Graduate School of Computer and Information Sciences
Bound Dissertation List
Search by Title Keyword:
Search By Year:
Search by Student Last Name:
Show All
AUTHOR TITLE CHAIR YEAR
HOLLIS GREENBERG HEED THE WARNING SIGNS: THE EFFECTIVENESS OF MESSAGE POPUP WARNINGS FOR DETERRING THE SPREAD OF MISINFORMATION DRINGUS 2024
CONRAD BELL ASPECT-ADVICE INTERFERENCE: DATA INTERACTIONS IN ASPECTJ MITROPOULOS 2023
VANESSA COOPER OPTIMIZING CONSTRAINT SELECTION IN A DESIGN VERIFICATION ENVIRONMENT FOR EFFICIENT COVERAGE CLOSURE MUKHERJEE 2023
SHERI JAMES A STUDY OF THE EFFECT OF TYPES OF ORGANIZATIONAL CULTURE ON INFORMATION SECURITY PROCEDURAL COUNTERMEASURES WANG 2023
JAMES LOVING THE APPLICATION OF GENOMIC COMPRESSION TECHNIQUES TO NETWORK TRAFFIC CANNADY 2023
DAVID NOEL AN INVESTIGATION OF METHODS FOR IMPROVING SPATIAL INVARIANCE OF CONVOLUTIONAL NEURAL NETWORKS FOR IMAGE CLASSIFICATION MUKHERJEE 2023
MICHAEL ROONEY AN EMPIRICAL ASSESSMENT OF THE USE OF PASSWORD WORKAROUNDS AND THE CYBERSECURITY RISK OF DATA BREACHES LEVY 2023
JACKIE SCOTT COMPARING PHISHING TRAINING AND CAMPAIGN METHODS FOR MITIGATING MALICIOUS EMAILS IN ORGANIZATIONS LEVY 2023
ANABETSY TERMINI ADVERSARIAL TRAINING OF DEEP NEURAL NETWORKS MUKHERJEE 2023
ANDRE VIEIRA INTEGRATING THE SPATIAL PYRAMID POOLING STRATEGY INTO 3D CONVOLUTIONAL NEURAL NETWORKS FOR AUTOMATIC DETECTION OF CEREBRAL MICROBLEEDS MUKHERJEE 2023
ENAS ALBATAINEH IMPROVING EMPLOYEES’ COMPLIANCE WITH PASSWORD POLICIES WANG 2022
PATRICIA BAKER A UNIVERSAL CYBERSECURITY COMPETENCY FRAMEWORK FOR ORGANIZATIONAL USERS LEVY 2022
GEORGE COOPER IMPACT OF KNOWLEDGE MANAGEMENT PROCESSES UPON JOB SATISFACTION AND JOB PERFORMANCE WANG 2022
MUDASSAR GHAZI DIAGNOSIS OF ERRORS IN STALLED INTER-ORGANIZATIONAL WORKFLOW PROCESSES MITROPOULOS 2022
ELJILANI HMOUDA A VALIDITY BASED APPROACH FOR FEATURE SELECTION IN INTRUSION DETECTION SYSTEMS LI 2022
WINNYANNE KUNKLE INVESTIGATING THE USER EXPERIENCE OF A 3D VIRTUAL ANATOMY SYSTEM DRINGUS 2022
KEVIN PARVIZ AN EMPIRICAL INVESTIGATION OF THE EVIDENCE RECOVERY PROCESS IN DIGITAL FORENSICS MUKHERJEE 2022
TOMMY POLLOCK EXPERIMENTAL STUDY TO ASSESS THE ROLE OF ENVIRONMENT AND DEVICE TYPE ON THE SUCCESS OF SOCIAL ENGINEERING ATTACKS: THE CASE OF JUDGMENT ERRORS LEVY 2022
AMMAR QAFFAF FACTORS AFFECTING CUSTOMERS’ DECISION TO SHARE PERSONAL DATA WITH MOBILE OPERATORS WANG 2022
HARI ROOSMAN INFORMATION SYSTEMS SECURITY COUNTERMEASURES: AN ASSESSMENT OF OLDER WORKERS IN INDONESIAN SMALL AND MEDIUM-SIZED BUSINESSES SNYDER 2022
HIMA BINDU SADASHIVA REDDY EXPLORING THE EXISTING AND UNKNOWN SIDE EFFECTS OF PRIVACY PRESERVING DATA MINING ALGORITHMS WANG 2022
ABRAR TURKISTANI THE APPLICATION OF BLOCKCHAIN TECHNOLOGY TO PROTECT AUTHOR’S COPYRIGHT HUR 2022
BRADLEY WANGIA SOCIAL MEDIA ANALYTICS AND INFORMATION PRIVACY DECISIONS: IMPACT OF USER INTIMATE KNOWLEDGE AND CO-OWNERSHIP PERCEPTIONS WANG 2022
CESAR ZALZALAH AN APPROACH FOR EFFICIENT ROBUST ADVERSARIAL TRAINING IN DEEP NEURAL NETWORKS LI 2022
AMY ANTONUCCI PAUSE FOR A CYBERSECURITY CAUSE: ASSESSING THE INFLUENCE OF A WAITING PERIOD ON USER HABITUATION IN MITIGATION OF PHISHING ATTACKS LEVY 2021
DAVID ASON NEURAL NETWORK VARIATIONS FOR TIME SERIES FORECASTING MUKHERJEE 2021
MAY BANTAN ASSESSING LEARNER’S PRIVACY BEHAVIORS THROUGH THE LENS OF GENDER EGALITARIANISM CULTURAL FACTOR IN A BLENDED-LEARNING CONTEXT: STUDENT’S PERSPECTIVE AT SAUDI ELECTRONIC UNIVERSITY WANG 2021
HENRY BRUCKMAN AUDITORY FEEDBACK IN INTEGRATED DEVELOPMENT ENVIRONMENTS TO PROVIDE COGNITIVE SUPPORT FOR NOVICE DEVELOPERS LASZLO 2021
CHRIS BUSH PROTECTING THE PROTECTOR: MAPPING THE KEY TERRAIN THAT SUPPORTS THE CONTINUOUS MONITORING MISSION OF A CYBERSECURITY SERVICE PROVIDER ABRAMSON 2021
ERNESTO CUSTODIO THE CONSTRUCTION AND INTERNAL VALIDATION OF A MODEL FOR THE EFFECTIVE COLLABORATION OF DISTRIBUTED AGILE TEAMS SNYDER 2021
ALI EL-SHARIF TRUSTED MACHINE LEARNING MODEL FOR CLINICAL DECISION MAKING MUKHERJEE 2021
TITUS FOFUNG EXAMINATION OF THE COMPUTER SECURITY BEHAVIORS OF TELECOMMUTERS WORKING WITH CONFIDENTIAL DATA THROUGH LEVERAGING THE FACTORS FROM FEAR APPEALS MODEL (FAM) WANG 2021
FRED GUYTON FEATURE SELECTION ON PERMISSIONS, INTENTS, AND APIS FOR ANDROID MALWARE DETECTION LI 2021
DOUGLAS HALE INVESTIGATION OF ANT COLONY OPTIMIZATION IMPLEMENTATION STRATEGIES FOR LOW-MEMORY OPERATING ENVIRONMENTS MUKHERJEE 2021
RAMON HURLOCKDICK HOW NON-COMPLIANCE IMPACTS SECURITY INCIDENTS: A PUBLIC SECTOR CASE STUDY OF APPLICATION SECURITY AND PROPER DATA GOVERNANCE WANG 2021
ROBERT JONES AN ASSESSMENT OF SOCIAL MEDIA INPUTS AND COURT CASE INFORMATION WITH THE IMPACTS TO MITIGATE INSIDER THREATS WANG 2021
CELESTINE KEMAH AN EMPIRICAL EXAMINATION OF THE IMPACT OF ORGANIZATIONAL INJUSTICE AND NEGATIVE AFFECT ON ATTITUDE AND NON-COMPLIANCE WITH INFORMATION SECURITY POLICY WANG 2021
JOHN MARSH THE IMPACT OF INFORMATION PRIVACY CONCERNS ON ACTUAL USER PRIVACY PRESERVING BEHAVIORS ZINK 2021
ROMAN MELNYK CLASSIFYING FINANCIAL SOFTWARE DEVELOPMENT DOCUMENTATION IN KNOWLEDGE DISCOVERY SYSTEMS SNYDER 2021
NISHA PATEL AN EMPIRICAL ASSESSMENT OF USERS’ INFORMATION SECURITY PROTECTION BEHAVIOR TOWARDS SOCIAL ENGINEERING BREACHES WANG 2021
TYLER PIERON EXAMINING THE INFLUENCE OF PERCEIVED RISK ON THE SELECTION OF INTERNET ACCESS IN THE U.S. INTELLIGENCE COMMUNITY WANG 2021
LEONARD POUNDS A FRAMEWORK FOR ARTIFICIAL INTELLIGENCE APPLICATIONS IN THE HEALTHCARE REVENUE CYCLE MANAGEMENT SIMCO 2021
JOSEPH SQUILLACE EXAMINATION OF CORPORATE INVESTMENTS IN PRIVACY: AN EVENT STUDY TEJAY 2021
MICHAEL STEWART INCREASING SOFTWARE RELIABILITY USING MUTATION TESTING AND MACHINE LEARNING MITROPOULOS 2021
EDGARDO VELEZ ENTERPRISE SOCIAL NETWORK SYSTEMS IMPLEMENTATION MODEL FOR KNOWLEDGE SHARING AMONG SUPPLY CHAIN IT PROFESSIONALS SNYDER 2021
ZULMA WESTNEY THE SOCIAL MEDIA MACHINES: AN INVESTIGATION OF THE EFFECT OF DISINFORMATION MODERATED BY TRUST ON USERS’ DECISION-MAKING PROCESS WANG 2021
WILLIAM WILKERSON DEVELOPMENT OF A SOCIAL ENGINEERING EXPOSURE INDEX (SEXI) USING OPEN SOURCE PERSONAL INFORMATION LEVY 2021
JONATHAN ADKINS AN APPROACH TO TWITTER EVENT DETECTION USING THE NEWSWORTHINESS METRIC LI 2020
AYMAN ABDULAZIZ M ALFAHID PERSPECTIVES OF ONLINE INSTRUCTORS TOWARDS DISTANCE LEARNING TECHNOLOGIES AT THE SAUDI ELECTRONIC UNIVERSITY (SEU) WANG 2020
JAREAU ALMEYDA A COVID-19 INDUCED SHIFT: FROM INTRODUCING HIGH SCHOOL FEMALES TO COMPUTING CAREERS TO AN ASSESSMENT OF TECHNOLOGICAL READINESS AMONG STEM TEACHERS SNYDER 2020
NAWWAF MOHSSEN A ALTALHI SNS AS AN EDUCATIONAL TOOL: EFFECT ON ACADEMIC PERFORMANCE AND LEARNERS’ PERCEPTIONS WANG 2020
ELIZABETH ARCENEAUX IDENTIFYING PHYSICIANS USER EXPERIENCE (UX) PAIN POINTS IN USING ELECTRONIC HEALTH RECORD (EHR) SYSTEMS DRINGUS 2020
JEFFREY BARNETT A HIERARCHICAL TEMPORAL MEMORY SEQUENCE CLASSIFIER APPLICATION FOR CLASSIFYING STREAMING DATA CANNADY 2020
TRACY BIERMAN IMPROVING ITERATED LOCAL SEARCH FOR MICROAGGREGATION LASZLO 2020
GARRY BLACKSTOCK ORGANIZATIONAL CULTURE AND KNOWLEDGE TRANSFER IN ENTERPRISE SOCIAL MEDIA WANG 2020
DONALD BURGIO REDUCTION OF FALSE POSITIVES IN INTRUSION DETECTION BASED ON EXTREME LEARNING MACHINE WITH SITUATION AWARENESS CANNADY 2020
VASILKA CHERGAROVA FACTORS AFFECTING SOFTWARE DEFINED NETWORKING ADOPTION BY RESEARCH AND EDUCATIONAL NETWORKS HUR 2020
MOLLY COOPER ASSESSMENT OF AUDIO AND VISUAL WARNINGS TO MITIGATE RISK OF PHISHING ATTACKS LEVY 2020
DARRELL EILTS AN EMPIRICAL ASSESSMENT OF CYBERSECURITY READINESS AND RESILIENCE IN SMALL BUSINESSES LEVY 2020
ANTHONY FAULDS ADAPTIVE BATCH SIZE SELECTION IN ACTIVE LEARNING FOR REGRESSION MUKHERJEE 2020
JAMES FURSTENBERG AN INVESTIGATION OF THE FACTORS THAT CONTRIBUTE TO THE PERCEIVED LIKELIHOOD OF COMPLIANCE WITH THE HIPAA SECURITY RULE AMONG HEALTHCARE COVERED ENTITIES AND BUSINESS ASSOCIATES WANG 2020
ANDREW GREEN AN INVESTIGATION OF SNS USE BY EXECUTIVES PARRISH 2020
LOVE JAMES SMART PRIVACY FOR IOT: PRIVACY EMBEDDED DESIGN FOR HOME AUTOMATION SYSTEMS WANG 2020
EMMANUEL JIGO DEVELOPMENT OF CRITERIA FOR MOBILE DEVICE CYBERSECURITY THREAT CLASSIFICATION AND COMMUNICATION STANDARD USING LABELS, PICTOGRAM, AS WELL AS SAFETY DATA SHEETS LEVY 2020
ELLIOTTE KIM REDUCING BITTORRENT DOWNLOAD TIME VIA HANDSHAKE-BASED SWITCHING SIMCO 2020
JEFFREY LASKY THE IMPACT OF CROSS-REFERENCES ON THE READABILITY OF THE U.S. INTERNAL REVENUE CODE SEAGULL 2020
NILS LAU THE ROLE OF COGNITIVE FACTORS AND PERSONALITY TRAITS ON MOBILE USER’S INFORMATION SECURITY BEHAVIOR WANG 2020
CAROL LENIHAN A PCNN FRAMEWORK FOR BLOOD CELL IMAGE SEGMENTATION LASZLO 2020
MARIO LORENZO CLASSIFYING RELATIONS USING RECURRENT NEURAL NETWORK WITH ONTOLOGICAL-CONCEPT EMBEDDING MUKHERJEE 2020
EVETTE MAYNARD-NOEL AN INVESTIGATION OF FACTORS MOTIVATING EMPLOYEE ATTITUDES, INTENTIONS, AND BEHAVIORS TO SHARE KNOWLEDGE IN HOMELAND SECURITY PAUL 2020
JOHN MCCONNELL UNIX ADMINISTRATOR INFORMATION SECURITY POLICY COMPLIANCE: THE INFLUENCE OF A FOCUSED SETA WORKSHOP AND INTERACTIVE SECURITY CHALLENGES ON HEURISTICS AND BIASES SNYDER 2020
STEPHEN MUSEMBWA DEVELOPING A SENSE OF COMMUNITY IN SOCIAL NETWORKING SITES PAUL 2020
MUTHARASU NARAYANA PERUMAL DEEP NEURAL NETWORKS FOR SENTIMENT ANALYSIS IN TWEETS WITH EMOTICONS MUKHERJEE 2020
BILL NOFFSINGER PREDICTIVE ACCURACY OF RECOMMENDER ALGORITHMS. MUKHERJEE 2020
OSBORNE OBENG EXAMINING THE CREATION OF INFORMATION PRIVACY CULTURE IN HEALTHCARE ORGANIZATIONS TO ACHIEVE COLLECTIVE HIPAA COMPLIANCE PRACTICE PAUL 2020
GUILLERMO PEREZ CYBERSECURITY SITUATIONAL AWARENESS AND CYBER CURIOSITY TAXONOMY FOR UNDERSTANDING SUSCEPTIBILITY OF SOCIAL ENGINEERING ATTACKS: CASE OF THE MARITIME INDUSTRY LEVY 2020
WILLIAM REED THE FACTORS THAT IMPACT PATIENT PORTAL UTILIZATION ABRAMSON 2020
ANH-HONG RUCKER IMPROVING REAL-TIME INTRUSION DETECTION IN DYNAMIC NETWORKS WITH HIGHLY IMBALANCED DATA USING A DATA STREAM MINING APPROACH CANNADY 2020
ARISAPHAT SUTTIDEE USABILITY OF PORTABLE EEG FOR MONITORING STUDENTS’ ATTENTION IN ONLINE LEARNING WANG 2020
CHRIS WILDER THE IMPACT OF UNCERTAINTY AND FAIRNESS ON EMPLOYEE INTENTION TO COMPLY WITH INFORMATION SECURITY POLICY PARRISH 2020
MARCUS WINKFIELD INFORMATION SYSTEMS SECURITY LEADERSHIP: AN EMPIRICAL STUDY OF BEHAVIORAL INFLUENCES OF LEADERS ON EMPLOYEES’ SECURITY COMPLIANCE TEJAY 2020
DAVID ZEICHICK DETECTING ROGUE MANIPULATION OF SMART HOME DEVICE SETTINGS LI 2020
MOHAMMED NAIF M ALATAWI EXAMINING THE IMPACT OF LEARNING MANAGEMENT SYSTEMS IN COMPUTER PROGRAMMING COURSES WANG 2019
SHAHAR AVIV AN EXAMINATION OF USER DETECTION OF BUSINESS EMAIL COMPROMISE AMONGST CORPORATE PROFESSIONALS LEVY 2019
NEELIMA BHATNAGAR MOTIVATION FACTORS FOR USING MOBILE INFORMATION SYSTEMS IN M-LEARNING COHEN 2019
EMILY BROWN ADAPTABLE PRIVACY PRESERVING MODEL CANNADY 2019
ALVA BULLARD EXAMINING SHARED UNDERSTANDING AND TEAM PERFORMANCE OF GLOBAL VIRTUAL TEAMS PAUL 2019
JAMES CLARK IMPROVING USMLE STEP 1 STUDENT OUTCOMES USING PREDICTIVE MODELING TERRELL 2019
BRENDA DELEE THE ROLE OF DISABILITY SUPPORT STAFF IN HIGHER EDUCATION ABRAMSON 2019
MARC DOYLE COMPREHENDING THE SAFETY PARADOX AND PRIVACY CONCERNS WITH MEDICAL DEVICE REMOTE PATIENT MONITORING COHEN 2019
DIAA FATHALLA ORLEASE: OPTIMISTICALLY REPLICATED LEASE FOR HIGHER REPLICA CONSISTENCY IN OPTIMISTIC REPLICATION SYSTEMS SIMCO 2019
JOHN FLEIG CITATIONALLY ENHANCED SEMANTIC LITERATURE BASED DISCOVERY SUN 2019
VIVIENNE FORRESTER USER INFORMATION SECURITY BEHAVIOR IN PROFESSIONAL VIRTUAL COMMUNITIES: A TECHNOLOGY THREAT AVOIDANCE APPROACH WANG 2019
BENJAMIN GEISLER GAMESPECT: A COMPOSITION FRAMEWORK AND META-LEVEL DOMAIN SPECIFIC ASPECT LANGUAGE FOR UNREAL ENGINE 4 MITROPOULOS 2019
ANTHONY GIWAH EMPIRICAL ASSESSMENT OF MOBILE DEVICE USERS INFORMATION SECURITY BEHAVIOR TOWARDS DATA BREACH: LEVERAGING PROTECTION MOTIVATION THEORY WANG 2019
KATHLEEN GOESCHEL FEATURE SET SELECTION FOR IMPROVED CLASSIFICATION OF STATIC ANALYSIS ALERTS MUKHERJEE 2019
JAMES GORHAM AN INVESTIGATION OF THE IMPACT OF SOCIAL NETWORKING ON KNOWLEDGE SHARING PARRISH 2019
LINDA GREENE KNOWLEDGE SHARING BEHAVIOR: UNDERSTANDING COMMUNICATION MEDIA AFFORDANCES AND THE ROLE OF INFORMATION SECURITY HUR 2019
HELEN HERNANDEZ USABILITY CHALLENGES WITH INSULIN PUMP DEVICES IN DIABETES CARE: WHAT TRAINERS OBSERVE WITH FIRST-TIME PUMP USERS DRINGUS 2019
LILIANA HORNE DEVELOPMENT OF A CLIENT-SIDE EVIL TWIN ATTACK DETECTION SYSTEM FOR PUBLIC WI-FI HOTSPOTS BASED ON DESIGN SCIENCE RESEARCH PARRISH 2019
ANGEL HUECA DEVELOPMENT AND VALIDATION OF A PROOF-OF-CONCEPT PROTOTYPE FOR ANALYTICS-BASED MALICIOUS CYBERSECURITY INSIDER THREAT IN REAL-TIME IDENTIFICATION SYSTEM LEVY 2019
DINESH KHIALANI THE INFLUENCE OF WEBSITE DESIGN ON ONLINE TRUST IN ELECTRONIC COMMERCE RETAILING ENVIRONMENTS COHEN 2019
JAMES KING GENE ONTOLOGY-GUIDED FORCE-DIRECTED VISUALIZATION OF PROTEIN INTERACTION NETWORKS LASZLO 2019
JOHN LYNDEN HYBRID METAHEURISTICS – DIVERSIFICATION V INTENSIFICATION MUKHERJEE 2019
VINCENT MOLOSKY THE INFLUENCE OF IDENTIFIABLE PERSONALITY TRAITS ON NURSES’ INTENTION TO USE WIRELESS IMPLANTABLE MEDICAL DEVICES COHEN 2019
GARRET MOORE A HYBRID (ACTIVE-PASSIVE) VANET CLUSTERING TECHNIQUE LIU 2019
LAKESHIA NALL INSTRUCTIONAL DESIGNERS AS PROJECT MANAGERS: A PHENOMENOLOGY SNYDER 2019
HAROLD OSBORN EXAMINING TASK CONFLICT AND TEAM ATMOSPHERE IN VIRTUAL TEAMS ENGAGED IN OUTSOURCED PROJECT WORK PAUL 2019
ROBERT SAGANICH AN INVESTIGATION OF ELECTRONIC PROTECTED HEALTH INFORMATION (E-PHI) PRIVACY POLICY LEGISLATION IN CALIFORNIA FOR SENIORS USING IN-HOME HEALTH MONITORING SYSTEMS COHEN 2019
DAVE SCHUBERT AN INSTRUCTIONAL DESIGNER COMPETENCY FRAMEWORK FOR COMPLEX LEARNING DESIGNS SNYDER 2019
WILLARVIS SMITH A COMPREHENSIVE CYBER DEFENSE SECURITY FRAMEWORK FOR LARGE ORGANIZATIONS ELLIS 2019
ADAM SOLOMON A NOVEL COOPERATIVE INTRUSION DETECTION SYSTEM FOR MOBILE AD HOC NETWORKS CANNADY 2019
JULIEO THOMPSON THE EVOLUTION OF TECHNOLOGY IN CALL CENTERS ABRAMSON 2019
ALEXANDER VERNER LSTM NETWORKS FOR DETECTION AND CLASSIFICATION OF ANOMALIES IN RAW SENSOR DATA MUKHERJEE 2019
BECKY WHITTEMORE A NEWBORN SCREENING DISORDERS ONLINE PORTAL FOR PRIMARY CARE PROVIDERS AND PARENTS ABRAMSON 2019
KIM WITHERS A PSYCHOSOCIAL BEHAVIORAL ATTRIBUTION MODEL: EXAMINING THE RELATIONSHIP BETWEEN THE DARK TRIAD” AND DEVIANT BEHAVIORS IMPACTING SOCIAL NETWORKING SITES PARRISH 2019
HATEM YAZBEK ADAPTIVE STRATEGIES OF MULTI-OBJECTIVE OPTIMIZATION FOR GREENER NETWORKS LIU 2019
ADAM ALBINA ASSESSING THE IMPACT OF A GEOSPATIAL INFORMATION SYSTEM FOR IMPROVING CAMPUS EMERGENCY DECISION MAKING OF NOVICE CRISIS MANAGERS ABRAMSON 2018
SALEH HAMED A ALHARTHI A DEVELOPMENTAL RESEARCH OF A TAXONOMY FOR EMPLOYEES’ MOBILE DEVICE CYBERSLACKING AND COMMITMENT TO THE ORGANIZATION IN THE CONTEXT OF PRODUCTIVITY LEVY 2018
FAHAD MOSLEH M ALSAADI KNOWLEDGE SHARING AMONG ACADEMICS IN HIGHER EDUCATION INSTITUTIONS IN SAUDI ARABIA SNYDER 2018
IQBAL AMIRI THE EFFICACY OF BIG DATA SECURITY, TRUST, LEADERSHIP, INFORMATION SENSITIVITY, PRIVACY CONCERN AND JOB REWARD ON DISCLOSING PERSONAL SECURITY INFORMATION ONLINE WANG 2018
MANSOUR HAMOUD M AWAJI EVALUATION OF MACHINE LEARNING TECHNIQUES FOR EARLY IDENTIFICATION OF AT-RISK STUDENTS MUKHERJEE 2018
ALI BAKER AN INVESTIGATION OF THE INTERACTION BETWEEN ORGANIZATIONAL CULTURE AND KNOWLEDGE SHARING THROUGH SOCIALIZATION: A MULTI-LEVEL PERSPECTIVE ELLIS 2018
ANDREW BERRY PERCEPTION AND USAGE OF SOCIAL NETWORKING WEBSITES AMONG SENIOR ADULTS COHEN 2018
CARLENE BLACKWOOD-BROWN AN EMPIRICAL ASSESSMENT OF SENIOR CITIZENS’ CYBERSECURITY AWARENESS, COMPUTER SELF-EFFICACY, PERCEIVED RISK OF IDENTITY THEFT, ATTITUDE, AND MOTIVATION TO ACQUIRE CYBERSECURITY SKILLS LEVY 2018
MARION BROWN ASSESSING THE ROLE OF CRITICAL VALUE FACTORS (CVFS) ON USERS’ RESISTANCE TO USE URBAN SEARCH AND RESCUE ROBOTICS LEVY 2018
DAMON BRUCCOLERI DATABASE STREAMING COMPRESSION ON MEMORY-LIMITED MACHINES SUN 2018
KARLA CLARKE NOVEL ALERT VISUALIZATION: THE DEVELOPMENT OF A VISUAL ANALYTICS PROTOTYPE FOR MITIGATION OF MALICIOUS INSIDERS CYBER THREAT LEVY 2018
THERESA CURRAN STANDARDIZING INSTRUCTIONAL DEFINITION AND CONTENT SUPPORTING INFORMATION SECURITY COMPLIANCE REQUIREMENTS ABRAMSON 2018
AIMAN DARWICHE MACHINE LEARNING METHODS FOR SEPTIC SHOCK PREDICTION MUKHERJEE 2018
FANNIEL DEMARKS AN OPERATIONAL MANAGEMENT COMPETENCY MODEL FOR ONLINE EDUCATION ADMINISTRATORS ABRAMSON 2018
MADHURI EDWARDS IDENTIFYING FACTORS CONTRIBUTING TOWARDS INFORMATION SECURITY MATURITY IN AN ORGANIZATION TEJAY 2018
RUSSELL GARNER DEVELOPMENT, IMPLEMENTATION AND ASSESSMENT OF AN ONLINE DOCTORAL STUDENT ORIENTATION ABRAMSON 2018
JODI GOODE COMPARING TRAINING METHODOLOGIES ON EMPLOYEE’S CYBERSECURITY COUNTERMEASURES AWARENESS AND SKILLS IN TRADITIONAL VS. SOCIO-TECHNICAL PROGRAMS LEVY 2018
ZADOK HAKIM FACTORS THAT CONTRIBUTE TO THE RESISTANCE TO CLOUD COMPUTING ADOPTION BY TECH COMPANIES VS. NON-TECH COMPANIES PARRISH 2018
CHAD HARDIN SEMI-INFORMED MULTI-AGENT PATROL STRATEGIES LASZLO 2018
EDWIN HILL THE EFFECTS OF STUDENT ACTIVITY DASHBOARDS ON PARTICIPATION, PERSISTENCE, AND PERFORMANCE ELLIS 2018
ANN-MARIE HORCHER CONSERVATION OF LIMITED RESOURCES: DESIGN PRINCIPLES FOR SECURITY AND USABILITY ON MOBILE DEVICES TEJAY 2018
GISLE JORGENSEN METRICS FOR ASPECT MINING VISUALIZATION MITROPOULOS 2018
ANGELA LANDRESS THE IMPACT OF USER MINDFULNESS ON NON-MALICIOUS SPILLAGE WITHIN IMAGES IN SOCIAL NETWORKING SITESS PARRISH 2018
KEMBLEY LINGELBACH PERCEPTIONS OF FEMALE CYBERSECURITY PROFESSIONALS ON BARRIERS AND FACTORS OF LOW FEMALE PARTICIPATION RATES TERRELL 2018
LINA LO MULTIDIMENSIONAL KNOWLEDGE FLOW DYNAMICS IN CONTEXT ELLIS 2018
DANIEL LONG EXPLORING GENERATIONAL DIFFERENCES IN TEXT MESSAGING USAGE AND HABITS COHEN 2018
WAYNE MADHLANGOBE ASSESSMENT OF FACTORS INFLUENCING INTENT-TO-USE BIG DATA ANALYTICS IN AN ORGANIZATION: A SURVEY STUDY WANG 2018
STEFANUS MALAN MULTI-ROBOT COMPLETE COVERAGE USING DIRECTIONAL CONSTRAINTS MUKHERJEE 2018
RICHARD MCCRAE THE IMPACT OF COST ON FEATURE SELECTION FOR CLASSIFIERS MUKHERJEE 2018
STEVEN MCELWEE PROBABILISTIC CLUSTER ENSEMBLE EVALUATION FOR UNSUPERVISED INTRUSION DETECTION CANNADY 2018
ELIZABETH OVIAWE DESIGN AND DEVELOPMENT OF SIMULATION-BASED INSTRUCTION ON MEANINGFUL USE AND INTERPROFESSIONALISM CORE COMPETENCIES IN A HEALTHCARE TEAM-BASED LEARNING ENVIRONMENT SNYDER 2018
JAMES PRATHER BEYOND AUTOMATED ASSESSMENT: BUILDING METACOGNITIVE AWARENESS IN NOVICE PROGRAMMERS IN CS1 COHEN 2018
RONALD PUNAKO COMPUTER SUPPORTED COLLABORATIVE LEARNING USING AUGMENTED AND VIRTUAL REALITY IN TOURISM EDUCATION SNYDER 2018
NICHOLAS SHAW A KNOWLEDGE MANAGEMENT SYSTEM (KMS) USING A STORYTELLING-BASED APPROACH TO COLLECT TACIT KNOWLEDGE LIU 2018
RODNEY THOMAS MACHINE LEARNING FOR EXPLORING STATE SPACE STRUCTURE IN GENETIC REGULATORY NETWORKS LASZLO 2018
LARRY TOWNSEND WIRELESS SENSOR NETWORK CLUSTERING WITH MACHINE LEARNING LI 2018
ELISSA WEEDEN USING WEB CONFERENCING TECHNOLOGY TO FOSTER INCLUSIVE COURSE EXPERIENCES FOR DEAF AND HARD-OF-HEARING STUDENTS ABRAMSON 2018
JACOB ARTHUR ENHANCED PREDICTION OF NETWORK ATTACKS USING INCOMPLETE DATA CANNADY 2017
JUAN ASENJO DATA MASKING, ENCRYPTION, AND THEIR EFFECT ON CLASSIFICATION PERFORMANCE: TRADE-OFFS BETWEEN DATA SECURITY AND UTILITY SUN 2017
ROBERT BATIE ASSESSING THE EFFECTIVENESS OF A FINGERPRINT BIOMETRIC AND A BIOMETRIC PERSONAL IDENTIFICATION NUMBER (BIO-PIN) AS A MULTI-FACTOR AUTHENTICATION MECHANISM LEVY 2017
SHELLON BLACKMAN-LEES TOWARDS A CONCEPTUAL FRAMEWORK FOR PERSISTENT USE: A TECHNICAL PLAN TO ACHIEVE SEMANTIC INTEROPERABILITY WITHIN ELECTRONIC HEALTH RECORD SYSTEMS ELLIS 2017
LESLIE BOFILL THE DESIGN AND IMPLEMENTATION OF ONLINE RADIOLOGY MODULES USING THE ADDIE PROCESS AND RAPID PROTOTYPING TERRELL 2017
TERESA CARTER FIVE--FACTOR MODEL AS A PREDICTOR FOR SPOKEN DIALOG SYSTEMS COHEN 2017
ABDULRAHIM CHARIF CONTEXTUALIZING SECURE INFORMATION SYSTEM DESIGN: A SOCIO-TECHNICAL APPROACH TEJAY 2017
MICHEAL ELROD A NOVEL APPROACH TO DETERMINING REAL-TIME RISK PROBABILITIES IN CRITICAL INFRASTRUCTURE INDUSTRIAL CONTROL SYSTEMS CANNADY 2017
STEVEN EPSTEIN THE EFFECT OF DOMAIN AND TECHNICAL EXPERTISE ON THE TRAINING OUTCOMES FOR CASE MANAGEMENT SYSTEMS IN HIGH EXPERTISE ORGANIZATIONS PARRISH 2017
SALAM FARHAT CREATING REALISTIC SYNTHETIC FILE SYSTEM WORKLOADS SIMCO 2017
JOHN FORD PULSAR SEARCH USING SUPERVISED MACHINE LEARNING. MUKHERJEE 2017
JAMES FRALEY CLASSIFICATION AND IDENTIFICATION OF ADVANCED POLYMORPHIC MALWARE CANNADY 2017
STEVEN FUENTES DEFINING USABILITY HEURISTICS FOR ADOPTION AND EFFICIENCY OF AN ELECTRONIC WORKFLOW DOCUMENT MANAGEMENT SYSTEM COHEN 2017
ROBERT HAMBLY AN EMPIRICAL INVESTIGATION OF THE WILLINGNESS OF US INTELLIGENCE COMMUNITY ANALYSTS TO CONTRIBUTE KNOWLEDGE TO A KNOWLEDGE MANAGEMENT SYSTEM (KMS) IN A HIGHLY CLASSIFIED AND SENSITIVE ENVIRONMENT LEVY 2017
TOM HARITOS A STUDY OF HUMAN-MACHINE INTERFACE (HMI) LEARNABILITY FOR UNMANNED AIRCRAFT SYSTEMS COMMAND AND CONTROL DRINGUS 2017
NICHOLAS HAYS REDUCING THE DOWNLOAD TIME IN STOCHASTIC P2P CONTENT DELIVERY NETWORKS BY IMPROVING PEER SELECTION SIMCO 2017
JEFF HEATON AUTOMATED FEATURE ENGINEERING FOR DEEP NEURAL NETWORKS WITH GENETIC PROGRAMMING CANNADY 2017
STEVEN HENDRIKSE THE EFFECT OF CODE OBFUSCATION ON AUTHORSHIP ATTRIBUTION OF BINARY COMPUTER FILES MITROPOULOS 2017
CRISTELIA HINOJOSA ORGANIZATIONAL INFORMATION DISSEMINATION WITHIN COLLABORATIVE NETWORKS USING DIGITAL COMMUNICATION TOOLS ELLIS 2017
STEFAN JOE-YEN PERFORMANCE ENVELOPES OF ADAPTIVE ENSEMBLE DATA STREAM CLASSIFIERS. MUKHERJEE 2017
THOMAS MCCUNE A STUDY OF HOW YOUNG ADULTS LEVERAGE MULTIPLE PROFILE MANAGEMENT FUNCTIONALITY IN MANAGING THEIR ONLINE REPUTATION ON SOCIAL NETWORKING SITES DRINGUS 2017
PATRICK MCNEIL INTEGRATING MULTIPLE MODALITIES INTO DEEP LEARNING NETWORKS CANNADY 2017
JENNIFER MERRITT INDIVIDUALIZED INSTRUCTION AS A FACULTY TRAINING STRATEGY FOR TECHNOLOGY INTEGRATION WANG 2017
ZAREEF MOHAMMED THE ROLE OF COGNITIVE DISPOSITION IN RE-EXAMINING THE PRIVACY PARADOX: A NEUROSCIENCE STUDY TEJAY 2017
RICHARD NILSEN MEASURING CYBERSECURITY COMPETENCY: AN EXPLORATORY INVESTIGATION OF THE CYBERSECURITY KNOWLEDGE, SKILLS, AND ABILITIES NECESSARY FOR ORGANIZATIONAL NETWORK ACCESS PRIVILEGES LEVY 2017
CHARLES PERKINS INVESTIGATING PERCEIVED INFLUENCES OF DATA WAREHOUSING BUSINESS INTELLIGENCE MATURITY ON ORGANIZATIONAL PERFORMANCE SUN 2017
JAIME PUENTE EXAMINING THE EFFECTS OF DISTRACTIVE MULTITASKING WITH PERIPHERAL COMPUTING IN THE CLASSROOM DRINGUS 2017
JERRY ROPER COPYRIGHT POLICY INTERPRETATION AND ITS EFFECTS ON HIGHER EDUCATION OPEN COURSES SUCCESS ABRAMSON 2017
COLEEN SANTEE AN EXPLORATORY STUDY OF THE APPROACH TO BRING YOUR OWN DEVICE (BYOD) IN ASSURING INFORMATION SECURITY NASUTI 2017
DAVID SAYRE A RUNTIME VERIFICATION AND VALIDATION FRAMEWORK FOR SELF-ADAPTIVE SOFTWARE SIMCO 2017
ERIC SPRIGGS AN ASSESSMENT OF THE INFLUENCE OF FUNCTIONAL DIVERSITY AND PERCEIVED INFORMATION QUALITY ON THE INTENTION TO USE COLLABORATION SYSTEMS PAUL 2017
GWENDOLYN STRIPLING AN EMPIRICAL EVALUATION OF FACTORS AFFECTING ENERGY MANAGEMENT INFORMATION SYSTEM SUCCESS COHEN 2017
BRENDA VARNER SUPPORTING EDUCATION FOR STUDENT PARENTS THROUGH MOBILE TECHNOLOGY ABRAMSON 2017
SAMUEL YODERS INTEGRATION OF SIMULATION TECHNOLOGY INTO HEALTH CARE EDUCATION CURRICULA THROUGH APPLIED CONSTRUCTIVIST LEARNING THEORY ABRAMSON 2017
YI ZHANG STRATEGIES FOR COMBINING TREE-BASED ENSEMBLE MODELS. MUKHERJEE 2017
MAHD ALZOUBI EVALUATING THE ENTERPRISE RESOURCE PLANNING (ERP) SYSTEMS SUCCESS AT THE INDIVIDUAL LEVEL OF ANALYSIS IN THE MIDDLE-EAST TERRELL 2016
GEORGE ANTONIOU DESIGNING AN EFFECTIVE INFORMATION SECURITY POLICY FOR EXCEPTIONAL SITUATIONS IN AN ORGANIZATION: AN EXPERIMENTAL STUDY TEJAY 2016
SANDRA ARMSTRONG LEVELING THE PLAYING FIELD: GENDER INCLUSIVE DESIGN FOR SINGLE AND MULTIPLAYER COMPUTER ROLE-PLAYING GAMES COHEN 2016
KIMBERLY BARTHOLOMEW PATIENT PORTALS: ACHIEVING TECHNOLOGY ACCEPTANCE AND MEANINGFUL USE IN INDEPENDENT PHYSICIAN-MANAGED PRACTICES ABRAMSON 2016
EMMANUEL BAZILE AN EMPIRICAL TESTING OF FACTORS CONTRIBUTING TO HEALTHCARE PROFESSIONALS’ RESISTANCE TO USE ELECTRONIC MEDICAL RECORDS (EMR) SYSTEMS LEVY 2016
SHAUNA BEAUDIN AN EMPIRICAL STUDY OF AUTHENTICATION METHODS TO SECURE E-LEARNING SYSTEM ACTIVITIES AGAINST IMPERSONATION FRAUD LEVY 2016
DAVID BETHELMY ASPECT MINING USING MULTIOBJECTIVE GENETIC CLUSTERING ALGORITHMS MITROPOULOS 2016
LINDA BETZ AN ANALYSIS OF THE RELATIONSHIP BETWEEN SECURITY INFORMATION TECHNOLOGY ENHANCEMENTS AND COMPUTER SECURITY BREACHES AND INCIDENTS WANG 2016
NEWTON CAMPBELL, JR. ALGORITHMIC FOUNDATIONS OF A*, LANDMARKS, AND GENERALIZED POLYGON INEQUALITIES LASZLO 2016
MELISSA CARLTON DEVELOPMENT OF A CYBERSECURITY SKILLS INDEX: A SCENARIOS-BASED, HANDS-ON MEASURE OF NON-IT PROFESSIONALS’ CYBERSECURITY SKILLS LEVY 2016
KAREN CASE A BIG IDEA: THE ROLLOUT OF OPEN SUNY ABRAMSON 2016
ALGERNON CORBETT THE STATE OF MOBILE LEARNING IMPLEMENTATION IN GOVERNMENT CABINET-LEVEL AGENCIES AND DEPARTMENTS ABRAMSON 2016
THOMAS DECINO A USABILITY AND LEARNABILITY CASE STUDY OF GLASS FLIGHT DECK INTERFACES AND PILOT INTERACTIONS THROUGH SCENARIO-BASED TRAINING DRINGUS 2016
KEITH EDWARDS EXAMINING THE SECURITY AWARENESS, INFORMATION PRIVACY, AND THE SECURITY BEHAVIORS OF HOME COMPUTER USERS PAUL 2016
MARY HARWARD A STUDY OF DATA SHARING PRACTICES WITHIN SCHOLARLY RESEARCH COMMUNITIES ZINK 2016
WILNELIA HERNANDEZ AN EMPIRICAL ASSESSMENT OF EMPLOYEES CYBERSLACKING IN THE PUBLIC SECTOR LEVY 2016
JULIE HEWITT BLENDED LEARNING FOR FACULTY PROFESSIONAL DEVELOPMENT INCORPORATING KNOWLEDGE MANAGEMENT PRINCIPLES SNYDER 2016
ROBIN HILL COMMUNITY COLLEGE FACULTY DISPOSITIONS TOWARDS BLENDED LEARNING SNYDER 2016
GUCHUN HUANG USING MOBILE PHONES FOR TEACHING AND LEARNING IN CHINESE TRADITIONAL UNDERGRADUATE EDUCATION ABRAMSON 2016
RICHARD MAITI CAPTURING, ELICITING, AND PRIORITIZING (CEP) NON-FUNCTIONAL REQUIREMENTS METADATA DURING THE EARLY STAGES OF AGILE SOFTWARE DEVELOPMENT MITROPOULOS 2016
NIKOLAY MALITSKY THE MUTABLE CLASS DESIGN PATTERN LASZLO 2016
JOSEPH MARNELL AN EMPIRICAL INVESTIGATION OF FACTORS EFFECTING RESISTANCE TO USE MULTI-FACTOR AUTHENTICATION SYSTEMS IN PUBLIC-ACCESS ENVIRONMENTS LEVY 2016
HOLLY MCKEE THE CONSTRUCTION AND VALIDATION OF AN INSTRUCTOR LEARNING ANALYTICS IMPLEMENTATION MODEL TO SUPPORT AT-RISK STUDENTS SNYDER 2016
KIMBERLY MCMURTRY EFFECTIVE TEACHING PRACTICES IN ONLINE HIGHER EDUCATION ABRAMSON 2016
ELIEL MELON A STUDY OF THE SUCCESS OF GROUP FORMATION IN VIRTUAL TEAMS USING COMPUTER MEDIATED COMMUNICATIONS LEVY 2016
SALEEM MIR ENHANCED METHOD CALL TREE FOR COMPREHENSIVE DETECTION OF SYMPTOMS OF CROSS CUTTING CONCERNS MITROPOULOS 2016
DAVID MOSKOWITZ AUTOMATICALLY DEFINED TEMPLATES FOR IMPROVED PREDICTION OF NON-STATIONARY, NON-LINEAR TIME SERIES IN GENETIC PROGRAMMING MUKHERJEE 2016
STEPHEN MUJEYE AN EXPERIMENTAL STUDY ON THE ROLE OF PASSWORD STRENGTH AND COGNITIVE LOAD ON EMPLOYEE PRODUCTIVITY LEVY 2016
THUAN NGUYEN KNOWLEDGE MANAGEMENT (KM) PERFORMANCE AND ORGANIZATIONAL PERFORMANCE: USING INTELLECTUAL CAPITAL (IC) AS THE PROXY AND A GUIDELINE FOR IC MEASUREMENT ELLIS 2016
PATRICK OFFOR EXAMINING CONSUMERS’ SELECTIVE INFORMATION PRIVACY DISCLOSURE BEHAVIORS IN AN ORGANIZATION’S SECURE E-COMMERCE SYSTEMS TEJAY 2016
JANICE ORCUTT TEACHING PRESENCE AND INTELLECTUAL CLIMATE IN A STRUCTURED ONLINE LEARNING ENVIRONMENT DRINGUS 2016
SERGIO PARRA USE OF STUDENT CREATED VIDEO PODCASTS TO PROMOTE FOREIGN LANGUAGE GRAMMAR ACQUISITION IN MIDDLE SCHOOL ABRAMSON 2016
JASON PITTMAN THE EFFECTS OF TIME-COMPRESSION AND LEARNER-CONTROL IN MULTIMEDIA INSTRUCTION DRINGUS 2016
EMAD SAMWEL TOWARD THE DEVELOPMENT AND IMPLEMENTATION OF PERSONALIZED, ADAPTIVE, AND COMPREHENSIVE ELEARNING SYSTEMS ABRAMSON 2016
DAVID SCHAAF ASSISTIVE TECHNOLOGY INSTRUCTION IN TEACHER EDUCATION CURRICULA ABRAMSON 2016
JOSEPH SIMPSON EMPIRICAL ANALYSIS OF SOCIO-COGNITIVE FACTORS AFFECTING SECURITY BEHAVIORS OF SMARTPHONE USERS. COHEN 2016
FARRELL TAYLOR EVALUATION OF SUPERVISED MACHINE LEARNING FOR CLASSIFYING VIDEO TRAFFIC MUKHERJEE 2016
ROBERT VAN CAMP USING DIVERSITY ENSEMBLES WITH TIME LIMITS TO HANDLE CONCEPT DRIFT MUKHERJEE 2016
THOMAS WINSTON AN EMPIRICAL INVESTIGATION OF PRIVACY AND SECURITY CONCERNS ON NURSES’ BEHAVIORAL INTENTIONS TO USE RFID IN HOSPITALS PAUL 2016
NOEL WINT AN INVESTIGATION OF SOCIO-TECHNICAL COMPONENTS OF KNOWLEDGE MANAGEMENT SYSTEM (KMS) USAGE ELLIS 2016
SEAN ZADIG UNDERSTANDING THE IMPACT OF HACKER INNOVATION UPON IS SECURITY COUNTERMEASURES TEJAY 2016
FRANK ACKER USE OF ENTROPY FOR FEATURE SELECTION WITH INTRUSION DETECTION SYSTEM PARAMETERS CANNADY 2015
ROBERT ALTIERO DIGITAL FORENSICS TOOL INTERFACE VISUALIZATION COHEN 2015
SHALETTE ANNMARIE ASHMAN EAST THE EFFECT OF COMPUTERIZED COGNITIVE TRAINING ON THE WORKING MEMORY AND MATHEMATICS ACHIEVEMENT OF LOW ACHIEVERS ELLIS 2015
BETSY BAUGESS EXAMINING SOCIAL NETWORK SITE USAGE BY OLDER ADULTS: A PHENOMENOLOGICAL APPROACH WANG 2015
BRIAN BENNETT LOCATING POTENTIAL ASPECT INTERFERENCE USING CLUSTERING ANALYSIS MITROPOULOS 2015
ALEKSANDR BLEKH GOVERNANCE AND ORGANIZATIONAL SPONSORSHIP AS SUCCESS FACTORS IN FREE/LIBRE AND OPEN SOURCE SOFTWARE DEVELOPMENT: AN EMPIRICAL INVESTIGATION USING STRUCTURAL EQUATION MODELING MUKHERJEE 2015
GRACE BONANNO THE IMPORTANCE OF PRESENCE IN ASSISTING MEDICAL DIAGNOSIS IN INDIVIDUALS WITH INTELLECTUAL DISABILITIES: A TELEMEDICINE APPROACH COHEN 2015
SHONDA BROWN AN INFORMATION PRIVACY EXAMINATION OF THE PRACTICES OF PHARMACEUTICAL COMPANIES REGARDING USE OF INFORMATION COLLECTED THROUGH THEIR WEBSITES LEVY 2015
BETSY BURGOS A STUDY OF ASSISTIVE TECHNOLOGY COMPETENCIES OF SPECIALISTS IN PUBLIC SCHOOLS DRINGUS 2015
DAVID CASTANO AFFECT AND ONLINE PRIVACY CONCERNS NYSHADHAM 2015
THEODORE COCHRAN IMMUNOLOGY INSPIRED DETECTION OF DATA THEFT FROM A NETWORKED COMPUTER CANNADY 2015
MICHAEL DEMBLEWSKI SECURITY FRAMEWORK FOR MACHINE-TO-MACHINE DEVICES AND NETWORKS STOUT 2015
AMRAN DIN USABLE SECURITY FOR E-CITIZENS: A STUDY TO EVALUATE AND COMPARE THE USABILITY OF USER ACCOUNTS ON E-GOVERNMENT WEBSITES COHEN 2015
PAUL DOOLEY AN EMPIRICAL DEVELOPMENT OF CRITICAL VALUE FACTORS FOR SYSTEM QUALITY AND INFORMATION QUALITY IN BUSINESS INTELLIGENCE SYSTEMS IMPLEMENTATIONS LEVY 2015
LAURA DOWNEY WELL-BEING TECHNOLOGIES: MEDITATION USING VIRTUAL WORLDS COHEN 2015
EGES EGEDIGWE SERVICE QUALITY AND PERCEIVED VALUE OF CLOUD COMPUTING-BASED SERVICE ENCOUNTERS: EVALUATION OF INSTRUCTOR PERCEIVED SERVICE QUALITY IN HIGHER EDUCATION IN TEXAS LIU 2015
MARY FONTI A PREDICTIVE MODELING SYSTEM: EARLY IDENTIFICATION OF STUDENTS AT-RISK ENROLLED IN ONLINE LEARNING PROGRAMS TERRELL 2015
TRELISA GLAZATOV APPLYING THE COMPONENT DISPLAY THEORY TO THE INSTRUCTIONAL DESIGN AND DEVELOPMENT OF AN EDUCATIONAL MOBILE APPLICATION SNYDER 2015
JOHN GRAY VIRTUE ETHICS: EXAMINING INFLUENCES ON THE ETHICAL COMMITMENT OF INFORMATION SYSTEM WORKERS IN TRUSTED POSITIONS TEJAY 2015
MICHAEL GREEN MOTIVATION AND LEARNING OF NON-TRADITIONAL COMPUTING EDUCATION STUDENTS IN A WEB-BASED COMBINED LABORATORY ABRAMSON 2015
DICK HAMANN THE CONSTRUCTION AND VALIDATION OF AN M-LEARNING FRAMEWORK FOR ONLINE AND BLENDED LEARNING ENVIRONMENTS SNYDER 2015
HOWARD HAMILTON AN EXAMINATION OF SLA COMPONENTS THAT INFLUENCE CLOUD COMPUTING ADOPTION PARRISH 2015
HIRA HERRINGTON A HEURISTIC EVOLUTIONARY METHOD FOR THE COMPLEMENTARY CELL SUPPRESSION PROBLEM MUKHERJEE 2015
JOHN HUDZINA AN ENHANCED MAPREDUCE WORKLOAD ALLOCATION TOOL SIMCO 2015
JAMES JAVA CHARACTERIZATION OF PROSE BY RHETORICAL STRUCTURE FOR MACHINE LEARNING CLASSIFICATION LASZLO 2015
STEPHEN KIBWAGE ROLE-BASED ACCESS CONTROL ADMINISTRATION OF SECURITY POLICIES AND POLICY CONFLICT RESOLUTION IN DISTRIBUTED SYSTEMS LIU 2015
JEFFREY KIMBALL MOTIVATIONS OF STUDENTS IN THE OPEN-ENDED USE OF MOBILE COMPUTING IN LECTURE-BASED CLASSROOMS TERRELL 2015
THOMAS KURTZ APPROACHES FOR DEVELOPING A MODEL FOR INFORMATION AND COMMUNICATION TECHNOLOGY (ICT) IMPLEMENTATION IN THE HIGHER EDUCATION ENVIRONMENT ELLIS 2015
KAREN LACADEN AN INVESTIGATION OF THE FACTORS CONTRIBUTING TO THE DEVELOPMENT OF POORLY DEFINED IS STRATEGIES. PARRISH 2015
RICHARD LAMB A MAKEOVER FOR THE CAPTURED LECTURE: APPLYING MULTIMEDIA LEARNING PRINCIPLES TO LECTURE VIDEO ELLIS 2015
JAMES LEWIS IDENTIFYING KEY DETERMINANTS OF SERVICE PROVIDER EFFECTIVENESS AND THE IMPACT ON OUTSOURCED SECURITY SUCCESS TEJAY 2015
FRANK LOFORTE EFFICIENT VARIATIONS OF THE QUALITY THRESHOLD CLUSTERING ALGORITHM MUKHERJEE 2015
TANYA MACNEIL POLICE OPINIONS OF DIGITAL EVIDENCE RESPONSE HANDLING IN THE STATE OF GEORGIA: AN EXAMINATION FROM THE VIEWPOINT OF LOCAL AGENCIES’ PATROL OFFICERS ZINK 2015
PATRICIA MCDERMOTT-WELLS MATH IN THE DARK: TOOLS FOR EXPRESSING MATHEMATICAL CONTENT BY VISUALLY IMPAIRED STUDENTS. MUKHERJEE 2015
NATHANIEL MELBY ENTERPRISE BANDWIDTH MANAGEMENT: A FRAMEWORK FOR TRAFFIC MANAGEMENT IN GLOBAL MANUFACTURING ENTERPRISES LITTMAN 2015
SCOTT MORRISSETTE INVESTIGATING CATEGORIZATION PREFERENCES FOR ONLINE DATING SITES NYSHADHAM 2015
DAVID MOURED DYNAMIC GAME-THEORETIC MODELS TO DETERMINE THE VALUE OF INTRUSION DETECTION SYSTEMS MUKHERJEE 2015
JEAN-PIERRE NZIGA INCREMENTAL SPARSE-PCA FEATURE EXTRACTION FOR DATA STREAMS CANNADY 2015
ARTURO PONCE A DYNAMIC BEHAVIORAL BIOMETRIC APPROACH TO AUTHENTICATE USERS EMPLOYING THEIR FINGERS TO INTERACT WITH TOUCHSCREEN DEVICES COHEN 2015
KRISTIN RAUB A PHENOMENOLOGICAL INQUIRY INTO FACEBOOK NEWCOMER MOTIVATIONS FOR PARTICIPATORY ACTIVITIES DRINGUS 2015
RICHARD RICHARDSON ENHANCEMENT OF MAMMOGRAPHY IMAGES FROM SEGMENTATION IMAGE COMPRESSION LASZLO 2015
JOSE RIVERA RODRIGUEZ SENIORS WITH DIABETES-INVESTIGATION OF THE IMPACT OF SEMANTIC AUDITORY DISTRACTIONS ON THE USABILITY OF A BLOOD GLUCOSE TRACKING SMARTPHONE MOBILE APPLICATION COHEN 2015
RICARDO RODRIGUEZ AN ELECTROENCEPHALOGRAM (EEG) BASED BIOMETRICS INVESTIGATION FOR AUTHENTICATION: AN HCI APPROACH COHEN 2015
MARK ROSENBAUM AN INSTRUMENT OF MEASURE: IDENTIFYING UNETHICAL PERSONAL IDENTITY INFORMATION (PII) PRIVACY VIOLATIONS COMMITTED BY IS/IT PRACTITIONERS’ – A COMPARISON TO COMPUTING MORAL EXEMPLARS WANG 2015
MANON SCHLADEN FORMATIVE RESEARCH ON AN INSTRUCTIONAL DESIGN THEORY FOR VIRTUAL PATIENTS IN CLINICAL EDUCATION: A PRESSURE ULCER PREVENTION CLINICAL REASONING CASE SNYDER 2015
ROGER SEEHOLZER INVESTIGATING ROLES OF INFORMATION SECURITY STRATEGY TEJAY 2015
RACHAEL SESSLER TRINKOWSKY INTERPRETATIVE PHENOMENOLOGICAL ANALYSIS OF ACCESSIBILITY AWARENESS AMONG FACULTY IN ONLINE LEARNING ENVIRONMENTS DRINGUS 2015
SHEILA SORENSEN MOTIVATING AN INDIVIDUAL TO SHARE EXTERNALIZED TACIT KNOWLEDGE ELLIS 2015
JONATHAN SPARKS THE IMPACT OF IMAGE SYNONYMS IN GRAPHICAL-BASED AUTHENTICATION SYSTEMS COHEN 2015
THOMAS TREVETHAN BUILDING CLOUD-BASED INFORMATION SYSTEMS LAB ARCHITECTURE: WRITING DESIGN PRINCIPLES THAT FACILITATE THE EFFECTIVE CONSTRUCTION AND EVALUATION OF A CLOUD-BASED LAB ENVIRONMENT PARRISH 2015
OSIRIS VILLACAMPA FEATURE SELECTION AND CLASSIFICATION METHODS FOR DECISION MAKING: A COMPARATIVE ANALYSIS SUN 2015
LUCINDA WANG IMPLICIT MEASURES OF ONLINE RISKS NYSHADHAM 2015
MICHELE WASHINGTON GATHERING THE REQUIREMENTS FOR A MOBILE DEVICE TUTORIAL FOR OLDER ADULTS COHEN 2015
NATHAN WHITE AN EMPIRICAL INVESTIGATION INTO THE ROLE THAT BOREDOM, RELATIONSHIPS, ANXIETY, AND GRATIFICATION (BRAG) PLAY IN A DRIVER’S DECISION TO TEXT LEVY 2015
FARANAK AFSHAR INVESTIGATING THE DETERMINANTS OF DISASTER RECOVERY TECHNOLOGY INVESTMENT CHOICE IN SMALL AND MEDIUM-SIZED ENTERPRISES TEJAY 2014
KEVIN BARTON INFORMATION SYSTEM SECURITY COMMITMENT: A STUDY OF EXTERNAL INFLUENCES ON SENIOR MANAGEMENT TEJAY 2014
DAWN BEYER CONSTRUCTING A CYBER PREPAREDNESS FRAMEWORK (CPF): THE LOCKHEED MARTIN CASE STUDY LITTMAN 2014
EDWARD BOYER UNDERSTANDING USABILITY-RELATED INFORMATION SECURITY FAILURES IN A HEALTHCARE CONTEXT TEJAY 2014
WALTER BROCK ALTERNATIVE APPROACHES TO CORRECTION OF MALAPROPISMS IN AIML BASED CONVERSATIONAL AGENTS MUKHERJEE 2014
ROBERT BROWN APPLICATION OF CELLULAR AUTOMATA TO DETECTION OF MALICIOUS NETWORK PACKETS CANNADY 2014
MIGUEL BULEJE THE IMPACT OF ENTERPRISE RESOURCE PLANNING SYSTEMS ON SMALL AND MEDIUM ENTERPRISES NYSHADHAM 2014
ROBERT CARTELLI IDENTIFYING E-COMMERCE STRATEGY-MAKING MODES IN SMALL FIRMS NYSHADHAM 2014
SIMON CLEVELAND A CAUSAL MODEL TO PREDICT ORGANIZATIONAL KNOWLEDGE SHARING VIA INFORMATION AND COMMUNICATION TECHNOLOGIES ELLIS 2014
ALEXANDER CORRIS SECURE MOBILE DEPLOYMENT OF NFL TRAINING MATERIALS ABRAMSON 2014
BINH DANG EVALUATION OF UNSUPERVISED LEARNING TECHNIQUES FOR INTRUSION DETECTION IN MOBILE AD HOC NETWORKS LI 2014
FELIX DIAZ USING SPEECH RECOGNITION SOFTWARE TO IMPROVE WRITING SKILLS ABRAMSON 2014
RAGAN DUBOSE-MORRIS AN INTERPRETATIVE PHENOMENOLOGICAL ANALYSIS OF TELEHEALTH CHAMPIONS DRINGUS 2014
CHARLES EDWARDS A FRAMEWORK FOR THE GOVERNANCE OF INFORMATION SECURITY TEJAY 2014
REINALDO FERNANDEZ A COGNITIVE APPRENTICESHIP APPROACH FOR TEACHING ABSTRACT AND COMPLEX SKILLS IN AN ONLINE LEARNING ENVIRONMENT SNYDER 2014
SHMUEL FINK THE IMPACT OF TECHNOLOGY ON THE STUDY OF TALMUD ABRAMSON 2014
GEORGE FORD SPOKEN LANGUAGE IDENTIFICATION FROM PROCESSING AND PATTERN ANALYSIS OF SPECTROGRAMS LASZLO 2014
SARA FOREMAN ASSISTIVE TECHNOLOGIES USED BY STUDENTS WITH ASPERGERS SYNDROME TO IMPROVE ACADEMIC PERFORNANCE IN THE GENERAL EDUCATION CLASSROOM ABRAMSON 2014
NATHANIEL FULLER A CONTEXTUAL MODEL FOR IDENTITY MANAGEMENT (IDM) INTERFACES COHEN 2014
ROBIN GARRETT A STUDY OF THE IMPACTS OF NAVIGATIONAL LINKS, TASK COMPLEXITY, AND THE OLDER USER ON WEBSITE USABILITY IN A COMMUNITY COLLEGE DOMAIN DRINGUS 2014
ARTURO GEIGEL UNSUPERVISED LEARNING TROJAN LI 2014
BENNET HAMMER A PICTURE IS WORTH A THOUSAND WORDS, BUT ARE THEY THE WORDS THAT MATTER? – AN ANALYSIS OF THE EFFECTS OF IMAGE COMMENTS ON SOCIAL NETWORKING SITES PARRISH 2014
MICHELLE HANSEN HELPING CHILDREN WITH AUTISM LEARN WITH MATHEMATICS SOFTWARE ABRAMSON 2014
MARTHA HARRELL FACTORS FOR INFORMATION SECURITY NONCOMPLIANCE: A MACROERGONOMIC PERSPECTIVE TEJAY 2014
RONDA HENNING SECURITY POLICIES THAT MAKE SENSE FOR COMPLEX SYSTEMS: COMPREHENSIBLE FORMALISM FOR THE SYSTEM CONSUMER CANNADY 2014
STEVE HERNANDEZ A METHOD TO REDUCE THE COST OF RESILIENCE BENCHMARKING OF SELF-ADAPTIVE SYSTEMS SIMCO 2014
HUEI-MIN HSU ORGANIZATIONAL CONTEXT INFLUENCES ON KNOWLEDGE SHARING WANG 2014
CORLAND KEATING VALIDATING THE OCTAVE ALLEGRO INFORMATION SYSTEMS RISK ASSESSMENT METHODOLOGY: A CASE STUDY LITTMAN 2014
MARK KOCOUR INVESTIGATION ON THE ADOPTION AND DIFFUSION OF SMARTPHONES IDEA LITTMAN 2014
BRIAN KOWALCZK IMPROVING THE SELECTION OF SURROGATES DURING THE COLD-START PHASE OF A CYBER FORAGING APPLICATION TO INCREASE APPLICATION PERFORMANCE SIMCO 2014
JOHN LANDMESSER IMPROVING IT PORTFOLIO MANAGEMENT DECISION CONFIDENCE USING MULTI-CRITERIA DECISION MAKING AND HYPERVARIATE DISPLAY TECHNIQUES. MUKHERJEE 2014
JOSEPH LUI A BAYESIAN APPROACH TO INTERNATIONAL CHANNEL SELECTION FOR SMES IN THE SOFTWARE INDUSTRY MUKHERJEE 2014
ADNAN MASOOD MEASURING INTEREST IN OUTLIERS WITH EXPLANATION FACILITY USING BAYESIAN BELIEF NETWORKS LI 2014
REGINA MATHIS WEB ONTOLOGY LANGUAGE FOR SCALABLE VECTOR GRAPHICS LASZLO 2014
WILLIAM MCGARVEY EVALUATING HEURISTICS AND CROWDING ON CENTER SELECTION IN K-MEANS GENETIC ALGORITHMS MUKHERJEE 2014
DIANA MOORE AN INVESTIGATION OF THE ATTRITION OF AFRICAN-AMERICAN STUDENTS IN AN ONLINE UNDERGRADUATE PROGRAM TERRELL 2014
KIMBERLY MORICK AN INVESTIGATION OF THE DAYTON REGIONAL STEM SCHOOL PUBLIC-PRIVATE PARTNERSHIPS TERRELL 2014
WINSTON NINH PERFORMANCE COMPARISON OF PROJECTIVE ELLIPTIC-CURVE POINT MULTIPLICATION IN 64-BIT X86 RUNTIME ENVIRONMENT LI 2014
STEPHEN ORR A VALUE-FOCUSED ASSESSMENT OF KNOWLEDGE SHARING IN A CLOSED INFORMATION ENVIRONMENT ZINK 2014
ANGEL OTERO AN INFORMATION SECURITY CONTROL ASSESSMENT METHODOLOGY FOR ORGANIZATIONS TEJAY 2014
DAVID SHRADER DYNAMIC PRICING IN HETEROGENEOUS WIRELESS CELLULAR NETWORKS SIMCO 2014
MICHAEL SNIDER UNIT TESTING ASPECTS USING INTERFACES WITH MOCK OBJECTS MITROPOULOS 2014
DIANNE SOLOMON EMPLOYEE AND ORGANIZATION SECURITY VALUE ALIGNMENT THROUGH VALUE SENSITIVE SECURITY POLICY DESIGN COHEN 2014
BRUCE SOWERS AN INVESTIGATION OF THE ROLE OF TECHNOLOGY IN INSTRUCTIONAL DESIGNERS DECISION-MAKING SNYDER 2014
JAMES SPRUILL A STUDY OF THE 8TH GRADE TECHNOLOGY LITERACY OF MICHIGAN CHARTER SCHOOL WANG 2014
TARYN STEVENSON SERVING MILITARY FAMILIES: USING SOLUTION-FOCUSED THERAPY IN A VIRTUAL ENVIRONMENT TERRELL 2014
CLAUDIO TAGLIENTI THE USER ATTRIBUTION PROBLEM AND THE CHALLENGE OF PERSISTENT SURVEILLANCE OF USER ACTIVITY IN COMPLEX NETWORKS CANNADY 2014
WENDY TU DESIGNING FOR STATISTICAL REASONING AND THINKING IN A TECHNOLOGY-ENHANCED LEARNING ENVIRONMENT SNYDER 2014
RUTH WELDON USING SIMULATED ANNEALING FOR ROBUSTNESS IN COEVOLUTIONARY GENETIC ALGORITHMS LASZLO 2014
ANN AKSUT POPULATION-BASED ANT COLONY OPTIMIZATION FOR MULTIVARIATE MICROAGGREGATION. MUKHERJEE 2013
SAMI AL-SALMAN THE ROLE OF FACULTY IN THE EFFECTIVENESS OF FULLY ONLINE PROGRAMS ABRAMSON 2013
GEORGE AMBROSE ADVISING E-PORTFOLIOS TO IMPROVE FIRST GENERATION STUDENT ENGAGEMENT IN HIGHER EDUCATION ABRAMSON 2013
GREGORY BLOCK REDUCING COGNITIVE LOAD USING UNCERTAINTY VISUALIZATION COHEN 2013
JAMES BOGGS ACCESSING GEOSPATIAL SERVICES IN LIMITED BANDWIDTH SERVICE-ORIENTED ARCHITECTURE (SOA) ENVIRONMENTS LITTMAN 2013
GWENDOLYN BRITTON INTEGRATION AND ABILITY OF ONLINE UNDERGRADUATE INFORMATION TECHNOLOGY PROJECT-BASED CAPSTONE EXPERIENCES ENHANCING SOFT SKILLS DEVELOPMENT ELLIS 2013
JAMES BURRELL COMPARISON OF TEXT INPUT AND INTERACTION IN A MOBILE LEARNING ENVIRONMENT DRINGUS 2013
URIEL CARRASQUILLA REDUCING THE CUMULATIVE FILE DOWNLOAD TIME AND VARIANCE IN A P2P OVERLAY VIA PROXIMITY BASED PEER SELECTION LIU 2013
MIN SUK CHOI ASSESSING THE ROLE OF USER COMPUTER SELF-EFFICACY, CYBERSECURITY COUNTERMEASURES AWARENESS, AND CYBERSECURITY SKILLS TOWARD COMPUTER MISUSE INTENTION AT GOVERNMENT AGENCIES LEVY 2013
PAUL COMITZ A SOFTWARE FACTORY FOR AIR TRAFFIC DATA LASZLO 2013
KATHLEEN COOL INFORMAL LEARNING AS PERFORMANCE: TOWARD A HERMENEUTIC PHENOMENOLOGY OF MUSEUM LEARNING IN SECOND LIFE TERRELL 2013
ALICIA DAVID MOTIVATED LEARNING IN INTRODUCTORY ONLINE COLLEGE COURSES: DO MOTIVATIONAL MESSAGES MATTER? SNYDER 2013
JOHN DEAN AN ASPECT POINTCUT FOR PARALLELIZABLE LOOPS MITROPOULOS 2013
MATTHEW DEVINE GLOGS AS NON-ROUTINE PROBLEM SOLVING TOOLS IN MATHEMATICS TERRELL 2013
DARSHAN DOMAH THE NERV METHODOLOGY: NON-FUNCTIONAL REQUIREMENTS ELICITATION, REASONING AND VALIDATION IN AGILE PROCESSES MITROPOULOS 2013
AUDREY GENDREAU ENHANCED DEPLOYMENT STRATEGY FOR ROLE-BASED HIERARCHICAL APPLICATION AGENTS IN WIRELESS SENSOR NETWORKS WITH ESTABLISHED CLUSTERHEADS CANNADY 2013
CHRISTIAN GRAHAM AN EXAMINATION OF THE TYPE OF LEADERSHIP AMONG GENERATION Y LEADERS AND ITS IMPACT ON VIRTUAL TEAM BEHAVIOR COHEN 2013
STEPHANIE GURLEN SECURITY DESIGN FLAWS THAT AFFECT USABILITY IN ONLINE BANKING COHEN 2013
YOURIK HACOUPIAN MINING ASPECTS THROUGH CLUSTER ANALYSIS USING SUPPORT VECTOR MACHINES AND GENETIC ALGORITHMS MITROPOULOS 2013
RAYMOND HALPER A POWER CONSERVATION METHODOLOGY FOR HARD DRIVES BY COMBINING PREFETCHING ALGORITHMS AND FLASH MEMORY SIMCO 2013
MARK HARRIS ELEMENTS OF A KNOWLEDGE MANAGEMENT GUIDE FOR PUBLIC SECTOR ORGANIZATIONS ABRAMSON 2013
KATHARINE HIXSON DEVELOPING AND EVALUATING TEAM TRAINING PROGRAMS FOR LONG-DURATION SPACEFLIGHT CREWS ABRAMSON 2013
JAMES JAUREZ DEVELOPMENT OF A MEDIA DRIVEN ONLINE ASSESSMENT FRAMEWORK: IMPROVING QUALITY, FREQUENCY, AND DEPLOYMENT OF GRADES AND FEEDBACK IN HIGHER EDUCATION WANG 2013
RUSSELL JOHNSON AUTHORSHIP ATTRIBUTION WITH FUNCTION WORD N-GRAMS LASZLO 2013
GREGORY JULOCK THE EFFECTIVENESS OF A RANDOM FORESTS MODEL IN DETECTING NETWORK-BASED BUFFER OVERFLOW ATTACKS LI 2013
DONNA KENNEDY AN INVESTIGATION OF CANDIDATES’ LIVED EXPERIENCE OF ATTRITION IN A LIMITED-RESIDENCY DOCTORAL PROGRAM TERRELL 2013
JAMES KIPER COORDINATING TRAINING PROGRAMS WITH BUSINESS PROCESSES IN LARGE ORGANIZATIONS ELLIS 2013
JACOB KRIVE EFFECTIVENESS OF EVIDENCE-BASED CPOE MEDICATION ORDER SETS MEASURED BY HEALTH OUTCOMES ZINK 2013
DANIEL KRUTZ CONCOLIC CODE CLONE DETECTION MITROPOULOS 2013
CAROLYN LAMACCHIA TECHNIQUE FOR IMPROVING THE SCALABILITY OF AN EXACT APPROACH FOR FREQUENT ITEMSET HIDING MUKHERJEE 2013
LERONE LATOUCHE USABILITY ISSUES IN THE USER INTERFACES OF PRIVACY-ENHANCING TECHNOLOGIES COHEN 2013
JEFFREY LINNEY ASSESSING BEHAVIORAL INTENTION TO USE LOW SOCIAL PRESENCE ICTS FOR INTERPERSONAL TASK COMPLETION AMONG COLLEGE STUDENTS: WITH SPECIAL CONSIDERATION TOWARD SHORT MESSAGE SERVICE (SMS) TEXT-MESSAGING ELLIS 2013
HERNAN LONDONO THE EFFECTS OF CROSSCUTTING HOMOGENEITY ON THE EVOLVABILITY OF ASPECT ORIENTED SOFTWARE MITROPOULOS 2013
MARGARET LONG E-BUSINESS REPORTING: TOWARDS A GLOBAL STANDARD FOR FINANCIAL REPORTING SYSTEMS USING XBRL NYSHADHAM 2013
RICHARD MACMILLAN EXAMINING THE ADOPTION OF DONOR MANAGEMENT SYSTEMS (DMS) IN NOT-FOR–PROFIT (NFP) ORGANIZATIONS WITH AN EXTENDED TAM WANG 2013
FRANCIS MANNING A FRAMEWORK FOR ENFORCING ROLE BASED ACCESS CONTROL IN OPEN SOURCE SOFTWARE MITROPOULOS 2013
KATHLEEN MARRS AN INVESTIGATION OF THE FACTORS THAT INFLUENCE FACULTY AND STUDENT ACCEPTANCE OF MOBILE LEARNING IN ONLINE HIGHER EDUCATION LITTMAN 2013
JACK MASON A HYBRID ARCHITECTURE FOR CONTEXT PRESERVATION DURING THREAD LEVEL SPECULATIVE EXECUTION SIMCO 2013
CHARLES MAYBERRY THE IMPACT OF AUGMENTED REALITY TRAINING ON PERFORMANCE ABRAMSON 2013
RICHARD MERRITTS ONLINE DECEPTION DETECTION USING BDI AGENTS CANNADY 2013
RICHARD MISLAN AN ANALYSIS OF MOBILE PHONE FORENSIC REPORTS AS TRIAGE TOOLS FOR GATHERING ON-SCENE INTELLIGENCE COHEN 2013
CHIOU MOH DEVELOPMENT AND ASSESSMENT OF MOBILE DEVICE SUPPORT FOR CERTIFICATION EXAM PREPARATION WANG 2013
DAVID MOORE ASPECTASSAY: A TECHNIQUE FOR EXPANDING THE POOL OF AVAILABLE ASPECT MINING TEST DATA USING CONCERN SEEDING MITROPOULOS 2013
AUGUST MURRAY IMPACT OF MILITARY DEPLOYMENT AND DISTANCE LEARNING ON SOLDIER-STUDENTS ABRAMSON 2013
BARBARA NEEQUAYE A MATURITY MODEL FOR ONLINE CLASSES ACROSS ACADEMIC DISCIPLINES ABRAMSON 2013
SANG NGUYEN MEASURING END-TO-END AJAX PERFORMANCE IN BROADBAND SATELLITE NETWORKS SIMCO 2013
MARIA PARES TORAL THE EFFECT OF THE USE OF THE 3-D MULTI-USER VIRTUAL ENVIRONMENT SECOND LIFE ON STUDENT MOTIVATION AND LANGUAGE PROFICIENCY IN COURSES OF SPANISH AS A FOREIGN LANGUAGE TERRELL 2013
SHARON PARKER AN EXPLORATION OF THE FACTORS INFLUENCING THE ADOPTION OF AN IS GOVERNANCE FRAMEWORK. ACKERMAN 2013
JERRY PEREZ AN INVESTIGATION OF RUN-TIME OPERATIONS IN A HETEROGENEOUS DESKTOP GRID ENVIRONMENT: THE TEXAS TECH UNIVERSITY (TTU) DESKTOP GRID CASE STUDY LITTMAN 2013
LEVI PERIGO AN EXAMINATION OF THE DESIGN, DEVELOPMENT, AND IMPLEMENTATION OF AN INTERNET PROTOCOL VERSION 6 (IPV6) NETWORK INFRASTRUCTURE: THE ADTRAN INC. CASE STUDY LITTMAN 2013
KELLIE PRICE USING VISUAL TECHNOLOGIES IN THE INTRODUCTORY PROGRAMMING COURSE FOR COMPUTER SCIENCE MAJORS ABRAMSON 2013
JOHN QUEERN AN EVOLUTIONARY ALGORITHM FOR THE CONSTRAINED FOREST PROBLEM. MUKHERJEE 2013
SCOTT RAGSDALE PURSUING AND COMPLETING AN UNDERGRADUATE COMPUTING DEGREE FROM A FEMALE PERSPECTIVE: A QUANTITATIVE AND QUALITATIVE ANALYSIS TERRELL 2013
JAIME RAIGOZA TEMPORAL JOIN PROCESSING WITH HILBERT CURVE SPACE MAPPING SUN 2013
JAMES RENEAU AN EXAMINATION OF THE ACCEPTANCE, ADOPTION, AND DIFFUSION OF SMARTPHONE DEVICES WITH SENIOR CITIZENS COHEN 2013
SUSAN RIZZO MAKING THE SHIFT: A PHENOMENOLOGICAL STUDY OF TEACHERS’ EXPERIENCES IN A STUDENT-CENTERED, 21ST CENTURY LAPTOP PROGRAM SNYDER 2013
JEFFREY ROACH PREDICTING REALISTIC STANDING POSTURES IN A REAL-TIME ENVIRONMENT LASZLO 2013
STEPHEN ROCHE EFFECTIVENESS OF ONLINE EDUCATION WITHIN THE AFFECTIVE DOMAIN TERRELL 2013
KIMBERLEE ROUND DEVELOPMENT AND EVALUATION OF HAWKLEARN: A NEXT GENERATION LEARNING MANAGEMENT SYSTEM ABRAMSON 2013
WILLIAM SAUSE A COORDINATED REINFORCEMENT LEARNING FRAMEWORK FOR MULTI-AGENT VIRTUAL ENVIRONMENTS LASZLO 2013
VINCENT SCOVETTA THE IMPACT OF LEADERSHIP SOCIAL POWER ON KNOWLEDGE MANAGEMENT SUCCESS ELLIS 2013
BILLY SHREWSBURY SUPERVISED LEARNING METHODS TO ENHANCE CUSTOMER LIFETIME VALUE MODELS FOR MULTI-CHANNEL RETAIL SALES ORGANIZATIONS MUKHERJEE 2013
GARRETT SMILEY INVESTIGATING THE ROLE OF MULTIBIOMETRIC AUTHENTICATION ON PROFESSIONAL CERTIFICATION E-EXAMINATION LEVY 2013
LAWRENCE SNYDER THE EFFECTIVENESS OF VIRTUAL LEARNING TOOLS FOR MILLENNIAL GENERATION STUDENTS IN A COMMUNITY COLLEGE CRIMINAL JUSTICE DEGREE PROGRAM WANG 2013
JOSHUA STALKER A READING PREFERENCE AND RISK TAXONOMY FOR PRINTED PROPRIETARY INFORMATION COMPROMISE IN THE AEROSPOACE AND DEFENSE INDUSTRY LEVY 2013
ERIC STRAW CONSTRUCTION OF A CONCEPTUALIZATION OF PERSONAL KNOWLEDGE WITHIN A KNOWLEDGE MANAGEMENT PERSPECTIVE USING GROUNDED THEORY METHODOLOGY ELLIS 2013
LAWRENCE TAUB APPLICATION OF A LAYERED HIDDEN MARKOV MODEL IN THE DETECTION OF NETWORK ATTACKS CANNADY 2013
MATTHEW TENNYSON AUTHORSHIP ATTRIBUTION OF SOURCE CODE MITROPOULOS 2013
HICHAM TOUT PHISHTEST: MEASURING THE IMPACT OF EMAIL HEADERS ON THE PREDICTIVE ACCURACY OF MACHINE LEARNING TECHNIQUES LI 2013
MARY VICKS AN EXAMINATION OF INTERNET FILTERING AND SAFETY POLICY TRENDS AND ISSUES IN SOUTH CAROLINA’S K-12 PUBLIC SCHOOLS ZINK 2013
STANIE WADDELL A STUDY OF THE EFFECT OF INFORMATION SECURITY POLICIES ON INFORMATION SECURITY BREACHES IN HIGHER EDUCATION INSTITUTIONS WANG 2013
KENNETH WHITE EMPLOYEE DETERMINANTS TO SHARE KNOWLEDGE IN A U.S. FEDERAL GOVERNMENT ENVIRONMENT: AN EXPLORATORY STUDY ZINK 2013
RICHARD WILKINS DOWNLOAD TIME REDUCTION USING RECENT PERFORMANCE-BIASED PEER REPLACEMENT IN STOCHASTIC P2P CONTENT DELIVERY NETWORKS SIMCO 2013
SHARON WRIGHT EXAMINING THE IMPACT OF COLLABORATION TECHNOLOGY TRAINING SUPPORT ON VIRTUAL TEAM COLLABORATION EFFECTIVENESS ELLIS 2013
DANIEL YOAS USING FORECASTING TO PREDICT LONG-TERM RESOURCE UTILIZATION FOR WEB SERVICES SIMCO 2013
FAYEZ ABBOUD UTILIZING IMAGE-BASED FORMATS TO OPTIMIZE PATTERN DATA FORMAT AND PROCESSING IN MASK AND MASKLESS PATTERN GENERATION LITHOGRAPHY LIU 2012
BARRY AHRENS A TOUR CONSTRUCTION FRAMEWORK FOR THE TRAVELLING SALESMAN PROBLEM LI 2012
RAMI ALNATSHEH FREQUENT ITEMSET HIDING ALGORITHM USING FREQUENT PATTERN TREE APPROACH. MUKHERJEE 2012
ALBERT BALL A COMPARISON OF PERSONAL INFORMATION SHARING AWARENESS, HABITS, AND PRACTICES OF USERS IN SOCIAL NETWORKING SITES AND E-LEARNING SYSTEMS LEVY 2012
KAREN BARON INCORPORATING PERSONAL HEALTH RECORDS INTO THE DISEASE MANAGEMENT OF RURAL HEART FAILURE PATIENTS ABRAMSON 2012
DONALD BESS UNDERSTANDING INFORMATION SECURITY CULTURE IN A ORGANIZATION: AN INTERPRETATIVE CASE STUDY TEJAY 2012
AVRIL BEST ONLINE ACADEMIC SUPPORT PEER GROUPS FOR MEDICAL UNDERGRADUATES ABRAMSON 2012
SANDRA BOESCH A STUDY OF TARGETED INFORMATION SYSTEM ACCESSIBILITY AND USAGE BY THE FOREIGN DOMESTIC WORKER IN SINGAPORE COHEN 2012
JOHN BONO THE INFLUENCE OF WEB SITE AESTHETICS ON IMPULSE PURCHASE BEHAVIOR WITHIN ONLINE RETAILING ENVIRONMENTS COHEN 2012
LINDA BROCK THE MARKET VALUE OF INFORMATION SYSTEM (IS) SECURITY: AN EVENT STUDY OF E-BANKING SERVICE PROVIDERS LITTMAN 2012
DEXTER BROWN A COMPARATIVE ANALYSIS OF MACHINE LEARNING TECHNIQUES FOR FORECLOSURE PREDICTION. MUKHERJEE 2012
PAUL CERKEZ AUTOMATED DETECTION OF SEMAGRAM LADEN IMAGES CANNADY 2012
FIRAS CHAHINE A GENETIC ALGORITHM THAT EXCHANGES NEIGHBORING CENTERS FOR FUZZY C-MEANS CLUSTERING. MUKHERJEE 2012
RAMADHAN CHUMA INVESTIGATING THE IMPACT OF SELF-CONTROL AND DETERRENTS ON NONCOMPLIANT INFORMATION SECURITY BEHAVIOR TEJAY 2012
JEEVAN D'SOUZA REGION-BASED CROSSOVER FOR CLUSTERING PROBLEMS LASZLO 2012
STEPHEN DINKEL UNCERTAINTY REASONING FOR SERVICE-BASED SITUATIONAL AWARENESS INFORMATION ON THE SEMANTIC WEB HAFNER 2012
HENRY DIRSKA A DECLARATIVE RULES API FOR MANAGING ADAPTATION RELATIONSHIPS IN CONTEXT-ORIENTED PROGRAMMING LASZLO 2012
GARY DOSS AN APPROACH TO EFFECTIVELY IDENTIFY INSIDER ATTACKS WITHIN AN ORGANIZATION TEJAY 2012
JOHN FREUND CONSTRUCTING A COMMUNITY RESPONSE GRID: THE DUBLIN, OHIO CASE STUDY LITTMAN 2012
GLENDA GAY A STUDY OF TECHNOLOGICAL BARRIERS TO INSTRUCTOR E-READINESS IN AN ONLINE ENVIRONMENT DRINGUS 2012
BARBARA HARBULA AN EXAMINATION OF TEACHERS INTEGRATION OF WEB 2.0 TECHNOLOGIES IN SECONDARY CLASSROOMS: A PHENOMENOLOGICAL RESEARCH STUDY WANG 2012
JEREMY HARRIS TOWARDS AN INTERNET-BASED DISTANCE EDUCATION (IDE) FRAMEWORK FOR RELIGIOUS-BASED HIGHER EDUCATION ORGANIZATIONS: A CASE OF THE ALLIANCE FOR ASSEMBLIES OF GOD HIGHER EDUCATION TERRELL 2012
KENRIE HYLTON AN EXPERIMENT USING WEBCAM-BASED SURVEILLANCE TO DETER INFORMATION SYSTEMS MISUSE LEVY 2012
JACK HYMAN TOWARDS AN UNDERSTANDING OF CONTEXTUAL USABILITY AND ITS IMPACT ON MOBILE COMMERCE COHEN 2012
RICARDO JIMENEZ A COMPARISON OF A YOUNG AND OLDER ADULT POPULATION OF COMPUTER USERS’ RECOGNITION RATES OF DIFFERENT TACTONS USING MODULATION AND SIMPLE-WAVEFORMS AS STIMULUS PARAMETERS. COHEN 2012
GERALD JOHNSON DEVELOPMENT OF AN AUDIT CLASSIFICATION INDEX (ACI) FOR FEDERAL E-LEARNING SYSTEMS SECURITY VULNERABILITIES LEVY 2012
STEPHAN JUNION INSTRUCTIONAL DESIGN STRATEGIES AND ACTIVITIES THAT INFORM THE COMMUNITY OF INQUIRY (COI) FRAMEWORK SNYDER 2012
RONALD KRAWITZ CLONE CODE DISCOVERY BASED ON FUNCTIONAL BEHAVIOR MITROPOULOS 2012
DAVID KUMKA QUANTIFYING PERFORMANCE COSTS OF DATABASE FINE-GRAINED ACCESS SUN 2012
SANDRA LEBRON-LOZADA LEARNING CONVERSATIONAL ENGLISH WITH STUDENT-GENERATED PODCASTS ABRAMSON 2012
GARY LIEBERMAN SECURELY HANDLING INTER-APPLICATION CONNECTION CREDENTIALS MITROPOULOS 2012
YAN LIU CORRELATION OF SOFTWARE QUALITY METRICS AND PERFORMANCE MITROPOULOS 2012
MICHAEL LOHLE IMPLICATIONS FOR REAL PROJECT MANAGEMENT SUCCESS: A STUDY OF AVATAR IDENTITY AS AN ANTECEDENT OF VIRTUAL TEAM TRUST TERRELL 2012
ROBERT MATTHEWS A PORTRAIT OF THE EARLY 21ST CENTURY MBA ABRAMSON 2012
HERBERT MATTORD ASSESSMENT OF WEB-BASED AUTHENTICATION METHODS IN THE U.S.: COMPARING E-LEARNING SYSTEMS TO INTERNET HEALTHCARE INFORMATION SYSTEMS LEVY 2012
DANA MAXIE THE IMPACT OF DATA-DRIVEN DECISION MAKING ON EDUCATIONAL PRACTICE IN LOUISIANA SCHOOLS ABRAMSON 2012
DONALD MCKAY II INFORMATION TECHNOLOGY PROJECT LEARNING PRACTICES AND PROJECT PERFORMANCE ELLIS 2012
DOUGLAS MILLER THE EFFECT OF INTERACTIVE TELEVISION AS AN INSTRUCTION DELIVERY METHOD IN RURAL SECONDARY SCHOOLS ON LEARNER ACHIEVEMENT, MOTIVATION AND ANXIETY TERRELL 2012
GLORIA MIYARES UNDERACHIEVING GIFTED SCIENCE STUDENTS AND MULTI-USER VIRTUAL ENVIRONMENTS TERRELL 2012
DENNIS MIZE A STUDY OF REQUIREMENTS VOLATILITY AND FOOTPRINT VISUALIZATION PROPERTIES IN EVOLVING USE CASE DATA SETS MITROPOULOS 2012
EDWIN NASSIFF UNDERSTANDING THE VALUE OF ENTERPRISE ARCHITECTURE FOR ORGANIZATIONS: A GROUNDED THEORY APPROACH TEJAY 2012
WAYNE PAULEY AN EMPIRICAL STUDY OF PRIVACY RISK ASSESSMENT METHODOLOGIES IN CLOUD COMPUTING ENVIRONMENTS HAFNER 2012
SYED RAZA SELECTING ONLINE VENDORS BY PRIVACY RISKS SEAGULL 2012
DAVID REIS AN EXAMINATION OF AN INFORMATION SECURITY FRAMEWORK IMPLEMENTATION BASED ON AGILE VALUES TO ACHIEVE HIPAA SECURITY RULE COMPLIANCE IN AN ACADEMIC MEDICAL CENTER: THE THOMAS JEFFERSON UNIV. CASE STUDY LITTMAN 2012
HERNAN RUF A COMPARATIVE STUDY ON ELECTRONIC VS. TRADITIONAL DATA COLLECTION IN A SPECIAL EDUCATION SETTING DRINGUS 2012
DEREK SEDLACK REDUCING INCONGRUITY OF PERCEPTIONS RELATED TO INFORMATION RISK: DIALOGICAL ACTION RESEARCH IN ORGANIZATIONS TEJAY 2012
FARNAZ SHARIFRAZI THE INVESTIGATION OF A SYNCHRONOUS ENGAGEMENT SYSTEMS (SES) TO ALLEVIATE ANXIETY AMONG ELEARNING STUDENTS IN AN MBA PROGRAM WANG 2012
DEVENA SINGLETON THE TRANSITION FROM TRADITIONAL TO BLENDED ON-CAMPUS LEARNING EXPERIENCE ABRAMSON 2012
NANCY SMITH EVOLVING CREDIBLE FACIAL EXPRESSIONS WITH INTERACTIVE GAS LASZLO 2012
FOREST THOLA MINIMIZING RECOMMENDER ERROR COSTS UNDER NOISY INPUTS IN RULE-BASED EXPERT SYSTEMS. MUKHERJEE 2012
GERRY VAN LOON TOWARD AN UNDERSTANDING OF INTERNET WORD OF MOUTH MESSAGE CONTENT AND THE BOOKING INTENTIONS OF LODGING CONSUMERS NYSHADHAM 2012
KAREN VIGNARE AN INVESTIGATION OF TRADITIONAL STUDENTS PREFERENCES FOR SOCIAL AND TEACHING PRESENCE IN ONLINE LEARNING DRINGUS 2012
RAYMOND WELLS AN EMPIRICAL ASSESSMENT OF FACTORS CONTRIBUTING TO INDIVIDUALS’ PROPENSITY TO COMMIT SOFTWARE PIRACY IN THE BAHAMAS LEVY 2012
ELIZABETH YAGODZINSKI FORMATIVE RESEARCH ON AN INSTRUCTIONAL DESIGN THEORY FOR ONLINE LEARNING COMMUNITIES: A HIGHER EDUCATION FACULTY DEVELOPMENT CASE SNYDER 2012
JILL YOUNG ANALYZING E-VOTING MACHINE TABULATIONS: A CASE STUDY TO DETERMINE THE ACCURACY OF E-VOTING MACHINES USED IN THE STATE OF MISSOURI LITTMAN 2012
RAYMOND ANGELO COLLABORATIVE GROUP LEARNING AND KNOWLEDGE BUILDING TO ADDRESS INFORMATION SYSTEMS PROJECT FAILURE DRINGUS 2011
MOHAMMAD AWWAL AN EMPIRICAL INVESTIGATION OF THE RELATIONSHIP BETWEEN COMPUTER SELF-EFFICACY AND INFORMATION PRIVACY CONCERNS HAFNER 2011
RITA BARRIOS AN ADAPTIVE DATABASE INTRUSION DETECTION SYSTEM CANNADY 2011
MAX BAUMGARTNER INSTRUCTIONAL TECHNOLOGIES IN GRADUATE PHYSICAL THERAPY COURSES ABRAMSON 2011
HARPREET BHASIN AN EVOLUTIONARY ALGORITHM FOR FEATURE SUBSET SELECTION IN HARD DISK DRIVE FAILURE PREDICTION. MUKHERJEE 2011
ANITA BLEFFERT-SCHMIDT THE BLENDED LEARNING EXPERIENCE OF COMMUNITY COLLEGE STUDENTS ABRAMSON 2011
STEPHEN BRONSBURG THE IMPACT OF AN OSTEOPATHIC MEDICAL PROGRAM ON INFORMATION TECHNOLOGY SKILLS OF PHYSICIANS ENTERING THE HEALTHCARE WORKFORCE LEVY 2011
CARLTON CUNNINGHAM USING LEARNER-CONTROLLED EXTRINSIC MOTIVATORS TO INCREASE ACHIEVEMENT IN TECHNOLOGY-ENHANCED FLEXIBLE LEARNING ENVIRONMENTS WANG 2011
KIMBERLEY DUNKERLEY DEVELOPING AN INFORMATION SYSTEMS SECURITY SUCCESS MODEL FOR ORGANIZATIONAL CONTEXT TEJAY 2011
CRIS EWELL DETECTION OF DEVIATIONS FROM AUTHORIZED NETWORK ACTIVITY USING DYNAMIC BAYESIAN NETWORKS CANNADY 2011
WEAM FARID THE NORMAP METHODOLOGY: NON-FUNCTIONAL REQUIREMENTS MODELING FOR AGILE PROCESSES MITROPOULOS 2011
JEAN FRENCH AUTOMATIC VIDEO INDEXING: IDENTIFICATION OF AFFECTIVE CONTENT USING WELL-DEFINED EMOTIONAL CATEGORIES HAFNER 2011
DEBORAH GEARS WIKI BEHAVIOR IN THE WORKPLACE: EMOTIONAL ASPECTS OF CONTENT ZINK 2011
MARK GIVENS THE IMPACT OF NEW INFORMATION TECHNOLOGY ON BUREAUCRATIC ORGANIZATIONAL CULTURE ABRAMSON 2011
IAN GREAVES AN INVESTIGATION OF ENTERPRISE RESOURCE PLANNING (ERP) AND SUPPORTING TECHNOLOGIES ACKERMAN 2011
WILLIAM HEATON NEW RECORD ORDERING HEURISTICS FOR MULTIVARIATE MICROAGGREGATION MUKHERJEE 2011
PETER HOLUB THE INFLUENCE OF NARRATIVE IN FOSTERING AFFECTIVE DEVELOPMENT OF MEDICAL PROFESSIONALISM IN AN ONLINE CLASS TERRELL 2011
YA-CHEN KAO A STUDY OF TEACHER-STUDENT COLLABORATION ON COURSE DESIGN WITH TECHNOLOGY AT WENZAO URSULINE COLLEGE OF LANGUAGES IN TAIWAN WANG 2011
ROBERT KEMERLING CONTROLLING WITH MODEL TREES MUKHERJEE 2011
PETR KRAUS SCALABLE METHODOLOGY FOR PERFORMANCE-BASED SELECTION OF SECURITY SERVICES FOR DISTRIBUTED SYSTEMS SIMCO 2011
ALLY LEE AN EMPIRICAL INVESTIGATION OF THE ROLE OF INFORMATION QUALITY IN CITIZENS’ TRUST IN E-GOVERNMENT SYSTEMS LEVY 2011
DIETRICK LEWIS THE PRINCIPAL AS TECHNOLOGY INTEGRATION LEADER ABRAMSON 2011
BERNARD LICHVAR AN EMPIRICAL INVESTIGATION OF THE EFFECT OF KNOWLEDGE SHARING AND ENCOURAGEMENT OF OTHERS IN PREDICTING COMPUTER SELF-EFFICACY AND USE OF IS IN THE WORKPLACE LEVY 2011
WILLIAM LINDSEY THE RELATIONSHIP BETWEEN PERSONALITY TYPE AND SOFTWARE USABILITY USING THE MYERS-BRIGGS TYPE INDICATOR (MBTI) AND THE SOFTWARE USABILITY MEASUREMENT INVENTORY (SUMI) COHEN 2011
ELIZABETH MADDREY THE EFFECT OF PROBLEM SOLVING INSTRUCTION ON THE PROGRAMMING SELF-EFFICACY OF INTRODUCTORY COMPUTER SCIENCE STUDENTS TERRELL 2011
DUNG MAI A HEURISTIC FOR THE CONSTRAINED ONE-SIDED TWO-LAYERED CROSSING REDUCTION PROBLEM FOR DYNAMIC GRAPH LAYOUT LASZLO 2011
GARY MANSI AN ASSESSMENT OF INSTANT MESSAGING INTERRUPTIONS ON KNOWLEDGE WORKERS’ TASK PERFORMANCE IN E-LEARNING-BASED TRAINING LEVY 2011
ROBERT MASON INTEROPERABILITY GAP CHALLENGES FOR LEARNING OBJECT REPOSITORIES AND LEARNING MANAGEMENT SYSTEMS ELLIS 2011
BARRY MCINTOSH AN ETHNOGRAPHIC INVESTIGATION OF THE ASSIMILATION OF NEW ORGANIZATIONAL MEMBERS INTO AN INFORMATION SECURITY CULTURE TEJAY 2011
WAYNE MIER INVESTIGATING THE USE AND EFFECTIVENESS OF PRINCIPLES LEARNED IN AN ONLINE FACULTY-TRAINING PROGRAM TERRELL 2011
MARIO MISSAKIAN ANALYTIC HIERARCHY PROCESS BASED RECOMMENDER SYSTEM FOR MODEL SELECTION. MUKHERJEE 2011
BRUCE MONTGOMERY THE IMPACT OF THE USER INTERFACE ON SIMULATION USABILITY AND SOLUTION QUALITY COHEN 2011
CONSTANCE MUSSA A PRUDENT ACCESS CONTROL BEHAVIORAL INTENTION MODEL FOR THE HEALTHCARE DOMAIN COHEN 2011
ADAM NORTEN NURSES ACCEPTANCE OF RFID TECHNOLOGY IN A MANDATORY-USE ENVIRONMENT LITTMAN 2011
CHARLES PAK NEAR REAL-TIME RISK ASSESSMENT USING HIDDEN MARKOV MODELS CANNADY 2011
MARXAN PESCETTA TEACHING DIGITAL CITIZENSHIP IN A GLOBAL ACADEMY ABRAMSON 2011
RENATA RAND MCFADDEN ASPECT MINING USING MODEL-BASED CLUSTERING MITROPOULOS 2011
MARK SANBORN MICROCLIMATE HABITAT MONITORING: WIRELESS SENSOR NETWORKS LITTMAN 2011
BABAK SHORAKA AN EMPIRICAL INVESTIGATION OF THE ECONOMIC VALUE OF INFORMATION SECURITY MANAGEMENT SYSTEM STANDARDS TEJAY 2011
JESSICA SMITH COMPUTER MUSIC COMPOSITION USING CROWDSOURCING AND GENETIC ALGORITHMS COHEN 2011
WILLIAM TRIBBEY CONSTRUCTION AND ANALYSIS OF VECTOR SPACE MODELS FOR USE IN ASPECT MINING MITROPOULOS 2011
DENNIS VICKERS A DOMAIN AWARE GENETIC ALGORITHM FOR THE P-MEDIAN PROBLEM. MUKHERJEE 2011
DONGQING YUAN DEVELOPING AND EVALUATING OPEN SOURCE NETWORK LABORATORY AND CURRICULUM WANG 2011
MARY ANGELES USE OF DYNAMIC POOL SIZE TO REGULATE SELECTION PRESSURE IN COOPERATIVE COEVOLUTION ALGORITHMS LASZLO 2010
JAMES BRADY AN INVESTIGATION OF FACTORS THAT AFFECT HIPPA SECURITY COMPLIANCE IN ACADEMIC MEDICAL CENTERS LITTMAN 2010
MICHAEL BROWN A SPECIES-CONSERVING GENETIC ALGORITHM FOR MULTIMODAL OPTIMIZATION LASZLO 2010
JESSIE BURNS AN INVESTIGATION OF MULTIPLE INTEGRATION TECHNIQUES FOR INFORMATION SYSTEMS: A MODEL FOR INTEGRATING DATA WAREHOUSING, ERP, AND SOA IN PRACTICE SCIGLIANO 2010
CHUN-I CHEN FACTORS AFFECTING BUSINESS-TO-BUSINESS ELECTRONIC COMMERCE SUCCESS: AN EMPIRICAL INVESTIGATION NYSHADHAM 2010
MARLON CLARKE THE ROLE OF SELF-EFFICACY IN COMPUTER SECURITY BEHAVIOR: DEVELOPING THE CONSTRUCT OF COMPUTER SECURITY SELF-EFFICACY (CSSE) LEVY 2010
ERIC DITRICH AN EVOLUTIONARY METHOD FOR COMPLEMENTARY CELL SUPPRESSION. MUKHERJEE 2010
NORAIDA DOMINGUEZ FLORES ONLINE LEARNING COMMUNITIES: ENHANCING THE ACQUISITION OF INFORMATION SKILLS BY UNDERGRADUATE STUDENTS OF THE UNIVERSITY OF PUERTO RICO AT CAROLINA WANG 2010
CRYSTAL EDGE QUANTITATIVE ASSESSMENT OF THE MODULARIZATION OF SECURITY DESIGN PATTERNS WITH ASPECTS MITROPOULOS 2010
MOHAMED ELHINDI DESIGN AND DEVELOPMENT OF AN IDENTITY MANAGEMENT SYSTEM: THE MINNESOTA STATE COLLEGE-SOUTHEAST TECHNICAL CASE STUDY LITTMAN 2010
JASON FERGUSON AN EXAMINATION OF A VIRTUAL PRIVATE NETWORK IMPLEMENTATION TO SUPPORT A TELEWORKING INITIATIVE: THE MARCUS FOOD COMPANY INC. CASE STUDY LITTMAN 2010
ALBERTO FERNANDEZ THE EFFECTS OF COURSECASTING IN INTERNATIONAL STUDENTS’ LANGUAGE COMPREHENSION, ACADEMIC PERFORMANCE AND OVERALL COURSE EXPERIENCE ELLIS 2010
LORI GEIST THE DESIGN AND DEVELOPMENT OF COLLABORAT: A GROUPWARE SOLUTION FOR TEAMS SUPPORTING SCHOOL-AGE STUDENTS WHO USE ASSISTIVE TECHNOLOGY DRINGUS 2010
GORDON GRANT ASCERTAINING THE RELATIONSHIP BETWEEN THE SECURITY AWARENESS AND THE SECURITY BEHAVIOR OF INDIVIDUALS HAFNER 2010
GAIL HODGE A STUDY OF FIRST- AND CONTINUING-GENERATION COLLEGE STUDENTS’ USE OF INTERNET COMMUNICATION TECHNOLOGIES IN SOCIAL CAPITAL AND ITS CONTRIBUTION TO THEIR PERSISTENCE IN COLLEGE LEVY 2010
SENG KENG COMPARING THE CULTURAL DIMENSIONS AND LEARNERS’ PERCEIVED EFFECTIVENESS OF ONLINE LEARNING SYSTEMS (OLS) AMONG AMERICAN AND MALAYSIAN LEARNERS LEVY 2010
GARY KESSLER JUDGES AWARENESS, UNDERSTANDING, AND APPLICATION OF DIGITAL EVIDENCE LITTMAN 2010
RAMESH KONDA PREDICTING MACHINING RATE IN NON-TRADITIONAL MACHINING USING DECISION TREE INDUCTIVE LEARNING MUKHERJEE 2010
JANAKI KRISHNAMURTHY QUALITY MARKET: DESIGN AND FIELD STUDY OF PREDICTION MARKET FOR SOFTWARE QUALITY CONTROL NYSHADHAM 2010
MICHAEL LEHRFELD PEER SELECTION ALGORITHM IN STOCHASTIC CONTENT DELIVERY NETWORKS TO PROVIDE AN OPTIMAL NODE-SERVER SET TO MINIMIZE FILE DOWNLOAD TIME SIMCO 2010
KEITH LYONS AN ANALYSIS OF THE RADIO FREQUENCY IDENTIFICATION (RFID) TECHNOLOGY IMPLEMENTATION WITHIN AN INDEPENDENT PUBLIC LIBRARY SYSTEM: A CASE STUDY OF THE NORTH CANTON, OHIO PUBLIC LIBRARY ZINK 2010
GENNADIY MAKOVOZ LATENT SEMANTIC ANALYSIS AS A METHOD OF CONTENT-BASED IMAGE RETRIEVAL IN MEDICAL APPLICATIONS MUKHERJEE 2010
MICHAEL MCCABE EVALUATING THE FEASIBILITY OF BUILDING AUTOMATION TECHNOLOGY IN THE CONVENIENCE STORE INDUSTRY: A CASE STUDY ZINK 2010
SHANNON MCMURTREY TRAINING AND OPTIMIZING DISTRIBUTED NEURAL NETWORKS USING A GENETIC ALGORITHM NYSHADHAM 2010
LORI NICHOLSON A QUANTUM ALGORITHM ANIMATOR LASZLO 2010
KRISHNAVENI PALANIAPPAN PREDICTING ESSENTIAL” GENES IN MICROBIAL GENOMES: A MACHINE LEARNING APPROACH TO KNOWLEDGE DISCOVERY IN MICROBIAL GENOMIC DATA MUKHERJEE 2010
KAREN PATE AN EXPLORATORY STUDY ON THE PRACTICES APPLIED BY CORPORATIONS TO EVALUATE THE PERFORMANCE OF THEIR NON-TRANSACTIONAL BUSINESS-TO-CONSUMER WEB SITES ZINK 2010
MICHAEL PELOSI RANGE LIMITED UAV TRAJECTORY USING TERRAIN MASKING UNDER RADAR DETECTION RISK MUKHERJEE 2010
GREGORY REINERT EARLY DETECTION OF ONLINE AUCTION OPPORTUNISTIC SELLERS THROUGH THE USE OF NEGATIVE-POSITIVE FEEDBACK COHEN 2010
MICHAEL SHARPE ASSISTIVE TECHNOLOGY ATTRITION: IDENTIFYING WHY TEACHERS ABANDON ASSISTIVE TECHNOLOGIES DRINGUS 2010
DAVID SHULMAN INVESTIGATING WIKIS AS AGENTS FOR VIRTUAL TEAM ACTIVITY AWARENESS DRINGUS 2010
JANICE SWIATEK-KELLEY PHYSICIANS’ PERCEPTIONS OF ELECTRONIC INFORMATION RESOURCES ZINK 2010
JAMES TEMPLETON TRUST AND TRUSTWORTHINESS: A FRAMEWORK FOR SUCCESSFUL DESIGN OF TELEMEDICINE COHEN 2010
DANIEL THOMBS DETERMINING THE VALUE OF HANDWRITTEN COMMENTS WITHIN WORK ORDERS ELLIS 2010
PING AN WANG THE EFFECT OF KNOWLEDGE OF ONLINE SECURITY RISKS ON CONSUMER DECISION MAKING IN B2C E-COMMERCE NYSHADHAM 2010
AMANDA WYNN AN INVESTIGATION OF THE CONTRIBUTIONS OF GENDER, SHOPPING ORIENTATION, AND ONLINE EXPERIENCE TO CONSUMERS INTENTION TO ENGAGE IN APPAREL E-COMMERCE SHOPPING LEVY 2010
DANIEL YAKIMCHUK A STUDY OF THE EFFICACY OF LITERACY-BASED ASSISTIVE TECHNOLOGY FOR UNDERGRADUATE SECOND LANGUAGE LEARNERS TERRELL 2010
JOE ASHBY USING COLLABORATIVE TECHNOLOGIES IN REMOTE LAB DELIVERY SYSTEMS FOR TOPICS IN AUTOMATION ABRAMSON 2009
VENKATESH BAGLODI DISAMBIGUATING PREPOSITION SENSES USING PREPOSITION SENSE GRAMMAR LASZLO 2009
DIANNE BELL BRIDGING THE PROFICIENCY GAP: INFORMATION AND COMMUNICATION TECHNOLOGY LITERACY ASSESSMENT OF NONTRADITIONAL COLLEGE STUDENTS ZINK 2009
SANDRA BLANKE A STUDY OF THE CONTRIBUTIONS OF ATTITUDE, COMPUTER SECURITY POLICY AWARENESS, AND COMPUTER SELF-EFFICACY TO THE EMPLOYEES COMPUTER ABUSE INTENTION IN BUSINESS ENVIRONMENTS LEVY 2009
MICHAEL BRYANT A COMPARISON OF THE RULE AND CASE-BASED REASONING APPROACHES FOR THE AUTOMATION OF HELP-DESK OPERATIONS AT THE TIER-TWO LEVEL MUKHERJEE 2009
SCOTT CARPENTER NEW METHODOLOGY FOR MEASURING INFORMATION, KNOWLEDGE, AND UNDERSTANDING VERSUS COMPLEXITY IN HIERARCHICAL DECISION SUPPORT MODELS HAFNER 2009
YEN-TZU CHEN USING INSTRUCTIONAL SOFTWARE TO IMPROVE ORAL PERFORMANCE OF TAIWANESE SPEAKERS OF ENGLISH ABRAMSON 2009
SAMUEL CONN A METHODOLOGY FOR DESIGN AND DEVELOPMENT OF AN ELECTRONIC LEARNING (E-LEARNING) NETWORK: THE REGIS UNIVERSITY SCHOOL FOR PROFESSIONAL STUDIES CASE STUDY LITTMAN 2009
TRACEY COOLEY DESIGN, DEVELOPMENT, AND IMPLEMENTATION OF A WIRELESS LOCAL AREA NETWORK (WLAN): THE HARTFORD JOB CORPS ACADEMY (HJCA) CASE STUDY LITTMAN 2009
BILL DAFNIS A MODEL FOR PLANNING THE INTEGRATION OF XML IN DISRUPTIVE ENVIRONMENTS: A CASE STUDY OF NEWSPAPER PRODUCTION AND DISTRIBUTION SYSTEMS LITTMAN 2009
JULIUS DAVAULT RESOLVING QUASI-SYNONYM RELATIONSHIPS IN AUTOMATIC THESAURUS CONSTRUCTION USING FUZZY ROUGH SETS AND AN INVERSE TERM FREQUENCY SIMILARITY FUNCTION MUKHERJEE 2009
BRENDA ELLIS THE HUMAN ANALYSIS ELEMENT OF INTRUSION DETECTION: A COGNITIVE TASK MODEL AND INTERFACE DESIGN AND IMPLICATIONS COHEN 2009
BILQUIS FERDOUSI A STUDY OF FACTORS THAT AFFECT INSTRUCTORS’ INTENTION TO USE E-LEARNING SYSTEMS IN TWO-YEAR COLLEGES LEVY 2009
ABBE FORMAN AN EXPLORATORY STUDY ON THE FACTORS ASSOCIATED WITH ETHICAL INTENTION OF DIGITAL PIRACY LEVY 2009
PATRICIA FREDERICK USING DIGITAL GAME-BASED LEARNING TO DELIVER VOCABULARY INSTRUCTION TO DEVELOPMENTAL READING STUDENTS ABRAMSON 2009
WILLIAM GARRABRANTS REDUCING COGNITIVE LOAD USING HYPERVARIATE DISPLAY COHEN 2009
JEFFREY GRAHAM EFFECT OF ONTOLOGY HIERARCHY ON A CONCEPT VECTOR MACHINE’S ABILITY TO CLASSIFY WEB DOCUMENTS MUKHERJEE 2009
FAITH HEIKKILA AN ANALYSIS OF THE IMPACT OF INFORMATION SECURITY POLICIES ON COMPUTER SECURITY BREACH INCIDENTS IN LAW FIRMS LITTMAN 2009
SARA HEJAZI RESPONSIBILITY FACTORS OF REDUCING INEFFICIENCIES IN INFORMATION SYSTEM PROCESSES AND THEIR ROLE ON INTENTION TO ACQUIRE SIX SIGMA CERTIFICATION LEVY 2009
TERRY HOUSE A MODEL AND INTELLIGENT SOFTWARE AGENT FOR THE SELECTION AND IMPLEMENTATION OF OPEN-SOURCE SOFTWARE IN HIGHER EDUCATION SCIGLIANO 2009
CHARLES LEACH AN INVESTIGATION OF TRAINING IN CREATIVE PROBLEM SOLVING AND ITS RELATIONSHIP TO AFFECTIVE AND EFFECTIVE IDEA GENERATION OF ENTREPRENEURIAL LEARNERS SCIGLIANO 2009
BRIAN LEIGHTY GRAMMAR INFERENCE FROM GEOSPATIAL DATA PATTERNS USING SPATIAL ASSOCIATION RULE MINING LASZLO 2009
KUANYUH LIN MAINTAINING A NEWS PERSPECTIVE REMOTELY THROUGH ONLINE INFORMATION RETRIEVAL: TASK-BASED WEB EXPERIENCES OF FOREIGN NEWS CORRESPONDENTS ZINK 2009
MAUREEN LLOYD-JAMES USING ONLINE TECHNOLOGIES TO DELIVER MANAGEMENT COURSES TO CRUISE SHIP PERSONNEL AT SEA ABRAMSON 2009
SAYYED MAISIKELI ASPECT MINING USING SELF-ORGANIZING MAPS WITH DYNAMIC METRICS AS INPUT VECTORS MITROPOULOS 2009
JOHN MEYER ADMINISTRATIVE SUPPORT FOR ONLINE TEACHING FACULTY ABRAMSON 2009
ANTHONY MIDDLETON HIGH-PERFORMANCE_KNOWLEDGE-BASED_ENTITY_EXTRACTION MUKHERJEE 2009
JOSE MOLINA GARCIA PLAZA APPLICATION OF DISCRETE COMPUTER SIMULATION MODELING TO EVALUATE BUSINESS CONTINUITY PLANS NYSHADHAM 2009
MARCEL OBI DEVELOPMENT AND VALIDATION OF A SCALE FOR MEASURING E-GOVERNMENT USER SATISFACTION NYSHADHAM 2009
BRANDI PORTER INFORMATION RETRIEVAL STRATEGIES OF MILLENNIAL UNDERGRADUATE STUDENTS IN WEB AND LIBRARY DATABASE SEARCHES ABRAMSON 2009
MARIE PULLAN SUPPORT SERVICES FOR MILLENNIAL UNDERGRADUATES ABRAMSON 2009
ANTONIO RINCON SECTION 508 ADHERENCE BY INDUSTRY PROFESSIONALS: IMPROVING UNIVERSAL DESIGN THROUGH TRAINING ABRAMSON 2009
GRIER RIVERS INTERACTIVE WHITEBOARDS IN THIRD GRADE SCIENCE INSTRUCTION WANG 2009
JOSEPH ROTH A MODEL FOR USING MANAGED SERVICES IN DESIGNING AND SUPPORTING A WIRELESS LOCAL AREA NETWORK AS A PART OF THE NAVY MARINE CORPS INTRANET SCIGLIANO 2009
STEVEN SHERMAN A PROCESS-CENTRIC ONTOLOGY FOR REPRESENTING SOFTWARE DEVELOPMENT PROJECT KNOWLEDGE HAFNER 2009
DAVID SMITH A FORMAL CONCEPT ANALYSIS APPROACH TO ASSOCIATION RULE MINING SUN 2009
ROBERTA STEED CULTURAL COMPETENCY TRAINING IN SECOND LIFE FOR LOUISIANA OCCUPATIONAL THERAPISTS TERRELL 2009
GAIL STERN COMPUTER ASSISTED PSYCHOMOTOR TRAINING IN A SPECIALIZED POPULATION ELLIS 2009
NELSON STEWART REPUTATION IN ELECTRONIC MARKETS: AN EXPERIMENTAL STUDY NYSHADHAM 2009
BRENDA STUTSKY EMPOWERMENT AND LEADERSHIP DEVELOPMENT IN AN ONLINE STORY-BASED LEARNING COMMUNITY ABRAMSON 2009
WESSEL THOMAS PARALLEL MINING OF ASSOCIATION RULES USING A LATTICE BASED APPROACH SUN 2009
PAUL TUTEN A MODEL FOR THE EVALUATION OF IS/IT INVESTMENTS SCIGLIANO 2009
CHARLETTE WATKINS TAILORING SOFTWARE INPECTIONS FOR ASPECT-ORIENTED PROGRAMMING MITROPOULOS 2009
MAVA WILSON TECHNOLOGY SUPPORT COMMUNITY FOR COLLEGE OFFICE SUPPORT STAFF ABRAMSON 2009
STEVEN ZHOU A NOVEL APPROACH TO IRIS LOCALIZATION AND CODE MATCHING SUN 2009
AJAY ARORA COMBINING PREPROCESSORS FOR IMPROVED SPAM FILTERING. MUKHERJEE 2008
DIANE BALL AN EMPIRICAL INVESTIGATION OF THE CONTRIBUTION OF COMPUTER SELF-EFFICACY, COMPUTER ANXIETY, AND INSTRUCTORS’ EXPERIENCE WITH THE USE OF TECHNOLOGY TO THEIR INTENTION TO USE EMERGING EDUCATIONAL TECHNO LEVY 2008
TODD BRETT AN EVENT MONITOR AND RESPONSE FRAMEWORK BASED ON THE WSLOGA ARCHITECTURE LASZLO 2008
CAROLINE BUDWELL THE SLAI METHODOLOGY: A SYSTEMATIC ASPECT-ORIENTED IDENTIFICATION PROCESS FOR FUNCTIONAL AND NON-FUNCTIONAL REQUIREMENTS MITROPOULOS 2008
ANN CARBONELL THE IMPACT OF INFORMATION TECHNOLOGY (IT) WORKFORCE COMPETENCY AND IT PROCESSES AND TECHNOLOGIES ON SERVICE EFFECTIVENESS: THE NATIONAL SYSTEMS FOR GEOSPATIAL-INTELLIGENCE CASE STUDY LITTMAN 2008
NOOREDIN ETEZADY THE IMPACT OF ERP INVESTMENTS ON ORGANIZATIONAL PERFORMANCE ZINK 2008
ALICEN FLOSI COURSE MANAGEMENT SOFTWARE: APPLYING THE TECHNOLOGY ACCEPTANCE MODEL TO STUDY USE BY POST-SECONDARY FACULTY COHEN 2008
MARK HARDY A COMPARISON OF STUDENT LEARNING WITH SIMULATIONS AND TRADITIONAL LABORATORY EXERCISES IN SECONDARY ELECTRONICS INSTRUCTION TERRELL 2008
ADAM HERRNECKAR A SOFTWARE ENGINEERING APPROACH TO ISSUES AND ECONOMICS OF NETWORK MANAGEMENT AUTOMATION FOR PROVIDING SELECTIVE OUTSOURCING IN MULTIPLE HETEROGENEOUS ENVIRONMENTS LITTMAN 2008
OKEY IGBONAGWAM THE ROLE OF SECURITY CLEARANCE AND USERS’ INVOLVEMENT IN THE EFFICIENCY OF REQUIREMENTS-GATHERING PROCESS: AN INFORMATION-SYSTEMS CASE STUDY IN THE U.S. MILITARY LEVY 2008
VICTOR JOHNSON ALGORITHMS FOR ADAPTIVE PALETTE CONSTRUCTION USING THE GRAPHICS PROCESSING UNIT LASZLO 2008
KAREN KING COMPARISON OF SOCIAL PRESENCE IN VOICE-BASED AND TEXT-BASED ASYNCHRONOUS COMPUTER CONFERENCING ELLIS 2008
HEIDI KRAMER MEASURING THE IMPACT OF E-TRAINING ON JOB PERFORMANCE ABRAMSON 2008
JOE LOOK USE AND ANALYSIS OF EXPECTED SIMILARITY OF SEMANTIC WEB ONTOLOGICAL ANNOTATIONS SUN 2008
DIANA LUCKEVICH COMPUTER ASSISTED INSTRUCTION FOR TEACHING VOCABULARY TO A CHILD WITH AUTISM ABRAMSON 2008
MICHAEL MAKOVOZ UTILIZATION OF SEMANTIC LINKING AND VISUALIZATION TECHNIQUES TO FACILITATE KNOWLEDGE CREATION FROM TEXTUAL SOFTWARE ARTIFACTS MITROPOULOS 2008
JON MCKAMEY SMART CLASSROOM TECHNOLOGY: INSTRUCTIONAL EFFECTIVENESS AND FACULTY AND STUDENT SATISFACTION ABRAMSON 2008
RANDY MELTON MONITORING QOS IN WIRELESS AD HOC NETWORKS SIMCO 2008
GEORGE MIKULSKI USE OF ABSTRACT CATEGORIES IN DATA CLUSTERING ALGORITHMS TO IMPROVE PATTERN MATCHING HAFNER 2008
DONNA MYERS QUALITY MEASURES IN DISTANCE EDUCATION COURSES AT TROY UNIVERSITY’S ELLIS 2008
DAVID MYLOTT AN INSTRUCTIONAL TECHNOLOGY GUIDE FOR CORPORATE INSTRUCTORS ABRAMSON 2008
ANTHONY NICHOLS AN EMPIRICAL ASSESSMENT OF ATTITUDE TOWARD COMPUTERS, MOTIVATION, SATISFACTION, AND PREVIOUS ACADEMIC PERFORMANCE AND THEIR CONTRIBUTION TO PERSISTENCE OF COLLEGE STUDENT-ATHLETES ENROLLED IN E-LEARNI LEVY 2008
KATHLEEN PITTMAN COMPARISON OF DATA MINING TECHNIQUES USED TO PREDICT STUDENT RETENTION MUKHERJEE 2008
FRANKLYN PRESCOD AN INVESTIGATION OF TECHNOLOGY USE AND LEARNING STYLES AS PREDICTORS OF UNDERGRADUATE INFORMATION TECHNOLOGY MANAGEMENT STUDENTS’ ACADEMIC ACHIEVEMENT AT RYERSON UNIVERSITY TERRELL 2008
JALAL RAISSI DYNAMIC SELECTION OF OPTIMAL CRYPTOGRAPHIC ALGORITHMS CANNADY 2008
LYNETTE RALPH A KNOWLEDGE MANAGEMENT SOLUTION FOR REFERENCE SERVICES ELLIS 2008
MICAL RAMIM AN EXAMINATION OF FACTORS ASSOCIATED WITH STUDENTS ETHICAL DECISION MAKING IN POST-SECONDARY E-LEARNING PROGRAMS LITTMAN 2008
MICHAEL REID INTEGRATING TRUST AND COMPUTER SELF-EFFICACY INTO THE TECHNOLOGY ACCEPTANCE MODEL: THEIR IMPACT ON CUSTOMERS USE OF BANKING INFORMATION SYSTEMS IN JAMAICA LEVY 2008
ROBERT ROBERTSON CRITICAL SUCCESS FACTORS FOR SMALL BUSINESS IN E-COMMERCE NYSHADHAM 2008
GREGORY SAFKO A STUDY OF A MODIFIED AUDITORY COMPONENT IN A MULTIMODAL FEEDBACK STUDY INVOLVING OLDER DEAF COMPUTER USERS COHEN 2008
JEFFREY SCHIFFEL A METHOD TO MANAGE AND MEASURE THE PROCESS IMPROVEMENT COST BENEFITS OF EXCHANGING TACIT AND EXPLICIT KNOWLEDGE AMONG KNOWLEDGE WORKERS ZINK 2008
MAHMUD SHIHAB WEB 2.0 TOOLS IMPROVE TEACHING AND STUDENT COLLABORATION IN HIGH SCHOOL ENGLISH CLASSES ABRAMSON 2008
HUMAIRA SIDDIQUI INVESTIGATION OF INTENTION TO USE E-COMMERCE IN THE ARAB COUNTRIES: A COMPARISON OF SELF-EFFICACY, USEFULNESS, CULTURE, GENDER, AND SOCIOECONOMIC STATUS IN SAUDI ARABIA AND UNITED ARAB EMIRATES LEVY 2008
TERENCE SMITH AN INVESTIGATION INTO THE IMPACT OF INFORMATION TECHNOLOGY BANK EXAMINERS COMMUNITY KNOWLEDGE SHARING SESSIONS ON THEIR INDIVIDUAL PERFORMANCE ZINK 2008
JESSICA STREET EXAMINING THE VALIDITY OF TESTING IN AN ONLINE LEARNING ENVIRONMENT TERRELL 2008
LARRY WOOSTER TUTORIAL SUPPORT FOR TEACHING RECOGNITION OF TONALITY IN A SMALL PAROCHIAL SCHOOL TERRELL 2008
TAMER ABOUALY DESIGN, DEVELOPMENT, AND IMPLEMENTATION OF A PUBLIC KEY CRYPTOSYSTEM FOR AUTOMATED TELLER MACHINES: THE TORONTO DOMINION BANK CASE STUDY LITTMAN 2007
ERASMUS ADDAE TRAINING A GLOBALLY-DISPERSED TRAINER POPULATION THROUGH DESKTOP VIDEO-CONFERENCING ABRAMSON 2007
MARTIN BAGAYA AN ANALYSIS OF IT/IS OFFSHORE OUTSOURCING: EDUCATOR PERSPECTIVES WANG 2007
RAZ BEN-EZZER A FRAMEWORK FOR DISTANCE EDUCATION STRATEGIES IN DIGITAL MUSIC EDUCATION FOR ADULTS COHEN 2007
RICK BLAZEK AUTHOR-STATEMENT CO-CITATION ANALYSIS APPLIED AS A RECOMMENDER SYSTEM TO SUPPORT NON-DOMAIN-EXPERT ACADEMIC RESEARCH HAFNER 2007
DAWN BRONSTEIN THE EFFICACY OF A WEB SITE EVALUATION CHECKLIST AS A PEDAGOGICAL APPROACH FOR TEACHING STUDENTS TO CRITICALLY EVALUATE INTERNET CONTENT TERRELL 2007
HERBERT BROWN EXAMINING STATISTICAL PROCESS CONTROL AS A METHOD OF RARE EVENT TEMPORAL DATA MINING. MUKHERJEE 2007
KEVIN BRUNNER A CHILD-CENTRIC INTERFACE: GRAFFITI OR NOT GRAFFITI COHEN 2007
TAHSIN CHOU STORAGE REDUCTION IN HIGH PERFORMANCE DISTRIBUTED DISK-BASED BACKUP IN STORAGE AREA NETWORK SUN 2007
J. WILLIAM CUPP A FAST HEURISTIC TO ESTIMATE THE INHERENT DEGREE OF CLUSTERING IN DATA SETS LASZLO 2007
DONNA EHRLICH ADAPTATION OF BUSINESS PROCESSES IN SMES: AN INTERPRETIVE STUDY NYSHADHAM 2007
ELIZABETH FLANAGAN COMPUTER-BASED READING PROGRAM WITH AT-RISK PRE-KINDERGARTEN STUDENTS ABRAMSON 2007
KATHERINE FLORI COMPUTING TECHNOLOGY IN AN INTERDISCIPLINARY THEATRE CURRICULUM FOR URBAN HIGH SCHOOL SENIORS ABRAMSON 2007
ISAAC GABRIEL PERCEPTIONS OF ONLINE RISKS NYSHADHAM 2007
MARLENE GROMAN A MODEL OF BEST PRACTICES FOR PROJECT MANAGEMENT STRATEGIES IN AN ADMINISTRATIVE COMPUTING SYSTEM IMPLEMENTATION IN HIGHER EDUCATION SCIGLIANO 2007
ERANNA GURUVADOO M*CTREE: A MULTI-RESOLUTION INDEXING STRUCTURE FOR XML DATA SUN 2007
JACOB HORNSBY AN EMPIRICAL INVESTIGATION OF THE EFFECTS OF DISCOUNTING ON PRIVACY RELATED DECISIONS. MUKHERJEE 2007
TRUDY HOWLES A STUDY OF ATTRITION AND THE USE OF STUDENT LEARNING COMMUNITIES IN THE COMPUTER SCIENCE INTRODUCTORY PROGRAMMING SEQUENCE TERRELL 2007
JULIA INNES SCHOLARLY COMMUNICATION IN THE FIELD OF ZOO RESEARCH ZINK 2007
WILLY ISAAC PERFORMANCE MEASUREMENT FOR THE E-GOVERNMENT INITIATIVES NYSHADHAM 2007
THOMAS JURY ELECTRONIC PERFORMANCE SUPPORT FOR E-LEARNING ANALYSIS AND DESIGN ABRAMSON 2007
CHRISTINE KEUPER UNDERSTANDING THE FIGURATIVE LANGUAGE OF TROPES USING ONTOLOGICAL CATEGORIZATIONS IN NATURAL LANGUAGE PROCESSING LASZLO 2007
TIEN-CHEN LEE USING WEB-BASED CALL TO IMPROVE ENGLISH LANGUAGE MASTERY AT REPUBLIC OF CHINA AIR FORCE ACADEMY ABRAMSON 2007
ILENE LITZ STUDENT ADOPTION OF A COMPUTER-SUPPORTED COLLABORATIVE LEARNING (CSCL) MATHEMATICAL PROBLEM SOLVING ENVIRONMENT: THE CASE OF THE MATH FORUMS POW-WOW WANG 2007
JASON LIVELY ASSESSING INDIVIDUAL CONTRIBUTION IN ONLINE COLLABORATIVE ACTIVITIES ELLIS 2007
MICHAEL NEUBAUER A SYSTEMS ANALYSIS OF INFORMATION TECHNOLOGY IMPLEMENTED BY AN FBI FIELD OFFICE FOR CRISIS RESPONSE EVENTS: THE COLUMBIA FIELD OFFICE CASE STUDY LITTMAN 2007
BERNARD NOBLE AN INVESTIGATION OF THE ATTITUDES, COSTS AND BENEFITS OF TELEWORK FOR INFORMATION SYSTEMS EMPLOYEES SCIGLIANO 2007
MARILYN OLANDER A STUDY OF INTERNET WEBLOGS AS A TOOL TO TEACH WRITING ABRAMSON 2007
RONNIE PARK DEVELOPMENT AND TEST OF AN INSTRUMENT TO EVALUATE IS EFFECTIVENESS OF E-GOVERNMENT INITIATIVES NYSHADHAM 2007
ANDREW POTTER AN INVESTIGATION OF INTERACTIONAL COHERENCE IN ASYNCHRONOUS LEARNING ENVIRONMENTS DRINGUS 2007
LOREEN POWELL AN EXPERIMENTAL STUDY TO DETERMINE WHAT TYPE OF LEARNING OBJECT REPOSITORY INTERFACE IS THE MOST EFFECTIVE FOR A TARGETED GROUP OF PRIMARY EDUCATORS ELLIS 2007
ANTHONY SLABICKI USING SIMULATORS TO GUIDE PRACTICE AND REINFORCE ONLINE LEARNING ABRAMSON 2007
TERRY SMITH SENIORS GO ONLINE. AN ASSESSMENT OF THE VALUE OF USABILITY: IS IT PERCEIVED USEFULNESS OR PERCEIVED EASE OF USE? COHEN 2007
MONICA UGBAJA PERCEPTUAL ORGANIZATION OF ECOMMERCE RISKS AMONG CONSUMERS: A CROSS-COUNTRY STUDY NYSHADHAM 2007
GERALD WILLIAMS ANALYSIS OF SPECTRAL SELECTIVITY ON EDGE DETECTION ALGORITHMS FOR NON-INVASIVE IDENTIFICATION OF SKIN CANCER. MUKHERJEE 2007
WILLIAM YATES ACADEMIC INTEGRITY IN THE INTERNET AGE ABRAMSON 2007
JAMES BILITSKI EVOLUTIONARY ALGORITHM FOR GENERATION OF AIR PRESSURE AND LIP PRESSURE PARAMETERS FOR AUTOMATED PERFORMANCE OF BRASS INSTRUMENTS MUKHERJEE 2006
CLAUDE COUNCIL AN INVESTIGATION OF A COBIT SYSTEMS SECURITY IT GOVERNANCE INITIATIVE IN HIGHER EDUCATION SCIGLIANO 2006
THEON DANET A STUDY OF THE IMPACT OF USERS INVOLVEMENT, RESISTANCE AND COMPUTER SELF-EFFICACY ON THE SUCCESS OF A CENTRALIZED IDENTIFICATION SYSTEM IMPLEMENTATION. LEVY 2006
ROBERT ELLETT AN EVALUATION OF PROGRAM FOR COOPERATIVE CATALOGING (PCC) RECORDS USED IN NON-PCC LIBRARIES ZINK 2006
MARGARITA ELORRIAGA COMPUTER USE BY LATINO MIGRANT FAMILIES: INCREASING K-2 CHILDRENS READING SKILLS THROUGH PARENT TRAINING ABRAMSON 2006
SUSAN FEREBEE AN EXAMINATION OF THE RELATIONSHIP BETWEEN INVOLVEMENT LEVEL OF WEB SITE USERS AND WEB CREDIBILITY ASSESSMENT DRINGUS 2006
JEFFREY FORREST INFORMATION POLICIES AND PRACTICES OF KNOWLEDGE MANAGEMENT (KM) AS RELATED TO THE DEVELOPMENT OF THE GLOBAL AVIATION INFORMATION NETWORK (GAIN) - AN APPLIED CASE STUDY ZINK 2006
JOAN FRESE A FACULTY DEVELOPMENT HANDBOOK FOR QUALITY ONLINE INSTRUCTION ABRAMSON 2006
MICHAEL FURICK USING NEURAL NETWORKS TO DEVELOP A NEW MODEL TO SCREEN APPLICANTS FOR APARTMENT RENTALS COHEN 2006
GLYN GOWING EMERGENT BEHAVIOR IN AUTONOMOUS SOFTWARE AGENTS FOR INTRUSION DETECTION CANNADY 2006
SHAWN HARRS STANDARDS DIRECTORY: AN ENGINEERING AND TECHNOLOGY STANDARDS DIGITAL LIBRARY AND INFORMATION RETRIEVAL SYSTEM FOR THE WALT DISNEY COMPANY ZINK 2006
ELIZABETH HAWTHORNE CHIRO-INFORMATICS: TOWARDS A SEMANTIC WEB HEALTH RECORD AND ONTOLOGY FOR COORDINATION OF PATIENT INFORMATION BETWEEN CHIROPRACTIC AND ALLOPATHIC PHYSICIANS COHEN 2006
IAN JOHNSON AN INVESTIGATION OF THE EFFECTS OF THE GEORGIA FRAMEWORK FOR INTEGRATION TECHNOLOGY (IN TECH) TRAINING PROGRAM ON TEACHERS’ COMPUTER SELF-EFFICACY AND COMPUTER UTILIZATION COHEN 2006
JOANNE KUZMA PRIVACY POLICIES: A STUDY OF THEIR USE AMONG ONLINE CANADIAN PHARMACIES ZINK 2006
DONNA LANE EVALUATING E-TEXTBOOKS IN A BUSINESS CURRICULUM WANG 2006
CATHRINE LINNES APPLYING DECISION THEORY TO QUANTIFY THE COST OF NETWORK SECURITY RISK CANNADY 2006
MIKE LITMAN A JAVA BASED API FOR THE IMPLEMENTATION AND MAINTENANCE OF DOMAIN SPECIFIC COLLABORATIVE VIRTUAL ENVIRONMENTS LASZLO 2006
ARTHUR MCADAMS AN INVESTIGATION OF THE RELATIONSHIPS BETWEEN USERS AND PROVIDERS OF INFORMATION TECHNOLOGY SERVICES FOR IMPROVED IT EFFECTIVENESS SCIGLIANO 2006
ANITA MCCARTHY KNOWLEDGE MANAGEMENT: EVALUATING STRATEGIES AND PROCESSES USED IN HIGHER EDUCATION ELLIS 2006
PAUL NIELSEN A QUANTIATIVE ANALYSIS OF PERFORMANCE IN A MULTI-PROTOOCL AD HOC 802.11B-BASED WIRELESS LOCAL NETWORK LITTMAN 2006
HAROLD PALMER A WEB-BASED DATA WAREHOUSE METHODOLOGY AND MODEL FOR STUDENT DATA IN HIGHER EDUCATION SCIGLIANO 2006
JANE PERSCHBACH BLOGGING: AN INQUIRY INTO THE EFFICACY OF A WEB-BASED TECHNOLOGY FOR STUDENT REFLECTION IN COMMUNITY COLLEGE COMPUTER SCIENCE PROGRAMS ABRAMSON 2006
PATRICIA PROFETA EFFECTIVENESS OF ASYNCHRONOUS REFERENCE SERVICES FOR DISTANCE LEARNING STUDENTS WITHIN FLORIDAS COMMUNITY COLLEGE SYSTEM ZINK 2006
KRIANGSAK PUKAWAN THE ATTITUDES AND PREFERENCES OF INTERNET USERS IN THAILAND TOWARD ONLINE PRIVACY RIGHTS ZINK 2006
DAVID REAVIS ELECTRONIC MAIL RETENTION POLICIES IN MID-SIZED MANUFACTURING COMPANIES IN THE UNITED STATES ZINK 2006
MALIK SALEH THE CONSTRUCTION AND VALIDATION OF A RESOURCE COVER PAGE AS AN INSTRUMENT FOR CATALOGING INTERNET RESOURCES IN THE SEMANTIC WEB NYSHADHAM 2006
HELEN SCHNEIDER A CASE STUDY OF INFORMATION ASSURANCE FIELD EXPERIENCE ABRAMSON 2006
RONALD SHEHANE A FRAMEWORK FOR KNOWLEDGE-AWARE SERVICE-CONTRACT QUALITY-MANAGEMENT DECISION SUPPORT SYSTEMS MUKHERJEE 2006
JAMES SINCLAIR ESTABLISHING A NEW PARADIGM IN ENGINEERING AND TECHNOLOGY EDUCATION: AN EXPERIMENTAL ANALYSIS OF MULTIPLE LEARNING METHODOLOGIES AND EXAMINATION OF COGNITIVE PROFILES OF CONTINUING EDUCATION STUDENTS COHEN 2006
GLENN STOUT IMPROVING THE DECISION MAKING PROCESS FOR INFORMATION SECURITY THROUGH A PRE-IMPLEMENTATION IMPACT REVIEW OF SECURITY COUNTERMEASURES CANNADY 2006
SAMIR TOUT PARALLEL HYBRID CLUSTERING USING GENETIC PROGRAMMING AND MULTI-OBJECTIVE FITNESS WITH DENSITY (PYRAMID) SUN 2006
KHOA TRAN AN IMPROVED MULTI-OBJECTIVE EVOLUTIONARY ALGORITHM WITH ADAPTABLE PARAMETERS. MUKHERJEE 2006
ARISA UDE AN EMPIRICAL INVESTIGATION OF WORKFLOW MANAGEMENT SYSTEMS QUEUES NYSHADHAM 2006
DEL WAKLEY WORKPLACE TECHNOLOGY COMPETENCIES FOR ASSOCIATE DEGREE MARKETING PROGRAMS ABRAMSON 2006
QI WANG BLENDING ELECTRONIC AND CLASSROOM TEACHING TO SUPPORT DEAF AND HARD OF HEARING COLLEGE STUDENTS ABRAMSON 2006
CHERYL WARD A STUDY OF E-LEARNING FOR ADVANCED LEARNERS IN MULTI-ABILITY CLASSROOMS ABRAMSON 2006
CREED WHEELER IMPLEMENTATION OF THE PEOPLE CAPABILITY MATURITY MODEL ON TECHNICAL SUPPORT PERSONNEL IN VOLUSIA COUNTY SCHOOLS ABRAMSON 2006
ANN WOLF USING TECHNOLOGY WITH LEARNING DISABLED READERS: A META-ANALYSIS ABRAMSON 2006
SEONG YU PROACTIVE SOFTWARE REJUVENATION MODEL AUGMENTED WITH SOFTWARE REPLICATION FOR REJUVENATION TRANSPARENCY TO CLIENTS IN A SINGLE COMPUTER ENVIRONMENT SIMCO 2006
FELIX AKINLADEJO COMPUTER -SUPPORTED REHABILITATIVE MANAGEMENT: A CASE STUDY OF USING VIRTUAL REALITY TECHNOLOGY IN AMBULATORY TRAINING FOR POST-ACUTE STROKE PATIENTS LASZLO 2005
ANTONIO BIELLO A MODEL FOR DEVELOPING INTERACTIVE INSTRUCTIONAL MULTIMEDIA APPLICATIONS FOR ELECTRONIC MUSIC INSTRUCTORS ELLIS 2005
GRANT BRAUGHT CO-EVOLUTIONARY DYNAMICS AND THE ORIGINS OF ADAPTIVE BEHAVIOR CANNADY 2005
ANTOINETTE BRUCIATI DEVELOPMENT AND IMPLEMENTATION OF A PLAN FOR AN ONLINE EDUCATIONAL TECHNOLOGY PROGRAM LEADING TO CROSS ENDORSEMENT FOR CONNECTICUT EDUCATORS LITTMAN 2005
DONNA CADY AN INVESTIGATION OF THE EFFECT OF THE INTERGRATION OF COMPUTING TECHNOLOGY IN THE SCIENCE CURRICULUM ON FEMALE STUDENTSSELF-EFFICACY BELIEFS TOWARD COMPUTING TERRELL 2005
TRACY CHRISTOFERO INFORMATION PRIVACY AS REQUIRED BY THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA): AWARENESS AND BARRIERS TO COMPLIANCE AS EXPERIENCED BY SMALL HEALTH CARE PRACTITIONERS IN RURAL WEST VIRGINIA ZINK 2005
BARBARA CIARAMITARO AN ANALYSIS OF THE IMPLEMENTATION OF AN ONLINE COLLABORATION SYSTEM TO SUPPORT LEGAL COMMUNITIES OF PRACTICE LITTMAN 2005
DEBORAH COHEN A PROCESS SCRIPT FOR ONLINE RESOURCE SELECTION (ORSIDS): A DEVELOPMENTAL STUDY ELLIS 2005
MARK COHEN AN EVALUATION OF THE CONSISTENCY OF JUDICIAL SENTENCING SYSTEMS THAT INCORPORATE SUBJECTIVE FACTORS MUKHERJEE 2005
RALPH COVINO A SURVEY OF THE MASSACHUSETTS CITIES AND TOWNS TO EXAMINE INTERNET FILTERING POLICIES IN PUBLIC SCHOOLS AND LIBRARIES ZINK 2005
RONALD CRITCHFIELD THE DEVELOPMENT OF AN INFORMATION LITERACY INDICATOR FOR INCOMING COLLEGE FRESHMEN ZINK 2005
DORRELL CRITTENDEN A STUDY OF THE IMPACT OF PRICE ELASTICITY ON THE ADOPTION DECISION OF MINICOMPUTERS NYSHADHAM 2005
NICHOLAS DITIRRO INTEGRATION ONLINE SOCIAL ENVIRONMENTS INTO COMMUNITY COLLEGE STUDENT ORGANIZATIONS ABRAMSON 2005
JOYCE DORMAN AN INVESTIGATION OF LEARNERS ATTITUDES AND PREFERENCES THAT RELATE TO PARTICIPATION IN INTERNET-BASED INSTRUCTION AT COASTAL CAROLINA UNIVERSITY. WANG 2005
AZAD EJAZ USING BAYESIAN BELIEF NETWORK FOR GOING-CONCERN RISK EVALUATION MUKHERJEE 2005
K ESTEP THE EFFECTS OF USING THE PRACTICAL EAR TRAINING TOOL (PET) PAIRED WITH MNEMONIC IMAGERY ON ENHANCING TRADITIONAL EAR TRAINING METHODS FOR UNDERGRADUATE MUSIC STUDENTS TERRELL 2005
DANIEL FEALKO EVALUATING PARTICLE SWARM INTELLIGENCE TECHNIQUES FOR SOLVING UNIVERSITY EXAMINATION TIMETABLING PROBLEMS MUKHERJEE 2005
HEATHER FIEDLER JOURNALISM AND MASS COMMUNICATION EDUCATION IN THE AGE OF TECHNOLOGY ABRAMSON 2005
SAMUEL FONTES USING THE TECHNOLOGY ACCEPTANCE MODEL AND STRUCTURAL EQUATIONS MODELING TO INVESTIGATE GENDER DIFFERENCES IN THE USAGE OF WEBSITES MUKHERJEE 2005
LUIS GONZALEZ A SELF-ADAPTIVE NEGATIVE SELECTION APPROACH FOR ANOMALY DETECTION CANNADY 2005
MARY GOSMAN A GENERIC COURSE MANAGEMENT SYSTEM (CMS)TUTORIAL FOR COLLEGE FACULTY ABRAMSON 2005
JEFFREY GROOM MEDICAL DECISION MAKING UNDER STRESS-EVALUATING THE ROLE OF COMPUTERIZED MEDICAL SIMULATION INSTRUCTION ABRAMSON 2005
FAYE INGLE A META-ANALYSIS OF WEB-BASED DISTANCE LEARNING ARTICLES WITH AN UPDATE ON COMPLETION RATES ABRAMSON 2005
CHRISTOPHER JOHNSON ESTABLISHING AN ONLINE COMMUNITY OF PRACTICE FOR INSTRUCTORS OF ENGLISH AS A FOREIGN LANGUAGE DRINGUS 2005
TODD JOHNSON APPLYING GENETIC ALGORITHMS IN THE IDENTIFICATION OF NOVEL BEHAVIOR PATTERNS IN NETWORK DATA STREAMS CANNADY 2005
ROBERT JOYCE SUCCESSFUL IMPLEMENTATION OF DECISION SUPPORT SYSTEMS SUPPLY CHAIN MANAGEMENT WITHIN MANUFACTURING COMPANIES MUKHERJEE 2005
ROBERT KAIDEN A STUDY OF MOTIVATION, ACHIEVEMENT, AND STUDY SKILLS IN AN ONLINE COMMUNITY COLLEGE COURSE IN BEGINNING ALGEBRA DRINGUS 2005
JEFFREY KANE ENERGY MANAGEMENT AS APPLIED TO AN AD-HOC ROUTING PROTOCOL SIMCO 2005
JANET KOURIK PERFORMANCE OF CLASSIFICATION TOOLS ON UNSTRUCTURED TEXT MUKHERJEE 2005
MICHAEL KRAMER USING CONCEPT MAPS FOR KNOWLEDGE ACQUISITION IN SATELLITE DESIGN: TRANSLATING STATEMENT OF REQUIREMENTS ON ORBIT TO DESIGN REQUIREMENTS MUKHERJEE 2005
LISA LANDGRAF A MODEL OF SUCCESSFUL SOFTWARE DEVELOPMENT PROCESSES IN HIGHER EDUCATION SCIGLIANO 2005
JEFFREY LIVERMORE FACTORS THAT IMPACT IMPLEMENTING A LIGHT SOFTWARE DEVELOPMENT METHODOLOGY LITTMAN 2005
JOHN MARA COMPUTERS AS UBIQUITIOUS TOOLS FOR TEACHERS AND LEARNERS:A CASE STUDY OF THE MAINE LAPTOP INITIATIVE ABRAMSON 2005
RICHARD MARCOUX A PREDICTIVE MODEL TO TEST ICONS FOR A GLOBAL AUDIENCE DRINGUS 2005
JOAN MCGRORY MODEL FOR PLANNING, DESIGNING AND IMPLEMENTING A WIRELESS LOCAL AREA NETWORK IN A UNIVERSITY CLASSROOM LITTMAN 2005
DEREK MOHAMMED A COMPAPRATIVE STUDY OF UNSUPERVISED NEURAL NETWORKS IN DETECTING FINANCIAL MISSTATEMENTS MUKHERJEE 2005
RICHARD PARROTT A STUDY OF THE RELATIONSHIPS BETWEEN END-USER INFORMATION SYSTEMS PROBLEMS AND HELPDESK CRITICAL SUCCESS FACTORS IN HIGHER EDUCATION SCIGLIANO 2005
TONY READ EVALUATING STRATEGIC INFORMATION TECHNOLOGY INVESTMENTS IN THE BANKING INDUSTRY MUKHERJEE 2005
TRACI REED USING ONLINE LEARNING ENVIRONMENTS TO ENHANCE THE ACQUISITION OF BASIC SKILLS AND IMPROVE RETENTION RATES OF ADULT EDUCATION STUDENTS ABRAMSON 2005
KARL REIMERS IMPACT OF IT INDUSTRY CERTIFICATION ON THE ACHIEVEMENT OF HIGH SCHOOL STUDENTS ENROLLED IN TECHNOLOGY COURSES TERRELL 2005
BRIAN SHEPPARD THE EFFECT OF INTERNET MONITORING SOFTWARE ON THE NON-EDUCATIONAL RELATED WEB USAGE OF ADULT STUDENTS SEEKING COMPUTER CERTIFICATION COHEN 2005
MIRI SHONFELD THE IMPACT OF AN ONLINE CONFERENCE IN EDUCATION: A CASE STUDY ABRAMSON 2005
SHARON SHUEY DEVELOPMENT AND IMPLEMENTATION OF A PROBLEM-BASED LEARNING MODEL IN A FINANCE COURSE: A CASE STUDY ABRAMSON 2005
CHAD SMITH A DESCRIPTIVE STUDY OF THE INTERNET SEARCH BEHAVIORS EMPLOYED BY DEAF ADOLESCENTS COMPLETING FACT-BASED RESEARCH TASKS DRINGUS 2005
BRANDON SPENCER THE EFFECTS OF COMPUTERIZED SMELL ON MEMORY COHEN 2005
SHERRY STRUM A COGNITIVE STUDY ON THE USE OF THE INTERNET BY MINORITY SMALL BUSINESS OWNERS FOR INFORMATION RESEARCH AND THE DESIGN AND DEVELOPMENT OF A SMALL BUSINESS INFORMATION PORTAL ZINK 2005
RICHARD TABU DEVELOPMENT OF TELECOMMUNICATIONS IN THE DEMOCRATIC REPUBLIC OF THE CONGO (DRC) ZINK 2005
JEFF TEO A MODEL OF TRUSTED COMPUTING ACCEPTANCE IN HIGHER EDUCATION SCIGLIANO 2005
NANCY THIBEAULT SINCLAIR CURRICULUM EXCHANGE: SHARING LEARNING RESOURCES TO IMPROVE PART-TIME INSTRUCTION ABRAMSON 2005
GEORGE THURMOND SECURING STATE LEVEL DIGITAL GOVERNMENT PUBLIC KEY INFRASTRUCTURE: A SURVEY OF SECURITY REQUIREMENTS FOR THE EVOLVING STATE-LEVEL DIGITAL GOVERNMENT. MANNING 2005
ROBERT VERMILYER KNOWLEDGE DISCOVERY IN CONTENT-BASED IMAGE RETRIEVAL ST SYSTEMS LASZLO 2005
DAVID VOORHEES PREDICTING SOFTWARE SIZE AND DEVELOPMENT EFFORT: MODELS BASED ON STEPWISE REFINEMENT MITROPOULOS 2005
BERTHAMAE WALKER AN INVESTIGATION OF THE FEASIBILITY OF USING WEB-CENTRIC METHODS VERSUS TRADITIONAL FACE-TO-FACE METHODS IN DELIVERING A COURSE IN BIBLIOGRAPHIC INSTRUCTION SCIGLIANO 2005
RICHARD YUN WANG A NEW STATISTICAL APPROACH FOR ANOMALY INTRUSION DETECTION BASED ON SHORT-TERM PROFILE DATA CANNADY 2005
SHARON WHEELER SOFTWARE ENGINEERS: LICENSE, CERTIFY OR CLASSIFY? MODELING PRACTIONERS THROUGH SPECS(SOFTWARE PRACTIONER EXPERT CLASSIFICATION SYSTEM) LEITNER 2005
MARCIE ZAHAREE A SUGGESTED E-BUSINESSPROCESS MODEL TO APPLY KNOWLEDGE MANAGEMENT TO SOLVE TRAINING PROBLEMS OF NEW EMPLOYEES ELLIS 2005
STEVEN ZALE TEACHING DATA STRUCTURES USING A PROGRAMMING BY EXAMPLE SYSTEM: EFFECTS ON STUDENT ACHIEVEMENT AND COGNITIVE LOAD COHEN 2005
DANIEL BAER AN ASSESSMENT OF THE PORTFOLIO-BASED TECHNOLOGY REQUIREMENT FOR PRESERVICE TEACHERS IN NORTH CAROLINA COHEN 2004
EDUARDO BAUTISTA A FRONT-LOADED AGILE SOFTWARE PROCESS FOR WEB APPLICATIONS LASZLO 2004
SHANNON BOESCH AUTOMATING THE SPECIFICATION, VALIDATION, AND APPLICATION OF EXPERT SYSTEMS IN A HYBRID EXPERT ENVIRONMENT CANNADY 2004
WAYNE BROWN A STUDY OF CHIEF INFORMATION OFFICERS EFFICTIVENESS IN HIGHER EDUCATION ABRAMSON 2004
WILLIAM BROWN CREDIBLE WEBCASTS FOR FINANCIAL COMMUNICATIONS COHEN 2004
BARBARA BURCKART USING AUTONOMOUS ROBOTS TO INTEGRATE MIDDLE SCHOOL ACADEMIC STANDARDS WITH TECHNOLOGY STANDARDS AND 21ST CENTURY WORKPLACE SKILLS . ABRAMSON 2004
JAMES COLLINS MEASURING CREDIBILITY ASSESSMENT TARGETS IN WEB-BASED INFORMATION COHEN 2004
CARL DEPASQUALE A METHOD TO MODEL THE BEHAVIOR OF JAVA CLASSES DURING DEVELOPMENT LEITNER 2004
TAMMY ENGELMAN A COMPARATIVE ANALYSIS OF DDS AND HUMANS ON MAKING LOAN DECISIONS LASZLO 2004
EILEEN EUDY A USE-CASE MODEL FOR A KNOWLEDGE MANAGEMENT SYSTEM TO FACILITATE DISASTER RELIEF OPERATIONS MUKHERJEE 2004
MARGO FITZPATRICK EVALUATING BAYESIAN CLASSIFIERS AND ROUGH SETS FOR CORPORATE BANKRUPTCY PREDICTION MUKHERJEE 2004
DONALD FRAZIER A SIMULATION MODEL OF LARGE SCALE SOFTWARE REUSE IMPLEMENTATIONS: A SYSTEMS DYNAMICS APPROACH MUKHERJEE 2004
ALBERT FUNDABURK THE EDUCATION OF INFORMATION SECURITY PROFESSIONALS: AN ANALYSIS OF INDUSTRY NEEDS VS. ACADEMIC CURRICULUM IN THE 21ST CENTURY CANNADY 2004
DAVID GARDNER METHOD AND APPARATUS FOR ENHANCED E-MAIL FILTERING AND ROUTING EMPLOYING DIRECTORY-BASED INFORMATION AND POLICIES LITTMAN 2004
ROSEMARY HAYES A MULTI-CRITERIA DECISION ANALYSIS FRAMEWORK FOR SELECTING SUITABLE LEARNING MANAGEMENT SYSTEMS DRINGUS 2004
SHERMAN HOU DEVELOPING A CULTURAL PORTAL TO ENHANCE THE FOREIGN LANGUAGE CURRICULUM ELLIS 2004
BARBARA KING A SOFTWARE DEVELOPMENT LIFE CYCLE MODEL FOR WEB-BASED APPLICATION DEVELOPMENT LEITNER 2004
ELAINE LAWRENCE TECHNOLOGY INTEGRATION AND PRE-SERVICE TEACHER TRAINING: THE EFFECTIVENESS OF EMBEDDING TECHNOLOGY USE IN THREE PRE-METHODS COURSES TERRELL 2004
JEFFREY LEHMAN AN EXTENSIBLE MARKUP LANGUAGE (XML) APPLICATION FOR THE UNIVERSITY COURSE TIMETABLING PROBLEM LASZLO 2004
EDWARD LOVITT IMPLEMENTATION OF AN INDIVIDUAL PROFESSIONAL DEVELOPMENT SYSTEM USING A WEB-ACESSIBLE DATABASE ELLIS 2004
NICKOLAS MACCHIARELLA EFFECTIVENESS OF VIDEO-BASED AUGMENTED REALITY AS A LEARNING PARADIGM FOR TRAINING AEROSPACE MAINTENANCE TASKS COHEN 2004
MOHAMED MANSOUR DETERMINING THE EFFECTIVENESS OF COLLEGE STUDENTS IN SEARCHING THE INTERNET RIGGS 2004
MICHAEL MCCARTHY AN ARCHITECTURE FOR IMPLEMENTING FINE-GRAINED XML DOCUMENT SECURITY USING WEB SERVICES CANNADY 2004
THERESA MCDONALD THE EFFECTS OF INSTANT MESSAGING ON PERFORMANCE AND COMMUNICATION APPREHENSION IN A BUSINESS COMPUTER APPLICATION CLASS TERRELL 2004
BETH MURRAY THE DESIGN AND IMPLEMENTATION OF A KNOWLEDGE MANAGEMENT SYSTEM IN THE SBC DATACOMM CUSTOMER SUPPORT CENTER LITTMAN 2004
KAREN NARD IMPROVING INFORMATION SYSTEMS SECURITY THROUGH MANAGEMENT PRACTICES: A NON-TECHNICAL APPROACH CANNADY 2004
LISA OLIVIERI THE EFFECT OF THE HIGH SCHOOL ENVIRONMENT ON ENCOURAGING GIRLS TO MAJOR IN COMPUTER SCIENCE COHEN 2004
EDWARD PALMER WEBSITES OF LARGE NONPROFIT ORGANIZATIONS LITTMAN 2004
JAMES RANSOME WIRELESS INTEGRATED SECURE DATA OPTIONS MODEL FOR CONVERGED NETWORK SECURITY CANNADY 2004
PAMELA RAWLS SCHOOL-BASED SUPPORT FOR ELEMENTARY SCHOOL TEACHING WITH TECHNOLOGY ABRAMSON 2004
ADAM RAZAVIAN COGNATIVE BASED ADAPTIVE PATH PLANNING FOR AUTONOMOUS ROBOTIC VEHICLES SUN 2004
BELARMINA RICHARDS HUMAN-AGENT INTERACTION AND WEB-BASED SYSTEMS: A STUDY OF USER PERFORMANCE AND SOFWARE AGENT LEARNING COHEN 2004
KATHLEEN ROBERTS INFUSING ONLINE COMPONENTS INTO THE ACADEMIC COURSEWORK OFCOMPREHENSIVE HIGHSCHOOLS IN THE STATE OF NEW YORK USING HSTOR-E ABRAMSON 2004
ELLEN SCALESE A MODEL TO INCREASE PERSISTENCE IN POST-SECONDARY ONLINE EDUCATION ABRAMSON 2004
LAWRENCE SHAFER DATA DRIVEN CALCULATION HISTORIES TO MINIMIZE IEEE-754 FLOATING-POINT COMPUTATIONAL ERROR LASZLO 2004
ROBERT STEPHENS A FRAMEWORK FOR THE IDENTIFICATION OF ELECTRONIC COMMERCE DESIGN ELEMENTS THAT ENABLE TRUST WITHIN THE SMALL HOTEL INDUSTRY COHEN 2004
EDIT SZANTO DEVELOPMENT OF A COPYRIGHT AND INTELLECTUAL PROPERTY POLICY AND ONLINE TRAINING FOR A COMMUNITY COLLEGE ABRAMSON 2004
UTAKO TANIGAWA A STUDY OF THE PROCESSES OF WHICH ENTERPRISE ARCHITECTURE DECISIONS ARE MADE NYSHADHAM 2004
EDDIE WACHTER A STUDY OF THE USE OF FORENSIC MULTIMEDIA IN THE COURTROOM DRINGUS 2004
CAROL WOODY APPLYING SECURITY RISK MANAGEMENT TO INTERNET CONNECTIVITY IN K-12 SCHOOLS LITTMAN 2004
VALERIE AKUNA FACULTY PERCEPTIONS OF INSTRUCTIONAL MANAGEMENT SYSTEMS IN WEB-BASED TEACHING AND LEARNING LITTMAN 2003
KEVIN ANDREYO INTEGRATING MULTIMEDIA AUTHORING INTO THE MIDDLE SCHOOL CURRICULUM ABRAMSON 2003
JEFFREY APPEL ACCOMMODATING WORKPLACE NEEDS WITH AN ON-LINE SOFTWARE ENGINEERING TUTORIAL ABRAMSON 2003
LISA BAIN USER-INTERFACE DESIGN IN ONLINE SHOPPING ENVIRONMENTS: THE DEVELOPMENT OF A PRODUCT INTERACTION MODEL (PIM) FROM INTERACTIVE DESIGN ELEMENTS COHEN 2003
RONALD BOOTH AN INFORMATION SYSTEMS PROJECT DELIVERY METHODOLOGY FOR IMPLEMENTING WEB-BASED PROGRAM MANAGEMENT SYSTEMS SCIGLIANO 2003
DONNA CACCIOPPO THE MEASUREMENT OF ENVIRONMENTAL FACTORS DURING FUNCITON POINT CALCULATIONS LEITNER 2003
JOHN CANE ASSESSMENT OF WEB APPLICATION TECHNOLOGY LEITNER 2003
STEVEN CASE PERFORMANCE MODELING OF ASYNCHRONOUS REAL-TIME COMMUNICATION WITHIN BLUETOOTH NETWORKS SIMCO 2003
RAYLENE COCHRAN USING E-BOOK READERS TO ASSIST ESL STUDENTS IN DEVELOPING THEIR ACADEMIC LANGUAGE SKILLS ELLIS 2003
MEGAN CONKLIN DISCOVERING INTERESTING RULES USING A PARALLEL, MULTI-CRITERIA KNOWLEDGE DISCOVERY SYSTEM SUN 2003
JEAN COPPOLA THE MODEL E-CLASSROOM FOR HIGHER EDUCATION: A CASE STUDY LITTMAN 2003
D BRUCE CURRY DEVELOPING A WIDER VIEW OF EDUCATIONAL TECHNOLOGY THROUGH UBIQUITOUS COMPUTING: A QUALITATIVE CASE STUDY ABRAMSON 2003
BONITA GACNIK THE DESIGN OF AN ONLINE OBLATE PROGRAM: BENEDICTINE SPIRITUALITY FOR THE LAITY ABRAMSON 2003
ELLEN GLAZER A CASE STUDY: A DISTANCE EDUCATION PROFESSIONAL PILOT TECHNOLOGY ASSOCIATE OF SCIENCE DEGREE PROGRAM LITTMAN 2003
JUDITH HORVATH A MULTIPLE ONLINE LEARNING PLATFORM STUDY OF THE IMPACT OF LEARNING STYLE ON ACADEMIC PERFORMANCE COHEN 2003
STEPHEN HUBER AN INVESTIGATION OF THE RELATIONSHIPS BETWEEN WORKFLOW AND THE IMPLEMENTATION OF OBJECT-ORIENTED METHODS SCIGLIANO 2003
FREDERICK HUNDLEY COLLABORATIVE LEARNING AND WIRELES LOCAL AREA NETWORKS ELLIS 2003
RANDY JUSTICE INFERENTIAL DISCLOSURE LIMITATION IN MULTIVARIATE CATEGORICAL DATABASES MUKHERJEE 2003
CHRISTINA LAIACONA IMPLICATIONS OF THE 21 CFR PART II-COMPUTER VALIDATIONS AND COTS SYSTEM TESTING ZINK 2003
JOHN LOMBARDI SECURING WEB BASED TRANSACTION SERVICES CANNADY 2003
GLORIA MACCORKINDALE THE ADAPTATION AND IMPLEMENTATION OF ISTE STANDARDS IN THE INTEGRATION OF TECHNOLOGY-BASED LEARNING IN THE CLASSROOM ELLIS 2003
FRANCISCO MITROPOULOS EXTRACTION AND REPRESENTATION OF OBJECT ORIENTED SOFTWARE METRICS FROM BINARY PROGRAMS SIMCO 2003
PATRICIA MORGENSTERN IMPLEMENTATION OF A WIRELESS LAN IN A UNIVERSITY ENVIRONMENT: THE WESTERN MICHIGAN UNIVERSITY HAWORTH COLLEGE OF BUSINESS CASE STUDY LITTMAN 2003
HERBERT MUSE A RETENTION ISSUE - PREDICTING THE AT-RISK STUDENT IN COMMUNITY COLLEGE WEB-BASED CLASSES DRINGUS 2003
EJIKE OKONKWO AN INVESTIGATION OF THE SKILL SETS NEEDED BY INFORMATION SYSTEMS MANAGERS TO COPE EFFECTIVELY WITH THE TRANSITION FROM LEGACY SYSTEMS TO CLIENT/SERVER AND INTERNET ENVIRONMENTS SCIGLIANO 2003
CHAELYNNE POPE A MODEL FOR THE IMPLEMENTATION OF A BLOG IN A MANUFACTURING ENVIRONMENT LITTMAN 2003
PETER RAETH FINDING UNEXPECTIED EVENTS IN STARING CONTINUOUS-DWELL SENSOR DATA STREAMS VIA ADAPTIVE PREDICTION CANNADY 2003
JOSEPH RAMSEY AN INTEGRATED SECURED OPEN-SOURCE MEDICAL PROTOTYPE FOR COLLABORATIVE PATIENT MANAGEMENT ON THE INTERNET SCIGLIANO 2003
MITCH RATON A COMPARATIVE ANALYSIS OF DESIGN TECHNIQUES FOR THE CONSTRUCTION OF A EXPERT SYSTEM FOR AIRCRAFT ENGINE DIAGNOSTICS SIMCO 2003
EVERETT RYAN A MODEL FOR STRATEGIC PLANNING AND ADMINISTRING AN ASYNCHRONOUS LEARNING NETWORK AND SCORM WITHIN THE HIGHER EDUCATIN USING THE UML SCIGLIANO 2003
JERRY SMITH INVESTIGATING THE ROLE OF SEXUAL REPRODUCTION IN DIPLOIDY AGE-STRUCTURED EVOLUTIONARY POPULATIONS SIMCO 2003
MARIA TORAL A COMPARATIVE STUDY OF HISPANIC STUDENTS ACHIEVEMENT IN TRADITIONAL IN-CLASS COURSES AND INTERNET-BASED COURSES TERRELL 2003
GARY WANE WEB SERVICES BASED AGENTS FOR SUPPLY CHAIN COLLABORATIVE CONTRACT INITIATION MUKHERJEE 2003
MEGHAN WILLIAMS A TAXONOMY OF MEDIA USAGE IN MULTIMEDIA (T-MUM) COHEN 2003
RONALD WOLAK WIRELESS LAN TECHNOLOGIES: A MODEL FOR PLANNING, DESIGNING, AND IMPLEMENTING A WLAN SOLUTION IN A GLOBAL MANUFACTURING ENTERPRISE LITTMAN 2003
ILYA YAKOVLEV A MODEL OF CRITICAL SUCCESS FACTORS FOR IMPLEMENTING ENTERPRISE RESOURCE PLANNING PACKAGES IN HIGHER EDUCATION SCIGLIANO 2003
MUNTUCK YAP AN INVESTIGATION OF A DISTRIBUTED SEARCH MECHANISM CONSISTING OF A SET OF COOPERATIVE AGENTS IMPLEMENTED WITH DIFFERENT HEURISTICS SCHEMES LEITNER 2003
BEVERLY ALCOTT A COMPARATIVE STUDY OF ACHIEVEMENT OF STUDENTS IN A DISTANCE LEARNING SECOND LANGUAGE CLASS AND IN A TRADITIONAL CLASSROOM SECOND LANGUAGE CLASS TERRELL 2002
MERLE BASS AN INFORMATION TECHNOLOGY PARADIGM FOR A LOCAL POLICE DEPARTMENT LITTMAN 2002
DENNIS BAUER AN EVOLUTION STRATEGY FOR THE OPTIMIZATION OF NETWORK TRAFFIC TO DETECT ANOMALOUS BEHAVIOR CANNADY 2002
BRYCE BERNARD THE EFFECT OF COMPUTER – BASED ACCOUNTING PRACTICE SETS ON THE ACHIEVEMENT OF INTRODUCTORY COLLEGE ACCOUNTING STUDENTS TERRELL 2002
EUGENE BINGUE THE DEVELOPMENT OF RELIABLE METRICS TO MEASURE THE EFFICIENCY OF OBJECT– ORIENTED DISPATCHING USING ADA 95 A HIGH– LEVEL LANGUAGE IMPLEMENTING HARD-DEADLINE REAL-TIME PROGRAMMING LASZLO 2002
CESAR CASAS APPLICATION OF ARTIFICIAL NEURAL NETWORKS TO THE TACTICAL ASSET ALLOCATION MODEL MUKHERJEE 2002
GALEN COLLINS THE VIABILITY OF A SATELLITE - AND WEB-BASED LEARNING SYSTEM FOR THE HOSPITALITY INDUSTRY: A CASE STUDY LITTMAN 2002
ALFREDO CRUZ EVOLUTIONARY ALGORITHMS FOR VLSI TEST AUTOMATION MUKHERJEE 2002
CAROL CUSANO VISUALLY SEARCHING THE WEB FOR CONTENT: A USABILITY EVALUATION OF TWO SEACH INTERFACES DRINGUS 2002
WALTER DIXON THE GEOMETRIC MEAN AS A GENERATOR OF TRUTH-VALUE IN HEURISTIC EXPERT SYSTEMS: AN IMPROVEMENT OVER THE FUZZY WEIGTED ARITHMETIC MEAN CANNADY 2002
JAMES DOLLENS INTRUSION DETECTION VIA COMPUTER SYSTEM DNA SIMCO 2002
FARIDEH GOZLEVELI AN INVESTIGATION OF PROJECT DEPENDENCIES AND RISKS IN PROJECT SCHEDULE SLIPPAGE AND EFFORT OVERRUN IN THE ENGINEERING COMPUTING ORGANIZATION SCIGLIANO 2002
ANN GREER A MODEL FOR THE DELIVERY AND EVALUATION OF ASYNCHRONOUS AND INTERACTIVE SYNCHRONOUS LIBRARY SERVICES AT SOUTHERN ADVENTIST UNIVERSITY ZINK 2002
HENRY GUILD PARTICIPANTS IN A DISCUSSION FORUM USE STORYTELLING TO CREATE FLEXIBLE MEANS OF COMMUNICATION LEITNER 2002
JOSEPH GULLA DESIGN AND IMPLEMENTATION OF A PROTOTYPE TOOLSET FOR FULL LIFE CYCLE MANAGEMENT OF WEB-BASED APPLICATIONS SCIGLIANO 2002
ERNEST HAMPSON HIGH SPEED ROUTING TABLE LOOKUPS FOR CURRENT AND NEXT GENERATION INTERNET ROUTING SIMCO 2002
HAROLD HENKE A STUDY OF THE USE OF PAPER BOOK METAPHORS IN THE DESIGN OF ELECTRONIC BOOKS DRINGUS 2002
JON INOUYE A TECHNIQUE FOR VISUALIZING SOFTWARE ARCHITECTURES LASZLO 2002
STEPHANIE KARRAN UTILIZATION OF INTERNET2 FOR COLLABORATIVE TELE-EDUCATION: A CASE STUDY LITTMAN 2002
ERNEST KLERKS NEURAL NETWORKS TO PREDICT THE PROPERTIES OF A NEW TYPE OF BATCH HOT DIP GALVANIZED STEEL MUKHERJEE 2002
AMY KORESDOSKI THE VALUE OF DISTANCE LEARNING GRADUATE DEGREE PROGRAMS TO EMPLOYERS AND EMPLOYEES ABRAMSON 2002
JENNIFER LAGIER FELLGUTH MEASURING USAGE OF DIGITAL RESOURCES AT HARNELL COLLEGE: AN EVALUATION OF SELECTED ELECTRONIC FULL-TEXT DATABASES. DRINGUS 2002
GARY LOCKLAIR FOUNDATIONS OF COMPUTER SCIENCE A SURVEY OF COMPUTER SCIENCE VIA ITS GRAND IDEAS LASZLO 2002
LYNDA LOUIS AN EMPIRICAL INVESTIGATION OF EMPLOYEE PERCEPTIONS OF OUTSOURCING SUCCESS OF INFORMATION TECHNOLOGY OPERATIONS MUKHERJEE 2002
JO LUNDY USING THE INTERNET TO BUILD COMMUNITY AND PROVIDE CLINICAL PRACTICE GUIDELINES FOR CAMP NURSES ABRAMSON 2002
STACY NOWICKI STUDENTS SUCCESS WITH WORLD WIDE WEB SEARCH ENGINES RETRIEVING RELEVANT RESULTS WITH RESPECT TO END-USER RELEVANCE JUDGEMENTS ZINK 2002
MC-CHESTER ODOH DATA CONVERSION: AN INVESTIGATION OF MANAGEMENTS ROLE IN THE CHANGE PROCESS SCIGLIANO 2002
ROBERT POLSELLI INTEGRATING COMPUTER TECHNOLOGY INTO THE K-12 CLASSROOM: A WEB-BASED TRAINING & MENTORSHIP MODEL ELLIS 2002
EASTON RHODD ENTERPRISE INTEGRATION MODELING: LINKING ENTERPRISE INTEGRATION ARCHITECTURE WITH BUSINESS STRATEGY PLANNING SCIGLIANO 2002
MARIA RODRIGO INFORMATION TECHNOLOGY USAGE IN METRO MANILA PUBLIC AND PRIVATE SCHOOLS ZINK 2002
SARAH SCHRIRE LEARNING PROCESSES AND MODERATION TECHNIQUES IN ASYNCHRONOUS LEARNING NETWORKS ABRAMSON 2002
WILLIAM SMITH THE EFFECT ON COGNITIVE LOAD BY USING VISUAL MODELING TOOLS TO TEACH OBJECT-ORIENTED PROGRAMMING TO STUDENTS WHO HAVE HIGH PRIOR EXPERIENCE WITH PROCEDURAL PROGRAMMING ELLIS 2002
MARTHA SNYDER THE DESIGN AND DELIVERY OF ONLINE LEARNING COMMUNITIES FOR OLDER ADULTS ABRAMSON 2002
RONALD SPERANO AN INVESTIGATION INTO THE EFFECTIVENESS OF A PORTABLE ELECTRONIC MEETING SYSTEM IN A COLOCATED COMPUTER SUPPORTED COOPERATIVE WORK ENVIRONMENT LITTMAN 2002
BEVERLY SWISSHELM A COMPARISON OF THE USE OF ARTIFICIAL NEURAL NETWORKS, FRACTAL TIME SERIES AND FRACTAL NEURAL NETWORKS IN FINANCIAL FORCASTING MUKHERJEE 2002
ROY TAUNTON Y2K SERENDIPITY: BENEFITS AND SPINOFFS SCIGLIANO 2002
TRIROJ VIROJTRIRATANA THE LINKAGE OF COMPETITIVE STRATEGY, INFORMATION TECHNOLOGY (IT) MATURITY AND SIZE WITH STRATEGIC RESPONSE TO FINANCIAL LIBERALIZATION OF THAI FINANCIAL INSTITUTIONS ZINK 2002
CAROLE WILKINSON A STUDY TO DETERMINE THE PREDICTORS OF SUCCESS IN AN ONLINE COLLEGE GRADUATE PROGRAM TERRELL 2002
STEVEN BERNSTEIN A COMPARISON OF TRADITIONAL-COMPUTER ASSISTED FEEDBACK AND GENERAL MULTIMEDIA FEEDBACK IN A WEB-BASED PHYSICAL THERAPY ASSIGNMENT TERRELL 2001
WENYI BI KNOWLEDGE DISCOVERY BY ATTRIBUTE-ORIENTED APPROACH UNDER DIRECTED ACYCLIC CONCEPT GRAPH (DACG) SUN 2001
JOSEPH BIANCO WEB INFORMATION SYSTEM (WIS): INFORMATION DELIVERY THROUGH WEB BROWSERS SALAZAR 2001
GARY HASMAN GUIDELINES FOR DEVELOPMENT OF COURSES FOR DELIVERY OVER THE IOWA COMMUNICATIONS NETWORK TERRELL 2001
DIANE HAYES INTELLECTUAL CAPITAL MANAGEMENT AMONG PROJECT MANAGERS IN THE INFORMATION TECHNOLOGY DOMAIN MANNING 2001
DOMINIQUE HEGER THE DESIGN OF A LOGARITHMIC FILE DATA ALLOCATION ALGORITHM FOR EXTENT BASED FILE SYSTEMS SIMCO 2001
DAVID HENDRICKSON STOCHASTIC DISCRETE EVENT SIMULATION USING PRODUCT-FORM QUEUING NETWORKS TO MODEL STEADY-STATE BEHAVIOR: AN EXAMINATION OF A MEDICAL DEVICE COMMUNICATIONS NETWORK LITTMAN 2001
CHERYL HILL DEVELOPMENT OF COMPUTER SKILLS IN PHYSICAL THERAPY STUDENTS TERRELL 2001
JOHN HIPPS AN XML MODEL OF A COLLABORATION TOOL FOR SUPPORTING EXTRANET-BASED WORKFLOW AUTOMATION SCIGLIANO 2001
DAVID JACOBS AN XML BASED AUTHORIZATION FRAMEWORK FOR WEB-BASED APPLICATIONS MUKHERJEE 2001
SALLIE JOHNSON FACULTY ATTITUDES TOWARD EDUCATIONAL TECHNOLOGY: AN ENTENSION OF BULLARDS ANALYSIS OF SELECTED VARIABLES DRINGUS 2001
DAVID JONES A SOFTWARE REENGINEERING METHOD FOR EVOLVING A STRUCTURED LEGACY SYSTEM TO AN OBJECT-ORIENTED SYSTEM MODEL USING THE UNIFIED MODELING LANGUAGE SCIGLIANO 2001
ROBERT KERBS THE EXTRACTION OF CLASSIFICATION RULES AND DECISION TREES FROM INDEPENDENCE DIAGRAMS SUN 2001
FRANK NASUTI KNOWLEDGE ACQUISITION USING MULTIPLE DOMAIN EXPERTS IN THE DESIGN AND DEVELOPMENT OF AN EXPERT SYSTEM FOR DISASTER RECOVERY PLANNING MUKHERJEE 2001
ALAN PESLAK A FIRM LEVEL STUDY OF INFORMATION TECHNOLOGY PRODUCTIVITY USING FINANCIAL AND MARKET BASED MEASURES MUKHERJEE 2001
THANH PHAM DYNAMIC UPDATE TECHNIQUES FOR ONLINE MAPS AND ATTRIBUTES DATA MUKHERJEE 2001
MASOOD POORANDI THE IMPACT OF GRAPHING CALCULATORS IN TEACHING MATHEMATICS TERRELL 2001
KENNETH REVELS DYNAMIC UPDATE TECHNIQUES FOR ON-LINE MAPS AND ATTRIBUTES DATA MUKHERJEE 2001
VIRGINIA ROSENKRANS ELECTRONIC COMMERCE AND INTERNET ADVERTISING MANNING 2001
WILLIAM RYAN COMPARISON OF STUDENT PERFORMANCE AND ATTITUDE IN A LECTURE CLASS TO STUDENT PERFORMANCE AND ATTITUDE IN A TELECOURSE AND A WEB-BASED CLASS COHEN 2001
MIRIAM SCHCOLNIK A STUDY OF READING WITH DEDICATED E-READERS ABRAMSON 2001
PATRICIA SPERANO THE DEVELOPMENT OF AN INTRANET-BASED ELECTRONIC PERFORMANCE SUPPORT SYSTEM FOR KNOWLEDGE MANAGEMENT WORKERS ABRAMSON 2001
LEON STEVENS A MODEL FOR TRANSFORMING LEGACY SYSTEMS IN A CLIENT/SERVER ENVIRONMENT BASED ON THE UNIFIED MODELING LANGUAGE (UML) SCIGLIANO 2001
CAROLYN VOEGLER THE DESIGN AND IMPLEMENTATION OF A WEB-BASED SYSTEM TO AID STUDENTS IN RESOURCE LOCATION IN A PRIVATE HIGH SCHOOL LIBRARY SETTING ZINK 2001
GIOCONDA WEINER CONSTRUCTING VIRTUAL INTERNET AGENTS TO IMPROVE LEARNING ABRAMSON 2001
JOHN WILLIAMS A STUDY OF THE CORRELATION OF THE ISO-9000 QUALITY CONTROL PROGRAM ON THE FINANCIAL RESULTS OF INFORMATION TECHNOLOGY COMPANIES WHO HAVE ACHIEVED ISO-9000 CERTIFICATION TERRELL 2001
MANUEL ASTTE A COMPARISON OF INTRANET TRANING PROGRAMS WITH TRADITIONAL CLASSROOM INSTRUCTION FOR LOCAL GOVERNMENT EMPLOYEES COHEN 2000
JAMES BACKER MULTI-USER DOMAIN OBJECT ORIENTED (MOO) AS A HIGH SCHOOL PROCEDURE FOR FOREIGN LANGUAGE ACQUISITION ABRAMSON 2000
NONI BOHONAK FINDING A FITNESS FUNCTION TO BE USED WITH GENETIC ALGORITHMS TO SOLVE A PROTEIN FOLDING PROBLEM: THE AB INITIO PREDICTION OF A PROTEIN USING TORSION ANGLES LASZLO 2000
JAMES CANNADY AN ADAPTIVE NEUTRAL NETWORK APPROACH TO INTRUSION DETECTION AND RESPONSE MUKHERJEE 2000
JOSEPH CANNON APPROXIMATION OF MARGINAL PROBABILITIES WHILE LEARNING BAYESIAN NETWORKS MUKHERJEE 2000
PATRICIA COWHERD A STUDY TO DETERMINE TECHNOLOGICAL SKILLS AND COMPETENCIES NEEDED FOR OFFICE EMPLOYMENT AS REPORTED BY SELECTED EMPLOYERS IN THE SOUTH CENTRAL KENTUCKY LAKE CUMBERLAND AREA DEVELOPMENT DISTRICT TERRELL 2000
JANCIS DENNIS PROBLEM-BASED LEARNING IN COMPUTER-MEDIATED VERSUS FACE-TO-FACE GROUPS: A COMPARISON OF LEARNING BEHAVIORS AND OUTCOMES OF ENTRY-LEVEL PHYSICAL THERAPY STUDENTS IN A MODULE ON WOMEN’S HEALTH ABRAMSON 2000
PATRICIA DEUBEL MATHEMATICS SOFTWARE AND ACHIEVEMENT ON THE OHIO NINTH GRADE PROFICIENCY TEST ABRAMSON 2000
LISA DEZIEL-EVANS AN INVESTIGATION OF CRITICAL THINKING IN SYNCHRONOUS AND ASYNCHRONOUS COMPUTER CONFERENCING ENVIRONMENTS DRINGUS 2000
PAULA DOHERTY SUCCESS FACTORS AMONG COMMUNITY COLLEGE STUDENTS IN AN ONLINE LEARNING ENVIROMENT TERRELL 2000
ROBERT GRENIER AN OBJECT-ORIENTED MODEL FOR INTERORGANIZATIONAL COLLABORATIVE PLANNING GUILD 2000
LAWRENCE GROSBERG IMPROVING SECURITY AND PERFORMANCE OF GENERAL CRYPTOSYSTEMS BASED UPON SHANNONS PERFECT SECRECY AND MESSAGE PRIORITIZATION LEITNER 2000
STEPHEN HANSEN COMPLETE RANDOMIZED CUTTING PLANE ALGORITHMS FOR PROPOSITIONAL SATISFIABILITY LEITNER 2000
HAJIME HAYAKAWA INTERNATIONAL USABILITY DESIGN GUIDELINES AND EFFECTIVEMESS OF A WORLD WIDE WEB-BASED INSTRUCATIONAL PROGRAM FOR HIGHT SCHOOL STUDENTS IN A CROSS CULTURE LEARNING ENVIROMENT ABRAMSON 2000
JAMES HENDEE A DATA-DRIVEN SOFT REAL TIME EXPERT SYSTEM FOR PRODUCING CORAL BLEACHING ALERTS MURRAY 2000
THERESA JU THE DESIGN OF AN INTEROPERABLE AND ADAPTABLE WORKFLOW MANAGEMENT SYSTEM USING XML SCIGLIANO 2000
GABRIEL KENGNI STRUCTURAL DESIGN OF A FAST CONVERGANCE ALGORITHM: A SEMI-UNIVERAL ROUTING PROTOCOL LEITNER 2000
RAGHUBABU KORRAPATI A BAYESIAN FRAMEWORK TO DETERMINE PATIENT COMPLIANCE IN GLAUCOMA CASES MUKHERJEE 2000
JAMES LOGAN THE REQUIREMENTS FOR A CONTEMPORARY X.400 MAIL SYSTEM FOR DISTRIBUTED NETWORKS GUILD 2000
JOANNE MARLOWE SMART CARD SYSTEMS: DEVELOPMENT OF A PARADIGM FOR A UNIVERSITY-WIDE SMART CARD STUDENT IDENTIFICATION SYSTEM LITTMAN 2000
MARGARET MARSTON TECHNOLOGY – BASED TRAINING FOR TEACHERS OF THE VISUALLY IMPAIRED IN THE USE OF SPEECH-SUPPORTED TELECOMMUNICATIONS ABRAMSON 2000
BRUCE MARTIN EFFECTS OF DEPARTMENT OF DEFENSE ACQUISITION REFORM ON MILITARY SOFTWARE DEVELOPMENT PROGRAMS GUILD 2000
PROGRESS MTSHALI MINIMIZING PARALLEL VIRTUAL MACHINE (PVM) TASKS EXECUTION TIMES THROUGH OPTIMAL HOST ASSIGNMENTS MUKHERJEE 2000
SHARRON REDDEN SELF- ESTEEM AND INTRINSIC MOTIVATIONAL EFFECTS OF USING A CONSTRUCTIVIST AND A BEHAVIORIST APPROACH TO COMPUTER USAGE IN FIFTH GRADE HISPANIC CLASSROOMS TERRELL 2000
ANDREW RUNYAN PERSISTENCE DIFFERENCES IN COMMUNITY COLLEGE COURSES TAUGHT IN CLASSROOMS AND THROUGH ALTERNATIVE FORMATS ABRAMSON 2000
LYNETTE SCHNEIDER A COMPARISON OF THE USER INTERFACE FEATURES OF THE FREE VERSIONS OF MEDLINE ON THE INTERNET WORLD WIDE WEB LITTMAN 2000
MICHAEL SIGNOR THE FAILURE ANALYSIS MATRIX: A USABLE MODEL FOR RANKING SOLUTIONS TO FAILURES IN INFORMATION SYSTEMS DRINGUS 2000
JESSE SMITH THE FEASIBILITY OF DEVELOPING A COMPUTER EXPERT SYSTEM TO MITIGATE NUCLEAR POWER PLANT ACCIDENTS MUKHERJEE 2000
KENNETH SPENCER A COMPARISON OF CONATIVE LEVELS AMOUNG LEARNERS WHEN DIFFERENT METHODS OF TRAINING ARE USED. ABRAMSON 2000
HELEN ST. AUBIN IMPLEMENTING A VIRTUAL REALITY PARADIGM IN HUMAN ANATOMY/PHYSIOLOGY COLLEGE CURRICULA ABRAMSON 2000
ROBERT STEINHOFF A PERFORMANCE COMPARISON OF TREE-BASED GENETIC PROGRAMMING VERSUS STACK-BASED GENETIC PROGRAMMING USING THE JAVA VIRTUAL MACHINE LEITNER 2000
VIRGELEAN THORN A COMPARATIVE STUDY OF THE EFFECTIVENESS OF THREE MODELS OF DISTANCE EDUCATION STUDENT ACHIEVEMENT AND LEVEL OF SATISFACTION. TERRELL 2000
RAMONA TOWNSEND AN INTERNET-BASED COLLABORATIVE PROTOTYPE FOR (SAP R/3) DATABASE ADMINISTRATION SCIGLIANO 2000
JOHN VIREN IMPLICATIONS OF CONTRAST SENSITIVITY IN INFORMATION CUEING ABRAMSON 2000
MICHAEL WILLIAMS TRAINING AVIATION MAINTENANCE TECHNICIANS WITH INFORMATION RETRIEVAL SYSTEMS ABRAMSON 2000
DONALD WISMER STATE GOVERNMENT COST RECOVERY FOR ELECTRONIC INFORMATION DISSEMINATION: A COMPARATIVE STUDY ZINK 2000
ERIC S. ACKERMAN DESIGNING A COMPUTER SYSTEM TO CONTROL SEVERAL SMALL EXPERIMENTS IN A SPACE ENVIRONMENT GUILD 1999
ARCHIE ADDO AN EXPERT SYSTEM FOR THE SELECTION OF ELECTRONIC PAYMENT SYSTEMS BASED ON ORGANIZATIONAL SECURITY REQUIREMENTS MUKHERJEE 1999
RICHARD BAKER INFORMATIONS SYSTEMS PROJECTS:LEADERSHIP AS A CRITICAL SUCCESS MANNING 1999
KATHLEEN CAHALAN DESIGN OF THE ELECTRONIC CLASSROOM GRAPHICAL USER INTERFACE: NOVA SOUTHEASTERN UNIVERSITY’S MULTIMEDIA ELECTRONIC CLASSROOM PROJECT SCIGLIANO 1999
DORTHEA CAMP-WHITE EFFECTS OF STUDENT PARTICIPATION IN A SELF CONTAINED FIFTH-GRADE MULTIMEDIA CLASSROOM ON STUDENT ACHIEVEMENT AND ADJUSTMENT TO THE MIDDLE SCHOOL SETTING COHEN 1999
RUEY-MING CHAO THE CRITICAL DISTANCE-LEARNING METRICS FOR STUDENT NEEDS AND SATISFACTION GUILD 1999
MING-CHE CHEN SUCCESSFUL WEB DESIGN FACTORS IN COMMERCIAL WEB SITES: A CASE STUDY GUILD 1999
EDWARD CROOK LINKING PRINTED BOOKS TO COMPUTERIZED SPEECH ABRAMSON 1999
NESTOR DIAZ EFFECTS OF MULTIMEDIA INSTRUCTION ON THE MATHEMATICS PERFORMANCE OF LIMITED ENGLISH PROFICIENT STUDENTS TERRELL 1999
YAW FRIMPONG A PROJECT MANAGEMENT PROTOTYPE FOR COLLABORATIVE PROJECTS ON THE INTERNET LEVIN 1999
WILLIAM GROOVER THE DESIGN OF AN EXPERT SYSTEM FOR ACADEMIC ADVISING AT A TWO-YEAR COMMUNITY COLLEGE MUKHERJEE 1999
JAMES GRUNWALD THE USE OF COOPERATIVE GROUPS IN LEARNING HOW TO USE NEW SOFTWARE PROGRAMS TERRELL 1999
WILLIAM HAFNER REQUIREMENTS AND ARCHITECTURE FOR A GROUP MEMORY IN THE ANY-TIME/ANY-PLACE DOMAIN OF COMPUTER SUPPORTED COOPERATIVE WORK DRINGUS 1999
MARC INGLE AN EXPERIMENTAL COMPARISON OF STUDENT PERFORMANCE IN A WEB-BASED VERSUS A LECTURE-BASED CLASSROOM ABRAMSON 1999
DOUGLAS L. JACOBS COLOR CALIBRATION OF COMPUTER DISPLAY DEVICES LASZLO 1999
MAURY E. JOHNSON PLANNING GENETIC ALGORITHM: PURSUING META-KNOWLEDGE SALAZAR 1999
KITTISAK KERDPRASOP ACTIVE DATABASE RULE SET REDUCTION BY KNOWLEDGE DISCOVERY SUN 1999
NITTAYA KERDPRASOP THE APPLICATION OF INDUCTIVE LOGIC PROGRAMMING TO SUPPORT SEMANTIC QUERY OPTIMIZATION SUN 1999
DIANE KING A MODEL FOR IN-HOUSE DEVELOPMENT OF COMPUTER-BASED TRAINING ABRAMSON 1999
CHRISTINE LAWES ASSESSMENT OF THE EFFECTS OF A TECHNICAL PREPARATION PROGRAM OF INSTRUCTION ON THE ACADEMIC ACHIEVEMENT AND RETENTION OF SECONDARY STUDENTS GUILD 1999
JUEEN LEE USING WEB BASED INSTRUCTION TO IMPROVE ACHIEVEMENT IN PROFESSIONAL COURSES IN THE CHINESE NAVAL ACADEMY ABRAMSON 1999
SUNHEE LEE AN INVESTIGATION OF THE EMERGING ROLE OF INFORMATION SYSTEMS PROFESSIONAL IN A CLIENT/SERVE ENVIRONMENT. LEVIN 1999
DONALD LEMMA A THEORETICAL MODEL FOR A PRESCRIPTION DRUG PUBLIC KEY CRYPTOGRAPHIC SYSTEM MUKHERJEE 1999
JENGLUNG LIN DESIGN PATTERNS FOR MODELING FILE SYSTEM SECUIRTY IN THE DISTRIBUTED ENVIRONMENT GUILD 1999
CRAIG S. LIPMAN MODELS FOR OPTIMIZING THE USE OF CONTRACTORS IN INFORMATION SYSTEMS APLICATION DEVELOPMENT OUTSOURCING SCIGLIANO 1999
JANE MAHONEY THE EFFECTS OF AIR TRAFFIC CONTROLLERS’ COGNITIVE STYLE, LEARNING STRATEGIES AND PERFORMANCE WITHIN A MULTIMEDIA TRAINING ENVIRONMENT TERRELL 1999
RORY MCGREAL A SYSTEMS ANALYSIS OF TELEEDUCATION NB – A PROVINCE-WIDE DISTRIBUTED DISTANCE LEARNING NETWORK LITTMAN 1999
GEORGE MCKEVITT A MODEL FOR AN AGENT BASED SYSTEM GUILD 1999
JOSEPH MCVEY A STUDY OF THE ATTITUDES OF MANAGEMENT AND EMPLOYEES TOWARD TELECOMMUTING TERRELL 1999
MARY G. COFFIN MURRAY AN ANALYSIS OF THE IMPLEMENTATION OF A WORKFLOW SYSTEM FOR HEALTH INFORMATION MANAGEMENT LITTMAN 1999
VICTOR ALLEN NGUYEN A SIMPLIFIED FACETED APPROACH TO INFORMATION RETRIEVAL FOR REUSABLE SOFTWARE CLASSIFICATION GUILD 1999
DENNIS R. PITTS LEARNING ABOUT SCIENTISTS IN A GENDER-EQUITABLE, MULTIMEDIA ENVIRONMENT ABRAMSON 1999
MITCHELL PRATT A STUDY OF THE COMPUTERIZED READING MANAGEMENT PROGRAM, ACCELERATED READER, AND ITS EFFECT ON READING AMONG PRIMARY GRADE STUDENTS ABRAMSON 1999
BELLARMIN N. SELVARAJ A REASONING MECHANISM IN THE PROBABILISTIC DATA MODEL BASED ON THE MAXIMUM ENTROPY FORMALISM SUN 1999
JOHN SULLIVAN STATEWIDE ONLINE WEB-BASED TRAINING PROGRAM TO PREPARE NEW JERSEY COMMUNITY COLLEGE FACULTY FOR DISTANCE TEACHING ABRAMSON 1999
TAKAAKI TOMIZAWA PICTGRAM: THE DESIGN AND IMPLEMENTATION OF A NEW VISUAL PROGRAMMING LANGUAGE LASZLO 1999
PATRICIA WHITE AN ARCHITECTURE DESIGN FOR A CUSTOMIZED GUI TO SUPPORT PERSONAL PREFERENCES GUILD 1999
YING-LU YEN BUILDING AN ASIAN CULTURAL GRAPHICAL USER INTERFACE (GUI) FOR EFFICIENT AND ADVANCED COMPUTING GUILD 1999
ANNE K. ABATE THE ROLE OF THE EINSTEIN LIBRARY OF NOVA SOUTHEASTERN UNIVERSITY IN MEETING THE NEEDS OF DISTANCE EDUCATION STUDENTS LITTMAN 1998
THERESA ANDUZE-PARIS A MICROWAVE LINK OVER WATER IN A TROPICAL ZONE CASE STUDY GUILD 1998
JAMES W. BARKER A LOW-COST, DECENTRALIZED, DISTRIBUTED COMPUTING ARCHITECTURE FOR AN AUTONOMOUS USER ENVIRONMENT SCIGLIANO 1998
ABBY H. BROWN SYSTEM REQUIREMENTS FOR A NEW MANAGEMENT CONTROL EXPERT SYSTEM GENERALIZED INFERENCE ENGINE INTERFACING WITH A CLIENT/SERVER NOTIFICATION SYSTEM GUILD 1998
MARK A. BROWN PROPOSITION OF THE TEMPORAL VARIATION DATA MODEL AND EVALUATION OF AN IMPLEMENTATION SUN 1998
JOYCE BETHEA BRYAN TECHNOLOGICAL LITERACY ASSESSMENT IN SECONDARY SCHOOLS THROUGH PORTFOLIO DEVELOPMENT ZINK 1998
PHYLLIS CHASSER THE EFFECT OF ALTERNATE FORMS OF FEEDBACK ON STUDENT ACHIEVEMENT AND MOTIVATION TERRELL 1998
JEANETTA R. CHRYSTIE A MODEL FOR APPLYING TOTAL QUALITY MANAGEMENT IN COMPUTER INFORMATION SYSTEMS MANAGEMENT SCIGLIANO 1998
FRANCIS R. CIRILLO A COMPLEXITY COMPARISON OF ADA 95 AND C++ GUILD 1998
VERNON L. CZELUSNIAK DESIGN AND IMPLEMENTATION: A CUSTOM INTERACTIVE MULTIMEDIA CBT FOR THE BLOOD-CELL ANALYSIS INDUSTRY ABRAMSON 1998
TIMOTHY ELLIS COMPUTER SUPPORTED, TIME AND PLACE INDEPENDENT DISTANCE EDUCATION FOR ADULT LEARNERS: A DEMONSTRATION PROJECT IN TEACHING FINANCIAL ACCOUNTING VIA THE INTERNET COHEN 1998
EILEEN SULEIMA ENNIS AN ANALYSIS OF USABILITY ISSUES OF THE WORLD WIDE WEB (WWW) DRINGUS 1998
ANDRES A. FOLLECO A PERFORMANCE ANALYSIS TOOL FOR UNIX MASSIVELY PARALLEL COMPUTERS BRUCE 1998
WILLIAM M. HARTMAN A STUDY TO DEFINE CURRENT PRACTICES, ATTITUDES AND VALUES IN THE SOFTWARE DEVELOPMENT COMMUNITY LIEBLEIN 1998
JOY A. HATCH THE EFFECT OF MULTIMEDIA TRAINING ON STUDENT PILOTS ENCOUNTERING EMERGENCY SITUATIONS ABRAMSON 1998
DAVID M. HEATH THE USE OF ELECTRONIC MEETING SYSTEM TECHNOLOGY TO AID IN SOFTWARE REQUIREMENTS ENGINEERING MUKHERJEE 1998
ARTHUR E. HILSCHER DEVELOPMENT AND PRODUCTION OF THE ELECTRONIC VIRTUAL” PHARMACEUTICAL DOSSIER ZINK 1998
DANIEL M. HSIEH A NEW METHOD TO UPDATE FLASH MEMORY: IN-SYSTEM PROGRAMMING ALGORITHMS FOR THE PERSONAL COMMUNICATOR SUN 1998
W. SIR ANTHONY JOHNSON JR. THE DYNAMICS OF COMPLEX SURFACES IN N-DIMENSIONS USING COMPUTER GRAPHICS GUILD 1998
DAVID T. LAURET THE AUDITORY DISPLAY IN INTERACTIVE COUSEWARE: MOVING HUMAN FACTORS INTO COMPUTER EDUCATION TERRELL 1998
REY LECLERC AN INVESTIGATION OF CRITICAL SUCCESS FACTORS AND PROCEDURES FOR IMPLEMENTING EFFECTIVE INFORMATION SYSTEMS SECURITY PROGRAMS SCIGLIANO 1998
GILDA LEWIS A NATIONAL APPROACH TO TOUCH KEYBOARDING INSTRUCTION ON COMPUTERS IN PRIMARY SCHOOLS IN BELIZE TERRELL 1998
WEN-YA LIN A LOAD BALANCING DATA ALLOCATION FOR PARALLEL QUERY PROCESSING SUN 1998
EDWARD C. LINDOO THE FUTURE OF NEWSPAPERS: A STUDY OF THE WORLD WIDE WEB AND ITS RELATIONSHIP TO ELECTRONIC PUBLISHING OF NEWSPAPERS COHEN 1998
S.J. LOMBARDI SUPPLEMENTING TEXTBOOK READING AND WRITING EXERCISES IN THE TYPICAL SPANISH III JESUIT HIGH SCHOOL LANGUAGE CLASSROOM WITH EMAIL CONFERENCES TERRELL 1998
KENNETH G. MACLEOD A CONCEPTUAL FRAMEWORK, IMPLEMENTATION PLAN, AND VISUAL GUIDE FOR THE INTERACTIVE MULTIMEDIA COURSEWARE DEVELOPMENT PROCESS ABRAMSON 1998
PHILLIP R. MARCUS INTERNET RETRIEVAL AND DISSEMINATION OF ENGINEERING DOCUMENTATION: PRELUDE TO THE WORLD WIDE WEB TECHNOLOGICAL MALL SCIGLIANO 1998
DAVID S. METCALF II DISTRIBUTED MULTIMEDIA INFORMATION AND TRAINING SYSTEMS: DEVELOPMENT OF A DESIGN MODEL FOR INTERACTIVE TRAINING USING THE WORLD WIDE WEB AS A DELIVERY SYSTEM LITTMAN 1998
TED MIKELL AN ANALYSIS OF SUCCESSFUL AND UNSUCCESSFUL IMPLEMENTATION OF TELECOMMUTING BY AN ORGANIZATION THROUGH IDENTIFICATION OF CRITICAL SUCCESS FACTORS MOODY 1998
SARAH J. MITCHELL REVITALIZING THE MIDCAREER COMPUTING TECHNICAL PROFESSIONAL (VOL. I) TERRELL 1998
SARAH J. MITCHELL REVITALIZING THE MIDCAREER COMPUTING TECHNICAL PROFESSIONAL (VOL. II) TERRELL 1998
PAUL V. MONTESINO EFFECT OF ELECTRONIC PORTFOLIO ASESSMENTS ON THE MOTIVATION AND COMPUTER INTEREST OF FOURTH AND FIFTH GRADE STUDENTS IN A MASSACHUSETTS SUBURBAN SCHOOL. TERRELL 1998
SIMON S. QIU A MORE GENERAL MARKOV RELIABILITY MODEL FOR COMPUTER SYSTEMS GUILD 1998
ROBERT C. RACITI CREATING COMPETITIVE ADVANTAGE WITH INTERNET TECHNOLOGY LITTMAN 1998
VICTOR DAVID SANCHEZ CONTRIBUTIONS TO SUPERVISED LEARNING OF REAL-VALUED FUNCTIONS USING NEUTRAL NETWORKS BRUCE 1998
LARRY A. SEARS POSSIBLE FUTURES: THE ROLE OF TECHNOLOGY IN EDUCATION TERRELL 1998
BARBARA SHEGOG AN INVESTIGATION OF THE RELATIONSHIPS BETWEEN CHARACTERISTICS OF TEACHERS AND THEIR ATTITUDES TOWARD TECHNOLOGY INTEGRATION IN THEIR COURSES SCIGLIANO 1998
RICHARD H. SUTOR AN EDUCATIONAL EXECUTIVE INFORMATION SYSTEM PROTOTYPE FOR PUBLIC SCHOOL DISTRICT SUPERINTENDENTS LEVIN 1998
PIN TAN NEURAL NETWORKS IN THE CALCULATION OF CARDIOVASCULAR EQUILIBRIUM VOLUME (VO) OF END-DIASTOLIC PRESSURE-VOLUME RELATIONSHIP STUDY CHENG 1998
MARGARET MAHONEY THOMBS ENHANCING THE ENGLISH WRITING SKILLS OF ESL STUDENTS USING E-MAIL WITH PRESERVICE TEACHERS AS MENTORS COHEN 1998
SALIM R. YAZBECK PLANNING, DESIGNING, AND INTEGRATING A DISTRIBUTED WIRELESS MOVILE INTRANET ARCHITECTRUE FOR LOCAL AND WIDE AREA NETWORKING AT A UNIVERSITY LITTMAN 1998
SAMUEL ABRAHAM THE USE OF PRESENTATION SOFTWARE (PS) BY COLLEGE FACULTY IN AN UNDERGRADUATE INSTITUTION TO ENHANCE THEIR TEACHING ABRAMSON 1997
LARRY E. BEEBE A MODEL FOR CULTURAL RESISTANCE IN BUSINESS PROCESS RE-ENGINEERING FAILURE TERRELL 1997
THOMAS E. BEUTEL DEVELOPMENT AND EVALUATION OF INTERACTIVE COURSEWARE FOR VISUALIZATION OF GRAPH DATA STRUCTURES AND ALGORITHMS ABRAMSON 1997
CANDICE L. BUCHANAN AN EXTENSION TO THE INFORMATION SYSTEM ARCHITECTURE FRAMEWORK FOR ELICITING AND REPRESENTING SYSTEM REUIREMENTS MOODY 1997
ROBERT H. CALABRESE AN INVESTIGATION OF COMMUNITY COLLEGE ADMINISTRATORS’ PERCEPTIONS OF EDUCATIONAL TECHNOLOGY FACILITIES TERRELL 1997
REBECA GOMEZ COHEN ANALYSIS, DESIGN, AND IMPLEMENTATION OF THE STUDENT ENROLLMENT MANAGEMENT SUPPORT SYSTEM IN THE COMMUNITY COLLEGE SYSTEM GUILD 1997
WILLIAM F. CONROY III AN INFORMATION MANAGEMENT SYSTEM TO SUPPORT THE DEPARTMENT OF DEFENSE TRANSPORTATION SYSTEM LITTMAN 1997
MARTIN DUCHOW BUILDING AN INFRASTRUCTURE IN IMPLEMENTING A COLLEGE CONSORTIUM SCIGLIANO 1997
MICHAEL FALAT THE INTERRELATIONSHIP BETWEEN CASE/I-CASE AND ORGANIZATIONAL/SOFTWARE MEASUREMENTS MOODY 1997
STAR M. FERDINAND THE STATE OF DISASTER RECOVERY PLANNING IN TEXAS SMALL BUSINESSES LASZLO 1997
YAW-SHYAN HUANG THE DEVELOPMENT OF ENTERPRISED-BASED IS FRAMEWORKS TO HANDLE OUTSOURCING BY SMALL AND MEDIUM ENTERPRISES IN THE REPUBLIC OF CHINA GUILD 1997
PARAVILA O. JACOB INTELLIGENT COLLISION WARNING SYSTEM BASED ON FUZZY LOGIC AND NEURAL NETWORK TECHNOLOGIES BRUCE 1997
JOHN P. KIRCHNER A METHOD FOR THE APPLICATION OF COMPUTER ANALYTIC TOOLS TO CLINICAL RESEARCH: NEURAL NETWORK ANALYSIS OF LIVER FUNCTION TESTS TO ASSIST IN THE DIFFERENTIAL DIAGNOSIS OF LIVER DISEASE GUILD 1997
HEE C. LEE OPTIMIZATION OF PAGING COST IN MOBILE SWITCHING SYSTEM BY GENETIC ALGORITHM SUN 1997
ROBERT B. LIPTON ELECTRONIC STUDENT PORTFOLIOS: A TOOL FOR PERFORMANCE-BASED ASSESSMENT (A PILOT PROJECT IN THE BERKS COUNTY PENNSYLVANIA SCHOOLS) ABRAMSON 1997
BABU V. MANI A CRITIQUE OF THE SOFTWARE REUSE FACILITIES IN C++ LASZLO 1997
CAMERON MATEIKA MULTIMEDIA DEVELOPMENT PROJECT FARMING FOR THE FUTURE CD-ROM ABRAMSON 1997
RONALD D. MCFARLAND CAUSAL INFERENCES OF ACHIEVEMENT BY ADULT LEARNERS AS DETERMINED BY LEARING STYLE DIFFERENCE IN HYPERTEXT-BASED COMPUTER-ASSISTED INSTRUCTION LITTMAN 1997
KATHRYN J. MOLAND AN EFFECTIVE SOFTWARE DEVELOPMENT METHODOLOGY FOR QUALITY SOFTWARE DEVELOPMENT IN A SCHEDULING DEPARTMENT MOODY 1997
FREDERICK MOXLEY II ON THE DEVELOPMENT OF A SOFTWARE ARCHITECTURE FOR A DISTRIBUTED INFORMATION SYSTEM THAT CAN SUPPORT THE WARRIOR AS ENVISIONED BY THE U.S. DEPARTMENT OF DEFENSE LITTMAN 1997
MANOJ S. PATANKAR A FRAMEWORK FOR THE DESIGN OF A VOICE-ACTIVATED, INTELLIGENT, AND HYPERMEDIA-BASED AIRCRAFT MAINTENANCE MANUAL ABRAMSON 1997
STEVEN PORIS EFFECTS OF COMPUTER-BASED COOPERATIVE LEARNING ON THE PROBLEM SOLVING SKILLS OF GRADE SIX STUDENTS TERRELL 1997
ELIZABETH L. RICH AN EMPIRICAL STUDY OF CRITICAL SUCCESS FACTORS FOR IMPLEMENTING CLIENT/SERVER HUMAN RESOURCE INFORMATION SYSTEMS MOODY 1997
JEAN M. ROEHRS A STUDY OF SOCIAL ORGANIZATIN IN SCIENCE IN THE AGE OF COMPUTER-MEDIATED-COMMUNICATION DRINGUS 1997
ROLANDO RUEDA DE LEON IDENTIFICATION OF CRITICAL SUCCESS FACTORS FOR THE IMPLEMENTATION OF ELECTRONIC DATA INTERCHANGE MOODY 1997
GREGORY E. SIMCO A METHODOLOGY FOR FILE SYSTEM PERFORMANCE EVALUATION GUILD 1997
BEVERLY SIMON PREDICTING SUCCESS IN COMPUTER SCIENCE AT A COMMUNITY COLLEGE TERRELL 1997
MARK STOVER THE CONSTRUCTION AND VALIDATION OF AN EVALUATIVE INSTRUMENT FOR ACADEMIC LIBRARY WORLD WIDE WEB SITES ZINK 1997
WINSTON M. TELLIS INFORMATION TECHNOLOGY IN A UNIVERSITY: AN INSTITUTIONAL CASE STUDY OF INSTRUCTIONAL AND RESEARCH COMPUTING IN A CLIENT/SERVER ENVIRIONMENT SCIGLIANO 1997
RICHARD E. TURNER THE EFFECT OF TOTAL QUALITY MANAGEMENT ON FACULTY PRODUCTIVITY TERRELL 1997
JR. URWILER THE EFFECTS OF USER INTERFACE METAPHORS ON THE LEARNABILITY OF COMPUTER SYSTEMS BY FIELD DEPENDENT AND FIELD INDEPENDENT COMPUTER USERS MOODY 1997
LARRY D. VAIL A COMPARISON OF THE MICROSOFT COMPONENT OBJECT MODEL WITH THE C++ AND SMALLTALK OBJECT MODELS GUILD 1997
HYACINTH WILLIAMS A PROPOSED SOLUTION FOR WORD-RECOGNITION DEFICIT IN THE COMPUTER ENVIRONMENT GUILD 1997
VICTOR G. WILLIAMS THE INFORMATION SYSTEM USED DURING THE JOB DESCRIPTION PROCESS FOR NEW MILITARY PERSONNEL AND ITS EFFECT ON JOB SATISFACTION TERRELL 1997
MARTHA L. CRAINE CEREBRAL DOMINANCE THEORY: COMPUTER SCIENCE CLAS SELECTION AND ACADEMIC ACHIEVEMENT TERRELL 1996
KATHRYN DIETZ CATALOGING OF CHILDREN’S PICTURE BOOKS: QUALITY IN THE AGE OF AUTOMATION LITTMAN 1996
MARK R. EATON INTERACTIVE FEATURES FOR AN HTML TUTORIAL IN A DISTANCE LEARNING PROGRAM LEVIN 1996
SUSAN FIFE DORCHAK AN INVESTIGATION OF DATA INTEGRITY IN ADA 95 GUILD 1996
PATRICIA GAINOUS AN INVESTIGATION INTO THE RELATIONSHIP BETWEEN CULTURALLY BASED SOFTWARE AND THE SELF-ESTEEM OF CHEROKEE STUDENTS KINGSBURY 1996
JR. GIL DEVELOPMENT OF AN EXPERT SYSTEM PROTOTYPE FOR THE ASSESSMENT OF DYSLEXIA AND ATTENTION DEFICIT HYPERACTIVITY DISORDER KINGSBURY 1996
MICHAEL R. GUNTER A DISTANCE EDUCATION CONFERENCING SYSTEM UTILIZING VOICE AND TEXT DATA OVER A LOW BANDWIDTH COMMUNICATIONS LINK LEVIN 1996
ROBERT H. LANE INFORMATION SYSTEMS IN NON-PROFIT ORGANIZATIONS: ENHANCING PERFORMANCE THROUGH ONLINE HELP KINGSBURY 1996
B.J. LEE AN INVESTIGATION OF THE POTENTIAL VERSUS ACTUAL USAGE OF EXPERT ELECTRICAL COST ESTIMATING SYSTEMS TERRELL 1996
LEE J. LEITNER THE MAPPING AND INTEGRATION OF THE HASKELL LANGUAGE TO THE COMMON OBJECT REQUEST BROKER ARCHITECTURE GUILD 1996
STEPHEN JOSEPH LOPEZ DESIGNING THE INTELLIGENT DATA NETWORK: AN ARCHITECTURAL MODEL FOR THE ENTERPRISE INFORMATION SYSTEM LITTMAN 1996
JR. MCDONALD FACTORS AFFECTING STUDENT ENROLLMENT AND RETENTION IN THE MASTER OF SCIENCE IN MANAGEMENT INFORMATION SYSTEMS DEGREE OFFERED BY NOVA SOUTHEASTERN UNIVERSITY TERRELL 1996
ROBERT LEE MILLER DESIGN INFORMATION RECOVERY FROM LEGACY SYSTEM COBOL SOURCE CODE: RESEARCH ON A REVERSE ENGINEERING METHODOLOGY SUN 1996
DAN A. NISWANDER AN ASSESSMENT OF ASYNCHRONOUS TRANSFER MODE (ATM) TRAINING FOR EDUCATORS LITTMAN 1996
SANDRA S. PARKER INVESTIGATION INTO AND RESOLUTION OF COPYRIGHT ISSUES IN SCHOOLS WITH CLOSED-CIRCUIT TELEVISION SYSTEMS LITTMAN 1996
DALE E. PERRIN A TELECOMMUNICATIONS-ORIENTED PROJECT CONTROL FRAMEWORK FOR A LEARNING TECHNOLOGY DEVELOPMENT ENVIRONMENT: APPLICATION TO SYSTEMS DEVELOPMENT LEVIN 1996
STEVEN R. SCHLOUGH AN ANALYSIS OF THE KNOWLEDGE, SKILL, AND ATTITUDES NEEDED IN A COMPUTER SUPPORTED WORK ENVIRONMENT KINGSBURY 1996
ANIL K. SHARMA A NEW DESIGN APPROACH TO AN EXPERT SYSTEM NETWORK MANAGER BASED ON AN ANALYSIS OF CONTEMPORARY DISTRIBUTED NETWORKS GUILD 1996
MICHAEL J. SIMPSON LOW COST VIDEO FOR DISTANCE EDUCATION LEVIN 1996
JAMI L. BILES ACTIVITIES OF STATE LIBRARY AGENCIES IN THE SOUTHEASTERN U.S. IN THE CONTINUING EDUCATIONAL PUBLIC LIBRARIANS LITTMAN 1995
TIMOTHY J. BRADY THE EFFECTS OF GRAMMAR AND STYLE CHECKING SOFTWARE ON THE WRITING OF THE 9TH GRADE BASIC STUDENTS IN A PROCESS CENTERED WRITING LAB. TERRELL 1995
VENESSA A. BROWN A COMPARATIVE STORY OF PRESERVICE AND INSERVICE TECHNOLOGICAL TRAINING FOR TEACHERS WITHIN THE SOUTHERN ASSOCIATION OF COLLEGES AND SCHOOL (SACS) REGION KINGSBURY 1995
WILKER BRUCE THE APPLICATION OF GENETIC PROGRAMMING TO THE AUTOMATIC GENERATION OF OBJECT-ORIENTED PROGRAMS ADAMS 1995
ROBERT L. CHIODO EFFECTS OF INTELLIGENT COMPUTER AIDED INST. USING HYPERMEDIA, DATABASE, AND EXPERT SYSTEMS ON THE SKILLS DEVELOPMENT AND PERFORMANCE OF ENTRY LEVEL, ADULT, WORDPERFECT STUDENTS CENTINI 1995
ALAN E. DILLMAN A STUDY OF VALUES CONGRUENCE AND TQM IN INFORMATION SYSTEMS ORGANIZATIONS DRINGUS 1995
CHRISTOPHER DUNHAM HEMISPHERICITY AND COMPUTER PROGRAMMING APTITUDE TERRELL 1995
DARRELL W. GREEN AUTHENTIC LEARNING IN ENGINEERING TECHNOLOGY THROUGH THE USE OF A TECHNOLOGY AND LEARNING MATRIX BASED CURRICULUM KINGSBURY 1995
GLENN GRIFFIN PREDICTING NAVAL AVIATOR FLIGHT TRAINING PERFORMANCE USING MULTIPLE REGRESSION AND AN ARTIFICIAL NEURAL NETWORK KINGSBURY 1995
CINDY MEYER HANCHEY A COMPARISON OF ETHICAL ATTITUDES OF UNIVERSITY STUDENTS WITH THOSE OF EXPERTS USING COMPUTER RELATED SCENARIOS KINGSBURY 1995
ADALECIA HASSELL COMPUTERS IN PUERTO RICO: TRAINING OF TEACHERS AND APPLICATIONS KINGSBURY 1995
ROBERT S. HOROWITZ IDEA ANALYSIS FOR THE DEVELOPMENT OF CLINICAL TRIAL STRATEGIES LITTMAN 1995
STEVEN A. KRANTZ LARGE-SCALE CLIENT/SERVER MIGRATION METHODOLOGY SALAZAR 1995
HAROLD RICHARD MORRIS THE EFFECTS OF MULTIMEDIA ON SELECTED CRITICAL THINKING SKILLS OF NON AT-RISK AND AT-RISK STUDENTS TERRELL 1995
LARRY DANIELD MOULDS AN ANALYSIS OF CURRENT TRAINING PRACTICES USED BY U.S. AND CANADIAN MEMBERS OF THE STEEL SERVICE CENTER INSTITUTE WITH EMPLOYEES WHO ARE GEOGRAPHICALLY LOCATED IN WIDELY DISPERSED SMALL GROUPS KINGSBURY 1995
NANCY J. RUMFIELD EFFECTS OF GRAPHICS AND PRESENTATION FORMAT ON INFORMATION RETENTION IN COLLEGE STUDENTS TERRELL 1995
KAREN M. RYDER THE EFFECTS ON PROGRAMMING IN A STRUCTURED LANGUAGE ON THE CRITICAL THINKING SKILLS OF COLLEGE STUDENTS KINGSBURY 1995
DANA V. TESONE DEVELOPMENT OF A MULTIMEDIA PUBLICATION IN HOSPITALITY AND TOURISM ETHICS FOR UNDERGRADUATE STUDENTS AND WORKPLACE TRAINING PROGRAMS KINGSBURY 1995
ANGELA M. TRUJILLO A NOVEL WIRELESS COMMUNICATIONS ARCHITECTURE FOR SUPPORTING LEGACY MAINFRAME DATA TRANSMISSION ADAMS 1995
WARREN VON WORLEY A TAXONOMY OF WORKGROUP COMPUTING APPLICATIONS DEITEL 1995
RONALD J. ASHLEY EFFECTIVENESS OF A SECONDARY SCHOOL HYPER-MEDIA BASED INSTRUCTIONAL PROG. IN BASIC LIB. SKILLS LITTMAN 1994
MARY BURKE WALL LONGITUDINAL DATABASE STUDY OF THE FACTORS INFLUENCING RETENTION FOR THE SPRING 1992 DEGREE SEEKING STUDENTS AT ATLANTIC COMMUNITY COLLEGE TERRELL 1994
STEPHEN CARROLL JONES FRESHMAN PLACEMENT FOR COMPUTER INFO SYSTEMS AT A WOMEN’S 4 YEAR LIBERAL ARTS COLLEGE IN ALABAMA KINGSBURY 1994
PATRICIA COLLINS GUIDELINES FOR INCORPORATING COMPLEX SCHEMATICS INTO COMPUTER ASSISTED INSTRUCTION CENTINI 1994
MIRCEA L. HALMU EFFECTS OF PARTICIPATORY DESIGN ON MEDICAL STAFF’S ATTITUDE TOWARD THE COMPUTERIZATION OF PATIENT RECORDS TERRELL 1994
AMOS E. HOLT TQM; IMPLEMENTATION IN A NOT-FOR-PROFIT RESEARCH & DEVELOPMENT ORGANIZATION MACFARLAND 1994
MARY HOSKEN DETERMINATION OF BUDGETARY EXPERTISE AMONG PUBLIC SCHOOLS LIBRARY LITTMAN 1994
DENNIS J. HUFF STRATEGIC PLAN FOR COMPUTING & TELECOMMUNICATIONS AT A UNIVERSITY SCIGLIANO 1994
MARY ANN JACKSON MCINTYRE STUDY TO EXAMINE THE EFFECTIVENESS OF COMPUTER ASSISTED INSTRUCTION ON MATHEMATICS ACHIEVEMENT KINGSBURY 1994
DONALD L. MCGARRY ELECTRONIC BULLETIN BOARD AS A MEANS OF PROFESSIONAL COMMUNICATION AMONG PHYSICS TEACHERS KINGSBURY 1994
JOHN S. MOORE FORMALIZATION OF A SLICING HIERARCHY & DEVELOPMENT OF ASSOC. PROCEDURES FOR RECTANGULAR DUALIZATION FROM A FOUR COMPLETION USING WALL DOMINANCE LEVIN 1994
DAVID L. ROTMAN DESIGN OF AN EFFECTIVE ECONOMICAL EXEC. INFORMATIONAL SYSTEM FOR CEDARVILL COLLEGE LEVIN 1994
RAUL A. SALAZAR THE DEVELOPMENT OF A PORTABLE AUTHORING SYSTEM ADAMS 1994
CAROLYN CHRISTINE SOLOMON SURVEY OF SOUTH CAROLINA INDUSTRIES & POST SECONDARY INST. TO DETERMINE COMPUTER SKILLS NEEDED BY HIGH SCHOOL GRADUATES KINGSBURY 1994
JONATHAN DAVID SPARKS DEVELOPING A COMPUTERIZED DISTANCE ADULT LEARNING SYSTEM FOR A LIBRARY PARAPROFESSIONAL INSERVICE TRAINING” COURSE LITTMAN 1994
PADMA VISWANATHAN IMPLEMENTING A RECURSIVE STRUCTURE IN A RELATIONAL DATA MODEL LEVIN 1994
JOHN R. WETSCH ASSESSING THE PRACTICE OF SYS. ADMIN. IN U.S. FEDERAL DIST. COURTS. KINGSBURY 1994
DEBORAH WICKER WRIGHT TEACHING THE WRITING PROCESS THROUGH COMPUTERS AS AN EARLY INTERVENTION TO THIRD GRADERS IN A NINE MO. ELEMENTARY SCHOOL LEVIN 1994
TINA M. BARRIOS THE INTERACTION BETWEEN COGNITIVE LEARNING STYLES AND ACADEMIC ACHIEVEMENT WHEN USING A MULTIMEDIA (HYPERMEDIA) INSTRUCTIONAL DELIVERY SYSTEM IN A HIGH SCHOOL ZOOLOGY COURSE KINGSBURY 1993
MARGARET BELL HENTZ DATA CONVERSION FROM FAXON’S SC-10 SERIALS CONTROL SYSTEM INTO TECHLIB/PLUS ON-LINE CARD CATALOG LITTMAN 1993
MARK A. BRIMER ASCERTAINING THE PERCEPTIONS OF PHYSICAL THERAPISTS UTILIZING COMPUTER TECHNOLOGY CENTINI 1993
WILLIAM H. BURKETT STUDY OF COMPUTER AVERSION FACTORS AND THEIR EFFECT ON AN OLDER ADULT POPULATION’S COMPUTER ANXIETY CENTINI 1993
PATRICIA A. COLLINS GUIDELINES FOR INCORPORATING COMPLEX SCHEMATICS INTO COMPUTER ASSISTED INSTRUCTION CENTINI 1993
ALFRED E. FANT COMPUTER USE BY TEACHERS IN THE HIGH SCHOOLS KINGSBURY 1993
DOUGLAS A. FROST USING A COMPUTER APTITUDE TEST TO INVESTIGATE DIFFERENCE BETWEEN STUDENTS IN SELECTED COLLEGES KINGSBURY 1993
JEANINE M. GENDRON DESIGN OF A DECISION SUPPORT HYPERTEXT SYSTEM TO ADDRESS TEENAGE LIFE CONCERNS SZABO 1993
PETER R. GIULIANI ROLE OF INFORMATION SYSTEM COURSES IN POSTGRADUATE BUSINESS EDUCATION KINGSBURY 1993
ROLLIE S. GUILD UNIX HIDDEN LANGUAGE ADAMS 1993
CHENG-I HOU DEVELOPMENT OF A COMPUTER BASED SYMPOSIA SYSTEM LEVIN 1993
MICHAEL J. JANNIRO EFFECTS OF COMPUTER BASED INSTRUCTION ON STUDENT LEARNING OF PSYCHOPHYSIOLOGICAL DETECTION OF DECEPTION TEST QUESTION FORMULATION FORNSHELL 1993
DANIEL E. KING COMPUTER APPLICATION AT THE VILLAGE MAILBOX KINGSBURY 1993
DENNIS A. KURTZ A USABILITY STUDY OF UPDATED SIMULATION SOFTWARE KINGSBURY 1993
PETER LIU APPLYING EXPERT SYSTEM TECH TO ENHANCE COMPUTER PERFORMANCE DEITEL 1993
VINCENT M. MANCUSO FIGHTER PILOT GROUND BASED INFO. ACQUISITION SCIGLIANO 1993
J. EDMUND MAYNARD FACULTY AND STUDENT ASSESSMENT OF THE CITADEL LIBRARY USER SERVICES LITTMAN 1993
MARTHA MONTGOMERY W. STUDY OF THE EFFECTS OF A HYPERTEXT COMPUTER ASSISTED INSTRUCTION IN MATH TERRELL 1993
MICHAEL A. MOODY EFFECTS OF DIFFERENT CERTAINTY FACTOR PARADIGMS UPON THE USABILITY OF EXPERT SYSTEMS SZABO 1993
LEONEL L. PERRA DESIGN OF A STRATEGIC PLANNING PROCESS & A PLAN FOR INFORMATION SYSTEMS IN A 2 YEAR RURAL COMMUNITY COLLEGE SCIGLIANO 1993
MOSHE S. RAAB INTRODUCTION OF A CATALOG AUTOMATION & MANUFACTURING COSTING SYSTEM FOR USE IN A JEWELRY CO. LEVIN 1993
ANGELA SATTERLEE NEEDS ASSESSMENT STUDY INFO MANAGEMENT CNTR. AT A LARGE COMMUNITY COLLEGE KINGSBURY 1993
SHAN HUNG SHIH A COST-EFFECTIVE MATERIAL MANAGEMENT SYSTEM WITH INTEGRATING ACCURATE AND EFFICIENT FORECASTING PURCHASING, AND INVENTORY CONTROL SUBSYSTEMS FOR A GOVERNMENT OWNED UTILITY LEVIN 1993
LINDA L. SIMMONS EFFECT OF NEW CURRICULAR GUIDELINES, REVISED ACCREDITION CRITERIA IN PRIVATE LIBERAL ARTS COLL. KINGSBURY 1993
RENEE TOBIAS ATTITUDES OF INMATES TOWARD THE USE OF COMPUTERS IN TENNESSEE CORRECTIONAL INSTITUTIONS KINGSBURY 1993
RAYMOND V. VAN GROESBECK EFFECTS OF A MINI-INTEGRATED LEARNING SYSTEM, TRADITIONAL LECTURE & DRILL INSTRUCTION KINGSBURY 1993
JOSEPH G. AMARA COMPUTER PRE-ANALYSIS OF AGGREGATE DATA IN HIGH SCHOOL SCIENCE LABS KINGSBURY 1992
HOWARD E. BECKNER INTRO TO THE ART OF PROGRAMMING FOR THE APPLE IIE KINGSBURY 1992
JAMES DIGENNARO EXPERT SYSTEM FOR THE PREDICTION OF ENVIRO IMPACTS OF A LOGGIN OPERATION KINGSBURY 1992
DAVID R. EMMONS DEVELOPING AN EXTENSIBLE AUTHORING SYSTEM LEVIN 1992
DON S. GRONINGER THE EFFECTS OF USING COMPUTER FACILITATED PROBLEM SOLVING WITH GENERAL MATH STUDENTS KINGSBURY 1992
DONNA F. HERRING FACTORS AFFECTING THE USE OF COMPUTERS IN CLASSROOMS MACFARLAND 1992
MILES E. HITCHCOCK A PLAN FOR IMPLEMENTATION OF A COMPUTER ASSISTED ACADEMIC ADVISING SYSTEM AT CENTENARY COLLEGE OF LOUISIANA FORNSHELL 1992
R. BRUCE HOSKEN A DEVELOPMENTAL MODEL FOR PARALLEL-PATH KNOWLEDGE ACQUISITION IN A COMPLEX MULTIPLE-DOMAIN EXPERT SYSTEM ENVIRONMENT SZABO 1992
MICHAEL HOUSER A COMPUTER IN USE IN THE CLASSROOM KINGSBURY 1992
HAROLD A. KIME EFFECTS OF COMPUTERIZED TOOLS IN TEACHING ENGLISH COMPOSITION FOR BASIC WRITERS KINGSBURY 1992
EDMUND M. KOSMAHL INSTRUCTIONAL USE OF COMPUTERS FOR ENTRY LEVEL PHYSICAL THERAPY EDUCATION CENTINI 1992
BERNARD J. KOVACH FIELD OFFICE AUTOMATION AND EVALUATION LEVIN 1992
G. ERIC MCALLISTER ON UTILIZING COMPUTER BASED TELEDUCATION CSUSB MISSION 1&2 LEVIN 1992
GARY D. MORFORD COOPERATIVE SCIENCE IN A COMPUTER MEDIATED COMMUN. ENVIRONMENT KINGSBURY 1992
ALAN L. SMITH DSRS IMPLEMENTATION IN THE U.S. DEPT. OF DEFENSE LEVIN 1992
RICHARD L. SMITH INVESTIGATION INTO THE RELATIONSHIP OF THE MYERS BRIGGS TYPE INDICATOR KINGSBURY 1992
DANIEL S.. WALSH CONCEPTUAL FRAME WORK ENTERPRISE ARCHITECTURE MODEL TO SUPPORT INFO. SYSTEMS LIEBLEIN 1992
JAN M. YATES AN ASSESSMENT OF TRENDS AND FACTORS AFFECTING FUTURE DIRECTIONS IN LIB & INFO SC. ED. LITTMAN 1992
HYDER ZAHED EFFECTIVENESS OF COMPUTER BASED TRAINING VERSUS THE LECTURE METHOD ON LEARNING LITTMAN 1992
THOMAS E. ALEXANDER STUDY TO EXAMINE THE EFFECTS OF COMPUTERS & TRADITIONAL TEACHING METHODS ON 9-11 YEAR OLD STUDENTS KINGSBURY 1991
ARDELLA P. BALL INTEGRATING MICROCOMPUTER APPLICATIONS INTO LIBRARY MEDIA COURSES LITTMAN 1991
JIMMY H. BARNES INVESTIGATION OF THE EFFECTIVENESS OF COMPUTER ASSISTED MATH INSTRUCTION KINGSBURY 1991
LINDA M. BOETTNER COMPUTER ANXIETY: ITS RELATED CHARACTERISTICS AND ITS RELATIONSHIP TO ACHIEVEMENT IN COMPUTER LITERACY OF SLIPPERY ROCK UNIVERSITY STUDENTS KINGSBURY 1991
LUELLA BOSMAN TEUTON MARKETING THE LEARNING RESOURCES CENTER AT SOUTH FLORIDA COLLEGE LITTMAN 1991
LAURIE P. DRINGUS A STUDY OF DELAYED TIME AND REAL TIME TEXT-BASED COMPUTER-MEDIATED COMMUNICATION SYSTEMS ON GROUP DECISION MAKING PERFORMANCE ADAMS 1991
MARY D. FOLEY BREAKING BARRIERS TO PUBLIC HIGH SCHOOL LIBRARY LITTMAN 1991
ROBERT E. GLASS PROJECT PLAN TO ESTABLISH A COLLEGE ED. PROGRAM FOR SEVERELY IMPAIRED PEOPLE KINGSBURY 1991
MONICA GLEASON THE DEVELOPMENT AND EVALUATION OF A HYPERTEXT COMPUTER-BASED TRAINING PROGRAM TO ASSIST IN DEVELOPING PUBLICATION SKILLS FORNSHELL 1991
CATHY GRIMALDI THE DEVELOPMENT AND EVALUATION OF A HYPERTEXT COMPUTER-BASED-TRAINING PROGRAM FOR THE TRAINING OF NEW SUBSTITUTE TEACHERS IN OLD BRIDGE, NEW JERSEY FORNSHELL 1991
DIANEN J. HALEY DESIGN OF SPECIFICATIONS FOR THE COMPUTER BASED TRAINING SYSTEM FOR AN AUTOMATED SMALL GROUP HOME FACILITY KINGSBURY 1991
ARTHUR T. KOCH A STRATEGIC PLAN FOR ACADEMIC COMPUTING AT OHIO DOMINICAN COLLEGE KINGSBURY 1991
MICHAEL S. KOGAN THE DESIGN OF OS/2 DEITEL 1991
PETER A.C. LONG A STUDY OF THE PREDICTIVE RELATIONSHIP BETWEEN PERSONALITY TYPES AND MANAGERIAL STYLE IN PREDICTING RESISTANCE TO CHANGE CENTINI 1991
JUNE A. PARSONS A META ANALYSIS OF LERNER CONTROL IN COMPUTER BASED LEARNING ENVIRONMENTS MACFARLAND 1991
WILLIAM C. STEINMAN COMPARISON OF 2 APPROACHES TO SMALL COLLEGES LAN DESIGN KINGSBURY 1991
KATHRYN SULLIVAN DISSERTATION REPORT IS 8995 USING DIALOG CIP LITTMAN 1991
THERESA K. TOOHIL CURRICULUM-ORIENTED CAI BASED ON INSTRUCTIONAL TECHNOLOGY LITTMAN 1991
JOYCE E. WOODY AN INTEGRATED NEEDS ASSESSMENT AND TRAINING PLAN MODEL FOR EMPLOYEES KINGSBURY 1991
YOUNG-DONG YOO DEVELOPMENT OF AN EXPERT TRAINING SYSTEM PROTOTYPE LOOSELY COUPLED TO AN EXTERNAL DATABASE AND WORKSHEET LEVIN 1991
STEVEN D. ZINK DESCRIPTIONS, ANALYSIS & CHARACTERISTICS OF THE RETRIEVAL OF HISTORICAL MATERIALS 1974-1979 FORNSHELL 1991
JOANNE G. CORTESE PLANNING, PRODUCING & REPORTING A COMPUTER FAIR IN A LOCAL COMMUNITY MACFARLAND 1990
WILLIAM C. CROSS THE EFFECT OF DISTRESS ON THE QUALITY OF COMPUTER PROGRAMMING KINGSBURY 1990
MARY B. DEHN A FEASIBILITY STUDY OF AN AUTOMATED PUBLIC ACCESS CATALOG FOR THE GREAT NECK LIBRARY LITTMAN 1990
GORDON FULLERTON THE DEVELOPMENT AND IMPLEMENTATION OF A BENCHMARK PROCESS FOR DISTRIBUTED RELATIONAL DATABASE MANAGEMENT SYSTEMS ADAMS 1990
DANIEL K. HATTON OFFICE INFO SYSTEMS: IMPLEMENTATION PLANNING GUIDE FOR THE U.S. ARMY MEDICAL DEPARTMENT LEVIN 1990
JERRY A. KATZ INTRO. OF OFFICE AUTOMATION & A DOCUMENT MANAGEMENT SYSTEM WITHIN MULTIPLE PLANT MANUFACTURING ORGANIZATION LEVIN 1990
JOHN KISTLER EXPLORATORY QUALITATIVE STUDY FOR THE DESIGN & IMPLEMENTATION OF AN EDUCATION MENTORING PROG. FOR AT-RISK STUDENTS KINGSBURY 1990
ALAN J. MATTHEWS COMPUTER AIDED SOFTWARE ENGINEERING (CASE) TOOLS FOR A COBOL SYSTEMS DEVELOPMENT ENVIRONMENT MURPHY 1990
CAROL MIGLIN EFFECTIVENESS OF COMPUTER ASSISTED INSTRUCTION IN THE HIGH SCHOOL CHEMISTRY LAB MACFARLAND 1990
DAVID S. MIZENER CREATION OF A MODEL AND A PARTIAL STRATEGIC PLAN FOR THE UNIVERSITY OF TEXAS PLAN AMERICAN LIBRARY LITTMAN 1990
MICHAEL MORAN HYPERTEXT COMPUTER-ASSISTED INSTRUCTION FOR CERIATRIC PHYSICAL THERAPISTS CENTINI 1990
MINDER RUCKER USING MICROCOMPUTER SOFTWARE TO REMEDIATE CRITICAL THINKING IN DISADVANTAGED STUDENTS MACFARLAND 1990
CLOVIS L. TONDO DOCTORAL WORK SUMMARY ADAMS 1990
CHARLES T. WUNKER THE POST-IMPLEMENTATION EVALUATION OF A DISTRIBUTED DATABASE ON A LOCAL ARE NETWORK LITTMAN 1990
RANDY YOUNG A DSM-III-R STUDY OF COMPUTER ADDICTION AMONG IOWA COMPUTER USERS CENTINI 1990
LINDA AVERILL A LOCAL AREA NETWORK IMPLEMENTED AT EVERETT HIGH SCHOOL LITTMAN 1989
ZAN TAMAR BAILEY DEVELOPMENT & INTEGRATION OF COMPUTER ACTIVITIES INTO ELEMENTARY SCHOOLS MACFARLAND 1989
MARILYN DOTSON THE DEVELOPMENT OF A 3 YEAR PLAN TO INTEGRATE COMPUTERS AND MATH IN THE UNDERGRAD LIBERAL ARTS MACFARLAND 1989
NELLITA P. DUBOSE LIBRARY AUTOMATION IN SOUTH CAROLINA LITTMAN 1989
JOSEPH M. FORMICA TEACHER AWARENESS OF STATE AND REGIONAL COMPUTER RELATED RESOURCES MACFARLAND 1989
EVA GULBINOWICZ STUDY OF DTERMINE FEASIBILITY OF INSTALLING CD-ROM IN ONTARIO GOVT. LIBRARIES LITTMAN 1989
JOHN M. KAISER MICROCOMPUTER BASED CAI SYSTEM TO COMPLEMENT INSTRUCTION IN NAVY TECHNICAL TRAINING MACFARLAND 1989
PATRICIA LABBE IMPLEMENTING AN ONLINE PUBLIC ACCESS CATALOG IN A HIGH SCHOOL LIBRARY MEDIA CENTER LITTMAN 1989
JACK LUSKIN COMPUTER CONFERENCING IN OCCUPATIONAL HEALTH & SAFETY TRAINING CENTINI 1989
RICHARD D. MANNING ORGANIZATIONAL IMPLICATIONS OF THE ELECTRONIC TRANSFER OF INFORMATION LITTMAN 1989
EARNESTINE T. MCCLOUD TEACHER UTILIZATION OF MIDDLE SCHOOL MEDIA PROGRAM LITTMAN 1989
ROGER L. RATCHFORD IMPROVING WRITING IN SECONDARY SCHOOLS BY USING LAPTOPS MACFARLAND 1989
NANCY L. TEGER STUDY OF A TELECOMMUNICATIONS PROJECT FOR SECONDARY SCHOOLS LITTMAN 1989
MICHAEL THOMBS AN INSTRUMENT FOR THE DISTRIBUTION AND COLLECTION OF DATA USING COMPUTER BASED TECHNOLOGY MACFARLAND 1989
ELIZABETH TWOHY BASIC SKILLS TRAINING PROGRAM FOR THE HANDICAPPED USING ADAPTIVE COMPUTER SOFTWARE MACFARLAND 1989
JARMO VITELI LEARNING ENGLISH IDIOMS VIA COMPUTER ASSISTED LANGUAGE LEARNING N ENGLISH AS A 2ND LANGUAGE MACFARLAND 1989
DOUGLAS W. WARNER A DBASE III PLUS SYSTEM FOR PROCESSING AND MAINTAINING HISTORICAL RECORDS ON STUDENTS’ EVALUATION OF INSTRUCTORS & COURSES MACFARLAND 1989
ANTHONY R. YEBBA VOICE MAIL A WAY TO ENHANCE FACULTY OFFICE HOURS MACFARLAND 1989
BARBARA M. YOUNG GUIDELINE FOR STRATEGIC PLANNING IN COMMUNITY COLLEGE LEARNING RESOURCE CENTERS: FL COMMUNITY COLLEGE EXPERIENCE LITTMAN 1989
SUSAN ANDERSON RESOURCE SHARING: A STUDY OF FLORIDA’S SHARE USED LIBRARY COLLECTIONS LITTMAN 1988
JANET C. ANDREWS INVESTIGATION OF CRITERIA USED BY BROWSERS WHEN SELECTING ADULT FICTION BOOKS IN A PUBLIC LIBRARY SCIGLIANO 1988
EVELYN K. BONNER A STUDY OF PERCEPTIONS & USE OF SMALL COLLEGE CONSORTIUM LIBRARY BY FACULTY & STUDENTS SCIGLIANO 1988
SALLY ANN CARR THE UTILIZATION OF COMPETITIVE INTELLIGENCE IN STRATEGIC PLANNING SCIGLIANO 1988
ALBERT E. CORDES USING COMPUTERS IN THE COLLEGE PHYSICS LAB MACFARLAND 1988
LARRY G. DAVID ANATOMY OF A SOFTWARE MAINTENANCE TRAINING PROGRAM SCIGLIANO 1988
WALTER F. DEAL USING ARTIFICIAL INTELLIGENCE TO ASSIST FACULTY ADVISORS MURPHY 1988
GLENDA DUDLEY BRIDGING COMPUTER INTERACTION PITFALLS: A MODEL FOR COMPUTER INTEGRATION IN SECONDARY SCHOOLS FORNSHELL 1988
JOHN L. FUEYO APPLYING STRUCTURED PROGRAMMING SKILLS TO PROBLEM SOLVING USING C-PROLOG FORNSHELL 1988
LINDA GUNTER A MICROCOMPUTER-BASED SYSTEM FOR INTERLIBRARY LOAN SERVICES IN A UNIVERSITY LIBRARY SCIGLIANO 1988
FRANK D. IAZZETA A COMPUTERIZED PRACTICE SET FOR ALL FIRST SEMESTER FINANCIAL ACCOUNTING COURSES AT A COMMUNITY COLLEGE SPURLOCK 1988
THOMAS L. JOHNSON STUDY OF DECISION STYLES OF INDIVIDUALS CHOOSING ALTERNATIVES WHEN THERE’S UNCERTAINTY SCIGLIANO 1988
NANCY R. KEATING INTEGRATED ON-LINE MEDIA MANAGEMENT SYSTEMS FOR MEDIA CENTERS SCIGLIANO 1988
KARENS. MCCONNELL A MODEL FOR IDENTIFYING SERIAL COLLECTION OVERLAP IN A UNION LIST OF SERIALS FOR PUBLIC UTILITY LIBRARIES SCIGLIANO 1988
MARK MERRYWEATHER A FEASIBILITY STUDY OF AN ON-LINE SYSTEM FOR THE ONTARIO POLICE COMMISSION LIBRARY SCIGLIANO 1988
LAWRENCE J. MISTOR AN EVALUATION OF THE USE OF MATHEMATICS GRADES AS A PREDICTOR VARIABLE OF STUDENT PERFORMANCE MACFARLAND 1988
DAVID L. NORMAN DEVELOPMENT OF A MICROCOMPUTER FINANCIAL MODEL FOR VARIABLE TRAINING COSTS LEVIN 1988
DOLORES PUSINS COURSEWARE DEVELOPMENT FOR THE INTEGRATION OF DESKTOP PUBLISHING MACFARLAND 1988
PHILLIP M. ADAMS AN INTERACTIVE EXPERT SYSTEM BASED DIALOGUE MANAGER (AN EXPERT SYSTEM’S QUEST FOR KNOWLEDGE) E. SIMCO 1987
PENELOPE A. BROWN COMPUTER PIRACY & THE COPYRIGHT LAW A CLARIFYING STATEMENT WITH ALTERNATIVE STRATEGIES FOR EDUCATION SCIGLIANO 1987
JAMES L. BUCHHOLZ IMPLEMENTING & EVALUATING A BIBLIOGRAPHIC RETRIEVAL SYSTEM FOR PRINT & NON-PRINT MEDIA MATERIAL SCIGLIANO 1987
PAUL L. CATANO TURNING AN EXPERT REFERENCE LIBRARIAN SKILL INTO COMPUTER SOFTWARE SCIGLIANO 1987
CAROL W. CUBBERLEY ORGANIZATION FOR COLLECTION DEVELOPMENT IN MEDIUM-SIZED ACADEMIC LIBRARIES CENTINI 1987
GEORGE K. FORNSHELL PROLOG IN COMPUTER-BASED LEARNING: A GENERAL PURPOSE INTERFACE FOR OVERCOMING LEARNING BLOCKS SCIGLIANO 1987
DONALD A. GUERRIERO STRATEGIC PLANNING FOR A SPECIAL LIBRARY SCIGLIANO 1987
NELLIE S. KREIS A FEASIBILITY STUDY OF THE IMPLEMENTATION OF CD ROM DATABASES IN SECONDARY SCHOOL LIBRARY SCIGLIANO 1987
RENA W. ROGGE LIBRARY PRESENCE: A TOOL FOR RECOGNITION SCIGLIANO 1987
MADELYN F. VALUNAS A STUDY OF ORGANIZATIONAL CLIMATE IN PENNSYLVANIA’S STATE SYSTEM OF HIGHER EDUCATION LIBRARIES LITTMAN 1987
MARLYN KEMPER NETWORKING: CHOOSING A LAN PATH TO INTERCONNECTION J. HANNIGAN 1986