International Association for Computer Information Systems
Tuesday, April 23, 2024

Table of Contents - Volume 11, Issue 1



DEVELOPMENT AND DIFFUSION OF CUSTOMER RELATIONSHIP MANAGEMENT ACROSS DISCIPLINES: FAD OR FASHION?
Maria Barua, Godwin Udo
pp. 1-8

UTILIZING THE TECHNOLOGY ACCEPTANCE MODEL TO ASSESS THE EMPLOYEE ADOPTION OF INFORMATION SYSTEMS SECURITY MEASURES
Cynthia Jones, Richard McCarthy, Leila Halawi, Bahaudin Mujtaba
pp. 9-16

SOFTWARD PIRACY: EXPLORING AWARENESS OF THE LAW AS A DETERMINANT OF SOFTLIFTING ATTITUDE AND INTENTION
Pamela Dupin-Bryant
pp. 17-22

INFORMATION PROCESSING CHALLENGES IN FINANCIAL SUPPLY CHAINS
Richard Calvasina, Mysore Ramaswamy, Eugene Calvasina, Gerald Calvasina
pp. 23-28

THE PROCESS ARCHITECTURE OF INFORMATION SYSTEMS - HIGHER EDUCATION INSTITUTIONS MANAGERIAL TOOL
Srecko Natek, Dusan Lesjak
pp. 29-34

THE EVOLUTION AND IMPLEMENTATION OF GLOBAL ASSURANCE
Garry White
pp. 35-40

A LONGITUDINAL STUDY OF FINANCIAL EXECUTIVES' VIEWS ON INFORMATION SYSTEMS RETURNS AND KEY TECHNOLOGY ISSUES
Alan Peslak
pp. 41-47

TECHNICAL AND USABILITY TESTING OF A MEDICAL INTERACTION WORKGROUP APPLICATION SUPPORT SYSTEM (MIWASS)
James Rodger
pp. 48-54

HPC PORTAL DEVELOPMENT PLATFORM
Chien-Heng Wu
pp. 55-60

SOCIAL AND TECHNOLOGICAL CONCERNS ASSOCIATED WITH THE USAGE OF UBIQUITOUS COMPUTING TECHNOLOGIES
Carsten Rocker
pp. 61-68

USING INFORMATION AND COMMUNICATION TECHNOLOGIES TO RENDER TRANSPARENT GOVERNANCE IN TRANSITION COUNTRIES
Mysore Ramaswamy
pp. 69-76

SOFTWARE DEVELOPMENT AND INTELLECTUAL PROPERTY: WHAT YOU DON'T KNOW CAN HURT YOU
Janet Ford, Barbara White, Lorrie Willey
pp. 77-84

DO YOU WANT ME TO PUBLISH THAT NOW? A LEGAL ANALYSIS OF ONLINE PUBLISHING
Jason Triche, Sam Ramanujan, Someswar Kesh
pp. 85-89

USING OBJECT-RELATIONAL DATABASE TECHNOLOGY TO SOLVE PROBLEMS IN DATABASE DEVELOPMENT
Ming Wang
pp. 90-99

KNOWLEDGE-BASED SUPPLY CHAIN NETWORK: A SIMULATION APPLICATION DESIGN CONFIGURED WITH RADIO FREQUENCY IDENTIFICATION, FREIGHT TRAIN DISPATCH, AND CONTAINER SHIPMENTS
Andrew Chen, William Chen, Christina Chen
pp. 100-110

RFID UBIQUITY AND PRIVACY LOSS CONCERNS AN ANALYSIS OF A PENNSYLVANIA UNIVERSITY
David Douglas, Karen Paullet
pp. 111-118

EXPLORING COMPUTER ETHICS ISSUES IN MALAYSIA
Maslin Masrom, Zuraini Ismail, Rashidah Anuar, Ramlah Hussein, Norshidah Mohamed
pp. 119-128

AUTOMATIC INTERPRETATION OF ENGLISH SPEECH
Milam Aiken, Lakisha Simmons, Shilpa Balan
pp. 129-133

UNDERSTANDING THE BENEFITS OF SOCIAL EXCHANGE IN B2B COMMUNITIES
Lakisha Simmons, Chris Simmons, Anthony Ammeter, Kaushik Ghosh
pp. 134-141

WEB APPLICATION SECURITY TESTING: AN INDUSTRY PERSPECTIVE ON HOW ITS EDUCATION IS PERCEIVED
John Scarpino
pp. 142-153

DOES THE TECHNOLOGY PORTRAYED IN TELEVISION CRIME SHOWS HAVE AN EFFECT ON POTENTIAL JURORS?
Gary Davis, Karen Paullet, Max Houck, Tom Swan
pp. 154-163

STRATEGIES FOR IMPROVING SYSTEMS DEVELOPMENT PROJECT SUCCESS
Christopher Jones, Glen Gray, Anna Gold, David Miller
pp. 164-173

ANALYSIS OF AIRPORT SECURITY BASED ON THE FIVE COMPONENTS OF INFORMATION SYSTEMS
Juyun Cho, Tom Velazquez, Benedikt Kraus, Korakod Aphipanya
pp. 174-183

WHAT'S THIS TWITTER ALL ABOUT? AN E-PATIENT'S END-USER COMMUNITY (EUCY)
Elaine Winston
pp. 184-191

AN EVALUATION OF EMPLOYEES' ATTITUDES TOWARD SOCIAL NETWORKING IN THE WORKPLACE
Matthew North
pp. 192-197

A FRAMEWORK FOR MEASURING HAPPINESS IN ONLINE SOCIAL NETWORKS
Amy Chou, Billy Lim
pp. 198-203

EXPLORING MOBILE DEVICE SECURITY POLICIES IN HIGHER EDUCATION
Beth Jones, Lynn Heinrichs
pp. 204-210

ACCOUNTING PROFESSIONALS’ VALUE ASSESSMENT OF ENTRY LEVEL IT SKILLS AND TOPICS: A COMPARISON OF THE DIFFERENCES BETWEEN CPA FIRMS AND INDUSTRY/GOVERNMENT ORGANIZATIONS
Orion Welch, Tom Madison, Sandra Welch
pp. 211-215

CUTTING EDGE COMMUNICATION: MICROBLOGGING AT THE FORTUNE 200, TWITTER IMPLEMENTATION AND USAGE
Carl Case, Darwin King
pp. 216-223

CELLULAR TELEPHONES: A USEFUL TECHNOLOGY WITH DANGEROUS CONSEQUENCES
Robbie Connell, Jack Shorter, Richard Aukerman
pp. 224-231

THE REASONS USERS “FAN” ORGANIZATIONAL FACEBOOK PAGES: A PILOT STUDY
John Anderson, James McCulloch, Keith Mulbery
pp. 232-236

WEB COMMUNICATIONS STRUCTURE
James Lee, Ben Kim, Ted Lee, Pairin Katerattanakul, Wan See
pp. 237-246

3G MOBILE PHONE ADOPTION AND CONTINUED USE: A PILOT STUDY
Meng Xudong, Peggy Deal, Liu Li, Christopher Griffin, William Barnett
pp. 247-255

AN EMPIRICAL STUDY OF USER AUTHENTICATION: THE PERCEPTIONS VERSUS PRACTICE OF STRONG PASSWORDS
Lisa Bain, Michael Hayden, Sandra Sneesby
pp. 256-265

MEASURING JOURNAL QUALITY: PROPOSED CRITERIA AND THEIR APPLICATION TO IS JOURNALS
James Cappel
pp. 266-273

WHY USABILITY TESTING WORKS FOR IT AUDIT
Voraphan Raungpaka, Usana Patramontree
pp. 274-279

E-BUSINESS AT RISK: A LOOK AT THE IMPACT AND CONTROL OF E-BUSINESS FRAUD
Patricia Lake, Susan Behling
pp. 280-285

ANALYZING THE ADOPTION OF COMPUTER SECURITY UTILIZING THE HEALTH BELIEF MODEL
Chet Claar, Jeffrey Johnson
pp. 286-291

A PRELIMINARY PERSPECTIVE OF THE 50-YEAR PUBLICATIONS IN THE JOURNAL OF COMPUTER INFORMATION SYSTEMS
Monica Holmes, Roger Hayen
pp. 292-303

AN ANALYSIS OF THE IMPACT OF ELECTRONIC MEDICAL RECORDS SYSTEM IN A GLOBAL MEDICAL TOURISM ENVIRONMENT
Saviour Nwachukwu, Mysore Ramaswamy, Ashagre Yigletu, Donald Andrews
pp. 304-308

BEYOND THE IMPACT FACTOR: UPDATES ON A CITATION STUDY FOR INFORMATION TECHNOLOGY JOURNALS
Kara Rawlins, Dale Gust
pp. 309-318

FACTORS IMPACTING ENROLLMENT IN INFORMATION SYSTEMS PROGRAMS
Manouchehr Tabatabaei, Mehdi Tehrani
pp. 319-321

VENDOR TRUST INFLUENCING CRM STRATEGIC IMPLEMENTATION PROCESS
Assion Lawson-Body, Lori Willoughby, Kinvi Logossah, Fred Celimene
pp. 322-335

THE MOBILE WORKER AND THE ORGANIZATION
James Sena
pp. 336-346

OUTSOURCING XBRL FINANCIAL STATEMENT FILING: A CASE STUDY OF PRACTICES IN TWO PUBLIC FIRMS
Deb Sledgianowski, Robert Fonfeder, Jackson Lam
pp. 347-351

DATA MINING AND SOCIAL NETWORKING SITES: PROTECTING BUSINESS INFRASTRUCTURE AND BEYOND
Richard Bassett, Tiffany Chamberlain, Stephen Cunningham, Gregor Vidmar
pp. 352-359

PENETRATION TESTING: A VITAL COMPONENT OF AN INFORMATION SECURITY STRATEGY
James Smith, Jack Shorter
pp. 358-363

BUSINESS PROCESS RE DESIGN IN EDUCATIONAL INSTITUTES IN MIDDLE EASTERN COUNTRIES: CASE STUDY
Lila Rajabion, Fida Alsughair, Arwa Aldossary, Seba Almaghlouth, Noora Abunayan
pp. 364-371

CLINICAL RESEARCH: USING BUSINESS INTELLIGENCE FRAMEWORK
Terri Keeling
pp. 372-376

ECONOMIC CONSEQUENCES OF THE SARBANESâ€"OXLEY ACT ON E-COMMERCE FIRMS
Ronald Young, Hua-Wei Huang, Yun-Chia Yan
pp. 377-383

SPELLING AND GRAMMATICAL ERRORS IN ELECTRONIC MEETINGS
Mina Park, Milam Aiken, Tobin Lindblom, Mahesh Vanjani
pp. 384-391

A POST ANALYSIS OF A FORMALIZED SOFTWARE QUALITY ASSURANCE TOOL’S IMPLEMENTATION: A CASE STUDY
John Scarpino, Paul Kovacs
pp. 392-401

A FRAMEWORK FOR INFORMATION SECURITY AWARENESS PROGRAMS
Carlos Domínguez, Mysore Ramaswamy, Eulalia Martinez, Mariano Cleal
pp. 402-409

FORMULATING AN EFFECTIVE CYBERSECURITY CURRICULUM
Terry Smith, Alex Koohang, Robert Behling
pp. 410-416

THE DEBATE OF ONLINE COURSE QUALITY IN TRADITIONAL UNIVERSITIES: A CASE STUDY
Mohammad Rob
pp. 417-422

AN INTELLIGENT PROCESS PLANNING CONCEPT USING AN AGENT-BASED APPROACH
Utpal Bose
pp. 423-431

RAISING AWARENESS: AN EXAMINATION OF EMBEDDED GPS DATA IN IMAGES POSTED TO THE SOCIAL NETWORKING SITE TWITTER
Michael Flinn, Christopher Teodorski, Karen Paullet
pp. 432-438

TECHNOLOGY: CONVENIENCE OR NECESSITY
Karen Paullet, Jamie Pinchot, Daniel Rota
pp. 439-444

IN MEMORY ANALYTICS: BUSINESS INTELLIGENCE WITHOUT A DATAWAREHOUSE
Anthony Serapiglia
pp. 445-450

ONLINE SHOPPING FACTORS: AN ANALYSIS OF COLLEGE STUDENTS’ EXPERIENCES BASED ON GENDER
Allen Truell, Melody Alexander, Jensen Zhao, Sherry Woosley
pp. 451-459

THE IMPACT OF WEB BROWSING ON CLASSROOM LEARNING PERFORMANCE
Han Li, Yingjin Cui, Xue Bai, Steve Davis
pp. 460-466

DEVELOPING AN INTELLIGENT RECOMMENDATION SYSTEM FOR A PRIVATE UNIVERSITY IN THAILAND
Kanokwan Kongsakun, Chun Fung, Tuchtawan Chanakul
pp. 467-472

SOCIAL MANAGEMENT NETWORKS: ANALYSIS OF POSTINGS IN FACEBOOK GROUPS RELATED TO WILDLIFE MANGEMENT AND PROSPECTS FOR DATA COLLECTION
G. Webb
pp. 473-482

A SMART WEB IMAGE RETRIEVAL SYSTEM BASED ON SEMANTIC MARKUP FOR INTELLIGENT E-BUSINESS
Seong-Yong Hong
pp. 483-490

EXAMINING QUANTITY AND TYPE OF COMMUNICATION IN CONTRIBUTING TO IS PROJECT SUCCESS
K. David Smith, Kimberly Merritt
pp. 491-496

USING DISCRETE EVENT SIMULATION TO EVALUATE THE BENEFITS OF RFID IN REDUCING TRAFFIC CONGESTION AND POLLUTION WHILE INCREASING STUDENT SAFETY IN RURAL OKLAHOMA SCHOOLS
Andrew Tiger, Ming-Shan Su, Jane Hicks
pp. 497-506

A COMPILATION RESEARCH OF ERP IMPLEMENTATION CRITICAL SUCCESS FACTORS
Zhenyu Huang
pp. 507-512

ONLINE SOCIAL NETWORKS AND THE PRIVACY PARADOX: A RESEARCH FRAMEWORK
Michael Mainier, Michelle Louch
pp. 513-517

ASSESSING BLACKBOARD: STUDENT PERCEPTIONS OF THE ONLINE TOOL
Adnan Chawdhry, Karen Paullet, Daniel Benjamin
pp. 518-524

LEADING TO SUCCESS VIA MENTORSHIP
Li-Jen Shannon, Ken Hartness
pp. 525-532

THE ECONOMICS OF FEE-BASED IPHONE APPLICATIONS VERSUS FREE APPLICATIONS: TO CHARGE OR NOT TO CHARGE
Jennifer Bresse-Vitelli, Philip Kim
pp. 533-537

HEALTHCARE KNOWLEDGE COLLECTION FOR CLINICAL DECISION SUPPORT SYSTEMS
Lillian Ortiz-Fournier, Mysore Ramaswamy
pp. 538-546

A TECHNOLOGICAL INFRASTRUCTURE DEVELOPMENT ASSESSMENT TO ENABLE A KNOWLEDGE SOCIETY INTO A SMART CITY
Elías Padilla, Eulalia Martínez
pp. 547-552

INDIVIDUAL DIFFERENCES ON INTENTIONS TO USE STRONG PASSWORDS
Lixuan Zhang, William McDowell, Todd Schultz
pp. 553-558

COURSE SEQUENCING AND PERFORMANCE: AN INVESTIGATION OF BUSINESS COLLEGE REQUIREMENTS IN RELATION TO AN INFORMATION SYSTEMS CORE COURSE
Sherry Woosley, Allen Truell, Melody Alexander, Jensen Zhao
pp. 559-565

CRITICAL SUCCESS FACTORS IN MANAGING VIRTUAL TEAMS: FRAMEWORK AND RELATIONSHIPS
Ganesh Vaidyanathan, Asghar Sabbaghi, Carmen Debrot
pp. 566-570

SUPPLY CHAIN INTELLIGENCE AND VALUE CREATION: A FRAMEWORK
Ganesh Vaidyanathan, Asghar Sabbaghi
pp. 571-576

AFFECTIVE COMPUTING: INVASIVE TECHNOLOGY AND LEGAL CONSIDERATIONS TO PROTECT CONSUMERS
Lee Steen, Philip Kim
pp. 577-584

STUDENTS’ USE OF MOBILE DEVICES: AN EXPLORATORY SURVEY IN AN INTRODUCTORY COMPUTER INFORMATION SYSTEM CLASS
Kamal Hingorani, Donald Woodard
pp. 585-588

UNCHARTED WATERS: USING SOCIAL NETWORKS IN HIRING DECISIONS
Chris Jones, Susan Behling
pp. 589-595

ON CODES OF ETHICS FOR WEB DESIGN
James Harris
pp. 596-600

BENEFIT-DRIVEN PARTICIPATION IN OPEN ORGANIZATIONAL SOCIAL MEDIA PLATFORMS: THE CASE OF THE SAP COMMUNITY NETWORK
Georgia Demetriou, Peter Kawalek
pp. 601-611

THE USE OF WEB LOG ANALYSIS IN ACADEMIC JOURNALS â€" CASE STUDY
Azad Ali, Frederick Kohun
pp. 612-619

PERCEPTIONS OF SOCIAL NETWORK USABILITY: IMPACTS OF PERCEIVED INTERACTIVITY AND TECHNOLOGY ACCEPTANCE
Belinda Shipps, Brandis Phillips
pp. 620-627

SOCIAL MEDIA SECURITY POLICIES: GUIDELINES FOR ORGANIZATIONS
Nipul Patel, Hetal Jasani
pp. 628-634

APPLYING LEAN PRINCIPLES IN SOFTWARE DEVELOPMENT PROCESS â€" A CASE STUDY
Jeff Widman, Stella Hua, Steven Ross
pp. 635-639

HAS YOUR PATENT STRATEGY BEEN “BILSKIED”? CHALLENGES FACING SOFTWARE BASED BUSINESS METHOD PATENTS
Nancy Martin, David Green
pp. 640-643

CHANGES IN EMPLOYEE INTENTION TO COMPLY WITH ORGANIZATIONAL SECURITY POLICIES AND PROCEDURES FACTORING RISK PERCEPTION: A COMPARISON OF 2006 AND 2010
Queen Booker, Fred Kitchens
pp. 649-658

AITP NCC BI GIS COMPETITION: A BI CASE PERSPECTIVE
Roger Hayen
pp. 659-668

EXPECTANCY THEORY PREDICTIONS OF BLOGGING INTENTION AND CONDUCTS
Hsiu-Li Liao, Su-Houn Liu, Shih-Ming Pi
pp. 669-677

MITIGATING RISK IN A HIGH UNCERTAINTY AVOIDANCE CULTURE â€" AIR TRAFFIC CONTROL
Darlene Drazenovich, Robert Skovira
pp. 678-688

INFORMATION TECHNOLOGY AND DISTANCE EDUCATION
Manying Qiu, Carl Wright, Shuting Xu
pp. 689-695

VALIDATING A COMPREHENSIVE MODEL FOR ONLINE SOCIAL NETWORKING USE:INITIAL RESULTS
Thilini Ariyachandra, Nancy Bertaux
pp. 696-710

THE REVOLUTION OF USING COLLABORATIVE SOURCES IN HIGHER EDUCATION
Christine Shull, Dana McCann
pp. 711-714

PERCEPTIONS OF THE IMPORTANCE OF OBJECT PROGRAMMING LANGUAGE CONTENT BY INDUSTRY PROFESSIONALS: A PRELIMINARY STUDY
Joseph Laverty, David Wood, Frederick Kohun, Gary DeLorenzo
pp. 715-723