Submissions from 2016
Understanding Deterrence Theory in Security Compliance Behavior: A Quantitative Meta-Analysis Approach, Javad Abed and Heinz Roland Weistroffer
Just Do It! Web 2.0 and the Breaking of the Tacit Dimension for Knowledge Acquisition, Atiya Avery
Office-based Physician EHR Adoption and Use in Southern US States, Shannon Beasley and John Girard
Criminal Court Redundancy Case Study: The Best Defensive is a Good Offense, Jennifer Breese, Johnathan Yerby, and Steven Tkach Jr.
Career Paths of Computing Program Graduates: A LinkedIn Analysis, Thomas Louis Case, Hyo-Joo Han, and Eric Rimes
Cookies, Data Collection and Sharing in Social Media: How Legal is it?, Raymond Collier
The Case for UBUNTU Linux Operating System Performance and Usability for Use in Higher Education in a Virtualized Environment, Maurice Dawson, Brittany DeWalt, and Simon Cleveland
Hospital Technology Integration in South US States, John Girard, Jennifer Breese, and Yingfeng Wang
Understanding Students' Intentions and Motivations to Pursue a Master in Information Systems - A Planned Behavior Approach, Debra Nestadt Hertz and Tridib Bandyopadhyay
An Empirical Investigation of Factors that Improve Employees’ Satisfaction in a Municipality Allowing the Use of BYOD, Efosa C. Idemudia, Kim Troboy, and Loretta F. Cochran
Harnessing the Expended Labor of Active Learning Exercises, Amanda L. Johnson and Shannon Beasley
Investigating Multitasking with Technology in Academic Settings, Mehruz Kamal, Stephen Kevlin, and Yangyan Dong
Transformation at Scale: The Experience of Developing No Cost Learning Material for Database-Related Courses, Lei Li, Svetana Peltsverger, Nancy Colyar, Rebecca Rutherfoord, Guangzhi Zheng, and Zhigang Li
A Look at Online Targeted Advertising in Information Systems Research, Dapeng Liu and Heinz Roland Weistroffer
Site Location Determination Using Geographic Information Systems: The Process and a Case Study, Arina Mardoukhi and Nima Kordzadeh
An M-Health Tool for Improved Self-Care of Heart Failure Patients: An On-Going Field Study, Tala Mirzaei
Health Analytics to Manage Turbulence in Patient Flow: A Field Study of Transitions in Care Processes, Tala Mirzaei
A Process Framework for Managing Cybersecurity Risks in Projects, Steven S. Presley and Jeffrey P. Landry
A Study on Influences of Gender Differences on Social Presence Features, Dishi Shrivastava, Karthikeyan Umapathy, Haiyan Huang, Ching-Hua Chuan, and Lakshmi Goel
Systems Theory: Should Information Researchers Even Care?, Kane J. Smith and Heinz Roland Weistroffer
e-Competency of Practitioners: A Grounded Theory, Jakobus Smit
The Innovation Value Chain and Organizational Culture, Jakobus Smit
Tesla’s Revenge: A 2D Educational Adventure Game for Information Literacy and Student Engagement, Caleb Talmage, Dana R. Casper, Sarah Hollifield, Jamila Brooks, Joshua Holland, Chris Nylund, Anthony Choi, and Myungjae Kwak
Information Systems Implementation Consequences: Ethical Treatment of End Users, Susan A. Vowels
Experimentation with Raw Data Vault Data Warehouse Loading, Connard Williams
Automatic Clustering of Source Code Using Self-Organizing Maps, William Wilson, Jean-Jacques Muteteke, and Lei Li
Assessing an Information Systems Master's Curriculum Program: Revisiting the ACM's MSIS 2006 Model Curriculum, A. James Wynne, Elena Olson, and Chandrashekar Challa
How to Measure IT Effectiveness: The CIO's Perspective, Xihui Zhang, Ali Murad, Adam Risher, and Jordan Simmons