Submissions from 2019
Data and Information Literacy: Achieving Sustainable Development Goals in Africa, Shimelis Assefa and Dawit Demissie
In Their Own Words: The Career Stories of Women Leaders in STEM Professions, Constance Campbell, Feruzan Irani Williams, and Paige Rutner
A Citation Analysis of E-Business Adoption Literature, Liang Chen and Cuong Nguyen
Suspicion in Phishing and Organization Risk, Jonathan Coppola and Deanna House
Privacy Protective Responses on Social Media: A Replication and Extension, John Drake and Eric Kisling
Governance and Management: Understanding with a Systems Imagination, Bernie Farkas and Raymond Papp
Mobile Payment Adoption: An Empirical Review and Opportunities for Future Research, Mark Harris, Amita Chin, and Joseph Beasley
Reducing Misinformation on Social Media Networks, Thomas Hayes and Richelle L. Oakley
Usability Challenges with Insulin Pump Devices in Diabetes Care: What Trainers Observe with First-time Pump Users, Helen Hernandez, Laurie Dringus, Martha Snyder, and Ling Wang
Predicting Patent Value: A Data Mining Approach, Xiaoyun He and Feng Zhang
GTTA3: An Extension of the General Theory of Technology Adoption, Ashish Kakar and Adarsh Kumar Kakar
Insights into the Importance-Performance Paradox of Software Product Attributes, Ashish Kakar and Adarsh Kumar Kakar
Perceived Differences of Trust, Risk, and Privacy in Different Internet Channels, Jeffrey P. Kaleta and Lakshman Mahadevan
ICTs, Capabilities, and Socio-Economic Development - Results and Implications, Mehruz Kamal
An Exploratory Study on the Influences of Website Quality on Actual Purchase and Moderation Effects, Hibah Khalil and Karthikeyan Umapathy
Transitioning from Waterfall to Agile: Shifting Student Thinking and Doing from Milestones to Sprints, Eric Kisling
Hospitals' Adoption and Implementation of Online Physician Review Systems: A Descriptive Analysis, Nima Kordzadeh and Shruti Agrawal
An Exploration of Countermeasures for Augmented Reality Shoulder Surfing Attacks, Christopher Kreider
Revisiting Request for Adminship (RFA) Ten Years Later: How Do User Contributions Relate to Longevity in Wikipedia, Christopher Kreider
A Framework for Cybersecurity Gap Analysis in Higher Education, Christopher Kreider and Mohammad Almalag
A Brief Look into Biometrics and One Use in Higher Education, Lillian Lukyamuzi, Sonny McKenzie, Christopher Parks, and Tiffany Smith
What Constitutes an Effective Instructional Video When Incorporated in Simulation Software Packages, Angela Mattia, Jill D'Aquila, and Daphne Wang
Business Intelligence and Analytics: An Exploration of Academic Interest Compared to Google Search Volume, Angela Mattia, George Gresham, and Arpita Jadav
Botnets: Smart Home User Vulnerabilities and Prevention, Ashley Newsome
The credit risk evaluation models: an application of data mining techniques, Cuong Nguyen
A Tutorial on Using Qlik Analytics Platform for Business Analytics, Richelle L. Oakley
Critical Success Factors in Online Multi-Platform Outpost Marketing Strategies, Richelle L. Oakley and E Mitchell Church
A Comparative Analysis of Facebook and Twitter Bots, Adewale Obadimu, Esther Mead, Samer Al-Khateeb, and Nitin Agarwal
The Perception of Gender in Voice Assistants, Chidera Obinali
Chitchat on the Nile about Using Similarity Measures to Evaluate Biomedical Ontology Records, Osama Rabie
An Application of Data Mining of Mental Health Data, Shaikh Shiam Rahman
Exploring Diabetes and Users' Lifestyle Choices in Digital Spaces to Improve Health Outcomes, George Shaw Jr., Tarun Sharma, and Sthanu Ramakrishnan
The Impact of Employee Organizational Commitment on Compliance with Information Security Policy, Janice Sipior and Danielle Lombardi
Towards a Taxonomy of Information Spillage and Leakage, James Smith, Andy Green, Tyler Pieron, and James Parrish
Relevant Participants' Participation in Systems Development: When is Particitipation Irrelevant?, Josephine Stanley-Brown and Heinz Weistroffer
Aligning Information Systems Security in Higher Educaiton With Industry Needs, Gelareh Towhidi, Jeannie Pridmore, and Brad Prince
Security and Privacy of Electronic Medical Records, Sajina Vinaykumar, Chi Zhang, and Hossain Shahriar
College Student Perceptions of MyProgrammingLab and BlueJ in an Introductory Computing Course, Christine Wania
Taxation of E-Commerce: States' Response to the Case of Wayfair v. South Dakota, Burke T. Ward and Janice Sipior
Data Analytics in Human Resources, Samantha White and Jeannie Pridmore
Google and Facebook Data Retention and Location Tracking through Forensic Cloud Analysis, Elizabeth Williams and Johnathan Yerby
Three Types of IT Use, Jason Williams, Mona Sinha, and Saurabh Gupta
Factors Affecting Student Performance in Intermediate Programming Courses: A Mixed Method Study, Ning Yang and Teagen Nabity