Journal of the Midwest Association for Information Systems (JMWAIS)
Most Popular Papers *
Evaluating Project Characteristics for Selecting the Best-fit Agile Software Development Methodology: A Teaching Case
Yousra Abdo Harb, Cherie Noteboom, and Surendra Sarnikar
Digital and Non-Digital Distractions for IT Professionals’ Remote Work
Makoto Nakayama, Charlie C. Chen, and Yoris Au
Enterprise Computer Security: A Literature Review
Dennis C. Acuña
Growing Computer Science and Information Technology Education in K-12: Industry Demand and Ecosystem Support
John Michael Muraski and Jakob Iversen
Call Me BIG PAPA: An Extension of Mason’s Information Ethics Framework to Big Data
Jacob Young, Tyler J. Smith, and Shawn H. Zheng
Complying with BYOD Security Policies: A Moderation Model Based on Protection Motivation Theory
Cindy Zhiling Tu, Joni Adkins, and Gary Yu Zhao
Innovation in Healthcare: Harnessing New Technologies
Eugenio Fernández
Using Individual Decision, Economic, and Health Status Data to Predict Health Checkup Behavior
Neetu Singh, Apoorva Kanthwal, Prashant Bidhuri, and Anusha Vijaykumar Munnolli
Web Scraping in the R Language: A Tutorial
Vlad Krotov and Matthew Tennyson
Building Collaboration Networks and Alliances to Solve the IT Talent Shortage: A Revelatory Case Study
John Michael Muraski, Jakob Iversen, and Kimberly Jean Iversen
The Role of Motivation in Assessing Website Credibility: Insights from Eye Tracking
Akmal Mirsadikov and Achita Muthitacharoen
Technology Adoption and Disruption -- Organizational Implications for the Future of Work
Rassule Hadidi and Daniel Power
A Framework for Designing Digital Health Interventions
Paidi O’Raghallaigh and Frederic Adam
Information Technology is Transforming the Heartland: Making the Case for Midwest United States
Rassule Hadidi, Daniel Power, and Joey F. George
Motivating Employees to Comply with Information Security policies
David Sikolia and David Biros
Electronic Health Record System Implementation in a Health Informatics Program: A Case Study
Kalyani Ankem, Vishal Uppala, and Alka Dhawan
Wearables in the Workplace: Examination Using a Privacy Boundary Model
Andy Luse and Jim Burkman
College Students’ Inappropriate Posting Behavior Across Social Media Sites: The Role of Friend Group Overlap
Robert E. Miller
COVID-19 and Examples of “Best” Teaching Practices from the Lens of Different Stakeholders
Rassule Hadidi and Joey F. George
A Practitioner Methodology for Mitigating Electronic Data Risk Associated with Human Error
Dennis C. Acuna, Rajab Suliman, and Nasir Elmesmari
* Based on the average number of full-text downloads per day since the paper was posted.
» Updated as of 01/25/23.