Table of Contents -
Volume 16, Issue 4
DIGITAL BADGES IN HIGHER EDUCATION: A THREE-PHASE STUDY ON THE IMPLEMENTATION OF DIGITAL BADGES IN AN ONLINE UNDERGRADUTE PROGRAMMaria Elena Corbeil,Joseph Rene Corbeil,Ignacio Rodriguez
pp. 1-9
https://doi.org/10.48009/4_iis_2015_1-9
USERS' PERCEPTIONS ON THE BRIGHTSPACE LEARNING MANAGEMENT SYSTEMSimone Moseley,Taiwo Ajani
pp. 10-19
https://doi.org/10.48009/4_iis_2015_10-19
A 3D LEARNING GAME TO FOSTER COMPUTATIONAL THINKING IN K-12 EDUCATION Myungjae Kwak,Kirill Yurov,Kevin Floyd
pp. 20-29
https://doi.org/10.48009/4_iis_2015_20-29
DATA MINING ANALYSIS AND PREDICTIONS OF REAL ESTATE PRICESVictor Gan,Vaishali Agarwal,Ben Kim
pp. 30-36
https://doi.org/10.48009/4_iis_2015_30-36
AN EXPLORATORY STUDY OF EXPECTED BUSINESS VALUE OF CLOUD COMPUTINGTa-Tao Chuang,Kazuo Nakatani,Thoma Teming Chen
pp. 37-47
https://doi.org/10.48009/4_iis_2015_37-47
THE CURRENT STATE OF E-BOOKS AND DIGITAL LIBRARIES OF JAPANHisaki Goto,Ben Kim,Kohji Inagaki
pp. 48-57
https://doi.org/10.48009/4_iis_2015_48-57
INTERNET OF THINGS-BASED HEALTH MONITORING AND MANAGEMENT DOMAIN-SPECIFIC ARCHITECTURE PATTERNRobert Samuel,Dennis Connolly
pp. 58-63
https://doi.org/10.48009/4_iis_2015_58-63
THE MANAGEMENT OF A WEBSITE'S HISTORICAL LINKS AND DOCUMENTS David Chao
pp. 64-69
https://doi.org/10.48009/4_iis_2015_64-69
DOES THE MALE PROGRAMMING STUDENT THINK FEMALES SHOULD BE STUDYING COMPUTER TECHNOLOGY?Jeanne Baugh
pp. 70-76
https://doi.org/10.48009/4_iis_2015_70-76
THE PRIVACY OF INFORMATION IN CLOUD COMPUTING Rosarito Sanchez-Morcilio,Francisco Quiles-Torres
pp. 77-85
https://doi.org/10.48009/4_iis_2015_77-85
AFTER THE DATA BREACH: NOTIFICATION LAWS AND MOREJanet Ford,Barbara Jo White,Kristin White
pp. 86-94
https://doi.org/10.48009/4_iis_2015_86-94
SNS CHOICE AND USAGE: A COMPREHENSIVE RESEARCH MODELFang Deng,Zhenyu Huang,Dalaa Alqahtani,James J. Cappel
pp. 95-101
https://doi.org/10.48009/4_iis_2015_95-101
USING K-MEANS CLUSTERING TO MODEL STUDENTS' LMS PARTICIPATION IN TRADITIONAL COURSES Klara Nelson
pp. 102-110
https://doi.org/10.48009/4_iis_2015_102-110
CRITICAL FACTORS IN THE ADOPTION OF OPEN SOURCE TECHNOLOGIESAnidza Valentin-Rodriguez,Ángel Ojeda-Castro,Macedonio Alanis-Gonzalez,Eulalia Márquez-Martínez,Aury Curbelo-Ruiz
pp. 111-120
https://doi.org/10.48009/4_iis_2015_111-120
A SECURITY VULNERABILITIES ANALYSIS OF THE APACHE BIG DATA STACK AND HIGH PERFORMANCE COMPUTING TECHNOLOGIESJames Sissom,Alex Glasnovich
pp. 121-123
https://doi.org/10.48009/4_iis_2015_121-123
AN EXPLORATORY STUDY OF STUDENT PERCEPTIONS OF MEDIA ARTICLES IN THE MAINSTREAMCarl M. Rebman,Debra Kelly,Queen E. Booker,Richard E. Custin
pp. 124-131
https://doi.org/10.48009/4_iis_2015_124-131
LESSONS LEARNED FROM TEACHING PROJECT-BASED SYSTEMS ANALYSIS AND DESIGNWenli Wang
pp. 132-142
https://doi.org/10.48009/4_iis_2015_132-142
WHAT IS SO DIFFERENT ABOUT STEM INTERNSHIPS?Kirsten Martinez,Barbara Jo White,Jennifer Williams
pp. 143-151
https://doi.org/10.48009/4_iis_2015_143-151
CASE STUDY: LESSONS LEARNED IN LAUNCHING AN INTEGRATED ONLINE GRADUATE BUSINESS ANALYTICS PROGRAMMary Dunaway,Richard McCarthy
pp. 152-156
https://doi.org/10.48009/4_iis_2016_152-156
CASE STUDY: EXPLORATION OF HOW TECHNOLOGY AND SOCIAL MEDIA USE IS RELATED TO INTERNET PRIVACY CONCERNS IN A DIRECT SALES ORGANIZATIONRobert Totterdale
pp. 157-165
https://doi.org/10.48009/4_iis_2015_157-165
ANTECEDENT DETERMINANTS OF BELIEFS UNDERPINNING THE INTENTION TO ACCEPT AND USE BUSINESS INTELLIGENCE SYSTEMS: THE IMPORTANCE OF ORGANIZATIONAL FACTORSTanja Grubljesic,Pedro Simoes Coelho,Jurij Jaklic
pp. 166-177
https://doi.org/10.48009/4_iis_2015_166-177
THE EDUCATIONAL AND CAREER BACKGROUNDS OF CIOSJohn Anderson,Nicholas Ball
pp. 178-182
https://doi.org/10.48009/4_iis_2015_178-182
STUDENT LEARNING IN A RAPID FEEDBACK ENVIRONMENTNicholas Ball,Gove Allen
pp. 183-193
https://doi.org/10.48009/4_iis_2015_183-193
THE IMPACT OF DISRUPTIVE TECHNOLOGY: THE INTERNET OF THINGSKyle Ebersold,Richard Glass
pp. 194-201
https://doi.org/10.48009/4_iis_2015_194-201
A DISCUSSION ABOUT CULTURE AND INFORMATION SECURITY POLICY COMPLIANCE: A SUB-CULTURALLY BOUND DETERMINANT-REDEFINING THE HOFSTEDE HYPOTHESISFahad Al-Khalifa,Frederick Kohun,Robert Skovira
pp. 202-208
https://doi.org/10.48009/4_iis_2015_202-208
OPENING THE "BLACK BOX" OF COLLECTIVE INTELLIGENCE: A CRITICAL REFLECTIONChristian Wagner,Ayoung Suh
pp. 209-214
https://doi.org/10.48009/4_iis_2015_209-214
STUDENT PERSPECTIVES OF CHEATING IN ONLINE CLASSESDavid Douglas,Karen Paullet,Adnan Chawdhry
pp. 215-223
https://doi.org/10.48009/4_iis_2015_215-223
EDUCATING THE TECHNOLOGY OFFICER OF THE FUTURE: A NEEDS ANALYSISChristopher Wydra,Frank Hartle III
pp. 224-231
https://doi.org/10.48009/4_iis_2015_224-231
POWER OF THE PEOPLE: A CASE STUDY USING FACEBOOK AS A DATA SOURCE IN QUALITATIVE RESEARCHG. Chris Nelson
pp. 232-238
https://doi.org/10.48009/4_iis_2015_232-238