International Association for Computer Information Systems
Thursday, August 17, 2017
FAQs   Contact

Table of Contents - Volume 16, Issue 2



ON SECURITY NEGOTIATION MODEL DEVELOPED FOR THE SECURITY OF THE SOCIAL NETWORKING SITES FROM THE HOSTILE USER
Ruchi Verma
Nitin Nitin
pp. 1-15

E-GOVERNMENT SUCCESS FACTORS: A PERSPECTIVE ON GOVERNMENT UNITS
Ewa Ziemba
Tomasz Papaj
Maria Jadamus-Hacura
pp. 16-27

TOWARDS A CONSISTENCY OF INFORMATION SYSTEMS CURRICULUM
Mehdi Sagheb-Tehrani
pp. 28-37

A METHODOLOGY FOR DETERMINING IF VIRTUALIZATION IS APPROPRIATE FOR MILITARY TRAINING APPLICATIONS
Kenneth Marsilio
pp. 38-43

IN-CLASSROOM TEACHING IS HERE TO STAY–AT LEAST FOR STUDENTS IN COMPUTER AND INFORMATION SYSTEMS
Paul Kovacs
Lisa Kovalchick
Alan Peslak
Wenli Wang
pp. 44-52

IT/IS FACULTY PERCEPTIONS OF THE UNIONIZATION PROCESS OF ADJUNCT FACULTY: A CASE STUDY
Michael Curran
Robert Kowalewski
Robert Trosky, Jr
Carrie Payne
pp. 53-62

THE USE OF MOBILE ASSISTED LANGUAGE LEARNING APPLICATIONS IN LEARNING ARABIC
Razak Abedalla
pp. 63-73

DO ONLINE AND FACE-TO-FACE STUDENTS EXHIBIT THE SAME INFORMATION ANALYSIS SKILLS?
Nelbert St. Clair
John Girard
pp. 74-80

BIG DATA ANALYTICS
Jasmine Zakir
Tom Seymour
Kristi Berg
pp. 81-90

DO YOU KNOW WHAT YOUR NAME IS? THE QUESTION OF ADDITIVE OR REDUCTIVE PRACTICES
Gerald Johnson
D. Lance Revenaugh
pp. 91-101

MOBILE APPLICATIONS FOR HEALTH CARE SUPPORT
Dejan Zilli
Jozica Leskovsek
Nova Vizija
Srecko Natek
Nova Vizija
Dusan Lesjak
pp. 102-107

USING WRITING ACROSS THE CURRICULUM (WAC) TECHNIQUES TO PROMOTE INCREASED STUDENT ENGAGEMENT AND LEARNING IN THE COMPUTER INFORMATION SYSTEMS CURRICULUM
Bruce Saulnier
pp. 108-115

PREDICTORS OF SUCCESS IN E-LEARNING COURSEWARE USABILITY DESIGN
Alex Koohang
Joanna Paliszkiewicz
Jeretta Horn Nord
pp. 116-122

ACADEMIC PREPARATION AND THE INFLUENCE OF IPAD TECHNOLOGY ON MILITARY AND US VETERAN STUDENTS
Joseph Compomizzi
Beth Sindaco
pp. 123-132

OBSTACLES TO THE ADOPTION OF CLOUD COMPUTING: BEST PRACTICIES IN TECHNOLOGY AND COMMUNICATION
Craig Callender
Bryan Marshall
Peter Cardon
Nipul Patel
pp. 133-139

EXAMINING THE APPLICATION OF BIG DATA ANALYTICS TO INCREASE UNIVERSITY RETENTION AND PROMOTE STUDENT SUCCESS
Jody Strausser
pp. 140-148

ELECTRONIC PAYMENT SYSTEMS USE AND SATISFACTION IN AN ARABIC COUNTRY: EVIDENCE FROM KUWAIT
Kamel Rouibah
pp. 149-160

USING THE BOLMAN AND DEAL’S FOUR FRAMES IN DEVELOPING A DATA GOVERNANCE STRATEGY
Justin Fruehauf
Fahad Al-Khalifa
Joesph Coniker
pp. 161-167

A MULTIFACTOR RESEARCH MODEL OF ANTECEDENTS OF SECURITY AND PRIVACY IN HEALTHCARE SETTINGS
Sushma Mishra
Peter Draus
Natalya Goreva
Donald Caputo
pp. 168-175

CAN WE LIVE WITHOUT THE INTERNET? AN OVERALL AND DEMOGRAPHIC ANALYSIS OF INTERNET USAGE AND DEPENDENCE
Alan Peslak
pp. 176-184

SECURITY BREACHES IN HEALTHCARE DATA: AN APPLICATION OF THE ACTOR-NETWORK THEORY
Richard Stachel
Marilyn DeLaHaye
pp. 185-194

TEACHING CASE: A SITUATED LEARNING APPROACH TO ERP ROLE ADAPTATION AND BUSINESS INTELLIGENCE
Mary Dunaway
pp. 195-208

IMPACT OF THE USE OF BLACKBOARD ON PERFORMANCE OF ACCOUNTING STUDENTS
Laurence Lawson-Body
Lori Willoughby
Assion Lawson-Body
pp. 209-216

USEFULNESS AND USABILITY OF MOBILE DEVICES IN CHINESE-ENGLISH ELECTRONIC MEETINGS
Milam Aiken
Jiafeng Wang
Linwu Gu
Mahesh Vanjani
pp. 217-225

REVISIT CHALLENGES FOR TEACHING COMPUTER LITERACY: A CASE OF USING AN ONLINE SIMULATION TOOL
Thomas Ngo-Ye
Jae Choi
pp. 226-235

THE RISKS AND REWARDS OF COMPUTING EVERYWHERE FOR SMALL BUSINESS ENTREPRENEURS
Richard Bassett
Anthony Richardson
Robert Page
pp. 236-245

INNOVATING KNOWLEDGE MANAGEMENT IN CYBER WARFARE
Quinn Lanzendorfer
Scott Spangler
pp. 246-254