International Association for Computer Information Systems
Tuesday, May 11, 2021

Table of Contents - Volume 12, Issue 1



ICT BANKING STRATEGIES DESIGNED TO GROW AND RETAIN E-COMMERCE: ALTERNATE DELIVERY CHANNELS' CUSTOMER BASE
Rudolph Strong
pp. 1-6
https://doi.org/10.48009/1_iis_2011_1-6

AN ANALYSIS OF AN ENTERPRISE MOBILITY SOFTWARE COMPANY - MANAGING SOFTWARE QUALITY AND MAINTAINING A COMPETITIVE EDGE IN FLUCTUATING PERIODS OF CORPORATE GROWTH: A CASE STUDY
John Scarpino, Rhonda Chicone
pp. 7-15
https://doi.org/10.48009/1_iis_2011_7-15

EXPLORING THE FEASIBILITY OF MOBILE MULTILINGUAL ELECTRONIC MEETINGS
Shilpa Balan, Milam Aiken, Bidyut Hazarika
pp. 16-22
https://doi.org/10.48009/1_iis_2011_16-22

THE SOCIAL SCIENCE OF DATA WAREHOUSING: ITS EVER-EVOLVING CORPORATE CULTURE
Debra Borkovich
pp. 23-35
https://doi.org/10.48009/1_iis_2011_23-35

IMPACT OF INFORMATION TECHNOLOGY INNOVATIONS ON FINANCIAL TRANSACTION PROCESSING
Mysore Ramaswamy, Richard Calvasina, Eugene Calvasina, Gerald Calvasina
pp. 36-43
https://doi.org/10.48009/1_iis_2011_36-43

SMALL NONPROFITS UNFAMILIAR WITH SARBANES-OXLEY FAILED TO ESTABLISH WHISTLEBLOWER PROTECTIONS
Matthew Kisow
pp. 44-53
https://doi.org/10.48009/1_iis_2011_44-53

TO CLOUD OR NOT TO CLOUD?
Richard Delaquis, Guy Philbin
pp. 54-58
https://doi.org/10.48009/1_iis_2011_54-58

USAGE AND PERCEPTIONS OF INTERNET AD BLOCKERS: AN EXPLORATORY STUDY
J. Sandvig, Deepinder Bajwa, Steven Ross
pp. 59-69
https://doi.org/10.48009/1_iis_2011_59-69

ENABLING BUSINESS INTELLIGENCE, KNOWLEDGE MANAGEMENT AND CLINICAL WORKFLOW WITH SINGLEVIEW
Brian Kolowitz, Rasu Shrestha
pp. 70-77
https://doi.org/10.48009/1_iis_2011_70-77

COMPUTER ETHICS OF AMERICAN AND EUROPEAN INFORMATION TECHNOLOGY STUDENTS: A CROSS-CULTURAL COMPARISO
Nancy Martin, Belle Woodward
pp. 78-87
https://doi.org/10.48009/1_iis_2011_78-87

CRITICAL FACTORS FOR SUCCESSFUL IMPLEMENTATION OF DATA WAREHOUSES
Ángel Ojeda-Castro, Mysore Ramaswamy, Ángel Rivera-Collazo, Ahmad Jumah
pp. 88-96
https://doi.org/10.48009/1_iis_2011_88-96

CULTURAL FACTORS INFLUENCING CELL PHONE ADOPTION IN DEVELOPING COUNTRIES: A QUALITATIVE STUDY
Assion Lawson-Body, Lori Willoughby, Jared Keengwe, Laurence Mukankusi
pp. 97-105
https://doi.org/10.48009/1_iis_2011_97-105

THREATS TO HEALTHCARE DATA: A THREAT TREE FOR RISK ASSESSMENT
J. Pardue, Priya Patidar
pp. 106-113
https://doi.org/10.48009/1_iis_2011_106-113

USING SQL DEVELOPER DATA MODELER AND MICROSOFT ACCESS FOR TEACHING DATABASE MODELING AND DESIGN
Kamal Hingorani, Donald Woodard, Narsin Askari-Danesh
pp. 109-115
https://doi.org/10.48009/1_iis_2011_109-115

AN EXPLORATION OF SEXTING BEHAVIOR AMONG YOUTH AND THE ASSOCIATED LEGAL RAMIFICATIONS
Jennifer Breese-Vitelli
pp. 114-119
https://doi.org/10.48009/1_iis_2011_114-119

STUDENT PERCEPTIONS OF EDUCATIONAL GAMES IN HIGHER EDUCATION: AN EMPIRICAL STUDY
Roslina Ibrahim, Samsudin Wahab, Rasimah Yusoff, Khalili Khalil, Azizah Jaafar
pp. 120-133
https://doi.org/10.48009/1_iis_2011_120-133

VALUE INCREASING ELECTRONIC COMMERCE SOLUTIONS IN THE APPAREL INDSUTRY
Kathleen DiIorio, June Wei
pp. 134-140
https://doi.org/10.48009/1_iis_2011_134-140

MOBILE TECHNOLOGY: PLUGGED IN AND ALWAYS ON
Karen Paullet, Jamie Pinchot, David Douglas, Daniel Rota
pp. 141-150
https://doi.org/10.48009/1_iis_2011_141-150

UNDERSTANDING THE IMPACT OF INFORMATION TECHNOLOGY ON STRATEGIC MANAGEMENT: A POWER ASYMMETRY VIEW
Tao Hu, Xihui Zhang, Katherine Brake, David Nickels
pp. 151-158
https://doi.org/10.48009/1_iis_2011_151-158

AN EMPIRICAL STUDY OF THE IMPACT OF EMOTIONS AND PERSONALITY ON SOCIAL NETWORKING
Alan Peslak, Neelima Bhatnagar
pp. 159-169
https://doi.org/10.48009/1_iis_2011_159-169

IPHONE AND IPAD APPLICATIONS: PERCEPTIONS OF USE IN AN ORGANIZATION'S SUPPLY CHAIN
Cassandra Elrod, Chelsea Brookshire, Elizabeth Cudney, Barry Flachsbart
pp. 170-180
https://doi.org/10.48009/1_iis_2011_170-180

WHAT DID I JUST TWEET?! A CLOSER LOOK @ HOW #E-DISCOVERY COULD IMPACT #SOCIAL NETWORKING
Philip Kim, Richard Metzer, Thomas Scanlon
pp. 181-188
https://doi.org/10.48009/1_iis_2011_181-188

FACTORS AFFECTING EMAIL RESPONSE RATES IN A CORPORATE ENVIRONMENT
Robert LaMastro, Daniel McFarland
pp. 189-193
https://doi.org/10.48009/1_iis_2011_189-193

USERS ACCEPTANCE ON MIXED REALITY TECHNOLOGY
Rasimah Yusoff, Roslina Ibrahim, Halimah Zaman, Azlina Ahmad, Syazani Suhaifi
pp. 194-205
https://doi.org/10.48009/1_iis_2011_194-205

AN ANALYSIS OF COMPUTER FRAUD: SCHEMES, DETECTION, AND OUTCOMES
Sandra Welch, Tom Madison, Orion Welch
pp. 206-212
https://doi.org/10.48009/1_iis_2011_206-212

MANAGEMENT GUIDELINES FOR SCRUM AGILE SOFTWARE DEVELOPMENT PROCESS
Juyun Cho, Richard Huff, David Olsen
pp. 213-223
https://doi.org/10.48009/1_iis_2011_213-223

SECURITY AWARENESS FOR HEALTH CARE INFORMATION SYSTEMS: A HIPAA COMPLIANCE PERSPECTIVE
Sushma Mishra, Gregory Leone, Donald Caputo, Robert Calabrisi
pp. 224-236
https://doi.org/10.48009/1_iis_2011_224-236

TAXONOMY OF MULTIPLE LEVELS OF SWOT ANALYSIS IN PROJECT MANAGEMENT
Ganesh Vaidyanathan, Asghar Sabbaghi
pp. 237-245
https://doi.org/10.48009/1_iis_2011_237-245

INFORMATION SECURITY EFFECTIVENESS: A RESEARCH FRAMEWORK
Sushma Mishra, Lewis Chasalow
pp. 246-255
https://doi.org/10.48009/1_iis_2011_246-255

BRIDGING DIGITAL AND GENDER DIVIDES: A PRELIMINARY STUDY APPLYING USES AND GRATIFICATION THEORY TO DOT DIVA'S RECRUITING STRATEGIES
Dacia Charlesworth
pp. 256-263
https://doi.org/10.48009/1_iis_2011_256-263

SECURITY TRAINING HUMAN PROTOCOL
Harry Benham
pp. 264-270
https://doi.org/10.48009/1_iis_2011_264-270

IDENTIFYING INFORMATION SECURITY GOVERNANCE DIMENSIONS: A MULTINOMIAL ANALYSIS
Sushma Mishra, Jay Powell
pp. 271-279
https://doi.org/10.48009/1_iis_2011_271-279

DESIGNING AND BUILDING A KNOWLEDGE WAREHOUSE ORIENTED, PUBLIC DECISION SUPPORT SITE USING FREE GOOGLE TOOLS: AN ANALYSIS AND CASE APPLICATION TO DEER MANAGEMENT
G. Webb
pp. 280-290
https://doi.org/10.48009/1_iis_2011_280-290

AN EXPLORATORY STUDY ON DETERMINING FACTORS FOR THE SMARTPHONE SELECTION DECISION
Dalsang Chung, Sun Chun
pp. 291-300
https://doi.org/10.48009/1_iis_2011_291-300

COMPARATIVE ANALYSIS OF MOBILE APPLICATION DEVELOPMENT AND SECURITY MODELS
Joseph Laverty, David Wood, Frederick Kohun, John Turchek
pp. 301-312
https://doi.org/10.48009/1_iis_2011_301-312

THERE'S AN APP FOR THAT, BUT IS THERE A MARKET FOR THAT APP? AN EXPLORATION OF THE APP MARKET AS AN AVENUE FOR ENTREPRENEURSHIP
George Kirk
pp. 313-317
https://doi.org/10.48009/1_iis_2011_313-317

AN EMPIRICAL ANALYSIS OF MOBILE SMART DEVICE ACCURACY AND EFFICIENCY IN GPS-ENABLED FIELD DATA COLLECTION
Matthew North
pp. 318-327
https://doi.org/10.48009/1_iis_2011_318-327

OBJECT REUSE AND INTEGRATION IN OBJECT-RELATIONAL DATABASE DEVELOPMENT
Ming Wang
pp. 328-338
https://doi.org/10.48009/1_iis_2011_328-338

CLOUD-BASED EMAIL ARCHITECTURE FOR HIGHER EDUCATION INSTITUTIONS
Meena Srinivasan
pp. 339-345
https://doi.org/10.48009/1_iis_2011_339-345

SAP AND MOBILE APPLICATIONS
William Gruver, Camille Rogers
pp. 346-351
https://doi.org/10.48009/1_iis_2011_346-351

FRAMING USER RESPONSES TO THE INTRODUCTION OF NEW INFORMATION TECHNOLOGY IN THE CONTEXT OF NEGATIVE CAPABILITY
Judith Decou, Diana Kao
pp. 352-356
https://doi.org/10.48009/1_iis_2011_352-356

EMPLOYING HOST VIRTUALIZATION AND SYMMETRIC MULTI-PROCESSING AS A STRATEGY FOR IMPROVING PERFORMANCE IN COMPUTENTIONALLY INTENSE PROBLEMS
Paul Safonov, Dennis Guster, Corey Hemminger
pp. 357-365
https://doi.org/10.48009/1_iis_2011_357-365

A FRAMEWORK AND DEMO FOR PREVENTING ANTI-COMPUTER FORENSICS
Chris Simmons, Danielle Jones, Lakisha Simmons
pp. 366-372
https://doi.org/10.48009/1_iis_2011_366-372

AN EXPLORATORY STUDY OF ADOPTION OF INFORMATION TECHNOLOGY BY SMALL AND MEDIUM BUSINESSES
Utpal Bose
pp. 373-381
https://doi.org/10.48009/1_iis_2011_373-381

USING AN INNOVATION DIFFUSION THEORY FRAMEWORK TO EXPLORE WEB SITE ADOPTION BY SMALL TO MEDIUM SIZED ENTERPRISES
Mary Helen Fagan
pp. 382-391
https://doi.org/10.48009/1_iis_2011_382-391

OBJECT DATA REUSE AND INTEGRATION IN ERP
Ming Wang, Xuesong Zhang, Drew Hwang
pp. 392-400
https://doi.org/10.48009/1_iis_2011_392-400

THE USE OF SOCIAL NETWORKING TOOL TWITTER TO IMPROVE COLLEGE STUDENTS' BUSINESS WRITING SKILLS
Lajuan Davis, L. Roger Yin
pp. 401-406
https://doi.org/10.48009/1_iis_2011_401-406

AN EMPIRICAL STUDY OF CELL PHONE AND SMARTPHONE USAGE
Alan Peslak, Li-Jen Shannon, Wendy Ceccucci
pp. 407-417
https://doi.org/10.48009/1_iis_2011_407-417

FACTORS AFFECTING THE MATRICULATION OF AFRICAN AMERICAN UNDERGRADUATE STUDENTS: AN EXPLORATORY STUDY
Leila Halawi, Andrew Knowles, Richard McCarthy
pp. 418-424
https://doi.org/10.48009/1_iis_2011_418-424

UNDERSTANDING PERCEIVED FLAMING TENDENCIES ON SOCIAL NETWORKING SITES: AN EXPLORATORY STUDY
Nitin Nitin, Ankush Bansal, Deepak Khazanchi
pp. 425-435
https://doi.org/10.48009/1_iis_2011_425-435

INFLUENCE OF DEMOGRAPHIC VARIABLES ON CUSTOMER SATISFACTION REGARDING E-BANKING: AN EMPIRICAL INVESTIGATION
S Kavitha, A Lakshmi
pp. 436-444
https://doi.org/10.48009/1_iis_2011_436-444

DESIGNING DATA WAREHOUSES TO SUPPORT CRIMINAL INVESTIGATION
Juan Rivera-Vázquez, Lillian Ortiz-Fournier, Mysore Ramaswamy
pp. 445-454
https://doi.org/10.48009/1_iis_2011_445-454

GLOBAL PERSPECTIVE ON RADIO SPECTRUM MANAGEMENT USAGE AND POLICY
S Srinivasan
pp. 455-463
https://doi.org/10.48009/1_iis_2011_455-463

USING ICT AND SERVICE LEARNING IN RURAL SENEGAL PROJECT FUNDED BY USAID/HED
Vishnu Vinekar, Elizabeth Langran, Winston Tellis
pp. 464-472
https://doi.org/10.48009/1_iis_2011_464-472

AN ANALYSIS OF THE MODALITIES OF ACADEMIC GLOBALIZATION AND ACCEPTANCE CRITERIA FOR FUTURE MODELS
Abdur Choudhary, Rehan Choudhary
pp. 473-482
https://doi.org/10.48009/1_iis_2011_473-482

ANALYZING THE ROLE OF SOME PERSONAL DETERMINANTS IN WEB 2.0 APPLICATIONS USAGE
Adel Aladwani
pp. 483-488
https://doi.org/10.48009/1_iis_2011_483-488