International Association for Computer Information Systems
Sunday, March 26, 2017
FAQs   Contact

Table of Contents - Volume 17, Issue 4



THE GREY AREAS OF BIG DATA ANALYTICS
Gwendolyn White
Thilini Ariyachandra
pp. 1-7

SMARTPHONE AND APP USAGE AMONG COLLEGE STUDENTS: USING SMARTPHONES EFFECTIVELY FOR SOCIAL AND EDUCATIONAL NEEDS
Gayle Jesse
pp. 8-20

SECURING THE INTERNET OF THINGS: A REVIEW
Matthew Ahlmeyer
Alina Chircu
pp. 21-28

CONCEPT PAPER FOR RESEARCHING THE PERCEPTIONS OF HIGHER EDUCATION SOCIAL MEDIA SITES: HOW ARE SCHOOL SOCIAL MEDIA SITES ENGAGING DIGITAL NATIVES’ COMPARED TO NON-TRADITIONAL STUDENTS?
Kenneth Marsilio
pp. 29-35

DEEP WEB, DARK WEB, INVISIBLE WEB AND THE POST ISIS WORLD
Ryan Ehney
Jack Shorter
pp. 36-41

INTEGRATING SAP PROJECT SYSTEM INTO AN IS PROJECT MANAGEMENT COURSE
Ming Wang
Lei Jin
pp. 42-50

WHO’S KNOCKING AT MY DOOR: DEVELOPING A WEB SERVICE VISUALIZATION TOOL FOR MONITORING USER ACCOUNT HEALTH
Thomas Chapman
pp. 51-57

RECOVERING FROM THE NIGHTMARE OF RANSOMWARE – HOW SAVVY USERS GET HIT WITH VIRUSES AND MALWARE: A PERSONAL CASE STUDY
Azad Ali
Raj Murthy
Frederick Kohun
pp. 58-69

THE BURDEN OF KNOWLEDGE MANAGEMENT IN THE INFORMATION AGE: A THEORETICAL APPROACH TO MITIGATING LOST KNOWLEDGE
Benjamin Stahl
Brian Buckles
pp. 70-81

USING TECHNOLOGY TO DETECT AND DETER ELECTRONIC CHEATING AT A LARGE PUBLIC UNIVERSITY
Nicholas Ball
Robert Wood
Robert Wood
Gove Allen
pp. 82-90

THE DELPHI TECHNIQUE: LESSONS LEARNED FROM A FIRST TIME RESEARCHER
Christopher Gray
pp. 91-97

A LEARNING MODULE FOR ADVANCED CRYPTOLOGY
Wenli Wang
pp. 98-108

GRADUATE STUDENT PERCEPTIONS OF PERSONAL SOCIAL MEDIA RISK: A COMPARISON STUDY
Samuel Goh
Paul Gangi
Julio Rivera
James Worrell
pp. 109-119

WAR GAMES: SIMULATION VS. VIRTUAL MACHINES IN CYBERSECURITY EDUCATION
Matthew North
pp. 120-126

TRACING AND MANAGING A ROGUE CLOUD BASED SERVICE THROUGH A MOBILE APP
Dennis Guster
Paul Safonov
Raqeeb Abdul
pp. 127-136

IDENTIFYING DATA SCIENCE AND ANALYTICS COMPETENCIES BASED ON INDUSTRY DEMAND
Ashraf Shirani
pp. 137-144

THE INTERNET OF THINGS: A CAUSE FOR ETHICAL CONCERN
Kyle Ebersold
Richard Glass
pp. 145-151

MOBILE LEARNING IN MALAYSIA EDUCATION INSTITUTIONS
Maslin Masrom
Amirah Syahmi Nadzari
Nik Hasnaa Nik Mahmood
Wan Normeza Wan Zakaria
Nor Raihana Mohd Ali
pp. 152-157

FACULTY PERCEPTIONS OF VIDEO CONFERENCING TECHNOLOGY
Kevin S. Floyd
Neil Rigole
Alan Stines
pp. 158-166

SOCIAL MEDIA IMPLOSION: CONTEXT COLLAPSE!
Debra J. Borkovich
Jennifer Breese
pp. 167-177

DOWNLOAD INTENTION IN THE MOBILE APPLICATION MARKETPLACE
Chien-Yun Yuan
Wen-Hai Chih
Chia-Yi Huang
pp. 178-186

IMPACT OF ELECTRONIC HEALTH RECORDS ON PATIENT OUTCOMES
Lilian Ndifon
Jude Edwards
Leila Halawi
pp. 187-196

HOW LONG DO EMPLOYEES REMEMBER INFORMATION SECURITY TRAINING PROGRAMS? A STUDY OF KNOWLEDGE ACQUISITION AND RETENTION
Philip Kim
Joseph Homan
Richard Metzer
pp. 197-207

UNBREAKABLE: A CONCISE OVERVIEW OF CYBERSECURITY
Kristi Berg
Joseph Crawford
Thomas Seymour
pp. 208-221

A LAYERED ARCHITECTURAL APPROACH TO UNDERSTANDING DISTRIBUTED CRYPTOGRAPHIC LEDGERS
Robert Samuel
pp. 222-226

ARCHITECTING A CYBERSECURITY MANGEMENT FRAMEWORK
Susan Tisdale
pp. 227-236

USING LMS DATA TO UNDERSTAND HOW STUDENTS USE COURSE TOOLS
Queen Booker
Carl Rebman
pp. 237-245

DOWNLOADING MOBILE APPS: ARE STUDENTS AWARE OF THE SECURITY RISKS?
Adnan Chawdhry
Karen Paullet
David Douglas
Joseph Compomizzi
pp. 246-253

LEGAL ETHICS AND CONCERNS WITH SECURITY IN A BRING YOUR OWN DEVICE PROGRAM
Misty Kiernan
pp. 254-259

KNOWLEDGE MANAGEMENT USING STUDENT FEEDBACK: A STUDY OF ONLINE STUDENTS’ LIVED EXPERIENCES ON VIRTUAL TEAMS
Michael Lohle
Steven Terrell
pp. 260-265