


default search action
SIGMIS-CPR 2019: Nashville, TN, USA
- Damien Joseph, Craig Van Slyke, Jonathan P. Allen, Jeria L. Quesenberry, Manuel Wiesche:

Proceedings of the 2019 on Computers and People Research Conference, SIGMIS-CPR 2019, Nashville, TN, USA, June 20-22, 2019. ACM 2019, ISBN 978-1-4503-6088-3
Keynote & Invited Talks
- Ephraim R. McLean:

Keynote: Were You There When?? 1-2
Poster Session
- Oduronke T. Eyitayo

, Goaletsa Rammidi:
A Comparative Study on the Academic Performance of Three Information System (IS) Streams at the University of Botswana. 3 - Laurie Giddens, Ester Gonzalez, Dorothy E. Leidner:

Unintended Consequences of Wearable Fitness Devices in Corporate Wellness Programs. 4
Panel Sessions
- Eileen M. Trauth, Allison J. Morgan Bryant, Curtis Cain, Leigh Ellen Potter

, Jeria L. Quesenberry, Suzanne Trauth, Craig Van Slyke
:
Addressing Social Inclusion in the IS Field through Theatre. 5-7 - Yaojie Li, Mary Sumner, Craig Van Slyke

, Thomas W. Ferratt, Thomas F. Stafford:
Elephant in the Classroom: Do Information Systems Professors Need to be More Techno-Savvy than Students? 8-9 - Jonathan P. Allen, T. Paul Thomas, Jonathan Ford:

Technology Entrepreneurship in the Digital Age. 10-11 - Manuel Wiesche, Damien Joseph

, Manju Ahuja, Mary Beth Watson-Manheim, Nishtha Langer
:
The Future of the IT Workforce. 12-13
IT Work and the Workforce
- Anna Wiedemann, Manuel Wiesche

, Helmut Krcmar:
Integrating Development and Operations in Cross-Functional Teams - Toward a DevOps Competency Model. 14-19 - Caroline Ernestine Oehlhorn, Sven Laumer, Christian Maier:

Sustaining the IT Workforce: A Review of Major Issues in 25 Years and Future Directions. 20-27 - Fred Niederman, Michelle L. Kaarst-Brown, Jeria L. Quesenberry, Tim Weitzel:

The Future of IT Work. 28-34
Ethics and Trust
- Lea Katharina Müller, Jens Mattke, Christian Maier, Tim Weitzel, Heinrich Graser:

Chatbot Acceptance: A Latent Profile Analysis on Individuals' Trust in Conversational Agents. 35-42 - Yong Tang

, Jason Jie Xiong, Rafael Becerril-Arreola, Lakshmi S. Iyer:
Blockchain Ethics Research: A Conceptual Model. 43-49 - Kerri Lynell Wood:

An Exploration into the Relationships of Ethical Decision Making and Moral Reasoning Among IT Specialists with Ethics Training, Education, and Ethical Leadership. 50-56
New Technologies
- Leigh Ellen Potter

, Alexandra Thompson
:
New and Emerging Technology: Ownership and Adoption. 57-66 - Donald E. Wynn Jr., Thomas W. Ferratt:

A Strategic View of IT and Innovativeness. 67-76
Poster Session
- Mashael Yousef Almoqbel

, Anchita Komalchand Likhar, Donghee Yvette Wohn:
Understanding Safety Concerns and Protection Behaviors of Rideshare Drivers. 77
Identity
- Lelia Hampton, Robert T. Cummings, Kinnis Gosha:

Improving Computer Science Instruction and Computer Use for African American Secondary School Students: A Focus Group Exploration of Computer Science Identity of African American Teachers. 78-84 - Caroline Ernestine Oehlhorn, Christian Maier, Sven Laumer, Tim Weitzel:

Attracting Young IT Professionals: An Empirical Study Using the Theory of Attractive Quality. 85-93
IT Interests and Skills
- Leonard Przybilla, Luka Baar, Manuel Wiesche

, Helmut Krcmar:
Machines as Teammates in Creative Teams: Digital Facilitation of the Dual Pathways to Creativity. 94-102
Identity
- Rui Sundrup, Jaime Windeler, Craig Froehle:

The Social Implications of Wearable Information Technologies: Extending IT Identity Theory. 103-108
Security
- Julie M. Haney, Wayne G. Lutters:

Motivating Cybersecurity Advocates: Implications for Recruitment and Retention. 109-117 - Faheem Ahmed Shaikh

, Damien Joseph
:
Effects of Information Security Legitimacy on Data Breach Consequences: Moderating Effect of Impression Management. 118-121 - Laura C. Amo, Dianna Cichocki:

Disgruntled yet Deft with IT: Employees who Pose Information Security Risk. 122-124 - Yaojie Li, Tom Stafford, Bryan Fuller

, Selwyn Ellis:
Information Securing in Organizations: A Dialectic Perspective. 125-130 - Craig Van Slyke

, William Grant Clary, Selwyn Ellis, Michele Maasberg:
Employer Preferences for Cybersecurity Skills among Information Systems Graduates. 131-134
Students and Curriculum
- Alana Platt, Onochie Fan-Osuala, Nicolas Herfel:

Understanding and Predicting Student Retention and Attrition in IT Undergraduates. 135-138 - Yaojie Li, Xuan Wang, Daqi Xin:

An Inquiry into AI University Curriculum and Market Demand: Facts, Fits, and Future Trends. 139-142 - Yaojie Li, John Finley, Rania Hodhod, Johnny C. Ho

, Jennifer Pitts:
The Role of Participative and Practical Goal-Setting in MIS Students Learning and Performance. 143-152
IT Interests and Skills
- Ronnie Jia, Heather H. Jia:

What Makes Us IT People?: Autistic Tendency and Intrinsic Interests in IT. 153-156 - Bernie S. Fabito

, Rafael Cabredo:
Exploring Game Aesthetics as Antecedents of Game Continuance: An Analysis in the Lens of Self-Determination Theory. 157-163
Identity
- Fred Niederman, Mary Sumner:

Resolving the Skills Paradox: A Content Analysis of a Jobs Database. 164-167
Collaboration and Teamwork
- Tenace Setor, Damien Joseph

:
When Agile Means Staying: The Relationship between Agile Development Usage and Individual IT Professional Outcomes. 168-175 - Leonard Przybilla, Manuel Wiesche

, Helmut Krcmar:
Emergent Leadership in Agile Teams-an Initial Exploration. 176-179 - Mary Beth Watson-Manheim, Manju K. Ahuja:

Multiple Team Membership in Software Development Gig Work. 180-182
Social Value
- Laura Gurney

, John J. D. Eveland, Indira R. Guzman
:
"What you say, I buy!": Information Diagnosticity and the Impact of Electronic Word-of-Mouth (eWOM) Consumer Reviews on Purchase Intention. 183-189 - Faiz Ahamad

:
Does Social Media Help in Attracting Talents? 190-194 - Carlos D. Buskey, Rajni Goel

, Curtis C. Cain:
Establishing a Framework to Measure Strategic Social Value of Online Engagements: A Model for Determining Social Identity. 195-199

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














