International Association for Computer Information Systems
Thursday, April 25, 2024

Table of Contents - Volume 17, Issue 1



EMPIRICAL ANALYSIS FOR SUCCESS FACTORS IN UBIQUITOUS SUPPLY CHAIN MANAGEMENT IN THE CASE OF UK COMPANIES
Changsu Kim, Jongheon Kim
pp. 1-13
https://doi.org/10.48009/1_iis_2016_1-13

A CIPHER BASED ON THE RANDOM SEQUENCE OF DIGITS IN IRRATIONAL NUMBERS
J.L. Gonzalez-Santander, G. Martin Gonzalez
pp. 14-25
https://doi.org/10.48009/1_iis_2016_14-25

APPLYING THE MULTIDIMENSIONAL ETHICS SCALE IN C2C E-COMMERCE
Kikua Jones, Lori N. K. Leonard
pp. 26-36
https://doi.org/10.48009/1_iis_2016_26-36

UNDERGRADUATE PERCEPTION OF ONLINE EDUCATION IN JORDAN
Salem Alemaishat, Guy Philbin
pp. 37-46
https://doi.org/10.48009/1_iis_2016_37-46

SELECTING CONTENTS FOR A NEW VIRTUALIZATION COURSE IN INFORMATION TECHNOLOGY (IT) TRACK
Azad Ali
pp. 47-57
https://doi.org/10.48009/1_iis_2016_47-57

FOR ENHANCING DEMOCRACY IN CHINA
Jensen Zhao, Sherry Zhao, Melody Alexander, Allen Truell
pp. 58-69
https://doi.org/10.48009/1_iis_2016_58-69

A REPORT ON THE STATE OF MOBILE TECHNOLOGIES WITHIN ORGANIZATIONS
Jeretta Horn Nord, Alex Koohang, Joanna Paliszkiewicz
pp. 70-79
https://doi.org/10.48009/1_iis_2016_70-79

PHISHING: ARE UNDERGRADUATES AT RISK AND PREPARED?
Carl Case, Darwin King
pp. 80-88
https://doi.org/10.48009/1_iis_2016_80-88

CHALLENGES TO MULTI-LAYER FEED FORWARD NEURAL NETWORKS IN INTRUSION DETECTION
Loye Ray
pp. 89-98
https://doi.org/10.48009/1_iis_2016_89-98

DO SOCIAL NETWORKING SITES PRIVACY POLICIES DIFFER? A LINGUISTIC ANALYSIS OF THE TEN MOST POPULAR SOCIAL NETWORKING SITES
Alan Peslak
pp. 99-106
https://doi.org/10.48009/1_iis_2016_99-106

ATTRIBUTES OF DATA BREACH NOTIFICATION LAWS IN THE UNITED STATES
David Green, Nancy Martin
pp. 107-118
https://doi.org/10.48009/1_iis_2016_107-118

ADDING AGILITY TO THE MIS CAPSTONE
Thom Luce
pp. 119-127
https://doi.org/10.48009/1_iis_2016_119-127

BUREAUCRACY 2.0: THE BUREAUCRATIZATION OF PROFESSIONAL WORK
Paul Nugent
pp. 128-135
https://doi.org/10.48009/1_iis_2016_128-135

THE RELATIONSHIP BETWEEN ENGAGEMENT SOFTWARE ANALYSIS AND FINAL GRADES IN ONLINE COURSES
Robert Kowalewski, Michel Curran, Barbara Burgess-Lefebvre
pp. 136-148
https://doi.org/10.48009/1_iis_2016_136-148

DIFFERENCES IN EFFECTS OF HELP SEQUENCE’S DELIVERY MEDIUM ON USERS OF DIFFERING LEVELS OF FIELD DEPENDENCE
Peter Draus
pp. 149-156
https://doi.org/10.48009/1_iis_2016_149-156

DOES LEARNING STYLE PLAY A ROLE IN COMPUTER INFORMATION SYSTEMS COURSE PERFORMANCE?
Wendy Ceccucci, Scott Hunsinger, S.E. Kruck, Alan Peslak, Patricia Sendall
pp. 157-167
https://doi.org/10.48009/1_iis_2016_157-167

TOWARDS A 21ST CENTURY INFORMATION SYSTEMS EDUCATION: HIGH IMPACT PRACTICES AND ESSENTIAL LEARNING OUTCOMES
Bruce Saulnier
pp. 168-177
https://doi.org/10.48009/1_iis_2016_168-177

A SURVEY OF SOCIAL ENGINEERING VULNERABILITIES IN HEALTH CARE SETTINGS
Sushma Mishra, Peter Draus, Natalya Goreva, Don Caputo
pp. 178-184
https://doi.org/10.48009/1_iis_2016_178-184

CONFIDENTIALITY, PRIVACY, ACCESSIBILITY AND SECURITY OF BIG DATA USAGES WITHIN MOBILE RECOMMENDER SYSTEMS, AS SOCIETY EMBRACES CLOUD BASED TECHNOLOGY
Jacob Mack, Theophilus Owusu, John Scarpino
pp. 185-195
https://doi.org/10.48009/1_iis_2016_185-195

U.S. EU SAFE HARBOR & PRIVACY SHIELD: STUDENT EXPLORATION OF GLOBAL IT ISSUES AND PROFESSIONALS WHO DEAL WITH THEM
Lorrie Willey, Barbara Jo White, Janet Ford
pp. 196-205
https://doi.org/10.48009/1_iis_2016_196-205

ANALYZING RISKS FOR HOME LOANS DURING FINANCIAL CRISIS OF 2008 USING DATA MINING
Ben Kim, Nina Tunas, Adrian Green
pp. 206-210
https://doi.org/10.48009/1_iis_2016_206-210

KNOWLEDGE MANAGEMENT IN SOFTWARE DEVELOPING ORGANIZATIONS. COMBINING CONCEPTUAL MODELS
Karol Chrabanski
pp. 211-220
https://doi.org/10.48009/1_iis_2016_211-220

THE FLOW OF KNOWLEDGE MANAGEMENT IN THE BANKING INDUSTRY IN THE KINGDOM OF SAUDI ARABIA: HOFSTEDE ANALYSIS OF THE CULTURAL CONSTRAINTS
Rana Alabdan, Jennifer Callen
pp. 221-230
https://doi.org/10.48009/1_iis_2016_221-230

PHISHING OUR CLIENTS: A STEP TOWARD IMPROVING TRAINING VIA SOCIAL ENGINEERING
Kevin Slonka, Brian Shrift
pp. 231-241
https://doi.org/10.48009/1_iis_2016_231-241

FRAMES OF MIND: CULTIVATING KNOWLEDGE AND CYBERSECURITY
Nicole Gong, Guy Philbin
pp. 242-252
https://doi.org/10.48009/1_iis_2016_242-252

IS THE INTEGRATION OF THE STEM DISCIPLINES WITH COMPUTING OCCURRING AT THE SECONDARY SCHOOL LEVEL IN K-12 SCHOOL SYSTEM? AN EXPLORATORY STUDY
Sushma Mishra, Donna Cellante, Diane Igoche
pp. 253-259
https://doi.org/10.48009/1_iis_2016_253-259

SUPPORTING DOCTORAL STUDENTS’ SELF-DESCRIBED NEEDS WHILE ENROLLED IN A LIMITED-RESIDENCY INFORMATION SYSTEMS DOCTORAL PROGRAM
Steven Terrell, Michael Lohle
pp. 260-264
https://doi.org/10.48009/1_iis_2016_260-264