Journal of Information Systems Applied Research
Volume 12, Issue No. 3 (December 2019) |
|
---|---|
Page 4 |
Where We are with Enterprise Architecture
Leila Halawi, Embry Riddle Aeronautical University Richard McCarthy, Quinnipiac University James Farah, Jacksonville University |
Page 14 |
Dangers of Distracted Driving by Mobile Phone Users: An Experimental Approach
Hoon S. Choi, Appalachian State University Jason Xiong, Appalachian State University B. Dawn Medlin, Appalachian State University |
Page 24 |
Changes in the Information Technology Field: A Survey of Current Technologies and Future Importance
Jeffrey Cummings, University of North Carolina Wilmington Thomas Janicki, University of North Carolina Wilmington |
Volume 12, Issue No. 2 (August 2019) |
|
Page 4 |
A Machine Learning Approach to Optimizing Diabetes Healthcare Management Using SAS Analytic Suite
Taiwo Ajani, Ferrum College George S. Habek, North Carolina State University |
Page 18 |
Aligning the Factors of Skill, Technology and Task to Influence the Continued
Use of Mobile Payment Users in China
Charlie Chen, Appalachian State University Hoon Seok Choi, Appalachian State University Jason (Jie) Xiong, Appalachian State University Yong Tang, University of Electronic Science and Technology |
Page 30 |
Security, Privacy, and Legislation Issues related to Commercial Drone Deliveries
Sandra A. Vannoy, Appalachian State University Dawn Medlin, Appalachian State University |
Page 37 |
Effects of Normalization Techniques on Logistic Regression in Data Science
Adekunle Adeyemo Hayden Wimmer, Georgia State University Loreen Powell, Bloomsburg University |
Volume 1, Issue No. 1 (April 2019) |
|
Page 4 |
Drone Delivery Services: An Evaluation of Personal Innovativeness, Opinion Passing and Key Information Technology Adoption Factors
Charlie Chen, Appalachian State University Hoon S. Choi, Appalachian State University Danuvasin Charoen, National Institute of Development Administration |
Page 17 |
The use of Snap Length in Lossy Network Traffic Compression for Network Intrusion Detection Applications
Sidney C. Smith, U.S. Army Research Laboratory Robert J. Hammell II, Towson University |
Page 26 |
Adversarial Machine Learning for Cyber Security
Michael J. De Lucia, U.S. Army Research Laboratory, University of Delaware Chase Cotton, University of Delaware |
Page 36 |
Standardizing Public Utility Data: A Case Study of a Rural Mid-Size Utility
Edgar Hassler, Appalachian State University Joseph Cazier, Appalachian State University Jamie Russell, Appalachian State University Thomas Mueller, Appalachian State University Daniel Paprocki, Appalachian State University |