Table of Contents -
Volume 16, Issue 3
FACTORS AFFECTING CLOUD COMPUTING ADOPTION AMONG UNIVERSITIES AND COLLEGES IN THE UNITED STATES AND CANADAWilliam Klug, Xue Bai
pp. 1-10
https://doi.org/10.48009/3_iis_2015_1-10
LEARNING ABOUT LEARNING ABOUT LEARNING: INSIGHTS FROM A STUDENT SURVEY IN A HYBRID CLASSROOM ENVIRONMENTGuido Lang, Stephen O'Connell
pp. 11-16
https://doi.org/10.48009/3_iis_2015_11-16
STRUCTURED ASSIGNMENT PEDAGOGY: AN SAP ENTERPRISE SOFTWARE DEPLOYMENTRoger Hayen
pp. 17-26
https://doi.org/10.48009/3_iis_2015_17-26
CASE STUDY: CAN DIGITAL NATIVES ADAPT TO TECHNOLOGYâS CHANGES AND SPEED?Scott Spangler, Anthony Rodi, Gary DeLorenzo, Frederick Kohun
pp. 27-32
https://doi.org/10.48009/3_iis_2015_27-32
CYBERSPACE: A VENUE FOR TERRORISMDavid Bieda, Leila Halawi
pp. 33-42
https://doi.org/10.48009/3_iis_2015_33-42
BLENDED LEARNING IN THE INTRODUCTORY COMPUTER SKILLS COURSEPaul Stephens, Matthew McGowan, Valerie Pape
pp. 43-53
https://doi.org/10.48009/3_iis_2015_43-53
A CONCEPTUAL MODEL TO MEASURE ERP USER-VALUEMohamed Lotfy, Leila Halawi
pp. 54-63
https://doi.org/10.48009/3_iis_2015_54-63
TOO âBIGâ TO PROCESS: BIG DATA IN THE BUSINESS LIBRARY: KEY RESOURCES AND IMPLICATIONS FOR THE FUTUREKara Rawlins, Breezy Silver
pp. 64-69
https://doi.org/10.48009/3_iis_2015_64-69
COOL OR CREEPY: CONSUMER COMFORT LEVEL WITH SENTIMENT ANALYTICSMatthew North
pp. 70-79
https://doi.org/10.48009/3_iis_2015_70-79
ANALYZING AN INFORMATION SYSTEMS PROGRAM SKILL-SET: A BOTTOM-UP VALIDATION OF A TOP-DOWN DESIGNArnaldo Ramos-Torres, Maria del R. Rodriguez-Orellana
pp. 80-89
https://doi.org/10.48009/3_iis_2015_80-89
AN EMPERICAL CASE RESPONSE TO DOES INFORMATION SYSTEMS SUFFER AN IDENTITY CRISIS? A CASE STUDY OF CONFUSION AND MISINFORMATIONAnthony Rodi, Gina Boff, Gary DeLorenzo
pp. 90-98
https://doi.org/10.48009/3_iis_2015_90-98
INFORMATION EXPOSURE MODEL: A FRAMEWORK FOR INDIVIDUAL ASSESSMENT OF RISKS AND BENEFITS FROM USING A WEBSITERobert Leitheiser, L. Roger Yin
pp. 99-107
https://doi.org/10.48009/3_iis_2015_99-107
MSLQ: INSTRUMENT VALIDATION OF MOTIVATION AND LEARNING STRATEGIES FOR ACQUIRING COMPUTER SOFTWARE APPLICATION SKILLSShelia Smith, Catherine Chen
pp. 108-118
https://doi.org/10.48009/3_iis_2015_108-118
TEACHING INTRODUCTORY PROGRAMMING WITH GAME DESIGN AND PROBLEM-BASED LEARNINGAndrey Soares, Frederico Fonseca, Nancy Martin
pp. 128-137
https://doi.org/10.48009/3_iis_2015_128-137
BUSINESS INTELLIGENCE AND IPAD TECHNOLOGY RAISING THE BAR IN PUBLIC EDUCATION: A QUANTITATIVE STUDYJoseph Compomizzi, Shana D'Aurora, Bryan D'Aurora
pp. 119-137
https://doi.org/10.48009/3_iis_2015_119-127
NEW TECHNOLOGY ADOPTION: EMBRACING CULTURAL INFLUENCESDebra J. Borkovich, Jennifer Breese-Vitelli, Robert Skovira
pp. 138-147
https://doi.org/10.48009/3_iis_2015_138-147
THE DEVELOPMENT OF A USABILITY INSTRUMENT FOR E-LEARNING IN EDUCATIONAL SETTINGSZoroayka Sandoval
pp. 148-155
https://doi.org/10.48009/3_iis_2015_148-155
THE EFFECT OF OPERATING SYSTEMS AND TYPES OF APPS ON PURCHASE INTENTIONHsiu-Li Liao, Su-Houn Liu, Chih-Chung Cheng
pp. 156-163
https://doi.org/10.48009/3_iis_2015_156-163
ENGAGING A DIVERSE STUDENT AUDIENCE IN AN INFORMATION SECURITY COURSELynn Heinrichs
pp. 164-171
https://doi.org/10.48009/3_iis_2015_164-171
IMPOVING LEARNING OUTCOMES OF TEXTBOOK CONTENT WITH A SUPPLEMENTARY LEARNING MODULE: A CASE FOR BASIC CRYPTOLOGYWenli Wang
pp. 172-182
https://doi.org/10.48009/3_iis_2015_172-182
AN EXPLORATORY STUDY ON THE RELATIONSHIP BETWEEN DIGITAL GAMES AND TRANSFER OF LEARNINGC. Frank Lee, Rebecca Giorcelli
pp. 183-190
https://doi.org/10.48009/3_iis_2015_183-190
CYBERSECURITY: CHALLENGES FROM A SYSTEMS, COMPLEXITY, KNOWLEDGE MANAGEMENT AND BUSINESS INTELLIGENCE PERSPECTIVESusan Tisdale
pp. 191-198
https://doi.org/10.48009/3_iis_2015_191-198
DO BUSINESS STUDENTS USE TECHNOLOGY TO CHEAT AND DO BUSINESS FACULTY TAKE ANY ACTIONS ABOUT IT?Lisa Bain, Neelima Bhatnagar
pp. 199-208
https://doi.org/10.48009/3_iis_2015_199-208
EFFECTIVE NETWORK SECURITY AUDIT TRAIL MANAGEMENT PRACTICES: AN EXPLORATORY STUDYDaniel O'Kelley, Richard Ye, Christopher Jones, David Miller
pp. 209-218
https://doi.org/10.48009/3_iis_2015_209-218
ASSESSING THE EFFECTIVENESS OF BUSINESS INTELLIGENCE AS A STRATEGICALLY IMPORTANT DEPLOYMENTTaryn Stanko, James Sena, Mark Sena
pp. 219-229
https://doi.org/10.48009/3_iis_2015_219-229
INTO THE DEPTHS OF THE INTERNET: THE DEEP WEBMarcus Tapia, Jack Shorter
pp. 230-237
https://doi.org/10.48009/3_iis_2015_230-237
BRING YOUR OWN DEVICE TO WORK: BENEFITS, SECURITY RISKS, AND GOVERNANCE ISSUES Jamie Pinchot, Karen Paullet
pp. 238-244
https://doi.org/10.48009/3_iis_2015_238-244