Most Recent Additions*
Is Artificial Intelligence Attractive? An Empirical Study on User’s Intention to Use AI-Enabled Applications
Gary Yu Zhao, Omar El-Gayar, and Cindy Zhiling Tu
Conversational Agents for Mental Health and Well-being: Discovering Design Recommendations Using Text Mining
Abdullah Wahbeh, Mohammad Al-Ramahi, Omar El-Gayar, Ahmed Elnoshokaty, and Tareq Nasralah
Fairness Challenges in Artificial Intelligence
Shuvro Chakrobartty and Omar El-Gayar
Social Media for Exploring Adverse Drug Events Associated with Multiple Sclerosis
Nevine Nawar, Omar El-Gayar, Ambati LoknathSai, and Bojja Giridhar
The role of age in organizational knowledge sharing: A systematic literature review
Kalee Crandall, Kodey Crandall, and Omar El-Gayar
A Decade in Review: Aligning Information Systems Security (ISS) with the NICE framework
Christopher Kreider and Omar El-Gayar
Drivers and Challenges of Wearable Devices Use: Content Analysis of Online Users Reviews
Ahmed Elnoshokaty, Omar El-Gayar, Abdullah Wahbeh, Mohammad A. Al-Ramahi, and Tareq Nasralah
Structured Sensemaking of Videographic Information within Dataphoric Space
Michael J. Pritchard
Factors In uencing Curriculum Adoption in 2- and 4-year Undergraduate Cybersecurity Programs
Michael J. Pritchard
BYOD security issues: a systematic literature review
Melva Ratchford, Omar El-Gayar, Cherie Noteboom, and yong wang
Adverse Health Effects of Kratom: An Analysis of Social Media Data
Abdullah Wahbeh, tareq Nasralah, Omar El-Gayar, and Ahmed Elnoshokaty
Design of a Virtual Cybersecurity Escape Room
Tania Williams and Omar El-Gayar
Security Analytics
Tania Williams, Thomas H. Morris, and Omar El-Gayar
Is Artificial Intelligence Attractive? An Empirical Study on User’s Intention to Use AI-Enabled Applications
Zhao Gary Yu, Omar El-Gayar, and Tu Cindy Zhiling
How Attractive is Artificial Intelligence? An Empirical Study of User Adoption of AI- Enabled Applications
Zhau, Gary; Omar El-Gayar; and tu Cindy
Recommender systems research and theory in higher education: A systematic literature review
Alicia McNett, and Cherie Noteboom
Improving the Effectiveness of Security Controls to Prevent APT Attacks
Srinivasulu R. Vuggumudi, Yong Wang, Kaushik Ragothaman, Cherie Noteboom, and Jun Liu
Compliance Based Penetration Testing as a Service
Srinivasulu R. Vuggumudi, Kaushik Ragothaman, and Yong Wang
Towards a Performance-explainability-fairness Framework for Benchmarking ML Models
Shuvro Chakrobartty and Omar El-Gayar
*Updated as of 03/20/23.