Submissions from 2022
Smart-Contract Enabled Blockchains for the Control of Supply Chain Order Variance, Corban Allenbrand
The Role of Disclosure Specificity in Mitigating Trust Violation After a Data Breach: A Multiple Stakeholder Approach, Zhuoli Axelton and Gaurav Bansal
Panel Proposal: Privacy in the Hyperconnected Digital Age, Gaurav Bansal, Fiona Nah, Matt Adamczyk, Damon Buono, Raman Mehta, and Shivani Srivastava
Exploring the workforce shortage of dermatologists through telehealth as an innovative supply chain and logistics management technological solution., Darrell Norman Burrell
Abstract Only: Diffusion of AI Governance, Langtao Chen, Brenda Eschenbrenner, Fiona Nah, Keng Siau, and Yuzhou Qian
Abstract Only: Identifying Factors that Influence Undergraduate Women to Leave (or Remain in) Computer Science Majors, Heather Davis and Deanna House
Towards a Cybersecurity Testbed for Agricultural Vehicles and Environments, Mark Freyhof, George Grispos, Santosh Pitla, and Cody Stolle
Abstract Only: The Truth About Numbers: Subjectivity in the CRISP-DM Process, Natalie Gerhart and Russell Torres
Early Outlook of Public Perception on Covid-19 Booster Shots, Rajesh Godasu and Kruttika Sutrave
Abstract Only: Effects of User Experience on Identity Authentication in the Nigerian E-banking Environment, Chinyere Igwe, Foluso Ayeni, and Victor Mbarika
Abstract Only: Utilizing a Virtual Internet Testbed and Private Cloud to Teach Organizational Cloud Integration, Caleb Krieger and Andy Luse
Abstract Only: The Development of a General Education Privacy and Security Course for Undergraduates, Meghan Lennon, Ben Padgitt, and Jacob Young
Abstract Only: Virtual IS Conference for HS Students, John Muraski and Jakob Iversen
The Information Systems Content Area on the CPA Exam: Does Candidate Age Matter?, Steven Muzatko, Adriana Cordis, and Gaurav Bansal
Abstract Only: ICT Usage and Learning Outcomes of Pupils in Primary Schools in Uganda, Ruqqaiya Naluwooza, Ayeni Foluso, Langmia Kehbuma, and Victor Mbarika
Exploration of Security Concerns Related to Personal Devices When Accessing Cloud-Based Electronic Health Records, Gargi Nandy and Deanna House
A Preliminary Look at Information Security through a Social Practice Theory Lens, Alaa Nehme and Merrill Warkentin
Disclosure On Online Sustainability Platforms and Value Creation for Digital vs. Non-Digital Firms, Xue Ning, Dobin Yim, and Jiban Khuntia
Security Warning Messages Research: Past and Future, Dustin Ormond and Jordan Barlow
Abstract Only: Are Project Narrative Attributes Indicative of Pre-order Campaign Success on Crowdfunding Platforms? – A Text-Mining Approach, Shaolin Pu and Karthik Srinivasan
Visualizing the Beer Game: The Value of Interactions During Dynamic Decision Making, Kari Sandouka
Reinforcement Learning Algorithms and Complexity of Inventory Control, A Review, Aravindh Sekar and David Zeng
Algorithmic Trading and Cryptocurrency- a literature review and key findings, Steve Sorsen and James Schulz
USING VIRTUAL REALITY IN CONSTRUCTION EDUCATION BY INCORPORATING BIM, Mehdi Torbat Esfahani and Mari Buche
Abstract Only: Compliance Based Penetration Testing as a Service, Srinivasulu Vuggumudi, Kaushik Ragothaman, and Yong Wang