International Association for Computer Information Systems
Wednesday, November 13, 2019

Table of Contents - Volume 20, Issue 3



REFLECTIONS ON SECURITY COURSES IN CIS CURRICULUM AFTER ATTENDING A CAE WORKSHOP
Lisa Z. Bain
Suzanne Mello-Stark
pp. 1-10

ANTECEDENTS TO SUCCESSFUL SOFTWARE TRAINING: A RESEARCH FRAMEWORK & PRELIMINARY EVIDENCE
Douglas Havelka
T.M. Rajkumar
pp. 11-21

SOCIAL MEDIA AND CHEATING: IS THERE A NEED TO REVIEW YOUR ACADEMIC INTEGRITY POLICY?
Philip Kim
Joseph V. Homan
pp. 22-27

CYBER-SECURITY INSTRUCTIONAL TECHNOLOGY DESIGN
Billy Carrie
Hayden Wimmer
Loreen Powell
Carl Rebman
pp. 28-36

SECURE PROTOCOLS AND VIRTUAL PRIVATE NETWORKS: AN EVALUATION
Raymond Angelo
pp. 37-46

BROADENING PARTICIPATION IN CYBERSECURITY EDUCATION: USING AN INTERSECTIONALITY LENS TO UNCOVER NEW PERSPECTIVES
Debra Nakama
Karen Paullet
pp. 47-56

COMMAND-BASED CODING USING R FOR DATA SCIENCE
Jianfeng Wang
Linwu Gu
pp. 57-63

FACTORS INFLUENCING CURRICULUM ADOPTION IN UNDERGRADUATE CYBERSECURITY PROGRAMS
Todd A. Whittaker
Cherie Noteboom
pp. 64-73

HIGH SCHOOL STUDENTS? PERCEPTIONS OF CYBERSECURITY: AN EXPLANATORY CASE STUDY
Kodey S. Crandall
Cherie Noteboom
Omar El-Gayar
Kalee Crandall
pp. 74-82

CONDUCTING SYSTEMATIC LITERATURE REVIEWS IN INFORMATION SYSTEMS: AN ANALYSIS OF GUIDELINES
Zefeng Bai
Nitin Jain
Roman Kurdyukov
Joanna Walton
Ying Wang
Tyler Wasson
Xiaolin Zhu
Alina M. Chircu
pp. 83-93

THE AGILE PROJECT MANAGEMENT UNDERPINNINGS: BACKLOG REFINEMENT, TEAM COMPOSITION, AND BACKLOG PREPARATION
Rosarito Sanchez-Morcilio
Francisco Quiles-Torres
pp. 94-106

EXAMINING A DEEP LEARNING NETWORK SYSTEM FOR IMAGE IDENTIFICATION AND CLASSIFICATION FOR PREVENTING UNAUTHORIZED ACCESS FOR A SMART HOME SECURITY SYSTEM
Beloved Egbedion
Hayden Wimmer
Carl M. Rebman Jr.
Loreen M. Powell
pp. 107-116

USING DATA MINING TECHNIQUES FOR GAME RULE EXTRACTION
Chen-Huei Chou
pp. 117-127

A CASE BASED ANALYSIS OF ORGANIZATIONAL SECURITY GOVERNANCE DIMENSIONS: USER INVOLVEMENT, PROCESS INTEGRITY AND RESOURCE ALLOCATION
Sushma Mishra
pp. 128-138

CYBERSECURITY INERTIA AND SOCIAL ENGINEERING: WHO'S WORSE, EMPLOYEES OR HACKERS?
Debra J. Borkovich
Robert Joseph Skovira
pp. 139-150

A MODEL GRADUATE ENTERPRISE SECURITY COURSE
Manouchehr Tabatabaei
James K. Harris
pp. 151-157

IS WECHAT SOCIAL TECHNOLOGY FITTING TO A WECHAT BRAND GROUP?
Linwu Gu
Jianfeng Wang
pp. 158-164

STRATEGIC MARKETING AND CYBERSECURITY: THE CASE OF DATA BREACHES
George Kirk
Jose Noguera
pp. 165-174

POLICE USE OF SOCIAL MEDIA: COMPARING CLASSIFICATION METHODS
Kevin Mentzer
Jane Fedorowicz
Christine Williams
pp. 175-185

INCREASING THE EFFECTIVENESS OF THE CYBERSECURITY TEACHING AND LEARNING BY APPLYING ACTIVITY THEORY AND NARRATIVE RESEARCH
Constanta-Nicoleta Bodea
Maria-Iuliana Dascalu
Mihail Cazacu
pp. 186-193

INTEGRATING EXPERIENTIAL LEARNING: USING AN EHR SYSTEM TO TEACH CDSS IN HEALTH INFORMATICS
Kalyani Ankem
Vishal Uppala
Adam Durst
pp. 194-207

A FRAMEWORK FOR A SMARPHONE NATURAL LANGUAGE-DRIVEN HEALTHCARE MONITOR AND ADVISOR USING WEARABLE DEVICES
George Stefanek
Marianne Curia
Janet Garwood
pp. 208-213