| AUTHOR |
TITLE |
CHAIR |
YEAR |
| ROSEANNE ALHINDI |
A STUDY OF USER EXPERIENCES OF PEDIATRIC PHYSICIANS WITH ELECTRONIC HEALTH RECORD SYSTEMS: ENCOUNTERS WITH TASK COMPLEXITY AND EFFICIENCY OF USER TASK FLOWS |
DRINGUS |
2025 |
| OUSMANE BARRY |
ENHANCED NETWORK ANOMALY DETECTION USING DEEP LEARNING MODELS |
MUKHERJEE |
2025 |
| BRIAN BISCEGLIA |
AN EMPIRICAL ASSESSMENT ON THE ROLE OF PERSUASION PRINCIPLES AND CYBERSECURITY SKILLS TRAINING ON SENIOR CITIZENS SMISHING SUSCEPTIBILITY |
LEVY |
2025 |
| DWAYNE FORD |
EXAMINING THE DISCLOSURE OF SENSITIVE INFORMATION THROUGH MOBILE APPLICATIONS: A PRIVACY CALCULUS AND WARNING EXPERIMENT ON LOCATION BASED SERVICES |
WANG |
2025 |
| OSCAR HO |
COMBATING DISINFORMATION ON SOCIAL MEDIA NETWORKS WITH MEDIA AND INFORMATION LITERACY TRAINING FOR SOCIAL MEDIA NETWORK USERS |
WANG |
2025 |
| HEMANT KULKARNI |
TO EXAMINE THE EFFECT OF USER-CENTRIC APPROACHES ON CONSUMER’S TRUST AND CONTINUED USE OF IOT DEVICES |
WANG |
2025 |
| YONAS MULISSA |
A HYBRID DEEP LEARNING MODEL FOR IOT NETWORK ANOMALY DETECTION |
LI |
2025 |
| ANDY SANTANA |
AN EVALUATION OF DATA PROTECTION AND PRIVACY ISSUES INTRODUCED BY BRING YOUR OWN DEVICES IN FINANCIAL INSTITUTIONS |
WANG |
2025 |
| LIONEL STANDRIDGE |
ARCHITECTURAL TECHNICAL DEBT - MIGRATING OBJECT ORIENTED SYSTEMS TO MODULAR ARCHITECTURES |
MITROPOULOS |
2025 |
| ERIC WEBB |
IMPLEMENTING RSA ACCUMULATORS FOR ASYNCHRONOUS AND PERMISSIONLESS RELIABLE BROADCASTING |
SIMCO |
2025 |
| KIMON ANDREOU |
ENHANCING SENTIMENT ANALYSIS IN NICHE DOMAINS: INTRODUCING DIVERSE DATASETS AND EVALUATING MODEL PERFORMANCE IN CAR DEALERSHIP AND BOARD GAME REVIEWS |
MUKHERJEE |
2024 |
| JOHN DEL VECCHIO |
DEVELOPMENT OF CYBERSECURITY FOOTPRINT INDEX FOR MANUFACTURING COMPANIES TO ASSESS ORGANIZATIONAL CYBER POSTURE |
LEVY |
2024 |
| MUNTHER GHAZAWNEH |
ASSESSING ORGANIZATIONAL INVESTMENTS IN CYBERSECURITY AND FINANCIAL PERFORMANCE BEFORE AND AFTER DATA BREACH INCIDENTS OF CLOUD SAAS PLATFORMS |
LEVY |
2024 |
| ANDREA GREEN |
STUDENT CONCERNS FOR CONTINUOUS AUTHENTICATION ASSURANCE METHODS APPLIED TO MITIGATE IMPERSONATION ATTACKS DURING E-ASSESSMENTS |
WANG |
2024 |
| HOLLIS GREENBERG |
HEED THE WARNING SIGNS: THE EFFECTIVENESS OF MESSAGE POPUP WARNINGS FOR DETERRING THE SPREAD OF MISINFORMATION |
DRINGUS |
2024 |
| JANICE JAMES |
A TECHNIQUE FOR VISUALIZATION OF MULTIVARIATE CATEGORICAL DATA |
LASZLO |
2024 |
| OLADAYO LUKE |
ENHANCING SIGN LANGUAGE RECOGNITION AND HAND GESTURE DETECTION USING CONVOLUTIONAL NEURAL NETWORKS AND DATA AUGMENTATION TECHNIQUES |
MUKHERJEE |
2024 |
| ARIEL LUNA |
EMPIRICAL ASSESSMENT OF REMOTE WORKERS’ CYBERSLACKING AND COMPUTER SECURITY POSTURE TO ASSESS ORGANIZATIONAL CYBERSECURITY RISKS |
LEVY |
2024 |
| JUAN MADRID |
DEVELOPMENT OF THE PASSWORD ALLEVIATING ABSTRACTION, REMEMBERING AND STRENGTH (PALABRAS) METHOD |
LEVY |
2024 |
| RONALD OAKES |
CONSTRUCTED LANGUAGE (CONLANG) AUDIO HONING |
LASZLO |
2024 |
| AARON RAMEY |
USING ONTOLOGICAL METHODS TO COMPARE CYBERSECURITY MATURITY MODEL CERTIFICATION 2.0 AND COBIT 19 |
WANG |
2024 |
| ANDREW RAMOS |
THE NUTRITION LABEL APPROACH: SATIATING U.S. CONSUMER CONCERNS FOR INFORMATION PRIVACY (CFIP) WITH PRIVACY HOME AUTOMATION ASSESSMENT SCORECARDS (PHAATS) |
WANG |
2024 |
| EIDAN ROSADO |
PRIVACY VS. SOCIAL CAPITAL: EXAMINING INFORMATION DISCLOSURE PATTERNS WITHIN SOCIAL MEDIA INFLUENCER NETWORKS |
WANG |
2024 |
| DARREN WIGGINS |
UNDERSTANDING THE ROLE OF TACIT AND EXPLICIT KNOWLEDGE HIDING IN ORGANIZATIONS |
WANG |
2024 |
| CONRAD BELL |
ASPECT-ADVICE INTERFERENCE: DATA INTERACTIONS IN ASPECTJ |
MITROPOULOS |
2023 |
| VANESSA COOPER |
OPTIMIZING CONSTRAINT SELECTION IN A DESIGN VERIFICATION ENVIRONMENT FOR EFFICIENT COVERAGE CLOSURE |
MUKHERJEE |
2023 |
| SHERI JAMES |
A STUDY OF THE EFFECT OF TYPES OF ORGANIZATIONAL CULTURE ON INFORMATION SECURITY PROCEDURAL COUNTERMEASURES |
WANG |
2023 |
| JAMES LOVING |
THE APPLICATION OF GENOMIC COMPRESSION TECHNIQUES TO NETWORK TRAFFIC |
CANNADY |
2023 |
| DAVID NOEL |
AN INVESTIGATION OF METHODS FOR IMPROVING SPATIAL INVARIANCE OF CONVOLUTIONAL NEURAL NETWORKS FOR IMAGE CLASSIFICATION |
MUKHERJEE |
2023 |
| MICHAEL ROONEY |
AN EMPIRICAL ASSESSMENT OF THE USE OF PASSWORD WORKAROUNDS AND THE CYBERSECURITY RISK OF DATA BREACHES |
LEVY |
2023 |
| JACKIE SCOTT |
COMPARING PHISHING TRAINING AND CAMPAIGN METHODS FOR MITIGATING MALICIOUS EMAILS IN ORGANIZATIONS |
LEVY |
2023 |
| ANABETSY TERMINI |
ADVERSARIAL TRAINING OF DEEP NEURAL NETWORKS |
MUKHERJEE |
2023 |
| ANDRE VIEIRA |
INTEGRATING THE SPATIAL PYRAMID POOLING STRATEGY INTO 3D CONVOLUTIONAL NEURAL NETWORKS FOR AUTOMATIC DETECTION OF CEREBRAL MICROBLEEDS |
MUKHERJEE |
2023 |
| ENAS ALBATAINEH |
IMPROVING EMPLOYEES’ COMPLIANCE WITH PASSWORD POLICIES |
WANG |
2022 |
| PATRICIA BAKER |
A UNIVERSAL CYBERSECURITY COMPETENCY FRAMEWORK FOR ORGANIZATIONAL USERS |
LEVY |
2022 |
| GEORGE COOPER |
IMPACT OF KNOWLEDGE MANAGEMENT PROCESSES UPON JOB SATISFACTION AND JOB PERFORMANCE |
WANG |
2022 |
| MUDASSAR GHAZI |
DIAGNOSIS OF ERRORS IN STALLED INTER-ORGANIZATIONAL WORKFLOW PROCESSES |
MITROPOULOS |
2022 |
| ELJILANI HMOUDA |
A VALIDITY BASED APPROACH FOR FEATURE SELECTION IN INTRUSION DETECTION SYSTEMS |
LI |
2022 |
| WINNYANNE KUNKLE |
INVESTIGATING THE USER EXPERIENCE OF A 3D VIRTUAL ANATOMY SYSTEM |
DRINGUS |
2022 |
| KEVIN PARVIZ |
AN EMPIRICAL INVESTIGATION OF THE EVIDENCE RECOVERY PROCESS IN DIGITAL FORENSICS |
MUKHERJEE |
2022 |
| TOMMY POLLOCK |
EXPERIMENTAL STUDY TO ASSESS THE ROLE OF ENVIRONMENT AND DEVICE TYPE ON THE SUCCESS OF SOCIAL ENGINEERING ATTACKS: THE CASE OF JUDGMENT ERRORS |
LEVY |
2022 |
| AMMAR QAFFAF |
FACTORS AFFECTING CUSTOMERS’ DECISION TO SHARE PERSONAL DATA WITH MOBILE OPERATORS |
WANG |
2022 |
| HARI ROOSMAN |
INFORMATION SYSTEMS SECURITY COUNTERMEASURES: AN ASSESSMENT OF OLDER WORKERS IN INDONESIAN SMALL AND MEDIUM-SIZED BUSINESSES |
SNYDER |
2022 |
| HIMA BINDU SADASHIVA REDDY |
EXPLORING THE EXISTING AND UNKNOWN SIDE EFFECTS OF PRIVACY PRESERVING DATA MINING ALGORITHMS |
WANG |
2022 |
| ABRAR TURKISTANI |
THE APPLICATION OF BLOCKCHAIN TECHNOLOGY TO PROTECT AUTHOR’S COPYRIGHT |
HUR |
2022 |
| BRADLEY WANGIA |
SOCIAL MEDIA ANALYTICS AND INFORMATION PRIVACY DECISIONS: IMPACT OF USER INTIMATE KNOWLEDGE AND CO-OWNERSHIP PERCEPTIONS |
WANG |
2022 |
| CESAR ZALZALAH |
AN APPROACH FOR EFFICIENT ROBUST ADVERSARIAL TRAINING IN DEEP NEURAL NETWORKS |
LI |
2022 |
| AMY ANTONUCCI |
PAUSE FOR A CYBERSECURITY CAUSE: ASSESSING THE INFLUENCE OF A WAITING PERIOD ON USER HABITUATION IN MITIGATION OF PHISHING ATTACKS |
LEVY |
2021 |
| DAVID ASON |
NEURAL NETWORK VARIATIONS FOR TIME SERIES FORECASTING |
MUKHERJEE |
2021 |
| MAY BANTAN |
ASSESSING LEARNER’S PRIVACY BEHAVIORS THROUGH THE LENS OF GENDER EGALITARIANISM CULTURAL FACTOR IN A BLENDED-LEARNING CONTEXT: STUDENT’S PERSPECTIVE AT SAUDI ELECTRONIC UNIVERSITY |
WANG |
2021 |
| HENRY BRUCKMAN |
AUDITORY FEEDBACK IN INTEGRATED DEVELOPMENT ENVIRONMENTS TO PROVIDE COGNITIVE SUPPORT FOR NOVICE DEVELOPERS |
LASZLO |
2021 |
| CHRIS BUSH |
PROTECTING THE PROTECTOR: MAPPING THE KEY TERRAIN THAT SUPPORTS THE CONTINUOUS MONITORING MISSION OF A CYBERSECURITY SERVICE PROVIDER |
ABRAMSON |
2021 |
| ERNESTO CUSTODIO |
THE CONSTRUCTION AND INTERNAL VALIDATION OF A MODEL FOR THE EFFECTIVE COLLABORATION OF DISTRIBUTED AGILE TEAMS |
SNYDER |
2021 |
| ALI EL-SHARIF |
TRUSTED MACHINE LEARNING MODEL FOR CLINICAL DECISION MAKING |
MUKHERJEE |
2021 |
| TITUS FOFUNG |
EXAMINATION OF THE COMPUTER SECURITY BEHAVIORS OF TELECOMMUTERS WORKING WITH CONFIDENTIAL DATA THROUGH LEVERAGING THE FACTORS FROM FEAR APPEALS MODEL (FAM) |
WANG |
2021 |
| FRED GUYTON |
FEATURE SELECTION ON PERMISSIONS, INTENTS, AND APIS FOR ANDROID MALWARE DETECTION |
LI |
2021 |
| DOUGLAS HALE |
INVESTIGATION OF ANT COLONY OPTIMIZATION IMPLEMENTATION STRATEGIES FOR LOW-MEMORY OPERATING ENVIRONMENTS |
MUKHERJEE |
2021 |
| RAMON HURLOCKDICK |
HOW NON-COMPLIANCE IMPACTS SECURITY INCIDENTS: A PUBLIC SECTOR CASE STUDY OF APPLICATION SECURITY AND PROPER DATA GOVERNANCE |
WANG |
2021 |
| ROBERT JONES |
AN ASSESSMENT OF SOCIAL MEDIA INPUTS AND COURT CASE INFORMATION WITH THE IMPACTS TO MITIGATE INSIDER THREATS |
WANG |
2021 |
| CELESTINE KEMAH |
AN EMPIRICAL EXAMINATION OF THE IMPACT OF ORGANIZATIONAL INJUSTICE AND NEGATIVE AFFECT ON ATTITUDE AND NON-COMPLIANCE WITH INFORMATION SECURITY POLICY |
WANG |
2021 |
| JOHN MARSH |
THE IMPACT OF INFORMATION PRIVACY CONCERNS ON ACTUAL USER PRIVACY PRESERVING BEHAVIORS |
ZINK |
2021 |
| ROMAN MELNYK |
CLASSIFYING FINANCIAL SOFTWARE DEVELOPMENT DOCUMENTATION IN KNOWLEDGE DISCOVERY SYSTEMS |
SNYDER |
2021 |
| NISHA PATEL |
AN EMPIRICAL ASSESSMENT OF USERS’ INFORMATION SECURITY PROTECTION BEHAVIOR TOWARDS SOCIAL ENGINEERING BREACHES |
WANG |
2021 |
| TYLER PIERON |
EXAMINING THE INFLUENCE OF PERCEIVED RISK ON THE SELECTION OF INTERNET ACCESS IN THE U.S. INTELLIGENCE COMMUNITY |
WANG |
2021 |
| LEONARD POUNDS |
A FRAMEWORK FOR ARTIFICIAL INTELLIGENCE APPLICATIONS IN THE HEALTHCARE REVENUE CYCLE MANAGEMENT |
SIMCO |
2021 |
| JOSEPH SQUILLACE |
EXAMINATION OF CORPORATE INVESTMENTS IN PRIVACY: AN EVENT STUDY |
TEJAY |
2021 |
| MICHAEL STEWART |
INCREASING SOFTWARE RELIABILITY USING MUTATION TESTING AND MACHINE LEARNING |
MITROPOULOS |
2021 |
| EDGARDO VELEZ |
ENTERPRISE SOCIAL NETWORK SYSTEMS IMPLEMENTATION MODEL FOR KNOWLEDGE SHARING AMONG SUPPLY CHAIN IT PROFESSIONALS |
SNYDER |
2021 |
| ZULMA WESTNEY |
THE SOCIAL MEDIA MACHINES: AN INVESTIGATION OF THE EFFECT OF DISINFORMATION MODERATED BY TRUST ON USERS’ DECISION-MAKING PROCESS |
WANG |
2021 |
| WILLIAM WILKERSON |
DEVELOPMENT OF A SOCIAL ENGINEERING EXPOSURE INDEX (SEXI) USING OPEN SOURCE PERSONAL INFORMATION |
LEVY |
2021 |
| JONATHAN ADKINS |
AN APPROACH TO TWITTER EVENT DETECTION USING THE NEWSWORTHINESS METRIC |
LI |
2020 |
| AYMAN ABDULAZIZ M ALFAHID |
PERSPECTIVES OF ONLINE INSTRUCTORS TOWARDS DISTANCE LEARNING TECHNOLOGIES AT THE SAUDI ELECTRONIC UNIVERSITY (SEU) |
WANG |
2020 |
| JAREAU ALMEYDA |
A COVID-19 INDUCED SHIFT: FROM INTRODUCING HIGH SCHOOL FEMALES TO COMPUTING CAREERS TO AN ASSESSMENT OF TECHNOLOGICAL READINESS AMONG STEM TEACHERS |
SNYDER |
2020 |
| NAWWAF MOHSSEN A ALTALHI |
SNS AS AN EDUCATIONAL TOOL: EFFECT ON ACADEMIC PERFORMANCE AND LEARNERS’ PERCEPTIONS |
WANG |
2020 |
| ELIZABETH ARCENEAUX |
IDENTIFYING PHYSICIANS USER EXPERIENCE (UX) PAIN POINTS IN USING ELECTRONIC HEALTH RECORD (EHR) SYSTEMS |
DRINGUS |
2020 |
| JEFFREY BARNETT |
A HIERARCHICAL TEMPORAL MEMORY SEQUENCE CLASSIFIER APPLICATION FOR CLASSIFYING STREAMING DATA |
CANNADY |
2020 |
| TRACY BIERMAN |
IMPROVING ITERATED LOCAL SEARCH FOR MICROAGGREGATION |
LASZLO |
2020 |
| GARRY BLACKSTOCK |
ORGANIZATIONAL CULTURE AND KNOWLEDGE TRANSFER IN ENTERPRISE SOCIAL MEDIA |
WANG |
2020 |
| DONALD BURGIO |
REDUCTION OF FALSE POSITIVES IN INTRUSION DETECTION BASED ON EXTREME LEARNING MACHINE WITH SITUATION AWARENESS |
CANNADY |
2020 |
| VASILKA CHERGAROVA |
FACTORS AFFECTING SOFTWARE DEFINED NETWORKING ADOPTION BY RESEARCH AND EDUCATIONAL NETWORKS |
HUR |
2020 |
| MOLLY COOPER |
ASSESSMENT OF AUDIO AND VISUAL WARNINGS TO MITIGATE RISK OF PHISHING ATTACKS |
LEVY |
2020 |
| DARRELL EILTS |
AN EMPIRICAL ASSESSMENT OF CYBERSECURITY READINESS AND RESILIENCE IN SMALL BUSINESSES |
LEVY |
2020 |
| ANTHONY FAULDS |
ADAPTIVE BATCH SIZE SELECTION IN ACTIVE LEARNING FOR REGRESSION |
MUKHERJEE |
2020 |
| JAMES FURSTENBERG |
AN INVESTIGATION OF THE FACTORS THAT CONTRIBUTE TO THE PERCEIVED LIKELIHOOD OF COMPLIANCE WITH THE HIPAA SECURITY RULE AMONG HEALTHCARE COVERED ENTITIES AND BUSINESS ASSOCIATES |
WANG |
2020 |
| ANDREW GREEN |
AN INVESTIGATION OF SNS USE BY EXECUTIVES |
PARRISH |
2020 |
| LOVE JAMES |
SMART PRIVACY FOR IOT: PRIVACY EMBEDDED DESIGN FOR HOME AUTOMATION SYSTEMS |
WANG |
2020 |
| EMMANUEL JIGO |
DEVELOPMENT OF CRITERIA FOR MOBILE DEVICE CYBERSECURITY THREAT CLASSIFICATION AND COMMUNICATION STANDARD USING LABELS, PICTOGRAM, AS WELL AS SAFETY DATA SHEETS |
LEVY |
2020 |
| ELLIOTTE KIM |
REDUCING BITTORRENT DOWNLOAD TIME VIA HANDSHAKE-BASED SWITCHING |
SIMCO |
2020 |
| JEFFREY LASKY |
THE IMPACT OF CROSS-REFERENCES ON THE READABILITY OF THE U.S. INTERNAL REVENUE CODE |
SEAGULL |
2020 |
| NILS LAU |
THE ROLE OF COGNITIVE FACTORS AND PERSONALITY TRAITS ON MOBILE USER’S INFORMATION SECURITY BEHAVIOR |
WANG |
2020 |
| CAROL LENIHAN |
A PCNN FRAMEWORK FOR BLOOD CELL IMAGE SEGMENTATION |
LASZLO |
2020 |
| MARIO LORENZO |
CLASSIFYING RELATIONS USING RECURRENT NEURAL NETWORK WITH ONTOLOGICAL-CONCEPT EMBEDDING |
MUKHERJEE |
2020 |
| EVETTE MAYNARD-NOEL |
AN INVESTIGATION OF FACTORS MOTIVATING EMPLOYEE ATTITUDES, INTENTIONS, AND BEHAVIORS TO SHARE KNOWLEDGE IN HOMELAND SECURITY |
PAUL |
2020 |
| JOHN MCCONNELL |
UNIX ADMINISTRATOR INFORMATION SECURITY POLICY COMPLIANCE: THE INFLUENCE OF A FOCUSED SETA WORKSHOP AND INTERACTIVE SECURITY CHALLENGES ON HEURISTICS AND BIASES |
SNYDER |
2020 |
| STEPHEN MUSEMBWA |
DEVELOPING A SENSE OF COMMUNITY IN SOCIAL NETWORKING SITES |
PAUL |
2020 |
| MUTHARASU NARAYANA PERUMAL |
DEEP NEURAL NETWORKS FOR SENTIMENT ANALYSIS IN TWEETS WITH EMOTICONS |
MUKHERJEE |
2020 |
| BILL NOFFSINGER |
PREDICTIVE ACCURACY OF RECOMMENDER ALGORITHMS. |
MUKHERJEE |
2020 |
| OSBORNE OBENG |
EXAMINING THE CREATION OF INFORMATION PRIVACY CULTURE IN HEALTHCARE ORGANIZATIONS TO ACHIEVE COLLECTIVE HIPAA COMPLIANCE PRACTICE |
PAUL |
2020 |
| GUILLERMO PEREZ |
CYBERSECURITY SITUATIONAL AWARENESS AND CYBER CURIOSITY TAXONOMY FOR UNDERSTANDING SUSCEPTIBILITY OF SOCIAL ENGINEERING ATTACKS: CASE OF THE MARITIME INDUSTRY |
LEVY |
2020 |
| WILLIAM REED |
THE FACTORS THAT IMPACT PATIENT PORTAL UTILIZATION |
ABRAMSON |
2020 |
| ANH-HONG RUCKER |
IMPROVING REAL-TIME INTRUSION DETECTION IN DYNAMIC NETWORKS WITH HIGHLY IMBALANCED DATA USING A DATA STREAM MINING APPROACH |
CANNADY |
2020 |
| ARISAPHAT SUTTIDEE |
USABILITY OF PORTABLE EEG FOR MONITORING STUDENTS’ ATTENTION IN ONLINE LEARNING |
WANG |
2020 |
| CHRIS WILDER |
THE IMPACT OF UNCERTAINTY AND FAIRNESS ON EMPLOYEE INTENTION TO COMPLY WITH INFORMATION SECURITY POLICY |
PARRISH |
2020 |
| MARCUS WINKFIELD |
INFORMATION SYSTEMS SECURITY LEADERSHIP: AN EMPIRICAL STUDY OF BEHAVIORAL INFLUENCES OF LEADERS ON EMPLOYEES’ SECURITY COMPLIANCE |
TEJAY |
2020 |
| DAVID ZEICHICK |
DETECTING ROGUE MANIPULATION OF SMART HOME DEVICE SETTINGS |
LI |
2020 |
| MOHAMMED NAIF M ALATAWI |
EXAMINING THE IMPACT OF LEARNING MANAGEMENT SYSTEMS IN COMPUTER PROGRAMMING COURSES |
WANG |
2019 |
| SHAHAR AVIV |
AN EXAMINATION OF USER DETECTION OF BUSINESS EMAIL COMPROMISE AMONGST CORPORATE PROFESSIONALS |
LEVY |
2019 |
| NEELIMA BHATNAGAR |
MOTIVATION FACTORS FOR USING MOBILE INFORMATION SYSTEMS IN M-LEARNING |
COHEN |
2019 |
| EMILY BROWN |
ADAPTABLE PRIVACY PRESERVING MODEL |
CANNADY |
2019 |
| ALVA BULLARD |
EXAMINING SHARED UNDERSTANDING AND TEAM PERFORMANCE OF GLOBAL VIRTUAL TEAMS |
PAUL |
2019 |
| JAMES CLARK |
IMPROVING USMLE STEP 1 STUDENT OUTCOMES USING PREDICTIVE MODELING |
TERRELL |
2019 |
| BRENDA DELEE |
THE ROLE OF DISABILITY SUPPORT STAFF IN HIGHER EDUCATION |
ABRAMSON |
2019 |
| MARC DOYLE |
COMPREHENDING THE SAFETY PARADOX AND PRIVACY CONCERNS WITH MEDICAL DEVICE REMOTE PATIENT MONITORING |
COHEN |
2019 |
| DIAA FATHALLA |
ORLEASE: OPTIMISTICALLY REPLICATED LEASE FOR HIGHER REPLICA CONSISTENCY IN OPTIMISTIC REPLICATION SYSTEMS |
SIMCO |
2019 |
| JOHN FLEIG |
CITATIONALLY ENHANCED SEMANTIC LITERATURE BASED DISCOVERY |
SUN |
2019 |
| VIVIENNE FORRESTER |
USER INFORMATION SECURITY BEHAVIOR IN PROFESSIONAL VIRTUAL COMMUNITIES: A TECHNOLOGY THREAT AVOIDANCE APPROACH |
WANG |
2019 |
| BENJAMIN GEISLER |
GAMESPECT: A COMPOSITION FRAMEWORK AND META-LEVEL DOMAIN SPECIFIC ASPECT LANGUAGE FOR UNREAL ENGINE 4 |
MITROPOULOS |
2019 |
| ANTHONY GIWAH |
EMPIRICAL ASSESSMENT OF MOBILE DEVICE USERS INFORMATION SECURITY BEHAVIOR TOWARDS DATA BREACH: LEVERAGING PROTECTION MOTIVATION THEORY |
WANG |
2019 |
| KATHLEEN GOESCHEL |
FEATURE SET SELECTION FOR IMPROVED CLASSIFICATION OF STATIC ANALYSIS ALERTS |
MUKHERJEE |
2019 |
| JAMES GORHAM |
AN INVESTIGATION OF THE IMPACT OF SOCIAL NETWORKING ON KNOWLEDGE SHARING |
PARRISH |
2019 |
| LINDA GREENE |
KNOWLEDGE SHARING BEHAVIOR: UNDERSTANDING COMMUNICATION MEDIA AFFORDANCES AND THE ROLE OF INFORMATION SECURITY |
HUR |
2019 |
| HELEN HERNANDEZ |
USABILITY CHALLENGES WITH INSULIN PUMP DEVICES IN DIABETES CARE: WHAT TRAINERS OBSERVE WITH FIRST-TIME PUMP USERS |
DRINGUS |
2019 |
| LILIANA HORNE |
DEVELOPMENT OF A CLIENT-SIDE EVIL TWIN ATTACK DETECTION SYSTEM FOR PUBLIC WI-FI HOTSPOTS BASED ON DESIGN SCIENCE RESEARCH |
PARRISH |
2019 |
| ANGEL HUECA |
DEVELOPMENT AND VALIDATION OF A PROOF-OF-CONCEPT PROTOTYPE FOR ANALYTICS-BASED MALICIOUS CYBERSECURITY INSIDER THREAT IN REAL-TIME IDENTIFICATION SYSTEM |
LEVY |
2019 |
| DINESH KHIALANI |
THE INFLUENCE OF WEBSITE DESIGN ON ONLINE TRUST IN ELECTRONIC COMMERCE RETAILING ENVIRONMENTS |
COHEN |
2019 |
| JAMES KING |
GENE ONTOLOGY-GUIDED FORCE-DIRECTED VISUALIZATION OF PROTEIN INTERACTION NETWORKS |
LASZLO |
2019 |
| JOHN LYNDEN |
HYBRID METAHEURISTICS – DIVERSIFICATION V INTENSIFICATION |
MUKHERJEE |
2019 |
| VINCENT MOLOSKY |
THE INFLUENCE OF IDENTIFIABLE PERSONALITY TRAITS ON NURSES’ INTENTION TO USE WIRELESS IMPLANTABLE MEDICAL DEVICES |
COHEN |
2019 |
| GARRET MOORE |
A HYBRID (ACTIVE-PASSIVE) VANET CLUSTERING TECHNIQUE |
LIU |
2019 |
| LAKESHIA NALL |
INSTRUCTIONAL DESIGNERS AS PROJECT MANAGERS: A PHENOMENOLOGY |
SNYDER |
2019 |
| HAROLD OSBORN |
EXAMINING TASK CONFLICT AND TEAM ATMOSPHERE IN VIRTUAL TEAMS ENGAGED IN OUTSOURCED PROJECT WORK |
PAUL |
2019 |
| ROBERT SAGANICH |
AN INVESTIGATION OF ELECTRONIC PROTECTED HEALTH INFORMATION (E-PHI) PRIVACY POLICY LEGISLATION IN CALIFORNIA FOR SENIORS USING IN-HOME HEALTH MONITORING SYSTEMS |
COHEN |
2019 |
| DAVE SCHUBERT |
AN INSTRUCTIONAL DESIGNER COMPETENCY FRAMEWORK FOR COMPLEX LEARNING DESIGNS |
SNYDER |
2019 |
| WILLARVIS SMITH |
A COMPREHENSIVE CYBER DEFENSE SECURITY FRAMEWORK FOR LARGE ORGANIZATIONS |
ELLIS |
2019 |
| ADAM SOLOMON |
A NOVEL COOPERATIVE INTRUSION DETECTION SYSTEM FOR MOBILE AD HOC NETWORKS |
CANNADY |
2019 |
| JULIEO THOMPSON |
THE EVOLUTION OF TECHNOLOGY IN CALL CENTERS |
ABRAMSON |
2019 |
| ALEXANDER VERNER |
LSTM NETWORKS FOR DETECTION AND CLASSIFICATION OF ANOMALIES IN RAW SENSOR DATA |
MUKHERJEE |
2019 |
| BECKY WHITTEMORE |
A NEWBORN SCREENING DISORDERS ONLINE PORTAL FOR PRIMARY CARE PROVIDERS AND PARENTS |
ABRAMSON |
2019 |
| KIM WITHERS |
A PSYCHOSOCIAL BEHAVIORAL ATTRIBUTION MODEL: EXAMINING THE RELATIONSHIP BETWEEN THE DARK TRIAD” AND DEVIANT BEHAVIORS IMPACTING SOCIAL NETWORKING SITES |
PARRISH |
2019 |
| HATEM YAZBEK |
ADAPTIVE STRATEGIES OF MULTI-OBJECTIVE OPTIMIZATION FOR GREENER NETWORKS |
LIU |
2019 |
| ADAM ALBINA |
ASSESSING THE IMPACT OF A GEOSPATIAL INFORMATION SYSTEM FOR IMPROVING CAMPUS EMERGENCY DECISION MAKING OF NOVICE CRISIS MANAGERS |
ABRAMSON |
2018 |
| SALEH HAMED A ALHARTHI |
A DEVELOPMENTAL RESEARCH OF A TAXONOMY FOR EMPLOYEES’ MOBILE DEVICE CYBERSLACKING AND COMMITMENT TO THE ORGANIZATION IN THE CONTEXT OF PRODUCTIVITY |
LEVY |
2018 |
| FAHAD MOSLEH M ALSAADI |
KNOWLEDGE SHARING AMONG ACADEMICS IN HIGHER EDUCATION INSTITUTIONS IN SAUDI ARABIA |
SNYDER |
2018 |
| IQBAL AMIRI |
THE EFFICACY OF BIG DATA SECURITY, TRUST, LEADERSHIP, INFORMATION SENSITIVITY, PRIVACY CONCERN AND JOB REWARD ON DISCLOSING PERSONAL SECURITY INFORMATION ONLINE |
WANG |
2018 |
| MANSOUR HAMOUD M AWAJI |
EVALUATION OF MACHINE LEARNING TECHNIQUES FOR EARLY IDENTIFICATION OF AT-RISK STUDENTS |
MUKHERJEE |
2018 |
| ALI BAKER |
AN INVESTIGATION OF THE INTERACTION BETWEEN ORGANIZATIONAL CULTURE AND KNOWLEDGE SHARING THROUGH SOCIALIZATION: A MULTI-LEVEL PERSPECTIVE |
ELLIS |
2018 |
| ANDREW BERRY |
PERCEPTION AND USAGE OF SOCIAL NETWORKING WEBSITES AMONG SENIOR ADULTS |
COHEN |
2018 |
| CARLENE BLACKWOOD-BROWN |
AN EMPIRICAL ASSESSMENT OF SENIOR CITIZENS’ CYBERSECURITY AWARENESS, COMPUTER SELF-EFFICACY, PERCEIVED RISK OF IDENTITY THEFT, ATTITUDE, AND MOTIVATION TO ACQUIRE CYBERSECURITY SKILLS |
LEVY |
2018 |
| MARION BROWN |
ASSESSING THE ROLE OF CRITICAL VALUE FACTORS (CVFS) ON USERS’ RESISTANCE TO USE URBAN SEARCH AND RESCUE ROBOTICS |
LEVY |
2018 |
| DAMON BRUCCOLERI |
DATABASE STREAMING COMPRESSION ON MEMORY-LIMITED MACHINES |
SUN |
2018 |
| KARLA CLARKE |
NOVEL ALERT VISUALIZATION: THE DEVELOPMENT OF A VISUAL ANALYTICS PROTOTYPE FOR MITIGATION OF MALICIOUS INSIDERS CYBER THREAT |
LEVY |
2018 |
| THERESA CURRAN |
STANDARDIZING INSTRUCTIONAL DEFINITION AND CONTENT SUPPORTING INFORMATION SECURITY COMPLIANCE REQUIREMENTS |
ABRAMSON |
2018 |
| AIMAN DARWICHE |
MACHINE LEARNING METHODS FOR SEPTIC SHOCK PREDICTION |
MUKHERJEE |
2018 |
| FANNIEL DEMARKS |
AN OPERATIONAL MANAGEMENT COMPETENCY MODEL FOR ONLINE EDUCATION ADMINISTRATORS |
ABRAMSON |
2018 |
| MADHURI EDWARDS |
IDENTIFYING FACTORS CONTRIBUTING TOWARDS INFORMATION SECURITY MATURITY IN AN ORGANIZATION |
TEJAY |
2018 |
| RUSSELL GARNER |
DEVELOPMENT, IMPLEMENTATION AND ASSESSMENT OF AN ONLINE DOCTORAL STUDENT ORIENTATION |
ABRAMSON |
2018 |
| JODI GOODE |
COMPARING TRAINING METHODOLOGIES ON EMPLOYEE’S CYBERSECURITY COUNTERMEASURES AWARENESS AND SKILLS IN TRADITIONAL VS. SOCIO-TECHNICAL PROGRAMS |
LEVY |
2018 |
| ZADOK HAKIM |
FACTORS THAT CONTRIBUTE TO THE RESISTANCE TO CLOUD COMPUTING ADOPTION BY TECH COMPANIES VS. NON-TECH COMPANIES |
PARRISH |
2018 |
| CHAD HARDIN |
SEMI-INFORMED MULTI-AGENT PATROL STRATEGIES |
LASZLO |
2018 |
| EDWIN HILL |
THE EFFECTS OF STUDENT ACTIVITY DASHBOARDS ON PARTICIPATION, PERSISTENCE, AND PERFORMANCE |
ELLIS |
2018 |
| ANN-MARIE HORCHER |
CONSERVATION OF LIMITED RESOURCES: DESIGN PRINCIPLES FOR SECURITY AND USABILITY ON MOBILE DEVICES |
TEJAY |
2018 |
| GISLE JORGENSEN |
METRICS FOR ASPECT MINING VISUALIZATION |
MITROPOULOS |
2018 |
| ANGELA LANDRESS |
THE IMPACT OF USER MINDFULNESS ON NON-MALICIOUS SPILLAGE WITHIN IMAGES IN SOCIAL NETWORKING SITESS |
PARRISH |
2018 |
| KEMBLEY LINGELBACH |
PERCEPTIONS OF FEMALE CYBERSECURITY PROFESSIONALS ON BARRIERS AND FACTORS OF LOW FEMALE PARTICIPATION RATES |
TERRELL |
2018 |
| LINA LO |
MULTIDIMENSIONAL KNOWLEDGE FLOW DYNAMICS IN CONTEXT |
ELLIS |
2018 |
| DANIEL LONG |
EXPLORING GENERATIONAL DIFFERENCES IN TEXT MESSAGING USAGE AND HABITS |
COHEN |
2018 |
| WAYNE MADHLANGOBE |
ASSESSMENT OF FACTORS INFLUENCING INTENT-TO-USE BIG DATA ANALYTICS IN AN ORGANIZATION: A SURVEY STUDY |
WANG |
2018 |
| STEFANUS MALAN |
MULTI-ROBOT COMPLETE COVERAGE USING DIRECTIONAL CONSTRAINTS |
MUKHERJEE |
2018 |
| RICHARD MCCRAE |
THE IMPACT OF COST ON FEATURE SELECTION FOR CLASSIFIERS |
MUKHERJEE |
2018 |
| STEVEN MCELWEE |
PROBABILISTIC CLUSTER ENSEMBLE EVALUATION FOR UNSUPERVISED INTRUSION DETECTION |
CANNADY |
2018 |
| ELIZABETH OVIAWE |
DESIGN AND DEVELOPMENT OF SIMULATION-BASED INSTRUCTION ON MEANINGFUL USE AND INTERPROFESSIONALISM CORE COMPETENCIES IN A HEALTHCARE TEAM-BASED LEARNING ENVIRONMENT |
SNYDER |
2018 |
| JAMES PRATHER |
BEYOND AUTOMATED ASSESSMENT: BUILDING METACOGNITIVE AWARENESS IN NOVICE PROGRAMMERS IN CS1 |
COHEN |
2018 |
| RONALD PUNAKO |
COMPUTER SUPPORTED COLLABORATIVE LEARNING USING AUGMENTED AND VIRTUAL REALITY IN TOURISM EDUCATION |
SNYDER |
2018 |
| NICHOLAS SHAW |
A KNOWLEDGE MANAGEMENT SYSTEM (KMS) USING A STORYTELLING-BASED APPROACH TO COLLECT TACIT KNOWLEDGE |
LIU |
2018 |
| RODNEY THOMAS |
MACHINE LEARNING FOR EXPLORING STATE SPACE STRUCTURE IN GENETIC REGULATORY NETWORKS |
LASZLO |
2018 |
| LARRY TOWNSEND |
WIRELESS SENSOR NETWORK CLUSTERING WITH MACHINE LEARNING |
LI |
2018 |
| ELISSA WEEDEN |
USING WEB CONFERENCING TECHNOLOGY TO FOSTER INCLUSIVE COURSE EXPERIENCES FOR DEAF AND HARD-OF-HEARING STUDENTS |
ABRAMSON |
2018 |
| JACOB ARTHUR |
ENHANCED PREDICTION OF NETWORK ATTACKS USING INCOMPLETE DATA |
CANNADY |
2017 |
| JUAN ASENJO |
DATA MASKING, ENCRYPTION, AND THEIR EFFECT ON CLASSIFICATION PERFORMANCE: TRADE-OFFS BETWEEN DATA SECURITY AND UTILITY |
SUN |
2017 |
| ROBERT BATIE |
ASSESSING THE EFFECTIVENESS OF A FINGERPRINT BIOMETRIC AND A BIOMETRIC PERSONAL IDENTIFICATION NUMBER (BIO-PIN) AS A MULTI-FACTOR AUTHENTICATION MECHANISM |
LEVY |
2017 |
| SHELLON BLACKMAN-LEES |
TOWARDS A CONCEPTUAL FRAMEWORK FOR PERSISTENT USE: A TECHNICAL PLAN TO ACHIEVE SEMANTIC INTEROPERABILITY WITHIN ELECTRONIC HEALTH RECORD SYSTEMS |
ELLIS |
2017 |
| LESLIE BOFILL |
THE DESIGN AND IMPLEMENTATION OF ONLINE RADIOLOGY MODULES USING THE ADDIE PROCESS AND RAPID PROTOTYPING |
TERRELL |
2017 |
| TERESA CARTER |
FIVE--FACTOR MODEL AS A PREDICTOR FOR SPOKEN DIALOG SYSTEMS |
COHEN |
2017 |
| ABDULRAHIM CHARIF |
CONTEXTUALIZING SECURE INFORMATION SYSTEM DESIGN: A SOCIO-TECHNICAL APPROACH |
TEJAY |
2017 |
| MICHEAL ELROD |
A NOVEL APPROACH TO DETERMINING REAL-TIME RISK PROBABILITIES IN CRITICAL INFRASTRUCTURE INDUSTRIAL CONTROL SYSTEMS |
CANNADY |
2017 |
| STEVEN EPSTEIN |
THE EFFECT OF DOMAIN AND TECHNICAL EXPERTISE ON THE TRAINING OUTCOMES FOR CASE MANAGEMENT SYSTEMS IN HIGH EXPERTISE ORGANIZATIONS |
PARRISH |
2017 |
| SALAM FARHAT |
CREATING REALISTIC SYNTHETIC FILE SYSTEM WORKLOADS |
SIMCO |
2017 |
| JOHN FORD |
PULSAR SEARCH USING SUPERVISED MACHINE LEARNING. |
MUKHERJEE |
2017 |
| JAMES FRALEY |
CLASSIFICATION AND IDENTIFICATION OF ADVANCED POLYMORPHIC MALWARE |
CANNADY |
2017 |
| STEVEN FUENTES |
DEFINING USABILITY HEURISTICS FOR ADOPTION AND EFFICIENCY OF AN ELECTRONIC WORKFLOW DOCUMENT MANAGEMENT SYSTEM |
COHEN |
2017 |
| ROBERT HAMBLY |
AN EMPIRICAL INVESTIGATION OF THE WILLINGNESS OF US INTELLIGENCE COMMUNITY ANALYSTS TO CONTRIBUTE KNOWLEDGE TO A KNOWLEDGE MANAGEMENT SYSTEM (KMS) IN A HIGHLY CLASSIFIED AND SENSITIVE ENVIRONMENT |
LEVY |
2017 |
| TOM HARITOS |
A STUDY OF HUMAN-MACHINE INTERFACE (HMI) LEARNABILITY FOR UNMANNED AIRCRAFT SYSTEMS COMMAND AND CONTROL |
DRINGUS |
2017 |
| NICHOLAS HAYS |
REDUCING THE DOWNLOAD TIME IN STOCHASTIC P2P CONTENT DELIVERY NETWORKS BY IMPROVING PEER SELECTION |
SIMCO |
2017 |
| JEFF HEATON |
AUTOMATED FEATURE ENGINEERING FOR DEEP NEURAL NETWORKS WITH GENETIC PROGRAMMING |
CANNADY |
2017 |
| STEVEN HENDRIKSE |
THE EFFECT OF CODE OBFUSCATION ON AUTHORSHIP ATTRIBUTION OF BINARY COMPUTER FILES |
MITROPOULOS |
2017 |
| CRISTELIA HINOJOSA |
ORGANIZATIONAL INFORMATION DISSEMINATION WITHIN COLLABORATIVE NETWORKS USING DIGITAL COMMUNICATION TOOLS |
ELLIS |
2017 |
| STEFAN JOE-YEN |
PERFORMANCE ENVELOPES OF ADAPTIVE ENSEMBLE DATA STREAM CLASSIFIERS. |
MUKHERJEE |
2017 |
| THOMAS MCCUNE |
A STUDY OF HOW YOUNG ADULTS LEVERAGE MULTIPLE PROFILE MANAGEMENT FUNCTIONALITY IN MANAGING THEIR ONLINE REPUTATION ON SOCIAL NETWORKING SITES |
DRINGUS |
2017 |
| PATRICK MCNEIL |
INTEGRATING MULTIPLE MODALITIES INTO DEEP LEARNING NETWORKS |
CANNADY |
2017 |
| JENNIFER MERRITT |
INDIVIDUALIZED INSTRUCTION AS A FACULTY TRAINING STRATEGY FOR TECHNOLOGY INTEGRATION |
WANG |
2017 |
| ZAREEF MOHAMMED |
THE ROLE OF COGNITIVE DISPOSITION IN RE-EXAMINING THE PRIVACY PARADOX: A NEUROSCIENCE STUDY |
TEJAY |
2017 |
| RICHARD NILSEN |
MEASURING CYBERSECURITY COMPETENCY: AN EXPLORATORY INVESTIGATION OF THE CYBERSECURITY KNOWLEDGE, SKILLS, AND ABILITIES NECESSARY FOR ORGANIZATIONAL NETWORK ACCESS PRIVILEGES |
LEVY |
2017 |
| CHARLES PERKINS |
INVESTIGATING PERCEIVED INFLUENCES OF DATA WAREHOUSING BUSINESS INTELLIGENCE MATURITY ON ORGANIZATIONAL PERFORMANCE |
SUN |
2017 |
| JAIME PUENTE |
EXAMINING THE EFFECTS OF DISTRACTIVE MULTITASKING WITH PERIPHERAL COMPUTING IN THE CLASSROOM |
DRINGUS |
2017 |
| JERRY ROPER |
COPYRIGHT POLICY INTERPRETATION AND ITS EFFECTS ON HIGHER EDUCATION OPEN COURSES SUCCESS |
ABRAMSON |
2017 |
| COLEEN SANTEE |
AN EXPLORATORY STUDY OF THE APPROACH TO BRING YOUR OWN DEVICE (BYOD) IN ASSURING INFORMATION SECURITY |
NASUTI |
2017 |
| DAVID SAYRE |
A RUNTIME VERIFICATION AND VALIDATION FRAMEWORK FOR SELF-ADAPTIVE SOFTWARE |
SIMCO |
2017 |
| ERIC SPRIGGS |
AN ASSESSMENT OF THE INFLUENCE OF FUNCTIONAL DIVERSITY AND PERCEIVED INFORMATION QUALITY ON THE INTENTION TO USE COLLABORATION SYSTEMS |
PAUL |
2017 |
| GWENDOLYN STRIPLING |
AN EMPIRICAL EVALUATION OF FACTORS AFFECTING ENERGY MANAGEMENT INFORMATION SYSTEM SUCCESS |
COHEN |
2017 |
| BRENDA VARNER |
SUPPORTING EDUCATION FOR STUDENT PARENTS THROUGH MOBILE TECHNOLOGY |
ABRAMSON |
2017 |
| SAMUEL YODERS |
INTEGRATION OF SIMULATION TECHNOLOGY INTO HEALTH CARE EDUCATION CURRICULA THROUGH APPLIED CONSTRUCTIVIST LEARNING THEORY |
ABRAMSON |
2017 |
| YI ZHANG |
STRATEGIES FOR COMBINING TREE-BASED ENSEMBLE MODELS. |
MUKHERJEE |
2017 |
| MAHD ALZOUBI |
EVALUATING THE ENTERPRISE RESOURCE PLANNING (ERP) SYSTEMS SUCCESS AT THE INDIVIDUAL LEVEL OF ANALYSIS IN THE MIDDLE-EAST |
TERRELL |
2016 |
| GEORGE ANTONIOU |
DESIGNING AN EFFECTIVE INFORMATION SECURITY POLICY FOR EXCEPTIONAL SITUATIONS IN AN ORGANIZATION: AN EXPERIMENTAL STUDY |
TEJAY |
2016 |
| SANDRA ARMSTRONG |
LEVELING THE PLAYING FIELD: GENDER INCLUSIVE DESIGN FOR SINGLE AND MULTIPLAYER COMPUTER ROLE-PLAYING GAMES |
COHEN |
2016 |
| KIMBERLY BARTHOLOMEW |
PATIENT PORTALS: ACHIEVING TECHNOLOGY ACCEPTANCE AND MEANINGFUL USE IN INDEPENDENT PHYSICIAN-MANAGED PRACTICES |
ABRAMSON |
2016 |
| EMMANUEL BAZILE |
AN EMPIRICAL TESTING OF FACTORS CONTRIBUTING TO HEALTHCARE PROFESSIONALS’ RESISTANCE TO USE ELECTRONIC MEDICAL RECORDS (EMR) SYSTEMS |
LEVY |
2016 |
| SHAUNA BEAUDIN |
AN EMPIRICAL STUDY OF AUTHENTICATION METHODS TO SECURE E-LEARNING SYSTEM ACTIVITIES AGAINST IMPERSONATION FRAUD |
LEVY |
2016 |
| DAVID BETHELMY |
ASPECT MINING USING MULTIOBJECTIVE GENETIC CLUSTERING ALGORITHMS |
MITROPOULOS |
2016 |
| LINDA BETZ |
AN ANALYSIS OF THE RELATIONSHIP BETWEEN SECURITY INFORMATION TECHNOLOGY ENHANCEMENTS AND COMPUTER SECURITY BREACHES AND INCIDENTS |
WANG |
2016 |
| NEWTON CAMPBELL, JR. |
ALGORITHMIC FOUNDATIONS OF A*, LANDMARKS, AND GENERALIZED POLYGON INEQUALITIES |
LASZLO |
2016 |
| MELISSA CARLTON |
DEVELOPMENT OF A CYBERSECURITY SKILLS INDEX: A SCENARIOS-BASED, HANDS-ON MEASURE OF NON-IT PROFESSIONALS’ CYBERSECURITY SKILLS |
LEVY |
2016 |
| KAREN CASE |
A BIG IDEA: THE ROLLOUT OF OPEN SUNY |
ABRAMSON |
2016 |
| ALGERNON CORBETT |
THE STATE OF MOBILE LEARNING IMPLEMENTATION IN GOVERNMENT CABINET-LEVEL AGENCIES AND DEPARTMENTS |
ABRAMSON |
2016 |
| THOMAS DECINO |
A USABILITY AND LEARNABILITY CASE STUDY OF GLASS FLIGHT DECK INTERFACES AND PILOT INTERACTIONS THROUGH SCENARIO-BASED TRAINING |
DRINGUS |
2016 |
| KEITH EDWARDS |
EXAMINING THE SECURITY AWARENESS, INFORMATION PRIVACY, AND THE SECURITY BEHAVIORS OF HOME COMPUTER USERS |
PAUL |
2016 |
| MARY HARWARD |
A STUDY OF DATA SHARING PRACTICES WITHIN SCHOLARLY RESEARCH COMMUNITIES |
ZINK |
2016 |
| WILNELIA HERNANDEZ |
AN EMPIRICAL ASSESSMENT OF EMPLOYEES CYBERSLACKING IN THE PUBLIC SECTOR |
LEVY |
2016 |
| JULIE HEWITT |
BLENDED LEARNING FOR FACULTY PROFESSIONAL DEVELOPMENT INCORPORATING KNOWLEDGE MANAGEMENT PRINCIPLES |
SNYDER |
2016 |
| ROBIN HILL |
COMMUNITY COLLEGE FACULTY DISPOSITIONS TOWARDS BLENDED LEARNING |
SNYDER |
2016 |
| GUCHUN HUANG |
USING MOBILE PHONES FOR TEACHING AND LEARNING INCHINESE TRADITIONAL UNDERGRADUATE EDUCATION |
ABRAMSON |
2016 |
| RICHARD MAITI |
CAPTURING, ELICITING, AND PRIORITIZING (CEP) NON-FUNCTIONAL REQUIREMENTS METADATA DURING THE EARLY STAGES OF AGILE SOFTWARE DEVELOPMENT |
MITROPOULOS |
2016 |
| NIKOLAY MALITSKY |
THE MUTABLE CLASS DESIGN PATTERN |
LASZLO |
2016 |
| JOSEPH MARNELL |
AN EMPIRICAL INVESTIGATION OF FACTORS EFFECTING RESISTANCE TO USE MULTI-FACTOR AUTHENTICATION SYSTEMS IN PUBLIC-ACCESS ENVIRONMENTS |
LEVY |
2016 |
| HOLLY MCKEE |
THE CONSTRUCTION AND VALIDATION OF AN INSTRUCTOR LEARNING ANALYTICS IMPLEMENTATION MODEL TO SUPPORT AT-RISK STUDENTS |
SNYDER |
2016 |
| KIMBERLY MCMURTRY |
EFFECTIVE TEACHING PRACTICES IN ONLINE HIGHER EDUCATION |
ABRAMSON |
2016 |
| ELIEL MELON |
A STUDY OF THE SUCCESS OF GROUP FORMATION IN VIRTUAL TEAMS USING COMPUTER MEDIATED COMMUNICATIONS |
LEVY |
2016 |
| SALEEM MIR |
ENHANCED METHOD CALL TREE FOR COMPREHENSIVE DETECTION OF SYMPTOMS OF CROSS CUTTING CONCERNS |
MITROPOULOS |
2016 |
| DAVID MOSKOWITZ |
AUTOMATICALLY DEFINED TEMPLATES FOR IMPROVED PREDICTION OF NON-STATIONARY, NON-LINEAR TIME SERIES IN GENETIC PROGRAMMING |
MUKHERJEE |
2016 |
| STEPHEN MUJEYE |
AN EXPERIMENTAL STUDY ON THE ROLE OF PASSWORD STRENGTH AND COGNITIVE LOAD ON EMPLOYEE PRODUCTIVITY |
LEVY |
2016 |
| THUAN NGUYEN |
KNOWLEDGE MANAGEMENT (KM) PERFORMANCE AND ORGANIZATIONAL PERFORMANCE: USING INTELLECTUAL CAPITAL (IC) AS THE PROXY AND A GUIDELINE FOR IC MEASUREMENT |
ELLIS |
2016 |
| PATRICK OFFOR |
EXAMINING CONSUMERS’ SELECTIVE INFORMATION PRIVACY DISCLOSURE BEHAVIORS IN AN ORGANIZATION’S SECURE E-COMMERCE SYSTEMS |
TEJAY |
2016 |
| JANICE ORCUTT |
TEACHING PRESENCE AND INTELLECTUAL CLIMATE IN A STRUCTURED ONLINE LEARNING ENVIRONMENT |
DRINGUS |
2016 |
| SERGIO PARRA |
USE OF STUDENT CREATED VIDEO PODCASTS TO PROMOTE FOREIGN LANGUAGE GRAMMAR ACQUISITION IN MIDDLE SCHOOL |
ABRAMSON |
2016 |
| JASON PITTMAN |
THE EFFECTS OF TIME-COMPRESSION AND LEARNER-CONTROL IN MULTIMEDIA INSTRUCTION |
DRINGUS |
2016 |
| EMAD SAMWEL |
TOWARD THE DEVELOPMENT AND IMPLEMENTATION OF PERSONALIZED, ADAPTIVE, AND COMPREHENSIVE ELEARNING SYSTEMS |
ABRAMSON |
2016 |
| DAVID SCHAAF |
ASSISTIVE TECHNOLOGY INSTRUCTION IN TEACHER EDUCATION CURRICULA |
ABRAMSON |
2016 |
| JOSEPH SIMPSON |
EMPIRICAL ANALYSIS OF SOCIO-COGNITIVE FACTORS AFFECTING SECURITY BEHAVIORS OF SMARTPHONE USERS. |
COHEN |
2016 |
| FARRELL TAYLOR |
EVALUATION OF SUPERVISED MACHINE LEARNING FOR CLASSIFYING VIDEO TRAFFIC |
MUKHERJEE |
2016 |
| ROBERT VAN CAMP |
USING DIVERSITY ENSEMBLES WITH TIME LIMITS TO HANDLE CONCEPT DRIFT |
MUKHERJEE |
2016 |
| THOMAS WINSTON |
AN EMPIRICAL INVESTIGATION OF PRIVACY AND SECURITY CONCERNS ON NURSES’ BEHAVIORAL INTENTIONS TO USE RFID IN HOSPITALS |
PAUL |
2016 |
| NOEL WINT |
AN INVESTIGATION OF SOCIO-TECHNICAL COMPONENTS OF KNOWLEDGE MANAGEMENT SYSTEM (KMS) USAGE |
ELLIS |
2016 |
| SEAN ZADIG |
UNDERSTANDING THE IMPACT OF HACKER INNOVATION UPON IS SECURITY COUNTERMEASURES |
TEJAY |
2016 |
| FRANK ACKER |
USE OF ENTROPY FOR FEATURE SELECTION WITH INTRUSION DETECTION SYSTEM PARAMETERS |
CANNADY |
2015 |
| ROBERT ALTIERO |
DIGITAL FORENSICS TOOL INTERFACE VISUALIZATION |
COHEN |
2015 |
| SHALETTE ANNMARIE ASHMAN EAST |
THE EFFECT OF COMPUTERIZED COGNITIVE TRAINING ON THE WORKING MEMORY AND MATHEMATICS ACHIEVEMENT OF LOW ACHIEVERS |
ELLIS |
2015 |
| BETSY BAUGESS |
EXAMINING SOCIAL NETWORK SITE USAGE BY OLDER ADULTS: A PHENOMENOLOGICAL APPROACH |
WANG |
2015 |
| BRIAN BENNETT |
LOCATING POTENTIAL ASPECT INTERFERENCE USING CLUSTERING ANALYSIS |
MITROPOULOS |
2015 |
| ALEKSANDR BLEKH |
GOVERNANCE AND ORGANIZATIONAL SPONSORSHIP AS SUCCESS FACTORS IN FREE/LIBRE AND OPEN SOURCE SOFTWARE DEVELOPMENT: AN EMPIRICAL INVESTIGATION USING STRUCTURAL EQUATION MODELING |
MUKHERJEE |
2015 |
| GRACE BONANNO |
THE IMPORTANCE OF PRESENCE IN ASSISTING MEDICAL DIAGNOSIS IN INDIVIDUALS WITH INTELLECTUAL DISABILITIES: A TELEMEDICINE APPROACH |
COHEN |
2015 |
| SHONDA BROWN |
AN INFORMATION PRIVACY EXAMINATION OF THE PRACTICES OF PHARMACEUTICAL COMPANIES REGARDING USE OF INFORMATION COLLECTED THROUGH THEIR WEBSITES |
LEVY |
2015 |
| BETSY BURGOS |
A STUDY OF ASSISTIVE TECHNOLOGY COMPETENCIES OF SPECIALISTS IN PUBLIC SCHOOLS |
DRINGUS |
2015 |
| DAVID CASTANO |
AFFECT AND ONLINE PRIVACY CONCERNS |
NYSHADHAM |
2015 |
| THEODORE COCHRAN |
IMMUNOLOGY INSPIRED DETECTION OF DATA THEFT FROM A NETWORKED COMPUTER |
CANNADY |
2015 |
| MICHAEL DEMBLEWSKI |
SECURITY FRAMEWORK FOR MACHINE-TO-MACHINE DEVICES AND NETWORKS |
STOUT |
2015 |
| AMRAN DIN |
USABLE SECURITY FOR E-CITIZENS: A STUDY TO EVALUATE AND COMPARE THE USABILITY OF USER ACCOUNTS ON E-GOVERNMENT WEBSITES |
COHEN |
2015 |
| PAUL DOOLEY |
AN EMPIRICAL DEVELOPMENT OF CRITICAL VALUE FACTORS FOR SYSTEM QUALITY AND INFORMATION QUALITY IN BUSINESS INTELLIGENCE SYSTEMS IMPLEMENTATIONS |
LEVY |
2015 |
| LAURA DOWNEY |
WELL-BEING TECHNOLOGIES: MEDITATION USING VIRTUAL WORLDS |
COHEN |
2015 |
| EGES EGEDIGWE |
SERVICE QUALITY AND PERCEIVED VALUE OF CLOUD COMPUTING-BASED SERVICE ENCOUNTERS: EVALUATION OF INSTRUCTOR PERCEIVED SERVICE QUALITY IN HIGHER EDUCATION IN TEXAS |
LIU |
2015 |
| MARY FONTI |
A PREDICTIVE MODELING SYSTEM: EARLY IDENTIFICATION OF STUDENTS AT-RISK ENROLLED IN ONLINE LEARNING PROGRAMS |
TERRELL |
2015 |
| TRELISA GLAZATOV |
APPLYING THE COMPONENT DISPLAY THEORY TO THE INSTRUCTIONAL DESIGN AND DEVELOPMENT OF AN EDUCATIONAL MOBILE APPLICATION |
SNYDER |
2015 |
| JOHN GRAY |
VIRTUE ETHICS: EXAMINING INFLUENCES ON THE ETHICAL COMMITMENT OF INFORMATION SYSTEM WORKERS IN TRUSTED POSITIONS |
TEJAY |
2015 |
| MICHAEL GREEN |
MOTIVATION AND LEARNING OF NON-TRADITIONAL COMPUTING EDUCATION STUDENTS IN A WEB-BASED COMBINED LABORATORY |
ABRAMSON |
2015 |
| DICK HAMANN |
THE CONSTRUCTION AND VALIDATION OF AN M-LEARNING FRAMEWORK FOR ONLINE AND BLENDED LEARNING ENVIRONMENTS |
SNYDER |
2015 |
| HOWARD HAMILTON |
AN EXAMINATION OF SLA COMPONENTS THAT INFLUENCE CLOUD COMPUTING ADOPTION |
PARRISH |
2015 |
| HIRA HERRINGTON |
A HEURISTIC EVOLUTIONARY METHOD FOR THE COMPLEMENTARY CELL SUPPRESSION PROBLEM |
MUKHERJEE |
2015 |
| JOHN HUDZINA |
AN ENHANCED MAPREDUCE WORKLOAD ALLOCATION TOOL |
SIMCO |
2015 |
| JAMES JAVA |
CHARACTERIZATION OF PROSE BY RHETORICAL STRUCTURE FOR MACHINE LEARNING CLASSIFICATION |
LASZLO |
2015 |
| STEPHEN KIBWAGE |
ROLE-BASED ACCESS CONTROL ADMINISTRATION OF SECURITY POLICIES AND POLICY CONFLICT RESOLUTION IN DISTRIBUTED SYSTEMS |
LIU |
2015 |
| JEFFREY KIMBALL |
MOTIVATIONS OF STUDENTS IN THE OPEN-ENDED USE OF MOBILE COMPUTING IN LECTURE-BASED CLASSROOMS |
TERRELL |
2015 |
| THOMAS KURTZ |
APPROACHES FOR DEVELOPING A MODEL FOR INFORMATION AND COMMUNICATION TECHNOLOGY (ICT) IMPLEMENTATION IN THE HIGHER EDUCATION ENVIRONMENT |
ELLIS |
2015 |
| KAREN LACADEN |
AN INVESTIGATION OF THE FACTORS CONTRIBUTING TO THE DEVELOPMENT OF POORLY DEFINED IS STRATEGIES. |
PARRISH |
2015 |
| RICHARD LAMB |
A MAKEOVER FOR THE CAPTURED LECTURE: APPLYING MULTIMEDIA LEARNING PRINCIPLES TO LECTURE VIDEO |
ELLIS |
2015 |
| JAMES LEWIS |
IDENTIFYING KEY DETERMINANTS OF SERVICE PROVIDER EFFECTIVENESS AND THE IMPACT ON OUTSOURCED SECURITY SUCCESS |
TEJAY |
2015 |
| FRANK LOFORTE |
EFFICIENT VARIATIONS OF THE QUALITY THRESHOLD CLUSTERING ALGORITHM |
MUKHERJEE |
2015 |
| TANYA MACNEIL |
POLICE OPINIONS OF DIGITAL EVIDENCE RESPONSE HANDLING IN THE STATE OF GEORGIA: AN EXAMINATION FROM THE VIEWPOINT OF LOCAL AGENCIES’ PATROL OFFICERS |
ZINK |
2015 |
| PATRICIA MCDERMOTT-WELLS |
MATH IN THE DARK: TOOLS FOR EXPRESSING MATHEMATICAL CONTENT BY VISUALLY IMPAIRED STUDENTS. |
MUKHERJEE |
2015 |
| NATHANIEL MELBY |
ENTERPRISE BANDWIDTH MANAGEMENT: A FRAMEWORK FOR TRAFFIC MANAGEMENT IN GLOBAL MANUFACTURING ENTERPRISES |
LITTMAN |
2015 |
| SCOTT MORRISSETTE |
INVESTIGATING CATEGORIZATION PREFERENCES FOR ONLINE DATING SITES |
NYSHADHAM |
2015 |
| DAVID MOURED |
DYNAMIC GAME-THEORETIC MODELS TO DETERMINE THE VALUE OF INTRUSION DETECTION SYSTEMS |
MUKHERJEE |
2015 |
| JEAN-PIERRE NZIGA |
INCREMENTAL SPARSE-PCA FEATURE EXTRACTION FOR DATA STREAMS |
CANNADY |
2015 |
| ARTURO PONCE |
A DYNAMIC BEHAVIORAL BIOMETRIC APPROACH TO AUTHENTICATE USERS EMPLOYING THEIR FINGERS TO INTERACT WITH TOUCHSCREEN DEVICES |
COHEN |
2015 |
| KRISTIN RAUB |
A PHENOMENOLOGICAL INQUIRY INTO FACEBOOK NEWCOMER MOTIVATIONS FOR PARTICIPATORY ACTIVITIES |
DRINGUS |
2015 |
| RICHARD RICHARDSON |
ENHANCEMENT OF MAMMOGRAPHY IMAGES FROM SEGMENTATION IMAGE COMPRESSION |
LASZLO |
2015 |
| JOSE RIVERA RODRIGUEZ |
SENIORS WITH DIABETES-INVESTIGATION OF THE IMPACT OF SEMANTIC AUDITORY DISTRACTIONS ON THE USABILITY OF A BLOOD GLUCOSE TRACKING SMARTPHONE MOBILE APPLICATION |
COHEN |
2015 |
| RICARDO RODRIGUEZ |
AN ELECTROENCEPHALOGRAM (EEG) BASED BIOMETRICS INVESTIGATION FOR AUTHENTICATION: AN HCI APPROACH |
COHEN |
2015 |
| MARK ROSENBAUM |
AN INSTRUMENT OF MEASURE: IDENTIFYING UNETHICAL PERSONAL IDENTITY INFORMATION (PII) PRIVACY VIOLATIONS COMMITTED BY IS/IT PRACTITIONERS’ – A COMPARISON TO COMPUTING MORAL EXEMPLARS |
WANG |
2015 |
| MANON SCHLADEN |
FORMATIVE RESEARCH ON AN INSTRUCTIONAL DESIGN THEORY FOR VIRTUAL PATIENTS IN CLINICAL EDUCATION: A PRESSURE ULCER PREVENTION CLINICAL REASONING CASE |
SNYDER |
2015 |
| ROGER SEEHOLZER |
INVESTIGATING ROLES OF INFORMATION SECURITY STRATEGY |
TEJAY |
2015 |
| RACHAEL SESSLER TRINKOWSKY |
INTERPRETATIVE PHENOMENOLOGICAL ANALYSIS OF ACCESSIBILITY AWARENESS AMONG FACULTY IN ONLINE LEARNING ENVIRONMENTS |
DRINGUS |
2015 |
| SHEILA SORENSEN |
MOTIVATING AN INDIVIDUAL TO SHARE EXTERNALIZED TACIT KNOWLEDGE |
ELLIS |
2015 |
| JONATHAN SPARKS |
THE IMPACT OF IMAGE SYNONYMS IN GRAPHICAL-BASED AUTHENTICATION SYSTEMS |
COHEN |
2015 |
| THOMAS TREVETHAN |
BUILDING CLOUD-BASED INFORMATION SYSTEMS LAB ARCHITECTURE: WRITING DESIGN PRINCIPLES THAT FACILITATE THE EFFECTIVE CONSTRUCTION AND EVALUATION OF A CLOUD-BASED LAB ENVIRONMENT |
PARRISH |
2015 |
| OSIRIS VILLACAMPA |
FEATURE SELECTION AND CLASSIFICATION METHODS FOR DECISION MAKING: A COMPARATIVE ANALYSIS |
SUN |
2015 |
| LUCINDA WANG |
IMPLICIT MEASURES OF ONLINE RISKS |
NYSHADHAM |
2015 |
| MICHELE WASHINGTON |
GATHERING THE REQUIREMENTS FOR A MOBILE DEVICE TUTORIAL FOR OLDER ADULTS |
COHEN |
2015 |
| NATHAN WHITE |
AN EMPIRICAL INVESTIGATION INTO THE ROLE THAT BOREDOM, RELATIONSHIPS, ANXIETY, AND GRATIFICATION (BRAG) PLAY IN A DRIVER’S DECISION TO TEXT |
LEVY |
2015 |
| FARANAK AFSHAR |
INVESTIGATING THE DETERMINANTS OF DISASTER RECOVERY TECHNOLOGY INVESTMENT CHOICE IN SMALL AND MEDIUM-SIZED ENTERPRISES |
TEJAY |
2014 |
| KEVIN BARTON |
INFORMATION SYSTEM SECURITY COMMITMENT: A STUDY OF EXTERNAL INFLUENCES ON SENIOR MANAGEMENT |
TEJAY |
2014 |
| DAWN BEYER |
CONSTRUCTING A CYBER PREPAREDNESS FRAMEWORK (CPF): THE LOCKHEED MARTIN CASE STUDY |
LITTMAN |
2014 |
| EDWARD BOYER |
UNDERSTANDING USABILITY-RELATED INFORMATION SECURITY FAILURES IN A HEALTHCARE CONTEXT |
TEJAY |
2014 |
| WALTER BROCK |
ALTERNATIVE APPROACHES TO CORRECTION OF MALAPROPISMS IN AIML BASED CONVERSATIONAL AGENTS |
MUKHERJEE |
2014 |
| ROBERT BROWN |
APPLICATION OF CELLULAR AUTOMATA TO DETECTION OF MALICIOUS NETWORK PACKETS |
CANNADY |
2014 |
| MIGUEL BULEJE |
THE IMPACT OF ENTERPRISE RESOURCE PLANNING SYSTEMS ON SMALL AND MEDIUM ENTERPRISES |
NYSHADHAM |
2014 |
| ROBERT CARTELLI |
IDENTIFYING E-COMMERCE STRATEGY-MAKING MODES IN SMALL FIRMS |
NYSHADHAM |
2014 |
| SIMON CLEVELAND |
A CAUSAL MODEL TO PREDICT ORGANIZATIONAL KNOWLEDGE SHARING VIA INFORMATION AND COMMUNICATION TECHNOLOGIES |
ELLIS |
2014 |
| ALEXANDER CORRIS |
SECURE MOBILE DEPLOYMENT OF NFL TRAINING MATERIALS |
ABRAMSON |
2014 |
| BINH DANG |
EVALUATION OF UNSUPERVISED LEARNING TECHNIQUES FOR INTRUSION DETECTION IN MOBILE AD HOC NETWORKS |
LI |
2014 |
| FELIX DIAZ |
USING SPEECH RECOGNITION SOFTWARE TO IMPROVE WRITING SKILLS |
ABRAMSON |
2014 |
| RAGAN DUBOSE-MORRIS |
AN INTERPRETATIVE PHENOMENOLOGICAL ANALYSIS OF TELEHEALTH CHAMPIONS |
DRINGUS |
2014 |
| CHARLES EDWARDS |
A FRAMEWORK FOR THE GOVERNANCE OF INFORMATION SECURITY |
TEJAY |
2014 |
| REINALDO FERNANDEZ |
A COGNITIVE APPRENTICESHIP APPROACH FOR TEACHING ABSTRACT AND COMPLEX SKILLS IN AN ONLINE LEARNING ENVIRONMENT |
SNYDER |
2014 |
| SHMUEL FINK |
THE IMPACT OF TECHNOLOGY ON THE STUDY OF TALMUD |
ABRAMSON |
2014 |
| GEORGE FORD |
SPOKEN LANGUAGE IDENTIFICATION FROM PROCESSING AND PATTERN ANALYSIS OF SPECTROGRAMS |
LASZLO |
2014 |
| SARA FOREMAN |
ASSISTIVE TECHNOLOGIES USED BY STUDENTS WITH ASPERGERS SYNDROME TO IMPROVE ACADEMIC PERFORNANCE IN THE GENERAL EDUCATION CLASSROOM |
ABRAMSON |
2014 |
| NATHANIEL FULLER |
A CONTEXTUAL MODEL FOR IDENTITY MANAGEMENT (IDM) INTERFACES |
COHEN |
2014 |
| ROBIN GARRETT |
A STUDY OF THE IMPACTS OF NAVIGATIONAL LINKS, TASK COMPLEXITY, AND THE OLDER USER ON WEBSITE USABILITY IN A COMMUNITY COLLEGE DOMAIN |
DRINGUS |
2014 |
| ARTURO GEIGEL |
UNSUPERVISED LEARNING TROJAN |
LI |
2014 |
| BENNET HAMMER |
A PICTURE IS WORTH A THOUSAND WORDS, BUT ARE THEY THE WORDS THAT MATTER? – AN ANALYSIS OF THE EFFECTS OF IMAGE COMMENTS ON SOCIAL NETWORKING SITES |
PARRISH |
2014 |
| MICHELLE HANSEN |
HELPING CHILDREN WITH AUTISM LEARN WITH MATHEMATICS SOFTWARE |
ABRAMSON |
2014 |
| MARTHA HARRELL |
FACTORS FOR INFORMATION SECURITY NONCOMPLIANCE: A MACROERGONOMIC PERSPECTIVE |
TEJAY |
2014 |
| RONDA HENNING |
SECURITY POLICIES THAT MAKE SENSE FOR COMPLEX SYSTEMS: COMPREHENSIBLE FORMALISM FOR THE SYSTEM CONSUMER |
CANNADY |
2014 |
| STEVE HERNANDEZ |
A METHOD TO REDUCE THE COST OF RESILIENCE BENCHMARKING OF SELF-ADAPTIVE SYSTEMS |
SIMCO |
2014 |
| HUEI-MIN HSU |
ORGANIZATIONAL CONTEXT INFLUENCES ON KNOWLEDGE SHARING |
WANG |
2014 |
| CORLAND KEATING |
VALIDATING THE OCTAVE ALLEGRO INFORMATION SYSTEMS RISK ASSESSMENT METHODOLOGY: A CASE STUDY |
LITTMAN |
2014 |
| DIANNE KENYON |
EMPLOYEE AND ORGANIZATION SECURITY VALUE ALIGNMENT THROUGH VALUE SENSITIVE SECURITY POLICY DESIGN |
COHEN |
2014 |
| MARK KOCOUR |
INVESTIGATION ON THE ADOPTION AND DIFFUSION OF SMARTPHONES IDEA |
LITTMAN |
2014 |
| BRIAN KOWALCZK |
IMPROVING THE SELECTION OF SURROGATES DURING THE COLD-START PHASE OF A CYBER FORAGING APPLICATION TO INCREASE APPLICATION PERFORMANCE |
SIMCO |
2014 |
| JOHN LANDMESSER |
IMPROVING IT PORTFOLIO MANAGEMENT DECISION CONFIDENCE USING MULTI-CRITERIA DECISION MAKING AND HYPERVARIATE DISPLAY TECHNIQUES. |
MUKHERJEE |
2014 |
| JOSEPH LUI |
A BAYESIAN APPROACH TO INTERNATIONAL CHANNEL SELECTION FOR SMES IN THE SOFTWARE INDUSTRY |
MUKHERJEE |
2014 |
| ADNAN MASOOD |
MEASURING INTEREST IN OUTLIERS WITH EXPLANATION FACILITY USING BAYESIAN BELIEF NETWORKS |
LI |
2014 |
| REGINA MATHIS |
WEB ONTOLOGY LANGUAGE FOR SCALABLE VECTOR GRAPHICS |
LASZLO |
2014 |
| WILLIAM MCGARVEY |
EVALUATING HEURISTICS AND CROWDING ON CENTER SELECTION IN K-MEANS GENETIC ALGORITHMS |
MUKHERJEE |
2014 |
| DIANA MOORE |
AN INVESTIGATION OF THE ATTRITION OF AFRICAN-AMERICAN STUDENTS IN AN ONLINE UNDERGRADUATE PROGRAM |
TERRELL |
2014 |
| KIMBERLY MORICK |
AN INVESTIGATION OF THE DAYTON REGIONAL STEM SCHOOL PUBLIC-PRIVATE PARTNERSHIPS |
TERRELL |
2014 |
| WINSTON NINH |
PERFORMANCE COMPARISON OF PROJECTIVE ELLIPTIC-CURVE POINT MULTIPLICATION IN 64-BIT X86 RUNTIME ENVIRONMENT |
LI |
2014 |
| STEPHEN ORR |
A VALUE-FOCUSED ASSESSMENT OF KNOWLEDGE SHARING IN A CLOSED INFORMATION ENVIRONMENT |
ZINK |
2014 |
| ANGEL OTERO |
AN INFORMATION SECURITY CONTROL ASSESSMENT METHODOLOGY FOR ORGANIZATIONS |
TEJAY |
2014 |
| DAVID SHRADER |
DYNAMIC PRICING IN HETEROGENEOUS WIRELESS CELLULAR NETWORKS |
SIMCO |
2014 |
| MICHAEL SNIDER |
UNIT TESTING ASPECTS USING INTERFACES WITH MOCK OBJECTS |
MITROPOULOS |
2014 |
| BRUCE SOWERS |
AN INVESTIGATION OF THE ROLE OF TECHNOLOGY IN INSTRUCTIONAL DESIGNERS DECISION-MAKING |
SNYDER |
2014 |
| JAMES SPRUILL |
A STUDY OF THE 8TH GRADE TECHNOLOGY LITERACY OF MICHIGAN CHARTER SCHOOL |
WANG |
2014 |
| TARYN STEVENSON |
SERVING MILITARY FAMILIES: USING SOLUTION-FOCUSED THERAPY IN A VIRTUAL ENVIRONMENT |
TERRELL |
2014 |
| CLAUDIO TAGLIENTI |
THE USER ATTRIBUTION PROBLEM AND THE CHALLENGE OF PERSISTENT SURVEILLANCE OF USER ACTIVITY IN COMPLEX NETWORKS |
CANNADY |
2014 |
| WENDY TU |
DESIGNING FOR STATISTICAL REASONING AND THINKING IN A TECHNOLOGY-ENHANCED LEARNING ENVIRONMENT |
SNYDER |
2014 |
| RUTH WELDON |
USING SIMULATED ANNEALING FOR ROBUSTNESS IN COEVOLUTIONARY GENETIC ALGORITHMS |
LASZLO |
2014 |
| ANN AKSUT |
POPULATION-BASED ANT COLONY OPTIMIZATION FOR MULTIVARIATE MICROAGGREGATION. |
MUKHERJEE |
2013 |
| SAMI AL-SALMAN |
THE ROLE OF FACULTY IN THE EFFECTIVENESS OF FULLY ONLINE PROGRAMS |
ABRAMSON |
2013 |
| GEORGE AMBROSE |
ADVISING E-PORTFOLIOS TO IMPROVE FIRST GENERATION STUDENT ENGAGEMENT IN HIGHER EDUCATION |
ABRAMSON |
2013 |
| GREGORY BLOCK |
REDUCING COGNITIVE LOAD USING UNCERTAINTY VISUALIZATION |
COHEN |
2013 |
| JAMES BOGGS |
ACCESSING GEOSPATIAL SERVICES IN LIMITED BANDWIDTH SERVICE-ORIENTED ARCHITECTURE (SOA) ENVIRONMENTS |
LITTMAN |
2013 |
| GWENDOLYN BRITTON |
INTEGRATION AND ABILITY OF ONLINE UNDERGRADUATE INFORMATION TECHNOLOGY PROJECT-BASED CAPSTONE EXPERIENCES ENHANCING SOFT SKILLS DEVELOPMENT |
ELLIS |
2013 |
| JAMES BURRELL |
COMPARISON OF TEXT INPUT AND INTERACTION IN A MOBILE LEARNING ENVIRONMENT |
DRINGUS |
2013 |
| URIEL CARRASQUILLA |
REDUCING THE CUMULATIVE FILE DOWNLOAD TIME AND VARIANCE IN A P2P OVERLAY VIA PROXIMITY BASED PEER SELECTION |
LIU |
2013 |
| MIN SUK CHOI |
ASSESSING THE ROLE OF USER COMPUTER SELF-EFFICACY, CYBERSECURITY COUNTERMEASURES AWARENESS, AND CYBERSECURITY SKILLS TOWARD COMPUTER MISUSE INTENTION AT GOVERNMENT AGENCIES |
LEVY |
2013 |
| PAUL COMITZ |
A SOFTWARE FACTORY FOR AIR TRAFFIC DATA |
LASZLO |
2013 |
| KATHLEEN COOL |
INFORMAL LEARNING AS PERFORMANCE: TOWARD A HERMENEUTIC PHENOMENOLOGY OF MUSEUM LEARNING IN SECOND LIFE |
TERRELL |
2013 |
| ALICIA DAVID |
MOTIVATED LEARNING IN INTRODUCTORY ONLINE COLLEGE COURSES: DO MOTIVATIONAL MESSAGES MATTER? |
SNYDER |
2013 |
| JOHN DEAN |
AN ASPECT POINTCUT FOR PARALLELIZABLE LOOPS |
MITROPOULOS |
2013 |
| MATTHEW DEVINE |
GLOGS AS NON-ROUTINE PROBLEM SOLVING TOOLS IN MATHEMATICS |
TERRELL |
2013 |
| DARSHAN DOMAH |
THE NERV METHODOLOGY: NON-FUNCTIONAL REQUIREMENTS ELICITATION, REASONING AND VALIDATION IN AGILE PROCESSES |
MITROPOULOS |
2013 |
| AUDREY GENDREAU |
ENHANCED DEPLOYMENT STRATEGY FOR ROLE-BASED HIERARCHICAL APPLICATION AGENTS IN WIRELESS SENSOR NETWORKS WITH ESTABLISHED CLUSTERHEADS |
CANNADY |
2013 |
| CHRISTIAN GRAHAM |
AN EXAMINATION OF THE TYPE OF LEADERSHIP AMONG GENERATION Y LEADERS AND ITS IMPACT ON VIRTUAL TEAM BEHAVIOR |
COHEN |
2013 |
| STEPHANIE GURLEN |
SECURITY DESIGN FLAWS THAT AFFECT USABILITY IN ONLINE BANKING |
COHEN |
2013 |
| YOURIK HACOUPIAN |
MINING ASPECTS THROUGH CLUSTER ANALYSIS USING SUPPORT VECTOR MACHINES AND GENETIC ALGORITHMS |
MITROPOULOS |
2013 |
| RAYMOND HALPER |
A POWER CONSERVATION METHODOLOGY FOR HARD DRIVES BY COMBINING PREFETCHING ALGORITHMS AND FLASH MEMORY |
SIMCO |
2013 |
| MARK HARRIS |
ELEMENTS OF A KNOWLEDGE MANAGEMENT GUIDE FOR PUBLIC SECTOR ORGANIZATIONS |
ABRAMSON |
2013 |
| KATHARINE HIXSON |
DEVELOPING AND EVALUATING TEAM TRAINING PROGRAMS FOR LONG-DURATION SPACEFLIGHT CREWS |
ABRAMSON |
2013 |
| JAMES JAUREZ |
DEVELOPMENT OF A MEDIA DRIVEN ONLINE ASSESSMENT FRAMEWORK: IMPROVING QUALITY, FREQUENCY, AND DEPLOYMENT OF GRADES AND FEEDBACK IN HIGHER EDUCATION |
WANG |
2013 |
| RUSSELL JOHNSON |
AUTHORSHIP ATTRIBUTION WITH FUNCTION WORD N-GRAMS |
LASZLO |
2013 |
| GREGORY JULOCK |
THE EFFECTIVENESS OF A RANDOM FORESTS MODEL IN DETECTING NETWORK-BASED BUFFER OVERFLOW ATTACKS |
LI |
2013 |
| DONNA KENNEDY |
AN INVESTIGATION OF CANDIDATES’ LIVED EXPERIENCE OF ATTRITION IN A LIMITED-RESIDENCY DOCTORAL PROGRAM |
TERRELL |
2013 |
| JAMES KIPER |
COORDINATING TRAINING PROGRAMS WITH BUSINESS PROCESSES IN LARGE ORGANIZATIONS |
ELLIS |
2013 |
| JACOB KRIVE |
EFFECTIVENESS OF EVIDENCE-BASED CPOE MEDICATION ORDER SETS MEASURED BY HEALTH OUTCOMES |
ZINK |
2013 |
| DANIEL KRUTZ |
CONCOLIC CODE CLONE DETECTION |
MITROPOULOS |
2013 |
| CAROLYN LAMACCHIA |
TECHNIQUE FOR IMPROVING THE SCALABILITY OF AN EXACT APPROACH FOR FREQUENT ITEMSET HIDING |
MUKHERJEE |
2013 |
| LERONE LATOUCHE |
USABILITY ISSUES IN THE USER INTERFACES OF PRIVACY-ENHANCING TECHNOLOGIES |
COHEN |
2013 |
| JEFFREY LINNEY |
ASSESSING BEHAVIORAL INTENTION TO USE LOW SOCIAL PRESENCE ICTS FOR INTERPERSONAL TASK COMPLETION AMONG COLLEGE STUDENTS: WITH SPECIAL CONSIDERATION TOWARD SHORT MESSAGE SERVICE (SMS) TEXT-MESSAGING |
ELLIS |
2013 |
| HERNAN LONDONO |
THE EFFECTS OF CROSSCUTTING HOMOGENEITY ON THE EVOLVABILITY OF ASPECT ORIENTED SOFTWARE |
MITROPOULOS |
2013 |
| MARGARET LONG |
E-BUSINESS REPORTING: TOWARDS A GLOBAL STANDARD FOR FINANCIAL REPORTING SYSTEMS USING XBRL |
NYSHADHAM |
2013 |
| RICHARD MACMILLAN |
EXAMINING THE ADOPTION OF DONOR MANAGEMENT SYSTEMS (DMS) IN NOT-FOR–PROFIT (NFP) ORGANIZATIONS WITH AN EXTENDED TAM |
WANG |
2013 |
| FRANCIS MANNING |
A FRAMEWORK FOR ENFORCING ROLE BASED ACCESS CONTROL IN OPEN SOURCE SOFTWARE |
MITROPOULOS |
2013 |
| KATHLEEN MARRS |
AN INVESTIGATION OF THE FACTORS THAT INFLUENCE FACULTY AND STUDENT ACCEPTANCE OF MOBILE LEARNING IN ONLINE HIGHER EDUCATION |
LITTMAN |
2013 |
| JACK MASON |
A HYBRID ARCHITECTURE FOR CONTEXT PRESERVATION DURING THREAD LEVEL SPECULATIVE EXECUTION |
SIMCO |
2013 |
| CHARLES MAYBERRY |
THE IMPACT OF AUGMENTED REALITY TRAINING ON PERFORMANCE |
ABRAMSON |
2013 |
| RICHARD MERRITTS |
ONLINE DECEPTION DETECTION USING BDI AGENTS |
CANNADY |
2013 |
| RICHARD MISLAN |
AN ANALYSIS OF MOBILE PHONE FORENSIC REPORTS AS TRIAGE TOOLS FOR GATHERING ON-SCENE INTELLIGENCE |
COHEN |
2013 |
| CHIOU MOH |
DEVELOPMENT AND ASSESSMENT OF MOBILE DEVICE SUPPORT FOR CERTIFICATION EXAM PREPARATION |
WANG |
2013 |
| DAVID MOORE |
ASPECTASSAY: A TECHNIQUE FOR EXPANDING THE POOL OF AVAILABLE ASPECT MINING TEST DATA USING CONCERN SEEDING |
MITROPOULOS |
2013 |
| AUGUST MURRAY |
IMPACT OF MILITARY DEPLOYMENT AND DISTANCE LEARNING ON SOLDIER-STUDENTS |
ABRAMSON |
2013 |
| BARBARA NEEQUAYE |
A MATURITY MODEL FOR ONLINE CLASSES ACROSS ACADEMIC DISCIPLINES |
ABRAMSON |
2013 |
| SANG NGUYEN |
MEASURING END-TO-END AJAX PERFORMANCE IN BROADBAND SATELLITE NETWORKS |
SIMCO |
2013 |
| MARIA PARES TORAL |
THE EFFECT OF THE USE OF THE 3-D MULTI-USER VIRTUAL ENVIRONMENT SECOND LIFE ON STUDENT MOTIVATION AND LANGUAGE PROFICIENCY IN COURSES OF SPANISH AS A FOREIGN LANGUAGE |
TERRELL |
2013 |
| SHARON PARKER |
AN EXPLORATION OF THE FACTORS INFLUENCING THE ADOPTION OF AN IS GOVERNANCE FRAMEWORK. |
ACKERMAN |
2013 |
| JERRY PEREZ |
AN INVESTIGATION OF RUN-TIME OPERATIONS IN A HETEROGENEOUS DESKTOP GRID ENVIRONMENT: THE TEXAS TECH UNIVERSITY (TTU) DESKTOP GRID CASE STUDY |
LITTMAN |
2013 |
| LEVI PERIGO |
AN EXAMINATION OF THE DESIGN, DEVELOPMENT, AND IMPLEMENTATION OF AN INTERNET PROTOCOL VERSION 6 (IPV6) NETWORK INFRASTRUCTURE: THE ADTRAN INC. CASE STUDY |
LITTMAN |
2013 |
| KELLIE PRICE |
USING VISUAL TECHNOLOGIES IN THE INTRODUCTORY PROGRAMMING COURSE FOR COMPUTER SCIENCE MAJORS |
ABRAMSON |
2013 |
| JOHN QUEERN |
AN EVOLUTIONARY ALGORITHM FOR THE CONSTRAINED FOREST PROBLEM. |
MUKHERJEE |
2013 |
| SCOTT RAGSDALE |
PURSUING AND COMPLETING AN UNDERGRADUATE COMPUTING DEGREE FROM A FEMALE PERSPECTIVE: A QUANTITATIVE AND QUALITATIVE ANALYSIS |
TERRELL |
2013 |
| JAIME RAIGOZA |
TEMPORAL JOIN PROCESSING WITH HILBERT CURVE SPACE MAPPING |
SUN |
2013 |
| JAMES RENEAU |
AN EXAMINATION OF THE ACCEPTANCE, ADOPTION, AND DIFFUSION OF SMARTPHONE DEVICES WITH SENIOR CITIZENS |
COHEN |
2013 |
| SUSAN RIZZO |
MAKING THE SHIFT: A PHENOMENOLOGICAL STUDY OF TEACHERS’ EXPERIENCES IN A STUDENT-CENTERED, 21ST CENTURY LAPTOP PROGRAM |
SNYDER |
2013 |
| JEFFREY ROACH |
PREDICTING REALISTIC STANDING POSTURES IN A REAL-TIME ENVIRONMENT |
LASZLO |
2013 |
| STEPHEN ROCHE |
EFFECTIVENESS OF ONLINE EDUCATION WITHIN THE AFFECTIVE DOMAIN |
TERRELL |
2013 |
| KIMBERLEE ROUND |
DEVELOPMENT AND EVALUATION OF HAWKLEARN: A NEXT GENERATION LEARNING MANAGEMENT SYSTEM |
ABRAMSON |
2013 |
| WILLIAM SAUSE |
A COORDINATED REINFORCEMENT LEARNING FRAMEWORK FOR MULTI-AGENT VIRTUAL ENVIRONMENTS |
LASZLO |
2013 |
| VINCENT SCOVETTA |
THE IMPACT OF LEADERSHIP SOCIAL POWER ON KNOWLEDGE MANAGEMENT SUCCESS |
ELLIS |
2013 |
| BILLY SHREWSBURY |
SUPERVISED LEARNING METHODS TO ENHANCE CUSTOMER LIFETIME VALUE MODELS FOR MULTI-CHANNEL RETAIL SALES ORGANIZATIONS |
MUKHERJEE |
2013 |
| GARRETT SMILEY |
INVESTIGATING THE ROLE OF MULTIBIOMETRIC AUTHENTICATION ON PROFESSIONAL CERTIFICATION E-EXAMINATION |
LEVY |
2013 |
| LAWRENCE SNYDER |
THE EFFECTIVENESS OF VIRTUAL LEARNING TOOLS FOR MILLENNIAL GENERATION STUDENTS IN A COMMUNITY COLLEGE CRIMINAL JUSTICE DEGREE PROGRAM |
WANG |
2013 |
| JOSHUA STALKER |
A READING PREFERENCE AND RISK TAXONOMY FOR PRINTED PROPRIETARY INFORMATION COMPROMISE IN THE AEROSPOACE AND DEFENSE INDUSTRY |
LEVY |
2013 |
| ERIC STRAW |
CONSTRUCTION OF A CONCEPTUALIZATION OF PERSONAL KNOWLEDGE WITHIN A KNOWLEDGE MANAGEMENT PERSPECTIVE USING GROUNDED THEORY METHODOLOGY |
ELLIS |
2013 |
| LAWRENCE TAUB |
APPLICATION OF A LAYERED HIDDEN MARKOV MODEL IN THE DETECTION OF NETWORK ATTACKS |
CANNADY |
2013 |
| MATTHEW TENNYSON |
AUTHORSHIP ATTRIBUTION OF SOURCE CODE |
MITROPOULOS |
2013 |
| HICHAM TOUT |
PHISHTEST: MEASURING THE IMPACT OF EMAIL HEADERS ON THE PREDICTIVE ACCURACY OF MACHINE LEARNING TECHNIQUES |
LI |
2013 |
| MARY VICKS |
AN EXAMINATION OF INTERNET FILTERING AND SAFETY POLICY TRENDS AND ISSUES IN SOUTH CAROLINA’S K-12 PUBLIC SCHOOLS |
ZINK |
2013 |
| STANIE WADDELL |
A STUDY OF THE EFFECT OF INFORMATION SECURITY POLICIES ON INFORMATION SECURITY BREACHES IN HIGHER EDUCATION INSTITUTIONS |
WANG |
2013 |
| KENNETH WHITE |
EMPLOYEE DETERMINANTS TO SHARE KNOWLEDGE IN A U.S. FEDERAL GOVERNMENT ENVIRONMENT: AN EXPLORATORY STUDY |
ZINK |
2013 |
| RICHARD WILKINS |
DOWNLOAD TIME REDUCTION USING RECENT PERFORMANCE-BIASED PEER REPLACEMENT IN STOCHASTIC P2P CONTENT DELIVERY NETWORKS |
SIMCO |
2013 |
| SHARON WRIGHT |
EXAMINING THE IMPACT OF COLLABORATION TECHNOLOGY TRAINING SUPPORT ON VIRTUAL TEAM COLLABORATION EFFECTIVENESS |
ELLIS |
2013 |
| DANIEL YOAS |
USING FORECASTING TO PREDICT LONG-TERM RESOURCE UTILIZATION FOR WEB SERVICES |
SIMCO |
2013 |
| FAYEZ ABBOUD |
UTILIZING IMAGE-BASED FORMATS TO OPTIMIZE PATTERN DATA FORMAT AND PROCESSING IN MASK AND MASKLESS PATTERN GENERATION LITHOGRAPHY |
LIU |
2012 |
| BARRY AHRENS |
A TOUR CONSTRUCTION FRAMEWORK FOR THE TRAVELLING SALESMAN PROBLEM |
LI |
2012 |
| RAMI ALNATSHEH |
FREQUENT ITEMSET HIDING ALGORITHM USING FREQUENT PATTERN TREE APPROACH. |
MUKHERJEE |
2012 |
| ALBERT BALL |
A COMPARISON OF PERSONAL INFORMATION SHARING AWARENESS, HABITS, AND PRACTICES OF USERS IN SOCIAL NETWORKING SITES AND E-LEARNING SYSTEMS |
LEVY |
2012 |
| KAREN BARON |
INCORPORATING PERSONAL HEALTH RECORDS INTO THE DISEASE MANAGEMENT OF RURAL HEART FAILURE PATIENTS |
ABRAMSON |
2012 |
| DONALD BESS |
UNDERSTANDING INFORMATION SECURITY CULTURE IN A ORGANIZATION: AN INTERPRETATIVE CASE STUDY |
TEJAY |
2012 |
| AVRIL BEST |
ONLINE ACADEMIC SUPPORT PEER GROUPS FOR MEDICAL UNDERGRADUATES |
ABRAMSON |
2012 |
| SANDRA BOESCH |
A STUDY OF TARGETED INFORMATION SYSTEM ACCESSIBILITY AND USAGE BY THE FOREIGN DOMESTIC WORKER IN SINGAPORE |
COHEN |
2012 |
| JOHN BONO |
THE INFLUENCE OF WEB SITE AESTHETICS ON IMPULSE PURCHASE BEHAVIOR WITHIN ONLINE RETAILING ENVIRONMENTS |
COHEN |
2012 |
| LINDA BROCK |
THE MARKET VALUE OF INFORMATION SYSTEM (IS) SECURITY: AN EVENT STUDY OF E-BANKING SERVICE PROVIDERS |
LITTMAN |
2012 |
| DEXTER BROWN |
A COMPARATIVE ANALYSIS OF MACHINE LEARNING TECHNIQUES FOR FORECLOSURE PREDICTION. |
MUKHERJEE |
2012 |
| PAUL CERKEZ |
AUTOMATED DETECTION OF SEMAGRAM LADEN IMAGES |
CANNADY |
2012 |
| FIRAS CHAHINE |
A GENETIC ALGORITHM THAT EXCHANGES NEIGHBORING CENTERS FOR FUZZY C-MEANS CLUSTERING. |
MUKHERJEE |
2012 |
| RAMADHAN CHUMA |
INVESTIGATING THE IMPACT OF SELF-CONTROL AND DETERRENTS ON NONCOMPLIANT INFORMATION SECURITY BEHAVIOR |
TEJAY |
2012 |
| JEEVAN D'SOUZA |
REGION-BASED CROSSOVER FOR CLUSTERING PROBLEMS |
LASZLO |
2012 |
| STEPHEN DINKEL |
UNCERTAINTY REASONING FOR SERVICE-BASED SITUATIONAL AWARENESS INFORMATION ON THE SEMANTIC WEB |
HAFNER |
2012 |
| HENRY DIRSKA |
A DECLARATIVE RULES API FOR MANAGING ADAPTATION RELATIONSHIPS IN CONTEXT-ORIENTED PROGRAMMING |
LASZLO |
2012 |
| GARY DOSS |
AN APPROACH TO EFFECTIVELY IDENTIFY INSIDER ATTACKS WITHIN AN ORGANIZATION |
TEJAY |
2012 |
| JOHN FREUND |
CONSTRUCTING A COMMUNITY RESPONSE GRID: THE DUBLIN, OHIO CASE STUDY |
LITTMAN |
2012 |
| GLENDA GAY |
A STUDY OF TECHNOLOGICAL BARRIERS TO INSTRUCTOR E-READINESS IN AN ONLINE ENVIRONMENT |
DRINGUS |
2012 |
| BARBARA HARBULA |
AN EXAMINATION OF TEACHERS INTEGRATION OF WEB 2.0 TECHNOLOGIES IN SECONDARY CLASSROOMS: A PHENOMENOLOGICAL RESEARCH STUDY |
WANG |
2012 |
| JEREMY HARRIS |
TOWARDS AN INTERNET-BASED DISTANCE EDUCATION (IDE) FRAMEWORK FOR RELIGIOUS-BASED HIGHER EDUCATION ORGANIZATIONS: A CASE OF THE ALLIANCE FOR ASSEMBLIES OF GOD HIGHER EDUCATION |
TERRELL |
2012 |
| KENRIE HYLTON |
AN EXPERIMENT USING WEBCAM-BASED SURVEILLANCE TO DETER INFORMATION SYSTEMS MISUSE |
LEVY |
2012 |
| JACK HYMAN |
TOWARDS AN UNDERSTANDING OF CONTEXTUAL USABILITY AND ITS IMPACT ON MOBILE COMMERCE |
COHEN |
2012 |
| RICARDO JIMENEZ |
A COMPARISON OF A YOUNG AND OLDER ADULT POPULATION OF COMPUTER USERS’ RECOGNITION RATES OF DIFFERENT TACTONS USING MODULATION AND SIMPLE-WAVEFORMS AS STIMULUS PARAMETERS. |
COHEN |
2012 |
| GERALD JOHNSON |
DEVELOPMENT OF AN AUDIT CLASSIFICATION INDEX (ACI) FOR FEDERAL E-LEARNING SYSTEMS SECURITY VULNERABILITIES |
LEVY |
2012 |
| STEPHAN JUNION |
INSTRUCTIONAL DESIGN STRATEGIES AND ACTIVITIES THAT INFORM THE COMMUNITY OF INQUIRY (COI) FRAMEWORK |
SNYDER |
2012 |
| RONALD KRAWITZ |
CLONE CODE DISCOVERY BASED ON FUNCTIONAL BEHAVIOR |
MITROPOULOS |
2012 |
| DAVID KUMKA |
QUANTIFYING PERFORMANCE COSTS OF DATABASE FINE-GRAINED ACCESS |
SUN |
2012 |
| SANDRA LEBRON-LOZADA |
LEARNING CONVERSATIONAL ENGLISH WITH STUDENT-GENERATED PODCASTS |
ABRAMSON |
2012 |
| GARY LIEBERMAN |
SECURELY HANDLING INTER-APPLICATION CONNECTION CREDENTIALS |
MITROPOULOS |
2012 |
| YAN LIU |
CORRELATION OF SOFTWARE QUALITY METRICS AND PERFORMANCE |
MITROPOULOS |
2012 |
| MICHAEL LOHLE |
IMPLICATIONS FOR REAL PROJECT MANAGEMENT SUCCESS: A STUDY OF AVATAR IDENTITY AS AN ANTECEDENT OF VIRTUAL TEAM TRUST |
TERRELL |
2012 |
| ROBERT MATTHEWS |
A PORTRAIT OF THE EARLY 21ST CENTURY MBA |
ABRAMSON |
2012 |
| HERBERT MATTORD |
ASSESSMENT OF WEB-BASED AUTHENTICATION METHODS IN THE U.S.: COMPARING E-LEARNING SYSTEMS TO INTERNET HEALTHCARE INFORMATION SYSTEMS |
LEVY |
2012 |
| DANA MAXIE |
THE IMPACT OF DATA-DRIVEN DECISION MAKING ON EDUCATIONAL PRACTICE IN LOUISIANA SCHOOLS |
ABRAMSON |
2012 |
| DONALD MCKAY II |
INFORMATION TECHNOLOGY PROJECT LEARNING PRACTICES AND PROJECT PERFORMANCE |
ELLIS |
2012 |
| DOUGLAS MILLER |
THE EFFECT OF INTERACTIVE TELEVISION AS AN INSTRUCTION DELIVERY METHOD IN RURAL SECONDARY SCHOOLS ON LEARNER ACHIEVEMENT, MOTIVATION AND ANXIETY |
TERRELL |
2012 |
| GLORIA MIYARES |
UNDERACHIEVING GIFTED SCIENCE STUDENTS AND MULTI-USER VIRTUAL ENVIRONMENTS |
TERRELL |
2012 |
| DENNIS MIZE |
A STUDY OF REQUIREMENTS VOLATILITY AND FOOTPRINT VISUALIZATION PROPERTIES IN EVOLVING USE CASE DATA SETS |
MITROPOULOS |
2012 |
| EDWIN NASSIFF |
UNDERSTANDING THE VALUE OF ENTERPRISE ARCHITECTURE FOR ORGANIZATIONS: A GROUNDED THEORY APPROACH |
TEJAY |
2012 |
| WAYNE PAULEY |
AN EMPIRICAL STUDY OF PRIVACY RISK ASSESSMENT METHODOLOGIES IN CLOUD COMPUTING ENVIRONMENTS |
HAFNER |
2012 |
| SYED RAZA |
SELECTING ONLINE VENDORS BY PRIVACY RISKS |
SEAGULL |
2012 |
| DAVID REIS |
AN EXAMINATION OF AN INFORMATION SECURITY FRAMEWORK IMPLEMENTATION BASED ON AGILE VALUES TO ACHIEVE HIPAA SECURITY RULE COMPLIANCE IN AN ACADEMIC MEDICAL CENTER: THE THOMAS JEFFERSON UNIV. CASE STUDY |
LITTMAN |
2012 |
| HERNAN RUF |
A COMPARATIVE STUDY ON ELECTRONIC VS. TRADITIONAL DATA COLLECTION IN A SPECIAL EDUCATION SETTING |
DRINGUS |
2012 |
| DEREK SEDLACK |
REDUCING INCONGRUITY OF PERCEPTIONS RELATED TO INFORMATION RISK: DIALOGICAL ACTION RESEARCH IN ORGANIZATIONS |
TEJAY |
2012 |
| FARNAZ SHARIFRAZI |
THE INVESTIGATION OF A SYNCHRONOUS ENGAGEMENT SYSTEMS (SES) TO ALLEVIATE ANXIETY AMONG ELEARNING STUDENTS IN AN MBA PROGRAM |
WANG |
2012 |
| DEVENA SINGLETON |
THE TRANSITION FROM TRADITIONAL TO BLENDED ON-CAMPUS LEARNING EXPERIENCE |
ABRAMSON |
2012 |
| NANCY SMITH |
EVOLVING CREDIBLE FACIAL EXPRESSIONS WITH INTERACTIVE GAS |
LASZLO |
2012 |
| FOREST THOLA |
MINIMIZING RECOMMENDER ERROR COSTS UNDER NOISY INPUTS IN RULE-BASED EXPERT SYSTEMS. |
MUKHERJEE |
2012 |
| GERRY VAN LOON |
TOWARD AN UNDERSTANDING OF INTERNET WORD OF MOUTH MESSAGE CONTENT AND THE BOOKING INTENTIONS OF LODGING CONSUMERS |
NYSHADHAM |
2012 |
| KAREN VIGNARE |
AN INVESTIGATION OF TRADITIONAL STUDENTS PREFERENCES FOR SOCIAL AND TEACHING PRESENCE IN ONLINE LEARNING |
DRINGUS |
2012 |
| RAYMOND WELLS |
AN EMPIRICAL ASSESSMENT OF FACTORS CONTRIBUTING TO INDIVIDUALS’ PROPENSITY TO COMMIT SOFTWARE PIRACY IN THE BAHAMAS |
LEVY |
2012 |
| ELIZABETH YAGODZINSKI |
FORMATIVE RESEARCH ON AN INSTRUCTIONAL DESIGN THEORY FOR ONLINE LEARNING COMMUNITIES: A HIGHER EDUCATION FACULTY DEVELOPMENT CASE |
SNYDER |
2012 |
| JILL YOUNG |
ANALYZING E-VOTING MACHINE TABULATIONS: A CASE STUDY TO DETERMINE THE ACCURACY OF E-VOTING MACHINES USED IN THE STATE OF MISSOURI |
LITTMAN |
2012 |
| RAYMOND ANGELO |
COLLABORATIVE GROUP LEARNING AND KNOWLEDGE BUILDING TO ADDRESS INFORMATION SYSTEMS PROJECT FAILURE |
DRINGUS |
2011 |
| MOHAMMAD AWWAL |
AN EMPIRICAL INVESTIGATION OF THE RELATIONSHIP BETWEEN COMPUTER SELF-EFFICACY AND INFORMATION PRIVACY CONCERNS |
HAFNER |
2011 |
| RITA BARRIOS |
AN ADAPTIVE DATABASE INTRUSION DETECTION SYSTEM |
CANNADY |
2011 |
| MAX BAUMGARTNER |
INSTRUCTIONAL TECHNOLOGIES IN GRADUATE PHYSICAL THERAPY COURSES |
ABRAMSON |
2011 |
| HARPREET BHASIN |
AN EVOLUTIONARY ALGORITHM FOR FEATURE SUBSET SELECTION IN HARD DISK DRIVE FAILURE PREDICTION. |
MUKHERJEE |
2011 |
| ANITA BLEFFERT-SCHMIDT |
THE BLENDED LEARNING EXPERIENCE OF COMMUNITY COLLEGE STUDENTS |
ABRAMSON |
2011 |
| STEPHEN BRONSBURG |
THE IMPACT OF AN OSTEOPATHIC MEDICAL PROGRAM ON INFORMATION TECHNOLOGY SKILLS OF PHYSICIANS ENTERING THE HEALTHCARE WORKFORCE |
LEVY |
2011 |
| CARLTON CUNNINGHAM |
USING LEARNER-CONTROLLED EXTRINSIC MOTIVATORS TO INCREASE ACHIEVEMENT IN TECHNOLOGY-ENHANCED FLEXIBLE LEARNING ENVIRONMENTS |
WANG |
2011 |
| KIMBERLEY DUNKERLEY |
DEVELOPING AN INFORMATION SYSTEMS SECURITY SUCCESS MODEL FOR ORGANIZATIONAL CONTEXT |
TEJAY |
2011 |
| CRIS EWELL |
DETECTION OF DEVIATIONS FROM AUTHORIZED NETWORK ACTIVITY USING DYNAMIC BAYESIAN NETWORKS |
CANNADY |
2011 |
| WEAM FARID |
THE NORMAP METHODOLOGY: NON-FUNCTIONAL REQUIREMENTS MODELING FOR AGILE PROCESSES |
MITROPOULOS |
2011 |
| JEAN FRENCH |
AUTOMATIC VIDEO INDEXING: IDENTIFICATION OF AFFECTIVE CONTENT USING WELL-DEFINED EMOTIONAL CATEGORIES |
HAFNER |
2011 |
| DEBORAH GEARS |
WIKI BEHAVIOR IN THE WORKPLACE: EMOTIONAL ASPECTS OF CONTENT |
ZINK |
2011 |
| MARK GIVENS |
THE IMPACT OF NEW INFORMATION TECHNOLOGY ON BUREAUCRATIC ORGANIZATIONAL CULTURE |
ABRAMSON |
2011 |
| IAN GREAVES |
AN INVESTIGATION OF ENTERPRISE RESOURCE PLANNING (ERP) AND SUPPORTING TECHNOLOGIES |
ACKERMAN |
2011 |
| WILLIAM HEATON |
NEW RECORD ORDERING HEURISTICS FOR MULTIVARIATE MICROAGGREGATION |
MUKHERJEE |
2011 |
| PETER HOLUB |
THE INFLUENCE OF NARRATIVE IN FOSTERING AFFECTIVE DEVELOPMENT OF MEDICAL PROFESSIONALISM IN AN ONLINE CLASS |
TERRELL |
2011 |
| YA-CHEN KAO |
A STUDY OF TEACHER-STUDENT COLLABORATION ON COURSE DESIGN WITH TECHNOLOGY AT WENZAO URSULINE COLLEGE OF LANGUAGES IN TAIWAN |
WANG |
2011 |
| ROBERT KEMERLING |
CONTROLLING WITH MODEL TREES |
MUKHERJEE |
2011 |
| PETR KRAUS |
SCALABLE METHODOLOGY FOR PERFORMANCE-BASED SELECTION OF SECURITY SERVICES FOR DISTRIBUTED SYSTEMS |
SIMCO |
2011 |
| ALLY LEE |
AN EMPIRICAL INVESTIGATION OF THE ROLE OF INFORMATION QUALITY IN CITIZENS’ TRUST IN E-GOVERNMENT SYSTEMS |
LEVY |
2011 |
| DIETRICK LEWIS |
THE PRINCIPAL AS TECHNOLOGY INTEGRATION LEADER |
ABRAMSON |
2011 |
| BERNARD LICHVAR |
AN EMPIRICAL INVESTIGATION OF THE EFFECT OF KNOWLEDGE SHARING AND ENCOURAGEMENT OF OTHERS IN PREDICTING COMPUTER SELF-EFFICACY AND USE OF IS IN THE WORKPLACE |
LEVY |
2011 |
| WILLIAM LINDSEY |
THE RELATIONSHIP BETWEEN PERSONALITY TYPE AND SOFTWARE USABILITY USING THE MYERS-BRIGGS TYPE INDICATOR (MBTI) AND THE SOFTWARE USABILITY MEASUREMENT INVENTORY (SUMI) |
COHEN |
2011 |
| ELIZABETH MADDREY |
THE EFFECT OF PROBLEM SOLVING INSTRUCTION ON THE PROGRAMMING SELF-EFFICACY OF INTRODUCTORY COMPUTER SCIENCE STUDENTS |
TERRELL |
2011 |
| DUNG MAI |
A HEURISTIC FOR THE CONSTRAINED ONE-SIDED TWO-LAYERED CROSSING REDUCTION PROBLEM FOR DYNAMIC GRAPH LAYOUT |
LASZLO |
2011 |
| GARY MANSI |
AN ASSESSMENT OF INSTANT MESSAGING INTERRUPTIONS ON KNOWLEDGE WORKERS’ TASK PERFORMANCE IN E-LEARNING-BASED TRAINING |
LEVY |
2011 |
| ROBERT MASON |
INTEROPERABILITY GAP CHALLENGES FOR LEARNING OBJECT REPOSITORIES AND LEARNING MANAGEMENT SYSTEMS |
ELLIS |
2011 |
| BARRY MCINTOSH |
AN ETHNOGRAPHIC INVESTIGATION OF THE ASSIMILATION OF NEW ORGANIZATIONAL MEMBERS INTO AN INFORMATION SECURITY CULTURE |
TEJAY |
2011 |
| WAYNE MIER |
INVESTIGATING THE USE AND EFFECTIVENESS OF PRINCIPLES LEARNED IN AN ONLINE FACULTY-TRAINING PROGRAM |
TERRELL |
2011 |
| MARIO MISSAKIAN |
ANALYTIC HIERARCHY PROCESS BASED RECOMMENDER SYSTEM FOR MODEL SELECTION. |
MUKHERJEE |
2011 |
| BRUCE MONTGOMERY |
THE IMPACT OF THE USER INTERFACE ON SIMULATION USABILITY AND SOLUTION QUALITY |
COHEN |
2011 |
| CONSTANCE MUSSA |
A PRUDENT ACCESS CONTROL BEHAVIORAL INTENTION MODEL FOR THE HEALTHCARE DOMAIN |
COHEN |
2011 |
| ADAM NORTEN |
NURSES ACCEPTANCE OF RFID TECHNOLOGY IN A MANDATORY-USE ENVIRONMENT |
LITTMAN |
2011 |
| CHARLES PAK |
NEAR REAL-TIME RISK ASSESSMENT USING HIDDEN MARKOV MODELS |
CANNADY |
2011 |
| MARXAN PESCETTA |
TEACHING DIGITAL CITIZENSHIP IN A GLOBAL ACADEMY |
ABRAMSON |
2011 |
| RENATA RAND MCFADDEN |
ASPECT MINING USING MODEL-BASED CLUSTERING |
MITROPOULOS |
2011 |
| MARK SANBORN |
MICROCLIMATE HABITAT MONITORING: WIRELESS SENSOR NETWORKS |
LITTMAN |
2011 |
| BABAK SHORAKA |
AN EMPIRICAL INVESTIGATION OF THE ECONOMIC VALUE OF INFORMATION SECURITY MANAGEMENT SYSTEM STANDARDS |
TEJAY |
2011 |
| JESSICA SMITH |
COMPUTER MUSIC COMPOSITION USING CROWDSOURCING AND GENETIC ALGORITHMS |
COHEN |
2011 |
| WILLIAM TRIBBEY |
CONSTRUCTION AND ANALYSIS OF VECTOR SPACE MODELS FOR USE IN ASPECT MINING |
MITROPOULOS |
2011 |
| DENNIS VICKERS |
A DOMAIN AWARE GENETIC ALGORITHM FOR THE P-MEDIAN PROBLEM. |
MUKHERJEE |
2011 |
| DONGQING YUAN |
DEVELOPING AND EVALUATING OPEN SOURCE NETWORK LABORATORY AND CURRICULUM |
WANG |
2011 |
| MARY ANGELES |
USE OF DYNAMIC POOL SIZE TO REGULATE SELECTION PRESSURE IN COOPERATIVE COEVOLUTION ALGORITHMS |
LASZLO |
2010 |
| JAMES BRADY |
AN INVESTIGATION OF FACTORS THAT AFFECT HIPPA SECURITY COMPLIANCE IN ACADEMIC MEDICAL CENTERS |
LITTMAN |
2010 |
| MICHAEL BROWN |
A SPECIES-CONSERVING GENETIC ALGORITHM FOR MULTIMODAL OPTIMIZATION |
LASZLO |
2010 |
| JESSIE BURNS |
AN INVESTIGATION OF MULTIPLE INTEGRATION TECHNIQUES FOR INFORMATION SYSTEMS: A MODEL FOR INTEGRATING DATA WAREHOUSING, ERP, AND SOA IN PRACTICE |
SCIGLIANO |
2010 |
| CHUN-I CHEN |
FACTORS AFFECTING BUSINESS-TO-BUSINESS ELECTRONIC COMMERCE SUCCESS: AN EMPIRICAL INVESTIGATION |
NYSHADHAM |
2010 |
| MARLON CLARKE |
THE ROLE OF SELF-EFFICACY IN COMPUTER SECURITY BEHAVIOR: DEVELOPING THE CONSTRUCT OF COMPUTER SECURITY SELF-EFFICACY (CSSE) |
LEVY |
2010 |
| ERIC DITRICH |
AN EVOLUTIONARY METHOD FOR COMPLEMENTARY CELL SUPPRESSION. |
MUKHERJEE |
2010 |
| NORAIDA DOMINGUEZ FLORES |
ONLINE LEARNING COMMUNITIES: ENHANCING THE ACQUISITION OF INFORMATION SKILLS BY UNDERGRADUATE STUDENTS OF THE UNIVERSITY OF PUERTO RICO AT CAROLINA |
WANG |
2010 |
| CRYSTAL EDGE |
QUANTITATIVE ASSESSMENT OF THE MODULARIZATION OF SECURITY DESIGN PATTERNS WITH ASPECTS |
MITROPOULOS |
2010 |
| MOHAMED ELHINDI |
DESIGN AND DEVELOPMENT OF AN IDENTITY MANAGEMENT SYSTEM: THE MINNESOTA STATE COLLEGE-SOUTHEAST TECHNICAL CASE STUDY |
LITTMAN |
2010 |
| JASON FERGUSON |
AN EXAMINATION OF A VIRTUAL PRIVATE NETWORK IMPLEMENTATION TO SUPPORT A TELEWORKING INITIATIVE: THE MARCUS FOOD COMPANY INC. CASE STUDY |
LITTMAN |
2010 |
| ALBERTO FERNANDEZ |
THE EFFECTS OF COURSECASTING IN INTERNATIONAL STUDENTS’ LANGUAGE COMPREHENSION, ACADEMIC PERFORMANCE AND OVERALL COURSE EXPERIENCE |
ELLIS |
2010 |
| LORI GEIST |
THE DESIGN AND DEVELOPMENT OF COLLABORAT: A GROUPWARE SOLUTION FOR TEAMS SUPPORTING SCHOOL-AGE STUDENTS WHO USE ASSISTIVE TECHNOLOGY |
DRINGUS |
2010 |
| GORDON GRANT |
ASCERTAINING THE RELATIONSHIP BETWEEN THE SECURITY AWARENESS AND THE SECURITY BEHAVIOR OF INDIVIDUALS |
HAFNER |
2010 |
| GAIL HODGE |
A STUDY OF FIRST- AND CONTINUING-GENERATION COLLEGE STUDENTS’ USE OF INTERNET COMMUNICATION TECHNOLOGIES IN SOCIAL CAPITAL AND ITS CONTRIBUTION TO THEIR PERSISTENCE IN COLLEGE |
LEVY |
2010 |
| SENG KENG |
COMPARING THE CULTURAL DIMENSIONS AND LEARNERS’ PERCEIVED EFFECTIVENESS OF ONLINE LEARNING SYSTEMS (OLS) AMONG AMERICAN AND MALAYSIAN LEARNERS |
LEVY |
2010 |
| GARY KESSLER |
JUDGES AWARENESS, UNDERSTANDING, AND APPLICATION OF DIGITAL EVIDENCE |
LITTMAN |
2010 |
| RAMESH KONDA |
PREDICTING MACHINING RATE IN NON-TRADITIONAL MACHINING USING DECISION TREE INDUCTIVE LEARNING |
MUKHERJEE |
2010 |
| JANAKI KRISHNAMURTHY |
QUALITY MARKET: DESIGN AND FIELD STUDY OF PREDICTION MARKET FOR SOFTWARE QUALITY CONTROL |
NYSHADHAM |
2010 |
| MICHAEL LEHRFELD |
PEER SELECTION ALGORITHM IN STOCHASTIC CONTENT DELIVERY NETWORKS TO PROVIDE AN OPTIMAL NODE-SERVER SET TO MINIMIZE FILE DOWNLOAD TIME |
SIMCO |
2010 |
| KEITH LYONS |
AN ANALYSIS OF THE RADIO FREQUENCY IDENTIFICATION (RFID) TECHNOLOGY IMPLEMENTATION WITHIN AN INDEPENDENT PUBLIC LIBRARY SYSTEM: A CASE STUDY OF THE NORTH CANTON, OHIO PUBLIC LIBRARY |
ZINK |
2010 |
| GENNADIY MAKOVOZ |
LATENT SEMANTIC ANALYSIS AS A METHOD OF CONTENT-BASED IMAGE RETRIEVAL IN MEDICAL APPLICATIONS |
MUKHERJEE |
2010 |
| MICHAEL MCCABE |
EVALUATING THE FEASIBILITY OF BUILDING AUTOMATION TECHNOLOGY IN THE CONVENIENCE STORE INDUSTRY: A CASE STUDY |
ZINK |
2010 |
| SHANNON MCMURTREY |
TRAINING AND OPTIMIZING DISTRIBUTED NEURAL NETWORKS USING A GENETIC ALGORITHM |
NYSHADHAM |
2010 |
| LORI NICHOLSON |
A QUANTUM ALGORITHM ANIMATOR |
LASZLO |
2010 |
| KRISHNAVENI PALANIAPPAN |
PREDICTING ESSENTIAL” GENES IN MICROBIAL GENOMES: A MACHINE LEARNING APPROACH TO KNOWLEDGE DISCOVERY IN MICROBIAL GENOMIC DATA |
MUKHERJEE |
2010 |
| KAREN PATE |
AN EXPLORATORY STUDY ON THE PRACTICES APPLIED BY CORPORATIONS TO EVALUATE THE PERFORMANCE OF THEIR NON-TRANSACTIONAL BUSINESS-TO-CONSUMER WEB SITES |
ZINK |
2010 |
| MICHAEL PELOSI |
RANGE LIMITED UAV TRAJECTORY USING TERRAIN MASKING UNDER RADAR DETECTION RISK |
MUKHERJEE |
2010 |
| GREGORY REINERT |
EARLY DETECTION OF ONLINE AUCTION OPPORTUNISTIC SELLERS THROUGH THE USE OF NEGATIVE-POSITIVE FEEDBACK |
COHEN |
2010 |
| MICHAEL SHARPE |
ASSISTIVE TECHNOLOGY ATTRITION: IDENTIFYING WHY TEACHERS ABANDON ASSISTIVE TECHNOLOGIES |
DRINGUS |
2010 |
| DAVID SHULMAN |
INVESTIGATING WIKIS AS AGENTS FOR VIRTUAL TEAM ACTIVITY AWARENESS |
DRINGUS |
2010 |
| JANICE SWIATEK-KELLEY |
PHYSICIANS’ PERCEPTIONS OF ELECTRONIC INFORMATION RESOURCES |
ZINK |
2010 |
| JAMES TEMPLETON |
TRUST AND TRUSTWORTHINESS: A FRAMEWORK FOR SUCCESSFUL DESIGN OF TELEMEDICINE |
COHEN |
2010 |
| DANIEL THOMBS |
DETERMINING THE VALUE OF HANDWRITTEN COMMENTS WITHIN WORK ORDERS |
ELLIS |
2010 |
| PING AN WANG |
THE EFFECT OF KNOWLEDGE OF ONLINE SECURITY RISKS ON CONSUMER DECISION MAKING IN B2C E-COMMERCE |
NYSHADHAM |
2010 |
| AMANDA WYNN |
AN INVESTIGATION OF THE CONTRIBUTIONS OF GENDER, SHOPPING ORIENTATION, AND ONLINE EXPERIENCE TO CONSUMERS INTENTION TO ENGAGE IN APPAREL E-COMMERCE SHOPPING |
LEVY |
2010 |
| DANIEL YAKIMCHUK |
A STUDY OF THE EFFICACY OF LITERACY-BASED ASSISTIVE TECHNOLOGY FOR UNDERGRADUATE SECOND LANGUAGE LEARNERS |
TERRELL |
2010 |
| JOE ASHBY |
USING COLLABORATIVE TECHNOLOGIES IN REMOTE LAB DELIVERY SYSTEMS FOR TOPICS IN AUTOMATION |
ABRAMSON |
2009 |
| VENKATESH BAGLODI |
DISAMBIGUATING PREPOSITION SENSES USING PREPOSITION SENSE GRAMMAR |
LASZLO |
2009 |
| DIANNE BELL |
BRIDGING THE PROFICIENCY GAP: INFORMATION AND COMMUNICATION TECHNOLOGY LITERACY ASSESSMENT OF NONTRADITIONAL COLLEGE STUDENTS |
ZINK |
2009 |
| SANDRA BLANKE |
A STUDY OF THE CONTRIBUTIONS OF ATTITUDE, COMPUTER SECURITY POLICY AWARENESS, AND COMPUTER SELF-EFFICACY TO THE EMPLOYEES COMPUTER ABUSE INTENTION IN BUSINESS ENVIRONMENTS |
LEVY |
2009 |
| MICHAEL BRYANT |
A COMPARISON OF THE RULE AND CASE-BASED REASONING APPROACHES FOR THE AUTOMATION OF HELP-DESK OPERATIONS AT THE TIER-TWO LEVEL |
MUKHERJEE |
2009 |
| SCOTT CARPENTER |
NEW METHODOLOGY FOR MEASURING INFORMATION, KNOWLEDGE, AND UNDERSTANDING VERSUS COMPLEXITY IN HIERARCHICAL DECISION SUPPORT MODELS |
HAFNER |
2009 |
| YEN-TZU CHEN |
USING INSTRUCTIONAL SOFTWARE TO IMPROVE ORAL PERFORMANCE OF TAIWANESE SPEAKERS OF ENGLISH |
ABRAMSON |
2009 |
| SAMUEL CONN |
A METHODOLOGY FOR DESIGN AND DEVELOPMENT OF AN ELECTRONIC LEARNING (E-LEARNING) NETWORK: THE REGIS UNIVERSITY SCHOOL FOR PROFESSIONAL STUDIES CASE STUDY |
LITTMAN |
2009 |
| TRACEY COOLEY |
DESIGN, DEVELOPMENT, AND IMPLEMENTATION OF A WIRELESS LOCAL AREA NETWORK (WLAN): THE HARTFORD JOB CORPS ACADEMY (HJCA) CASE STUDY |
LITTMAN |
2009 |
| BILL DAFNIS |
A MODEL FOR PLANNING THE INTEGRATION OF XML IN DISRUPTIVE ENVIRONMENTS: A CASE STUDY OF NEWSPAPER PRODUCTION AND DISTRIBUTION SYSTEMS |
LITTMAN |
2009 |
| JULIUS DAVAULT |
RESOLVING QUASI-SYNONYM RELATIONSHIPS IN AUTOMATIC THESAURUS CONSTRUCTION USING FUZZY ROUGH SETS AND AN INVERSE TERM FREQUENCY SIMILARITY FUNCTION |
MUKHERJEE |
2009 |
| BRENDA ELLIS |
THE HUMAN ANALYSIS ELEMENT OF INTRUSION DETECTION: A COGNITIVE TASK MODEL AND INTERFACE DESIGN AND IMPLICATIONS |
COHEN |
2009 |
| BILQUIS FERDOUSI |
A STUDY OF FACTORS THAT AFFECT INSTRUCTORS’ INTENTION TO USE E-LEARNING SYSTEMS IN TWO-YEAR COLLEGES |
LEVY |
2009 |
| ABBE FORMAN |
AN EXPLORATORY STUDY ON THE FACTORS ASSOCIATED WITH ETHICAL INTENTION OF DIGITAL PIRACY |
LEVY |
2009 |
| PATRICIA FREDERICK |
USING DIGITAL GAME-BASED LEARNING TO DELIVER VOCABULARY INSTRUCTION TO DEVELOPMENTAL READING STUDENTS |
ABRAMSON |
2009 |
| WILLIAM GARRABRANTS |
REDUCING COGNITIVE LOAD USING HYPERVARIATE DISPLAY |
COHEN |
2009 |
| JEFFREY GRAHAM |
EFFECT OF ONTOLOGY HIERARCHY ON A CONCEPT VECTOR MACHINE’S ABILITY TO CLASSIFY WEB DOCUMENTS |
MUKHERJEE |
2009 |
| FAITH HEIKKILA |
AN ANALYSIS OF THE IMPACT OF INFORMATION SECURITY POLICIES ON COMPUTER SECURITY BREACH INCIDENTS IN LAW FIRMS |
LITTMAN |
2009 |
| SARA HEJAZI |
RESPONSIBILITY FACTORS OF REDUCING INEFFICIENCIES IN INFORMATION SYSTEM PROCESSES AND THEIR ROLE ON INTENTION TO ACQUIRE SIX SIGMA CERTIFICATION |
LEVY |
2009 |
| TERRY HOUSE |
A MODEL AND INTELLIGENT SOFTWARE AGENT FOR THE SELECTION AND IMPLEMENTATION OF OPEN-SOURCE SOFTWARE IN HIGHER EDUCATION |
SCIGLIANO |
2009 |
| CHARLES LEACH |
AN INVESTIGATION OF TRAINING IN CREATIVE PROBLEM SOLVING AND ITS RELATIONSHIP TO AFFECTIVE AND EFFECTIVE IDEA GENERATION OF ENTREPRENEURIAL LEARNERS |
SCIGLIANO |
2009 |
| BRIAN LEIGHTY |
GRAMMAR INFERENCE FROM GEOSPATIAL DATA PATTERNS USING SPATIAL ASSOCIATION RULE MINING |
LASZLO |
2009 |
| KUANYUH LIN |
MAINTAINING A NEWS PERSPECTIVE REMOTELY THROUGH ONLINE INFORMATION RETRIEVAL: TASK-BASED WEB EXPERIENCES OF FOREIGN NEWS CORRESPONDENTS |
ZINK |
2009 |
| MAUREEN LLOYD-JAMES |
USING ONLINE TECHNOLOGIES TO DELIVER MANAGEMENT COURSES TO CRUISE SHIP PERSONNEL AT SEA |
ABRAMSON |
2009 |
| SAYYED MAISIKELI |
ASPECT MINING USING SELF-ORGANIZING MAPS WITH DYNAMIC METRICS AS INPUT VECTORS |
MITROPOULOS |
2009 |
| JOHN MEYER |
ADMINISTRATIVE SUPPORT FOR ONLINE TEACHING FACULTY |
ABRAMSON |
2009 |
| ANTHONY MIDDLETON |
HIGH-PERFORMANCE_KNOWLEDGE-BASED_ENTITY_EXTRACTION |
MUKHERJEE |
2009 |
| JOSE MOLINA GARCIA PLAZA |
APPLICATION OF DISCRETE COMPUTER SIMULATION MODELING TO EVALUATE BUSINESS CONTINUITY PLANS |
NYSHADHAM |
2009 |
| MARCEL OBI |
DEVELOPMENT AND VALIDATION OF A SCALE FOR MEASURING E-GOVERNMENT USER SATISFACTION |
NYSHADHAM |
2009 |
| BRANDI PORTER |
INFORMATION RETRIEVAL STRATEGIES OF MILLENNIAL UNDERGRADUATE STUDENTS IN WEB AND LIBRARY DATABASE SEARCHES |
ABRAMSON |
2009 |
| MARIE PULLAN |
SUPPORT SERVICES FOR MILLENNIAL UNDERGRADUATES |
ABRAMSON |
2009 |
| ANTONIO RINCON |
SECTION 508 ADHERENCE BY INDUSTRY PROFESSIONALS: IMPROVING UNIVERSAL DESIGN THROUGH TRAINING |
ABRAMSON |
2009 |
| GRIER RIVERS |
INTERACTIVE WHITEBOARDS IN THIRD GRADE SCIENCE INSTRUCTION |
WANG |
2009 |
| JOSEPH ROTH |
A MODEL FOR USING MANAGED SERVICES IN DESIGNING AND SUPPORTING A WIRELESS LOCAL AREA NETWORK AS A PART OF THE NAVY MARINE CORPS INTRANET |
SCIGLIANO |
2009 |
| STEVEN SHERMAN |
A PROCESS-CENTRIC ONTOLOGY FOR REPRESENTING SOFTWARE DEVELOPMENT PROJECT KNOWLEDGE |
HAFNER |
2009 |
| DAVID SMITH |
A FORMAL CONCEPT ANALYSIS APPROACH TO ASSOCIATION RULE MINING |
SUN |
2009 |
| ROBERTA STEED |
CULTURAL COMPETENCY TRAINING IN SECOND LIFE FOR LOUISIANA OCCUPATIONAL THERAPISTS |
TERRELL |
2009 |
| GAIL STERN |
COMPUTER ASSISTED PSYCHOMOTOR TRAINING IN A SPECIALIZED POPULATION |
ELLIS |
2009 |
| NELSON STEWART |
REPUTATION IN ELECTRONIC MARKETS: AN EXPERIMENTAL STUDY |
NYSHADHAM |
2009 |
| BRENDA STUTSKY |
EMPOWERMENT AND LEADERSHIP DEVELOPMENT IN AN ONLINE STORY-BASED LEARNING COMMUNITY |
ABRAMSON |
2009 |
| WESSEL THOMAS |
PARALLEL MINING OF ASSOCIATION RULES USING A LATTICE BASED APPROACH |
SUN |
2009 |
| PAUL TUTEN |
A MODEL FOR THE EVALUATION OF IS/IT INVESTMENTS |
SCIGLIANO |
2009 |
| CHARLETTE WATKINS |
TAILORING SOFTWARE INPECTIONS FOR ASPECT-ORIENTED PROGRAMMING |
MITROPOULOS |
2009 |
| MAVA WILSON |
TECHNOLOGY SUPPORT COMMUNITY FOR COLLEGE OFFICE SUPPORT STAFF |
ABRAMSON |
2009 |
| STEVEN ZHOU |
A NOVEL APPROACH TO IRIS LOCALIZATION AND CODE MATCHING |
SUN |
2009 |
| AJAY ARORA |
COMBINING PREPROCESSORS FOR IMPROVED SPAM FILTERING. |
MUKHERJEE |
2008 |
| DIANE BALL |
AN EMPIRICAL INVESTIGATION OF THE CONTRIBUTION OF COMPUTER SELF-EFFICACY, COMPUTER ANXIETY, AND INSTRUCTORS’ EXPERIENCE WITH THE USE OF TECHNOLOGY TO THEIR INTENTION TO USE EMERGING EDUCATIONAL TECHNO |
LEVY |
2008 |
| TODD BRETT |
AN EVENT MONITOR AND RESPONSE FRAMEWORK BASED ON THE WSLOGA ARCHITECTURE |
LASZLO |
2008 |
| CAROLINE BUDWELL |
THE SLAI METHODOLOGY: A SYSTEMATIC ASPECT-ORIENTED IDENTIFICATION PROCESS FOR FUNCTIONAL AND NON-FUNCTIONAL REQUIREMENTS |
MITROPOULOS |
2008 |
| ANN CARBONELL |
THE IMPACT OF INFORMATION TECHNOLOGY (IT) WORKFORCE COMPETENCY AND IT PROCESSES AND TECHNOLOGIES ON SERVICE EFFECTIVENESS: THE NATIONAL SYSTEMS FOR GEOSPATIAL-INTELLIGENCE CASE STUDY |
LITTMAN |
2008 |
| NOOREDIN ETEZADY |
THE IMPACT OF ERP INVESTMENTS ON ORGANIZATIONAL PERFORMANCE |
ZINK |
2008 |
| ALICEN FLOSI |
COURSE MANAGEMENT SOFTWARE: APPLYING THE TECHNOLOGY ACCEPTANCE MODEL TO STUDY USE BY POST-SECONDARY FACULTY |
COHEN |
2008 |
| MARK HARDY |
A COMPARISON OF STUDENT LEARNING WITH SIMULATIONS AND TRADITIONAL LABORATORY EXERCISES IN SECONDARY ELECTRONICS INSTRUCTION |
TERRELL |
2008 |
| ADAM HERRNECKAR |
A SOFTWARE ENGINEERING APPROACH TO ISSUES AND ECONOMICS OF NETWORK MANAGEMENT AUTOMATION FOR PROVIDING SELECTIVE OUTSOURCING IN MULTIPLE HETEROGENEOUS ENVIRONMENTS |
LITTMAN |
2008 |
| OKEY IGBONAGWAM |
THE ROLE OF SECURITY CLEARANCE AND USERS’ INVOLVEMENT IN THE EFFICIENCY OF REQUIREMENTS-GATHERING PROCESS: AN INFORMATION-SYSTEMS CASE STUDY IN THE U.S. MILITARY |
LEVY |
2008 |
| VICTOR JOHNSON |
ALGORITHMS FOR ADAPTIVE PALETTE CONSTRUCTION USING THE GRAPHICS PROCESSING UNIT |
LASZLO |
2008 |
| KAREN KING |
COMPARISON OF SOCIAL PRESENCE IN VOICE-BASED AND TEXT-BASED ASYNCHRONOUS COMPUTER CONFERENCING |
ELLIS |
2008 |
| HEIDI KRAMER |
MEASURING THE IMPACT OF E-TRAINING ON JOB PERFORMANCE |
ABRAMSON |
2008 |
| JOE LOOK |
USE AND ANALYSIS OF EXPECTED SIMILARITY OF SEMANTIC WEB ONTOLOGICAL ANNOTATIONS |
SUN |
2008 |
| DIANA LUCKEVICH |
COMPUTER ASSISTED INSTRUCTION FOR TEACHING VOCABULARY TO A CHILD WITH AUTISM |
ABRAMSON |
2008 |
| MICHAEL MAKOVOZ |
UTILIZATION OF SEMANTIC LINKING AND VISUALIZATION TECHNIQUES TO FACILITATE KNOWLEDGE CREATION FROM TEXTUAL SOFTWARE ARTIFACTS |
MITROPOULOS |
2008 |
| JON MCKAMEY |
SMART CLASSROOM TECHNOLOGY: INSTRUCTIONAL EFFECTIVENESS AND FACULTY AND STUDENT SATISFACTION |
ABRAMSON |
2008 |
| RANDY MELTON |
MONITORING QOS IN WIRELESS AD HOC NETWORKS |
SIMCO |
2008 |
| GEORGE MIKULSKI |
USE OF ABSTRACT CATEGORIES IN DATA CLUSTERING ALGORITHMS TO IMPROVE PATTERN MATCHING |
HAFNER |
2008 |
| DONNA MYERS |
QUALITY MEASURES IN DISTANCE EDUCATION COURSES AT TROY UNIVERSITY’S |
ELLIS |
2008 |
| DAVID MYLOTT |
AN INSTRUCTIONAL TECHNOLOGY GUIDE FOR CORPORATE INSTRUCTORS |
ABRAMSON |
2008 |
| ANTHONY NICHOLS |
AN EMPIRICAL ASSESSMENT OF ATTITUDE TOWARD COMPUTERS, MOTIVATION, SATISFACTION, AND PREVIOUS ACADEMIC PERFORMANCE AND THEIR CONTRIBUTION TO PERSISTENCE OF COLLEGE STUDENT-ATHLETES ENROLLED IN E-LEARNI |
LEVY |
2008 |
| KATHLEEN PITTMAN |
COMPARISON OF DATA MINING TECHNIQUES USED TO PREDICT STUDENT RETENTION |
MUKHERJEE |
2008 |
| FRANKLYN PRESCOD |
AN INVESTIGATION OF TECHNOLOGY USE AND LEARNING STYLES AS PREDICTORS OF UNDERGRADUATE INFORMATION TECHNOLOGY MANAGEMENT STUDENTS’ ACADEMIC ACHIEVEMENT AT RYERSON UNIVERSITY |
TERRELL |
2008 |
| JALAL RAISSI |
DYNAMIC SELECTION OF OPTIMAL CRYPTOGRAPHIC ALGORITHMS |
CANNADY |
2008 |
| LYNETTE RALPH |
A KNOWLEDGE MANAGEMENT SOLUTION FOR REFERENCE SERVICES |
ELLIS |
2008 |
| MICAL RAMIM |
AN EXAMINATION OF FACTORS ASSOCIATED WITH STUDENTS ETHICAL DECISION MAKING IN POST-SECONDARY E-LEARNING PROGRAMS |
LITTMAN |
2008 |
| MICHAEL REID |
INTEGRATING TRUST AND COMPUTER SELF-EFFICACY INTO THE TECHNOLOGY ACCEPTANCE MODEL: THEIR IMPACT ON CUSTOMERS USE OF BANKING INFORMATION SYSTEMS IN JAMAICA |
LEVY |
2008 |
| ROBERT ROBERTSON |
CRITICAL SUCCESS FACTORS FOR SMALL BUSINESS IN E-COMMERCE |
NYSHADHAM |
2008 |
| GREGORY SAFKO |
A STUDY OF A MODIFIED AUDITORY COMPONENT IN A MULTIMODAL FEEDBACK STUDY INVOLVING OLDER DEAF COMPUTER USERS |
COHEN |
2008 |
| JEFFREY SCHIFFEL |
A METHOD TO MANAGE AND MEASURE THE PROCESS IMPROVEMENT COST BENEFITS OF EXCHANGING TACIT AND EXPLICIT KNOWLEDGE AMONG KNOWLEDGE WORKERS |
ZINK |
2008 |
| MAHMUD SHIHAB |
WEB 2.0 TOOLS IMPROVE TEACHING AND STUDENT COLLABORATION IN HIGH SCHOOL ENGLISH CLASSES |
ABRAMSON |
2008 |
| HUMAIRA SIDDIQUI |
INVESTIGATION OF INTENTION TO USE E-COMMERCE IN THE ARAB COUNTRIES: A COMPARISON OF SELF-EFFICACY, USEFULNESS, CULTURE, GENDER, AND SOCIOECONOMIC STATUS IN SAUDI ARABIA AND UNITED ARAB EMIRATES |
LEVY |
2008 |
| TERENCE SMITH |
AN INVESTIGATION INTO THE IMPACT OF INFORMATION TECHNOLOGY BANK EXAMINERS COMMUNITY KNOWLEDGE SHARING SESSIONS ON THEIR INDIVIDUAL PERFORMANCE |
ZINK |
2008 |
| JESSICA STREET |
EXAMINING THE VALIDITY OF TESTING IN AN ONLINE LEARNING ENVIRONMENT |
TERRELL |
2008 |
| LARRY WOOSTER |
TUTORIAL SUPPORT FOR TEACHING RECOGNITION OF TONALITY IN A SMALL PAROCHIAL SCHOOL |
TERRELL |
2008 |
| TAMER ABOUALY |
DESIGN, DEVELOPMENT, AND IMPLEMENTATION OF A PUBLIC KEY CRYPTOSYSTEM FOR AUTOMATED TELLER MACHINES: THE TORONTO DOMINION BANK CASE STUDY |
LITTMAN |
2007 |
| ERASMUS ADDAE |
TRAINING A GLOBALLY-DISPERSED TRAINER POPULATION THROUGH DESKTOP VIDEO-CONFERENCING |
ABRAMSON |
2007 |
| MARTIN BAGAYA |
AN ANALYSIS OF IT/IS OFFSHORE OUTSOURCING: EDUCATOR PERSPECTIVES |
WANG |
2007 |
| RAZ BEN-EZZER |
A FRAMEWORK FOR DISTANCE EDUCATION STRATEGIES IN DIGITAL MUSIC EDUCATION FOR ADULTS |
COHEN |
2007 |
| RICK BLAZEK |
AUTHOR-STATEMENT CO-CITATION ANALYSIS APPLIED AS A RECOMMENDER SYSTEM TO SUPPORT NON-DOMAIN-EXPERT ACADEMIC RESEARCH |
HAFNER |
2007 |
| DAWN BRONSTEIN |
THE EFFICACY OF A WEB SITE EVALUATION CHECKLIST AS A PEDAGOGICAL APPROACH FOR TEACHING STUDENTS TO CRITICALLY EVALUATE INTERNET CONTENT |
TERRELL |
2007 |
| HERBERT BROWN |
EXAMINING STATISTICAL PROCESS CONTROL AS A METHOD OF RARE EVENT TEMPORAL DATA MINING. |
MUKHERJEE |
2007 |
| KEVIN BRUNNER |
A CHILD-CENTRIC INTERFACE: GRAFFITI OR NOT GRAFFITI |
COHEN |
2007 |
| TAHSIN CHOU |
STORAGE REDUCTION IN HIGH PERFORMANCE DISTRIBUTED DISK-BASED BACKUP IN STORAGE AREA NETWORK |
SUN |
2007 |
| J. WILLIAM CUPP |
A FAST HEURISTIC TO ESTIMATE THE INHERENT DEGREE OF CLUSTERING IN DATA SETS |
LASZLO |
2007 |
| DONNA EHRLICH |
ADAPTATION OF BUSINESS PROCESSES IN SMES: AN INTERPRETIVE STUDY |
NYSHADHAM |
2007 |
| ELIZABETH FLANAGAN |
COMPUTER-BASED READING PROGRAM WITH AT-RISK PRE-KINDERGARTEN STUDENTS |
ABRAMSON |
2007 |
| KATHERINE FLORI |
COMPUTING TECHNOLOGY IN AN INTERDISCIPLINARY THEATRE CURRICULUM FOR URBAN HIGH SCHOOL SENIORS |
ABRAMSON |
2007 |
| ISAAC GABRIEL |
PERCEPTIONS OF ONLINE RISKS |
NYSHADHAM |
2007 |
| MARLENE GROMAN |
A MODEL OF BEST PRACTICES FOR PROJECT MANAGEMENT STRATEGIES IN AN ADMINISTRATIVE COMPUTING SYSTEM IMPLEMENTATION IN HIGHER EDUCATION |
SCIGLIANO |
2007 |
| ERANNA GURUVADOO |
M*CTREE: A MULTI-RESOLUTION INDEXING STRUCTURE FOR XML DATA |
SUN |
2007 |
| JACOB HORNSBY |
AN EMPIRICAL INVESTIGATION OF THE EFFECTS OF DISCOUNTING ON PRIVACY RELATED DECISIONS. |
MUKHERJEE |
2007 |
| TRUDY HOWLES |
A STUDY OF ATTRITION AND THE USE OF STUDENT LEARNING COMMUNITIES IN THE COMPUTER SCIENCE INTRODUCTORY PROGRAMMING SEQUENCE |
TERRELL |
2007 |
| JULIA INNES |
SCHOLARLY COMMUNICATION IN THE FIELD OF ZOO RESEARCH |
ZINK |
2007 |
| WILLY ISAAC |
PERFORMANCE MEASUREMENT FOR THE E-GOVERNMENT INITIATIVES |
NYSHADHAM |
2007 |
| THOMAS JURY |
ELECTRONIC PERFORMANCE SUPPORT FOR E-LEARNING ANALYSIS AND DESIGN |
ABRAMSON |
2007 |
| CHRISTINE KEUPER |
UNDERSTANDING THE FIGURATIVE LANGUAGE OF TROPES USING ONTOLOGICAL CATEGORIZATIONS IN NATURAL LANGUAGE PROCESSING |
LASZLO |
2007 |
| TIEN-CHEN LEE |
USING WEB-BASED CALL TO IMPROVE ENGLISH LANGUAGE MASTERY AT REPUBLIC OF CHINA AIR FORCE ACADEMY |
ABRAMSON |
2007 |
| ILENE LITZ |
STUDENT ADOPTION OF A COMPUTER-SUPPORTED COLLABORATIVE LEARNING (CSCL) MATHEMATICAL PROBLEM SOLVING ENVIRONMENT: THE CASE OF THE MATH FORUMS POW-WOW |
WANG |
2007 |
| JASON LIVELY |
ASSESSING INDIVIDUAL CONTRIBUTION IN ONLINE COLLABORATIVE ACTIVITIES |
ELLIS |
2007 |
| MICHAEL NEUBAUER |
A SYSTEMS ANALYSIS OF INFORMATION TECHNOLOGY IMPLEMENTED BY AN FBI FIELD OFFICE FOR CRISIS RESPONSE EVENTS: THE COLUMBIA FIELD OFFICE CASE STUDY |
LITTMAN |
2007 |
| BERNARD NOBLE |
AN INVESTIGATION OF THE ATTITUDES, COSTS AND BENEFITS OF TELEWORK FOR INFORMATION SYSTEMS EMPLOYEES
|
SCIGLIANO |
2007 |
| MARILYN OLANDER |
A STUDY OF INTERNET WEBLOGS AS A TOOL TO TEACH WRITING |
ABRAMSON |
2007 |
| RONNIE PARK |
DEVELOPMENT AND TEST OF AN INSTRUMENT TO EVALUATE IS EFFECTIVENESS OF E-GOVERNMENT INITIATIVES |
NYSHADHAM |
2007 |
| ANDREW POTTER |
AN INVESTIGATION OF INTERACTIONAL COHERENCE IN ASYNCHRONOUS LEARNING ENVIRONMENTS |
DRINGUS |
2007 |
| LOREEN POWELL |
AN EXPERIMENTAL STUDY TO DETERMINE WHAT TYPE OF LEARNING OBJECT REPOSITORY INTERFACE IS THE MOST EFFECTIVE FOR A TARGETED GROUP OF PRIMARY EDUCATORS |
ELLIS |
2007 |
| ANTHONY SLABICKI |
USING SIMULATORS TO GUIDE PRACTICE AND REINFORCE ONLINE LEARNING |
ABRAMSON |
2007 |
| TERRY SMITH |
SENIORS GO ONLINE. AN ASSESSMENT OF THE VALUE OF USABILITY: IS IT PERCEIVED USEFULNESS OR PERCEIVED EASE OF USE? |
COHEN |
2007 |
| MONICA UGBAJA |
PERCEPTUAL ORGANIZATION OF ECOMMERCE RISKS AMONG CONSUMERS: A CROSS-COUNTRY STUDY |
NYSHADHAM |
2007 |
| GERALD WILLIAMS |
ANALYSIS OF SPECTRAL SELECTIVITY ON EDGE DETECTION ALGORITHMS FOR NON-INVASIVE IDENTIFICATION OF SKIN CANCER. |
MUKHERJEE |
2007 |
| WILLIAM YATES |
ACADEMIC INTEGRITY IN THE INTERNET AGE |
ABRAMSON |
2007 |
| JAMES BILITSKI |
EVOLUTIONARY ALGORITHM FOR GENERATION OF AIR PRESSURE AND LIP PRESSURE PARAMETERS FOR AUTOMATED PERFORMANCE OF BRASS INSTRUMENTS |
MUKHERJEE |
2006 |
| CLAUDE COUNCIL |
AN INVESTIGATION OF A COBIT SYSTEMS SECURITY IT GOVERNANCE INITIATIVE IN HIGHER EDUCATION |
SCIGLIANO |
2006 |
| THEON DANET |
A STUDY OF THE IMPACT OF USERS INVOLVEMENT, RESISTANCE AND COMPUTER SELF-EFFICACY ON THE SUCCESS OF A CENTRALIZED IDENTIFICATION SYSTEM IMPLEMENTATION.
|
LEVY |
2006 |
| ROBERT ELLETT |
AN EVALUATION OF PROGRAM FOR COOPERATIVE CATALOGING (PCC) RECORDS USED IN NON-PCC LIBRARIES |
ZINK |
2006 |
| MARGARITA ELORRIAGA |
COMPUTER USE BY LATINO MIGRANT FAMILIES: INCREASING K-2 CHILDRENS READING SKILLS THROUGH PARENT TRAINING |
ABRAMSON |
2006 |
| SUSAN FEREBEE |
AN EXAMINATION OF THE RELATIONSHIP BETWEEN INVOLVEMENT LEVEL OF WEB SITE USERS AND WEB CREDIBILITY ASSESSMENT |
DRINGUS |
2006 |
| JEFFREY FORREST |
INFORMATION POLICIES AND PRACTICES OF KNOWLEDGE MANAGEMENT (KM) AS RELATED TO THE DEVELOPMENT OF THE GLOBAL AVIATION INFORMATION NETWORK (GAIN) - AN APPLIED CASE STUDY |
ZINK |
2006 |
| JOAN FRESE |
A FACULTY DEVELOPMENT HANDBOOK FOR QUALITY ONLINE INSTRUCTION |
ABRAMSON |
2006 |
| MICHAEL FURICK |
USING NEURAL NETWORKS TO DEVELOP A NEW MODEL TO SCREEN APPLICANTS FOR APARTMENT RENTALS |
COHEN |
2006 |
| GLYN GOWING |
EMERGENT BEHAVIOR IN AUTONOMOUS SOFTWARE AGENTS FOR INTRUSION DETECTION |
CANNADY |
2006 |
| SHAWN HARRS |
STANDARDS DIRECTORY: AN ENGINEERING AND TECHNOLOGY STANDARDS DIGITAL LIBRARY AND INFORMATION RETRIEVAL SYSTEM FOR THE WALT DISNEY COMPANY |
ZINK |
2006 |
| ELIZABETH HAWTHORNE |
CHIRO-INFORMATICS: TOWARDS A SEMANTIC WEB HEALTH RECORD AND ONTOLOGY FOR COORDINATION OF PATIENT INFORMATION BETWEEN CHIROPRACTIC AND ALLOPATHIC PHYSICIANS |
COHEN |
2006 |
| IAN JOHNSON |
AN INVESTIGATION OF THE EFFECTS OF THE GEORGIA FRAMEWORK FOR INTEGRATION TECHNOLOGY (IN TECH) TRAINING PROGRAM ON TEACHERS’ COMPUTER SELF-EFFICACY AND COMPUTER UTILIZATION |
COHEN |
2006 |
| JOANNE KUZMA |
PRIVACY POLICIES: A STUDY OF THEIR USE AMONG ONLINE CANADIAN PHARMACIES |
ZINK |
2006 |
| DONNA LANE |
EVALUATING E-TEXTBOOKS IN A BUSINESS CURRICULUM |
WANG |
2006 |
| CATHRINE LINNES |
APPLYING DECISION THEORY TO QUANTIFY THE COST OF NETWORK SECURITY RISK |
CANNADY |
2006 |
| MIKE LITMAN |
A JAVA BASED API FOR THE IMPLEMENTATION AND MAINTENANCE OF DOMAIN SPECIFIC COLLABORATIVE VIRTUAL ENVIRONMENTS |
LASZLO |
2006 |
| ARTHUR MCADAMS |
AN INVESTIGATION OF THE RELATIONSHIPS BETWEEN USERS AND PROVIDERS OF INFORMATION TECHNOLOGY SERVICES FOR IMPROVED IT EFFECTIVENESS |
SCIGLIANO |
2006 |
| ANITA MCCARTHY |
KNOWLEDGE MANAGEMENT: EVALUATING STRATEGIES AND PROCESSES USED IN HIGHER EDUCATION |
ELLIS |
2006 |
| PAUL NIELSEN |
A QUANTIATIVE ANALYSIS OF PERFORMANCE IN A MULTI-PROTOOCL AD HOC 802.11B-BASED WIRELESS LOCAL NETWORK |
LITTMAN |
2006 |
| HAROLD PALMER |
A WEB-BASED DATA WAREHOUSE METHODOLOGY AND MODEL FOR STUDENT DATA IN HIGHER EDUCATION |
SCIGLIANO |
2006 |
| JANE PERSCHBACH |
BLOGGING: AN INQUIRY INTO THE EFFICACY OF A WEB-BASED TECHNOLOGY FOR STUDENT REFLECTION IN COMMUNITY COLLEGE COMPUTER SCIENCE PROGRAMS |
ABRAMSON |
2006 |
| PATRICIA PROFETA |
EFFECTIVENESS OF ASYNCHRONOUS REFERENCE SERVICES FOR DISTANCE LEARNING STUDENTS WITHIN FLORIDAS COMMUNITY COLLEGE SYSTEM |
ZINK |
2006 |
| KRIANGSAK PUKAWAN |
THE ATTITUDES AND PREFERENCES OF INTERNET USERS IN THAILAND TOWARD ONLINE PRIVACY RIGHTS |
ZINK |
2006 |
| DAVID REAVIS |
ELECTRONIC MAIL RETENTION POLICIES IN MID-SIZED MANUFACTURING COMPANIES IN THE UNITED STATES |
ZINK |
2006 |
| MALIK SALEH |
THE CONSTRUCTION AND VALIDATION OF A RESOURCE COVER PAGE AS AN INSTRUMENT FOR CATALOGING INTERNET RESOURCES IN THE SEMANTIC WEB |
NYSHADHAM |
2006 |
| HELEN SCHNEIDER |
A CASE STUDY OF INFORMATION ASSURANCE FIELD EXPERIENCE |
ABRAMSON |
2006 |
| RONALD SHEHANE |
A FRAMEWORK FOR KNOWLEDGE-AWARE SERVICE-CONTRACT QUALITY-MANAGEMENT DECISION SUPPORT SYSTEMS |
MUKHERJEE |
2006 |
| JAMES SINCLAIR |
ESTABLISHING A NEW PARADIGM IN ENGINEERING AND TECHNOLOGY EDUCATION: AN EXPERIMENTAL ANALYSIS OF MULTIPLE LEARNING METHODOLOGIES AND EXAMINATION OF COGNITIVE PROFILES OF CONTINUING EDUCATION STUDENTS |
COHEN |
2006 |
| GLENN STOUT |
IMPROVING THE DECISION MAKING PROCESS FOR INFORMATION SECURITY THROUGH A PRE-IMPLEMENTATION IMPACT REVIEW OF SECURITY COUNTERMEASURES |
CANNADY |
2006 |
| SAMIR TOUT |
PARALLEL HYBRID CLUSTERING USING GENETIC PROGRAMMING AND MULTI-OBJECTIVE FITNESS WITH DENSITY (PYRAMID)
|
SUN |
2006 |
| KHOA TRAN |
AN IMPROVED MULTI-OBJECTIVE EVOLUTIONARY ALGORITHM WITH ADAPTABLE PARAMETERS. |
MUKHERJEE |
2006 |
| ARISA UDE |
AN EMPIRICAL INVESTIGATION OF WORKFLOW MANAGEMENT SYSTEMS QUEUES |
NYSHADHAM |
2006 |
| DEL WAKLEY |
WORKPLACE TECHNOLOGY COMPETENCIES FOR ASSOCIATE DEGREE MARKETING PROGRAMS |
ABRAMSON |
2006 |
| QI WANG |
BLENDING ELECTRONIC AND CLASSROOM TEACHING TO SUPPORT DEAF AND HARD OF HEARING COLLEGE STUDENTS |
ABRAMSON |
2006 |
| CHERYL WARD |
A STUDY OF E-LEARNING FOR ADVANCED LEARNERS IN MULTI-ABILITY CLASSROOMS |
ABRAMSON |
2006 |
| CREED WHEELER |
IMPLEMENTATION OF THE PEOPLE CAPABILITY MATURITY MODEL ON TECHNICAL SUPPORT PERSONNEL IN VOLUSIA COUNTY SCHOOLS |
ABRAMSON |
2006 |
| ANN WOLF |
USING TECHNOLOGY WITH LEARNING DISABLED READERS: A META-ANALYSIS |
ABRAMSON |
2006 |
| SEONG YU |
PROACTIVE SOFTWARE REJUVENATION MODEL AUGMENTED WITH SOFTWARE REPLICATION FOR REJUVENATION TRANSPARENCY TO CLIENTS IN A SINGLE COMPUTER ENVIRONMENT |
SIMCO |
2006 |
| FELIX AKINLADEJO |
COMPUTER -SUPPORTED REHABILITATIVE MANAGEMENT: A CASE STUDY OF USING VIRTUAL REALITY TECHNOLOGY IN AMBULATORY TRAINING FOR POST-ACUTE STROKE PATIENTS |
LASZLO |
2005 |
| ANTONIO BIELLO |
A MODEL FOR DEVELOPING INTERACTIVE INSTRUCTIONAL MULTIMEDIA APPLICATIONS FOR ELECTRONIC MUSIC INSTRUCTORS |
ELLIS |
2005 |
| GRANT BRAUGHT |
CO-EVOLUTIONARY DYNAMICS AND THE ORIGINS OF ADAPTIVE BEHAVIOR |
CANNADY |
2005 |
| ANTOINETTE BRUCIATI |
DEVELOPMENT AND IMPLEMENTATION OF A PLAN FOR AN ONLINE EDUCATIONAL TECHNOLOGY PROGRAM LEADING TO CROSS ENDORSEMENT FOR CONNECTICUT EDUCATORS |
LITTMAN |
2005 |
| DONNA CADY |
AN INVESTIGATION OF THE EFFECT OF THE INTERGRATION OF COMPUTING TECHNOLOGY IN THE SCIENCE CURRICULUM ON FEMALE STUDENTSSELF-EFFICACY BELIEFS TOWARD COMPUTING |
TERRELL |
2005 |
| TRACY CHRISTOFERO |
INFORMATION PRIVACY AS REQUIRED BY THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA): AWARENESS AND BARRIERS TO COMPLIANCE AS EXPERIENCED BY SMALL HEALTH CARE PRACTITIONERS IN RURAL WEST VIRGINIA |
ZINK |
2005 |
| BARBARA CIARAMITARO |
AN ANALYSIS OF THE IMPLEMENTATION OF AN ONLINE COLLABORATION SYSTEM TO SUPPORT LEGAL COMMUNITIES OF PRACTICE |
LITTMAN |
2005 |
| DEBORAH COHEN |
A PROCESS SCRIPT FOR ONLINE RESOURCE SELECTION (ORSIDS): A DEVELOPMENTAL STUDY |
ELLIS |
2005 |
| MARK COHEN |
AN EVALUATION OF THE CONSISTENCY OF JUDICIAL SENTENCING SYSTEMS THAT INCORPORATE SUBJECTIVE FACTORS |
MUKHERJEE |
2005 |
| RALPH COVINO |
A SURVEY OF THE MASSACHUSETTS CITIES AND TOWNS TO EXAMINE INTERNET FILTERING POLICIES IN PUBLIC SCHOOLS AND LIBRARIES |
ZINK |
2005 |
| RONALD CRITCHFIELD |
THE DEVELOPMENT OF AN INFORMATION LITERACY INDICATOR FOR INCOMING COLLEGE FRESHMEN |
ZINK |
2005 |
| DORRELL CRITTENDEN |
A STUDY OF THE IMPACT OF PRICE ELASTICITY ON THE ADOPTION DECISION OF MINICOMPUTERS |
NYSHADHAM |
2005 |
| NICHOLAS DITIRRO |
INTEGRATION ONLINE SOCIAL ENVIRONMENTS INTO COMMUNITY COLLEGE STUDENT ORGANIZATIONS |
ABRAMSON |
2005 |
| JOYCE DORMAN |
AN INVESTIGATION OF LEARNERS ATTITUDES AND PREFERENCES THAT RELATE TO PARTICIPATION IN INTERNET-BASED INSTRUCTION AT COASTAL CAROLINA UNIVERSITY.
|
WANG |
2005 |
| AZAD EJAZ |
USING BAYESIAN BELIEF NETWORK FOR GOING-CONCERN RISK EVALUATION |
MUKHERJEE |
2005 |
| K ESTEP |
THE EFFECTS OF USING THE PRACTICAL EAR TRAINING TOOL (PET) PAIRED WITH MNEMONIC IMAGERY ON ENHANCING TRADITIONAL EAR TRAINING METHODS FOR UNDERGRADUATE MUSIC STUDENTS |
TERRELL |
2005 |
| DANIEL FEALKO |
EVALUATING PARTICLE SWARM INTELLIGENCE TECHNIQUES FOR SOLVING UNIVERSITY EXAMINATION TIMETABLING PROBLEMS |
MUKHERJEE |
2005 |
| HEATHER FIEDLER |
JOURNALISM AND MASS COMMUNICATION EDUCATION IN THE AGE OF TECHNOLOGY |
ABRAMSON |
2005 |
| SAMUEL FONTES |
USING THE TECHNOLOGY ACCEPTANCE MODEL AND STRUCTURAL EQUATIONS MODELING TO INVESTIGATE GENDER DIFFERENCES IN THE USAGE OF WEBSITES
|
MUKHERJEE |
2005 |
| LUIS GONZALEZ |
A SELF-ADAPTIVE NEGATIVE SELECTION APPROACH FOR ANOMALY DETECTION |
CANNADY |
2005 |
| MARY GOSMAN |
A GENERIC COURSE MANAGEMENT SYSTEM (CMS)TUTORIAL FOR COLLEGE FACULTY |
ABRAMSON |
2005 |
| JEFFREY GROOM |
MEDICAL DECISION MAKING UNDER STRESS-EVALUATING THE ROLE OF COMPUTERIZED MEDICAL SIMULATION INSTRUCTION |
ABRAMSON |
2005 |
| FAYE INGLE |
A META-ANALYSIS OF WEB-BASED DISTANCE LEARNING ARTICLES WITH AN UPDATE ON COMPLETION RATES |
ABRAMSON |
2005 |
| CHRISTOPHER JOHNSON |
ESTABLISHING AN ONLINE COMMUNITY OF PRACTICE FOR INSTRUCTORS OF ENGLISH AS A FOREIGN LANGUAGE |
DRINGUS |
2005 |
| TODD JOHNSON |
APPLYING GENETIC ALGORITHMS IN THE IDENTIFICATION OF NOVEL BEHAVIOR PATTERNS IN NETWORK DATA STREAMS |
CANNADY |
2005 |
| ROBERT JOYCE |
SUCCESSFUL IMPLEMENTATION OF DECISION SUPPORT SYSTEMS SUPPLY CHAIN MANAGEMENT WITHIN MANUFACTURING COMPANIES |
MUKHERJEE |
2005 |
| ROBERT KAIDEN |
A STUDY OF MOTIVATION, ACHIEVEMENT, AND STUDY SKILLS IN AN ONLINE COMMUNITY COLLEGE COURSE IN BEGINNING ALGEBRA |
DRINGUS |
2005 |
| JEFFREY KANE |
ENERGY MANAGEMENT AS APPLIED TO AN AD-HOC ROUTING PROTOCOL |
SIMCO |
2005 |
| JANET KOURIK |
PERFORMANCE OF CLASSIFICATION TOOLS ON UNSTRUCTURED TEXT |
MUKHERJEE |
2005 |
| MICHAEL KRAMER |
USING CONCEPT MAPS FOR KNOWLEDGE ACQUISITION IN SATELLITE DESIGN: TRANSLATING STATEMENT OF REQUIREMENTS ON ORBIT TO DESIGN REQUIREMENTS |
MUKHERJEE |
2005 |
| LISA LANDGRAF |
A MODEL OF SUCCESSFUL SOFTWARE DEVELOPMENT PROCESSES IN HIGHER EDUCATION |
SCIGLIANO |
2005 |
| JEFFREY LIVERMORE |
FACTORS THAT IMPACT IMPLEMENTING A LIGHT SOFTWARE DEVELOPMENT METHODOLOGY |
LITTMAN |
2005 |
| JOHN MARA |
COMPUTERS AS UBIQUITIOUS TOOLS FOR TEACHERS AND LEARNERS:A CASE STUDY OF THE MAINE LAPTOP INITIATIVE |
ABRAMSON |
2005 |
| RICHARD MARCOUX |
A PREDICTIVE MODEL TO TEST ICONS FOR A GLOBAL AUDIENCE |
DRINGUS |
2005 |
| JOAN MCGRORY |
MODEL FOR PLANNING, DESIGNING AND IMPLEMENTING A WIRELESS LOCAL AREA NETWORK IN A UNIVERSITY CLASSROOM |
LITTMAN |
2005 |
| DEREK MOHAMMED |
A COMPAPRATIVE STUDY OF UNSUPERVISED NEURAL NETWORKS IN DETECTING FINANCIAL MISSTATEMENTS |
MUKHERJEE |
2005 |
| RICHARD PARROTT |
A STUDY OF THE RELATIONSHIPS BETWEEN END-USER INFORMATION SYSTEMS PROBLEMS AND HELPDESK CRITICAL SUCCESS FACTORS IN HIGHER EDUCATION |
SCIGLIANO |
2005 |
| TONY READ |
EVALUATING STRATEGIC INFORMATION TECHNOLOGY INVESTMENTS IN THE BANKING INDUSTRY |
MUKHERJEE |
2005 |
| TRACI REED |
USING ONLINE LEARNING ENVIRONMENTS TO ENHANCE THE ACQUISITION OF BASIC SKILLS AND IMPROVE RETENTION RATES OF ADULT EDUCATION STUDENTS |
ABRAMSON |
2005 |
| KARL REIMERS |
IMPACT OF IT INDUSTRY CERTIFICATION ON THE ACHIEVEMENT OF HIGH SCHOOL STUDENTS ENROLLED IN TECHNOLOGY COURSES |
TERRELL |
2005 |
| BRIAN SHEPPARD |
THE EFFECT OF INTERNET MONITORING SOFTWARE ON THE NON-EDUCATIONAL RELATED WEB USAGE OF ADULT STUDENTS SEEKING COMPUTER CERTIFICATION |
COHEN |
2005 |
| MIRI SHONFELD |
THE IMPACT OF AN ONLINE CONFERENCE IN EDUCATION: A CASE STUDY |
ABRAMSON |
2005 |
| SHARON SHUEY |
DEVELOPMENT AND IMPLEMENTATION OF A PROBLEM-BASED LEARNING MODEL IN A FINANCE COURSE: A CASE STUDY |
ABRAMSON |
2005 |
| CHAD SMITH |
A DESCRIPTIVE STUDY OF THE INTERNET SEARCH BEHAVIORS EMPLOYED BY DEAF ADOLESCENTS COMPLETING FACT-BASED RESEARCH TASKS |
DRINGUS |
2005 |
| BRANDON SPENCER |
THE EFFECTS OF COMPUTERIZED SMELL ON MEMORY |
COHEN |
2005 |
| SHERRY STRUM |
A COGNITIVE STUDY ON THE USE OF THE INTERNET BY MINORITY SMALL
BUSINESS OWNERS FOR INFORMATION RESEARCH AND THE DESIGN AND DEVELOPMENT OF A SMALL BUSINESS INFORMATION PORTAL |
ZINK |
2005 |
| RICHARD TABU |
DEVELOPMENT OF TELECOMMUNICATIONS IN THE DEMOCRATIC REPUBLIC OF THE CONGO (DRC) |
ZINK |
2005 |
| JEFF TEO |
A MODEL OF TRUSTED COMPUTING ACCEPTANCE IN HIGHER EDUCATION |
SCIGLIANO |
2005 |
| NANCY THIBEAULT |
SINCLAIR CURRICULUM EXCHANGE: SHARING LEARNING RESOURCES TO IMPROVE PART-TIME INSTRUCTION |
ABRAMSON |
2005 |
| GEORGE THURMOND |
SECURING STATE LEVEL DIGITAL GOVERNMENT PUBLIC KEY INFRASTRUCTURE: A SURVEY OF SECURITY REQUIREMENTS FOR THE EVOLVING STATE-LEVEL DIGITAL GOVERNMENT. |
MANNING |
2005 |
| ROBERT VERMILYER |
KNOWLEDGE DISCOVERY IN CONTENT-BASED IMAGE RETRIEVAL ST
SYSTEMS |
LASZLO |
2005 |
| DAVID VOORHEES |
PREDICTING SOFTWARE SIZE AND DEVELOPMENT EFFORT: MODELS BASED ON STEPWISE REFINEMENT |
MITROPOULOS |
2005 |
| BERTHAMAE WALKER |
AN INVESTIGATION OF THE FEASIBILITY OF USING WEB-CENTRIC METHODS VERSUS TRADITIONAL FACE-TO-FACE METHODS IN DELIVERING A COURSE IN BIBLIOGRAPHIC INSTRUCTION |
SCIGLIANO |
2005 |
| RICHARD YUN WANG |
A NEW STATISTICAL APPROACH FOR ANOMALY INTRUSION DETECTION BASED ON SHORT-TERM PROFILE DATA |
CANNADY |
2005 |
| SHARON WHEELER |
SOFTWARE ENGINEERS: LICENSE, CERTIFY OR CLASSIFY? MODELING PRACTIONERS THROUGH SPECS(SOFTWARE PRACTIONER EXPERT CLASSIFICATION SYSTEM) |
LEITNER |
2005 |
| MARCIE ZAHAREE |
A SUGGESTED E-BUSINESSPROCESS MODEL TO APPLY KNOWLEDGE MANAGEMENT TO SOLVE TRAINING PROBLEMS OF NEW EMPLOYEES |
ELLIS |
2005 |
| STEVEN ZALE |
TEACHING DATA STRUCTURES USING A PROGRAMMING BY EXAMPLE SYSTEM: EFFECTS ON STUDENT ACHIEVEMENT AND COGNITIVE LOAD |
COHEN |
2005 |
| DANIEL BAER |
AN ASSESSMENT OF THE PORTFOLIO-BASED TECHNOLOGY REQUIREMENT FOR PRESERVICE TEACHERS IN NORTH CAROLINA |
COHEN |
2004 |
| EDUARDO BAUTISTA |
A FRONT-LOADED AGILE SOFTWARE PROCESS FOR WEB APPLICATIONS |
LASZLO |
2004 |
| SHANNON BOESCH |
AUTOMATING THE SPECIFICATION, VALIDATION, AND APPLICATION OF EXPERT SYSTEMS IN A HYBRID EXPERT ENVIRONMENT |
CANNADY |
2004 |
| WAYNE BROWN |
A STUDY OF CHIEF INFORMATION OFFICERS EFFICTIVENESS IN HIGHER EDUCATION |
ABRAMSON |
2004 |
| WILLIAM BROWN |
CREDIBLE WEBCASTS FOR FINANCIAL COMMUNICATIONS |
COHEN |
2004 |
| BARBARA BURCKART |
USING AUTONOMOUS ROBOTS TO INTEGRATE MIDDLE SCHOOL ACADEMIC STANDARDS WITH TECHNOLOGY STANDARDS AND 21ST CENTURY WORKPLACE SKILLS
. |
ABRAMSON |
2004 |
| JAMES COLLINS |
MEASURING CREDIBILITY ASSESSMENT TARGETS IN WEB-BASED INFORMATION |
COHEN |
2004 |
| CARL DEPASQUALE |
A METHOD TO MODEL THE BEHAVIOR OF JAVA CLASSES DURING DEVELOPMENT |
LEITNER |
2004 |
| TAMMY ENGELMAN |
A COMPARATIVE ANALYSIS OF DDS AND HUMANS ON MAKING LOAN DECISIONS |
LASZLO |
2004 |
| EILEEN EUDY |
A USE-CASE MODEL FOR A KNOWLEDGE MANAGEMENT SYSTEM TO FACILITATE DISASTER RELIEF OPERATIONS |
MUKHERJEE |
2004 |
| MARGO FITZPATRICK |
EVALUATING BAYESIAN CLASSIFIERS AND ROUGH SETS FOR CORPORATE BANKRUPTCY PREDICTION |
MUKHERJEE |
2004 |
| DONALD FRAZIER |
A SIMULATION MODEL OF LARGE SCALE SOFTWARE REUSE IMPLEMENTATIONS: A SYSTEMS DYNAMICS APPROACH |
MUKHERJEE |
2004 |
| ALBERT FUNDABURK |
THE EDUCATION OF INFORMATION SECURITY PROFESSIONALS: AN ANALYSIS OF INDUSTRY NEEDS VS. ACADEMIC CURRICULUM IN THE 21ST CENTURY |
CANNADY |
2004 |
| DAVID GARDNER |
METHOD AND APPARATUS FOR ENHANCED E-MAIL FILTERING AND ROUTING EMPLOYING DIRECTORY-BASED INFORMATION AND POLICIES |
LITTMAN |
2004 |
| ROSEMARY HAYES |
A MULTI-CRITERIA DECISION ANALYSIS FRAMEWORK FOR SELECTING SUITABLE LEARNING MANAGEMENT SYSTEMS |
DRINGUS |
2004 |
| SHERMAN HOU |
DEVELOPING A CULTURAL PORTAL TO ENHANCE THE FOREIGN LANGUAGE CURRICULUM |
ELLIS |
2004 |
| BARBARA KING |
A SOFTWARE DEVELOPMENT LIFE CYCLE MODEL FOR WEB-BASED APPLICATION DEVELOPMENT |
LEITNER |
2004 |
| ELAINE LAWRENCE |
TECHNOLOGY INTEGRATION AND PRE-SERVICE TEACHER TRAINING: THE EFFECTIVENESS OF EMBEDDING TECHNOLOGY USE IN THREE PRE-METHODS COURSES |
TERRELL |
2004 |
| JEFFREY LEHMAN |
AN EXTENSIBLE MARKUP LANGUAGE (XML) APPLICATION FOR THE UNIVERSITY COURSE TIMETABLING PROBLEM |
LASZLO |
2004 |
| EDWARD LOVITT |
IMPLEMENTATION OF AN INDIVIDUAL PROFESSIONAL DEVELOPMENT SYSTEM USING A WEB-ACESSIBLE DATABASE |
ELLIS |
2004 |
| NICKOLAS MACCHIARELLA |
EFFECTIVENESS OF VIDEO-BASED AUGMENTED REALITY AS A LEARNING PARADIGM FOR TRAINING AEROSPACE MAINTENANCE TASKS |
COHEN |
2004 |
| MOHAMED MANSOUR |
DETERMINING THE EFFECTIVENESS OF COLLEGE STUDENTS IN SEARCHING THE INTERNET |
RIGGS |
2004 |
| MICHAEL MCCARTHY |
AN ARCHITECTURE FOR IMPLEMENTING FINE-GRAINED XML DOCUMENT SECURITY USING WEB SERVICES |
CANNADY |
2004 |
| THERESA MCDONALD |
THE EFFECTS OF INSTANT MESSAGING ON PERFORMANCE AND COMMUNICATION APPREHENSION IN A BUSINESS COMPUTER APPLICATION CLASS |
TERRELL |
2004 |
| BETH MURRAY |
THE DESIGN AND IMPLEMENTATION OF A KNOWLEDGE MANAGEMENT SYSTEM IN THE SBC DATACOMM CUSTOMER SUPPORT CENTER |
LITTMAN |
2004 |
| KAREN NARD |
IMPROVING INFORMATION SYSTEMS SECURITY THROUGH MANAGEMENT PRACTICES: A NON-TECHNICAL APPROACH |
CANNADY |
2004 |
| LISA OLIVIERI |
THE EFFECT OF THE HIGH SCHOOL ENVIRONMENT ON ENCOURAGING GIRLS TO MAJOR IN COMPUTER SCIENCE |
COHEN |
2004 |
| EDWARD PALMER |
WEBSITES OF LARGE NONPROFIT ORGANIZATIONS
|
LITTMAN |
2004 |
| JAMES RANSOME |
WIRELESS INTEGRATED SECURE DATA OPTIONS MODEL FOR CONVERGED NETWORK SECURITY |
CANNADY |
2004 |
| PAMELA RAWLS |
SCHOOL-BASED SUPPORT FOR ELEMENTARY SCHOOL TEACHING WITH TECHNOLOGY |
ABRAMSON |
2004 |
| ADAM RAZAVIAN |
COGNATIVE BASED ADAPTIVE PATH PLANNING FOR AUTONOMOUS ROBOTIC VEHICLES |
SUN |
2004 |
| BELARMINA RICHARDS |
HUMAN-AGENT INTERACTION AND WEB-BASED SYSTEMS: A STUDY OF USER PERFORMANCE AND SOFWARE AGENT LEARNING |
COHEN |
2004 |
| KATHLEEN ROBERTS |
INFUSING ONLINE COMPONENTS INTO THE ACADEMIC COURSEWORK OFCOMPREHENSIVE HIGHSCHOOLS IN THE STATE OF NEW YORK USING HSTOR-E |
ABRAMSON |
2004 |
| ELLEN SCALESE |
A MODEL TO INCREASE PERSISTENCE IN POST-SECONDARY ONLINE EDUCATION |
ABRAMSON |
2004 |
| LAWRENCE SHAFER |
DATA DRIVEN CALCULATION HISTORIES TO MINIMIZE IEEE-754 FLOATING-POINT COMPUTATIONAL ERROR |
LASZLO |
2004 |
| ROBERT STEPHENS |
A FRAMEWORK FOR THE IDENTIFICATION OF ELECTRONIC COMMERCE DESIGN ELEMENTS THAT ENABLE TRUST WITHIN THE SMALL HOTEL INDUSTRY |
COHEN |
2004 |
| EDIT SZANTO |
DEVELOPMENT OF A COPYRIGHT AND INTELLECTUAL PROPERTY POLICY AND ONLINE TRAINING FOR A COMMUNITY COLLEGE |
ABRAMSON |
2004 |
| UTAKO TANIGAWA |
A STUDY OF THE PROCESSES OF WHICH ENTERPRISE ARCHITECTURE DECISIONS ARE MADE |
NYSHADHAM |
2004 |
| EDDIE WACHTER |
A STUDY OF THE USE OF FORENSIC MULTIMEDIA IN THE COURTROOM |
DRINGUS |
2004 |
| CAROL WOODY |
APPLYING SECURITY RISK MANAGEMENT TO INTERNET CONNECTIVITY IN K-12 SCHOOLS |
LITTMAN |
2004 |
| VALERIE AKUNA |
FACULTY PERCEPTIONS OF INSTRUCTIONAL MANAGEMENT SYSTEMS IN WEB-BASED TEACHING AND LEARNING |
LITTMAN |
2003 |
| KEVIN ANDREYO |
INTEGRATING MULTIMEDIA AUTHORING INTO THE MIDDLE SCHOOL CURRICULUM |
ABRAMSON |
2003 |
| JEFFREY APPEL |
ACCOMMODATING WORKPLACE NEEDS WITH AN ON-LINE SOFTWARE ENGINEERING TUTORIAL
|
ABRAMSON |
2003 |
| LISA BAIN |
USER-INTERFACE DESIGN IN ONLINE SHOPPING ENVIRONMENTS: THE DEVELOPMENT OF A PRODUCT INTERACTION MODEL (PIM) FROM INTERACTIVE DESIGN ELEMENTS |
COHEN |
2003 |
| RONALD BOOTH |
AN INFORMATION SYSTEMS PROJECT DELIVERY METHODOLOGY FOR IMPLEMENTING WEB-BASED PROGRAM MANAGEMENT SYSTEMS |
SCIGLIANO |
2003 |
| DONNA CACCIOPPO |
THE MEASUREMENT OF ENVIRONMENTAL FACTORS DURING FUNCITON POINT CALCULATIONS |
LEITNER |
2003 |
| JOHN CANE |
ASSESSMENT OF WEB APPLICATION TECHNOLOGY |
LEITNER |
2003 |
| STEVEN CASE |
PERFORMANCE MODELING OF ASYNCHRONOUS REAL-TIME COMMUNICATION WITHIN BLUETOOTH NETWORKS |
SIMCO |
2003 |
| RAYLENE COCHRAN |
USING E-BOOK READERS TO ASSIST ESL STUDENTS IN DEVELOPING THEIR ACADEMIC LANGUAGE SKILLS |
ELLIS |
2003 |
| MEGAN CONKLIN |
DISCOVERING INTERESTING RULES USING A PARALLEL, MULTI-CRITERIA KNOWLEDGE DISCOVERY SYSTEM |
SUN |
2003 |
| JEAN COPPOLA |
THE MODEL E-CLASSROOM FOR HIGHER EDUCATION: A CASE STUDY |
LITTMAN |
2003 |
| D BRUCE CURRY |
DEVELOPING A WIDER VIEW OF EDUCATIONAL TECHNOLOGY THROUGH UBIQUITOUS COMPUTING: A QUALITATIVE CASE STUDY |
ABRAMSON |
2003 |
| BONITA GACNIK |
THE DESIGN OF AN ONLINE OBLATE PROGRAM: BENEDICTINE SPIRITUALITY FOR THE LAITY |
ABRAMSON |
2003 |
| ELLEN GLAZER |
A CASE STUDY: A DISTANCE EDUCATION PROFESSIONAL PILOT TECHNOLOGY ASSOCIATE OF SCIENCE DEGREE PROGRAM |
LITTMAN |
2003 |
| JUDITH HORVATH |
A MULTIPLE ONLINE LEARNING PLATFORM STUDY OF THE IMPACT OF LEARNING STYLE ON ACADEMIC PERFORMANCE |
COHEN |
2003 |
| STEPHEN HUBER |
AN INVESTIGATION OF THE RELATIONSHIPS BETWEEN WORKFLOW AND THE IMPLEMENTATION OF OBJECT-ORIENTED METHODS |
SCIGLIANO |
2003 |
| FREDERICK HUNDLEY |
COLLABORATIVE LEARNING AND WIRELES LOCAL AREA NETWORKS |
ELLIS |
2003 |
| RANDY JUSTICE |
INFERENTIAL DISCLOSURE LIMITATION IN MULTIVARIATE CATEGORICAL DATABASES |
MUKHERJEE |
2003 |
| CHRISTINA LAIACONA |
IMPLICATIONS OF THE 21 CFR PART II-COMPUTER VALIDATIONS AND COTS SYSTEM TESTING |
ZINK |
2003 |
| JOHN LOMBARDI |
SECURING WEB BASED TRANSACTION SERVICES |
CANNADY |
2003 |
| GLORIA MACCORKINDALE |
THE ADAPTATION AND IMPLEMENTATION OF ISTE STANDARDS IN THE INTEGRATION OF TECHNOLOGY-BASED LEARNING IN THE CLASSROOM |
ELLIS |
2003 |
| FRANCISCO MITROPOULOS |
EXTRACTION AND REPRESENTATION OF OBJECT ORIENTED SOFTWARE METRICS FROM BINARY PROGRAMS |
SIMCO |
2003 |
| PATRICIA MORGENSTERN |
IMPLEMENTATION OF A WIRELESS LAN IN A UNIVERSITY ENVIRONMENT: THE WESTERN MICHIGAN UNIVERSITY HAWORTH COLLEGE OF BUSINESS CASE STUDY |
LITTMAN |
2003 |
| HERBERT MUSE |
A RETENTION ISSUE - PREDICTING THE AT-RISK STUDENT IN COMMUNITY COLLEGE WEB-BASED CLASSES |
DRINGUS |
2003 |
| EJIKE OKONKWO |
AN INVESTIGATION OF THE SKILL SETS NEEDED BY INFORMATION SYSTEMS MANAGERS TO COPE EFFECTIVELY WITH THE TRANSITION FROM LEGACY SYSTEMS TO CLIENT/SERVER AND INTERNET ENVIRONMENTS |
SCIGLIANO |
2003 |
| CHAELYNNE POPE |
A MODEL FOR THE IMPLEMENTATION OF A BLOG IN A MANUFACTURING ENVIRONMENT |
LITTMAN |
2003 |
| PETER RAETH |
FINDING UNEXPECTIED EVENTS IN STARING CONTINUOUS-DWELL SENSOR DATA STREAMS VIA ADAPTIVE PREDICTION |
CANNADY |
2003 |
| JOSEPH RAMSEY |
AN INTEGRATED SECURED OPEN-SOURCE MEDICAL PROTOTYPE FOR COLLABORATIVE PATIENT MANAGEMENT ON THE INTERNET |
SCIGLIANO |
2003 |
| MITCH RATON |
A COMPARATIVE ANALYSIS OF DESIGN TECHNIQUES FOR THE CONSTRUCTION OF A EXPERT SYSTEM FOR AIRCRAFT ENGINE DIAGNOSTICS |
SIMCO |
2003 |
| EVERETT RYAN |
A MODEL FOR STRATEGIC PLANNING AND ADMINISTRING AN ASYNCHRONOUS LEARNING NETWORK AND SCORM WITHIN THE HIGHER EDUCATIN USING THE UML |
SCIGLIANO |
2003 |
| JERRY SMITH |
INVESTIGATING THE ROLE OF SEXUAL REPRODUCTION IN DIPLOIDY AGE-STRUCTURED EVOLUTIONARY POPULATIONS |
SIMCO |
2003 |
| MARIA TORAL |
A COMPARATIVE STUDY OF HISPANIC STUDENTS ACHIEVEMENT IN TRADITIONAL IN-CLASS COURSES AND INTERNET-BASED COURSES |
TERRELL |
2003 |
| GARY WANE |
WEB SERVICES BASED AGENTS FOR SUPPLY CHAIN COLLABORATIVE CONTRACT INITIATION |
MUKHERJEE |
2003 |
| MEGHAN WILLIAMS |
A TAXONOMY OF MEDIA USAGE IN MULTIMEDIA (T-MUM) |
COHEN |
2003 |
| RONALD WOLAK |
WIRELESS LAN TECHNOLOGIES: A MODEL FOR PLANNING, DESIGNING, AND IMPLEMENTING A WLAN SOLUTION IN A GLOBAL MANUFACTURING ENTERPRISE |
LITTMAN |
2003 |
| ILYA YAKOVLEV |
A MODEL OF CRITICAL SUCCESS FACTORS FOR IMPLEMENTING ENTERPRISE RESOURCE PLANNING PACKAGES IN HIGHER EDUCATION |
SCIGLIANO |
2003 |
| MUNTUCK YAP |
AN INVESTIGATION OF A DISTRIBUTED SEARCH MECHANISM CONSISTING OF A SET OF COOPERATIVE AGENTS IMPLEMENTED WITH DIFFERENT HEURISTICS SCHEMES |
LEITNER |
2003 |
| BEVERLY ALCOTT |
A COMPARATIVE STUDY OF ACHIEVEMENT OF STUDENTS IN A DISTANCE LEARNING SECOND LANGUAGE CLASS AND IN A TRADITIONAL CLASSROOM SECOND LANGUAGE CLASS |
TERRELL |
2002 |
| MERLE BASS |
AN INFORMATION TECHNOLOGY PARADIGM FOR A LOCAL POLICE DEPARTMENT |
LITTMAN |
2002 |
| DENNIS BAUER |
AN EVOLUTION STRATEGY FOR THE OPTIMIZATION OF NETWORK TRAFFIC TO DETECT ANOMALOUS BEHAVIOR |
CANNADY |
2002 |
| BRYCE BERNARD |
THE EFFECT OF COMPUTER – BASED ACCOUNTING PRACTICE SETS ON THE ACHIEVEMENT OF INTRODUCTORY COLLEGE ACCOUNTING STUDENTS |
TERRELL |
2002 |
| EUGENE BINGUE |
THE DEVELOPMENT OF RELIABLE METRICS TO MEASURE THE EFFICIENCY OF OBJECT– ORIENTED DISPATCHING USING ADA 95 A HIGH– LEVEL LANGUAGE IMPLEMENTING HARD-DEADLINE REAL-TIME PROGRAMMING |
LASZLO |
2002 |
| CESAR CASAS |
APPLICATION OF ARTIFICIAL NEURAL NETWORKS TO THE TACTICAL ASSET ALLOCATION MODEL |
MUKHERJEE |
2002 |
| GALEN COLLINS |
THE VIABILITY OF A SATELLITE - AND WEB-BASED LEARNING SYSTEM FOR THE HOSPITALITY INDUSTRY: A CASE STUDY |
LITTMAN |
2002 |
| ALFREDO CRUZ |
EVOLUTIONARY ALGORITHMS FOR VLSI TEST AUTOMATION |
MUKHERJEE |
2002 |
| CAROL CUSANO |
VISUALLY SEARCHING THE WEB FOR CONTENT: A USABILITY EVALUATION OF TWO SEACH INTERFACES |
DRINGUS |
2002 |
| WALTER DIXON |
THE GEOMETRIC MEAN AS A GENERATOR OF TRUTH-VALUE IN HEURISTIC EXPERT SYSTEMS: AN IMPROVEMENT OVER THE FUZZY WEIGTED ARITHMETIC MEAN |
CANNADY |
2002 |
| JAMES DOLLENS |
INTRUSION DETECTION VIA COMPUTER SYSTEM DNA |
SIMCO |
2002 |
| FARIDEH GOZLEVELI |
AN INVESTIGATION OF PROJECT DEPENDENCIES AND RISKS IN PROJECT SCHEDULE SLIPPAGE AND EFFORT OVERRUN IN THE ENGINEERING COMPUTING ORGANIZATION |
SCIGLIANO |
2002 |
| ANN GREER |
A MODEL FOR THE DELIVERY AND EVALUATION OF ASYNCHRONOUS AND INTERACTIVE SYNCHRONOUS LIBRARY SERVICES AT SOUTHERN ADVENTIST UNIVERSITY |
ZINK |
2002 |
| HENRY GUILD |
PARTICIPANTS IN A DISCUSSION FORUM USE STORYTELLING TO CREATE FLEXIBLE MEANS OF COMMUNICATION |
LEITNER |
2002 |
| JOSEPH GULLA |
DESIGN AND IMPLEMENTATION OF A PROTOTYPE TOOLSET FOR FULL LIFE CYCLE MANAGEMENT OF WEB-BASED APPLICATIONS |
SCIGLIANO |
2002 |
| ERNEST HAMPSON |
HIGH SPEED ROUTING TABLE LOOKUPS FOR CURRENT AND NEXT GENERATION INTERNET ROUTING |
SIMCO |
2002 |
| HAROLD HENKE |
A STUDY OF THE USE OF PAPER BOOK METAPHORS IN THE DESIGN OF ELECTRONIC BOOKS |
DRINGUS |
2002 |
| JON INOUYE |
A TECHNIQUE FOR VISUALIZING SOFTWARE ARCHITECTURES |
LASZLO |
2002 |
| STEPHANIE KARRAN |
UTILIZATION OF INTERNET2 FOR COLLABORATIVE TELE-EDUCATION: A CASE STUDY |
LITTMAN |
2002 |
| ERNEST KLERKS |
NEURAL NETWORKS TO PREDICT THE PROPERTIES OF A NEW TYPE OF BATCH HOT DIP GALVANIZED STEEL |
MUKHERJEE |
2002 |
| AMY KORESDOSKI |
THE VALUE OF DISTANCE LEARNING GRADUATE DEGREE PROGRAMS TO EMPLOYERS AND EMPLOYEES |
ABRAMSON |
2002 |
| JENNIFER LAGIER FELLGUTH |
MEASURING USAGE OF DIGITAL RESOURCES AT HARNELL COLLEGE: AN EVALUATION OF SELECTED ELECTRONIC FULL-TEXT DATABASES. |
DRINGUS |
2002 |
| GARY LOCKLAIR |
FOUNDATIONS OF COMPUTER SCIENCE A SURVEY OF COMPUTER SCIENCE VIA ITS GRAND IDEAS |
LASZLO |
2002 |
| LYNDA LOUIS |
AN EMPIRICAL INVESTIGATION OF EMPLOYEE PERCEPTIONS OF OUTSOURCING SUCCESS OF INFORMATION TECHNOLOGY OPERATIONS |
MUKHERJEE |
2002 |
| JO LUNDY |
USING THE INTERNET TO BUILD COMMUNITY AND PROVIDE CLINICAL PRACTICE GUIDELINES FOR CAMP NURSES |
ABRAMSON |
2002 |
| STACY NOWICKI |
STUDENTS SUCCESS WITH WORLD WIDE WEB SEARCH ENGINES RETRIEVING RELEVANT RESULTS WITH RESPECT TO END-USER RELEVANCE JUDGEMENTS |
ZINK |
2002 |
| MC-CHESTER ODOH |
DATA CONVERSION: AN INVESTIGATION OF MANAGEMENTS ROLE IN THE CHANGE PROCESS |
SCIGLIANO |
2002 |
| ROBERT POLSELLI |
INTEGRATING COMPUTER TECHNOLOGY INTO THE K-12 CLASSROOM: A WEB-BASED TRAINING & MENTORSHIP MODEL |
ELLIS |
2002 |
| EASTON RHODD |
ENTERPRISE INTEGRATION MODELING: LINKING ENTERPRISE INTEGRATION ARCHITECTURE WITH BUSINESS STRATEGY PLANNING |
SCIGLIANO |
2002 |
| MARIA RODRIGO |
INFORMATION TECHNOLOGY USAGE IN METRO MANILA PUBLIC AND PRIVATE SCHOOLS |
ZINK |
2002 |
| SARAH SCHRIRE |
LEARNING PROCESSES AND MODERATION TECHNIQUES IN ASYNCHRONOUS LEARNING NETWORKS |
ABRAMSON |
2002 |
| WILLIAM SMITH |
THE EFFECT ON COGNITIVE LOAD BY USING VISUAL MODELING TOOLS TO TEACH OBJECT-ORIENTED PROGRAMMING TO STUDENTS WHO HAVE HIGH PRIOR EXPERIENCE WITH PROCEDURAL PROGRAMMING |
ELLIS |
2002 |
| MARTHA SNYDER |
THE DESIGN AND DELIVERY OF ONLINE LEARNING COMMUNITIES FOR OLDER ADULTS |
ABRAMSON |
2002 |
| RONALD SPERANO |
AN INVESTIGATION INTO THE EFFECTIVENESS OF A PORTABLE ELECTRONIC MEETING SYSTEM IN A COLOCATED COMPUTER SUPPORTED COOPERATIVE WORK ENVIRONMENT |
LITTMAN |
2002 |
| BEVERLY SWISSHELM |
A COMPARISON OF THE USE OF ARTIFICIAL NEURAL NETWORKS, FRACTAL TIME SERIES AND FRACTAL NEURAL NETWORKS IN FINANCIAL FORCASTING |
MUKHERJEE |
2002 |
| ROY TAUNTON |
Y2K SERENDIPITY: BENEFITS AND SPINOFFS |
SCIGLIANO |
2002 |
| TRIROJ VIROJTRIRATANA |
THE LINKAGE OF COMPETITIVE STRATEGY, INFORMATION TECHNOLOGY (IT) MATURITY AND SIZE WITH STRATEGIC RESPONSE TO FINANCIAL LIBERALIZATION OF THAI FINANCIAL INSTITUTIONS |
ZINK |
2002 |
| CAROLE WILKINSON |
A STUDY TO DETERMINE THE PREDICTORS OF SUCCESS IN AN ONLINE COLLEGE GRADUATE PROGRAM |
TERRELL |
2002 |
| STEVEN BERNSTEIN |
A COMPARISON OF TRADITIONAL-COMPUTER ASSISTED FEEDBACK AND GENERAL MULTIMEDIA FEEDBACK IN A WEB-BASED PHYSICAL THERAPY ASSIGNMENT |
TERRELL |
2001 |
| WENYI BI |
KNOWLEDGE DISCOVERY BY ATTRIBUTE-ORIENTED APPROACH UNDER DIRECTED ACYCLIC CONCEPT GRAPH (DACG) |
SUN |
2001 |
| JOSEPH BIANCO |
WEB INFORMATION SYSTEM (WIS): INFORMATION DELIVERY THROUGH WEB BROWSERS |
SALAZAR |
2001 |
| GARY HASMAN |
GUIDELINES FOR DEVELOPMENT OF COURSES FOR DELIVERY OVER THE IOWA COMMUNICATIONS NETWORK
|
TERRELL |
2001 |
| DIANE HAYES |
INTELLECTUAL CAPITAL MANAGEMENT AMONG PROJECT MANAGERS IN THE INFORMATION TECHNOLOGY DOMAIN |
MANNING |
2001 |
| DOMINIQUE HEGER |
THE DESIGN OF A LOGARITHMIC FILE DATA ALLOCATION ALGORITHM FOR EXTENT BASED FILE SYSTEMS |
SIMCO |
2001 |
| DAVID HENDRICKSON |
STOCHASTIC DISCRETE EVENT SIMULATION USING PRODUCT-FORM QUEUING NETWORKS TO MODEL STEADY-STATE BEHAVIOR: AN EXAMINATION OF A MEDICAL DEVICE COMMUNICATIONS NETWORK |
LITTMAN |
2001 |
| CHERYL HILL |
DEVELOPMENT OF COMPUTER SKILLS IN PHYSICAL THERAPY STUDENTS |
TERRELL |
2001 |
| JOHN HIPPS |
AN XML MODEL OF A COLLABORATION TOOL FOR SUPPORTING EXTRANET-BASED WORKFLOW AUTOMATION |
SCIGLIANO |
2001 |
| DAVID JACOBS |
AN XML BASED AUTHORIZATION FRAMEWORK FOR WEB-BASED APPLICATIONS |
MUKHERJEE |
2001 |
| SALLIE JOHNSON |
FACULTY ATTITUDES TOWARD EDUCATIONAL TECHNOLOGY: AN ENTENSION OF BULLARDS ANALYSIS OF SELECTED VARIABLES |
DRINGUS |
2001 |
| DAVID JONES |
A SOFTWARE REENGINEERING METHOD FOR EVOLVING A STRUCTURED LEGACY SYSTEM TO AN OBJECT-ORIENTED SYSTEM MODEL USING THE UNIFIED MODELING LANGUAGE |
SCIGLIANO |
2001 |
| ROBERT KERBS |
THE EXTRACTION OF CLASSIFICATION RULES AND DECISION TREES FROM INDEPENDENCE DIAGRAMS |
SUN |
2001 |
| FRANK NASUTI |
KNOWLEDGE ACQUISITION USING MULTIPLE DOMAIN EXPERTS IN THE DESIGN AND DEVELOPMENT OF AN EXPERT SYSTEM FOR DISASTER RECOVERY PLANNING |
MUKHERJEE |
2001 |
| ALAN PESLAK |
A FIRM LEVEL STUDY OF INFORMATION TECHNOLOGY PRODUCTIVITY USING FINANCIAL AND MARKET BASED MEASURES |
MUKHERJEE |
2001 |
| THANH PHAM |
DYNAMIC UPDATE TECHNIQUES FOR ONLINE MAPS AND ATTRIBUTES DATA |
MUKHERJEE |
2001 |
| MASOOD POORANDI |
THE IMPACT OF GRAPHING CALCULATORS IN TEACHING MATHEMATICS |
TERRELL |
2001 |
| KENNETH REVELS |
DYNAMIC UPDATE TECHNIQUES FOR ON-LINE MAPS AND ATTRIBUTES DATA |
MUKHERJEE |
2001 |
| VIRGINIA ROSENKRANS |
ELECTRONIC COMMERCE AND INTERNET ADVERTISING |
MANNING |
2001 |
| WILLIAM RYAN |
COMPARISON OF STUDENT PERFORMANCE AND ATTITUDE IN A LECTURE CLASS TO STUDENT PERFORMANCE AND ATTITUDE IN A TELECOURSE AND A WEB-BASED CLASS |
COHEN |
2001 |
| MIRIAM SCHCOLNIK |
A STUDY OF READING WITH DEDICATED E-READERS |
ABRAMSON |
2001 |
| PATRICIA SPERANO |
THE DEVELOPMENT OF AN INTRANET-BASED ELECTRONIC PERFORMANCE SUPPORT SYSTEM FOR KNOWLEDGE MANAGEMENT WORKERS |
ABRAMSON |
2001 |
| LEON STEVENS |
A MODEL FOR TRANSFORMING LEGACY SYSTEMS IN A CLIENT/SERVER ENVIRONMENT BASED ON THE UNIFIED MODELING LANGUAGE (UML) |
SCIGLIANO |
2001 |
| CAROLYN VOEGLER |
THE DESIGN AND IMPLEMENTATION OF A WEB-BASED SYSTEM TO AID STUDENTS IN RESOURCE LOCATION IN A PRIVATE HIGH SCHOOL LIBRARY SETTING |
ZINK |
2001 |
| GIOCONDA WEINER |
CONSTRUCTING VIRTUAL INTERNET AGENTS TO IMPROVE LEARNING |
ABRAMSON |
2001 |
| JOHN WILLIAMS |
A STUDY OF THE CORRELATION OF THE ISO-9000 QUALITY CONTROL PROGRAM ON THE FINANCIAL RESULTS OF INFORMATION TECHNOLOGY COMPANIES WHO HAVE ACHIEVED ISO-9000 CERTIFICATION |
TERRELL |
2001 |
| MANUEL ASTTE |
A COMPARISON OF INTRANET TRANING PROGRAMS WITH TRADITIONAL CLASSROOM INSTRUCTION FOR LOCAL GOVERNMENT EMPLOYEES |
COHEN |
2000 |
| JAMES BACKER |
MULTI-USER DOMAIN OBJECT ORIENTED (MOO) AS A HIGH SCHOOL PROCEDURE FOR FOREIGN LANGUAGE ACQUISITION |
ABRAMSON |
2000 |
| NONI BOHONAK |
FINDING A FITNESS FUNCTION TO BE USED WITH GENETIC ALGORITHMS TO SOLVE A PROTEIN FOLDING PROBLEM: THE AB INITIO PREDICTION OF A PROTEIN USING TORSION ANGLES |
LASZLO |
2000 |
| JAMES CANNADY |
AN ADAPTIVE NEUTRAL NETWORK APPROACH TO INTRUSION DETECTION AND RESPONSE |
MUKHERJEE |
2000 |
| JOSEPH CANNON |
APPROXIMATION OF MARGINAL PROBABILITIES WHILE LEARNING BAYESIAN NETWORKS |
MUKHERJEE |
2000 |
| PATRICIA COWHERD |
A STUDY TO DETERMINE TECHNOLOGICAL SKILLS AND COMPETENCIES NEEDED FOR OFFICE EMPLOYMENT AS REPORTED BY SELECTED EMPLOYERS IN THE SOUTH CENTRAL KENTUCKY LAKE CUMBERLAND AREA DEVELOPMENT DISTRICT |
TERRELL |
2000 |
| JANCIS DENNIS |
PROBLEM-BASED LEARNING IN COMPUTER-MEDIATED VERSUS FACE-TO-FACE GROUPS: A COMPARISON OF LEARNING BEHAVIORS AND OUTCOMES OF ENTRY-LEVEL PHYSICAL THERAPY STUDENTS IN A MODULE ON WOMEN’S HEALTH |
ABRAMSON |
2000 |
| PATRICIA DEUBEL |
MATHEMATICS SOFTWARE AND ACHIEVEMENT ON THE OHIO NINTH GRADE PROFICIENCY TEST |
ABRAMSON |
2000 |
| LISA DEZIEL-EVANS |
AN INVESTIGATION OF CRITICAL THINKING IN SYNCHRONOUS AND ASYNCHRONOUS COMPUTER CONFERENCING ENVIRONMENTS |
DRINGUS |
2000 |
| PAULA DOHERTY |
SUCCESS FACTORS AMONG COMMUNITY COLLEGE STUDENTS IN AN ONLINE LEARNING ENVIROMENT |
TERRELL |
2000 |
| ROBERT GRENIER |
AN OBJECT-ORIENTED MODEL FOR INTERORGANIZATIONAL COLLABORATIVE PLANNING |
GUILD |
2000 |
| LAWRENCE GROSBERG |
IMPROVING SECURITY AND PERFORMANCE OF GENERAL CRYPTOSYSTEMS BASED UPON SHANNONS PERFECT SECRECY AND MESSAGE PRIORITIZATION |
LEITNER |
2000 |
| STEPHEN HANSEN |
COMPLETE RANDOMIZED CUTTING PLANE ALGORITHMS FOR PROPOSITIONAL SATISFIABILITY |
LEITNER |
2000 |
| HAJIME HAYAKAWA |
INTERNATIONAL USABILITY DESIGN GUIDELINES AND EFFECTIVEMESS OF A WORLD WIDE WEB-BASED INSTRUCATIONAL PROGRAM FOR HIGHT SCHOOL STUDENTS IN A CROSS CULTURE LEARNING ENVIROMENT |
ABRAMSON |
2000 |
| JAMES HENDEE |
A DATA-DRIVEN SOFT REAL TIME EXPERT SYSTEM FOR PRODUCING CORAL BLEACHING ALERTS |
MURRAY |
2000 |
| THERESA JU |
THE DESIGN OF AN INTEROPERABLE AND ADAPTABLE WORKFLOW MANAGEMENT SYSTEM USING XML
|
SCIGLIANO |
2000 |
| GABRIEL KENGNI |
STRUCTURAL DESIGN OF A FAST CONVERGANCE ALGORITHM: A SEMI-UNIVERAL ROUTING PROTOCOL |
LEITNER |
2000 |
| RAGHUBABU KORRAPATI |
A BAYESIAN FRAMEWORK TO DETERMINE PATIENT COMPLIANCE IN GLAUCOMA CASES |
MUKHERJEE |
2000 |
| JAMES LOGAN |
THE REQUIREMENTS FOR A CONTEMPORARY X.400 MAIL SYSTEM FOR DISTRIBUTED NETWORKS |
GUILD |
2000 |
| JOANNE MARLOWE |
SMART CARD SYSTEMS: DEVELOPMENT OF A PARADIGM FOR A UNIVERSITY-WIDE SMART CARD STUDENT IDENTIFICATION SYSTEM |
LITTMAN |
2000 |
| MARGARET MARSTON |
TECHNOLOGY – BASED TRAINING FOR TEACHERS OF THE VISUALLY IMPAIRED IN THE USE OF SPEECH-SUPPORTED TELECOMMUNICATIONS |
ABRAMSON |
2000 |
| BRUCE MARTIN |
EFFECTS OF DEPARTMENT OF DEFENSE ACQUISITION REFORM ON MILITARY SOFTWARE DEVELOPMENT PROGRAMS |
GUILD |
2000 |
| PROGRESS MTSHALI |
MINIMIZING PARALLEL VIRTUAL MACHINE (PVM) TASKS EXECUTION TIMES THROUGH OPTIMAL HOST ASSIGNMENTS |
MUKHERJEE |
2000 |
| SHARRON REDDEN |
SELF- ESTEEM AND INTRINSIC MOTIVATIONAL EFFECTS OF USING A CONSTRUCTIVIST AND A BEHAVIORIST APPROACH TO COMPUTER USAGE IN FIFTH GRADE HISPANIC CLASSROOMS |
TERRELL |
2000 |
| ANDREW RUNYAN |
PERSISTENCE DIFFERENCES IN COMMUNITY COLLEGE COURSES TAUGHT IN CLASSROOMS AND THROUGH ALTERNATIVE FORMATS |
ABRAMSON |
2000 |
| LYNETTE SCHNEIDER |
A COMPARISON OF THE USER INTERFACE FEATURES OF THE FREE VERSIONS OF MEDLINE ON THE INTERNET WORLD WIDE WEB |
LITTMAN |
2000 |
| MICHAEL SIGNOR |
THE FAILURE ANALYSIS MATRIX: A USABLE MODEL FOR RANKING SOLUTIONS TO FAILURES IN INFORMATION SYSTEMS |
DRINGUS |
2000 |
| JESSE SMITH |
THE FEASIBILITY OF DEVELOPING A COMPUTER EXPERT SYSTEM TO MITIGATE NUCLEAR POWER PLANT ACCIDENTS |
MUKHERJEE |
2000 |
| KENNETH SPENCER |
A COMPARISON OF CONATIVE LEVELS AMOUNG LEARNERS WHEN DIFFERENT METHODS OF TRAINING ARE USED. |
ABRAMSON |
2000 |
| HELEN ST. AUBIN |
IMPLEMENTING A VIRTUAL REALITY PARADIGM IN HUMAN ANATOMY/PHYSIOLOGY COLLEGE CURRICULA |
ABRAMSON |
2000 |
| ROBERT STEINHOFF |
A PERFORMANCE COMPARISON OF TREE-BASED GENETIC PROGRAMMING VERSUS STACK-BASED GENETIC PROGRAMMING USING THE JAVA VIRTUAL MACHINE |
LEITNER |
2000 |
| VIRGELEAN THORN |
A COMPARATIVE STUDY OF THE EFFECTIVENESS OF THREE MODELS OF DISTANCE EDUCATION STUDENT ACHIEVEMENT AND LEVEL OF SATISFACTION. |
TERRELL |
2000 |
| RAMONA TOWNSEND |
AN INTERNET-BASED COLLABORATIVE PROTOTYPE FOR (SAP R/3) DATABASE ADMINISTRATION |
SCIGLIANO |
2000 |
| JOHN VIREN |
IMPLICATIONS OF CONTRAST SENSITIVITY IN INFORMATION CUEING |
ABRAMSON |
2000 |
| MICHAEL WILLIAMS |
TRAINING AVIATION MAINTENANCE TECHNICIANS WITH INFORMATION RETRIEVAL SYSTEMS |
ABRAMSON |
2000 |
| DONALD WISMER |
STATE GOVERNMENT COST RECOVERY FOR ELECTRONIC INFORMATION DISSEMINATION: A COMPARATIVE STUDY |
ZINK |
2000 |
| ERIC S. ACKERMAN |
DESIGNING A COMPUTER SYSTEM TO CONTROL SEVERAL SMALL EXPERIMENTS IN A SPACE ENVIRONMENT |
GUILD |
1999 |
| ARCHIE ADDO |
AN EXPERT SYSTEM FOR THE SELECTION OF ELECTRONIC PAYMENT SYSTEMS BASED ON ORGANIZATIONAL SECURITY REQUIREMENTS |
MUKHERJEE |
1999 |
| RICHARD BAKER |
INFORMATIONS SYSTEMS PROJECTS:LEADERSHIP AS A CRITICAL SUCCESS |
MANNING |
1999 |
| KATHLEEN CAHALAN |
DESIGN OF THE ELECTRONIC CLASSROOM GRAPHICAL USER INTERFACE: NOVA SOUTHEASTERN UNIVERSITY’S MULTIMEDIA ELECTRONIC CLASSROOM PROJECT |
SCIGLIANO |
1999 |
| DORTHEA CAMP-WHITE |
EFFECTS OF STUDENT PARTICIPATION IN A SELF CONTAINED FIFTH-GRADE MULTIMEDIA CLASSROOM ON STUDENT ACHIEVEMENT AND ADJUSTMENT TO THE MIDDLE SCHOOL SETTING |
COHEN |
1999 |
| RUEY-MING CHAO |
THE CRITICAL DISTANCE-LEARNING METRICS FOR STUDENT NEEDS AND SATISFACTION |
GUILD |
1999 |
| MING-CHE CHEN |
SUCCESSFUL WEB DESIGN FACTORS IN COMMERCIAL WEB SITES: A CASE STUDY |
GUILD |
1999 |
| EDWARD CROOK |
LINKING PRINTED BOOKS TO COMPUTERIZED SPEECH |
ABRAMSON |
1999 |
| NESTOR DIAZ |
EFFECTS OF MULTIMEDIA INSTRUCTION ON THE MATHEMATICS PERFORMANCE OF LIMITED ENGLISH PROFICIENT STUDENTS |
TERRELL |
1999 |
| YAW FRIMPONG |
A PROJECT MANAGEMENT PROTOTYPE FOR COLLABORATIVE PROJECTS ON THE INTERNET |
LEVIN |
1999 |
| WILLIAM GROOVER |
THE DESIGN OF AN EXPERT SYSTEM FOR ACADEMIC ADVISING AT A TWO-YEAR COMMUNITY COLLEGE |
MUKHERJEE |
1999 |
| JAMES GRUNWALD |
THE USE OF COOPERATIVE GROUPS IN LEARNING HOW TO USE NEW SOFTWARE PROGRAMS |
TERRELL |
1999 |
| WILLIAM HAFNER |
REQUIREMENTS AND ARCHITECTURE FOR A GROUP MEMORY IN THE ANY-TIME/ANY-PLACE DOMAIN OF COMPUTER SUPPORTED COOPERATIVE WORK |
DRINGUS |
1999 |
| MARC INGLE |
AN EXPERIMENTAL COMPARISON OF STUDENT PERFORMANCE IN A WEB-BASED VERSUS A LECTURE-BASED CLASSROOM |
ABRAMSON |
1999 |
| DOUGLAS L. JACOBS |
COLOR CALIBRATION OF COMPUTER DISPLAY DEVICES |
LASZLO |
1999 |
| MAURY E. JOHNSON |
PLANNING GENETIC ALGORITHM: PURSUING META-KNOWLEDGE |
SALAZAR |
1999 |
| KITTISAK KERDPRASOP |
ACTIVE DATABASE RULE SET REDUCTION BY KNOWLEDGE DISCOVERY |
SUN |
1999 |
| NITTAYA KERDPRASOP |
THE APPLICATION OF INDUCTIVE LOGIC PROGRAMMING TO SUPPORT SEMANTIC QUERY OPTIMIZATION |
SUN |
1999 |
| DIANE KING |
A MODEL FOR IN-HOUSE DEVELOPMENT OF COMPUTER-BASED TRAINING |
ABRAMSON |
1999 |
| CHRISTINE LAWES |
ASSESSMENT OF THE EFFECTS OF A TECHNICAL PREPARATION PROGRAM OF INSTRUCTION ON THE ACADEMIC ACHIEVEMENT AND RETENTION OF SECONDARY STUDENTS |
GUILD |
1999 |
| JUEEN LEE |
USING WEB BASED INSTRUCTION TO IMPROVE ACHIEVEMENT IN PROFESSIONAL COURSES IN THE CHINESE NAVAL ACADEMY |
ABRAMSON |
1999 |
| SUNHEE LEE |
AN INVESTIGATION OF THE EMERGING ROLE OF INFORMATION SYSTEMS PROFESSIONAL IN A CLIENT/SERVE ENVIRONMENT. |
LEVIN |
1999 |
| DONALD LEMMA |
A THEORETICAL MODEL FOR A PRESCRIPTION DRUG PUBLIC KEY CRYPTOGRAPHIC SYSTEM |
MUKHERJEE |
1999 |
| JENGLUNG LIN |
DESIGN PATTERNS FOR MODELING FILE SYSTEM SECUIRTY IN THE DISTRIBUTED ENVIRONMENT |
GUILD |
1999 |
| CRAIG S. LIPMAN |
MODELS FOR OPTIMIZING THE USE OF CONTRACTORS IN INFORMATION SYSTEMS APLICATION DEVELOPMENT OUTSOURCING |
SCIGLIANO |
1999 |
| JANE MAHONEY |
THE EFFECTS OF AIR TRAFFIC CONTROLLERS’ COGNITIVE STYLE, LEARNING STRATEGIES AND PERFORMANCE WITHIN A MULTIMEDIA TRAINING ENVIRONMENT |
TERRELL |
1999 |
| RORY MCGREAL |
A SYSTEMS ANALYSIS OF TELEEDUCATION NB – A PROVINCE-WIDE DISTRIBUTED DISTANCE LEARNING NETWORK |
LITTMAN |
1999 |
| GEORGE MCKEVITT |
A MODEL FOR AN AGENT BASED SYSTEM |
GUILD |
1999 |
| JOSEPH MCVEY |
A STUDY OF THE ATTITUDES OF MANAGEMENT AND EMPLOYEES TOWARD TELECOMMUTING |
TERRELL |
1999 |
| MARY G. COFFIN MURRAY |
AN ANALYSIS OF THE IMPLEMENTATION OF A WORKFLOW SYSTEM FOR HEALTH INFORMATION MANAGEMENT |
LITTMAN |
1999 |
| VICTOR ALLEN NGUYEN |
A SIMPLIFIED FACETED APPROACH TO INFORMATION RETRIEVAL FOR REUSABLE SOFTWARE CLASSIFICATION |
GUILD |
1999 |
| DENNIS R. PITTS |
LEARNING ABOUT SCIENTISTS IN A GENDER-EQUITABLE, MULTIMEDIA ENVIRONMENT |
ABRAMSON |
1999 |
| MITCHELL PRATT |
A STUDY OF THE COMPUTERIZED READING MANAGEMENT PROGRAM, ACCELERATED READER, AND ITS EFFECT ON READING AMONG PRIMARY GRADE STUDENTS |
ABRAMSON |
1999 |
| BELLARMIN N. SELVARAJ |
A REASONING MECHANISM IN THE PROBABILISTIC DATA MODEL BASED ON THE MAXIMUM ENTROPY FORMALISM |
SUN |
1999 |
| JOHN SULLIVAN |
STATEWIDE ONLINE WEB-BASED TRAINING PROGRAM TO PREPARE NEW JERSEY COMMUNITY COLLEGE FACULTY FOR DISTANCE TEACHING |
ABRAMSON |
1999 |
| TAKAAKI TOMIZAWA |
PICTGRAM: THE DESIGN AND IMPLEMENTATION OF A NEW VISUAL PROGRAMMING LANGUAGE |
LASZLO |
1999 |
| PATRICIA WHITE |
AN ARCHITECTURE DESIGN FOR A CUSTOMIZED GUI TO SUPPORT PERSONAL PREFERENCES |
GUILD |
1999 |
| YING-LU YEN |
BUILDING AN ASIAN CULTURAL GRAPHICAL USER INTERFACE (GUI) FOR EFFICIENT AND ADVANCED COMPUTING |
GUILD |
1999 |
| ANNE K. ABATE |
THE ROLE OF THE EINSTEIN LIBRARY OF NOVA SOUTHEASTERN UNIVERSITY IN MEETING THE NEEDS OF DISTANCE EDUCATION STUDENTS |
LITTMAN |
1998 |
| THERESA ANDUZE-PARIS |
A MICROWAVE LINK OVER WATER IN A TROPICAL ZONE CASE STUDY |
GUILD |
1998 |
| JAMES W. BARKER |
A LOW-COST, DECENTRALIZED, DISTRIBUTED COMPUTING ARCHITECTURE FOR AN AUTONOMOUS USER ENVIRONMENT |
SCIGLIANO |
1998 |
| ABBY H. BROWN |
SYSTEM REQUIREMENTS FOR A NEW MANAGEMENT CONTROL EXPERT SYSTEM GENERALIZED INFERENCE ENGINE INTERFACING WITH A CLIENT/SERVER NOTIFICATION SYSTEM |
GUILD |
1998 |
| MARK A. BROWN |
PROPOSITION OF THE TEMPORAL VARIATION DATA MODEL AND EVALUATION OF AN IMPLEMENTATION |
SUN |
1998 |
| JOYCE BETHEA BRYAN |
TECHNOLOGICAL LITERACY ASSESSMENT IN SECONDARY SCHOOLS THROUGH PORTFOLIO DEVELOPMENT |
ZINK |
1998 |
| PHYLLIS CHASSER |
THE EFFECT OF ALTERNATE FORMS OF FEEDBACK ON STUDENT ACHIEVEMENT AND MOTIVATION |
TERRELL |
1998 |
| JEANETTA R. CHRYSTIE |
A MODEL FOR APPLYING TOTAL QUALITY MANAGEMENT IN COMPUTER INFORMATION SYSTEMS MANAGEMENT |
SCIGLIANO |
1998 |
| FRANCIS R. CIRILLO |
A COMPLEXITY COMPARISON OF ADA 95 AND C++ |
GUILD |
1998 |
| VERNON L. CZELUSNIAK |
DESIGN AND IMPLEMENTATION: A CUSTOM INTERACTIVE MULTIMEDIA CBT FOR THE BLOOD-CELL ANALYSIS INDUSTRY |
ABRAMSON |
1998 |
| TIMOTHY ELLIS |
COMPUTER SUPPORTED, TIME AND PLACE INDEPENDENT DISTANCE EDUCATION FOR ADULT LEARNERS: A DEMONSTRATION PROJECT IN TEACHING FINANCIAL ACCOUNTING VIA THE INTERNET |
COHEN |
1998 |
| EILEEN SULEIMA ENNIS |
AN ANALYSIS OF USABILITY ISSUES OF THE WORLD WIDE WEB (WWW) |
DRINGUS |
1998 |
| ANDRES A. FOLLECO |
A PERFORMANCE ANALYSIS TOOL FOR UNIX MASSIVELY PARALLEL COMPUTERS |
BRUCE |
1998 |
| WILLIAM M. HARTMAN |
A STUDY TO DEFINE CURRENT PRACTICES, ATTITUDES AND VALUES IN THE SOFTWARE DEVELOPMENT COMMUNITY |
LIEBLEIN |
1998 |
| JOY A. HATCH |
THE EFFECT OF MULTIMEDIA TRAINING ON STUDENT PILOTS ENCOUNTERING EMERGENCY SITUATIONS |
ABRAMSON |
1998 |
| DAVID M. HEATH |
THE USE OF ELECTRONIC MEETING SYSTEM TECHNOLOGY TO AID IN SOFTWARE REQUIREMENTS ENGINEERING |
MUKHERJEE |
1998 |
| ARTHUR E. HILSCHER |
DEVELOPMENT AND PRODUCTION OF THE ELECTRONIC VIRTUAL” PHARMACEUTICAL DOSSIER |
ZINK |
1998 |
| DANIEL M. HSIEH |
A NEW METHOD TO UPDATE FLASH MEMORY: IN-SYSTEM PROGRAMMING ALGORITHMS FOR THE PERSONAL COMMUNICATOR |
SUN |
1998 |
| W. SIR ANTHONY JOHNSON JR. |
THE DYNAMICS OF COMPLEX SURFACES IN N-DIMENSIONS USING COMPUTER GRAPHICS |
GUILD |
1998 |
| DAVID T. LAURET |
THE AUDITORY DISPLAY IN INTERACTIVE COUSEWARE: MOVING HUMAN FACTORS INTO COMPUTER EDUCATION |
TERRELL |
1998 |
| REY LECLERC |
AN INVESTIGATION OF CRITICAL SUCCESS FACTORS AND PROCEDURES FOR IMPLEMENTING EFFECTIVE INFORMATION SYSTEMS SECURITY PROGRAMS |
SCIGLIANO |
1998 |
| GILDA LEWIS |
A NATIONAL APPROACH TO TOUCH KEYBOARDING INSTRUCTION ON COMPUTERS IN PRIMARY SCHOOLS IN BELIZE |
TERRELL |
1998 |
| WEN-YA LIN |
A LOAD BALANCING DATA ALLOCATION FOR PARALLEL QUERY PROCESSING |
SUN |
1998 |
| EDWARD C. LINDOO |
THE FUTURE OF NEWSPAPERS: A STUDY OF THE WORLD WIDE WEB AND ITS RELATIONSHIP TO ELECTRONIC PUBLISHING OF NEWSPAPERS |
COHEN |
1998 |
| S.J. LOMBARDI |
SUPPLEMENTING TEXTBOOK READING AND WRITING EXERCISES IN THE TYPICAL SPANISH III JESUIT HIGH SCHOOL LANGUAGE CLASSROOM WITH EMAIL CONFERENCES |
TERRELL |
1998 |
| KENNETH G. MACLEOD |
A CONCEPTUAL FRAMEWORK, IMPLEMENTATION PLAN, AND VISUAL GUIDE FOR THE INTERACTIVE MULTIMEDIA COURSEWARE DEVELOPMENT PROCESS |
ABRAMSON |
1998 |
| PHILLIP R. MARCUS |
INTERNET RETRIEVAL AND DISSEMINATION OF ENGINEERING DOCUMENTATION: PRELUDE TO THE WORLD WIDE WEB TECHNOLOGICAL MALL |
SCIGLIANO |
1998 |
| DAVID S. METCALF II |
DISTRIBUTED MULTIMEDIA INFORMATION AND TRAINING SYSTEMS: DEVELOPMENT OF A DESIGN MODEL FOR INTERACTIVE TRAINING USING THE WORLD WIDE WEB AS A DELIVERY SYSTEM |
LITTMAN |
1998 |
| TED MIKELL |
AN ANALYSIS OF SUCCESSFUL AND UNSUCCESSFUL IMPLEMENTATION OF TELECOMMUTING BY AN ORGANIZATION THROUGH IDENTIFICATION OF CRITICAL SUCCESS FACTORS |
MOODY |
1998 |
| SARAH J. MITCHELL |
REVITALIZING THE MIDCAREER COMPUTING TECHNICAL PROFESSIONAL (VOL. I) |
TERRELL |
1998 |
| SARAH J. MITCHELL |
REVITALIZING THE MIDCAREER COMPUTING TECHNICAL PROFESSIONAL (VOL. II) |
TERRELL |
1998 |
| PAUL V. MONTESINO |
EFFECT OF ELECTRONIC PORTFOLIO ASESSMENTS ON THE MOTIVATION AND COMPUTER INTEREST OF FOURTH AND FIFTH GRADE STUDENTS IN A MASSACHUSETTS SUBURBAN SCHOOL. |
TERRELL |
1998 |
| SIMON S. QIU |
A MORE GENERAL MARKOV RELIABILITY MODEL FOR COMPUTER SYSTEMS |
GUILD |
1998 |
| ROBERT C. RACITI |
CREATING COMPETITIVE ADVANTAGE WITH INTERNET TECHNOLOGY |
LITTMAN |
1998 |
| VICTOR DAVID SANCHEZ |
CONTRIBUTIONS TO SUPERVISED LEARNING OF REAL-VALUED FUNCTIONS USING NEUTRAL NETWORKS |
BRUCE |
1998 |
| LARRY A. SEARS |
POSSIBLE FUTURES: THE ROLE OF TECHNOLOGY IN EDUCATION |
TERRELL |
1998 |
| BARBARA SHEGOG |
AN INVESTIGATION OF THE RELATIONSHIPS BETWEEN CHARACTERISTICS OF TEACHERS AND THEIR ATTITUDES TOWARD TECHNOLOGY INTEGRATION IN THEIR COURSES |
SCIGLIANO |
1998 |
| RICHARD H. SUTOR |
AN EDUCATIONAL EXECUTIVE INFORMATION SYSTEM PROTOTYPE FOR PUBLIC SCHOOL DISTRICT SUPERINTENDENTS |
LEVIN |
1998 |
| PIN TAN |
NEURAL NETWORKS IN THE CALCULATION OF CARDIOVASCULAR EQUILIBRIUM VOLUME (VO) OF END-DIASTOLIC PRESSURE-VOLUME RELATIONSHIP STUDY |
CHENG |
1998 |
| MARGARET MAHONEY THOMBS |
ENHANCING THE ENGLISH WRITING SKILLS OF ESL STUDENTS USING E-MAIL WITH PRESERVICE TEACHERS AS MENTORS |
COHEN |
1998 |
| SALIM R. YAZBECK |
PLANNING, DESIGNING, AND INTEGRATING A DISTRIBUTED WIRELESS MOVILE INTRANET ARCHITECTRUE FOR LOCAL AND WIDE AREA NETWORKING AT A UNIVERSITY |
LITTMAN |
1998 |
| SAMUEL ABRAHAM |
THE USE OF PRESENTATION SOFTWARE (PS) BY COLLEGE FACULTY IN AN UNDERGRADUATE INSTITUTION TO ENHANCE THEIR TEACHING |
ABRAMSON |
1997 |
| LARRY E. BEEBE |
A MODEL FOR CULTURAL RESISTANCE IN BUSINESS PROCESS RE-ENGINEERING FAILURE |
TERRELL |
1997 |
| THOMAS E. BEUTEL |
DEVELOPMENT AND EVALUATION OF INTERACTIVE COURSEWARE FOR VISUALIZATION OF GRAPH DATA STRUCTURES AND ALGORITHMS |
ABRAMSON |
1997 |
| CANDICE L. BUCHANAN |
AN EXTENSION TO THE INFORMATION SYSTEM ARCHITECTURE FRAMEWORK FOR ELICITING AND REPRESENTING SYSTEM REUIREMENTS |
MOODY |
1997 |
| ROBERT H. CALABRESE |
AN INVESTIGATION OF COMMUNITY COLLEGE ADMINISTRATORS’ PERCEPTIONS OF EDUCATIONAL TECHNOLOGY FACILITIES |
TERRELL |
1997 |
| REBECA GOMEZ COHEN |
ANALYSIS, DESIGN, AND IMPLEMENTATION OF THE STUDENT ENROLLMENT MANAGEMENT SUPPORT SYSTEM IN THE COMMUNITY COLLEGE SYSTEM |
GUILD |
1997 |
| WILLIAM F. CONROY III |
AN INFORMATION MANAGEMENT SYSTEM TO SUPPORT THE DEPARTMENT OF DEFENSE TRANSPORTATION SYSTEM |
LITTMAN |
1997 |
| MARTIN DUCHOW |
BUILDING AN INFRASTRUCTURE IN IMPLEMENTING A COLLEGE CONSORTIUM |
SCIGLIANO |
1997 |
| MICHAEL FALAT |
THE INTERRELATIONSHIP BETWEEN CASE/I-CASE AND ORGANIZATIONAL/SOFTWARE MEASUREMENTS |
MOODY |
1997 |
| STAR M. FERDINAND |
THE STATE OF DISASTER RECOVERY PLANNING IN TEXAS SMALL BUSINESSES |
LASZLO |
1997 |
| YAW-SHYAN HUANG |
THE DEVELOPMENT OF ENTERPRISED-BASED IS FRAMEWORKS TO HANDLE OUTSOURCING BY SMALL AND MEDIUM ENTERPRISES IN THE REPUBLIC OF CHINA |
GUILD |
1997 |
| PARAVILA O. JACOB |
INTELLIGENT COLLISION WARNING SYSTEM BASED ON FUZZY LOGIC AND NEURAL NETWORK TECHNOLOGIES |
BRUCE |
1997 |
| JOHN P. KIRCHNER |
A METHOD FOR THE APPLICATION OF COMPUTER ANALYTIC TOOLS TO CLINICAL RESEARCH: NEURAL NETWORK ANALYSIS OF LIVER FUNCTION TESTS TO ASSIST IN THE DIFFERENTIAL DIAGNOSIS OF LIVER DISEASE |
GUILD |
1997 |
| HEE C. LEE |
OPTIMIZATION OF PAGING COST IN MOBILE SWITCHING SYSTEM BY GENETIC ALGORITHM |
SUN |
1997 |
| ROBERT B. LIPTON |
ELECTRONIC STUDENT PORTFOLIOS: A TOOL FOR PERFORMANCE-BASED ASSESSMENT (A PILOT PROJECT IN THE BERKS COUNTY PENNSYLVANIA SCHOOLS) |
ABRAMSON |
1997 |
| BABU V. MANI |
A CRITIQUE OF THE SOFTWARE REUSE FACILITIES IN C++ |
LASZLO |
1997 |
| CAMERON MATEIKA |
MULTIMEDIA DEVELOPMENT PROJECT FARMING FOR THE FUTURE CD-ROM |
ABRAMSON |
1997 |
| RONALD D. MCFARLAND |
CAUSAL INFERENCES OF ACHIEVEMENT BY ADULT LEARNERS AS DETERMINED BY LEARING STYLE DIFFERENCE IN HYPERTEXT-BASED COMPUTER-ASSISTED INSTRUCTION |
LITTMAN |
1997 |
| KATHRYN J. MOLAND |
AN EFFECTIVE SOFTWARE DEVELOPMENT METHODOLOGY FOR QUALITY SOFTWARE DEVELOPMENT IN A SCHEDULING DEPARTMENT |
MOODY |
1997 |
| FREDERICK MOXLEY II |
ON THE DEVELOPMENT OF A SOFTWARE ARCHITECTURE FOR A DISTRIBUTED INFORMATION SYSTEM THAT CAN SUPPORT THE WARRIOR AS ENVISIONED BY THE U.S. DEPARTMENT OF DEFENSE |
LITTMAN |
1997 |
| MANOJ S. PATANKAR |
A FRAMEWORK FOR THE DESIGN OF A VOICE-ACTIVATED, INTELLIGENT, AND HYPERMEDIA-BASED AIRCRAFT MAINTENANCE MANUAL |
ABRAMSON |
1997 |
| STEVEN PORIS |
EFFECTS OF COMPUTER-BASED COOPERATIVE LEARNING ON THE PROBLEM SOLVING SKILLS OF GRADE SIX STUDENTS |
TERRELL |
1997 |
| ELIZABETH L. RICH |
AN EMPIRICAL STUDY OF CRITICAL SUCCESS FACTORS FOR IMPLEMENTING CLIENT/SERVER HUMAN RESOURCE INFORMATION SYSTEMS |
MOODY |
1997 |
| JEAN M. ROEHRS |
A STUDY OF SOCIAL ORGANIZATIN IN SCIENCE IN THE AGE OF COMPUTER-MEDIATED-COMMUNICATION |
DRINGUS |
1997 |
| ROLANDO RUEDA DE LEON |
IDENTIFICATION OF CRITICAL SUCCESS FACTORS FOR THE IMPLEMENTATION OF ELECTRONIC DATA INTERCHANGE |
MOODY |
1997 |
| GREGORY E. SIMCO |
A METHODOLOGY FOR FILE SYSTEM PERFORMANCE EVALUATION |
GUILD |
1997 |
| BEVERLY SIMON |
PREDICTING SUCCESS IN COMPUTER SCIENCE AT A COMMUNITY COLLEGE |
TERRELL |
1997 |
| MARK STOVER |
THE CONSTRUCTION AND VALIDATION OF AN EVALUATIVE INSTRUMENT FOR ACADEMIC LIBRARY WORLD WIDE WEB SITES |
ZINK |
1997 |
| WINSTON M. TELLIS |
INFORMATION TECHNOLOGY IN A UNIVERSITY: AN INSTITUTIONAL CASE STUDY OF INSTRUCTIONAL AND RESEARCH COMPUTING IN A CLIENT/SERVER ENVIRIONMENT |
SCIGLIANO |
1997 |
| RICHARD E. TURNER |
THE EFFECT OF TOTAL QUALITY MANAGEMENT ON FACULTY PRODUCTIVITY |
TERRELL |
1997 |
| JR. URWILER |
THE EFFECTS OF USER INTERFACE METAPHORS ON THE LEARNABILITY OF COMPUTER SYSTEMS BY FIELD DEPENDENT AND FIELD INDEPENDENT COMPUTER USERS |
MOODY |
1997 |
| LARRY D. VAIL |
A COMPARISON OF THE MICROSOFT COMPONENT OBJECT MODEL WITH THE C++ AND SMALLTALK OBJECT MODELS |
GUILD |
1997 |
| HYACINTH WILLIAMS |
A PROPOSED SOLUTION FOR WORD-RECOGNITION DEFICIT IN THE COMPUTER ENVIRONMENT |
GUILD |
1997 |
| VICTOR G. WILLIAMS |
THE INFORMATION SYSTEM USED DURING THE JOB DESCRIPTION PROCESS FOR NEW MILITARY PERSONNEL AND ITS EFFECT ON JOB SATISFACTION |
TERRELL |
1997 |
| MARTHA L. CRAINE |
CEREBRAL DOMINANCE THEORY: COMPUTER SCIENCE CLAS SELECTION AND ACADEMIC ACHIEVEMENT |
TERRELL |
1996 |
| KATHRYN DIETZ |
CATALOGING OF CHILDREN’S PICTURE BOOKS: QUALITY IN THE AGE OF AUTOMATION |
LITTMAN |
1996 |
| MARK R. EATON |
INTERACTIVE FEATURES FOR AN HTML TUTORIAL IN A DISTANCE LEARNING PROGRAM |
LEVIN |
1996 |
| SUSAN FIFE DORCHAK |
AN INVESTIGATION OF DATA INTEGRITY IN ADA 95 |
GUILD |
1996 |
| PATRICIA GAINOUS |
AN INVESTIGATION INTO THE RELATIONSHIP BETWEEN CULTURALLY BASED SOFTWARE AND THE SELF-ESTEEM OF CHEROKEE STUDENTS |
KINGSBURY |
1996 |
| JR. GIL |
DEVELOPMENT OF AN EXPERT SYSTEM PROTOTYPE FOR THE ASSESSMENT OF DYSLEXIA AND ATTENTION DEFICIT HYPERACTIVITY DISORDER |
KINGSBURY |
1996 |
| MICHAEL R. GUNTER |
A DISTANCE EDUCATION CONFERENCING SYSTEM UTILIZING VOICE AND TEXT DATA OVER A LOW BANDWIDTH COMMUNICATIONS LINK |
LEVIN |
1996 |
| ROBERT H. LANE |
INFORMATION SYSTEMS IN NON-PROFIT ORGANIZATIONS: ENHANCING PERFORMANCE THROUGH ONLINE HELP |
KINGSBURY |
1996 |
| B.J. LEE |
AN INVESTIGATION OF THE POTENTIAL VERSUS ACTUAL USAGE OF EXPERT ELECTRICAL COST ESTIMATING SYSTEMS |
TERRELL |
1996 |
| LEE J. LEITNER |
THE MAPPING AND INTEGRATION OF THE HASKELL LANGUAGE TO THE COMMON OBJECT REQUEST BROKER ARCHITECTURE |
GUILD |
1996 |
| STEPHEN JOSEPH LOPEZ |
DESIGNING THE INTELLIGENT DATA NETWORK: AN ARCHITECTURAL MODEL FOR THE ENTERPRISE INFORMATION SYSTEM |
LITTMAN |
1996 |
| JR. MCDONALD |
FACTORS AFFECTING STUDENT ENROLLMENT AND RETENTION IN THE MASTER OF SCIENCE IN MANAGEMENT INFORMATION SYSTEMS DEGREE OFFERED BY NOVA SOUTHEASTERN UNIVERSITY |
TERRELL |
1996 |
| ROBERT LEE MILLER |
DESIGN INFORMATION RECOVERY FROM LEGACY SYSTEM COBOL SOURCE CODE: RESEARCH ON A REVERSE ENGINEERING METHODOLOGY |
SUN |
1996 |
| DAN A. NISWANDER |
AN ASSESSMENT OF ASYNCHRONOUS TRANSFER MODE (ATM) TRAINING FOR EDUCATORS |
LITTMAN |
1996 |
| SANDRA S. PARKER |
INVESTIGATION INTO AND RESOLUTION OF COPYRIGHT ISSUES IN SCHOOLS WITH CLOSED-CIRCUIT TELEVISION SYSTEMS |
LITTMAN |
1996 |
| DALE E. PERRIN |
A TELECOMMUNICATIONS-ORIENTED PROJECT CONTROL FRAMEWORK FOR A LEARNING TECHNOLOGY DEVELOPMENT ENVIRONMENT: APPLICATION TO SYSTEMS DEVELOPMENT |
LEVIN |
1996 |
| STEVEN R. SCHLOUGH |
AN ANALYSIS OF THE KNOWLEDGE, SKILL, AND ATTITUDES NEEDED IN A COMPUTER SUPPORTED WORK ENVIRONMENT |
KINGSBURY |
1996 |
| ANIL K. SHARMA |
A NEW DESIGN APPROACH TO AN EXPERT SYSTEM NETWORK MANAGER BASED ON AN ANALYSIS OF CONTEMPORARY DISTRIBUTED NETWORKS |
GUILD |
1996 |
| MICHAEL J. SIMPSON |
LOW COST VIDEO FOR DISTANCE EDUCATION |
LEVIN |
1996 |
| JAMI L. BILES |
ACTIVITIES OF STATE LIBRARY AGENCIES IN THE SOUTHEASTERN U.S. IN THE CONTINUING EDUCATIONAL PUBLIC LIBRARIANS |
LITTMAN |
1995 |
| TIMOTHY J. BRADY |
THE EFFECTS OF GRAMMAR AND STYLE CHECKING SOFTWARE ON THE WRITING OF THE 9TH GRADE BASIC STUDENTS IN A PROCESS CENTERED WRITING LAB. |
TERRELL |
1995 |
| VENESSA A. BROWN |
A COMPARATIVE STORY OF PRESERVICE AND INSERVICE TECHNOLOGICAL TRAINING FOR TEACHERS WITHIN THE SOUTHERN ASSOCIATION OF COLLEGES AND SCHOOL (SACS) REGION |
KINGSBURY |
1995 |
| WILKER BRUCE |
THE APPLICATION OF GENETIC PROGRAMMING TO THE AUTOMATIC GENERATION OF OBJECT-ORIENTED PROGRAMS |
ADAMS |
1995 |
| ROBERT L. CHIODO |
EFFECTS OF INTELLIGENT COMPUTER AIDED INST. USING HYPERMEDIA, DATABASE, AND EXPERT SYSTEMS ON THE SKILLS DEVELOPMENT AND PERFORMANCE OF ENTRY LEVEL, ADULT, WORDPERFECT STUDENTS |
CENTINI |
1995 |
| ALAN E. DILLMAN |
A STUDY OF VALUES CONGRUENCE AND TQM IN INFORMATION SYSTEMS ORGANIZATIONS |
DRINGUS |
1995 |
| CHRISTOPHER DUNHAM |
HEMISPHERICITY AND COMPUTER PROGRAMMING APTITUDE |
TERRELL |
1995 |
| DARRELL W. GREEN |
AUTHENTIC LEARNING IN ENGINEERING TECHNOLOGY THROUGH THE USE OF A TECHNOLOGY AND LEARNING MATRIX BASED CURRICULUM |
KINGSBURY |
1995 |
| GLENN GRIFFIN |
PREDICTING NAVAL AVIATOR FLIGHT TRAINING PERFORMANCE USING MULTIPLE REGRESSION AND AN ARTIFICIAL NEURAL NETWORK |
KINGSBURY |
1995 |
| CINDY MEYER HANCHEY |
A COMPARISON OF ETHICAL ATTITUDES OF UNIVERSITY STUDENTS WITH THOSE OF EXPERTS USING COMPUTER RELATED SCENARIOS |
KINGSBURY |
1995 |
| ADALECIA HASSELL |
COMPUTERS IN PUERTO RICO: TRAINING OF TEACHERS AND APPLICATIONS |
KINGSBURY |
1995 |
| ROBERT S. HOROWITZ |
IDEA ANALYSIS FOR THE DEVELOPMENT OF CLINICAL TRIAL STRATEGIES |
LITTMAN |
1995 |
| STEVEN A. KRANTZ |
LARGE-SCALE CLIENT/SERVER MIGRATION METHODOLOGY |
SALAZAR |
1995 |
| HAROLD RICHARD MORRIS |
THE EFFECTS OF MULTIMEDIA ON SELECTED CRITICAL THINKING SKILLS OF NON AT-RISK AND AT-RISK STUDENTS |
TERRELL |
1995 |
| LARRY DANIELD MOULDS |
AN ANALYSIS OF CURRENT TRAINING PRACTICES USED BY U.S. AND CANADIAN MEMBERS OF THE STEEL SERVICE CENTER INSTITUTE WITH EMPLOYEES WHO ARE GEOGRAPHICALLY LOCATED IN WIDELY DISPERSED SMALL GROUPS |
KINGSBURY |
1995 |
| NANCY J. RUMFIELD |
EFFECTS OF GRAPHICS AND PRESENTATION FORMAT ON INFORMATION RETENTION IN COLLEGE STUDENTS |
TERRELL |
1995 |
| KAREN M. RYDER |
THE EFFECTS ON PROGRAMMING IN A STRUCTURED LANGUAGE ON THE CRITICAL THINKING SKILLS OF COLLEGE STUDENTS |
KINGSBURY |
1995 |
| DANA V. TESONE |
DEVELOPMENT OF A MULTIMEDIA PUBLICATION IN HOSPITALITY AND TOURISM ETHICS FOR UNDERGRADUATE STUDENTS AND WORKPLACE TRAINING PROGRAMS |
KINGSBURY |
1995 |
| ANGELA M. TRUJILLO |
A NOVEL WIRELESS COMMUNICATIONS ARCHITECTURE FOR SUPPORTING LEGACY MAINFRAME DATA TRANSMISSION |
ADAMS |
1995 |
| WARREN VON WORLEY |
A TAXONOMY OF WORKGROUP COMPUTING APPLICATIONS |
DEITEL |
1995 |
| RONALD J. ASHLEY |
EFFECTIVENESS OF A SECONDARY SCHOOL HYPER-MEDIA BASED INSTRUCTIONAL PROG. IN BASIC LIB. SKILLS |
LITTMAN |
1994 |
| MARY BURKE WALL |
LONGITUDINAL DATABASE STUDY OF THE FACTORS INFLUENCING RETENTION FOR THE SPRING 1992 DEGREE SEEKING STUDENTS AT ATLANTIC COMMUNITY COLLEGE |
TERRELL |
1994 |
| STEPHEN CARROLL JONES |
FRESHMAN PLACEMENT FOR COMPUTER INFO SYSTEMS AT A WOMEN’S 4 YEAR LIBERAL ARTS COLLEGE IN ALABAMA |
KINGSBURY |
1994 |
| PATRICIA COLLINS |
GUIDELINES FOR INCORPORATING COMPLEX SCHEMATICS INTO COMPUTER ASSISTED INSTRUCTION |
CENTINI |
1994 |
| MIRCEA L. HALMU |
EFFECTS OF PARTICIPATORY DESIGN ON MEDICAL STAFF’S ATTITUDE TOWARD THE COMPUTERIZATION OF PATIENT RECORDS |
TERRELL |
1994 |
| AMOS E. HOLT |
TQM; IMPLEMENTATION IN A NOT-FOR-PROFIT RESEARCH & DEVELOPMENT ORGANIZATION |
MACFARLAND |
1994 |
| MARY HOSKEN |
DETERMINATION OF BUDGETARY EXPERTISE AMONG PUBLIC SCHOOLS LIBRARY |
LITTMAN |
1994 |
| DENNIS J. HUFF |
STRATEGIC PLAN FOR COMPUTING & TELECOMMUNICATIONS AT A UNIVERSITY |
SCIGLIANO |
1994 |
| MARY ANN JACKSON MCINTYRE |
STUDY TO EXAMINE THE EFFECTIVENESS OF COMPUTER ASSISTED INSTRUCTION ON MATHEMATICS ACHIEVEMENT |
KINGSBURY |
1994 |
| DONALD L. MCGARRY |
ELECTRONIC BULLETIN BOARD AS A MEANS OF PROFESSIONAL COMMUNICATION AMONG PHYSICS TEACHERS |
KINGSBURY |
1994 |
| JOHN S. MOORE |
FORMALIZATION OF A SLICING HIERARCHY & DEVELOPMENT OF ASSOC. PROCEDURES FOR RECTANGULAR DUALIZATION FROM A FOUR COMPLETION USING WALL DOMINANCE |
LEVIN |
1994 |
| DAVID L. ROTMAN |
DESIGN OF AN EFFECTIVE ECONOMICAL EXEC. INFORMATIONAL SYSTEM FOR CEDARVILL COLLEGE |
LEVIN |
1994 |
| RAUL A. SALAZAR |
THE DEVELOPMENT OF A PORTABLE AUTHORING SYSTEM |
ADAMS |
1994 |
| CAROLYN CHRISTINE SOLOMON |
SURVEY OF SOUTH CAROLINA INDUSTRIES & POST SECONDARY INST. TO DETERMINE COMPUTER SKILLS NEEDED BY HIGH SCHOOL GRADUATES |
KINGSBURY |
1994 |
| JONATHAN DAVID SPARKS |
DEVELOPING A COMPUTERIZED DISTANCE ADULT LEARNING SYSTEM FOR A LIBRARY PARAPROFESSIONAL INSERVICE TRAINING” COURSE |
LITTMAN |
1994 |
| PADMA VISWANATHAN |
IMPLEMENTING A RECURSIVE STRUCTURE IN A RELATIONAL DATA MODEL |
LEVIN |
1994 |
| JOHN R. WETSCH |
ASSESSING THE PRACTICE OF SYS. ADMIN. IN U.S. FEDERAL DIST. COURTS. |
KINGSBURY |
1994 |
| DEBORAH WICKER WRIGHT |
TEACHING THE WRITING PROCESS THROUGH COMPUTERS AS AN EARLY INTERVENTION TO THIRD GRADERS IN A NINE MO. ELEMENTARY SCHOOL |
LEVIN |
1994 |
| TINA M. BARRIOS |
THE INTERACTION BETWEEN COGNITIVE LEARNING STYLES AND ACADEMIC ACHIEVEMENT WHEN USING A MULTIMEDIA (HYPERMEDIA) INSTRUCTIONAL DELIVERY SYSTEM IN A HIGH SCHOOL ZOOLOGY COURSE |
KINGSBURY |
1993 |
| MARGARET BELL HENTZ |
DATA CONVERSION FROM FAXON’S SC-10 SERIALS CONTROL SYSTEM INTO TECHLIB/PLUS ON-LINE CARD CATALOG |
LITTMAN |
1993 |
| MARK A. BRIMER |
ASCERTAINING THE PERCEPTIONS OF PHYSICAL THERAPISTS UTILIZING COMPUTER TECHNOLOGY |
CENTINI |
1993 |
| WILLIAM H. BURKETT |
STUDY OF COMPUTER AVERSION FACTORS AND THEIR EFFECT ON AN OLDER ADULT POPULATION’S COMPUTER ANXIETY |
CENTINI |
1993 |
| PATRICIA A. COLLINS |
GUIDELINES FOR INCORPORATING COMPLEX SCHEMATICS INTO COMPUTER ASSISTED INSTRUCTION |
CENTINI |
1993 |
| ALFRED E. FANT |
COMPUTER USE BY TEACHERS IN THE HIGH SCHOOLS |
KINGSBURY |
1993 |
| DOUGLAS A. FROST |
USING A COMPUTER APTITUDE TEST TO INVESTIGATE DIFFERENCE BETWEEN STUDENTS IN SELECTED COLLEGES |
KINGSBURY |
1993 |
| JEANINE M. GENDRON |
DESIGN OF A DECISION SUPPORT HYPERTEXT SYSTEM TO ADDRESS TEENAGE LIFE CONCERNS |
SZABO |
1993 |
| PETER R. GIULIANI |
ROLE OF INFORMATION SYSTEM COURSES IN POSTGRADUATE BUSINESS EDUCATION |
KINGSBURY |
1993 |
| ROLLIE S. GUILD |
UNIX HIDDEN LANGUAGE |
ADAMS |
1993 |
| CHENG-I HOU |
DEVELOPMENT OF A COMPUTER BASED SYMPOSIA SYSTEM |
LEVIN |
1993 |
| MICHAEL J. JANNIRO |
EFFECTS OF COMPUTER BASED INSTRUCTION ON STUDENT LEARNING OF PSYCHOPHYSIOLOGICAL DETECTION OF DECEPTION TEST QUESTION FORMULATION |
FORNSHELL |
1993 |
| DANIEL E. KING |
COMPUTER APPLICATION AT THE VILLAGE MAILBOX |
KINGSBURY |
1993 |
| DENNIS A. KURTZ |
A USABILITY STUDY OF UPDATED SIMULATION SOFTWARE |
KINGSBURY |
1993 |
| PETER LIU |
APPLYING EXPERT SYSTEM TECH TO ENHANCE COMPUTER PERFORMANCE |
DEITEL |
1993 |
| VINCENT M. MANCUSO |
FIGHTER PILOT GROUND BASED INFO. ACQUISITION |
SCIGLIANO |
1993 |
| J. EDMUND MAYNARD |
FACULTY AND STUDENT ASSESSMENT OF THE CITADEL LIBRARY USER SERVICES |
LITTMAN |
1993 |
| MARTHA MONTGOMERY W. |
STUDY OF THE EFFECTS OF A HYPERTEXT COMPUTER ASSISTED INSTRUCTION IN MATH |
TERRELL |
1993 |
| MICHAEL A. MOODY |
EFFECTS OF DIFFERENT CERTAINTY FACTOR PARADIGMS UPON THE USABILITY OF EXPERT SYSTEMS |
SZABO |
1993 |
| LEONEL L. PERRA |
DESIGN OF A STRATEGIC PLANNING PROCESS & A PLAN FOR INFORMATION SYSTEMS IN A 2 YEAR RURAL COMMUNITY COLLEGE |
SCIGLIANO |
1993 |
| MOSHE S. RAAB |
INTRODUCTION OF A CATALOG AUTOMATION & MANUFACTURING COSTING SYSTEM FOR USE IN A JEWELRY CO. |
LEVIN |
1993 |
| ANGELA SATTERLEE |
NEEDS ASSESSMENT STUDY INFO MANAGEMENT CNTR. AT A LARGE COMMUNITY COLLEGE |
KINGSBURY |
1993 |
| SHAN HUNG SHIH |
A COST-EFFECTIVE MATERIAL MANAGEMENT SYSTEM WITH INTEGRATING ACCURATE AND EFFICIENT FORECASTING PURCHASING, AND INVENTORY CONTROL SUBSYSTEMS FOR A GOVERNMENT OWNED UTILITY |
LEVIN |
1993 |
| LINDA L. SIMMONS |
EFFECT OF NEW CURRICULAR GUIDELINES, REVISED ACCREDITION CRITERIA IN PRIVATE LIBERAL ARTS COLL. |
KINGSBURY |
1993 |
| RENEE TOBIAS |
ATTITUDES OF INMATES TOWARD THE USE OF COMPUTERS IN TENNESSEE CORRECTIONAL INSTITUTIONS |
KINGSBURY |
1993 |
| RAYMOND V. VAN GROESBECK |
EFFECTS OF A MINI-INTEGRATED LEARNING SYSTEM, TRADITIONAL LECTURE & DRILL INSTRUCTION |
KINGSBURY |
1993 |
| JOSEPH G. AMARA |
COMPUTER PRE-ANALYSIS OF AGGREGATE DATA IN HIGH SCHOOL SCIENCE LABS |
KINGSBURY |
1992 |
| HOWARD E. BECKNER |
INTRO TO THE ART OF PROGRAMMING FOR THE APPLE IIE |
KINGSBURY |
1992 |
| JAMES DIGENNARO |
EXPERT SYSTEM FOR THE PREDICTION OF ENVIRO IMPACTS OF A LOGGIN OPERATION |
KINGSBURY |
1992 |
| DAVID R. EMMONS |
DEVELOPING AN EXTENSIBLE AUTHORING SYSTEM |
LEVIN |
1992 |
| DON S. GRONINGER |
THE EFFECTS OF USING COMPUTER FACILITATED PROBLEM SOLVING WITH GENERAL MATH STUDENTS |
KINGSBURY |
1992 |
| DONNA F. HERRING |
FACTORS AFFECTING THE USE OF COMPUTERS IN CLASSROOMS |
MACFARLAND |
1992 |
| MILES E. HITCHCOCK |
A PLAN FOR IMPLEMENTATION OF A COMPUTER ASSISTED ACADEMIC ADVISING SYSTEM AT CENTENARY COLLEGE OF LOUISIANA |
FORNSHELL |
1992 |
| R. BRUCE HOSKEN |
A DEVELOPMENTAL MODEL FOR PARALLEL-PATH KNOWLEDGE ACQUISITION IN A COMPLEX MULTIPLE-DOMAIN EXPERT SYSTEM ENVIRONMENT |
SZABO |
1992 |
| MICHAEL HOUSER |
A COMPUTER IN USE IN THE CLASSROOM |
KINGSBURY |
1992 |
| HAROLD A. KIME |
EFFECTS OF COMPUTERIZED TOOLS IN TEACHING ENGLISH COMPOSITION FOR BASIC WRITERS |
KINGSBURY |
1992 |
| EDMUND M. KOSMAHL |
INSTRUCTIONAL USE OF COMPUTERS FOR ENTRY LEVEL PHYSICAL THERAPY EDUCATION |
CENTINI |
1992 |
| BERNARD J. KOVACH |
FIELD OFFICE AUTOMATION AND EVALUATION |
LEVIN |
1992 |
| G. ERIC MCALLISTER |
ON UTILIZING COMPUTER BASED TELEDUCATION CSUSB MISSION 1&2 |
LEVIN |
1992 |
| GARY D. MORFORD |
COOPERATIVE SCIENCE IN A COMPUTER MEDIATED COMMUN. ENVIRONMENT |
KINGSBURY |
1992 |
| ALAN L. SMITH |
DSRS IMPLEMENTATION IN THE U.S. DEPT. OF DEFENSE |
LEVIN |
1992 |
| RICHARD L. SMITH |
INVESTIGATION INTO THE RELATIONSHIP OF THE MYERS BRIGGS TYPE INDICATOR |
KINGSBURY |
1992 |
| DANIEL S.. WALSH |
CONCEPTUAL FRAME WORK ENTERPRISE ARCHITECTURE MODEL TO SUPPORT INFO. SYSTEMS |
LIEBLEIN |
1992 |
| JAN M. YATES |
AN ASSESSMENT OF TRENDS AND FACTORS AFFECTING FUTURE DIRECTIONS IN LIB & INFO SC. ED. |
LITTMAN |
1992 |
| HYDER ZAHED |
EFFECTIVENESS OF COMPUTER BASED TRAINING VERSUS THE LECTURE METHOD ON LEARNING |
LITTMAN |
1992 |
| THOMAS E. ALEXANDER |
STUDY TO EXAMINE THE EFFECTS OF COMPUTERS & TRADITIONAL TEACHING METHODS ON 9-11 YEAR OLD STUDENTS |
KINGSBURY |
1991 |
| ARDELLA P. BALL |
INTEGRATING MICROCOMPUTER APPLICATIONS INTO LIBRARY MEDIA COURSES |
LITTMAN |
1991 |
| JIMMY H. BARNES |
INVESTIGATION OF THE EFFECTIVENESS OF COMPUTER ASSISTED MATH INSTRUCTION |
KINGSBURY |
1991 |
| LINDA M. BOETTNER |
COMPUTER ANXIETY: ITS RELATED CHARACTERISTICS AND ITS RELATIONSHIP TO ACHIEVEMENT IN COMPUTER LITERACY OF SLIPPERY ROCK UNIVERSITY STUDENTS |
KINGSBURY |
1991 |
| LUELLA BOSMAN TEUTON |
MARKETING THE LEARNING RESOURCES CENTER AT SOUTH FLORIDA COLLEGE |
LITTMAN |
1991 |
| LAURIE P. DRINGUS |
A STUDY OF DELAYED TIME AND REAL TIME TEXT-BASED COMPUTER-MEDIATED COMMUNICATION SYSTEMS ON GROUP DECISION MAKING PERFORMANCE |
ADAMS |
1991 |
| MARY D. FOLEY |
BREAKING BARRIERS TO PUBLIC HIGH SCHOOL LIBRARY |
LITTMAN |
1991 |
| ROBERT E. GLASS |
PROJECT PLAN TO ESTABLISH A COLLEGE ED. PROGRAM FOR SEVERELY IMPAIRED PEOPLE |
KINGSBURY |
1991 |
| MONICA GLEASON |
THE DEVELOPMENT AND EVALUATION OF A HYPERTEXT COMPUTER-BASED TRAINING PROGRAM TO ASSIST IN DEVELOPING PUBLICATION SKILLS |
FORNSHELL |
1991 |
| CATHY GRIMALDI |
THE DEVELOPMENT AND EVALUATION OF A HYPERTEXT COMPUTER-BASED-TRAINING PROGRAM FOR THE TRAINING OF NEW SUBSTITUTE TEACHERS IN OLD BRIDGE, NEW JERSEY |
FORNSHELL |
1991 |
| DIANEN J. HALEY |
DESIGN OF SPECIFICATIONS FOR THE COMPUTER BASED TRAINING SYSTEM FOR AN AUTOMATED SMALL GROUP HOME FACILITY |
KINGSBURY |
1991 |
| ARTHUR T. KOCH |
A STRATEGIC PLAN FOR ACADEMIC COMPUTING AT OHIO DOMINICAN COLLEGE |
KINGSBURY |
1991 |
| MICHAEL S. KOGAN |
THE DESIGN OF OS/2 |
DEITEL |
1991 |
| PETER A.C. LONG |
A STUDY OF THE PREDICTIVE RELATIONSHIP BETWEEN PERSONALITY TYPES AND MANAGERIAL STYLE IN PREDICTING RESISTANCE TO CHANGE |
CENTINI |
1991 |
| JUNE A. PARSONS |
A META ANALYSIS OF LERNER CONTROL IN COMPUTER BASED LEARNING ENVIRONMENTS |
MACFARLAND |
1991 |
| WILLIAM C. STEINMAN |
COMPARISON OF 2 APPROACHES TO SMALL COLLEGES LAN DESIGN |
KINGSBURY |
1991 |
| KATHRYN SULLIVAN |
DISSERTATION REPORT IS 8995 USING DIALOG CIP |
LITTMAN |
1991 |
| THERESA K. TOOHIL |
CURRICULUM-ORIENTED CAI BASED ON INSTRUCTIONAL TECHNOLOGY |
LITTMAN |
1991 |
| JOYCE E. WOODY |
AN INTEGRATED NEEDS ASSESSMENT AND TRAINING PLAN MODEL FOR EMPLOYEES |
KINGSBURY |
1991 |
| YOUNG-DONG YOO |
DEVELOPMENT OF AN EXPERT TRAINING SYSTEM PROTOTYPE LOOSELY COUPLED TO AN EXTERNAL DATABASE AND WORKSHEET |
LEVIN |
1991 |
| STEVEN D. ZINK |
DESCRIPTIONS, ANALYSIS & CHARACTERISTICS OF THE RETRIEVAL OF HISTORICAL MATERIALS 1974-1979 |
FORNSHELL |
1991 |
| JOANNE G. CORTESE |
PLANNING, PRODUCING & REPORTING A COMPUTER FAIR IN A LOCAL COMMUNITY |
MACFARLAND |
1990 |
| WILLIAM C. CROSS |
THE EFFECT OF DISTRESS ON THE QUALITY OF COMPUTER PROGRAMMING |
KINGSBURY |
1990 |
| MARY B. DEHN |
A FEASIBILITY STUDY OF AN AUTOMATED PUBLIC ACCESS CATALOG FOR THE GREAT NECK LIBRARY |
LITTMAN |
1990 |
| GORDON FULLERTON |
THE DEVELOPMENT AND IMPLEMENTATION OF A BENCHMARK PROCESS FOR DISTRIBUTED RELATIONAL DATABASE MANAGEMENT SYSTEMS |
ADAMS |
1990 |
| DANIEL K. HATTON |
OFFICE INFO SYSTEMS: IMPLEMENTATION PLANNING GUIDE FOR THE U.S. ARMY MEDICAL DEPARTMENT |
LEVIN |
1990 |
| JERRY A. KATZ |
INTRO. OF OFFICE AUTOMATION & A DOCUMENT MANAGEMENT SYSTEM WITHIN MULTIPLE PLANT MANUFACTURING ORGANIZATION |
LEVIN |
1990 |
| JOHN KISTLER |
EXPLORATORY QUALITATIVE STUDY FOR THE DESIGN & IMPLEMENTATION OF AN EDUCATION MENTORING PROG. FOR AT-RISK STUDENTS |
KINGSBURY |
1990 |
| ALAN J. MATTHEWS |
COMPUTER AIDED SOFTWARE ENGINEERING (CASE) TOOLS FOR A COBOL SYSTEMS DEVELOPMENT ENVIRONMENT |
MURPHY |
1990 |
| CAROL MIGLIN |
EFFECTIVENESS OF COMPUTER ASSISTED INSTRUCTION IN THE HIGH SCHOOL CHEMISTRY LAB |
MACFARLAND |
1990 |
| DAVID S. MIZENER |
CREATION OF A MODEL AND A PARTIAL STRATEGIC PLAN FOR THE UNIVERSITY OF TEXAS PLAN AMERICAN LIBRARY |
LITTMAN |
1990 |
| MICHAEL MORAN |
HYPERTEXT COMPUTER-ASSISTED INSTRUCTION FOR CERIATRIC PHYSICAL THERAPISTS |
CENTINI |
1990 |
| MINDER RUCKER |
USING MICROCOMPUTER SOFTWARE TO REMEDIATE CRITICAL THINKING IN DISADVANTAGED STUDENTS |
MACFARLAND |
1990 |
| CLOVIS L. TONDO |
DOCTORAL WORK SUMMARY |
ADAMS |
1990 |
| CHARLES T. WUNKER |
THE POST-IMPLEMENTATION EVALUATION OF A DISTRIBUTED DATABASE ON A LOCAL ARE NETWORK |
LITTMAN |
1990 |
| RANDY YOUNG |
A DSM-III-R STUDY OF COMPUTER ADDICTION AMONG IOWA COMPUTER USERS |
CENTINI |
1990 |
| LINDA AVERILL |
A LOCAL AREA NETWORK IMPLEMENTED AT EVERETT HIGH SCHOOL |
LITTMAN |
1989 |
| ZAN TAMAR BAILEY |
DEVELOPMENT & INTEGRATION OF COMPUTER ACTIVITIES INTO ELEMENTARY SCHOOLS |
MACFARLAND |
1989 |
| MARILYN DOTSON |
THE DEVELOPMENT OF A 3 YEAR PLAN TO INTEGRATE COMPUTERS AND MATH IN THE UNDERGRAD LIBERAL ARTS |
MACFARLAND |
1989 |
| NELLITA P. DUBOSE |
LIBRARY AUTOMATION IN SOUTH CAROLINA |
LITTMAN |
1989 |
| JOSEPH M. FORMICA |
TEACHER AWARENESS OF STATE AND REGIONAL COMPUTER RELATED RESOURCES |
MACFARLAND |
1989 |
| EVA GULBINOWICZ |
STUDY OF DTERMINE FEASIBILITY OF INSTALLING CD-ROM IN ONTARIO GOVT. LIBRARIES |
LITTMAN |
1989 |
| JOHN M. KAISER |
MICROCOMPUTER BASED CAI SYSTEM TO COMPLEMENT INSTRUCTION IN NAVY TECHNICAL TRAINING |
MACFARLAND |
1989 |
| PATRICIA LABBE |
IMPLEMENTING AN ONLINE PUBLIC ACCESS CATALOG IN A HIGH SCHOOL LIBRARY MEDIA CENTER |
LITTMAN |
1989 |
| JACK LUSKIN |
COMPUTER CONFERENCING IN OCCUPATIONAL HEALTH & SAFETY TRAINING |
CENTINI |
1989 |
| RICHARD D. MANNING |
ORGANIZATIONAL IMPLICATIONS OF THE ELECTRONIC TRANSFER OF INFORMATION |
LITTMAN |
1989 |
| EARNESTINE T. MCCLOUD |
TEACHER UTILIZATION OF MIDDLE SCHOOL MEDIA PROGRAM |
LITTMAN |
1989 |
| ROGER L. RATCHFORD |
IMPROVING WRITING IN SECONDARY SCHOOLS BY USING LAPTOPS |
MACFARLAND |
1989 |
| NANCY L. TEGER |
STUDY OF A TELECOMMUNICATIONS PROJECT FOR SECONDARY SCHOOLS |
LITTMAN |
1989 |
| MICHAEL THOMBS |
AN INSTRUMENT FOR THE DISTRIBUTION AND COLLECTION OF DATA USING COMPUTER BASED TECHNOLOGY |
MACFARLAND |
1989 |
| ELIZABETH TWOHY |
BASIC SKILLS TRAINING PROGRAM FOR THE HANDICAPPED USING ADAPTIVE COMPUTER SOFTWARE |
MACFARLAND |
1989 |
| JARMO VITELI |
LEARNING ENGLISH IDIOMS VIA COMPUTER ASSISTED LANGUAGE LEARNING N ENGLISH AS A 2ND LANGUAGE |
MACFARLAND |
1989 |
| DOUGLAS W. WARNER |
A DBASE III PLUS SYSTEM FOR PROCESSING AND MAINTAINING HISTORICAL RECORDS ON STUDENTS’ EVALUATION OF INSTRUCTORS & COURSES |
MACFARLAND |
1989 |
| ANTHONY R. YEBBA |
VOICE MAIL A WAY TO ENHANCE FACULTY OFFICE HOURS |
MACFARLAND |
1989 |
| BARBARA M. YOUNG |
GUIDELINE FOR STRATEGIC PLANNING IN COMMUNITY COLLEGE LEARNING RESOURCE CENTERS: FL COMMUNITY COLLEGE EXPERIENCE |
LITTMAN |
1989 |
| SUSAN ANDERSON |
RESOURCE SHARING: A STUDY OF FLORIDA’S SHARE USED LIBRARY COLLECTIONS |
LITTMAN |
1988 |
| JANET C. ANDREWS |
INVESTIGATION OF CRITERIA USED BY BROWSERS WHEN SELECTING ADULT FICTION BOOKS IN A PUBLIC LIBRARY |
SCIGLIANO |
1988 |
| EVELYN K. BONNER |
A STUDY OF PERCEPTIONS & USE OF SMALL COLLEGE CONSORTIUM LIBRARY BY FACULTY & STUDENTS |
SCIGLIANO |
1988 |
| SALLY ANN CARR |
THE UTILIZATION OF COMPETITIVE INTELLIGENCE IN STRATEGIC PLANNING |
SCIGLIANO |
1988 |
| ALBERT E. CORDES |
USING COMPUTERS IN THE COLLEGE PHYSICS LAB |
MACFARLAND |
1988 |
| LARRY G. DAVID |
ANATOMY OF A SOFTWARE MAINTENANCE TRAINING PROGRAM |
SCIGLIANO |
1988 |
| WALTER F. DEAL |
USING ARTIFICIAL INTELLIGENCE TO ASSIST FACULTY ADVISORS |
MURPHY |
1988 |
| GLENDA DUDLEY |
BRIDGING COMPUTER INTERACTION PITFALLS: A MODEL FOR COMPUTER INTEGRATION IN SECONDARY SCHOOLS |
FORNSHELL |
1988 |
| JOHN L. FUEYO |
APPLYING STRUCTURED PROGRAMMING SKILLS TO PROBLEM SOLVING USING C-PROLOG |
FORNSHELL |
1988 |
| LINDA GUNTER |
A MICROCOMPUTER-BASED SYSTEM FOR INTERLIBRARY LOAN SERVICES IN A UNIVERSITY LIBRARY |
SCIGLIANO |
1988 |
| FRANK D. IAZZETA |
A COMPUTERIZED PRACTICE SET FOR ALL FIRST SEMESTER FINANCIAL ACCOUNTING COURSES AT A COMMUNITY COLLEGE |
SPURLOCK |
1988 |
| THOMAS L. JOHNSON |
STUDY OF DECISION STYLES OF INDIVIDUALS CHOOSING ALTERNATIVES WHEN THERE’S UNCERTAINTY |
SCIGLIANO |
1988 |
| NANCY R. KEATING |
INTEGRATED ON-LINE MEDIA MANAGEMENT SYSTEMS FOR MEDIA CENTERS |
SCIGLIANO |
1988 |
| KARENS. MCCONNELL |
A MODEL FOR IDENTIFYING SERIAL COLLECTION OVERLAP IN A UNION LIST OF SERIALS FOR PUBLIC UTILITY LIBRARIES |
SCIGLIANO |
1988 |
| MARK MERRYWEATHER |
A FEASIBILITY STUDY OF AN ON-LINE SYSTEM FOR THE ONTARIO POLICE COMMISSION LIBRARY |
SCIGLIANO |
1988 |
| LAWRENCE J. MISTOR |
AN EVALUATION OF THE USE OF MATHEMATICS GRADES AS A PREDICTOR VARIABLE OF STUDENT PERFORMANCE |
MACFARLAND |
1988 |
| DAVID L. NORMAN |
DEVELOPMENT OF A MICROCOMPUTER FINANCIAL MODEL FOR VARIABLE TRAINING COSTS |
LEVIN |
1988 |
| DOLORES PUSINS |
COURSEWARE DEVELOPMENT FOR THE INTEGRATION OF DESKTOP PUBLISHING |
MACFARLAND |
1988 |
| PHILLIP M. ADAMS |
AN INTERACTIVE EXPERT SYSTEM BASED DIALOGUE MANAGER (AN EXPERT SYSTEM’S QUEST FOR KNOWLEDGE) |
E. SIMCO |
1987 |
| PENELOPE A. BROWN |
COMPUTER PIRACY & THE COPYRIGHT LAW A CLARIFYING STATEMENT WITH ALTERNATIVE STRATEGIES FOR EDUCATION |
SCIGLIANO |
1987 |
| JAMES L. BUCHHOLZ |
IMPLEMENTING & EVALUATING A BIBLIOGRAPHIC RETRIEVAL SYSTEM FOR PRINT & NON-PRINT MEDIA MATERIAL |
SCIGLIANO |
1987 |
| PAUL L. CATANO |
TURNING AN EXPERT REFERENCE LIBRARIAN SKILL INTO COMPUTER SOFTWARE |
SCIGLIANO |
1987 |
| CAROL W. CUBBERLEY |
ORGANIZATION FOR COLLECTION DEVELOPMENT IN MEDIUM-SIZED ACADEMIC LIBRARIES |
CENTINI |
1987 |
| GEORGE K. FORNSHELL |
PROLOG IN COMPUTER-BASED LEARNING: A GENERAL PURPOSE INTERFACE FOR OVERCOMING LEARNING BLOCKS |
SCIGLIANO |
1987 |
| DONALD A. GUERRIERO |
STRATEGIC PLANNING FOR A SPECIAL LIBRARY |
SCIGLIANO |
1987 |
| NELLIE S. KREIS |
A FEASIBILITY STUDY OF THE IMPLEMENTATION OF CD ROM DATABASES IN SECONDARY SCHOOL LIBRARY |
SCIGLIANO |
1987 |
| RENA W. ROGGE |
LIBRARY PRESENCE: A TOOL FOR RECOGNITION |
SCIGLIANO |
1987 |
| MADELYN F. VALUNAS |
A STUDY OF ORGANIZATIONAL CLIMATE IN PENNSYLVANIA’S STATE SYSTEM OF HIGHER EDUCATION LIBRARIES |
LITTMAN |
1987 |
| MARLYN KEMPER |
NETWORKING: CHOOSING A LAN PATH TO INTERCONNECTION |
J. HANNIGAN |
1986 |