default search action
Steven D. Sheetz
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2021
- [j22]Andrea L. Kavanaugh, Steven D. Sheetz, Hamida Skandrani, Malek Sghaier:
Media use, information reliability and political efficacy in Tunisia, 2011-2019. Inf. Polity 26(4): 521-547 (2021)
2010 – 2019
- 2019
- [c18]Steven D. Sheetz, Andrea L. Kavanaugh, Edward A. Fox, Riham Hassan, Seungwon Yang, Mohamed Magdy, Donald J. Shoemaker:
Information Uses and Gratifications Related to Crisis: Student Perceptions since the Egyptian Uprising. ISCRAM 2019 - 2017
- [j21]Andrea L. Kavanaugh, Steven D. Sheetz, Hamida Skandrani, Edward A. Fox:
Media use by young Tunisians during the 2011 revolution vs 2014 elections. Inf. Polity 22(2-3): 137-158 (2017) - 2016
- [j20]Andrea L. Kavanaugh, Steven D. Sheetz, Rodrigo Sandoval-Almazán, John C. Tedesco, Edward A. Fox:
Media use during conflicts: Information seeking and political efficacy during the 2012 Mexican elections. Gov. Inf. Q. 33(3): 595-602 (2016) - [c17]Andrea L. Kavanaugh, Steven D. Sheetz, Hamida Skandrani, John C. Tedesco, Yue Sun, Edward A. Fox:
The Use and Impact of Social Media during the 2011 Tunisian Revolution. DG.O 2016: 20-30 - 2014
- [j19]E. Vance Wilson, Weiyi Wang, Steven D. Sheetz:
Underpinning a Guiding Theory of Patient-Centered E-Health. Commun. Assoc. Inf. Syst. 34: 16 (2014) - [j18]Linda G. Wallace, Steven D. Sheetz:
The adoption of software measures: A technology acceptance model (TAM) perspective. Inf. Manag. 51(2): 249-259 (2014) - [c16]E. Vance Wilson, Steven D. Sheetz, Soussan Djamasbi, Joanna Webber:
Testing the Group Task Demands-Resources Model among IT Professionals. AMCIS 2014 - [c15]Andrea L. Kavanaugh, Steven D. Sheetz, Rodrigo Sandoval-Almazán, John C. Tedesco, Edward A. Fox:
Media use during conflicts: information seeking gratifications & efficacy during 2012 Mexican elections. DG.O 2014: 205-214 - 2013
- [j17]Andrea L. Kavanaugh, Steven D. Sheetz, Riham Hassan, Seungwon Yang, Hicham G. Elmongui, Edward A. Fox, Mohamed Magdy, Donald J. Shoemaker:
Between a Rock and a Cell Phone: Communication and Information Technology Use during the 2011 Uprisings in Tunisia and Egypt. Int. J. Inf. Syst. Crisis Response Manag. 5(1): 1-21 (2013) - [c14]Seungwon Yang, Haeyong Chung, Xiao Lin, Sunshin Lee, Liangzhe Chen, Andrew Wood, Andrea L. Kavanaugh, Steven D. Sheetz, Donald J. Shoemaker, Edward A. Fox:
PhaseVis1: What, when, where, and who in visualizing the four phases of emergency management through the lens of social media. ISCRAM 2013 - 2012
- [j16]Andrea L. Kavanaugh, Edward A. Fox, Steven D. Sheetz, Seungwon Yang, Lin Tzy Li, Donald J. Shoemaker, Apostol Natsev, Lexing Xie:
Social media use by government: From the routine to the critical. Gov. Inf. Q. 29(4): 480-491 (2012) - [j15]David Henderson, Steven D. Sheetz, Brad S. Trinkle:
The determinants of inter-organizational and internal in-house adoption of XBRL: A structural equation model. Int. J. Account. Inf. Syst. 13(2): 109-140 (2012) - [j14]Dave Hendersen, Steven D. Sheetz, France Bélanger:
Explaining Developer Attitude Toward Using Formalized Commercial Methodologies: Decomposing Perceived Usefulness. Inf. Resour. Manag. J. 25(1): 1-20 (2012) - [c13]E. Vance Wilson, Weiyi Wang, Steven D. Sheetz, James R. Connolly:
Patient-Centered E-Health: A Status Report. AMCIS 2012 - [c12]Andrea L. Kavanaugh, Steven D. Sheetz, Riham Hassan, Seungwon Yang, Hicham G. Elmongui, Edward A. Fox, Mohamed Magdy, Donald J. Shoemaker:
Between a rock and a cell phone: Communication and information technology use during the 2011 Egyptian uprising. ISCRAM 2012 - 2011
- [j13]Andrea L. Kavanaugh, Steven D. Sheetz, Francis K. H. Quek, B. Joon Kim:
Cell Phone Use with Social Ties During Crises: The Case of the Virginia Tech Tragedy. Int. J. Inf. Syst. Crisis Response Manag. 3(2): 18-32 (2011) - [c11]Andrea L. Kavanaugh, Edward A. Fox, Steven D. Sheetz, Seungwon Yang, Lin Tzy Li, Travis Whalen, Donald J. Shoemaker, Paul Natsev, Lexing Xie:
Social media use by government: from the routine to the critical. DG.O 2011: 121-130 - [c10]Lin Tzy Li, Seungwon Yang, Andrea L. Kavanaugh, Edward A. Fox, Steven D. Sheetz, Donald J. Shoemaker, Travis Whalen, Venkat Srinivasan:
Twitter use during an emergency event: the case of the UT Austin shooting. DG.O 2011: 335-336 - [c9]Seungwon Yang, Andrea L. Kavanaugh, Nádia P. Kozievitch, Lin Tzy Li, Venkat Srinivasan, Steven D. Sheetz, Travis Whalen, Donald J. Shoemaker, Ricardo da Silva Torres, Edward A. Fox:
CTRnet DL for disaster information services. JCDL 2011: 437-438 - 2010
- [j12]E. Vance Wilson, Steven D. Sheetz:
A demands-resources model of work pressure in IT student task groups. Comput. Educ. 55(1): 415-426 (2010) - [c8]Andrea L. Kavanaugh, Francis K. H. Quek, Steven D. Sheetz, B. Joon Kim:
Cell phone use with social ties during crises: The case of the Virginia Tech tragedy. ISCRAM 2010
2000 – 2009
- 2009
- [j11]Steven D. Sheetz, David Henderson, Linda G. Wallace:
Understanding developer and manager perceptions of function points and source lines of code. J. Syst. Softw. 82(9): 1540-1549 (2009) - [c7]Wingyan Chung, Edward A. Fox, Steven D. Sheetz, Seungwon Yang:
LIKES: Educating the Next Generation of Knowledge Society Builders. AMCIS 2009: 11 - [c6]E. Vance Wilson, Steven D. Sheetz:
The Role of Work Pressure in IT Task Groups: Identifying Theoretical Constructs. AMCIS 2009: 526 - 2008
- [j10]E. Vance Wilson, Steven D. Sheetz:
Context Counts: Effects of Work versus Non-Work Context on Participants' Perceptions of Fit in E-mail versus Face-to-Face Communication. Commun. Assoc. Inf. Syst. 22: 17 (2008) - 2007
- [c5]Elliot Sloane, Gondy Leroy, Steven D. Sheetz:
An Integrated Social Actor and Service Oriented Architecture (SOA) Approach for Improved Electronic Health Record (EHR) Privacy and Confidentiality in the US National Healthcare Information Network (NHIN). AMCIS 2007: 366 - 2006
- [c4]Steven D. Sheetz, Thomas Caruso:
XIntegrating Electronic Health Record Standards into a Laboratory Information Management System. AMCIS 2006: 331 - 2005
- [c3]Steven D. Sheetz, Linda G. Wallace, David Henderson:
Understanding Manager and Developer Perceptions of the Relative Advantage, Compatibility, and Complexity of Function Points and Source Lines of Code. AMCIS 2005: 384 - 2003
- [c2]David P. Tegarden, Linda F. Tegarden, Steven D. Sheetz:
Knowledge Management Technology for Revealing Cognitive Diversity within a Management Team. HICSS 2003: 116 - 2002
- [j9]Steven D. Sheetz:
Identifying the difficulties of object-oriented development. J. Syst. Softw. 64(1): 23-36 (2002) - 2001
- [j8]Reza Barkhi, Steven D. Sheetz:
The State of Theoretical Diversity. Commun. Assoc. Inf. Syst. 7: 6 (2001) - [j7]David P. Tegarden, Steven D. Sheetz:
Cognitive activities in OO development. Int. J. Hum. Comput. Stud. 54(6): 779-798 (2001) - [j6]S. E. Kruck, Steven D. Sheetz:
Spreadsheet Accuracy Theory. J. Inf. Syst. Educ. 12(2): 93-108 (2001) - [j5]Steven D. Sheetz, David P. Tegarden:
Illustrating the cognitive consequences of object-oriented systems development. J. Syst. Softw. 59(2): 163-179 (2001) - 2000
- [c1]E. Vance Wilson, Kris H. Larsen, Steven D. Sheetz:
Supporting at-distance students through an internet-based advising system. IRMA Conference 2000: 545-547
1990 – 1999
- 1997
- [j4]Steven D. Sheetz, Gretchen Irwin, David P. Tegarden, H. James Nelson, David E. Monarchi:
Exploring the Difficulties of Learning Object-Oriented Techniques. J. Manag. Inf. Syst. 14(2): 103-132 (1997) - 1996
- [j3]Steven D. Sheetz, David P. Tegarden:
Perceptual complexity of object oriented systems: a student view. Object Oriented Syst. 3: 165-195 (1996) - 1995
- [j2]David P. Tegarden, Steven D. Sheetz, David E. Monarchi:
A software complexity model of object-oriented systems. Decis. Support Syst. 13(3-4): 241-262 (1995) - 1994
- [j1]Steven D. Sheetz, David P. Tegarden, Kenneth A. Kozar, Ilze Zigurs:
A Group Support Systems Approach to Cognitive Mapping. J. Manag. Inf. Syst. 11(1): 31-58 (1994)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:17 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint