MWAIS 2024 Proceedings
Submissions from 2024
Bridging Hazard Risk Perception: Enhancing Knowledge in Public Health, Fahmidah Ashraf
Adoption of Generative AI (Gen-AI) In Sub-Saharan Africa: Extension of the UTAUT Model, Foluso Ayeni, Achanyi Ngufor, Esther Gani, and Victor Mbarika
Mitigating AI Obtrusivity and AI Concerns, Gaurav Bansal and Zhuoli Axelton
Exploring the Efficacy of Feature Films in Enhancing IT Security Education for Millennials, Prasad Bingi, Janakiraman Moorthy, Rangarajan Parthasarathy, Xiaoguang Tian, and Sheena Choi
Human Roles in Implementation and Oversight of Artificial Intelligence: Towards a Governance Framework, Ally Britton-Heitz and Jeffrey Merhout
Advancing Digital Media use through Reverse Mentoring: An Exploratory Study of Small Businesses in Emerging Market, Mary Conway Dato-on and Sharmistha Banerjee
Enriching Higher Education: Bridging Borders through International Experiences and ICT Learning, Maurice Dawson, Annamaria Szakonyi, and Damon Walker
Image Classification for Snow Detection to Improve Pedestrian Safety, Ricardo de Deijn and Rajeev Bukralia
Developing a Digital-Ready Mentorship Program to Connect Students with Industry, Danielle Edwards and Alanah Mitchell
Double-edged sword: Navigating AI Opportunities and the Risk of Digital Colonization in Africa, Naome A. Etori, Maurice Dawson, and Maria Gini
Ethical Evaluation of Human-Robot Interaction, Naome A. Etori, Maurice Dawson, and Maria Gini
Role of Human Resource Management in Information Security Compliance Behavior, Sahar Farshadkhah and Stephanie Maynard-Patrick
Increasing Student Success in Entry-Level Programming Courses, Daniel Freburg, Todd Thomas, and Traci Carte
A Business Analytics Experiential Learning Narrative, Robert Garcia
Improving Sustainability through Data Governance, Coleen Griffin
Burnout in the Cybersecurity Profession: A Scoping Review, Vatsla Gupta, Ann Rangarajan, and Calvin Nobles
A Review of Popular Business Intelligence Tools, Yousra Harb, Yanyan Shang, Wael Odat, and Esra'a Abu Zaitoun
A Framework for BLE Device Setup, Benjamin Hofmann and Tobias Engel
Proposing the Theory of Acceptance and Use of Self-driving Vehicles, Yujong Hwang and Esther Hwang
Unravelling Biased Blocking in The Adoption of Payattitude NFC Electronic Payment in Nigeria: An Exploratory Analysis, Roseline Igah and Andy Luse
Transitioning from product to platform-based firm: An empirical investigation, Radhika Jain
Artificial Intelligence Red-Teaming: Requirement Analysis of Competencies and Foundations, Elahe Javadi, Elham Buxton, Shukri Abotteen, and Ashley Strehlow
From Machine Learning to Organizational Learning, Elahe Javadi and Judith Gebauer
Cybersecurity Management Practices in Thai SMEs, Gideon Jonathan and Thanintorn Thamrongthanakit
Augmented Reality Marketing-Impact on Intrinsic Motivation and Optimal User Experiences, Sampath Kumar, Rangarajan Parthasarathy, and Vivek Madupu
Zero Trust: The Development of a Social Engineering Game to Raise Cybersecurity Awareness, Yvonne Murphy and Jacob Young
Exploring the Variability of Human Factors Definitions in Cybersecurity Literature, Calvin Nobles and Darrell Burrell
Insights from Depression Apps User Reviews via Sentiment Analysis and Topic Modelling, Senanu Okuboyejo, Mousumi Munmun, and Steven Walczak
Factors Impacting Interest and Enrollment Intentions of First-Generation Students in Business Analytics Programs, Rangarajan Parthasarathy and Hyeonsik Shin
Artificial Intelligence's Role in Cybersecurity and Global Dynamics, Nethra Shanbhag, Maurice Dawson, and Naome A. Etori
Russia’s Strategies for Leveraging AI Policies and Investments for Global Economic Competitiveness, Annamaria Szakonyi, Harshini Chellasamy, and Maurice Dawson
Text Mining for Effective Classification of Car Problem Severity Levels, Rajesh Timmisetty, Prudhvi Aluri, Dimple Chintala, and Hema Sanaka
Using Scientometrics to Analyze Scholarly Contribution of the MWAIS Conference, Sripriya Vemula, Caleb Krieger, and Andy Luse
Protecting Child Online Data Privacy in the Age of AI: A COPPA Theoretical and Policy Analysis, John Wilkerson and Marcia Dailey