International Association for Computer Information Systems
Tuesday, April 13, 2021

Table of Contents - Volume 17, Issue 4



THE GREY AREAS OF BIG DATA ANALYTICS
Gwendolyn White,Thilini Ariyachandra
pp. 1-7
https://doi.org/10.48009/4_iis_2016_1-7

SMARTPHONE AND APP USAGE AMONG COLLEGE STUDENTS: USING SMARTPHONES EFFECTIVELY FOR SOCIAL AND EDUCATIONAL NEEDS
Gayle Jesse
pp. 8-20
https://doi.org/10.48009/4_iis_2016_8-20

SECURING THE INTERNET OF THINGS: A REVIEW
Matthew Ahlmeyer,Alina Chircu
pp. 21-28
https://doi.org/10.48009/4_iis_2016_21-28

CONCEPT PAPER FOR RESEARCHING THE PERCEPTIONS OF HIGHER EDUCATION SOCIAL MEDIA SITES: HOW ARE SCHOOL SOCIAL MEDIA SITES ENGAGING DIGITAL NATIVES' COMPARED TO NON-TRADITIONAL STUDENTS?
Kenneth Marsilio
pp. 29-35
https://doi.org/10.48009/4_iis_2016_29-35

DEEP WEB, DARK WEB, INVISIBLE WEB AND THE POST ISIS WORLD
Ryan Ehney,Jack Shorter
pp. 36-41
https://doi.org/10.48009/4_iis_2016_36-41

INTEGRATING SAP PROJECT SYSTEM INTO AN IS PROJECT MANAGEMENT COURSE
Ming Wang,Lei Jin
pp. 42-50
https://doi.org/10.48009/4_iis_2016_42-50

WHO'S KNOCKING AT MY DOOR: DEVELOPING A WEB SERVICE VISUALIZATION TOOL FOR MONITORING USER ACCOUNT HEALTH
Thomas Chapman
pp. 51-57
https://doi.org/10.48009/4_iis_2016_51-57

RECOVERING FROM THE NIGHTMARE OF RANSOMWARE – HOW SAVVY USERS GET HIT WITH VIRUSES AND MALWARE: A PERSONAL CASE STUDY
Azad Ali,Raj Murthy,Frederick Kohun
pp. 58-69
https://doi.org/10.48009/4_iis_2016_58-69

THE BURDEN OF KNOWLEDGE MANAGEMENT IN THE INFORMATION AGE: A THEORETICAL APPROACH TO MITIGATING LOST KNOWLEDGE
Benjamin Stahl,Brian Buckles
pp. 70-81
https://doi.org/10.48009/4_iis_2016_70-81

USING TECHNOLOGY TO DETECT AND DETER ELECTRONIC CHEATING AT A LARGE PUBLIC UNIVERSITY
Nicholas Ball,Robert Wood,Robert Wood,Gove Allen
pp. 82-90
https://doi.org/10.48009/4_iis_2016_82-90

THE DELPHI TECHNIQUE: LESSONS LEARNED FROM A FIRST TIME RESEARCHER
Christopher Gray
pp. 91-97
https://doi.org/10.48009/4_iis_2016_91-97

A LEARNING MODULE FOR ADVANCED CRYPTOLOGY
Wenli Wang
pp. 98-108
https://doi.org/10.48009/4_iis_2016_98-108

GRADUATE STUDENT PERCEPTIONS OF PERSONAL SOCIAL MEDIA RISK: A COMPARISON STUDY
Samuel Goh,Paul Gangi,Julio Rivera,James Worrell
pp. 109-119
https://doi.org/10.48009/4_iis_2016_109-119

WAR GAMES: SIMULATION VS. VIRTUAL MACHINES IN CYBERSECURITY EDUCATION
Matthew North
pp. 120-126
https://doi.org/10.48009/4_iis_2016_120-126

TRACING AND MANAGING A ROGUE CLOUD BASED SERVICE THROUGH A MOBILE APP
Dennis Guster,Paul Safonov,Raqeeb Abdul
pp. 127-136
https://doi.org/10.48009/4_iis_2016_127-136

IDENTIFYING DATA SCIENCE AND ANALYTICS COMPETENCIES BASED ON INDUSTRY DEMAND
Ashraf Shirani
pp. 137-144
https://doi.org/10.48009/4_iis_2016_137-144

THE INTERNET OF THINGS: A CAUSE FOR ETHICAL CONCERN
Kyle Ebersold,Richard Glass
pp. 145-151
https://doi.org/10.48009/4_iis_2016_145-151

MOBILE LEARNING IN MALAYSIA EDUCATION INSTITUTIONS
Maslin Masrom,Amirah Syahmi Nadzari,Nik Hasnaa Nik Mahmood,Wan Normeza Wan Zakaria,Nor Raihana Mohd Ali
pp. 152-157
https://doi.org/10.48009/4_iis_2016_152-157

FACULTY PERCEPTIONS OF VIDEO CONFERENCING TECHNOLOGY
Kevin S. Floyd,Neil Rigole,Alan Stines
pp. 158-166
https://doi.org/10.48009/4_iis_2016_158-166

SOCIAL MEDIA IMPLOSION: CONTEXT COLLAPSE!
Debra J. Borkovich,Jennifer Breese
pp. 167-177
https://doi.org/10.48009/4_iis_2016_167-177

DOWNLOAD INTENTION IN THE MOBILE APPLICATION MARKETPLACE
Chien-Yun Yuan,Wen-Hai Chih,Chia-Yi Huang
pp. 178-186
https://doi.org/10.48009/4_iis_2016_178-186

IMPACT OF ELECTRONIC HEALTH RECORDS ON PATIENT OUTCOMES
Lilian Ndifon,Jude Edwards,Leila Halawi
pp. 187-196
https://doi.org/10.48009/4_iis_2016_187-196

HOW LONG DO EMPLOYEES REMEMBER INFORMATION SECURITY TRAINING PROGRAMS? A STUDY OF KNOWLEDGE ACQUISITION AND RETENTION
Philip Kim,Joseph Homan,Richard Metzer
pp. 197-207
https://doi.org/10.48009/4_iis_2016_197-207

UNBREAKABLE: A CONCISE OVERVIEW OF CYBERSECURITY
Kristi Berg,Joseph Crawford,Thomas Seymour
pp. 208-221
https://doi.org/10.48009/4_iis_2016_208-221

A LAYERED ARCHITECTURAL APPROACH TO UNDERSTANDING DISTRIBUTED CRYPTOGRAPHIC LEDGERS
Robert Samuel
pp. 222-226
https://doi.org/10.48009/4_iis_2016_222-226

ARCHITECTING A CYBERSECURITY MANGEMENT FRAMEWORK
Susan Tisdale
pp. 227-236
https://doi.org/10.48009/4_iis_2016_227-236

USING LMS DATA TO UNDERSTAND HOW STUDENTS USE COURSE TOOLS
Queen Booker,Carl Rebman
pp. 237-245
https://doi.org/10.48009/4_iis_2016_237-245

DOWNLOADING MOBILE APPS: ARE STUDENTS AWARE OF THE SECURITY RISKS?
Adnan Chawdhry,Karen Paullet,David Douglas,Joseph Compomizzi
pp. 246-253
https://doi.org/10.48009/4_iis_2016_246-253

LEGAL ETHICS AND CONCERNS WITH SECURITY IN A BRING YOUR OWN DEVICE PROGRAM
Misty Kiernan
pp. 254-259
https://doi.org/10.48009/4_iis_2016_254-259

KNOWLEDGE MANAGEMENT USING STUDENT FEEDBACK: A STUDY OF ONLINE STUDENTS' LIVED EXPERIENCES ON VIRTUAL TEAMS
Michael Lohle,Steven Terrell
pp. 260-265
https://doi.org/10.48009/4_iis_2016_260-265