International Association for Computer Information Systems
Tuesday, April 13, 2021

Table of Contents - Volume 17, Issue 1



EMPIRICAL ANALYSIS FOR SUCCESS FACTORS IN UBIQUITOUS SUPPLY CHAIN MANAGEMENT IN THE CASE OF UK COMPANIES
Changsu Kim,Jongheon Kim
pp. 1-13
https://doi.org/10.48009/1_iis_2016_1-13

A CIPHER BASED ON THE RANDOM SEQUENCE OF DIGITS IN IRRATIONAL NUMBERS
J.L. Gonzalez-Santander,G. Martin Gonzalez
pp. 14-25
https://doi.org/10.48009/1_iis_2016_14-25

APPLYING THE MULTIDIMENSIONAL ETHICS SCALE IN C2C E-COMMERCE
Kikua Jones,Lori N. K. Leonard
pp. 26-36
https://doi.org/10.48009/1_iis_2016_26-36

UNDERGRADUATE PERCEPTION OF ONLINE EDUCATION IN JORDAN
Salem Alemaishat,Guy Philbin
pp. 37-46
https://doi.org/10.48009/1_iis_2016_37-46

SELECTING CONTENTS FOR A NEW VIRTUALIZATION COURSE IN INFORMATION TECHNOLOGY (IT) TRACK
Azad Ali
pp. 47-57
https://doi.org/10.48009/1_iis_2016_47-57

FOR ENHANCING DEMOCRACY IN CHINA
Jensen Zhao,Sherry Zhao,Melody Alexander,Allen Truell
pp. 58-69
https://doi.org/10.48009/1_iis_2016_58-69

A REPORT ON THE STATE OF MOBILE TECHNOLOGIES WITHIN ORGANIZATIONS
Jeretta Horn Nord,Alex Koohang,Joanna Paliszkiewicz
pp. 70-79
https://doi.org/10.48009/1_iis_2016_70-79

PHISHING: ARE UNDERGRADUATES AT RISK AND PREPARED?
Carl Case,Darwin King
pp. 80-88
https://doi.org/10.48009/1_iis_2016_80-88

CHALLENGES TO MULTI-LAYER FEED FORWARD NEURAL NETWORKS IN INTRUSION DETECTION
Loye Ray
pp. 89-98
https://doi.org/10.48009/1_iis_2016_89-98

DO SOCIAL NETWORKING SITES PRIVACY POLICIES DIFFER? A LINGUISTIC ANALYSIS OF THE TEN MOST POPULAR SOCIAL NETWORKING SITES
Alan Peslak
pp. 99-106
https://doi.org/10.48009/1_iis_2016_99-106

ATTRIBUTES OF DATA BREACH NOTIFICATION LAWS IN THE UNITED STATES
David Green,Nancy Martin
pp. 107-118
https://doi.org/10.48009/1_iis_2016_107-118

ADDING AGILITY TO THE MIS CAPSTONE
Thom Luce
pp. 119-127
https://doi.org/10.48009/1_iis_2016_119-127

BUREAUCRACY 2.0: THE BUREAUCRATIZATION OF PROFESSIONAL WORK
Paul Nugent
pp. 128-135
https://doi.org/10.48009/1_iis_2016_128-135

THE RELATIONSHIP BETWEEN ENGAGEMENT SOFTWARE ANALYSIS AND FINAL GRADES IN ONLINE COURSES
Robert Kowalewski,Michel Curran,Barbara Burgess-Lefebvre
pp. 136-148
https://doi.org/10.48009/1_iis_2016_136-148

DIFFERENCES IN EFFECTS OF HELP SEQUENCE'S DELIVERY MEDIUM ON USERS OF DIFFERING LEVELS OF FIELD DEPENDENCE
Peter Draus
pp. 149-156
https://doi.org/10.48009/1_iis_2016_149-156

DOES LEARNING STYLE PLAY A ROLE IN COMPUTER INFORMATION SYSTEMS COURSE PERFORMANCE?
Wendy Ceccucci,Scott Hunsinger,S.E. Kruck,Alan Peslak,Patricia Sendall
pp. 157-167
https://doi.org/10.48009/1_iis_2016_157-167

TOWARDS A 21ST CENTURY INFORMATION SYSTEMS EDUCATION: HIGH IMPACT PRACTICES AND ESSENTIAL LEARNING OUTCOMES
Bruce Saulnier
pp. 168-177
https://doi.org/10.48009/1_iis_2016_168-177

A SURVEY OF SOCIAL ENGINEERING VULNERABILITIES IN HEALTH CARE SETTINGS
Sushma Mishra,Peter Draus,Natalya Goreva,Don Caputo
pp. 178-184
https://doi.org/10.48009/1_iis_2016_178-184

CONFIDENTIALITY, PRIVACY, ACCESSIBILITY AND SECURITY OF BIG DATA USAGES WITHIN MOBILE RECOMMENDER SYSTEMS, AS SOCIETY EMBRACES CLOUD BASED TECHNOLOGY
Jacob Mack,Theophilus Owusu,John Scarpino
pp. 185-195
https://doi.org/10.48009/1_iis_2016_185-195

U.S. EU SAFE HARBOR & PRIVACY SHIELD: STUDENT EXPLORATION OF GLOBAL IT ISSUES AND PROFESSIONALS WHO DEAL WITH THEM
Lorrie Willey,Barbara Jo White,Janet Ford
pp. 196-205
https://doi.org/10.48009/1_iis_2016_196-205

ANALYZING RISKS FOR HOME LOANS DURING FINANCIAL CRISIS OF 2008 USING DATA MINING
Ben Kim,Nina Tunas,Adrian Green
pp. 206-210
https://doi.org/10.48009/1_iis_2016_206-210

KNOWLEDGE MANAGEMENT IN SOFTWARE DEVELOPING ORGANIZATIONS. COMBINING CONCEPTUAL MODELS
Karol Chrabanski
pp. 211-220
https://doi.org/10.48009/1_iis_2016_211-220

THE FLOW OF KNOWLEDGE MANAGEMENT IN THE BANKING INDUSTRY IN THE KINGDOM OF SAUDI ARABIA: HOFSTEDE ANALYSIS OF THE CULTURAL CONSTRAINTS
Rana Alabdan,Jennifer Callen
pp. 221-230
https://doi.org/10.48009/1_iis_2016_221-230

PHISHING OUR CLIENTS: A STEP TOWARD IMPROVING TRAINING VIA SOCIAL ENGINEERING
Kevin Slonka,Brian Shrift
pp. 231-241
https://doi.org/10.48009/1_iis_2016_231-241

FRAMES OF MIND: CULTIVATING KNOWLEDGE AND CYBERSECURITY
Nicole Gong,Guy Philbin
pp. 242-252
https://doi.org/10.48009/1_iis_2016_242-252

IS THE INTEGRATION OF THE STEM DISCIPLINES WITH COMPUTING OCCURRING AT THE SECONDARY SCHOOL LEVEL IN K-12 SCHOOL SYSTEM? AN EXPLORATORY STUDY
Sushma Mishra,Donna Cellante,Diane Igoche
pp. 253-259
https://doi.org/10.48009/1_iis_2016_253-259

SUPPORTING DOCTORAL STUDENTS' SELF-DESCRIBED NEEDS WHILE ENROLLED IN A LIMITED-RESIDENCY INFORMATION SYSTEMS DOCTORAL PROGRAM
Steven Terrell,Michael Lohle
pp. 260-264
https://doi.org/10.48009/1_iis_2016_260-264