Submissions from 2015
Technology and Gambling: How it has changed the game, Nicholas Hensley
DEFINING CYBERCRIME & GOVERNMENT INVOLVEMENT, Kristen Kile
Cyber Security and Management within the Government, Brandon Larsen
ISM in the Industry: Information Technology in Mass Media, Shearl Christine Levere
How three different generations view modern day technologies, Dylan McGraw
The Integration of Technology: Changing the World of Education and Learning, Emily Reitz
The Effects of Technology on Today’s Education, Jelani Saunders
THE EVOLUTION OF CELL PHONES, Michelle Vermaaten
CYBER SECURITY & CYBER CRIMES/THREATS, Chad A. Wood
Submissions from 2014
Network Security: A Practical and Technical Approach, Logan Berg
Major Advancements in Personal Computing, Brandon Brooks
APPLICATIONS OF GAMIFICATION: OVERCOMING A DIGITAL DISCONNECT, Adrienne Carroll
Cloud Computing Risks and Risk Management, Anthony Hopkins
Effects of Technology on School Aged Children, Shawn Lamont Lee Jr.
IT Management, Kameron Reppe
Submissions from 2013
Ethical Hacking, Logan Berg
Lights, Camera, Action: The Role of Information Technology in Motion Pictures, DJ Christian
Communication Technology in the Military, Jordan Diehl
Technology use in the National Basketball Association: How Technology and Communication has changed, Katie Hottinger
The Internet and How the Government has Impacted its Usage Today, Jonathan Hulse
Information Management Compliance: Frameworks for Governance & Assurance, Thomas B. Malvey
NFL: The World of Technology?: How technology made the NFL the cash cows of the sports world, JaRon A. Moody
3-D Printing, Kristina Shindyapin
The History of Apple Inc., Dominique Turner
Submissions from 2012
Access Controls in Relational Databases, Rebekah Broome
Cloud Storage, Matthew G. Chaulklin
Computer Viruses, Darrin McKenzie
Apple vs. Microsoft: Which one is better? A historical and technical comparison of two companies, Philip Thorpe
Technological Advancements of Cell Phones from 2008-2012, Chris Wholey
Submissions from 2011
Ethical Hacking, Sean Allison
Information Systems in Automobiles, Rob Berry
The War on Cyber Terrorism, Brandon Curry
API and Method Call Selection in an Automated Mashup Composer, Joseph Durham
Decoding Digerati, Derick Fox
Mobile OS and Peer-To-Peer Gaming Integration with iPhone iOS, Stephen Jackson
Online Identity Theft, Ryan Lampert
Houdini's wxPython, Michael Moore
Engineering a 3 dimensional Model of the Bridgewater Campus Using 3ds Max, Jean-Leman Rusangiza
Impact of Network Security on E-Commerce, John Rutt
Installing Wireless Networks, John M. Sawyer
''Going Green'' with Computing, Nicole Southerly
Course Planner, Jermaine Spears
Cloud-based Computing, Tyler Zimmerman
Submissions from 2010
Magic the Gathering Deck Analysis Application, William Tyler Broyles
Women in the Information Technology World: Then and Now, Katie Haw
Communicating Through Social Networks, Bradley Jones
Information Systems in Automobiles: What IT Has Evolved and How it Affects Society, William Robbie Lawrence
Internet Privacy: The Cost of Being Connected, Paul Pennell
Rockingham Memorial Hospital And Virtualization [Virtual Servers Save], Louis Sanchez
Creating a CMU Sphinx Based Speech Recognition Book Cataloguing Software, Sekani Tembo
RAPIDLY RISING IDENTITY THEFT & CRIMES, Dominic Trawick
Submissions from 2009
IJustSwim Web Solution, James R. Fukumoto
Interactive Software Incorporated into Education to Improve Learning, Brittany S. Keller
Alert Systems and their Response, Aaron Read
Submissions from 2008
Restructuring Emergency Communications: The Advancements of the 800MHz Radio System, Caleb Bailey
Career Services Database, Antonio Jones
DarkBasic Pro: Building a 2D Fighter, Arkady Kurihine