College of Information Sciences and Technology

  • United States

Research Output 1976 2020

Filter
Chapter
2010
4 Citations (Scopus)

Semantic access control model for RFID-enabled supply chains

Li, Z., Chu, C. H. & Yao, W., Jan 1 2010, Radio Frequency Identification System Security. RFIDsec'10 Asia Workshop Proceedings. IOS Press, p. 95-108 14 p. (Cryptology and Information Security Series; vol. 4).

Research output: Chapter in Book/Report/Conference proceedingChapter

Radio frequency identification (RFID)
Access control
Supply chains
Semantics
Merging

Sharing usability information: A communication paradox

Bach, P. M., Jiang, H. & Carroll, J. M., Dec 1 2010, Interpersonal Relations and Social Patterns in Communication Technologies: Discourse Norms, Language Structures and Cultural Variables. IGI Global, p. 405-420 16 p.

Research output: Chapter in Book/Report/Conference proceedingChapter

communication
software development
social capital
engineer
manager
6 Citations (Scopus)

Social activism in the 'Blackosphere': The Jena 6 case

Kvasny, L., Payton, F. C. & Hales, K. D., Dec 1 2010, Interpersonal Relations and Social Patterns in Communication Technologies: Discourse Norms, Language Structures and Cultural Variables. IGI Global, p. 18-31 14 p.

Research output: Chapter in Book/Report/Conference proceedingChapter

Internet
publicity
ethnic identity
Group

The personalization privacy paradox: Mobile customers' perceptions of push-based vs. pull-based location commerce

Xu, H., Carroll, J. M. & Rosson, M. B., Dec 1 2010, Encyclopedia of E-Business Development and Management in the Global Economy. IGI Global, Vol. 2. p. 779-788 10 p.

Research output: Chapter in Book/Report/Conference proceedingChapter

Pull
Personalization
Privacy
Paradox
Customer perception

The Web-active end user

Zang, N. & Rosson, M. B., Dec 1 2010, No Code Required. Elsevier Inc., p. 389-405 17 p.

Research output: Chapter in Book/Report/Conference proceedingChapter

Internet
HTML
Costs
2009

Cellular network security

Liu, P., LaPorta, T. F. & Kotapati, K., Dec 1 2009, Computer and Information Security Handbook. Elsevier Inc., p. 183-203 21 p.

Research output: Chapter in Book/Report/Conference proceedingChapter

Network security
Outages
HIgh speed networks
Communication
Finance

Face recognition by sparse representation

Ganesh, A., Wagner, A., Zhou, Z., Yang, A. Y., Ma, Y. & Wright, J., Jan 1 2009, Compressed Sensing: Theory and Applications. Cambridge University Press, p. 515-539 25 p.

Research output: Chapter in Book/Report/Conference proceedingChapter

Face recognition
Lighting
Access control
Computer vision
Pattern recognition
5 Citations (Scopus)

From data privacy to location privacy

Wang, T. & Liu, L., Dec 1 2009, Machine Learning in Cyber Trust: Security, Privacy, and Reliability. Springer US, p. 217-246 30 p.

Research output: Chapter in Book/Report/Conference proceedingChapter

Data privacy
3 Citations (Scopus)

Speech input to support universal access

Feng, J. & Sears, A. L., Jan 1 2009, The Universal Access Handbook. CRC Press, p. 30-1-30-16

Research output: Chapter in Book/Report/Conference proceedingChapter

Graphical user interfaces
Speech recognition
Information technology
Websites
Navigation
10 Citations (Scopus)

The call for transformational governance in the knowledge economy

Yeo, B. & Trauth, E., Dec 1 2009, Handbook of Research on ICT-enabled Transformational Government: A Global Perspective. IGI Global, p. 271-290 20 p.

Research output: Chapter in Book/Report/Conference proceedingChapter

knowledge economy
knowledge work
governance
information technology
social factors
4 Citations (Scopus)

The internet, black identity, and the evolving discourse of the digital divide

Kvasny, L. & Hales, K. D., Dec 1 2009, Handbook of Research on Overcoming Digital Divides: Constructing an Equitable and Competitive Information Society. IGI Global, p. 260-276 17 p.

Research output: Chapter in Book/Report/Conference proceedingChapter

digital divide
communication technology
information technology
Internet
discourse
2008
10 Citations (Scopus)

A review of methodologies for analyzing websites

Booth, D. & Jansen, B. J., Dec 1 2008, Handbook of Research on Web Log Analysis. IGI Global, p. 143-164 22 p.

Research output: Chapter in Book/Report/Conference proceedingChapter

Websites
Customer satisfaction
World Wide Web
Industry
2 Citations (Scopus)

Cultural diversity challenges: Issues for managing globally distributed knowledge workers in software development

Huang, H. & Trauth, E. M., Dec 1 2008, Selected Readings on Global Information Technology: Contemporary Applications. IGI Global, p. 420-436 17 p.

Research output: Chapter in Book/Report/Conference proceedingChapter

Software engineering
Information technology

Damage quarantine and recovery in data processing systems

Liu, P., Jajodia, S. & Yu, M., Dec 1 2008, Handbook of Database Security: Applications and Trends. Springer US, p. 383-407 25 p.

Research output: Chapter in Book/Report/Conference proceedingChapter

Recovery
Fault tolerance
Interoperability
Industry
Information systems
5 Citations (Scopus)

Detecting remote exploits ising data mining

Masud, M., Khan, L., Thuraisingham, B., Wang, X., Liu, P. & Zhu, S., Sep 11 2008, Advances in Digital Forensics IV. Cuenca, P., Guerrero, C., Puigjaner, R. & Serra, B. (eds.). p. 177-189 13 p. (IFIP International Federation for Information Processing; vol. 285).

Research output: Chapter in Book/Report/Conference proceedingChapter

Data mining
Firewall
Web services
Attack
7 Citations (Scopus)

Generalizing the Dempster-Shafer theory to fuzzy sets

Yen, J., Feb 4 2008, Classic Works of the Dempster-Shafer Theory of Belief Functions. Yager, R. R. & Liu, L. (eds.). p. 529-554 26 p. (Studies in Fuzziness and Soft Computing; vol. 219).

Research output: Chapter in Book/Report/Conference proceedingChapter

Dempster-Shafer Theory
Fuzzy sets
Fuzzy Sets
Fuzzy set theory
Intelligent systems

Health portals and menu-driven identities

Kvasny, L. & Warren, J., Sep 30 2008, Medical Informatics: Concepts, Methodologies, Tools, and Applications. IGI Global, Vol. 3-4. p. 1549-1557 9 p.

Research output: Chapter in Book/Report/Conference proceedingChapter

Health
health
15 Citations (Scopus)

Research and methodological foundations of transaction log analysis

Jansen, B. J., Taksa, I. & Spink, A., Dec 1 2008, Handbook of Research on Web Log Analysis. IGI Global, p. 1-16 16 p.

Research output: Chapter in Book/Report/Conference proceedingChapter

2 Citations (Scopus)

RFID and supply chain visibility

Gupta, S., Garg, M., Xu, H. & Goh, M., Dec 1 2008, Handbook of Research in Mobile Business, Second Edition: Technical, Methodological and Social Perspectives. IGI Global, p. 368-374 7 p.

Research output: Chapter in Book/Report/Conference proceedingChapter

Supply chain
Radio frequency identification
Visibility
Globalization
Barcode

Social construction of gender and sexuality in online HIV/AIDS information

Chong, J. & Kvasny, L., Sep 30 2008, Medical Informatics: Concepts, Methodologies, Tools, and Applications. IGI Global, Vol. 3-4. p. 1614-1620 7 p.

Research output: Chapter in Book/Report/Conference proceedingChapter

social construction
sexuality
AIDS
gender
6 Citations (Scopus)

Supporting community with location-sensitive mobile applications

Carroll, J. M. & Ganoe, C. H., Dec 1 2008, Handbook of Research on Urban Informatics: The Practice and Promise of the Real-Time City. IGI Global, p. 339-352 14 p.

Research output: Chapter in Book/Report/Conference proceedingChapter

community
informal learning
networking
research project
infrastructure
1 Citation (Scopus)

Surveys as a complementary method for web log analysis

Rainie, L. & Jansen, B. J., Dec 1 2008, Handbook of Research on Web Log Analysis. IGI Global, p. 39-64 26 p.

Research output: Chapter in Book/Report/Conference proceedingChapter

1 Citation (Scopus)

Survivability evaluation modeling techniques and measures

Wang, H. & Liu, P., Dec 1 2008, Handbook of Research on Information Security and Assurance. IGI Global, p. 504-517 14 p.

Research output: Chapter in Book/Report/Conference proceedingChapter

Security of data
Computer systems
Availability
3 Citations (Scopus)

The Geospatial Semantic Web

Fonseca, F., Feb 25 2008, The Handbook of Geographic Information Science. John Wiley and Sons, p. 367-376 10 p.

Research output: Chapter in Book/Report/Conference proceedingChapter

GPS
semantics
Internet
13 Citations (Scopus)

The methodology of search log analysis

Jansen, B. J., Dec 1 2008, Handbook of Research on Web Log Analysis. IGI Global, p. 100-123 24 p.

Research output: Chapter in Book/Report/Conference proceedingChapter

Intranets
Search engines
Interfaces (computer)
Websites
Information systems
5 Citations (Scopus)

The useful interface experience: The role and transformation of usability

Carroll, J. M. & Mentis, H. M., Dec 1 2008, Product Experience. Elsevier Ltd, p. 499-514 16 p.

Research output: Chapter in Book/Report/Conference proceedingChapter

Cognitive Science
Cognition
Research Design
History
Research
8 Citations (Scopus)

Toward a conceptual model of common ground in teamwork

Carroll, J., Convertino, G., Rosson, M. B. & Ganoe, C. H., Dec 1 2008, Macrocognition in Teams: Theories and Methodologies. Ashgate Publishing Ltd., p. 87-105 19 p.

Research output: Chapter in Book/Report/Conference proceedingChapter

teamwork
4 Citations (Scopus)

Using action-object pairs as a conceptual framework for transaction log analysis

Zhang, M. & Jansen, B. J., Dec 1 2008, Handbook of Research on Web Log Analysis. IGI Global, p. 416-435 20 p.

Research output: Chapter in Book/Report/Conference proceedingChapter

Feedback
Systems analysis
2 Citations (Scopus)

Web log analysis: Diversity of research methodologies

Taksa, I., Spink, A. & Jansen, B. J., Dec 1 2008, Handbook of Research on Web Log Analysis. IGI Global, p. 506-522 17 p.

Research output: Chapter in Book/Report/Conference proceedingChapter

2007

Complete Fault Analysis for Long Transmission Line Using Synchronized Sampling

Zhang, N. & Kezunovic, M., Dec 1 2007, Power Plants and Power Systems Control 2006. Elsevier Ltd, p. 137-142 6 p.

Research output: Chapter in Book/Report/Conference proceedingChapter

Electric lines
Sampling
Electric fault location
Electric fault currents
Fault detection

Computer worms, detection, and defense

Cole, R. J. & Chu, C. H., Dec 1 2007, Encyclopedia of Information Ethics and Security. IGI Global, p. 89-95 7 p.

Research output: Chapter in Book/Report/Conference proceedingChapter

Computer worms
6 Citations (Scopus)

Leveraging diversity in information systems and technology education in the global workplace

Trauth, E. M., Huang, H., Quesenberry, J. L. & Morgan, A. J., Dec 1 2007, Information Systems and Technology Education: From the University to the Workplace. IGI Global, p. 27-41 15 p.

Research output: Chapter in Book/Report/Conference proceedingChapter

information system
workplace
information technology
education
human resources
1 Citation (Scopus)

Trusted Recovery

Yu, M., Liu, P., Zang, W. & Jajodia, S., Dec 1 2007, Secure Data Management in Decentralized Systems. Yu, T. & Jajodia, S. (eds.). p. 59-94 36 p. (Advances in Information Security; vol. 33).

Research output: Chapter in Book/Report/Conference proceedingChapter

Recovery
2006
2 Citations (Scopus)

American discourses of the digital divide and economic development: A sisyphean order to catch up?

Tu, L. & Kvasny, L., Oct 5 2006, Social Inclusion: Societal and Organizational Implications for Information Systems: IFIP TC8 WG8.2 International Working Conference. Trauth, E., Howcroft, D., Butler, T., Butler, T. & DeGross, J. (eds.). p. 51-65 15 p. (IFIP International Federation for Information Processing; vol. 208).

Research output: Chapter in Book/Report/Conference proceedingChapter

Economic development
Catch-up
Digital divide
Discourse
Information and communication technology
8 Citations (Scopus)

CAT - A practical graph & SDL based toolkit for vulnerability assessment of 3G networks

Kotapati, K., Liu, P. & Laporta, T. F., Dec 21 2006, Security and Privacy in Dynamic Environments: Proceedings of the IFIP TC-11 21st International Information Security Conference (SEC 2006), 22-24 May 2006, Karlstad, Sweden. Fischer-Hubner, S., Lindskog, S., Lassous, G. & Yngstrom, L. (eds.). p. 158-170 13 p. (IFIP International Federation for Information Processing; vol. 201).

Research output: Chapter in Book/Report/Conference proceedingChapter

Attack
Vulnerability
Graph
Toolkit
Graph model
7 Citations (Scopus)

Conducting feminist gender research in the information systems field

Trauth, E. M., Kvasny, L. & Greenhill, A., Dec 1 2006, Issues and Trends in Technology and Human Interaction. IGI Global, p. 1-24 24 p.

Research output: Chapter in Book/Report/Conference proceedingChapter

gender studies
information system
gender
legitimacy
reflexivity
17 Citations (Scopus)

Cultural diversity challenges: Issues for managing globally distributed knowledge workers in software development

Huang, H. & Trauth, E. M., Dec 1 2006, Managing IT Professionals in the Internet Age. IGI Global, p. 254-276 23 p.

Research output: Chapter in Book/Report/Conference proceedingChapter

Knowledge workers
Cultural diversity
Software development
Global software development
Workforce
20 Citations (Scopus)

E-survey methodology

Jansen, K. J., Corley, K. G. & Jansen, B. J., Dec 1 2006, Handbook of Research on Electronic Surveys and Measurements. IGI Global, p. 1-8 8 p.

Research output: Chapter in Book/Report/Conference proceedingChapter

mail survey
methodology
e-mail
online survey
privacy
21 Citations (Scopus)

Gender and the information technology workforce: Issues of theory and practice

Trauth, E. M. & Quesenberry, J. L., Dec 1 2006, Managing IT Professionals in the Internet Age. IGI Global, p. 18-36 19 p.

Research output: Chapter in Book/Report/Conference proceedingChapter

Workforce
IT workforce
Social construction
Individual differences
Gender gap
4 Citations (Scopus)

Impact of individual differences on Web searching performance: Issues for design and the digital divide

Morgan, A. J. & Trauth, E. M., Dec 1 2006, Cognitively Informed Systems: Utilizing Practical Approaches to Enrich Information Presentation and Transfer. IGI Global, p. 261-282 22 p.

Research output: Chapter in Book/Report/Conference proceedingChapter

Individual differences
Digital divide
Search engine
World Wide Web
Web search

Semantics and the medical healthcare search

Spink, A., Wolfe, R. M. & Jansen, B. J., Dec 1 2006, Advances in Electronic Business. IGI Global, Vol. 2. p. 267-279 13 p.

Research output: Chapter in Book/Report/Conference proceedingChapter

Healthcare
World Wide Web
Search engine
Web search
Longitudinal study
2 Citations (Scopus)

The existential significance of the digital divide for America's historically underserved populations

Kvasny, L., Dec 1 2006, Information Technology Ethics: Cultural Perspectives. IGI Global, p. 200-212 13 p.

Research output: Chapter in Book/Report/Conference proceedingChapter

Internet
Communication
3 Citations (Scopus)

The impact of the internet on local and distant social ties

Kavanaugh, A., Zin, T. T., Rosson, M. B. & Carroll, J., Dec 1 2006, Networked Neighbourhoods: The Connected Community in Context. Springer London, p. 217-236 20 p.

Research output: Chapter in Book/Report/Conference proceedingChapter

Internet
Communication
Electronic mail
2 Citations (Scopus)

The sociotechnical nature of mobile computing work: Evidence from a study of policing in the united states

Sawyer, S. & Tapia, A., Dec 1 2006, Intelligent Systems for Optical Networks Design: Advancing Techniques. IGI Global, p. 152-171 20 p.

Research output: Chapter in Book/Report/Conference proceedingChapter

justice
evidence
third generation
law enforcement
2005
12 Citations (Scopus)

Choosing critical IS research

Howcroft, D. & Trauth, E. M., Dec 1 2005, Handbook of Critical Information Systems Research: Theory and Application. Edward Elgar Publishing Ltd., p. 1-15 15 p.

Research output: Chapter in Book/Report/Conference proceedingChapter

6 Citations (Scopus)

Including human variability in a cognitive architecture to improve team simulation

Ritter, F. E. & Norling, E., Jan 1 2005, Cognition and Multi-Agent Interaction: From Cognitive Modeling to Social Simulation. Cambridge University Press, p. 417-427 11 p.

Research output: Chapter in Book/Report/Conference proceedingChapter

simulation
organizational unit
computer game
moderator
simulation model
3 Citations (Scopus)

Rethinking Urban poverty: Forms of capital, information technology and enterprise development

Kvasny, L. & Yapa, L., Dec 1 2005, Handbook of Critical Information Systems Research: Theory and Application. Edward Elgar Publishing Ltd., p. 350-364 15 p.

Research output: Chapter in Book/Report/Conference proceedingChapter

Enterprise development
Technology development
Urban poverty

Sanctioning mechanisms in virtual communities

Bertino, E., Squicciarini, A. & Ferrari, E., Dec 1 2005, Encyclopedia of Virtual Communities and Technologies. IGI Global, p. 409-413 5 p.

Research output: Chapter in Book/Report/Conference proceedingChapter

Sharing Intelligence Using Information Supply Chains

Sun, S., Fan, X. & Yen, J., Oct 7 2005, Emergent Information Technologies and Enabling Policies for Counter-Terrorism. John Wiley & Sons, Inc., p. 231-253 23 p.

Research output: Chapter in Book/Report/Conference proceedingChapter

Supply chains
intelligence
supply

Supporting culture in computer-supported cooperative work

Xiao, L., Convertino, G., Trauth, E., Carroll, J. M. & Rosson, M. B., Dec 1 2005, Encyclopedia of Human Computer Interaction. IGI Global, p. 567-573 7 p.

Research output: Chapter in Book/Report/Conference proceedingChapter