International Association for Computer Information Systems
Wednesday, October 20, 2021

Table of Contents - Volume 10, Issue 2



COMPUTER LITERACY AND THE DEVELOPING WORLD: THE BRIDGE TO INFORMATION
Winston Tellis
pp. 1-5
https://doi.org/10.48009/P2009_1147

CHALLENGES WITH IMPLEMENTING DATA WAREHOUSING OFFSHORE IN A FLAT WORLD: ISSUES FOR STUDY
Lisa Nelson
pp. 6-11
https://doi.org/10.48009/P2009_1163

MAKING SENSE OF SIMMONS: UNDERSTANDING AND USING SIMMONS MARKET DATA AND OTHER MARKETING DATABASES
Kara Rawlins
pp. 12-21
https://doi.org/10.48009/P2009_1228

ONLINE SHOPPING PERCEPTIONS OF OFFLINE SHOPPERS
Manouchehr Tabatabaei
pp. 22-26
https://doi.org/10.48009/P2009_1218

COLLABORATION USING CLOUD COMPUTING AND TRADITIONAL SYSTEMS
Barbara White, Jo Brown, Cynthia Deale, Adam Hardin
pp. 27-32
https://doi.org/10.48009/P2009_1243

TOWARDS A FRAMEWORK FOR INFORMATION TECHNOLOGY GOVERNANCE IN PUERTO RICO
Sandra Lind, Mysore Ramaswamy, Eulalia Martinez
pp. 33-39
https://doi.org/10.48009/P2009_1148

A STUDY OF ERP SUCCESS FROM 2003 TO 2006 AS VIEWED BY TOP FINANCIAL EXECUTIVES
Alan Peslak
pp. 40-47
https://doi.org/10.48009/P2009_1151

DATA QUALITY PROBLEMS IN RESPONSIBILITY ACCOUNTING
Richard Calvasina, Eugene Calvasina, Mysore Ramaswamy, Gerald Calvasina
pp. 48-57
https://doi.org/10.48009/P2009_1153

A STUDY ON DESIGN AND DEVELOPMENT OF FXDB SYSTEM FOR SEMANTIC SEARCH
Seong-Yong Hong, Hae-Yeon Choi
pp. 58-65
https://doi.org/10.48009/P2009_1165

THE ROLE OF E-GOVERNMENT IN COMBATING CORRUPTION IN TRANSITION COUNTRIES
Mysore Ramaswamy, Audrey Selian
pp. 66-75
https://doi.org/10.48009/P2009_1167

MANAGERS’ PERSPECTIVES ON EMPLOYEE INFORMATION TECHNOLOGY FRAUD ISSUES WITHIN COMPANIES/ORGANIZATIONS
Susan Behling, Kevin Floyd, Terry Smith, Alex Koohang, Robert Behling
pp. 76-81
https://doi.org/10.48009/P2009_1168

INTERNET SEARCH STATISTICS AS A SOURCE OF BUSINESS INTELLIGENCE: SEARCHES ON FORECLOSURE AS AN ESTIMATE OF ACTUAL HOME FORECLOSURES
G. Webb
pp. 82-87
https://doi.org/10.48009/P2009_1169

A SECURITY VULNERABILITY AUDIT OF FORTUNE 500 E-COMMERCE NETWORK SYSTEMS
Jensen Zhao, Allen Truell, Melody Alexander
pp. 88-94
https://doi.org/10.48009/P2009_1170

THE NEXT GENERATION INTERNET PROTOCOL, IPV6: AN OVERVIEW
Mohamad Ladan
pp. 95-100
https://doi.org/10.48009/P2009_1171

POLYGLOT: A MULTILINGUAL GROUP SUPPORT SYSTEM
Milam Aiken, Mahesh Vanjani
pp. 101-106
https://doi.org/10.48009/P2009_1173

REPLACING TRADITIONAL TELEPHONY WITH VOIP
Collin Jackson, Jack Shorter, Karen Forcht
pp. 107-112
https://doi.org/10.48009/P2009_1175

A THEORETICAL FRAMEWORK FOR UTILIZING DATA WAREHOUSING TO PREDICT INFORMATION SECURITY THREATS
Lee Steen, Philip Kim
pp. 113-120
https://doi.org/10.48009/P2009_1176

ONLINE MENTORING ACCEPTANCE BY WOMEN PROFESSIONALS
Regina Gibson, Lloyd Gibson
pp. 121-127
https://doi.org/10.48009/P2009_1255

SELECTING A FIRST PROGRAMMING LANGUAGE TO TEACH PROSPECTIVE TEACHERS â€" CASE EXAMPLES FROM TWO PROGRAMS
Azad Ali, Frederick Kohun, David Wood
pp. 128-137
https://doi.org/10.48009/P2009_1182

APPLYING AN ENHANCED UNIFIED DATABASE-MANAGEMENT QUALITY EVALUATION TOOL
Paul Kovacs, John Scarpino, Gary Davis, Jeanne Baugh
pp. 138-147
https://doi.org/10.48009/P2009_1184

AN EMPIRICAL METHOD FOR MEASURING THE EFFECTIVENESS OF AN OBJECT-ORIENTED DESIGN PROCESS
Stevan Mrdalj, Vladan Jovanovic, Joseph Scazzero
pp. 148-156
https://doi.org/10.48009/P2009_1187

CRITICAL SUCCESS FACTORS FOR OPEN-SOURCE INNOVATION: THE CASE OF OPEN SOURCE SOFTWARE DEVELOPMENT
Gang Peng
pp. 157-164
https://doi.org/10.48009/P2009_1194

DRAFTING INFORMATIONAL PRIVACY LAWS: INFORMATION SCIENCE PERSPECTIVE
Sabah Al-Fedaghi
pp. 165-174
https://doi.org/10.48009/P2009_1202

DESIGNING AN ASSESSMENT TOOL FOR MEASURING E-READINESS OF IRANIAN ICT COMPANIES
Ali Nabavi, Reggie Davidrajuh
pp. 175-184
https://doi.org/10.48009/P2009_1203

INTRODUCING A CONCENTRATION IN INFORMATION ASSURANCE INTO A COMPUTER SCIENCE PROGRAM
Azad Ali, Waleed Farag
pp. 185-193
https://doi.org/10.48009/P2009_1204

PROCESS MODELS AND DISTRIBUTION OF WORK IN OFFSHORING APPLICATION SOFTWARE DEVELOPMENT
Karl Kurbel
pp. 194-203
https://doi.org/10.48009/P2009_1205

WILL YOU BE MINED? ETHICAL CONSIDERATIONS OF OPT-IN LOYALTY PROGRAMS AND PRICE DISCRIMINATION
Gregory Smith, Michael Rimler
pp. 204-209
https://doi.org/10.48009/P2009_1206

A STUDY OF EXPLORING THE “BIG FIVE” AND TASK TECHNOLOGY FIT IN WEB-BASED DECISION SUPPORT SYSTEMS
Linwu Gu, Jianfeng Wang
pp. 210-217
https://doi.org/10.48009/P2009_1210

THE ADVANTAGES OF VIRTUALIZING A UNIVERSITY COMPUTING INSTRUCTIONAL/RESEARCH DOMAIN
Corey Hemminger, Paul Safonov, Dennis Guster, Joseph Meunier, Christopher Schroeder
pp. 218-225
https://doi.org/10.48009/P2009_1213

RELATIONAL DATA MODELING TO ENHANCE GIS-BASED VISUAL INFORMATION SYSTEMS
Matthew North, Samuel Fee, Jacqueline Bytnar
pp. 226-230
https://doi.org/10.48009/P2009_1216

EFFECTIVE KNOWLEDGE MANAGEMENT USING AN ONTOLOGY-BASED APPROACH
Kamal Gella, J. Regian, Laurie Waisel, Paul Kovacs
pp. 231-236
https://doi.org/10.48009/P2009_1219

PRIVACY UNDER HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT (HIPAA) OF 1996: THE IMPACT OF RFID
William Roach, Gene Wunder
pp. 237-241
https://doi.org/10.48009/P2009_1220

AN EMPIRICAL STUDY OF CYBER SECURITY PERCEPTIONS, AWARENESS AND PRACTICE
Chen Zhang, Janet Prichard
pp. 242-248
https://doi.org/10.48009/P2009_1221

GLOBALIZATION, COLLABORATION, AND SOCIAL NETWORKING: AN EXPLORATORY STUDY
Robert Totterdale
pp. 249-256
https://doi.org/10.48009/P2009_1222

USER MULTI-INTEREST MODELING BASED ON SEMANTIC SIMILAR NETWORK IN PERSONALIZED INFORMATION RETRIEVAL
Zhiheng Qi, Nianbai Fan, Zhenyu Huang
pp. 257-266
https://doi.org/10.48009/P2009_1223

A CRITICAL ANALYSIS OF USING 3-D VIRTUAL WORLD ENVIRONMENTS IN E-COMMERCE STRATEGY
Donald Moscato, Eric Moscato
pp. 267-274
https://doi.org/10.48009/P2009_1224

EXPLORING ETHICAL CODES AND MORAL BEHAVIOR IN TODAY’S CLASSROOM
Robert Skovira, Stanley Schuyler
pp. 275-286
https://doi.org/10.48009/P2009_1230

COMPUTER INFORMATION SYSTEMS AS A CATALYST FOR FRAUD, EXPLOITATION AND ECONOMIC UPHEAVAL IN WORLD FINANCIAL MARKETS
Susan Behling, Hal Records, Dayle Nattress, Robert Behling
pp. 287-292
https://doi.org/10.48009/P2009_1208

USING ENTERPRISE MASHUPS AS A BUSINESS INTELLIGENCE SITUATIONAL APPLICATION
Robert Samuel
pp. 293-298
https://doi.org/10.48009/P2009_1231

PERCEPTIVE PROFILES OF STUDENTS COMPUTER SECURITY & SAFETY COMPETENCIES: IMPLICATION FOR BUSINESS CURRICULUM
Ewuuk Lomo-David
pp. 299-308
https://doi.org/10.48009/P2009_1232

GETTING CONNECTED EVERYWHERE: BROADBAND POWER LINE TECHNOLOGY IN MEXICO
Guillermo Cesar, Joon-Yeoul Oh, Heejoong Yang
pp. 309-315
https://doi.org/10.48009/P2009_1245

THE IMPACT OF COMMUNICATION STRUCTURE ON ISSUE TRACKING EFFICIENCY AT A LARGE BUSINESS SOFTWARE VENDOR
Arne Beckhaus, Dirk Neumann, Lars Karg
pp. 316-323
https://doi.org/10.48009/P2009_1242

SENIORS’ PERCEPTIONS OF THE WEB AND SOCIAL NETWORKING
Thilini Ariyachandra, Elaine Crable, James Brodzinski
pp. 324-332
https://doi.org/10.48009/P2009_1261

DATA WAREHOUSING AND BUSINESS INTELLIGENCE SKILLS FOR INFORMATION SYSTEMS GRADUATES: ANALYSIS BASED ON MARKETPLACE DEMAND
Ashraf Shirani, Malu Roldan
pp. 333-339
https://doi.org/10.48009/P2009_1265

A HYBRID SOFTWARE DEVELOPMENT METHOD FOR LARGE-SCALE PROJECTS: RATIONAL UNIFIED PROCESS WITH SCRUM
Juyun Cho
pp. 340-348
https://doi.org/10.48009/P2009_1267

A THEORETICAL FRAMEWORK FOR GOVERNMENT 2.0 IN DEVELOPING AND EMERGING ECONOMIES
Rhoda Joseph
pp. 349-354
https://doi.org/10.48009/P2009_1272

THE INFORMATION SYSTEMS ANALYST EXAM AS A PROGRAM ASSESSMENT TOOL: PRE-POST TESTS AND COMPARISON TO THE MAJOR FIELD TEST
Donald Carpenter, Morgan Bridge, Johnny Snyder, Gayla Slauson
pp. 355-363
https://doi.org/10.48009/P2009_1273

EXAMINING MEDIATORS OF STRUCTURAL ASSURANCE CONSTRUCTS IN BUSINESS-TO-CONSUMER E-COMMERCE
Wei Sha
pp. 364-371
https://doi.org/10.48009/P2009_1263

COGNITIVE DIFFERENCES IN SERVICE QUALITY BETWEEN E-GOVERNMENT USERS AND ADMINISTRATORS
Su-Houn Liu, Yu-Hsieh Sung, Hsiu-Li Liao, Ching-Min Liu
pp. 372-380
https://doi.org/10.48009/P2009_1276

A CLUSTER ANALYSIS OF WIRELESS WEB SERVICES ADOPTERS
Suhong Li, Richard Glass, Harold Records
pp. 381-389
https://doi.org/10.48009/P2009_1277

HOSPITAL ADMINISTRATORS’ PERCEPTION ON THE ADOPTION OF RFID: EMPIRICAL STUDY INCLUDING PRIVACY/SECURITY
Sun Chun, Dalsang Chung
pp. 390-399
https://doi.org/10.48009/P2009_1279

TOWARD INTELLIGENT BUSINESS INTEGRATION: THE SEMANTIC WEB
James Lee, Surinder Kahai, Yong Kim, Ben Kim
pp. 400-406
https://doi.org/10.48009/P2009_1226

EXPLORING THE NATURE OF SECURITY AWARENESS: A PHILOSOPHICAL PERSPECTIVE
Kamphol Wipawayangkool
pp. 407-414
https://doi.org/10.48009/P2009_1286

E-BUSINESS IMPACTS AND OBSTACLES FROM THE PERSPECTIVE OF EUROSTAT AND STUDENTS
Viktorija Sulcic, Dušan Lesjak
pp. 415-420
https://doi.org/10.48009/P2009_1287

“ROMAN 41, ROGER…WHAT IS YOUR POSITION?”: THE INFOSCAPE OF AIR TRAFFIC CONTROLLERS
Darlene Drazenovich, Robert Skovira
pp. 421-429
https://doi.org/10.48009/P2009_1288

AN EMPIRICAL STUDY OF THE RELATIVE IMPORTANCE OF SPECIFIC TECHNOLOGY SKILLS, GENERAL BUSINESS SKILLS, AND GENERAL TECHNOLOGY SKILLS
Alan Peslak, Gary Davis
pp. 430-438
https://doi.org/10.48009/P2009_1291

CUSTOMER PRIVACY CAN BE COSTLY: THE CASE OF HIPAA
Wallace Wood
pp. 439-443
https://doi.org/10.48009/P2009_1292

WEB IMAGE INFORMATION MINING SYSTEM USING UUP FOR E-BUSINESS INTELLIGENCE
Seong-Yong Hong
pp. 444-450
https://doi.org/10.48009/P2009_1295

SIX SIGMA MEET INFORMATION SYSTEMS
Roger Hayen
pp. 451-458
https://doi.org/10.48009/P2009_1298

STUDENT PERCEPTIONS OF ELECTRONIC TEXTBOOKS
Matthew McGowan, Paul Stephens, Charles West
pp. 459-465
https://doi.org/10.48009/P2009_1299

THE BUSINESS TRADEOFFS WITH THE FINAL â€" FOUR MODELS OF CONVENTIONAL TELEPHONY SYSTEMS
Timothy Kelly
pp. 466-471
https://doi.org/10.48009/P2009_1302

DESIGNING A NEW TOOL FOR MODELING AND SIMULATION OF DISCRETE-EVENT SYSTEMS
Reggie Davidrajuh, Istvan Molnar
pp. 472-477
https://doi.org/10.48009/P2009_1308

AN INVESTIGATION INTO THE TOOLS AND TECHNIQUES WITHIN THE PMBOK (4TH EDITION) THAT SUPPORT TRANSACTIVE MEMORY SYSTEMS
Mark Thorogood
pp. 478-484
https://doi.org/10.48009/P2009_1312

A COMPREHENSIVE RISK-BASED AUDITING FRAMEWORK FOR SMALL- AND MEDIUM- SIZED FINANCIAL INSTITUTIONS
Petter Lovaas
pp. 485-494
https://doi.org/10.48009/P2009_1313

A REVIEW OF INTERNET SHOPPING FACTORS: DO THE TECHNOLOGY ACCEPTANCE MODEL OR THEORY OF REASONED ACTION MODEL APPLY?
Alan Peslak, Neelima Bhatnagar
pp. 495-504
https://doi.org/10.48009/P2009_1315

BLENDING DECISION AND DESIGN SCIENCE WITH INFORMATION SYSTEMS DESIGN AS A MEANS TO OPTIMIZING BUSINESS DECISIONS
Gina Boff, Lisa Kovalchick, Mark Reese
pp. 505-512
https://doi.org/10.48009/P2009_1317

VIRTUALIZATION AND SECURITY: A PERSPECTIVE
James Sena
pp. 513-519
https://doi.org/10.48009/P2009_1319

IDENTITY THEFT RECOVERY: USING EQUITY THEORY TO EXPLORE THE NEED FOR VICTIM ADVOCACY
Paul Visentin, Scott Hunsinger, Dawn Medlin
pp. 520-528
https://doi.org/10.48009/P2009_1320

BUSINESS CONTINUITY AND DISASTER RECOVERY PLANNING
Jesse Patterson, Richard Aukerman, Jack Shorter
pp. 529-535
https://doi.org/10.48009/P2009_1321

PROTOTYPING FOR THE HOLY GRAIL OF RFID: RETURN ON INVESTMENTS
Vic Matta, Kevin Berisso, Tod Brokaw
pp. 536-543
https://doi.org/10.48009/P2009_1324

A STUDENT PROGRAM RECOMMENDATION SYSTEM PROTOTYPE
Queen Booker
pp. 544-551
https://doi.org/10.48009/P2009_1328

IS RISK ANALYSIS: A CHAOS THEORETIC PERSPECTIVE
Sumana Sharma, Gurpreet Dhillon
pp. 552-560
https://doi.org/10.48009/P2009_1330

CHINESE AMERICAN ONLINE BANKING: MULTICULTURAL ACCEPTANCE OF INFORMATION TECHNOLOGY
Lloyd Gibson, Regina Gibson
pp. 561-570
https://doi.org/10.48009/P2009_1251

THE IMPACT OF THE BALANCED SCORECARD ON GOVERNMENT-TO-GOVERNMENT E-SERVICE DELIVERY
Assion Lawson-Body, Lori Willoughby
pp. 571-584
https://doi.org/10.48009/P2009_1190

WIRELESS (IN)SECURITY: AN OVERVIEW IN THE HEALTHCARE INDUSTRY
L. Yin, Daniel Norris
pp. 585-591
https://doi.org/10.48009/P2009_1271

AN INVESTIGATION OF CULTURAL INTELLIGENCE AS AN ANTECEDENT TO VIRTUAL SOFTWARE DEVELOPMENT TEAM SUCCESS
Paul Ambrose, John Chenoweth, En Mao
pp. 592-597
https://doi.org/10.48009/P2009_1280

COMPUTER ETHICS: GENDER EFFECTS AND EMPLOYEE INTERNET MISUSE
Kimberly Young, Carl Case
pp. 598-603
https://doi.org/10.48009/P2009_1155

SPREADSHEET PROGRAM USAGE FOR TEN JOB TASKS IN ORGANIZATIONS â€"AN EMPIRICAL INVESTIGATION
Joseph Mollick
pp. 604-613
https://doi.org/10.48009/P2009_1331

APPROPRIATE PENALTIES FOR ACADEMIC DISHONESTY AS PERCEIVED BY STUDENTS IN AN INFORMATION SYSTEMS CLASS: AN ANALYSIS BY CLASS LEVEL
Melody Alexander, Allen Truell, Jensen Zhao
pp. 614-622
https://doi.org/10.48009/P2009_1258

EXAMINING THE UNDERPINNINGS OF ORGANIZATIONAL CULTURE AND ORGANIZATIONAL SYSTEMS: A LITERATURE REVIEW
Marguerite Barta
pp. 623-639
https://doi.org/10.48009/P2009_1191

CYBERSTALKING: AN EXPLORATORY STUDY OF STUDENTS AT A MID-ATLANTIC UNIVERSITY
Karen Paullet, Daniel Rota, Thomas Swan
pp. 640-649
https://doi.org/10.48009/P2009_1212

AN INFORMATION SECURITY MANAGEMENT SYSTEM MODEL FOR SMALL AND MEDIUM-SIZED FINANCIAL INSTITUTIONS
Kevin Streff
pp. 650-659
https://doi.org/10.48009/P2009_1285