International Association for Computer Information Systems
Friday, April 19, 2024

Table of Contents - Volume 20, Issue 1



PREDICTORS OF SUCCESS IN SECURITY AND DATA PROTECTION AWARENESS OF MOBILE DEVICES: TRUST AND PRIVACY
Alex Koohang, Joanna Paliszkiewicz, Jeretta Horn Nord, Karen Paullet, Tara Underwood
pp. 1-11
https://doi.org/10.48009/1_iis_2019_1-11

OVERVIEW OF BLOCKCHAIN LEGISLATION AND ADOPTION: STATUS AND CHALLENGES
Selam E. Eyassu
pp. 12-21
https://doi.org/10.48009/1_iis_2019_12-21

FACTORS RELATED TO LARGER BUT FEWER WILDFIRES AND FEWER DEER IN CALIFORNIA: A GOOGLE SITES KNOWLEDGE BASE
G. Kent Webb
pp. 22-31
https://doi.org/10.48009/1_iis_2019_22-31

APPROPRIATE SAMPLE FOR TECHNOLOGY ADOPTION STUDIES IN TECHNICAL EDUCATION
Shannon W. Beasley
pp. 32-39
https://doi.org/10.48009/1_iis_2019_32-39

WHAT REALLY MATTERS IN ONLINE EDUCATION?
Wenli Wang, Alan Peslak, Paul Kovacs, Lisa Kovalchick
pp. 40-48
https://doi.org/10.48009/1_iis_2019_40-48

IT PROFESSIONAL USERS AND VENDORS? PERCEPTIONS OF THE KEY FACTORS IN ADOPTING CLOUD-MANAGED NETWORKS TECHNOLOGY
Chalermpon Kesa, Peter Draus
pp. 49-59
https://doi.org/10.48009/1_iis_2019_49-59

HABITS OF HIGHLY PRODUCTIVE INFORMATION SYSTEMS USERS: A LOOK AT ONE UNIVERSITY'S FACULTY, STAFF, AND STUDENTS
Gayle R. Jesse, Lily J. Pharris
pp. 60-69
https://doi.org/10.48009/1_iis_2019_60-69

BIG DATA STUDIES: A SYSTEMATIC REVIEW
Mehmet Ali Koseoglu, Mehmet Yildiz, John P. Girard
pp. 70-79
https://doi.org/10.48009/1_iis_2019_70-79

CYBER CRIME AND CYBER SECURITY AWARENESS AMONG STUDENTS: A COMPARATIVE STUDY IN ISRAEL AND SLOVENIA
Dusan Lesjak, Moti Zwilling, Galit Klein
pp. 80-87
https://doi.org/10.48009/1_iis_2019_80-87

DESIGNING A DOCTORAL PROGRAM IN CYBERSECURITY FOR WORKING PROFESSIONALS
Ping Wang, Fred Kohun
pp. 88-99
https://doi.org/10.48009/1_iis_2019_88-99

ENHANCING ORGANIZATIONAL CYBERSECURITY: A HANDS-ON IMMERSIVE LEARNING PROJECT
Jensen J. Zhao, Allen D. Truell, Edward J. Lazaros, Chris Davison
pp. 100-107
https://doi.org/10.48009/1_iis_2019_100-107

A PRELIMINARY INVESTIGATION OF QUALITY METRICS AND PERFORMANCE FOR SELECTED INSTITUTIONS DELIVERING TECHNOLOGY MEDIATED HIGHER EDUCATION
Suhong Li, Kamel Rouibah, Hal Records, Robert Behling
pp. 108-118
https://doi.org/10.48009/1_iis_2019_108-118

INDUSTRIAL INTERNET OF THINGS VULNERABILITIES AND THREATS: WHAT STAKEHOLDERS NEED TO CONSIDER
Fred Hoffman
pp. 119-133
https://doi.org/10.48009/1_iis_2019_119-133

AN EVALUATION OF A MULTILINGUAL CHATBOT
Mahesh Vanjani, Jamison Posey, Milam Aiken
pp. 134-143
https://doi.org/10.48009/1_iis_2019_134-143

AGILE AND SECURE SOFTWARE DEVELOPMENT: AN UNFINISHED STORY
David Bishop, Pam Rowland
pp. 144-156
https://doi.org/10.48009/1_iis_2019_144-156

PROPOSING A NEW GRADUATE DEGREE IN DATA ENGINEERING AND ANALYTICS
Kimberly W. Bartholomew, John E. Anderson
pp. 157-167
https://doi.org/10.48009/1_iis_2019_157-167

INFLUENCING THE FUTURE: ADOLESCENT GIRLS? PERCEPTIONS OF CYBERSECURITY CAREERS
Pam Rowland, Cherie Noteboom
pp. 168-177
https://doi.org/10.48009/1_iis_2019_168-177

PRIVACY: THE MISSING "V" IN BIG DATA ANALYTICS
Christopher B. Davison, Allen D. Truell, Edward J. Lazaros, Jensen J. Zhao
pp. 178-185
https://doi.org/10.48009/1_iis_2019_178-185

YOU'VE BEEN HACKED: A TECHNIQUE FOR RAISING CYBER SECURITY AWARENESS
David T. Smith, Azad I. Ali
pp. 186-194
https://doi.org/10.48009/1_iis_2019_186-194

SELECTING ENTERPRISE APPLICATIONS FOR CURRICULUM: INSIGHTS FROM A TEACHING INITIATIVE
Jae J. Choi, Thomas L. Ngo-Ye
pp. 195-203
https://doi.org/10.48009/1_iis_2019_195-203

PAIRING CONSTRUCTIVISM WITH THE MULTIDISCIPLINARITY OF IS EDUCATION
Samuel B. Fee, Amanda Holland-Minkley, Thomas Lombardi
pp. 204-212
https://doi.org/10.48009/1_iis_2019_204-212

A LONGITUDINAL STUDY OF FACEBOOK PRIVACY POLICIES
Alan Peslak, Mauri Conforti
pp. 213-223
https://doi.org/10.48009/1_iis_2019_213-223

THE ROLE OF TRADITION IN SYSTEMS ENGINEERING PRACTICE A PRELIMINARY ETHNOGRAPHIC STUDY
Paul D. Nugent, Jennifer Flynn
pp. 224-232
https://doi.org/10.48009/1_iis_2019_224-232