMATION SECURITY PROTECTION BEHAVIOR TOWARDS SOCIAL ENGINEERING BREACHES |
WANG |
2021 |
TYLER PIERON |
EXAMINING THE INFLUENCE OF PERCEIVED RISK ON THE SELECTION OF INTERNET ACCESS IN THE U.S. INTELLIGENCE COMMUNITY |
WANG |
2021 |
LEONARD POUNDS |
A FRAMEWORK FOR ARTIFICIAL INTELLIGENCE APPLICATIONS IN THE HEALTHCARE REVENUE CYCLE MANAGEMENT |
SIMCO |
2021 |
JOSEPH SQUILLACE |
EXAMINATION OF CORPORATE INVESTMENTS IN PRIVACY: AN EVENT STUDY |
TEJAY |
2021 |
MICHAEL STEWART |
INCREASING SOFTWARE RELIABILITY USING MUTATION TESTING AND MACHINE LEARNING |
MITROPOULOS |
2021 |
EDGARDO VELEZ |
ENTERPRISE SOCIAL NETWORK SYSTEMS IMPLEMENTATION MODEL FOR KNOWLEDGE SHARING AMONG SUPPLY CHAIN IT PROFESSIONALS |
SNYDER |
2021 |
ZULMA WESTNEY |
THE SOCIAL MEDIA MACHINES: AN INVESTIGATION OF THE EFFECT OF DISINFORMATION MODERATED BY TRUST ON USERS’ DECISION-MAKING PROCESS |
WANG |
2021 |
WILLIAM WILKERSON |
DEVELOPMENT OF A SOCIAL ENGINEERING EXPOSURE INDEX (SEXI) USING OPEN SOURCE PERSONAL INFORMATION |
LEVY |
2021 |
JONATHAN ADKINS |
AN APPROACH TO TWITTER EVENT DETECTION USING THE NEWSWORTHINESS METRIC |
LI |
2020 |
AYMAN ABDULAZIZ M ALFAHID |
PERSPECTIVES OF ONLINE INSTRUCTORS TOWARDS DISTANCE LEARNING TECHNOLOGIES AT THE SAUDI ELECTRONIC UNIVERSITY (SEU) |
WANG |
2020 |
JAREAU ALMEYDA |
A COVID-19 INDUCED SHIFT: FROM INTRODUCING HIGH SCHOOL FEMALES TO COMPUTING CAREERS TO AN ASSESSMENT OF TECHNOLOGICAL READINESS AMONG STEM TEACHERS |
SNYDER |
2020 |
NAWWAF MOHSSEN A ALTALHI |
SNS AS AN EDUCATIONAL TOOL: EFFECT ON ACADEMIC PERFORMANCE AND LEARNERS’ PERCEPTIONS |
WANG |
2020 |
ELIZABETH ARCENEAUX |
IDENTIFYING PHYSICIANS USER EXPERIENCE (UX) PAIN POINTS IN USING ELECTRONIC HEALTH RECORD (EHR) SYSTEMS |
DRINGUS |
2020 |
JEFFREY BARNETT |
A HIERARCHICAL TEMPORAL MEMORY SEQUENCE CLASSIFIER APPLICATION FOR CLASSIFYING STREAMING DATA |
CANNADY |
2020 |
TRACY BIERMAN |
IMPROVING ITERATED LOCAL SEARCH FOR MICROAGGREGATION |
LASZLO |
2020 |
GARRY BLACKSTOCK |
ORGANIZATIONAL CULTURE AND KNOWLEDGE TRANSFER IN ENTERPRISE SOCIAL MEDIA |
WANG |
2020 |
DONALD BURGIO |
REDUCTION OF FALSE POSITIVES IN INTRUSION DETECTION BASED ON EXTREME LEARNING MACHINE WITH SITUATION AWARENESS |
CANNADY |
2020 |
VASILKA CHERGAROVA |
FACTORS AFFECTING SOFTWARE DEFINED NETWORKING ADOPTION BY RESEARCH AND EDUCATIONAL NETWORKS |
HUR |
2020 |
MOLLY COOPER |
ASSESSMENT OF AUDIO AND VISUAL WARNINGS TO MITIGATE RISK OF PHISHING ATTACKS |
LEVY |
2020 |
DARRELL EILTS |
AN EMPIRICAL ASSESSMENT OF CYBERSECURITY READINESS AND RESILIENCE IN SMALL BUSINESSES |
LEVY |
2020 |
ANTHONY FAULDS |
ADAPTIVE BATCH SIZE SELECTION IN ACTIVE LEARNING FOR REGRESSION |
MUKHERJEE |
2020 |
JAMES FURSTENBERG |
AN INVESTIGATION OF THE FACTORS THAT CONTRIBUTE TO THE PERCEIVED LIKELIHOOD OF COMPLIANCE WITH THE HIPAA SECURITY RULE AMONG HEALTHCARE COVERED ENTITIES AND BUSINESS ASSOCIATES |
WANG |
2020 |
ANDREW GREEN |
AN INVESTIGATION OF SNS USE BY EXECUTIVES |
PARRISH |
2020 |
LOVE JAMES |
SMART PRIVACY FOR IOT: PRIVACY EMBEDDED DESIGN FOR HOME AUTOMATION SYSTEMS |
WANG |
2020 |
EMMANUEL JIGO |
DEVELOPMENT OF CRITERIA FOR MOBILE DEVICE CYBERSECURITY THREAT CLASSIFICATION AND COMMUNICATION STANDARD USING LABELS, PICTOGRAM, AS WELL AS SAFETY DATA SHEETS |
LEVY |
2020 |
ELLIOTTE KIM |
REDUCING BITTORRENT DOWNLOAD TIME VIA HANDSHAKE-BASED SWITCHING |
SIMCO |
2020 |
JEFFREY LASKY |
THE IMPACT OF CROSS-REFERENCES ON THE READABILITY OF THE U.S. INTERNAL REVENUE CODE |
SEAGULL |
2020 |
NILS LAU |
THE ROLE OF COGNITIVE FACTORS AND PERSONALITY TRAITS ON MOBILE USER’S INFORMATION SECURITY BEHAVIOR |
WANG |
2020 |
CAROL LENIHAN |
A PCNN FRAMEWORK FOR BLOOD CELL IMAGE SEGMENTATION |
LASZLO |
2020 |
MARIO LORENZO |
CLASSIFYING RELATIONS USING RECURRENT NEURAL NETWORK WITH ONTOLOGICAL-CONCEPT EMBEDDING |
MUKHERJEE |
2020 |
EVETTE MAYNARD-NOEL |
AN INVESTIGATION OF FACTORS MOTIVATING EMPLOYEE ATTITUDES, INTENTIONS, AND BEHAVIORS TO SHARE KNOWLEDGE IN HOMELAND SECURITY |
PAUL |
2020 |
JOHN MCCONNELL |
UNIX ADMINISTRATOR INFORMATION SECURITY POLICY COMPLIANCE: THE INFLUENCE OF A FOCUSED SETA WORKSHOP AND INTERACTIVE SECURITY CHALLENGES ON HEURISTICS AND BIASES |
SNYDER |
2020 |
STEPHEN MUSEMBWA |
DEVELOPING A SENSE OF COMMUNITY IN SOCIAL NETWORKING SITES |
PAUL |
2020 |
MUTHARASU NARAYANA PERUMAL |
DEEP NEURAL NETWORKS FOR SENTIMENT ANALYSIS IN TWEETS WITH EMOTICONS |
MUKHERJEE |
2020 |
BILL NOFFSINGER |
PREDICTIVE ACCURACY OF RECOMMENDER ALGORITHMS. |
MUKHERJEE |
2020 |
OSBORNE OBENG |
EXAMINING THE CREATION OF INFORMATION PRIVACY CULTURE IN HEALTHCARE ORGANIZATIONS TO ACHIEVE COLLECTIVE HIPAA COMPLIANCE PRACTICE |
PAUL |
2020 |
GUILLERMO PEREZ |
CYBERSECURITY SITUATIONAL AWARENESS AND CYBER CURIOSITY TAXONOMY FOR UNDERSTANDING SUSCEPTIBILITY OF SOCIAL ENGINEERING ATTACKS: CASE OF THE MARITIME INDUSTRY |
LEVY |
2020 |
WILLIAM REED |
THE FACTORS THAT IMPACT PATIENT PORTAL UTILIZATION |
ABRAMSON |
2020 |
ANH-HONG RUCKER |
IMPROVING REAL-TIME INTRUSION DETECTION IN DYNAMIC NETWORKS WITH HIGHLY IMBALANCED DATA USING A DATA STREAM MINING APPROACH |
CANNADY |
2020 |
ARISAPHAT SUTTIDEE |
USABILITY OF PORTABLE EEG FOR MONITORING STUDENTS’ ATTENTION IN ONLINE LEARNING |
WANG |
2020 |
CHRIS WILDER |
THE IMPACT OF UNCERTAINTY AND FAIRNESS ON EMPLOYEE INTENTION TO COMPLY WITH INFORMATION SECURITY POLICY |
PARRISH |
2020 |
MARCUS WINKFIELD |
INFORMATION SYSTEMS SECURITY LEADERSHIP: AN EMPIRICAL STUDY OF BEHAVIORAL INFLUENCES OF LEADERS ON EMPLOYEES’ SECURITY COMPLIANCE |
TEJAY |
2020 |
DAVID ZEICHICK |
DETECTING ROGUE MANIPULATION OF SMART HOME DEVICE SETTINGS |
LI |
2020 |
MOHAMMED NAIF M ALATAWI |
EXAMINING THE IMPACT OF LEARNING MANAGEMENT SYSTEMS IN COMPUTER PROGRAMMING COURSES |
WANG |
2019 |
SHAHAR AVIV |
AN EXAMINATION OF USER DETECTION OF BUSINESS EMAIL COMPROMISE AMONGST CORPORATE PROFESSIONALS |
LEVY |
2019 |
NEELIMA BHATNAGAR |
MOTIVATION FACTORS FOR USING MOBILE INFORMATION SYSTEMS IN M-LEARNING |
COHEN |
2019 |
EMILY BROWN |
ADAPTABLE PRIVACY PRESERVING MODEL |
CANNADY |
2019 |
ALVA BULLARD |
EXAMINING SHARED UNDERSTANDING AND TEAM PERFORMANCE OF GLOBAL VIRTUAL TEAMS |
PAUL |
2019 |
JAMES CLARK |
IMPROVING USMLE STEP 1 STUDENT OUTCOMES USING PREDICTIVE MODELING |
TERRELL |
2019 |
BRENDA DELEE |
THE ROLE OF DISABILITY SUPPORT STAFF IN HIGHER EDUCATION |
ABRAMSON |
2019 |
MARC DOYLE |
COMPREHENDING THE SAFETY PARADOX AND PRIVACY CONCERNS WITH MEDICAL DEVICE REMOTE PATIENT MONITORING |
COHEN |
2019 |
DIAA FATHALLA |
ORLEASE: OPTIMISTICALLY REPLICATED LEASE FOR HIGHER REPLICA CONSISTENCY IN OPTIMISTIC REPLICATION SYSTEMS |
SIMCO |
2019 |
JOHN FLEIG |
CITATIONALLY ENHANCED SEMANTIC LITERATURE BASED DISCOVERY |
SUN |
2019 |
VIVIENNE FORRESTER |
USER INFORMATION SECURITY BEHAVIOR IN PROFESSIONAL VIRTUAL COMMUNITIES: A TECHNOLOGY THREAT AVOIDANCE APPROACH |
WANG |
2019 |
BENJAMIN GEISLER |
GAMESPECT: A COMPOSITION FRAMEWORK AND META-LEVEL DOMAIN SPECIFIC ASPECT LANGUAGE FOR UNREAL ENGINE 4 |
MITROPOULOS |
2019 |
ANTHONY GIWAH |
EMPIRICAL ASSESSMENT OF MOBILE DEVICE USERS INFORMATION SECURITY BEHAVIOR TOWARDS DATA BREACH: LEVERAGING PROTECTION MOTIVATION THEORY |
WANG |
2019 |
KATHLEEN GOESCHEL |
FEATURE SET SELECTION FOR IMPROVED CLASSIFICATION OF STATIC ANALYSIS ALERTS |
MUKHERJEE |
2019 |
JAMES GORHAM |
AN INVESTIGATION OF THE IMPACT OF SOCIAL NETWORKING ON KNOWLEDGE SHARING |
PARRISH |
2019 |
LINDA GREENE |
KNOWLEDGE SHARING BEHAVIOR: UNDERSTANDING COMMUNICATION MEDIA AFFORDANCES AND THE ROLE OF INFORMATION SECURITY |
HUR |
2019 |
HELEN HERNANDEZ |
USABILITY CHALLENGES WITH INSULIN PUMP DEVICES IN DIABETES CARE: WHAT TRAINERS OBSERVE WITH FIRST-TIME PUMP USERS |
DRINGUS |
2019 |
LILIANA HORNE |
DEVELOPMENT OF A CLIENT-SIDE EVIL TWIN ATTACK DETECTION SYSTEM FOR PUBLIC WI-FI HOTSPOTS BASED ON DESIGN SCIENCE RESEARCH |
PARRISH |
2019 |
ANGEL HUECA |
DEVELOPMENT AND VALIDATION OF A PROOF-OF-CONCEPT PROTOTYPE FOR ANALYTICS-BASED MALICIOUS CYBERSECURITY INSIDER THREAT IN REAL-TIME IDENTIFICATION SYSTEM |
LEVY |
2019 |
DINESH KHIALANI |
THE INFLUENCE OF WEBSITE DESIGN ON ONLINE TRUST IN ELECTRONIC COMMERCE RETAILING ENVIRONMENTS |
COHEN |
2019 |
JAMES KING |
GENE ONTOLOGY-GUIDED FORCE-DIRECTED VISUALIZATION OF PROTEIN INTERACTION NETWORKS |
LASZLO |
2019 |
JOHN LYNDEN |
HYBRID METAHEURISTICS – DIVERSIFICATION V INTENSIFICATION |
MUKHERJEE |
2019 |
VINCENT MOLOSKY |
THE INFLUENCE OF IDENTIFIABLE PERSONALITY TRAITS ON NURSES’ INTENTION TO USE WIRELESS IMPLANTABLE MEDICAL DEVICES |
COHEN |
2019 |
GARRET MOORE |
A HYBRID (ACTIVE-PASSIVE) VANET CLUSTERING TECHNIQUE |
LIU |
2019 |
LAKESHIA NALL |
INSTRUCTIONAL DESIGNERS AS PROJECT MANAGERS: A PHENOMENOLOGY |
SNYDER |
2019 |
HAROLD OSBORN |
EXAMINING TASK CONFLICT AND TEAM ATMOSPHERE IN VIRTUAL TEAMS ENGAGED IN OUTSOURCED PROJECT WORK |
PAUL |
2019 |
ROBERT SAGANICH |
AN INVESTIGATION OF ELECTRONIC PROTECTED HEALTH INFORMATION (E-PHI) PRIVACY POLICY LEGISLATION IN CALIFORNIA FOR SENIORS USING IN-HOME HEALTH MONITORING SYSTEMS |
COHEN |
2019 |
DAVE SCHUBERT |
AN INSTRUCTIONAL DESIGNER COMPETENCY FRAMEWORK FOR COMPLEX LEARNING DESIGNS |
SNYDER |
2019 |
WILLARVIS SMITH |
A COMPREHENSIVE CYBER DEFENSE SECURITY FRAMEWORK FOR LARGE ORGANIZATIONS |
ELLIS |
2019 |
ADAM SOLOMON |
A NOVEL COOPERATIVE INTRUSION DETECTION SYSTEM FOR MOBILE AD HOC NETWORKS |
CANNADY |
2019 |
JULIEO THOMPSON |
THE EVOLUTION OF TECHNOLOGY IN CALL CENTERS |
ABRAMSON |
2019 |
ALEXANDER VERNER |
LSTM NETWORKS FOR DETECTION AND CLASSIFICATION OF ANOMALIES IN RAW SENSOR DATA |
MUKHERJEE |
2019 |
BECKY WHITTEMORE |
A NEWBORN SCREENING DISORDERS ONLINE PORTAL FOR PRIMARY CARE PROVIDERS AND PARENTS |
ABRAMSON |
2019 |
KIM WITHERS |
A PSYCHOSOCIAL BEHAVIORAL ATTRIBUTION MODEL: EXAMINING THE RELATIONSHIP BETWEEN THE DARK TRIAD” AND DEVIANT BEHAVIORS IMPACTING SOCIAL NETWORKING SITES |
PARRISH |
2019 |
HATEM YAZBEK |
ADAPTIVE STRATEGIES OF MULTI-OBJECTIVE OPTIMIZATION FOR GREENER NETWORKS |
LIU |
2019 |
ADAM ALBINA |
ASSESSING THE IMPACT OF A GEOSPATIAL INFORMATION SYSTEM FOR IMPROVING CAMPUS EMERGENCY DECISION MAKING OF NOVICE CRISIS MANAGERS |
ABRAMSON |
2018 |
SALEH HAMED A ALHARTHI |
A DEVELOPMENTAL RESEARCH OF A TAXONOMY FOR EMPLOYEES’ MOBILE DEVICE CYBERSLACKING AND COMMITMENT TO THE ORGANIZATION IN THE CONTEXT OF PRODUCTIVITY |
LEVY |
2018 |
FAHAD MOSLEH M ALSAADI |
KNOWLEDGE SHARING AMONG ACADEMICS IN HIGHER EDUCATION INSTITUTIONS IN SAUDI ARABIA |
SNYDER |
2018 |
IQBAL AMIRI |
THE EFFICACY OF BIG DATA SECURITY, TRUST, LEADERSHIP, INFORMATION SENSITIVITY, PRIVACY CONCERN AND JOB REWARD ON DISCLOSING PERSONAL SECURITY INFORMATION ONLINE |
WANG |
2018 |
MANSOUR HAMOUD M AWAJI |
EVALUATION OF MACHINE LEARNING TECHNIQUES FOR EARLY IDENTIFICATION OF AT-RISK STUDENTS |
MUKHERJEE |
2018 |
ALI BAKER |
AN INVESTIGATION OF THE INTERACTION BETWEEN ORGANIZATIONAL CULTURE AND KNOWLEDGE SHARING THROUGH SOCIALIZATION: A MULTI-LEVEL PERSPECTIVE |
ELLIS |
2018 |
ANDREW BERRY |
PERCEPTION AND USAGE OF SOCIAL NETWORKING WEBSITES AMONG SENIOR ADULTS |
COHEN |
2018 |
CARLENE BLACKWOOD-BROWN |
AN EMPIRICAL ASSESSMENT OF SENIOR CITIZENS’ CYBERSECURITY AWARENESS, COMPUTER SELF-EFFICACY, PERCEIVED RISK OF IDENTITY THEFT, ATTITUDE, AND MOTIVATION TO ACQUIRE CYBERSECURITY SKILLS |
LEVY |
2018 |
MARION BROWN |
ASSESSING THE ROLE OF CRITICAL VALUE FACTORS (CVFS) ON USERS’ RESISTANCE TO USE URBAN SEARCH AND RESCUE ROBOTICS |
LEVY |
2018 |
DAMON BRUCCOLERI |
DATABASE STREAMING COMPRESSION ON MEMORY-LIMITED MACHINES |
SUN |
2018 |
KARLA CLARKE |
NOVEL ALERT VISUALIZATION: THE DEVELOPMENT OF A VISUAL ANALYTICS PROTOTYPE FOR MITIGATION OF MALICIOUS INSIDERS CYBER THREAT |
LEVY |
2018 |
THERESA CURRAN |
STANDARDIZING INSTRUCTIONAL DEFINITION AND CONTENT SUPPORTING INFORMATION SECURITY COMPLIANCE REQUIREMENTS |
ABRAMSON |
2018 |
AIMAN DARWICHE |
MACHINE LEARNING METHODS FOR SEPTIC SHOCK PREDICTION |
MUKHERJEE |
2018 |
FANNIEL DEMARKS |
AN OPERATIONAL MANAGEMENT COMPETENCY MODEL FOR ONLINE EDUCATION ADMINISTRATORS |
ABRAMSON |
2018 |
MADHURI EDWARDS |
IDENTIFYING FACTORS CONTRIBUTING TOWARDS INFORMATION SECURITY MATURITY IN AN ORGANIZATION |
TEJAY |
2018 |
RUSSELL GARNER |
DEVELOPMENT, IMPLEMENTATION AND ASSESSMENT OF AN ONLINE DOCTORAL STUDENT ORIENTATION |
ABRAMSON |
2018 |
JODI GOODE |
COMPARING TRAINING METHODOLOGIES ON EMPLOYEE’S CYBERSECURITY COUNTERMEASURES AWARENESS AND SKILLS IN TRADITIONAL VS. SOCIO-TECHNICAL PROGRAMS |
LEVY |
2018 |
ZADOK HAKIM |
FACTORS THAT CONTRIBUTE TO THE RESISTANCE TO CLOUD COMPUTING ADOPTION BY TECH COMPANIES VS. NON-TECH COMPANIES |
PARRISH |
2018 |
CHAD HARDIN |
SEMI-INFORMED MULTI-AGENT PATROL STRATEGIES |
LASZLO |
2018 |
EDWIN HILL |
THE EFFECTS OF STUDENT ACTIVITY DASHBOARDS ON PARTICIPATION, PERSISTENCE, AND PERFORMANCE |
ELLIS |
2018 |
ANN-MARIE HORCHER |
CONSERVATION OF LIMITED RESOURCES: DESIGN PRINCIPLES FOR SECURITY AND USABILITY ON MOBILE DEVICES |
TEJAY |
2018 |
GISLE JORGENSEN |
METRICS FOR ASPECT MINING VISUALIZATION |
MITROPOULOS |
2018 |
ANGELA LANDRESS |
THE IMPACT OF USER MINDFULNESS ON NON-MALICIOUS SPILLAGE WITHIN IMAGES IN SOCIAL NETWORKING SITESS |
PARRISH |
2018 |
KEMBLEY LINGELBACH |
PERCEPTIONS OF FEMALE CYBERSECURITY PROFESSIONALS ON BARRIERS AND FACTORS OF LOW FEMALE PARTICIPATION RATES |
TERRELL |
2018 |
LINA LO |
MULTIDIMENSIONAL KNOWLEDGE FLOW DYNAMICS IN CONTEXT |
ELLIS |
2018 |
DANIEL LONG |
EXPLORING GENERATIONAL DIFFERENCES IN TEXT MESSAGING USAGE AND HABITS |
COHEN |
2018 |
WAYNE MADHLANGOBE |
ASSESSMENT OF FACTORS INFLUENCING INTENT-TO-USE BIG DATA ANALYTICS IN AN ORGANIZATION: A SURVEY STUDY |
WANG |
2018 |
STEFANUS MALAN |
MULTI-ROBOT COMPLETE COVERAGE USING DIRECTIONAL CONSTRAINTS |
MUKHERJEE |
2018 |
RICHARD MCCRAE |
THE IMPACT OF COST ON FEATURE SELECTION FOR CLASSIFIERS |
MUKHERJEE |
2018 |
STEVEN MCELWEE |
PROBABILISTIC CLUSTER ENSEMBLE EVALUATION FOR UNSUPERVISED INTRUSION DETECTION |
CANNADY |
2018 |
ELIZABETH OVIAWE |
DESIGN AND DEVELOPMENT OF SIMULATION-BASED INSTRUCTION ON MEANINGFUL USE AND INTERPROFESSIONALISM CORE COMPETENCIES IN A HEALTHCARE TEAM-BASED LEARNING ENVIRONMENT |
SNYDER |
2018 |
JAMES PRATHER |
BEYOND AUTOMATED ASSESSMENT: BUILDING METACOGNITIVE AWARENESS IN NOVICE PROGRAMMERS IN CS1 |
COHEN |
2018 |
RONALD PUNAKO |
COMPUTER SUPPORTED COLLABORATIVE LEARNING USING AUGMENTED AND VIRTUAL REALITY IN TOURISM EDUCATION |
SNYDER |
2018 |
NICHOLAS SHAW |
A KNOWLEDGE MANAGEMENT SYSTEM (KMS) USING A STORYTELLING-BASED APPROACH TO COLLECT TACIT KNOWLEDGE |
LIU |
2018 |
RODNEY THOMAS |
MACHINE LEARNING FOR EXPLORING STATE SPACE STRUCTURE IN GENETIC REGULATORY NETWORKS |
LASZLO |
2018 |
LARRY TOWNSEND |
WIRELESS SENSOR NETWORK CLUSTERING WITH MACHINE LEARNING |
LI |
2018 |
ELISSA WEEDEN |
USING WEB CONFERENCING TECHNOLOGY TO FOSTER INCLUSIVE COURSE EXPERIENCES FOR DEAF AND HARD-OF-HEARING STUDENTS |
ABRAMSON |
2018 |
JACOB ARTHUR |
ENHANCED PREDICTION OF NETWORK ATTACKS USING INCOMPLETE DATA |
CANNADY |
2017 |
JUAN ASENJO |
DATA MASKING, ENCRYPTION, AND THEIR EFFECT ON CLASSIFICATION PERFORMANCE: TRADE-OFFS BETWEEN DATA SECURITY AND UTILITY |
SUN |
2017 |
ROBERT BATIE |
ASSESSING THE EFFECTIVENESS OF A FINGERPRINT BIOMETRIC AND A BIOMETRIC PERSONAL IDENTIFICATION NUMBER (BIO-PIN) AS A MULTI-FACTOR AUTHENTICATION MECHANISM |
LEVY |
2017 |
SHELLON BLACKMAN-LEES |
TOWARDS A CONCEPTUAL FRAMEWORK FOR PERSISTENT USE: A TECHNICAL PLAN TO ACHIEVE SEMANTIC INTEROPERABILITY WITHIN ELECTRONIC HEALTH RECORD SYSTEMS |
ELLIS |
2017 |
LESLIE BOFILL |
THE DESIGN AND IMPLEMENTATION OF ONLINE RADIOLOGY MODULES USING THE ADDIE PROCESS AND RAPID PROTOTYPING |
TERRELL |
2017 |
TERESA CARTER |
FIVE--FACTOR MODEL AS A PREDICTOR FOR SPOKEN DIALOG SYSTEMS |
COHEN |
2017 |
ABDULRAHIM CHARIF |
CONTEXTUALIZING SECURE INFORMATION SYSTEM DESIGN: A SOCIO-TECHNICAL APPROACH |
TEJAY |
2017 |
MICHEAL ELROD |
A NOVEL APPROACH TO DETERMINING REAL-TIME RISK PROBABILITIES IN CRITICAL INFRASTRUCTURE INDUSTRIAL CONTROL SYSTEMS |
CANNADY |
2017 |
STEVEN EPSTEIN |
THE EFFECT OF DOMAIN AND TECHNICAL EXPERTISE ON THE TRAINING OUTCOMES FOR CASE MANAGEMENT SYSTEMS IN HIGH EXPERTISE ORGANIZATIONS |
PARRISH |
2017 |
SALAM FARHAT |
CREATING REALISTIC SYNTHETIC FILE SYSTEM WORKLOADS |
SIMCO |
2017 |
JOHN FORD |
PULSAR SEARCH USING SUPERVISED MACHINE LEARNING. |
MUKHERJEE |
2017 |
JAMES FRALEY |
CLASSIFICATION AND IDENTIFICATION OF ADVANCED POLYMORPHIC MALWARE |
CANNADY |
2017 |
STEVEN FUENTES |
DEFINING USABILITY HEURISTICS FOR ADOPTION AND EFFICIENCY OF AN ELECTRONIC WORKFLOW DOCUMENT MANAGEMENT SYSTEM |
COHEN |
2017 |
ROBERT HAMBLY |
AN EMPIRICAL INVESTIGATION OF THE WILLINGNESS OF US INTELLIGENCE COMMUNITY ANALYSTS TO CONTRIBUTE KNOWLEDGE TO A KNOWLEDGE MANAGEMENT SYSTEM (KMS) IN A HIGHLY CLASSIFIED AND SENSITIVE ENVIRONMENT |
LEVY |
2017 |
TOM HARITOS |
A STUDY OF HUMAN-MACHINE INTERFACE (HMI) LEARNABILITY FOR UNMANNED AIRCRAFT SYSTEMS COMMAND AND CONTROL |
DRINGUS |
2017 |
NICHOLAS HAYS |
REDUCING THE DOWNLOAD TIME IN STOCHASTIC P2P CONTENT DELIVERY NETWORKS BY IMPROVING PEER SELECTION |
SIMCO |
2017 |
JEFF HEATON |
AUTOMATED FEATURE ENGINEERING FOR DEEP NEURAL NETWORKS WITH GENETIC PROGRAMMING |
CANNADY |
2017 |
STEVEN HENDRIKSE |
THE EFFECT OF CODE OBFUSCATION ON AUTHORSHIP ATTRIBUTION OF BINARY COMPUTER FILES |
MITROPOULOS |
2017 |
CRISTELIA HINOJOSA |
ORGANIZATIONAL INFORMATION DISSEMINATION WITHIN COLLABORATIVE NETWORKS USING DIGITAL COMMUNICATION TOOLS |
ELLIS |
2017 |
STEFAN JOE-YEN |
PERFORMANCE ENVELOPES OF ADAPTIVE ENSEMBLE DATA STREAM CLASSIFIERS. |
MUKHERJEE |
2017 |
THOMAS MCCUNE |
A STUDY OF HOW YOUNG ADULTS LEVERAGE MULTIPLE PROFILE MANAGEMENT FUNCTIONALITY IN MANAGING THEIR ONLINE REPUTATION ON SOCIAL NETWORKING SITES |
DRINGUS |
2017 |
PATRICK MCNEIL |
INTEGRATING MULTIPLE MODALITIES INTO DEEP LEARNING NETWORKS |
CANNADY |
2017 |
JENNIFER MERRITT |
INDIVIDUALIZED INSTRUCTION AS A FACULTY TRAINING STRATEGY FOR TECHNOLOGY INTEGRATION |
WANG |
2017 |
ZAREEF MOHAMMED |
THE ROLE OF COGNITIVE DISPOSITION IN RE-EXAMINING THE PRIVACY PARADOX: A NEUROSCIENCE STUDY |
TEJAY |
2017 |
RICHARD NILSEN |
MEASURING CYBERSECURITY COMPETENCY: AN EXPLORATORY INVESTIGATION OF THE CYBERSECURITY KNOWLEDGE, SKILLS, AND ABILITIES NECESSARY FOR ORGANIZATIONAL NETWORK ACCESS PRIVILEGES |
LEVY |
2017 |
CHARLES PERKINS |
INVESTIGATING PERCEIVED INFLUENCES OF DATA WAREHOUSING BUSINESS INTELLIGENCE MATURITY ON ORGANIZATIONAL PERFORMANCE |
SUN |
2017 |
JAIME PUENTE |
EXAMINING THE EFFECTS OF DISTRACTIVE MULTITASKING WITH PERIPHERAL COMPUTING IN THE CLASSROOM |
DRINGUS |
2017 |
JERRY ROPER |
COPYRIGHT POLICY INTERPRETATION AND ITS EFFECTS ON HIGHER EDUCATION OPEN COURSES SUCCESS |
ABRAMSON |
2017 |
COLEEN SANTEE |
AN EXPLORATORY STUDY OF THE APPROACH TO BRING YOUR OWN DEVICE (BYOD) IN ASSURING INFORMATION SECURITY |
NASUTI |
2017 |
DAVID SAYRE |
A RUNTIME VERIFICATION AND VALIDATION FRAMEWORK FOR SELF-ADAPTIVE SOFTWARE |
SIMCO |
2017 |
ERIC SPRIGGS |
AN ASSESSMENT OF THE INFLUENCE OF FUNCTIONAL DIVERSITY AND PERCEIVED INFORMATION QUALITY ON THE INTENTION TO USE COLLABORATION SYSTEMS |
PAUL |
2017 |
GWENDOLYN STRIPLING |
AN EMPIRICAL EVALUATION OF FACTORS AFFECTING ENERGY MANAGEMENT INFORMATION SYSTEM SUCCESS |
COHEN |
2017 |
BRENDA VARNER |
SUPPORTING EDUCATION FOR STUDENT PARENTS THROUGH MOBILE TECHNOLOGY |
ABRAMSON |
2017 |
SAMUEL YODERS |
INTEGRATION OF SIMULATION TECHNOLOGY INTO HEALTH CARE EDUCATION CURRICULA THROUGH APPLIED CONSTRUCTIVIST LEARNING THEORY |
ABRAMSON |
2017 |
YI ZHANG |
STRATEGIES FOR COMBINING TREE-BASED ENSEMBLE MODELS. |
MUKHERJEE |
2017 |
MAHD ALZOUBI |
EVALUATING THE ENTERPRISE RESOURCE PLANNING (ERP) SYSTEMS SUCCESS AT THE INDIVIDUAL LEVEL OF ANALYSIS IN THE MIDDLE-EAST |
TERRELL |
2016 |
GEORGE ANTONIOU |
DESIGNING AN EFFECTIVE INFORMATION SECURITY POLICY FOR EXCEPTIONAL SITUATIONS IN AN ORGANIZATION: AN EXPERIMENTAL STUDY |
TEJAY |
2016 |
SANDRA ARMSTRONG |
LEVELING THE PLAYING FIELD: GENDER INCLUSIVE DESIGN FOR SINGLE AND MULTIPLAYER COMPUTER ROLE-PLAYING GAMES |
COHEN |
2016 |
KIMBERLY BARTHOLOMEW |
PATIENT PORTALS: ACHIEVING TECHNOLOGY ACCEPTANCE AND MEANINGFUL USE IN INDEPENDENT PHYSICIAN-MANAGED PRACTICES |
ABRAMSON |
2016 |
EMMANUEL BAZILE |
AN EMPIRICAL TESTING OF FACTORS CONTRIBUTING TO HEALTHCARE PROFESSIONALS’ RESISTANCE TO USE ELECTRONIC MEDICAL RECORDS (EMR) SYSTEMS |
LEVY |
2016 |
SHAUNA BEAUDIN |
AN EMPIRICAL STUDY OF AUTHENTICATION METHODS TO SECURE E-LEARNING SYSTEM ACTIVITIES AGAINST IMPERSONATION FRAUD |
LEVY |
2016 |
DAVID BETHELMY |
ASPECT MINING USING MULTIOBJECTIVE GENETIC CLUSTERING ALGORITHMS |
MITROPOULOS |
2016 |
LINDA BETZ |
AN ANALYSIS OF THE RELATIONSHIP BETWEEN SECURITY INFORMATION TECHNOLOGY ENHANCEMENTS AND COMPUTER SECURITY BREACHES AND INCIDENTS |
WANG |
2016 |
NEWTON CAMPBELL, JR. |
ALGORITHMIC FOUNDATIONS OF A*, LANDMARKS, AND GENERALIZED POLYGON INEQUALITIES |
LASZLO |
2016 |
MELISSA CARLTON |
DEVELOPMENT OF A CYBERSECURITY SKILLS INDEX: A SCENARIOS-BASED, HANDS-ON MEASURE OF NON-IT PROFESSIONALS’ CYBERSECURITY SKILLS |
LEVY |
2016 |
KAREN CASE |
A BIG IDEA: THE ROLLOUT OF OPEN SUNY |
ABRAMSON |
2016 |
ALGERNON CORBETT |
THE STATE OF MOBILE LEARNING IMPLEMENTATION IN GOVERNMENT CABINET-LEVEL AGENCIES AND DEPARTMENTS |
ABRAMSON |
2016 |
THOMAS DECINO |
A USABILITY AND LEARNABILITY CASE STUDY OF GLASS FLIGHT DECK INTERFACES AND PILOT INTERACTIONS THROUGH SCENARIO-BASED TRAINING |
DRINGUS |
2016 |
KEITH EDWARDS |
EXAMINING THE SECURITY AWARENESS, INFORMATION PRIVACY, AND THE SECURITY BEHAVIORS OF HOME COMPUTER USERS |
PAUL |
2016 |
MARY HARWARD |
A STUDY OF DATA SHARING PRACTICES WITHIN SCHOLARLY RESEARCH COMMUNITIES |
ZINK |
2016 |
WILNELIA HERNANDEZ |
AN EMPIRICAL ASSESSMENT OF EMPLOYEES CYBERSLACKING IN THE PUBLIC SECTOR |
LEVY |
2016 |
JULIE HEWITT |
BLENDED LEARNING FOR FACULTY PROFESSIONAL DEVELOPMENT INCORPORATING KNOWLEDGE MANAGEMENT PRINCIPLES |
SNYDER |
2016 |
ROBIN HILL |
COMMUNITY COLLEGE FACULTY DISPOSITIONS TOWARDS BLENDED LEARNING |
SNYDER |
2016 |
GUCHUN HUANG |
USING MOBILE PHONES FOR TEACHING AND LEARNING INCHINESE TRADITIONAL UNDERGRADUATE EDUCATION |
ABRAMSON |
2016 |
RICHARD MAITI |
CAPTURING, ELICITING, AND PRIORITIZING (CEP) NON-FUNCTIONAL REQUIREMENTS METADATA DURING THE EARLY STAGES OF AGILE SOFTWARE DEVELOPMENT |
MITROPOULOS |
2016 |
NIKOLAY MALITSKY |
THE MUTABLE CLASS DESIGN PATTERN |
LASZLO |
2016 |
JOSEPH MARNELL |
AN EMPIRICAL INVESTIGATION OF FACTORS EFFECTING RESISTANCE TO USE MULTI-FACTOR AUTHENTICATION SYSTEMS IN PUBLIC-ACCESS ENVIRONMENTS |
LEVY |
2016 |
HOLLY MCKEE |
THE CONSTRUCTION AND VALIDATION OF AN INSTRUCTOR LEARNING ANALYTICS IMPLEMENTATION MODEL TO SUPPORT AT-RISK STUDENTS |
SNYDER |
2016 |
KIMBERLY MCMURTRY |
EFFECTIVE TEACHING PRACTICES IN ONLINE HIGHER EDUCATION |
ABRAMSON |
2016 |
ELIEL MELON |
A STUDY OF THE SUCCESS OF GROUP FORMATION IN VIRTUAL TEAMS USING COMPUTER MEDIATED COMMUNICATIONS |
LEVY |
2016 |
SALEEM MIR |
ENHANCED METHOD CALL TREE FOR COMPREHENSIVE DETECTION OF SYMPTOMS OF CROSS CUTTING CONCERNS |
MITROPOULOS |
2016 |
DAVID MOSKOWITZ |
AUTOMATICALLY DEFINED TEMPLATES FOR IMPROVED PREDICTION OF NON-STATIONARY, NON-LINEAR TIME SERIES IN GENETIC PROGRAMMING |
MUKHERJEE |
2016 |
STEPHEN MUJEYE |
AN EXPERIMENTAL STUDY ON THE ROLE OF PASSWORD STRENGTH AND COGNITIVE LOAD ON EMPLOYEE PRODUCTIVITY |
LEVY |
2016 |
THUAN NGUYEN |
KNOWLEDGE MANAGEMENT (KM) PERFORMANCE AND ORGANIZATIONAL PERFORMANCE: USING INTELLECTUAL CAPITAL (IC) AS THE PROXY AND A GUIDELINE FOR IC MEASUREMENT |
ELLIS |
2016 |
PATRICK OFFOR |
EXAMINING CONSUMERS’ SELECTIVE INFORMATION PRIVACY DISCLOSURE BEHAVIORS IN AN ORGANIZATION’S SECURE E-COMMERCE SYSTEMS |
TEJAY |
2016 |
JANICE ORCUTT |
TEACHING PRESENCE AND INTELLECTUAL CLIMATE IN A STRUCTURED ONLINE LEARNING ENVIRONMENT |
DRINGUS |
2016 |
SERGIO PARRA |
USE OF STUDENT CREATED VIDEO PODCASTS TO PROMOTE FOREIGN LANGUAGE GRAMMAR ACQUISITION IN MIDDLE SCHOOL |
ABRAMSON |
2016 |
JASON PITTMAN |
THE EFFECTS OF TIME-COMPRESSION AND LEARNER-CONTROL IN MULTIMEDIA INSTRUCTION |
DRINGUS |
2016 |
EMAD SAMWEL |
TOWARD THE DEVELOPMENT AND IMPLEMENTATION OF PERSONALIZED, ADAPTIVE, AND COMPREHENSIVE ELEARNING SYSTEMS |
ABRAMSON |
2016 |
DAVID SCHAAF |
ASSISTIVE TECHNOLOGY INSTRUCTION IN TEACHER EDUCATION CURRICULA |
ABRAMSON |
2016 |
JOSEPH SIMPSON |
EMPIRICAL ANALYSIS OF SOCIO-COGNITIVE FACTORS AFFECTING SECURITY BEHAVIORS OF SMARTPHONE USERS. |
COHEN |
2016 |
FARRELL TAYLOR |
EVALUATION OF SUPERVISED MACHINE LEARNING FOR CLASSIFYING VIDEO TRAFFIC |
MUKHERJEE |
2016 |
ROBERT VAN CAMP |
USING DIVERSITY ENSEMBLES WITH TIME LIMITS TO HANDLE CONCEPT DRIFT |
MUKHERJEE |
2016 |
THOMAS WINSTON |
AN EMPIRICAL INVESTIGATION OF PRIVACY AND SECURITY CONCERNS ON NURSES’ BEHAVIORAL INTENTIONS TO USE RFID IN HOSPITALS |
PAUL |
2016 |
NOEL WINT |
AN INVESTIGATION OF SOCIO-TECHNICAL COMPONENTS OF KNOWLEDGE MANAGEMENT SYSTEM (KMS) USAGE |
ELLIS |
2016 |
SEAN ZADIG |
UNDERSTANDING THE IMPACT OF HACKER INNOVATION UPON IS SECURITY COUNTERMEASURES |
TEJAY |
2016 |
FRANK ACKER |
USE OF ENTROPY FOR FEATURE SELECTION WITH INTRUSION DETECTION SYSTEM PARAMETERS |
CANNADY |
2015 |
ROBERT ALTIERO |
DIGITAL FORENSICS TOOL INTERFACE VISUALIZATION |
COHEN |
2015 |
SHALETTE ANNMARIE ASHMAN EAST |
THE EFFECT OF COMPUTERIZED COGNITIVE TRAINING ON THE WORKING MEMORY AND MATHEMATICS ACHIEVEMENT OF LOW ACHIEVERS |
ELLIS |
2015 |
BETSY BAUGESS |
EXAMINING SOCIAL NETWORK SITE USAGE BY OLDER ADULTS: A PHENOMENOLOGICAL APPROACH |
WANG |
2015 |
BRIAN BENNETT |
LOCATING POTENTIAL ASPECT INTERFERENCE USING CLUSTERING ANALYSIS |
MITROPOULOS |
2015 |
ALEKSANDR BLEKH |
GOVERNANCE AND ORGANIZATIONAL SPONSORSHIP AS SUCCESS FACTORS IN FREE/LIBRE AND OPEN SOURCE SOFTWARE DEVELOPMENT: AN EMPIRICAL INVESTIGATION USING STRUCTURAL EQUATION MODELING |
MUKHERJEE |
2015 |
GRACE BONANNO |
THE IMPORTANCE OF PRESENCE IN ASSISTING MEDICAL DIAGNOSIS IN INDIVIDUALS WITH INTELLECTUAL DISABILITIES: A TELEMEDICINE APPROACH |
COHEN |
2015 |
SHONDA BROWN |
AN INFORMATION PRIVACY EXAMINATION OF THE PRACTICES OF PHARMACEUTICAL COMPANIES REGARDING USE OF INFORMATION COLLECTED THROUGH THEIR WEBSITES |
LEVY |
2015 |
BETSY BURGOS |
A STUDY OF ASSISTIVE TECHNOLOGY COMPETENCIES OF SPECIALISTS IN PUBLIC SCHOOLS |
DRINGUS |
2015 |
DAVID CASTANO |
AFFECT AND ONLINE PRIVACY CONCERNS |
NYSHADHAM |
2015 |
THEODORE COCHRAN |
IMMUNOLOGY INSPIRED DETECTION OF DATA THEFT FROM A NETWORKED COMPUTER |
CANNADY |
2015 |
MICHAEL DEMBLEWSKI |
SECURITY FRAMEWORK FOR MACHINE-TO-MACHINE DEVICES AND NETWORKS |
STOUT |
2015 |
AMRAN DIN |
USABLE SECURITY FOR E-CITIZENS: A STUDY TO EVALUATE AND COMPARE THE USABILITY OF USER ACCOUNTS ON E-GOVERNMENT WEBSITES |
COHEN |
2015 |
PAUL DOOLEY |
AN EMPIRICAL DEVELOPMENT OF CRITICAL VALUE FACTORS FOR SYSTEM QUALITY AND INFORMATION QUALITY IN BUSINESS INTELLIGENCE SYSTEMS IMPLEMENTATIONS |
LEVY |
2015 |
LAURA DOWNEY |
WELL-BEING TECHNOLOGIES: MEDITATION USING VIRTUAL WORLDS |
COHEN |
2015 |
EGES EGEDIGWE |
SERVICE QUALITY AND PERCEIVED VALUE OF CLOUD COMPUTING-BASED SERVICE ENCOUNTERS: EVALUATION OF INSTRUCTOR PERCEIVED SERVICE QUALITY IN HIGHER EDUCATION IN TEXAS |
LIU |
2015 |
MARY FONTI |
A PREDICTIVE MODELING SYSTEM: EARLY IDENTIFICATION OF STUDENTS AT-RISK ENROLLED IN ONLINE LEARNING PROGRAMS |
TERRELL |
2015 |
TRELISA GLAZATOV |
APPLYING THE COMPONENT DISPLAY THEORY TO THE INSTRUCTIONAL DESIGN AND DEVELOPMENT OF AN EDUCATIONAL MOBILE APPLICATION |
SNYDER |
2015 |
JOHN GRAY |
VIRTUE ETHICS: EXAMINING INFLUENCES ON THE ETHICAL COMMITMENT OF INFORMATION SYSTEM WORKERS IN TRUSTED POSITIONS |
TEJAY |
2015 |
MICHAEL GREEN |
MOTIVATION AND LEARNING OF NON-TRADITIONAL COMPUTING EDUCATION STUDENTS IN A WEB-BASED COMBINED LABORATORY |
ABRAMSON |
2015 |
DICK HAMANN |
THE CONSTRUCTION AND VALIDATION OF AN M-LEARNING FRAMEWORK FOR ONLINE AND BLENDED LEARNING ENVIRONMENTS |
SNYDER |
2015 |
HOWARD HAMILTON |
AN EXAMINATION OF SLA COMPONENTS THAT INFLUENCE CLOUD COMPUTING ADOPTION |
PARRISH |
2015 |
HIRA HERRINGTON |
A HEURISTIC EVOLUTIONARY METHOD FOR THE COMPLEMENTARY CELL SUPPRESSION PROBLEM |
MUKHERJEE |
2015 |
JOHN HUDZINA |
AN ENHANCED MAPREDUCE WORKLOAD ALLOCATION TOOL |
SIMCO |
2015 |
JAMES JAVA |
CHARACTERIZATION OF PROSE BY RHETORICAL STRUCTURE FOR MACHINE LEARNING CLASSIFICATION |
LASZLO |
2015 |
STEPHEN KIBWAGE |
ROLE-BASED ACCESS CONTROL ADMINISTRATION OF SECURITY POLICIES AND POLICY CONFLICT RESOLUTION IN DISTRIBUTED SYSTEMS |
LIU |
2015 |
JEFFREY KIMBALL |
MOTIVATIONS OF STUDENTS IN THE OPEN-ENDED USE OF MOBILE COMPUTING IN LECTURE-BASED CLASSROOMS |
TERRELL |
2015 |
THOMAS KURTZ |
APPROACHES FOR DEVELOPING A MODEL FOR INFORMATION AND COMMUNICATION TECHNOLOGY (ICT) IMPLEMENTATION IN THE HIGHER EDUCATION ENVIRONMENT |
ELLIS |
2015 |
KAREN LACADEN |
AN INVESTIGATION OF THE FACTORS CONTRIBUTING TO THE DEVELOPMENT OF POORLY DEFINED IS STRATEGIES. |
PARRISH |
2015 |
RICHARD LAMB |
A MAKEOVER FOR THE CAPTURED LECTURE: APPLYING MULTIMEDIA LEARNING PRINCIPLES TO LECTURE VIDEO |
ELLIS |
2015 |
JAMES LEWIS |
IDENTIFYING KEY DETERMINANTS OF SERVICE PROVIDER EFFECTIVENESS AND THE IMPACT ON OUTSOURCED SECURITY SUCCESS |
TEJAY |
2015 |
FRANK LOFORTE |
EFFICIENT VARIATIONS OF THE QUALITY THRESHOLD CLUSTERING ALGORITHM |
MUKHERJEE |
2015 |
TANYA MACNEIL |
POLICE OPINIONS OF DIGITAL EVIDENCE RESPONSE HANDLING IN THE STATE OF GEORGIA: AN EXAMINATION FROM THE VIEWPOINT OF LOCAL AGENCIES’ PATROL OFFICERS |
ZINK |
2015 |
PATRICIA MCDERMOTT-WELLS |
MATH IN THE DARK: TOOLS FOR EXPRESSING MATHEMATICAL CONTENT BY VISUALLY IMPAIRED STUDENTS. |
MUKHERJEE |
2015 |
NATHANIEL MELBY |
ENTERPRISE BANDWIDTH MANAGEMENT: A FRAMEWORK FOR TRAFFIC MANAGEMENT IN GLOBAL MANUFACTURING ENTERPRISES |
LITTMAN |
2015 |
SCOTT MORRISSETTE |
INVESTIGATING CATEGORIZATION PREFERENCES FOR ONLINE DATING SITES |
NYSHADHAM |
2015 |
DAVID MOURED |
DYNAMIC GAME-THEORETIC MODELS TO DETERMINE THE VALUE OF INTRUSION DETECTION SYSTEMS |
MUKHERJEE |
2015 |
JEAN-PIERRE NZIGA |
INCREMENTAL SPARSE-PCA FEATURE EXTRACTION FOR DATA STREAMS |
CANNADY |
2015 |
ARTURO PONCE |
A DYNAMIC BEHAVIORAL BIOMETRIC APPROACH TO AUTHENTICATE USERS EMPLOYING THEIR FINGERS TO INTERACT WITH TOUCHSCREEN DEVICES |
COHEN |
2015 |
KRISTIN RAUB |
A PHENOMENOLOGICAL INQUIRY INTO FACEBOOK NEWCOMER MOTIVATIONS FOR PARTICIPATORY ACTIVITIES |
DRINGUS |
2015 |
RICHARD RICHARDSON |
ENHANCEMENT OF MAMMOGRAPHY IMAGES FROM SEGMENTATION IMAGE COMPRESSION |
LASZLO |
2015 |
JOSE RIVERA RODRIGUEZ |
SENIORS WITH DIABETES-INVESTIGATION OF THE IMPACT OF SEMANTIC AUDITORY DISTRACTIONS ON THE USABILITY OF A BLOOD GLUCOSE TRACKING SMARTPHONE MOBILE APPLICATION |
COHEN |
2015 |
RICARDO RODRIGUEZ |
AN ELECTROENCEPHALOGRAM (EEG) BASED BIOMETRICS INVESTIGATION FOR AUTHENTICATION: AN HCI APPROACH |
COHEN |
2015 |
MARK ROSENBAUM |
AN INSTRUMENT OF MEASURE: IDENTIFYING UNETHICAL PERSONAL IDENTITY INFORMATION (PII) PRIVACY VIOLATIONS COMMITTED BY IS/IT PRACTITIONERS’ – A COMPARISON TO COMPUTING MORAL EXEMPLARS |
WANG |
2015 |
MANON SCHLADEN |
FORMATIVE RESEARCH ON AN INSTRUCTIONAL DESIGN THEORY FOR VIRTUAL PATIENTS IN CLINICAL EDUCATION: A PRESSURE ULCER PREVENTION CLINICAL REASONING CASE |
SNYDER |
2015 |
ROGER SEEHOLZER |
INVESTIGATING ROLES OF INFORMATION SECURITY STRATEGY |
TEJAY |
2015 |
RACHAEL SESSLER TRINKOWSKY |
INTERPRETATIVE PHENOMENOLOGICAL ANALYSIS OF ACCESSIBILITY AWARENESS AMONG FACULTY IN ONLINE LEARNING ENVIRONMENTS |
DRINGUS |
2015 |
SHEILA SORENSEN |
MOTIVATING AN INDIVIDUAL TO SHARE EXTERNALIZED TACIT KNOWLEDGE |
ELLIS |
2015 |
JONATHAN SPARKS |
THE IMPACT OF IMAGE SYNONYMS IN GRAPHICAL-BASED AUTHENTICATION SYSTEMS |
COHEN |
2015 |
THOMAS TREVETHAN |
BUILDING CLOUD-BASED INFORMATION SYSTEMS LAB ARCHITECTURE: WRITING DESIGN PRINCIPLES THAT FACILITATE THE EFFECTIVE CONSTRUCTION AND EVALUATION OF A CLOUD-BASED LAB ENVIRONMENT |
PARRISH |
2015 |
OSIRIS VILLACAMPA |
FEATURE SELECTION AND CLASSIFICATION METHODS FOR DECISION MAKING: A COMPARATIVE ANALYSIS |
SUN |
2015 |
LUCINDA WANG |
IMPLICIT MEASURES OF ONLINE RISKS |
NYSHADHAM |
2015 |
MICHELE WASHINGTON |
GATHERING THE REQUIREMENTS FOR A MOBILE DEVICE TUTORIAL FOR OLDER ADULTS |
COHEN |
2015 |
NATHAN WHITE |
AN EMPIRICAL INVESTIGATION INTO THE ROLE THAT BOREDOM, RELATIONSHIPS, ANXIETY, AND GRATIFICATION (BRAG) PLAY IN A DRIVER’S DECISION TO TEXT |
LEVY |
2015 |
FARANAK AFSHAR |
INVESTIGATING THE DETERMINANTS OF DISASTER RECOVERY TECHNOLOGY INVESTMENT CHOICE IN SMALL AND MEDIUM-SIZED ENTERPRISES |
TEJAY |
2014 |
KEVIN BARTON |
INFORMATION SYSTEM SECURITY COMMITMENT: A STUDY OF EXTERNAL INFLUENCES ON SENIOR MANAGEMENT |
TEJAY |
2014 |
DAWN BEYER |
CONSTRUCTING A CYBER PREPAREDNESS FRAMEWORK (CPF): THE LOCKHEED MARTIN CASE STUDY |
LITTMAN |
2014 |
EDWARD BOYER |
UNDERSTANDING USABILITY-RELATED INFORMATION SECURITY FAILURES IN A HEALTHCARE CONTEXT |
TEJAY |
2014 |
WALTER BROCK |
ALTERNATIVE APPROACHES TO CORRECTION OF MALAPROPISMS IN AIML BASED CONVERSATIONAL AGENTS |
MUKHERJEE |
2014 |
ROBERT BROWN |
APPLICATION OF CELLULAR AUTOMATA TO DETECTION OF MALICIOUS NETWORK PACKETS |
CANNADY |
2014 |
MIGUEL BULEJE |
THE IMPACT OF ENTERPRISE RESOURCE PLANNING SYSTEMS ON SMALL AND MEDIUM ENTERPRISES |
NYSHADHAM |
2014 |
ROBERT CARTELLI |
IDENTIFYING E-COMMERCE STRATEGY-MAKING MODES IN SMALL FIRMS |
NYSHADHAM |
2014 |
SIMON CLEVELAND |
A CAUSAL MODEL TO PREDICT ORGANIZATIONAL KNOWLEDGE SHARING VIA INFORMATION AND COMMUNICATION TECHNOLOGIES |
ELLIS |
2014 |
ALEXANDER CORRIS |
SECURE MOBILE DEPLOYMENT OF NFL TRAINING MATERIALS |
ABRAMSON |
2014 |
BINH DANG |
EVALUATION OF UNSUPERVISED LEARNING TECHNIQUES FOR INTRUSION DETECTION IN MOBILE AD HOC NETWORKS |
LI |
2014 |
FELIX DIAZ |
USING SPEECH RECOGNITION SOFTWARE TO IMPROVE WRITING SKILLS |
ABRAMSON |
2014 |
RAGAN DUBOSE-MORRIS |
AN INTERPRETATIVE PHENOMENOLOGICAL ANALYSIS OF TELEHEALTH CHAMPIONS |
DRINGUS |
2014 |
CHARLES EDWARDS |
A FRAMEWORK FOR THE GOVERNANCE OF INFORMATION SECURITY |
TEJAY |
2014 |
REINALDO FERNANDEZ |
A COGNITIVE APPRENTICESHIP APPROACH FOR TEACHING ABSTRACT AND COMPLEX SKILLS IN AN ONLINE LEARNING ENVIRONMENT |
SNYDER |
2014 |
SHMUEL FINK |
THE IMPACT OF TECHNOLOGY ON THE STUDY OF TALMUD |
ABRAMSON |
2014 |
GEORGE FORD |
SPOKEN LANGUAGE IDENTIFICATION FROM PROCESSING AND PATTERN ANALYSIS OF SPECTROGRAMS |
LASZLO |
2014 |
SARA FOREMAN |
ASSISTIVE TECHNOLOGIES USED BY STUDENTS WITH ASPERGERS SYNDROME TO IMPROVE ACADEMIC PERFORNANCE IN THE GENERAL EDUCATION CLASSROOM |
ABRAMSON |
2014 |
NATHANIEL FULLER |
A CONTEXTUAL MODEL FOR IDENTITY MANAGEMENT (IDM) INTERFACES |
COHEN |
2014 |
ROBIN GARRETT |
A STUDY OF THE IMPACTS OF NAVIGATIONAL LINKS, TASK COMPLEXITY, AND THE OLDER USER ON WEBSITE USABILITY IN A COMMUNITY COLLEGE DOMAIN |
DRINGUS |
2014 |
ARTURO GEIGEL |
UNSUPERVISED LEARNING TROJAN |
LI |
2014 |
BENNET HAMMER |
A PICTURE IS WORTH A THOUSAND WORDS, BUT ARE THEY THE WORDS THAT MATTER? – AN ANALYSIS OF THE EFFECTS OF IMAGE COMMENTS ON SOCIAL NETWORKING SITES |
PARRISH |
2014 |
MICHELLE HANSEN |
HELPING CHILDREN WITH AUTISM LEARN WITH MATHEMATICS SOFTWARE |
ABRAMSON |
2014 |
MARTHA HARRELL |
FACTORS FOR INFORMATION SECURITY NONCOMPLIANCE: A MACROERGONOMIC PERSPECTIVE |
TEJAY |
2014 |
RONDA HENNING |
SECURITY POLICIES THAT MAKE SENSE FOR COMPLEX SYSTEMS: COMPREHENSIBLE FORMALISM FOR THE SYSTEM CONSUMER |
CANNADY |
2014 |
STEVE HERNANDEZ |
A METHOD TO REDUCE THE COST OF RESILIENCE BENCHMARKING OF SELF-ADAPTIVE SYSTEMS |
SIMCO |
2014 |
HUEI-MIN HSU |
ORGANIZATIONAL CONTEXT INFLUENCES ON KNOWLEDGE SHARING |
WANG |
2014 |
CORLAND KEATING |
VALIDATING THE OCTAVE ALLEGRO INFORMATION SYSTEMS RISK ASSESSMENT METHODOLOGY: A CASE STUDY |
LITTMAN |
2014 |
MARK KOCOUR |
INVESTIGATION ON THE ADOPTION AND DIFFUSION OF SMARTPHONES IDEA |
LITTMAN |
2014 |
BRIAN KOWALCZK |
IMPROVING THE SELECTION OF SURROGATES DURING THE COLD-START PHASE OF A CYBER FORAGING APPLICATION TO INCREASE APPLICATION PERFORMANCE |
SIMCO |
2014 |
JOHN LANDMESSER |
IMPROVING IT PORTFOLIO MANAGEMENT DECISION CONFIDENCE USING MULTI-CRITERIA DECISION MAKING AND HYPERVARIATE DISPLAY TECHNIQUES. |
MUKHERJEE |
2014 |
JOSEPH LUI |
A BAYESIAN APPROACH TO INTERNATIONAL CHANNEL SELECTION FOR SMES IN THE SOFTWARE INDUSTRY |
MUKHERJEE |
2014 |
ADNAN MASOOD |
MEASURING INTEREST IN OUTLIERS WITH EXPLANATION FACILITY USING BAYESIAN BELIEF NETWORKS |
LI |
2014 |
REGINA MATHIS |
WEB ONTOLOGY LANGUAGE FOR SCALABLE VECTOR GRAPHICS |
LASZLO |
2014 |
WILLIAM MCGARVEY |
EVALUATING HEURISTICS AND CROWDING ON CENTER SELECTION IN K-MEANS GENETIC ALGORITHMS |
MUKHERJEE |
2014 |
DIANA MOORE |
AN INVESTIGATION OF THE ATTRITION OF AFRICAN-AMERICAN STUDENTS IN AN ONLINE UNDERGRADUATE PROGRAM |
TERRELL |
2014 |
KIMBERLY MORICK |
AN INVESTIGATION OF THE DAYTON REGIONAL STEM SCHOOL PUBLIC-PRIVATE PARTNERSHIPS |
TERRELL |
2014 |
WINSTON NINH |
PERFORMANCE COMPARISON OF PROJECTIVE ELLIPTIC-CURVE POINT MULTIPLICATION IN 64-BIT X86 RUNTIME ENVIRONMENT |
LI |
2014 |
STEPHEN ORR |
A VALUE-FOCUSED ASSESSMENT OF KNOWLEDGE SHARING IN A CLOSED INFORMATION ENVIRONMENT |
ZINK |
2014 |
ANGEL OTERO |
AN INFORMATION SECURITY CONTROL ASSESSMENT METHODOLOGY FOR ORGANIZATIONS |
TEJAY |
2014 |
DAVID SHRADER |
DYNAMIC PRICING IN HETEROGENEOUS WIRELESS CELLULAR NETWORKS |
SIMCO |
2014 |
MICHAEL SNIDER |
UNIT TESTING ASPECTS USING INTERFACES WITH MOCK OBJECTS |
MITROPOULOS |
2014 |
DIANNE SOLOMON |
EMPLOYEE AND ORGANIZATION SECURITY VALUE ALIGNMENT THROUGH VALUE SENSITIVE SECURITY POLICY DESIGN |
COHEN |
2014 |
BRUCE SOWERS |
AN INVESTIGATION OF THE ROLE OF TECHNOLOGY IN INSTRUCTIONAL DESIGNERS DECISION-MAKING |
SNYDER |
2014 |
JAMES SPRUILL |
A STUDY OF THE 8TH GRADE TECHNOLOGY LITERACY OF MICHIGAN CHARTER SCHOOL |
WANG |
2014 |
TARYN STEVENSON |
SERVING MILITARY FAMILIES: USING SOLUTION-FOCUSED THERAPY IN A VIRTUAL ENVIRONMENT |
TERRELL |
2014 |
CLAUDIO TAGLIENTI |
THE USER ATTRIBUTION PROBLEM AND THE CHALLENGE OF PERSISTENT SURVEILLANCE OF USER ACTIVITY IN COMPLEX NETWORKS |
CANNADY |
2014 |
WENDY TU |
DESIGNING FOR STATISTICAL REASONING AND THINKING IN A TECHNOLOGY-ENHANCED LEARNING ENVIRONMENT |
SNYDER |
2014 |
RUTH WELDON |
USING SIMULATED ANNEALING FOR ROBUSTNESS IN COEVOLUTIONARY GENETIC ALGORITHMS |
LASZLO |
2014 |
ANN AKSUT |
POPULATION-BASED ANT COLONY OPTIMIZATION FOR MULTIVARIATE MICROAGGREGATION. |
MUKHERJEE |
2013 |
SAMI AL-SALMAN |
THE ROLE OF FACULTY IN THE EFFECTIVENESS OF FULLY ONLINE PROGRAMS |
ABRAMSON |
2013 |
GEORGE AMBROSE |
ADVISING E-PORTFOLIOS TO IMPROVE FIRST GENERATION STUDENT ENGAGEMENT IN HIGHER EDUCATION |
ABRAMSON |
2013 |
GREGORY BLOCK |
REDUCING COGNITIVE LOAD USING UNCERTAINTY VISUALIZATION |
COHEN |
2013 |
JAMES BOGGS |
ACCESSING GEOSPATIAL SERVICES IN LIMITED BANDWIDTH SERVICE-ORIENTED ARCHITECTURE (SOA) ENVIRONMENTS |
LITTMAN |
2013 |
GWENDOLYN BRITTON |
INTEGRATION AND ABILITY OF ONLINE UNDERGRADUATE INFORMATION TECHNOLOGY PROJECT-BASED CAPSTONE EXPERIENCES ENHANCING SOFT SKILLS DEVELOPMENT |
ELLIS |
2013 |
JAMES BURRELL |
COMPARISON OF TEXT INPUT AND INTERACTION IN A MOBILE LEARNING ENVIRONMENT |
DRINGUS |
2013 |
URIEL CARRASQUILLA |
REDUCING THE CUMULATIVE FILE DOWNLOAD TIME AND VARIANCE IN A P2P OVERLAY VIA PROXIMITY BASED PEER SELECTION |
LIU |
2013 |
MIN SUK CHOI |
ASSESSING THE ROLE OF USER COMPUTER SELF-EFFICACY, CYBERSECURITY COUNTERMEASURES AWARENESS, AND CYBERSECURITY SKILLS TOWARD COMPUTER MISUSE INTENTION AT GOVERNMENT AGENCIES |
LEVY |
2013 |
PAUL COMITZ |
A SOFTWARE FACTORY FOR AIR TRAFFIC DATA |
LASZLO |
2013 |
KATHLEEN COOL |
INFORMAL LEARNING AS PERFORMANCE: TOWARD A HERMENEUTIC PHENOMENOLOGY OF MUSEUM LEARNING IN SECOND LIFE |
TERRELL |
2013 |
ALICIA DAVID |
MOTIVATED LEARNING IN INTRODUCTORY ONLINE COLLEGE COURSES: DO MOTIVATIONAL MESSAGES MATTER? |
SNYDER |
2013 |
JOHN DEAN |
AN ASPECT POINTCUT FOR PARALLELIZABLE LOOPS |
MITROPOULOS |
2013 |
MATTHEW DEVINE |
GLOGS AS NON-ROUTINE PROBLEM SOLVING TOOLS IN MATHEMATICS |
TERRELL |
2013 |
DARSHAN DOMAH |
THE NERV METHODOLOGY: NON-FUNCTIONAL REQUIREMENTS ELICITATION, REASONING AND VALIDATION IN AGILE PROCESSES |
MITROPOULOS |
2013 |
AUDREY GENDREAU |
ENHANCED DEPLOYMENT STRATEGY FOR ROLE-BASED HIERARCHICAL APPLICATION AGENTS IN WIRELESS SENSOR NETWORKS WITH ESTABLISHED CLUSTERHEADS |
CANNADY |
2013 |
CHRISTIAN GRAHAM |
AN EXAMINATION OF THE TYPE OF LEADERSHIP AMONG GENERATION Y LEADERS AND ITS IMPACT ON VIRTUAL TEAM BEHAVIOR |
COHEN |
2013 |
STEPHANIE GURLEN |
SECURITY DESIGN FLAWS THAT AFFECT USABILITY IN ONLINE BANKING |
COHEN |
2013 |
YOURIK HACOUPIAN |
MINING ASPECTS THROUGH CLUSTER ANALYSIS USING SUPPORT VECTOR MACHINES AND GENETIC ALGORITHMS |
MITROPOULOS |
2013 |
RAYMOND HALPER |
A POWER CONSERVATION METHODOLOGY FOR HARD DRIVES BY COMBINING PREFETCHING ALGORITHMS AND FLASH MEMORY |
SIMCO |
2013 |
MARK HARRIS |
ELEMENTS OF A KNOWLEDGE MANAGEMENT GUIDE FOR PUBLIC SECTOR ORGANIZATIONS |
ABRAMSON |
2013 |
KATHARINE HIXSON |
DEVELOPING AND EVALUATING TEAM TRAINING PROGRAMS FOR LONG-DURATION SPACEFLIGHT CREWS |
ABRAMSON |
2013 |
JAMES JAUREZ |
DEVELOPMENT OF A MEDIA DRIVEN ONLINE ASSESSMENT FRAMEWORK: IMPROVING QUALITY, FREQUENCY, AND DEPLOYMENT OF GRADES AND FEEDBACK IN HIGHER EDUCATION |
WANG |
2013 |
RUSSELL JOHNSON |
AUTHORSHIP ATTRIBUTION WITH FUNCTION WORD N-GRAMS |
LASZLO |
2013 |
GREGORY JULOCK |
THE EFFECTIVENESS OF A RANDOM FORESTS MODEL IN DETECTING NETWORK-BASED BUFFER OVERFLOW ATTACKS |
LI |
2013 |
DONNA KENNEDY |
AN INVESTIGATION OF CANDIDATES’ LIVED EXPERIENCE OF ATTRITION IN A LIMITED-RESIDENCY DOCTORAL PROGRAM |
TERRELL |
2013 |
JAMES KIPER |
COORDINATING TRAINING PROGRAMS WITH BUSINESS PROCESSES IN LARGE ORGANIZATIONS |
ELLIS |
2013 |
JACOB KRIVE |
EFFECTIVENESS OF EVIDENCE-BASED CPOE MEDICATION ORDER SETS MEASURED BY HEALTH OUTCOMES |
ZINK |
2013 |
DANIEL KRUTZ |
CONCOLIC CODE CLONE DETECTION |
MITROPOULOS |
2013 |
CAROLYN LAMACCHIA |
TECHNIQUE FOR IMPROVING THE SCALABILITY OF AN EXACT APPROACH FOR FREQUENT ITEMSET HIDING |
MUKHERJEE |
2013 |
LERONE LATOUCHE |
USABILITY ISSUES IN THE USER INTERFACES OF PRIVACY-ENHANCING TECHNOLOGIES |
COHEN |
2013 |
JEFFREY LINNEY |
ASSESSING BEHAVIORAL INTENTION TO USE LOW SOCIAL PRESENCE ICTS FOR INTERPERSONAL TASK COMPLETION AMONG COLLEGE STUDENTS: WITH SPECIAL CONSIDERATION TOWARD SHORT MESSAGE SERVICE (SMS) TEXT-MESSAGING |
ELLIS |
2013 |
HERNAN LONDONO |
THE EFFECTS OF CROSSCUTTING HOMOGENEITY ON THE EVOLVABILITY OF ASPECT ORIENTED SOFTWARE |
MITROPOULOS |
2013 |
MARGARET LONG |
E-BUSINESS REPORTING: TOWARDS A GLOBAL STANDARD FOR FINANCIAL REPORTING SYSTEMS USING XBRL |
NYSHADHAM |
2013 |
RICHARD MACMILLAN |
EXAMINING THE ADOPTION OF DONOR MANAGEMENT SYSTEMS (DMS) IN NOT-FOR–PROFIT (NFP) ORGANIZATIONS WITH AN EXTENDED TAM |
WANG |
2013 |
FRANCIS MANNING |
A FRAMEWORK FOR ENFORCING ROLE BASED ACCESS CONTROL IN OPEN SOURCE SOFTWARE |
MITROPOULOS |
2013 |
KATHLEEN MARRS |
AN INVESTIGATION OF THE FACTORS THAT INFLUENCE FACULTY AND STUDENT ACCEPTANCE OF MOBILE LEARNING IN ONLINE HIGHER EDUCATION |
LITTMAN |
2013 |
JACK MASON |
A HYBRID ARCHITECTURE FOR CONTEXT PRESERVATION DURING THREAD LEVEL SPECULATIVE EXECUTION |
SIMCO |
2013 |
CHARLES MAYBERRY |
THE IMPACT OF AUGMENTED REALITY TRAINING ON PERFORMANCE |
ABRAMSON |
2013 |
RICHARD MERRITTS |
ONLINE DECEPTION DETECTION USING BDI AGENTS |
CANNADY |
2013 |
RICHARD MISLAN |
AN ANALYSIS OF MOBILE PHONE FORENSIC REPORTS AS TRIAGE TOOLS FOR GATHERING ON-SCENE INTELLIGENCE |
COHEN |
2013 |
CHIOU MOH |
DEVELOPMENT AND ASSESSMENT OF MOBILE DEVICE SUPPORT FOR CERTIFICATION EXAM PREPARATION |
WANG |
2013 |
DAVID MOORE |
ASPECTASSAY: A TECHNIQUE FOR EXPANDING THE POOL OF AVAILABLE ASPECT MINING TEST DATA USING CONCERN SEEDING |
MITROPOULOS |
2013 |
AUGUST MURRAY |
IMPACT OF MILITARY DEPLOYMENT AND DISTANCE LEARNING ON SOLDIER-STUDENTS |
ABRAMSON |
2013 |
BARBARA NEEQUAYE |
A MATURITY MODEL FOR ONLINE CLASSES ACROSS ACADEMIC DISCIPLINES |
ABRAMSON |
2013 |
SANG NGUYEN |
MEASURING END-TO-END AJAX PERFORMANCE IN BROADBAND SATELLITE NETWORKS |
SIMCO |
2013 |
MARIA PARES TORAL |
THE EFFECT OF THE USE OF THE 3-D MULTI-USER VIRTUAL ENVIRONMENT SECOND LIFE ON STUDENT MOTIVATION AND LANGUAGE PROFICIENCY IN COURSES OF SPANISH AS A FOREIGN LANGUAGE |
TERRELL |
2013 |
SHARON PARKER |
AN EXPLORATION OF THE FACTORS INFLUENCING THE ADOPTION OF AN IS GOVERNANCE FRAMEWORK. |
ACKERMAN |
2013 |
JERRY PEREZ |
AN INVESTIGATION OF RUN-TIME OPERATIONS IN A HETEROGENEOUS DESKTOP GRID ENVIRONMENT: THE TEXAS TECH UNIVERSITY (TTU) DESKTOP GRID CASE STUDY |
LITTMAN |
2013 |
LEVI PERIGO |
AN EXAMINATION OF THE DESIGN, DEVELOPMENT, AND IMPLEMENTATION OF AN INTERNET PROTOCOL VERSION 6 (IPV6) NETWORK INFRASTRUCTURE: THE ADTRAN INC. CASE STUDY |
LITTMAN |
2013 |
KELLIE PRICE |
USING VISUAL TECHNOLOGIES IN THE INTRODUCTORY PROGRAMMING COURSE FOR COMPUTER SCIENCE MAJORS |
ABRAMSON |
2013 |
JOHN QUEERN |
AN EVOLUTIONARY ALGORITHM FOR THE CONSTRAINED FOREST PROBLEM. |
MUKHERJEE |
2013 |
SCOTT RAGSDALE |
PURSUING AND COMPLETING AN UNDERGRADUATE COMPUTING DEGREE FROM A FEMALE PERSPECTIVE: A QUANTITATIVE AND QUALITATIVE ANALYSIS |
TERRELL |
2013 |
JAIME RAIGOZA |
TEMPORAL JOIN PROCESSING WITH HILBERT CURVE SPACE MAPPING |
SUN |
2013 |
JAMES RENEAU |
AN EXAMINATION OF THE ACCEPTANCE, ADOPTION, AND DIFFUSION OF SMARTPHONE DEVICES WITH SENIOR CITIZENS |
COHEN |
2013 |
SUSAN RIZZO |
MAKING THE SHIFT: A PHENOMENOLOGICAL STUDY OF TEACHERS’ EXPERIENCES IN A STUDENT-CENTERED, 21ST CENTURY LAPTOP PROGRAM |
SNYDER |
2013 |
JEFFREY ROACH |
PREDICTING REALISTIC STANDING POSTURES IN A REAL-TIME ENVIRONMENT |
LASZLO |
2013 |
STEPHEN ROCHE |
EFFECTIVENESS OF ONLINE EDUCATION WITHIN THE AFFECTIVE DOMAIN |
TERRELL |
2013 |
KIMBERLEE ROUND |
DEVELOPMENT AND EVALUATION OF HAWKLEARN: A NEXT GENERATION LEARNING MANAGEMENT SYSTEM |
ABRAMSON |
2013 |
WILLIAM SAUSE |
A COORDINATED REINFORCEMENT LEARNING FRAMEWORK FOR MULTI-AGENT VIRTUAL ENVIRONMENTS |
LASZLO |
2013 |
VINCENT SCOVETTA |
THE IMPACT OF LEADERSHIP SOCIAL POWER ON KNOWLEDGE MANAGEMENT SUCCESS |
ELLIS |
2013 |
BILLY SHREWSBURY |
SUPERVISED LEARNING METHODS TO ENHANCE CUSTOMER LIFETIME VALUE MODELS FOR MULTI-CHANNEL RETAIL SALES ORGANIZATIONS |
MUKHERJEE |
2013 |
GARRETT SMILEY |
INVESTIGATING THE ROLE OF MULTIBIOMETRIC AUTHENTICATION ON PROFESSIONAL CERTIFICATION E-EXAMINATION |
LEVY |
2013 |
LAWRENCE SNYDER |
THE EFFECTIVENESS OF VIRTUAL LEARNING TOOLS FOR MILLENNIAL GENERATION STUDENTS IN A COMMUNITY COLLEGE CRIMINAL JUSTICE DEGREE PROGRAM |
WANG |
2013 |
JOSHUA STALKER |
A READING PREFERENCE AND RISK TAXONOMY FOR PRINTED PROPRIETARY INFORMATION COMPROMISE IN THE AEROSPOACE AND DEFENSE INDUSTRY |
LEVY |
2013 |
ERIC STRAW |
CONSTRUCTION OF A CONCEPTUALIZATION OF PERSONAL KNOWLEDGE WITHIN A KNOWLEDGE MANAGEMENT PERSPECTIVE USING GROUNDED THEORY METHODOLOGY |
ELLIS |
2013 |
LAWRENCE TAUB |
APPLICATION OF A LAYERED HIDDEN MARKOV MODEL IN THE DETECTION OF NETWORK ATTACKS |
CANNADY |
2013 |
MATTHEW TENNYSON |
AUTHORSHIP ATTRIBUTION OF SOURCE CODE |
MITROPOULOS |
2013 |
HICHAM TOUT |
PHISHTEST: MEASURING THE IMPACT OF EMAIL HEADERS ON THE PREDICTIVE ACCURACY OF MACHINE LEARNING TECHNIQUES |
LI |
2013 |
MARY VICKS |
AN EXAMINATION OF INTERNET FILTERING AND SAFETY POLICY TRENDS AND ISSUES IN SOUTH CAROLINA’S K-12 PUBLIC SCHOOLS |
ZINK |
2013 |
STANIE WADDELL |
A STUDY OF THE EFFECT OF INFORMATION SECURITY POLICIES ON INFORMATION SECURITY BREACHES IN HIGHER EDUCATION INSTITUTIONS |
WANG |
2013 |
KENNETH WHITE |
EMPLOYEE DETERMINANTS TO SHARE KNOWLEDGE IN A U.S. FEDERAL GOVERNMENT ENVIRONMENT: AN EXPLORATORY STUDY |
ZINK |
2013 |
RICHARD WILKINS |
DOWNLOAD TIME REDUCTION USING RECENT PERFORMANCE-BIASED PEER REPLACEMENT IN STOCHASTIC P2P CONTENT DELIVERY NETWORKS |
SIMCO |
2013 |
SHARON WRIGHT |
EXAMINING THE IMPACT OF COLLABORATION TECHNOLOGY TRAINING SUPPORT ON VIRTUAL TEAM COLLABORATION EFFECTIVENESS |
ELLIS |
2013 |
DANIEL YOAS |
USING FORECASTING TO PREDICT LONG-TERM RESOURCE UTILIZATION FOR WEB SERVICES |
SIMCO |
2013 |
FAYEZ ABBOUD |
UTILIZING IMAGE-BASED FORMATS TO OPTIMIZE PATTERN DATA FORMAT AND PROCESSING IN MASK AND MASKLESS PATTERN GENERATION LITHOGRAPHY |
LIU |
2012 |
BARRY AHRENS |
A TOUR CONSTRUCTION FRAMEWORK FOR THE TRAVELLING SALESMAN PROBLEM |
LI |
2012 |
RAMI ALNATSHEH |
FREQUENT ITEMSET HIDING ALGORITHM USING FREQUENT PATTERN TREE APPROACH. |
MUKHERJEE |
2012 |
ALBERT BALL |
A COMPARISON OF PERSONAL INFORMATION SHARING AWARENESS, HABITS, AND PRACTICES OF USERS IN SOCIAL NETWORKING SITES AND E-LEARNING SYSTEMS |
LEVY |
2012 |
KAREN BARON |
INCORPORATING PERSONAL HEALTH RECORDS INTO THE DISEASE MANAGEMENT OF RURAL HEART FAILURE PATIENTS |
ABRAMSON |
2012 |
DONALD BESS |
UNDERSTANDING INFORMATION SECURITY CULTURE IN A ORGANIZATION: AN INTERPRETATIVE CASE STUDY |
TEJAY |
2012 |
AVRIL BEST |
ONLINE ACADEMIC SUPPORT PEER GROUPS FOR MEDICAL UNDERGRADUATES |
ABRAMSON |
2012 |
SANDRA BOESCH |
A STUDY OF TARGETED INFORMATION SYSTEM ACCESSIBILITY AND USAGE BY THE FOREIGN DOMESTIC WORKER IN SINGAPORE |
COHEN |
2012 |
JOHN BONO |
THE INFLUENCE OF WEB SITE AESTHETICS ON IMPULSE PURCHASE BEHAVIOR WITHIN ONLINE RETAILING ENVIRONMENTS |
COHEN |
2012 |
LINDA BROCK |
THE MARKET VALUE OF INFORMATION SYSTEM (IS) SECURITY: AN EVENT STUDY OF E-BANKING SERVICE PROVIDERS |
LITTMAN |
2012 |
DEXTER BROWN |
A COMPARATIVE ANALYSIS OF MACHINE LEARNING TECHNIQUES FOR FORECLOSURE PREDICTION. |
MUKHERJEE |
2012 |
PAUL CERKEZ |
AUTOMATED DETECTION OF SEMAGRAM LADEN IMAGES |
CANNADY |
2012 |
FIRAS CHAHINE |
A GENETIC ALGORITHM THAT EXCHANGES NEIGHBORING CENTERS FOR FUZZY C-MEANS CLUSTERING. |
MUKHERJEE |
2012 |
RAMADHAN CHUMA |
INVESTIGATING THE IMPACT OF SELF-CONTROL AND DETERRENTS ON NONCOMPLIANT INFORMATION SECURITY BEHAVIOR |
TEJAY |
2012 |
JEEVAN D'SOUZA |
REGION-BASED CROSSOVER FOR CLUSTERING PROBLEMS |
LASZLO |
2012 |
STEPHEN DINKEL |
UNCERTAINTY REASONING FOR SERVICE-BASED SITUATIONAL AWARENESS INFORMATION ON THE SEMANTIC WEB |
HAFNER |
2012 |
HENRY DIRSKA |
A DECLARATIVE RULES API FOR MANAGING ADAPTATION RELATIONSHIPS IN CONTEXT-ORIENTED PROGRAMMING |
LASZLO |
2012 |
GARY DOSS |
AN APPROACH TO EFFECTIVELY IDENTIFY INSIDER ATTACKS WITHIN AN ORGANIZATION |
TEJAY |
2012 |
JOHN FREUND |
CONSTRUCTING A COMMUNITY RESPONSE GRID: THE DUBLIN, OHIO CASE STUDY |
LITTMAN |
2012 |
GLENDA GAY |
A STUDY OF TECHNOLOGICAL BARRIERS TO INSTRUCTOR E-READINESS IN AN ONLINE ENVIRONMENT |
DRINGUS |
2012 |
BARBARA HARBULA |
AN EXAMINATION OF TEACHERS INTEGRATION OF WEB 2.0 TECHNOLOGIES IN SECONDARY CLASSROOMS: A PHENOMENOLOGICAL RESEARCH STUDY |
WANG |
2012 |
JEREMY HARRIS |
TOWARDS AN INTERNET-BASED DISTANCE EDUCATION (IDE) FRAMEWORK FOR RELIGIOUS-BASED HIGHER EDUCATION ORGANIZATIONS: A CASE OF THE ALLIANCE FOR ASSEMBLIES OF GOD HIGHER EDUCATION |
TERRELL |
2012 |
KENRIE HYLTON |
AN EXPERIMENT USING WEBCAM-BASED SURVEILLANCE TO DETER INFORMATION SYSTEMS MISUSE |
LEVY |
2012 |
JACK HYMAN |
TOWARDS AN UNDERSTANDING OF CONTEXTUAL USABILITY AND ITS IMPACT ON MOBILE COMMERCE |
COHEN |
2012 |
RICARDO JIMENEZ |
A COMPARISON OF A YOUNG AND OLDER ADULT POPULATION OF COMPUTER USERS’ RECOGNITION RATES OF DIFFERENT TACTONS USING MODULATION AND SIMPLE-WAVEFORMS AS STIMULUS PARAMETERS. |
COHEN |
2012 |
GERALD JOHNSON |
DEVELOPMENT OF AN AUDIT CLASSIFICATION INDEX (ACI) FOR FEDERAL E-LEARNING SYSTEMS SECURITY VULNERABILITIES |
LEVY |
2012 |
STEPHAN JUNION |
INSTRUCTIONAL DESIGN STRATEGIES AND ACTIVITIES THAT INFORM THE COMMUNITY OF INQUIRY (COI) FRAMEWORK |
SNYDER |
2012 |
RONALD KRAWITZ |
CLONE CODE DISCOVERY BASED ON FUNCTIONAL BEHAVIOR |
MITROPOULOS |
2012 |
DAVID KUMKA |
QUANTIFYING PERFORMANCE COSTS OF DATABASE FINE-GRAINED ACCESS |
SUN |
2012 |
SANDRA LEBRON-LOZADA |
LEARNING CONVERSATIONAL ENGLISH WITH STUDENT-GENERATED PODCASTS |
ABRAMSON |
2012 |
GARY LIEBERMAN |
SECURELY HANDLING INTER-APPLICATION CONNECTION CREDENTIALS |
MITROPOULOS |
2012 |
YAN LIU |
CORRELATION OF SOFTWARE QUALITY METRICS AND PERFORMANCE |
MITROPOULOS |
2012 |
MICHAEL LOHLE |
IMPLICATIONS FOR REAL PROJECT MANAGEMENT SUCCESS: A STUDY OF AVATAR IDENTITY AS AN ANTECEDENT OF VIRTUAL TEAM TRUST |
TERRELL |
2012 |
ROBERT MATTHEWS |
A PORTRAIT OF THE EARLY 21ST CENTURY MBA |
ABRAMSON |
2012 |
HERBERT MATTORD |
ASSESSMENT OF WEB-BASED AUTHENTICATION METHODS IN THE U.S.: COMPARING E-LEARNING SYSTEMS TO INTERNET HEALTHCARE INFORMATION SYSTEMS |
LEVY |
2012 |
DANA MAXIE |
THE IMPACT OF DATA-DRIVEN DECISION MAKING ON EDUCATIONAL PRACTICE IN LOUISIANA SCHOOLS |
ABRAMSON |
2012 |
DONALD MCKAY II |
INFORMATION TECHNOLOGY PROJECT LEARNING PRACTICES AND PROJECT PERFORMANCE |
ELLIS |
2012 |
DOUGLAS MILLER |
THE EFFECT OF INTERACTIVE TELEVISION AS AN INSTRUCTION DELIVERY METHOD IN RURAL SECONDARY SCHOOLS ON LEARNER ACHIEVEMENT, MOTIVATION AND ANXIETY |
TERRELL |
2012 |
GLORIA MIYARES |
UNDERACHIEVING GIFTED SCIENCE STUDENTS AND MULTI-USER VIRTUAL ENVIRONMENTS |
TERRELL |
2012 |
DENNIS MIZE |
A STUDY OF REQUIREMENTS VOLATILITY AND FOOTPRINT VISUALIZATION PROPERTIES IN EVOLVING USE CASE DATA SETS |
MITROPOULOS |
2012 |
EDWIN NASSIFF |
UNDERSTANDING THE VALUE OF ENTERPRISE ARCHITECTURE FOR ORGANIZATIONS: A GROUNDED THEORY APPROACH |
TEJAY |
2012 |
WAYNE PAULEY |
AN EMPIRICAL STUDY OF PRIVACY RISK ASSESSMENT METHODOLOGIES IN CLOUD COMPUTING ENVIRONMENTS |
HAFNER |
2012 |
SYED RAZA |
SELECTING ONLINE VENDORS BY PRIVACY RISKS |
SEAGULL |
2012 |
DAVID REIS |
AN EXAMINATION OF AN INFORMATION SECURITY FRAMEWORK IMPLEMENTATION BASED ON AGILE VALUES TO ACHIEVE HIPAA SECURITY RULE COMPLIANCE IN AN ACADEMIC MEDICAL CENTER: THE THOMAS JEFFERSON UNIV. CASE STUDY |
LITTMAN |
2012 |
HERNAN RUF |
A COMPARATIVE STUDY ON ELECTRONIC VS. TRADITIONAL DATA COLLECTION IN A SPECIAL EDUCATION SETTING |
DRINGUS |
2012 |
DEREK SEDLACK |
REDUCING INCONGRUITY OF PERCEPTIONS RELATED TO INFORMATION RISK: DIALOGICAL ACTION RESEARCH IN ORGANIZATIONS |
TEJAY |
2012 |
FARNAZ SHARIFRAZI |
THE INVESTIGATION OF A SYNCHRONOUS ENGAGEMENT SYSTEMS (SES) TO ALLEVIATE ANXIETY AMONG ELEARNING STUDENTS IN AN MBA PROGRAM |
WANG |
2012 |
DEVENA SINGLETON |
THE TRANSITION FROM TRADITIONAL TO BLENDED ON-CAMPUS LEARNING EXPERIENCE |
ABRAMSON |
2012 |
NANCY SMITH |
EVOLVING CREDIBLE FACIAL EXPRESSIONS WITH INTERACTIVE GAS |
LASZLO |
2012 |
FOREST THOLA |
MINIMIZING RECOMMENDER ERROR COSTS UNDER NOISY INPUTS IN RULE-BASED EXPERT SYSTEMS. |
MUKHERJEE |
2012 |
GERRY VAN LOON |
TOWARD AN UNDERSTANDING OF INTERNET WORD OF MOUTH MESSAGE CONTENT AND THE BOOKING INTENTIONS OF LODGING CONSUMERS |
NYSHADHAM |
2012 |
KAREN VIGNARE |
AN INVESTIGATION OF TRADITIONAL STUDENTS PREFERENCES FOR SOCIAL AND TEACHING PRESENCE IN ONLINE LEARNING |
DRINGUS |
2012 |
RAYMOND WELLS |
AN EMPIRICAL ASSESSMENT OF FACTORS CONTRIBUTING TO INDIVIDUALS’ PROPENSITY TO COMMIT SOFTWARE PIRACY IN THE BAHAMAS |
LEVY |
2012 |
ELIZABETH YAGODZINSKI |
FORMATIVE RESEARCH ON AN INSTRUCTIONAL DESIGN THEORY FOR ONLINE LEARNING COMMUNITIES: A HIGHER EDUCATION FACULTY DEVELOPMENT CASE |
SNYDER |
2012 |
JILL YOUNG |
ANALYZING E-VOTING MACHINE TABULATIONS: A CASE STUDY TO DETERMINE THE ACCURACY OF E-VOTING MACHINES USED IN THE STATE OF MISSOURI |
LITTMAN |
2012 |
RAYMOND ANGELO |
COLLABORATIVE GROUP LEARNING AND KNOWLEDGE BUILDING TO ADDRESS INFORMATION SYSTEMS PROJECT FAILURE |
DRINGUS |
2011 |
MOHAMMAD AWWAL |
AN EMPIRICAL INVESTIGATION OF THE RELATIONSHIP BETWEEN COMPUTER SELF-EFFICACY AND INFORMATION PRIVACY CONCERNS |
HAFNER |
2011 |
RITA BARRIOS |
AN ADAPTIVE DATABASE INTRUSION DETECTION SYSTEM |
CANNADY |
2011 |
MAX BAUMGARTNER |
INSTRUCTIONAL TECHNOLOGIES IN GRADUATE PHYSICAL THERAPY COURSES |
ABRAMSON |
2011 |
HARPREET BHASIN |
AN EVOLUTIONARY ALGORITHM FOR FEATURE SUBSET SELECTION IN HARD DISK DRIVE FAILURE PREDICTION. |
MUKHERJEE |
2011 |
ANITA BLEFFERT-SCHMIDT |
THE BLENDED LEARNING EXPERIENCE OF COMMUNITY COLLEGE STUDENTS |
ABRAMSON |
2011 |
STEPHEN BRONSBURG |
THE IMPACT OF AN OSTEOPATHIC MEDICAL PROGRAM ON INFORMATION TECHNOLOGY SKILLS OF PHYSICIANS ENTERING THE HEALTHCARE WORKFORCE |
LEVY |
2011 |
CARLTON CUNNINGHAM |
USING LEARNER-CONTROLLED EXTRINSIC MOTIVATORS TO INCREASE ACHIEVEMENT IN TECHNOLOGY-ENHANCED FLEXIBLE LEARNING ENVIRONMENTS |
WANG |
2011 |
KIMBERLEY DUNKERLEY |
DEVELOPING AN INFORMATION SYSTEMS SECURITY SUCCESS MODEL FOR ORGANIZATIONAL CONTEXT |
TEJAY |
2011 |
CRIS EWELL |
DETECTION OF DEVIATIONS FROM AUTHORIZED NETWORK ACTIVITY USING DYNAMIC BAYESIAN NETWORKS |
CANNADY |
2011 |
WEAM FARID |
THE NORMAP METHODOLOGY: NON-FUNCTIONAL REQUIREMENTS MODELING FOR AGILE PROCESSES |
MITROPOULOS |
2011 |
JEAN FRENCH |
AUTOMATIC VIDEO INDEXING: IDENTIFICATION OF AFFECTIVE CONTENT USING WELL-DEFINED EMOTIONAL CATEGORIES |
HAFNER |
2011 |
DEBORAH GEARS |
WIKI BEHAVIOR IN THE WORKPLACE: EMOTIONAL ASPECTS OF CONTENT |
ZINK |
2011 |
MARK GIVENS |
THE IMPACT OF NEW INFORMATION TECHNOLOGY ON BUREAUCRATIC ORGANIZATIONAL CULTURE |
ABRAMSON |
2011 |
IAN GREAVES |
AN INVESTIGATION OF ENTERPRISE RESOURCE PLANNING (ERP) AND SUPPORTING TECHNOLOGIES |
ACKERMAN |
2011 |
WILLIAM HEATON |
NEW RECORD ORDERING HEURISTICS FOR MULTIVARIATE MICROAGGREGATION |
MUKHERJEE |
2011 |
PETER HOLUB |
THE INFLUENCE OF NARRATIVE IN FOSTERING AFFECTIVE DEVELOPMENT OF MEDICAL PROFESSIONALISM IN AN ONLINE CLASS |
TERRELL |
2011 |
YA-CHEN KAO |
A STUDY OF TEACHER-STUDENT COLLABORATION ON COURSE DESIGN WITH TECHNOLOGY AT WENZAO URSULINE COLLEGE OF LANGUAGES IN TAIWAN |
WANG |
2011 |
ROBERT KEMERLING |
CONTROLLING WITH MODEL TREES |
MUKHERJEE |
2011 |
PETR KRAUS |
SCALABLE METHODOLOGY FOR PERFORMANCE-BASED SELECTION OF SECURITY SERVICES FOR DISTRIBUTED SYSTEMS |
SIMCO |
2011 |
ALLY LEE |
AN EMPIRICAL INVESTIGATION OF THE ROLE OF INFORMATION QUALITY IN CITIZENS’ TRUST IN E-GOVERNMENT SYSTEMS |
LEVY |
2011 |
DIETRICK LEWIS |
THE PRINCIPAL AS TECHNOLOGY INTEGRATION LEADER |
ABRAMSON |
2011 |
BERNARD LICHVAR |
AN EMPIRICAL INVESTIGATION OF THE EFFECT OF KNOWLEDGE SHARING AND ENCOURAGEMENT OF OTHERS IN PREDICTING COMPUTER SELF-EFFICACY AND USE OF IS IN THE WORKPLACE |
LEVY |
2011 |
WILLIAM LINDSEY |
THE RELATIONSHIP BETWEEN PERSONALITY TYPE AND SOFTWARE USABILITY USING THE MYERS-BRIGGS TYPE INDICATOR (MBTI) AND THE SOFTWARE USABILITY MEASUREMENT INVENTORY (SUMI) |
COHEN |
2011 |
ELIZABETH MADDREY |
THE EFFECT OF PROBLEM SOLVING INSTRUCTION ON THE PROGRAMMING SELF-EFFICACY OF INTRODUCTORY COMPUTER SCIENCE STUDENTS |
TERRELL |
2011 |
DUNG MAI |
A HEURISTIC FOR THE CONSTRAINED ONE-SIDED TWO-LAYERED CROSSING REDUCTION PROBLEM FOR DYNAMIC GRAPH LAYOUT |
LASZLO |
2011 |
GARY MANSI |
AN ASSESSMENT OF INSTANT MESSAGING INTERRUPTIONS ON KNOWLEDGE WORKERS’ TASK PERFORMANCE IN E-LEARNING-BASED TRAINING |
LEVY |
2011 |
ROBERT MASON |
INTEROPERABILITY GAP CHALLENGES FOR LEARNING OBJECT REPOSITORIES AND LEARNING MANAGEMENT SYSTEMS |
ELLIS |
2011 |
BARRY MCINTOSH |
AN ETHNOGRAPHIC INVESTIGATION OF THE ASSIMILATION OF NEW ORGANIZATIONAL MEMBERS INTO AN INFORMATION SECURITY CULTURE |
TEJAY |
2011 |
WAYNE MIER |
INVESTIGATING THE USE AND EFFECTIVENESS OF PRINCIPLES LEARNED IN AN ONLINE FACULTY-TRAINING PROGRAM |
TERRELL |
2011 |
MARIO MISSAKIAN |
ANALYTIC HIERARCHY PROCESS BASED RECOMMENDER SYSTEM FOR MODEL SELECTION. |
MUKHERJEE |
2011 |
BRUCE MONTGOMERY |
THE IMPACT OF THE USER INTERFACE ON SIMULATION USABILITY AND SOLUTION QUALITY |
COHEN |
2011 |
CONSTANCE MUSSA |
A PRUDENT ACCESS CONTROL BEHAVIORAL INTENTION MODEL FOR THE HEALTHCARE DOMAIN |
COHEN |
2011 |
ADAM NORTEN |
NURSES ACCEPTANCE OF RFID TECHNOLOGY IN A MANDATORY-USE ENVIRONMENT |
LITTMAN |
2011 |
CHARLES PAK |
NEAR REAL-TIME RISK ASSESSMENT USING HIDDEN MARKOV MODELS |
CANNADY |
2011 |
MARXAN PESCETTA |
TEACHING DIGITAL CITIZENSHIP IN A GLOBAL ACADEMY |
ABRAMSON |
2011 |
RENATA RAND MCFADDEN |
ASPECT MINING USING MODEL-BASED CLUSTERING |
MITROPOULOS |
2011 |
MARK SANBORN |
MICROCLIMATE HABITAT MONITORING: WIRELESS SENSOR NETWORKS |
LITTMAN |
2011 |
BABAK SHORAKA |
AN EMPIRICAL INVESTIGATION OF THE ECONOMIC VALUE OF INFORMATION SECURITY MANAGEMENT SYSTEM STANDARDS |
TEJAY |
2011 |
JESSICA SMITH |
COMPUTER MUSIC COMPOSITION USING CROWDSOURCING AND GENETIC ALGORITHMS |
COHEN |
2011 |
WILLIAM TRIBBEY |
CONSTRUCTION AND ANALYSIS OF VECTOR SPACE MODELS FOR USE IN ASPECT MINING |
MITROPOULOS |
2011 |
DENNIS VICKERS |
A DOMAIN AWARE GENETIC ALGORITHM FOR THE P-MEDIAN PROBLEM. |
MUKHERJEE |
2011 |
DONGQING YUAN |
DEVELOPING AND EVALUATING OPEN SOURCE NETWORK LABORATORY AND CURRICULUM |
WANG |
2011 |
MARY ANGELES |
USE OF DYNAMIC POOL SIZE TO REGULATE SELECTION PRESSURE IN COOPERATIVE COEVOLUTION ALGORITHMS |
LASZLO |
2010 |
JAMES BRADY |
AN INVESTIGATION OF FACTORS THAT AFFECT HIPPA SECURITY COMPLIANCE IN ACADEMIC MEDICAL CENTERS |
LITTMAN |
2010 |
MICHAEL BROWN |
A SPECIES-CONSERVING GENETIC ALGORITHM FOR MULTIMODAL OPTIMIZATION |
LASZLO |
2010 |
JESSIE BURNS |
AN INVESTIGATION OF MULTIPLE INTEGRATION TECHNIQUES FOR INFORMATION SYSTEMS: A MODEL FOR INTEGRATING DATA WAREHOUSING, ERP, AND SOA IN PRACTICE |
SCIGLIANO |
2010 |
CHUN-I CHEN |
FACTORS AFFECTING BUSINESS-TO-BUSINESS ELECTRONIC COMMERCE SUCCESS: AN EMPIRICAL INVESTIGATION |
NYSHADHAM |
2010 |
MARLON CLARKE |
THE ROLE OF SELF-EFFICACY IN COMPUTER SECURITY BEHAVIOR: DEVELOPING THE CONSTRUCT OF COMPUTER SECURITY SELF-EFFICACY (CSSE) |
LEVY |
2010 |
ERIC DITRICH |
AN EVOLUTIONARY METHOD FOR COMPLEMENTARY CELL SUPPRESSION. |
MUKHERJEE |
2010 |
NORAIDA DOMINGUEZ FLORES |
ONLINE LEARNING COMMUNITIES: ENHANCING THE ACQUISITION OF INFORMATION SKILLS BY UNDERGRADUATE STUDENTS OF THE UNIVERSITY OF PUERTO RICO AT CAROLINA |
WANG |
2010 |
CRYSTAL EDGE |
QUANTITATIVE ASSESSMENT OF THE MODULARIZATION OF SECURITY DESIGN PATTERNS WITH ASPECTS |
MITROPOULOS |
2010 |
MOHAMED ELHINDI |
DESIGN AND DEVELOPMENT OF AN IDENTITY MANAGEMENT SYSTEM: THE MINNESOTA STATE COLLEGE-SOUTHEAST TECHNICAL CASE STUDY |
LITTMAN |
2010 |
JASON FERGUSON |
AN EXAMINATION OF A VIRTUAL PRIVATE NETWORK IMPLEMENTATION TO SUPPORT A TELEWORKING INITIATIVE: THE MARCUS FOOD COMPANY INC. CASE STUDY |
LITTMAN |
2010 |
ALBERTO FERNANDEZ |
THE EFFECTS OF COURSECASTING IN INTERNATIONAL STUDENTS’ LANGUAGE COMPREHENSION, ACADEMIC PERFORMANCE AND OVERALL COURSE EXPERIENCE |
ELLIS |
2010 |
LORI GEIST |
THE DESIGN AND DEVELOPMENT OF COLLABORAT: A GROUPWARE SOLUTION FOR TEAMS SUPPORTING SCHOOL-AGE STUDENTS WHO USE ASSISTIVE TECHNOLOGY |
DRINGUS |
2010 |
GORDON GRANT |
ASCERTAINING THE RELATIONSHIP BETWEEN THE SECURITY AWARENESS AND THE SECURITY BEHAVIOR OF INDIVIDUALS |
HAFNER |
2010 |
GAIL HODGE |
A STUDY OF FIRST- AND CONTINUING-GENERATION COLLEGE STUDENTS’ USE OF INTERNET COMMUNICATION TECHNOLOGIES IN SOCIAL CAPITAL AND ITS CONTRIBUTION TO THEIR PERSISTENCE IN COLLEGE |
LEVY |
2010 |
SENG KENG |
COMPARING THE CULTURAL DIMENSIONS AND LEARNERS’ PERCEIVED EFFECTIVENESS OF ONLINE LEARNING SYSTEMS (OLS) AMONG AMERICAN AND MALAYSIAN LEARNERS |
LEVY |
2010 |
GARY KESSLER |
JUDGES AWARENESS, UNDERSTANDING, AND APPLICATION OF DIGITAL EVIDENCE |
LITTMAN |
2010 |
RAMESH KONDA |
PREDICTING MACHINING RATE IN NON-TRADITIONAL MACHINING USING DECISION TREE INDUCTIVE LEARNING |
MUKHERJEE |
2010 |
JANAKI KRISHNAMURTHY |
QUALITY MARKET: DESIGN AND FIELD STUDY OF PREDICTION MARKET FOR SOFTWARE QUALITY CONTROL |
NYSHADHAM |
2010 |
MICHAEL LEHRFELD |
PEER SELECTION ALGORITHM IN STOCHASTIC CONTENT DELIVERY NETWORKS TO PROVIDE AN OPTIMAL NODE-SERVER SET TO MINIMIZE FILE DOWNLOAD TIME |
SIMCO |
2010 |
KEITH LYONS |
AN ANALYSIS OF THE RADIO FREQUENCY IDENTIFICATION (RFID) TECHNOLOGY IMPLEMENTATION WITHIN AN INDEPENDENT PUBLIC LIBRARY SYSTEM: A CASE STUDY OF THE NORTH CANTON, OHIO PUBLIC LIBRARY |
ZINK |
2010 |
GENNADIY MAKOVOZ |
LATENT SEMANTIC ANALYSIS AS A METHOD OF CONTENT-BASED IMAGE RETRIEVAL IN MEDICAL APPLICATIONS |
MUKHERJEE |
2010 |
MICHAEL MCCABE |
EVALUATING THE FEASIBILITY OF BUILDING AUTOMATION TECHNOLOGY IN THE CONVENIENCE STORE INDUSTRY: A CASE STUDY |
ZINK |
2010 |
SHANNON MCMURTREY |
TRAINING AND OPTIMIZING DISTRIBUTED NEURAL NETWORKS USING A GENETIC ALGORITHM |
NYSHADHAM |
2010 |
LORI NICHOLSON |
A QUANTUM ALGORITHM ANIMATOR |
LASZLO |
2010 |
KRISHNAVENI PALANIAPPAN |
PREDICTING ESSENTIAL” GENES IN MICROBIAL GENOMES: A MACHINE LEARNING APPROACH TO KNOWLEDGE DISCOVERY IN MICROBIAL GENOMIC DATA |
MUKHERJEE |
2010 |
KAREN PATE |
AN EXPLORATORY STUDY ON THE PRACTICES APPLIED BY CORPORATIONS TO EVALUATE THE PERFORMANCE OF THEIR NON-TRANSACTIONAL BUSINESS-TO-CONSUMER WEB SITES |
ZINK |
2010 |
MICHAEL PELOSI |
RANGE LIMITED UAV TRAJECTORY USING TERRAIN MASKING UNDER RADAR DETECTION RISK |
MUKHERJEE |
2010 |
GREGORY REINERT |
EARLY DETECTION OF ONLINE AUCTION OPPORTUNISTIC SELLERS THROUGH THE USE OF NEGATIVE-POSITIVE FEEDBACK |
COHEN |
2010 |
MICHAEL SHARPE |
ASSISTIVE TECHNOLOGY ATTRITION: IDENTIFYING WHY TEACHERS ABANDON ASSISTIVE TECHNOLOGIES |
DRINGUS |
2010 |
DAVID SHULMAN |
INVESTIGATING WIKIS AS AGENTS FOR VIRTUAL TEAM ACTIVITY AWARENESS |
DRINGUS |
2010 |
JANICE SWIATEK-KELLEY |
PHYSICIANS’ PERCEPTIONS OF ELECTRONIC INFORMATION RESOURCES |
ZINK |
2010 |
JAMES TEMPLETON |
TRUST AND TRUSTWORTHINESS: A FRAMEWORK FOR SUCCESSFUL DESIGN OF TELEMEDICINE |
COHEN |
2010 |
DANIEL THOMBS |
DETERMINING THE VALUE OF HANDWRITTEN COMMENTS WITHIN WORK ORDERS |
ELLIS |
2010 |
PING AN WANG |
THE EFFECT OF KNOWLEDGE OF ONLINE SECURITY RISKS ON CONSUMER DECISION MAKING IN B2C E-COMMERCE |
NYSHADHAM |
2010 |
AMANDA WYNN |
AN INVESTIGATION OF THE CONTRIBUTIONS OF GENDER, SHOPPING ORIENTATION, AND ONLINE EXPERIENCE TO CONSUMERS INTENTION TO ENGAGE IN APPAREL E-COMMERCE SHOPPING |
LEVY |
2010 |
DANIEL YAKIMCHUK |
A STUDY OF THE EFFICACY OF LITERACY-BASED ASSISTIVE TECHNOLOGY FOR UNDERGRADUATE SECOND LANGUAGE LEARNERS |
TERRELL |
2010 |
JOE ASHBY |
USING COLLABORATIVE TECHNOLOGIES IN REMOTE LAB DELIVERY SYSTEMS FOR TOPICS IN AUTOMATION |
ABRAMSON |
2009 |
VENKATESH BAGLODI |
DISAMBIGUATING PREPOSITION SENSES USING PREPOSITION SENSE GRAMMAR |
LASZLO |
2009 |
DIANNE BELL |
BRIDGING THE PROFICIENCY GAP: INFORMATION AND COMMUNICATION TECHNOLOGY LITERACY ASSESSMENT OF NONTRADITIONAL COLLEGE STUDENTS |
ZINK |
2009 |
SANDRA BLANKE |
A STUDY OF THE CONTRIBUTIONS OF ATTITUDE, COMPUTER SECURITY POLICY AWARENESS, AND COMPUTER SELF-EFFICACY TO THE EMPLOYEES COMPUTER ABUSE INTENTION IN BUSINESS ENVIRONMENTS |
LEVY |
2009 |
MICHAEL BRYANT |
A COMPARISON OF THE RULE AND CASE-BASED REASONING APPROACHES FOR THE AUTOMATION OF HELP-DESK OPERATIONS AT THE TIER-TWO LEVEL |
MUKHERJEE |
2009 |
SCOTT CARPENTER |
NEW METHODOLOGY FOR MEASURING INFORMATION, KNOWLEDGE, AND UNDERSTANDING VERSUS COMPLEXITY IN HIERARCHICAL DECISION SUPPORT MODELS |
HAFNER |
2009 |
YEN-TZU CHEN |
USING INSTRUCTIONAL SOFTWARE TO IMPROVE ORAL PERFORMANCE OF TAIWANESE SPEAKERS OF ENGLISH |
ABRAMSON |
2009 |
SAMUEL CONN |
A METHODOLOGY FOR DESIGN AND DEVELOPMENT OF AN ELECTRONIC LEARNING (E-LEARNING) NETWORK: THE REGIS UNIVERSITY SCHOOL FOR PROFESSIONAL STUDIES CASE STUDY |
LITTMAN |
2009 |
TRACEY COOLEY |
DESIGN, DEVELOPMENT, AND IMPLEMENTATION OF A WIRELESS LOCAL AREA NETWORK (WLAN): THE HARTFORD JOB CORPS ACADEMY (HJCA) CASE STUDY |
LITTMAN |
2009 |
BILL DAFNIS |
A MODEL FOR PLANNING THE INTEGRATION OF XML IN DISRUPTIVE ENVIRONMENTS: A CASE STUDY OF NEWSPAPER PRODUCTION AND DISTRIBUTION SYSTEMS |
LITTMAN |
2009 |
JULIUS DAVAULT |
RESOLVING QUASI-SYNONYM RELATIONSHIPS IN AUTOMATIC THESAURUS CONSTRUCTION USING FUZZY ROUGH SETS AND AN INVERSE TERM FREQUENCY SIMILARITY FUNCTION |
MUKHERJEE |
2009 |
BRENDA ELLIS |
THE HUMAN ANALYSIS ELEMENT OF INTRUSION DETECTION: A COGNITIVE TASK MODEL AND INTERFACE DESIGN AND IMPLICATIONS |
COHEN |
2009 |
BILQUIS FERDOUSI |
A STUDY OF FACTORS THAT AFFECT INSTRUCTORS’ INTENTION TO USE E-LEARNING SYSTEMS IN TWO-YEAR COLLEGES |
LEVY |
2009 |
ABBE FORMAN |
AN EXPLORATORY STUDY ON THE FACTORS ASSOCIATED WITH ETHICAL INTENTION OF DIGITAL PIRACY |
LEVY |
2009 |
PATRICIA FREDERICK |
USING DIGITAL GAME-BASED LEARNING TO DELIVER VOCABULARY INSTRUCTION TO DEVELOPMENTAL READING STUDENTS |
ABRAMSON |
2009 |
WILLIAM GARRABRANTS |
REDUCING COGNITIVE LOAD USING HYPERVARIATE DISPLAY |
COHEN |
2009 |
JEFFREY GRAHAM |
EFFECT OF ONTOLOGY HIERARCHY ON A CONCEPT VECTOR MACHINE’S ABILITY TO CLASSIFY WEB DOCUMENTS |
MUKHERJEE |
2009 |
FAITH HEIKKILA |
AN ANALYSIS OF THE IMPACT OF INFORMATION SECURITY POLICIES ON COMPUTER SECURITY BREACH INCIDENTS IN LAW FIRMS |
LITTMAN |
2009 |
SARA HEJAZI |
RESPONSIBILITY FACTORS OF REDUCING INEFFICIENCIES IN INFORMATION SYSTEM PROCESSES AND THEIR ROLE ON INTENTION TO ACQUIRE SIX SIGMA CERTIFICATION |
LEVY |
2009 |
TERRY HOUSE |
A MODEL AND INTELLIGENT SOFTWARE AGENT FOR THE SELECTION AND IMPLEMENTATION OF OPEN-SOURCE SOFTWARE IN HIGHER EDUCATION |
SCIGLIANO |
2009 |
CHARLES LEACH |
AN INVESTIGATION OF TRAINING IN CREATIVE PROBLEM SOLVING AND ITS RELATIONSHIP TO AFFECTIVE AND EFFECTIVE IDEA GENERATION OF ENTREPRENEURIAL LEARNERS |
SCIGLIANO |
2009 |
BRIAN LEIGHTY |
GRAMMAR INFERENCE FROM GEOSPATIAL DATA PATTERNS USING SPATIAL ASSOCIATION RULE MINING |
LASZLO |
2009 |
KUANYUH LIN |
MAINTAINING A NEWS PERSPECTIVE REMOTELY THROUGH ONLINE INFORMATION RETRIEVAL: TASK-BASED WEB EXPERIENCES OF FOREIGN NEWS CORRESPONDENTS |
ZINK |
2009 |
MAUREEN LLOYD-JAMES |
USING ONLINE TECHNOLOGIES TO DELIVER MANAGEMENT COURSES TO CRUISE SHIP PERSONNEL AT SEA |
ABRAMSON |
2009 |
SAYYED MAISIKELI |
ASPECT MINING USING SELF-ORGANIZING MAPS WITH DYNAMIC METRICS AS INPUT VECTORS |
MITROPOULOS |
2009 |
JOHN MEYER |
ADMINISTRATIVE SUPPORT FOR ONLINE TEACHING FACULTY |
ABRAMSON |
2009 |
ANTHONY MIDDLETON |
HIGH-PERFORMANCE_KNOWLEDGE-BASED_ENTITY_EXTRACTION |
MUKHERJEE |
2009 |
JOSE MOLINA GARCIA PLAZA |
APPLICATION OF DISCRETE COMPUTER SIMULATION MODELING TO EVALUATE BUSINESS CONTINUITY PLANS |
NYSHADHAM |
2009 |
MARCEL OBI |
DEVELOPMENT AND VALIDATION OF A SCALE FOR MEASURING E-GOVERNMENT USER SATISFACTION |
NYSHADHAM |
2009 |
BRANDI PORTER |
INFORMATION RETRIEVAL STRATEGIES OF MILLENNIAL UNDERGRADUATE STUDENTS IN WEB AND LIBRARY DATABASE SEARCHES |
ABRAMSON |
2009 |
MARIE PULLAN |
SUPPORT SERVICES FOR MILLENNIAL UNDERGRADUATES |
ABRAMSON |
2009 |
ANTONIO RINCON |
SECTION 508 ADHERENCE BY INDUSTRY PROFESSIONALS: IMPROVING UNIVERSAL DESIGN THROUGH TRAINING |
ABRAMSON |
2009 |
GRIER RIVERS |
INTERACTIVE WHITEBOARDS IN THIRD GRADE SCIENCE INSTRUCTION |
WANG |
2009 |
JOSEPH ROTH |
A MODEL FOR USING MANAGED SERVICES IN DESIGNING AND SUPPORTING A WIRELESS LOCAL AREA NETWORK AS A PART OF THE NAVY MARINE CORPS INTRANET |
SCIGLIANO |
2009 |
STEVEN SHERMAN |
A PROCESS-CENTRIC ONTOLOGY FOR REPRESENTING SOFTWARE DEVELOPMENT PROJECT KNOWLEDGE |
HAFNER |
2009 |
DAVID SMITH |
A FORMAL CONCEPT ANALYSIS APPROACH TO ASSOCIATION RULE MINING |
SUN |
2009 |
ROBERTA STEED |
CULTURAL COMPETENCY TRAINING IN SECOND LIFE FOR LOUISIANA OCCUPATIONAL THERAPISTS |
TERRELL |
2009 |
GAIL STERN |
COMPUTER ASSISTED PSYCHOMOTOR TRAINING IN A SPECIALIZED POPULATION |
ELLIS |
2009 |
NELSON STEWART |
REPUTATION IN ELECTRONIC MARKETS: AN EXPERIMENTAL STUDY |
NYSHADHAM |
2009 |
BRENDA STUTSKY |
EMPOWERMENT AND LEADERSHIP DEVELOPMENT IN AN ONLINE STORY-BASED LEARNING COMMUNITY |
ABRAMSON |
2009 |
WESSEL THOMAS |
PARALLEL MINING OF ASSOCIATION RULES USING A LATTICE BASED APPROACH |
SUN |
2009 |
PAUL TUTEN |
A MODEL FOR THE EVALUATION OF IS/IT INVESTMENTS |
SCIGLIANO |
2009 |
CHARLETTE WATKINS |
TAILORING SOFTWARE INPECTIONS FOR ASPECT-ORIENTED PROGRAMMING |
MITROPOULOS |
2009 |
MAVA WILSON |
TECHNOLOGY SUPPORT COMMUNITY FOR COLLEGE OFFICE SUPPORT STAFF |
ABRAMSON |
2009 |
STEVEN ZHOU |
A NOVEL APPROACH TO IRIS LOCALIZATION AND CODE MATCHING |
SUN |
2009 |
AJAY ARORA |
COMBINING PREPROCESSORS FOR IMPROVED SPAM FILTERING. |
MUKHERJEE |
2008 |
DIANE BALL |
AN EMPIRICAL INVESTIGATION OF THE CONTRIBUTION OF COMPUTER SELF-EFFICACY, COMPUTER ANXIETY, AND INSTRUCTORS’ EXPERIENCE WITH THE USE OF TECHNOLOGY TO THEIR INTENTION TO USE EMERGING EDUCATIONAL TECHNO |
LEVY |
2008 |
TODD BRETT |
AN EVENT MONITOR AND RESPONSE FRAMEWORK BASED ON THE WSLOGA ARCHITECTURE |
LASZLO |
2008 |
CAROLINE BUDWELL |
THE SLAI METHODOLOGY: A SYSTEMATIC ASPECT-ORIENTED IDENTIFICATION PROCESS FOR FUNCTIONAL AND NON-FUNCTIONAL REQUIREMENTS |
MITROPOULOS |
2008 |
ANN CARBONELL |
THE IMPACT OF INFORMATION TECHNOLOGY (IT) WORKFORCE COMPETENCY AND IT PROCESSES AND TECHNOLOGIES ON SERVICE EFFECTIVENESS: THE NATIONAL SYSTEMS FOR GEOSPATIAL-INTELLIGENCE CASE STUDY |
LITTMAN |
2008 |
NOOREDIN ETEZADY |
THE IMPACT OF ERP INVESTMENTS ON ORGANIZATIONAL PERFORMANCE |
ZINK |
2008 |
ALICEN FLOSI |
COURSE MANAGEMENT SOFTWARE: APPLYING THE TECHNOLOGY ACCEPTANCE MODEL TO STUDY USE BY POST-SECONDARY FACULTY |
COHEN |
2008 |
MARK HARDY |
A COMPARISON OF STUDENT LEARNING WITH SIMULATIONS AND TRADITIONAL LABORATORY EXERCISES IN SECONDARY ELECTRONICS INSTRUCTION |
TERRELL |
2008 |
ADAM HERRNECKAR |
A SOFTWARE ENGINEERING APPROACH TO ISSUES AND ECONOMICS OF NETWORK MANAGEMENT AUTOMATION FOR PROVIDING SELECTIVE OUTSOURCING IN MULTIPLE HETEROGENEOUS ENVIRONMENTS |
LITTMAN |
2008 |
OKEY IGBONAGWAM |
THE ROLE OF SECURITY CLEARANCE AND USERS’ INVOLVEMENT IN THE EFFICIENCY OF REQUIREMENTS-GATHERING PROCESS: AN INFORMATION-SYSTEMS CASE STUDY IN THE U.S. MILITARY |
LEVY |
2008 |
VICTOR JOHNSON |
ALGORITHMS FOR ADAPTIVE PALETTE CONSTRUCTION USING THE GRAPHICS PROCESSING UNIT |
LASZLO |
2008 |
KAREN KING |
COMPARISON OF SOCIAL PRESENCE IN VOICE-BASED AND TEXT-BASED ASYNCHRONOUS COMPUTER CONFERENCING |
ELLIS |
2008 |
HEIDI KRAMER |
MEASURING THE IMPACT OF E-TRAINING ON JOB PERFORMANCE |
ABRAMSON |
2008 |
JOE LOOK |
USE AND ANALYSIS OF EXPECTED SIMILARITY OF SEMANTIC WEB ONTOLOGICAL ANNOTATIONS |
SUN |
2008 |
DIANA LUCKEVICH |
COMPUTER ASSISTED INSTRUCTION FOR TEACHING VOCABULARY TO A CHILD WITH AUTISM |
ABRAMSON |
2008 |
MICHAEL MAKOVOZ |
UTILIZATION OF SEMANTIC LINKING AND VISUALIZATION TECHNIQUES TO FACILITATE KNOWLEDGE CREATION FROM TEXTUAL SOFTWARE ARTIFACTS |
MITROPOULOS |
2008 |
JON MCKAMEY |
SMART CLASSROOM TECHNOLOGY: INSTRUCTIONAL EFFECTIVENESS AND FACULTY AND STUDENT SATISFACTION |
ABRAMSON |
2008 |
RANDY MELTON |
MONITORING QOS IN WIRELESS AD HOC NETWORKS |
SIMCO |
2008 |
GEORGE MIKULSKI |
USE OF ABSTRACT CATEGORIES IN DATA CLUSTERING ALGORITHMS TO IMPROVE PATTERN MATCHING |
HAFNER |
2008 |
DONNA MYERS |
QUALITY MEASURES IN DISTANCE EDUCATION COURSES AT TROY UNIVERSITY’S |
ELLIS |
2008 |
DAVID MYLOTT |
AN INSTRUCTIONAL TECHNOLOGY GUIDE FOR CORPORATE INSTRUCTORS |
ABRAMSON |
2008 |
ANTHONY NICHOLS |
AN EMPIRICAL ASSESSMENT OF ATTITUDE TOWARD COMPUTERS, MOTIVATION, SATISFACTION, AND PREVIOUS ACADEMIC PERFORMANCE AND THEIR CONTRIBUTION TO PERSISTENCE OF COLLEGE STUDENT-ATHLETES ENROLLED IN E-LEARNI |
LEVY |
2008 |
KATHLEEN PITTMAN |
COMPARISON OF DATA MINING TECHNIQUES USED TO PREDICT STUDENT RETENTION |
MUKHERJEE |
2008 |
FRANKLYN PRESCOD |
AN INVESTIGATION OF TECHNOLOGY USE AND LEARNING STYLES AS PREDICTORS OF UNDERGRADUATE INFORMATION TECHNOLOGY MANAGEMENT STUDENTS’ ACADEMIC ACHIEVEMENT AT RYERSON UNIVERSITY |
TERRELL |
2008 |
JALAL RAISSI |
DYNAMIC SELECTION OF OPTIMAL CRYPTOGRAPHIC ALGORITHMS |
CANNADY |
2008 |
LYNETTE RALPH |
A KNOWLEDGE MANAGEMENT SOLUTION FOR REFERENCE SERVICES |
ELLIS |
2008 |
MICAL RAMIM |
AN EXAMINATION OF FACTORS ASSOCIATED WITH STUDENTS ETHICAL DECISION MAKING IN POST-SECONDARY E-LEARNING PROGRAMS |
LITTMAN |
2008 |
MICHAEL REID |
INTEGRATING TRUST AND COMPUTER SELF-EFFICACY INTO THE TECHNOLOGY ACCEPTANCE MODEL: THEIR IMPACT ON CUSTOMERS USE OF BANKING INFORMATION SYSTEMS IN JAMAICA |
LEVY |
2008 |
ROBERT ROBERTSON |
CRITICAL SUCCESS FACTORS FOR SMALL BUSINESS IN E-COMMERCE |
NYSHADHAM |
2008 |
GREGORY SAFKO |
A STUDY OF A MODIFIED AUDITORY COMPONENT IN A MULTIMODAL FEEDBACK STUDY INVOLVING OLDER DEAF COMPUTER USERS |
COHEN |
2008 |
JEFFREY SCHIFFEL |
A METHOD TO MANAGE AND MEASURE THE PROCESS IMPROVEMENT COST BENEFITS OF EXCHANGING TACIT AND EXPLICIT KNOWLEDGE AMONG KNOWLEDGE WORKERS |
ZINK |
2008 |
MAHMUD SHIHAB |
WEB 2.0 TOOLS IMPROVE TEACHING AND STUDENT COLLABORATION IN HIGH SCHOOL ENGLISH CLASSES |
ABRAMSON |
2008 |
HUMAIRA SIDDIQUI |
INVESTIGATION OF INTENTION TO USE E-COMMERCE IN THE ARAB COUNTRIES: A COMPARISON OF SELF-EFFICACY, USEFULNESS, CULTURE, GENDER, AND SOCIOECONOMIC STATUS IN SAUDI ARABIA AND UNITED ARAB EMIRATES |
LEVY |
2008 |
TERENCE SMITH |
AN INVESTIGATION INTO THE IMPACT OF INFORMATION TECHNOLOGY BANK EXAMINERS COMMUNITY KNOWLEDGE SHARING SESSIONS ON THEIR INDIVIDUAL PERFORMANCE |
ZINK |
2008 |
JESSICA STREET |
EXAMINING THE VALIDITY OF TESTING IN AN ONLINE LEARNING ENVIRONMENT |
TERRELL |
2008 |
LARRY WOOSTER |
TUTORIAL SUPPORT FOR TEACHING RECOGNITION OF TONALITY IN A SMALL PAROCHIAL SCHOOL |
TERRELL |
2008 |
TAMER ABOUALY |
DESIGN, DEVELOPMENT, AND IMPLEMENTATION OF A PUBLIC KEY CRYPTOSYSTEM FOR AUTOMATED TELLER MACHINES: THE TORONTO DOMINION BANK CASE STUDY |
LITTMAN |
2007 |
ERASMUS ADDAE |
TRAINING A GLOBALLY-DISPERSED TRAINER POPULATION THROUGH DESKTOP VIDEO-CONFERENCING |
ABRAMSON |
2007 |
MARTIN BAGAYA |
AN ANALYSIS OF IT/IS OFFSHORE OUTSOURCING: EDUCATOR PERSPECTIVES |
WANG |
2007 |
RAZ BEN-EZZER |
A FRAMEWORK FOR DISTANCE EDUCATION STRATEGIES IN DIGITAL MUSIC EDUCATION FOR ADULTS |
COHEN |
2007 |
RICK BLAZEK |
AUTHOR-STATEMENT CO-CITATION ANALYSIS APPLIED AS A RECOMMENDER SYSTEM TO SUPPORT NON-DOMAIN-EXPERT ACADEMIC RESEARCH |
HAFNER |
2007 |
DAWN BRONSTEIN |
THE EFFICACY OF A WEB SITE EVALUATION CHECKLIST AS A PEDAGOGICAL APPROACH FOR TEACHING STUDENTS TO CRITICALLY EVALUATE INTERNET CONTENT |
TERRELL |
2007 |
HERBERT BROWN |
EXAMINING STATISTICAL PROCESS CONTROL AS A METHOD OF RARE EVENT TEMPORAL DATA MINING. |
MUKHERJEE |
2007 |
KEVIN BRUNNER |
A CHILD-CENTRIC INTERFACE: GRAFFITI OR NOT GRAFFITI |
COHEN |
2007 |
TAHSIN CHOU |
STORAGE REDUCTION IN HIGH PERFORMANCE DISTRIBUTED DISK-BASED BACKUP IN STORAGE AREA NETWORK |
SUN |
2007 |
J. WILLIAM CUPP |
A FAST HEURISTIC TO ESTIMATE THE INHERENT DEGREE OF CLUSTERING IN DATA SETS |
LASZLO |
2007 |
DONNA EHRLICH |
ADAPTATION OF BUSINESS PROCESSES IN SMES: AN INTERPRETIVE STUDY |
NYSHADHAM |
2007 |
ELIZABETH FLANAGAN |
COMPUTER-BASED READING PROGRAM WITH AT-RISK PRE-KINDERGARTEN STUDENTS |
ABRAMSON |
2007 |
KATHERINE FLORI |
COMPUTING TECHNOLOGY IN AN INTERDISCIPLINARY THEATRE CURRICULUM FOR URBAN HIGH SCHOOL SENIORS |
ABRAMSON |
2007 |
ISAAC GABRIEL |
PERCEPTIONS OF ONLINE RISKS |
NYSHADHAM |
2007 |
MARLENE GROMAN |
A MODEL OF BEST PRACTICES FOR PROJECT MANAGEMENT STRATEGIES IN AN ADMINISTRATIVE COMPUTING SYSTEM IMPLEMENTATION IN HIGHER EDUCATION |
SCIGLIANO |
2007 |
ERANNA GURUVADOO |
M*CTREE: A MULTI-RESOLUTION INDEXING STRUCTURE FOR XML DATA |
SUN |
2007 |
JACOB HORNSBY |
AN EMPIRICAL INVESTIGATION OF THE EFFECTS OF DISCOUNTING ON PRIVACY RELATED DECISIONS. |
MUKHERJEE |
2007 |
TRUDY HOWLES |
A STUDY OF ATTRITION AND THE USE OF STUDENT LEARNING COMMUNITIES IN THE COMPUTER SCIENCE INTRODUCTORY PROGRAMMING SEQUENCE |
TERRELL |
2007 |
JULIA INNES |
SCHOLARLY COMMUNICATION IN THE FIELD OF ZOO RESEARCH |
ZINK |
2007 |
WILLY ISAAC |
PERFORMANCE MEASUREMENT FOR THE E-GOVERNMENT INITIATIVES |
NYSHADHAM |
2007 |
THOMAS JURY |
ELECTRONIC PERFORMANCE SUPPORT FOR E-LEARNING ANALYSIS AND DESIGN |
ABRAMSON |
2007 |
CHRISTINE KEUPER |
UNDERSTANDING THE FIGURATIVE LANGUAGE OF TROPES USING ONTOLOGICAL CATEGORIZATIONS IN NATURAL LANGUAGE PROCESSING |
LASZLO |
2007 |
TIEN-CHEN LEE |
USING WEB-BASED CALL TO IMPROVE ENGLISH LANGUAGE MASTERY AT REPUBLIC OF CHINA AIR FORCE ACADEMY |
ABRAMSON |
2007 |
ILENE LITZ |
STUDENT ADOPTION OF A COMPUTER-SUPPORTED COLLABORATIVE LEARNING (CSCL) MATHEMATICAL PROBLEM SOLVING ENVIRONMENT: THE CASE OF THE MATH FORUMS POW-WOW |
WANG |
2007 |
JASON LIVELY |
ASSESSING INDIVIDUAL CONTRIBUTION IN ONLINE COLLABORATIVE ACTIVITIES |
ELLIS |
2007 |
MICHAEL NEUBAUER |
A SYSTEMS ANALYSIS OF INFORMATION TECHNOLOGY IMPLEMENTED BY AN FBI FIELD OFFICE FOR CRISIS RESPONSE EVENTS: THE COLUMBIA FIELD OFFICE CASE STUDY |
LITTMAN |
2007 |
BERNARD NOBLE |
AN INVESTIGATION OF THE ATTITUDES, COSTS AND BENEFITS OF TELEWORK FOR INFORMATION SYSTEMS EMPLOYEES
|
SCIGLIANO |
2007 |
MARILYN OLANDER |
A STUDY OF INTERNET WEBLOGS AS A TOOL TO TEACH WRITING |
ABRAMSON |
2007 |
RONNIE PARK |
DEVELOPMENT AND TEST OF AN INSTRUMENT TO EVALUATE IS EFFECTIVENESS OF E-GOVERNMENT INITIATIVES |
NYSHADHAM |
2007 |
ANDREW POTTER |
AN INVESTIGATION OF INTERACTIONAL COHERENCE IN ASYNCHRONOUS LEARNING ENVIRONMENTS |
DRINGUS |
2007 |
LOREEN POWELL |
AN EXPERIMENTAL STUDY TO DETERMINE WHAT TYPE OF LEARNING OBJECT REPOSITORY INTERFACE IS THE MOST EFFECTIVE FOR A TARGETED GROUP OF PRIMARY EDUCATORS |
ELLIS |
2007 |
ANTHONY SLABICKI |
USING SIMULATORS TO GUIDE PRACTICE AND REINFORCE ONLINE LEARNING |
ABRAMSON |
2007 |
TERRY SMITH |
SENIORS GO ONLINE. AN ASSESSMENT OF THE VALUE OF USABILITY: IS IT PERCEIVED USEFULNESS OR PERCEIVED EASE OF USE? |
COHEN |
2007 |
MONICA UGBAJA |
PERCEPTUAL ORGANIZATION OF ECOMMERCE RISKS AMONG CONSUMERS: A CROSS-COUNTRY STUDY |
NYSHADHAM |
2007 |
GERALD WILLIAMS |
ANALYSIS OF SPECTRAL SELECTIVITY ON EDGE DETECTION ALGORITHMS FOR NON-INVASIVE IDENTIFICATION OF SKIN CANCER. |
MUKHERJEE |
2007 |
WILLIAM YATES |
ACADEMIC INTEGRITY IN THE INTERNET AGE |
ABRAMSON |
2007 |
JAMES BILITSKI |
EVOLUTIONARY ALGORITHM FOR GENERATION OF AIR PRESSURE AND LIP PRESSURE PARAMETERS FOR AUTOMATED PERFORMANCE OF BRASS INSTRUMENTS |
MUKHERJEE |
2006 |
CLAUDE COUNCIL |
AN INVESTIGATION OF A COBIT SYSTEMS SECURITY IT GOVERNANCE INITIATIVE IN HIGHER EDUCATION |
SCIGLIANO |
2006 |
THEON DANET |
A STUDY OF THE IMPACT OF USERS INVOLVEMENT, RESISTANCE AND COMPUTER SELF-EFFICACY ON THE SUCCESS OF A CENTRALIZED IDENTIFICATION SYSTEM IMPLEMENTATION.
|
LEVY |
2006 |
ROBERT ELLETT |
AN EVALUATION OF PROGRAM FOR COOPERATIVE CATALOGING (PCC) RECORDS USED IN NON-PCC LIBRARIES |
ZINK |
2006 |
MARGARITA ELORRIAGA |
COMPUTER USE BY LATINO MIGRANT FAMILIES: INCREASING K-2 CHILDRENS READING SKILLS THROUGH PARENT TRAINING |
ABRAMSON |
2006 |
SUSAN FEREBEE |
AN EXAMINATION OF THE RELATIONSHIP BETWEEN INVOLVEMENT LEVEL OF WEB SITE USERS AND WEB CREDIBILITY ASSESSMENT |
DRINGUS |
2006 |
JEFFREY FORREST |
INFORMATION POLICIES AND PRACTICES OF KNOWLEDGE MANAGEMENT (KM) AS RELATED TO THE DEVELOPMENT OF THE GLOBAL AVIATION INFORMATION NETWORK (GAIN) - AN APPLIED CASE STUDY |
ZINK |
2006 |
JOAN FRESE |
A FACULTY DEVELOPMENT HANDBOOK FOR QUALITY ONLINE INSTRUCTION |
ABRAMSON |
2006 |
MICHAEL FURICK |
USING NEURAL NETWORKS TO DEVELOP A NEW MODEL TO SCREEN APPLICANTS FOR APARTMENT RENTALS |
COHEN |
2006 |
GLYN GOWING |
EMERGENT BEHAVIOR IN AUTONOMOUS SOFTWARE AGENTS FOR INTRUSION DETECTION |
CANNADY |
2006 |
SHAWN HARRS |
STANDARDS DIRECTORY: AN ENGINEERING AND TECHNOLOGY STANDARDS DIGITAL LIBRARY AND INFORMATION RETRIEVAL SYSTEM FOR THE WALT DISNEY COMPANY |
ZINK |
2006 |
ELIZABETH HAWTHORNE |
CHIRO-INFORMATICS: TOWARDS A SEMANTIC WEB HEALTH RECORD AND ONTOLOGY FOR COORDINATION OF PATIENT INFORMATION BETWEEN CHIROPRACTIC AND ALLOPATHIC PHYSICIANS |
COHEN |
2006 |
IAN JOHNSON |
AN INVESTIGATION OF THE EFFECTS OF THE GEORGIA FRAMEWORK FOR INTEGRATION TECHNOLOGY (IN TECH) TRAINING PROGRAM ON TEACHERS’ COMPUTER SELF-EFFICACY AND COMPUTER UTILIZATION |
COHEN |
2006 |
JOANNE KUZMA |
PRIVACY POLICIES: A STUDY OF THEIR USE AMONG ONLINE CANADIAN PHARMACIES |
ZINK |
2006 |
DONNA LANE |
EVALUATING E-TEXTBOOKS IN A BUSINESS CURRICULUM |
WANG |
2006 |
CATHRINE LINNES |
APPLYING DECISION THEORY TO QUANTIFY THE COST OF NETWORK SECURITY RISK |
CANNADY |
2006 |
MIKE LITMAN |
A JAVA BASED API FOR THE IMPLEMENTATION AND MAINTENANCE OF DOMAIN SPECIFIC COLLABORATIVE VIRTUAL ENVIRONMENTS |
LASZLO |
2006 |
ARTHUR MCADAMS |
AN INVESTIGATION OF THE RELATIONSHIPS BETWEEN USERS AND PROVIDERS OF INFORMATION TECHNOLOGY SERVICES FOR IMPROVED IT EFFECTIVENESS |
SCIGLIANO |
2006 |
ANITA MCCARTHY |
KNOWLEDGE MANAGEMENT: EVALUATING STRATEGIES AND PROCESSES USED IN HIGHER EDUCATION |
ELLIS |
2006 |
PAUL NIELSEN |
A QUANTIATIVE ANALYSIS OF PERFORMANCE IN A MULTI-PROTOOCL AD HOC 802.11B-BASED WIRELESS LOCAL NETWORK |
LITTMAN |
2006 |
HAROLD PALMER |
A WEB-BASED DATA WAREHOUSE METHODOLOGY AND MODEL FOR STUDENT DATA IN HIGHER EDUCATION |
SCIGLIANO |
2006 |
JANE PERSCHBACH |
BLOGGING: AN INQUIRY INTO THE EFFICACY OF A WEB-BASED TECHNOLOGY FOR STUDENT REFLECTION IN COMMUNITY COLLEGE COMPUTER SCIENCE PROGRAMS |
ABRAMSON |
2006 |
PATRICIA PROFETA |
EFFECTIVENESS OF ASYNCHRONOUS REFERENCE SERVICES FOR DISTANCE LEARNING STUDENTS WITHIN FLORIDAS COMMUNITY COLLEGE SYSTEM |
ZINK |
2006 |
KRIANGSAK PUKAWAN |
THE ATTITUDES AND PREFERENCES OF INTERNET USERS IN THAILAND TOWARD ONLINE PRIVACY RIGHTS |
ZINK |
2006 |
DAVID REAVIS |
ELECTRONIC MAIL RETENTION POLICIES IN MID-SIZED MANUFACTURING COMPANIES IN THE UNITED STATES |
ZINK |
2006 |
MALIK SALEH |
THE CONSTRUCTION AND VALIDATION OF A RESOURCE COVER PAGE AS AN INSTRUMENT FOR CATALOGING INTERNET RESOURCES IN THE SEMANTIC WEB |
NYSHADHAM |
2006 |
HELEN SCHNEIDER |
A CASE STUDY OF INFORMATION ASSURANCE FIELD EXPERIENCE |
ABRAMSON |
2006 |
RONALD SHEHANE |
A FRAMEWORK FOR KNOWLEDGE-AWARE SERVICE-CONTRACT QUALITY-MANAGEMENT DECISION SUPPORT SYSTEMS |
MUKHERJEE |
2006 |
JAMES SINCLAIR |
ESTABLISHING A NEW PARADIGM IN ENGINEERING AND TECHNOLOGY EDUCATION: AN EXPERIMENTAL ANALYSIS OF MULTIPLE LEARNING METHODOLOGIES AND EXAMINATION OF COGNITIVE PROFILES OF CONTINUING EDUCATION STUDENTS |
COHEN |
2006 |
GLENN STOUT |
IMPROVING THE DECISION MAKING PROCESS FOR INFORMATION SECURITY THROUGH A PRE-IMPLEMENTATION IMPACT REVIEW OF SECURITY COUNTERMEASURES |
CANNADY |
2006 |
SAMIR TOUT |
PARALLEL HYBRID CLUSTERING USING GENETIC PROGRAMMING AND MULTI-OBJECTIVE FITNESS WITH DENSITY (PYRAMID)
|
SUN |
2006 |
KHOA TRAN |
AN IMPROVED MULTI-OBJECTIVE EVOLUTIONARY ALGORITHM WITH ADAPTABLE PARAMETERS. |
MUKHERJEE |
2006 |
ARISA UDE |
AN EMPIRICAL INVESTIGATION OF WORKFLOW MANAGEMENT SYSTEMS QUEUES |
NYSHADHAM |
2006 |
DEL WAKLEY |
WORKPLACE TECHNOLOGY COMPETENCIES FOR ASSOCIATE DEGREE MARKETING PROGRAMS |
ABRAMSON |
2006 |
QI WANG |
BLENDING ELECTRONIC AND CLASSROOM TEACHING TO SUPPORT DEAF AND HARD OF HEARING COLLEGE STUDENTS |
ABRAMSON |
2006 |
CHERYL WARD |
A STUDY OF E-LEARNING FOR ADVANCED LEARNERS IN MULTI-ABILITY CLASSROOMS |
ABRAMSON |
2006 |
CREED WHEELER |
IMPLEMENTATION OF THE PEOPLE CAPABILITY MATURITY MODEL ON TECHNICAL SUPPORT PERSONNEL IN VOLUSIA COUNTY SCHOOLS |
ABRAMSON |
2006 |
ANN WOLF |
USING TECHNOLOGY WITH LEARNING DISABLED READERS: A META-ANALYSIS |
ABRAMSON |
2006 |
SEONG YU |
PROACTIVE SOFTWARE REJUVENATION MODEL AUGMENTED WITH SOFTWARE REPLICATION FOR REJUVENATION TRANSPARENCY TO CLIENTS IN A SINGLE COMPUTER ENVIRONMENT |
SIMCO |
2006 |
FELIX AKINLADEJO |
COMPUTER -SUPPORTED REHABILITATIVE MANAGEMENT: A CASE STUDY OF USING VIRTUAL REALITY TECHNOLOGY IN AMBULATORY TRAINING FOR POST-ACUTE STROKE PATIENTS |
LASZLO |
2005 |
ANTONIO BIELLO |
A MODEL FOR DEVELOPING INTERACTIVE INSTRUCTIONAL MULTIMEDIA APPLICATIONS FOR ELECTRONIC MUSIC INSTRUCTORS |
ELLIS |
2005 |
GRANT BRAUGHT |
CO-EVOLUTIONARY DYNAMICS AND THE ORIGINS OF ADAPTIVE BEHAVIOR |
CANNADY |
2005 |
ANTOINETTE BRUCIATI |
DEVELOPMENT AND IMPLEMENTATION OF A PLAN FOR AN ONLINE EDUCATIONAL TECHNOLOGY PROGRAM LEADING TO CROSS ENDORSEMENT FOR CONNECTICUT EDUCATORS |
LITTMAN |
2005 |
DONNA CADY |
AN INVESTIGATION OF THE EFFECT OF THE INTERGRATION OF COMPUTING TECHNOLOGY IN THE SCIENCE CURRICULUM ON FEMALE STUDENTSSELF-EFFICACY BELIEFS TOWARD COMPUTING |
TERRELL |
2005 |
TRACY CHRISTOFERO |
INFORMATION PRIVACY AS REQUIRED BY THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA): AWARENESS AND BARRIERS TO COMPLIANCE AS EXPERIENCED BY SMALL HEALTH CARE PRACTITIONERS IN RURAL WEST VIRGINIA |
ZINK |
2005 |
BARBARA CIARAMITARO |
AN ANALYSIS OF THE IMPLEMENTATION OF AN ONLINE COLLABORATION SYSTEM TO SUPPORT LEGAL COMMUNITIES OF PRACTICE |
LITTMAN |
2005 |
DEBORAH COHEN |
A PROCESS SCRIPT FOR ONLINE RESOURCE SELECTION (ORSIDS): A DEVELOPMENTAL STUDY |
ELLIS |
2005 |
MARK COHEN |
AN EVALUATION OF THE CONSISTENCY OF JUDICIAL SENTENCING SYSTEMS THAT INCORPORATE SUBJECTIVE FACTORS |
MUKHERJEE |
2005 |
RALPH COVINO |
A SURVEY OF THE MASSACHUSETTS CITIES AND TOWNS TO EXAMINE INTERNET FILTERING POLICIES IN PUBLIC SCHOOLS AND LIBRARIES |
ZINK |
2005 |
RONALD CRITCHFIELD |
THE DEVELOPMENT OF AN INFORMATION LITERACY INDICATOR FOR INCOMING COLLEGE FRESHMEN |
ZINK |
2005 |
DORRELL CRITTENDEN |
A STUDY OF THE IMPACT OF PRICE ELASTICITY ON THE ADOPTION DECISION OF MINICOMPUTERS |
NYSHADHAM |
2005 |
NICHOLAS DITIRRO |
INTEGRATION ONLINE SOCIAL ENVIRONMENTS INTO COMMUNITY COLLEGE STUDENT ORGANIZATIONS |
ABRAMSON |
2005 |
JOYCE DORMAN |
AN INVESTIGATION OF LEARNERS ATTITUDES AND PREFERENCES THAT RELATE TO PARTICIPATION IN INTERNET-BASED INSTRUCTION AT COASTAL CAROLINA UNIVERSITY.
|
WANG |
2005 |
AZAD EJAZ |
USING BAYESIAN BELIEF NETWORK FOR GOING-CONCERN RISK EVALUATION |
MUKHERJEE |
2005 |
K ESTEP |
THE EFFECTS OF USING THE PRACTICAL EAR TRAINING TOOL (PET) PAIRED WITH MNEMONIC IMAGERY ON ENHANCING TRADITIONAL EAR TRAINING METHODS FOR UNDERGRADUATE MUSIC STUDENTS |
TERRELL |
2005 |
DANIEL FEALKO |
EVALUATING PARTICLE SWARM INTELLIGENCE TECHNIQUES FOR SOLVING UNIVERSITY EXAMINATION TIMETABLING PROBLEMS |
MUKHERJEE |
2005 |
HEATHER FIEDLER |
JOURNALISM AND MASS COMMUNICATION EDUCATION IN THE AGE OF TECHNOLOGY |
ABRAMSON |
2005 |
SAMUEL FONTES |
USING THE TECHNOLOGY ACCEPTANCE MODEL AND STRUCTURAL EQUATIONS MODELING TO INVESTIGATE GENDER DIFFERENCES IN THE USAGE OF WEBSITES
|
MUKHERJEE |
2005 |
LUIS GONZALEZ |
A SELF-ADAPTIVE NEGATIVE SELECTION APPROACH FOR ANOMALY DETECTION |
CANNADY |
2005 |
MARY GOSMAN |
A GENERIC COURSE MANAGEMENT SYSTEM (CMS)TUTORIAL FOR COLLEGE FACULTY |
ABRAMSON |
2005 |
JEFFREY GROOM |
MEDICAL DECISION MAKING UNDER STRESS-EVALUATING THE ROLE OF COMPUTERIZED MEDICAL SIMULATION INSTRUCTION |
ABRAMSON |
2005 |
FAYE INGLE |
A META-ANALYSIS OF WEB-BASED DISTANCE LEARNING ARTICLES WITH AN UPDATE ON COMPLETION RATES |
ABRAMSON |
2005 |
CHRISTOPHER JOHNSON |
ESTABLISHING AN ONLINE COMMUNITY OF PRACTICE FOR INSTRUCTORS OF ENGLISH AS A FOREIGN LANGUAGE |
DRINGUS |
2005 |
TODD JOHNSON |
APPLYING GENETIC ALGORITHMS IN THE IDENTIFICATION OF NOVEL BEHAVIOR PATTERNS IN NETWORK DATA STREAMS |
CANNADY |
2005 |
ROBERT JOYCE |
SUCCESSFUL IMPLEMENTATION OF DECISION SUPPORT SYSTEMS SUPPLY CHAIN MANAGEMENT WITHIN MANUFACTURING COMPANIES |
MUKHERJEE |
2005 |
ROBERT KAIDEN |
A STUDY OF MOTIVATION, ACHIEVEMENT, AND STUDY SKILLS IN AN ONLINE COMMUNITY COLLEGE COURSE IN BEGINNING ALGEBRA |
DRINGUS |
2005 |
JEFFREY KANE |
ENERGY MANAGEMENT AS APPLIED TO AN AD-HOC ROUTING PROTOCOL |
SIMCO |
2005 |
JANET KOURIK |
PERFORMANCE OF CLASSIFICATION TOOLS ON UNSTRUCTURED TEXT |
MUKHERJEE |
2005 |
MICHAEL KRAMER |
USING CONCEPT MAPS FOR KNOWLEDGE ACQUISITION IN SATELLITE DESIGN: TRANSLATING STATEMENT OF REQUIREMENTS ON ORBIT TO DESIGN REQUIREMENTS |
MUKHERJEE |
2005 |
LISA LANDGRAF |
A MODEL OF SUCCESSFUL SOFTWARE DEVELOPMENT PROCESSES IN HIGHER EDUCATION |
SCIGLIANO |
2005 |
JEFFREY LIVERMORE |
FACTORS THAT IMPACT IMPLEMENTING A LIGHT SOFTWARE DEVELOPMENT METHODOLOGY |
LITTMAN |
2005 |
JOHN MARA |
COMPUTERS AS UBIQUITIOUS TOOLS FOR TEACHERS AND LEARNERS:A CASE STUDY OF THE MAINE LAPTOP INITIATIVE |
ABRAMSON |
2005 |
RICHARD MARCOUX |
A PREDICTIVE MODEL TO TEST ICONS FOR A GLOBAL AUDIENCE |
DRINGUS |
2005 |
JOAN MCGRORY |
MODEL FOR PLANNING, DESIGNING AND IMPLEMENTING A WIRELESS LOCAL AREA NETWORK IN A UNIVERSITY CLASSROOM |
LITTMAN |
2005 |
DEREK MOHAMMED |
A COMPAPRATIVE STUDY OF UNSUPERVISED NEURAL NETWORKS IN DETECTING FINANCIAL MISSTATEMENTS |
MUKHERJEE |
2005 |
RICHARD PARROTT |
A STUDY OF THE RELATIONSHIPS BETWEEN END-USER INFORMATION SYSTEMS PROBLEMS AND HELPDESK CRITICAL SUCCESS FACTORS IN HIGHER EDUCATION |
SCIGLIANO |
2005 |
TONY READ |
EVALUATING STRATEGIC INFORMATION TECHNOLOGY INVESTMENTS IN THE BANKING INDUSTRY |
MUKHERJEE |
2005 |
TRACI REED |
USING ONLINE LEARNING ENVIRONMENTS TO ENHANCE THE ACQUISITION OF BASIC SKILLS AND IMPROVE RETENTION RATES OF ADULT EDUCATION STUDENTS |
ABRAMSON |
2005 |
KARL REIMERS |
IMPACT OF IT INDUSTRY CERTIFICATION ON THE ACHIEVEMENT OF HIGH SCHOOL STUDENTS ENROLLED IN TECHNOLOGY COURSES |
TERRELL |
2005 |
BRIAN SHEPPARD |
THE EFFECT OF INTERNET MONITORING SOFTWARE ON THE NON-EDUCATIONAL RELATED WEB USAGE OF ADULT STUDENTS SEEKING COMPUTER CERTIFICATION |
COHEN |
2005 |
MIRI SHONFELD |
THE IMPACT OF AN ONLINE CONFERENCE IN EDUCATION: A CASE STUDY |
ABRAMSON |
2005 |
SHARON SHUEY |
DEVELOPMENT AND IMPLEMENTATION OF A PROBLEM-BASED LEARNING MODEL IN A FINANCE COURSE: A CASE STUDY |
ABRAMSON |
2005 |
CHAD SMITH |
A DESCRIPTIVE STUDY OF THE INTERNET SEARCH BEHAVIORS EMPLOYED BY DEAF ADOLESCENTS COMPLETING FACT-BASED RESEARCH TASKS |
DRINGUS |
2005 |
BRANDON SPENCER |
THE EFFECTS OF COMPUTERIZED SMELL ON MEMORY |
COHEN |
2005 |
SHERRY STRUM |
A COGNITIVE STUDY ON THE USE OF THE INTERNET BY MINORITY SMALL
BUSINESS OWNERS FOR INFORMATION RESEARCH AND THE DESIGN AND DEVELOPMENT OF A SMALL BUSINESS INFORMATION PORTAL |
ZINK |
2005 |
RICHARD TABU |
DEVELOPMENT OF TELECOMMUNICATIONS IN THE DEMOCRATIC REPUBLIC OF THE CONGO (DRC) |
ZINK |
2005 |
JEFF TEO |
A MODEL OF TRUSTED COMPUTING ACCEPTANCE IN HIGHER EDUCATION |
SCIGLIANO |
2005 |
NANCY THIBEAULT |
SINCLAIR CURRICULUM EXCHANGE: SHARING LEARNING RESOURCES TO IMPROVE PART-TIME INSTRUCTION |
ABRAMSON |
2005 |
GEORGE THURMOND |
SECURING STATE LEVEL DIGITAL GOVERNMENT PUBLIC KEY INFRASTRUCTURE: A SURVEY OF SECURITY REQUIREMENTS FOR THE EVOLVING STATE-LEVEL DIGITAL GOVERNMENT. |
MANNING |
2005 |
ROBERT VERMILYER |
KNOWLEDGE DISCOVERY IN CONTENT-BASED IMAGE RETRIEVAL ST
SYSTEMS |
LASZLO |
2005 |
DAVID VOORHEES |
PREDICTING SOFTWARE SIZE AND DEVELOPMENT EFFORT: MODELS BASED ON STEPWISE REFINEMENT |
MITROPOULOS |
2005 |
BERTHAMAE WALKER |
AN INVESTIGATION OF THE FEASIBILITY OF USING WEB-CENTRIC METHODS VERSUS TRADITIONAL FACE-TO-FACE METHODS IN DELIVERING A COURSE IN BIBLIOGRAPHIC INSTRUCTION |
SCIGLIANO |
2005 |
RICHARD YUN WANG |
A NEW STATISTICAL APPROACH FOR ANOMALY INTRUSION DETECTION BASED ON SHORT-TERM PROFILE DATA |
CANNADY |
2005 |
SHARON WHEELER |
SOFTWARE ENGINEERS: LICENSE, CERTIFY OR CLASSIFY? MODELING PRACTIONERS THROUGH SPECS(SOFTWARE PRACTIONER EXPERT CLASSIFICATION SYSTEM) |
LEITNER |
2005 |
MARCIE ZAHAREE |
A SUGGESTED E-BUSINESSPROCESS MODEL TO APPLY KNOWLEDGE MANAGEMENT TO SOLVE TRAINING PROBLEMS OF NEW EMPLOYEES |
ELLIS |
2005 |
STEVEN ZALE |
TEACHING DATA STRUCTURES USING A PROGRAMMING BY EXAMPLE SYSTEM: EFFECTS ON STUDENT ACHIEVEMENT AND COGNITIVE LOAD |
COHEN |
2005 |
DANIEL BAER |
AN ASSESSMENT OF THE PORTFOLIO-BASED TECHNOLOGY REQUIREMENT FOR PRESERVICE TEACHERS IN NORTH CAROLINA |
COHEN |
2004 |
EDUARDO BAUTISTA |
A FRONT-LOADED AGILE SOFTWARE PROCESS FOR WEB APPLICATIONS |
LASZLO |
2004 |
SHANNON BOESCH |
AUTOMATING THE SPECIFICATION, VALIDATION, AND APPLICATION OF EXPERT SYSTEMS IN A HYBRID EXPERT ENVIRONMENT |
CANNADY |
2004 |
WAYNE BROWN |
A STUDY OF CHIEF INFORMATION OFFICERS EFFICTIVENESS IN HIGHER EDUCATION |
ABRAMSON |
2004 |
WILLIAM BROWN |
CREDIBLE WEBCASTS FOR FINANCIAL COMMUNICATIONS |
COHEN |
2004 |
BARBARA BURCKART |
USING AUTONOMOUS ROBOTS TO INTEGRATE MIDDLE SCHOOL ACADEMIC STANDARDS WITH TECHNOLOGY STANDARDS AND 21ST CENTURY WORKPLACE SKILLS
. |
ABRAMSON |
2004 |
JAMES COLLINS |
MEASURING CREDIBILITY ASSESSMENT TARGETS IN WEB-BASED INFORMATION |
COHEN |
2004 |
CARL DEPASQUALE |
A METHOD TO MODEL THE BEHAVIOR OF JAVA CLASSES DURING DEVELOPMENT |
LEITNER |
2004 |
TAMMY ENGELMAN |
A COMPARATIVE ANALYSIS OF DDS AND HUMANS ON MAKING LOAN DECISIONS |
LASZLO |
2004 |
EILEEN EUDY |
A USE-CASE MODEL FOR A KNOWLEDGE MANAGEMENT SYSTEM TO FACILITATE DISASTER RELIEF OPERATIONS |
MUKHERJEE |
2004 |
MARGO FITZPATRICK |
EVALUATING BAYESIAN CLASSIFIERS AND ROUGH SETS FOR CORPORATE BANKRUPTCY PREDICTION |
MUKHERJEE |
2004 |
DONALD FRAZIER |
A SIMULATION MODEL OF LARGE SCALE SOFTWARE REUSE IMPLEMENTATIONS: A SYSTEMS DYNAMICS APPROACH |
MUKHERJEE |
2004 |
ALBERT FUNDABURK |
THE EDUCATION OF INFORMATION SECURITY PROFESSIONALS: AN ANALYSIS OF INDUSTRY NEEDS VS. ACADEMIC CURRICULUM IN THE 21ST CENTURY |
CANNADY |
2004 |
DAVID GARDNER |
METHOD AND APPARATUS FOR ENHANCED E-MAIL FILTERING AND ROUTING EMPLOYING DIRECTORY-BASED INFORMATION AND POLICIES |
LITTMAN |
2004 |
ROSEMARY HAYES |
A MULTI-CRITERIA DECISION ANALYSIS FRAMEWORK FOR SELECTING SUITABLE LEARNING MANAGEMENT SYSTEMS |
DRINGUS |
2004 |
SHERMAN HOU |
DEVELOPING A CULTURAL PORTAL TO ENHANCE THE FOREIGN LANGUAGE CURRICULUM |
ELLIS |
2004 |
BARBARA KING |
A SOFTWARE DEVELOPMENT LIFE CYCLE MODEL FOR WEB-BASED APPLICATION DEVELOPMENT |
LEITNER |
2004 |
ELAINE LAWRENCE |
TECHNOLOGY INTEGRATION AND PRE-SERVICE TEACHER TRAINING: THE EFFECTIVENESS OF EMBEDDING TECHNOLOGY USE IN THREE PRE-METHODS COURSES |
TERRELL |
2004 |
JEFFREY LEHMAN |
AN EXTENSIBLE MARKUP LANGUAGE (XML) APPLICATION FOR THE UNIVERSITY COURSE TIMETABLING PROBLEM |
LASZLO |
2004 |
EDWARD LOVITT |
IMPLEMENTATION OF AN INDIVIDUAL PROFESSIONAL DEVELOPMENT SYSTEM USING A WEB-ACESSIBLE DATABASE |
ELLIS |
2004 |
NICKOLAS MACCHIARELLA |
EFFECTIVENESS OF VIDEO-BASED AUGMENTED REALITY AS A LEARNING PARADIGM FOR TRAINING AEROSPACE MAINTENANCE TASKS |
COHEN |
2004 |
MOHAMED MANSOUR |
DETERMINING THE EFFECTIVENESS OF COLLEGE STUDENTS IN SEARCHING THE INTERNET |
RIGGS |
2004 |
MICHAEL MCCARTHY |
AN ARCHITECTURE FOR IMPLEMENTING FINE-GRAINED XML DOCUMENT SECURITY USING WEB SERVICES |
CANNADY |
2004 |
THERESA MCDONALD |
THE EFFECTS OF INSTANT MESSAGING ON PERFORMANCE AND COMMUNICATION APPREHENSION IN A BUSINESS COMPUTER APPLICATION CLASS |
TERRELL |
2004 |
BETH MURRAY |
THE DESIGN AND IMPLEMENTATION OF A KNOWLEDGE MANAGEMENT SYSTEM IN THE SBC DATACOMM CUSTOMER SUPPORT CENTER |
LITTMAN |
2004 |
KAREN NARD |
IMPROVING INFORMATION SYSTEMS SECURITY THROUGH MANAGEMENT PRACTICES: A NON-TECHNICAL APPROACH |
CANNADY |
2004 |
LISA OLIVIERI |
THE EFFECT OF THE HIGH SCHOOL ENVIRONMENT ON ENCOURAGING GIRLS TO MAJOR IN COMPUTER SCIENCE |
COHEN |
2004 |
EDWARD PALMER |
WEBSITES OF LARGE NONPROFIT ORGANIZATIONS
|
LITTMAN |
2004 |
JAMES RANSOME |
WIRELESS INTEGRATED SECURE DATA OPTIONS MODEL FOR CONVERGED NETWORK SECURITY |
CANNADY |
2004 |
PAMELA RAWLS |
SCHOOL-BASED SUPPORT FOR ELEMENTARY SCHOOL TEACHING WITH TECHNOLOGY |
ABRAMSON |
2004 |
ADAM RAZAVIAN |
COGNATIVE BASED ADAPTIVE PATH PLANNING FOR AUTONOMOUS ROBOTIC VEHICLES |
SUN |
2004 |
BELARMINA RICHARDS |
HUMAN-AGENT INTERACTION AND WEB-BASED SYSTEMS: A STUDY OF USER PERFORMANCE AND SOFWARE AGENT LEARNING |
COHEN |
2004 |
KATHLEEN ROBERTS |
INFUSING ONLINE COMPONENTS INTO THE ACADEMIC COURSEWORK OFCOMPREHENSIVE HIGHSCHOOLS IN THE STATE OF NEW YORK USING HSTOR-E |
ABRAMSON |
2004 |
ELLEN SCALESE |
A MODEL TO INCREASE PERSISTENCE IN POST-SECONDARY ONLINE EDUCATION |
ABRAMSON |
2004 |
LAWRENCE SHAFER |
DATA DRIVEN CALCULATION HISTORIES TO MINIMIZE IEEE-754 FLOATING-POINT COMPUTATIONAL ERROR |
LASZLO |
2004 |
ROBERT STEPHENS |
A FRAMEWORK FOR THE IDENTIFICATION OF ELECTRONIC COMMERCE DESIGN ELEMENTS THAT ENABLE TRUST WITHIN THE SMALL HOTEL INDUSTRY |
COHEN |
2004 |
EDIT SZANTO |
DEVELOPMENT OF A COPYRIGHT AND INTELLECTUAL PROPERTY POLICY AND ONLINE TRAINING FOR A COMMUNITY COLLEGE |
ABRAMSON |
2004 |
UTAKO TANIGAWA |
A STUDY OF THE PROCESSES OF WHICH ENTERPRISE ARCHITECTURE DECISIONS ARE MADE |
NYSHADHAM |
2004 |
EDDIE WACHTER |
A STUDY OF THE USE OF FORENSIC MULTIMEDIA IN THE COURTROOM |
DRINGUS |
2004 |
CAROL WOODY |
APPLYING SECURITY RISK MANAGEMENT TO INTERNET CONNECTIVITY IN K-12 SCHOOLS |
LITTMAN |
2004 |
VALERIE AKUNA |
FACULTY PERCEPTIONS OF INSTRUCTIONAL MANAGEMENT SYSTEMS IN WEB-BASED TEACHING AND LEARNING |
LITTMAN |
2003 |
KEVIN ANDREYO |
INTEGRATING MULTIMEDIA AUTHORING INTO THE MIDDLE SCHOOL CURRICULUM |
ABRAMSON |
2003 |
JEFFREY APPEL |
ACCOMMODATING WORKPLACE NEEDS WITH AN ON-LINE SOFTWARE ENGINEERING TUTORIAL
|
ABRAMSON |
2003 |
LISA BAIN |
USER-INTERFACE DESIGN IN ONLINE SHOPPING ENVIRONMENTS: THE DEVELOPMENT OF A PRODUCT INTERACTION MODEL (PIM) FROM INTERACTIVE DESIGN ELEMENTS |
COHEN |
2003 |
RONALD BOOTH |
AN INFORMATION SYSTEMS PROJECT DELIVERY METHODOLOGY FOR IMPLEMENTING WEB-BASED PROGRAM MANAGEMENT SYSTEMS |
SCIGLIANO |
2003 |
DONNA CACCIOPPO |
THE MEASUREMENT OF ENVIRONMENTAL FACTORS DURING FUNCITON POINT CALCULATIONS |
LEITNER |
2003 |
JOHN CANE |
ASSESSMENT OF WEB APPLICATION TECHNOLOGY |
LEITNER |
2003 |
STEVEN CASE |
PERFORMANCE MODELING OF ASYNCHRONOUS REAL-TIME COMMUNICATION WITHIN BLUETOOTH NETWORKS |
SIMCO |
2003 |
RAYLENE COCHRAN |
USING E-BOOK READERS TO ASSIST ESL STUDENTS IN DEVELOPING THEIR ACADEMIC LANGUAGE SKILLS |
ELLIS |
2003 |
MEGAN CONKLIN |
DISCOVERING INTERESTING RULES USING A PARALLEL, MULTI-CRITERIA KNOWLEDGE DISCOVERY SYSTEM |
SUN |
2003 |
JEAN COPPOLA |
THE MODEL E-CLASSROOM FOR HIGHER EDUCATION: A CASE STUDY |
LITTMAN |
2003 |
D BRUCE CURRY |
DEVELOPING A WIDER VIEW OF EDUCATIONAL TECHNOLOGY THROUGH UBIQUITOUS COMPUTING: A QUALITATIVE CASE STUDY |
ABRAMSON |
2003 |
BONITA GACNIK |
THE DESIGN OF AN ONLINE OBLATE PROGRAM: BENEDICTINE SPIRITUALITY FOR THE LAITY |
ABRAMSON |
2003 |
ELLEN GLAZER |
A CASE STUDY: A DISTANCE EDUCATION PROFESSIONAL PILOT TECHNOLOGY ASSOCIATE OF SCIENCE DEGREE PROGRAM |
LITTMAN |
2003 |
JUDITH HORVATH |
A MULTIPLE ONLINE LEARNING PLATFORM STUDY OF THE IMPACT OF LEARNING STYLE ON ACADEMIC PERFORMANCE |
COHEN |
2003 |
STEPHEN HUBER |
AN INVESTIGATION OF THE RELATIONSHIPS BETWEEN WORKFLOW AND THE IMPLEMENTATION OF OBJECT-ORIENTED METHODS |
SCIGLIANO |
2003 |
FREDERICK HUNDLEY |
COLLABORATIVE LEARNING AND WIRELES LOCAL AREA NETWORKS |
ELLIS |
2003 |
RANDY JUSTICE |
INFERENTIAL DISCLOSURE LIMITATION IN MULTIVARIATE CATEGORICAL DATABASES |
MUKHERJEE |
2003 |
CHRISTINA LAIACONA |
IMPLICATIONS OF THE 21 CFR PART II-COMPUTER VALIDATIONS AND COTS SYSTEM TESTING |
ZINK |
2003 |
JOHN LOMBARDI |
SECURING WEB BASED TRANSACTION SERVICES |
CANNADY |
2003 |
GLORIA MACCORKINDALE |
THE ADAPTATION AND IMPLEMENTATION OF ISTE STANDARDS IN THE INTEGRATION OF TECHNOLOGY-BASED LEARNING IN THE CLASSROOM |
ELLIS |
2003 |
FRANCISCO MITROPOULOS |
EXTRACTION AND REPRESENTATION OF OBJECT ORIENTED SOFTWARE METRICS FROM BINARY PROGRAMS |
SIMCO |
2003 |
PATRICIA MORGENSTERN |
IMPLEMENTATION OF A WIRELESS LAN IN A UNIVERSITY ENVIRONMENT: THE WESTERN MICHIGAN UNIVERSITY HAWORTH COLLEGE OF BUSINESS CASE STUDY |
LITTMAN |
2003 |
HERBERT MUSE |
A RETENTION ISSUE - PREDICTING THE AT-RISK STUDENT IN COMMUNITY COLLEGE WEB-BASED CLASSES |
DRINGUS |
2003 |
EJIKE OKONKWO |
AN INVESTIGATION OF THE SKILL SETS NEEDED BY INFORMATION SYSTEMS MANAGERS TO COPE EFFECTIVELY WITH THE TRANSITION FROM LEGACY SYSTEMS TO CLIENT/SERVER AND INTERNET ENVIRONMENTS |
SCIGLIANO |
2003 |
CHAELYNNE POPE |
A MODEL FOR THE IMPLEMENTATION OF A BLOG IN A MANUFACTURING ENVIRONMENT |
LITTMAN |
2003 |
PETER RAETH |
FINDING UNEXPECTIED EVENTS IN STARING CONTINUOUS-DWELL SENSOR DATA STREAMS VIA ADAPTIVE PREDICTION |
CANNADY |
2003 |
JOSEPH RAMSEY |
AN INTEGRATED SECURED OPEN-SOURCE MEDICAL PROTOTYPE FOR COLLABORATIVE PATIENT MANAGEMENT ON THE INTERNET |
SCIGLIANO |
2003 |
MITCH RATON |
A COMPARATIVE ANALYSIS OF DESIGN TECHNIQUES FOR THE CONSTRUCTION OF A EXPERT SYSTEM FOR AIRCRAFT ENGINE DIAGNOSTICS |
SIMCO |
2003 |
EVERETT RYAN |
A MODEL FOR STRATEGIC PLANNING AND ADMINISTRING AN ASYNCHRONOUS LEARNING NETWORK AND SCORM WITHIN THE HIGHER EDUCATIN USING THE UML |
SCIGLIANO |
2003 |
JERRY SMITH |
INVESTIGATING THE ROLE OF SEXUAL REPRODUCTION IN DIPLOIDY AGE-STRUCTURED EVOLUTIONARY POPULATIONS |
SIMCO |
2003 |
MARIA TORAL |
A COMPARATIVE STUDY OF HISPANIC STUDENTS ACHIEVEMENT IN TRADITIONAL IN-CLASS COURSES AND INTERNET-BASED COURSES |
TERRELL |
2003 |
GARY WANE |
WEB SERVICES BASED AGENTS FOR SUPPLY CHAIN COLLABORATIVE CONTRACT INITIATION |
MUKHERJEE |
2003 |
MEGHAN WILLIAMS |
A TAXONOMY OF MEDIA USAGE IN MULTIMEDIA (T-MUM) |
COHEN |
2003 |
RONALD WOLAK |
WIRELESS LAN TECHNOLOGIES: A MODEL FOR PLANNING, DESIGNING, AND IMPLEMENTING A WLAN SOLUTION IN A GLOBAL MANUFACTURING ENTERPRISE |
LITTMAN |
2003 |
ILYA YAKOVLEV |
A MODEL OF CRITICAL SUCCESS FACTORS FOR IMPLEMENTING ENTERPRISE RESOURCE PLANNING PACKAGES IN HIGHER EDUCATION |
SCIGLIANO |
2003 |
MUNTUCK YAP |
AN INVESTIGATION OF A DISTRIBUTED SEARCH MECHANISM CONSISTING OF A SET OF COOPERATIVE AGENTS IMPLEMENTED WITH DIFFERENT HEURISTICS SCHEMES |
LEITNER |
2003 |
BEVERLY ALCOTT |
A COMPARATIVE STUDY OF ACHIEVEMENT OF STUDENTS IN A DISTANCE LEARNING SECOND LANGUAGE CLASS AND IN A TRADITIONAL CLASSROOM SECOND LANGUAGE CLASS |
TERRELL |
2002 |
MERLE BASS |
AN INFORMATION TECHNOLOGY PARADIGM FOR A LOCAL POLICE DEPARTMENT |
LITTMAN |
2002 |
DENNIS BAUER |
AN EVOLUTION STRATEGY FOR THE OPTIMIZATION OF NETWORK TRAFFIC TO DETECT ANOMALOUS BEHAVIOR |
CANNADY |
2002 |
BRYCE BERNARD |
THE EFFECT OF COMPUTER – BASED ACCOUNTING PRACTICE SETS ON THE ACHIEVEMENT OF INTRODUCTORY COLLEGE ACCOUNTING STUDENTS |
TERRELL |
2002 |
EUGENE BINGUE |
THE DEVELOPMENT OF RELIABLE METRICS TO MEASURE THE EFFICIENCY OF OBJECT– ORIENTED DISPATCHING USING ADA 95 A HIGH– LEVEL LANGUAGE IMPLEMENTING HARD-DEADLINE REAL-TIME PROGRAMMING |
LASZLO |
2002 |
CESAR CASAS |
APPLICATION OF ARTIFICIAL NEURAL NETWORKS TO THE TACTICAL ASSET ALLOCATION MODEL |
MUKHERJEE |
2002 |
GALEN COLLINS |
THE VIABILITY OF A SATELLITE - AND WEB-BASED LEARNING SYSTEM FOR THE HOSPITALITY INDUSTRY: A CASE STUDY |
LITTMAN |
2002 |
ALFREDO CRUZ |
EVOLUTIONARY ALGORITHMS FOR VLSI TEST AUTOMATION |
MUKHERJEE |
2002 |
CAROL CUSANO |
VISUALLY SEARCHING THE WEB FOR CONTENT: A USABILITY EVALUATION OF TWO SEACH INTERFACES |
DRINGUS |
2002 |
WALTER DIXON |
THE GEOMETRIC MEAN AS A GENERATOR OF TRUTH-VALUE IN HEURISTIC EXPERT SYSTEMS: AN IMPROVEMENT OVER THE FUZZY WEIGTED ARITHMETIC MEAN |
CANNADY |
2002 |
JAMES DOLLENS |
INTRUSION DETECTION VIA COMPUTER SYSTEM DNA |
SIMCO |
2002 |
FARIDEH GOZLEVELI |
AN INVESTIGATION OF PROJECT DEPENDENCIES AND RISKS IN PROJECT SCHEDULE SLIPPAGE AND EFFORT OVERRUN IN THE ENGINEERING COMPUTING ORGANIZATION |
SCIGLIANO |
2002 |
ANN GREER |
A MODEL FOR THE DELIVERY AND EVALUATION OF ASYNCHRONOUS AND INTERACTIVE SYNCHRONOUS LIBRARY SERVICES AT SOUTHERN ADVENTIST UNIVERSITY |
ZINK |
2002 |
HENRY GUILD |
PARTICIPANTS IN A DISCUSSION FORUM USE STORYTELLING TO CREATE FLEXIBLE MEANS OF COMMUNICATION |
LEITNER |
2002 |
JOSEPH GULLA |
DESIGN AND IMPLEMENTATION OF A PROTOTYPE TOOLSET FOR FULL LIFE CYCLE MANAGEMENT OF WEB-BASED APPLICATIONS |
SCIGLIANO |
2002 |
ERNEST HAMPSON |
HIGH SPEED ROUTING TABLE LOOKUPS FOR CURRENT AND NEXT GENERATION INTERNET ROUTING |
SIMCO |
2002 |
HAROLD HENKE |
A STUDY OF THE USE OF PAPER BOOK METAPHORS IN THE DESIGN OF ELECTRONIC BOOKS |
DRINGUS |
2002 |
JON INOUYE |
A TECHNIQUE FOR VISUALIZING SOFTWARE ARCHITECTURES |
LASZLO |
2002 |
STEPHANIE KARRAN |
UTILIZATION OF INTERNET2 FOR COLLABORATIVE TELE-EDUCATION: A CASE STUDY |
LITTMAN |
2002 |
ERNEST KLERKS |
NEURAL NETWORKS TO PREDICT THE PROPERTIES OF A NEW TYPE OF BATCH HOT DIP GALVANIZED STEEL |
MUKHERJEE |
2002 |
AMY KORESDOSKI |
THE VALUE OF DISTANCE LEARNING GRADUATE DEGREE PROGRAMS TO EMPLOYERS AND EMPLOYEES |
ABRAMSON |
2002 |
JENNIFER LAGIER FELLGUTH |
MEASURING USAGE OF DIGITAL RESOURCES AT HARNELL COLLEGE: AN EVALUATION OF SELECTED ELECTRONIC FULL-TEXT DATABASES. |
DRINGUS |
2002 |
GARY LOCKLAIR |
FOUNDATIONS OF COMPUTER SCIENCE A SURVEY OF COMPUTER SCIENCE VIA ITS GRAND IDEAS |
LASZLO |
2002 |
LYNDA LOUIS |
AN EMPIRICAL INVESTIGATION OF EMPLOYEE PERCEPTIONS OF OUTSOURCING SUCCESS OF INFORMATION TECHNOLOGY OPERATIONS |
MUKHERJEE |
2002 |
JO LUNDY |
USING THE INTERNET TO BUILD COMMUNITY AND PROVIDE CLINICAL PRACTICE GUIDELINES FOR CAMP NURSES |
ABRAMSON |
2002 |
STACY NOWICKI |
STUDENTS SUCCESS WITH WORLD WIDE WEB SEARCH ENGINES RETRIEVING RELEVANT RESULTS WITH RESPECT TO END-USER RELEVANCE JUDGEMENTS |
ZINK |
2002 |
MC-CHESTER ODOH |
DATA CONVERSION: AN INVESTIGATION OF MANAGEMENTS ROLE IN THE CHANGE PROCESS |
SCIGLIANO |
2002 |
ROBERT POLSELLI |
INTEGRATING COMPUTER TECHNOLOGY INTO THE K-12 CLASSROOM: A WEB-BASED TRAINING & MENTORSHIP MODEL |
ELLIS |
2002 |
EASTON RHODD |
ENTERPRISE INTEGRATION MODELING: LINKING ENTERPRISE INTEGRATION ARCHITECTURE WITH BUSINESS STRATEGY PLANNING |
SCIGLIANO |
2002 |
MARIA RODRIGO |
INFORMATION TECHNOLOGY USAGE IN METRO MANILA PUBLIC AND PRIVATE SCHOOLS |
ZINK |
2002 |
SARAH SCHRIRE |
LEARNING PROCESSES AND MODERATION TECHNIQUES IN ASYNCHRONOUS LEARNING NETWORKS |
ABRAMSON |
2002 |
WILLIAM SMITH |
THE EFFECT ON COGNITIVE LOAD BY USING VISUAL MODELING TOOLS TO TEACH OBJECT-ORIENTED PROGRAMMING TO STUDENTS WHO HAVE HIGH PRIOR EXPERIENCE WITH PROCEDURAL PROGRAMMING |
ELLIS |
2002 |
MARTHA SNYDER |
THE DESIGN AND DELIVERY OF ONLINE LEARNING COMMUNITIES FOR OLDER ADULTS |
ABRAMSON |
2002 |
RONALD SPERANO |
AN INVESTIGATION INTO THE EFFECTIVENESS OF A PORTABLE ELECTRONIC MEETING SYSTEM IN A COLOCATED COMPUTER SUPPORTED COOPERATIVE WORK ENVIRONMENT |
LITTMAN |
2002 |
BEVERLY SWISSHELM |
A COMPARISON OF THE USE OF ARTIFICIAL NEURAL NETWORKS, FRACTAL TIME SERIES AND FRACTAL NEURAL NETWORKS IN FINANCIAL FORCASTING |
MUKHERJEE |
2002 |
ROY TAUNTON |
Y2K SERENDIPITY: BENEFITS AND SPINOFFS |
SCIGLIANO |
2002 |
TRIROJ VIROJTRIRATANA |
THE LINKAGE OF COMPETITIVE STRATEGY, INFORMATION TECHNOLOGY (IT) MATURITY AND SIZE WITH STRATEGIC RESPONSE TO FINANCIAL LIBERALIZATION OF THAI FINANCIAL INSTITUTIONS |
ZINK |
2002 |
CAROLE WILKINSON |
A STUDY TO DETERMINE THE PREDICTORS OF SUCCESS IN AN ONLINE COLLEGE GRADUATE PROGRAM |
TERRELL |
2002 |
STEVEN BERNSTEIN |
A COMPARISON OF TRADITIONAL-COMPUTER ASSISTED FEEDBACK AND GENERAL MULTIMEDIA FEEDBACK IN A WEB-BASED PHYSICAL THERAPY ASSIGNMENT |
TERRELL |
2001 |
WENYI BI |
KNOWLEDGE DISCOVERY BY ATTRIBUTE-ORIENTED APPROACH UNDER DIRECTED ACYCLIC CONCEPT GRAPH (DACG) |
SUN |
2001 |
JOSEPH BIANCO |
WEB INFORMATION SYSTEM (WIS): INFORMATION DELIVERY THROUGH WEB BROWSERS |
SALAZAR |
2001 |
GARY HASMAN |
GUIDELINES FOR DEVELOPMENT OF COURSES FOR DELIVERY OVER THE IOWA COMMUNICATIONS NETWORK
|
TERRELL |
2001 |
DIANE HAYES |
INTELLECTUAL CAPITAL MANAGEMENT AMONG PROJECT MANAGERS IN THE INFORMATION TECHNOLOGY DOMAIN |
MANNING |
2001 |
DOMINIQUE HEGER |
THE DESIGN OF A LOGARITHMIC FILE DATA ALLOCATION ALGORITHM FOR EXTENT BASED FILE SYSTEMS |
SIMCO |
2001 |
DAVID HENDRICKSON |
STOCHASTIC DISCRETE EVENT SIMULATION USING PRODUCT-FORM QUEUING NETWORKS TO MODEL STEADY-STATE BEHAVIOR: AN EXAMINATION OF A MEDICAL DEVICE COMMUNICATIONS NETWORK |
LITTMAN |
2001 |
CHERYL HILL |
DEVELOPMENT OF COMPUTER SKILLS IN PHYSICAL THERAPY STUDENTS |
TERRELL |
2001 |
JOHN HIPPS |
AN XML MODEL OF A COLLABORATION TOOL FOR SUPPORTING EXTRANET-BASED WORKFLOW AUTOMATION |
SCIGLIANO |
2001 |
DAVID JACOBS |
AN XML BASED AUTHORIZATION FRAMEWORK FOR WEB-BASED APPLICATIONS |
MUKHERJEE |
2001 |
SALLIE JOHNSON |
FACULTY ATTITUDES TOWARD EDUCATIONAL TECHNOLOGY: AN ENTENSION OF BULLARDS ANALYSIS OF SELECTED VARIABLES |
DRINGUS |
2001 |
DAVID JONES |
A SOFTWARE REENGINEERING METHOD FOR EVOLVING A STRUCTURED LEGACY SYSTEM TO AN OBJECT-ORIENTED SYSTEM MODEL USING THE UNIFIED MODELING LANGUAGE |
SCIGLIANO |
2001 |
ROBERT KERBS |
THE EXTRACTION OF CLASSIFICATION RULES AND DECISION TREES FROM INDEPENDENCE DIAGRAMS |
SUN |
2001 |
FRANK NASUTI |
KNOWLEDGE ACQUISITION USING MULTIPLE DOMAIN EXPERTS IN THE DESIGN AND DEVELOPMENT OF AN EXPERT SYSTEM FOR DISASTER RECOVERY PLANNING |
MUKHERJEE |
2001 |
ALAN PESLAK |
A FIRM LEVEL STUDY OF INFORMATION TECHNOLOGY PRODUCTIVITY USING FINANCIAL AND MARKET BASED MEASURES |
MUKHERJEE |
2001 |
THANH PHAM |
DYNAMIC UPDATE TECHNIQUES FOR ONLINE MAPS AND ATTRIBUTES DATA |
MUKHERJEE |
2001 |
MASOOD POORANDI |
THE IMPACT OF GRAPHING CALCULATORS IN TEACHING MATHEMATICS |
TERRELL |
2001 |
KENNETH REVELS |
DYNAMIC UPDATE TECHNIQUES FOR ON-LINE MAPS AND ATTRIBUTES DATA |
MUKHERJEE |
2001 |
VIRGINIA ROSENKRANS |
ELECTRONIC COMMERCE AND INTERNET ADVERTISING |
MANNING |
2001 |
WILLIAM RYAN |
COMPARISON OF STUDENT PERFORMANCE AND ATTITUDE IN A LECTURE CLASS TO STUDENT PERFORMANCE AND ATTITUDE IN A TELECOURSE AND A WEB-BASED CLASS |
COHEN |
2001 |
MIRIAM SCHCOLNIK |
A STUDY OF READING WITH DEDICATED E-READERS |
ABRAMSON |
2001 |
PATRICIA SPERANO |
THE DEVELOPMENT OF AN INTRANET-BASED ELECTRONIC PERFORMANCE SUPPORT SYSTEM FOR KNOWLEDGE MANAGEMENT WORKERS |
ABRAMSON |
2001 |
LEON STEVENS |
A MODEL FOR TRANSFORMING LEGACY SYSTEMS IN A CLIENT/SERVER ENVIRONMENT BASED ON THE UNIFIED MODELING LANGUAGE (UML) |
SCIGLIANO |
2001 |
CAROLYN VOEGLER |
THE DESIGN AND IMPLEMENTATION OF A WEB-BASED SYSTEM TO AID STUDENTS IN RESOURCE LOCATION IN A PRIVATE HIGH SCHOOL LIBRARY SETTING |
ZINK |
2001 |
GIOCONDA WEINER |
CONSTRUCTING VIRTUAL INTERNET AGENTS TO IMPROVE LEARNING |
ABRAMSON |
2001 |
JOHN WILLIAMS |
A STUDY OF THE CORRELATION OF THE ISO-9000 QUALITY CONTROL PROGRAM ON THE FINANCIAL RESULTS OF INFORMATION TECHNOLOGY COMPANIES WHO HAVE ACHIEVED ISO-9000 CERTIFICATION |
TERRELL |
2001 |
MANUEL ASTTE |
A COMPARISON OF INTRANET TRANING PROGRAMS WITH TRADITIONAL CLASSROOM INSTRUCTION FOR LOCAL GOVERNMENT EMPLOYEES |
COHEN |
2000 |
JAMES BACKER |
MULTI-USER DOMAIN OBJECT ORIENTED (MOO) AS A HIGH SCHOOL PROCEDURE FOR FOREIGN LANGUAGE ACQUISITION |
ABRAMSON |
2000 |
NONI BOHONAK |
FINDING A FITNESS FUNCTION TO BE USED WITH GENETIC ALGORITHMS TO SOLVE A PROTEIN FOLDING PROBLEM: THE AB INITIO PREDICTION OF A PROTEIN USING TORSION ANGLES |
LASZLO |
2000 |
JAMES CANNADY |
AN ADAPTIVE NEUTRAL NETWORK APPROACH TO INTRUSION DETECTION AND RESPONSE |
MUKHERJEE |
2000 |
JOSEPH CANNON |
APPROXIMATION OF MARGINAL PROBABILITIES WHILE LEARNING BAYESIAN NETWORKS |
MUKHERJEE |
2000 |
PATRICIA COWHERD |
A STUDY TO DETERMINE TECHNOLOGICAL SKILLS AND COMPETENCIES NEEDED FOR OFFICE EMPLOYMENT AS REPORTED BY SELECTED EMPLOYERS IN THE SOUTH CENTRAL KENTUCKY LAKE CUMBERLAND AREA DEVELOPMENT DISTRICT |
TERRELL |
2000 |
JANCIS DENNIS |
PROBLEM-BASED LEARNING IN COMPUTER-MEDIATED VERSUS FACE-TO-FACE GROUPS: A COMPARISON OF LEARNING BEHAVIORS AND OUTCOMES OF ENTRY-LEVEL PHYSICAL THERAPY STUDENTS IN A MODULE ON WOMEN’S HEALTH |
ABRAMSON |
2000 |
PATRICIA DEUBEL |
MATHEMATICS SOFTWARE AND ACHIEVEMENT ON THE OHIO NINTH GRADE PROFICIENCY TEST |
ABRAMSON |
2000 |
LISA DEZIEL-EVANS |
AN INVESTIGATION OF CRITICAL THINKING IN SYNCHRONOUS AND ASYNCHRONOUS COMPUTER CONFERENCING ENVIRONMENTS |
DRINGUS |
2000 |
PAULA DOHERTY |
SUCCESS FACTORS AMONG COMMUNITY COLLEGE STUDENTS IN AN ONLINE LEARNING ENVIROMENT |
TERRELL |
2000 |
ROBERT GRENIER |
AN OBJECT-ORIENTED MODEL FOR INTERORGANIZATIONAL COLLABORATIVE PLANNING |
GUILD |
2000 |
LAWRENCE GROSBERG |
IMPROVING SECURITY AND PERFORMANCE OF GENERAL CRYPTOSYSTEMS BASED UPON SHANNONS PERFECT SECRECY AND MESSAGE PRIORITIZATION |
LEITNER |
2000 |
STEPHEN HANSEN |
COMPLETE RANDOMIZED CUTTING PLANE ALGORITHMS FOR PROPOSITIONAL SATISFIABILITY |
LEITNER |
2000 |
HAJIME HAYAKAWA |
INTERNATIONAL USABILITY DESIGN GUIDELINES AND EFFECTIVEMESS OF A WORLD WIDE WEB-BASED INSTRUCATIONAL PROGRAM FOR HIGHT SCHOOL STUDENTS IN A CROSS CULTURE LEARNING ENVIROMENT |
ABRAMSON |
2000 |
JAMES HENDEE |
A DATA-DRIVEN SOFT REAL TIME EXPERT SYSTEM FOR PRODUCING CORAL BLEACHING ALERTS |
MURRAY |
2000 |
THERESA JU |
THE DESIGN OF AN INTEROPERABLE AND ADAPTABLE WORKFLOW MANAGEMENT SYSTEM USING XML
|
SCIGLIANO |
2000 |
GABRIEL KENGNI |
STRUCTURAL DESIGN OF A FAST CONVERGANCE ALGORITHM: A SEMI-UNIVERAL ROUTING PROTOCOL |
LEITNER |
2000 |
RAGHUBABU KORRAPATI |
A BAYESIAN FRAMEWORK TO DETERMINE PATIENT COMPLIANCE IN GLAUCOMA CASES |
MUKHERJEE |
2000 |
JAMES LOGAN |
THE REQUIREMENTS FOR A CONTEMPORARY X.400 MAIL SYSTEM FOR DISTRIBUTED NETWORKS |
GUILD |
2000 |
JOANNE MARLOWE |
SMART CARD SYSTEMS: DEVELOPMENT OF A PARADIGM FOR A UNIVERSITY-WIDE SMART CARD STUDENT IDENTIFICATION SYSTEM |
LITTMAN |
2000 |
MARGARET MARSTON |
TECHNOLOGY – BASED TRAINING FOR TEACHERS OF THE VISUALLY IMPAIRED IN THE USE OF SPEECH-SUPPORTED TELECOMMUNICATIONS |
ABRAMSON |
2000 |
BRUCE MARTIN |
EFFECTS OF DEPARTMENT OF DEFENSE ACQUISITION REFORM ON MILITARY SOFTWARE DEVELOPMENT PROGRAMS |
GUILD |
2000 |
PROGRESS MTSHALI |
MINIMIZING PARALLEL VIRTUAL MACHINE (PVM) TASKS EXECUTION TIMES THROUGH OPTIMAL HOST ASSIGNMENTS |
MUKHERJEE |
2000 |
SHARRON REDDEN |
SELF- ESTEEM AND INTRINSIC MOTIVATIONAL EFFECTS OF USING A CONSTRUCTIVIST AND A BEHAVIORIST APPROACH TO COMPUTER USAGE IN FIFTH GRADE HISPANIC CLASSROOMS |
TERRELL |
2000 |
ANDREW RUNYAN |
PERSISTENCE DIFFERENCES IN COMMUNITY COLLEGE COURSES TAUGHT IN CLASSROOMS AND THROUGH ALTERNATIVE FORMATS |
ABRAMSON |
2000 |
LYNETTE SCHNEIDER |
A COMPARISON OF THE USER INTERFACE FEATURES OF THE FREE VERSIONS OF MEDLINE ON THE INTERNET WORLD WIDE WEB |
LITTMAN |
2000 |
MICHAEL SIGNOR |
THE FAILURE ANALYSIS MATRIX: A USABLE MODEL FOR RANKING SOLUTIONS TO FAILURES IN INFORMATION SYSTEMS |
DRINGUS |
2000 |
JESSE SMITH |
THE FEASIBILITY OF DEVELOPING A COMPUTER EXPERT SYSTEM TO MITIGATE NUCLEAR POWER PLANT ACCIDENTS |
MUKHERJEE |
2000 |
KENNETH SPENCER |
A COMPARISON OF CONATIVE LEVELS AMOUNG LEARNERS WHEN DIFFERENT METHODS OF TRAINING ARE USED. |
ABRAMSON |
2000 |
HELEN ST. AUBIN |
IMPLEMENTING A VIRTUAL REALITY PARADIGM IN HUMAN ANATOMY/PHYSIOLOGY COLLEGE CURRICULA |
ABRAMSON |
2000 |
ROBERT STEINHOFF |
A PERFORMANCE COMPARISON OF TREE-BASED GENETIC PROGRAMMING VERSUS STACK-BASED GENETIC PROGRAMMING USING THE JAVA VIRTUAL MACHINE |
LEITNER |
2000 |
VIRGELEAN THORN |
A COMPARATIVE STUDY OF THE EFFECTIVENESS OF THREE MODELS OF DISTANCE EDUCATION STUDENT ACHIEVEMENT AND LEVEL OF SATISFACTION. |
TERRELL |
2000 |
RAMONA TOWNSEND |
AN INTERNET-BASED COLLABORATIVE PROTOTYPE FOR (SAP R/3) DATABASE ADMINISTRATION |
SCIGLIANO |
2000 |
JOHN VIREN |
IMPLICATIONS OF CONTRAST SENSITIVITY IN INFORMATION CUEING |
ABRAMSON |
2000 |
MICHAEL WILLIAMS |
TRAINING AVIATION MAINTENANCE TECHNICIANS WITH INFORMATION RETRIEVAL SYSTEMS |
ABRAMSON |
2000 |
DONALD WISMER |
STATE GOVERNMENT COST RECOVERY FOR ELECTRONIC INFORMATION DISSEMINATION: A COMPARATIVE STUDY |
ZINK |
2000 |
ERIC S. ACKERMAN |
DESIGNING A COMPUTER SYSTEM TO CONTROL SEVERAL SMALL EXPERIMENTS IN A SPACE ENVIRONMENT |
GUILD |
1999 |
ARCHIE ADDO |
AN EXPERT SYSTEM FOR THE SELECTION OF ELECTRONIC PAYMENT SYSTEMS BASED ON ORGANIZATIONAL SECURITY REQUIREMENTS |
MUKHERJEE |
1999 |
RICHARD BAKER |
INFORMATIONS SYSTEMS PROJECTS:LEADERSHIP AS A CRITICAL SUCCESS |
MANNING |
1999 |
KATHLEEN CAHALAN |
DESIGN OF THE ELECTRONIC CLASSROOM GRAPHICAL USER INTERFACE: NOVA SOUTHEASTERN UNIVERSITY’S MULTIMEDIA ELECTRONIC CLASSROOM PROJECT |
SCIGLIANO |
1999 |
DORTHEA CAMP-WHITE |
EFFECTS OF STUDENT PARTICIPATION IN A SELF CONTAINED FIFTH-GRADE MULTIMEDIA CLASSROOM ON STUDENT ACHIEVEMENT AND ADJUSTMENT TO THE MIDDLE SCHOOL SETTING |
COHEN |
1999 |
RUEY-MING CHAO |
THE CRITICAL DISTANCE-LEARNING METRICS FOR STUDENT NEEDS AND SATISFACTION |
GUILD |
1999 |
MING-CHE CHEN |
SUCCESSFUL WEB DESIGN FACTORS IN COMMERCIAL WEB SITES: A CASE STUDY |
GUILD |
1999 |
EDWARD CROOK |
LINKING PRINTED BOOKS TO COMPUTERIZED SPEECH |
ABRAMSON |
1999 |
NESTOR DIAZ |
EFFECTS OF MULTIMEDIA INSTRUCTION ON THE MATHEMATICS PERFORMANCE OF LIMITED ENGLISH PROFICIENT STUDENTS |
TERRELL |
1999 |
YAW FRIMPONG |
A PROJECT MANAGEMENT PROTOTYPE FOR COLLABORATIVE PROJECTS ON THE INTERNET |
LEVIN |
1999 |
WILLIAM GROOVER |
THE DESIGN OF AN EXPERT SYSTEM FOR ACADEMIC ADVISING AT A TWO-YEAR COMMUNITY COLLEGE |
MUKHERJEE |
1999 |
JAMES GRUNWALD |
THE USE OF COOPERATIVE GROUPS IN LEARNING HOW TO USE NEW SOFTWARE PROGRAMS |
TERRELL |
1999 |
WILLIAM HAFNER |
REQUIREMENTS AND ARCHITECTURE FOR A GROUP MEMORY IN THE ANY-TIME/ANY-PLACE DOMAIN OF COMPUTER SUPPORTED COOPERATIVE WORK |
DRINGUS |
1999 |
MARC INGLE |
AN EXPERIMENTAL COMPARISON OF STUDENT PERFORMANCE IN A WEB-BASED VERSUS A LECTURE-BASED CLASSROOM |
ABRAMSON |
1999 |
DOUGLAS L. JACOBS |
COLOR CALIBRATION OF COMPUTER DISPLAY DEVICES |
LASZLO |
1999 |
MAURY E. JOHNSON |
PLANNING GENETIC ALGORITHM: PURSUING META-KNOWLEDGE |
SALAZAR |
1999 |
KITTISAK KERDPRASOP |
ACTIVE DATABASE RULE SET REDUCTION BY KNOWLEDGE DISCOVERY |
SUN |
1999 |
NITTAYA KERDPRASOP |
THE APPLICATION OF INDUCTIVE LOGIC PROGRAMMING TO SUPPORT SEMANTIC QUERY OPTIMIZATION |
SUN |
1999 |
DIANE KING |
A MODEL FOR IN-HOUSE DEVELOPMENT OF COMPUTER-BASED TRAINING |
ABRAMSON |
1999 |
CHRISTINE LAWES |
ASSESSMENT OF THE EFFECTS OF A TECHNICAL PREPARATION PROGRAM OF INSTRUCTION ON THE ACADEMIC ACHIEVEMENT AND RETENTION OF SECONDARY STUDENTS |
GUILD |
1999 |
JUEEN LEE |
USING WEB BASED INSTRUCTION TO IMPROVE ACHIEVEMENT IN PROFESSIONAL COURSES IN THE CHINESE NAVAL ACADEMY |
ABRAMSON |
1999 |
SUNHEE LEE |
AN INVESTIGATION OF THE EMERGING ROLE OF INFORMATION SYSTEMS PROFESSIONAL IN A CLIENT/SERVE ENVIRONMENT. |
LEVIN |
1999 |
DONALD LEMMA |
A THEORETICAL MODEL FOR A PRESCRIPTION DRUG PUBLIC KEY CRYPTOGRAPHIC SYSTEM |
MUKHERJEE |
1999 |
JENGLUNG LIN |
DESIGN PATTERNS FOR MODELING FILE SYSTEM SECUIRTY IN THE DISTRIBUTED ENVIRONMENT |
GUILD |
1999 |
CRAIG S. LIPMAN |
MODELS FOR OPTIMIZING THE USE OF CONTRACTORS IN INFORMATION SYSTEMS APLICATION DEVELOPMENT OUTSOURCING |
SCIGLIANO |
1999 |
JANE MAHONEY |
THE EFFECTS OF AIR TRAFFIC CONTROLLERS’ COGNITIVE STYLE, LEARNING STRATEGIES AND PERFORMANCE WITHIN A MULTIMEDIA TRAINING ENVIRONMENT |
TERRELL |
1999 |
RORY MCGREAL |
A SYSTEMS ANALYSIS OF TELEEDUCATION NB – A PROVINCE-WIDE DISTRIBUTED DISTANCE LEARNING NETWORK |
LITTMAN |
1999 |
GEORGE MCKEVITT |
A MODEL FOR AN AGENT BASED SYSTEM |
GUILD |
1999 |
JOSEPH MCVEY |
A STUDY OF THE ATTITUDES OF MANAGEMENT AND EMPLOYEES TOWARD TELECOMMUTING |
TERRELL |
1999 |
MARY G. COFFIN MURRAY |
AN ANALYSIS OF THE IMPLEMENTATION OF A WORKFLOW SYSTEM FOR HEALTH INFORMATION MANAGEMENT |
LITTMAN |
1999 |
VICTOR ALLEN NGUYEN |
A SIMPLIFIED FACETED APPROACH TO INFORMATION RETRIEVAL FOR REUSABLE SOFTWARE CLASSIFICATION |
GUILD |
1999 |
DENNIS R. PITTS |
LEARNING ABOUT SCIENTISTS IN A GENDER-EQUITABLE, MULTIMEDIA ENVIRONMENT |
ABRAMSON |
1999 |
MITCHELL PRATT |
A STUDY OF THE COMPUTERIZED READING MANAGEMENT PROGRAM, ACCELERATED READER, AND ITS EFFECT ON READING AMONG PRIMARY GRADE STUDENTS |
ABRAMSON |
1999 |
BELLARMIN N. SELVARAJ |
A REASONING MECHANISM IN THE PROBABILISTIC DATA MODEL BASED ON THE MAXIMUM ENTROPY FORMALISM |
SUN |
1999 |
JOHN SULLIVAN |
STATEWIDE ONLINE WEB-BASED TRAINING PROGRAM TO PREPARE NEW JERSEY COMMUNITY COLLEGE FACULTY FOR DISTANCE TEACHING |
ABRAMSON |
1999 |
TAKAAKI TOMIZAWA |
PICTGRAM: THE DESIGN AND IMPLEMENTATION OF A NEW VISUAL PROGRAMMING LANGUAGE |
LASZLO |
1999 |
PATRICIA WHITE |
AN ARCHITECTURE DESIGN FOR A CUSTOMIZED GUI TO SUPPORT PERSONAL PREFERENCES |
GUILD |
1999 |
YING-LU YEN |
BUILDING AN ASIAN CULTURAL GRAPHICAL USER INTERFACE (GUI) FOR EFFICIENT AND ADVANCED COMPUTING |
GUILD |
1999 |
ANNE K. ABATE |
THE ROLE OF THE EINSTEIN LIBRARY OF NOVA SOUTHEASTERN UNIVERSITY IN MEETING THE NEEDS OF DISTANCE EDUCATION STUDENTS |
LITTMAN |
1998 |
THERESA ANDUZE-PARIS |
A MICROWAVE LINK OVER WATER IN A TROPICAL ZONE CASE STUDY |
GUILD |
1998 |
JAMES W. BARKER |
A LOW-COST, DECENTRALIZED, DISTRIBUTED COMPUTING ARCHITECTURE FOR AN AUTONOMOUS USER ENVIRONMENT |
SCIGLIANO |
1998 |
ABBY H. BROWN |
SYSTEM REQUIREMENTS FOR A NEW MANAGEMENT CONTROL EXPERT SYSTEM GENERALIZED INFERENCE ENGINE INTERFACING WITH A CLIENT/SERVER NOTIFICATION SYSTEM |
GUILD |
1998 |
MARK A. BROWN |
PROPOSITION OF THE TEMPORAL VARIATION DATA MODEL AND EVALUATION OF AN IMPLEMENTATION |
SUN |
1998 |
JOYCE BETHEA BRYAN |
TECHNOLOGICAL LITERACY ASSESSMENT IN SECONDARY SCHOOLS THROUGH PORTFOLIO DEVELOPMENT |
ZINK |
1998 |
PHYLLIS CHASSER |
THE EFFECT OF ALTERNATE FORMS OF FEEDBACK ON STUDENT ACHIEVEMENT AND MOTIVATION |
TERRELL |
1998 |
JEANETTA R. CHRYSTIE |
A MODEL FOR APPLYING TOTAL QUALITY MANAGEMENT IN COMPUTER INFORMATION SYSTEMS MANAGEMENT |
SCIGLIANO |
1998 |
FRANCIS R. CIRILLO |
A COMPLEXITY COMPARISON OF ADA 95 AND C++ |
GUILD |
1998 |
VERNON L. CZELUSNIAK |
DESIGN AND IMPLEMENTATION: A CUSTOM INTERACTIVE MULTIMEDIA CBT FOR THE BLOOD-CELL ANALYSIS INDUSTRY |
ABRAMSON |
1998 |
TIMOTHY ELLIS |
COMPUTER SUPPORTED, TIME AND PLACE INDEPENDENT DISTANCE EDUCATION FOR ADULT LEARNERS: A DEMONSTRATION PROJECT IN TEACHING FINANCIAL ACCOUNTING VIA THE INTERNET |
COHEN |
1998 |
EILEEN SULEIMA ENNIS |
AN ANALYSIS OF USABILITY ISSUES OF THE WORLD WIDE WEB (WWW) |
DRINGUS |
1998 |
ANDRES A. FOLLECO |
A PERFORMANCE ANALYSIS TOOL FOR UNIX MASSIVELY PARALLEL COMPUTERS |
BRUCE |
1998 |
WILLIAM M. HARTMAN |
A STUDY TO DEFINE CURRENT PRACTICES, ATTITUDES AND VALUES IN THE SOFTWARE DEVELOPMENT COMMUNITY |
LIEBLEIN |
1998 |
JOY A. HATCH |
THE EFFECT OF MULTIMEDIA TRAINING ON STUDENT PILOTS ENCOUNTERING EMERGENCY SITUATIONS |
ABRAMSON |
1998 |
DAVID M. HEATH |
THE USE OF ELECTRONIC MEETING SYSTEM TECHNOLOGY TO AID IN SOFTWARE REQUIREMENTS ENGINEERING |
MUKHERJEE |
1998 |
ARTHUR E. HILSCHER |
DEVELOPMENT AND PRODUCTION OF THE ELECTRONIC VIRTUAL” PHARMACEUTICAL DOSSIER |
ZINK |
1998 |
DANIEL M. HSIEH |
A NEW METHOD TO UPDATE FLASH MEMORY: IN-SYSTEM PROGRAMMING ALGORITHMS FOR THE PERSONAL COMMUNICATOR |
SUN |
1998 |
W. SIR ANTHONY JOHNSON JR. |
THE DYNAMICS OF COMPLEX SURFACES IN N-DIMENSIONS USING COMPUTER GRAPHICS |
GUILD |
1998 |
DAVID T. LAURET |
THE AUDITORY DISPLAY IN INTERACTIVE COUSEWARE: MOVING HUMAN FACTORS INTO COMPUTER EDUCATION |
TERRELL |
1998 |
REY LECLERC |
AN INVESTIGATION OF CRITICAL SUCCESS FACTORS AND PROCEDURES FOR IMPLEMENTING EFFECTIVE INFORMATION SYSTEMS SECURITY PROGRAMS |
SCIGLIANO |
1998 |
GILDA LEWIS |
A NATIONAL APPROACH TO TOUCH KEYBOARDING INSTRUCTION ON COMPUTERS IN PRIMARY SCHOOLS IN BELIZE |
TERRELL |
1998 |
WEN-YA LIN |
A LOAD BALANCING DATA ALLOCATION FOR PARALLEL QUERY PROCESSING |
SUN |
1998 |
EDWARD C. LINDOO |
THE FUTURE OF NEWSPAPERS: A STUDY OF THE WORLD WIDE WEB AND ITS RELATIONSHIP TO ELECTRONIC PUBLISHING OF NEWSPAPERS |
COHEN |
1998 |
S.J. LOMBARDI |
SUPPLEMENTING TEXTBOOK READING AND WRITING EXERCISES IN THE TYPICAL SPANISH III JESUIT HIGH SCHOOL LANGUAGE CLASSROOM WITH EMAIL CONFERENCES |
TERRELL |
1998 |
KENNETH G. MACLEOD |
A CONCEPTUAL FRAMEWORK, IMPLEMENTATION PLAN, AND VISUAL GUIDE FOR THE INTERACTIVE MULTIMEDIA COURSEWARE DEVELOPMENT PROCESS |
ABRAMSON |
1998 |
PHILLIP R. MARCUS |
INTERNET RETRIEVAL AND DISSEMINATION OF ENGINEERING DOCUMENTATION: PRELUDE TO THE WORLD WIDE WEB TECHNOLOGICAL MALL |
SCIGLIANO |
1998 |
DAVID S. METCALF II |
DISTRIBUTED MULTIMEDIA INFORMATION AND TRAINING SYSTEMS: DEVELOPMENT OF A DESIGN MODEL FOR INTERACTIVE TRAINING USING THE WORLD WIDE WEB AS A DELIVERY SYSTEM |
LITTMAN |
1998 |
TED MIKELL |
AN ANALYSIS OF SUCCESSFUL AND UNSUCCESSFUL IMPLEMENTATION OF TELECOMMUTING BY AN ORGANIZATION THROUGH IDENTIFICATION OF CRITICAL SUCCESS FACTORS |
MOODY |
1998 |
SARAH J. MITCHELL |
REVITALIZING THE MIDCAREER COMPUTING TECHNICAL PROFESSIONAL (VOL. I) |
TERRELL |
1998 |
SARAH J. MITCHELL |
REVITALIZING THE MIDCAREER COMPUTING TECHNICAL PROFESSIONAL (VOL. II) |
TERRELL |
1998 |
PAUL V. MONTESINO |
EFFECT OF ELECTRONIC PORTFOLIO ASESSMENTS ON THE MOTIVATION AND COMPUTER INTEREST OF FOURTH AND FIFTH GRADE STUDENTS IN A MASSACHUSETTS SUBURBAN SCHOOL. |
TERRELL |
1998 |
SIMON S. QIU |
A MORE GENERAL MARKOV RELIABILITY MODEL FOR COMPUTER SYSTEMS |
GUILD |
1998 |
ROBERT C. RACITI |
CREATING COMPETITIVE ADVANTAGE WITH INTERNET TECHNOLOGY |
LITTMAN |
1998 |
VICTOR DAVID SANCHEZ |
CONTRIBUTIONS TO SUPERVISED LEARNING OF REAL-VALUED FUNCTIONS USING NEUTRAL NETWORKS |
BRUCE |
1998 |
LARRY A. SEARS |
POSSIBLE FUTURES: THE ROLE OF TECHNOLOGY IN EDUCATION |
TERRELL |
1998 |
BARBARA SHEGOG |
AN INVESTIGATION OF THE RELATIONSHIPS BETWEEN CHARACTERISTICS OF TEACHERS AND THEIR ATTITUDES TOWARD TECHNOLOGY INTEGRATION IN THEIR COURSES |
SCIGLIANO |
1998 |
RICHARD H. SUTOR |
AN EDUCATIONAL EXECUTIVE INFORMATION SYSTEM PROTOTYPE FOR PUBLIC SCHOOL DISTRICT SUPERINTENDENTS |
LEVIN |
1998 |
PIN TAN |
NEURAL NETWORKS IN THE CALCULATION OF CARDIOVASCULAR EQUILIBRIUM VOLUME (VO) OF END-DIASTOLIC PRESSURE-VOLUME RELATIONSHIP STUDY |
CHENG |
1998 |
MARGARET MAHONEY THOMBS |
ENHANCING THE ENGLISH WRITING SKILLS OF ESL STUDENTS USING E-MAIL WITH PRESERVICE TEACHERS AS MENTORS |
COHEN |
1998 |
SALIM R. YAZBECK |
PLANNING, DESIGNING, AND INTEGRATING A DISTRIBUTED WIRELESS MOVILE INTRANET ARCHITECTRUE FOR LOCAL AND WIDE AREA NETWORKING AT A UNIVERSITY |
LITTMAN |
1998 |
SAMUEL ABRAHAM |
THE USE OF PRESENTATION SOFTWARE (PS) BY COLLEGE FACULTY IN AN UNDERGRADUATE INSTITUTION TO ENHANCE THEIR TEACHING |
ABRAMSON |
1997 |
LARRY E. BEEBE |
A MODEL FOR CULTURAL RESISTANCE IN BUSINESS PROCESS RE-ENGINEERING FAILURE |
TERRELL |
1997 |
THOMAS E. BEUTEL |
DEVELOPMENT AND EVALUATION OF INTERACTIVE COURSEWARE FOR VISUALIZATION OF GRAPH DATA STRUCTURES AND ALGORITHMS |
ABRAMSON |
1997 |
CANDICE L. BUCHANAN |
AN EXTENSION TO THE INFORMATION SYSTEM ARCHITECTURE FRAMEWORK FOR ELICITING AND REPRESENTING SYSTEM REUIREMENTS |
MOODY |
1997 |
ROBERT H. CALABRESE |
AN INVESTIGATION OF COMMUNITY COLLEGE ADMINISTRATORS’ PERCEPTIONS OF EDUCATIONAL TECHNOLOGY FACILITIES |
TERRELL |
1997 |
REBECA GOMEZ COHEN |
ANALYSIS, DESIGN, AND IMPLEMENTATION OF THE STUDENT ENROLLMENT MANAGEMENT SUPPORT SYSTEM IN THE COMMUNITY COLLEGE SYSTEM |
GUILD |
1997 |
WILLIAM F. CONROY III |
AN INFORMATION MANAGEMENT SYSTEM TO SUPPORT THE DEPARTMENT OF DEFENSE TRANSPORTATION SYSTEM |
LITTMAN |
1997 |
MARTIN DUCHOW |
BUILDING AN INFRASTRUCTURE IN IMPLEMENTING A COLLEGE CONSORTIUM |
SCIGLIANO |
1997 |
MICHAEL FALAT |
THE INTERRELATIONSHIP BETWEEN CASE/I-CASE AND ORGANIZATIONAL/SOFTWARE MEASUREMENTS |
MOODY |
1997 |
STAR M. FERDINAND |
THE STATE OF DISASTER RECOVERY PLANNING IN TEXAS SMALL BUSINESSES |
LASZLO |
1997 |
YAW-SHYAN HUANG |
THE DEVELOPMENT OF ENTERPRISED-BASED IS FRAMEWORKS TO HANDLE OUTSOURCING BY SMALL AND MEDIUM ENTERPRISES IN THE REPUBLIC OF CHINA |
GUILD |
1997 |
PARAVILA O. JACOB |
INTELLIGENT COLLISION WARNING SYSTEM BASED ON FUZZY LOGIC AND NEURAL NETWORK TECHNOLOGIES |
BRUCE |
1997 |
JOHN P. KIRCHNER |
A METHOD FOR THE APPLICATION OF COMPUTER ANALYTIC TOOLS TO CLINICAL RESEARCH: NEURAL NETWORK ANALYSIS OF LIVER FUNCTION TESTS TO ASSIST IN THE DIFFERENTIAL DIAGNOSIS OF LIVER DISEASE |
GUILD |
1997 |
HEE C. LEE |
OPTIMIZATION OF PAGING COST IN MOBILE SWITCHING SYSTEM BY GENETIC ALGORITHM |
SUN |
1997 |
ROBERT B. LIPTON |
ELECTRONIC STUDENT PORTFOLIOS: A TOOL FOR PERFORMANCE-BASED ASSESSMENT (A PILOT PROJECT IN THE BERKS COUNTY PENNSYLVANIA SCHOOLS) |
ABRAMSON |
1997 |
BABU V. MANI |
A CRITIQUE OF THE SOFTWARE REUSE FACILITIES IN C++ |
LASZLO |
1997 |
CAMERON MATEIKA |
MULTIMEDIA DEVELOPMENT PROJECT FARMING FOR THE FUTURE CD-ROM |
ABRAMSON |
1997 |
RONALD D. MCFARLAND |
CAUSAL INFERENCES OF ACHIEVEMENT BY ADULT LEARNERS AS DETERMINED BY LEARING STYLE DIFFERENCE IN HYPERTEXT-BASED COMPUTER-ASSISTED INSTRUCTION |
LITTMAN |
1997 |
KATHRYN J. MOLAND |
AN EFFECTIVE SOFTWARE DEVELOPMENT METHODOLOGY FOR QUALITY SOFTWARE DEVELOPMENT IN A SCHEDULING DEPARTMENT |
MOODY |
1997 |
FREDERICK MOXLEY II |
ON THE DEVELOPMENT OF A SOFTWARE ARCHITECTURE FOR A DISTRIBUTED INFORMATION SYSTEM THAT CAN SUPPORT THE WARRIOR AS ENVISIONED BY THE U.S. DEPARTMENT OF DEFENSE |
LITTMAN |
1997 |
MANOJ S. PATANKAR |
A FRAMEWORK FOR THE DESIGN OF A VOICE-ACTIVATED, INTELLIGENT, AND HYPERMEDIA-BASED AIRCRAFT MAINTENANCE MANUAL |
ABRAMSON |
1997 |
STEVEN PORIS |
EFFECTS OF COMPUTER-BASED COOPERATIVE LEARNING ON THE PROBLEM SOLVING SKILLS OF GRADE SIX STUDENTS |
TERRELL |
1997 |
ELIZABETH L. RICH |
AN EMPIRICAL STUDY OF CRITICAL SUCCESS FACTORS FOR IMPLEMENTING CLIENT/SERVER HUMAN RESOURCE INFORMATION SYSTEMS |
MOODY |
1997 |
JEAN M. ROEHRS |
A STUDY OF SOCIAL ORGANIZATIN IN SCIENCE IN THE AGE OF COMPUTER-MEDIATED-COMMUNICATION |
DRINGUS |
1997 |
ROLANDO RUEDA DE LEON |
IDENTIFICATION OF CRITICAL SUCCESS FACTORS FOR THE IMPLEMENTATION OF ELECTRONIC DATA INTERCHANGE |
MOODY |
1997 |
GREGORY E. SIMCO |
A METHODOLOGY FOR FILE SYSTEM PERFORMANCE EVALUATION |
GUILD |
1997 |
BEVERLY SIMON |
PREDICTING SUCCESS IN COMPUTER SCIENCE AT A COMMUNITY COLLEGE |
TERRELL |
1997 |
MARK STOVER |
THE CONSTRUCTION AND VALIDATION OF AN EVALUATIVE INSTRUMENT FOR ACADEMIC LIBRARY WORLD WIDE WEB SITES |
ZINK |
1997 |
WINSTON M. TELLIS |
INFORMATION TECHNOLOGY IN A UNIVERSITY: AN INSTITUTIONAL CASE STUDY OF INSTRUCTIONAL AND RESEARCH COMPUTING IN A CLIENT/SERVER ENVIRIONMENT |
SCIGLIANO |
1997 |
RICHARD E. TURNER |
THE EFFECT OF TOTAL QUALITY MANAGEMENT ON FACULTY PRODUCTIVITY |
TERRELL |
1997 |
JR. URWILER |
THE EFFECTS OF USER INTERFACE METAPHORS ON THE LEARNABILITY OF COMPUTER SYSTEMS BY FIELD DEPENDENT AND FIELD INDEPENDENT COMPUTER USERS |
MOODY |
1997 |
LARRY D. VAIL |
A COMPARISON OF THE MICROSOFT COMPONENT OBJECT MODEL WITH THE C++ AND SMALLTALK OBJECT MODELS |
GUILD |
1997 |
HYACINTH WILLIAMS |
A PROPOSED SOLUTION FOR WORD-RECOGNITION DEFICIT IN THE COMPUTER ENVIRONMENT |
GUILD |
1997 |
VICTOR G. WILLIAMS |
THE INFORMATION SYSTEM USED DURING THE JOB DESCRIPTION PROCESS FOR NEW MILITARY PERSONNEL AND ITS EFFECT ON JOB SATISFACTION |
TERRELL |
1997 |
MARTHA L. CRAINE |
CEREBRAL DOMINANCE THEORY: COMPUTER SCIENCE CLAS SELECTION AND ACADEMIC ACHIEVEMENT |
TERRELL |
1996 |
KATHRYN DIETZ |
CATALOGING OF CHILDREN’S PICTURE BOOKS: QUALITY IN THE AGE OF AUTOMATION |
LITTMAN |
1996 |
MARK R. EATON |
INTERACTIVE FEATURES FOR AN HTML TUTORIAL IN A DISTANCE LEARNING PROGRAM |
LEVIN |
1996 |
SUSAN FIFE DORCHAK |
AN INVESTIGATION OF DATA INTEGRITY IN ADA 95 |
GUILD |
1996 |
PATRICIA GAINOUS |
AN INVESTIGATION INTO THE RELATIONSHIP BETWEEN CULTURALLY BASED SOFTWARE AND THE SELF-ESTEEM OF CHEROKEE STUDENTS |
KINGSBURY |
1996 |
JR. GIL |
DEVELOPMENT OF AN EXPERT SYSTEM PROTOTYPE FOR THE ASSESSMENT OF DYSLEXIA AND ATTENTION DEFICIT HYPERACTIVITY DISORDER |
KINGSBURY |
1996 |
MICHAEL R. GUNTER |
A DISTANCE EDUCATION CONFERENCING SYSTEM UTILIZING VOICE AND TEXT DATA OVER A LOW BANDWIDTH COMMUNICATIONS LINK |
LEVIN |
1996 |
ROBERT H. LANE |
INFORMATION SYSTEMS IN NON-PROFIT ORGANIZATIONS: ENHANCING PERFORMANCE THROUGH ONLINE HELP |
KINGSBURY |
1996 |
B.J. LEE |
AN INVESTIGATION OF THE POTENTIAL VERSUS ACTUAL USAGE OF EXPERT ELECTRICAL COST ESTIMATING SYSTEMS |
TERRELL |
1996 |
LEE J. LEITNER |
THE MAPPING AND INTEGRATION OF THE HASKELL LANGUAGE TO THE COMMON OBJECT REQUEST BROKER ARCHITECTURE |
GUILD |
1996 |
STEPHEN JOSEPH LOPEZ |
DESIGNING THE INTELLIGENT DATA NETWORK: AN ARCHITECTURAL MODEL FOR THE ENTERPRISE INFORMATION SYSTEM |
LITTMAN |
1996 |
JR. MCDONALD |
FACTORS AFFECTING STUDENT ENROLLMENT AND RETENTION IN THE MASTER OF SCIENCE IN MANAGEMENT INFORMATION SYSTEMS DEGREE OFFERED BY NOVA SOUTHEASTERN UNIVERSITY |
TERRELL |
1996 |
ROBERT LEE MILLER |
DESIGN INFORMATION RECOVERY FROM LEGACY SYSTEM COBOL SOURCE CODE: RESEARCH ON A REVERSE ENGINEERING METHODOLOGY |
SUN |
1996 |
DAN A. NISWANDER |
AN ASSESSMENT OF ASYNCHRONOUS TRANSFER MODE (ATM) TRAINING FOR EDUCATORS |
LITTMAN |
1996 |
SANDRA S. PARKER |
INVESTIGATION INTO AND RESOLUTION OF COPYRIGHT ISSUES IN SCHOOLS WITH CLOSED-CIRCUIT TELEVISION SYSTEMS |
LITTMAN |
1996 |
DALE E. PERRIN |
A TELECOMMUNICATIONS-ORIENTED PROJECT CONTROL FRAMEWORK FOR A LEARNING TECHNOLOGY DEVELOPMENT ENVIRONMENT: APPLICATION TO SYSTEMS DEVELOPMENT |
LEVIN |
1996 |
STEVEN R. SCHLOUGH |
AN ANALYSIS OF THE KNOWLEDGE, SKILL, AND ATTITUDES NEEDED IN A COMPUTER SUPPORTED WORK ENVIRONMENT |
KINGSBURY |
1996 |
ANIL K. SHARMA |
A NEW DESIGN APPROACH TO AN EXPERT SYSTEM NETWORK MANAGER BASED ON AN ANALYSIS OF CONTEMPORARY DISTRIBUTED NETWORKS |
GUILD |
1996 |
MICHAEL J. SIMPSON |
LOW COST VIDEO FOR DISTANCE EDUCATION |
LEVIN |
1996 |
JAMI L. BILES |
ACTIVITIES OF STATE LIBRARY AGENCIES IN THE SOUTHEASTERN U.S. IN THE CONTINUING EDUCATIONAL PUBLIC LIBRARIANS |
LITTMAN |
1995 |
TIMOTHY J. BRADY |
THE EFFECTS OF GRAMMAR AND STYLE CHECKING SOFTWARE ON THE WRITING OF THE 9TH GRADE BASIC STUDENTS IN A PROCESS CENTERED WRITING LAB. |
TERRELL |
1995 |
VENESSA A. BROWN |
A COMPARATIVE STORY OF PRESERVICE AND INSERVICE TECHNOLOGICAL TRAINING FOR TEACHERS WITHIN THE SOUTHERN ASSOCIATION OF COLLEGES AND SCHOOL (SACS) REGION |
KINGSBURY |
1995 |
WILKER BRUCE |
THE APPLICATION OF GENETIC PROGRAMMING TO THE AUTOMATIC GENERATION OF OBJECT-ORIENTED PROGRAMS |
ADAMS |
1995 |
ROBERT L. CHIODO |
EFFECTS OF INTELLIGENT COMPUTER AIDED INST. USING HYPERMEDIA, DATABASE, AND EXPERT SYSTEMS ON THE SKILLS DEVELOPMENT AND PERFORMANCE OF ENTRY LEVEL, ADULT, WORDPERFECT STUDENTS |
CENTINI |
1995 |
ALAN E. DILLMAN |
A STUDY OF VALUES CONGRUENCE AND TQM IN INFORMATION SYSTEMS ORGANIZATIONS |
DRINGUS |
1995 |
CHRISTOPHER DUNHAM |
HEMISPHERICITY AND COMPUTER PROGRAMMING APTITUDE |
TERRELL |
1995 |
DARRELL W. GREEN |
AUTHENTIC LEARNING IN ENGINEERING TECHNOLOGY THROUGH THE USE OF A TECHNOLOGY AND LEARNING MATRIX BASED CURRICULUM |
KINGSBURY |
1995 |
GLENN GRIFFIN |
PREDICTING NAVAL AVIATOR FLIGHT TRAINING PERFORMANCE USING MULTIPLE REGRESSION AND AN ARTIFICIAL NEURAL NETWORK |
KINGSBURY |
1995 |
CINDY MEYER HANCHEY |
A COMPARISON OF ETHICAL ATTITUDES OF UNIVERSITY STUDENTS WITH THOSE OF EXPERTS USING COMPUTER RELATED SCENARIOS |
KINGSBURY |
1995 |
ADALECIA HASSELL |
COMPUTERS IN PUERTO RICO: TRAINING OF TEACHERS AND APPLICATIONS |
KINGSBURY |
1995 |
ROBERT S. HOROWITZ |
IDEA ANALYSIS FOR THE DEVELOPMENT OF CLINICAL TRIAL STRATEGIES |
LITTMAN |
1995 |
STEVEN A. KRANTZ |
LARGE-SCALE CLIENT/SERVER MIGRATION METHODOLOGY |
SALAZAR |
1995 |
HAROLD RICHARD MORRIS |
THE EFFECTS OF MULTIMEDIA ON SELECTED CRITICAL THINKING SKILLS OF NON AT-RISK AND AT-RISK STUDENTS |
TERRELL |
1995 |
LARRY DANIELD MOULDS |
AN ANALYSIS OF CURRENT TRAINING PRACTICES USED BY U.S. AND CANADIAN MEMBERS OF THE STEEL SERVICE CENTER INSTITUTE WITH EMPLOYEES WHO ARE GEOGRAPHICALLY LOCATED IN WIDELY DISPERSED SMALL GROUPS |
KINGSBURY |
1995 |
NANCY J. RUMFIELD |
EFFECTS OF GRAPHICS AND PRESENTATION FORMAT ON INFORMATION RETENTION IN COLLEGE STUDENTS |
TERRELL |
1995 |
KAREN M. RYDER |
THE EFFECTS ON PROGRAMMING IN A STRUCTURED LANGUAGE ON THE CRITICAL THINKING SKILLS OF COLLEGE STUDENTS |
KINGSBURY |
1995 |
DANA V. TESONE |
DEVELOPMENT OF A MULTIMEDIA PUBLICATION IN HOSPITALITY AND TOURISM ETHICS FOR UNDERGRADUATE STUDENTS AND WORKPLACE TRAINING PROGRAMS |
KINGSBURY |
1995 |
ANGELA M. TRUJILLO |
A NOVEL WIRELESS COMMUNICATIONS ARCHITECTURE FOR SUPPORTING LEGACY MAINFRAME DATA TRANSMISSION |
ADAMS |
1995 |
WARREN VON WORLEY |
A TAXONOMY OF WORKGROUP COMPUTING APPLICATIONS |
DEITEL |
1995 |
RONALD J. ASHLEY |
EFFECTIVENESS OF A SECONDARY SCHOOL HYPER-MEDIA BASED INSTRUCTIONAL PROG. IN BASIC LIB. SKILLS |
LITTMAN |
1994 |
MARY BURKE WALL |
LONGITUDINAL DATABASE STUDY OF THE FACTORS INFLUENCING RETENTION FOR THE SPRING 1992 DEGREE SEEKING STUDENTS AT ATLANTIC COMMUNITY COLLEGE |
TERRELL |
1994 |
STEPHEN CARROLL JONES |
FRESHMAN PLACEMENT FOR COMPUTER INFO SYSTEMS AT A WOMEN’S 4 YEAR LIBERAL ARTS COLLEGE IN ALABAMA |
KINGSBURY |
1994 |
PATRICIA COLLINS |
GUIDELINES FOR INCORPORATING COMPLEX SCHEMATICS INTO COMPUTER ASSISTED INSTRUCTION |
CENTINI |
1994 |
MIRCEA L. HALMU |
EFFECTS OF PARTICIPATORY DESIGN ON MEDICAL STAFF’S ATTITUDE TOWARD THE COMPUTERIZATION OF PATIENT RECORDS |
TERRELL |
1994 |
AMOS E. HOLT |
TQM; IMPLEMENTATION IN A NOT-FOR-PROFIT RESEARCH & DEVELOPMENT ORGANIZATION |
MACFARLAND |
1994 |
MARY HOSKEN |
DETERMINATION OF BUDGETARY EXPERTISE AMONG PUBLIC SCHOOLS LIBRARY |
LITTMAN |
1994 |
DENNIS J. HUFF |
STRATEGIC PLAN FOR COMPUTING & TELECOMMUNICATIONS AT A UNIVERSITY |
SCIGLIANO |
1994 |
MARY ANN JACKSON MCINTYRE |
STUDY TO EXAMINE THE EFFECTIVENESS OF COMPUTER ASSISTED INSTRUCTION ON MATHEMATICS ACHIEVEMENT |
KINGSBURY |
1994 |
DONALD L. MCGARRY |
ELECTRONIC BULLETIN BOARD AS A MEANS OF PROFESSIONAL COMMUNICATION AMONG PHYSICS TEACHERS |
KINGSBURY |
1994 |
JOHN S. MOORE |
FORMALIZATION OF A SLICING HIERARCHY & DEVELOPMENT OF ASSOC. PROCEDURES FOR RECTANGULAR DUALIZATION FROM A FOUR COMPLETION USING WALL DOMINANCE |
LEVIN |
1994 |
DAVID L. ROTMAN |
DESIGN OF AN EFFECTIVE ECONOMICAL EXEC. INFORMATIONAL SYSTEM FOR CEDARVILL COLLEGE |
LEVIN |
1994 |
RAUL A. SALAZAR |
THE DEVELOPMENT OF A PORTABLE AUTHORING SYSTEM |
ADAMS |
1994 |
CAROLYN CHRISTINE SOLOMON |
SURVEY OF SOUTH CAROLINA INDUSTRIES & POST SECONDARY INST. TO DETERMINE COMPUTER SKILLS NEEDED BY HIGH SCHOOL GRADUATES |
KINGSBURY |
1994 |
JONATHAN DAVID SPARKS |
DEVELOPING A COMPUTERIZED DISTANCE ADULT LEARNING SYSTEM FOR A LIBRARY PARAPROFESSIONAL INSERVICE TRAINING” COURSE |
LITTMAN |
1994 |
PADMA VISWANATHAN |
IMPLEMENTING A RECURSIVE STRUCTURE IN A RELATIONAL DATA MODEL |
LEVIN |
1994 |
JOHN R. WETSCH |
ASSESSING THE PRACTICE OF SYS. ADMIN. IN U.S. FEDERAL DIST. COURTS. |
KINGSBURY |
1994 |
DEBORAH WICKER WRIGHT |
TEACHING THE WRITING PROCESS THROUGH COMPUTERS AS AN EARLY INTERVENTION TO THIRD GRADERS IN A NINE MO. ELEMENTARY SCHOOL |
LEVIN |
1994 |
TINA M. BARRIOS |
THE INTERACTION BETWEEN COGNITIVE LEARNING STYLES AND ACADEMIC ACHIEVEMENT WHEN USING A MULTIMEDIA (HYPERMEDIA) INSTRUCTIONAL DELIVERY SYSTEM IN A HIGH SCHOOL ZOOLOGY COURSE |
KINGSBURY |
1993 |
MARGARET BELL HENTZ |
DATA CONVERSION FROM FAXON’S SC-10 SERIALS CONTROL SYSTEM INTO TECHLIB/PLUS ON-LINE CARD CATALOG |
LITTMAN |
1993 |
MARK A. BRIMER |
ASCERTAINING THE PERCEPTIONS OF PHYSICAL THERAPISTS UTILIZING COMPUTER TECHNOLOGY |
CENTINI |
1993 |
WILLIAM H. BURKETT |
STUDY OF COMPUTER AVERSION FACTORS AND THEIR EFFECT ON AN OLDER ADULT POPULATION’S COMPUTER ANXIETY |
CENTINI |
1993 |
PATRICIA A. COLLINS |
GUIDELINES FOR INCORPORATING COMPLEX SCHEMATICS INTO COMPUTER ASSISTED INSTRUCTION |
CENTINI |
1993 |
ALFRED E. FANT |
COMPUTER USE BY TEACHERS IN THE HIGH SCHOOLS |
KINGSBURY |
1993 |
DOUGLAS A. FROST |
USING A COMPUTER APTITUDE TEST TO INVESTIGATE DIFFERENCE BETWEEN STUDENTS IN SELECTED COLLEGES |
KINGSBURY |
1993 |
JEANINE M. GENDRON |
DESIGN OF A DECISION SUPPORT HYPERTEXT SYSTEM TO ADDRESS TEENAGE LIFE CONCERNS |
SZABO |
1993 |
PETER R. GIULIANI |
ROLE OF INFORMATION SYSTEM COURSES IN POSTGRADUATE BUSINESS EDUCATION |
KINGSBURY |
1993 |
ROLLIE S. GUILD |
UNIX HIDDEN LANGUAGE |
ADAMS |
1993 |
CHENG-I HOU |
DEVELOPMENT OF A COMPUTER BASED SYMPOSIA SYSTEM |
LEVIN |
1993 |
MICHAEL J. JANNIRO |
EFFECTS OF COMPUTER BASED INSTRUCTION ON STUDENT LEARNING OF PSYCHOPHYSIOLOGICAL DETECTION OF DECEPTION TEST QUESTION FORMULATION |
FORNSHELL |
1993 |
DANIEL E. KING |
COMPUTER APPLICATION AT THE VILLAGE MAILBOX |
KINGSBURY |
1993 |
DENNIS A. KURTZ |
A USABILITY STUDY OF UPDATED SIMULATION SOFTWARE |
KINGSBURY |
1993 |
PETER LIU |
APPLYING EXPERT SYSTEM TECH TO ENHANCE COMPUTER PERFORMANCE |
DEITEL |
1993 |
VINCENT M. MANCUSO |
FIGHTER PILOT GROUND BASED INFO. ACQUISITION |
SCIGLIANO |
1993 |
J. EDMUND MAYNARD |
FACULTY AND STUDENT ASSESSMENT OF THE CITADEL LIBRARY USER SERVICES |
LITTMAN |
1993 |
MARTHA MONTGOMERY W. |
STUDY OF THE EFFECTS OF A HYPERTEXT COMPUTER ASSISTED INSTRUCTION IN MATH |
TERRELL |
1993 |
MICHAEL A. MOODY |
EFFECTS OF DIFFERENT CERTAINTY FACTOR PARADIGMS UPON THE USABILITY OF EXPERT SYSTEMS |
SZABO |
1993 |
LEONEL L. PERRA |
DESIGN OF A STRATEGIC PLANNING PROCESS & A PLAN FOR INFORMATION SYSTEMS IN A 2 YEAR RURAL COMMUNITY COLLEGE |
SCIGLIANO |
1993 |
MOSHE S. RAAB |
INTRODUCTION OF A CATALOG AUTOMATION & MANUFACTURING COSTING SYSTEM FOR USE IN A JEWELRY CO. |
LEVIN |
1993 |
ANGELA SATTERLEE |
NEEDS ASSESSMENT STUDY INFO MANAGEMENT CNTR. AT A LARGE COMMUNITY COLLEGE |
KINGSBURY |
1993 |
SHAN HUNG SHIH |
A COST-EFFECTIVE MATERIAL MANAGEMENT SYSTEM WITH INTEGRATING ACCURATE AND EFFICIENT FORECASTING PURCHASING, AND INVENTORY CONTROL SUBSYSTEMS FOR A GOVERNMENT OWNED UTILITY |
LEVIN |
1993 |
LINDA L. SIMMONS |
EFFECT OF NEW CURRICULAR GUIDELINES, REVISED ACCREDITION CRITERIA IN PRIVATE LIBERAL ARTS COLL. |
KINGSBURY |
1993 |
RENEE TOBIAS |
ATTITUDES OF INMATES TOWARD THE USE OF COMPUTERS IN TENNESSEE CORRECTIONAL INSTITUTIONS |
KINGSBURY |
1993 |
RAYMOND V. VAN GROESBECK |
EFFECTS OF A MINI-INTEGRATED LEARNING SYSTEM, TRADITIONAL LECTURE & DRILL INSTRUCTION |
KINGSBURY |
1993 |
JOSEPH G. AMARA |
COMPUTER PRE-ANALYSIS OF AGGREGATE DATA IN HIGH SCHOOL SCIENCE LABS |
KINGSBURY |
1992 |
HOWARD E. BECKNER |
INTRO TO THE ART OF PROGRAMMING FOR THE APPLE IIE |
KINGSBURY |
1992 |
JAMES DIGENNARO |
EXPERT SYSTEM FOR THE PREDICTION OF ENVIRO IMPACTS OF A LOGGIN OPERATION |
KINGSBURY |
1992 |
DAVID R. EMMONS |
DEVELOPING AN EXTENSIBLE AUTHORING SYSTEM |
LEVIN |
1992 |
DON S. GRONINGER |
THE EFFECTS OF USING COMPUTER FACILITATED PROBLEM SOLVING WITH GENERAL MATH STUDENTS |
KINGSBURY |
1992 |
DONNA F. HERRING |
FACTORS AFFECTING THE USE OF COMPUTERS IN CLASSROOMS |
MACFARLAND |
1992 |
MILES E. HITCHCOCK |
A PLAN FOR IMPLEMENTATION OF A COMPUTER ASSISTED ACADEMIC ADVISING SYSTEM AT CENTENARY COLLEGE OF LOUISIANA |
FORNSHELL |
1992 |
R. BRUCE HOSKEN |
A DEVELOPMENTAL MODEL FOR PARALLEL-PATH KNOWLEDGE ACQUISITION IN A COMPLEX MULTIPLE-DOMAIN EXPERT SYSTEM ENVIRONMENT |
SZABO |
1992 |
MICHAEL HOUSER |
A COMPUTER IN USE IN THE CLASSROOM |
KINGSBURY |
1992 |
HAROLD A. KIME |
EFFECTS OF COMPUTERIZED TOOLS IN TEACHING ENGLISH COMPOSITION FOR BASIC WRITERS |
KINGSBURY |
1992 |
EDMUND M. KOSMAHL |
INSTRUCTIONAL USE OF COMPUTERS FOR ENTRY LEVEL PHYSICAL THERAPY EDUCATION |
CENTINI |
1992 |
BERNARD J. KOVACH |
FIELD OFFICE AUTOMATION AND EVALUATION |
LEVIN |
1992 |
G. ERIC MCALLISTER |
ON UTILIZING COMPUTER BASED TELEDUCATION CSUSB MISSION 1&2 |
LEVIN |
1992 |
GARY D. MORFORD |
COOPERATIVE SCIENCE IN A COMPUTER MEDIATED COMMUN. ENVIRONMENT |
KINGSBURY |
1992 |
ALAN L. SMITH |
DSRS IMPLEMENTATION IN THE U.S. DEPT. OF DEFENSE |
LEVIN |
1992 |
RICHARD L. SMITH |
INVESTIGATION INTO THE RELATIONSHIP OF THE MYERS BRIGGS TYPE INDICATOR |
KINGSBURY |
1992 |
DANIEL S.. WALSH |
CONCEPTUAL FRAME WORK ENTERPRISE ARCHITECTURE MODEL TO SUPPORT INFO. SYSTEMS |
LIEBLEIN |
1992 |
JAN M. YATES |
AN ASSESSMENT OF TRENDS AND FACTORS AFFECTING FUTURE DIRECTIONS IN LIB & INFO SC. ED. |
LITTMAN |
1992 |
HYDER ZAHED |
EFFECTIVENESS OF COMPUTER BASED TRAINING VERSUS THE LECTURE METHOD ON LEARNING |
LITTMAN |
1992 |
THOMAS E. ALEXANDER |
STUDY TO EXAMINE THE EFFECTS OF COMPUTERS & TRADITIONAL TEACHING METHODS ON 9-11 YEAR OLD STUDENTS |
KINGSBURY |
1991 |
ARDELLA P. BALL |
INTEGRATING MICROCOMPUTER APPLICATIONS INTO LIBRARY MEDIA COURSES |
LITTMAN |
1991 |
JIMMY H. BARNES |
INVESTIGATION OF THE EFFECTIVENESS OF COMPUTER ASSISTED MATH INSTRUCTION |
KINGSBURY |
1991 |
LINDA M. BOETTNER |
COMPUTER ANXIETY: ITS RELATED CHARACTERISTICS AND ITS RELATIONSHIP TO ACHIEVEMENT IN COMPUTER LITERACY OF SLIPPERY ROCK UNIVERSITY STUDENTS |
KINGSBURY |
1991 |
LUELLA BOSMAN TEUTON |
MARKETING THE LEARNING RESOURCES CENTER AT SOUTH FLORIDA COLLEGE |
LITTMAN |
1991 |
LAURIE P. DRINGUS |
A STUDY OF DELAYED TIME AND REAL TIME TEXT-BASED COMPUTER-MEDIATED COMMUNICATION SYSTEMS ON GROUP DECISION MAKING PERFORMANCE |
ADAMS |
1991 |
MARY D. FOLEY |
BREAKING BARRIERS TO PUBLIC HIGH SCHOOL LIBRARY |
LITTMAN |
1991 |
ROBERT E. GLASS |
PROJECT PLAN TO ESTABLISH A COLLEGE ED. PROGRAM FOR SEVERELY IMPAIRED PEOPLE |
KINGSBURY |
1991 |
MONICA GLEASON |
THE DEVELOPMENT AND EVALUATION OF A HYPERTEXT COMPUTER-BASED TRAINING PROGRAM TO ASSIST IN DEVELOPING PUBLICATION SKILLS |
FORNSHELL |
1991 |
CATHY GRIMALDI |
THE DEVELOPMENT AND EVALUATION OF A HYPERTEXT COMPUTER-BASED-TRAINING PROGRAM FOR THE TRAINING OF NEW SUBSTITUTE TEACHERS IN OLD BRIDGE, NEW JERSEY |
FORNSHELL |
1991 |
DIANEN J. HALEY |
DESIGN OF SPECIFICATIONS FOR THE COMPUTER BASED TRAINING SYSTEM FOR AN AUTOMATED SMALL GROUP HOME FACILITY |
KINGSBURY |
1991 |
ARTHUR T. KOCH |
A STRATEGIC PLAN FOR ACADEMIC COMPUTING AT OHIO DOMINICAN COLLEGE |
KINGSBURY |
1991 |
MICHAEL S. KOGAN |
THE DESIGN OF OS/2 |
DEITEL |
1991 |
PETER A.C. LONG |
A STUDY OF THE PREDICTIVE RELATIONSHIP BETWEEN PERSONALITY TYPES AND MANAGERIAL STYLE IN PREDICTING RESISTANCE TO CHANGE |
CENTINI |
1991 |
JUNE A. PARSONS |
A META ANALYSIS OF LERNER CONTROL IN COMPUTER BASED LEARNING ENVIRONMENTS |
MACFARLAND |
1991 |
WILLIAM C. STEINMAN |
COMPARISON OF 2 APPROACHES TO SMALL COLLEGES LAN DESIGN |
KINGSBURY |
1991 |
KATHRYN SULLIVAN |
DISSERTATION REPORT IS 8995 USING DIALOG CIP |
LITTMAN |
1991 |
THERESA K. TOOHIL |
CURRICULUM-ORIENTED CAI BASED ON INSTRUCTIONAL TECHNOLOGY |
LITTMAN |
1991 |
JOYCE E. WOODY |
AN INTEGRATED NEEDS ASSESSMENT AND TRAINING PLAN MODEL FOR EMPLOYEES |
KINGSBURY |
1991 |
YOUNG-DONG YOO |
DEVELOPMENT OF AN EXPERT TRAINING SYSTEM PROTOTYPE LOOSELY COUPLED TO AN EXTERNAL DATABASE AND WORKSHEET |
LEVIN |
1991 |
STEVEN D. ZINK |
DESCRIPTIONS, ANALYSIS & CHARACTERISTICS OF THE RETRIEVAL OF HISTORICAL MATERIALS 1974-1979 |
FORNSHELL |
1991 |
JOANNE G. CORTESE |
PLANNING, PRODUCING & REPORTING A COMPUTER FAIR IN A LOCAL COMMUNITY |
MACFARLAND |
1990 |
WILLIAM C. CROSS |
THE EFFECT OF DISTRESS ON THE QUALITY OF COMPUTER PROGRAMMING |
KINGSBURY |
1990 |
MARY B. DEHN |
A FEASIBILITY STUDY OF AN AUTOMATED PUBLIC ACCESS CATALOG FOR THE GREAT NECK LIBRARY |
LITTMAN |
1990 |
GORDON FULLERTON |
THE DEVELOPMENT AND IMPLEMENTATION OF A BENCHMARK PROCESS FOR DISTRIBUTED RELATIONAL DATABASE MANAGEMENT SYSTEMS |
ADAMS |
1990 |
DANIEL K. HATTON |
OFFICE INFO SYSTEMS: IMPLEMENTATION PLANNING GUIDE FOR THE U.S. ARMY MEDICAL DEPARTMENT |
LEVIN |
1990 |
JERRY A. KATZ |
INTRO. OF OFFICE AUTOMATION & A DOCUMENT MANAGEMENT SYSTEM WITHIN MULTIPLE PLANT MANUFACTURING ORGANIZATION |
LEVIN |
1990 |
JOHN KISTLER |
EXPLORATORY QUALITATIVE STUDY FOR THE DESIGN & IMPLEMENTATION OF AN EDUCATION MENTORING PROG. FOR AT-RISK STUDENTS |
KINGSBURY |
1990 |
ALAN J. MATTHEWS |
COMPUTER AIDED SOFTWARE ENGINEERING (CASE) TOOLS FOR A COBOL SYSTEMS DEVELOPMENT ENVIRONMENT |
MURPHY |
1990 |
CAROL MIGLIN |
EFFECTIVENESS OF COMPUTER ASSISTED INSTRUCTION IN THE HIGH SCHOOL CHEMISTRY LAB |
MACFARLAND |
1990 |
DAVID S. MIZENER |
CREATION OF A MODEL AND A PARTIAL STRATEGIC PLAN FOR THE UNIVERSITY OF TEXAS PLAN AMERICAN LIBRARY |
LITTMAN |
1990 |
MICHAEL MORAN |
HYPERTEXT COMPUTER-ASSISTED INSTRUCTION FOR CERIATRIC PHYSICAL THERAPISTS |
CENTINI |
1990 |
MINDER RUCKER |
USING MICROCOMPUTER SOFTWARE TO REMEDIATE CRITICAL THINKING IN DISADVANTAGED STUDENTS |
MACFARLAND |
1990 |
CLOVIS L. TONDO |
DOCTORAL WORK SUMMARY |
ADAMS |
1990 |
CHARLES T. WUNKER |
THE POST-IMPLEMENTATION EVALUATION OF A DISTRIBUTED DATABASE ON A LOCAL ARE NETWORK |
LITTMAN |
1990 |
RANDY YOUNG |
A DSM-III-R STUDY OF COMPUTER ADDICTION AMONG IOWA COMPUTER USERS |
CENTINI |
1990 |
LINDA AVERILL |
A LOCAL AREA NETWORK IMPLEMENTED AT EVERETT HIGH SCHOOL |
LITTMAN |
1989 |
ZAN TAMAR BAILEY |
DEVELOPMENT & INTEGRATION OF COMPUTER ACTIVITIES INTO ELEMENTARY SCHOOLS |
MACFARLAND |
1989 |
MARILYN DOTSON |
THE DEVELOPMENT OF A 3 YEAR PLAN TO INTEGRATE COMPUTERS AND MATH IN THE UNDERGRAD LIBERAL ARTS |
MACFARLAND |
1989 |
NELLITA P. DUBOSE |
LIBRARY AUTOMATION IN SOUTH CAROLINA |
LITTMAN |
1989 |
JOSEPH M. FORMICA |
TEACHER AWARENESS OF STATE AND REGIONAL COMPUTER RELATED RESOURCES |
MACFARLAND |
1989 |
EVA GULBINOWICZ |
STUDY OF DTERMINE FEASIBILITY OF INSTALLING CD-ROM IN ONTARIO GOVT. LIBRARIES |
LITTMAN |
1989 |
JOHN M. KAISER |
MICROCOMPUTER BASED CAI SYSTEM TO COMPLEMENT INSTRUCTION IN NAVY TECHNICAL TRAINING |
MACFARLAND |
1989 |
PATRICIA LABBE |
IMPLEMENTING AN ONLINE PUBLIC ACCESS CATALOG IN A HIGH SCHOOL LIBRARY MEDIA CENTER |
LITTMAN |
1989 |
JACK LUSKIN |
COMPUTER CONFERENCING IN OCCUPATIONAL HEALTH & SAFETY TRAINING |
CENTINI |
1989 |
RICHARD D. MANNING |
ORGANIZATIONAL IMPLICATIONS OF THE ELECTRONIC TRANSFER OF INFORMATION |
LITTMAN |
1989 |
EARNESTINE T. MCCLOUD |
TEACHER UTILIZATION OF MIDDLE SCHOOL MEDIA PROGRAM |
LITTMAN |
1989 |
ROGER L. RATCHFORD |
IMPROVING WRITING IN SECONDARY SCHOOLS BY USING LAPTOPS |
MACFARLAND |
1989 |
NANCY L. TEGER |
STUDY OF A TELECOMMUNICATIONS PROJECT FOR SECONDARY SCHOOLS |
LITTMAN |
1989 |
MICHAEL THOMBS |
AN INSTRUMENT FOR THE DISTRIBUTION AND COLLECTION OF DATA USING COMPUTER BASED TECHNOLOGY |
MACFARLAND |
1989 |
ELIZABETH TWOHY |
BASIC SKILLS TRAINING PROGRAM FOR THE HANDICAPPED USING ADAPTIVE COMPUTER SOFTWARE |
MACFARLAND |
1989 |
JARMO VITELI |
LEARNING ENGLISH IDIOMS VIA COMPUTER ASSISTED LANGUAGE LEARNING N ENGLISH AS A 2ND LANGUAGE |
MACFARLAND |
1989 |
DOUGLAS W. WARNER |
A DBASE III PLUS SYSTEM FOR PROCESSING AND MAINTAINING HISTORICAL RECORDS ON STUDENTS’ EVALUATION OF INSTRUCTORS & COURSES |
MACFARLAND |
1989 |
ANTHONY R. YEBBA |
VOICE MAIL A WAY TO ENHANCE FACULTY OFFICE HOURS |
MACFARLAND |
1989 |
BARBARA M. YOUNG |
GUIDELINE FOR STRATEGIC PLANNING IN COMMUNITY COLLEGE LEARNING RESOURCE CENTERS: FL COMMUNITY COLLEGE EXPERIENCE |
LITTMAN |
1989 |
SUSAN ANDERSON |
RESOURCE SHARING: A STUDY OF FLORIDA’S SHARE USED LIBRARY COLLECTIONS |
LITTMAN |
1988 |
JANET C. ANDREWS |
INVESTIGATION OF CRITERIA USED BY BROWSERS WHEN SELECTING ADULT FICTION BOOKS IN A PUBLIC LIBRARY |
SCIGLIANO |
1988 |
EVELYN K. BONNER |
A STUDY OF PERCEPTIONS & USE OF SMALL COLLEGE CONSORTIUM LIBRARY BY FACULTY & STUDENTS |
SCIGLIANO |
1988 |
SALLY ANN CARR |
THE UTILIZATION OF COMPETITIVE INTELLIGENCE IN STRATEGIC PLANNING |
SCIGLIANO |
1988 |
ALBERT E. CORDES |
USING COMPUTERS IN THE COLLEGE PHYSICS LAB |
MACFARLAND |
1988 |
LARRY G. DAVID |
ANATOMY OF A SOFTWARE MAINTENANCE TRAINING PROGRAM |
SCIGLIANO |
1988 |
WALTER F. DEAL |
USING ARTIFICIAL INTELLIGENCE TO ASSIST FACULTY ADVISORS |
MURPHY |
1988 |
GLENDA DUDLEY |
BRIDGING COMPUTER INTERACTION PITFALLS: A MODEL FOR COMPUTER INTEGRATION IN SECONDARY SCHOOLS |
FORNSHELL |
1988 |
JOHN L. FUEYO |
APPLYING STRUCTURED PROGRAMMING SKILLS TO PROBLEM SOLVING USING C-PROLOG |
FORNSHELL |
1988 |
LINDA GUNTER |
A MICROCOMPUTER-BASED SYSTEM FOR INTERLIBRARY LOAN SERVICES IN A UNIVERSITY LIBRARY |
SCIGLIANO |
1988 |
FRANK D. IAZZETA |
A COMPUTERIZED PRACTICE SET FOR ALL FIRST SEMESTER FINANCIAL ACCOUNTING COURSES AT A COMMUNITY COLLEGE |
SPURLOCK |
1988 |
THOMAS L. JOHNSON |
STUDY OF DECISION STYLES OF INDIVIDUALS CHOOSING ALTERNATIVES WHEN THERE’S UNCERTAINTY |
SCIGLIANO |
1988 |
NANCY R. KEATING |
INTEGRATED ON-LINE MEDIA MANAGEMENT SYSTEMS FOR MEDIA CENTERS |
SCIGLIANO |
1988 |
KARENS. MCCONNELL |
A MODEL FOR IDENTIFYING SERIAL COLLECTION OVERLAP IN A UNION LIST OF SERIALS FOR PUBLIC UTILITY LIBRARIES |
SCIGLIANO |
1988 |
MARK MERRYWEATHER |
A FEASIBILITY STUDY OF AN ON-LINE SYSTEM FOR THE ONTARIO POLICE COMMISSION LIBRARY |
SCIGLIANO |
1988 |
LAWRENCE J. MISTOR |
AN EVALUATION OF THE USE OF MATHEMATICS GRADES AS A PREDICTOR VARIABLE OF STUDENT PERFORMANCE |
MACFARLAND |
1988 |
DAVID L. NORMAN |
DEVELOPMENT OF A MICROCOMPUTER FINANCIAL MODEL FOR VARIABLE TRAINING COSTS |
LEVIN |
1988 |
DOLORES PUSINS |
COURSEWARE DEVELOPMENT FOR THE INTEGRATION OF DESKTOP PUBLISHING |
MACFARLAND |
1988 |
PHILLIP M. ADAMS |
AN INTERACTIVE EXPERT SYSTEM BASED DIALOGUE MANAGER (AN EXPERT SYSTEM’S QUEST FOR KNOWLEDGE) |
E. SIMCO |
1987 |
PENELOPE A. BROWN |
COMPUTER PIRACY & THE COPYRIGHT LAW A CLARIFYING STATEMENT WITH ALTERNATIVE STRATEGIES FOR EDUCATION |
SCIGLIANO |
1987 |
JAMES L. BUCHHOLZ |
IMPLEMENTING & EVALUATING A BIBLIOGRAPHIC RETRIEVAL SYSTEM FOR PRINT & NON-PRINT MEDIA MATERIAL |
SCIGLIANO |
1987 |
PAUL L. CATANO |
TURNING AN EXPERT REFERENCE LIBRARIAN SKILL INTO COMPUTER SOFTWARE |
SCIGLIANO |
1987 |
CAROL W. CUBBERLEY |
ORGANIZATION FOR COLLECTION DEVELOPMENT IN MEDIUM-SIZED ACADEMIC LIBRARIES |
CENTINI |
1987 |
GEORGE K. FORNSHELL |
PROLOG IN COMPUTER-BASED LEARNING: A GENERAL PURPOSE INTERFACE FOR OVERCOMING LEARNING BLOCKS |
SCIGLIANO |
1987 |
DONALD A. GUERRIERO |
STRATEGIC PLANNING FOR A SPECIAL LIBRARY |
SCIGLIANO |
1987 |
NELLIE S. KREIS |
A FEASIBILITY STUDY OF THE IMPLEMENTATION OF CD ROM DATABASES IN SECONDARY SCHOOL LIBRARY |
SCIGLIANO |
1987 |
RENA W. ROGGE |
LIBRARY PRESENCE: A TOOL FOR RECOGNITION |
SCIGLIANO |
1987 |
MADELYN F. VALUNAS |
A STUDY OF ORGANIZATIONAL CLIMATE IN PENNSYLVANIA’S STATE SYSTEM OF HIGHER EDUCATION LIBRARIES |
LITTMAN |
1987 |
MARLYN KEMPER |
NETWORKING: CHOOSING A LAN PATH TO INTERCONNECTION |
J. HANNIGAN |
1986 |