Follow

Submissions from 2018

PDF

A Graphical User Interface for Designing Graph Grammars, Patrick Andrade and Yingfeng Wang

PDF

Abstract Only: MEASUREMENTS OF EDUCATIONAL TECHNOLOGY, Shimelis Assefa and Dawit Demissie

PDF

COMPLETED RESEARCH: PRELIMINARY INSIGHTS INTO THE IMPACT OF DIGITAL PLATFORMS FOR MUSIC, Joseph Budu, Prince Kobby Akakpol, and Richard Boateng

PDF

SOCIAL MEDIA ANALYSIS FOR ORGANIZATIONS: US NORTHEASTERN PUBLIC AND STATE LIBRARIES CASE STUDY, Matthew Collins and Amir Karami

PDF

Social Media and the Supply Chain: Improving Risk Detection, Risk Management, and Disruption Recovery, Scott R. Cox and Kirk Atkinson

PDF

Implementing the Swarm Technique in a Collaborative Learning Environment: Lessons Learned, Phillip Flamm and Paige Rutner

PDF

Understanding how the need for popularity, conscientiousness, and the frequency of messaging affects professionalism in written computer-mediated communication, Pamela S. Galluch

PDF

RELAX, DON'T DO IT: UNDERSTANDING HOW TECHNOLOGY USE AND AWARENESS AFFECT YOUR LIFE ORIENTATION, Pamela Suzanne Galluch and Amanda Billips

PDF

QUANTUM INFORMATION SYSTEMS: HARNESSING INDIVIDUAL AND GROUP ENERGIES, Jennifer E. Gerow, Corey Baham, and James A. Rodger

PDF

THE IMPACT OF ORGANIZATIONAL CONFLICT ON THE SECURITY IMPERATIVE FOR IMPLANTABLE MEDICAL DEVICES: A CASE STUDY APPROACH, Helen B. Hernandez and Steven D. Zink

PDF

UNDERSTANDING THE MOBILE APP MARKETS: DEMAND, SUPPLY, AND VALUE CREATION, Xiaoyun He

PDF

Legal and Security Issues with Bring Your Own Device and Open Source Software, Larry Hollingsworth

PDF

MINING FACEBOOK PAGE FOR BI-PARTISAN ANALYSIS, Mehtab Iqbal and Sushmita Khan

PDF

GTTA 2: AN EXTENSION OF THE GENERAL THEORY OF TECHNOLOGY ADOPTION (GTTA), Adarsh Kumar Kakar and Ashish Kakar

PDF

IS THE TIME RIPE FOR BRANDING OF SOFTWARE PRODUCTS, Adarsh Kumar Kakar and Ashish Kakar

PDF

EXPLORING USER PRIVACY BASED ON HUMAN BEHAVIOR WITH INTERNET OF THINGS DEVICES AT HOME (FORMATIVE RESEARCH), Jeffrey P. Kaleta, Russell Thackston, and Olajide Ojagbule

PDF

Abstract Only: Twitter Sentiment Toward Autism During Autism Awareness Month, Jeffrey P. Kaleta, Jingjing Yin, and Sushmita Khan

PDF

FACILITATING SOCIOECONOMIC DEVELOPMENT THROUGH CLOUD-BASED SERVICES IN MICRO-ENTERPRISES, Mehruz Kamal

PDF

Abstract Only: AVOIDING PROJECT DELAY: OVERCOMING THE APOLLO SYNDROME IN VIRTUAL IS TEAMS, Eric Kisling

PDF

Abstract Only: THE ROLE OF SOCIAL MEDIA PRIVACY CONCERNS IN PREDICTING USERS’ RISK BELIEFS, Alex Koohang and Johnathan Yerby

PDF

Abstract Only: INVESTIGATING THE USE OF TWITTER BY THREE MAJOR U.S. MEDICAL CENTERS, Nima Kordzadeh and Siyu Chen

PDF

THE DISCOVERABILITY OF PASSWORD ENTRY USING VIRTUAL KEYBOARDS IN AN AUGMENTED REALITY WEARABLE: AN INITIAL PROOF OF CONCEPT, Christopher Kreider

PDF

CONSTRUCTING A CONNECTED PROGRAM IN IT/IS: A NON-R1 UNIVERSITY CASE, Xiang Liu and Diane Murphy

PDF

Abstract Only: SHOP, SOCIALIZE, SURF, AND SEARCH EQUALLY FROM EVERYWHERE – REALLY?, Lakshman Mahadevan and Jeffrey P. Kaleta

PDF

SCRUM RETROSPECTIVES: MEASURING AND IMPROVING EFFECTIVENESS, David Marshburn

PDF

Teaching Students Mainframe Skills for the Niche Market: An Exploratory Proposal, Thomas L. Ngo-Ye and Jae Choi

PDF

APPLICATION OF DATA ANALYTICS TECHNIQUES IN ANALYZING CRIMES, Christian Sunday Nwankwo, Majeed Kayode Raji, and Etinosa Sharon Oghogho

PDF

ENGAGING STUDENTS WITH MOBILE APPLICATION IS CONCEPTS THROUGH CREATING VIDEO VIGNETTES, Richelle L. Oakley and Mitchell Church

PDF

THE IMPACT OF ACTIVE LEARNING WITH ADAPTIVE LEARNING SYSTEMS IN GENERAL EDUCATION INFORMATION TECHNOLOGY COURSES, Hyesung Park, Kihyun Kim, and Cindy Robertson

PDF

Abstract Only: WhatsApp for Social Activism in Ethiopia? Research in Progress from US Diplomacy Lab, Devendra Potnis, Dawit Demissie, Jeni Trimmer, and Jamie Cleek

PDF

Three Meta-Phases of a Project, Steven S. Presley, Jeffrey P. Landry, and Jordan Shropshire

PDF

ARE CERTIFIED IOT DEVICES TRUSTWORTHY? A PRELIMINARY INVESTIGATION, Donald A. Privitera and Lei Li

PDF

ONTOLOGICAL SEMANTICS AND ENTERPRISE CONTENT MANAGEMENT IN SYSTEMS DEVELOPMENT, Osama Bassam Rabie and Heinz Roland Weistroffer

PDF

SECURITY AND USER EXPERIENCE: A HOLISTIC MODEL FOR CAPTCHA USABILITY ISSUES, Jayalakshmi Raman, Karthikeyan Umapathy, and Haiyan Huang

PDF

Assessing Students’ Object-Oriented Programming Skills with Java: The “Department-Employee” Project, Tyler T. Redman, Mark G. Terwilliger, John D. Crabtree, and Xihui Zhang

PDF

WEB PROXY LOG TO DEVELOP A REQUIREMENT BASED RESOURCE ALLOCATION FOR WEB TRAFFIC, Md Baitul Al Sadi

PDF

INFORMATION SYSTEMS STRATEGIC LEADERSHIP IN THE LAST DECADE: NEW ADVANCEMENTS AND BLUE OCEAN OPPORTUNITIES, Mazen Shawosh

PDF

TOWARDS A CONSENSUS DEFINITION OF FULL-STACK DEVELOPMENT, Jordan Shropshire, Jeffrey P. Landry, and Steven S. Presley

PDF

CASE STUDY: LESSONS LEARNED WHILE LAYING THE FOUNDATION FOR A HIGH SCHOOL COMPUTER SCIENCE CURRICULUM, Russell Thackston, Chris Kadlec, and Elizabeth Rasnick

PDF

CHARACTERIZING DISEASES AND DISORDERS IN GAY USERS’ TWEETS, Frank Webb, Amir Karami, and Vanessa Kitzie

PDF

BICYCLE SHARING IN CHINA: PAST, PRESENT, AND FUTURE, Naidong Zhao, Xihui Zhang, M. Shane Banks, and Mingke Xiong