Follow

Submissions from 2023

PDF

Abstract Only: Finding the Most Interpretable Topic Modeling Approach, Alex Algarra and Frank Lee

PDF

Exploring the Function and Value of IT Advisory Boards In Higher Education, Brian Bovee

PDF

Abstract Only: Mining App Reviews for Security and Privacy Research, AJ Burns and Clay Posey

PDF

Attractivenss Factors and Implication of Fitness Youtubers to Audiences, Chun Chiu, Gerard Li, and Cheuk Hang Au

PDF

Abstract Only: The Use of Advanced Technologies in Government to Promote the Ethical Growth of People, Michael Cuellar

PDF

Work Tactics in Hybrid Work Environment: A Gender Perspective, Gurpreet Dhillon, Kane Smith, Joti Kaur, and Simran Dhillon

PDF

Examining the Effects of Virtual Work on Cybersecurity Behavior, Amitava Dutta and Pallab Sanyal

PDF

Digital Transformation of Ghana Judicial Sector: An Activity Theory Perspective, Maud Elliot, John Effah, and Richard Boateng

PDF

Abstract Only: Exploring the U.S. Criminal Justice Information Systems as an Artifact through an Unearthing and Examination of Web Objects, Reagan Giles and Atiya Avery

PDF

Transfer Learning For Covid-19 Image Classification Using Lightweight Architectures: A Systematic Review, Rajesh Godasu, David Zeng, and Kruttika Sutrave

PDF

A Literature Review on Privacy and Security in Virtual Reality and Augmented Reality, Yunus Gumbo; Liang Zhao; and Xin Tian, et al.

PDF

Is M-PESA Enabling The Poor Of Kenya To Bank Without A Traditional Bank Account?, Gireesh Gupta

PDF

Value Co-Destruction in IT Service Ecosystem Drivers and Outcomes, Maryam Heidari

PDF

Abstract Only: Determinants Of Gamification Effectiveness: Perspectives Of Affordances And Coping Responses In The Context Of Gamified Erp Training, Asher John, Soomin Park, Yu Zhao, and Dong-Heon Kwak

PDF

Cloud Services for Microenterprise Sustainability: Multi Case Analysis, Mehruz Kamal

PDF

Research in Progress: Anybody Home: Predicting Whether Someone Is Home Based On IOT Network Traffic, Jonatha Kaufman, Christopher Kreider, Kassandra Williams, and Jackson Walker

PDF

The Effect of Homomorphic Encryption on Voter Perceptions of Trust on Election Systems, Jonatha Kaufman and Michael Lapke

PDF

Edge Computing: Applications and Security Features, India Keene and Haiyan Huang

PDF

Abstract Only: Assessing and Controlling Social Desirability Bias in Cyberbullying Research, Dongyeon Kim, Kyungmyung Jang, Jinwoong Lee, and Deborah Knapp

PDF

Abstract Only: Security Burnout and Security Policy Compliance Intention, Sumin Kim

PDF

Abstract Only: Conspiracy Theories: An Exploration of the Linkage between Human Emotions, Characteristics, and Intentions, Shetia Butler Lamar, Lydia Ray, and Florence Wakoko

PDF

Does The NFT Market Interact With Major Financial Markets?, Lixin Liu, Wenzhou Li, Yuming He, and Wu He

PDF

Abstract Only: An Investigation of Computerized Physician Order Entry System Using Activity Theory, Xiaoyan Liu, Mary Jones, and Russell Torres

PDF

Abstract Only: Skill Networks for Career Competitive Advantage, Joseph Mansour, Craig Van Slyke, and Kimberly Taylor

PDF

Assessing Information Security Maturity Levels in ISP Organizations Using COBIT 2019, Phenyo Modisane

PDF

Abstract Only: ISD Virtual Team Project Culture, Solomon Negash

PDF

Willingness to Disclose In Fintech: A Multidimensional Development Theory Perspective, DeJarvis Oliver

PDF

Systematic Literature Review and Research Model to Examine Data Analytics Adoption in Organizational Contexts, Arielle Oneal and Karthikeyan Umapathy

PDF

Abstract Only: Small Business Supply Chain Information Systems: A Review of the Literature on Digitization in the Context of the Covid19 Pandemic, Audrey Osborne and Atiya Avery

PDF

Abstract Only: Improving Organizational Cybersecurity Efforts through the Application of High-Reliability Organizing Concepts, Clay Posey and AJ Burns

PDF

Abstract Only: Robotic Process Automation, Jeannie Pridmore, Joy Godin, Paige Rutner, and Feruzan Irani-Williams

PDF

Abstract Only: Autistic Employees, Cybersecurity, and Diversity: How the three intersect to enhance information security and privacy, Sadaf Salehi Qeshmi, John Batchelor, and Gerald Burch

PDF

A Review of Machine Learning Approaches for Real Estate Valuation, Thomas Root, Troy Strader, and John Huang

PDF

Beyond E-Government: A Framework For E-Democracy, Narcyz Roztocki, Wojciech Strzelczyk, and Heinz Roland Weistroffer

PDF

Employee Motivation Practices In Public Sector Enterprise Systems Implementation, Narcyz Roztocki, Wojciech Strzelczyk, and Heinz Roland Weistroffer

PDF

The Celebrity Factor: Modeling the Impact of Influencer Statements on the Public Perception toward Covid-19 Vaccines, Abhishek Shah and Shweta Shah

PDF

Abstract Only: Improving Health Literacy: Health Knowledge Transfer In Social Media Platforms, Yanyan Shang

PDF

Exploring Service Variety in Hot Crypto-Wallet: A Model of Inflow, Roll & Go, Po-Hsu Shieh, Cheuk Hang Au, and Kris Law

PDF

Abstract Only: Mind the Gap - Discrepancies between Small Business and Service Providers Information Security Expectations, Craig Van Slyke, T. Selwyn Ellis, Kevin Lee Elder, and Joseph Mansour

PDF

Abstract Only: Economic Impact to Overall Stock Market Value From Information Security & Data Breach Events, Joseph Squillace, Zakkary Hozella, and Justice Cappella

PDF

Data Breach Announcements: Evaluating the Content and Timing of Breach Announcements and Their Effect on Firm Value, Paul Viancourt and Brian Walkup

PDF

Identifying tomorrow’s Smart City Privacy Challenges: A Review of Literature, John Wilkerson and James Smith

PDF

How the Public Shaped the Internet: Open-Source Software Development and Implementation through the Years, Vineyard Wolfenbarger and James Smith

PDF

Is IS Different? Exploring Student Choices for Graduate Major Selection, Amy Woszczynski, Amber Fellows, and Tridib Bandyopadhyay

PDF

The Impact of an Information System Curriculum on Actual and Perceived Critical Thinking, Judy Wynekoop and Kazuo Nakatani

PDF

A Review of Gender Research In Information Systems: From Bibliometric Analysis To Future Research Directions, Shimi Zhou and Eleanor Loiacono