Follow

Submissions from 2019

PDF

Electronic Evidence and Technology-Assisted Review, Brian Almquist

PDF

Panel Discussion: CIO Panel on Ethical Framework for AI & Big Data, Murali Balakrishnan, Gaurav Bansal, David Cagigal, Raman Mehta, and Todd Thiel

PDF

Abstract Only: Trust Violation and Rebuilding After a Data Breach: Role of Environmental Stewardship and Underlying Motives, Gaurav Bansal and Noah Redfearn

PDF

Work 4.0 and the Identification of Complex Competence Sets, Ronald C. Beckett and Tanvria Daberkow

PDF

How can Health Technology Project Communications be Improved in a Hospital, Andrew Behrens, Cherie Bakker Noteboom, and David Bishop

PDF

What are Healthcare Providers' Perceptions of Health Information Technology Project Training?, Andrew Behrens, Kaushik Ragothaman, David Bishop, and Cherie Bakker Noteboom

PDF

Developing more Women in Managerial Roles in Information Technology and Cybersecurity, Darrell Norman Burrell

PDF

Innovations from Academia around Cybersecurity Workforce and Faculty Development, Darrell Norman Burrell

PDF

Employee Acceptance of Employer Control Over Personal Devices – Research in Progress, Kevin Callies, Cherie Bakker Noteboom, Daniel Talley, and Yong Wang

PDF

The Impact of Analytics in Professional Baseball: How Long Before Performance Improves, Lee Freeman

PDF

Investigating ICTs for Education in Marginalized Communities, Mehruz Kamal and Diksha Diksha

PDF

“Something to talk about” Exploring open source design spaces, Kevin Lumbard, Vinod Kumar Ahuja, Matt Germonprez, and Sean Goggins

PDF

Factors Impacting Seniors’ Usage of Technology, Mohammad Merhi and Hani Aldirawi

PDF

Workshop: Building Collaboration Networks to solve the IT Talent Pipeline Shortage: Where are the Women?, John Michael Muraski, Jakob Iversen, and Kimberly Jean Iversen

PDF

Establishing Human Factors Programs to Mitigate Blind Spots in Cybersecurity, Calvin Nobles

PDF

Extrinsic Factors Influencing the Effective Use of Security Awareness Guidelines: A Comparative Study between a Bank and a Telecommunications Company, Arnold Nzailu and James Boit

PDF

A Conceptual Model of the Role of Relative Advantage, Compatibility and Complexity in Electronic Medical Records Implementation Success, Rangarajan Parthasarathy, Justin Kern, James R. Knight, and David K. Wyant

PDF

Does Organizational Innovation Capability Impact Electronic Medical Records Implementation Success?, Rangarajan Parthasarathy, James R. Knight, and David K. Wyant

PDF

Scenarios for information and communication technology in sub-Saharan African academic libraries: a research proposal, Shana R. Ponelis

PDF

Building Decision Adviser Bots, Daniel Power, Shashidhar Kaparthi, and Arti Mann

PDF

Adolescent Girls’ Influencers in Cybersecurity Education and Activities, Pam Rowland and Cherie Bakker Noteboom

PDF

Making Course Content Inclusive: Implementing UDL and ADA Best Practices, Amy Rutledge and Shaun Moore

PDF

Interactive Visualizations: A Literature Review, Kari Sandouka

PDF

Blockchain - A Solution to Age-old Problems: Overview, Case Examples and Research Ideas, Dana Schwartz and Jeff Merhout

PDF

Comparison of Data Mining and Mathematical Models for Estimating Fuel Consumption of Passenger Vehicles, Mehmet Sevkli, Aise Zulal Sevkli, and Oslem Cosgun

PDF

Developing an Unintentional Information Security Misbehavior Scale (UISMS), Forough Nasirpouri Shadbad and David Biros

PDF

Abstract Only: Building Trust in Healthcare IoT, Madhav Sharma and David Biros

PDF

Decision Support for Data Virtualization based on Fifteen Critical Success Factors: A Methodology, Marwin Shraideh, Matthias Gottlieb, Isabel uhrmann, Harald Kienegger, Markus Böhm, and Helmut Krcmar

PDF

A Review of Information Systems Security Management: An Integrated Framework, Cindy Zhiling Tu, Joni Adkins, and Gary Yu Zhao

PDF

How Does the Visualization of Data Change How it is Interpreted?, Alexis VanderWilt and Cherie Bakker Noteboom

PDF

Towards Crime Prevention Using Big Data Analytics: A Literature Review with an Explorative Case Study, Andreas Vassilakos, Matthias Gottlieb, and Maurice Dawson

PDF

Modular and Collaborative Theorizing: A Move Away from Theoretical Superstars, Jeffrey D. Wall

PDF

Exploring Design Patterns as Evaluation Tools in Human Computer Interaction Education, Christine Wania

PDF

When Programs Collide - A Panel Discussion on the Competing Interests of Analytics and Security, Jacob Young, David Biros, Ryan Schuetzler, Paul R. Stephens, Tyler J. Smith, Rhonda A. Syler, and Shawn H. Zheng