Table of Contents -
Volume 16, Issue 2
ON SECURITY NEGOTIATION MODEL DEVELOPED FOR THE SECURITY OF THE SOCIAL NETWORKING SITES FROM THE HOSTILE USERRuchi Verma, Nitin Nitin
pp. 1-15
https://doi.org/10.48009/2_iis_2015_1-15
E-GOVERNMENT SUCCESS FACTORS: A PERSPECTIVE ON GOVERNMENT UNITS Ewa Ziemba, Tomasz Papaj, Maria Jadamus-Hacura
pp. 16-27
https://doi.org/10.48009/2_iis_2015_16-27
TOWARDS A CONSISTENCY OF INFORMATION SYSTEMS CURRICULUM Mehdi Sagheb-Tehrani
pp. 28-37
https://doi.org/10.48009/2_iis_2015_28-37
A METHODOLOGY FOR DETERMINING IF VIRTUALIZATION IS APPROPRIATE FOR MILITARY TRAINING APPLICATIONSKenneth Marsilio
pp. 38-43
https://doi.org/10.48009/2_iis_2015_38-43
IN-CLASSROOM TEACHING IS HERE TO STAYâ"AT LEAST FOR STUDENTS IN COMPUTER AND INFORMATION SYSTEMSPaul Kovacs, Lisa Kovalchick, Alan Peslak, Wenli Wang
pp. 44-52
https://doi.org/10.48009/2_iis_2015_44-52
IT/IS FACULTY PERCEPTIONS OF THE UNIONIZATION PROCESS OF ADJUNCT FACULTY: A CASE STUDYMichael Curran, Robert Kowalewski, Robert Trosky, Jr, Carrie Payne
pp. 53-62
https://doi.org/10.48009/2_iis_2015_53-62
THE USE OF MOBILE ASSISTED LANGUAGE LEARNING APPLICATIONS IN LEARNING ARABICRazak Abedalla
pp. 63-73
https://doi.org/10.48009/2_iis_2015_63-73
DO ONLINE AND FACE-TO-FACE STUDENTS EXHIBIT THE SAME INFORMATION ANALYSIS SKILLS?Nelbert St. Clair, John Girard
pp. 74-80
https://doi.org/10.48009/2_iis_2015_74-80
BIG DATA ANALYTICSJasmine Zakir, Tom Seymour, Kristi Berg
pp. 81-90
https://doi.org/10.48009/2_iis_2015_81-90
DO YOU KNOW WHAT YOUR NAME IS? THE QUESTION OF ADDITIVE OR REDUCTIVE PRACTICESGerald Johnson, D. Lance Revenaugh
pp. 91-101
https://doi.org/10.48009/2_iis_2015_91-101
MOBILE APPLICATIONS FOR HEALTH CARE SUPPORTDejan Zilli, Jozica Leskovsek, Nova Vizija, Srecko Natek, Nova Vizija, Dusan Lesjak
pp. 102-107
https://doi.org/10.48009/2_iis_2015_102-107
USING WRITING ACROSS THE CURRICULUM (WAC) TECHNIQUES TO PROMOTE INCREASED STUDENT ENGAGEMENT AND LEARNING IN THE COMPUTER INFORMATION SYSTEMS CURRICULUMBruce Saulnier
pp. 108-115
https://doi.org/10.48009/2_iis_2015_108-115
PREDICTORS OF SUCCESS IN E-LEARNING COURSEWARE USABILITY DESIGNAlex Koohang, Joanna Paliszkiewicz, Jeretta Horn Nord
pp. 116-122
https://doi.org/10.48009/2_iis_2015_116-122
ACADEMIC PREPARATION AND THE INFLUENCE OF IPAD TECHNOLOGY ON MILITARY AND US VETERAN STUDENTSJoseph Compomizzi, Beth Sindaco
pp. 123-132
https://doi.org/10.48009/2_iis_2015_123-132
OBSTACLES TO THE ADOPTION OF CLOUD COMPUTING: BEST PRACTICIES IN TECHNOLOGY AND COMMUNICATIONCraig Callender, Bryan Marshall, Peter Cardon, Nipul Patel
pp. 133-139
https://doi.org/10.48009/2_iis_2015_133-139
EXAMINING THE APPLICATION OF BIG DATA ANALYTICS TO INCREASE UNIVERSITY RETENTION AND PROMOTE STUDENT SUCCESSJody Strausser
pp. 140-148
https://doi.org/10.48009/2_iis_2015_140-148
ELECTRONIC PAYMENT SYSTEMS USE AND SATISFACTION IN AN ARABIC COUNTRY: EVIDENCE FROM KUWAITKamel Rouibah
pp. 149-160
https://doi.org/10.48009/2_iis_2015_149-160
USING THE BOLMAN AND DEALâS FOUR FRAMES IN DEVELOPING A DATA GOVERNANCE STRATEGYJustin Fruehauf, Fahad Al-Khalifa, Joesph Coniker
pp. 161-167
https://doi.org/10.48009/2_iis_2015_161-167
A MULTIFACTOR RESEARCH MODEL OF ANTECEDENTS OF SECURITY AND PRIVACY IN HEALTHCARE SETTINGSSushma Mishra, Peter Draus, Natalya Goreva, Donald Caputo
pp. 168-175
https://doi.org/10.48009/2_iis_2015_168-175
CAN WE LIVE WITHOUT THE INTERNET? AN OVERALL AND DEMOGRAPHIC ANALYSIS OF INTERNET USAGE AND DEPENDENCE Alan Peslak
pp. 176-184
https://doi.org/10.48009/2_iis_2015_176-184
SECURITY BREACHES IN HEALTHCARE DATA: AN APPLICATION OF THE ACTOR-NETWORK THEORYRichard Stachel, Marilyn DeLaHaye
pp. 185-194
https://doi.org/10.48009/2_iis_2015_185-194
TEACHING CASE: A SITUATED LEARNING APPROACH TO ERP ROLE ADAPTATION AND BUSINESS INTELLIGENCEMary Dunaway
pp. 195-208
https://doi.org/10.48009/2_iis_2015_195-208
IMPACT OF THE USE OF BLACKBOARD ON PERFORMANCE OF ACCOUNTING STUDENTSLaurence Lawson-Body, Lori Willoughby, Assion Lawson-Body
pp. 209-216
https://doi.org/10.48009/2_iis_2015_209-216
USEFULNESS AND USABILITY OF MOBILE DEVICES IN CHINESE-ENGLISH ELECTRONIC MEETINGS Milam Aiken, Jiafeng Wang, Linwu Gu, Mahesh Vanjani
pp. 217-225
https://doi.org/10.48009/2_iis_2015_217-225
REVISIT CHALLENGES FOR TEACHING COMPUTER LITERACY: A CASE OF USING AN ONLINE SIMULATION TOOLThomas Ngo-Ye, Jae Choi
pp. 226-235
https://doi.org/10.48009/2_iis_2015_226-235
THE RISKS AND REWARDS OF COMPUTING EVERYWHERE FOR SMALL BUSINESS ENTREPRENEURS Richard Bassett, Anthony Richardson, Robert Page
pp. 236-245
https://doi.org/10.48009/2_iis_2015_236-245
INNOVATING KNOWLEDGE MANAGEMENT IN CYBER WARFARE Quinn Lanzendorfer, Scott Spangler
pp. 246-254
https://doi.org/10.48009/2_iis_2015_246-254