SlideShare a Scribd company logo
1 of 6
Download to read offline
Midwest Association for Information Systems (MWAIS) 2018 Conference
Schedule
May 17-18, 2018
Anheuser-Busch Hall
University of Missouri-St. Louis
One University Blvd., St. Louis, MO 63121
Wednesday, May 16
TIME LOCATION EVENT
5.00-7.00 PM ABH 103 MWAIS Welcome Reception. Volunteers will shuttle
attendees to and from the Conference Hotel
(Renaissance St. Louis, 9801 Natural Bridge Rd, St.
Louis, MO 63134) to UMSL.
Thursday, May 17
TIME LOCATION EVENT
7.15-9.15 AM Conference
Hotel
Lobby
Shuttle service to UMSL campus
7.30 AM–4.00
PM
ABH
Ground
Floor Lobby
Conference Registration
7.30-8.30 AM ABH 103 Continental Breakfast
8.30 AM-4.30 PM ABH
Ground
Floor Lobby
Sponsor Exhibits
8.30-8.45 AM ABH 103 Conference Kick Of and Welcome
8.45-9.45 AM ABH 103 Welcome Keynote
Col. Terrence Adams, Scott Air Force Base
9.45-10.00 AM ABH 103 Morning Break
10.00–11.00 AM SESSION A1 (Three Concurrent Tracks)
ABH 001 Workshop: Innovative low-code tool for Systems
Analysis and Design, Daniela Field and Kat
Brandenburg (Mendix)
ABH 002 Cybersecurity Policy and Behavior
Manifest Observations on a Comprehensive Computer
Security Policy, Dennis Acuna
The Development of an Open Source Intelligence
Gathering Exercise for Teaching Information Security &
Privacy, Jacob Young, Kerstyn Campbell, Angelica Fanti,
Alex Alicea, Matthew Weiss, Justin Burkhart and
Matthew Braasch
Effect of Probable and Guaranteed Monetary Vaalue
Gains and Losses on Cybersecurity Behavior of Users,
Santhosh Kumar Ravindran, Fiona Fui-Hoon Nah and
Maggie X. Cheng
Trade-offs between Monetary Gain and Ris Ta ing in
Cybersecurity Behavior, Xinhui Zhan, Fiona Fui-Hoon
Nah and Maggie X. Cheng
1
ABH 003 Technological Applications
Modeling Trust in the Adoption Decision Process of
Robo-Advisors: An Agent-Based Simulation Approach,
Sangho Lee, Jae Choi, Thomas Ngo-Ye and Maeve
Cummings
Context-Dependent Information Elements in the Car:
Explorative Analysis of Static and Dynamic Head-Up-
Displays, Matthias Gottlieb, Peter Zarnitz, Markus
Böhm and Helmut Krcmar
Preliminary Insights into Social Commerce Capability
Development, Edward Entee, Joseph Budu and Richard
Boateng
Green Communication in Cellular Networ s, Shahram
Moradi and Connie S. Barber
11.05 AM–12.05
PM
SESSION A2: Three Concurrent Tracks
ABH 001 Panel: Distance Education Best Practices: Innovation
and Pedagogy, Terrence Duncan, Emad Rahim, Darrell
Burrell, Dave Carter and Bill Davis
ABH 002 Social Issues
The Case for IT Training within Guinea’s Ministry of
Agriculture: Evaluating Performance and Usability,
Maurice Dawson, Damon Walker and Simon Cleveland
The Perception of Cyber Security in High School Girls,
Kanthi Narukonda and Pam Rowland
The Signifcance of Professional Associations:
Addressing the Cybersecurity Talent Gap, Calvin
Nobles and Darrell Burrell
IoT entrepreneurship, Michael Chuang
ABH 003 Human and Machine Learning
Neural Correlates of States of User Experience in
Gaming using EEG and Predictive Analytics, Chandana
Mallapragada, Fiona Fui-Hoon Nah, Keng Siau, Langtao
Chen and Tejaswini Yelamanchili
The Role of Message Structure on the Effectiveness of
Security Messages: A Neuro-Investigation, Roozmehr
Safi, Glenn J. Browne and Eric Walden
Assessing Classical and Expressive Aesthetics of Web
pages Using Machine Learning, Ang Chen, Fiona Fui-
Hoon Nah and Langtao Chen
Efficient Reduced-Bias Genetic Algorithm RERBGAt for
Generic Community Detection Objectives, Aditya
Karnam Gururaj Rao, Sanjiv Bhatia, Cezary Janikow and
Sharlee Climer
2
12.15 PM ABH
Terrace
Lawn
Group photo
12.30–1.30 PM ABH 001 Emerson Sponsored Lunch, MWAIS Board Meeting
1.45–2.45 PM ABH 001 CIO Panel: Cybersecurity in the Trenches, Moderator
Mary Sumner, Panelists: Michael Gibbons, CIO-Edward
Jones, Lawrence Casey, CIO-True Manufacturing, Jef
Robertson, CIO-Thompson Coburn
2.50–3.50 PM SESSION A3: Three Concurrent Tracks
ABH 001 Theoretical Models
Complying with BYOD Security Policies: A Moderation
Model, Cindy Zhiling Tu, Joni Adkins and Gary Yu Zhao
An Equity Perspective on Knowledge Sharing Behaviors
in Organizations, Prasad Rudramuniyaiah, Kailash Joshi
and Kyootai Lee
The Current Development of Technology Model in E-
Commerce and Suggestion for Future Research,
Shafeeq Ur Rahaman, Noel Merwyn Badugula and Te-
Wei Wang
Shipping and Return-Shipping Costs do not Cost the
Same: The Role of Gender and Product Price in Online
Buying, Gaurav Bansal and Emma Nies
ABH 002 Secure Passwords
Cybersecurity: Personal Information and Password
Setup, Yizhi Ma and Nathan Twyman
Password Memorability and Strength using an Image,
Cameron Burns and Nathan Twyman
Supervised Machine Learning Techniques,
Cybersecurity Habits and Human Generated Password
Entropy for Hac ing Prediction, Pedro Taveras and
Liliana Hernandez Toirac
Artifcial Intelligence-Based Password Brute Force
Attac s, Khoa D Trieu and Yi Yang
ABH 003 Artifcial Intelligence
Artifcial Intelligence: A Study on Governance, Policies,
and Regulations, Weiyu Wang and Keng Siau
A Qualitative Research on Mar eting and Sales in the
Artifcial Intelligence Age, Sara Yang and Keng Siau
Artifcial Intelligence Impacts on Higher Education, Yizhi
Ma and Keng Siau
Use of Artifcial Intelligence, Machine Learning, and
Autonomous Technologies in the Mining Industry,
Zeshan Hyder, Keng Siau and Fiona Nah
3.50–4.05 PM ABH Afternoon Break – cofee and cookies
3
Ground
Floor Lobby
4.05–5.05 PM SESSION A4: Four Concurrent Tracks
ABH 001 Panel: Information Technology Use in West African
Agriculture – Challenges and Opportunities, Maurice
Dawson, Damon Walker and Ashley Moss
ABH 002 Pedagogy
Mobile Course Feedbac System for Improving Student
Engagement, Nathaniel Williams, Jake Mondschein,
Mark Farmer and Nathan Twyman
The Impact of Guided Learning on Student
Achievement and Retention in an Online Course
Environment: A Refection on Introductory MIS Courses,
Shaun Moore and Amy Rutledge
When your students are quest-masters: Gamifying
Information Systems Course Content, Connie Barber
Extrinsic and Intrinsic Motivations: An Experiment on
the role of Competitions in Teaching and Learning,
Elahe Javadi and Shivam Verma
ABH 003 Research-in-Progress
A Research Agenda on Using Conceptual Models for
User Story Development, Abhimanyu Gupta, Geert
Poels and Palash Bera
Project Management Assurance in Agile Projects, Dawn
Owens, Jefrey Merhout and Deepak Khazanchi
Decision Support Systems for Recruiting College
Athletes, Conrad Schmid
Exploring the Relative Sustainability Efficiency of
Organizations: A DEA Approach, Daphne Simmonds
and Abel Moreno
ABH 004 Research-in-Progress
An Integrated Concept for Supply Chain Analytics in
Small-Medium Sized Enterprises, Tobias Engel, Dany
Meyer, and Joerg-Oliver Vogt
Toward Understanding Customer Preference Factors in
Agile – A Research Plan, David Bishop and Pam
Rowland
How Wearable Technology will Replace Vaerbal
Authentication or Passwords for Universal Secure
Authentication for Healthcare, Chad Fenner and Cherie
Noteboom
5.15 PM ABH
Ground
Floor
Shuttle Service to Conference Hotel and then on
to the Missouri Botanical Garden
6.00–9.00 PM Conference Shuttle service to the Missouri Botanical Garden
4
Hotel
Lobby
(approximately at the top of every hour)
6.00-10.00 PM UMSL SPONSORED SOCIAL EVENT: Missouri Botanical Garden
Cocktail reception, bufet dinner, and self-guided tours of the
garden
10.00 PM Last shuttle service to the Conference Hotel
Friday, May 18
TIME LOCATION EVENT
8.00-10.00 AM Conference
Hotel
Lobby
Shuttle service to UMSL campus
8.00 AM–Noon ABH
Ground
Floor Lobby
Conference Registration
8.00 AM–Noon ABH
Ground
Floor Lobby
Sponsor Exhibits
8.00-9.00 AM ABH 103 Continental Breakfast and Morning Keynote
Lt. Col. George Sconyers, Scott Air Force Base
9.00–10.00 AM SESSION B1 (Three Concurrent Tracks)
ABH 001 Workshop: Innovative low-code tool for Systems
Analysis and Design, Daniela Field and Kat
Brandenburg (Mendix)
ABH 002 Technology and Cybersecurity Leadership
Toward Cybersecurity Leadership Framewor , Simon
Cleveland and Marisa Cleveland (via Zoom conference)
Cybercrime Post-incident Leadership Model, Marisa
Cleveland and Simon Cleveland (via Zoom conference)
Theoretical Trends in IS/T Leadership: A Review of
Published Research, Abhishek Tripathi and Deepak
Khazanchi
Fear and Loathing of Cybersecurity: What Keeps IT
Executives Awa e at Night, Steven Wallace and Karen
Green
ABH 003 Healthcare
Role of Decision Ma ing in Predicting Health Behavior,
Neetu Singh, Apoorva Kanthwal, Prashant Bidhuri and
Anusha Vijaykumar Munnolli
Malaria Surveillance System Using Social Media, Jame
Boit and Hassan Alyami
Challenges in Healthcare Post-EMR Adoption, Terrence
Duncan, Emad Rahim and Darrell Burrell
Informational Vaideo Gaming in the Waiting Room,
Mitchell Ramirez, Coltin Shields, Andrew Long,
Nathaniel Burland, and Nathan Twyman
5
10.05-11.05 AM SESSION B2 (Two Concurrent Tracks)
ABH 001 Panel: Artifcial Intelligence and The Future of Wor ,
Keng Siau, Mary Lacity and Vicki Sauter
ABH 002 E-commerce, Security, and Online Communities
Timing of Data Breach Announcement and E-
Commerce Trust, Steven Muzatko and Gaurav Bansal
Got Phished! Role of Top Management Support in
Creating Phishing Safe Organizations, Gaurav Bansal
Negative Effects of Online Health Communities on
User’s Health, Tareq Nasralah, Ali Ahmed, Abdullah
Wahbeh, Hassan Alyami and Areeba Ali
The Case of Online Health Forums, Tareq Nasralah, Ali
Ahmed, Abdullah Wahbeh, Hassan Alyami and Areeba
Ali
11.15 AM-12.30
PM
ABH 103 Mendix Sponsored Lunch and Research Keynote
Prashant Palvia, University of North Carolina,
Greensboro
12.30-12.45 PM ABH 103 Closing Comments
11.30 AM-1.00
PM
ABH
Ground
Floor
Shuttle Service to Conference Hotel. Last Bus
departs at 1.00 PM.
6

More Related Content

What's hot

Steam++ An Extensible End-to-end Framework for Developing IoT Data Processing...
Steam++ An Extensible End-to-end Framework for Developing IoT Data Processing...Steam++ An Extensible End-to-end Framework for Developing IoT Data Processing...
Steam++ An Extensible End-to-end Framework for Developing IoT Data Processing...AIRCC Publishing Corporation
 
ENCRYPTION BASED WATERMARKING TECHNIQUE FOR SECURITY OF MEDICAL IMAGE
ENCRYPTION BASED WATERMARKING TECHNIQUE FOR SECURITY OF MEDICAL IMAGEENCRYPTION BASED WATERMARKING TECHNIQUE FOR SECURITY OF MEDICAL IMAGE
ENCRYPTION BASED WATERMARKING TECHNIQUE FOR SECURITY OF MEDICAL IMAGEijcsit
 
March 2021: Top 10 Read Article in Computer Science & Information Technology
March 2021: Top 10 Read Article in Computer Science & Information TechnologyMarch 2021: Top 10 Read Article in Computer Science & Information Technology
March 2021: Top 10 Read Article in Computer Science & Information TechnologyAIRCC Publishing Corporation
 
Research trends on CAPTCHA: A systematic literature
Research trends on CAPTCHA: A systematic literature Research trends on CAPTCHA: A systematic literature
Research trends on CAPTCHA: A systematic literature IJECEIAES
 
Safely Scaling Virtual Private Network for a Major Telecom Company during A P...
Safely Scaling Virtual Private Network for a Major Telecom Company during A P...Safely Scaling Virtual Private Network for a Major Telecom Company during A P...
Safely Scaling Virtual Private Network for a Major Telecom Company during A P...AIRCC Publishing Corporation
 

What's hot (6)

Steam++ An Extensible End-to-end Framework for Developing IoT Data Processing...
Steam++ An Extensible End-to-end Framework for Developing IoT Data Processing...Steam++ An Extensible End-to-end Framework for Developing IoT Data Processing...
Steam++ An Extensible End-to-end Framework for Developing IoT Data Processing...
 
ENCRYPTION BASED WATERMARKING TECHNIQUE FOR SECURITY OF MEDICAL IMAGE
ENCRYPTION BASED WATERMARKING TECHNIQUE FOR SECURITY OF MEDICAL IMAGEENCRYPTION BASED WATERMARKING TECHNIQUE FOR SECURITY OF MEDICAL IMAGE
ENCRYPTION BASED WATERMARKING TECHNIQUE FOR SECURITY OF MEDICAL IMAGE
 
March 2021: Top 10 Read Article in Computer Science & Information Technology
March 2021: Top 10 Read Article in Computer Science & Information TechnologyMarch 2021: Top 10 Read Article in Computer Science & Information Technology
March 2021: Top 10 Read Article in Computer Science & Information Technology
 
Book-Trusted-Digital-Repositories-APA-CDAC-2014
Book-Trusted-Digital-Repositories-APA-CDAC-2014Book-Trusted-Digital-Repositories-APA-CDAC-2014
Book-Trusted-Digital-Repositories-APA-CDAC-2014
 
Research trends on CAPTCHA: A systematic literature
Research trends on CAPTCHA: A systematic literature Research trends on CAPTCHA: A systematic literature
Research trends on CAPTCHA: A systematic literature
 
Safely Scaling Virtual Private Network for a Major Telecom Company during A P...
Safely Scaling Virtual Private Network for a Major Telecom Company during A P...Safely Scaling Virtual Private Network for a Major Telecom Company during A P...
Safely Scaling Virtual Private Network for a Major Telecom Company during A P...
 

Similar to Schedule for the 13th Annual Conference of the Midwest AIS

Toward Understanding the Impact of Artificial Intelligence on Education: An E...
Toward Understanding the Impact of Artificial Intelligence on Education: An E...Toward Understanding the Impact of Artificial Intelligence on Education: An E...
Toward Understanding the Impact of Artificial Intelligence on Education: An E...Dr Poonsri Vate-U-Lan
 
Pdfslide.net book of-abstracts-insight-student-conference-2015
Pdfslide.net book of-abstracts-insight-student-conference-2015Pdfslide.net book of-abstracts-insight-student-conference-2015
Pdfslide.net book of-abstracts-insight-student-conference-2015Zia Ush Shamszaman
 
International journal of computer (ijc) (issn 2307 4523) volume 8 no1 2013
International journal of computer (ijc) (issn 2307 4523) volume 8 no1 2013International journal of computer (ijc) (issn 2307 4523) volume 8 no1 2013
International journal of computer (ijc) (issn 2307 4523) volume 8 no1 2013Mohammad Nassar
 
Jackie Rees
Jackie ReesJackie Rees
Jackie Reesbutest
 
Humangenderidentificationusingmachinelearning.pptx
Humangenderidentificationusingmachinelearning.pptxHumangenderidentificationusingmachinelearning.pptx
Humangenderidentificationusingmachinelearning.pptxkhajurianavam
 
Responsible AI
Responsible AIResponsible AI
Responsible AINeo4j
 
Inauguration Function - Ohio Center of Excellence in Knowledge-Enabled Comput...
Inauguration Function - Ohio Center of Excellence in Knowledge-Enabled Comput...Inauguration Function - Ohio Center of Excellence in Knowledge-Enabled Comput...
Inauguration Function - Ohio Center of Excellence in Knowledge-Enabled Comput...Artificial Intelligence Institute at UofSC
 
Webinar slides sept 23 2021 mary aiken
Webinar slides sept 23 2021 mary aikenWebinar slides sept 23 2021 mary aiken
Webinar slides sept 23 2021 mary aikenCapitolTechU
 
Handbook of Informatics for Nurses and Healthcare Profes
Handbook of Informatics for Nurses and Healthcare ProfesHandbook of Informatics for Nurses and Healthcare Profes
Handbook of Informatics for Nurses and Healthcare ProfesJeanmarieColbert3
 
Defining the boundary for AI research in Intelligent Systems Dec 2021
Defining the boundary for AI research in Intelligent Systems Dec  2021Defining the boundary for AI research in Intelligent Systems Dec  2021
Defining the boundary for AI research in Intelligent Systems Dec 2021Parasuram Balasubramanian
 
Comprehensive Viewpoint Representations for a Deeper Understanding of User In...
Comprehensive Viewpoint Representations for a Deeper Understanding of User In...Comprehensive Viewpoint Representations for a Deeper Understanding of User In...
Comprehensive Viewpoint Representations for a Deeper Understanding of User In...TimDraws
 
تحلیل شبکه‌های اجتماعی چرا و چگونه
تحلیل شبکه‌های اجتماعی چرا و چگونهتحلیل شبکه‌های اجتماعی چرا و چگونه
تحلیل شبکه‌های اجتماعی چرا و چگونهskillupevent
 
UVA School of Data Science
UVA School of Data ScienceUVA School of Data Science
UVA School of Data SciencePhilip Bourne
 
Running head ANNOTATED BIBLIOGRAPHYANNOTATED BIBLIOGRAPHY2.docx
Running head ANNOTATED BIBLIOGRAPHYANNOTATED BIBLIOGRAPHY2.docxRunning head ANNOTATED BIBLIOGRAPHYANNOTATED BIBLIOGRAPHY2.docx
Running head ANNOTATED BIBLIOGRAPHYANNOTATED BIBLIOGRAPHY2.docxhealdkathaleen
 
Who Watches the Watchers Metrics for Security Strategy - BsidesLV 2015 - Roytman
Who Watches the Watchers Metrics for Security Strategy - BsidesLV 2015 - RoytmanWho Watches the Watchers Metrics for Security Strategy - BsidesLV 2015 - Roytman
Who Watches the Watchers Metrics for Security Strategy - BsidesLV 2015 - RoytmanMichael Roytman
 
Kentaro 2009 02 11 CooperacióN Toyama
Kentaro 2009 02 11 CooperacióN   ToyamaKentaro 2009 02 11 CooperacióN   Toyama
Kentaro 2009 02 11 CooperacióN ToyamaCOOPERACION 2.0 2009
 
HCMDSS11 Workshop Agenda
HCMDSS11 Workshop AgendaHCMDSS11 Workshop Agenda
HCMDSS11 Workshop AgendamLab
 

Similar to Schedule for the 13th Annual Conference of the Midwest AIS (20)

Toward Understanding the Impact of Artificial Intelligence on Education: An E...
Toward Understanding the Impact of Artificial Intelligence on Education: An E...Toward Understanding the Impact of Artificial Intelligence on Education: An E...
Toward Understanding the Impact of Artificial Intelligence on Education: An E...
 
MSR 2013 Preview
MSR 2013 PreviewMSR 2013 Preview
MSR 2013 Preview
 
Data Mining
Data MiningData Mining
Data Mining
 
Pdfslide.net book of-abstracts-insight-student-conference-2015
Pdfslide.net book of-abstracts-insight-student-conference-2015Pdfslide.net book of-abstracts-insight-student-conference-2015
Pdfslide.net book of-abstracts-insight-student-conference-2015
 
International journal of computer (ijc) (issn 2307 4523) volume 8 no1 2013
International journal of computer (ijc) (issn 2307 4523) volume 8 no1 2013International journal of computer (ijc) (issn 2307 4523) volume 8 no1 2013
International journal of computer (ijc) (issn 2307 4523) volume 8 no1 2013
 
Jackie Rees
Jackie ReesJackie Rees
Jackie Rees
 
Machine learning advances in 2020
Machine learning advances in 2020Machine learning advances in 2020
Machine learning advances in 2020
 
Humangenderidentificationusingmachinelearning.pptx
Humangenderidentificationusingmachinelearning.pptxHumangenderidentificationusingmachinelearning.pptx
Humangenderidentificationusingmachinelearning.pptx
 
Responsible AI
Responsible AIResponsible AI
Responsible AI
 
Inauguration Function - Ohio Center of Excellence in Knowledge-Enabled Comput...
Inauguration Function - Ohio Center of Excellence in Knowledge-Enabled Comput...Inauguration Function - Ohio Center of Excellence in Knowledge-Enabled Comput...
Inauguration Function - Ohio Center of Excellence in Knowledge-Enabled Comput...
 
Webinar slides sept 23 2021 mary aiken
Webinar slides sept 23 2021 mary aikenWebinar slides sept 23 2021 mary aiken
Webinar slides sept 23 2021 mary aiken
 
Handbook of Informatics for Nurses and Healthcare Profes
Handbook of Informatics for Nurses and Healthcare ProfesHandbook of Informatics for Nurses and Healthcare Profes
Handbook of Informatics for Nurses and Healthcare Profes
 
Defining the boundary for AI research in Intelligent Systems Dec 2021
Defining the boundary for AI research in Intelligent Systems Dec  2021Defining the boundary for AI research in Intelligent Systems Dec  2021
Defining the boundary for AI research in Intelligent Systems Dec 2021
 
Comprehensive Viewpoint Representations for a Deeper Understanding of User In...
Comprehensive Viewpoint Representations for a Deeper Understanding of User In...Comprehensive Viewpoint Representations for a Deeper Understanding of User In...
Comprehensive Viewpoint Representations for a Deeper Understanding of User In...
 
تحلیل شبکه‌های اجتماعی چرا و چگونه
تحلیل شبکه‌های اجتماعی چرا و چگونهتحلیل شبکه‌های اجتماعی چرا و چگونه
تحلیل شبکه‌های اجتماعی چرا و چگونه
 
UVA School of Data Science
UVA School of Data ScienceUVA School of Data Science
UVA School of Data Science
 
Running head ANNOTATED BIBLIOGRAPHYANNOTATED BIBLIOGRAPHY2.docx
Running head ANNOTATED BIBLIOGRAPHYANNOTATED BIBLIOGRAPHY2.docxRunning head ANNOTATED BIBLIOGRAPHYANNOTATED BIBLIOGRAPHY2.docx
Running head ANNOTATED BIBLIOGRAPHYANNOTATED BIBLIOGRAPHY2.docx
 
Who Watches the Watchers Metrics for Security Strategy - BsidesLV 2015 - Roytman
Who Watches the Watchers Metrics for Security Strategy - BsidesLV 2015 - RoytmanWho Watches the Watchers Metrics for Security Strategy - BsidesLV 2015 - Roytman
Who Watches the Watchers Metrics for Security Strategy - BsidesLV 2015 - Roytman
 
Kentaro 2009 02 11 CooperacióN Toyama
Kentaro 2009 02 11 CooperacióN   ToyamaKentaro 2009 02 11 CooperacióN   Toyama
Kentaro 2009 02 11 CooperacióN Toyama
 
HCMDSS11 Workshop Agenda
HCMDSS11 Workshop AgendaHCMDSS11 Workshop Agenda
HCMDSS11 Workshop Agenda
 

More from Maurice Dawson

Understanding the Challenge of Cybersecurity in Critical Infrastructure Sectors
Understanding the Challenge of Cybersecurity in Critical Infrastructure SectorsUnderstanding the Challenge of Cybersecurity in Critical Infrastructure Sectors
Understanding the Challenge of Cybersecurity in Critical Infrastructure SectorsMaurice Dawson
 
Unprotected Data: Your Risk of Internet-Enabled Psychological and Information...
Unprotected Data: Your Risk of Internet-Enabled Psychological and Information...Unprotected Data: Your Risk of Internet-Enabled Psychological and Information...
Unprotected Data: Your Risk of Internet-Enabled Psychological and Information...Maurice Dawson
 
Security Solutions for Hyperconnectivity in the Internet of Things
Security Solutions for Hyperconnectivity in the Internet of ThingsSecurity Solutions for Hyperconnectivity in the Internet of Things
Security Solutions for Hyperconnectivity in the Internet of ThingsMaurice Dawson
 
Framework for the Development of Virtual Labs for Industrial Internet of Thin...
Framework for the Development of Virtual Labs for Industrial Internet of Thin...Framework for the Development of Virtual Labs for Industrial Internet of Thin...
Framework for the Development of Virtual Labs for Industrial Internet of Thin...Maurice Dawson
 
Unprepared for Cybersecurity in Saudi Arabia: Argument for a Shift Towards Cy...
Unprepared for Cybersecurity in Saudi Arabia: Argument for a Shift Towards Cy...Unprepared for Cybersecurity in Saudi Arabia: Argument for a Shift Towards Cy...
Unprepared for Cybersecurity in Saudi Arabia: Argument for a Shift Towards Cy...Maurice Dawson
 
CTRL, Search, Exploit, and Destroy
CTRL, Search, Exploit, and DestroyCTRL, Search, Exploit, and Destroy
CTRL, Search, Exploit, and DestroyMaurice Dawson
 
MWAIS Fall 2017 Newsletter
MWAIS Fall 2017 NewsletterMWAIS Fall 2017 Newsletter
MWAIS Fall 2017 NewsletterMaurice Dawson
 
MWAIS Fall 2018 Newsletter
MWAIS Fall 2018 NewsletterMWAIS Fall 2018 Newsletter
MWAIS Fall 2018 NewsletterMaurice Dawson
 
Information Technology Use in West African Agriculture – challenges and oppor...
Information Technology Use in West African Agriculture – challenges and oppor...Information Technology Use in West African Agriculture – challenges and oppor...
Information Technology Use in West African Agriculture – challenges and oppor...Maurice Dawson
 
The Case for IT Training within Guinea’s Ministry of Agriculture: Evaluating ...
The Case for IT Training within Guinea’s Ministry of Agriculture: Evaluating ...The Case for IT Training within Guinea’s Ministry of Agriculture: Evaluating ...
The Case for IT Training within Guinea’s Ministry of Agriculture: Evaluating ...Maurice Dawson
 
UMSL IS | Farmer 2 Farmer Program
UMSL IS | Farmer 2 Farmer ProgramUMSL IS | Farmer 2 Farmer Program
UMSL IS | Farmer 2 Farmer ProgramMaurice Dawson
 
Midwest Association for Information Systems - MWAIS2018
Midwest Association for Information Systems - MWAIS2018Midwest Association for Information Systems - MWAIS2018
Midwest Association for Information Systems - MWAIS2018Maurice Dawson
 
MWAIS 2018 - 13th Annual Conference
MWAIS 2018 - 13th Annual ConferenceMWAIS 2018 - 13th Annual Conference
MWAIS 2018 - 13th Annual ConferenceMaurice Dawson
 
MWAIS 2018 : 13th Annual Conference of the Midwest Association for Informatio...
MWAIS 2018 : 13th Annual Conference of the Midwest Association for Informatio...MWAIS 2018 : 13th Annual Conference of the Midwest Association for Informatio...
MWAIS 2018 : 13th Annual Conference of the Midwest Association for Informatio...Maurice Dawson
 
Technological Advancements for Intelligence Collection, Analysis, and Dissemi...
Technological Advancements for Intelligence Collection, Analysis, and Dissemi...Technological Advancements for Intelligence Collection, Analysis, and Dissemi...
Technological Advancements for Intelligence Collection, Analysis, and Dissemi...Maurice Dawson
 
Hacking, Privacy and Security in a Hyperconnected Society
Hacking, Privacy and Security in a Hyperconnected SocietyHacking, Privacy and Security in a Hyperconnected Society
Hacking, Privacy and Security in a Hyperconnected SocietyMaurice Dawson
 
University of Missouri - Saint Louis Cyber Security
University of Missouri - Saint Louis Cyber SecurityUniversity of Missouri - Saint Louis Cyber Security
University of Missouri - Saint Louis Cyber SecurityMaurice Dawson
 
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017Maurice Dawson
 
Security Solutions for Hyperconnectivity and the Internet of Things
Security Solutions for Hyperconnectivity and the Internet of ThingsSecurity Solutions for Hyperconnectivity and the Internet of Things
Security Solutions for Hyperconnectivity and the Internet of ThingsMaurice Dawson
 
Microblogging in higher education: Digital Natives, knowledge creation, socia...
Microblogging in higher education: Digital Natives, knowledge creation, socia...Microblogging in higher education: Digital Natives, knowledge creation, socia...
Microblogging in higher education: Digital Natives, knowledge creation, socia...Maurice Dawson
 

More from Maurice Dawson (20)

Understanding the Challenge of Cybersecurity in Critical Infrastructure Sectors
Understanding the Challenge of Cybersecurity in Critical Infrastructure SectorsUnderstanding the Challenge of Cybersecurity in Critical Infrastructure Sectors
Understanding the Challenge of Cybersecurity in Critical Infrastructure Sectors
 
Unprotected Data: Your Risk of Internet-Enabled Psychological and Information...
Unprotected Data: Your Risk of Internet-Enabled Psychological and Information...Unprotected Data: Your Risk of Internet-Enabled Psychological and Information...
Unprotected Data: Your Risk of Internet-Enabled Psychological and Information...
 
Security Solutions for Hyperconnectivity in the Internet of Things
Security Solutions for Hyperconnectivity in the Internet of ThingsSecurity Solutions for Hyperconnectivity in the Internet of Things
Security Solutions for Hyperconnectivity in the Internet of Things
 
Framework for the Development of Virtual Labs for Industrial Internet of Thin...
Framework for the Development of Virtual Labs for Industrial Internet of Thin...Framework for the Development of Virtual Labs for Industrial Internet of Thin...
Framework for the Development of Virtual Labs for Industrial Internet of Thin...
 
Unprepared for Cybersecurity in Saudi Arabia: Argument for a Shift Towards Cy...
Unprepared for Cybersecurity in Saudi Arabia: Argument for a Shift Towards Cy...Unprepared for Cybersecurity in Saudi Arabia: Argument for a Shift Towards Cy...
Unprepared for Cybersecurity in Saudi Arabia: Argument for a Shift Towards Cy...
 
CTRL, Search, Exploit, and Destroy
CTRL, Search, Exploit, and DestroyCTRL, Search, Exploit, and Destroy
CTRL, Search, Exploit, and Destroy
 
MWAIS Fall 2017 Newsletter
MWAIS Fall 2017 NewsletterMWAIS Fall 2017 Newsletter
MWAIS Fall 2017 Newsletter
 
MWAIS Fall 2018 Newsletter
MWAIS Fall 2018 NewsletterMWAIS Fall 2018 Newsletter
MWAIS Fall 2018 Newsletter
 
Information Technology Use in West African Agriculture – challenges and oppor...
Information Technology Use in West African Agriculture – challenges and oppor...Information Technology Use in West African Agriculture – challenges and oppor...
Information Technology Use in West African Agriculture – challenges and oppor...
 
The Case for IT Training within Guinea’s Ministry of Agriculture: Evaluating ...
The Case for IT Training within Guinea’s Ministry of Agriculture: Evaluating ...The Case for IT Training within Guinea’s Ministry of Agriculture: Evaluating ...
The Case for IT Training within Guinea’s Ministry of Agriculture: Evaluating ...
 
UMSL IS | Farmer 2 Farmer Program
UMSL IS | Farmer 2 Farmer ProgramUMSL IS | Farmer 2 Farmer Program
UMSL IS | Farmer 2 Farmer Program
 
Midwest Association for Information Systems - MWAIS2018
Midwest Association for Information Systems - MWAIS2018Midwest Association for Information Systems - MWAIS2018
Midwest Association for Information Systems - MWAIS2018
 
MWAIS 2018 - 13th Annual Conference
MWAIS 2018 - 13th Annual ConferenceMWAIS 2018 - 13th Annual Conference
MWAIS 2018 - 13th Annual Conference
 
MWAIS 2018 : 13th Annual Conference of the Midwest Association for Informatio...
MWAIS 2018 : 13th Annual Conference of the Midwest Association for Informatio...MWAIS 2018 : 13th Annual Conference of the Midwest Association for Informatio...
MWAIS 2018 : 13th Annual Conference of the Midwest Association for Informatio...
 
Technological Advancements for Intelligence Collection, Analysis, and Dissemi...
Technological Advancements for Intelligence Collection, Analysis, and Dissemi...Technological Advancements for Intelligence Collection, Analysis, and Dissemi...
Technological Advancements for Intelligence Collection, Analysis, and Dissemi...
 
Hacking, Privacy and Security in a Hyperconnected Society
Hacking, Privacy and Security in a Hyperconnected SocietyHacking, Privacy and Security in a Hyperconnected Society
Hacking, Privacy and Security in a Hyperconnected Society
 
University of Missouri - Saint Louis Cyber Security
University of Missouri - Saint Louis Cyber SecurityUniversity of Missouri - Saint Louis Cyber Security
University of Missouri - Saint Louis Cyber Security
 
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
 
Security Solutions for Hyperconnectivity and the Internet of Things
Security Solutions for Hyperconnectivity and the Internet of ThingsSecurity Solutions for Hyperconnectivity and the Internet of Things
Security Solutions for Hyperconnectivity and the Internet of Things
 
Microblogging in higher education: Digital Natives, knowledge creation, socia...
Microblogging in higher education: Digital Natives, knowledge creation, socia...Microblogging in higher education: Digital Natives, knowledge creation, socia...
Microblogging in higher education: Digital Natives, knowledge creation, socia...
 

Recently uploaded

TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providermohitmore19
 
Payment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdf
Payment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdfPayment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdf
Payment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdfkalichargn70th171
 
ManageIQ - Sprint 236 Review - Slide Deck
ManageIQ - Sprint 236 Review - Slide DeckManageIQ - Sprint 236 Review - Slide Deck
ManageIQ - Sprint 236 Review - Slide DeckManageIQ
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...ICS
 
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrainmasabamasaba
 
%in ivory park+277-882-255-28 abortion pills for sale in ivory park
%in ivory park+277-882-255-28 abortion pills for sale in ivory park %in ivory park+277-882-255-28 abortion pills for sale in ivory park
%in ivory park+277-882-255-28 abortion pills for sale in ivory park masabamasaba
 
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Steffen Staab
 
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...SelfMade bd
 
%in Midrand+277-882-255-28 abortion pills for sale in midrand
%in Midrand+277-882-255-28 abortion pills for sale in midrand%in Midrand+277-882-255-28 abortion pills for sale in midrand
%in Midrand+277-882-255-28 abortion pills for sale in midrandmasabamasaba
 
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfonteinmasabamasaba
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxComplianceQuest1
 
The title is not connected to what is inside
The title is not connected to what is insideThe title is not connected to what is inside
The title is not connected to what is insideshinachiaurasa2
 
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
Direct Style Effect Systems -The Print[A] Example- A Comprehension AidDirect Style Effect Systems -The Print[A] Example- A Comprehension Aid
Direct Style Effect Systems - The Print[A] Example - A Comprehension AidPhilip Schwarz
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Modelsaagamshah0812
 
10 Trends Likely to Shape Enterprise Technology in 2024
10 Trends Likely to Shape Enterprise Technology in 202410 Trends Likely to Shape Enterprise Technology in 2024
10 Trends Likely to Shape Enterprise Technology in 2024Mind IT Systems
 
VTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learnVTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learnAmarnathKambale
 
Exploring the Best Video Editing App.pdf
Exploring the Best Video Editing App.pdfExploring the Best Video Editing App.pdf
Exploring the Best Video Editing App.pdfproinshot.com
 
Define the academic and professional writing..pdf
Define the academic and professional writing..pdfDefine the academic and professional writing..pdf
Define the academic and professional writing..pdfPearlKirahMaeRagusta1
 
AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM TechniquesAI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM TechniquesVictorSzoltysek
 
%in kempton park+277-882-255-28 abortion pills for sale in kempton park
%in kempton park+277-882-255-28 abortion pills for sale in kempton park %in kempton park+277-882-255-28 abortion pills for sale in kempton park
%in kempton park+277-882-255-28 abortion pills for sale in kempton park masabamasaba
 

Recently uploaded (20)

TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service provider
 
Payment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdf
Payment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdfPayment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdf
Payment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdf
 
ManageIQ - Sprint 236 Review - Slide Deck
ManageIQ - Sprint 236 Review - Slide DeckManageIQ - Sprint 236 Review - Slide Deck
ManageIQ - Sprint 236 Review - Slide Deck
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
 
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
 
%in ivory park+277-882-255-28 abortion pills for sale in ivory park
%in ivory park+277-882-255-28 abortion pills for sale in ivory park %in ivory park+277-882-255-28 abortion pills for sale in ivory park
%in ivory park+277-882-255-28 abortion pills for sale in ivory park
 
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
 
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
 
%in Midrand+277-882-255-28 abortion pills for sale in midrand
%in Midrand+277-882-255-28 abortion pills for sale in midrand%in Midrand+277-882-255-28 abortion pills for sale in midrand
%in Midrand+277-882-255-28 abortion pills for sale in midrand
 
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docx
 
The title is not connected to what is inside
The title is not connected to what is insideThe title is not connected to what is inside
The title is not connected to what is inside
 
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
Direct Style Effect Systems -The Print[A] Example- A Comprehension AidDirect Style Effect Systems -The Print[A] Example- A Comprehension Aid
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Models
 
10 Trends Likely to Shape Enterprise Technology in 2024
10 Trends Likely to Shape Enterprise Technology in 202410 Trends Likely to Shape Enterprise Technology in 2024
10 Trends Likely to Shape Enterprise Technology in 2024
 
VTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learnVTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learn
 
Exploring the Best Video Editing App.pdf
Exploring the Best Video Editing App.pdfExploring the Best Video Editing App.pdf
Exploring the Best Video Editing App.pdf
 
Define the academic and professional writing..pdf
Define the academic and professional writing..pdfDefine the academic and professional writing..pdf
Define the academic and professional writing..pdf
 
AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM TechniquesAI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
 
%in kempton park+277-882-255-28 abortion pills for sale in kempton park
%in kempton park+277-882-255-28 abortion pills for sale in kempton park %in kempton park+277-882-255-28 abortion pills for sale in kempton park
%in kempton park+277-882-255-28 abortion pills for sale in kempton park
 

Schedule for the 13th Annual Conference of the Midwest AIS

  • 1. Midwest Association for Information Systems (MWAIS) 2018 Conference Schedule May 17-18, 2018 Anheuser-Busch Hall University of Missouri-St. Louis One University Blvd., St. Louis, MO 63121 Wednesday, May 16 TIME LOCATION EVENT 5.00-7.00 PM ABH 103 MWAIS Welcome Reception. Volunteers will shuttle attendees to and from the Conference Hotel (Renaissance St. Louis, 9801 Natural Bridge Rd, St. Louis, MO 63134) to UMSL. Thursday, May 17 TIME LOCATION EVENT 7.15-9.15 AM Conference Hotel Lobby Shuttle service to UMSL campus 7.30 AM–4.00 PM ABH Ground Floor Lobby Conference Registration 7.30-8.30 AM ABH 103 Continental Breakfast 8.30 AM-4.30 PM ABH Ground Floor Lobby Sponsor Exhibits 8.30-8.45 AM ABH 103 Conference Kick Of and Welcome 8.45-9.45 AM ABH 103 Welcome Keynote Col. Terrence Adams, Scott Air Force Base 9.45-10.00 AM ABH 103 Morning Break 10.00–11.00 AM SESSION A1 (Three Concurrent Tracks) ABH 001 Workshop: Innovative low-code tool for Systems Analysis and Design, Daniela Field and Kat Brandenburg (Mendix) ABH 002 Cybersecurity Policy and Behavior Manifest Observations on a Comprehensive Computer Security Policy, Dennis Acuna The Development of an Open Source Intelligence Gathering Exercise for Teaching Information Security & Privacy, Jacob Young, Kerstyn Campbell, Angelica Fanti, Alex Alicea, Matthew Weiss, Justin Burkhart and Matthew Braasch Effect of Probable and Guaranteed Monetary Vaalue Gains and Losses on Cybersecurity Behavior of Users, Santhosh Kumar Ravindran, Fiona Fui-Hoon Nah and Maggie X. Cheng Trade-offs between Monetary Gain and Ris Ta ing in Cybersecurity Behavior, Xinhui Zhan, Fiona Fui-Hoon Nah and Maggie X. Cheng 1
  • 2. ABH 003 Technological Applications Modeling Trust in the Adoption Decision Process of Robo-Advisors: An Agent-Based Simulation Approach, Sangho Lee, Jae Choi, Thomas Ngo-Ye and Maeve Cummings Context-Dependent Information Elements in the Car: Explorative Analysis of Static and Dynamic Head-Up- Displays, Matthias Gottlieb, Peter Zarnitz, Markus Böhm and Helmut Krcmar Preliminary Insights into Social Commerce Capability Development, Edward Entee, Joseph Budu and Richard Boateng Green Communication in Cellular Networ s, Shahram Moradi and Connie S. Barber 11.05 AM–12.05 PM SESSION A2: Three Concurrent Tracks ABH 001 Panel: Distance Education Best Practices: Innovation and Pedagogy, Terrence Duncan, Emad Rahim, Darrell Burrell, Dave Carter and Bill Davis ABH 002 Social Issues The Case for IT Training within Guinea’s Ministry of Agriculture: Evaluating Performance and Usability, Maurice Dawson, Damon Walker and Simon Cleveland The Perception of Cyber Security in High School Girls, Kanthi Narukonda and Pam Rowland The Signifcance of Professional Associations: Addressing the Cybersecurity Talent Gap, Calvin Nobles and Darrell Burrell IoT entrepreneurship, Michael Chuang ABH 003 Human and Machine Learning Neural Correlates of States of User Experience in Gaming using EEG and Predictive Analytics, Chandana Mallapragada, Fiona Fui-Hoon Nah, Keng Siau, Langtao Chen and Tejaswini Yelamanchili The Role of Message Structure on the Effectiveness of Security Messages: A Neuro-Investigation, Roozmehr Safi, Glenn J. Browne and Eric Walden Assessing Classical and Expressive Aesthetics of Web pages Using Machine Learning, Ang Chen, Fiona Fui- Hoon Nah and Langtao Chen Efficient Reduced-Bias Genetic Algorithm RERBGAt for Generic Community Detection Objectives, Aditya Karnam Gururaj Rao, Sanjiv Bhatia, Cezary Janikow and Sharlee Climer 2
  • 3. 12.15 PM ABH Terrace Lawn Group photo 12.30–1.30 PM ABH 001 Emerson Sponsored Lunch, MWAIS Board Meeting 1.45–2.45 PM ABH 001 CIO Panel: Cybersecurity in the Trenches, Moderator Mary Sumner, Panelists: Michael Gibbons, CIO-Edward Jones, Lawrence Casey, CIO-True Manufacturing, Jef Robertson, CIO-Thompson Coburn 2.50–3.50 PM SESSION A3: Three Concurrent Tracks ABH 001 Theoretical Models Complying with BYOD Security Policies: A Moderation Model, Cindy Zhiling Tu, Joni Adkins and Gary Yu Zhao An Equity Perspective on Knowledge Sharing Behaviors in Organizations, Prasad Rudramuniyaiah, Kailash Joshi and Kyootai Lee The Current Development of Technology Model in E- Commerce and Suggestion for Future Research, Shafeeq Ur Rahaman, Noel Merwyn Badugula and Te- Wei Wang Shipping and Return-Shipping Costs do not Cost the Same: The Role of Gender and Product Price in Online Buying, Gaurav Bansal and Emma Nies ABH 002 Secure Passwords Cybersecurity: Personal Information and Password Setup, Yizhi Ma and Nathan Twyman Password Memorability and Strength using an Image, Cameron Burns and Nathan Twyman Supervised Machine Learning Techniques, Cybersecurity Habits and Human Generated Password Entropy for Hac ing Prediction, Pedro Taveras and Liliana Hernandez Toirac Artifcial Intelligence-Based Password Brute Force Attac s, Khoa D Trieu and Yi Yang ABH 003 Artifcial Intelligence Artifcial Intelligence: A Study on Governance, Policies, and Regulations, Weiyu Wang and Keng Siau A Qualitative Research on Mar eting and Sales in the Artifcial Intelligence Age, Sara Yang and Keng Siau Artifcial Intelligence Impacts on Higher Education, Yizhi Ma and Keng Siau Use of Artifcial Intelligence, Machine Learning, and Autonomous Technologies in the Mining Industry, Zeshan Hyder, Keng Siau and Fiona Nah 3.50–4.05 PM ABH Afternoon Break – cofee and cookies 3
  • 4. Ground Floor Lobby 4.05–5.05 PM SESSION A4: Four Concurrent Tracks ABH 001 Panel: Information Technology Use in West African Agriculture – Challenges and Opportunities, Maurice Dawson, Damon Walker and Ashley Moss ABH 002 Pedagogy Mobile Course Feedbac System for Improving Student Engagement, Nathaniel Williams, Jake Mondschein, Mark Farmer and Nathan Twyman The Impact of Guided Learning on Student Achievement and Retention in an Online Course Environment: A Refection on Introductory MIS Courses, Shaun Moore and Amy Rutledge When your students are quest-masters: Gamifying Information Systems Course Content, Connie Barber Extrinsic and Intrinsic Motivations: An Experiment on the role of Competitions in Teaching and Learning, Elahe Javadi and Shivam Verma ABH 003 Research-in-Progress A Research Agenda on Using Conceptual Models for User Story Development, Abhimanyu Gupta, Geert Poels and Palash Bera Project Management Assurance in Agile Projects, Dawn Owens, Jefrey Merhout and Deepak Khazanchi Decision Support Systems for Recruiting College Athletes, Conrad Schmid Exploring the Relative Sustainability Efficiency of Organizations: A DEA Approach, Daphne Simmonds and Abel Moreno ABH 004 Research-in-Progress An Integrated Concept for Supply Chain Analytics in Small-Medium Sized Enterprises, Tobias Engel, Dany Meyer, and Joerg-Oliver Vogt Toward Understanding Customer Preference Factors in Agile – A Research Plan, David Bishop and Pam Rowland How Wearable Technology will Replace Vaerbal Authentication or Passwords for Universal Secure Authentication for Healthcare, Chad Fenner and Cherie Noteboom 5.15 PM ABH Ground Floor Shuttle Service to Conference Hotel and then on to the Missouri Botanical Garden 6.00–9.00 PM Conference Shuttle service to the Missouri Botanical Garden 4
  • 5. Hotel Lobby (approximately at the top of every hour) 6.00-10.00 PM UMSL SPONSORED SOCIAL EVENT: Missouri Botanical Garden Cocktail reception, bufet dinner, and self-guided tours of the garden 10.00 PM Last shuttle service to the Conference Hotel Friday, May 18 TIME LOCATION EVENT 8.00-10.00 AM Conference Hotel Lobby Shuttle service to UMSL campus 8.00 AM–Noon ABH Ground Floor Lobby Conference Registration 8.00 AM–Noon ABH Ground Floor Lobby Sponsor Exhibits 8.00-9.00 AM ABH 103 Continental Breakfast and Morning Keynote Lt. Col. George Sconyers, Scott Air Force Base 9.00–10.00 AM SESSION B1 (Three Concurrent Tracks) ABH 001 Workshop: Innovative low-code tool for Systems Analysis and Design, Daniela Field and Kat Brandenburg (Mendix) ABH 002 Technology and Cybersecurity Leadership Toward Cybersecurity Leadership Framewor , Simon Cleveland and Marisa Cleveland (via Zoom conference) Cybercrime Post-incident Leadership Model, Marisa Cleveland and Simon Cleveland (via Zoom conference) Theoretical Trends in IS/T Leadership: A Review of Published Research, Abhishek Tripathi and Deepak Khazanchi Fear and Loathing of Cybersecurity: What Keeps IT Executives Awa e at Night, Steven Wallace and Karen Green ABH 003 Healthcare Role of Decision Ma ing in Predicting Health Behavior, Neetu Singh, Apoorva Kanthwal, Prashant Bidhuri and Anusha Vijaykumar Munnolli Malaria Surveillance System Using Social Media, Jame Boit and Hassan Alyami Challenges in Healthcare Post-EMR Adoption, Terrence Duncan, Emad Rahim and Darrell Burrell Informational Vaideo Gaming in the Waiting Room, Mitchell Ramirez, Coltin Shields, Andrew Long, Nathaniel Burland, and Nathan Twyman 5
  • 6. 10.05-11.05 AM SESSION B2 (Two Concurrent Tracks) ABH 001 Panel: Artifcial Intelligence and The Future of Wor , Keng Siau, Mary Lacity and Vicki Sauter ABH 002 E-commerce, Security, and Online Communities Timing of Data Breach Announcement and E- Commerce Trust, Steven Muzatko and Gaurav Bansal Got Phished! Role of Top Management Support in Creating Phishing Safe Organizations, Gaurav Bansal Negative Effects of Online Health Communities on User’s Health, Tareq Nasralah, Ali Ahmed, Abdullah Wahbeh, Hassan Alyami and Areeba Ali The Case of Online Health Forums, Tareq Nasralah, Ali Ahmed, Abdullah Wahbeh, Hassan Alyami and Areeba Ali 11.15 AM-12.30 PM ABH 103 Mendix Sponsored Lunch and Research Keynote Prashant Palvia, University of North Carolina, Greensboro 12.30-12.45 PM ABH 103 Closing Comments 11.30 AM-1.00 PM ABH Ground Floor Shuttle Service to Conference Hotel. Last Bus departs at 1.00 PM. 6