Table of Contents -
Volume 26, Issue 3
Designing curiosity-driven AI chatbots for non-technical fields: A design science approach to supporting school counselorsKalee Crandall, Cherie Noteboom, Kevin Smith
pp. 1-14
https://doi.org/10.48009/3_iis_2025_2025_101
Factors Leading to Telemedicine Access in a Post-Pandemic Era in Developing Countries: The Case of PeruPaula Maqueira-Barcelli, Christian Fernando Libaque-Saenz
pp. 15-31
https://doi.org/10.48009/3_iis_2025_2025_102
Ensuring ADA compliance in AI hiring: Review, analysis, and disability discrimination frameworkStephen Fabeyo
pp. 32-44
https://doi.org/10.48009/3_iis_2025_2025_103
Impact of local governments? social media engagement on citizens? trust, satisfaction, and word-of-mouth: A study of Lima-PeruGustavo Leonidas Pena-Rosell, Christian Fernando Libaque-Saenz
pp. 45-60
https://doi.org/10.48009/3_iis_2025_2025_104
Rebranding second-generation open-source intelligence: ?It?s not your father?s OSINT?Fred Hoffman, Brian Fuller
pp. 61-74
https://doi.org/10.48009/3_iis_2025_2025_105
How Mercyhurst?s CIRAT does OSINT ? and whyFred Hoffman, Brian Fuller
pp. 75-85
https://doi.org/10.48009/3_iis_2025_2025_106
Merchants? Typology of Digital Wallet Users in the Peruvian Retail SectorChristian Fernando Libaque-Saenz, Mario Chong, Ana Luna, Juan Sebastian Garcia-Pajoy, Lucas Machuca
pp. 86-99
https://doi.org/10.48009/3_iis_2025_2025_107
Breaking the Chain of Knowledge Transfer: AI Shadows Implicit, Explicit and Tacit Exchange David Scibelli, Brian Stevens
pp. 100-114
https://doi.org/10.48009/3_iis_2025_2025_108
Leveraging Large Language Models and In-Context Learning for Construct Identification in Computational Social Science: A Case Study on Wearable DevicesOmar El-Gayar, Abdullah Wahbeh, Mohammad Al-Ramahi, Ahmed Elnoshokaty, Tareq Nasralah
pp. 115-126
https://doi.org/10.48009/3_iis_2025_2025_109
Explainable AI in employment decision-making: A systematic review of transparency methods in hiring algorithmsStephen Fabeyo
pp. 127-135
https://doi.org/10.48009/3_iis_2025_2025_110
From code to concern: A demographic analysis of AI challenges and ethics in IT developmentAlan Peslak, Lisa Kovalchick
pp. 136-148
https://doi.org/10.48009/3_iis_2025_2025_111
Cybersecurity Awareness Among Post-Secondary Students Natalya Bromall, Peter Draus, Sushma Mishra, Kevin Slonka, Judit Trunkos
pp. 149-157
https://doi.org/10.48009/3_iis_2025_2025_112
Inexpensive Real-Time AI Solutions Using Low-Power Edge DevicesBrian Rodriguez, Nuri Yilmazer, Joon-Yeoul Oh
pp. 158-165
https://doi.org/10.48009/3_iis_2025_2025_113
Using Machine Learning to Support Peer-to-Peer Loan Funding Decision SupportMousumi Munmum, Queen E. Booker, Simon Jin
pp. 166-182
https://doi.org/10.48009/3_iis_2025_2025_114
The impact of leadership in cybersecurity risk management on information security policy compliance and perceived information security success: The moderating role of IT complexityLinwu Gu, Jianfeng Wang
pp. 183-193
https://doi.org/10.48009/3_iis_2025_2025_115
A PLS-SEM mediation analysis of factors influencing the adoption intention of banking chatbotsChandni Bansal, Krishan Kumar, Rajni Goel, Anuj Sharma
pp. 194-212
https://doi.org/10.48009/3_iis_2025_2025_116
Increasing food supply to support population growth through smart farming technologiesEdward T. Chen
pp. 213-219
https://doi.org/10.48009/3_iis_2025_2025_117
The Impact of Digitalization on Peruvian Public ServicesRaul Diaz-Parra, Christian Fernando Libaque-Saenz
pp. 220-236
https://doi.org/10.48009/3_iis_2025_2025_118
The Effects of Human Factors on the Acceptance of Healthcare 4.0 TransformationJameela Al-Jaroodi, Nadar Mohamed, Nader Kesserwan, Imad Jawhar, Bryce Mathews
pp. 237-254
https://doi.org/10.48009/3_iis_2025_2025_119
Proactive Detection of Tax Fraud Using Explainable AI Techniques: A Hybrid ApproachAnas AlSobeh, Mustafa Farouk Abo El Rob, Kamel Rouibah, Amani Shatnawi
pp. 255-274
https://doi.org/10.48009/3_iis_2025_2025_120
ReptiLoRA: Accelerating Meta?Initialization with Low?Rank AdaptationMinjun Kim, Jeongwon Park, Seonghun Kang, Bongkyoung Kwon
pp. 275-284
https://doi.org/10.48009/3_iis_2025_2025_121
The growing adoption of artificial intelligence (AI) to drive innovation, resulting in enhanced competitivenessJeffrey Harmon, Edward J. Lazaros, Hesham Allam, Christopher B. Davison, Allen D. Truell
pp. 285-290
https://doi.org/10.48009/3_iis_2025_2025_122
Using machine learning to analyze factors influencing grades in upper-level information technology coursesJenq-Foung Yao, Daniel Wu, Yu-Hsiang (John) Huang, Troy Strader, Tsu-Ming Chiang
pp. 291-301
https://doi.org/10.48009/3_iis_2025_2025_123
Expanded expectation-confirmation model using tangible and intangible benefits of MOOCs: The case of PeruMarcelo Briceno-Egusquiza, Michelle Rodriguez-Serra
pp. 302-318
https://doi.org/10.48009/3_iis_2025_2025_124
Ethical safeguards and vulnerabilities in large language modelsJordan Stuckey, Hayden Wimmer, Carl M. Rebman, Jr.
pp. 319-333
https://doi.org/10.48009/3_iis_2025_2025_125
Correlating happiness and environmental initiatives at the international level using machine learning John C. Stewart, G. Alan Davis, Brynne M. Stewart
pp. 334-339
https://doi.org/10.48009/3_iis_2025_2025_126
Applying agile principles to pedagogical activities and strategies in a learning-centric environmentJohn C. Stewart, G. Alan Davis
pp. 340-349
https://doi.org/10.48009/3_iis_2025_2025_127
The perception of computer information system students in Georgia Technical Colleges on gamificationJason P. Brown
pp. 350-362
https://doi.org/10.48009/3_iis_2025_2025_128
Predicting the unpredictable: predicting the march madness champion using statistical modelingJack Sweeney, Suhong Li
pp. 363-376
https://doi.org/10.48009/3_iis_2025_2025_129
Strengthening cybersecurity education: The urgent need to integrate maritime cybersecurity into cyber programsKaren Paullet
pp. 377-386
https://doi.org/10.48009/3_iis_2025_2025_130
Improving cybersecurity through explainable artificial intelligence: a systematic literature reviewShadrack Oriaro, Sushma Mishra
pp. 387-400
https://doi.org/10.48009/3_iis_2025_2025_131
Precision check: A critical look at the reliability of AI detection Karen Paullet, Jamie Pinchot, Evan Kinney, Tyler Stewart
pp. 401-412
https://doi.org/10.48009/3_iis_2025_2025_132
Enhancing university education with AI: a Telegram bot leveraging RAG and external APIs for secure knowledge retrieval Vadim Bashurov, Paul Safonov
pp. 413-420
https://doi.org/10.48009/3_iis_2025_2025_133
Human-robot interactions: a systematic literature review and future research agenda for the experience economyGaurav Tyagi, Anuj Sharma, Ravinder Kumar Verma
pp. 421-436
https://doi.org/10.48009/3_iis_2025_2025_134
A snapshot at the future of teaching computer programming courses from the lenses of artificial intelligence ? A comparison with teaching web design coursesAzad Ali, Frederick Kohun
pp. 437-444
https://doi.org/10.48009/3_iis_2025_2025_135
A policy void: An analysis of biometric facial recognition technology governance in K12 public school handbooksValerie Mercer
pp. 445-456
https://doi.org/10.48009/3_iis_2025_136
Suspicious cheering with bits Emil Eminov, Stephen Flowerday, Andrew Morin
pp. 457-471
https://doi.org/10.48009/3_iis_2025_137
SMEs and artificial intelligence in oman: A case of the insurance sectorGaurav Tyagi,
Ravinder Kumar Verma,
Anuj Sharma
pp. 472-483
https://doi.org/10.48009/3_iis_2025_138