Submissions from 2018
Manifest Observations on a Comprehensive Computer Security Policy, Dennis C. Acuña
Got Phished! Role of Top Management Support in Creating Phishing Safe Organizations, Gaurav Bansal
Shipping and Return-Shipping Costs do not Cost the Same: The Role of Gender and Product Price in Online Buying, Gaurav Bansal and Emma Nies
When your students are quest-masters: Gamifying Information Systems Course Content, Connie S. Barber
Toward Understanding Customer Preference Factors in Agile - A Research Plan, David Bishop and Pam Rowland
Malaria Surveillance System Using Social Media, James Boit and Hassan Alyami
Password Memorability and Strength using an Image, Cameron Burns and Nathan Twyman
Assessing Classical and Expressive Aesthetics of Web Pages using Machine Learning, Ang Chen, Fiona Fui-Hoon Nah, and Langtao Chen
Towards IoT Entrepreneurship: A Preliminary Investigation, Michael Y. Chuang
Cybercrime Post-Incident Leadership Model, Marisa Cleveland and Simon Cleveland
Toward Cybersecurity Leadership Framework, Simon Cleveland and Marisa Cleveland
MWAIS 2018 Event Program Booklet, Maurice Dawson
The Case for IT Training within Guinea’s Ministry of Agriculture: Evaluating Performance and Usability, Maurice Dawson, Damon Walker, and Simon Cleveland
Information Technology Use in West African Agriculture – challenges and opportunities: a panel discussion, Maurice Dawson, Damon Walker, and Ashley Moss
Challenges in Healthcare Post-EMR Adoption, Terrence Duncan, Emad Rahim, and Darrell Burrell
An integrated concept for supply chain analytics in Small-medium sized enterprises, Tobias Engel, Dany Meyer, and Joerg-Oliver Vogt
Preliminary Insights into Social Commerce Capability Development, Edward Entee, Joseph Budu, and Richard Boateng
How Wearable Technology Will Replace Verbal Authentication or Passwords for Universal Secure Authentication for Healthcare, Chad R. Fenner and Cherie Noteboom
Context-Dependent Information Elements in the Car: Explorative Analysis of Static and Dynamic Head-Up-Displays, Matthias Gottlieb, Peter Zarnitz, Markus Böhm, and Helmut Krcmar
Evolutionary Systems: Applications to Cybersecurity, David Gould and Simon Cleveland
A Research Agenda on Using Conceptual Models for User Story Development, Abhimanyu Gupta, Geert Poels, and Palash Bera
Use of Artificial Intelligence, Machine Learning, and Autonomous Technologies in the Mining Industry, Zeshan Hyder, Keng Siau, and Fiona Fui-Hoon Nah
Extrinsic and Intrinsic Motivations: An Experiment on the Role of Competitions in Teaching and Learning, Elahe Javadi and Shivam Verma
Innovative low-code tool for Systems Analysis and Design, Julie Kukesh and Kat Brandenburg
Modeling Trust in the Adoption Decision Process of Robo-Advisors: An Agent-Based Simulation Approach, Sangho Lee, Jae Choi, Thomas L. Ngo-Ye, and Maeve Cummings
Informational Video Gaming in the Waiting Room, Andrew Long, Mitchell Ramirez, Coltin Shields, and Nathan Twyman
Neural Correlates of States of User Experience in Gaming using EEG and Predictive Analytics, Chandana Mallapragada, Fiona Fui-Hoon Nah, Keng Siau, Langtao Chen, and Tejaswini Yelamanchili
Artificial Intelligence Impacts on Higher Education, Yizhi Ma and Keng L. Siau
Cybersecurity: Personal Information and Password Setup, Yizhi Ma and Nathan W. Twyman
The Impact of Guided Learning on Student Achievement and Retention in an Online Course Environment: A Reflection on Introductory MIS Courses, Shaun Moore and Amy Rutledge
Green Communication in Cellular Networks, Shahram Moradi and Connie S. Barber
Timing of Data Breach Announcement and E-Commerce Trust, Steven Muzatko and Gaurav Bansal
The Perceptions of Cyber Security in High School Girls, Kanthi Narukonda and Pam Rowland
Negative Effects of Online Health Communities on User's Health: The Case of Online Health Forums, Tareq Nasralah, Ali Ahmed, Abdullah Wahbeh, Hassan Alyami, and Areeba Ali
The Significance of Professional Associations: Addressing the Cybersecurity Talent Gap, Calvin Nobles and Darrell Burrell
Project Management Assurance in Agile Projects: Research in Progress, Dawn Owens, Jeffrey W. Merhout, and Deepak Khazanchi
The Current Development of Technology Model in E-Commerce and Suggestion for Future Research, Shafeeq Ur Rahaman, Noel Merwyn Badugula, Te-Wei Wang, and Neethu Chithralekha Somarajan
A Panel on Distance Education Best Practices: Innovation and Pedagogy, Emad Rahim, Darrell Burrell, Bill Davis, Terrance Duncan, and Dave Carter
Efficient Reduced-Bias Genetic Algorithm (ERBGA) for Generic Community Detection Objectives, Aditya Karnam Gururaj Rao, Cezary Janikow, Sanjiv Bhatia, and Sharlee Climer
Effect of Probable and Guaranteed Monetary Value Gains and Losses on Cybersecurity Behavior of Users, Santhosh Kumar Ravindran, Fiona Fui-Hoon Nah, and Maggie X. Cheng
An Equity Perspective on Knowledge Sharing Behaviors in Organizations, Prasad S. Rudramuniyaiah, Kailash Joshi, and Kyootai Lee
The Role of Message Structure on the Effectiveness of Security Messages: A Neuro-Investigation, Roozmehr Safi, Glenn J. Browne, and Eric Walden
Research-in-Progress: Decision Support Systems for Recruiting College Athletes, Conrad Schmid
Panel: Artificial Intelligence and The Future of Work, Keng Siau, Mary Lacity, and Vicki Sauter
Exploring the Relative Sustainability Efficiency of Organizations: A DEA Approach, Daphne Simmonds and Abel Moreno
Role of Decision Making in Predicting Health Behavior, Neetu Singh, Apoorva Kanthwal, Prashant Bidhuri, and Anusha Vijaykumar Munnolli
ERP Project Retrospectives—55 Enterprise Systems: Evaluating Project Success, Lessons Learned, and Business Outcomes, Mary Sumner
Business Payoff to the Cloud, Mary Sumner and Joe Caro
Panel: Cyber-Security in the Trenches, Mary Sumner, Wayne Fajerski, Jeff Robertson, and Tony Munns
Supervised Machine Learning Techniques, Cybersecurity Habits and Human Generated Password Entropy for Hacking Prediction, Pedro Taveras and Liliana Hernandez
Artificial Intelligence-Based Password Brute Force Attacks, Khoa Trieu and Yi Yang
Theoretical Trends in IS/T Leadership: A Review of Published Research, Abhishek Tripathi and Deepak Khazanchi
Complying with BYOD Security Policies: A Moderation Model, Cindy Zhiling Tu, Joni Adkins, and Gary Yu Zhao
Fear and Loathing of Cybersecurity: What Keeps IT Executives Awake at Night, Steven A. Wallace and Karen Y. Green
Artificial Intelligence: A Study on Governance, Policies, and Regulations, Weiyu Wang and Keng Siau
Mobile Course Feedback System for Improving Student Engagement, Nathaniel Williams, Jake Mondschein, Mark Farmer, and Nathan Twyman
A Qualitative Research on Marketing and Sales in the Artificial Intelligence Age, Yin Yang and Keng L. Siau
The Development of an Open Source Intelligence Gathering Exercise for Teaching Information Security & Privacy, Jacob A. Young, Kerstyn N. Campbell, Angelica N. Fanti, Alex Alicea, Matthew V. Weiss, Justin R. Burkhart, and Matthew R. Braasch
Trade-offs between Monetary Gain and Risk Taking in Cybersecurity Behavior, Xinhui Zhan, Fiona Fui-Hoon Nah, and Maggie X. Cheng