International Association for Computer Information Systems
Saturday, October 21, 2017
FAQs   Contact

Table of Contents - Volume 17, Issue 1



EMPIRICAL ANALYSIS FOR SUCCESS FACTORS IN UBIQUITOUS SUPPLY CHAIN MANAGEMENT IN THE CASE OF UK COMPANIES
Changsu Kim
Jongheon Kim
pp. 1-13

A CIPHER BASED ON THE RANDOM SEQUENCE OF DIGITS IN IRRATIONAL NUMBERS
J.L. Gonzalez-Santander
G. Martin Gonzalez
pp. 14-25

APPLYING THE MULTIDIMENSIONAL ETHICS SCALE IN C2C E-COMMERCE
Kikua Jones
Lori N. K. Leonard
pp. 26-36

UNDERGRADUATE PERCEPTION OF ONLINE EDUCATION IN JORDAN
Salem Alemaishat
Guy Philbin
pp. 37-46

SELECTING CONTENTS FOR A NEW VIRTUALIZATION COURSE IN INFORMATION TECHNOLOGY (IT) TRACK
Azad Ali
pp. 47-57

FOR ENHANCING DEMOCRACY IN CHINA
Jensen Zhao
Sherry Zhao
Melody Alexander
Allen Truell
pp. 58-69

A REPORT ON THE STATE OF MOBILE TECHNOLOGIES WITHIN ORGANIZATIONS
Jeretta Horn Nord
Alex Koohang
Joanna Paliszkiewicz
pp. 70-79

PHISHING: ARE UNDERGRADUATES AT RISK AND PREPARED?
Carl Case
Darwin King
pp. 80-88

CHALLENGES TO MULTI-LAYER FEED FORWARD NEURAL NETWORKS IN INTRUSION DETECTION
Loye Ray
pp. 89-98

DO SOCIAL NETWORKING SITES PRIVACY POLICIES DIFFER? A LINGUISTIC ANALYSIS OF THE TEN MOST POPULAR SOCIAL NETWORKING SITES
Alan Peslak
pp. 99-106

ATTRIBUTES OF DATA BREACH NOTIFICATION LAWS IN THE UNITED STATES
David Green
Nancy Martin
pp. 107-118

ADDING AGILITY TO THE MIS CAPSTONE
Thom Luce
pp. 119-127

BUREAUCRACY 2.0: THE BUREAUCRATIZATION OF PROFESSIONAL WORK
Paul Nugent
pp. 128-135

THE RELATIONSHIP BETWEEN ENGAGEMENT SOFTWARE ANALYSIS AND FINAL GRADES IN ONLINE COURSES
Robert Kowalewski
Michel Curran
Barbara Burgess-Lefebvre
pp. 136-148

DIFFERENCES IN EFFECTS OF HELP SEQUENCE'S DELIVERY MEDIUM ON USERS OF DIFFERING LEVELS OF FIELD DEPENDENCE
Peter Draus
pp. 149-156

DOES LEARNING STYLE PLAY A ROLE IN COMPUTER INFORMATION SYSTEMS COURSE PERFORMANCE?
Wendy Ceccucci
Scott Hunsinger
S.E. Kruck
Alan Peslak
Patricia Sendall
pp. 157-167

TOWARDS A 21ST CENTURY INFORMATION SYSTEMS EDUCATION: HIGH IMPACT PRACTICES AND ESSENTIAL LEARNING OUTCOMES
Bruce Saulnier
pp. 168-177

A SURVEY OF SOCIAL ENGINEERING VULNERABILITIES IN HEALTH CARE SETTINGS
Sushma Mishra
Peter Draus
Natalya Goreva
Don Caputo
pp. 178-184

CONFIDENTIALITY, PRIVACY, ACCESSIBILITY AND SECURITY OF BIG DATA USAGES WITHIN MOBILE RECOMMENDER SYSTEMS, AS SOCIETY EMBRACES CLOUD BASED TECHNOLOGY
Jacob Mack
Theophilus Owusu
John Scarpino
pp. 185-195

U.S. EU SAFE HARBOR & PRIVACY SHIELD: STUDENT EXPLORATION OF GLOBAL IT ISSUES AND PROFESSIONALS WHO DEAL WITH THEM
Lorrie Willey
Barbara Jo White
Janet Ford
pp. 196-205

ANALYZING RISKS FOR HOME LOANS DURING FINANCIAL CRISIS OF 2008 USING DATA MINING
Ben Kim
Nina Tunas
Adrian Green
pp. 206-210

KNOWLEDGE MANAGEMENT IN SOFTWARE DEVELOPING ORGANIZATIONS. COMBINING CONCEPTUAL MODELS
Karol Chrabanski
pp. 211-220

THE FLOW OF KNOWLEDGE MANAGEMENT IN THE BANKING INDUSTRY IN THE KINGDOM OF SAUDI ARABIA: HOFSTEDE ANALYSIS OF THE CULTURAL CONSTRAINTS
Rana Alabdan
Jennifer Callen
pp. 221-230

PHISHING OUR CLIENTS: A STEP TOWARD IMPROVING TRAINING VIA SOCIAL ENGINEERING
Kevin Slonka
Brian Shrift
pp. 231-241

FRAMES OF MIND: CULTIVATING KNOWLEDGE AND CYBERSECURITY
Nicole Gong
Guy Philbin
pp. 242-252

IS THE INTEGRATION OF THE STEM DISCIPLINES WITH COMPUTING OCCURRING AT THE SECONDARY SCHOOL LEVEL IN K-12 SCHOOL SYSTEM? AN EXPLORATORY STUDY
Sushma Mishra
Donna Cellante
Diane Igoche
pp. 253-259

SUPPORTING DOCTORAL STUDENTS' SELF-DESCRIBED NEEDS WHILE ENROLLED IN A LIMITED-RESIDENCY INFORMATION SYSTEMS DOCTORAL PROGRAM
Steven Terrell
Michael Lohle
pp. 260-264