MWAIS 2024 Proceedings

MWAIS 2024 Proceedings

 
The 19th Annual MWAIS Conference was held in person on May 16 & 17, 2024, in Peoria, Illinois. Sponsored by the AIS MWAIS chapter, the conference was hosted by Bradley University's Foster College of Business and Center for Cybersecurity. The MWAIS conference included completed research papers, research-in-progress papers, extended abstracts, panels, and workshops. MWAIS 2024 provided opportunities for faculty and students to have stimulating conversations in emerging and current areas of IS research. The MWAIS 2024 proceedings from the Conference are hosted here in the eLibrary (see below). MWAIS 2024 Conference Committee: Chair - Jacob Young, Bradley University; Program Co-Chairs - Angelica Fanti, Bradley University, Tyler Smith, Bradley University; Track Chairs - Sahar Farshadkhah, University of Illinois Springfield, Rangarajan Parthasarathy, University of Wisconsin-Green Bay, Shawn Zheng, Bradley University

Follow

Submissions from 2024

PDF

Bridging Hazard Risk Perception: Enhancing Knowledge in Public Health, Fahmidah Ashraf

PDF

Adoption of Generative AI (Gen-AI) In Sub-Saharan Africa: Extension of the UTAUT Model, Foluso Ayeni, Achanyi Ngufor, Esther Gani, and Victor Mbarika

PDF

Mitigating AI Obtrusivity and AI Concerns, Gaurav Bansal and Zhuoli Axelton

PDF

Exploring the Efficacy of Feature Films in Enhancing IT Security Education for Millennials, Prasad Bingi, Janakiraman Moorthy, Rangarajan Parthasarathy, Xiaoguang Tian, and Sheena Choi

PDF

Human Roles in Implementation and Oversight of Artificial Intelligence: Towards a Governance Framework, Ally Britton-Heitz and Jeffrey Merhout

PDF

Advancing Digital Media use through Reverse Mentoring: An Exploratory Study of Small Businesses in Emerging Market, Mary Conway Dato-on and Sharmistha Banerjee

PDF

Enriching Higher Education: Bridging Borders through International Experiences and ICT Learning, Maurice Dawson, Annamaria Szakonyi, and Damon Walker

PDF

Image Classification for Snow Detection to Improve Pedestrian Safety, Ricardo de Deijn and Rajeev Bukralia

PDF

Developing a Digital-Ready Mentorship Program to Connect Students with Industry, Danielle Edwards and Alanah Mitchell

PDF

Double-edged sword: Navigating AI Opportunities and the Risk of Digital Colonization in Africa, Naome A. Etori, Maurice Dawson, and Maria Gini

PDF

Ethical Evaluation of Human-Robot Interaction, Naome A. Etori, Maurice Dawson, and Maria Gini

PDF

Role of Human Resource Management in Information Security Compliance Behavior, Sahar Farshadkhah and Stephanie Maynard-Patrick

PDF

Increasing Student Success in Entry-Level Programming Courses, Daniel Freburg, Todd Thomas, and Traci Carte

PDF

A Business Analytics Experiential Learning Narrative, Robert Garcia

PDF

Improving Sustainability through Data Governance, Coleen Griffin

PDF

Burnout in the Cybersecurity Profession: A Scoping Review, Vatsla Gupta, Ann Rangarajan, and Calvin Nobles

PDF

A Review of Popular Business Intelligence Tools, Yousra Harb, Yanyan Shang, Wael Odat, and Esra'a Abu Zaitoun

PDF

A Framework for BLE Device Setup, Benjamin Hofmann and Tobias Engel

PDF

Proposing the Theory of Acceptance and Use of Self-driving Vehicles, Yujong Hwang and Esther Hwang

PDF

Unravelling Biased Blocking in The Adoption of Payattitude NFC Electronic Payment in Nigeria: An Exploratory Analysis, Roseline Igah and Andy Luse

PDF

Transitioning from product to platform-based firm: An empirical investigation, Radhika Jain

PDF

Artificial Intelligence Red-Teaming: Requirement Analysis of Competencies and Foundations, Elahe Javadi, Elham Buxton, Shukri Abotteen, and Ashley Strehlow

PDF

From Machine Learning to Organizational Learning, Elahe Javadi and Judith Gebauer

PDF

Cybersecurity Management Practices in Thai SMEs, Gideon Jonathan and Thanintorn Thamrongthanakit

PDF

Augmented Reality Marketing-Impact on Intrinsic Motivation and Optimal User Experiences, Sampath Kumar, Rangarajan Parthasarathy, and Vivek Madupu

PDF

Zero Trust: The Development of a Social Engineering Game to Raise Cybersecurity Awareness, Yvonne Murphy and Jacob Young

PDF

Exploring the Variability of Human Factors Definitions in Cybersecurity Literature, Calvin Nobles and Darrell Burrell

PDF

Insights from Depression Apps User Reviews via Sentiment Analysis and Topic Modelling, Senanu Okuboyejo, Mousumi Munmun, and Steven Walczak

PDF

Factors Impacting Interest and Enrollment Intentions of First-Generation Students in Business Analytics Programs, Rangarajan Parthasarathy and Hyeonsik Shin

PDF

Artificial Intelligence's Role in Cybersecurity and Global Dynamics, Nethra Shanbhag, Maurice Dawson, and Naome A. Etori

PDF

Russia’s Strategies for Leveraging AI Policies and Investments for Global Economic Competitiveness, Annamaria Szakonyi, Harshini Chellasamy, and Maurice Dawson

PDF

Text Mining for Effective Classification of Car Problem Severity Levels, Rajesh Timmisetty, Prudhvi Aluri, Dimple Chintala, and Hema Sanaka

PDF

Using Scientometrics to Analyze Scholarly Contribution of the MWAIS Conference, Sripriya Vemula, Caleb Krieger, and Andy Luse

PDF

Protecting Child Online Data Privacy in the Age of AI: A COPPA Theoretical and Policy Analysis, John Wilkerson and Marcia Dailey