Table of Contents -
Volume 16, Issue 4
DIGITAL BADGES IN HIGHER EDUCATION: A THREE-PHASE STUDY ON THE IMPLEMENTATION OF DIGITAL BADGES IN AN ONLINE UNDERGRADUTE PROGRAMMaria Elena Corbeil, Joseph Rene Corbeil, Ignacio Rodriguez
pp. 1-9
https://doi.org/10.48009/4_iis_2015_1-9
USERSâ PERCEPTIONS ON THE BRIGHTSPACE LEARNING MANAGEMENT SYSTEMSimone Moseley, Taiwo Ajani
pp. 10-19
https://doi.org/10.48009/4_iis_2015_10-19
A 3D LEARNING GAME TO FOSTER COMPUTATIONAL THINKING IN K-12 EDUCATION Myungjae Kwak, Kirill Yurov, Kevin Floyd
pp. 20-29
https://doi.org/10.48009/4_iis_2015_20-29
DATA MINING ANALYSIS AND PREDICTIONS OF REAL ESTATE PRICESVictor Gan, Vaishali Agarwal, Ben Kim
pp. 30-36
https://doi.org/10.48009/4_iis_2015_30-36
AN EXPLORATORY STUDY OF EXPECTED BUSINESS VALUE OF CLOUD COMPUTINGTa-Tao Chuang, Kazuo Nakatani, Thoma Teming Chen
pp. 37-47
https://doi.org/10.48009/4_iis_2015_37-47
THE CURRENT STATE OF E-BOOKS AND DIGITAL LIBRARIES OF JAPANHisaki Goto, Ben Kim, Kohji Inagaki
pp. 48-57
https://doi.org/10.48009/4_iis_2015_48-57
INTERNET OF THINGS-BASED HEALTH MONITORING AND MANAGEMENT DOMAIN-SPECIFIC ARCHITECTURE PATTERNRobert Samuel, Dennis Connolly
pp. 58-63
https://doi.org/10.48009/4_iis_2015_58-63
THE MANAGEMENT OF A WEBSITEâS HISTORICAL LINKS AND DOCUMENTS David Chao
pp. 64-69
https://doi.org/10.48009/4_iis_2015_64-69
DOES THE MALE PROGRAMMING STUDENT THINK FEMALES SHOULD BE STUDYING COMPUTER TECHNOLOGY?Jeanne Baugh
pp. 70-76
https://doi.org/10.48009/4_iis_2015_70-76
THE PRIVACY OF INFORMATION IN CLOUD COMPUTING Rosarito Sanchez-Morcilio, Francisco Quiles-Torres
pp. 77-85
https://doi.org/10.48009/4_iis_2015_77-85
AFTER THE DATA BREACH: NOTIFICATION LAWS AND MOREJanet Ford, Barbara Jo White, Kristin White
pp. 86-94
https://doi.org/10.48009/4_iis_2015_86-94
SNS CHOICE AND USAGE: A COMPREHENSIVE RESEARCH MODELFang Deng, Zhenyu Huang, Dalaa Alqahtani, James J. Cappel
pp. 95-101
https://doi.org/10.48009/4_iis_2015_95-101
USING K-MEANS CLUSTERING TO MODEL STUDENTSâ LMS PARTICIPATION IN TRADITIONAL COURSES Klara Nelson
pp. 102-110
https://doi.org/10.48009/4_iis_2015_102-110
CRITICAL FACTORS IN THE ADOPTION OF OPEN SOURCE TECHNOLOGIESAnidza Valentin-Rodriguez, Ãngel Ojeda-Castro, Macedonio Alanis-Gonzalez, Eulalia Márquez-MartÃnez, Aury Curbelo-Ruiz
pp. 111-120
https://doi.org/10.48009/4_iis_2015_111-120
A SECURITY VULNERABILITIES ANALYSIS OF THE APACHE BIG DATA STACK AND HIGH PERFORMANCE COMPUTING TECHNOLOGIESJames Sissom, Alex Glasnovich
pp. 121-123
https://doi.org/10.48009/4_iis_2015_121-123
AN EXPLORATORY STUDY OF STUDENT PERCEPTIONS OF MEDIA ARTICLES IN THE MAINSTREAMCarl M. Rebman, Debra Kelly, Queen E. Booker, Richard E. Custin
pp. 124-131
https://doi.org/10.48009/4_iis_2015_124-131
LESSONS LEARNED FROM TEACHING PROJECT-BASED SYSTEMS ANALYSIS AND DESIGNWenli Wang
pp. 132-142
https://doi.org/10.48009/4_iis_2015_132-142
WHAT IS SO DIFFERENT ABOUT STEM INTERNSHIPS?Kirsten Martinez, Barbara Jo White, Jennifer Williams
pp. 143-151
https://doi.org/10.48009/4_iis_2015_143-151
CASE STUDY: LESSONS LEARNED IN LAUNCHING AN INTEGRATED ONLINE GRADUATE BUSINESS ANALYTICS PROGRAMMary Dunaway, Richard McCarthy
pp. 152-156
https://doi.org/10.48009/4_iis_2015_152-156
CASE STUDY: EXPLORATION OF HOW TECHNOLOGY AND SOCIAL MEDIA USE IS RELATED TO INTERNET PRIVACY CONCERNS IN A DIRECT SALES ORGANIZATIONRobert Totterdale
pp. 157-165
https://doi.org/10.48009/4_iis_2015_157-165
ANTECEDENT DETERMINANTS OF BELIEFS UNDERPINNING THE INTENTION TO ACCEPT AND USE BUSINESS INTELLIGENCE SYSTEMS: THE IMPORTANCE OF ORGANIZATIONAL FACTORSTanja Grubljesic, Pedro Simoes Coelho, Jurij Jaklic
pp. 166-177
https://doi.org/10.48009/4_iis_2015_166-177
THE EDUCATIONAL AND CAREER BACKGROUNDS OF CIOSJohn Anderson, Nicholas Ball
pp. 178-182
https://doi.org/10.48009/4_iis_2015_178-182
STUDENT LEARNING IN A RAPID FEEDBACK ENVIRONMENTNicholas Ball, Gove Allen
pp. 183-193
https://doi.org/10.48009/4_iis_2015_183-193
THE IMPACT OF DISRUPTIVE TECHNOLOGY: THE INTERNET OF THINGSKyle Ebersold, Richard Glass
pp. 194-201
https://doi.org/10.48009/4_iis_2015_194-201
A DISCUSSION ABOUT CULTURE AND INFORMATION SECURITY POLICY COMPLIANCE: A SUB-CULTURALLY BOUND DETERMINANTâ"REDEFINING THE HOFSTEDE HYPOTHESISFahad Al-Khalifa, Frederick Kohun, Robert Skovira
pp. 202-208
https://doi.org/10.48009/4_iis_2015_202-208
OPENING THE âBLACK BOXâ OF COLLECTIVE INTELLIGENCE: A CRITICAL REFLECTIONChristian Wagner, Ayoung Suh
pp. 209-214
https://doi.org/10.48009/4_iis_2015_209-214
STUDENT PERSPECTIVES OF CHEATING IN ONLINE CLASSESDavid Douglas, Karen Paullet, Adnan Chawdhry
pp. 215-223
https://doi.org/10.48009/4_iis_2015_215-223
EDUCATING THE TECHNOLOGY OFFICER OF THE FUTURE: A NEEDS ANALYSISChristopher Wydra, Frank Hartle III
pp. 224-231
https://doi.org/10.48009/4_iis_2015_224-231
POWER OF THE PEOPLE: A CASE STUDY USING FACEBOOK AS A DATA SOURCE IN QUALITATIVE RESEARCHG. Chris Nelson
pp. 232-238
https://doi.org/10.48009/4_iis_2015_232-238