Table of Contents -
Volume 9, Issue 2
SALARY COMPARISON STUDY OF SAP VS. NON-SAP BUSINESS GRADUATESFrank Andera,Amanda Dittmer,Katherine Soave
pp. 1-7
https://doi.org/10.48009/2_iis_2008_1-7
A VULNERABILITY AUDIT OF THE U.S. STATE E-GOVERNMENT NETWORK SYSTEMSJensen Zhao,Allen Truell,Melody Alexander,Rod Davis
pp. 8-13
https://doi.org/10.48009/2_iis_2008_8-13
OUTSOURCING: DATA SECURITY AND PRIVACY ISSUES IN INDIANipul Patel,Susan Conners
pp. 14-20
https://doi.org/10.48009/2_iis_2008_14-20
THE CHALLENGE OF SUPPORTABLE OPEN SOURCE SOFTWARE: IS IT REALLY OPEN?Arthur McAdams,Winston Tellis
pp. 21-24
https://doi.org/10.48009/2_iis_2008_21-24
A QUALITATIVE STUDY OF CUSTOMER SATISFACTION FROM AN ELECTRONIC COMMERCE PERSPECTIVELaurence Mukankusi,Fred Celimene,Louicius Michel,Assion Lawson-Body
pp. 25-36
https://doi.org/10.48009/2_iis_2008_25-36
AN EXAMINATION OF DECISION CONFIDENCE AND ILLUSION OF CONTROL IN A GROUP SETTINGSathasivam Mathiyalakan
pp. 37-45
https://doi.org/10.48009/2_iis_2008_37-45
A CONCEPTION OF THE E-BUSINESS RECEPTION MODEL (EBRM)Zbigniew Pastuszak
pp. 46-55
https://doi.org/10.48009/2_iis_2008_46-55
SOCIAL PRESENCE, PERSONALITY TYPES, AND IT-SUPPORTED TEACHING METHODSKamal Hingorani
pp. 56-62
https://doi.org/10.48009/2_iis_2008_56-62
A TECHNIQUE FOR PEER AND GROUP MEMBER EVALUATIONS OF TEAMWORK IN THE UNDERGRADUATE CLASSROOMRanida Harris,Kenneth Harris,Kara Vaught
pp. 63-71
https://doi.org/10.48009/2_iis_2008_63-71
SUPPLY CHAIN MANAGEMENT SOFTWARE SYSTEMS INTEGRATION AND VERSION UPGRADES: VENDOR AND CUSTOMER BASED FRAMEWORKGanesh Vaidyanathan,Asghar Sabbaghi,Yan Fu
pp. 72-79
https://doi.org/10.48009/2_iis_2008_72-79
EXECUTIVE INFORMATION FOR STRATEGIC DECISION MAKINGEugene Calvasina,Mysore Ramaswamy,Richard Calvasina,Gerald Calvasina
pp. 80-86
https://doi.org/10.48009/2_iis_2008_80-86
SOCIAL NETWORKING WEBSITES IN INDIA AND THE UNITED STATES: A CROSS-NATIONAL COMPARISON OF ONLINE PRIVACY AND COMMUNICATIONBryan Marshall,Peter Cardon,Daniel Norris,Natalya Goreva,Ryan D'Souza
pp. 87-94
https://doi.org/10.48009/2_iis_2008_87-94
MEASURING STUDENTS PERCEPTIONS OF BLACKBOARD USING THE TECHNOLOGY ACCEPTANCE MODEL: A PLS APPROACHLeila Halawi,Richard McCarthy
pp. 95-102
https://doi.org/10.48009/2_iis_2008_95-102
NATIONAL CULTURE AND TECHNOLOGY ACCEPTANCE: THE IMPACT OF UNCERTAINTY AVOIDANCEPeter Cardon,Bryan Marshall
pp. 103-110
https://doi.org/10.48009/2_iis_2008_103-110
USING GOOGLE KEYWORD STATISTICS TO EXPLAIN CHANGES IN TRAFFIC TO INTERNET SITES RELATED TO GLOBAL ENVIRONMENTAL MANAGEMENTG. Webb
pp. 111-116
https://doi.org/10.48009/2_iis_2008_111-116
A NOVEL APPROACH FOR IDENTIFYING ENTITY TYPES FOR CONCEPTUAL DATA MODELING IN DEVELOPING DATA-INTENSIVE WEB APPLICATIONSSeung Lee
pp. 117-122
https://doi.org/10.48009/2_iis_2008_117-122
A FRAMEWORK FOR A GREEN PRODUCT LIFECYCLE MANAGEMENT SYSTEMAmy Trappey,Fataneh Taghaboni-Dutta,Charles Trappey
pp. 123-131
https://doi.org/10.48009/2_iis_2008_123-131
ENCHANCING THE USE OF BIDSS/CI SYSTEMS: A PROPOSED FRAMEWORKMonica Holmes,Roger Hayen,Jie Zeng
pp. 132-138
https://doi.org/10.48009/2_iis_2008_132-138
DOMAIN NAME DISPUTES: TECHNOLOGY OUTPACES THE LEGAL SYSTEMSam Ramanujan,Someswar Kesh,Steve Ewens
pp. 139-145
https://doi.org/10.48009/2_iis_2008_139-145
AN ANALYSIS OF A SOFTWARE QUALITY ASSURANCE TOOL'S IMPLEMENTATION: A CASE STUDYJohn Scarpino,Paul Kovacs
pp. 146-152
https://doi.org/10.48009/2_iis_2008_146-152
BENCHMARK NEW PRODUCT DEVELOPMENT PROCESSES USING DEA-BASED MODULARIZED APPROACHTzu-An Chiang,Amy Trappey,Wen-Chih Chen
pp. 153-162
https://doi.org/10.48009/2_iis_2008_153-162
A CLUSTER ANALYSIS OF CAMPUS PORTAL IMPLEMENTATIONSuhong Li,Wallace Wood
pp. 163-170
https://doi.org/10.48009/2_iis_2008_163-170
AN ETHNOGRAPHIC STUDY COMPARING RESTRICTED AND OPEN ENGINEERING LABS FOR INFORMATION CONTROLLee Steen,Robert Skovira
pp. 171-181
https://doi.org/10.48009/2_iis_2008_171-181
CARRIER SERVICE INFRASTRUCTURES: ESSENTIAL COST ELEMENTS FOR GLOBAL E-COMMERCETimothy Kelly
pp. 182-187
https://doi.org/10.48009/2_iis_2008_182-187
ISSUES AND CHALLENGES OF AGILE SOFTWARE DEVELOPMENT WITH SCRUMJuyun Cho
pp. 188-195
https://doi.org/10.48009/2_iis_2008_188-195
USING THE TASK TECHNOLOGY FIT MODEL AS A DIAGNOSTIC TOOL FOR ELECTRONIC MEDICAL RECORDS SYSTEMS EVALUATIONCarol Kilmon,Mary Fagan,Vivek Pandey,Thomas Belt
pp. 196-204
https://doi.org/10.48009/2_iis_2008_196-204
TECHNOLOGY AND CULTURE: FIVE ORTHODOXIESAj Grant,Robert Skovira
pp. 205-210
https://doi.org/10.48009/2_iis_2008_205-210
AMPLIFYING TEAMWORK ISSUES THROUGH THE USE OF SITUATIONAL VIGNETTESJames Cappel
pp. 211-218
https://doi.org/10.48009/2_iis_2008_211-218
INFORMATION AGE ORGANIZATION: MOVING FROM INFORMATION TO KNOWLEDGE TO LONG-TERM SUCCESSHonora Rockar
pp. 219-226
https://doi.org/10.48009/2_iis_2008_219-226
CORPORATE SOCIAL NETWORKINGJames Sena,Mark Sena
pp. 227-231
https://doi.org/10.48009/2_iis_2008_227-231
CICERO COLORING SCHEMA FOR DATA MODELINGVladan Jovanovic,Lily Cupic
pp. 232-237
https://doi.org/10.48009/2_iis_2008_232-237
A SYMBOL SET FOR DIAGRAMMING NETWORKSVladan Jovanovic,Eric Stone
pp. 238-242
https://doi.org/10.48009/2_iis_2008_238-242
ASSESSING STUDENTS' PERCEPTIONS OF PROJECT MANAGEMENT BEFORE AND AFTER COMPLETION OF A PROJECT MANAGEMENT COURSEThomas Case,Manouchehr Tabatabaei
pp. 243-251
https://doi.org/10.48009/2_iis_2008_243-251
INFORMATION THE TRANSFORMATION OF PUBLIC ADMINISTRATIONS: THE CASE OF E-HOUSEKEEPER IN TAIWANSu-Houn Liu,Tsang-Yao Chen,Hsiu-Li Liao
pp. 251-257
https://doi.org/10.48009/2_iis_2008_251-257
UTILIZING NEURAL NETWORKS TO ASSESS COMMUNITY-LEVEL VULNERABILITY TO THE METHAMPHETAMINE EPIDEMICCretson Dalmadge,Monica Cain
pp. 258-266
https://doi.org/10.48009/2_iis_2008_258-266
AN EMPIRICAL EXPLORATION OF SOFTWARE DEVELOPMENT QUALITYHarry Benham
pp. 267-271
https://doi.org/10.48009/2_iis_2008_267-271
PERCEPTION AND REALITY: AN INTROSPECTIVE STUDY ON SUPPLY CHAIN INFORMATION SECURITY RISKGregory Smith,Kevin Watson,Wade Baker
pp. 272-278
https://doi.org/10.48009/2_iis_2008_272-278
A FRAMEWORK FOR A WEBSITE SNAPSHOT MANAGEMENT SYSTEMDavid Chao,Sam Gill
pp. 279-285
https://doi.org/10.48009/2_iis_2008_279-285
UNINTENDED BENEFITS OF INFORMAL LEARNING ON THE PREPARATION OF STUDENTS FOR ADVANCED DEGREE PROGRAMSM.A. Reese,G.M. Boff
pp. 286-293
https://doi.org/10.48009/2_iis_2008_286-293
TOPIC INFLUENCES ON ELECTRONIC MEETING RELEVANT COMMENTSMilam Aiken,Linwu Gu,Jianfeng Wang,Mahesh Vanjani
pp. 300-304
https://doi.org/10.48009/2_iis_2008_300-304
IMPROVING END-USER DATABASE DEVELOPMENT QUALITY: A 5C DATA MODELING METHODHsiang-Jui Kung,Hui-Lien Tung,Adrian Gardiner
pp. 305-312
https://doi.org/10.48009/2_iis_2008_305-312
ASSESSING WEB SERVICE QUALITY DIMENSIONS: THE E-SERVPERF APPROACHGodwin Udo,Kallol Bagchi,Peeter Kirs
pp. 313-322
https://doi.org/10.48009/2_iis_2008_313-322
CREATING CUSTOMIZED DATABASE VIEWS WITH USER-DEFINED NON-CONSISTENCY REQUIREMENTSDavid Chao,Robert Nickerson
pp. 323-329
https://doi.org/10.48009/2_iis_2008_323-329
ENTERPRISE CONTENT MANAGEMENT: A USABILITY STUDYRobert Totterdale
pp. 330-336
https://doi.org/10.48009/2_iis_2008_330-336
THE IMPACT OF BANNER AD STYLES ON INTERACTION AND CLICK-THROUGH RATESAdam Sigel,Gerald Braun,Mark Sena
pp. 337-342
https://doi.org/10.48009/2_iis_2008_337-342
GROUP WISDOM SUPPORT SYSTEMS: AGGREGATING THE INSIGHTS OF MANY THROUGH INFORMATION TECHNOLOGYChristian Wagner,Andrea Back
pp. 343-350
https://doi.org/10.48009/2_iis_2008_343-350
A MODELING TECHNIQUE FOR BPR BASED ON EXTENDED PETRI NETTang Zhi-Wei,Zong Dai
pp. 351-360
https://doi.org/10.48009/2_iis_2008_351-360
E-SOCIAL BEHAVIOR: ARE ACADEMIC CLASS AND IDENTITY THEFT FACTORS?Carl Case,Darwin King,Michael Kasperski,Ann Lehman
pp. 361-368
https://doi.org/10.48009/2_iis_2008_361-368
ANALYZING POWER AS INFORMATION IN ORGANIZATIONS: THINKING ABOUT HOW TO DO IT!Robert Skovira
pp. 369-377
https://doi.org/10.48009/2_iis_2008_369-377
ISSUES IN NETWORK ANALYSIS AND DESIGN: A CRITICAL EXAMINATIONSomeswar Kesh,Sam Ramanujan
pp. 378-384
https://doi.org/10.48009/2_iis_2008_378-384
REAL SECURITY IN VIRTUAL SYSTEMS: A PROPOSED MODEL FOR A COMPREHENSIVE APPROACH TO SECURING VIRTUALIZED ENVIRONMENTSManal Yunis,Jerald Hughes,Joseph Roge`
pp. 385-395
https://doi.org/10.48009/2_iis_2008_385-395
EXAMINING HEALTHCARE PROFESSIONALS' ACCEPTANCE OF ELECTRONIC MEDICAL RECORDS USING UTAUTMatthew Wills,Omar El-Gayar,Dorine Bennett
pp. 396-401
https://doi.org/10.48009/2_iis_2008_396-401
INFORMATION TECHNOLOGY AND BUSINESS PROCESS OUTSOURCING TO INDIA: IMPLICATIONS AND CHALLENGESKamal Hingorani
pp. 402-411
https://doi.org/10.48009/2_iis_2008_402-411
A COMPARISON OF STUDENT USE AND UNDERSTANDING OF TEXT MESSAGING SHORTHAND AT TWO UNIVERSITIESBetty Kleen,Lynn Heinrichs
pp. 412-420
https://doi.org/10.48009/2_iis_2008_412-420
INFLUENCE OF TRUST PREDICTORS ON DIFFERENT DIMENSIONS OF TRUST IN M-COMMERCESunitha Mogenahalli,Pruthikrai Mahatanankoon,Billy Lim
pp. 421-428
https://doi.org/10.48009/2_iis_2008_421-428
SYNCHRONIZING KNOWLEDGE IN MILITARY DECISION MAKING: A RESEARCH APPROACH FOR EXPLORING THE EFFECTS OF ORGANIZATIONAL CULTURELarry George,Robert Skovira,A. J. Grant,Ann Jabro
pp. 429-438
https://doi.org/10.48009/2_iis_2008_429-438
E-BUSINESS IN SLOVENIAN SMESViktorija Sulcic,Dusan Lesjak
pp. 439-444
https://doi.org/10.48009/2_iis_2008_439-444
EXAMINING THE EFFECTIVENESS OF VIRTUAL COMMUNITIES OF PRACTICE: A RESEARCH FRAMEWORKSean McGann,Hala Annabi
pp. 445-451
https://doi.org/10.48009/2_iis_2008_445-451
ASSESSING THE READABILTIY OF FREEWARE END-USER LICENSING AGREEMENTSJanet Prichard,Michael Hayden
pp. 452-459
https://doi.org/10.48009/2_iis_2008_452-459
AN EMPIRICAL STUDY OF UNIVERSITY WEBSITESMarzie Astani,Mohamed Elhindi
pp. 460-465
https://doi.org/10.48009/2_iis_2008_460-465
PRIVATE SECTOR VERSUS PUBLIC SECTOR RESEARCH ON SOFTWARE PROJECT MANAGEMENT: AN EXPLORATORY STUDYKevin Elder,Michael Garman
pp. 466-475
https://doi.org/10.48009/2_iis_2008_466-475
(AN INVESTIGATION INTO WHETHER) THE AD-HOC NATURE OF PROJECT ENVIRONMENTS INCREASES THE NEED FOR STRONG PROJECT LEADERSLambi Hubbard
pp. 476-478
https://doi.org/10.48009/2_iis_2008_476-478
SIX SIGMA INFORMATION SYSTEMS: A PAYROLL APPLICATIONRoger Hayen
pp. 479-488
https://doi.org/10.48009/2_iis_2008_479-488
FROM CONCEPT TO COMPLETION: A DATA WAREHOUSE FOR MEASURING PERFORMANCE WITHIN THE CORPS OF ENGINEERS OPERATIONS AND MAINTENANCE DIVISIONJames Sissom
pp. 489-493
https://doi.org/10.48009/2_iis_2008_489-493
A CROSS-NATIONAL ANALYSIS OF E-GOVERNMENT IMPLEMENTATION: A RESEARCH NOTESaviour Nwachukwu,Syed Khalil,Ashagre Yigletu,Donald Andrews
pp. 494-499
https://doi.org/10.48009/2_iis_2008_494-499
USER SATISFACTION IN DATAWAREHOUSING: AN EMPIRICAL INVESTIGATION OF SALIENT VARIABLESKimberly Merritt
pp. 500-508
https://doi.org/10.48009/2_iis_2008_500-508
GROWING COMPUTER ADOPTION SUPPORTS INFORMATION SYSTEMS IN NONTRADITIONAL SETTINGSJean Adams
pp. 509-517
https://doi.org/10.48009/2_iis_2008_509-517
EFFECT OF MANAGEMENT CHANGE ON R&D/IA AND STOCK RETURN IN IT COMPANIESYun-Chia Yan,Hua-Wei Huang,Hsiao-Wen Huang
pp. 518-522
https://doi.org/10.48009/2_iis_2008_518-522
MOBILE COMPUTING WITH WEB 2.0: CURRENT STATE-OF-THE-ART, ISSUES AND CHALLENGESHiren Nagar,Billy Lim
pp. 523-529
https://doi.org/10.48009/2_iis_2008_523-529
EXAMINING THE USE OF COMPETITIVE INTELLIGENCE IN STAFFING MUNICIPAL POLICE DEPARTMENTS: AN EXPLORATORY STUDYQueen Booker,Fred Kitchens,Carl M. Rebman
pp. 530-537
https://doi.org/10.48009/2_iis_2008_530-537
USING UML FOR OBJECT-RELATIONAL DATABASE SYSTEMS DEVELOPMENT: A FRAMEWORKMing Wang
pp. 538-543
https://doi.org/10.48009/2_iis_2008_538-543
AN ANALYSIS OF DISTRIBUTED DATABASE INDEXING METHOD IN REGARD TO PERFORMANCE OF EXTRACT/TRANSFORM/LOAD (ETL) PROCESSESDennis Guster,Paul Safonov,Christopher Brown,Brittany Jansen
pp. 544-550
https://doi.org/10.48009/2_iis_2008_544-550
X-WINDOWS, GUI PROGRAMMING, AND MICROSOFT WINDOWSHerbert Carew,Meledath Damodaran
pp. 551-559
https://doi.org/10.48009/2_iis_2008_551-559
FRAMEWORK OF MEETING SCHEDULING IN COMPUTER SYSTEMSGoran Martinovic
pp. 560-569
https://doi.org/10.48009/2_iis_2008_560-569
HOW DO CONCERNS ABOUT ORGANIZATIONAL FAIRNESS AND PROFILING AFFECT INDIVIDUALS' FEELING OF ALIENATION?Joseph Mollick
pp. 570-577
https://doi.org/10.48009/2_iis_2008_570-577
ERP SYSTEMS AND INTERNAL AUDITAditya Saharia,Bruce Koch,Robert Tucker
pp. 578-586
https://doi.org/10.48009/2_iis_2008_578-586
USE OF MOBILE AGENTS IN A FEDERATED IDENTITY STRUCTUREFarah Layouni,Yann Pollet
pp. 587-593
https://doi.org/10.48009/2_iis_2008_587-593
FROM ADOPTION TO ACTION: MAPPING TECHNOLOGY ADOPTION CONSTRUCTS FOR THE SMALL TO MEDIUM ENTERPRISE INNOVATION SUCCESSDaniel Norris,Roger Yin
pp. 594-606
https://doi.org/10.48009/2_iis_2008_594-606
CURRENT PRACTICES IN ELECTRONIC COMMUNICATION MANAGEMENTRichard Glass,Nancy Records,Hal Records,Robert Behling
pp. 607-612
https://doi.org/10.48009/2_iis_2008_607-612
THE RELATIONSHIP OF E-COMMERCE READINESS TO TECHNOLOGY ACCEPTANCE: THE CASE OF BARBADOSJude Edwards,Leila Halawi,Richard McCarthy
pp. 613-621
https://doi.org/10.48009/2_iis_2008_613-621
AN EMPIRICAL STUDY OF INSTANT MESSAGING BEHAVIOR BASED ON THE TECHNOLOGY ASSESSMENT MODEL (TAM)Alan Peslak
pp. 622-627
https://doi.org/10.48009/2_iis_2008_622-627
AN AGENT BASED SIMULATION MODEL TO LOCATING SELLERS USING GEOGRAPHIC INFORMATION SYSTEMSAli Pouyan,Ali Bazghandi
pp. 628-633
https://doi.org/10.48009/2_iis_2008_628-633
SECURITY OF PERSONAL IDENTIFIABLE INFORMATIONJack Shorter,Karen Forcht,Alicia Aldridge,Daphyne Thomas
pp. 634-638
https://doi.org/10.48009/2_iis_2008_634-638
THE WORLD OF DROP-SHIP ETAILING: EFFECTIVE WAY TO USE E-BAYJack Shorter,Karen Forcht,Alicia Aldridge,Susan Kruck
pp. 639-644
https://doi.org/10.48009/2_iis_2008_639-644