International Association for Computer Information Systems
Wednesday, November 13, 2019

Table of Contents - Volume 20, Issue 2



A COMPARATIVE STUDY ANALYZING COMPUTER PROGRAMMING COLLEGE STUDENTS' PRE-KNOWLEDGE AND POST-KNOWLEDGE OF SOFTWARE APPLICATION SECURITY USING OWASP
Mel Tomeo
Wilfred Mutale
John Scarpino
Lee Cottrell
pp. 1-8

STUDENT PERCEPTIONS OF SKILLS AND COMPETENCIES NEEDED FOR CYBERSECURITY PROGRAMS AND CAREERS
Sushma Mishra
Jamie Pinchot
Donna Cellante
Karen Paullet
pp. 9-17

AN EXPLORATORY STUDY OF EFFICACY OF COMMON BUSINESS CRITICAL THINKING COURSE: DO CIS MAJORS PERFORM BETTER THAN OTHER BUSINESS MAJORS?
Kazuo Nakatani
Judy Wynekoop
pp. 18-28

A DESIGN OF AN AUTOMATED PARKING SYSTEM ON A SMART CAMPUS
Delaney Brown
SeongYong Hong
pp. 29-37

EMPHASIZING SECURITY AND WRITING IN A CROSS-DISCIPLINARY COURSE FOR COMPUTER INFORMATION SYSTEMS AND BUSINESS LAW STUDENTS
Lorrie Willey
Barbara Jo White
pp. 38-46

TRENDS IN BLOCKCHAIN AND NEWER TECHNOLOGIES USES IN LOGISTICS AND SUPPLY CHAIN MANAGEMENT
Ephrem Eyob
Simon Eyob
pp. 47-55

THE USE OF MACHINE LEARNING IN HIGHER EDUCATION
Frank Swiontek
Assion Lawson-Body
Laurence Lawson-Body
pp. 56-61

WHAT IS CYBERSECURITY AND WHAT CYBERSECURITY SKILLS ARE EMPLOYERS SEEKING?
Alan Peslak
D. Scott Hunsinger
pp. 62-72

HEALTHCARE PROFESSIONALS' PERCEPTION OF THE USABILITY OF ELECTRONIC MEDICAL RECORDS
Peter Draus
Sushma Mishra
Kevin Slonka
Natalya Bromall
Kelli Slonka
pp. 73-82

CYBERBULLYING: IMPORTANT CONSIDERATIONS
Allen D. Truell
Jensen J. Zhao
Edward J. Lazaros
Christopher Davison
Dakota L. D. Nicley
pp. 83-88

RESEARCH ON SECURITY VISUALIZATION: A SURVEY
Shuyi Liu
Wu He
Xin Tian
pp. 89-96

COMPARISON OF PUBLISHED PROGRAM OUTCOMES WITH STUDENT AND FACULTY EXPECTED OUTCOMES USING A CONSTRUCTIVIST ALIGNMENT APPROACH
Peter Draus
pp. 97-104

THE EFFECTS OF NATIONAL CULTURE DIMENSIONS AND ONLINE MEDIUM TYPE ON DECISION CONFIDENCE: A STUDY BASED ON US AND CHINA
Xiang Fang
T.M. Rajkumar
Mark P. Sena
pp. 105-116

A NOVEL OS-ELM CLASSIFIER BASED ON HOG FEATURE EXTRACTION AND VIOLA JONES ALGORITHM FOR FACIAL RECOGNITION
Ankit Rajpal
Anurag Mishra
Khushwant Sehra
pp. 117-127

THE YIN AND YANG OF A DOCTOR OF SCIENCE IN INFORMATION SYSTEMS AND COMMUNICATIONS PROGRAM: PERSONAL REFLECTIONS AND REVERSE ENGINEERING
Fred Hoffman
Chaojie Wang
Alvi Lim
Jin Kwon
pp. 128-139

BLOCKCHAIN TECHNOLOGY ADOPTION IN SUPPLY CHANGE MANAGEMENT: TWO THEORETICAL PERSPECTIVES
Jennifer L. Breese
Sung-Jin Park
Ganesh Vaidyanathan
pp. 140-150

DEVELOPING AN E-COMMERCE DATABASE WEB APPLICATION FOR UNIVERSITY SPORT CONCESSION EVENT: A TEACHING CASE
Thomas L. Ngo-Ye
Jae J. Choi
Dexter Gittens
pp. 151-161

ECONOMIC COSTS AND IMPACTS OF BUSINESS DATA BREACHES
Ping Wang
Hubert D'Cruze
David Wood
pp. 162-171

PRIVACY AND SECURITY TRIBULATIONS IN THE DIGITAL CULTURE
S.C. Spangler
pp. 172-182

FALSIFYING PERSONAL DATA TO ADDRESS ONLINE PRIVACY ISSUES
Vasilka Chergarova
Ling Wang
pp. 183-194

MAPPING THE STRUCTURE OF A TWITTER 'SECURITY EXPERT' SOCIAL NETWORK
John E. Anderson
Daniel McDonald
pp. 195-205

ENTER THE TWILIGHT ZONE: THE PARADOX OF THE DIGITAL NATIVE
Nancy Marksbury
Enid Arbelo Bryant
pp. 206-215

INFORMATION TECHNOLOGY STRATEGIES FOR SMALL BUSINESSES
Mysore Ramaswamy
pp. 216-225