{"title":"IT LEADERSHIP ON CLASSROOM TECHNOLOGY INTEGRATION WITHIN HIGHER EDUCATION: A NARRATIVE REVIEW","authors":"","doi":"10.48009/4_iis_2023_101","DOIUrl":"https://doi.org/10.48009/4_iis_2023_101","url":null,"abstract":"","PeriodicalId":33557,"journal":{"name":"Issues in Information Systems","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135754301","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"VALIDATING PRIOR RESEARCH: A QUALITATIVE STUDY OF THE CAREER PERSPECTIVES AND EXPERIENCES OF FEMALE CYBERSECURITY PROFESSIONALS","authors":"","doi":"10.48009/4_iis_2023_109","DOIUrl":"https://doi.org/10.48009/4_iis_2023_109","url":null,"abstract":"","PeriodicalId":33557,"journal":{"name":"Issues in Information Systems","volume":"281 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135754302","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"EXPLORING MULTI-HOMING BEHAVIOR: USER PERCEPTIONS OF SUBSCRIBING TO MULTIPLE STREAMING PLATFORMS","authors":"","doi":"10.48009/3_iis_2023_120","DOIUrl":"https://doi.org/10.48009/3_iis_2023_120","url":null,"abstract":"","PeriodicalId":33557,"journal":{"name":"Issues in Information Systems","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135754307","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A STUDY OF EMERGENT COOPERATIVE BEHAVIORS OF MULTI-AGENT SYSTEMS USING REINFORCEMENT LEARNING","authors":"","doi":"10.48009/1_iis_2023_116","DOIUrl":"https://doi.org/10.48009/1_iis_2023_116","url":null,"abstract":"","PeriodicalId":33557,"journal":{"name":"Issues in Information Systems","volume":"88 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135750099","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"TESTING CAREDEX: SAGAT METHODOLOGY DEPLOYED FOR A DISASTER DRILL AT A SENIOR LIVING COMMUNITY","authors":"","doi":"10.48009/1_iis_2023_101","DOIUrl":"https://doi.org/10.48009/1_iis_2023_101","url":null,"abstract":"The NSF-funded CareDEX Team, in conjunction with a partner Senior Living Community (SLC) and several local first responder agencies","PeriodicalId":33557,"journal":{"name":"Issues in Information Systems","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135750102","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"THE EFFECT OF MICROLEARNING AND MULTIMEDIA DESIGN ON KNOWLEDGE AND SKILLS ACQUISITION OF STUDENTS IN E-COURSES","authors":"","doi":"10.48009/1_iis_2023_129","DOIUrl":"https://doi.org/10.48009/1_iis_2023_129","url":null,"abstract":"","PeriodicalId":33557,"journal":{"name":"Issues in Information Systems","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135910563","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A QUANTITATIVE STUDY ON THE USAGE OF A CRYPTOGRAPHIC SOFTWARE TOOL FOR DATA AND COMMUNICATIONS ENCRYPTION","authors":"","doi":"10.48009/2_iis_2023_102","DOIUrl":"https://doi.org/10.48009/2_iis_2023_102","url":null,"abstract":"","PeriodicalId":33557,"journal":{"name":"Issues in Information Systems","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135750078","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"THE INFLUENCE OF TRADITIONAL CYBERSECURITY TRAINING ON USER ATTITUDES TOWARDS VR CYBERSECURITY TRAINING","authors":"","doi":"10.48009/1_iis_2023_109","DOIUrl":"https://doi.org/10.48009/1_iis_2023_109","url":null,"abstract":"Effective cybersecurity training methods are needed as a primary defense against cyber threats. Traditional cybersecurity training methods have many issues and may not always translate into positive learning outcomes. Virtual Reality (VR) cybersecurity training methods may mitigate the pitfalls found in traditional cybersecurity training methods. This study utilizes the Technology Adoption Model (TAM) to explore user attitudes toward VR cybersecurity training modules. Moreover, the influence undergoing traditional cybersecurity training has on user attitudes is explored. A survey method is utilized to determine if the engagement and entertainment levels of traditional cybersecurity training methods influence on the perceived ease of use and usefulness of VR training platforms. There were 82 participants in this study. This study aimed to explore the perceived ease of use and usefulness of VR cybersecurity training modules. The results of this study demonstrate a statistically significant relationship between rated entertainment and engagement levels of traditional cybersecurity training methods and perceived ease of use and usefulness of VR training platforms. This study provides important insight for organizations and decision-makers seeking effective cybersecurity training methods.","PeriodicalId":33557,"journal":{"name":"Issues in Information Systems","volume":"135 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135750090","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"AN IMPLEMENTATION CASE OF THE HYFLP TEACHING MODALITY: LESSONS LEARNED AND A PATH FORWARD","authors":"","doi":"10.48009/1_iis_2023_102","DOIUrl":"https://doi.org/10.48009/1_iis_2023_102","url":null,"abstract":"","PeriodicalId":33557,"journal":{"name":"Issues in Information Systems","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135753455","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"THE FUTURE OF CRYPTO CURRENCY: GAPS, CHALLENGES, AND CONCERNS","authors":"","doi":"10.48009/3_iis_2023_106","DOIUrl":"https://doi.org/10.48009/3_iis_2023_106","url":null,"abstract":"","PeriodicalId":33557,"journal":{"name":"Issues in Information Systems","volume":"281 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135753471","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}