Follow

Submissions from 2022

PDF

The Impact of Choice Overload on Decision Deferral in Cybersecurity, Cristian Alecse

PDF

Abstract Only: Trails of automated social bots, Zakaria Babutsidze and Dorian Vincileoni

PDF

GENERATIVE ADVERSARIAL NETWORKS IN TUMOR-RELATED RESEARCH: A REVIEW AND AGENDA FOR MOVING FORWARD, Andrew Behrens and Cherie Noteboom

PDF

Potentials of Blockchain Technology for Payroll Systems, Musa Ibrahim Bello

PDF

WILL NFTS BE THE BEST DIGITAL ASSET FOR THE METAVERSE?, Rodney Brown Sr., Soo Il Shin, and J.B. (Joo Baek) Kim

PDF

MANAGING CYBER HYGIENE AT A HIGHER EDUCATION INSTITUTION IN THE UNITED STATES, Shetia Butler Lamar

PDF

Abstract Only: An Analysis of Misinformation on Facebook: Causes, Detection, and Mitigation, Shetia Butler Lamar, Carolyn Zidor-Guerrie, and Michelle Kuralt

PDF

A DESIGN DASHBOARD FOR MANAGING GROUNDWATER USE AND SUSTAINING AQUIFER RECHARGE THROUGH VILLAGE-LEVEL INTERVENTIONS, Alexandra Christofalos, Lakshmi Iyer, and Basant Maheshwari

PDF

Abstract Only: Building the Inclusive IS Classroom, Amy Connolly

PDF

Cybersecurity In Nonprofits: Factors Affecting Security Readiness During Covid-19, Natalia Ermicioi and Michelle Xiang Liu

PDF

Abstract Only: CONTINUITY OF CARE DOCUMENT DEVELOPMENT FOR SUBSTANCE USE DISORDER, Sue Feldman and Benjamin Schooley

PDF

Abstract Only: ASSESSING DECISION MAKERS’ COGNITIVE LOAD FOR A FIRST RESPONDER HEALTH MONITORING SYSTEM, Ann Fruhling and Elizabeth Reisher

PDF

FACILITATING DIVERSE VIRTUAL IT TEAM, Nicolette Gordon

PDF

Teaching Programming Online: An Approach with Attributional Factors and Self-Efficacy, Xiaoyun He

PDF

A DASHBOARD FOR NURSING HOME COVID-19 IMPACT: A DESIGN SCIENCE APPROACH, Lakshmi Iyer, Malik Gopika, Sandi Lane, and Trent Spaulding

PDF

EVALUATING THE USE OF MACHINE LEARNING FOR CYBER SECURITY INTRUSION DETECTION, Mumbi Kairu and Soo Il Shin

PDF

What more can software development learn from Agile manufacturing? A roadmap on the 20th anniversary of the Agile manifesto, Akshay Kakar, Ashish Kakar, Bismita Choudhury, and Adarsh Kumar Kakar

PDF

Have the Agile Values endured? An empirical investigation on the 20th anniversary of the Agile Manifesto (2001), Ashish Kakar, Bismita Choudhury, Akshay Kakar, and Adarsh Kumar Kakar

PDF

Using the Capabilities Framework to Understand Social Impact of ICT Adoption in Microenterprises, Mehruz Kamal

PDF

The Effect of Homomorphic Encryption on Voters' Perceptions of Security in Election Systems, Jonathan Kaufman and Michael Lapke

PDF

Effectiveness of Bridging Master Program in Cybersecurity and Industry in US: Program Comparison and Analysis, Shalaka Kulal, Xin Tian, and Zhigang Li

PDF

Abstract Only: Superteam Transactions: The Effect of an Intelligent Assistant in Virtual Teams, Denise McWilliams and Adriane Randolph

PDF

Abstract Only: Investigating Factors Related to Faux Pas Posting by Students: Moving Beyond the Big Five, Robert Miller

PDF

Abstract Only: User control and acceptance of recommender systems, Emil Mirzayev and Zakaria Babutsidze

PDF

Abstract Only: Who Can I Trust? Use and Disuse of AI-Based Systems Under Conditions of High and Low Stakes, Bethany Niese and Monica Adya