Follow

Submissions from 2022

PDF

Abstract Only: THE IMPACT OF CHOICE OVERLOAD ON DECISION DEFERRAL IN CYBERSECURITY, CRISTIAN ALECSE

PDF

Abstract Only: Trails of automated social bots, Zakaria Babutsidze and Dorian Vincileoni

PDF

GENERATIVE ADVERSARIAL NETWORKS IN TUMOR-RELATED RESEARCH: A REVIEW AND AGENDA FOR MOVING FORWARD, Andrew Behrens and Cherie Noteboom

PDF

Potentials of Blockchain Technology for Payroll Systems, Musa Ibrahim Bello and Thomas R. Daniel

PDF

WILL NFTS BE THE BEST DIGITAL ASSET FOR THE METAVERSE?, Rodney Brown Sr., Soo Il Shin, and J.B. (Joo Baek) Kim

PDF

MANAGING CYBER HYGIENE AT A HIGHER EDUCATION INSTITUTION IN THE UNITED STATES, Shetia Butler Lamar

PDF

Abstract Only: An Analysis of Misinformation on Facebook: Causes, Detection, and Mitigation, Shetia Butler Lamar, Carolyn Zidor-Guerrie, and Michelle Kuralt

PDF

A DESIGN DASHBOARD FOR MANAGING GROUNDWATER USE AND SUSTAINING AQUIFER RECHARGE THROUGH VILLAGE-LEVEL INTERVENTIONS, Alexandra Christofalos, Lakshmi Iyer, and Basant Maheshwari

PDF

Abstract Only: Building the Inclusive IS Classroom, Amy Connolly

PDF

ANALYZING THE RELATIONSHIP BETWEEN INTERNATIONAL MUSIC SALES, AUDIO ATTRIBUTES, AND NATIONAL CULTURE, Dale Crowell, Amy B. Woszczynski, and Tridib Bandyopadhyay

PDF

Cybersecurity In Nonprofits: Factors Affecting Security Readiness During Covid-19, Natalia Ermicioi and Michelle Xiang Liu

PDF

Using Machine Learning Techniques to model Encoder/ Decoder Pair for Non-invasive Electroencephalographic Wireless Signal Transmission, Ernst Fanfan, Joe Blankenship, Summit Chakravarty, and Adriane B. Randolph

PDF

Abstract Only: CONTINUITY OF CARE DOCUMENT DEVELOPMENT FOR SUBSTANCE USE DISORDER, Sue Feldman and Benjamin Schooley

PDF

Abstract Only: ASSESSING DECISION MAKERS’ COGNITIVE LOAD FOR A FIRST RESPONDER HEALTH MONITORING SYSTEM, Ann Fruhling and Elizabeth Reisher

PDF

FACILITATING DIVERSE VIRTUAL IT TEAM, Nicolette Gordon

PDF

Teaching Programming Online: An Approach with Attributional Factors and Self-Efficacy, Xiaoyun He

PDF

A DASHBOARD FOR NURSING HOME COVID-19 IMPACT: A DESIGN SCIENCE APPROACH, Lakshmi Iyer, Malik Gopika, Sandi Lane, and Trent Spaulding

PDF

EVALUATING THE USE OF MACHINE LEARNING FOR CYBER SECURITY INTRUSION DETECTION, Mumbi Kairu and Soo Il Shin

PDF

What more can software development learn from Agile manufacturing? A roadmap on the 20th anniversary of the Agile manifesto, Akshay Kakar, Ashish Kakar, Bismita Choudhury, and Adarsh Kumar Kakar

PDF

Have the Agile Values endured? An empirical investigation on the 20th anniversary of the Agile Manifesto (2001), Ashish Kakar, Bismita Choudhury, Akshay Kakar, and Adarsh Kumar Kakar

PDF

Using the Capabilities Framework to Understand Social Impact of ICT Adoption in Microenterprises, Mehruz Kamal

PDF

ACCOUNTS THAT NEVER EXPIRE: AN EXPLORATION INTO PRIVILEGED ACCOUNTS ON WIKIPEDIA, Jonathan Kaufman and Christopher Kreider

PDF

The Effect of Homomorphic Encryption on Voters' Perceptions of Security in Election Systems, Jonathan Kaufman and Michael Lapke

PDF

Effectiveness of Bridging Master Program in Cybersecurity and Industry in US: Program Comparison and Analysis, Shalaka Kulal, Xin Tian, and Zhigang Li

PDF

Abstract Only: POWER AND ETHICS IN THE MOTIVATION AND APPLICATION OF GREEN TECHNOLOGY, Michael Lapke, Shalyn Lapke, Samuel Stone, Anna Kinnunen, and Juha Kauko