Follow

Submissions from 2016

PDF

Understanding Deterrence Theory in Security Compliance Behavior: A Quantitative Meta-Analysis Approach, Javad Abed and Heinz Roland Weistroffer

PDF

Just Do It! Web 2.0 and the Breaking of the Tacit Dimension for Knowledge Acquisition, Atiya Avery

PDF

Office-based Physician EHR Adoption and Use in Southern US States, Shannon Beasley and John Girard

PDF

Criminal Court Redundancy Case Study: The Best Defensive is a Good Offense, Jennifer Breese, Johnathan Yerby, and Steven Tkach Jr.

PDF

Career Paths of Computing Program Graduates: A LinkedIn Analysis, Thomas Louis Case, Hyo-Joo Han, and Eric Rimes

PDF

Cookies, Data Collection and Sharing in Social Media: How Legal is it?, Raymond Collier

PDF

The Case for UBUNTU Linux Operating System Performance and Usability for Use in Higher Education in a Virtualized Environment, Maurice Dawson, Brittany DeWalt, and Simon Cleveland

PDF

Hospital Technology Integration in South US States, John Girard, Jennifer Breese, and Yingfeng Wang

PDF

Understanding Students' Intentions and Motivations to Pursue a Master in Information Systems - A Planned Behavior Approach, Debra Nestadt Hertz and Tridib Bandyopadhyay

PDF

An Empirical Investigation of Factors that Improve Employees’ Satisfaction in a Municipality Allowing the Use of BYOD, Efosa C. Idemudia, Kim Troboy, and Loretta F. Cochran

PDF

Harnessing the Expended Labor of Active Learning Exercises, Amanda L. Johnson and Shannon Beasley

PDF

Investigating Multitasking with Technology in Academic Settings, Mehruz Kamal, Stephen Kevlin, and Yangyan Dong

PDF

Transformation at Scale: The Experience of Developing No Cost Learning Material for Database-Related Courses, Lei Li, Svetana Peltsverger, Nancy Colyar, Rebecca Rutherfoord, Guangzhi Zheng, and Zhigang Li

PDF

A Look at Online Targeted Advertising in Information Systems Research, Dapeng Liu and Heinz Roland Weistroffer

PDF

Site Location Determination Using Geographic Information Systems: The Process and a Case Study, Arina Mardoukhi and Nima Kordzadeh

PDF

An M-Health Tool for Improved Self-Care of Heart Failure Patients: An On-Going Field Study, Tala Mirzaei

PDF

Health Analytics to Manage Turbulence in Patient Flow: A Field Study of Transitions in Care Processes, Tala Mirzaei

PDF

A Process Framework for Managing Cybersecurity Risks in Projects, Steven S. Presley and Jeffrey P. Landry

PDF

A Study on Influences of Gender Differences on Social Presence Features, Dishi Shrivastava, Karthikeyan Umapathy, Haiyan Huang, Ching-Hua Chuan, and Lakshmi Goel

PDF

Systems Theory: Should Information Researchers Even Care?, Kane J. Smith and Heinz Roland Weistroffer

PDF

e-Competency of Practitioners: A Grounded Theory, Jakobus Smit

PDF

The Innovation Value Chain and Organizational Culture, Jakobus Smit

PDF

Tesla’s Revenge: A 2D Educational Adventure Game for Information Literacy and Student Engagement, Caleb Talmage, Dana R. Casper, Sarah Hollifield, Jamila Brooks, Joshua Holland, Chris Nylund, Anthony Choi, and Myungjae Kwak

PDF

Information Systems Implementation Consequences: Ethical Treatment of End Users, Susan A. Vowels

PDF

Experimentation with Raw Data Vault Data Warehouse Loading, Connard Williams

PDF

Automatic Clustering of Source Code Using Self-Organizing Maps, William Wilson, Jean-Jacques Muteteke, and Lei Li

PDF

Assessing an Information Systems Master's Curriculum Program: Revisiting the ACM's MSIS 2006 Model Curriculum, A. James Wynne, Elena Olson, and Chandrashekar Challa

PDF

How to Measure IT Effectiveness: The CIO's Perspective, Xihui Zhang, Ali Murad, Adam Risher, and Jordan Simmons