International Association for Computer Information Systems
Wednesday, January 27, 2021

Table of Contents - Volume 20, Issue 1



PREDICTORS OF SUCCESS IN SECURITY AND DATA PROTECTION AWARENESS OF MOBILE DEVICES: TRUST AND PRIVACY
Alex Koohang, Joanna Paliszkiewicz, Jeretta Horn Nord, Karen Paullet,Tara Underwood
pp. 1-11
https://doi.org/10.48009/1_iis_2019_1-11

OVERVIEW OF BLOCKCHAIN LEGISLATION AND ADOPTION: STATUS AND CHALLENGES
Selam E. Eyassu
pp. 12-21
https://doi.org/10.48009/1_iis_2019_12-21

FACTORS RELATED TO LARGER BUT FEWER WILDFIRES AND FEWER DEER IN CALIFORNIA: A GOOGLE SITES KNOWLEDGE BASE
G. Kent Webb
pp. 22-31
https://doi.org/10.48009/1_iis_2019_22-31

APPROPRIATE SAMPLE FOR TECHNOLOGY ADOPTION STUDIES IN TECHNICAL EDUCATION
Shannon W. Beasley
pp. 32-39
https://doi.org/10.48009/1_iis_2019_32-39

WHAT REALLY MATTERS IN ONLINE EDUCATION?
Wenli Wang,Alan Peslak,Paul Kovacs,Lisa Kovalchick
pp. 40-48
https://doi.org/10.48009/1_iis_2019_40-48

IT PROFESSIONAL USERS AND VENDORS? PERCEPTIONS OF THE KEY FACTORS IN ADOPTING CLOUD-MANAGED NETWORKS TECHNOLOGY
Chalermpon Kesa,Peter Draus
pp. 49-59
https://doi.org/10.48009/1_iis_2019_49-59

HABITS OF HIGHLY PRODUCTIVE INFORMATION SYSTEMS USERS: A LOOK AT ONE UNIVERSITY'S FACULTY, STAFF, AND STUDENTS
Gayle R. Jesse,Lily J. Pharris
pp. 60-69
https://doi.org/10.48009/1_iis_2019_60-69

BIG DATA STUDIES: A SYSTEMATIC REVIEW
Mehmet Ali Koseoglu,Mehmet Yildiz,John P. Girard
pp. 70-79
https://doi.org/10.48009/1_iis_2019_70-79

CYBER CRIME AND CYBER SECURITY AWARENESS AMONG STUDENTS: A COMPARATIVE STUDY IN ISRAEL AND SLOVENIA
Dusan Lesjak,Moti Zwilling,Galit Klein
pp. 80-87
https://doi.org/10.48009/1_iis_2019_80-87

DESIGNING A DOCTORAL PROGRAM IN CYBERSECURITY FOR WORKING PROFESSIONALS
Ping Wang,Fred Kohun
pp. 88-99
https://doi.org/10.48009/1_iis_2019_88-99

ENHANCING ORGANIZATIONAL CYBERSECURITY: A HANDS-ON IMMERSIVE LEARNING PROJECT
Jensen J. Zhao, Allen D. Truell, Edward J. Lazaros, Chris Davison
pp. 100-107
https://doi.org/10.48009/1_iis_2019_100-107

A PRELIMINARY INVESTIGATION OF QUALITY METRICS AND PERFORMANCE FOR SELECTED INSTITUTIONS DELIVERING TECHNOLOGY MEDIATED HIGHER EDUCATION
Suhong Li,Kamel Rouibah,Hal Records,Robert Behling
pp. 108-118
https://doi.org/10.48009/1_iis_2019_108-118

INDUSTRIAL INTERNET OF THINGS VULNERABILITIES AND THREATS: WHAT STAKEHOLDERS NEED TO CONSIDER
Fred Hoffman
pp. 119-133
https://doi.org/10.48009/1_iis_2019_119-133

AN EVALUATION OF A MULTILINGUAL CHATBOT
Mahesh Vanjani,Jamison Posey,Milam Aiken
pp. 134-143
https://doi.org/10.48009/1_iis_2019_134-143

AGILE AND SECURE SOFTWARE DEVELOPMENT: AN UNFINISHED STORY
David Bishop,Pam Rowland
pp. 144-156
https://doi.org/10.48009/1_iis_2019_144-156

PROPOSING A NEW GRADUATE DEGREE IN DATA ENGINEERING AND ANALYTICS
Kimberly W. Bartholomew,John E. Anderson
pp. 157-167
https://doi.org/10.48009/1_iis_2019_157-167

INFLUENCING THE FUTURE: ADOLESCENT GIRLS? PERCEPTIONS OF CYBERSECURITY CAREERS
Pam Rowland,Cherie Noteboom
pp. 168-177
https://doi.org/10.48009/1_iis_2019_168-177

PRIVACY: THE MISSING "V" IN BIG DATA ANALYTICS
Christopher B. Davison,Allen D. Truell,Edward J. Lazaros,Jensen J. Zhao
pp. 178-185
https://doi.org/10.48009/1_iis_2019_178-185

YOU'VE BEEN HACKED: A TECHNIQUE FOR RAISING CYBER SECURITY AWARENESS
David T. Smith,Azad I. Ali
pp. 186-194
https://doi.org/10.48009/1_iis_2019_186-194

SELECTING ENTERPRISE APPLICATIONS FOR CURRICULUM: INSIGHTS FROM A TEACHING INITIATIVE
Jae J. Choi,Thomas L. Ngo-Ye
pp. 195-203
https://doi.org/10.48009/1_iis_2019_195-203

PAIRING CONSTRUCTIVISM WITH THE MULTIDISCIPLINARITY OF IS EDUCATION
Samuel B. Fee,Amanda Holland-Minkley,Thomas Lombardi
pp. 204-212
https://doi.org/10.48009/1_iis_2019_204-212

A LONGITUDINAL STUDY OF FACEBOOK PRIVACY POLICIES
Alan Peslak,Mauri Conforti
pp. 213-223
https://doi.org/10.48009/1_iis_2019_213-223

THE ROLE OF TRADITION IN SYSTEMS ENGINEERING PRACTICE A PRELIMINARY ETHNOGRAPHIC STUDY
Paul D. Nugent,Jennifer Flynn
pp. 224-232
https://doi.org/10.48009/1_iis_2019_224-232