Submissions from 2018

PDF

Manifest Observations on a Comprehensive Computer Security Policy, Dennis C. Acuña

PDF

Got Phished! Role of Top Management Support in Creating Phishing Safe Organizations, Gaurav Bansal

PDF

Shipping and Return-Shipping Costs do not Cost the Same: The Role of Gender and Product Price in Online Buying, Gaurav Bansal and Emma Nies

PDF

When your students are quest-masters: Gamifying Information Systems Course Content, Connie S. Barber

PDF

Toward Understanding Customer Preference Factors in Agile - A Research Plan, David Bishop and Pam Rowland

PDF

Malaria Surveillance System Using Social Media, James Boit and Hassan Alyami

PDF

Password Memorability and Strength using an Image, Cameron Burns and Nathan Twyman

PDF

Assessing Classical and Expressive Aesthetics of Web Pages using Machine Learning, Ang Chen, Fiona Fui-Hoon Nah, and Langtao Chen

PDF

Towards IoT Entrepreneurship: A Preliminary Investigation, Michael Y. Chuang

PDF

Cybercrime Post-Incident Leadership Model, Marisa Cleveland and Simon Cleveland

PDF

Toward Cybersecurity Leadership Framework, Simon Cleveland and Marisa Cleveland

PDF

MWAIS 2018 Event Program Booklet, Maurice Dawson

PDF

The Case for IT Training within Guinea’s Ministry of Agriculture: Evaluating Performance and Usability, Maurice Dawson, Damon Walker, and Simon Cleveland

PDF

Information Technology Use in West African Agriculture – challenges and opportunities: a panel discussion, Maurice Dawson, Damon Walker, and Ashley Moss

PDF

Challenges in Healthcare Post-EMR Adoption, Terrence Duncan, Emad Rahim, and Darrell Burrell

PDF

An integrated concept for supply chain analytics in Small-medium sized enterprises, Tobias Engel, Dany Meyer, and Joerg-Oliver Vogt

PDF

Preliminary Insights into Social Commerce Capability Development, Edward Entee, Joseph Budu, and Richard Boateng

PDF

How Wearable Technology Will Replace Verbal Authentication or Passwords for Universal Secure Authentication for Healthcare, Chad R. Fenner and Cherie Noteboom

PDF

Context-Dependent Information Elements in the Car: Explorative Analysis of Static and Dynamic Head-Up-Displays, Matthias Gottlieb, Peter Zarnitz, Markus Böhm, and Helmut Krcmar

PDF

Evolutionary Systems: Applications to Cybersecurity, David Gould and Simon Cleveland

PDF

A Research Agenda on Using Conceptual Models for User Story Development, Abhimanyu Gupta, Geert Poels, and Palash Bera

PDF

Use of Artificial Intelligence, Machine Learning, and Autonomous Technologies in the Mining Industry, Zeshan Hyder, Keng Siau, and Fiona Fui-Hoon Nah

PDF

Extrinsic and Intrinsic Motivations: An Experiment on the Role of Competitions in Teaching and Learning, Elahe Javadi and Shivam Verma

PDF

Innovative low-code tool for Systems Analysis and Design, Julie Kukesh and Kat Brandenburg

PDF

Modeling Trust in the Adoption Decision Process of Robo-Advisors: An Agent-Based Simulation Approach, Sangho Lee, Jae Choi, Thomas L. Ngo-Ye, and Maeve Cummings

PDF

Informational Video Gaming in the Waiting Room, Andrew Long, Mitchell Ramirez, Coltin Shields, and Nathan Twyman

PDF

Neural Correlates of States of User Experience in Gaming using EEG and Predictive Analytics, Chandana Mallapragada, Fiona Fui-Hoon Nah, Keng Siau, Langtao Chen, and Tejaswini Yelamanchili

PDF

Artificial Intelligence Impacts on Higher Education, Yizhi Ma and Keng L. Siau

PDF

Cybersecurity: Personal Information and Password Setup, Yizhi Ma and Nathan W. Twyman

PDF

The Impact of Guided Learning on Student Achievement and Retention in an Online Course Environment: A Reflection on Introductory MIS Courses, Shaun Moore and Amy Rutledge

PDF

Green Communication in Cellular Networks, Shahram Moradi and Connie S. Barber

PDF

Timing of Data Breach Announcement and E-Commerce Trust, Steven Muzatko and Gaurav Bansal

PDF

The Perceptions of Cyber Security in High School Girls, Kanthi Narukonda and Pam Rowland

PDF

Negative Effects of Online Health Communities on User's Health: The Case of Online Health Forums, Tareq Nasralah, Ali Ahmed, Abdullah Wahbeh, Hassan Alyami, and Areeba Ali

PDF

The Significance of Professional Associations: Addressing the Cybersecurity Talent Gap, Calvin Nobles and Darrell Burrell

PDF

Project Management Assurance in Agile Projects: Research in Progress, Dawn Owens, Jeffrey W. Merhout, and Deepak Khazanchi

PDF

The Current Development of Technology Model in E-Commerce and Suggestion for Future Research, Shafeeq Ur Rahaman, Noel Merwyn Badugula, Te-Wei Wang, and Neethu Chithralekha Somarajan

PDF

A Panel on Distance Education Best Practices: Innovation and Pedagogy, Emad Rahim, Darrell Burrell, Bill Davis, Terrance Duncan, and Dave Carter

PDF

Efficient Reduced-Bias Genetic Algorithm (ERBGA) for Generic Community Detection Objectives, Aditya Karnam Gururaj Rao, Cezary Janikow, Sanjiv Bhatia, and Sharlee Climer

PDF

Effect of Probable and Guaranteed Monetary Value Gains and Losses on Cybersecurity Behavior of Users, Santhosh Kumar Ravindran, Fiona Fui-Hoon Nah, and Maggie X. Cheng

PDF

An Equity Perspective on Knowledge Sharing Behaviors in Organizations, Prasad S. Rudramuniyaiah, Kailash Joshi, and Kyootai Lee

PDF

The Role of Message Structure on the Effectiveness of Security Messages: A Neuro-Investigation, Roozmehr Safi, Glenn J. Browne, and Eric Walden

PDF

Research-in-Progress: Decision Support Systems for Recruiting College Athletes, Conrad Schmid

PDF

Panel: Artificial Intelligence and The Future of Work, Keng Siau, Mary Lacity, and Vicki Sauter

PDF

Exploring the Relative Sustainability Efficiency of Organizations: A DEA Approach, Daphne Simmonds and Abel Moreno

PDF

Role of Decision Making in Predicting Health Behavior, Neetu Singh, Apoorva Kanthwal, Prashant Bidhuri, and Anusha Vijaykumar Munnolli

PDF

ERP Project Retrospectives—55 Enterprise Systems: Evaluating Project Success, Lessons Learned, and Business Outcomes, Mary Sumner

PDF

Business Payoff to the Cloud, Mary Sumner and Joe Caro

PDF

Panel: Cyber-Security in the Trenches, Mary Sumner, Wayne Fajerski, Jeff Robertson, and Tony Munns

PDF

Supervised Machine Learning Techniques, Cybersecurity Habits and Human Generated Password Entropy for Hacking Prediction, Pedro Taveras and Liliana Hernandez

PDF

Artificial Intelligence-Based Password Brute Force Attacks, Khoa Trieu and Yi Yang

PDF

Theoretical Trends in IS/T Leadership: A Review of Published Research, Abhishek Tripathi and Deepak Khazanchi

PDF

Complying with BYOD Security Policies: A Moderation Model, Cindy Zhiling Tu, Joni Adkins, and Gary Yu Zhao

PDF

Fear and Loathing of Cybersecurity: What Keeps IT Executives Awake at Night, Steven A. Wallace and Karen Y. Green

PDF

Artificial Intelligence: A Study on Governance, Policies, and Regulations, Weiyu Wang and Keng Siau

PDF

Mobile Course Feedback System for Improving Student Engagement, Nathaniel Williams, Jake Mondschein, Mark Farmer, and Nathan Twyman

PDF

A Qualitative Research on Marketing and Sales in the Artificial Intelligence Age, Yin Yang and Keng L. Siau

PDF

The Development of an Open Source Intelligence Gathering Exercise for Teaching Information Security & Privacy, Jacob A. Young, Kerstyn N. Campbell, Angelica N. Fanti, Alex Alicea, Matthew V. Weiss, Justin R. Burkhart, and Matthew R. Braasch

PDF

Trade-offs between Monetary Gain and Risk Taking in Cybersecurity Behavior, Xinhui Zhan, Fiona Fui-Hoon Nah, and Maggie X. Cheng