A collection of published articles from members of the Department of Information Systems at Kennesaw State University.
Visit the full list of Faculty Publications to view the work from other departments on campus.
Submissions from 2023
Fake news detection using machine learning: an adversarial collaboration approach, Karen M. DSouza and Aaron M. French
Strategic Information Systems (SIS) implementation at a bank in an emerging economy: implications for strategic enterprise capabilities and societal development, Dereje Mulat Ferede, Solomon Negash, and Peter Meso
Social Networking Continuance and Success: A Replication Study, Aaron M. French and Andrew William Green
The impact of cognitive biases on the believability of fake news, Aaron M. French, Veda C. Storey, and Linda Wallace
First responders, mental health, dispatch coding, COVID-19: Crisis within a crisis, Talha Hashmi, Dominic Thomas, and Monica Nandan
Advanced Practice Nurses' Organization Commitment: Impact of Job Environment, Job Satisfaction, and Person-Organization Fit, Yeon Hee Kim, Soo Il Shin, Hye Kyung Kim, Myunghee Jun, and Michael Wreen
Telehealth in Medicine: Predictions 2023–2024, Jiang Li, Ingrid Vasiliu-Feltes, Kathleen McGrow, Brendan F. Smith, Paul Barach, Sweta Sneha, and Francis X. Campion
Assessing the relationship between educational attainment and flu vaccination: an examination of the 2019 Behavioral Risk Factor Surveillance System, Roxanna Lopez, Ijeoma Ikedum, Bernice Ndungu, Austin R. Brown, and Sweta Sneha
Stakeholder orientation and product market performance: Evidence from a natural experiment, Juntai Lu and Jia Wei
Organizational perspectives on converged security operations, Herbert Mattord, Kathleen Kotwica, Michael Whitman, and Evan Battaglia
Inattention and Forewarning on Individuals’ Smart Apps Permissions-Consenting Behavior, Solomon Negash, Peter Meso, and Philip Musa
Comparing Information Security Compliance Between New Zealand, USA, and Vietnam, Miloslava Plachkinova and Lech Janczewski
Least Privilege across People, Process, and Technology: Endpoint Security Framework, Miloslava Plachkinova and Kenneth Knapp
A Taxonomy for Risk Assessment of Cyberattacks on Critical Infrastructure (TRACI), Miloslava Plachkinovа and Ace Vо
Modeling reporting delays in cyber incidents: an industry-level comparison, Seema Sangari, Eric Dallal, and Michael Whitman
Exploring satisfaction with social networking sites through the lens of fan page visiting: uncertainty reduction and general systems theory perspective, Soo Il Shin, Dianne Hall, Kyung Young Lee, and Sumin Han
Identifying Washtrading Cases in NFT Sales Networks, Nargess Tahmasbi, Guohou Shan, and Aaron M. French
Emerging Technology IS Course Design: Blockchain for Business Example, Dominic Thomas and Solomon Negash
Showcase: A Data-Driven Dashboard for Federal Criminal Sentencing, Ace Vо and Miloslava Plachkinovа
Submissions from 2022
Conscious Empathic AI in Service, Hadi Esmaeilzadeh and Reza Vaezi
Latent-Curve Modeling of Continued-Use Intentions: Near- Versus Distant-Future, Aaron M. French, Robert F. Otondo, and J. P. Shim
Investigating the net benefits of contactless technologies in quick-service restaurants: the moderating roles of social interaction anxiety and language proficiency, Kyung Young Lee, Sumin Han, Soo Il Shin, and Sung Byung Yang
Assessment of readiness for launching cloud computing services: The case of Ethio-Telecom in Ethiopia, Getachew H. Mengesha, Philip F. Musa, Solomon Negash, and Ruth Leuleged
Hacker Definitions in Information Systems Research, De Jarvis Oliver and Adriane B. Randolph
Context-aware user profiles to improve media synchronicity for individuals with severe motor disabilities, Adriane B. Randolph, Stacie C. Petter, Veda C. Storey, and Melody M. Jackson
Engaged Brains: A Course on Neuro-Information Systems, Adriane B. Randolph and A. J. Raven
Enhancing supply chain sensing capability through social media: an environmental scanning perspective, Jiahe Song, Kang Bok Lee, Zhongyun Zhou, and Soo Il Shin
Supporting Mobile Innovation in the Middle: Hospital IT Manager Attitudes, Dominic Thomas and Yurong Yao
Submissions from 2021
Deepfakes: Awareness, Concerns, and Platform Accountability, Justin D. Cochran and Stuart A. Napshin
The 4th industrial revolution powered by the integration of ai, blockchain, and 5g, Aaron M. French, J. P. Shim, Kai R. Larsen, Marten Risius, and Hemant Jain
The Journal of Organizational Computing and Electronic Commerce: An Analysis of Its Impact on the Information Systems Field in the 21st Century, Aaron M. French and Veda C. Storey
LES MISÉRABLES: The Tale of COVID-19 and Role of Information, Aaron M. French, Veda C. Storey, and Linda Wallace
Do social networking fan page posts matter for corporate image? Modified elaboration likelihood model perspective, Soo Il Shin, Dianne J. Hall, Sumin Han, David Paradice, and Teresa Lang
The black hole-star formation connection over cosmic time, Chandra B. Singh, Nelitha Kulasiri, Max North, and David Garofalo
Alleviating Challenges Related to FDA-Approved Medical Wearables Using Blockchain Technology, Sweta Sneha, Alina Panjwani, Brandon Lade, Jiyoun Randolph, and Monica Vickery
Health Internet Technology for Chronic Conditions: Review of Diabetes Management Apps, Sweta Sneha, Srivarun Thalla, Ishaan Rischie, and Hossain Shahriar
Agile Course Design: Multi-University Faculty Collaboration to Design the IS Course for an Online MBA Program, Amy B. Woszczynski, Jeannie L. Pridmore, Tridib Bandyopadhyay, Joy Godin, and Bradley J. Prince
Submissions from 2019
Deterioration rates in Virtual Reality Therapy: An individual patient data level meta-analysis., Max M. North
Submissions from 2018
Positive and Negative Psychological States in Self-paced Technology Training, Saurabh Gupta
A cluster analysis of highly productive business and management education scholars, Alvin Hwang, Regina F. Bento, J. B. Arbaugh, and Justin Cochran
The Sense of Presence Exploration in Virtual Reality Therapy, Max M. North and Sarah M. North
Analysis of Effectiveness of Optional Versus Mandatory Quizzes on Final Comprehensive Examinations Performance., Max M. North and Ronny Richardson
Internet Industry: A Perspective Review through Internet of Things and Internet of Everything, Kristin Tucker, Jake Bulim, Glenn Koch, and Max M. North
Submissions from 2017
Examination of the QM Process: Making A Case for Transformative Professional Development Model, Radwan Ali and James Wright
A Security and Privacy Framework for e-Learning, Radwan Ali and Humayun Zafar
A model to analyze the challenge of using cyber insurance, Tridib Bandyopadhyay and Vijay Mookerjee
A Concise Review of the Emergence of Big Data and Plausible Trends, Max M. North, Ronny Richardson, Ashanta Abron, and Saurabh Gupta
Information Security and Ethics Awareness: A Concise Comparative Investigation., Max M. North, Ronny Richardson, and Sarah M. North
A Concise Review of Economic Flourishment of China, Max M. North, Ronny Richardson, Rakesh Patel, and Luke Dabbs
Data Warehousing: A Practical Managerial Approach, Max M. North, Larry Thomas, Ronny Richardson, and Patrick Akpess
Ransomware: Evolution, Mitigation and Prevention, Ronny Richardson and Max M. North
Learning Outcomes for Cyber Defense Competitions, Amy B. Woszczynski and Andrew Green
Submissions from 2016
Gender-based Differences in Culture in the Indian IT Workplace, Amy B. Woszczynski, Pamila Dembla, and Humayun Zafar
Submissions from 2015
Electronic Payment Adoption in the Banking Sector of Low-Income Countries, Teshome Alemu, Tridib Bandyopadhyay, and Solomon Negash
IT Infrastructure Role in the Success of a Banking System: The Case of Limited Broadband Access, Berhanu Borena and Solomon Negash
Forming a Learning Community for New Chairs, Meghan A. Burke, Ruth A. Goldfine, Dawn Latta Kirby, and Patricia Alvarez McHatton
The Russian and Ukrainian Information Technology Outsourcing Market: Potential, Barriers and Management Considerations, Virginia Kleist, Amy B. Woszczynski, Humayun Zafar, and Pamila Dembla
MOOCs: Branding, Enrollment, and Multiple Measures of Success, Elke M. Leeds and Jim Cope
A Student-Centered Guest Lecturing: A Constructivism Approach to Promote Student Engagement, Lei Li and Rong Guo
Informing and Performing: A Study ComparingAdaptive Learning to Traditional Learning, Meg Coffin Murray and Jorge Perez
Increasing Student Engagement and Assessing the Value of an Online Collaboration Tool: The Case of VoiceThread, Solomon Negash and Tamara Powell
Request and Response Analysis Framework for Mitigating Clickjacking Attacks, Hossain Shahriar, Hisham Haddad, and Vamshee Krishna Devendran
Mobile Healthcare Service Adoption, Genet Shanko, Solomon Negash, and Tridib Bandyopadhyay
Submissions from 2014
Dynamic Competition in IT Security: A Differential Games Approach, Tridib Bandyopadhyay, Dengpan Liu, Vijay Mookerjee, and Allen Wilhite
Multilevel Research in Information Systems: Concepts, Strategies, Problems and Pitfalls, France Bélanger, Meghann Cefaratti, Traci Carte, and Steven E. Markham
The Role of Student Characteristics in Predicting Retention in Online Courses, J. Cochran, S. Campbell, H. Baker, and E. Leeds
The Role of Student Characteristics in Predicting Retention in Online Business Courses, J. Cochran, S. Campbell, Hope Baker, and E. Leeds
The adoption of e-learning systems in low income countries: the case of Ethiopia, Yonas Hagos and Solomon Negash
Promoting Information Systems Major to Undergraduate Students - A Comprehensive Investigation, Lei Li, Chi Zhang, and Guangzhi Zheng
Rethinking FS-ISAC: An IT Security Information Sharing Model for the Financial Services Sector, Charles Liu, Humayun Zafar, and Yoris A. Au
Rethinking FS-ISAC: An IT Security Information Sharing Network Model for the Financial Services Sector, Charles Zhechao Liu, Humayun Zafar, and Yoris A. Au
Factors for Measuring Password-based Authentication Practices, Herbert J. Mattord, Yair Levy, and Steven Furnell
Analysis of a Scholarly Social Networking site: The Case of the Dormant User, Meg Murray
Unraveling the digital literacy paradox: How higher education fails at the fourth literacy., Meg Coffin Murray and Jorge Perez
Distance Learning Immersive Environments: Sense of Presence Exploration, Max M. North
A Comparative Review of Information Technology Project Management in Private and Public Sector Organization, Muhammad Obeidat and Max North
Information Security Governance for the Non-security Business Executive, Michael Whitman and Herbert J. Mattord
Security Risk Management in Health Care: A Case Study, Humayun Zafar, Myung S. Ko, and Jan G. Clark
Submissions from 2013
Comparing Mobile and PC Internet Adoption Factors of Loyalty and Satisfaction with Online Shopping Consumers, D. Amoroso and M. Ogawa
Quality is Becoming More About Taste and Less About Cost: Eeg and Survey Study on Consumer Behavior, Charnetta Brown, Adriane Randolph, and Janee Burkhalter
WikiED: Using Web 2.0 Tools to Teach Content and Critical Thinking, Jennifer Kreps Frisch, Paula C. Jackson, and Meg Murray
Addressing Emerging Information Security Personnel Needs. A Look at Competitions in Academia: Do Cyber Defense Competitions Work?, Andrew Green and Humayun Zafar
The Impact of Student Retention Strategies: An Empirical Study, Elke Meyo Leeds, Stacy M. Campbell, Hope Baker, Radwan Ali, Dorothy Brawley, and John Crisp
User Profiles and Personas in the Design and Development of Consumer Health Technologies, Cynthia LeRouge, Jiao Ma, Sweta Sneha, and Kristin Tolle
Evaluating Authentication Components: An Expert Panel Approach, Herbert J. Mattord, Yair Levy, and Steven Furnell
Student Interaction with Content in Online and Hybrid Courses: Leading Horses to the Proverbial Water, Meg Murray, Jorge Perez, Debra Geist, and Alison Hedrick
An Identification and Evaluation of Information Security and Assurance Research Outlets, Michael Whitman, Humayun Zafar, and Herbert J. Mattord
Human Resource Information Systems: Information Security Concerns for Organizations, Humayun Zafar
Submissions from 2012
Kaizen Blitz, Satya S. Chakravorty and Richard M. Franza
Research Note—An Investigation of the Appropriation of Technology-Mediated Training Methods Incorporating Enactive and Collaborative Learning, Saurabh Gupta and Robert Bostrom
A Framework for Instituting Software Metrics in Small Software Organizations, Donald E. Meredith, Hisham M. Haddad, and Nancy C. Ross
Student Interaction with Online Course Content: Build It and They Might Come, Meg C. Murray, Jorge Pérez, Debra B. Geist, and Alison Hedrick
Perception of African Youth on Personal Computer Utilization: The Case of Ethiopia and Rwanda, S. Negash
A PhD in Information Systems for Emerging Economies: The Addis Ababa University Model, Solomon Negash, Salehu Anteneh, and Richard T. Watson
Triangulating System Requirements for Users With Severe Motor Disabilities, Adriane B. Randolph
Triangulating System Requirements for Users With Severe Motor Disabilities, Adriane B. Randolph
Silence or Knowing in IT-Facilitated Face-to-Face Meetings Silence or Knowing in IT-Facilitated Face-to-Face Meetings, Arjan Raven and Omar A. El Sawy
Brain Games as a Potential Nonpharmaceutical Alternative for the Treatment of ADHD, Stacy C. Wegrzyn, Doug Hearrington, Tim Martin, and Adriane B. Randolph
Guide to Network Security, Michael E. Whitman
Threats to Information Security Revisited, Michael Whitman and Herbert J. Mattord