Follow

Submissions from 2025

PDF

Scrolling Through Contradictions: The Cognitive Impact of Discrepant News Exposure on Social Media, Ghazal Abdolhossein Khani, Corey Baham, and Andy Luse

PDF

Social Media’s Influence on First-Generation College Decisions: “A Systematic Literature Review of Its Effects on College Selection”, Richard Balderrama and Rosymar Hjermstad

PDF

In AI We Trust (or Don't): The Crucial Role of Transparency Over Accuracy in Healthcare, Gaurav Bansal, Vic Matta, and Kevin Diaz-Ordonez

PDF

The Effects of Digital Inking on Retention and Transfer of Knowledge: A Randomized Controlled Trial, Laura Davis, David Taylor, and Joseph Thomas

PDF

Abstract Only: Workshop: Leveraging Digital Twins in Information Systems, Tobias Engel, Gökhan Cenk, Jonas Andersson, and Maurice Dawson

PDF

Rural Native American Student Digital Divide Perceptions, Chad Fenner and Cherie Baker-Noteboom

PDF

Assessing Cybersecurity Awareness: Examining Demographics, Knowledge, and Actionable Practices, Wyatt Held and Joseph Y. Thomas

PDF

Trustworthiness of AI Models: The Example of Supply Chain Transparency, Benjamin Hofmann, Tobias Engel, and Gökhan Cenk

PDF

Towards User Interface Design Guidelines for Effective Human-AI Interaction in Bioacoustics, Benjamin Hou and Olga Perera

PDF

Are Your DevOps Teams Truly in Sync? Exploring the Role of Social Capital and Intra-alignment in DevOps Teams, Roseline Igah, Corey Baham, and Andy Luse

PDF

Abstract Only: Community-Based Strategy Against Health Misinformation, Gideon Mekonnen Jonathan and Foluso Ayeni

PDF

Abstract Only: Workshop: Building AI Applications with Dify.ai: A Hands-On Workshop, Alex Leatherwood and Vic Matta

PDF

Understanding User Emotional Response to Short Videos, Dongtan Li and Ashish Gupta

PDF

Understanding Malicious Insider Computer Abuses – A Test of Situational Action Theory, Han Li, Xin Luo, and Yan Chen

PDF

Using Nested Virtualization to Teach Enterprise Virtualization, Andy Luse and Caleb Krieger

PDF

Human and Bot Interactions in Open Source Discussion Spaces: Case Study of Kubernetes Bots in Issue Forums, Lale Madahali, Nicole B. Damen, Holly K. Rosser, and Kevin Lumbard

PDF

Aircraft Route Demand Forecasting using Temporal Fusion Transformers (TFT), Vatsal Maru, Gaurav Shekhar, and Kade Ponzo

PDF

Abstract Only: Collaborative Writing and Information Systems Curriculum in the Age of AI: Research-in-Progress, Alanah Mitchell

PDF

Abstract Only: Risk Framework for Cybersecurity Incident Response utilizing Large Language Models, Kasey Morland and Deepak Khazanchi

PDF

The Impact of LLMs on the Learning Curve of Social Science Students, Rabih Neouchi, Gaurav Shekhar, and Dharmender Salian

PDF

Soil Moisture Estimation in Precision Agriculture: A Knowledge Distillation Approach, Mohammed Rakib, Vrinda Nagula, and Arunkumar Bagavathi

PDF

Competitions in Online Knowledge Communities: Factors Influencing Team Performance, Armaan Rashid and Naif Almutawa

PDF

Battling the Growth of Cybercrime: A Systematic Literature Review and the Emergence of Fraud-As-A- Service, John Rickgarn and Foluso Ayeni

PDF

IT Governance Framework for the Internet of Medical Things in the Healthcare Industry, Zachary N. Roemer, Emma E. Sundquist, Robert C. Sumerauer, and Jeffrey W. Merhout

PDF

Generating the “Eureka!” Effect by using Entrance and Exit Tickets, Julie Rursch and Andy Luse

PDF

Augmenting Resource Utilization Across Cross Functional Teams using Generative AI, Gaurav Shekhar, Kannan Srikanth, and Karan Karthik

PDF

Development and Implementation of a Real Time AI-Based Part Verification System in Picking Process Using Low- Cost Equipment, Md Khalid Siddiqui, Benjamin Hofmann, and Tobias Engel

PDF

Artificial Intelligence, Bias, and Decision Making: A Review of Major Findings, Sankita Sigdel and Anne Powell

PDF

Modeling Carrots vs. Sticks: An Agent-Based Simulation of Insider Compliance with Information Security Policies, David Sikolia

PDF

Generational Differences and AI in the Classroom, Mary Sumner

PDF

Theoretical Foundations for Predicting Success in Learning Complex Enterprise Systems, Mary Sumner and Wilfred Wu

PDF

Human-Automation Preferences in Security Operations Centers, Jack Tilbury and Stephen Flowerday

PDF

Using Generative Adversarial Network to Improve Knowledge Distillation on Large Language Models: A Design Science Approach, Man Wang and David Zeng

PDF

Developing a Smart City Data Literacy Framework: Strategies for Mitigating Supply Chain Software Risks, John Wilkerson, Marcia Daley, and Paul Brown

PDF

Integrating Information Security into the Porter's Value Chain: A Strategy for Future CISO Success, John Wilkerson, Marcia Daley, and Paul Brown

PDF

Building Trust in AI: Evaluating the Response Effectiveness of Conversational Tools and Their Impact on User Confidence, Shan Xiao, Hailey Nguyen, and Botong Xue

PDF

Cybersecurity Data Governance in Cloud Computing, Hongjiang Xu

PDF

The Stunted Evolution of Whistleblowing Research: A Matter of Artificial Selection, Jacob Young and Sahar Farshadkah

PDF

Comparative Analysis of Applying SMOTE Techniques to Imbalanced Data for Online Instructors’ Performance Prediction, Gary Yu Zhao and Cindy Zhiling Tu