Table of Contents -
Volume 13, Issue 1
EVALUATING AND IMPLEMENTING LOAD AND PERFORMANCE TESTING TOOLS TO TEST ADOBE FLEX AND OTHER RICH INTERNET APPLICATIONS: A CASE STUDYJohn Scarpino
pp. 1-10
https://doi.org/10.48009/1_iis_2012_1-10
HELPING SMALL BUSINESSES IDENTIFY THEIR IT APPLICATION NEEDS, A SIMPLE TOOL Yousif Mustafa
pp. 11-16
https://doi.org/10.48009/1_iis_2012_11-16
TRANSITIONAL ISSUES DURING MIGRATION TO AN INTEGRATED DATA WAREHOUSE SYSTEM: A CASE STUDYMichael Curran
pp. 17-24
https://doi.org/10.48009/1_iis_2012_17-24
BEHAVIOURAL RESPONSES AND PROCLIVITY OF FACEBOOK USERS TOWARDS FLAMINGNitin Nitin,Amit Srivastava,Ayushi Dwivedi,Karan Sood,Manvee Gupta,Pranav Shandil
pp. 25-39
https://doi.org/10.48009/1_iis_2012_25-39
NEW PLATFORMS FOR HEALTH HYPERMEDIANicholas Polys,Andrew Wood
pp. 40-50
https://doi.org/10.48009/1_iis_2012_40-50
EXPLORING THE UNDERGRADUATE WORLD OF ELECTRONIC SOCIAL NETWORKING: AN EXAMINATION OF ATTITUDE, ADOPTION, AND USAGECarl Case,Darwin King
pp. 51-58
https://doi.org/10.48009/1_iis_2012_51-58
A CROSS-CULTURAL COMPARISON BETWEEN AMERICANS AND CHINESE IN THEIR ATTITUDES TOWARDS INFORMATION ETHICSXin Liu,Yishan Chen
pp. 59-67
https://doi.org/10.48009/1_iis_2012_59-67
ACTIVE LEARNING IN E-LEARNING: ADVANCING A SYSTEMIC MODELAlex Koohang
pp. 68-76
https://doi.org/10.48009/1_iis_2012_68-76
THE IMPACTS OF A NONPROFIT CANCER RESEARCH ORGANIZATION MOVING TO A PRIVATE CLOUD ENVIRONMENTMatthew Kisow,John Scarpino
pp. 77-84
https://doi.org/10.48009/1_iis_2012_77-84
LARGE PROGRAMMING PROJECTS FOR THE BEGINNING PROGRAMMERJeanne Baugh,Paul Kovacs
pp. 85-93
https://doi.org/10.48009/1_iis_2012_85-93
USING RECURSIVE DISTANCE VECTOR METHODOLOGY TO REVIEW REMOTE DESKTOP SOLUTIONS IN THE SMALL BUSINESS CONSULTING ENVIRONMENTStephen Hinton
pp. 94-104
https://doi.org/10.48009/1_iis_2012_94-104
CUSTOMER LOYALTY IN THE DOCTOR'S OFFICE: THE POTENTIAL OF USING TOOLS LIKE CRMJosimar Souza Costa,José Carlos Lázaro Silva Filho,Danielle Batista Coimbra,Érico Veras Marques,Isis Sousa Ferreira,Marcelo C. Teixeira Filho
pp. 105-112
https://doi.org/10.48009/1_iis_2012_105-112
BUSINESS INTELLIGENCE AND IPAD TECHNOLOGY: A MARRIAGE IN THE CLOUDJoseph Compomizzi,Shana M. D'Aurora
pp. 113-120
https://doi.org/10.48009/1_iis_2012_113-120
PERSISTENT STAGING AREA MODELS FOR DATA WAREHOUSESV. Jovanovic,I. Bojicic,C. Knowles,M. Pavlic
pp. 121-132
https://doi.org/10.48009/1_iis_2012_121-132
HACKERS GONE WILD: THE 2011 SPRING BREAK OF LULZSECStan Pendergrass
pp. 133-143
https://doi.org/10.48009/1_iis_2012_133-143
THE STRATEGIC HUNT FOR MOBILE CONSUMERS THROUGH M-COMMERCEDavid B. Scibelli,Brian Stevens
pp. 144-150
https://doi.org/10.48009/1_iis_2012_144-150
THE CURRENT STATUS OF ABET ACCREDITATION OF INFORMATION SYSTEMS PROGRAMSRonald MacKinnon,Kevin Elder,John Dyer
pp. 151-159
https://doi.org/10.48009/1_iis_2012_151-159
INTERACTIVE MULTIMEDIA LEARNING ON HEALTH CARE AMONG LEBANESE WOMEN: AN EXPLORATORY STUDY Joanna Kassem,Zeinab Houssein,Leila Halawi
pp. 160-166
https://doi.org/10.48009/1_iis_2012_160-166
INFORMATION TECHNOLOGY AND HUMAN FACTORS AFFECTING THE ACCURACY OF AUTOMATED PATIENT MEDICATION REPORTING SYSTEMSRobert Boncella,Wenying Sun,Carol Boncella
pp. 167-176
https://doi.org/10.48009/1_iis_2012_167-176
INFORMATION SECURITY POLICIES' CHANGES IN ORGANIZATIONSMarzie Astani
pp. 177-184
https://doi.org/10.48009/1_iis_2012_177-184
FURTHER COMPARISON OF ON-CAMPUS VS. E-LEARNING STUDENT SUCCESS FOR AN IS COURSERoy Foreman
pp. 185-189
https://doi.org/10.48009/1_iis_2012_185-189
LIVING IN DENIAL - A COMPARISON OF DISTRIBUTED DENIAL OF SERVICE MITIGATION METHODSElizabeth Unrein,Delaney L.S. Fish,Joshua Boeker,Wenying Sun
pp. 190-198
https://doi.org/10.48009/1_iis_2012_190-198
FROM SEARCH TO APPLICATION BUILDING - YAHOO PIPES FOR NOVICE PROGRAMMERSAbhijit Sen
pp. 199-208
https://doi.org/10.48009/1_iis_2012_199-208
A COMPARISON OF WIRELESS SECURITY PROCEDURES: SECURITY COUPLED WITH EASE OF IMPLEMENTATION FOR A COLLEGE CAMPUSRonrico Slack,Bryan Marshall
pp. 209-214
https://doi.org/10.48009/1_iis_2012_209-214
MEASURING THE EFFECTIVENESS OF INFORMATION SECURITY TRAINING: A COMPARATIVE ANALYSIS OF COMPUTER-BASED TRAINING AND INSTRUCTOR-BASED TRAININGPhilip Kim,Joseph Homan
pp. 215-224
https://doi.org/10.48009/1_iis_2012_215-224
IS THE GROWING USE OF ELECTRONIC DEVICES BENEFICIAL TO ACADEMIC PERFORMANCE? RESULTS FROM ARCHIVAL DATA AND A SURVEYTaylor Drain,Lakeisha Grier,Wenying Sun
pp. 225-231
https://doi.org/10.48009/1_iis_2012_225-231
INFORMATION TECHNOLOGY DRIVEN RESTRUCTURING OF FINANCIAL/MANAGERIAL ACCOUNTING REPORTSMysore Ramaswamy,Richard Calvasina,Eugene Calvasina,Gerald Calvasina
pp. 232-239
https://doi.org/10.48009/1_iis_2012_232-239
ON THE PHENOMENON OF DIGITAL INEQUALITYMysore Ramaswamy
pp. 240-246
https://doi.org/10.48009/1_iis_2012_240-246
EXPLORING THE U.S. STATE E-GOVERNMENT USE OF SOCIAL MEDIA FOR DEMOCRACYJensen Zhao,Allen Truell,Melody Alexander,Sushil Sharma
pp. 247-257
https://doi.org/10.48009/1_iis_2012_247-257
FACULTY PERCEPTIONS OF PEDAGOGICAL BENEFITS OF WEB 2.0 TECHNOLOGIES AND VARIABLES RELATED TO ADOPTIONPamela Dupin-Bryant
pp. 258-263
https://doi.org/10.48009/1_iis_2012_258-263
ACCEPTANCE OF CLINICAL DATA REPOSITORIES BY GENERAL PRACTITIONERSLillian Ortiz-Fournier,Mysore Ramaswamy,Eulalia Márquez-Martínez,Juan Rivera-Vázquez
pp. 264-274
https://doi.org/10.48009/1_iis_2012_264-274
DISTRACTED DRIVING: DYING TO TEXT YOUDavid Douglas,Karen Paullet,Jamie Pinchot
pp. 275-283
https://doi.org/10.48009/1_iis_2012_275-283
WHAT'S IN YOUR PROFILE? MAPPING FACEBOOK PROFILE DATA TO PERSONAL SECURITY QUESTIONSJamie Pinchot,Karen Paullet
pp. 284-293
https://doi.org/10.48009/1_iis_2012_284-293
TAKING GREEN COMPUTING TO THE COMPUTER LAB Philip Robertson,Bryan Marshall,Peter W. Cardon,Natalya Goreva
pp. 294-299
https://doi.org/10.48009/1_iis_2012_294-299
CANDIDATE-SCREENING, INFORMATION TECHNOLOGY AND THE LAW: SOCIAL MEDIA CONSIDERATIONSLorrie Willey,Barbara Wright,Teri Domagalski,Janet Ford
pp. 300-309
https://doi.org/10.48009/1_iis_2012_300-309
A MODEL FOR ENGAGING STUDENTS, COMMUNITIES AND COLLEGES THROUGH THE INTEGRATION OF SERVICE-LEARNING PROJECTS INTO INFORMATION SYSTEMS COURSESPaul Kovacs,Gayle Jesse,Lisa Kovalchick
pp. 310-320
https://doi.org/10.48009/1_iis_2012_310-320
DESIGN AND IMPLEMENTATION OF A NETWORK LAB TO ENHANCE UNDERGRADUATE NETWORKING AND INFORMATION ASSURANCE CURRICULUM IN A BACCALAUREATE DEGREE PROGRAM: A CASE STUDYJohnathan Yerby,Kevin Floyd,Jacob Morrison
pp. 321-330
https://doi.org/10.48009/1_iis_2012_321-330
UNDERSTANDING STUDENT PERFORMANCE IN AN INTRODUCTORY INFORMATION SYSTEMS COURSE: AN ASSESSMENT FOR ABETSushma Mishra,Linda Kavanaugh,John Turchek
pp. 331-339
https://doi.org/10.48009/1_iis_2012_331-339
AN EXPLORATION OF STUDENT ATTITUDES ON PRIVACY/SECURITY ISSUES: FACEBOOK USAGE CONCERNS AND EXPECTATIONSSushma Mishra,Peter Draus,Gregory Leone,Donald Caputo
pp. 340-349
https://doi.org/10.48009/1_iis_2012_340-349
EXPLORING UNDERLYING FACTORS INFLUENCING DAILY USAGE OF FACEBOOK FOR UNDERGRADUATE COLLEGE STUDENTS: A RESEARCH MODEL Sushma Mishra,Peter Draus,Gregory Leone,Donald Caputo
pp. 350-360
https://doi.org/10.48009/1_iis_2012_350-360
ANALYSIS OF THE VARIABLES THAT AFFECT FREQUENCY OF USE AND TIME SPENT ON TEXT MESSAGING Alan Peslak,Wendy Ceccucci,Neelima Bhatnagar
pp. 361-370
https://doi.org/10.48009/1_iis_2012_361-370
ANALYZE BANKING EFFICIENCY FROM AN INTERNATIONAL PERSPECTIVEJohn Wang,Bin Zhou,Ruiliang Yan
pp. 371-381
https://doi.org/10.48009/1_iis_2012_371-381
OUTLINE AND EXERCISES FOR A NOVEL INTRODUCTORY COURSE IN DATA SCIENCE AND VISUALIZATIONMegan Squire
pp. 382-390
https://doi.org/10.48009/1_iis_2012_382-390
ENABLING INNOVATIVE COURSEWORK THROUGH INCREMENTAL PROBLEM-BASED LEARNINGAmanda Holland-Minkley,Samuel Fee
pp. 391-401
https://doi.org/10.48009/1_iis_2012_391-401