Content Posted in 2024
2021 Academic Hall of Fame Celebrating Ruth Habeger and Honoring Dr. Zeno Van Erdewyk, Ruth Habeger
ABCD: A Risk Management Framework for SCADA Systems, Thuy Lam
Academic Achievement among NCAA Division 2 Student-Athletes and Non-Athletes, Shane D. Scholten, Holden Thomas Daum, and Luke Thomas Daum
Academic Hall of Fame Flyer, Vicki Sterling
Academic Hall of Fame Program, Vicki Sterling
Access Control for IoT: A Survey of Existing Research, Dynamic Policies and Future Directions, Yong Wang, Kaushik Ragothaman, Bhaskar P. Rimal Dr., and Mark Lawrence
A comparative analysis of anti-vax discourse on twitter before and after COVID-19 onset, Tareq Nasralah, Ahmed Elnoshokaty, Omar F. El-Gayar, Mohammad Al-Ramahi, and Abdullah Wahbeh
A Comparative Analysis of the Interpretability of LDA and LLM for Topic Modeling: The Case of Healthcare Apps, Omar El-Gayar, Mohammad Al-Ramahi, Abdullah Wahbeh, Tareq Nasralah, and Ahmed Elnoshokaty
A Comprehensive Evaluation of Electronic Medical Record System Implementation in Saudi Arabia, Jun Liu, Cherie Noteboom, and Hassan Alyami
A Comprehensive Framework Empowering Organizations to Effectively Minimize the Risk of Big Data De-anonymization Attack, Olufemi A. Asabi
A Cross-Architecture Framework for Anti-Debugging Techniques, Austin Norby
A Design Theory for Intelligent Clinical Decision Support, Andrew Behrens, Jun Liu, and Cherie Noteboom
Adverse Health Effects of Kratom: An Analysis of Social Media Data, Abdullah Wahbeh, Tareq Nasralah, Omar El-Gayar, Mohammad Al-Ramahi, and Ahmed El Noshokaty
A Dynamic Analysis Security Testing Infrastructure for Internet of Things, Yong Wang, Elliot Kjerstad, and Bailey Belisario
A framework for developing a domain specific business intelligence maturity model: Application to healthcare, Patti Brooks, Omar F. El-Gayar, and Surendra Sarnikar
A Framework for Examining the Human Side of Anti-Forensic Measures, Yong Wang, Jason Nikolai, and Raj Kumar Nepali
A Framework towards an efficient solution for the transportation of University of Bahrain Students, Youssef Harrath Dr.
A GAMIFICATION TECHNIQUE TO INCREASE ENGAGEMENT IN ASYNCHRONOUS ONLINE DISCUSSIONS, Brian Bovee, Thomas Jernejcic, and Omar F. El-Gayar
AI Capability and Supply Chain Performance: A Systematic Literature Review, Lordt Becklines and Omar F. El-Gayar
A Knowledge Extraction Approach for IT Tech-support Transcripts, Gary Yu Zhao, Omar El-Gayar, and Cindy Zhiling Tu
Alert Prioritization and Strengthening: Towards an Industry Standard Priority Scoring System for IDS Analysts Using Open Source Tools and Models of Machine Learning, Austin O'Brien, Bikram Dangi, Jeremy Gamet, Arica Kulm, T.J. Nelson, and Wayne E. Pauli
A Model of Authentication for Augmented and Virtual Realities, Christopher Kreider
An Agent-Based Approach for Sourcing Business Rules in Supply Chain Management, Jun Liu and Sudha Ram
An Algorithm Based on Priority Rules for Solving a Multi-drone Routing Problem in Hazardous Waste Collection, Youssef Harrath Dr. and Jihene Kaabi Dr.
An Automated Virtual Security Testing Platform for Android Mobile Apps, Yong Wang
A Neuropsychological Approach for Investigating Behavioral Beliefs Using Facial Expression Emoticons, Insu Park, Tamandia Matofam, and Jun Liu
A New Perspective on Semantics of Data Provenance, Sudha Ram and Jun Liu
An Inventory of Privacy Curricula Offerings in Higher Education, Dustin Steinhagen, Chase Lucas, Mary Francis, Mark Lawrence, and Kevin Streff
An LSTM Based Approach for the Classification of Customer Reviews: An Exploratory Study, Jun Liu, Akhilesh Chauhan, and Piyush Vyas
An NLP-Based Knowledge Extraction Approach for IT Tech-Support/Helpdesk Transcripts, Gary Yu Zhao
An Overview of Identity Relationship Management in the Internet of Things, Yong Wang and Mohammad Muntasir Nur
Ant Colony-based Approach for solving an Unmanned Aerial Vehicle Routing Problem, Youssef Harrath Dr. and Jihene Kaabi Dr.
Artificial Intelligence Usage and Data Privacy Discoveries within mHealth, Jennifer Schulte
A Semantic Foundation for Provenance Management, Sudha Ram and Jun Liu
A Semiotics Framework for Analyzing Data Provenance Research, Jun Liu and Sudha Ram
Assessing Security Flaws in Modern Precision Farming Systems, Joseph Boyd and Robert Richardson
Assessing Security Vulnerabilities in Wireless IoT Devices, John Brumels
Assessing Varied Instructional Approaches in the Instruction of Online Graduate Students, Mary Francis
Assessment of Wax Worms (Galleria mellonella) as a Suitable Alternative Host to Study the Virulence of the Marine Pathogen Vibrio coralliilyticus, Vaille Swenson, Darrell Artz, Alexy Jakowicz, Timothy Cramer, Trever Listman, Michael Gaylor, Blake Ushijima, and Patrick Videau
A Streaming Intrusion Monitoring and Classification System for IaaS Cloud, Yong Wang and Jason Nikolai
A Study of IT Security Policies, Hassan Alyami, James Boit, and Omar F. El-Gayar
A Systematic Mapping Study of Access Control in the Internet of Things, Yong Wang and Kaushik Ragothaman
Automated Dynamic Policy Generation for Access Control in the Internet of Things, Kaushik Nagarajan Muthusamy Ragothaman
Automated Post-Breach Penetration Testing through Reinforcement Learning, Austin O'Brien, Sujita Chaudhary, and Shengjie Xu
Beyond party: ideological convictions and foreign policy conflicts in the US congress, William Bendix and Gyung-Ho Jeong
Bring Your Own Device Security Issues and Challenges, Yong Wang, Karthik Vangury, and Jinpeng Wei
BYOD security issues: a systematic literature review, Melva Ratchford, Yong Wang, Cherie Noteboom, and Omar F. El-Gayar
CARVE: A Scientific Method-Based Threat Hunting Hypothesis Development Model, Yong Wang and Kevin Wafula
CEO’s Communication Styles and their Effect on Organizational Performance, Ronghua Shan, Yong Wang, Jun Liu, and Giridhar Reddy Bojja
CHDA CERTIFICATION EXAM SUCCESS FACTORS, Renae Spohn, William Schweinle III, Patti Berg-Poppe, Carole South-Winter, and David DeJong
Classifying facts and opinions in Twitter messages: a deep learning-basedapproach, Ronghua Shan, Swayambhu P. Chatterjee, Shuyuan Deng, Jun Liu, and Wu Jiao
Comprehensive Framework for the Design of Diabetes Registries, Hassan Alyami and Omar F. El-Gayar
Credibility Analysis of Customer Reviews on Amazon: A Design Science Approach, Jun Liu and Piyush Vyas
Critical Success Factors for BI Systems Implementation and Delivery: A Systematic Literature Review, Badr Harfoush, Omar F. El-Gayar, and Noura Mansoura
Dark Side of GenAI: A Blackbox Analysis of X, Ahmed Elnoshokaty, Tareq Nasralah, Omar F. El-Gayar, Mohammad Al-Ramahi, and Abdullah Wahbeh
Data integration with diverse data: aerospace industry insights from a systematic literature review, Cherie Noteboom and Olga Perera
Deconstructing Compulsory Realpolitik in Cultural Studies: An Interview with Alexa Alice Joubin, David Kenley and William Sewell
Deep Neural Network at Edge: An Exploration of Hyper Parameter Tuning on Plant Seedling Dataset, Ali Y. Shaheen and Omar El-Gayar
Defending the security of the mind: A mail survey of thought-reform literacy in South Dakota, Dustin Rozario Steinhagen
Design of an Intelligent Patient Decision aid Based on Individual Decision-Making Styles and Information Need Preferences, Cherie Noteboom, Sergey Motorny, and Surendra Sarnikar
Design of a Virtual Cybersecurity Escape Room, Tania Williams and Omar F. El-Gayar
Detecting malicious short URLs on Twitter, Raj Kumar Nepali, Yong Wang, and Yazan Alshboul
Detection of Prostate Cancer Using Machine Learning Techniques: An Exploratory Study, Laxmi Manasa Gorugantu, Omar El-Gayar, and Nevine Nawar
Developing A Privacy Research Lab: Activities And Impact Of Prilab, Mary Francis and Dustin Steinhagen
Digital Divide in Rural Native American Homes: A Student Perspective, Chad R. Fenner, Cherie Noteboom, and Omar El-Gayar
Disaster Experience and Hospital Information Systems: An Examination of Perceived Information Assurance, Risk, Resilience, and HIS Usefulness, Insu Park, Raj Sharman, and H.Raghav Rao
Disentangling the effects of efficacy-facilitating informational support on health resilience in online health communities based on phrase-level text analysis, Insu Park, Surendra Sarnikar, and Jeewon Cho
Do AI-Generated Political Advertisements Create Positive or Negative Responses from Voters?, Grace Schofield
Does Information Systems Support forCreativity Enhance Effective Information Systems Use andJob Satisfaction inVirtual Work?, Insu Park and Jeewon Cho
Do online test proctoring services abide by standard data protections?, Tristan Stapert and Andrew Kramer
Early public outlook on the coronavirus disease (COVID-19): A social media study, Jun Liu, Giridhar Reddy Bojja, Martinson Ofori, and Loknath Sai Ambati
Effectiveness of Transfer Learning with Light-weight Architecture for Covid-19 Imaging, Rajesh Godasu
Enhancing Real-Time Streaming Content Security: An Adaptive QIM Watermarking Approach for Dynamic Tampering Detection, Harsha Sammangi, Giridhar Reddy Bojja, Loknath Sai Ambati, Md Jabir Rahman, and Jun Liu
Enhancing Smart Home Security Through Risk-Based Access Control (RBAC): “Closing the Gap”, Ahmad Abusini
Exploratory Study on the Impact of Blockchain Adoption on Inventory Accuracy and Supply Chain Efficiency, Deb Tech and Aravindh Sekar
Exploring large language models for ontology learning, Olga Perera and Jun Liu
Exploring the Activeness of Professional Online Community Members, Jun Liu, Yanyan Shang, and Jie Xiong
Exploring the Antimicrobial Potential of Honey from Alfalfa (Medicago sativa) Against Both Human and Plant Pathogens, Denyce Bravo and Andrew Santhoff
Exploring the Impact of Blockchain Integration on Inventory Accuracy and Supply Chain Efficiency – A Literature Review, Aravindh Sekar, Deb Tech, and Cherie Noteboom
Factors Affecting Users’ Satisfaction with Telehealth Apps: Analysis of User Reviews using BERT, Abdullah Wahbeh, Tyler Howes, Omar F. El-Gayar, Raed Seetan, and Mohammad Al-Ramahi
FACTORS FOR SUCCESSFULLY PASSING CERTIFICATION EXAMS: A SYSTEMATIC REVIEW, Renae Spohn, William Schweinle III, Patti Berg-Poppe, Carole South-Winter, and David DeJong
Factors influencing blockchain implementation in supply chain management: An exploratory pilot study, Aravindh Sekar, Deb Tech, Patti Brooks, and Cherie Noteboom
Fine-Grained Address Space Layout Randomization Through Non-Contiguous Per-Function Memory Segment Assignment, Andrew Kramer
Forensic Iconography for Image Forgery Detection, Chad R. Johnson
Formative Validity of A Novel Authentication Artifact for Augmented and Virtual Realities, Christopher Kreider and Omar El-Gayar
Fox in the Henhouse: The Delegation of Regulatory and Privacy Enforcement to Big Tech, William Bendix and Jon McKay
Fulfillment of a Higher Order: Placing Information Literacy within Maslow’s Hierarchy of Needs, Mary Francis
Gamifying Online Discussions: A Model for Improving Engagement Using Leaderboards, Brian Bovee, Cherie Noteboom, Kevin Smith, and Omar F. El-Gayar
Gender Differentials in School Computer Technology Support Roles: An Analysis, Mark Hawkes and Brad Brockmueller
Generative Adversarial Networks in Fraud Detection: A Systematic Literature Review, Man Wang and Omar F. El-Gayar
GENERATIVE ADVERSARIAL NETWORKS IN TUMOR-RELATED RESEARCH: A REVIEW AND AGENDA FOR MOVING FORWARD, Andrew Behrens and Cherie Noteboom
Geographic Variations and The Utilization of Health Care Resources, Tareq Nasralah, Cherie Noteboom, Abdullah Wahbeh, and Yong Wang
Getting the Best Out of Joint Warfighter Development, Charls Davis, Jeffrey Turner, and Mary Bell
Health Benefits and Adverse Effects of Kratom: A Social Media Text-Mining Approach, Abdullah Wahbeh, Mohammad Al-Ramahi, Omar F. El-Gayar, Tareq Nasralah, and Ahmed El Noshokaty
Health Literacy: Exploring Health Knowledge Transfer in Online Healthcare Communities, Yanyan Shang and Jun Liu
HLA-G gene polymorphisms as predictors of survival in colorectal cancer: A unified machine learning approach for cancer detection, Youssef Harrath, Marwa Hasni, Sabrine Dhouioui, Nadia Boujelbene, Abdel Halim Harrath, Mohamed Ayadi, Ines Zemni, Safa Bhar Layeb, and Ines Zidi
How Attractive is Artificial Intelligence? An Empirical Study of User Adoption of AI- Enabled Applications, Gary Yu Zhao, Omar F. El-Gayar, and Cindy Zhiling Tu
Hybrid Quantum Artificial Intelligence Electromagnetic Spectrum Analysis Framework for Transportation System Security, Varghese Vaidyan
Hypervisor-based cloud intrusion detection system, Yong Wang and Jason Nikolai
ICT: Attendance and Contact Tracing During a Pandemic, Shawn Zwach and Michael J. Ham
Identifying Critical Factors That Impact Learning Analytics Adoption by Higher Education Faculty, Michael Knupp
Identity Sharing and Adaptive Personalization Influencing Online Repurchases, Insu Park, Son Bui, and William J. Kettinger
Impact of IT Investment on Hospital Performance: A Longitudinal Data Analysis, Jun Liu and Giridhar Reddy Bojja
Impacts of Mobile Computing on Student Learning in the University: A Comparison of Course Assessment Data, Mark Hawkes and Claver P. Hategekimana
Implementing a Zero Trust Architecture For ICS/SCADA Systems, Raven Sims
Improved PSOR algorithm for minimum power multicast tree problem in wireless ad hoc networks, Austin O'Brien, Manki Min, and Sung Y. Shin
Internal Bonding, External Bridging and Functional Diversity: Impact of Social Capital on the Quality of Wikipedia Articles, Jun Liu and Sudha Ram
Investigating Conversion of Anthracene to Anthraquinone in the Presence of Montmorillonite Clay Under Temperature Regimes Relevant to Prebiotic Environments, Hope Juntunen, Briann Pitts, Vaille Swenson, Patrick Videau, and Michael Gaylor
IoT Device Identification Using Supervised Machine Learning, Yong Wang, Bhaskar P. Rimal Dr., Mark Elder, Sofía I. Crespo Maldonado, Helen Chen, Carson Koball, and Kaushik Ragothaman
Is Artificial Intelligence Attractive? An Empirical Study on User’s Intention to Use AI-Enabled Applications, Omar F. El-Gayar, Tu Cindy Zhiling, and Zhao Gary Yu
Leveraging the Zigbee Pattern of Life to Identify Devices, Kurt Jarvis
Linguistic Discourse Variables as Indicators of Reflective Online Interaction, Mark Hawkes
Lookahead Expansion Algorithm for Minimum Power Multicasting in Wireless Ad Hoc Networks, Austin O'Brien and Manki Min
MACHINE LEARNING APPLICATIONS IN MALWARE CLASSIFICATION: A METAANALYSIS LITERATURE REVIEW, T.J. Nelson, Austin O'Brien, and Cherie Noteboom
MACHINE LEARNING APPLICATIONS IN MALWARE CLASSIFICATION: A METAANALYSIS LITERATURE REVIEW, Cherie Noteboom, Austin O'Brien, and T.J. Nelson
Making Embedded Librarians a Part of an Online Community of Learners, Mary Francis
May Fourth at 100 in Singapore and Hong Kong: memorialization, localization, and negotiation, David Kenley and Els van Dongen
Medical Device Security Regulations and Assessment Case Studies, Yong Wang, Kai Taylor, Alexandra Smith, Adam Zimmel, and Korina Alcantara
Micromouse - Maze Solving Robot, Aiden Schramm, David Medin, and Andrew Kramer
Mining mobile application reviews to inform the design of anonymous live counseling applications, Cherie Noteboom, Kalee Crandall, Kodey S. Crandall, and Matt North
MobileGuardian: A Security Policy Enforcement Framework for Mobile Devices, Yong Wang, Karthik Vangury, and Jason Nikolai
Mobile Malware Security Challenges and Cloud-Based Detection, Yong Wang, Michael Hoffman, Nicholas Penning, and Jason Nikolai
Mobile Payment Security, Threats, and Challenges, Yong Wang, Christen Hahn, and Kruttika Sutrave
Mobile Security Testing Approaches and Challenges, Yong Wang and Yazan Alshboul
Moving data down the road: a systematic review of information privacy concerns in Internet-of-Vehicles (IoV) literature, Brad Fowler and Omar El-Gayar
Native American Rural Community Digital Divide: Student Insights, Chad R. Fenner, Cherie Noteboom, and Omar El-Gayar
Natural Language Processing: Understanding Slang and Colloquial Speech, Beau Miller
New Culture Turns One Hundred: A Centennial Reflection on the May Fourth and New Culture Movement in Singapore, David Kenley
NLP in Electronic Health Records: A Decade Perspective, James Boit, Hassan Alyami, and Omar F. El-Gayar
OABIS: An ontology-based approach to business rules sourcing in supply chain management systems, Jun Liu and Sudha Ram
Open Educational Resources, Mary Francis
Open Source Capture and Analysis of 802.11 Management Frames, Michael J. Ham and Kyle Cronin
Partitioning-Based SOR for Minimum Energy Multicast Tree Problem in Wireless Ad Hoc Networks, Austin O'Brien, Manki Min, and Sung Y. Shin
Peer Reviewers of Academic Journals: Who is Responsible for Our Professional Literature, Mary Francis
PEOPLE, PROCESS, AND TECHNOLOGY IN CLINICAL DECISION SUPPORT SYSTEMS: A META-ANALYSIS, Andrew Behrens, Cherie Noteboom, Kalee Crandall, and David Zeng
Perception of Bias in ChatGPT: Analysis of Social Media Data, Abdullah Wahbeh, Mohammad Al-Ramahi, Omar F. El-Gayar, Ahmed El Noshokaty, and Tareq Nasralah
Perceptions of Preservice Teachers about Adaptive Learning Programs in K-8 Mathematics Education, Kevin Smith
Planning a secure and reliable IoT-enabled FOG-assisted computing infrastructure for healthcare, Jun Liu, Hafiz Munsab Ali, Syed Ahmad Chan Bukhari, and Hafiz Tayyab Rauf
Power-Aware Fog Supported IoT Network for Healthcare Infrastructure Using Swarm Intelligence-Based Algorithms, Hafiz Munsab Ali, Syed Ahmad Chan Bukhari, Tahir Hameed, Jun Liu, and Alain Bertrand Bomgni
Prediction of Patient Willingness to Recommend Hospital: A Machine Learning-Based Exploratory Study, Jun Liu, Loknath Sai Ambati, Piyush Vyas, Giridhar Reddy Bojja, and Martinson Ofori
Privacy and Online Social Networks: A Systematic Literature Review of Concerns, Preservation, and Policies, Damion Mitchell and Omar F. El-Gayar
Privacy impact assessment for online social networks, Yong Wang and Raj Kumar Nepali
Privacy Measurement for Social Network Actor Model, Yong Wang and Raj Kumar Nepali
Privacy threat modeling framework for online social networks, Yong Wang and Raj Kumar Nepali
Proliferation of health misinformation on social media platforms: a systematic literature review, Jun Liu, Gitika Vyas, and Piyush Vyas
Prospects of Deep Learning and Edge Intelligence in Agriculture: A Review, Ali Shaheen and Omar F. El-Gayar
Provenance Management in BioSciences, Jun Liu and Sudha Ram
Public Discourse Against Masks in the COVID-19 Era: Infodemiology Study of Twitter Data, Mohammad Al-Ramahi, Ahmed Elnoshokaty, Omar F. El-Gayar, Tareq Nasralah, and Abdullah Wahbeh
Real-Time Fake News Detection on the X (Twitter): An Online Machine Learning Approach, Jun Liu, Piyush Vyas, and Shengjie Xu
Remote Mobile Screen (RMS): An Approach for Secure BYOD Environments, Yong Wang, Santiago Gimenez Ocano, and Byrav Ramamurthy
Resonant Landscapes, Tate Carson and Cater Gordon
Risk preferences, responsibility, and self-monitoring in a Stag Hunt, Robert Girtz, Joshua Hill, and Mark Owens
Science at Dakota State University, Vaille Swenson, Michael Gaylor, Blake Ushijima, and Patrick Videau
Security Analytics, Tania Williams, Omar F. El-Gayar, and Thomas H. Morris
Security Policy Compliance: User Acceptance Perspective, Ahmad Al-Omari, Omar F. El-Gayar, and Amit Deokar
Smart Electric Vehicle Charging in the Era of Internet of Vehicles, Emerging Trends, and Open Issues, Yong Wang, Bhaskar P. Rimal Dr., Cuiyu Kong, Bikrant Poudel, and Pratima Shahi
Smartphone Security Challenges, Yong Wang, Kevin Streff, and Sonell Raman
SocBridge: Bridging the gap between Online Social Networks, Yong Wang and Raj Kumar Nepali
Social Media Analysis of Modifiable Lifestyle Factors in Multiple Sclerosis, Laxmi Manasa Gorugantu, Omar El-Gayar, and Nevine Nawar
Social Media Text Mining Framework for Drug Abuse: Development and Validation Study With an Opioid Crisis Case Analysis, Tareq Nasralah, Omar F. El-Gayar, and Yong Wang
Social network privacy measurement and simulation, Yong Wang, Raj Kumar Nepali, and Jason Nikolai
Software Project Management: The Role of Modeling, Omar F. El-Gayar and Sreedhar Thota
Something for Every Kind of Learner: Students’ Perceptions of an Educational Recommender Study Tool, Cherie Noteboom and Alicia McNett
SONET: A SOcial NETwork Model for Privacy Monitoring and Ranking, Yong Wang and Raj Kumar Nepali
SOR Revisited: Partitioning and Recovering after Shrinking, Austin O'Brien, Manki Min, and Sung Y. Shin
Sterling named to DSU Academic Hall of Fame, Vicki Sterling
Student Privacy and Learning Analytics: Investigating the Application of Privacy within A Student Success Information System in Higher Education, Mary Francis, Mejai Avoseh, Karen Card, Lisa Newland, and Kevin Streff
Studying the Relationship Between Timely and Effective Care, Preventive Care, and Patient Hospital Recommendation, Piyush Vyas, Martinson Ofori, Insu Park, Prathamesh Muzumdar, and Ganga Prasad Basyal
Surveying for Ophidiomyces ophidiicola, the causal agent of Snake Fungal Disease in South Dakota., Adam Peak, Brandon Daniels, and Andrew E. Sathoff
Teaching About Asia in a Time of Pandemic, David Kenley
Technology Facilitation in the Rural School: An Analysis of Options, Mark Hawkes, Brad Brockmueller, and Pamela Halverson
Test Suite Optimization Using Machine Learning Techniques: A Comprehensive Study, Abid Mehmood, Qazi Mudassir Ilyas, Muneer Ahmad, and Zhongliang Shi
The Applications of Artificial Intelligence in Managing Project Processes and Targets: A Systematic Analysis, Cherie Noteboom, Martinson Ofori, and Zixing Shen
The Determinant of Selfless Misuse Intention and the Role of System Resilience under the Context of Disasters, Insu Park and Dheyaaldin Alsalman
The Dynamics of Pre- and Post-purchase Service and Consumer Evaluation of Online Retailers: A Comparative Analysis of Dissonance and Disconfirmation Models*, Insu Park, Jeewon Cho, and H.Raghav Rao
The Effect of Enterprise Crowdsourcing Systems on Employees’ Innovative Behavior and Job Performance, Vetrivadivel Vel, Insu Park, and Jun Liu
The Effect of Perceived IS Support for Creativity on Job Satisfaction: The Role of Effective IS Use in Virtual Workplaces, Insu Park, Jeewon Cho, and Mohammad Al-Ramahi
The Fun of Motivation: Crossing the Threshold Concepts, Mary Francis
The Impact of Family Business Ownership and Involvement on Entrepreneurial Self-Identification, Ephrata Yared Feyissa and Robert Girtz
The impact of information privacy concerns on information systems use behaviors in non-volitional surveillance contexts: A moderated mediation approach, Jeewon Cho and Insu Park
The Impact of Organizational Culture on AI adoption and Organizational Performance: A Mixed Methods Approach, Wilfred Mutale and Omar F. El-Gayar
The Issues Facing Librarians and Physicians: Facilitating Quality Research in the Internet Age, Mary Francis
The Mediation Effect of Self-Esteem on Weight and Earnings, Robert Girtz and Ronald DeBeaumont
The Role of Enterprise Crowdsourcing Systems on Knowledge Application, Insu Park, Vetrivadivel Vel, and Jun Liu
The role of leadership styles, organizational culture, and knowledge management in higher education institutions (HEI), Armel Djangone and Omar El-Gayar
The Role of the Privacy Calculus and the Privacy Paradox in the Acceptance of Wearables for Health and Wellbeing, Thomas Jernejcic and Omar F. El-Gayar
The Trajectory of Romance Scams in the U.S, LD Herrera and John Hastings
The Trajectory of Romance Scams in the U.S., LD Herrera and John Hastings
The Treatment of Privacy in Professional Codes of Ethics: An International Survey, Mary Francis
The use of a multimedia lesson to increase novice programmers' understanding of programming array concepts, Jim McKeown
Toward Automated Knowledge Discovery in Case-Based Reasoning, Sherri Weitl-Harms, John Hastings, and Jay H. Powell
Toward Developing a Provenance Ontology for Biological Images, Jun Liu and Sudha Ram
Toward extracting the scattering phase shift from integrated correlation functions, Peng Guo and Vladimir Gasparian
Towards Automated Policy Generation for Dynamic Access Control in the Internet of Things Control in the Internet of Thing, Yong Wang, Kaushik Ragothaman, and Srinivasulu R. Vuggumudi
Towards improving the security of mobile systems using virtualization and isolation, Yong Wang and Jeremias Eppler
Towards Robust IoT Security: A Blockchain Design with Attribute-based Encryption, Bryan Ikei, Hanna Thiry, and Shengjie Xu
Tunneling time in coupled-channel systems, Peng Guo, Vladimir Gasparian, Antonio Pérez-Garrido, and Esther Jódar
Turning a One Campus Book Event Into a Web 2.0 Experience: The First Two Years, Mary Francis
Two decades of design research on lessons-learned systems: a systematic review and future research agenda, Benjamin X. Hou and Omar F. El-Gayar
UAV Drone Security of Control for Increased Safety-of-flight, Daniel R. Nash
Understanding Provider Perspectives: Catalysts and Challenges of Intelligent Clinical Decision Support Systems, Andrew Behrens
Understanding the Semantics of Data Provenance to Support Active Conceptual Modeling, Jun Liu and Sudha Ram
Users’ Continuance Participation in the Online Peer-to-peer Healthcare Community: A Text Mining Approach, Jun Liu and Yanyan Shang
Using big data and network analysis to understand Wikipedia article quality, Jun Liu and Sudha Ram
Using Fun to Teach Rigorous Content, Mary Francis
Using Online Social Support to Predict Cancer Stage, Jun Liu and Sudha Ram
Variables of Interest in Exploring the Reflective Outcomes of Network-Based Communication, Mark Hawkes
Verifying X.509 Certificate Extensions, Michael J. Ham, Cody Welu, and Kyle Cronin
Virtually in the Classroom, Kevin Smith and Dan Klumper
Web Injection and Banking Trojan Malware -A Systematic Literature Review, Cherie Noteboom, Tjada Nelson, and Cory A. Nance
Web Injection and Banking Trojan Malware -A Systematic Literature Review, Cherie Noteboom, Tjada Nelson, and Cory A. Nance
Weed Detection Using Lightweight Deep Learning Models with Transfer Learning and Hyperparameter Optimization, Ali Shaheen
Weed Detection using Lightweight DL models with Transfer Learning & Hyperparameter Optimization, Ali Shaheen and Omar F. El-Gayar
Weeding the Reference Collection: A Case Study of Collection Management, Mary Francis
Who Does What: Collaboration Patterns in the Wikipedia and Their Impact on Article Quality, Jun Liu and Sudha Ram
You Look Suspicious!!: Leveraging Visible Attributes to Classify Malicious Short URLs on Twitter, Raj Kumar Nepali and Yong Wang