International Association for Computer Information Systems
Tuesday, November 13, 2018    |     FAQs   Contact

Table of Contents - Volume 19, Issue 2



AN EFFICIENT HYBRID MODEL FOR DETECTING DISTRIBUTED DENIAL OF SERVICE (DDOS) ATTACKS IN CLOUD COMPUTING USING MULTIVARIATE CORRELATION AND DATA MINING CLUSTERING TECHNIQUES
Anteneh Girma
Ping Wang
pp. 1-12

IMPLEMENTING DWECK'S GROWTH MINDSET BY INCORPORATING INDUSTRY BASED TOOLS AND TECHNIQUES IN THE CLASSROOM
Wilfred Mutale
Mel Tomeo
John J. Scarpino
Cristina D?Imperio
Xihui Zhang
pp. 13-22

FEEDBACK STRATEGIES FOR INFORMATION SYSTEMS FACULTY
Edward J. Lazaros
Allen D. Truell
Melody W. Alexander
Jensen J. Zhao
pp. 23-32

IMPACT OF USERS' MOTIVATION ON GAMIFIED CROWDSOURCING SYSTEMS: A CASE OF STACKOVERFLOW
Sarah Penoyer
Breana Reynolds
Bryan Marshall
Peter W. Cardon
pp. 33-40

SYNCHONOUS AND ASYNCHONOUS COMMUNICATION: A DETERMINING FACTOR IN THE GAP BETWEEN THE TEACHING ONLINE AND TRADITIONAL STATISTICS
Angel Ojeda-Castro
Juan Valera-Marquez
Philip R. Murray-Finley
pp. 41-46

THE EFFECT OF MAP-BASED MATERIALS AND ACTIVITIES ON GLOBAL DATA PRIVACY AWARENESS IN AN INFORMATION SYSTEMS COURSE
William A. Kapakos
Barbara Jo White
Lorrie Willey
Janet C. Ford
pp. 47-55

DANGER IN YOUR POCKET: A CASE STUDY ANALYSIS OF EVOLVING ISSUES RELATED TO SOCIAL MEDIA USE AND ABUSE THROUGH SMARTPHONES
William Stanley Pendergrass
Carrie A. Payne
pp. 56-64

TEACH MBA DATA SCIENCE USING R
Jianfeng Wang
Linwu Gu
pp. 65-71

ISSUES IN THE DEVELOPMENT OF AN UNDERGRADUATE BUSINESS ANALYTICS MAJOR
Paul Stephens
Matthew McGowan
pp. 72-80

COMPARISON OF "D," "F," AND "W" GRADES BETWEEN INFORMATION SYSTEMS TRADITIONAL AND ONLINE COURSES FOR THE PAST FIVE ACADEMIC YEARS
Melody Alexander
Allen Truell
Edward Lazaros
Jensen Zhao
pp. 81-89

EXAMINATION OF IGNORING MESSAGE BEHAVIOR IN INSTANT MESSENGER
Hsiu-Li Liao
Chen-Huei Chou
Chun-Yu Yeh
pp. 90-98

HEARTBLEED: A CASE STUDY
J.K. Harris
pp. 99-108

ANALYSIS AND PREDICTION OF REAL ESTATE PRICES: A CASE OF THE BOSTON HOUSING MARKET
Sharmila Muralidharan
Katrina Phiri
Sonal K. Sinha
Ben Kim
pp. 109-118

AN OPTIMIZED AGILE TECHNIQUE TO EFFECTIVELY IMPLEMENT AGILE METHODS IN PROJECT MANAGEMENT: A RESEARCH PROPOSITION
Rosarito Sanchez-Morcilio
Francisco Quiles-Torres
pp. 119-131

CASE STUDY: THE UTILIZATION OF LOW-CODE DEVELOPMENT TECHNOLOGY TO SUPPORT RESEARCH DATA COLLECTION
Robert L. Totterdale
pp. 132-139

GENDER, OVER SHARING, AND CYBERBULLYING IN ONLINE MULTI-PLAYER GAMING (MMOG) ENVIRONMENTS
Meg Fryling
pp. 140-148

FOUR IT/IS PILLARS FOR ARTIFICIAL INTELLIGENCE MACHINE LEARNING/DEEP LEARNING APPLICATIONS
Robert E. Samuel
Gerald Cormier
Shannon Fascendini
Christina M. Stubanas
Katherine A. Yacko
pp. 149-154

WHAT MAY AFFECT USERS TO SELL, BUY, OR SWAP ON WECHAT?
Linwu Gu
Jianfeng Wang
pp. 155-162

SEARCHING THE INTERNET TO ESTIMATE DEER POPULATION TRENDS IN THE U.S., CALIFORNIA, AND CONNECTICUT
G. Kent Webb
pp. 163-173

A STUDY AND COMPARISON OF ETHICAL CODES FOR INFORMATION TECHNOLOGY PROFESSIONALS
Kristi Berg
Brian Bartz
pp. 174-184

UNDERSTANDING MOBILE GOVERNMENT SUCCESS IN AN ARAB COUNTRY: FINDINGS FROM A QUALITATIVE STUDY
Kamel Rouibah
Hasan Qurban
Nabeel Al-Qirim
Ali Tarhini
pp. 185-198

APPROACHING AN AXIOM: TESTING A GROUNDED THEORY DEVELOPED FOR ONLINE STUDENT TEAM PROJECTS ON CAMPUS
Michael F. Lohle
Steven Terrell
pp. 199-207

INTEGRATING DATA ANALYTICS & KNOWLEDGE MANAGEMENT: A CONCEPTUAL MODEL
Chaojie Wang
pp. 208-216

USING ROLE PLAY EXERCISES TO ENHANCE COMMUNICATION COMPETENCE AND PERSUASIVE COMMUNICATION SKILLS IN ENTREPRENEURSHIP PROGRAMS
George A. Kirk
pp. 217-225