Submissions from 2022
Accelerating Ukrainian Academic Teachers’ Professional Digital Competence in Times of War, Nataliya Berbyuk Lindström, Aleksandre Asatiani, Natalia Kononova, and Liudmyla Grynevych
A Chart-buster YouTuber's Cruise to Stardom: The Role of Social Media Configuration in Digital Branding Strategy, Mekhala Egodawele, Darshana D. Sedera, Banura Sooriyapperuma, and Dilanjan Seneviratne
Achieving Digital Resilience in Crisis: A Resource Orchestration Analysis, Ton Nu Huong Giang Hoang
A Course Architecture for HyFlex Courses in Information Systems, Andreas Drechsler and Cathal Doyle
Addressing Biases in Text Classification, Dieter Gutschi, Margeret Hall, Christian Haas, and Patricia Klarner
A Framework for the Blockchain Ecosystem for Smart Tourism, Aaron M. French
Agile Leadership Competencies, Lise Tordrup and Anne Engholm
AI Embedded Social Media and its Influence on Retail Traders, Alexis Gonzalez and Dorothy E. Leidner
AI meets Design Science - Towards Design Methods for AI Systems Development, Sabine Janzen, Hannah Stein, Nurten Oeksuez-Koester, and Wolfgang Maass
An Artificial Intelligence-Based Framework for Autonomous Big Data Analytics: A Reinforcement Learning Approach, Yuzhang Han, Minoo Mondaresnezhad, and Hamid R. Nemati
A New Typology of Gamers: Based on Microtransaction Preference, Personality, and Gaming Motivation, Sunghan Ryu
Architecture for Digital Transformation Toward IS Leadership: With Case Studies in Global Companies and Ecosystem Society, Yoshimasa YM Masuda, Stéphane Gagnon, ALFRED ZIMMERMANN, and Rashmi Jain
Are Bug Bounty Programs Equally Beneficial to All Companies? An Empirical Analysis of Cybersecurity and Crowdsourcing, Shuhua Wu, Aleksi Aaltonen, and Jason B. Thatcher
Are we making Google stupid?, Hani Safadi
Artificial Intelligence in Telemedicine: Making Practice a Little Closer to Perfect?, Nicolette Gordon
A Taxonomical Approach to Classify Cryptocurrencies, Ace Vo and Miloslava Plachkinova
A Training Platform to Enhance Offshore Safety Based on Fuzzy Cognitive Map, Antonie Jetter, Ahmed Alibage, Peter Liang, Payam Aminpour, and Steven Gray
Augmented Scholar: Opportunities and Threats (Not Only) for IS Scholars, Tomasz Marcin Mucha and Timo Seppala
Automation, Augmentation, and Activation Process: A Process behind the Emergence of Successful ML-based Business Solutions, Kaveh Abhari, Tomasz Marcin Mucha, and Sijia Ma
Autonomous Driving: How to Influence User Acceptance of Self-Driving Cars - An Ontology-based Sentiment Analysis of Online Posts, Herbert Endres, Jasmin Köbler, and Michael Bortlik
Big Tech's Dark Side: Killer Apps, Abs, and Acqs, Sherry L. Fowler
Building a Cross Disciplinary Cybersecurity Program in the IS Department, Arun Aryal
Building telemedicine supply chains for disaster recovery, Uzma Raja, Rafay Ishfaq, and Michael Lamb
Can WEKA be Used to Develop a Decision Support Model for Economic Growth and Inflation?, Zahid B. Zamir
Case Writing Project-based Teaching in Information Systems Courses: For Addressing Emerging Topics and Issues, Sunghan Ryu
Collaborative Robots and Gender Inequality in Manufacturing Industry, Xinyu Fu, Narayan Ramasubbu, and Dennis Galletta
Commercializing Deep Tech: How to Navigate the Technology-first Approach When Markets are Unknown, Stefan Raff and Marin Jovanovic
Concepts and consequences of IT affordance in healthcare: A literature review, Malgorzata Kolotylo-Kulkarni, Weidong Xia, and Haoran Zheng
Conducting Online Studies in Conceptual Modeling Research: Benefits and Challenges, Kristina Rosenthal and Stefan Strecker
Creating a Workplace that Embraces Neurodiversity, Ronnie Jia and Heather H. Jia
Critical Systems Management: Information Standardization and Society, Natalia Kapralova
Crowdfunding: Differences for Social versus Commercial Digital Campaigns, Herbert Endres and Fabian Bechtold
Cybersecurity Threats and Responses for SMEs, SHILPA BALAN and Joseph Otto
Dark side of the Internet: studying online human trafficking, Smriti Srivastava and Gurpreet Dhillon
Data brokers, can I have my virtual self back, please? Using the right to data deletion to prompt protective privacy behaviors, Nicholas J. Brown
Data Work in the Digital Age. Reporting Practices and Coping Strategies in the Frontline, Mette Strange Noesgaard, Kasper Elmholdt, and Jeppe Agger Nielsen
Designing Algorithms for Circular Business: Are We On The Right Track?, Eric van Heck
Desperately Seeking IT Support Measures: In Search of Apt Measures to Operationalize IT Support in the Conduct of Contemporary IT Research, Gerard De Leoz
Digital onboarding - an integrated conceptualization, Joëlle Simonet, Martina Becker, Sabrina Schell, and Nikolaus Obwegeser
Digital Options Generators – The Case of Corporate Venture Builders, Ferdinand Mittermeier
Digital Platform Strategy – A Critical Review, Stanislav Mamonov
Does board gender diversity matter in IT investment?, Yen-Yao Wang, Sidi Zhao, and Pei Xu
Domain expertise afore and beyond KDD in data preparation projects. Developing field protocols, Sana Skandrani and Muhammad Murtaza Ali
Ethics-aware Recommender Systems for Social Media, Khadija Ali Vakeel and Joseph Sebastian
Evaluation of Design Science Research Artifacts: A Systematic Literature Review, Miloslava Plachkinova and Ace Vo
Examining Cognitive Load and Information Systems Security Compliance, Derrick Ganye and Kane Smith
Examining Control Balance & Information Security Policy Violations, Kane J. Smith
Examining the Impact of Information-Gap on News Reading in Social Media, Arjun Kadian, Dezhi (Denny) Yin, and Logan Steele