Submissions from 2019
Electronic Evidence and Technology-Assisted Review, Brian Almquist
Panel Discussion: CIO Panel on Ethical Framework for AI & Big Data, Murali Balakrishnan, Gaurav Bansal, David Cagigal, Raman Mehta, and Todd Thiel
Abstract Only: Trust Violation and Rebuilding After a Data Breach: Role of Environmental Stewardship and Underlying Motives, Gaurav Bansal and Noah Redfearn
Work 4.0 and the Identification of Complex Competence Sets, Ronald C. Beckett and Tanvria Daberkow
How can Health Technology Project Communications be Improved in a Hospital, Andrew Behrens, Cherie Bakker Noteboom, and David Bishop
What are Healthcare Providers' Perceptions of Health Information Technology Project Training?, Andrew Behrens, Kaushik Ragothaman, David Bishop, and Cherie Bakker Noteboom
Developing more Women in Managerial Roles in Information Technology and Cybersecurity, Darrell Norman Burrell
Innovations from Academia around Cybersecurity Workforce and Faculty Development, Darrell Norman Burrell
Employee Acceptance of Employer Control Over Personal Devices – Research in Progress, Kevin Callies, Cherie Bakker Noteboom, Daniel Talley, and Yong Wang
The Impact of Analytics in Professional Baseball: How Long Before Performance Improves, Lee Freeman
Investigating ICTs for Education in Marginalized Communities, Mehruz Kamal and Diksha Diksha
“Something to talk about” Exploring open source design spaces, Kevin Lumbard, Vinod Kumar Ahuja, Matt Germonprez, and Sean Goggins
Factors Impacting Seniors’ Usage of Technology, Mohammad Merhi and Hani Aldirawi
Workshop: Building Collaboration Networks to solve the IT Talent Pipeline Shortage: Where are the Women?, John Michael Muraski, Jakob Iversen, and Kimberly Jean Iversen
Establishing Human Factors Programs to Mitigate Blind Spots in Cybersecurity, Calvin Nobles
Extrinsic Factors Influencing the Effective Use of Security Awareness Guidelines: A Comparative Study between a Bank and a Telecommunications Company, Arnold Nzailu and James Boit
A Conceptual Model of the Role of Relative Advantage, Compatibility and Complexity in Electronic Medical Records Implementation Success, Rangarajan Parthasarathy, Justin Kern, James R. Knight, and David K. Wyant
Does Organizational Innovation Capability Impact Electronic Medical Records Implementation Success?, Rangarajan Parthasarathy, James R. Knight, and David K. Wyant
Scenarios for information and communication technology in sub-Saharan African academic libraries: a research proposal, Shana R. Ponelis
Building Decision Adviser Bots, Daniel Power, Shashidhar Kaparthi, and Arti Mann
Adolescent Girls’ Influencers in Cybersecurity Education and Activities, Pam Rowland and Cherie Bakker Noteboom
Making Course Content Inclusive: Implementing UDL and ADA Best Practices, Amy Rutledge and Shaun Moore
Interactive Visualizations: A Literature Review, Kari Sandouka
Blockchain - A Solution to Age-old Problems: Overview, Case Examples and Research Ideas, Dana Schwartz and Jeff Merhout
Comparison of Data Mining and Mathematical Models for Estimating Fuel Consumption of Passenger Vehicles, Mehmet Sevkli, Aise Zulal Sevkli, and Oslem Cosgun
Developing an Unintentional Information Security Misbehavior Scale (UISMS), Forough Nasirpouri Shadbad and David Biros
Abstract Only: Building Trust in Healthcare IoT, Madhav Sharma and David Biros
Decision Support for Data Virtualization based on Fifteen Critical Success Factors: A Methodology, Marwin Shraideh, Matthias Gottlieb, Isabel uhrmann, Harald Kienegger, Markus Böhm, and Helmut Krcmar
A Review of Information Systems Security Management: An Integrated Framework, Cindy Zhiling Tu, Joni Adkins, and Gary Yu Zhao
How Does the Visualization of Data Change How it is Interpreted?, Alexis VanderWilt and Cherie Bakker Noteboom
Towards Crime Prevention Using Big Data Analytics: A Literature Review with an Explorative Case Study, Andreas Vassilakos, Matthias Gottlieb, and Maurice Dawson
Modular and Collaborative Theorizing: A Move Away from Theoretical Superstars, Jeffrey D. Wall
Exploring Design Patterns as Evaluation Tools in Human Computer Interaction Education, Christine Wania
When Programs Collide - A Panel Discussion on the Competing Interests of Analytics and Security, Jacob Young, David Biros, Ryan Schuetzler, Paul R. Stephens, Tyler J. Smith, Rhonda A. Syler, and Shawn H. Zheng