Abstract Only
Abstract Only: Are Project Narrative Attributes Indicative of Pre-order Campaign Success on Crowdfunding Platforms? – A Text-Mining Approach, Shaolin Pu and Karthik Srinivasan
Abstract Only: Compliance Based Penetration Testing as a Service, Srinivasulu Vuggumudi, Kaushik Ragothaman, and Yong Wang
Abstract Only: Effects of User Experience on Identity Authentication in the Nigerian E-banking Environment, Chinyere Igwe, Foluso Ayeni, and Victor Mbarika
Abstract Only: ICT Usage and Learning Outcomes of Pupils in Primary Schools in Uganda, Ruqqaiya Naluwooza, Ayeni Foluso, Langmia Kehbuma, and Victor Mbarika
Abstract Only: Identifying Factors that Influence Undergraduate Women to Leave (or Remain in) Computer Science Majors, Heather Davis and Deanna House
Abstract Only: Incorporating Blockchain into Undergraduate Cybersecurity Curriculum-Best Practices and Recommendations, Jason Xiong and Dave Kocsis
Abstract Only: Panel on Privacy in the Hyperconnected Digital Age, Gaurav Bansal, Fiona Nah, Matt Adamczyk, Damon Buono, Raman Mehta, and Shivani Srivastava
Abstract Only: The Development of a General Education Privacy and Security Course for Undergraduates, Meghan Lennon, Ben Padgitt, and Jacob Young
Abstract Only: The Truth About Numbers: Subjectivity in the CRISP-DM Process, Natalie Gerhart and Russell Torres
Abstract Only: Utilizing a Virtual Internet Testbed and Private Cloud to Teach Organizational Cloud Integration, Caleb Krieger and Andy Luse
Abstract Only: Virtual IS Conference for HS Students, John Muraski and Jakob Iversen
Articles
Algorithmic Trading and Cryptocurrency- a literature review and key findings, Steve Sorsen and James Schulz
A Preliminary Look at Information Security through a Social Practice Theory Lens, Alaa Nehme and Merrill Warkentin
Diffusion of AI Governance, Langtao Chen, Brenda Eschenbrenner, Fiona Nah, Keng Siau, and Yuzhou Qian
Disclosure On Online Sustainability Platforms and Value Creation for Digital vs. Non-Digital Firms, Xue Ning, Dobin Yim, and Jiban Khuntia
Early Outlook of Public Perception on Covid-19 Booster Shots, Rajesh Godasu and Kruttika Sutrave
Exploration of Security Concerns Related to Personal Devices When Accessing Cloud-Based Electronic Health Records, Gargi Nandy and Deanna House
Exploring the workforce shortage of dermatologists through telehealth as an innovative supply chain and logistics management technological solution., Darrell Norman Burrell
Improving the Effectiveness of Security Controls to Prevent APT Attacks, Srinivasulu Vuggumudi, Yong Wang, Kaushik Ragothaman, Cherie, and Jun Liu
Reinforcement Learning Algorithms and Complexity of Inventory Control, A Review, Aravindh Sekar and David Zeng
Security Warning Messages Research: Past and Future, Dustin Ormond and Jordan Barlow
Smart-Contract Enabled Blockchains for the Control of Supply Chain Order Variance, Corban Allenbrand
Smart-Contract Enabled Blockchains for the Control of Supply Chain Order Variance, Corban Allenbrand
The Information Systems Content Area on the CPA Exam: Does Candidate Age Matter?, Steven Muzatko, Adriana Cordis, and Gaurav Bansal
The Role of Disclosure Specificity in Mitigating Trust Violation After a Data Breach: A Multiple Stakeholder Approach, Zhuoli Axelton and Gaurav Bansal