{"title":"FACTORS DRIVING NFC-BASED MOBILE PAYMENT ADOPTION: THE CASE OF PERU","authors":"","doi":"10.48009/1_iis_2023_105","DOIUrl":"https://doi.org/10.48009/1_iis_2023_105","url":null,"abstract":"","PeriodicalId":33557,"journal":{"name":"Issues in Information Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135750100","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"FACTORS INFLUENCING HIGHER EDUCATION STUDENTS' PERFORMANCE AND SATISFACTION WITH VIRTUAL CLASSES DURING THE COVID-19 PANDEMIC: THE CASE OF PERU","authors":"","doi":"10.48009/4_iis_2023_114","DOIUrl":"https://doi.org/10.48009/4_iis_2023_114","url":null,"abstract":"","PeriodicalId":33557,"journal":{"name":"Issues in Information Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135753467","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"THE EFFICACY OF DETECTING AI-GENERATED FAKE NEWS USING TRANSFER LEARNING","authors":"","doi":"10.48009/2_iis_2023_114","DOIUrl":"https://doi.org/10.48009/2_iis_2023_114","url":null,"abstract":"","PeriodicalId":33557,"journal":{"name":"Issues in Information Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135753505","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"TEACHING AI IN THE COLLEGE COURSE: INTRODUCING THE AI PROMPT DEVELOPMENT LIFE CYCLE (PDLC)","authors":"","doi":"10.48009/2_iis_2023_111","DOIUrl":"https://doi.org/10.48009/2_iis_2023_111","url":null,"abstract":"","PeriodicalId":33557,"journal":{"name":"Issues in Information Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135753511","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"THE IMPACT OF TECHNOSTRESS CREATORS ON ACADEMICS' CYBERSECURITY FATIGUE IN SOUTH AFRICA","authors":"","doi":"10.48009/4_iis_2023_123","DOIUrl":"https://doi.org/10.48009/4_iis_2023_123","url":null,"abstract":"","PeriodicalId":33557,"journal":{"name":"Issues in Information Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135754299","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"FACULTY'S PERCEPTIONS OF EMBEDDED LIBRARIANS","authors":"","doi":"10.48009/4_iis_2023_112","DOIUrl":"https://doi.org/10.48009/4_iis_2023_112","url":null,"abstract":"","PeriodicalId":33557,"journal":{"name":"Issues in Information Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135754312","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Tamanna Hossain, Robert L. Logan, Arjuna Ugarte, Yoshitomo Matsubara, Sameer Singh, Sean Young
{"title":"DETECTING COVID-19 MISINFORMATION ON SOCIAL MEDIA","authors":"Tamanna Hossain, Robert L. Logan, Arjuna Ugarte, Yoshitomo Matsubara, Sameer Singh, Sean Young","doi":"10.48009/3_iis_2023_124","DOIUrl":"https://doi.org/10.48009/3_iis_2023_124","url":null,"abstract":"The ongoing pandemic has heightened the need for developing tools to flag COVID-19related misinformation on the internet, specifically on social media such as Twitter. However, due to novel language and the rapid change of information, existing misinformation detection datasets are not effective in evaluating systems designed to detect misinformation on this topic. Misinformation detection can be subdivided into two sub-tasks retrieval of misconceptions relevant to posts being checked for veracity, and stance detection to identify whether the posts agree, disagree, or express no stance towards the retrieved misconceptions. To facilitate research on this task, we release COVID-Lies1, a dataset of 5K expert-annotated tweets to evaluate the performance of misinformation detection systems on 86 different pieces of COVID-19 related misinformation. We evaluate existing NLP systems on this dataset, providing first benchmarks and identifying key challenges for future models to improve upon.","PeriodicalId":33557,"journal":{"name":"Issues in Information Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135845092","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"THE ROLE OF MANAGEMENT DECISIONS IN CREATING CYBERSECURITY VULNERABILITIES","authors":"","doi":"10.48009/2_iis_2023_105","DOIUrl":"https://doi.org/10.48009/2_iis_2023_105","url":null,"abstract":"","PeriodicalId":33557,"journal":{"name":"Issues in Information Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135750077","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"THE INFLUENCE OF GENDER AND ACCEPTANCE OF VR CYBERSECURITY TRAINING PLATFORMS","authors":"","doi":"10.48009/1_iis_2023_108","DOIUrl":"https://doi.org/10.48009/1_iis_2023_108","url":null,"abstract":"Effective training is essential to combat the plethora of cyber-attacks that frequently target individuals and organizations. Virtual Reality (VR) training platforms may provide an effective, engaging, and interactive approach to disseminating cybersecurity training and awareness. Gender is an influencing factor in cybersecurity training and may influence the potential adoption of VR cybersecurity training modules. This study utilizes the Technology Adoption Model (TAM) to measure the perceived usefulness and ease of use of VR cybersecurity training platforms. Overall, this paper explores whether gender is a predictor of how individuals perceive the usefulness and ease of use of Virtual Reality (VR) technologies for conducting cybersecurity training.","PeriodicalId":33557,"journal":{"name":"Issues in Information Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135750084","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"THE CHANGING LANDSCAPE IN CYBERSECURITY EDUCATION, THE IMPACT OF COVID-19, AND THE PROMISE OF ONLINE EDUCATION PROGRAMS","authors":"","doi":"10.48009/2_iis_2023_104","DOIUrl":"https://doi.org/10.48009/2_iis_2023_104","url":null,"abstract":"","PeriodicalId":33557,"journal":{"name":"Issues in Information Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135750087","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}