Table of Contents -
Volume 10, Issue 2
COMPUTER LITERACY AND THE DEVELOPING WORLD: THE BRIDGE TO INFORMATIONWinston Tellis
pp. 1-5
CHALLENGES WITH IMPLEMENTING DATA WAREHOUSING OFFSHORE IN A FLAT WORLD: ISSUES FOR STUDYLisa Nelson
pp. 6-11
MAKING SENSE OF SIMMONS: UNDERSTANDING AND USING SIMMONS MARKET DATA AND OTHER MARKETING DATABASESKara Rawlins
pp. 12-21
ONLINE SHOPPING PERCEPTIONS OF OFFLINE SHOPPERSManouchehr Tabatabaei
pp. 22-26
COLLABORATION USING CLOUD COMPUTING AND TRADITIONAL SYSTEMSBarbara White, Jo Brown, Cynthia Deale, Adam Hardin
pp. 27-32
TOWARDS A FRAMEWORK FOR INFORMATION TECHNOLOGY GOVERNANCE IN PUERTO RICOSandra Lind, Mysore Ramaswamy, Eulalia Martinez
pp. 33-39
A STUDY OF ERP SUCCESS FROM 2003 TO 2006 AS VIEWED BY TOP FINANCIAL EXECUTIVESAlan Peslak
pp. 40-47
DATA QUALITY PROBLEMS IN RESPONSIBILITY ACCOUNTINGRichard Calvasina, Eugene Calvasina, Mysore Ramaswamy, Gerald Calvasina
pp. 48-57
A STUDY ON DESIGN AND DEVELOPMENT OF FXDB SYSTEM FOR SEMANTIC SEARCHSeong-Yong Hong, Hae-Yeon Choi
pp. 58-65
THE ROLE OF E-GOVERNMENT IN COMBATING CORRUPTION IN TRANSITION COUNTRIESMysore Ramaswamy, Audrey Selian
pp. 66-75
MANAGERSâ PERSPECTIVES ON EMPLOYEE INFORMATION TECHNOLOGY FRAUD ISSUES WITHIN COMPANIES/ORGANIZATIONSSusan Behling, Kevin Floyd, Terry Smith, Alex Koohang, Robert Behling
pp. 76-81
INTERNET SEARCH STATISTICS AS A SOURCE OF BUSINESS INTELLIGENCE: SEARCHES ON FORECLOSURE AS AN ESTIMATE OF ACTUAL HOME FORECLOSURESG. Webb
pp. 82-87
A SECURITY VULNERABILITY AUDIT OF FORTUNE 500 E-COMMERCE NETWORK SYSTEMSJensen Zhao, Allen Truell, Melody Alexander
pp. 88-94
THE NEXT GENERATION INTERNET PROTOCOL, IPV6: AN OVERVIEWMohamad Ladan
pp. 95-100
POLYGLOT: A MULTILINGUAL GROUP SUPPORT SYSTEMMilam Aiken, Mahesh Vanjani
pp. 101-106
REPLACING TRADITIONAL TELEPHONY WITH VOIPCollin Jackson, Jack Shorter, Karen Forcht
pp. 107-112
A THEORETICAL FRAMEWORK FOR UTILIZING DATA WAREHOUSING TO PREDICT INFORMATION SECURITY THREATSLee Steen, Philip Kim
pp. 113-120
ONLINE MENTORING ACCEPTANCE BY WOMEN PROFESSIONALSRegina Gibson, Lloyd Gibson
pp. 121-127
SELECTING A FIRST PROGRAMMING LANGUAGE TO TEACH PROSPECTIVE TEACHERS â" CASE EXAMPLES FROM TWO PROGRAMSAzad Ali, Frederick Kohun, David Wood
pp. 128-137
APPLYING AN ENHANCED UNIFIED DATABASE-MANAGEMENT QUALITY EVALUATION TOOLPaul Kovacs, John Scarpino, Gary Davis, Jeanne Baugh
pp. 138-147
AN EMPIRICAL METHOD FOR MEASURING THE EFFECTIVENESS OF AN OBJECT-ORIENTED DESIGN PROCESSStevan Mrdalj, Vladan Jovanovic, Joseph Scazzero
pp. 148-156
CRITICAL SUCCESS FACTORS FOR OPEN-SOURCE INNOVATION: THE CASE OF OPEN SOURCE SOFTWARE DEVELOPMENTGang Peng
pp. 157-164
DRAFTING INFORMATIONAL PRIVACY LAWS: INFORMATION SCIENCE PERSPECTIVESabah Al-Fedaghi
pp. 165-174
DESIGNING AN ASSESSMENT TOOL FOR MEASURING E-READINESS OF IRANIAN ICT COMPANIESAli Nabavi, Reggie Davidrajuh
pp. 175-184
INTRODUCING A CONCENTRATION IN INFORMATION ASSURANCE INTO A COMPUTER SCIENCE PROGRAMAzad Ali, Waleed Farag
pp. 185-193
PROCESS MODELS AND DISTRIBUTION OF WORK IN OFFSHORING APPLICATION SOFTWARE DEVELOPMENTKarl Kurbel
pp. 194-203
WILL YOU BE MINED? ETHICAL CONSIDERATIONS OF OPT-IN LOYALTY PROGRAMS AND PRICE DISCRIMINATIONGregory Smith, Michael Rimler
pp. 204-209
A STUDY OF EXPLORING THE âBIG FIVEâ AND TASK TECHNOLOGY FIT IN WEB-BASED DECISION SUPPORT SYSTEMSLinwu Gu, Jianfeng Wang
pp. 210-217
THE ADVANTAGES OF VIRTUALIZING A UNIVERSITY COMPUTING INSTRUCTIONAL/RESEARCH DOMAINCorey Hemminger, Paul Safonov, Dennis Guster, Joseph Meunier, Christopher Schroeder
pp. 218-225
RELATIONAL DATA MODELING TO ENHANCE GIS-BASED VISUAL INFORMATION SYSTEMSMatthew North, Samuel Fee, Jacqueline Bytnar
pp. 226-230
EFFECTIVE KNOWLEDGE MANAGEMENT USING AN ONTOLOGY-BASED APPROACHKamal Gella, J. Regian, Laurie Waisel, Paul Kovacs
pp. 231-236
PRIVACY UNDER HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT (HIPAA) OF 1996: THE IMPACT OF RFIDWilliam Roach, Gene Wunder
pp. 237-241
AN EMPIRICAL STUDY OF CYBER SECURITY PERCEPTIONS, AWARENESS AND PRACTICEChen Zhang, Janet Prichard
pp. 242-248
GLOBALIZATION, COLLABORATION, AND SOCIAL NETWORKING: AN EXPLORATORY STUDYRobert Totterdale
pp. 249-256
USER MULTI-INTEREST MODELING BASED ON SEMANTIC SIMILAR NETWORK IN PERSONALIZED INFORMATION RETRIEVALZhiheng Qi, Nianbai Fan, Zhenyu Huang
pp. 257-266
A CRITICAL ANALYSIS OF USING 3-D VIRTUAL WORLD ENVIRONMENTS IN E-COMMERCE STRATEGYDonald Moscato, Eric Moscato
pp. 267-274
EXPLORING ETHICAL CODES AND MORAL BEHAVIOR IN TODAYâS CLASSROOMRobert Skovira, Stanley Schuyler
pp. 275-286
COMPUTER INFORMATION SYSTEMS AS A CATALYST FOR FRAUD, EXPLOITATION AND ECONOMIC UPHEAVAL IN WORLD FINANCIAL MARKETSSusan Behling, Hal Records, Dayle Nattress, Robert Behling
pp. 287-292
USING ENTERPRISE MASHUPS AS A BUSINESS INTELLIGENCE SITUATIONAL APPLICATIONRobert Samuel
pp. 293-298
PERCEPTIVE PROFILES OF STUDENTS COMPUTER SECURITY & SAFETY COMPETENCIES: IMPLICATION FOR BUSINESS CURRICULUMEwuuk Lomo-David
pp. 299-308
GETTING CONNECTED EVERYWHERE: BROADBAND POWER LINE TECHNOLOGY IN MEXICOGuillermo Cesar, Joon-Yeoul Oh, Heejoong Yang
pp. 309-315
THE IMPACT OF COMMUNICATION STRUCTURE ON ISSUE TRACKING EFFICIENCY AT A LARGE BUSINESS SOFTWARE VENDORArne Beckhaus, Dirk Neumann, Lars Karg
pp. 316-323
SENIORSâ PERCEPTIONS OF THE WEB AND SOCIAL NETWORKINGThilini Ariyachandra, Elaine Crable, James Brodzinski
pp. 324-332
DATA WAREHOUSING AND BUSINESS INTELLIGENCE SKILLS FOR INFORMATION SYSTEMS GRADUATES: ANALYSIS BASED ON MARKETPLACE DEMANDAshraf Shirani, Malu Roldan
pp. 333-339
A HYBRID SOFTWARE DEVELOPMENT METHOD FOR LARGE-SCALE PROJECTS: RATIONAL UNIFIED PROCESS WITH SCRUMJuyun Cho
pp. 340-348
A THEORETICAL FRAMEWORK FOR GOVERNMENT 2.0 IN DEVELOPING AND EMERGING ECONOMIESRhoda Joseph
pp. 349-354
THE INFORMATION SYSTEMS ANALYST EXAM AS A PROGRAM ASSESSMENT TOOL: PRE-POST TESTS AND COMPARISON TO THE MAJOR FIELD TESTDonald Carpenter, Morgan Bridge, Johnny Snyder, Gayla Slauson
pp. 355-363
EXAMINING MEDIATORS OF STRUCTURAL ASSURANCE CONSTRUCTS IN BUSINESS-TO-CONSUMER E-COMMERCEWei Sha
pp. 364-371
COGNITIVE DIFFERENCES IN SERVICE QUALITY BETWEEN E-GOVERNMENT USERS AND ADMINISTRATORSSu-Houn Liu, Yu-Hsieh Sung, Hsiu-Li Liao, Ching-Min Liu
pp. 372-380
A CLUSTER ANALYSIS OF WIRELESS WEB SERVICES ADOPTERSSuhong Li, Richard Glass, Harold Records
pp. 381-389
HOSPITAL ADMINISTRATORSâ PERCEPTION ON THE ADOPTION OF RFID: EMPIRICAL STUDY INCLUDING PRIVACY/SECURITYSun Chun, Dalsang Chung
pp. 390-399
TOWARD INTELLIGENT BUSINESS INTEGRATION: THE SEMANTIC WEBJames Lee, Surinder Kahai, Yong Kim, Ben Kim
pp. 400-406
EXPLORING THE NATURE OF SECURITY AWARENESS: A PHILOSOPHICAL PERSPECTIVEKamphol Wipawayangkool
pp. 407-414
E-BUSINESS IMPACTS AND OBSTACLES FROM THE PERSPECTIVE OF EUROSTAT AND STUDENTSViktorija Sulcic, Dušan Lesjak
pp. 415-420
âROMAN 41, ROGERâ¦WHAT IS YOUR POSITION?â: THE INFOSCAPE OF AIR TRAFFIC CONTROLLERSDarlene Drazenovich, Robert Skovira
pp. 421-429
AN EMPIRICAL STUDY OF THE RELATIVE IMPORTANCE OF SPECIFIC TECHNOLOGY SKILLS, GENERAL BUSINESS SKILLS, AND GENERAL TECHNOLOGY SKILLSAlan Peslak, Gary Davis
pp. 430-438
CUSTOMER PRIVACY CAN BE COSTLY: THE CASE OF HIPAAWallace Wood
pp. 439-443
WEB IMAGE INFORMATION MINING SYSTEM USING UUP FOR E-BUSINESS INTELLIGENCESeong-Yong Hong
pp. 444-450
SIX SIGMA MEET INFORMATION SYSTEMSRoger Hayen
pp. 451-458
STUDENT PERCEPTIONS OF ELECTRONIC TEXTBOOKSMatthew McGowan, Paul Stephens, Charles West
pp. 459-465
THE BUSINESS TRADEOFFS WITH THE FINAL â" FOUR MODELS OF CONVENTIONAL TELEPHONY SYSTEMSTimothy Kelly
pp. 466-471
DESIGNING A NEW TOOL FOR MODELING AND SIMULATION OF DISCRETE-EVENT SYSTEMSReggie Davidrajuh, Istvan Molnar
pp. 472-477
AN INVESTIGATION INTO THE TOOLS AND TECHNIQUES WITHIN THE PMBOK (4TH EDITION) THAT SUPPORT TRANSACTIVE MEMORY SYSTEMSMark Thorogood
pp. 478-484
A COMPREHENSIVE RISK-BASED AUDITING FRAMEWORK FOR SMALL- AND MEDIUM- SIZED FINANCIAL INSTITUTIONSPetter Lovaas
pp. 485-494
A REVIEW OF INTERNET SHOPPING FACTORS: DO THE TECHNOLOGY ACCEPTANCE MODEL OR THEORY OF REASONED ACTION MODEL APPLY?Alan Peslak, Neelima Bhatnagar
pp. 495-504
BLENDING DECISION AND DESIGN SCIENCE WITH INFORMATION SYSTEMS DESIGN AS A MEANS TO OPTIMIZING BUSINESS DECISIONSGina Boff, Lisa Kovalchick, Mark Reese
pp. 505-512
VIRTUALIZATION AND SECURITY: A PERSPECTIVEJames Sena
pp. 513-519
IDENTITY THEFT RECOVERY: USING EQUITY THEORY TO EXPLORE THE NEED FOR VICTIM ADVOCACYPaul Visentin, Scott Hunsinger, Dawn Medlin
pp. 520-528
BUSINESS CONTINUITY AND DISASTER RECOVERY PLANNINGJesse Patterson, Richard Aukerman, Jack Shorter
pp. 529-535
PROTOTYPING FOR THE HOLY GRAIL OF RFID: RETURN ON INVESTMENTSVic Matta, Kevin Berisso, Tod Brokaw
pp. 536-543
A STUDENT PROGRAM RECOMMENDATION SYSTEM PROTOTYPEQueen Booker
pp. 544-551
IS RISK ANALYSIS: A CHAOS THEORETIC PERSPECTIVESumana Sharma, Gurpreet Dhillon
pp. 552-560
CHINESE AMERICAN ONLINE BANKING: MULTICULTURAL ACCEPTANCE OF INFORMATION TECHNOLOGYLloyd Gibson, Regina Gibson
pp. 561-570
THE IMPACT OF THE BALANCED SCORECARD ON GOVERNMENT-TO-GOVERNMENT E-SERVICE DELIVERYAssion Lawson-Body, Lori Willoughby
pp. 571-584
WIRELESS (IN)SECURITY: AN OVERVIEW IN THE HEALTHCARE INDUSTRYL. Yin, Daniel Norris
pp. 585-591
AN INVESTIGATION OF CULTURAL INTELLIGENCE AS AN ANTECEDENT TO VIRTUAL SOFTWARE DEVELOPMENT TEAM SUCCESSPaul Ambrose, John Chenoweth, En Mao
pp. 592-597
COMPUTER ETHICS: GENDER EFFECTS AND EMPLOYEE INTERNET MISUSEKimberly Young, Carl Case
pp. 598-603
SPREADSHEET PROGRAM USAGE FOR TEN JOB TASKS IN ORGANIZATIONS â"AN EMPIRICAL INVESTIGATIONJoseph Mollick
pp. 604-613
APPROPRIATE PENALTIES FOR ACADEMIC DISHONESTY AS PERCEIVED BY STUDENTS IN AN INFORMATION SYSTEMS CLASS: AN ANALYSIS BY CLASS LEVELMelody Alexander, Allen Truell, Jensen Zhao
pp. 614-622
EXAMINING THE UNDERPINNINGS OF ORGANIZATIONAL CULTURE AND ORGANIZATIONAL SYSTEMS: A LITERATURE REVIEWMarguerite Barta
pp. 623-639
CYBERSTALKING: AN EXPLORATORY STUDY OF STUDENTS AT A MID-ATLANTIC UNIVERSITYKaren Paullet, Daniel Rota, Thomas Swan
pp. 640-649
AN INFORMATION SECURITY MANAGEMENT SYSTEM MODEL FOR SMALL AND MEDIUM-SIZED FINANCIAL INSTITUTIONSKevin Streff
pp. 650-659