Submissions from 2019

PDF

Data and Information Literacy: Achieving Sustainable Development Goals in Africa, Shimelis Assefa and Dawit Demissie

PDF

In Their Own Words: The Career Stories of Women Leaders in STEM Professions, Constance Campbell, Feruzan Irani Williams, and Paige Rutner

PDF

A Citation Analysis of E-Business Adoption Literature, Liang Chen and Cuong Nguyen

PDF

Suspicion in Phishing and Organization Risk, Jonathan Coppola and Deanna House

PDF

Privacy Protective Responses on Social Media: A Replication and Extension, John Drake and Eric Kisling

PDF

Governance and Management: Understanding with a Systems Imagination, Bernie Farkas and Raymond Papp

PDF

Mobile Payment Adoption: An Empirical Review and Opportunities for Future Research, Mark Harris, Amita Chin, and Joseph Beasley

PDF

Reducing Misinformation on Social Media Networks, Thomas Hayes and Richelle L. Oakley

PDF

Usability Challenges with Insulin Pump Devices in Diabetes Care: What Trainers Observe with First-time Pump Users, Helen Hernandez, Laurie Dringus, Martha Snyder, and Ling Wang

PDF

Predicting Patent Value: A Data Mining Approach, Xiaoyun He and Feng Zhang

PDF

GTTA3: An Extension of the General Theory of Technology Adoption, Ashish Kakar and Adarsh Kumar Kakar

PDF

Insights into the Importance-Performance Paradox of Software Product Attributes, Ashish Kakar and Adarsh Kumar Kakar

PDF

Perceived Differences of Trust, Risk, and Privacy in Different Internet Channels, Jeffrey P. Kaleta and Lakshman Mahadevan

PDF

ICTs, Capabilities, and Socio-Economic Development - Results and Implications, Mehruz Kamal

PDF

An Exploratory Study on the Influences of Website Quality on Actual Purchase and Moderation Effects, Hibah Khalil and Karthikeyan Umapathy

PDF

Transitioning from Waterfall to Agile: Shifting Student Thinking and Doing from Milestones to Sprints, Eric Kisling

PDF

Hospitals' Adoption and Implementation of Online Physician Review Systems: A Descriptive Analysis, Nima Kordzadeh and Shruti Agrawal

PDF

An Exploration of Countermeasures for Augmented Reality Shoulder Surfing Attacks, Christopher Kreider

PDF

Revisiting Request for Adminship (RFA) Ten Years Later: How Do User Contributions Relate to Longevity in Wikipedia, Christopher Kreider

PDF

A Framework for Cybersecurity Gap Analysis in Higher Education, Christopher Kreider and Mohammad Almalag

PDF

A Brief Look into Biometrics and One Use in Higher Education, Lillian Lukyamuzi, Sonny McKenzie, Christopher Parks, and Tiffany Smith

PDF

What Constitutes an Effective Instructional Video When Incorporated in Simulation Software Packages, Angela Mattia, Jill D'Aquila, and Daphne Wang

PDF

Business Intelligence and Analytics: An Exploration of Academic Interest Compared to Google Search Volume, Angela Mattia, George Gresham, and Arpita Jadav

PDF

Botnets: Smart Home User Vulnerabilities and Prevention, Ashley Newsome

PDF

The credit risk evaluation models: an application of data mining techniques, Cuong Nguyen

PDF

A Tutorial on Using Qlik Analytics Platform for Business Analytics, Richelle L. Oakley

PDF

Critical Success Factors in Online Multi-Platform Outpost Marketing Strategies, Richelle L. Oakley and E Mitchell Church

PDF

A Comparative Analysis of Facebook and Twitter Bots, Adewale Obadimu, Esther Mead, Samer Al-Khateeb, and Nitin Agarwal

PDF

The Perception of Gender in Voice Assistants, Chidera Obinali

PDF

Chitchat on the Nile about Using Similarity Measures to Evaluate Biomedical Ontology Records, Osama Rabie

PDF

An Application of Data Mining of Mental Health Data, Shaikh Shiam Rahman

PDF

Exploring Diabetes and Users' Lifestyle Choices in Digital Spaces to Improve Health Outcomes, George Shaw Jr., Tarun Sharma, and Sthanu Ramakrishnan

PDF

The Impact of Employee Organizational Commitment on Compliance with Information Security Policy, Janice Sipior and Danielle Lombardi

PDF

Towards a Taxonomy of Information Spillage and Leakage, James Smith, Andy Green, Tyler Pieron, and James Parrish

PDF

Relevant Participants' Participation in Systems Development: When is Particitipation Irrelevant?, Josephine Stanley-Brown and Heinz Weistroffer

PDF

Aligning Information Systems Security in Higher Educaiton With Industry Needs, Gelareh Towhidi, Jeannie Pridmore, and Brad Prince

PDF

Security and Privacy of Electronic Medical Records, Sajina Vinaykumar, Chi Zhang, and Hossain Shahriar

PDF

College Student Perceptions of MyProgrammingLab and BlueJ in an Introductory Computing Course, Christine Wania

PDF

Taxation of E-Commerce: States' Response to the Case of Wayfair v. South Dakota, Burke T. Ward and Janice Sipior

PDF

Data Analytics in Human Resources, Samantha White and Jeannie Pridmore

PDF

Google and Facebook Data Retention and Location Tracking through Forensic Cloud Analysis, Elizabeth Williams and Johnathan Yerby

PDF

Three Types of IT Use, Jason Williams, Mona Sinha, and Saurabh Gupta

PDF

Factors Affecting Student Performance in Intermediate Programming Courses: A Mixed Method Study, Ning Yang and Teagen Nabity