Submissions from 2016
Human Computer Interaction Using Eye-tracking Data, Sukwon Lee
Investigating The Three-Click Rule: A Pilot Study, Thomas Porter and Dr. Robert Miller
IT and Organizational Agility: A Review of Major Findings, Jennifer Heckler and Anne Powell
The Impact of Mobile Technology on Small Service Businesses, Michael Eierman and Jakob Iversen
A Comparative Study of Ensemble-based Forecasting Models for Stock Index Prediction, Dhanya Jothimani, Ravi Shankar, and Surendra S. Yadav
Environmental Management Information Systems: A Conceptual Overview and Review of Vendors, Jeffrey W. Merhout, Mary M. Callison, and Shu Schiller
Social Engineering Awareness in Business and Academia, Deanna Hauser
The Influence of Outcome-Oriented Security Policy on Security Perceptions and Intentions, Jeffrey D. Wall and Mari W. Buche
Effects of a Comprehensive Computer Security Policy on Computer Security Culture, Dennis C. Acuña
Moral Beliefs and Organizational Information Security Policy Compliance: The Role of Gender, Gaurav Bansal, Kayla Hodorff, and Kyle Marshall
Motivating Employees to Comply with Information Security Policies, David Sikolia and David Biros
Secure Software Development: A Developer Level Analysis, Nasim Talebi and Emmanuel W. Ayaburi
When Size Does Matter: Identifying Multilevel Factors Contributing to IT Major Choice, Andy Luse, Julie Rursch, and Doug Jacobson
A Foundational Perspective on Core Competency Requirements for Project Management Initiatives, Todd A. Little
Socio Cognitive and Affective Processing in the Context of Team-Based Gamified ERP Training: Reflective and Impulsive Model, Jungwon Kuem, Jiao Wu, Dong-Heon Kwak, Shuyuan Deng, and Mark Srite
Towards an Emancipatory Systems Approach for IT Adoption in Organizations, Osden Jokonya
Job Relevance and IT Usage by Child Welfare Professionals in Wisconsin Counties, Samantha Surowiec and Gaurav Bansal
Longitudinal Studies in Information Systems Research: Practices, Findings, and Gaps, Yi Maggie Guo and Barbara D. Klein
The Significance of Mixed Methods Research in Information Systems Research, Osden Jokonya
A Typology of Student Social Media Users: A Posting Behavior Perspective, Robert E. Miller and James Melton
Social media in the information seeking behavior of married Korean immigrant men, Tae Hee Lee
Benefits and Concerns of Using Social Media - Users’ Perspective, Hongjiang Xu
The Special Role of Public Business Schools in the Local and Regional Economic Development – A Panel Presentation, Rassule Hadidi, Ron McNeil, Bob Clary, Amy Hietapelto, and John Chenoweth
Academic panel: Privacy, technology and surveillance in the digital age: the Big Brother scenario, Mari Buche, Joey F. George, Deepak Khazanchi, Daniel Power, and Michael Zimmer
Table of Contents: Proceedings of the 11th Annual Midwest United States Association for Information Systems, Shana R. Ponelis