International Association for Computer Information Systems
Wednesday, October 20, 2021

Table of Contents - Volume 11, Issue 1



DEVELOPMENT AND DIFFUSION OF CUSTOMER RELATIONSHIP MANAGEMENT ACROSS DISCIPLINES: FAD OR FASHION?
Maria Barua, Godwin Udo
pp. 1-8
https://doi.org/10.48009/1-8_LV2010_1535

UTILIZING THE TECHNOLOGY ACCEPTANCE MODEL TO ASSESS THE EMPLOYEE ADOPTION OF INFORMATION SYSTEMS SECURITY MEASURES
Cynthia Jones, Richard McCarthy, Leila Halawi, Bahaudin Mujtaba
pp. 9-16
https://doi.org/10.48009/9-16_LV2010_1334

SOFTWARD PIRACY: EXPLORING AWARENESS OF THE LAW AS A DETERMINANT OF SOFTLIFTING ATTITUDE AND INTENTION
Pamela Dupin-Bryant
pp. 17-22
https://doi.org/10.48009/17-22_LV2010_1347

INFORMATION PROCESSING CHALLENGES IN FINANCIAL SUPPLY CHAINS
Richard Calvasina, Mysore Ramaswamy, Eugene Calvasina, Gerald Calvasina
pp. 23-28
https://doi.org/10.48009/23-28_LV2010_1365

THE PROCESS ARCHITECTURE OF INFORMATION SYSTEMS - HIGHER EDUCATION INSTITUTIONS MANAGERIAL TOOL
Srecko Natek, Dusan Lesjak
pp. 29-34
https://doi.org/10.48009/29-34_LV2010_1391

THE EVOLUTION AND IMPLEMENTATION OF GLOBAL ASSURANCE
Garry White
pp. 35-40
https://doi.org/10.48009/35-40_LV2010_1341

A LONGITUDINAL STUDY OF FINANCIAL EXECUTIVES' VIEWS ON INFORMATION SYSTEMS RETURNS AND KEY TECHNOLOGY ISSUES
Alan Peslak
pp. 41-47
https://doi.org/10.48009/41-47_LV2010_1373

TECHNICAL AND USABILITY TESTING OF A MEDICAL INTERACTION WORKGROUP APPLICATION SUPPORT SYSTEM (MIWASS)
James Rodger
pp. 48-54
https://doi.org/10.48009/48-54_LV2010_1418

HPC PORTAL DEVELOPMENT PLATFORM
Chien-Heng Wu
pp. 55-60
https://doi.org/10.48009/55-60_LV2010_1360

SOCIAL AND TECHNOLOGICAL CONCERNS ASSOCIATED WITH THE USAGE OF UBIQUITOUS COMPUTING TECHNOLOGIES
Carsten Rocker
pp. 61-68
https://doi.org/10.48009/61-68_LV2010_1428

USING INFORMATION AND COMMUNICATION TECHNOLOGIES TO RENDER TRANSPARENT GOVERNANCE IN TRANSITION COUNTRIES
Mysore Ramaswamy
pp. 69-76
https://doi.org/10.48009/69-76_LV2010_1452

SOFTWARE DEVELOPMENT AND INTELLECTUAL PROPERTY: WHAT YOU DON'T KNOW CAN HURT YOU
Janet Ford, Barbara White, Lorrie Willey
pp. 77-84
https://doi.org/10.48009/77-84_LV2010_1489

DO YOU WANT ME TO PUBLISH THAT NOW? A LEGAL ANALYSIS OF ONLINE PUBLISHING
Jason Triche, Sam Ramanujan, Someswar Kesh
pp. 85-89
https://doi.org/10.48009/85-89_LV2010_1480

USING OBJECT-RELATIONAL DATABASE TECHNOLOGY TO SOLVE PROBLEMS IN DATABASE DEVELOPMENT
Ming Wang
pp. 90-99
https://doi.org/10.48009/90-99_LV2010_1543

KNOWLEDGE-BASED SUPPLY CHAIN NETWORK: A SIMULATION APPLICATION DESIGN CONFIGURED WITH RADIO FREQUENCY IDENTIFICATION, FREIGHT TRAIN DISPATCH, AND CONTAINER SHIPMENTS
Andrew Chen, William Chen, Christina Chen
pp. 100-110
https://doi.org/10.48009/100-110_LV2010_1437

RFID UBIQUITY AND PRIVACY LOSS CONCERNS AN ANALYSIS OF A PENNSYLVANIA UNIVERSITY
David Douglas, Karen Paullet
pp. 111-118
https://doi.org/10.48009/111-118_LV2010_1419

EXPLORING COMPUTER ETHICS ISSUES IN MALAYSIA
Maslin Masrom, Zuraini Ismail, Rashidah Anuar, Ramlah Hussein, Norshidah Mohamed
pp. 119-128
https://doi.org/10.48009/119-128_LV2010_1431

AUTOMATIC INTERPRETATION OF ENGLISH SPEECH
Milam Aiken, Lakisha Simmons, Shilpa Balan
pp. 129-133
https://doi.org/10.48009/129-133_LV2010_1335

UNDERSTANDING THE BENEFITS OF SOCIAL EXCHANGE IN B2B COMMUNITIES
Lakisha Simmons, Chris Simmons, Anthony Ammeter, Kaushik Ghosh
pp. 134-141
https://doi.org/10.48009/134-141_LV2010_1336

WEB APPLICATION SECURITY TESTING: AN INDUSTRY PERSPECTIVE ON HOW ITS EDUCATION IS PERCEIVED
John Scarpino
pp. 142-153
https://doi.org/10.48009/142-153_LV2010_1339

DOES THE TECHNOLOGY PORTRAYED IN TELEVISION CRIME SHOWS HAVE AN EFFECT ON POTENTIAL JURORS?
Gary Davis, Karen Paullet, Max Houck, Tom Swan
pp. 154-163
https://doi.org/10.48009/154-163_LV2010_1439

STRATEGIES FOR IMPROVING SYSTEMS DEVELOPMENT PROJECT SUCCESS
Christopher Jones, Glen Gray, Anna Gold, David Miller
pp. 164-173
https://doi.org/10.48009/164-173_LV2010_1445

ANALYSIS OF AIRPORT SECURITY BASED ON THE FIVE COMPONENTS OF INFORMATION SYSTEMS
Juyun Cho, Tom Velazquez, Benedikt Kraus, Korakod Aphipanya
pp. 174-183
https://doi.org/10.48009/174-183_LV2010_1449

WHAT'S THIS TWITTER ALL ABOUT? AN E-PATIENT'S END-USER COMMUNITY (EUCY)
Elaine Winston
pp. 184-191
https://doi.org/10.48009/184-191_LV2010_1481

AN EVALUATION OF EMPLOYEES' ATTITUDES TOWARD SOCIAL NETWORKING IN THE WORKPLACE
Matthew North
pp. 192-197
https://doi.org/10.48009/192-197_LV2010_1399

A FRAMEWORK FOR MEASURING HAPPINESS IN ONLINE SOCIAL NETWORKS
Amy Chou, Billy Lim
pp. 198-203
https://doi.org/10.48009/198-203_LV2010_1467

EXPLORING MOBILE DEVICE SECURITY POLICIES IN HIGHER EDUCATION
Beth Jones, Lynn Heinrichs
pp. 204-210
https://doi.org/10.48009/204-210_LV2010_1470

ACCOUNTING PROFESSIONALS’ VALUE ASSESSMENT OF ENTRY LEVEL IT SKILLS AND TOPICS: A COMPARISON OF THE DIFFERENCES BETWEEN CPA FIRMS AND INDUSTRY/GOVERNMENT ORGANIZATIONS
Orion Welch, Tom Madison, Sandra Welch
pp. 211-215
https://doi.org/10.48009/211-215_LV2010_1383

CUTTING EDGE COMMUNICATION: MICROBLOGGING AT THE FORTUNE 200, TWITTER IMPLEMENTATION AND USAGE
Carl Case, Darwin King
pp. 216-223
https://doi.org/10.48009/216-223_LV2010_1342

CELLULAR TELEPHONES: A USEFUL TECHNOLOGY WITH DANGEROUS CONSEQUENCES
Robbie Connell, Jack Shorter, Richard Aukerman
pp. 224-231
https://doi.org/10.48009/224-231_LV2010_1346

THE REASONS USERS “FAN” ORGANIZATIONAL FACEBOOK PAGES: A PILOT STUDY
John Anderson, James McCulloch, Keith Mulbery
pp. 232-236
https://doi.org/10.48009/232-236_LV2010_1486

WEB COMMUNICATIONS STRUCTURE
James Lee, Ben Kim, Ted Lee, Pairin Katerattanakul, Wan See
pp. 237-246
https://doi.org/10.48009/237-246_LV2010_1537

3G MOBILE PHONE ADOPTION AND CONTINUED USE: A PILOT STUDY
Meng Xudong, Peggy Deal, Liu Li, Christopher Griffin, William Barnett
pp. 247-255
https://doi.org/10.48009/247-255_LV2010_1531

AN EMPIRICAL STUDY OF USER AUTHENTICATION: THE PERCEPTIONS VERSUS PRACTICE OF STRONG PASSWORDS
Lisa Bain, Michael Hayden, Sandra Sneesby
pp. 256-265
https://doi.org/10.48009/256-265_LV2010_1440

MEASURING JOURNAL QUALITY: PROPOSED CRITERIA AND THEIR APPLICATION TO IS JOURNALS
James Cappel
pp. 266-273
https://doi.org/10.48009/266-273_LV2010_1343

WHY USABILITY TESTING WORKS FOR IT AUDIT
Voraphan Raungpaka, Usana Patramontree
pp. 274-279
https://doi.org/10.48009/274-279_LV2010_1560

E-BUSINESS AT RISK: A LOOK AT THE IMPACT AND CONTROL OF E-BUSINESS FRAUD
Patricia Lake, Susan Behling
pp. 280-285
https://doi.org/10.48009/280-285_LV2010_1499

ANALYZING THE ADOPTION OF COMPUTER SECURITY UTILIZING THE HEALTH BELIEF MODEL
Chet Claar, Jeffrey Johnson
pp. 286-291
https://doi.org/10.48009/286-291_LV2010_1503

A PRELIMINARY PERSPECTIVE OF THE 50-YEAR PUBLICATIONS IN THE JOURNAL OF COMPUTER INFORMATION SYSTEMS
Monica Holmes, Roger Hayen
pp. 292-303
https://doi.org/10.48009/292-297_LV2010_1506

AN ANALYSIS OF THE IMPACT OF ELECTRONIC MEDICAL RECORDS SYSTEM IN A GLOBAL MEDICAL TOURISM ENVIRONMENT
Saviour Nwachukwu, Mysore Ramaswamy, Ashagre Yigletu, Donald Andrews
pp. 304-308
https://doi.org/10.48009/304-308_LV2010_1509

BEYOND THE IMPACT FACTOR: UPDATES ON A CITATION STUDY FOR INFORMATION TECHNOLOGY JOURNALS
Kara Rawlins, Dale Gust
pp. 309-318
https://doi.org/10.48009/309-318_LV2010_1515

FACTORS IMPACTING ENROLLMENT IN INFORMATION SYSTEMS PROGRAMS
Manouchehr Tabatabaei, Mehdi Tehrani
pp. 319-321
https://doi.org/10.48009/319-321_LV2010_1500

VENDOR TRUST INFLUENCING CRM STRATEGIC IMPLEMENTATION PROCESS
Assion Lawson-Body, Lori Willoughby, Kinvi Logossah, Fred Celimene
pp. 322-335
https://doi.org/10.48009/322-335_LV2010_1374

THE MOBILE WORKER AND THE ORGANIZATION
James Sena
pp. 336-346
https://doi.org/10.48009/336-346_LV2010_1375

OUTSOURCING XBRL FINANCIAL STATEMENT FILING: A CASE STUDY OF PRACTICES IN TWO PUBLIC FIRMS
Deb Sledgianowski, Robert Fonfeder, Jackson Lam
pp. 347-351
https://doi.org/10.48009/347-351_LV2010_1380

DATA MINING AND SOCIAL NETWORKING SITES: PROTECTING BUSINESS INFRASTRUCTURE AND BEYOND
Richard Bassett, Tiffany Chamberlain, Stephen Cunningham, Gregor Vidmar
pp. 352-359
https://doi.org/10.48009/352-357_LV2010_1555

PENETRATION TESTING: A VITAL COMPONENT OF AN INFORMATION SECURITY STRATEGY
James Smith, Jack Shorter
pp. 358-363
https://doi.org/10.48009/358-363_LV2010_1337

BUSINESS PROCESS RE DESIGN IN EDUCATIONAL INSTITUTES IN MIDDLE EASTERN COUNTRIES: CASE STUDY
Lila Rajabion, Fida Alsughair, Arwa Aldossary, Seba Almaghlouth, Noora Abunayan
pp. 364-371
https://doi.org/10.48009/364-371_LV2010_1552

CLINICAL RESEARCH: USING BUSINESS INTELLIGENCE FRAMEWORK
Terri Keeling
pp. 372-376
https://doi.org/10.48009/372-376_LV2010_1344.

ECONOMIC CONSEQUENCES OF THE SARBANESâ€"OXLEY ACT ON E-COMMERCE FIRMS
Ronald Young, Hua-Wei Huang, Yun-Chia Yan
pp. 377-383
https://doi.org/10.48009/377-383_LV2010_1349

SPELLING AND GRAMMATICAL ERRORS IN ELECTRONIC MEETINGS
Mina Park, Milam Aiken, Tobin Lindblom, Mahesh Vanjani
pp. 384-391
https://doi.org/10.48009/384-391_LV2010_1350

A POST ANALYSIS OF A FORMALIZED SOFTWARE QUALITY ASSURANCE TOOL’S IMPLEMENTATION: A CASE STUDY
John Scarpino, Paul Kovacs
pp. 392-401
https://doi.org/10.48009/392-401_LV2010_1352

A FRAMEWORK FOR INFORMATION SECURITY AWARENESS PROGRAMS
Carlos Domínguez, Mysore Ramaswamy, Eulalia Martinez, Mariano Cleal
pp. 402-409
https://doi.org/10.48009/402-409_LV2010_1354

FORMULATING AN EFFECTIVE CYBERSECURITY CURRICULUM
Terry Smith, Alex Koohang, Robert Behling
pp. 410-416
https://doi.org/10.48009/410-416_LV2010_1363

THE DEBATE OF ONLINE COURSE QUALITY IN TRADITIONAL UNIVERSITIES: A CASE STUDY
Mohammad Rob
pp. 417-422
https://doi.org/10.48009/417-422_LV2010_1364

AN INTELLIGENT PROCESS PLANNING CONCEPT USING AN AGENT-BASED APPROACH
Utpal Bose
pp. 423-431
https://doi.org/10.48009/423-431_LV2010_1368

RAISING AWARENESS: AN EXAMINATION OF EMBEDDED GPS DATA IN IMAGES POSTED TO THE SOCIAL NETWORKING SITE TWITTER
Michael Flinn, Christopher Teodorski, Karen Paullet
pp. 432-438
https://doi.org/10.48009/432-438_LV2010_1370

TECHNOLOGY: CONVENIENCE OR NECESSITY
Karen Paullet, Jamie Pinchot, Daniel Rota
pp. 439-444
https://doi.org/10.48009/439-444_LV2010_1389

IN MEMORY ANALYTICS: BUSINESS INTELLIGENCE WITHOUT A DATAWAREHOUSE
Anthony Serapiglia
pp. 445-450
https://doi.org/10.48009/445-450_LV2010_1390

ONLINE SHOPPING FACTORS: AN ANALYSIS OF COLLEGE STUDENTS’ EXPERIENCES BASED ON GENDER
Allen Truell, Melody Alexander, Jensen Zhao, Sherry Woosley
pp. 451-459
https://doi.org/10.48009/451-459_LV2010_1394

THE IMPACT OF WEB BROWSING ON CLASSROOM LEARNING PERFORMANCE
Han Li, Yingjin Cui, Xue Bai, Steve Davis
pp. 460-466
https://doi.org/10.48009/460-466_LV2010_1396

DEVELOPING AN INTELLIGENT RECOMMENDATION SYSTEM FOR A PRIVATE UNIVERSITY IN THAILAND
Kanokwan Kongsakun, Chun Fung, Tuchtawan Chanakul
pp. 467-472
https://doi.org/10.48009/467-472_LV2010_1400

SOCIAL MANAGEMENT NETWORKS: ANALYSIS OF POSTINGS IN FACEBOOK GROUPS RELATED TO WILDLIFE MANGEMENT AND PROSPECTS FOR DATA COLLECTION
G. Webb
pp. 473-482
https://doi.org/10.48009/473-482_LV2010_1401

A SMART WEB IMAGE RETRIEVAL SYSTEM BASED ON SEMANTIC MARKUP FOR INTELLIGENT E-BUSINESS
Seong-Yong Hong
pp. 483-490
https://doi.org/10.48009/483-490_LV2010_1404

EXAMINING QUANTITY AND TYPE OF COMMUNICATION IN CONTRIBUTING TO IS PROJECT SUCCESS
K. David Smith, Kimberly Merritt
pp. 491-496
https://doi.org/10.48009/491-496_LV2010_1405

USING DISCRETE EVENT SIMULATION TO EVALUATE THE BENEFITS OF RFID IN REDUCING TRAFFIC CONGESTION AND POLLUTION WHILE INCREASING STUDENT SAFETY IN RURAL OKLAHOMA SCHOOLS
Andrew Tiger, Ming-Shan Su, Jane Hicks
pp. 497-506
https://doi.org/10.48009/497-506_LV2010_1406

A COMPILATION RESEARCH OF ERP IMPLEMENTATION CRITICAL SUCCESS FACTORS
Zhenyu Huang
pp. 507-512
https://doi.org/10.48009/507-512_LV2010_1491

ONLINE SOCIAL NETWORKS AND THE PRIVACY PARADOX: A RESEARCH FRAMEWORK
Michael Mainier, Michelle Louch
pp. 513-517
https://doi.org/10.48009/513-517_LV2010_1421

ASSESSING BLACKBOARD: STUDENT PERCEPTIONS OF THE ONLINE TOOL
Adnan Chawdhry, Karen Paullet, Daniel Benjamin
pp. 518-524
https://doi.org/10.48009/518-524_LV2010_1434

LEADING TO SUCCESS VIA MENTORSHIP
Li-Jen Shannon, Ken Hartness
pp. 525-532
https://doi.org/10.48009/525-532_LV2010_1438

THE ECONOMICS OF FEE-BASED IPHONE APPLICATIONS VERSUS FREE APPLICATIONS: TO CHARGE OR NOT TO CHARGE
Jennifer Bresse-Vitelli, Philip Kim
pp. 533-537
https://doi.org/10.48009/533-537_LV2010_1450

HEALTHCARE KNOWLEDGE COLLECTION FOR CLINICAL DECISION SUPPORT SYSTEMS
Lillian Ortiz-Fournier, Mysore Ramaswamy
pp. 538-546
https://doi.org/10.48009/538-546_LV2010_1456

A TECHNOLOGICAL INFRASTRUCTURE DEVELOPMENT ASSESSMENT TO ENABLE A KNOWLEDGE SOCIETY INTO A SMART CITY
Elías Padilla, Eulalia Martínez
pp. 547-552
https://doi.org/10.48009/547-552_LV2010_1458

INDIVIDUAL DIFFERENCES ON INTENTIONS TO USE STRONG PASSWORDS
Lixuan Zhang, William McDowell, Todd Schultz
pp. 553-558
https://doi.org/10.48009/553-558_LV2010_1459

COURSE SEQUENCING AND PERFORMANCE: AN INVESTIGATION OF BUSINESS COLLEGE REQUIREMENTS IN RELATION TO AN INFORMATION SYSTEMS CORE COURSE
Sherry Woosley, Allen Truell, Melody Alexander, Jensen Zhao
pp. 559-565
https://doi.org/10.48009/559-565_LV2010_1460

CRITICAL SUCCESS FACTORS IN MANAGING VIRTUAL TEAMS: FRAMEWORK AND RELATIONSHIPS
Ganesh Vaidyanathan, Asghar Sabbaghi, Carmen Debrot
pp. 566-570
https://doi.org/10.48009/566-570_LV2010_1461

SUPPLY CHAIN INTELLIGENCE AND VALUE CREATION: A FRAMEWORK
Ganesh Vaidyanathan, Asghar Sabbaghi
pp. 571-576
https://doi.org/10.48009/571-576_LV2010_1462

AFFECTIVE COMPUTING: INVASIVE TECHNOLOGY AND LEGAL CONSIDERATIONS TO PROTECT CONSUMERS
Lee Steen, Philip Kim
pp. 577-584
https://doi.org/10.48009/577-584_LV2010_1463

STUDENTS’ USE OF MOBILE DEVICES: AN EXPLORATORY SURVEY IN AN INTRODUCTORY COMPUTER INFORMATION SYSTEM CLASS
Kamal Hingorani, Donald Woodard
pp. 585-588
https://doi.org/10.48009/585-588_LV2010_1466

UNCHARTED WATERS: USING SOCIAL NETWORKS IN HIRING DECISIONS
Chris Jones, Susan Behling
pp. 589-595
https://doi.org/10.48009/589-595_LV2010_1474

ON CODES OF ETHICS FOR WEB DESIGN
James Harris
pp. 596-600
https://doi.org/10.48009/596-600_LV2010_1479

BENEFIT-DRIVEN PARTICIPATION IN OPEN ORGANIZATIONAL SOCIAL MEDIA PLATFORMS: THE CASE OF THE SAP COMMUNITY NETWORK
Georgia Demetriou, Peter Kawalek
pp. 601-611
https://doi.org/10.48009/601-611_LV2010_1483

THE USE OF WEB LOG ANALYSIS IN ACADEMIC JOURNALS â€" CASE STUDY
Azad Ali, Frederick Kohun
pp. 612-619
https://doi.org/10.48009/612-619_LV2010_1487

PERCEPTIONS OF SOCIAL NETWORK USABILITY: IMPACTS OF PERCEIVED INTERACTIVITY AND TECHNOLOGY ACCEPTANCE
Belinda Shipps, Brandis Phillips
pp. 620-627
https://doi.org/10.48009/620-627_LV2010_1493

SOCIAL MEDIA SECURITY POLICIES: GUIDELINES FOR ORGANIZATIONS
Nipul Patel, Hetal Jasani
pp. 628-634
https://doi.org/10.48009/628-634_LV2010_1495

APPLYING LEAN PRINCIPLES IN SOFTWARE DEVELOPMENT PROCESS â€" A CASE STUDY
Jeff Widman, Stella Hua, Steven Ross
pp. 635-639
https://doi.org/10.48009/635-639_LV2010_1497

HAS YOUR PATENT STRATEGY BEEN “BILSKIED”? CHALLENGES FACING SOFTWARE BASED BUSINESS METHOD PATENTS
Nancy Martin, David Green
pp. 640-643
https://doi.org/10.48009/640-643_LV2010_1519

CHANGES IN EMPLOYEE INTENTION TO COMPLY WITH ORGANIZATIONAL SECURITY POLICIES AND PROCEDURES FACTORING RISK PERCEPTION: A COMPARISON OF 2006 AND 2010
Queen Booker, Fred Kitchens
pp. 649-658
https://doi.org/10.48009/649-658_LV2010_1522

AITP NCC BI GIS COMPETITION: A BI CASE PERSPECTIVE
Roger Hayen
pp. 659-668
https://doi.org/10.48009/659-668_LV2010_1525

EXPECTANCY THEORY PREDICTIONS OF BLOGGING INTENTION AND CONDUCTS
Hsiu-Li Liao, Su-Houn Liu, Shih-Ming Pi
pp. 669-677
https://doi.org/10.48009/669-677_LV2010_1529

MITIGATING RISK IN A HIGH UNCERTAINTY AVOIDANCE CULTURE â€" AIR TRAFFIC CONTROL
Darlene Drazenovich, Robert Skovira
pp. 678-688
https://doi.org/10.48009/678-688_LV2010_1518

INFORMATION TECHNOLOGY AND DISTANCE EDUCATION
Manying Qiu, Carl Wright, Shuting Xu
pp. 689-695
https://doi.org/10.48009/689-695_LV2010_1551

VALIDATING A COMPREHENSIVE MODEL FOR ONLINE SOCIAL NETWORKING USE:INITIAL RESULTS
Thilini Ariyachandra, Nancy Bertaux
pp. 696-710
https://doi.org/10.48009/696-710_LV2010_1508

THE REVOLUTION OF USING COLLABORATIVE SOURCES IN HIGHER EDUCATION
Christine Shull, Dana McCann
pp. 711-714
https://doi.org/10.48009/711-714_LV2010_1557

PERCEPTIONS OF THE IMPORTANCE OF OBJECT PROGRAMMING LANGUAGE CONTENT BY INDUSTRY PROFESSIONALS: A PRELIMINARY STUDY
Joseph Laverty, David Wood, Frederick Kohun, Gary DeLorenzo
pp. 715-723
https://doi.org/10.48009/715-723_LV2010_1512