Submissions from 2022
Abstract Only: THE IMPACT OF CHOICE OVERLOAD ON DECISION DEFERRAL IN CYBERSECURITY, CRISTIAN ALECSE
Abstract Only: Trails of automated social bots, Zakaria Babutsidze and Dorian Vincileoni
GENERATIVE ADVERSARIAL NETWORKS IN TUMOR-RELATED RESEARCH: A REVIEW AND AGENDA FOR MOVING FORWARD, Andrew Behrens and Cherie Noteboom
Potentials of Blockchain Technology for Payroll Systems, Musa Ibrahim Bello and Thomas R. Daniel
WILL NFTS BE THE BEST DIGITAL ASSET FOR THE METAVERSE?, Rodney Brown Sr., Soo Il Shin, and J.B. (Joo Baek) Kim
MANAGING CYBER HYGIENE AT A HIGHER EDUCATION INSTITUTION IN THE UNITED STATES, Shetia Butler Lamar
Abstract Only: An Analysis of Misinformation on Facebook: Causes, Detection, and Mitigation, Shetia Butler Lamar, Carolyn Zidor-Guerrie, and Michelle Kuralt
A DESIGN DASHBOARD FOR MANAGING GROUNDWATER USE AND SUSTAINING AQUIFER RECHARGE THROUGH VILLAGE-LEVEL INTERVENTIONS, Alexandra Christofalos, Lakshmi Iyer, and Basant Maheshwari
Abstract Only: Building the Inclusive IS Classroom, Amy Connolly
ANALYZING THE RELATIONSHIP BETWEEN INTERNATIONAL MUSIC SALES, AUDIO ATTRIBUTES, AND NATIONAL CULTURE, Dale Crowell, Amy B. Woszczynski, and Tridib Bandyopadhyay
Cybersecurity In Nonprofits: Factors Affecting Security Readiness During Covid-19, Natalia Ermicioi and Michelle Xiang Liu
Using Machine Learning Techniques to model Encoder/ Decoder Pair for Non-invasive Electroencephalographic Wireless Signal Transmission, Ernst Fanfan, Joe Blankenship, Summit Chakravarty, and Adriane B. Randolph
Abstract Only: CONTINUITY OF CARE DOCUMENT DEVELOPMENT FOR SUBSTANCE USE DISORDER, Sue Feldman and Benjamin Schooley
Abstract Only: ASSESSING DECISION MAKERS’ COGNITIVE LOAD FOR A FIRST RESPONDER HEALTH MONITORING SYSTEM, Ann Fruhling and Elizabeth Reisher
FACILITATING DIVERSE VIRTUAL IT TEAM, Nicolette Gordon
Teaching Programming Online: An Approach with Attributional Factors and Self-Efficacy, Xiaoyun He
A DASHBOARD FOR NURSING HOME COVID-19 IMPACT: A DESIGN SCIENCE APPROACH, Lakshmi Iyer, Malik Gopika, Sandi Lane, and Trent Spaulding
EVALUATING THE USE OF MACHINE LEARNING FOR CYBER SECURITY INTRUSION DETECTION, Mumbi Kairu and Soo Il Shin
What more can software development learn from Agile manufacturing? A roadmap on the 20th anniversary of the Agile manifesto, Akshay Kakar, Ashish Kakar, Bismita Choudhury, and Adarsh Kumar Kakar
Have the Agile Values endured? An empirical investigation on the 20th anniversary of the Agile Manifesto (2001), Ashish Kakar, Bismita Choudhury, Akshay Kakar, and Adarsh Kumar Kakar
Using the Capabilities Framework to Understand Social Impact of ICT Adoption in Microenterprises, Mehruz Kamal
ACCOUNTS THAT NEVER EXPIRE: AN EXPLORATION INTO PRIVILEGED ACCOUNTS ON WIKIPEDIA, Jonathan Kaufman and Christopher Kreider
The Effect of Homomorphic Encryption on Voters' Perceptions of Security in Election Systems, Jonathan Kaufman and Michael Lapke
Effectiveness of Bridging Master Program in Cybersecurity and Industry in US: Program Comparison and Analysis, Shalaka Kulal, Xin Tian, and Zhigang Li
Abstract Only: POWER AND ETHICS IN THE MOTIVATION AND APPLICATION OF GREEN TECHNOLOGY, Michael Lapke, Shalyn Lapke, Samuel Stone, Anna Kinnunen, and Juha Kauko