International Association for Computer Information Systems
Friday, April 26, 2024

Table of Contents - Volume 20, Issue 3



REFLECTIONS ON SECURITY COURSES IN CIS CURRICULUM AFTER ATTENDING A CAE WORKSHOP
Lisa Z. Bain, Suzanne Mello-Stark
pp. 1-10
https://doi.org/10.48009/3_iis_2019_1-10

ANTECEDENTS TO SUCCESSFUL SOFTWARE TRAINING: A RESEARCH FRAMEWORK & PRELIMINARY EVIDENCE
Douglas Havelka, T.M. Rajkumar
pp. 11-21
https://doi.org/10.48009/3_iis_2019_11-21

SOCIAL MEDIA AND CHEATING: IS THERE A NEED TO REVIEW YOUR ACADEMIC INTEGRITY POLICY?
Philip Kim, Joseph V. Homan
pp. 22-27
https://doi.org/10.48009/3_iis_2019_22-27

CYBER-SECURITY INSTRUCTIONAL TECHNOLOGY DESIGN
Billy Carrie, Hayden Wimmer, Loreen Powell, Carl Rebman
pp. 28-36
https://doi.org/10.48009/3_iis_2019_28-36

SECURE PROTOCOLS AND VIRTUAL PRIVATE NETWORKS: AN EVALUATION
Raymond Angelo
pp. 37-46
https://doi.org/10.48009/3_iis_2019_37-46

BROADENING PARTICIPATION IN CYBERSECURITY EDUCATION: USING AN INTERSECTIONALITY LENS TO UNCOVER NEW PERSPECTIVES
Debra Nakama, Karen Paullet
pp. 47-56
https://doi.org/10.48009/3_iis_2019_47-56

COMMAND-BASED CODING USING R FOR DATA SCIENCE
Jianfeng Wang, Linwu Gu
pp. 57-63
https://doi.org/10.48009/3_iis_2019_57-63

FACTORS INFLUENCING CURRICULUM ADOPTION IN UNDERGRADUATE CYBERSECURITY PROGRAMS
Todd A. Whittaker, Cherie Noteboom
pp. 64-73
https://doi.org/10.48009/3_iis_2019_64-73

HIGH SCHOOL STUDENTS? PERCEPTIONS OF CYBERSECURITY: AN EXPLANATORY CASE STUDY
Kodey S. Crandall, Cherie Noteboom, Omar El-Gayar, Kalee Crandall
pp. 74-82
https://doi.org/10.48009/3_iis_2019_74-82

CONDUCTING SYSTEMATIC LITERATURE REVIEWS IN INFORMATION SYSTEMS: AN ANALYSIS OF GUIDELINES
Zefeng Bai, Nitin Jain, Roman Kurdyukov, Joanna Walton, Ying Wang, Tyler Wasson, Xiaolin Zhu, Alina M. Chircu
pp. 83-93
https://doi.org/10.48009/3_iis_2019_83-93

THE AGILE PROJECT MANAGEMENT UNDERPINNINGS: BACKLOG REFINEMENT, TEAM COMPOSITION, AND BACKLOG PREPARATION
Rosarito Sanchez-Morcilio, Francisco Quiles-Torres
pp. 94-106
https://doi.org/10.48009/3_iis_2019_94-106

EXAMINING A DEEP LEARNING NETWORK SYSTEM FOR IMAGE IDENTIFICATION AND CLASSIFICATION FOR PREVENTING UNAUTHORIZED ACCESS FOR A SMART HOME SECURITY SYSTEM
Beloved Egbedion, Hayden Wimmer, Carl M. Rebman Jr., Loreen M. Powell
pp. 107-116
https://doi.org/10.48009/3_iis_2019_107-116

USING DATA MINING TECHNIQUES FOR GAME RULE EXTRACTION
Chen-Huei Chou
pp. 117-127
https://doi.org/10.48009/3_iis_2019_117-127

A CASE BASED ANALYSIS OF ORGANIZATIONAL SECURITY GOVERNANCE DIMENSIONS: USER INVOLVEMENT, PROCESS INTEGRITY AND RESOURCE ALLOCATION
Sushma Mishra
pp. 128-138
https://doi.org/10.48009/3_iis_2019_128-138

CYBERSECURITY INERTIA AND SOCIAL ENGINEERING: WHO'S WORSE, EMPLOYEES OR HACKERS?
Debra J. Borkovich, Robert Joseph Skovira
pp. 139-150
https://doi.org/10.48009/3_iis_2019_139-150

A MODEL GRADUATE ENTERPRISE SECURITY COURSE
Manouchehr Tabatabaei, James K. Harris
pp. 151-157
https://doi.org/10.48009/3_iis_2019_151-157

IS WECHAT SOCIAL TECHNOLOGY FITTING TO A WECHAT BRAND GROUP?
Linwu Gu, Jianfeng Wang
pp. 158-164
https://doi.org/10.48009/3_iis_2019_158-164

STRATEGIC MARKETING AND CYBERSECURITY: THE CASE OF DATA BREACHES
George Kirk, Jose Noguera
pp. 165-174
https://doi.org/10.48009/3_iis_2019_165-174

POLICE USE OF SOCIAL MEDIA: COMPARING CLASSIFICATION METHODS
Kevin Mentzer, Jane Fedorowicz, Christine Williams
pp. 175-185
https://doi.org/10.48009/3_iis_2019_175-185

INCREASING THE EFFECTIVENESS OF THE CYBERSECURITY TEACHING AND LEARNING BY APPLYING ACTIVITY THEORY AND NARRATIVE RESEARCH
Constanta-Nicoleta Bodea, Maria-Iuliana Dascalu, Mihail Cazacu
pp. 186-193
https://doi.org/10.48009/3_iis_2019_186-193

INTEGRATING EXPERIENTIAL LEARNING: USING AN EHR SYSTEM TO TEACH CDSS IN HEALTH INFORMATICS
Kalyani Ankem, Vishal Uppala, Adam Durst
pp. 194-207
https://doi.org/10.48009/3_iis_2019_194-207

A FRAMEWORK FOR A SMARPHONE NATURAL LANGUAGE-DRIVEN HEALTHCARE MONITOR AND ADVISOR USING WEARABLE DEVICES
George Stefanek, Marianne Curia, Janet Garwood
pp. 208-213
https://doi.org/10.48009/3_iis_2019_208-213