International Association for Computer Information Systems
Friday, April 26, 2024

Table of Contents - Volume 16, Issue 3



FACTORS AFFECTING CLOUD COMPUTING ADOPTION AMONG UNIVERSITIES AND COLLEGES IN THE UNITED STATES AND CANADA
William Klug, Xue Bai
pp. 1-10
https://doi.org/10.48009/3_iis_2015_1-10

LEARNING ABOUT LEARNING ABOUT LEARNING: INSIGHTS FROM A STUDENT SURVEY IN A HYBRID CLASSROOM ENVIRONMENT
Guido Lang, Stephen O'Connell
pp. 11-16
https://doi.org/10.48009/3_iis_2015_11-16

STRUCTURED ASSIGNMENT PEDAGOGY: AN SAP ENTERPRISE SOFTWARE DEPLOYMENT
Roger Hayen
pp. 17-26
https://doi.org/10.48009/3_iis_2015_17-26

CASE STUDY: CAN DIGITAL NATIVES ADAPT TO TECHNOLOGY’S CHANGES AND SPEED?
Scott Spangler, Anthony Rodi, Gary DeLorenzo, Frederick Kohun
pp. 27-32
https://doi.org/10.48009/3_iis_2015_27-32

CYBERSPACE: A VENUE FOR TERRORISM
David Bieda, Leila Halawi
pp. 33-42
https://doi.org/10.48009/3_iis_2015_33-42

BLENDED LEARNING IN THE INTRODUCTORY COMPUTER SKILLS COURSE
Paul Stephens, Matthew McGowan, Valerie Pape
pp. 43-53
https://doi.org/10.48009/3_iis_2015_43-53

A CONCEPTUAL MODEL TO MEASURE ERP USER-VALUE
Mohamed Lotfy, Leila Halawi
pp. 54-63
https://doi.org/10.48009/3_iis_2015_54-63

TOO “BIG” TO PROCESS: BIG DATA IN THE BUSINESS LIBRARY: KEY RESOURCES AND IMPLICATIONS FOR THE FUTURE
Kara Rawlins, Breezy Silver
pp. 64-69
https://doi.org/10.48009/3_iis_2015_64-69

COOL OR CREEPY: CONSUMER COMFORT LEVEL WITH SENTIMENT ANALYTICS
Matthew North
pp. 70-79
https://doi.org/10.48009/3_iis_2015_70-79

ANALYZING AN INFORMATION SYSTEMS PROGRAM SKILL-SET: A BOTTOM-UP VALIDATION OF A TOP-DOWN DESIGN
Arnaldo Ramos-Torres, Maria del R. Rodriguez-Orellana
pp. 80-89
https://doi.org/10.48009/3_iis_2015_80-89

AN EMPERICAL CASE RESPONSE TO DOES INFORMATION SYSTEMS SUFFER AN IDENTITY CRISIS? A CASE STUDY OF CONFUSION AND MISINFORMATION
Anthony Rodi, Gina Boff, Gary DeLorenzo
pp. 90-98
https://doi.org/10.48009/3_iis_2015_90-98

INFORMATION EXPOSURE MODEL: A FRAMEWORK FOR INDIVIDUAL ASSESSMENT OF RISKS AND BENEFITS FROM USING A WEBSITE
Robert Leitheiser, L. Roger Yin
pp. 99-107
https://doi.org/10.48009/3_iis_2015_99-107

MSLQ: INSTRUMENT VALIDATION OF MOTIVATION AND LEARNING STRATEGIES FOR ACQUIRING COMPUTER SOFTWARE APPLICATION SKILLS
Shelia Smith, Catherine Chen
pp. 108-118
https://doi.org/10.48009/3_iis_2015_108-118

TEACHING INTRODUCTORY PROGRAMMING WITH GAME DESIGN AND PROBLEM-BASED LEARNING
Andrey Soares, Frederico Fonseca, Nancy Martin
pp. 128-137
https://doi.org/10.48009/3_iis_2015_128-137

BUSINESS INTELLIGENCE AND IPAD TECHNOLOGY RAISING THE BAR IN PUBLIC EDUCATION: A QUANTITATIVE STUDY
Joseph Compomizzi, Shana D'Aurora, Bryan D'Aurora
pp. 119-137
https://doi.org/10.48009/3_iis_2015_119-127

NEW TECHNOLOGY ADOPTION: EMBRACING CULTURAL INFLUENCES
Debra J. Borkovich, Jennifer Breese-Vitelli, Robert Skovira
pp. 138-147
https://doi.org/10.48009/3_iis_2015_138-147

THE DEVELOPMENT OF A USABILITY INSTRUMENT FOR E-LEARNING IN EDUCATIONAL SETTINGS
Zoroayka Sandoval
pp. 148-155
https://doi.org/10.48009/3_iis_2015_148-155

THE EFFECT OF OPERATING SYSTEMS AND TYPES OF APPS ON PURCHASE INTENTION
Hsiu-Li Liao, Su-Houn Liu, Chih-Chung Cheng
pp. 156-163
https://doi.org/10.48009/3_iis_2015_156-163

ENGAGING A DIVERSE STUDENT AUDIENCE IN AN INFORMATION SECURITY COURSE
Lynn Heinrichs
pp. 164-171
https://doi.org/10.48009/3_iis_2015_164-171

IMPOVING LEARNING OUTCOMES OF TEXTBOOK CONTENT WITH A SUPPLEMENTARY LEARNING MODULE: A CASE FOR BASIC CRYPTOLOGY
Wenli Wang
pp. 172-182
https://doi.org/10.48009/3_iis_2015_172-182

AN EXPLORATORY STUDY ON THE RELATIONSHIP BETWEEN DIGITAL GAMES AND TRANSFER OF LEARNING
C. Frank Lee, Rebecca Giorcelli
pp. 183-190
https://doi.org/10.48009/3_iis_2015_183-190

CYBERSECURITY: CHALLENGES FROM A SYSTEMS, COMPLEXITY, KNOWLEDGE MANAGEMENT AND BUSINESS INTELLIGENCE PERSPECTIVE
Susan Tisdale
pp. 191-198
https://doi.org/10.48009/3_iis_2015_191-198

DO BUSINESS STUDENTS USE TECHNOLOGY TO CHEAT AND DO BUSINESS FACULTY TAKE ANY ACTIONS ABOUT IT?
Lisa Bain, Neelima Bhatnagar
pp. 199-208
https://doi.org/10.48009/3_iis_2015_199-208

EFFECTIVE NETWORK SECURITY AUDIT TRAIL MANAGEMENT PRACTICES: AN EXPLORATORY STUDY
Daniel O'Kelley, Richard Ye, Christopher Jones, David Miller
pp. 209-218
https://doi.org/10.48009/3_iis_2015_209-218

ASSESSING THE EFFECTIVENESS OF BUSINESS INTELLIGENCE AS A STRATEGICALLY IMPORTANT DEPLOYMENT
Taryn Stanko, James Sena, Mark Sena
pp. 219-229
https://doi.org/10.48009/3_iis_2015_219-229

INTO THE DEPTHS OF THE INTERNET: THE DEEP WEB
Marcus Tapia, Jack Shorter
pp. 230-237
https://doi.org/10.48009/3_iis_2015_230-237

BRING YOUR OWN DEVICE TO WORK: BENEFITS, SECURITY RISKS, AND GOVERNANCE ISSUES
Jamie Pinchot, Karen Paullet
pp. 238-244
https://doi.org/10.48009/3_iis_2015_238-244