Submissions from 2016

PDF

Human Computer Interaction Using Eye-tracking Data, Sukwon Lee

PDF

Investigating The Three-Click Rule: A Pilot Study, Thomas Porter and Dr. Robert Miller

PDF

IT and Organizational Agility: A Review of Major Findings, Jennifer Heckler and Anne Powell

PDF

The Impact of Mobile Technology on Small Service Businesses, Michael Eierman and Jakob Iversen

PDF

A Comparative Study of Ensemble-based Forecasting Models for Stock Index Prediction, Dhanya Jothimani, Ravi Shankar, and Surendra S. Yadav

PDF

Environmental Management Information Systems: A Conceptual Overview and Review of Vendors, Jeffrey W. Merhout, Mary M. Callison, and Shu Schiller

PDF

Social Engineering Awareness in Business and Academia, Deanna Hauser

PDF

Beyond the Prisoner’s Dilemma: Using the Game Theory Security Model to Develop Robust Information Security Policies, Alan Rea

PDF

The Influence of Outcome-Oriented Security Policy on Security Perceptions and Intentions, Jeffrey D. Wall and Mari W. Buche

PDF

Effects of a Comprehensive Computer Security Policy on Computer Security Culture, Dennis C. Acuña

PDF

Moral Beliefs and Organizational Information Security Policy Compliance: The Role of Gender, Gaurav Bansal, Kayla Hodorff, and Kyle Marshall

PDF

Motivating Employees to Comply with Information Security Policies, David Sikolia and David Biros

PDF

Secure Software Development: A Developer Level Analysis, Nasim Talebi and Emmanuel W. Ayaburi

PDF

When Size Does Matter: Identifying Multilevel Factors Contributing to IT Major Choice, Andy Luse, Julie Rursch, and Doug Jacobson

PDF

A Foundational Perspective on Core Competency Requirements for Project Management Initiatives, Todd A. Little

PDF

Socio Cognitive and Affective Processing in the Context of Team-Based Gamified ERP Training: Reflective and Impulsive Model, Jungwon Kuem, Jiao Wu, Dong-Heon Kwak, Shuyuan Deng, and Mark Srite

PDF

Towards an Emancipatory Systems Approach for IT Adoption in Organizations, Osden Jokonya

PDF

Job Relevance and IT Usage by Child Welfare Professionals in Wisconsin Counties, Samantha Surowiec and Gaurav Bansal

PDF

Longitudinal Studies in Information Systems Research: Practices, Findings, and Gaps, Yi Maggie Guo and Barbara D. Klein

PDF

The Significance of Mixed Methods Research in Information Systems Research, Osden Jokonya

PDF

A Typology of Student Social Media Users: A Posting Behavior Perspective, Robert E. Miller and James Melton

PDF

Social media in the information seeking behavior of married Korean immigrant men, Tae Hee Lee

PDF

Benefits and Concerns of Using Social Media - Users’ Perspective, Hongjiang Xu

PDF

The Special Role of Public Business Schools in the Local and Regional Economic Development – A Panel Presentation, Rassule Hadidi, Ron McNeil, Bob Clary, Amy Hietapelto, and John Chenoweth

PDF

Academic panel: Privacy, technology and surveillance in the digital age: the Big Brother scenario, Mari Buche, Joey F. George, Deepak Khazanchi, Daniel Power, and Michael Zimmer

PDF

Table of Contents: Proceedings of the 11th Annual Midwest United States Association for Information Systems, Shana R. Ponelis