International Association for Computer Information Systems
Wednesday, January 27, 2021

Table of Contents - Volume 16, Issue 4



DIGITAL BADGES IN HIGHER EDUCATION: A THREE-PHASE STUDY ON THE IMPLEMENTATION OF DIGITAL BADGES IN AN ONLINE UNDERGRADUTE PROGRAM
Maria Elena Corbeil,Joseph Rene Corbeil,Ignacio Rodriguez
pp. 1-9
https://doi.org/10.48009/4_iis_2015_1-9

USERS' PERCEPTIONS ON THE BRIGHTSPACE LEARNING MANAGEMENT SYSTEM
Simone Moseley,Taiwo Ajani
pp. 10-19
https://doi.org/10.48009/4_iis_2015_10-19

A 3D LEARNING GAME TO FOSTER COMPUTATIONAL THINKING IN K-12 EDUCATION
Myungjae Kwak,Kirill Yurov,Kevin Floyd
pp. 20-29
https://doi.org/10.48009/4_iis_2015_20-29

DATA MINING ANALYSIS AND PREDICTIONS OF REAL ESTATE PRICES
Victor Gan,Vaishali Agarwal,Ben Kim
pp. 30-36
https://doi.org/10.48009/4_iis_2015_30-36

AN EXPLORATORY STUDY OF EXPECTED BUSINESS VALUE OF CLOUD COMPUTING
Ta-Tao Chuang,Kazuo Nakatani,Thoma Teming Chen
pp. 37-47
https://doi.org/10.48009/4_iis_2015_37-47

THE CURRENT STATE OF E-BOOKS AND DIGITAL LIBRARIES OF JAPAN
Hisaki Goto,Ben Kim,Kohji Inagaki
pp. 48-57
https://doi.org/10.48009/4_iis_2015_48-57

INTERNET OF THINGS-BASED HEALTH MONITORING AND MANAGEMENT DOMAIN-SPECIFIC ARCHITECTURE PATTERN
Robert Samuel,Dennis Connolly
pp. 58-63
https://doi.org/10.48009/4_iis_2015_58-63

THE MANAGEMENT OF A WEBSITE'S HISTORICAL LINKS AND DOCUMENTS
David Chao
pp. 64-69
https://doi.org/10.48009/4_iis_2015_64-69

DOES THE MALE PROGRAMMING STUDENT THINK FEMALES SHOULD BE STUDYING COMPUTER TECHNOLOGY?
Jeanne Baugh
pp. 70-76
https://doi.org/10.48009/4_iis_2015_70-76

THE PRIVACY OF INFORMATION IN CLOUD COMPUTING
Rosarito Sanchez-Morcilio,Francisco Quiles-Torres
pp. 77-85
https://doi.org/10.48009/4_iis_2015_77-85

AFTER THE DATA BREACH: NOTIFICATION LAWS AND MORE
Janet Ford,Barbara Jo White,Kristin White
pp. 86-94
https://doi.org/10.48009/4_iis_2015_86-94

SNS CHOICE AND USAGE: A COMPREHENSIVE RESEARCH MODEL
Fang Deng,Zhenyu Huang,Dalaa Alqahtani,James J. Cappel
pp. 95-101
https://doi.org/10.48009/4_iis_2015_95-101

USING K-MEANS CLUSTERING TO MODEL STUDENTS' LMS PARTICIPATION IN TRADITIONAL COURSES
Klara Nelson
pp. 102-110
https://doi.org/10.48009/4_iis_2015_102-110

CRITICAL FACTORS IN THE ADOPTION OF OPEN SOURCE TECHNOLOGIES
Anidza Valentin-Rodriguez,Ángel Ojeda-Castro,Macedonio Alanis-Gonzalez,Eulalia Márquez-Martínez,Aury Curbelo-Ruiz
pp. 111-120
https://doi.org/10.48009/4_iis_2015_111-120

A SECURITY VULNERABILITIES ANALYSIS OF THE APACHE BIG DATA STACK AND HIGH PERFORMANCE COMPUTING TECHNOLOGIES
James Sissom,Alex Glasnovich
pp. 121-123
https://doi.org/10.48009/4_iis_2015_121-123

AN EXPLORATORY STUDY OF STUDENT PERCEPTIONS OF MEDIA ARTICLES IN THE MAINSTREAM
Carl M. Rebman,Debra Kelly,Queen E. Booker,Richard E. Custin
pp. 124-131
https://doi.org/10.48009/4_iis_2015_124-131

LESSONS LEARNED FROM TEACHING PROJECT-BASED SYSTEMS ANALYSIS AND DESIGN
Wenli Wang
pp. 132-142
https://doi.org/10.48009/4_iis_2015_132-142

WHAT IS SO DIFFERENT ABOUT STEM INTERNSHIPS?
Kirsten Martinez,Barbara Jo White,Jennifer Williams
pp. 143-151
https://doi.org/10.48009/4_iis_2015_143-151

CASE STUDY: LESSONS LEARNED IN LAUNCHING AN INTEGRATED ONLINE GRADUATE BUSINESS ANALYTICS PROGRAM
Mary Dunaway,Richard McCarthy
pp. 152-156
https://doi.org/10.48009/4_iis_2016_152-156

CASE STUDY: EXPLORATION OF HOW TECHNOLOGY AND SOCIAL MEDIA USE IS RELATED TO INTERNET PRIVACY CONCERNS IN A DIRECT SALES ORGANIZATION
Robert Totterdale
pp. 157-165
https://doi.org/10.48009/4_iis_2015_157-165

ANTECEDENT DETERMINANTS OF BELIEFS UNDERPINNING THE INTENTION TO ACCEPT AND USE BUSINESS INTELLIGENCE SYSTEMS: THE IMPORTANCE OF ORGANIZATIONAL FACTORS
Tanja Grubljesic,Pedro Simoes Coelho,Jurij Jaklic
pp. 166-177
https://doi.org/10.48009/4_iis_2015_166-177

THE EDUCATIONAL AND CAREER BACKGROUNDS OF CIOS
John Anderson,Nicholas Ball
pp. 178-182
https://doi.org/10.48009/4_iis_2015_178-182

STUDENT LEARNING IN A RAPID FEEDBACK ENVIRONMENT
Nicholas Ball,Gove Allen
pp. 183-193
https://doi.org/10.48009/4_iis_2015_183-193

THE IMPACT OF DISRUPTIVE TECHNOLOGY: THE INTERNET OF THINGS
Kyle Ebersold,Richard Glass
pp. 194-201
https://doi.org/10.48009/4_iis_2015_194-201

A DISCUSSION ABOUT CULTURE AND INFORMATION SECURITY POLICY COMPLIANCE: A SUB-CULTURALLY BOUND DETERMINANT-REDEFINING THE HOFSTEDE HYPOTHESIS
Fahad Al-Khalifa,Frederick Kohun,Robert Skovira
pp. 202-208
https://doi.org/10.48009/4_iis_2015_202-208

OPENING THE "BLACK BOX" OF COLLECTIVE INTELLIGENCE: A CRITICAL REFLECTION
Christian Wagner,Ayoung Suh
pp. 209-214
https://doi.org/10.48009/4_iis_2015_209-214

STUDENT PERSPECTIVES OF CHEATING IN ONLINE CLASSES
David Douglas,Karen Paullet,Adnan Chawdhry
pp. 215-223
https://doi.org/10.48009/4_iis_2015_215-223

EDUCATING THE TECHNOLOGY OFFICER OF THE FUTURE: A NEEDS ANALYSIS
Christopher Wydra,Frank Hartle III
pp. 224-231
https://doi.org/10.48009/4_iis_2015_224-231

POWER OF THE PEOPLE: A CASE STUDY USING FACEBOOK AS A DATA SOURCE IN QUALITATIVE RESEARCH
G. Chris Nelson
pp. 232-238
https://doi.org/10.48009/4_iis_2015_232-238