Table of Contents -
Volume 20, Issue 2
A COMPARATIVE STUDY ANALYZING COMPUTER PROGRAMMING COLLEGE STUDENTS' PRE-KNOWLEDGE AND POST-KNOWLEDGE OF SOFTWARE APPLICATION SECURITY USING OWASP Mel Tomeo, Wilfred Mutale, John Scarpino, Lee Cottrell
pp. 1-8
https://doi.org/10.48009/2_iis_2019_1-8
STUDENT PERCEPTIONS OF SKILLS AND COMPETENCIES NEEDED FOR CYBERSECURITY PROGRAMS AND CAREERS Sushma Mishra, Jamie Pinchot, Donna Cellante, Karen Paullet
pp. 9-17
https://doi.org/10.48009/2_iis_2019_9-17
AN EXPLORATORY STUDY OF EFFICACY OF COMMON BUSINESS CRITICAL THINKING COURSE: DO CIS MAJORS PERFORM BETTER THAN OTHER BUSINESS MAJORS? Kazuo Nakatani, Judy Wynekoop
pp. 18-28
https://doi.org/10.48009/2_iis_2019_18-28
A DESIGN OF AN AUTOMATED PARKING SYSTEM ON A SMART CAMPUS Delaney Brown, SeongYong Hong
pp. 29-37
https://doi.org/10.48009/2_iis_2019_29-37
EMPHASIZING SECURITY AND WRITING IN A CROSS-DISCIPLINARY COURSE FOR COMPUTER INFORMATION SYSTEMS AND BUSINESS LAW STUDENTS Lorrie Willey, Barbara Jo White
pp. 38-46
https://doi.org/10.48009/2_iis_2019_38-46
TRENDS IN BLOCKCHAIN AND NEWER TECHNOLOGIES USES IN LOGISTICS AND SUPPLY CHAIN MANAGEMENT Ephrem Eyob, Simon Eyob
pp. 47-55
https://doi.org/10.48009/2_iis_2019_47-55
THE USE OF MACHINE LEARNING IN HIGHER EDUCATION Frank Swiontek, Assion Lawson-Body, Laurence Lawson-Body
pp. 56-61
https://doi.org/10.48009/2_iis_2019_56-61
WHAT IS CYBERSECURITY AND WHAT CYBERSECURITY SKILLS ARE EMPLOYERS SEEKING? Alan Peslak, D. Scott Hunsinger
pp. 62-72
https://doi.org/10.48009/2_iis_2019_62-72
HEALTHCARE PROFESSIONALS' PERCEPTION OF THE USABILITY OF ELECTRONIC MEDICAL RECORDS Peter Draus, Sushma Mishra, Kevin Slonka, Natalya Bromall, Kelli Slonka
pp. 73-82
https://doi.org/10.48009/2_iis_2019_73-82
CYBERBULLYING: IMPORTANT CONSIDERATIONS Allen D. Truell, Jensen J. Zhao, Edward J. Lazaros, Christopher Davison, Dakota L. D. Nicley
pp. 83-88
https://doi.org/10.48009/2_iis_2019_83-88
RESEARCH ON SECURITY VISUALIZATION: A SURVEY Shuyi Liu, Wu He, Xin Tian
pp. 89-96
https://doi.org/10.48009/2_iis_2019_89-96
COMPARISON OF PUBLISHED PROGRAM OUTCOMES WITH STUDENT AND FACULTY EXPECTED OUTCOMES USING A CONSTRUCTIVIST ALIGNMENT APPROACH Peter Draus
pp. 97-104
https://doi.org/10.48009/2_iis_2019_97-104
THE EFFECTS OF NATIONAL CULTURE DIMENSIONS AND ONLINE MEDIUM TYPE ON DECISION CONFIDENCE: A STUDY BASED ON US AND CHINA Xiang Fang, T.M. Rajkumar, Mark P. Sena
pp. 105-116
https://doi.org/10.48009/2_iis_2019_105-116
A NOVEL OS-ELM CLASSIFIER BASED ON HOG FEATURE EXTRACTION AND VIOLA JONES ALGORITHM FOR FACIAL RECOGNITION Ankit Rajpal, Anurag Mishra, Khushwant Sehra
pp. 117-127
https://doi.org/10.48009/2_iis_2019_117-127
THE YIN AND YANG OF A DOCTOR OF SCIENCE IN INFORMATION SYSTEMS AND COMMUNICATIONS PROGRAM: PERSONAL REFLECTIONS AND REVERSE ENGINEERING Fred Hoffman, Chaojie Wang, Alvi Lim, Jin Kwon
pp. 128-139
https://doi.org/10.48009/2_iis_2019_128-139
BLOCKCHAIN TECHNOLOGY ADOPTION IN SUPPLY CHANGE MANAGEMENT: TWO THEORETICAL PERSPECTIVES Jennifer L. Breese, Sung-Jin Park, Ganesh Vaidyanathan
pp. 140-150
https://doi.org/10.48009/2_iis_2019_140-150
DEVELOPING AN E-COMMERCE DATABASE WEB APPLICATION FOR UNIVERSITY SPORT CONCESSION EVENT: A TEACHING CASE Thomas L. Ngo-Ye, Jae J. Choi, Dexter Gittens
pp. 151-161
https://doi.org/10.48009/2_iis_2019_151-161
ECONOMIC COSTS AND IMPACTS OF BUSINESS DATA BREACHES Ping Wang, Hubert D'Cruze, David Wood
pp. 162-171
https://doi.org/10.48009/2_iis_2019_162-171
PRIVACY AND SECURITY TRIBULATIONS IN THE DIGITAL CULTURE S.C. Spangler
pp. 172-182
https://doi.org/10.48009/2_iis_2019_172-182
FALSIFYING PERSONAL DATA TO ADDRESS ONLINE PRIVACY ISSUES Vasilka Chergarova, Ling Wang
pp. 183-194
https://doi.org/10.48009/2_iis_2019_183-194
MAPPING THE STRUCTURE OF A TWITTER 'SECURITY EXPERT' SOCIAL NETWORK John E. Anderson, Daniel McDonald
pp. 195-205
https://doi.org/10.48009/2_iis_2019_195-205
ENTER THE TWILIGHT ZONE: THE PARADOX OF THE DIGITAL NATIVE Nancy Marksbury, Enid Arbelo Bryant
pp. 206-215
https://doi.org/10.48009/2_iis_2019_206-215
INFORMATION TECHNOLOGY STRATEGIES FOR SMALL BUSINESSES Mysore Ramaswamy
pp. 216-225
https://doi.org/10.48009/2_iis_2019_216-225