Table of Contents -
Volume 25, Issue 3
RISK-TAKING PROPENSITY AND INFORMATION SECURITY COMPLIANCE BEHAVIOR IN GOVERNMENT WORKERSTammy Ferrante, Taiwo Ajani
pp. 1-12
https://doi.org/10.48009/3_iis_2024_101
INFLUENCING ADOLESCENT'S CAREER CHOICES: PARENT'S PERCEPTIONS OF INFORMATION SYSTEMSCherie Noteboom, Kalee Crandall, Matthew Noteboom
pp. 13-25
https://doi.org/10.48009/3_iis_2024_102
THE IMPACT OF ORGANIZATIONAL FACTORS ON SECURITY BEHAVIORAL INTENTIONSLinwu Gu, Jianfeng Wang
pp. 26-35
https://doi.org/10.48009/3_iis_2024_103
WHAT DO HIGH SCHOOL STUDENTS KNOW ABOUT THE FIELD OF CYBER SECURITY? A SURVEY OF PERCEPTION AND EXPERIENCESSushma Mishra, Peter Draus, Kevin Slonka, Natalya Bromall
pp. 36-46
https://doi.org/10.48009/3_iis_2024_104
EXAMINING ENSEMBLE MODELS TO DETECT CREDIT CARD FRAUDULENT TRANSACTIONSQueen Booker
pp. 47-61
https://doi.org/10.48009/3_iis_2024_105
THE APPLICATION OF MITRE ATT&CK FRAMEWORK IN MITIGATING CYBERSECURITY THREATS IN THE PUBLIC SECTORMustafa Farouk Abo El Rob, Mohammad Anwar, Sriteja Gondi, Oula Mansour
pp. 62-80
https://doi.org/10.48009/3_iis_2024_106
LEARNING BY DOING: ACQUIRING THE TACIT KNOWLEDGE OF HOW TO CONDUCT AN OPEN-SOURCE INTELLIGENCE COLLECTION AND ANALYSIS PROJECTFred Hoffman
pp. 81-93
https://doi.org/10.48009/3_iis_2024_107
FOUNDATIONS OF MOBILE FORENSICS: AN ACADEMIC APPROACHJason James
pp. 94-108
https://doi.org/10.48009/3_iis_2024_108
EMBEDDING AI COMPETENCIES IN A CYBER SECURITY GRADUATE PROGRAM: IDENTIFYING EXISTING GAPSSushma Mishra, Noory Etezady
pp. 109-118
https://doi.org/10.48009/3_iis_2024_109
A COMPARISON OF AI MODELS TO DETECT HIDDEN MESSAGES IN IMAGESGeorge Stefanek, Leif Gulbransen, Griffin Spink, Jack Morawski, Dylan Filla, Ronald C. Rabello De Castro
pp. 119-132
https://doi.org/10.48009/3_iis_2024_110
IS AI FLATTENING THE CURVE OF CRITICAL THINKERS LEAVING BEHIND A COGNITIVE CAP FOR LEARNERS? David Scibelli, Brian Stevens
pp. 133-147
https://doi.org/10.48009/3_iis_2024_111
TRANSFORMING INDUSTRIES: THE DIGITAL REVOLUTION OF INDUSTRY 4.0Olena Kulykovets
pp. 148-164
https://doi.org/10.48009/3_iis_2024_112
CAN GPTZERO DETECT IF STUDENTS ARE USING ARTIFICIAL INTELLIGENCE TO CREATE ASSIGNMENTS? Karen Paullet, Jamie Pinchot, Evan Kinney, Tyler Stewart
pp. 165-174
https://doi.org/10.48009/3_iis_2024_113
COMPARING MODELS OF ONLINE MISINFORMATION DISTRIBUTION: A SURVEY PAPERZhengyao Liew, Xin Tian, Zhigang Li
pp. 175-184
https://doi.org/10.48009/3_iis_2024_114
STRUCTURAL MODEL THAT DETERMINES THE SUCCESSFUL IMPLEMENTATION OF E-GOVERNMENTAngel Ojeda, Juan Valera, Irak Ravelo
pp. 185-199
https://doi.org/10.48009/3_iis_2024_115
ARTIFICIAL INTELLIGENCE IN THE WORKPLACE: A PHILOSOPHICAL APPROACH TO ETHICS AND INTEGRITYDebra J. Borkovich, Robert J. Skovira, Frederick Kohun
pp. 200-217
https://doi.org/10.48009/3_iis_2024_116
EXAMINING FACTORS OF STUDENT AI ADOPTION THROUGH THE VALUE-BASED ADOPTION MODELErisjena Rruplli, Mark Frydenberg, Adam Patterson, Kevin Mentzer
pp. 218-230
https://doi.org/10.48009/3_iis_2024_117
DIMENSIONALITY AND DATA SIZE REDUCTION USING SINGULAR VALUE DECOMPOSITIONBen Kim
pp. 231-237
https://doi.org/10.48009/3_iis_2024_118
EXAMINING GENERATIVE ARTIFICIAL INTELLIGENCE ADOPTION IN ACADEMIA: A UTAUT PERSPECTIVEAdam Patterson, Mark Frydenberg, Leena Basma
pp. 238-251
https://doi.org/10.48009/3_iis_2024_119
EXAMINING TEXT CONSISTENCY AMONGST FOMC STATEMENTS AND MINUTES SUBTEXT USING DEEP LEARNINGAdam Patterson
pp. 252-266
https://doi.org/10.48009/3_iis_2024_120
THE IMPACT OF ARTIFICIAL INTELLIGENCE ON MUSICIANS Mark Fox, Ganesh Vaidyanathan, Jennifer Breese
pp. 267-276
https://doi.org/10.48009/3_iis_2024_121
ANALYZING REDDIT DISCOURSE SURROUNDING GENERATIVE AIKevin Mentzer, Jason Price, Jas Singh
pp. 277-292
https://doi.org/10.48009/3_iis_2024_122
UNDERSTANDING THE PUBLIC REACTION TO MAJOR UNITED STATES ENVIRONMENTAL POLICIES THROUGH TWITTERRyan Giammarco, Suhong Li
pp. 292-311
https://doi.org/10.48009/3_iis_2024_123
TRACKING SOCIAL MEDIA CONVERSATIONS ON EXTREME WEATHER DISCUSSION: A LONGITUDINAL ANALYSISJames Chen, Suhong Li
pp. 312-326
https://doi.org/10.48009/3_iis_2024_124
HOW EFFECTIVE ARE LARGE LANGUAGE MODELS IN DETECTING PHISHING EMAILS?Jing Hua, Ping Wang, Peyton Lutchkus
pp. 327-341
https://doi.org/10.48009/3_iis_2024_125
THE IMPLICATIONS OF THE DIMENSIONS OF DATA CHANGE FOR ORGANISATIONS' USEFULNESSWandisa Nyikana, Nomawethu Tungela, Tiko Iyamu
pp. 342-356
https://doi.org/10.48009/3_iis_2024_126
DEALING WITH THE CHALLENGES OF LEARNING RECURSIVE PROGRAMMING - HELPFUL FUNCTIONS AND INCREMENTAL APPROACHES TO ENCOURAGE RECURSIVE THINKINGDavid Smith, Pankaj Chaudhary, Azad Ali
pp. 357-370
https://doi.org/10.48009/3_iis_2024_127
GENERATIVE AI'S IMPACT ON PROGRAMMING STUDENTS: FRUSTRATION AND CONFIDENCE ACROSS LEARNING STYLESNada Hashmi, Zhi Li, Salvatore Parise, G. Shankaranarayanan
pp. 371-385
https://doi.org/10.48009/3_iis_2024_128
PREDICTING POPULARITY: MACHINE LEARNING INSIGHTS INTO MOVIE TEAM PATTERNS AND ONLINE RATINGSQiunan Zhang, Yuelin Zhu, Xihui Zhang, Mark Terwilliger
pp. 386-398
https://doi.org/10.48009/3_iis_2024_129
AWARENESS IN VIRTUAL WORKSPACES: INFLUENCES ON DISPENSABILITY AND CONSENSUSRussell Haines, Lijun Chen, Ed Hassler
pp. 399-412
https://doi.org/10.48009/3_iis_2024_130
UNDERSTANDING THE INTENTION TO USE LOCATION-BASED SERVICES: A COMPREHENSIVE THEORETICAL FRAMEWORKEdgardo R. Bravo, M. Karina Ferreyra
pp. 413-427
https://doi.org/10.48009/3_iis_2024_131
REDEFINING CAREERS IN THE AGE OF ARTIFICIAL INTELLIGENCEJames J. Lee, Amrapali Samanta, Misuk Lee
pp. 428-438
https://doi.org/10.48009/3_iis_2024_132