International Association for Computer Information Systems
Thursday, December 05, 2024

Table of Contents - Volume 16, Issue 2



ON SECURITY NEGOTIATION MODEL DEVELOPED FOR THE SECURITY OF THE SOCIAL NETWORKING SITES FROM THE HOSTILE USER
Ruchi Verma, Nitin Nitin
pp. 1-15
https://doi.org/10.48009/2_iis_2015_1-15

E-GOVERNMENT SUCCESS FACTORS: A PERSPECTIVE ON GOVERNMENT UNITS
Ewa Ziemba, Tomasz Papaj, Maria Jadamus-Hacura
pp. 16-27
https://doi.org/10.48009/2_iis_2015_16-27

TOWARDS A CONSISTENCY OF INFORMATION SYSTEMS CURRICULUM
Mehdi Sagheb-Tehrani
pp. 28-37
https://doi.org/10.48009/2_iis_2015_28-37

A METHODOLOGY FOR DETERMINING IF VIRTUALIZATION IS APPROPRIATE FOR MILITARY TRAINING APPLICATIONS
Kenneth Marsilio
pp. 38-43
https://doi.org/10.48009/2_iis_2015_38-43

IN-CLASSROOM TEACHING IS HERE TO STAYâ€"AT LEAST FOR STUDENTS IN COMPUTER AND INFORMATION SYSTEMS
Paul Kovacs, Lisa Kovalchick, Alan Peslak, Wenli Wang
pp. 44-52
https://doi.org/10.48009/2_iis_2015_44-52

IT/IS FACULTY PERCEPTIONS OF THE UNIONIZATION PROCESS OF ADJUNCT FACULTY: A CASE STUDY
Michael Curran, Robert Kowalewski, Robert Trosky, Jr, Carrie Payne
pp. 53-62
https://doi.org/10.48009/2_iis_2015_53-62

THE USE OF MOBILE ASSISTED LANGUAGE LEARNING APPLICATIONS IN LEARNING ARABIC
Razak Abedalla
pp. 63-73
https://doi.org/10.48009/2_iis_2015_63-73

DO ONLINE AND FACE-TO-FACE STUDENTS EXHIBIT THE SAME INFORMATION ANALYSIS SKILLS?
Nelbert St. Clair, John Girard
pp. 74-80
https://doi.org/10.48009/2_iis_2015_74-80

BIG DATA ANALYTICS
Jasmine Zakir, Tom Seymour, Kristi Berg
pp. 81-90
https://doi.org/10.48009/2_iis_2015_81-90

DO YOU KNOW WHAT YOUR NAME IS? THE QUESTION OF ADDITIVE OR REDUCTIVE PRACTICES
Gerald Johnson, D. Lance Revenaugh
pp. 91-101
https://doi.org/10.48009/2_iis_2015_91-101

MOBILE APPLICATIONS FOR HEALTH CARE SUPPORT
Dejan Zilli, Jozica Leskovsek, Nova Vizija, Srecko Natek, Nova Vizija, Dusan Lesjak
pp. 102-107
https://doi.org/10.48009/2_iis_2015_102-107

USING WRITING ACROSS THE CURRICULUM (WAC) TECHNIQUES TO PROMOTE INCREASED STUDENT ENGAGEMENT AND LEARNING IN THE COMPUTER INFORMATION SYSTEMS CURRICULUM
Bruce Saulnier
pp. 108-115
https://doi.org/10.48009/2_iis_2015_108-115

PREDICTORS OF SUCCESS IN E-LEARNING COURSEWARE USABILITY DESIGN
Alex Koohang, Joanna Paliszkiewicz, Jeretta Horn Nord
pp. 116-122
https://doi.org/10.48009/2_iis_2015_116-122

ACADEMIC PREPARATION AND THE INFLUENCE OF IPAD TECHNOLOGY ON MILITARY AND US VETERAN STUDENTS
Joseph Compomizzi, Beth Sindaco
pp. 123-132
https://doi.org/10.48009/2_iis_2015_123-132

OBSTACLES TO THE ADOPTION OF CLOUD COMPUTING: BEST PRACTICIES IN TECHNOLOGY AND COMMUNICATION
Craig Callender, Bryan Marshall, Peter Cardon, Nipul Patel
pp. 133-139
https://doi.org/10.48009/2_iis_2015_133-139

EXAMINING THE APPLICATION OF BIG DATA ANALYTICS TO INCREASE UNIVERSITY RETENTION AND PROMOTE STUDENT SUCCESS
Jody Strausser
pp. 140-148
https://doi.org/10.48009/2_iis_2015_140-148

ELECTRONIC PAYMENT SYSTEMS USE AND SATISFACTION IN AN ARABIC COUNTRY: EVIDENCE FROM KUWAIT
Kamel Rouibah
pp. 149-160
https://doi.org/10.48009/2_iis_2015_149-160

USING THE BOLMAN AND DEAL’S FOUR FRAMES IN DEVELOPING A DATA GOVERNANCE STRATEGY
Justin Fruehauf, Fahad Al-Khalifa, Joesph Coniker
pp. 161-167
https://doi.org/10.48009/2_iis_2015_161-167

A MULTIFACTOR RESEARCH MODEL OF ANTECEDENTS OF SECURITY AND PRIVACY IN HEALTHCARE SETTINGS
Sushma Mishra, Peter Draus, Natalya Goreva, Donald Caputo
pp. 168-175
https://doi.org/10.48009/2_iis_2015_168-175

CAN WE LIVE WITHOUT THE INTERNET? AN OVERALL AND DEMOGRAPHIC ANALYSIS OF INTERNET USAGE AND DEPENDENCE
Alan Peslak
pp. 176-184
https://doi.org/10.48009/2_iis_2015_176-184

SECURITY BREACHES IN HEALTHCARE DATA: AN APPLICATION OF THE ACTOR-NETWORK THEORY
Richard Stachel, Marilyn DeLaHaye
pp. 185-194
https://doi.org/10.48009/2_iis_2015_185-194

TEACHING CASE: A SITUATED LEARNING APPROACH TO ERP ROLE ADAPTATION AND BUSINESS INTELLIGENCE
Mary Dunaway
pp. 195-208
https://doi.org/10.48009/2_iis_2015_195-208

IMPACT OF THE USE OF BLACKBOARD ON PERFORMANCE OF ACCOUNTING STUDENTS
Laurence Lawson-Body, Lori Willoughby, Assion Lawson-Body
pp. 209-216
https://doi.org/10.48009/2_iis_2015_209-216

USEFULNESS AND USABILITY OF MOBILE DEVICES IN CHINESE-ENGLISH ELECTRONIC MEETINGS
Milam Aiken, Jiafeng Wang, Linwu Gu, Mahesh Vanjani
pp. 217-225
https://doi.org/10.48009/2_iis_2015_217-225

REVISIT CHALLENGES FOR TEACHING COMPUTER LITERACY: A CASE OF USING AN ONLINE SIMULATION TOOL
Thomas Ngo-Ye, Jae Choi
pp. 226-235
https://doi.org/10.48009/2_iis_2015_226-235

THE RISKS AND REWARDS OF COMPUTING EVERYWHERE FOR SMALL BUSINESS ENTREPRENEURS
Richard Bassett, Anthony Richardson, Robert Page
pp. 236-245
https://doi.org/10.48009/2_iis_2015_236-245

INNOVATING KNOWLEDGE MANAGEMENT IN CYBER WARFARE
Quinn Lanzendorfer, Scott Spangler
pp. 246-254
https://doi.org/10.48009/2_iis_2015_246-254