International Association for Computer Information Systems
Thursday, April 25, 2024

Table of Contents - Volume 16, Issue 4



DIGITAL BADGES IN HIGHER EDUCATION: A THREE-PHASE STUDY ON THE IMPLEMENTATION OF DIGITAL BADGES IN AN ONLINE UNDERGRADUTE PROGRAM
Maria Elena Corbeil, Joseph Rene Corbeil, Ignacio Rodriguez
pp. 1-9
https://doi.org/10.48009/4_iis_2015_1-9

USERS’ PERCEPTIONS ON THE BRIGHTSPACE LEARNING MANAGEMENT SYSTEM
Simone Moseley, Taiwo Ajani
pp. 10-19
https://doi.org/10.48009/4_iis_2015_10-19

A 3D LEARNING GAME TO FOSTER COMPUTATIONAL THINKING IN K-12 EDUCATION
Myungjae Kwak, Kirill Yurov, Kevin Floyd
pp. 20-29
https://doi.org/10.48009/4_iis_2015_20-29

DATA MINING ANALYSIS AND PREDICTIONS OF REAL ESTATE PRICES
Victor Gan, Vaishali Agarwal, Ben Kim
pp. 30-36
https://doi.org/10.48009/4_iis_2015_30-36

AN EXPLORATORY STUDY OF EXPECTED BUSINESS VALUE OF CLOUD COMPUTING
Ta-Tao Chuang, Kazuo Nakatani, Thoma Teming Chen
pp. 37-47
https://doi.org/10.48009/4_iis_2015_37-47

THE CURRENT STATE OF E-BOOKS AND DIGITAL LIBRARIES OF JAPAN
Hisaki Goto, Ben Kim, Kohji Inagaki
pp. 48-57
https://doi.org/10.48009/4_iis_2015_48-57

INTERNET OF THINGS-BASED HEALTH MONITORING AND MANAGEMENT DOMAIN-SPECIFIC ARCHITECTURE PATTERN
Robert Samuel, Dennis Connolly
pp. 58-63
https://doi.org/10.48009/4_iis_2015_58-63

THE MANAGEMENT OF A WEBSITE’S HISTORICAL LINKS AND DOCUMENTS
David Chao
pp. 64-69
https://doi.org/10.48009/4_iis_2015_64-69

DOES THE MALE PROGRAMMING STUDENT THINK FEMALES SHOULD BE STUDYING COMPUTER TECHNOLOGY?
Jeanne Baugh
pp. 70-76
https://doi.org/10.48009/4_iis_2015_70-76

THE PRIVACY OF INFORMATION IN CLOUD COMPUTING
Rosarito Sanchez-Morcilio, Francisco Quiles-Torres
pp. 77-85
https://doi.org/10.48009/4_iis_2015_77-85

AFTER THE DATA BREACH: NOTIFICATION LAWS AND MORE
Janet Ford, Barbara Jo White, Kristin White
pp. 86-94
https://doi.org/10.48009/4_iis_2015_86-94

SNS CHOICE AND USAGE: A COMPREHENSIVE RESEARCH MODEL
Fang Deng, Zhenyu Huang, Dalaa Alqahtani, James J. Cappel
pp. 95-101
https://doi.org/10.48009/4_iis_2015_95-101

USING K-MEANS CLUSTERING TO MODEL STUDENTS’ LMS PARTICIPATION IN TRADITIONAL COURSES
Klara Nelson
pp. 102-110
https://doi.org/10.48009/4_iis_2015_102-110

CRITICAL FACTORS IN THE ADOPTION OF OPEN SOURCE TECHNOLOGIES
Anidza Valentin-Rodriguez, Ángel Ojeda-Castro, Macedonio Alanis-Gonzalez, Eulalia Márquez-Martínez, Aury Curbelo-Ruiz
pp. 111-120
https://doi.org/10.48009/4_iis_2015_111-120

A SECURITY VULNERABILITIES ANALYSIS OF THE APACHE BIG DATA STACK AND HIGH PERFORMANCE COMPUTING TECHNOLOGIES
James Sissom, Alex Glasnovich
pp. 121-123
https://doi.org/10.48009/4_iis_2015_121-123

AN EXPLORATORY STUDY OF STUDENT PERCEPTIONS OF MEDIA ARTICLES IN THE MAINSTREAM
Carl M. Rebman, Debra Kelly, Queen E. Booker, Richard E. Custin
pp. 124-131
https://doi.org/10.48009/4_iis_2015_124-131

LESSONS LEARNED FROM TEACHING PROJECT-BASED SYSTEMS ANALYSIS AND DESIGN
Wenli Wang
pp. 132-142
https://doi.org/10.48009/4_iis_2015_132-142

WHAT IS SO DIFFERENT ABOUT STEM INTERNSHIPS?
Kirsten Martinez, Barbara Jo White, Jennifer Williams
pp. 143-151
https://doi.org/10.48009/4_iis_2015_143-151

CASE STUDY: LESSONS LEARNED IN LAUNCHING AN INTEGRATED ONLINE GRADUATE BUSINESS ANALYTICS PROGRAM
Mary Dunaway, Richard McCarthy
pp. 152-156
https://doi.org/10.48009/4_iis_2015_152-156

CASE STUDY: EXPLORATION OF HOW TECHNOLOGY AND SOCIAL MEDIA USE IS RELATED TO INTERNET PRIVACY CONCERNS IN A DIRECT SALES ORGANIZATION
Robert Totterdale
pp. 157-165
https://doi.org/10.48009/4_iis_2015_157-165

ANTECEDENT DETERMINANTS OF BELIEFS UNDERPINNING THE INTENTION TO ACCEPT AND USE BUSINESS INTELLIGENCE SYSTEMS: THE IMPORTANCE OF ORGANIZATIONAL FACTORS
Tanja Grubljesic, Pedro Simoes Coelho, Jurij Jaklic
pp. 166-177
https://doi.org/10.48009/4_iis_2015_166-177

THE EDUCATIONAL AND CAREER BACKGROUNDS OF CIOS
John Anderson, Nicholas Ball
pp. 178-182
https://doi.org/10.48009/4_iis_2015_178-182

STUDENT LEARNING IN A RAPID FEEDBACK ENVIRONMENT
Nicholas Ball, Gove Allen
pp. 183-193
https://doi.org/10.48009/4_iis_2015_183-193

THE IMPACT OF DISRUPTIVE TECHNOLOGY: THE INTERNET OF THINGS
Kyle Ebersold, Richard Glass
pp. 194-201
https://doi.org/10.48009/4_iis_2015_194-201

A DISCUSSION ABOUT CULTURE AND INFORMATION SECURITY POLICY COMPLIANCE: A SUB-CULTURALLY BOUND DETERMINANTâ€"REDEFINING THE HOFSTEDE HYPOTHESIS
Fahad Al-Khalifa, Frederick Kohun, Robert Skovira
pp. 202-208
https://doi.org/10.48009/4_iis_2015_202-208

OPENING THE “BLACK BOX” OF COLLECTIVE INTELLIGENCE: A CRITICAL REFLECTION
Christian Wagner, Ayoung Suh
pp. 209-214
https://doi.org/10.48009/4_iis_2015_209-214

STUDENT PERSPECTIVES OF CHEATING IN ONLINE CLASSES
David Douglas, Karen Paullet, Adnan Chawdhry
pp. 215-223
https://doi.org/10.48009/4_iis_2015_215-223

EDUCATING THE TECHNOLOGY OFFICER OF THE FUTURE: A NEEDS ANALYSIS
Christopher Wydra, Frank Hartle III
pp. 224-231
https://doi.org/10.48009/4_iis_2015_224-231

POWER OF THE PEOPLE: A CASE STUDY USING FACEBOOK AS A DATA SOURCE IN QUALITATIVE RESEARCH
G. Chris Nelson
pp. 232-238
https://doi.org/10.48009/4_iis_2015_232-238