International Association for Computer Information Systems
Tuesday, April 13, 2021

Table of Contents - Volume 20, Issue 2



A COMPARATIVE STUDY ANALYZING COMPUTER PROGRAMMING COLLEGE STUDENTS' PRE-KNOWLEDGE AND POST-KNOWLEDGE OF SOFTWARE APPLICATION SECURITY USING OWASP
Mel Tomeo,Wilfred Mutale,John Scarpino,Lee Cottrell
pp. 1-8
https://doi.org/10.48009/2_iis_2019_1-8

STUDENT PERCEPTIONS OF SKILLS AND COMPETENCIES NEEDED FOR CYBERSECURITY PROGRAMS AND CAREERS
Sushma Mishra,Jamie Pinchot,Donna Cellante,Karen Paullet
pp. 9-17
https://doi.org/10.48009/2_iis_2019_9-17

AN EXPLORATORY STUDY OF EFFICACY OF COMMON BUSINESS CRITICAL THINKING COURSE: DO CIS MAJORS PERFORM BETTER THAN OTHER BUSINESS MAJORS?
Kazuo Nakatani,Judy Wynekoop
pp. 18-28
https://doi.org/10.48009/2_iis_2019_18-28

A DESIGN OF AN AUTOMATED PARKING SYSTEM ON A SMART CAMPUS
Delaney Brown,SeongYong Hong
pp. 29-37
https://doi.org/10.48009/2_iis_2019_29-37

EMPHASIZING SECURITY AND WRITING IN A CROSS-DISCIPLINARY COURSE FOR COMPUTER INFORMATION SYSTEMS AND BUSINESS LAW STUDENTS
Lorrie Willey,Barbara Jo White
pp. 38-46
https://doi.org/10.48009/2_iis_2019_38-46

TRENDS IN BLOCKCHAIN AND NEWER TECHNOLOGIES USES IN LOGISTICS AND SUPPLY CHAIN MANAGEMENT
Ephrem Eyob,Simon Eyob
pp. 47-55
https://doi.org/10.48009/2_iis_2019_47-55

THE USE OF MACHINE LEARNING IN HIGHER EDUCATION
Frank Swiontek,Assion Lawson-Body,Laurence Lawson-Body
pp. 56-61
https://doi.org/10.48009/2_iis_2019_56-61

WHAT IS CYBERSECURITY AND WHAT CYBERSECURITY SKILLS ARE EMPLOYERS SEEKING?
Alan Peslak,D. Scott Hunsinger
pp. 62-72
https://doi.org/10.48009/2_iis_2019_62-72

HEALTHCARE PROFESSIONALS' PERCEPTION OF THE USABILITY OF ELECTRONIC MEDICAL RECORDS
Peter Draus,Sushma Mishra,Kevin Slonka,Natalya Bromall,Kelli Slonka
pp. 73-82
https://doi.org/10.48009/2_iis_2019_73-82

CYBERBULLYING: IMPORTANT CONSIDERATIONS
Allen D. Truell,Jensen J. Zhao,Edward J. Lazaros,Christopher Davison,Dakota L. D. Nicley
pp. 83-88
https://doi.org/10.48009/2_iis_2019_83-88

RESEARCH ON SECURITY VISUALIZATION: A SURVEY
Shuyi Liu,Wu He,Xin Tian
pp. 89-96
https://doi.org/10.48009/2_iis_2019_89-96

COMPARISON OF PUBLISHED PROGRAM OUTCOMES WITH STUDENT AND FACULTY EXPECTED OUTCOMES USING A CONSTRUCTIVIST ALIGNMENT APPROACH
Peter Draus
pp. 97-104
https://doi.org/10.48009/2_iis_2019_97-104

THE EFFECTS OF NATIONAL CULTURE DIMENSIONS AND ONLINE MEDIUM TYPE ON DECISION CONFIDENCE: A STUDY BASED ON US AND CHINA
Xiang Fang,T.M. Rajkumar,Mark P. Sena
pp. 105-116
https://doi.org/10.48009/2_iis_2019_105-116

A NOVEL OS-ELM CLASSIFIER BASED ON HOG FEATURE EXTRACTION AND VIOLA JONES ALGORITHM FOR FACIAL RECOGNITION
Ankit Rajpal,Anurag Mishra,Khushwant Sehra
pp. 117-127
https://doi.org/10.48009/2_iis_2019_117-127

THE YIN AND YANG OF A DOCTOR OF SCIENCE IN INFORMATION SYSTEMS AND COMMUNICATIONS PROGRAM: PERSONAL REFLECTIONS AND REVERSE ENGINEERING
Fred Hoffman,Chaojie Wang,Alvi Lim,Jin Kwon
pp. 128-139
https://doi.org/10.48009/2_iis_2019_128-139

BLOCKCHAIN TECHNOLOGY ADOPTION IN SUPPLY CHANGE MANAGEMENT: TWO THEORETICAL PERSPECTIVES
Jennifer L. Breese,Sung-Jin Park,Ganesh Vaidyanathan
pp. 140-150
https://doi.org/10.48009/2_iis_2019_140-150

DEVELOPING AN E-COMMERCE DATABASE WEB APPLICATION FOR UNIVERSITY SPORT CONCESSION EVENT: A TEACHING CASE
Thomas L. Ngo-Ye,Jae J. Choi,Dexter Gittens
pp. 151-161
https://doi.org/10.48009/2_iis_2019_151-161

ECONOMIC COSTS AND IMPACTS OF BUSINESS DATA BREACHES
Ping Wang,Hubert D'Cruze,David Wood
pp. 162-171
https://doi.org/10.48009/2_iis_2019_162-171

PRIVACY AND SECURITY TRIBULATIONS IN THE DIGITAL CULTURE
S.C. Spangler
pp. 172-182
https://doi.org/10.48009/2_iis_2019_172-182

FALSIFYING PERSONAL DATA TO ADDRESS ONLINE PRIVACY ISSUES
Vasilka Chergarova,Ling Wang
pp. 183-194
https://doi.org/10.48009/2_iis_2019_183-194

MAPPING THE STRUCTURE OF A TWITTER 'SECURITY EXPERT' SOCIAL NETWORK
John E. Anderson,Daniel McDonald
pp. 195-205
https://doi.org/10.48009/2_iis_2019_195-205

ENTER THE TWILIGHT ZONE: THE PARADOX OF THE DIGITAL NATIVE
Nancy Marksbury,Enid Arbelo Bryant
pp. 206-215
https://doi.org/10.48009/2_iis_2019_206-215

INFORMATION TECHNOLOGY STRATEGIES FOR SMALL BUSINESSES
Mysore Ramaswamy
pp. 216-225
https://doi.org/10.48009/2_iis_2019_216-225