Guynes, C. S., Kvanli, A. H., Pavur, R. J. (2000). Introduction to Business Statistics: A Computer Integrated Approach. 964. St Paul: West Publishing Compnany.
Guynes, C. S., Gordon, D. A., Lynch, R. G. (1976). Statistics for Management. 215. Dalls: MLA Press.
Phillips, B. K., Ryan, S., Harden, G., Guynes, C. S., Windsor, J. (2013). Motivating Students to Acquire Mainframe Skills. Annual Conference on Computers and People Research.
Guynes, C. S. (2011). Teaching XML for Business. General Business Conference.
Guynes, C. S. (2004). Offshoring Considerations for IT Organizations. Pan American Technology Conference.
Guynes, C. S. (2001). Issues in Information Technology Investment. Pan American Technology Conference.
Guynes, C. S. (1977). National Chairman of the Management Information. National Decision Science, Systems Special Interest Group for the National De.
Guynes, C. S., Parrish, J. L., Vedder, R. G. (2020). Edge computing societal privacy and security issues. ACM SIGCAS Computers and Society. 48(3-4), 11--12. New York, NY, USA: ACM.
Guynes, S., Vedder, R. G. (2018). IT Personnel and Corporate Identification. ACM SIGCAS Computers and Society. 47(4), 10-14.
St.John, J., Visinescu, L., Guynes, C. S., Prybutok, V. R. (2017). Information and Communication Technology Offshoring Logistics Success. Information Systems Management. 33(3), . https://www.tandfonline.com/doi/full/10.1080/10580530.2016.1188542
St. John, J., Vedder, R. G., Guynes, S. (2017). Offshoring and Social Exchange. ACM SIGCAS Computers and Society. 47(1), .
Vedder, R. G., Guynes, C. S. (2016). The Challenge of Botsourcing. Review of Business Information Systems. 20(1), .
St. John, J., Cline, M., Guynes, C. S. (2015). Business Administration Students as Surrogates for IT Professionals. American Journal of Business Education.
St. John, J., Guynes, C. S., Vedder, R. (2015). The Client-Vendor Offshore Relationship. Information Systems Management.
St. John, J., Cline, M., Guynes, C. S. (2015). Recent Trends in Offshoring Relationships. Review of Business Information Systems. 19(1), . Published.
St. John, J., Vedder, R., Guynes, C. S. (2013). Relationship Changes in IT Offshoring. International Journal of Management & Information Systems.
St. John, J., Guynes, C., Vedder, R. (2013). The Value of Partnership in Offshoring. Journal of Business and Economics Research.
Wu, A., Guynes, C., Windsor, J. (2012). Security Awareness Programs. Review of Business Information Systems.
Huff, K., Cline, M., Guynes, C. S. (2012). Web-Based Testing. American Journal of Business Education.
Peak, D. A., Guynes, C. S., Prybutok, V. R. (2011). Aligning Information Technology with Business Strategy. Journal of Information Technology Case and Application Research.
Guynes, C. S., Wu, A., Windsor, J. (2011). E-Commerce/Network Security Considerationd. International Journal of Management & Information Systems.
Guynes, C. S., Windsor, J. (2011). Revisiting Client-Server Computing. Journal of Business and Economics Research.
Cline, M., Guynes, C. S., Simard, K. (2010). Ace Project as a Project Management Tool. American Journal of Business Education. 3(4), 62-68.
Cline, M., Guynes, C. (2010). Impact of Organizational Change on IT Security. Journal of Business and Economics Research. 8(1), 59-65.
Vedder, R., Guynes, C. S. (2010). Offshoring Limitations. Review of Business Information Systems. 14(1), 39-43.
Vedder, R., Guynes, C. S. (2009). Social considerations for information technology offshoring. ACM SIGCAS Computers and Society. 38(4), 40-44.
Jensen, B., Guynes, C. S., Nyaboga, A. (2009). The Graduate MIS Security Course: Objectives and Challenges. American Journal of Business Education. 2(8), 51-54.
Cline, M., Guynes, C. S., Riley, R. (2009). Information Technology Investment. Review of Business Information Systems. 13(3), 11-16.
Riley, R., Nyaboga, A., Guynes, C. S. (2009). The Importance of Gender and Facial Information Science on Information Systems Design. Journal of Business and Economics Research. 7(8), 85-90.
Cline, M., Guynes, C. S. (2009). Improving the Operational Environment thru Internet Utilization. International Journal of Management & Information Systems. 13(1), 1-8.
Jensen, B., Guynes, C. S. (2008). Impact of Sarbanes-Oxley on Global Outsourcing. International Journal of Management & Information Systems. 12(1), 65-74.
Guynes, C. S. (2007). Data Administration Security. International Journal of Management & Information Systems. 10(1), 5-11.
Jensen, B., Cline, M., Guynes, C. S. (2007). HIPAA, privacy and organizational change: a challenge for management .. ACM SIGCAS Computers and Society. 37(1), 12-17.
Jensen, B., Cline, M., Guynes, C. S. (2006). Teaching the Undergraduate CS Information Security Course.. SIGCSE Bulletin.
Peak, D., Guynes, C. S. (2005). Information Technology Alignment Planning-A Case Study. Information & Management. 42, 619-633.
Guynes, C. S., Cline, M. (2004). IT Investmentment is Strategic to a Firm's Survival. Information Strategy: The Executive's Journal. 39-47.
Guynes, C. S., Peak, D. (2003). Improving Information Quality Through IT Alignment Planning- A Case Study. Information Systems Management. 22-29.
Guynes, C. S., Peak, D. (2003). IT Alignment Planning. Journal of Computer Information Systems. 9-15.
Guynes, C. S., Vedder, R. G. (2002). CIO's Perspectives on Competitive Intelligence. Information Systems Management. 49-55.
Guynes, C. S., Cline, M. (2001). The Impact of Information Technology Investment on the Enterprise. Information Systems Management. 70-76.
Guynes, C. S., Celine, M. (2001). Impact of Technology Investment on Firm Performance`. Journal of Computer Information Systems. 15-19.
Guynes, C. S., Vedder, R. G. (2001). A Study of Competitive Intelligence Practices in Organizations. Journal of Computer Information Systems. 36-40.
Guynes, C. S., Fox, T. (1999). Maintaining Quality in Information Systems. Journal of Computer Information Systems. 76-80.
Guynes, C. S., Vanecek, M. T., Vedder, R. G. (1999). CEO and CIO Perspectives on Competitive Intelligence. Communications of the ACM. 42(8), 109-116.
Guynes, C. S., Spence, J. W., Kappelman, L. A. (1998). Fostering Loyal and Long-Term Employees by Raising Organizational Identification. Journal of Systems Development Management. 1-7.
Guynes, C. S., Richard, T. Y., Rick, K. L. (1998). IS Managers Perceptions of IS Job Skills. Journal of Computer Information Systems. 53-57.
Guynes, C. S., Vedder, R. G., Vanecek, M. T. (1997). Electronic Commerce on The WWW/INTERNET. Journal of Computer Information Systems. 20-25.
Guynes, C. S., Vedder, R. G., Vanecek, M. T. (1997). Security Issues on the Internet. ACM SIGSAC - Security Audit & Control. 8-12.
Guynes, C. S., Windsor, J., Kappelman, L. A. (1997). Managing End-User Development in a Client/Server Enrironment. Journal of Systems Development Management. 1-9.
Guynes, C. S., Kappelman, L. A., Farr, P. (1997). User Partnerships: The Key to System Success. Journal of Systems Development Management. 1-9.
Guynes, C. S., Vanecek, M. T. (1996). Critical Success Factors in Data Management. Information & Management. 30, 201-209.
Guynes, C. S., Prybutok, V. R., Myers, B. L. (1996). Evolving Data Quality Considerations for Client/Server Environments. Data Quality. 21-27.
Guynes, C. S., Prybutok, V. R., Windsor, J. (1996). DATA QUALITY- A Critical Information Systems Consideration. Data Management Review. 99-101.
Guynes, C. S., Golladay, R. M., Rick, H. (1996). Database Security in a Client/Server Environment. ACM SIGSAC - Security Audit & Control. 9-12.
Guynes, C. S., Vedder, R. G., Vanecek, M. T. (1996). Privacy and Societal Issues on the Internet. ACM SIGCAS Computers and Society. 13-15.
Guynes, C. S., Vondran, G. M., Prybutok, V. R. (1996). The Information Infrastructure: Policy and Security Considerations. ACM SIGCAS Computers and Society. 11-13.
Guynes, C. S., Maples, G. E. (1996). Privacy Issues in Statistical Database Environment. ACM SIGCAS Computers and Society. 4-5.
Guynes, C. S., Windsor, J. (1995). Client/Server Computing-Politics and Solutions. Data Center Operations Management. 1-9.
Guynes, C. S., Vanecek, M. T. (1995). Data Management Issues in Information Systems. Journal of Database Management. 3-12.
Guynes, C. S., Kappelman, L. A. (1995). End-User Training and Empowerment: Lessons from a Clien/Server Enrironment. Journal of Systems Management. 36-41.
Guynes, C. S., Thorn, R. G. (1995). Network Security in a Clinet/Server Environment. ACM SIGSAC - Security Audit & Control. 6-12.
Guynes, C. S., Huff, R., Golladay, R. M. (1995). Ethical Considerations for the Information HIghway. ACM SIGCAS Computers and Society. 3-7.
Guynes, C. S., Corman, L. S., Vanecek, M. T. (1995). Study of Laterality and Cognitive Style in Information Systems and Liberal Arts Students. Journal of Computer Information Systems. 26-35.
Guynes, C. S. (1994). Current Privacy Consideration As We Enter the 'Information Highway' Era.. ACM SIGCAS Computers and Society. 16-19.
Guynes, C. S., Lee, P. (1993). Monitoring Database Performance in an End User Environment. Journal of Systems Management. 27-30.
Guynes, C. S., Spence, J. W. (1993). The Data Administrator-User Interface, A Critical Dialogue. Journal of Computer Information Systems. 25-27.
Guynes, C. S., Guynes, J. L., Thorn, R. G. (1990). The Data Dictinonary: A Valuable Information Resource Management Tool. Journal of Computer Information Systems. 10-12.
Guynes, C. S., Guynes+, J. L., Thorn, R. G. (1990). The Impact of Transborder Data Flow Regulation. Information Systems Management. 70-73.
Guynes, C. S., Guynes, J. L., Thorn, R. G. (1990). Conquering International Boundaries That Restrict the Flow of Data. Information Strategy: The Executive's Journal. 27-32.
Guynes, C. S., Guynes, J. L., Thorn, R. G. (1990). Strategic and Operational Issues for the Successful Information Center. Information Systems Management. 15-22.
Guynes, C. S. (1988). Metadata Considerations for Effective Data Administration. Journal of Computer Information Systems. 16-19.
Guynes, C. S. (1987). Monitoring Database Performance- A Control Issue. ACM SIGSAC - Security Audit & Control. 7-11.
Guynes, C. S. (1985). Security of Computer Software. ACM SIGSAC - Security Audit & Control. 31-35.
Guynes, C. S., Spence, J. W. (1984). Designing Computer Systems That Work. Journal of Computer Information Systems. 12-14.
Guynes, C. S., Vanecek, M. (1984). Job Selection Strategy for Ph D. Students. The Computer Education Quarterly. 14-20.
Guynes, C. S., T, R., Spence, J. W. (1984). Security Considerations for Computer Personnel. ACM SIGCPR Computer Personnel. 26-30.
Guynes, C. S., Spence, J. W. (1984). A Realistic Approach for Educationg Systems Programmers. SIGCSE Bulletin. 10-12.
Guynes, C. S., Spence, J. W., T, R. (1984). Crisis Programming. Journal of Systems Management. 38-41.
Guynes, C. S., King, R., Yestingsmeier, J. (1984). Deregulation and EFTS. Business Insight. 24-26.
Guynes, C. S., Vanecek, M. (1984). Telecommunications Update: Tariffs and Taxed. The Computer Education Quarterly. 26-29.
Guynes, C. S., Vanecek, M., Zant, R. (1983). A Comparison of the ACM's Curricula in IS and CS. The Computer Education Quarterly. 36-39.
Guynes, C. S., Zant, R., Laney, M. (1983). Computer Security Practice. Journal of Systems Management. 22-26.
Guynes, C. S., Ray, H. (1983). Upgrading Educational Programs in Computer Information Systems. SIGCSE Bulletin. 14-16.
Guynes, C. S., Vanecek, M., Zant, R. (1983). A Summary of the ACM's MOdel Curricula in IS and BCIS. The Computer Education Quarterly. 16-20.
Guynes, C. S. (1983). EFTS Impact on Computer Security,. Computers & Security. 73-77.
Guynes, C. S., Harvill, R. H. (1983). Keeping Pace with the Changing Business Environment. The Computer Education Quarterly. 14-17.
Guynes, C. S., H, R., Harvill, J. (1982). Computer Errors: Where Does the Problem Really Lie?. Interface: The Computer Education Quarterly. 73-75.
Guynes, C. S., Vanecek, M., Zant, R. (1982). Thoughts on the Matur¬ing Process of the Information Systems Academic Discipline. Interface: The Computer Education Quarterly. 24-26.
Guynes, C. S., Vanecek, M. (1982). Business Computer Information Systems DPMA vs ACM: Now What?,. Interface: The Computer Education Quarterly. 18-22.
Guynes, C. S., Vanecek, M. (1981). The Professional Organization Dilemma. Interface: The Computer Education Quarterly. 22-24.
Guynes, C. S., King, R. (1981). What Effect Will EFTS have on Financial Institutions in the 80's. ABA Banking Journal. 47-53.
Guynes, C. S., Dehay, j. (1981). Basic Considerations of the Com¬puterized MIS for Small Business Managers. Small Business Institute Journal. 21-24.
Guynes, C. S., Vanecek, M. (1981). Business Computer Information Systems. Interface: The Computer Education Quarterly. 2-5.
Guynes, C. S., Vanecek, M. (1981). Computer Security: The Human Element. The Personnel Administrator. 71-79.
Guynes, C. S., Spence, M. R. (1981). Information Systems Education: An Applied Approach. Journal of Computer Information Systems. 17-20.
Guynes, C. S., Dehay, J. (1981). Software Security. Journal of Systems Management. 34-38.
Guynes, C. S., Zant, V. M. (1980). Changing Technology: Distributed Data Process¬ing. Journal Of Accountancy. 75-83.
Guynes, C. S., Zant, R., Vanecek, M. (1980). Data Storage and Retrieval Techniques in a Data Base Management Systems Environ¬ment. Journal of Computer Information Systems. 17-20.
Guynes, C. S. (1979). Security in Information Systems. The Personnel Journal. 60-66.
Guynes, C. S. (1979). Telecommunications and Computer Security. Journal of Systems Management. 19-23.
Guynes, C. S. (1979). Corporate Identity Crisis. Data Management. 16-19.
Guynes, C. S., Vanecek, M., Zant, R. (1979). Security of Telecom¬munication Systems. The CPA Journal. 31-34.
Guynes, C. S. (1979). The Care and Management of EDP Specialists. The Personnel Journal. 703-706.