Submissions from 2017

PDF

Storytelling with Tableau: A Hands-on Workshop, Shu Schiller

PDF

Media Choice in Asynchronous Deception Detection, Roger McHaney, Joey F. George, and Manjul Gupta

PDF

Neural Correlates of User Experience in Gaming, Tejaswini Yelamanchili, Fiona Fui-Hoon Nah, Keng L. Siau, and Langtao Chen

PDF

Methods in User Data Searches Simplified Approach to Web Searches, Chandana Mallapragada, Daniel Feissle, Sonia Kapoor, and Tylor Brom

PDF

Effect of EMR Use on Technostress and Healthcare Providers, Steven Wallace

PDF

Electronic Health Record System Implementation in a Health Informatics Program Research-in-Progress, Kalyani Ankem and Alka Dhawan

PDF

Online Health Recommendation System: A Social Support Perspective, Tareq Nasralah, Cherie Bakker Noteboom, Abdullah Wahbeh, and Mohammad Aref Al-Ramahi

PDF

An Exploratory Framework of a Decision Support System (DSS) to Support Ecological Compensation in China’s National Parks, Yu Wei, Rassule Hadidi, and Roya Gholami

PDF

Development of Effective IT Leadership Behaviors: A Review, Louis Hickman and Mesut Akdere

PDF

Project Management Assurance Research in Progress, Dawn Owens and Deepak Khazanchi

PDF

The Impact of Task-Methodology Fit on CPM/PERT Diagramming Performance: An Experimental Investigation, Daphne Simmonds and Norman Pence

PDF

The Ethics of Information Systems – challenges and opportunities: a panel discussion, Simon Rogerson, Keith Miller, Jenifer Sunrise Winter, and David Larson

PDF

Panel - Sharing Economy and Online/Blended Education: Implications, Daniel Power, Mari W. Buche, Kevin P. Scheibe, Michele Gribbins, Vickie Cook, and Rassule Hadidi

PDF

A Cross Country Analysis of Multitasking with Technology in Academic Settings, Mehruz Kamal and Yangyan Dong

PDF

Filter Bubble, Selective Exposure, and Integrative Complexity, Elahe Javadi, Nancy Novotny, Elnaz Mirrahimi, and Navid Rajabi

PDF

An Evaluation of Two Scales Used for Measuring Attribution, Andy Luse and Jim Burkman

PDF

Ensemble of Non-Classical Decomposition Models and Machine Learning Models for Stock Index Prediction, Dhanya Jothimani, Ravi Shankar, and Prof. (Dr.) Surendra S. Yadav

PDF

The Characteristics of Universities Offering Data Analytics Programs: An Analysis of US Regional Masters Universities, Troy Strader and Andrew Bryant

PDF

Separating News from Opinion in Social Media using Machine learning, Swayambhu Chatterjee

PDF

CLASSIFYING STUDENT SOCIAL MEDIA USERS: A PRELIMINARY INVESTIGATION, Robert E. Miller and James Melton

PDF

Workshop: Introduction to Meta-Analysis, Sudeep Sharma and Hamed Qahri-Saremi

PDF

Panel: Challenges and Strategies for Revitalizing a Mature Online Business Program, Carolee Rigsbee, Michele Gribbins, Donna Rogers, and Emily Boles

PDF

Mental Models: What do you mean by Data Science?, Mari W. Buche

PDF

Data Governance at State Departments of Transportation, James Hall

PDF

Machine Learning Approaches to Sentiment Analytics, Wangchuchu Zhao and Keng L. Siau

PDF

Lexicons in Sentiment Analytics, Bo Yuan and Keng L. Siau

PDF

A Systematic Literature Review of the Enterprise Systems Research in Leading IS Journals (2000-2015), Deepak Saxena and Joe McDonagh

PDF

Knowledge Challenges in Enterprise Systems Implementation: A Case Analysis, Sharath Sasidharan

PDF

What SMEs need to focus on in order to obtain benefits of ERP systems?, Hongjiang Xu

PDF

Panel: Teaching and Research Directions for Business and MIS Programs, Keng L. Siau, Stacie Petter, Shu Schiller, and Jacquelyn Ulmer

PDF

Workshop: Emerging Technologies and Practices that Promote Student-Centered Learning, Michele Gribbins and Vickie Cook

PDF

Information System Requirement Elicitation: The Role of Humor, David Krienke and Gaurav Bansal

PDF

Antecedents to Managerial Preference for Agile Software Development Methods – A Research Plan, David Bishop, Pam Rowland, and Cherie Bakker Noteboom

PDF

Governance Practices over Agile Systems Development Projects: A Research Agenda, Jeff Merhout and Mary Kovach

PDF

Effects of a Comprehensive Computer Security Policy on Human Computer Security Policy Compliance, Dennis C. Acuña

PDF

Insider Data Breaches and Trust Violation: The Role of Privacy Concern, Age and Gender, Gaurav Bansal, Anita Benzshawel, and Dana Estrada

PDF

How User Information Assurance Influences Perceived Information Control in Cloud Storage Service: A Self-Determination Perspective, Yuan Li, kuo-chung Chang, and Jingguo Wang

PDF

The Impact of Monetary Value Gains and Losses on Cybersecurity Behavior, Samuel Noah Smith, Fiona Fui-Hoon Nah, Maggie Cheng, and Santhosh Kumar Ravindran

PDF

Application of Flipped Classroom Techniques in Online Education: Experience with an Introductory MIS Course, Amy Rutledge and Vijayan Sugumaran

PDF

The Development of an Applied Ethical Hacking and Security Assessment Course, Jacob Young, Kerstyn Campbell, Angelica Fanti, Samantha Johnson, Zachary Sells, and Alex Sutter

PDF

A Model for teaching hands-on IT Audit skills to IS students, Arnold Nzailu, Hassan Alyami, and Kevin Streff

PDF

Effects of the Use of Leaderboards in Education, Yu-Hsien Chiu and Fiona Fui-Hoon Nah

PDF

Measuring Adoption of Open Source Software and Practices in Organizations: A Pilot Study, Georg J.P. Link, Jeremiah Gill, and Deepak Khazanchi

PDF

Advancing Open Online Community Science Practice: The Open Community Data Exchange, Georg J.P. Link, Kevin Lumbard, Matt Germonprez, and Sean Goggins

PDF

Open Source Communities as Liminal Ecosystems, Kevin Lumbard and Matt Germonprez

PDF

Investigating IS Service Portfolio Management and Strategy: A Study of IS Application Services, Tony Yu-Ju Tu, Hsin-Lu Chang, and Yu-Hsiang (John) Huang

PDF

A Novel Improvement to Google Scholar Ranking Algorithms Through Broad Topic Search, Matthew Russell Kearl, Cherie Bakker Noteboom, and Deb Tech

PDF

Impact of Artificial Intelligence, Robotics, and Machine Learning on Sales and Marketing, Keng L. Siau and Yin Yang

PDF

The policy-practice gap: Describing discordances between regulation on paper and organizational practices, David Sikolia and David Biros

PDF

Review of Mobile Applications Used for Covert Communication, Ali Ahmed and Ashley Podhradsky