Submissions from 2018
A Graphical User Interface for Designing Graph Grammars, Patrick Andrade and Yingfeng Wang
Abstract Only: MEASUREMENTS OF EDUCATIONAL TECHNOLOGY, Shimelis Assefa and Dawit Demissie
COMPLETED RESEARCH: PRELIMINARY INSIGHTS INTO THE IMPACT OF DIGITAL PLATFORMS FOR MUSIC, Joseph Budu, Prince Kobby Akakpol, and Richard Boateng
SOCIAL MEDIA ANALYSIS FOR ORGANIZATIONS: US NORTHEASTERN PUBLIC AND STATE LIBRARIES CASE STUDY, Matthew Collins and Amir Karami
Social Media and the Supply Chain: Improving Risk Detection, Risk Management, and Disruption Recovery, Scott R. Cox and Kirk Atkinson
Implementing the Swarm Technique in a Collaborative Learning Environment: Lessons Learned, Phillip Flamm and Paige Rutner
Understanding how the need for popularity, conscientiousness, and the frequency of messaging affects professionalism in written computer-mediated communication, Pamela S. Galluch
RELAX, DON'T DO IT: UNDERSTANDING HOW TECHNOLOGY USE AND AWARENESS AFFECT YOUR LIFE ORIENTATION, Pamela Suzanne Galluch and Amanda Billips
QUANTUM INFORMATION SYSTEMS: HARNESSING INDIVIDUAL AND GROUP ENERGIES, Jennifer E. Gerow, Corey Baham, and James A. Rodger
THE IMPACT OF ORGANIZATIONAL CONFLICT ON THE SECURITY IMPERATIVE FOR IMPLANTABLE MEDICAL DEVICES: A CASE STUDY APPROACH, Helen B. Hernandez and Steven D. Zink
UNDERSTANDING THE MOBILE APP MARKETS: DEMAND, SUPPLY, AND VALUE CREATION, Xiaoyun He
Legal and Security Issues with Bring Your Own Device and Open Source Software, Larry Hollingsworth
MINING FACEBOOK PAGE FOR BI-PARTISAN ANALYSIS, Mehtab Iqbal and Sushmita Khan
GTTA 2: AN EXTENSION OF THE GENERAL THEORY OF TECHNOLOGY ADOPTION (GTTA), Adarsh Kumar Kakar and Ashish Kakar
IS THE TIME RIPE FOR BRANDING OF SOFTWARE PRODUCTS, Adarsh Kumar Kakar and Ashish Kakar
EXPLORING USER PRIVACY BASED ON HUMAN BEHAVIOR WITH INTERNET OF THINGS DEVICES AT HOME (FORMATIVE RESEARCH), Jeffrey P. Kaleta, Russell Thackston, and Olajide Ojagbule
Abstract Only: Twitter Sentiment Toward Autism During Autism Awareness Month, Jeffrey P. Kaleta, Jingjing Yin, and Sushmita Khan
FACILITATING SOCIOECONOMIC DEVELOPMENT THROUGH CLOUD-BASED SERVICES IN MICRO-ENTERPRISES, Mehruz Kamal
Abstract Only: AVOIDING PROJECT DELAY: OVERCOMING THE APOLLO SYNDROME IN VIRTUAL IS TEAMS, Eric Kisling
Abstract Only: THE ROLE OF SOCIAL MEDIA PRIVACY CONCERNS IN PREDICTING USERS’ RISK BELIEFS, Alex Koohang and Johnathan Yerby
Abstract Only: INVESTIGATING THE USE OF TWITTER BY THREE MAJOR U.S. MEDICAL CENTERS, Nima Kordzadeh and Siyu Chen
THE DISCOVERABILITY OF PASSWORD ENTRY USING VIRTUAL KEYBOARDS IN AN AUGMENTED REALITY WEARABLE: AN INITIAL PROOF OF CONCEPT, Christopher Kreider
CONSTRUCTING A CONNECTED PROGRAM IN IT/IS: A NON-R1 UNIVERSITY CASE, Xiang Liu and Diane Murphy
Abstract Only: SHOP, SOCIALIZE, SURF, AND SEARCH EQUALLY FROM EVERYWHERE – REALLY?, Lakshman Mahadevan and Jeffrey P. Kaleta
SCRUM RETROSPECTIVES: MEASURING AND IMPROVING EFFECTIVENESS, David Marshburn
Teaching Students Mainframe Skills for the Niche Market: An Exploratory Proposal, Thomas L. Ngo-Ye and Jae Choi
APPLICATION OF DATA ANALYTICS TECHNIQUES IN ANALYZING CRIMES, Christian Sunday Nwankwo, Majeed Kayode Raji, and Etinosa Sharon Oghogho
ENGAGING STUDENTS WITH MOBILE APPLICATION IS CONCEPTS THROUGH CREATING VIDEO VIGNETTES, Richelle L. Oakley and Mitchell Church
THE IMPACT OF ACTIVE LEARNING WITH ADAPTIVE LEARNING SYSTEMS IN GENERAL EDUCATION INFORMATION TECHNOLOGY COURSES, Hyesung Park, Kihyun Kim, and Cindy Robertson
Abstract Only: WhatsApp for Social Activism in Ethiopia? Research in Progress from US Diplomacy Lab, Devendra Potnis, Dawit Demissie, Jeni Trimmer, and Jamie Cleek
Three Meta-Phases of a Project, Steven S. Presley, Jeffrey P. Landry, and Jordan Shropshire
ARE CERTIFIED IOT DEVICES TRUSTWORTHY? A PRELIMINARY INVESTIGATION, Donald A. Privitera and Lei Li
ONTOLOGICAL SEMANTICS AND ENTERPRISE CONTENT MANAGEMENT IN SYSTEMS DEVELOPMENT, Osama Bassam Rabie and Heinz Roland Weistroffer
SECURITY AND USER EXPERIENCE: A HOLISTIC MODEL FOR CAPTCHA USABILITY ISSUES, Jayalakshmi Raman, Karthikeyan Umapathy, and Haiyan Huang
Assessing Students’ Object-Oriented Programming Skills with Java: The “Department-Employee” Project, Tyler T. Redman, Mark G. Terwilliger, John D. Crabtree, and Xihui Zhang
WEB PROXY LOG TO DEVELOP A REQUIREMENT BASED RESOURCE ALLOCATION FOR WEB TRAFFIC, Md Baitul Al Sadi
INFORMATION SYSTEMS STRATEGIC LEADERSHIP IN THE LAST DECADE: NEW ADVANCEMENTS AND BLUE OCEAN OPPORTUNITIES, Mazen Shawosh
TOWARDS A CONSENSUS DEFINITION OF FULL-STACK DEVELOPMENT, Jordan Shropshire, Jeffrey P. Landry, and Steven S. Presley
CASE STUDY: LESSONS LEARNED WHILE LAYING THE FOUNDATION FOR A HIGH SCHOOL COMPUTER SCIENCE CURRICULUM, Russell Thackston, Chris Kadlec, and Elizabeth Rasnick
CHARACTERIZING DISEASES AND DISORDERS IN GAY USERS’ TWEETS, Frank Webb, Amir Karami, and Vanessa Kitzie
BICYCLE SHARING IN CHINA: PAST, PRESENT, AND FUTURE, Naidong Zhao, Xihui Zhang, M. Shane Banks, and Mingke Xiong