International Association for Computer Information Systems
Saturday, October 21, 2017
FAQs   Contact

Table of Contents - Volume 11, Issue 1



DEVELOPMENT AND DIFFUSION OF CUSTOMER RELATIONSHIP MANAGEMENT ACROSS DISCIPLINES: FAD OR FASHION?
Maria Barua
Godwin Udo
pp. 1-8

UTILIZING THE TECHNOLOGY ACCEPTANCE MODEL TO ASSESS THE EMPLOYEE ADOPTION OF INFORMATION SYSTEMS SECURITY MEASURES
Cynthia Jones
Richard McCarthy
Leila Halawi
Bahaudin Mujtaba
pp. 9-16

SOFTWARD PIRACY: EXPLORING AWARENESS OF THE LAW AS A DETERMINANT OF SOFTLIFTING ATTITUDE AND INTENTION
Pamela Dupin-Bryant
pp. 17-22

INFORMATION PROCESSING CHALLENGES IN FINANCIAL SUPPLY CHAINS
Richard Calvasina
Mysore Ramaswamy
Eugene Calvasina
Gerald Calvasina
pp. 23-28

THE PROCESS ARCHITECTURE OF INFORMATION SYSTEMS - HIGHER EDUCATION INSTITUTIONS MANAGERIAL TOOL
Srecko Natek
Dusan Lesjak
pp. 29-34

THE EVOLUTION AND IMPLEMENTATION OF GLOBAL ASSURANCE
Garry White
pp. 35-40

A LONGITUDINAL STUDY OF FINANCIAL EXECUTIVES' VIEWS ON INFORMATION SYSTEMS RETURNS AND KEY TECHNOLOGY ISSUES
Alan Peslak
pp. 41-47

TECHNICAL AND USABILITY TESTING OF A MEDICAL INTERACTION WORKGROUP APPLICATION SUPPORT SYSTEM (MIWASS)
James Rodger
pp. 48-54

HPC PORTAL DEVELOPMENT PLATFORM
Chien-Heng Wu
pp. 55-60

SOCIAL AND TECHNOLOGICAL CONCERNS ASSOCIATED WITH THE USAGE OF UBIQUITOUS COMPUTING TECHNOLOGIES
Carsten Rocker
pp. 61-68

USING INFORMATION AND COMMUNICATION TECHNOLOGIES TO RENDER TRANSPARENT GOVERNANCE IN TRANSITION COUNTRIES
Mysore Ramaswamy
pp. 69-76

SOFTWARE DEVELOPMENT AND INTELLECTUAL PROPERTY: WHAT YOU DON'T KNOW CAN HURT YOU
Janet Ford
Barbara White
Lorrie Willey
pp. 77-84

DO YOU WANT ME TO PUBLISH THAT NOW? A LEGAL ANALYSIS OF ONLINE PUBLISHING
Jason Triche
Sam Ramanujan
Someswar Kesh
pp. 85-89

USING OBJECT-RELATIONAL DATABASE TECHNOLOGY TO SOLVE PROBLEMS IN DATABASE DEVELOPMENT
Ming Wang
pp. 90-99

KNOWLEDGE-BASED SUPPLY CHAIN NETWORK: A SIMULATION APPLICATION DESIGN CONFIGURED WITH RADIO FREQUENCY IDENTIFICATION, FREIGHT TRAIN DISPATCH, AND CONTAINER SHIPMENTS
Andrew Chen
William Chen
Christina Chen
pp. 100-110

RFID UBIQUITY AND PRIVACY LOSS CONCERNS AN ANALYSIS OF A PENNSYLVANIA UNIVERSITY
David Douglas
Karen Paullet
pp. 111-118

EXPLORING COMPUTER ETHICS ISSUES IN MALAYSIA
Maslin Masrom
Zuraini Ismail
Rashidah Anuar
Ramlah Hussein
Norshidah Mohamed
pp. 119-128

AUTOMATIC INTERPRETATION OF ENGLISH SPEECH
Milam Aiken
Lakisha Simmons
Shilpa Balan
pp. 129-133

UNDERSTANDING THE BENEFITS OF SOCIAL EXCHANGE IN B2B COMMUNITIES
Lakisha Simmons
Chris Simmons
Anthony Ammeter
Kaushik Ghosh
pp. 134-141

WEB APPLICATION SECURITY TESTING: AN INDUSTRY PERSPECTIVE ON HOW ITS EDUCATION IS PERCEIVED
John Scarpino
pp. 142-153

DOES THE TECHNOLOGY PORTRAYED IN TELEVISION CRIME SHOWS HAVE AN EFFECT ON POTENTIAL JURORS?
Gary Davis
Karen Paullet
Max Houck
Tom Swan
pp. 154-163

STRATEGIES FOR IMPROVING SYSTEMS DEVELOPMENT PROJECT SUCCESS
Christopher Jones
Glen Gray
Anna Gold
David Miller
pp. 164-173

ANALYSIS OF AIRPORT SECURITY BASED ON THE FIVE COMPONENTS OF INFORMATION SYSTEMS
Juyun Cho
Tom Velazquez
Benedikt Kraus
Korakod Aphipanya
pp. 174-183

WHAT'S THIS TWITTER ALL ABOUT? AN E-PATIENT'S END-USER COMMUNITY (EUCY)
Elaine Winston
pp. 184-191

AN EVALUATION OF EMPLOYEES' ATTITUDES TOWARD SOCIAL NETWORKING IN THE WORKPLACE
Matthew North
pp. 192-197

A FRAMEWORK FOR MEASURING HAPPINESS IN ONLINE SOCIAL NETWORKS
Amy Chou
Billy Lim
pp. 198-203

EXPLORING MOBILE DEVICE SECURITY POLICIES IN HIGHER EDUCATION
Beth Jones
Lynn Heinrichs
pp. 204-210

ACCOUNTING PROFESSIONALS' VALUE ASSESSMENT OF ENTRY LEVEL IT SKILLS AND TOPICS: A COMPARISON OF THE DIFFERENCES BETWEEN CPA FIRMS AND INDUSTRY/GOVERNMENT ORGANIZATIONS
Orion Welch
Tom Madison
Sandra Welch
pp. 211-215

CUTTING EDGE COMMUNICATION: MICROBLOGGING AT THE FORTUNE 200, TWITTER IMPLEMENTATION AND USAGE
Carl Case
Darwin King
pp. 216-223

CELLULAR TELEPHONES: A USEFUL TECHNOLOGY WITH DANGEROUS CONSEQUENCES
Robbie Connell
Jack Shorter
Richard Aukerman
pp. 224-231

THE REASONS USERS "FAN" ORGANIZATIONAL FACEBOOK PAGES: A PILOT STUDY
John Anderson
James McCulloch
Keith Mulbery
pp. 232-236

WEB COMMUNICATIONS STRUCTURE
James Lee
Ben Kim
Ted Lee
Pairin Katerattanakul
Wan See
pp. 237-246

3G MOBILE PHONE ADOPTION AND CONTINUED USE: A PILOT STUDY
Meng Xudong
Peggy Deal
Liu Li
Christopher Griffin
William Barnett
pp. 247-255

AN EMPIRICAL STUDY OF USER AUTHENTICATION: THE PERCEPTIONS VERSUS PRACTICE OF STRONG PASSWORDS
Lisa Bain
Michael Hayden
Sandra Sneesby
pp. 256-265

MEASURING JOURNAL QUALITY: PROPOSED CRITERIA AND THEIR APPLICATION TO IS JOURNALS
James Cappel
pp. 266-273

WHY USABILITY TESTING WORKS FOR IT AUDIT
Voraphan Raungpaka
Usana Patramontree
pp. 274-279

E-BUSINESS AT RISK: A LOOK AT THE IMPACT AND CONTROL OF E-BUSINESS FRAUD
Patricia Lake
Susan Behling
pp. 280-285

ANALYZING THE ADOPTION OF COMPUTER SECURITY UTILIZING THE HEALTH BELIEF MODEL
Chet Claar
Jeffrey Johnson
pp. 286-291

A PRELIMINARY PERSPECTIVE OF THE 50-YEAR PUBLICATIONS IN THE JOURNAL OF COMPUTER INFORMATION SYSTEMS
Monica Holmes
Roger Hayen
pp. 292-303

AN ANALYSIS OF THE IMPACT OF ELECTRONIC MEDICAL RECORDS SYSTEM IN A GLOBAL MEDICAL TOURISM ENVIRONMENT
Saviour Nwachukwu
Mysore Ramaswamy
Ashagre Yigletu
Donald Andrews
pp. 304-308

BEYOND THE IMPACT FACTOR: UPDATES ON A CITATION STUDY FOR INFORMATION TECHNOLOGY JOURNALS
Kara Rawlins
Dale Gust
pp. 309-318

FACTORS IMPACTING ENROLLMENT IN INFORMATION SYSTEMS PROGRAMS
Manouchehr Tabatabaei
Mehdi Tehrani
pp. 319-321

VENDOR TRUST INFLUENCING CRM STRATEGIC IMPLEMENTATION PROCESS
Assion Lawson-Body
Lori Willoughby
Kinvi Logossah
Fred Celimene
pp. 322-335

THE MOBILE WORKER AND THE ORGANIZATION
James Sena
pp. 336-346

OUTSOURCING XBRL FINANCIAL STATEMENT FILING: A CASE STUDY OF PRACTICES IN TWO PUBLIC FIRMS
Deb Sledgianowski
Robert Fonfeder
Jackson Lam
pp. 347-351

DATA MINING AND SOCIAL NETWORKING SITES: PROTECTING BUSINESS INFRASTRUCTURE AND BEYOND
Richard Bassett
Tiffany Chamberlain
Stephen Cunningham
Gregor Vidmar
pp. 352-359

PENETRATION TESTING: A VITAL COMPONENT OF AN INFORMATION SECURITY STRATEGY
James Smith
Jack Shorter
pp. 358-363

BUSINESS PROCESS RE DESIGN IN EDUCATIONAL INSTITUTES IN MIDDLE EASTERN COUNTRIES: CASE STUDY
Lila Rajabion
Fida Alsughair
Arwa Aldossary
Seba Almaghlouth
Noora Abunayan
pp. 364-371

CLINICAL RESEARCH: USING BUSINESS INTELLIGENCE FRAMEWORK
Terri Keeling
pp. 372-376

ECONOMIC CONSEQUENCES OF THE SARBANES–OXLEY ACT ON E-COMMERCE FIRMS
Ronald Young
Hua-Wei Huang
Yun-Chia Yan
pp. 377-383

SPELLING AND GRAMMATICAL ERRORS IN ELECTRONIC MEETINGS
Mina Park
Milam Aiken
Tobin Lindblom
Mahesh Vanjani
pp. 384-391

A POST ANALYSIS OF A FORMALIZED SOFTWARE QUALITY ASSURANCE TOOL'S IMPLEMENTATION: A CASE STUDY
John Scarpino
Paul Kovacs
pp. 392-401

A FRAMEWORK FOR INFORMATION SECURITY AWARENESS PROGRAMS
Carlos Domínguez
Mysore Ramaswamy
Eulalia Martinez
Mariano Cleal
pp. 402-409

FORMULATING AN EFFECTIVE CYBERSECURITY CURRICULUM
Terry Smith
Alex Koohang
Robert Behling
pp. 410-416

THE DEBATE OF ONLINE COURSE QUALITY IN TRADITIONAL UNIVERSITIES: A CASE STUDY
Mohammad Rob
pp. 417-422

AN INTELLIGENT PROCESS PLANNING CONCEPT USING AN AGENT-BASED APPROACH
Utpal Bose
pp. 423-431

RAISING AWARENESS: AN EXAMINATION OF EMBEDDED GPS DATA IN IMAGES POSTED TO THE SOCIAL NETWORKING SITE TWITTER
Michael Flinn
Christopher Teodorski
Karen Paullet
pp. 432-438

TECHNOLOGY: CONVENIENCE OR NECESSITY
Karen Paullet
Jamie Pinchot
Daniel Rota
pp. 439-444

IN MEMORY ANALYTICS: BUSINESS INTELLIGENCE WITHOUT A DATAWAREHOUSE
Anthony Serapiglia
pp. 445-450

ONLINE SHOPPING FACTORS: AN ANALYSIS OF COLLEGE STUDENTS' EXPERIENCES BASED ON GENDER
Allen Truell
Melody Alexander
Jensen Zhao
Sherry Woosley
pp. 451-459

THE IMPACT OF WEB BROWSING ON CLASSROOM LEARNING PERFORMANCE
Han Li
Yingjin Cui
Xue Bai
Steve Davis
pp. 460-466

DEVELOPING AN INTELLIGENT RECOMMENDATION SYSTEM FOR A PRIVATE UNIVERSITY IN THAILAND
Kanokwan Kongsakun
Chun Fung
Tuchtawan Chanakul
pp. 467-472

SOCIAL MANAGEMENT NETWORKS: ANALYSIS OF POSTINGS IN FACEBOOK GROUPS RELATED TO WILDLIFE MANGEMENT AND PROSPECTS FOR DATA COLLECTION
G. Webb
pp. 473-482

A SMART WEB IMAGE RETRIEVAL SYSTEM BASED ON SEMANTIC MARKUP FOR INTELLIGENT E-BUSINESS
Seong-Yong Hong
pp. 483-490

EXAMINING QUANTITY AND TYPE OF COMMUNICATION IN CONTRIBUTING TO IS PROJECT SUCCESS
K. David Smith
Kimberly Merritt
pp. 491-496

USING DISCRETE EVENT SIMULATION TO EVALUATE THE BENEFITS OF RFID IN REDUCING TRAFFIC CONGESTION AND POLLUTION WHILE INCREASING STUDENT SAFETY IN RURAL OKLAHOMA SCHOOLS
Andrew Tiger
Ming-Shan Su
Jane Hicks
pp. 497-506

A COMPILATION RESEARCH OF ERP IMPLEMENTATION CRITICAL SUCCESS FACTORS
Zhenyu Huang
pp. 507-512

ONLINE SOCIAL NETWORKS AND THE PRIVACY PARADOX: A RESEARCH FRAMEWORK
Michael Mainier
Michelle Louch
pp. 513-517

ASSESSING BLACKBOARD: STUDENT PERCEPTIONS OF THE ONLINE TOOL
Adnan Chawdhry
Karen Paullet
Daniel Benjamin
pp. 518-524

LEADING TO SUCCESS VIA MENTORSHIP
Li-Jen Shannon
Ken Hartness
pp. 525-532

THE ECONOMICS OF FEE-BASED IPHONE APPLICATIONS VERSUS FREE APPLICATIONS: TO CHARGE OR NOT TO CHARGE
Jennifer Bresse-Vitelli
Philip Kim
pp. 533-537

HEALTHCARE KNOWLEDGE COLLECTION FOR CLINICAL DECISION SUPPORT SYSTEMS
Lillian Ortiz-Fournier
Mysore Ramaswamy
pp. 538-546

A TECHNOLOGICAL INFRASTRUCTURE DEVELOPMENT ASSESSMENT TO ENABLE A KNOWLEDGE SOCIETY INTO A SMART CITY
Elías Padilla
Eulalia Martínez
pp. 547-552

INDIVIDUAL DIFFERENCES ON INTENTIONS TO USE STRONG PASSWORDS
Lixuan Zhang
William McDowell
Todd Schultz
pp. 553-558

COURSE SEQUENCING AND PERFORMANCE: AN INVESTIGATION OF BUSINESS COLLEGE REQUIREMENTS IN RELATION TO AN INFORMATION SYSTEMS CORE COURSE
Sherry Woosley
Allen Truell
Melody Alexander
Jensen Zhao
pp. 559-565

CRITICAL SUCCESS FACTORS IN MANAGING VIRTUAL TEAMS: FRAMEWORK AND RELATIONSHIPS
Ganesh Vaidyanathan
Asghar Sabbaghi
Carmen Debrot
pp. 566-570

SUPPLY CHAIN INTELLIGENCE AND VALUE CREATION: A FRAMEWORK
Ganesh Vaidyanathan
Asghar Sabbaghi
pp. 571-576

AFFECTIVE COMPUTING: INVASIVE TECHNOLOGY AND LEGAL CONSIDERATIONS TO PROTECT CONSUMERS
Lee Steen
Philip Kim
pp. 577-584

STUDENTS' USE OF MOBILE DEVICES: AN EXPLORATORY SURVEY IN AN INTRODUCTORY COMPUTER INFORMATION SYSTEM CLASS
Kamal Hingorani
Donald Woodard
pp. 585-588

UNCHARTED WATERS: USING SOCIAL NETWORKS IN HIRING DECISIONS
Chris Jones
Susan Behling
pp. 589-595

ON CODES OF ETHICS FOR WEB DESIGN
James Harris
pp. 596-600

BENEFIT-DRIVEN PARTICIPATION IN OPEN ORGANIZATIONAL SOCIAL MEDIA PLATFORMS: THE CASE OF THE SAP COMMUNITY NETWORK
Georgia Demetriou
Peter Kawalek
pp. 601-611

THE USE OF WEB LOG ANALYSIS IN ACADEMIC JOURNALS – CASE STUDY
Azad Ali
Frederick Kohun
pp. 612-619

PERCEPTIONS OF SOCIAL NETWORK USABILITY: IMPACTS OF PERCEIVED INTERACTIVITY AND TECHNOLOGY ACCEPTANCE
Belinda Shipps
Brandis Phillips
pp. 620-627

SOCIAL MEDIA SECURITY POLICIES: GUIDELINES FOR ORGANIZATIONS
Nipul Patel
Hetal Jasani
pp. 628-634

APPLYING LEAN PRINCIPLES IN SOFTWARE DEVELOPMENT PROCESS – A CASE STUDY
Jeff Widman
Stella Hua
Steven Ross
pp. 635-639

HAS YOUR PATENT STRATEGY BEEN "BILSKIED"? CHALLENGES FACING SOFTWARE BASED BUSINESS METHOD PATENTS
Nancy Martin
David Green
pp. 640-643

CHANGES IN EMPLOYEE INTENTION TO COMPLY WITH ORGANIZATIONAL SECURITY POLICIES AND PROCEDURES FACTORING RISK PERCEPTION: A COMPARISON OF 2006 AND 2010
Queen Booker
Fred Kitchens
pp. 649-658

AITP NCC BI GIS COMPETITION: A BI CASE PERSPECTIVE
Roger Hayen
pp. 659-668

EXPECTANCY THEORY PREDICTIONS OF BLOGGING INTENTION AND CONDUCTS
Hsiu-Li Liao
Su-Houn Liu
Shih-Ming Pi
pp. 669-677

MITIGATING RISK IN A HIGH UNCERTAINTY AVOIDANCE CULTURE – AIR TRAFFIC CONTROL
Darlene Drazenovich
Robert Skovira
pp. 678-688

INFORMATION TECHNOLOGY AND DISTANCE EDUCATION
Manying Qiu
Carl Wright
Shuting Xu
pp. 689-695

VALIDATING A COMPREHENSIVE MODEL FOR ONLINE SOCIAL NETWORKING USE:INITIAL RESULTS
Thilini Ariyachandra
Nancy Bertaux
pp. 696-710

THE REVOLUTION OF USING COLLABORATIVE SOURCES IN HIGHER EDUCATION
Christine Shull
Dana McCann
pp. 711-714

PERCEPTIONS OF THE IMPORTANCE OF OBJECT PROGRAMMING LANGUAGE CONTENT BY INDUSTRY PROFESSIONALS: A PRELIMINARY STUDY
Joseph Laverty
David Wood
Frederick Kohun
Gary DeLorenzo
pp. 715-723