Table of Contents -
Volume 7, Issue 2
DIFFUSION OF KNOWLEDGE IN AND THROUGH HIGHER EDUCATION ORGANIZATIONSPatrice Sargenti,William Lightfoot,Mounir Kehal
pp. 3-8
https://doi.org/10.48009/2_iis_2006_3-8
INVESTIGATING DECISION SUPPORT SYSTEMS FRAMEWORKSRoger Hayen
pp. 9-13
https://doi.org/10.48009/2_iis_2006_9-13
TOWARD A UNIFIED ENTERPRISE ARCHITECTURE FRAMEWORK: AN ANALYTICAL EVALUATIONRichard McCarthy
pp. 14-17
https://doi.org/10.48009/2_iis_2006_14-17
A COMPARISON OF ENTERPRISE ARCHITECTURE FRAMEWORKSLise Urbaczewski,Stevan Mrdalj
pp. 18-23
https://doi.org/10.48009/2_iis_2006_18-23
THE IMPACT OF THE SARBANES-OXLEY ACT 2002 ON THE INFORMATION SYSTEMS OF PUBLIC COMPANIESMonica Holmes,Darian Neubecker
pp. 24-28
https://doi.org/10.48009/2_iis_2006_24-28
BUSINESS INTELLIGENCE FOR A SUPPLY CHAIN MANAGEMENT SYSTEMEsra Vural,Özgür Sengül,Steve Davis,Holger Günther
pp. 29-32
https://doi.org/10.48009/2_iis_2006_29-32
PROCESSOR TYPE AND ITS RELATIONSHIP TO PERFORMANCE IN THE APPLICATION OF DISTRIBUTED PROCESSING TO DETERMINE VULNERABILITES IN PASSWORD FILESPaul Safonov,Dennis Guster,Renat Sultanov,Dmitri Podkorytov
pp. 33-37
https://doi.org/10.48009/2_iis_2006_33-37
DATA SECURITY - IDENTITY THEFT: BANKS AND FINANCIAL INSTITUTIONS ARE ON THE LOOKOUTEric Kieschnick,Richard Aukerman,Jack Shorter
pp. 38-42
https://doi.org/10.48009/2_iis_2006_38-42
LOCKING DOWN LOG FILES: ENHANCING NETWORK SECURITY BY PROTECTING LOG FILESBernie Lantz,Rob Hall,Jason Couraud
pp. 43-47
https://doi.org/10.48009/2_iis_2006_43-47
SECURITY RISKS OF CARELESS COMPUTER DISPOSALKaren Forcht,Richard Swart,Shiloh Allen,Daphyne Thomas
pp. 48-51
https://doi.org/10.48009/2_iis_2006_48-51
CYBEREXTORTION: AN OVERVIEW OF DISTRIBUTED DENIAL OF SERVICE ATTACKS AGAINST ONLINE GAMING COMPANIESRichard Paulson,James Weber
pp. 52-58
https://doi.org/10.48009/2_iis_2006_52-58
SAP R/3 IMPLEMENTATION SUCCESS INCREASES AS ONE ORGANIZATION DEVIATES FROM FASTTRACK© FOR SAP: A CASE STUDYGina Boff,Gary DeLorenzo
pp. 59-63
https://doi.org/10.48009/2_iis_2006_59-63
INTEGRATED RESULTS REPORTING: MOVING TOWARD ELECTRONIC HEALTH RECORDSMary Fagan,Carol Kilmon,Tom Belt
pp. 64-68
https://doi.org/10.48009/2_iis_2006_64-68
SYSTEM FOR ORDER ALLOCATION AMONG WAREHOUSESSteffen Hett,Steve Davis
pp. 69-72
https://doi.org/10.48009/2_iis_2006_69-72
APPLYING AGILE METHODOLOGIES TO IT SECURITYSomeswar Kesh,Sandhya Jane
pp. 73-76
https://doi.org/10.48009/2_iis_2006_73-76
INFORMATION PROCESS REENGINEERING: WHERE TO START BUSINESS AND HOW TO DECIDE?Srecko Natek,Duan Lesjak
pp. 77-82
https://doi.org/10.48009/2_iis_2006_77-82
ENTERPRISE RESOURCE PLANNING TODAYJ Vanover,Jack Shorter
pp. 83-87
https://doi.org/10.48009/2_iis_2006_83-87
THE IMPORTANCE OF DATA QUALITY FOR SAP IMPLEMENTATION IN MEDIUM-SIZED ORGANIZATIONSHongjiang Xu
pp. 88-91
https://doi.org/10.48009/2_iis_2006_88-91
RECOVERING TROUBLED PROJECTS: PRESCRIPTIONS FOR SUSTAINED RECOVERYDouglas Havelka,T.M. Rajkumar
pp. 92-96
https://doi.org/10.48009/2_iis_2006_92-96
INFORMATION REQUIREMENTS FOR MAKING STRATEGIC DECISIONS AT THE ENTERPRISE LEVELEugene Calvasina,Mysore Ramaswamy,Richard Calvasina,Gerald Calvasina
pp. 97-101
https://doi.org/10.48009/2_iis_2006_97-101
COMPUTER-SUPPORTED COOPERATIVE WORK: A COLLABORATIVE VIEWKristi Berg,Lori Willoughby,John Girard
pp. 101-104
https://doi.org/10.48009/2_iis_2006_101-104
MICROFINANCE IN ACTION: A BUSINESS PROCESS ANALYSIS OF AN OPERATION IN NICARAGUAJulio Martinez,Winston Tellis
pp. 105-109
https://doi.org/10.48009/2_iis_2006_105-109
AN EXPLORATORY STUDY OF END USER COMPUTING STRATEGY: MANAGING FOR COMPLIANCE AND INNOVATIONElaine Winston
pp. 110-118
https://doi.org/10.48009/2_iis_2006_110-118
ADDING THE KURDISH LANGUAGE TO VB .NET GLOBALIZATION: MAKING A CASE AND TECHNICAL CODEAzad Ali,Seever Sulaiman
pp. 119-124
https://doi.org/10.48009/2_iis_2006_119-124
MEASURING THE ACCURACY OF SPANISH TO ENGLISH TRANSLATIONSMilam Aiken,Mahesh Vanjani,Zachary Wong
pp. 125-128
https://doi.org/10.48009/2_iis_2006_125-128
APPLICATION OF AN INFORMATION LANDSCAPE MODEL TO ANALYZE INFORMATION FLOWS IN A COMMUNITY OF PRACTICELarry George,Robert Skovira
pp. 129-133
https://doi.org/10.48009/2_iis_2006_129-133
AN EFFECTIVE APPROACH FOR MODIFYING XML DOCUMENTS IN THE CONTEXT OF MESSAGE BROKERINGR Gururaj,M Reddy,P Kumar
pp. 134-139
https://doi.org/10.48009/2_iis_2006_134-139
COLOR IMAGE SEMANTIC INFORMATION RETRIEVAL SYSTEM USING HUMAN SENSATION AND EMOTIONHae-Yeon Choi,Seong-Yong Hong
pp. 140-145
https://doi.org/10.48009/2_iis_2006_140-145
A MOBILE USER INTERFACE FOR AN ERP SYSTEMKarl Kurbel,Anna Jankowska,Kamil Nowakowski
pp. 146-151
https://doi.org/10.48009/2_iis_2006_146-151
REQUIREMENTS MANAGEMENT USING POSITIONING REQUIREMENTS IN ENTERPRISE SYSTEM PROJECTSClotilde Rohleder
pp. 152-160
https://doi.org/10.48009/2_iis_2006_152-160
A LONGITUDINAL LOOK AT E-GOVERNMENT IN PRACTICERoy Boggs,Douglas Walters
pp. 161-164
https://doi.org/10.48009/2_iis_2006_161-164
E-GOVERNMENT PRACTICES AT LOCAL LEVELS: AN ANALYSIS OF U.S. COUNTIES' WEBSITESZhenyu Huang
pp. 165-170
https://doi.org/10.48009/2_iis_2006_165-170
STATE E-GOVERNMENT SERVICE AND ECONOMIC COMPETITIVENESS: A RELATIONAL ANALYSISJensen Zhao,Allen Truell,Melody Alexander,Rod Davis
pp. 171-176
https://doi.org/10.48009/2_iis_2006_171-176
CONSUMER PERCEPTIONS OF ONLINE SHOPPINGChuleeporn Changchit
pp. 177-181
https://doi.org/10.48009/2_iis_2006_177-181
E-BUSINESS ADOPTION: FROM THE ECONOMIC AND STRATEGIC MANAGEMENT PERSPECTIVESFujun Lai,Weihua Shi,Jian Wang,Joe Hutchinson
pp. 182-186
https://doi.org/10.48009/2_iis_2006_182-186
AN ANALYSIS OF THE USE OF WEB DESIGN CONVENTIONS IN COMPANY WEBSITESJames Cappel,Zhenyu Huang
pp. 187-191
https://doi.org/10.48009/2_iis_2006_187-191
E-COMMERCE TRANSACTIONS: AN EMPIRICAL ANALYSIS & UNDERSTANDING OF WEB-BASED APPLICATIONSEphrem Eyob
pp. 192-196
https://doi.org/10.48009/2_iis_2006_192-196
USERS' SELECTION OF E-AUCTION WEBSITES IN CHINA:THE EFFECTS OF DESIGN, TRUST AND COUNTRY-OF-ORIGINZhenyu Huang,Ming Dai
pp. 197-201
https://doi.org/10.48009/2_iis_2006_197-201
CONSUMERS' ATTITUDES OF E-COMMERCE IN CHINAXiaowen Zou,Hengshan Wang,Hongjiang Xu
pp. 202-207
https://doi.org/10.48009/2_iis_2006_202-207
USAGE OF APPROVAL SEALS IN ONLINE COMMERCEKai Koong,Binshan Lin,Lai Liu
pp. 208-212
https://doi.org/10.48009/2_iis_2006_208-212
WHY VISITORS LEAVE WEB SITES WITHOUT BUYING: TOWARD A UNIFIED THEORY OF WEB SITE DESIGNVoraphan Manomuth,John Vinsonhaler,Gerry Scheffelmaier
pp. 213-217
https://doi.org/10.48009/2_iis_2006_213-217
RELIABILITY IN AUTOMATED EVALUATION TOOLS FOR WEB ACCESSIBILITY STANDARDS COMPLIANCEAshli Molinero,Frederick Kohun
pp. 218-223
https://doi.org/10.48009/2_iis_2006_218-223
PUBLISHED SECURITY POLICIES OF WEB SITES OF GLOBAL BANKS OF MEXICO, CENTRAL & SOUTH AMERICA, CANADA AND THE U.S.Donald Moscato,Eric Moscato
pp. 223-228
https://doi.org/10.48009/2_iis_2006_223-228
THE SEARCH ENGINE VISIBILITY OF QUEENSLAND VISITOR INFORMATION CENTRES' WEBSITESYuquan Shi
pp. 228-232
https://doi.org/10.48009/2_iis_2006_228-232
HOW RELIABLE ARE WEBSITE RANKINGS? IMPLICATIONS FOR E-BUSINESS ADVERTISING AND INTERNET SEARCHBruce Lo,Rosy Sedhain
pp. 233-240
https://doi.org/10.48009/2_iis_2006_233-240
INFORMATION TECHNOLOGY ADDRESSES TRANSPARENCY: THE POTENTIAL EFFECTS OF XBRL ON FINANCIAL DISCLOSUREYuan Li,Joseph Roge`,Les Rydl,Mike Crews
pp. 241-245
https://doi.org/10.48009/2_iis_2006_241-245
THE DEVELOPMENT OF A RESEARCH AGENDA FOR RFID ADOPTION AND EFFECTIVENESS IN SUPPLY CHAINSVic Matta,Christopher Moberg
pp. 246-251
https://doi.org/10.48009/2_iis_2006_246-251
WHICH THEORY APPLIES: AN ANALYSIS OF INFORMATION SYSTEMS RESEARCHLeila A. Halawi,Richard McCarthy
pp. 252-256
https://doi.org/10.48009/2_iis_2006_252-256
A ZACHMAN CUBEVladan Jovanovic,Stevan Mrdalj,Adrian Gardiner
pp. 257-262
https://doi.org/10.48009/2_iis_2006_257-262
AVOIDANCE OF CYCLICAL REFERENCE OF FOREIGN KEYS IN DATA MODELING USING THE ENTITY-RELATIONSHIP MODELBen Kim
pp. 263-268
https://doi.org/10.48009/2_iis_2009_263-268
AN ACTIVE CONSUMER THEORY PERSPECTIVE ON BLOGSSeung Lee
pp. 269-274
https://doi.org/10.48009/2_iis_2006_269-274
MANAGING CRITICAL KNOWLEDGE MANAGEMENT ISSUES IN GLOBAL SOFTWARE DEVELOPMENT PROJECTSChe-Hung Liu,Roman Wong,Yen-Tzu Chen,Hua-Wei Huang
pp. 275-279
https://doi.org/10.48009/2_iis_2006_275-279
KNOWLEDGE WORK AND IT OUTSOURCING: IS SOME WORK RETURNING TO THE UNITED STATES?Arthur McAdams,Winston Tellis
pp. 280-283
https://doi.org/10.48009/2_iis_2006_280-283
INFORMATION TECHNOLOGY OUTSOURCING: A KNOWLEDGE-MANAGEMENT FRAMEWORKMohammed Tafti
pp. 284-288
https://doi.org/10.48009/2_iis_2006_284-288
ON THE PHENOMENON OF INFORMATION DILUTIONMysore Ramaswamy
pp. 289-292
https://doi.org/10.48009/2_iis_2006_289-292
METAPHORS GONE WILD: THE ILLUSIVE MACHINE CYCLEDonald Carpenter,Donna Kizzier
pp. 293-297
https://doi.org/10.48009/2_iis_2006_293-297
INTELLIGENT INFORMATION SYSTEMS, QUO VADIS?Vic Matta,Dusan Sormaz
pp. 298-303
https://doi.org/10.48009/2_iis_2006_298-303
THE VALUE OF CORPORATE INFORMATION AND ALLIED TECHNOLOGIES AS PERCEIVED BY EXECUTIVESAdeyemi Adekoya
pp. 307-311
https://doi.org/10.48009/2_iis_2006_307-311
BLOGS AND BUSINESS: OPPORTUNITIES AND HEADACHESWallace Wood,Robert Behling,Susan Haugen
pp. 312-316
https://doi.org/10.48009/2_iis_2006_312-316
THE DIGITAL DIVIDE: GENDER ISSUES, INITIATIVES AND EMERGING TRENDS IN THE CORPORATE AND ACADEMIC SPHERESDonald Caputo
pp. 317-321
https://doi.org/10.48009/2_iis_2006_317-321
IS UNDERGRADUATE SPAM UNDER CONTROL?Carl Case,Darwin King
pp. 322-326
https://doi.org/10.48009/2_iis_2006_322-326
A LONGITUDINAL STUDY OF THE IMPACT OF E-MAIL AND SPAM IN THE CORPORATE WORLDWallace Wood,Suhong Li
pp. 327-332
https://doi.org/10.48009/2_iis_2006_327-332
INFORMATION SYSTEMS ETHICS IN DEVELOPED & DEVELOPING ECONOMIES: COMPARING BOLIVIA, OMAN, SOUTH KOREA, & THE UNITED STATESThomas Hilton,Adriana Santa Cruz,Se-Hyung Oh,Husain Al-Lawati
pp. 333-338
https://doi.org/10.48009/2_iis_2006_333-338
AN EXPLORATORY INVESTIGATION OF INFORMATION TECHNOLOGY ETHICS FACTORSAlan Peslak
pp. 339-343
https://doi.org/10.48009/2_iis_2006_339-343
TRANSFORMING REMOTE SALES FORCE TRAINING: GUIDELINES FOR INTEGRATING E-LEARNING INTO AN EXISTING REMOTE SALES FORCE TRAINING PROGRAM A CASE STUDYMichael Donohoe,Jeanne Baugh,Daniel Rota
pp. 344-349
https://doi.org/10.48009/2_iis_2006_344-349
EMPLOYEE TRAININGSusan Switzer,Larry Thomas,Richard Featheringham
pp. 350-353
https://doi.org/10.48009/2_iis_2006_350-353
THE EFFECT OF KNOWLEDGE MANAGEMENT CAPABILITY ON THE IC DESIGN INDUSTRY IN TAIWANChu-Yi Hsu,Edward Chen,Kuoching Feng
pp. 354-358
https://doi.org/10.48009/2_iis_2006_354-358
MANAGING INFORMATION INTEGRATION IN TODAY'S BUSINESSHal Records,Nancy Records,Robert Behling
pp. 359-364
https://doi.org/10.48009/2_iis_2006_359-364