![]() |
| 2005 | ||
|---|---|---|
| 5 | EE | Norman Pendegraft, Mark Rounds, Deborah A. Frincke: A simulation model of IS security. ACM Southeast Regional Conference (2) 2005: 172-177 |
| 4 | Norman Pendegraft: Simulation and Gaming in IT Education. Encyclopedia of Information Science and Technology (V) 2005: 2499-2502 | |
| 2001 | ||
| 3 | EE | Jeff Butterfield, Norman Pendegraft: Analyzing Information System Investments: A Game-Theoretic Approach. IS Management 18(3): 73-82 (2001) |
| 2000 | ||
| 2 | Norman Pendegraft, Joseph Geiger: Use of SBIDA cases for IS projects. IRMA Conference 2000: 870-871 | |
| 1 | Norman Pendegraft: Spread sheet simulation of CDMA. IRMA Conference 2000: 872-873 | |
| 1 | Jeff Butterfield | [3] |
| 2 | Deborah A. Frincke | [5] |
| 3 | Joseph Geiger | [2] |
| 4 | Mark Rounds | [5] |