International Association for Computer Information Systems
Friday, April 26, 2024

Table of Contents - Volume 17, Issue 4



THE GREY AREAS OF BIG DATA ANALYTICS
Gwendolyn White, Thilini Ariyachandra
pp. 1-7
https://doi.org/10.48009/4_iis_2016_1-7

SMARTPHONE AND APP USAGE AMONG COLLEGE STUDENTS: USING SMARTPHONES EFFECTIVELY FOR SOCIAL AND EDUCATIONAL NEEDS
Gayle Jesse
pp. 8-20
https://doi.org/10.48009/4_iis_2016_8-20

SECURING THE INTERNET OF THINGS: A REVIEW
Matthew Ahlmeyer, Alina Chircu
pp. 21-28
https://doi.org/10.48009/4_iis_2016_21-28

CONCEPT PAPER FOR RESEARCHING THE PERCEPTIONS OF HIGHER EDUCATION SOCIAL MEDIA SITES: HOW ARE SCHOOL SOCIAL MEDIA SITES ENGAGING DIGITAL NATIVES’ COMPARED TO NON-TRADITIONAL STUDENTS?
Kenneth Marsilio
pp. 29-35
https://doi.org/10.48009/4_iis_2016_29-35

DEEP WEB, DARK WEB, INVISIBLE WEB AND THE POST ISIS WORLD
Ryan Ehney, Jack Shorter
pp. 36-41
https://doi.org/10.48009/4_iis_2016_36-41

INTEGRATING SAP PROJECT SYSTEM INTO AN IS PROJECT MANAGEMENT COURSE
Ming Wang, Lei Jin
pp. 42-50
https://doi.org/10.48009/4_iis_2016_42-50

WHO’S KNOCKING AT MY DOOR: DEVELOPING A WEB SERVICE VISUALIZATION TOOL FOR MONITORING USER ACCOUNT HEALTH
Thomas Chapman
pp. 51-57
https://doi.org/10.48009/4_iis_2016_51-57

RECOVERING FROM THE NIGHTMARE OF RANSOMWARE â€" HOW SAVVY USERS GET HIT WITH VIRUSES AND MALWARE: A PERSONAL CASE STUDY
Azad Ali, Raj Murthy, Frederick Kohun
pp. 58-69
https://doi.org/10.48009/4_iis_2016_58-69

THE BURDEN OF KNOWLEDGE MANAGEMENT IN THE INFORMATION AGE: A THEORETICAL APPROACH TO MITIGATING LOST KNOWLEDGE
Benjamin Stahl, Brian Buckles
pp. 70-81
https://doi.org/10.48009/4_iis_2016_70-81

USING TECHNOLOGY TO DETECT AND DETER ELECTRONIC CHEATING AT A LARGE PUBLIC UNIVERSITY
Nicholas Ball, Robert Wood, Robert Wood, Gove Allen
pp. 82-90
https://doi.org/10.48009/4_iis_2016_82-90

THE DELPHI TECHNIQUE: LESSONS LEARNED FROM A FIRST TIME RESEARCHER
Christopher Gray
pp. 91-97
https://doi.org/10.48009/4_iis_2016_91-97

A LEARNING MODULE FOR ADVANCED CRYPTOLOGY
Wenli Wang
pp. 98-108
https://doi.org/10.48009/4_iis_2016_98-108

GRADUATE STUDENT PERCEPTIONS OF PERSONAL SOCIAL MEDIA RISK: A COMPARISON STUDY
Samuel Goh, Paul Gangi, Julio Rivera, James Worrell
pp. 109-119
https://doi.org/10.48009/4_iis_2016_109-119

WAR GAMES: SIMULATION VS. VIRTUAL MACHINES IN CYBERSECURITY EDUCATION
Matthew North
pp. 120-126
https://doi.org/10.48009/4_iis_2016_120-126

TRACING AND MANAGING A ROGUE CLOUD BASED SERVICE THROUGH A MOBILE APP
Dennis Guster, Paul Safonov, Raqeeb Abdul
pp. 127-136
https://doi.org/10.48009/4_iis_2016_127-136

IDENTIFYING DATA SCIENCE AND ANALYTICS COMPETENCIES BASED ON INDUSTRY DEMAND
Ashraf Shirani
pp. 137-144
https://doi.org/10.48009/4_iis_2016_137-144

THE INTERNET OF THINGS: A CAUSE FOR ETHICAL CONCERN
Kyle Ebersold, Richard Glass
pp. 145-151
https://doi.org/10.48009/4_iis_2016_145-151

MOBILE LEARNING IN MALAYSIA EDUCATION INSTITUTIONS
Maslin Masrom, Amirah Syahmi Nadzari, Nik Hasnaa Nik Mahmood, Wan Normeza Wan Zakaria, Nor Raihana Mohd Ali
pp. 152-157
https://doi.org/10.48009/4_iis_2016_152-157

FACULTY PERCEPTIONS OF VIDEO CONFERENCING TECHNOLOGY
Kevin S. Floyd, Neil Rigole, Alan Stines
pp. 158-166
https://doi.org/10.48009/4_iis_2016_158-166

SOCIAL MEDIA IMPLOSION: CONTEXT COLLAPSE!
Debra J. Borkovich, Jennifer Breese
pp. 167-177
https://doi.org/10.48009/4_iis_2016_167-177

DOWNLOAD INTENTION IN THE MOBILE APPLICATION MARKETPLACE
Chien-Yun Yuan, Wen-Hai Chih, Chia-Yi Huang
pp. 178-186
https://doi.org/10.48009/4_iis_2016_178-186

IMPACT OF ELECTRONIC HEALTH RECORDS ON PATIENT OUTCOMES
Lilian Ndifon, Jude Edwards, Leila Halawi
pp. 187-196
https://doi.org/10.48009/4_iis_2016_187-196

HOW LONG DO EMPLOYEES REMEMBER INFORMATION SECURITY TRAINING PROGRAMS? A STUDY OF KNOWLEDGE ACQUISITION AND RETENTION
Philip Kim, Joseph Homan, Richard Metzer
pp. 197-207
https://doi.org/10.48009/4_iis_2016_197-207

UNBREAKABLE: A CONCISE OVERVIEW OF CYBERSECURITY
Kristi Berg, Joseph Crawford, Thomas Seymour
pp. 208-221
https://doi.org/10.48009/4_iis_2016_208-221

A LAYERED ARCHITECTURAL APPROACH TO UNDERSTANDING DISTRIBUTED CRYPTOGRAPHIC LEDGERS
Robert Samuel
pp. 222-226
https://doi.org/10.48009/4_iis_2016_222-226

ARCHITECTING A CYBERSECURITY MANGEMENT FRAMEWORK
Susan Tisdale
pp. 227-236
https://doi.org/10.48009/4_iis_2016_227-236

USING LMS DATA TO UNDERSTAND HOW STUDENTS USE COURSE TOOLS
Queen Booker, Carl Rebman
pp. 237-245
https://doi.org/10.48009/4_iis_2016_237-245

DOWNLOADING MOBILE APPS: ARE STUDENTS AWARE OF THE SECURITY RISKS?
Adnan Chawdhry, Karen Paullet, David Douglas, Joseph Compomizzi
pp. 246-253
https://doi.org/10.48009/4_iis_2016_246-253

LEGAL ETHICS AND CONCERNS WITH SECURITY IN A BRING YOUR OWN DEVICE PROGRAM
Misty Kiernan
pp. 254-259
https://doi.org/10.48009/4_iis_2016_254-259

KNOWLEDGE MANAGEMENT USING STUDENT FEEDBACK: A STUDY OF ONLINE STUDENTS’ LIVED EXPERIENCES ON VIRTUAL TEAMS
Michael Lohle, Steven Terrell
pp. 260-265
https://doi.org/10.48009/4_iis_2016_260-265