Table of Contents -
Volume 24, Issue 2
MINING MOBILE APPLICATION REVIEWS TO INFORM THE DESIGN OF ANONYMOUS LIVE COUNSELING APPLICATIONSKalee Crandall, Kodey Crandall, Matt North, Cherie Noteboom
pp. 1-11
https://doi.org/10.48009/2_iis_2023_101
A QUANTITATIVE STUDY ON THE USAGE OF A CRYPTOGRAPHIC SOFTWARE TOOL FOR DATA AND COMMUNICATIONS ENCRYPTIONMel Tomeo, Wilfred Mutale, Matthew Kisow, John J. Scarpino, Vasilka Chergarova
pp. 12-21
https://doi.org/10.48009/2_iis_2023_102
ENHANCING CYBERSECURITY USING A NEW DYNAMIC APPROACH TO AUTHENTICATION AND AUTHORIZATIONAbdur Rahim Choudhary
pp. 22-32
https://doi.org/10.48009/2_iis_2023_103
THE CHANGING LANDSCAPE IN CYBERSECURITY EDUCATION, THE IMPACT OF COVID-19, AND THE PROMISE OF ONLINE EDUCATION PROGRAMSCassie Longhart, Jacob Mack
pp. 33-45
https://doi.org/10.48009/2_iis_2023_104
THE ROLE OF MANAGEMENT DECISIONS IN CREATING CYBERSECURITY VULNERABILITIESKieran Fletcher
pp. 46-59
https://doi.org/10.48009/2_iis_2023_105
ANALYSIS OF A STUDENT SATISFACTION EXIT SURVEY OF A GRADUATE DATA ANALYTICS PROGRAMJohn Stewart, G. Alan Davis, Alan Peslak
pp. 60-70
https://doi.org/10.48009/2_iis_2023_106
PSYCHOLOGICAL TACTICS OF PHISHING EMAILSPing Wang, Peyton Lutchkus
pp. 71-83
https://doi.org/10.48009/2_iis_2023_107
CAREERS AND SKILLS IN THE ENTERPRISE BLOCKCHAIN INDUSTRY FOR INFORMATION SYSTEMS GRADUATESAshraf Shirani
pp. 84-92
https://doi.org/10.48009/2_iis_2023_108
BLOCKCHAIN FOR MARKETING PURPOSES BY BANKING INSTITUTIONS: ACTIVITY THEORY PERSPECTIVEMagdeline Moche, Tiko Iyamu
pp. 93-108
https://doi.org/10.48009/2_iis_2023_109
THE INTEGRATION COMPONENTS BETWEEN ENTERPRISE INFORMATION ARCHITECTURE AND BUSINESS STRATEGYTiko Iyamu, Paul van Staden
pp. 109-122
https://doi.org/10.48009/2_iis_2023_110
TEACHING AI IN THE COLLEGE COURSE: INTRODUCING THE AI PROMPT DEVELOPMENT LIFE CYCLE (PDLC)Lorrie Willey, Barbara Jo White, Cynthia S. Deale
pp. 123-138
https://doi.org/10.48009/2_iis_2023_111
CONSIDERATIONS FOR UPDATING PROGRAMMING COURSESAzad Ali, Pankaj Chaudhary, Kustim Wibowo
pp. 139-152
https://doi.org/10.48009/2_iis_2023_112
ACCURACY AND DETECTION OF STUDENT USE OF CHATGPT IN BUSINESS ANALYTICS COURSESLauren F. Laker, Mark Sena
pp. 153-163
https://doi.org/10.48009/2_iis_2023_113
THE EFFICACY OF DETECTING AI-GENERATED FAKE NEWS USING TRANSFER LEARNINGJake Stewart, Nikita Lyubashenko, George Stefanek
pp. 164-177
https://doi.org/10.48009/2_iis_2023_114
IS PROFESSORS' PERSPECTIVES ON AI-ASSISTED PROGRAMMINGKelsey Rose, Victoria Massey, Bryan Marshall, Peter Cardon
pp. 178-190
https://doi.org/10.48009/2_iis_2023_115
INTERNET OF THINGS (IOT): USERS' CONCERNS ABOUT PRIVACY AND SECURITYAlex Koohang, Carol Springer Sargent, David Fuller, Tara Underwood
pp. 191-202
https://doi.org/10.48009/2_iis_2023_116
ASSESSMENT OF CHATGPT-GENERATED PROGRAMMING CODE BASED ON EXERCISES IN AN INTRODUCTORY PROGRAMMING COURSEAzad Ali, Kustim Wibowo
pp. 203-212
https://doi.org/10.48009/2_iis_2023_117
CAN SUCCESS VISUALIZATION HELP STUDENTS MANAGE THEIR CONCERNS ABOUT LEARNING TECHNICAL CONCEPTS?Michael Lohle
pp. 213-219
https://doi.org/10.48009/2_iis_2023_118
FINTECH CURRICULA: A SURVEY OF IS, ACCOUNTING, AND FINANCE DEPARTMENT CHAIRSAbby E. Milner, Michael Thomas, Eric Kobbe, Brad Fowler, Peter Cardon, Bryan Marshall
pp. 220-231
https://doi.org/10.48009/2_iis_2023_119
THE GDPR AND UK GDPR AND ITS IMPACT ON US ACADEMIC INSTITUTIONSLeila Halawi, Alpesh Makwana
pp. 232-241
https://doi.org/10.48009/2_iis_2023_120
INCREASING STUDENT AGENCY WITHIN COURSES VIA ASSIGNMENT TRACKSJonathan P. Leidig
pp. 242-249
https://doi.org/10.48009/2_iis_2023_121
MENTAL HEALTH AND INFORMATION TECHNOLOGY DEVELOPERS: AN EXPLORATION OF DEMOGRAPHIC VARIANCESAlan Peslak, Wendy Ceccucci, Kiku Jones, Lori Leonard
pp. 250-264
https://doi.org/10.48009/2_iis_2023_122
TRAINING K-12 TEACHERS TO DELIVER CLOUD COMPUTING CONTENT: A CASE STUDYJameela Aljaroodi, Natalya Bromall, Maria Kalevitch, Cheryl Maurer, Vicki Donne
pp. 265-274
https://doi.org/10.48009/2_iis_2023_123
CYBERSECURITY AND DATA QUALITY'S IMPACT ON CLOUD ERPHongjiang Xu, Mark Hwang
pp. 275-281
https://doi.org/10.48009/2_iis_2023_124
CASE STUDY: EXPLORING THE ROLE OF CURRENT AND POTENTIAL USAGE OF GENERATIVE ARTIFICIAL INTELLIGENCE TOOLS IN HIGHER EDUCATIONVasilka Chergarova, Mel Tomeo, Lauren Provost, Gretel De la Pe?a, Anthony Ulloa, David Miranda
pp. 282-293
https://doi.org/10.48009/2_iis_2023_125
PUSH AND MOORING FACTORS TO EXPLAIN THE DISCONTINUANCE OF SOCIAL NETWORKSEdgardo R. Bravo, Ana Gabriela Cuentas-Romero
pp. 294-303
https://doi.org/10.48009/2_iis_2023_126
CULTURAL DIFFERENCES IN PRIVACY PROTECTION: A CASE STUDY OF DIDI PRIVACY VIOLATIONSJing Hua, Ping Wang
pp. 304-319
https://doi.org/10.48009/2_iis_2023_127
COMPARING CYBERSECURITY SKILLS AND CYBERSECURITY CURRICULA: A PRE AND POST COVID ANALYSISQueen E. Booker, Mousumi Munmun
pp. 320-333
https://doi.org/10.48009/2_iis_2023_128
WOMEN IN ANALYTICS: EXPLORING A POTENTIAL PATH TO INCREASE FEMALE PARTICIPATION IN COMPUTING CAREERSAlana Platt, Amir Fard Bahreini, Choton Basu
pp. 334-345
https://doi.org/10.48009/2_iis_2023_129