International Association for Computer Information Systems
Thursday, August 17, 2017
FAQs   Contact

Table of Contents - Volume 12, Issue 1



ICT BANKING STRATEGIES DESIGNED TO GROW AND RETAIN E-COMMERCE: ALTERNATE DELIVERY CHANNELS' CUSTOMER BASE
Rudolph Strong
pp. 1-6

AN ANALYSIS OF AN ENTERPRISE MOBILITY SOFTWARE COMPANY - MANAGING SOFTWARE QUALITY AND MAINTAINING A COMPETITIVE EDGE IN FLUCTUATING PERIODS OF CORPORATE GROWTH: A CASE STUDY
John Scarpino
Rhonda Chicone
pp. 7-15

EXPLORING THE FEASIBILITY OF MOBILE MULTILINGUAL ELECTRONIC MEETINGS
Shilpa Balan
Milam Aiken
Bidyut Hazarika
pp. 16-22

THE SOCIAL SCIENCE OF DATA WAREHOUSING: ITS EVER-EVOLVING CORPORATE CULTURE
Debra Borkovich
pp. 23-35

IMPACT OF INFORMATION TECHNOLOGY INNOVATIONS ON FINANCIAL TRANSACTION PROCESSING
Mysore Ramaswamy
Richard Calvasina
Eugene Calvasina
Gerald Calvasina
pp. 36-43

SMALL NONPROFITS UNFAMILIAR WITH SARBANES-OXLEY FAILED TO ESTABLISH WHISTLEBLOWER PROTECTIONS
Matthew Kisow
pp. 44-53

TO CLOUD OR NOT TO CLOUD?
Richard Delaquis
Guy Philbin
pp. 54-58

USAGE AND PERCEPTIONS OF INTERNET AD BLOCKERS: AN EXPLORATORY STUDY
J. Sandvig
Deepinder Bajwa
Steven Ross
pp. 59-69

ENABLING BUSINESS INTELLIGENCE, KNOWLEDGE MANAGEMENT AND CLINICAL WORKFLOW WITH SINGLEVIEW
Brian Kolowitz
Rasu Shrestha
pp. 70-77

COMPUTER ETHICS OF AMERICAN AND EUROPEAN INFORMATION TECHNOLOGY STUDENTS: A CROSS-CULTURAL COMPARISO
Nancy Martin
Belle Woodward
pp. 78-87

CRITICAL FACTORS FOR SUCCESSFUL IMPLEMENTATION OF DATA WAREHOUSES
Ángel Ojeda-Castro
Mysore Ramaswamy
Ángel Rivera-Collazo
Ahmad Jumah
pp. 88-96

CULTURAL FACTORS INFLUENCING CELL PHONE ADOPTION IN DEVELOPING COUNTRIES: A QUALITATIVE STUDY
Assion Lawson-Body
Lori Willoughby
Jared Keengwe
Laurence Mukankusi
pp. 97-105

THREATS TO HEALTHCARE DATA: A THREAT TREE FOR RISK ASSESSMENT
J. Pardue
Priya Patidar
pp. 106-113

USING SQL DEVELOPER DATA MODELER AND MICROSOFT ACCESS FOR TEACHING DATABASE MODELING AND DESIGN
Kamal Hingorani
Donald Woodard
Narsin Askari-Danesh
pp. 109-115

AN EXPLORATION OF SEXTING BEHAVIOR AMONG YOUTH AND THE ASSOCIATED LEGAL RAMIFICATIONS
Jennifer Breese-Vitelli
pp. 114-119

STUDENT PERCEPTIONS OF EDUCATIONAL GAMES IN HIGHER EDUCATION: AN EMPIRICAL STUDY
Roslina Ibrahim
Samsudin Wahab
Rasimah Yusoff
Khalili Khalil
Azizah Jaafar
pp. 120-133

VALUE INCREASING ELECTRONIC COMMERCE SOLUTIONS IN THE APPAREL INDSUTRY
Kathleen DiIorio
June Wei
pp. 134-140

MOBILE TECHNOLOGY: PLUGGED IN AND ALWAYS ON
Karen Paullet
Jamie Pinchot
David Douglas
Daniel Rota
pp. 141-150

UNDERSTANDING THE IMPACT OF INFORMATION TECHNOLOGY ON STRATEGIC MANAGEMENT: A POWER ASYMMETRY VIEW
Tao Hu
Xihui Zhang
Katherine Brake
David Nickels
pp. 151-158

AN EMPIRICAL STUDY OF THE IMPACT OF EMOTIONS AND PERSONALITY ON SOCIAL NETWORKING
Alan Peslak
Neelima Bhatnagar
pp. 159-169

IPHONE AND IPAD APPLICATIONS: PERCEPTIONS OF USE IN AN ORGANIZATION'S SUPPLY CHAIN
Cassandra Elrod
Chelsea Brookshire
Elizabeth Cudney
Barry Flachsbart
pp. 170-180

WHAT DID I JUST TWEET?! A CLOSER LOOK @ HOW #E-DISCOVERY COULD IMPACT #SOCIAL NETWORKING
Philip Kim
Richard Metzer
Thomas Scanlon
pp. 181-188

FACTORS AFFECTING EMAIL RESPONSE RATES IN A CORPORATE ENVIRONMENT
Robert LaMastro
Daniel McFarland
pp. 189-193

USERS ACCEPTANCE ON MIXED REALITY TECHNOLOGY
Rasimah Yusoff
Roslina Ibrahim
Halimah Zaman
Azlina Ahmad
Syazani Suhaifi
pp. 194-205

AN ANALYSIS OF COMPUTER FRAUD: SCHEMES, DETECTION, AND OUTCOMES
Sandra Welch
Tom Madison
Orion Welch
pp. 206-212

MANAGEMENT GUIDELINES FOR SCRUM AGILE SOFTWARE DEVELOPMENT PROCESS
Juyun Cho
Richard Huff
David Olsen
pp. 213-223

SECURITY AWARENESS FOR HEALTH CARE INFORMATION SYSTEMS: A HIPAA COMPLIANCE PERSPECTIVE
Sushma Mishra
Gregory Leone
Donald Caputo
Robert Calabrisi
pp. 224-236

TAXONOMY OF MULTIPLE LEVELS OF SWOT ANALYSIS IN PROJECT MANAGEMENT
Ganesh Vaidyanathan
Asghar Sabbaghi
pp. 237-245

INFORMATION SECURITY EFFECTIVENESS: A RESEARCH FRAMEWORK
Sushma Mishra
Lewis Chasalow
pp. 246-255

BRIDGING DIGITAL AND GENDER DIVIDES: A PRELIMINARY STUDY APPLYING USES AND GRATIFICATION THEORY TO DOT DIVA’S RECRUITING STRATEGIES
Dacia Charlesworth
pp. 256-263

SECURITY TRAINING HUMAN PROTOCOL
Harry Benham
pp. 264-270

IDENTIFYING INFORMATION SECURITY GOVERNANCE DIMENSIONS: A MULTINOMIAL ANALYSIS
Sushma Mishra
Jay Powell
pp. 271-279

DESIGNING AND BUILDING A KNOWLEDGE WAREHOUSE ORIENTED, PUBLIC DECISION SUPPORT SITE USING FREE GOOGLE TOOLS: AN ANALYSIS AND CASE APPLICATION TO DEER MANAGEMENT
G. Webb
pp. 280-290

AN EXPLORATORY STUDY ON DETERMINING FACTORS FOR THE SMARTPHONE SELECTION DECISION
Dalsang Chung
Sun Chun
pp. 291-300

COMPARATIVE ANALYSIS OF MOBILE APPLICATION DEVELOPMENT AND SECURITY MODELS
Joseph Laverty
David Wood
Frederick Kohun
John Turchek
pp. 301-312

THERE'S AN APP FOR THAT, BUT IS THERE A MARKET FOR THAT APP? AN EXPLORATION OF THE APP MARKET AS AN AVENUE FOR ENTREPRENEURSHIP
George Kirk
pp. 313-317

AN EMPIRICAL ANALYSIS OF MOBILE SMART DEVICE ACCURACY AND EFFICIENCY IN GPS-ENABLED FIELD DATA COLLECTION
Matthew North
pp. 318-327

OBJECT REUSE AND INTEGRATION IN OBJECT-RELATIONAL DATABASE DEVELOPMENT
Ming Wang
pp. 328-338

CLOUD-BASED EMAIL ARCHITECTURE FOR HIGHER EDUCATION INSTITUTIONS
Meena Srinivasan
pp. 339-345

SAP AND MOBILE APPLICATIONS
William Gruver
Camille Rogers
pp. 346-351

FRAMING USER RESPONSES TO THE INTRODUCTION OF NEW INFORMATION TECHNOLOGY IN THE CONTEXT OF NEGATIVE CAPABILITY
Judith Decou
Diana Kao
pp. 352-356

EMPLOYING HOST VIRTUALIZATION AND SYMMETRIC MULTI-PROCESSING AS A STRATEGY FOR IMPROVING PERFORMANCE IN COMPUTENTIONALLY INTENSE PROBLEMS
Paul Safonov
Dennis Guster
Corey Hemminger
pp. 357-365

A FRAMEWORK AND DEMO FOR PREVENTING ANTI-COMPUTER FORENSICS
Chris Simmons
Danielle Jones
Lakisha Simmons
pp. 366-372

AN EXPLORATORY STUDY OF ADOPTION OF INFORMATION TECHNOLOGY BY SMALL AND MEDIUM BUSINESSES
Utpal Bose
pp. 373-381

USING AN INNOVATION DIFFUSION THEORY FRAMEWORK TO EXPLORE WEB SITE ADOPTION BY SMALL TO MEDIUM SIZED ENTERPRISES
Mary Helen Fagan
pp. 382-391

OBJECT DATA REUSE AND INTEGRATION IN ERP
Ming Wang
Xuesong Zhang
Drew Hwang
pp. 392-400

THE USE OF SOCIAL NETWORKING TOOL TWITTER TO IMPROVE COLLEGE STUDENTS' BUSINESS WRITING SKILLS
Lajuan Davis
L. Roger Yin
pp. 401-406

AN EMPIRICAL STUDY OF CELL PHONE AND SMARTPHONE USAGE
Alan Peslak
Li-Jen Shannon
Wendy Ceccucci
pp. 407-417

FACTORS AFFECTING THE MATRICULATION OF AFRICAN AMERICAN UNDERGRADUATE STUDENTS: AN EXPLORATORY STUDY
Leila Halawi
Andrew Knowles
Richard McCarthy
pp. 418-424

UNDERSTANDING PERCEIVED FLAMING TENDENCIES ON SOCIAL NETWORKING SITES: AN EXPLORATORY STUDY
Nitin Nitin
Ankush Bansal
Deepak Khazanchi
pp. 425-435

INFLUENCE OF DEMOGRAPHIC VARIABLES ON CUSTOMER SATISFACTION REGARDING E-BANKING: AN EMPIRICAL INVESTIGATION
S Kavitha
A Lakshmi
pp. 436-444

DESIGNING DATA WAREHOUSES TO SUPPORT CRIMINAL INVESTIGATION
Juan Rivera-Vázquez
Lillian Ortiz-Fournier
Mysore Ramaswamy
pp. 445-454

GLOBAL PERSPECTIVE ON RADIO SPECTRUM MANAGEMENT USAGE AND POLICY
S Srinivasan
pp. 455-463

USING ICT AND SERVICE LEARNING IN RURAL SENEGAL PROJECT FUNDED BY USAID/HED
Vishnu Vinekar
Elizabeth Langran
Winston Tellis
pp. 464-472

AN ANALYSIS OF THE MODALITIES OF ACADEMIC GLOBALIZATION AND ACCEPTANCE CRITERIA FOR FUTURE MODELS
Abdur Choudhary
Rehan Choudhary
pp. 473-482

ANALYZING THE ROLE OF SOME PERSONAL DETERMINANTS IN WEB 2.0 APPLICATIONS USAGE
Adel Aladwani
pp. 483-488