Applied IS Research / Methodologies
A Comprehensive Current Review of Text Messaging Usage
(4287)
|
Analysis of the Risks of NFC Mobile Payment Systems
(4279)
|
Causes of cyberbullying in multi-player online gaming environments: Gamer perceptions
(4258)
|
Crowdsourcing Surveys: Alternative Approaches to Survey Collection
(4260)
|
Identifying the Critical Success Factors for Information Systems to Manage Sponsored Research Activities at Institutions of Higher Education
(4272)
|
Sentiment Analysis and Opinion Mining: Current State of the Art and Review of Google and Yahoo Search Engines’ Privacy Policies
(4254)
|
Business Intelligence / Big Data
Achieving Effective Data Analytics: An Agile Framework
(4269)
|
An Interactive Toolbox for Twitter Content Analytics
(4259)
|
Principle Component Analysis for Feature Reduction and Data Preprocessing in Data Science
(4257)
|
Understanding User Behavior on Pinterest: Findings and Insights
(4277)
|
Cloud Computing
An Empirical Study on the Impact of Price Discount on Sales in Software-as-a-Service (SaaS) Market
(4264)
|
Database Management / Storage
Patient Healthcare Smart Card System: A Unified Medical Record for Access and Analytics
(4275)
|
ERP / Supply Chain
E-commerce Adoption: A Revelatory Case Study in the German Oncology Pharmaceutical Supply Chain
(4273)
|
IT Management / Strategy
Building Client Vendor Alignment Capability in Strategic Information Systems Outsourcing
(4252)
|
On Assessment of Risks in Offshore Outsourcing of Information Technology
(4267)
|
System Analysis of the Infrastructure of an IT services provider
(4290)
|
Other Applied Research Topics
A Simulation Modeling Approach to Improve JIT Implementation in a Highly Dynamic Manufacturing Environment
(4289)
|
Evidence of Wikipedia usage during the school year: A numerical study
(4263)
|
Security / Networks / Communications
3D Printing: The Future Crime of the Present
(4274)
|
Are Students Using Security Measures to Protect their Data when Downloading Mobile Applications?
(4268)
|
Malvertising - A Rising Threat To The Online Ecosystem
(4266)
|
Proposal for Kelly Criterion-Inspired Lossy Network Compression for Network Intrusion Applications
(4265)
|
Subjective norm and measuring its impact on information security behavioral intention in organizations.
(4253)
|
The Effects of Perceived Functionality and Usability on Privacy and Security Concerns about Adopting Cloud Applications
(4255)
|
Software Engineering / Application Development
Prototype to Production: A Case Study
(4286)
|