Table of Contents -
Volume 11, Issue 1
DEVELOPMENT AND DIFFUSION OF CUSTOMER RELATIONSHIP MANAGEMENT ACROSS DISCIPLINES: FAD OR FASHION?Maria Barua, Godwin Udo
pp. 1-8
UTILIZING THE TECHNOLOGY ACCEPTANCE MODEL TO ASSESS THE EMPLOYEE ADOPTION OF INFORMATION SYSTEMS SECURITY MEASURESCynthia Jones, Richard McCarthy, Leila Halawi, Bahaudin Mujtaba
pp. 9-16
SOFTWARD PIRACY: EXPLORING AWARENESS OF THE LAW AS A DETERMINANT OF SOFTLIFTING ATTITUDE AND INTENTIONPamela Dupin-Bryant
pp. 17-22
INFORMATION PROCESSING CHALLENGES IN FINANCIAL SUPPLY CHAINSRichard Calvasina, Mysore Ramaswamy, Eugene Calvasina, Gerald Calvasina
pp. 23-28
THE PROCESS ARCHITECTURE OF INFORMATION SYSTEMS - HIGHER EDUCATION INSTITUTIONS MANAGERIAL TOOLSrecko Natek, Dusan Lesjak
pp. 29-34
THE EVOLUTION AND IMPLEMENTATION OF GLOBAL ASSURANCEGarry White
pp. 35-40
A LONGITUDINAL STUDY OF FINANCIAL EXECUTIVES' VIEWS ON INFORMATION SYSTEMS RETURNS AND KEY TECHNOLOGY ISSUESAlan Peslak
pp. 41-47
TECHNICAL AND USABILITY TESTING OF A MEDICAL INTERACTION WORKGROUP APPLICATION SUPPORT SYSTEM (MIWASS)James Rodger
pp. 48-54
HPC PORTAL DEVELOPMENT PLATFORMChien-Heng Wu
pp. 55-60
SOCIAL AND TECHNOLOGICAL CONCERNS ASSOCIATED WITH THE USAGE OF UBIQUITOUS COMPUTING TECHNOLOGIESCarsten Rocker
pp. 61-68
USING INFORMATION AND COMMUNICATION TECHNOLOGIES TO RENDER TRANSPARENT GOVERNANCE IN TRANSITION COUNTRIESMysore Ramaswamy
pp. 69-76
SOFTWARE DEVELOPMENT AND INTELLECTUAL PROPERTY: WHAT YOU DON'T KNOW CAN HURT YOUJanet Ford, Barbara White, Lorrie Willey
pp. 77-84
DO YOU WANT ME TO PUBLISH THAT NOW? A LEGAL ANALYSIS OF ONLINE PUBLISHINGJason Triche, Sam Ramanujan, Someswar Kesh
pp. 85-89
USING OBJECT-RELATIONAL DATABASE TECHNOLOGY TO SOLVE PROBLEMS IN DATABASE DEVELOPMENTMing Wang
pp. 90-99
KNOWLEDGE-BASED SUPPLY CHAIN NETWORK: A SIMULATION APPLICATION DESIGN CONFIGURED WITH RADIO FREQUENCY IDENTIFICATION, FREIGHT TRAIN DISPATCH, AND CONTAINER SHIPMENTSAndrew Chen, William Chen, Christina Chen
pp. 100-110
RFID UBIQUITY AND PRIVACY LOSS CONCERNS AN ANALYSIS OF A PENNSYLVANIA UNIVERSITYDavid Douglas, Karen Paullet
pp. 111-118
EXPLORING COMPUTER ETHICS ISSUES IN MALAYSIAMaslin Masrom, Zuraini Ismail, Rashidah Anuar, Ramlah Hussein, Norshidah Mohamed
pp. 119-128
AUTOMATIC INTERPRETATION OF ENGLISH SPEECHMilam Aiken, Lakisha Simmons, Shilpa Balan
pp. 129-133
UNDERSTANDING THE BENEFITS OF SOCIAL EXCHANGE IN B2B COMMUNITIESLakisha Simmons, Chris Simmons, Anthony Ammeter, Kaushik Ghosh
pp. 134-141
WEB APPLICATION SECURITY TESTING: AN INDUSTRY PERSPECTIVE ON HOW ITS EDUCATION IS PERCEIVEDJohn Scarpino
pp. 142-153
DOES THE TECHNOLOGY PORTRAYED IN TELEVISION CRIME SHOWS HAVE AN EFFECT ON POTENTIAL JURORS?Gary Davis, Karen Paullet, Max Houck, Tom Swan
pp. 154-163
STRATEGIES FOR IMPROVING SYSTEMS DEVELOPMENT PROJECT SUCCESSChristopher Jones, Glen Gray, Anna Gold, David Miller
pp. 164-173
ANALYSIS OF AIRPORT SECURITY BASED ON THE FIVE COMPONENTS OF INFORMATION SYSTEMSJuyun Cho, Tom Velazquez, Benedikt Kraus, Korakod Aphipanya
pp. 174-183
WHAT'S THIS TWITTER ALL ABOUT? AN E-PATIENT'S END-USER COMMUNITY (EUCY)Elaine Winston
pp. 184-191
AN EVALUATION OF EMPLOYEES' ATTITUDES TOWARD SOCIAL NETWORKING IN THE WORKPLACEMatthew North
pp. 192-197
A FRAMEWORK FOR MEASURING HAPPINESS IN ONLINE SOCIAL NETWORKSAmy Chou, Billy Lim
pp. 198-203
EXPLORING MOBILE DEVICE SECURITY POLICIES IN HIGHER EDUCATIONBeth Jones, Lynn Heinrichs
pp. 204-210
ACCOUNTING PROFESSIONALSâ VALUE ASSESSMENT OF ENTRY LEVEL IT SKILLS AND TOPICS: A COMPARISON OF THE DIFFERENCES BETWEEN CPA FIRMS AND INDUSTRY/GOVERNMENT ORGANIZATIONSOrion Welch, Tom Madison, Sandra Welch
pp. 211-215
CUTTING EDGE COMMUNICATION: MICROBLOGGING AT THE FORTUNE 200, TWITTER IMPLEMENTATION AND USAGECarl Case, Darwin King
pp. 216-223
CELLULAR TELEPHONES: A USEFUL TECHNOLOGY WITH DANGEROUS CONSEQUENCESRobbie Connell, Jack Shorter, Richard Aukerman
pp. 224-231
THE REASONS USERS âFANâ ORGANIZATIONAL FACEBOOK PAGES: A PILOT STUDYJohn Anderson, James McCulloch, Keith Mulbery
pp. 232-236
WEB COMMUNICATIONS STRUCTUREJames Lee, Ben Kim, Ted Lee, Pairin Katerattanakul, Wan See
pp. 237-246
3G MOBILE PHONE ADOPTION AND CONTINUED USE: A PILOT STUDYMeng Xudong, Peggy Deal, Liu Li, Christopher Griffin, William Barnett
pp. 247-255
AN EMPIRICAL STUDY OF USER AUTHENTICATION: THE PERCEPTIONS VERSUS PRACTICE OF STRONG PASSWORDSLisa Bain, Michael Hayden, Sandra Sneesby
pp. 256-265
MEASURING JOURNAL QUALITY: PROPOSED CRITERIA AND THEIR APPLICATION TO IS JOURNALSJames Cappel
pp. 266-273
WHY USABILITY TESTING WORKS FOR IT AUDITVoraphan Raungpaka, Usana Patramontree
pp. 274-279
E-BUSINESS AT RISK: A LOOK AT THE IMPACT AND CONTROL OF E-BUSINESS FRAUDPatricia Lake, Susan Behling
pp. 280-285
ANALYZING THE ADOPTION OF COMPUTER SECURITY UTILIZING THE HEALTH BELIEF MODELChet Claar, Jeffrey Johnson
pp. 286-291
A PRELIMINARY PERSPECTIVE OF THE 50-YEAR PUBLICATIONS IN THE JOURNAL OF COMPUTER INFORMATION SYSTEMSMonica Holmes, Roger Hayen
pp. 292-303
AN ANALYSIS OF THE IMPACT OF ELECTRONIC MEDICAL RECORDS SYSTEM IN A GLOBAL MEDICAL TOURISM ENVIRONMENTSaviour Nwachukwu, Mysore Ramaswamy, Ashagre Yigletu, Donald Andrews
pp. 304-308
BEYOND THE IMPACT FACTOR: UPDATES ON A CITATION STUDY FOR INFORMATION TECHNOLOGY JOURNALSKara Rawlins, Dale Gust
pp. 309-318
FACTORS IMPACTING ENROLLMENT IN INFORMATION SYSTEMS PROGRAMSManouchehr Tabatabaei, Mehdi Tehrani
pp. 319-321
VENDOR TRUST INFLUENCING CRM STRATEGIC IMPLEMENTATION PROCESSAssion Lawson-Body, Lori Willoughby, Kinvi Logossah, Fred Celimene
pp. 322-335
THE MOBILE WORKER AND THE ORGANIZATIONJames Sena
pp. 336-346
OUTSOURCING XBRL FINANCIAL STATEMENT FILING: A CASE STUDY OF PRACTICES IN TWO PUBLIC FIRMSDeb Sledgianowski, Robert Fonfeder, Jackson Lam
pp. 347-351
DATA MINING AND SOCIAL NETWORKING SITES: PROTECTING BUSINESS INFRASTRUCTURE AND BEYONDRichard Bassett, Tiffany Chamberlain, Stephen Cunningham, Gregor Vidmar
pp. 352-359
PENETRATION TESTING: A VITAL COMPONENT OF AN INFORMATION SECURITY STRATEGYJames Smith, Jack Shorter
pp. 358-363
BUSINESS PROCESS RE DESIGN IN EDUCATIONAL INSTITUTES IN MIDDLE EASTERN COUNTRIES: CASE STUDYLila Rajabion, Fida Alsughair, Arwa Aldossary, Seba Almaghlouth, Noora Abunayan
pp. 364-371
CLINICAL RESEARCH: USING BUSINESS INTELLIGENCE FRAMEWORKTerri Keeling
pp. 372-376
ECONOMIC CONSEQUENCES OF THE SARBANESâ"OXLEY ACT ON E-COMMERCE FIRMSRonald Young, Hua-Wei Huang, Yun-Chia Yan
pp. 377-383
SPELLING AND GRAMMATICAL ERRORS IN ELECTRONIC MEETINGSMina Park, Milam Aiken, Tobin Lindblom, Mahesh Vanjani
pp. 384-391
A POST ANALYSIS OF A FORMALIZED SOFTWARE QUALITY ASSURANCE TOOLâS IMPLEMENTATION: A CASE STUDYJohn Scarpino, Paul Kovacs
pp. 392-401
A FRAMEWORK FOR INFORMATION SECURITY AWARENESS PROGRAMSCarlos DomÃnguez, Mysore Ramaswamy, Eulalia Martinez, Mariano Cleal
pp. 402-409
FORMULATING AN EFFECTIVE CYBERSECURITY CURRICULUMTerry Smith, Alex Koohang, Robert Behling
pp. 410-416
THE DEBATE OF ONLINE COURSE QUALITY IN TRADITIONAL UNIVERSITIES: A CASE STUDYMohammad Rob
pp. 417-422
AN INTELLIGENT PROCESS PLANNING CONCEPT USING AN AGENT-BASED APPROACHUtpal Bose
pp. 423-431
RAISING AWARENESS: AN EXAMINATION OF EMBEDDED GPS DATA IN IMAGES POSTED TO THE SOCIAL NETWORKING SITE TWITTERMichael Flinn, Christopher Teodorski, Karen Paullet
pp. 432-438
TECHNOLOGY: CONVENIENCE OR NECESSITYKaren Paullet, Jamie Pinchot, Daniel Rota
pp. 439-444
IN MEMORY ANALYTICS: BUSINESS INTELLIGENCE WITHOUT A DATAWAREHOUSEAnthony Serapiglia
pp. 445-450
ONLINE SHOPPING FACTORS: AN ANALYSIS OF COLLEGE STUDENTSâ EXPERIENCES BASED ON GENDERAllen Truell, Melody Alexander, Jensen Zhao, Sherry Woosley
pp. 451-459
THE IMPACT OF WEB BROWSING ON CLASSROOM LEARNING PERFORMANCEHan Li, Yingjin Cui, Xue Bai, Steve Davis
pp. 460-466
DEVELOPING AN INTELLIGENT RECOMMENDATION SYSTEM FOR A PRIVATE UNIVERSITY IN THAILANDKanokwan Kongsakun, Chun Fung, Tuchtawan Chanakul
pp. 467-472
SOCIAL MANAGEMENT NETWORKS: ANALYSIS OF POSTINGS IN FACEBOOK GROUPS RELATED TO WILDLIFE MANGEMENT AND PROSPECTS FOR DATA COLLECTIONG. Webb
pp. 473-482
A SMART WEB IMAGE RETRIEVAL SYSTEM BASED ON SEMANTIC MARKUP FOR INTELLIGENT E-BUSINESSSeong-Yong Hong
pp. 483-490
EXAMINING QUANTITY AND TYPE OF COMMUNICATION IN CONTRIBUTING TO IS PROJECT SUCCESSK. David Smith, Kimberly Merritt
pp. 491-496
USING DISCRETE EVENT SIMULATION TO EVALUATE THE BENEFITS OF RFID IN REDUCING TRAFFIC CONGESTION AND POLLUTION WHILE INCREASING STUDENT SAFETY IN RURAL OKLAHOMA SCHOOLSAndrew Tiger, Ming-Shan Su, Jane Hicks
pp. 497-506
A COMPILATION RESEARCH OF ERP IMPLEMENTATION CRITICAL SUCCESS FACTORSZhenyu Huang
pp. 507-512
ONLINE SOCIAL NETWORKS AND THE PRIVACY PARADOX: A RESEARCH FRAMEWORKMichael Mainier, Michelle Louch
pp. 513-517
ASSESSING BLACKBOARD: STUDENT PERCEPTIONS OF THE ONLINE TOOLAdnan Chawdhry, Karen Paullet, Daniel Benjamin
pp. 518-524
LEADING TO SUCCESS VIA MENTORSHIPLi-Jen Shannon, Ken Hartness
pp. 525-532
THE ECONOMICS OF FEE-BASED IPHONE APPLICATIONS VERSUS FREE APPLICATIONS: TO CHARGE OR NOT TO CHARGEJennifer Bresse-Vitelli, Philip Kim
pp. 533-537
HEALTHCARE KNOWLEDGE COLLECTION FOR CLINICAL DECISION SUPPORT SYSTEMSLillian Ortiz-Fournier, Mysore Ramaswamy
pp. 538-546
A TECHNOLOGICAL INFRASTRUCTURE DEVELOPMENT ASSESSMENT TO ENABLE A KNOWLEDGE SOCIETY INTO A SMART CITYElÃas Padilla, Eulalia MartÃnez
pp. 547-552
INDIVIDUAL DIFFERENCES ON INTENTIONS TO USE STRONG PASSWORDSLixuan Zhang, William McDowell, Todd Schultz
pp. 553-558
COURSE SEQUENCING AND PERFORMANCE: AN INVESTIGATION OF BUSINESS COLLEGE REQUIREMENTS IN RELATION TO AN INFORMATION SYSTEMS CORE COURSESherry Woosley, Allen Truell, Melody Alexander, Jensen Zhao
pp. 559-565
CRITICAL SUCCESS FACTORS IN MANAGING VIRTUAL TEAMS: FRAMEWORK AND RELATIONSHIPSGanesh Vaidyanathan, Asghar Sabbaghi, Carmen Debrot
pp. 566-570
SUPPLY CHAIN INTELLIGENCE AND VALUE CREATION: A FRAMEWORKGanesh Vaidyanathan, Asghar Sabbaghi
pp. 571-576
AFFECTIVE COMPUTING: INVASIVE TECHNOLOGY AND LEGAL CONSIDERATIONS TO PROTECT CONSUMERSLee Steen, Philip Kim
pp. 577-584
STUDENTSâ USE OF MOBILE DEVICES: AN EXPLORATORY SURVEY IN AN INTRODUCTORY COMPUTER INFORMATION SYSTEM CLASSKamal Hingorani, Donald Woodard
pp. 585-588
UNCHARTED WATERS: USING SOCIAL NETWORKS IN HIRING DECISIONSChris Jones, Susan Behling
pp. 589-595
ON CODES OF ETHICS FOR WEB DESIGNJames Harris
pp. 596-600
BENEFIT-DRIVEN PARTICIPATION IN OPEN ORGANIZATIONAL SOCIAL MEDIA PLATFORMS: THE CASE OF THE SAP COMMUNITY NETWORKGeorgia Demetriou, Peter Kawalek
pp. 601-611
THE USE OF WEB LOG ANALYSIS IN ACADEMIC JOURNALS â" CASE STUDYAzad Ali, Frederick Kohun
pp. 612-619
PERCEPTIONS OF SOCIAL NETWORK USABILITY: IMPACTS OF PERCEIVED INTERACTIVITY AND TECHNOLOGY ACCEPTANCEBelinda Shipps, Brandis Phillips
pp. 620-627
SOCIAL MEDIA SECURITY POLICIES: GUIDELINES FOR ORGANIZATIONSNipul Patel, Hetal Jasani
pp. 628-634
APPLYING LEAN PRINCIPLES IN SOFTWARE DEVELOPMENT PROCESS â" A CASE STUDYJeff Widman, Stella Hua, Steven Ross
pp. 635-639
HAS YOUR PATENT STRATEGY BEEN âBILSKIEDâ? CHALLENGES FACING SOFTWARE BASED BUSINESS METHOD PATENTSNancy Martin, David Green
pp. 640-643
CHANGES IN EMPLOYEE INTENTION TO COMPLY WITH ORGANIZATIONAL SECURITY POLICIES AND PROCEDURES FACTORING RISK PERCEPTION: A COMPARISON OF 2006 AND 2010Queen Booker, Fred Kitchens
pp. 649-658
AITP NCC BI GIS COMPETITION: A BI CASE PERSPECTIVERoger Hayen
pp. 659-668
EXPECTANCY THEORY PREDICTIONS OF BLOGGING INTENTION AND CONDUCTSHsiu-Li Liao, Su-Houn Liu, Shih-Ming Pi
pp. 669-677
MITIGATING RISK IN A HIGH UNCERTAINTY AVOIDANCE CULTURE â" AIR TRAFFIC CONTROLDarlene Drazenovich, Robert Skovira
pp. 678-688
INFORMATION TECHNOLOGY AND DISTANCE EDUCATIONManying Qiu, Carl Wright, Shuting Xu
pp. 689-695
VALIDATING A COMPREHENSIVE MODEL FOR ONLINE SOCIAL NETWORKING USE:INITIAL RESULTSThilini Ariyachandra, Nancy Bertaux
pp. 696-710
THE REVOLUTION OF USING COLLABORATIVE SOURCES IN HIGHER EDUCATIONChristine Shull, Dana McCann
pp. 711-714
PERCEPTIONS OF THE IMPORTANCE OF OBJECT PROGRAMMING LANGUAGE CONTENT BY INDUSTRY PROFESSIONALS: A PRELIMINARY STUDYJoseph Laverty, David Wood, Frederick Kohun, Gary DeLorenzo
pp. 715-723