UMGC Library

UCSP 605 and ASC 601: Articles by Discipline: Information Technology

Ande, R., Adebisi, B., Hammoudeh, M., & Saleem, J. (2020). Internet of Things: Evolution and technologies from a security perspective. Sustainable Cities and Society, 54, 1-15.  

Atanasoff, L., & Venable, M. A. (2017). Technostress: Implications for adults in the workforce. Career Development Quarterly, 65(4), 326–338. 

Ayala, N. F., Le Dain, M. A., Merminod, V., Gzara, L., Enrique, D. V., & Frank, A. G. (2020). The contribution of IT-leveraging capability for collaborative product development with suppliers. Journal of Strategic Information Systems, 29(3), 1-17. 

Boyes, H. (2015). Security, privacy, and the built environment. IT Professional, 17(3), 25–31. 

Hunt, K., Agarwal, P., & Zhuang, J. (2021). Technology adoption for airport security: Modeling public disclosure and secrecy in an attacker-defender game. Reliability Engineering and System Safety, 207, 1-15. 

Junglas, I., Goel, L., Ives, B., & Harris, J. (2019). Innovation at work: The relative advantage of using consumer IT in the workplace. Information Systems Journal, 29(2), 317–339. 

Payyappalli, V. M., Zhuang, J., & Jose, V. R. R. (2017). Deterrence and risk preferences in sequential attacker-defender games with continuous efforts. Risk Analysis: An International Journal, 37(11), 2229–2245. 

Polyakov, M., Khanin, I., Bilozubenko, V., Korneyev, M., & Nebaba, N. (2020). Information technologies for developing a company’s knowledge management system. Knowledge & Performance Management, 4(1), 15–25. 

Sedgwick, D., & Hawdon, J. (2019). Interagency cooperation in the era of homeland policing: Are agencies answering the call? American Journal of Criminal Justice, 44(2), 167–190. 

Venkatraman, S., M. K. Cheung, C., Lee, Z. W. Y., D. Davis, F., & Venkatesh, V. (2018). The “Darth” side of technology use: An inductively derived typology of cyberdeviance. Journal of Management Information Systems, 35(4), 1060–1091.