Content Posted in 2024
2021 Academic Hall of Fame Celebrating Ruth Habeger and Honoring Dr. Zeno Van Erdewyk, Ruth Habeger
Academic Hall of Fame Flyer, Vicki Sterling
Academic Hall of Fame Program, Vicki Sterling
Access Control for IoT: A Survey of Existing Research, Dynamic Policies and Future Directions, Yong Wang, Kaushik Ragothaman, Bhaskar P. Rimal Dr., and Mark Lawrence
A Comprehensive Evaluation of Electronic Medical Record System Implementation in Saudi Arabia, Jun Liu, Cherie Noteboom, and Hassan Alyami
A Design Theory for Intelligent Clinical Decision Support, Andrew Behrens, Jun Liu, and Cherie Noteboom
A Dynamic Analysis Security Testing Infrastructure for Internet of Things, Yong Wang, Elliot Kjerstad, and Bailey Belisario
A framework for developing a domain specific business intelligence maturity model: Application to healthcare, Patti Brooks, Omar F. El-Gayar, and Surendra Sarnikar
A Framework for Examining the Human Side of Anti-Forensic Measures, Yong Wang, Jason Nikolai, and Raj Kumar Nepali
A Framework towards an efficient solution for the transportation of University of Bahrain Students, Youssef Harrath Dr.
A Knowledge Extraction Approach for IT Tech-support Transcripts, Gary Yu Zhao, Omar El-Gayar, and Cindy Zhiling Tu
Alert Prioritization and Strengthening: Towards an Industry Standard Priority Scoring System for IDS Analysts Using Open Source Tools and Models of Machine Learning, Austin O'Brien, Bikram Dangi, Jeremy Gamet, Arica Kulm, T.J. Nelson, and Wayne E. Pauli
An Algorithm Based on Priority Rules for Solving a Multi-drone Routing Problem in Hazardous Waste Collection, Youssef Harrath Dr. and Jihene Kaabi Dr.
An Automated Virtual Security Testing Platform for Android Mobile Apps, Yong Wang
A Neuropsychological Approach for Investigating Behavioral Beliefs Using Facial Expression Emoticons, Insu Park, Tamandia Matofam, and Jun Liu
An Inventory of Privacy Curricula Offerings in Higher Education, Dustin Steinhagen, Chase Lucas, Mary Francis, Mark Lawrence, and Kevin Streff
An LSTM Based Approach for the Classification of Customer Reviews: An Exploratory Study, Jun Liu, Akhilesh Chauhan, and Piyush Vyas
An Overview of Identity Relationship Management in the Internet of Things, Yong Wang and Mohammad Muntasir Nur
Ant Colony-based Approach for solving an Unmanned Aerial Vehicle Routing Problem, Youssef Harrath Dr. and Jihene Kaabi Dr.
Artificial Intelligence Usage and Data Privacy Discoveries within mHealth, Jennifer Schulte
Assessing Security Flaws in Modern Precision Farming Systems, Joseph Boyd and Robert Richardson
Assessing Security Vulnerabilities in Wireless IoT Devices, John Brumels
Assessing Varied Instructional Approaches in the Instruction of Online Graduate Students, Mary Francis
A Streaming Intrusion Monitoring and Classification System for IaaS Cloud, Yong Wang and Jason Nikolai
A Systematic Mapping Study of Access Control in the Internet of Things, Yong Wang and Kaushik Ragothaman
Automated Post-Breach Penetration Testing through Reinforcement Learning, Austin O'Brien, Sujita Chaudhary, and Shengjie Xu
Beyond party: ideological convictions and foreign policy conflicts in the US congress, William Bendix and Gyung-Ho Jeong
Bring Your Own Device Security Issues and Challenges, Yong Wang, Karthik Vangury, and Jinpeng Wei
CARVE: A Scientific Method-Based Threat Hunting Hypothesis Development Model, Yong Wang and Kevin Wafula
CEO’s Communication Styles and their Effect on Organizational Performance, Ronghua Shan, Yong Wang, Jun Liu, and Giridhar Reddy Bojja
CHDA CERTIFICATION EXAM SUCCESS FACTORS, Renae Spohn, William Schweinle III, Patti Berg-Poppe, Carole South-Winter, and David DeJong
Classifying facts and opinions in Twitter messages: a deep learning-basedapproach, Ronghua Shan, Swayambhu P. Chatterjee, Shuyuan Deng, Jun Liu, and Wu Jiao
Credibility Analysis of Customer Reviews on Amazon: A Design Science Approach, Jun Liu and Piyush Vyas
Deconstructing Compulsory Realpolitik in Cultural Studies: An Interview with Alexa Alice Joubin, David Kenley and William Sewell
Deep Neural Network at Edge: An Exploration of Hyper Parameter Tuning on Plant Seedling Dataset, Ali Y. Shaheen and Omar El-Gayar
Design of an Intelligent Patient Decision aid Based on Individual Decision-Making Styles and Information Need Preferences, Cherie Noteboom, Sergey Motorny, and Surendra Sarnikar
Detecting malicious short URLs on Twitter, Raj Kumar Nepali, Yong Wang, and Yazan Alshboul
Detection of Prostate Cancer Using Machine Learning Techniques: An Exploratory Study, Laxmi Manasa Gorugantu, Omar El-Gayar, and Nevine Nawar
Digital Divide in Rural Native American Homes: A Student Perspective, Chad R. Fenner, Cherie Noteboom, and Omar El-Gayar
Disaster Experience and Hospital Information Systems: An Examination of Perceived Information Assurance, Risk, Resilience, and HIS Usefulness, Insu Park, Raj Sharman, and H.Raghav Rao
Disentangling the effects of efficacy-facilitating informational support on health resilience in online health communities based on phrase-level text analysis, Insu Park, Surendra Sarnikar, and Jeewon Cho
Do AI-Generated Political Advertisements Create Positive or Negative Responses from Voters?, Grace Schofield
Does Information Systems Support forCreativity Enhance Effective Information Systems Use andJob Satisfaction inVirtual Work?, Insu Park and Jeewon Cho
Do online test proctoring services abide by standard data protections?, Tristan Stapert and Andrew Kramer
Early public outlook on the coronavirus disease (COVID-19): A social media study, Jun Liu, Giridhar Reddy Bojja, Martinson Ofori, and Loknath Sai Ambati
Exploring the Activeness of Professional Online Community Members, Jun Liu, Yanyan Shang, and Jie Xiong
Exploring the Antimicrobial Potential of Honey from Alfalfa (Medicago sativa) Against Both Human and Plant Pathogens, Denyce Bravo and Andrew Santhoff
FACTORS FOR SUCCESSFULLY PASSING CERTIFICATION EXAMS: A SYSTEMATIC REVIEW, Renae Spohn, William Schweinle III, Patti Berg-Poppe, Carole South-Winter, and David DeJong
Formative Validity of A Novel Authentication Artifact for Augmented and Virtual Realities, Christopher Kreider and Omar El-Gayar
Fox in the Henhouse: The Delegation of Regulatory and Privacy Enforcement to Big Tech, William Bendix and Jon McKay
Fulfillment of a Higher Order: Placing Information Literacy within Maslow’s Hierarchy of Needs, Mary Francis
Gender Differentials in School Computer Technology Support Roles: An Analysis, Mark Hawkes and Brad Brockmueller
GENERATIVE ADVERSARIAL NETWORKS IN TUMOR-RELATED RESEARCH: A REVIEW AND AGENDA FOR MOVING FORWARD, Andrew Behrens and Cherie Noteboom
GENERATIVE ADVERSARIAL NETWORKS IN TUMOR-RELATED RESEARCH: A REVIEW AND AGENDA FOR MOVING FORWARD, Andrew Behrens and Cherie Noteboom
Geographic Variations and The Utilization of Health Care Resources, Tareq Nasralah, Cherie Noteboom, Abdullah Wahbeh, and Yong Wang
Hybrid Quantum Artificial Intelligence Electromagnetic Spectrum Analysis Framework for Transportation System Security, Varghese Vaidyan
Hypervisor-based cloud intrusion detection system, Yong Wang and Jason Nikolai
ICT: Attendance and Contact Tracing During a Pandemic, Shawn Zwach and Michael J. Ham
Identity Sharing and Adaptive Personalization Influencing Online Repurchases, Insu Park, Son Bui, and William J. Kettinger
Impact of IT Investment on Hospital Performance: A Longitudinal Data Analysis, Jun Liu and Giridhar Reddy Bojja
Impacts of Mobile Computing on Student Learning in the University: A Comparison of Course Assessment Data, Mark Hawkes and Claver P. Hategekimana
Improved PSOR algorithm for minimum power multicast tree problem in wireless ad hoc networks, Austin O'Brien, Manki Min, and Sung Y. Shin
IoT Device Identification Using Supervised Machine Learning, Yong Wang, Bhaskar P. Rimal Dr., Mark Elder, Sofía I. Crespo Maldonado, Helen Chen, Carson Koball, and Kaushik Ragothaman
Linguistic Discourse Variables as Indicators of Reflective Online Interaction, Mark Hawkes
Lookahead Expansion Algorithm for Minimum Power Multicasting in Wireless Ad Hoc Networks, Austin O'Brien and Manki Min
Making Embedded Librarians a Part of an Online Community of Learners, Mary Francis
May Fourth at 100 in Singapore and Hong Kong: memorialization, localization, and negotiation, David Kenley and Els van Dongen
Medical Device Security Regulations and Assessment Case Studies, Yong Wang, Kai Taylor, Alexandra Smith, Adam Zimmel, and Korina Alcantara
Micromouse - Maze Solving Robot, Aiden Schramm, David Medin, and Andrew Kramer
MobileGuardian: A Security Policy Enforcement Framework for Mobile Devices, Yong Wang, Karthik Vangury, and Jason Nikolai
Mobile Malware Security Challenges and Cloud-Based Detection, Yong Wang, Michael Hoffman, Nicholas Penning, and Jason Nikolai
Mobile Payment Security, Threats, and Challenges, Yong Wang, Christen Hahn, and Kruttika Sutrave
Mobile Security Testing Approaches and Challenges, Yong Wang and Yazan Alshboul
Moving data down the road: a systematic review of information privacy concerns in Internet-of-Vehicles (IoV) literature, Brad Fowler and Omar El-Gayar
Native American Rural Community Digital Divide: Student Insights, Chad R. Fenner, Cherie Noteboom, and Omar El-Gayar
Natural Language Processing: Understanding Slang and Colloquial Speech, Beau Miller
New Culture Turns One Hundred: A Centennial Reflection on the May Fourth and New Culture Movement in Singapore, David Kenley
Open Educational Resources, Mary Francis
Open Source Capture and Analysis of 802.11 Management Frames, Michael J. Ham and Kyle Cronin
Optimal Algorithm for Managing On-Campus Student Transportation, Youssef Harrath Dr.
Partitioning-Based SOR for Minimum Energy Multicast Tree Problem in Wireless Ad Hoc Networks, Austin O'Brien, Manki Min, and Sung Y. Shin
Peer Reviewers of Academic Journals: Who is Responsible for Our Professional Literature, Mary Francis
PEOPLE, PROCESS, AND TECHNOLOGY IN CLINICAL DECISION SUPPORT SYSTEMS: A META-ANALYSIS, Andrew Behrens, Cherie Noteboom, Kalee Crandall, and David Zeng
Perceptions of Preservice Teachers about Adaptive Learning Programs in K-8 Mathematics Education, Kevin Smith
Planning a secure and reliable IoT-enabled FOG-assisted computing infrastructure for healthcare, Jun Liu, Hafiz Munsab Ali, Syed Ahmad Chan Bukhari, and Hafiz Tayyab Rauf
Prediction of Patient Willingness to Recommend Hospital: A Machine Learning-Based Exploratory Study, Jun Liu, Piyush Vyas, Giridhar Reddy Bojja, Loknath Sai Ambati, and Martinson Ofori
Prediction of Patient Willingness to Recommend Hospital: A Machine Learning-Based Exploratory Study, Jun Liu, Loknath Sai Ambati, Piyush Vyas, Giridhar Reddy Bojja, and Martinson Ofori
Privacy impact assessment for online social networks, Yong Wang and Raj Kumar Nepali
Privacy Measurement for Social Network Actor Model, Yong Wang and Raj Kumar Nepali
Privacy threat modeling framework for online social networks, Yong Wang and Raj Kumar Nepali
Proliferation of health misinformation on social media platforms: a systematic literature review, Jun Liu, Gitika Vyas, and Piyush Vyas
Remote Mobile Screen (RMS): An Approach for Secure BYOD Environments, Yong Wang, Santiago Gimenez Ocano, and Byrav Ramamurthy
Resonant Landscapes, Tate Carson and Cater Gordon
Risk preferences, responsibility, and self-monitoring in a Stag Hunt, Robert Girtz, Joshua Hill, and Mark Owens
Smart Electric Vehicle Charging in the Era of Internet of Vehicles, Emerging Trends, and Open Issues, Yong Wang, Bhaskar P. Rimal Dr., Cuiyu Kong, Bikrant Poudel, and Pratima Shahi
Smartphone Security Challenges, Yong Wang, Kevin Streff, and Sonell Raman
SocBridge: Bridging the gap between Online Social Networks, Yong Wang and Raj Kumar Nepali
Social Media Analysis of Modifiable Lifestyle Factors in Multiple Sclerosis, Laxmi Manasa Gorugantu, Omar El-Gayar, and Nevine Nawar
Social network privacy measurement and simulation, Yong Wang, Raj Kumar Nepali, and Jason Nikolai
SONET: A SOcial NETwork Model for Privacy Monitoring and Ranking, Yong Wang and Raj Kumar Nepali
SOR Revisited: Partitioning and Recovering after Shrinking, Austin O'Brien, Manki Min, and Sung Y. Shin
Sterling named to DSU Academic Hall of Fame, Vicki Sterling
Student Privacy and Learning Analytics: Investigating the Application of Privacy within A Student Success Information System in Higher Education, Mary Francis, Mejai Avoseh, Karen Card, Lisa Newland, and Kevin Streff
Surveying for Ophidiomyces ophidiicola, the causal agent of Snake Fungal Disease in South Dakota., Adam Peak, Brandon Daniels, and Andrew E. Sathoff
Teaching About Asia in a Time of Pandemic, David Kenley
Technology Facilitation in the Rural School: An Analysis of Options, Mark Hawkes, Brad Brockmueller, and Pamela Halverson
The Determinant of Selfless Misuse Intention and the Role of System Resilience under the Context of Disasters, Insu Park and Dheyaaldin Alsalman
The Dynamics of Pre- and Post-purchase Service and Consumer Evaluation of Online Retailers: A Comparative Analysis of Dissonance and Disconfirmation Models*, Insu Park, Jeewon Cho, and H.Raghav Rao
The Effect of Enterprise Crowdsourcing Systems on Employees’ Innovative Behavior and Job Performance, Vetrivadivel Vel, Insu Park, and Jun Liu
The Effect of Perceived IS Support for Creativity on Job Satisfaction: The Role of Effective IS Use in Virtual Workplaces, Insu Park, Jeewon Cho, and Mohammad Al-Ramahi
The Fun of Motivation: Crossing the Threshold Concepts, Mary Francis
The Impact of Family Business Ownership and Involvement on Entrepreneurial Self-Identification, Ephrata Yared Feyissa and Robert Girtz
The Issues Facing Librarians and Physicians: Facilitating Quality Research in the Internet Age, Mary Francis
The Mediation Effect of Self-Esteem on Weight and Earnings, Robert Girtz and Ronald DeBeaumont
The Role of Enterprise Crowdsourcing Systems on Knowledge Application, Insu Park, Vetrivadivel Vel, and Jun Liu
The role of leadership styles, organizational culture, and knowledge management in higher education institutions (HEI), Armel Djangone and Omar El-Gayar
The Treatment of Privacy in Professional Codes of Ethics: An International Survey, Mary Francis
The use of a multimedia lesson to increase novice programmers' understanding of programming array concepts, Jim McKeown
Toward extracting the scattering phase shift from integrated correlation functions, Peng Guo and Vladimir Gasparian
Towards a Business Intelligence Maturity Model for Healthcare, Patti Brooks, Omar F. El-Gayar, and Surendra Sarnikar
Towards Automated Policy Generation for Dynamic Access Control in the Internet of Things Control in the Internet of Thing, Yong Wang, Kaushik Ragothaman, and Srinivasulu R. Vuggumudi
Towards improving the security of mobile systems using virtualization and isolation, Yong Wang and Jeremias Eppler
Turning a One Campus Book Event Into a Web 2.0 Experience: The First Two Years, Mary Francis
Users’ Continuance Participation in the Online Peer-to-peer Healthcare Community: A Text Mining Approach, Jun Liu and Yanyan Shang
Using big data and network analysis to understand Wikipedia article quality, Jun Liu and Sudha Ram
Using Fun to Teach Rigorous Content, Mary Francis
Using Online Social Support to Predict Cancer Stage, Jun Liu and Sudha Ram
Using Semi-Supervised Learning for the Creation of Medical Systematic Review: An Exploratory Analysis, Jun Liu, Prem Timsina, Omar F. El-Gayar, and Yanyan Shang
Variables of Interest in Exploring the Reflective Outcomes of Network-Based Communication, Mark Hawkes
Verifying X.509 Certificate Extensions, Michael J. Ham, Cody Welu, and Kyle Cronin
Virtually in the Classroom, Kevin Smith and Dan Klumper
Weeding the Reference Collection: A Case Study of Collection Management, Mary Francis
You Look Suspicious!!: Leveraging Visible Attributes to Classify Malicious Short URLs on Twitter, Raj Kumar Nepali and Yong Wang