Development of an Evaluation Model for XBRL-enabled Tools Intended for Investors
(
1508)
Barbara Clements, Southeast Missouri State University
Dana Schwieger, Southeast Missouri State University
Ken Surendran, Southeast Missouri State University
A Process for Assessing Voting System Risk Using Threat Trees(
1505)
Alec Yasinisac, University of South Alabama
J. Harold Pardue, University of South Alabama
On the utility of HCI practices in improving a commercial information retrieval system
(
1503)
Matt Burton Honeycutt, InRAD, LLC
James Kolpack, InRAD, LLC
Nathan Honeycutt, InRAD, LLC
Douglas Talbert, Tennessee Technological University
Meritorious Papers (top 15%)
Password Security Risk versus Effort: An Exploratory Study on
User-Perceived Risk and the Intention to Use Online Applications
(
1516)
Judith Gebauer, University of North Carolina Wilmington
Douglas M Kline,
University of North Carolina Wilmington
Ling He, Saginaw Valley State
University
What Influences People to Use Linux?
(
1509)
Susanna Fransen, Appalachian State University
Scott Hunsinger, Appalachian
State University