International Association for Computer Information Systems
Tuesday, April 13, 2021

Table of Contents - Volume 11, Issue 1



DEVELOPMENT AND DIFFUSION OF CUSTOMER RELATIONSHIP MANAGEMENT ACROSS DISCIPLINES: FAD OR FASHION?
Maria Barua,Godwin Udo
pp. 1-8
https://doi.org/10.48009/1_iis_2010_1-8

UTILIZING THE TECHNOLOGY ACCEPTANCE MODEL TO ASSESS THE EMPLOYEE ADOPTION OF INFORMATION SYSTEMS SECURITY MEASURES
Cynthia Jones,Richard McCarthy,Leila Halawi,Bahaudin Mujtaba
pp. 9-16
https://doi.org/10.48009/1_iis_2010_9-16

SOFTWARD PIRACY: EXPLORING AWARENESS OF THE LAW AS A DETERMINANT OF SOFTLIFTING ATTITUDE AND INTENTION
Pamela Dupin-Bryant
pp. 17-22
https://doi.org/10.48009/1_iis_2010_17-22

INFORMATION PROCESSING CHALLENGES IN FINANCIAL SUPPLY CHAINS
Richard Calvasina,Mysore Ramaswamy,Eugene Calvasina,Gerald Calvasina
pp. 23-28
https://doi.org/10.48009/1_iis_2010_23-28

THE PROCESS ARCHITECTURE OF INFORMATION SYSTEMS - HIGHER EDUCATION INSTITUTIONS MANAGERIAL TOOL
Srecko Natek,Dusan Lesjak
pp. 29-34
https://doi.org/10.48009/1_iis_2010_29-34

THE EVOLUTION AND IMPLEMENTATION OF GLOBAL ASSURANCE
Garry White
pp. 35-40
https://doi.org/10.48009/1_iis_2010_35-40

A LONGITUDINAL STUDY OF FINANCIAL EXECUTIVES' VIEWS ON INFORMATION SYSTEMS RETURNS AND KEY TECHNOLOGY ISSUES
Alan Peslak
pp. 41-47
https://doi.org/10.48009/1_iis_2010_41-47

TECHNICAL AND USABILITY TESTING OF A MEDICAL INTERACTION WORKGROUP APPLICATION SUPPORT SYSTEM (MIWASS)
James Rodger
pp. 48-54
https://doi.org/10.48009/1_iis_2010_48-54

HPC PORTAL DEVELOPMENT PLATFORM
Chien-Heng Wu
pp. 55-60
https://doi.org/10.48009/1_iis_2010_55-60

SOCIAL AND TECHNOLOGICAL CONCERNS ASSOCIATED WITH THE USAGE OF UBIQUITOUS COMPUTING TECHNOLOGIES
Carsten Rocker
pp. 61-68
https://doi.org/10.48009/1_iis_2010_61-68

USING INFORMATION AND COMMUNICATION TECHNOLOGIES TO RENDER TRANSPARENT GOVERNANCE IN TRANSITION COUNTRIES
Mysore Ramaswamy
pp. 69-76
https://doi.org/10.48009/1_iis_2010_69-76

SOFTWARE DEVELOPMENT AND INTELLECTUAL PROPERTY: WHAT YOU DON'T KNOW CAN HURT YOU
Janet Ford,Barbara White,Lorrie Willey
pp. 77-84
https://doi.org/10.48009/1_iis_2010_77-84

DO YOU WANT ME TO PUBLISH THAT NOW? A LEGAL ANALYSIS OF ONLINE PUBLISHING
Jason Triche,Sam Ramanujan,Someswar Kesh
pp. 85-89
https://doi.org/10.48009/1_iis_2010_85-89

USING OBJECT-RELATIONAL DATABASE TECHNOLOGY TO SOLVE PROBLEMS IN DATABASE DEVELOPMENT
Ming Wang
pp. 90-99
https://doi.org/10.48009/1_iis_2010_90-99

KNOWLEDGE-BASED SUPPLY CHAIN NETWORK: A SIMULATION APPLICATION DESIGN CONFIGURED WITH RADIO FREQUENCY IDENTIFICATION, FREIGHT TRAIN DISPATCH, AND CONTAINER SHIPMENTS
Andrew Chen,William Chen,Christina Chen
pp. 100-110
https://doi.org/10.48009/1_iis_2010_100-110

RFID UBIQUITY AND PRIVACY LOSS CONCERNS AN ANALYSIS OF A PENNSYLVANIA UNIVERSITY
David Douglas,Karen Paullet
pp. 111-118
https://doi.org/10.48009/1_iis_2010_111-118

EXPLORING COMPUTER ETHICS ISSUES IN MALAYSIA
Maslin Masrom,Zuraini Ismail,Rashidah Anuar,Ramlah Hussein,Norshidah Mohamed
pp. 119-128
https://doi.org/10.48009/1_iis_2010_119-128

AUTOMATIC INTERPRETATION OF ENGLISH SPEECH
Milam Aiken,Lakisha Simmons,Shilpa Balan
pp. 129-133
https://doi.org/10.48009/1_iis_2010_129-133

UNDERSTANDING THE BENEFITS OF SOCIAL EXCHANGE IN B2B COMMUNITIES
Lakisha Simmons,Chris Simmons,Anthony Ammeter,Kaushik Ghosh
pp. 134-141
https://doi.org/10.48009/1_iis_2010_134-141

WEB APPLICATION SECURITY TESTING: AN INDUSTRY PERSPECTIVE ON HOW ITS EDUCATION IS PERCEIVED
John Scarpino
pp. 142-153
https://doi.org/10.48009/1_iis_2010_142-153

DOES THE TECHNOLOGY PORTRAYED IN TELEVISION CRIME SHOWS HAVE AN EFFECT ON POTENTIAL JURORS?
Gary Davis,Karen Paullet,Max Houck,Tom Swan
pp. 154-163
https://doi.org/10.48009/1_iis_2010_154-163

STRATEGIES FOR IMPROVING SYSTEMS DEVELOPMENT PROJECT SUCCESS
Christopher Jones,Glen Gray,Anna Gold,David Miller
pp. 164-173
https://doi.org/10.48009/1_iis_2010_164-173

ANALYSIS OF AIRPORT SECURITY BASED ON THE FIVE COMPONENTS OF INFORMATION SYSTEMS
Juyun Cho,Tom Velazquez,Benedikt Kraus,Korakod Aphipanya
pp. 174-183
https://doi.org/10.48009/1_iis_2010_174-183

WHAT'S THIS TWITTER ALL ABOUT? AN E-PATIENT'S END-USER COMMUNITY (EUCY)
Elaine Winston
pp. 184-191
https://doi.org/10.48009/1_iis_2010_184-191

AN EVALUATION OF EMPLOYEES' ATTITUDES TOWARD SOCIAL NETWORKING IN THE WORKPLACE
Matthew North
pp. 192-197
https://doi.org/10.48009/1_iis_2010_192-197

A FRAMEWORK FOR MEASURING HAPPINESS IN ONLINE SOCIAL NETWORKS
Amy Chou,Billy Lim
pp. 198-203
https://doi.org/10.48009/1_iis_2010_198-203

EXPLORING MOBILE DEVICE SECURITY POLICIES IN HIGHER EDUCATION
Beth Jones,Lynn Heinrichs
pp. 204-210
https://doi.org/10.48009/1_iis_2010_204-210

ACCOUNTING PROFESSIONALS' VALUE ASSESSMENT OF ENTRY LEVEL IT SKILLS AND TOPICS: A COMPARISON OF THE DIFFERENCES BETWEEN CPA FIRMS AND INDUSTRY/GOVERNMENT ORGANIZATIONS
Orion Welch,Tom Madison,Sandra Welch
pp. 211-215
https://doi.org/10.48009/1_iis_2010_211-215

CUTTING EDGE COMMUNICATION: MICROBLOGGING AT THE FORTUNE 200, TWITTER IMPLEMENTATION AND USAGE
Carl Case,Darwin King
pp. 216-223
https://doi.org/10.48009/1_iis_2010_216-223

CELLULAR TELEPHONES: A USEFUL TECHNOLOGY WITH DANGEROUS CONSEQUENCES
Robbie Connell,Jack Shorter,Richard Aukerman
pp. 224-231
https://doi.org/10.48009/1_iis_2010_224-231

THE REASONS USERS "FAN" ORGANIZATIONAL FACEBOOK PAGES: A PILOT STUDY
John Anderson,James McCulloch,Keith Mulbery
pp. 232-236
https://doi.org/10.48009/1_iis_2010_232-236

WEB COMMUNICATIONS STRUCTURE
James Lee,Ben Kim,Ted Lee,Pairin Katerattanakul,Wan See
pp. 237-246
https://doi.org/10.48009/1_iis_2010_237-246

3G MOBILE PHONE ADOPTION AND CONTINUED USE: A PILOT STUDY
Meng Xudong,Peggy Deal,Liu Li,Christopher Griffin,William Barnett
pp. 247-255
https://doi.org/10.48009/1_iis_2010_247-255

AN EMPIRICAL STUDY OF USER AUTHENTICATION: THE PERCEPTIONS VERSUS PRACTICE OF STRONG PASSWORDS
Lisa Bain,Michael Hayden,Sandra Sneesby
pp. 256-265
https://doi.org/10.48009/1_iis_2010_256-265

MEASURING JOURNAL QUALITY: PROPOSED CRITERIA AND THEIR APPLICATION TO IS JOURNALS
James Cappel
pp. 266-273
https://doi.org/10.48009/1_iis_2010_266-273

WHY USABILITY TESTING WORKS FOR IT AUDIT
Voraphan Raungpaka,Usana Patramontree
pp. 274-279
https://doi.org/10.48009/1_iis_2010_274-279

E-BUSINESS AT RISK: A LOOK AT THE IMPACT AND CONTROL OF E-BUSINESS FRAUD
Patricia Lake,Susan Behling
pp. 280-285
https://doi.org/10.48009/1_iis_2010_280-285

ANALYZING THE ADOPTION OF COMPUTER SECURITY UTILIZING THE HEALTH BELIEF MODEL
Chet Claar,Jeffrey Johnson
pp. 286-291
https://doi.org/10.48009/1_iis_2010_286-291

A PRELIMINARY PERSPECTIVE OF THE 50-YEAR PUBLICATIONS IN THE JOURNAL OF COMPUTER INFORMATION SYSTEMS
Monica Holmes,Roger Hayen
pp. 292-303
https://doi.org/10.48009/1_iis_2010_292-303

AN ANALYSIS OF THE IMPACT OF ELECTRONIC MEDICAL RECORDS SYSTEM IN A GLOBAL MEDICAL TOURISM ENVIRONMENT
Saviour Nwachukwu,Mysore Ramaswamy,Ashagre Yigletu,Donald Andrews
pp. 304-308
https://doi.org/10.48009/1_iis_2010_304-308

BEYOND THE IMPACT FACTOR: UPDATES ON A CITATION STUDY FOR INFORMATION TECHNOLOGY JOURNALS
Kara Rawlins,Dale Gust
pp. 309-318
https://doi.org/10.48009/1_iis_2010_309-318

FACTORS IMPACTING ENROLLMENT IN INFORMATION SYSTEMS PROGRAMS
Manouchehr Tabatabaei,Mehdi Tehrani
pp. 319-321
https://doi.org/10.48009/1_iis_2010_319-321

VENDOR TRUST INFLUENCING CRM STRATEGIC IMPLEMENTATION PROCESS
Assion Lawson-Body,Lori Willoughby,Kinvi Logossah,Fred Celimene
pp. 322-335
https://doi.org/10.48009/1_iis_2010_322-335

THE MOBILE WORKER AND THE ORGANIZATION
James Sena
pp. 336-346
https://doi.org/10.48009/1_iis_2010_336-346

OUTSOURCING XBRL FINANCIAL STATEMENT FILING: A CASE STUDY OF PRACTICES IN TWO PUBLIC FIRMS
Deb Sledgianowski,Robert Fonfeder,Jackson Lam
pp. 347-351
https://doi.org/10.48009/1_iis_2010_347-351

DATA MINING AND SOCIAL NETWORKING SITES: PROTECTING BUSINESS INFRASTRUCTURE AND BEYOND
Richard Bassett,Tiffany Chamberlain,Stephen Cunningham,Gregor Vidmar
pp. 352-359
https://doi.org/10.48009/1_iis_2010_352-359

PENETRATION TESTING: A VITAL COMPONENT OF AN INFORMATION SECURITY STRATEGY
James Smith,Jack Shorter
pp. 358-363
https://doi.org/10.48009/1_iis_2010_358-363

BUSINESS PROCESS RE DESIGN IN EDUCATIONAL INSTITUTES IN MIDDLE EASTERN COUNTRIES: CASE STUDY
Lila Rajabion,Fida Alsughair,Arwa Aldossary,Seba Almaghlouth,Noora Abunayan
pp. 364-371
https://doi.org/10.48009/1_iis_2010_364-371

CLINICAL RESEARCH: USING BUSINESS INTELLIGENCE FRAMEWORK
Terri Keeling
pp. 372-376
https://doi.org/10.48009/1_iis_2010_372-376

ECONOMIC CONSEQUENCES OF THE SARBANES–OXLEY ACT ON E-COMMERCE FIRMS
Ronald Young,Hua-Wei Huang,Yun-Chia Yan
pp. 377-383
https://doi.org/10.48009/1_iis_2010_377-383

SPELLING AND GRAMMATICAL ERRORS IN ELECTRONIC MEETINGS
Mina Park,Milam Aiken,Tobin Lindblom,Mahesh Vanjani
pp. 384-391
https://doi.org/10.48009/1_iis_2010_384-391

A POST ANALYSIS OF A FORMALIZED SOFTWARE QUALITY ASSURANCE TOOL'S IMPLEMENTATION: A CASE STUDY
John Scarpino,Paul Kovacs
pp. 392-401
https://doi.org/10.48009/1_iis_2010_392-401

A FRAMEWORK FOR INFORMATION SECURITY AWARENESS PROGRAMS
Carlos Domínguez,Mysore Ramaswamy,Eulalia Martinez,Mariano Cleal
pp. 402-409
https://doi.org/10.48009/1_iis_2010_402-409

FORMULATING AN EFFECTIVE CYBERSECURITY CURRICULUM
Terry Smith,Alex Koohang,Robert Behling
pp. 410-416
https://doi.org/10.48009/1_iis_2010_410-416

THE DEBATE OF ONLINE COURSE QUALITY IN TRADITIONAL UNIVERSITIES: A CASE STUDY
Mohammad Rob
pp. 417-422
https://doi.org/10.48009/1_iis_2010_417-422

AN INTELLIGENT PROCESS PLANNING CONCEPT USING AN AGENT-BASED APPROACH
Utpal Bose
pp. 423-431
https://doi.org/10.48009/1_iis_2010_423-431

RAISING AWARENESS: AN EXAMINATION OF EMBEDDED GPS DATA IN IMAGES POSTED TO THE SOCIAL NETWORKING SITE TWITTER
Michael Flinn,Christopher Teodorski,Karen Paullet
pp. 432-438
https://doi.org/10.48009/1_iis_2010_432-438

TECHNOLOGY: CONVENIENCE OR NECESSITY
Karen Paullet,Jamie Pinchot,Daniel Rota
pp. 439-444
https://doi.org/10.48009/1_iis_2010_439-444

IN MEMORY ANALYTICS: BUSINESS INTELLIGENCE WITHOUT A DATAWAREHOUSE
Anthony Serapiglia
pp. 445-450
https://doi.org/10.48009/1_iis_2010_445-450

ONLINE SHOPPING FACTORS: AN ANALYSIS OF COLLEGE STUDENTS' EXPERIENCES BASED ON GENDER
Allen Truell,Melody Alexander,Jensen Zhao,Sherry Woosley
pp. 451-459
https://doi.org/10.48009/1_iis_2010_451-459

THE IMPACT OF WEB BROWSING ON CLASSROOM LEARNING PERFORMANCE
Han Li,Yingjin Cui,Xue Bai,Steve Davis
pp. 460-466
https://doi.org/10.48009/1_iis_2010_460-466

DEVELOPING AN INTELLIGENT RECOMMENDATION SYSTEM FOR A PRIVATE UNIVERSITY IN THAILAND
Kanokwan Kongsakun,Chun Fung,Tuchtawan Chanakul
pp. 467-472
https://doi.org/10.48009/1_iis_2010_467-472

SOCIAL MANAGEMENT NETWORKS: ANALYSIS OF POSTINGS IN FACEBOOK GROUPS RELATED TO WILDLIFE MANGEMENT AND PROSPECTS FOR DATA COLLECTION
G. Webb
pp. 473-482
https://doi.org/10.48009/1_iis_2010_473-482

A SMART WEB IMAGE RETRIEVAL SYSTEM BASED ON SEMANTIC MARKUP FOR INTELLIGENT E-BUSINESS
Seong-Yong Hong
pp. 483-490
https://doi.org/10.48009/1_iis_2010_483-490

EXAMINING QUANTITY AND TYPE OF COMMUNICATION IN CONTRIBUTING TO IS PROJECT SUCCESS
K. David Smith,Kimberly Merritt
pp. 491-496
https://doi.org/10.48009/1_iis_2010_491-496

USING DISCRETE EVENT SIMULATION TO EVALUATE THE BENEFITS OF RFID IN REDUCING TRAFFIC CONGESTION AND POLLUTION WHILE INCREASING STUDENT SAFETY IN RURAL OKLAHOMA SCHOOLS
Andrew Tiger,Ming-Shan Su,Jane Hicks
pp. 497-506
https://doi.org/10.48009/1_iis_2010_497-506

A COMPILATION RESEARCH OF ERP IMPLEMENTATION CRITICAL SUCCESS FACTORS
Zhenyu Huang
pp. 507-512
https://doi.org/10.48009/1_iis_2010_507-512

ONLINE SOCIAL NETWORKS AND THE PRIVACY PARADOX: A RESEARCH FRAMEWORK
Michael Mainier,Michelle Louch
pp. 513-517
https://doi.org/10.48009/1_iis_2010_513-517

ASSESSING BLACKBOARD: STUDENT PERCEPTIONS OF THE ONLINE TOOL
Adnan Chawdhry,Karen Paullet,Daniel Benjamin
pp. 518-524
https://doi.org/10.48009/1_iis_2010_518-524

LEADING TO SUCCESS VIA MENTORSHIP
Li-Jen Shannon,Ken Hartness
pp. 525-532
https://doi.org/10.48009/1_iis_2010_525-532

THE ECONOMICS OF FEE-BASED IPHONE APPLICATIONS VERSUS FREE APPLICATIONS: TO CHARGE OR NOT TO CHARGE
Jennifer Bresse-Vitelli,Philip Kim
pp. 533-537
https://doi.org/10.48009/1_iis_2010_533-537

HEALTHCARE KNOWLEDGE COLLECTION FOR CLINICAL DECISION SUPPORT SYSTEMS
Lillian Ortiz-Fournier,Mysore Ramaswamy
pp. 538-546
https://doi.org/10.48009/1_iis_2010_538-546

A TECHNOLOGICAL INFRASTRUCTURE DEVELOPMENT ASSESSMENT TO ENABLE A KNOWLEDGE SOCIETY INTO A SMART CITY
Elías Padilla,Eulalia Martínez
pp. 547-552
https://doi.org/10.48009/1_iis_2010_547-552

INDIVIDUAL DIFFERENCES ON INTENTIONS TO USE STRONG PASSWORDS
Lixuan Zhang,William McDowell,Todd Schultz
pp. 553-558
https://doi.org/10.48009/1_iis_2010_553-558

COURSE SEQUENCING AND PERFORMANCE: AN INVESTIGATION OF BUSINESS COLLEGE REQUIREMENTS IN RELATION TO AN INFORMATION SYSTEMS CORE COURSE
Sherry Woosley,Allen Truell,Melody Alexander,Jensen Zhao
pp. 559-565
https://doi.org/10.48009/1_iis_2010_559-565

CRITICAL SUCCESS FACTORS IN MANAGING VIRTUAL TEAMS: FRAMEWORK AND RELATIONSHIPS
Ganesh Vaidyanathan,Asghar Sabbaghi,Carmen Debrot
pp. 566-570
https://doi.org/10.48009/1_iis_2010_566-570

SUPPLY CHAIN INTELLIGENCE AND VALUE CREATION: A FRAMEWORK
Ganesh Vaidyanathan,Asghar Sabbaghi
pp. 571-576
https://doi.org/10.48009/1_iis_2010_571-576

AFFECTIVE COMPUTING: INVASIVE TECHNOLOGY AND LEGAL CONSIDERATIONS TO PROTECT CONSUMERS
Lee Steen,Philip Kim
pp. 577-584
https://doi.org/10.48009/1_iis_2010_577-584

STUDENTS' USE OF MOBILE DEVICES: AN EXPLORATORY SURVEY IN AN INTRODUCTORY COMPUTER INFORMATION SYSTEM CLASS
Kamal Hingorani,Donald Woodard
pp. 585-588
https://doi.org/10.48009/1_iis_2010_585-588

UNCHARTED WATERS: USING SOCIAL NETWORKS IN HIRING DECISIONS
Chris Jones,Susan Behling
pp. 589-595
https://doi.org/10.48009/1_iis_2010_589-595

ON CODES OF ETHICS FOR WEB DESIGN
James Harris
pp. 596-600
https://doi.org/10.48009/1_iis_2010_596-600

BENEFIT-DRIVEN PARTICIPATION IN OPEN ORGANIZATIONAL SOCIAL MEDIA PLATFORMS: THE CASE OF THE SAP COMMUNITY NETWORK
Georgia Demetriou,Peter Kawalek
pp. 601-611
https://doi.org/10.48009/1_iis_2010_601-611

THE USE OF WEB LOG ANALYSIS IN ACADEMIC JOURNALS – CASE STUDY
Azad Ali,Frederick Kohun
pp. 612-619
https://doi.org/10.48009/1_iis_2010_612-619

PERCEPTIONS OF SOCIAL NETWORK USABILITY: IMPACTS OF PERCEIVED INTERACTIVITY AND TECHNOLOGY ACCEPTANCE
Belinda Shipps,Brandis Phillips
pp. 620-627
https://doi.org/10.48009/1_iis_2010_620-627

SOCIAL MEDIA SECURITY POLICIES: GUIDELINES FOR ORGANIZATIONS
Nipul Patel,Hetal Jasani
pp. 628-634
https://doi.org/10.48009/1_iis_2010_628-634

APPLYING LEAN PRINCIPLES IN SOFTWARE DEVELOPMENT PROCESS – A CASE STUDY
Jeff Widman,Stella Hua,Steven Ross
pp. 635-639
https://doi.org/10.48009/1_iis_2010_635-639

HAS YOUR PATENT STRATEGY BEEN "BILSKIED"? CHALLENGES FACING SOFTWARE BASED BUSINESS METHOD PATENTS
Nancy Martin,David Green
pp. 640-643
https://doi.org/10.48009/1_iis_2010_640-643

CHANGES IN EMPLOYEE INTENTION TO COMPLY WITH ORGANIZATIONAL SECURITY POLICIES AND PROCEDURES FACTORING RISK PERCEPTION: A COMPARISON OF 2006 AND 2010
Queen Booker,Fred Kitchens
pp. 649-658
https://doi.org/10.48009/1_iis_2010_649-658

AITP NCC BI GIS COMPETITION: A BI CASE PERSPECTIVE
Roger Hayen
pp. 659-668
https://doi.org/10.48009/1_iis_2010_659-668

EXPECTANCY THEORY PREDICTIONS OF BLOGGING INTENTION AND CONDUCTS
Hsiu-Li Liao,Su-Houn Liu,Shih-Ming Pi
pp. 669-677
https://doi.org/10.48009/1_iis_2010_669-677

MITIGATING RISK IN A HIGH UNCERTAINTY AVOIDANCE CULTURE – AIR TRAFFIC CONTROL
Darlene Drazenovich,Robert Skovira
pp. 678-688
https://doi.org/10.48009/1_iis_2010_678-688

INFORMATION TECHNOLOGY AND DISTANCE EDUCATION
Manying Qiu,Carl Wright,Shuting Xu
pp. 689-695
https://doi.org/10.48009/1_iis_2010_689-695

VALIDATING A COMPREHENSIVE MODEL FOR ONLINE SOCIAL NETWORKING USE:INITIAL RESULTS
Thilini Ariyachandra,Nancy Bertaux
pp. 696-710
https://doi.org/10.48009/1_iis_2010_696-710

THE REVOLUTION OF USING COLLABORATIVE SOURCES IN HIGHER EDUCATION
Christine Shull,Dana McCann
pp. 711-714
https://doi.org/10.48009/1_iis_2010_711-714

PERCEPTIONS OF THE IMPORTANCE OF OBJECT PROGRAMMING LANGUAGE CONTENT BY INDUSTRY PROFESSIONALS: A PRELIMINARY STUDY
Joseph Laverty,David Wood,Frederick Kohun,Gary DeLorenzo
pp. 715-723
https://doi.org/10.48009/1_iis_2010_715-723