Table of Contents -
Volume 17, Issue 1
EMPIRICAL ANALYSIS FOR SUCCESS FACTORS IN UBIQUITOUS SUPPLY CHAIN MANAGEMENT IN THE CASE OF UK COMPANIESChangsu Kim, Jongheon Kim
pp. 1-13
https://doi.org/10.48009/1_iis_2016_1-13
A CIPHER BASED ON THE RANDOM SEQUENCE OF DIGITS IN IRRATIONAL NUMBERSJ.L. Gonzalez-Santander, G. Martin Gonzalez
pp. 14-25
https://doi.org/10.48009/1_iis_2016_14-25
APPLYING THE MULTIDIMENSIONAL ETHICS SCALE IN C2C E-COMMERCEKikua Jones, Lori N. K. Leonard
pp. 26-36
https://doi.org/10.48009/1_iis_2016_26-36
UNDERGRADUATE PERCEPTION OF ONLINE EDUCATION IN JORDAN Salem Alemaishat, Guy Philbin
pp. 37-46
https://doi.org/10.48009/1_iis_2016_37-46
SELECTING CONTENTS FOR A NEW VIRTUALIZATION COURSE IN INFORMATION TECHNOLOGY (IT) TRACKAzad Ali
pp. 47-57
https://doi.org/10.48009/1_iis_2016_47-57
FOR ENHANCING DEMOCRACY IN CHINAJensen Zhao, Sherry Zhao, Melody Alexander, Allen Truell
pp. 58-69
https://doi.org/10.48009/1_iis_2016_58-69
A REPORT ON THE STATE OF MOBILE TECHNOLOGIES WITHIN ORGANIZATIONSJeretta Horn Nord, Alex Koohang, Joanna Paliszkiewicz
pp. 70-79
https://doi.org/10.48009/1_iis_2016_70-79
PHISHING: ARE UNDERGRADUATES AT RISK AND PREPARED?Carl Case, Darwin King
pp. 80-88
https://doi.org/10.48009/1_iis_2016_80-88
CHALLENGES TO MULTI-LAYER FEED FORWARD NEURAL NETWORKS IN INTRUSION DETECTIONLoye Ray
pp. 89-98
https://doi.org/10.48009/1_iis_2016_89-98
DO SOCIAL NETWORKING SITES PRIVACY POLICIES DIFFER? A LINGUISTIC ANALYSIS OF THE TEN MOST POPULAR SOCIAL NETWORKING SITESAlan Peslak
pp. 99-106
https://doi.org/10.48009/1_iis_2016_99-106
ATTRIBUTES OF DATA BREACH NOTIFICATION LAWS IN THE UNITED STATESDavid Green, Nancy Martin
pp. 107-118
https://doi.org/10.48009/1_iis_2016_107-118
ADDING AGILITY TO THE MIS CAPSTONEThom Luce
pp. 119-127
https://doi.org/10.48009/1_iis_2016_119-127
BUREAUCRACY 2.0: THE BUREAUCRATIZATION OF PROFESSIONAL WORKPaul Nugent
pp. 128-135
https://doi.org/10.48009/1_iis_2016_128-135
THE RELATIONSHIP BETWEEN ENGAGEMENT SOFTWARE ANALYSIS AND FINAL GRADES IN ONLINE COURSESRobert Kowalewski, Michel Curran, Barbara Burgess-Lefebvre
pp. 136-148
https://doi.org/10.48009/1_iis_2016_136-148
DIFFERENCES IN EFFECTS OF HELP SEQUENCEâS DELIVERY MEDIUM ON USERS OF DIFFERING LEVELS OF FIELD DEPENDENCEPeter Draus
pp. 149-156
https://doi.org/10.48009/1_iis_2016_149-156
DOES LEARNING STYLE PLAY A ROLE IN COMPUTER INFORMATION SYSTEMS COURSE PERFORMANCE?Wendy Ceccucci, Scott Hunsinger, S.E. Kruck, Alan Peslak, Patricia Sendall
pp. 157-167
https://doi.org/10.48009/1_iis_2016_157-167
TOWARDS A 21ST CENTURY INFORMATION SYSTEMS EDUCATION: HIGH IMPACT PRACTICES AND ESSENTIAL LEARNING OUTCOMESBruce Saulnier
pp. 168-177
https://doi.org/10.48009/1_iis_2016_168-177
A SURVEY OF SOCIAL ENGINEERING VULNERABILITIES IN HEALTH CARE SETTINGSSushma Mishra, Peter Draus, Natalya Goreva, Don Caputo
pp. 178-184
https://doi.org/10.48009/1_iis_2016_178-184
CONFIDENTIALITY, PRIVACY, ACCESSIBILITY AND SECURITY OF BIG DATA USAGES WITHIN MOBILE RECOMMENDER SYSTEMS, AS SOCIETY EMBRACES CLOUD BASED TECHNOLOGYJacob Mack, Theophilus Owusu, John Scarpino
pp. 185-195
https://doi.org/10.48009/1_iis_2016_185-195
U.S. EU SAFE HARBOR & PRIVACY SHIELD: STUDENT EXPLORATION OF GLOBAL IT ISSUES AND PROFESSIONALS WHO DEAL WITH THEMLorrie Willey, Barbara Jo White, Janet Ford
pp. 196-205
https://doi.org/10.48009/1_iis_2016_196-205
ANALYZING RISKS FOR HOME LOANS DURING FINANCIAL CRISIS OF 2008 USING DATA MININGBen Kim, Nina Tunas, Adrian Green
pp. 206-210
https://doi.org/10.48009/1_iis_2016_206-210
KNOWLEDGE MANAGEMENT IN SOFTWARE DEVELOPING ORGANIZATIONS. COMBINING CONCEPTUAL MODELSKarol Chrabanski
pp. 211-220
https://doi.org/10.48009/1_iis_2016_211-220
THE FLOW OF KNOWLEDGE MANAGEMENT IN THE BANKING INDUSTRY IN THE KINGDOM OF SAUDI ARABIA: HOFSTEDE ANALYSIS OF THE CULTURAL CONSTRAINTSRana Alabdan, Jennifer Callen
pp. 221-230
https://doi.org/10.48009/1_iis_2016_221-230
PHISHING OUR CLIENTS: A STEP TOWARD IMPROVING TRAINING VIA SOCIAL ENGINEERINGKevin Slonka, Brian Shrift
pp. 231-241
https://doi.org/10.48009/1_iis_2016_231-241
FRAMES OF MIND: CULTIVATING KNOWLEDGE AND CYBERSECURITYNicole Gong, Guy Philbin
pp. 242-252
https://doi.org/10.48009/1_iis_2016_242-252
IS THE INTEGRATION OF THE STEM DISCIPLINES WITH COMPUTING OCCURRING AT THE SECONDARY SCHOOL LEVEL IN K-12 SCHOOL SYSTEM? AN EXPLORATORY STUDYSushma Mishra, Donna Cellante, Diane Igoche
pp. 253-259
https://doi.org/10.48009/1_iis_2016_253-259
SUPPORTING DOCTORAL STUDENTSâ SELF-DESCRIBED NEEDS WHILE ENROLLED IN A LIMITED-RESIDENCY INFORMATION SYSTEMS DOCTORAL PROGRAMSteven Terrell, Michael Lohle
pp. 260-264
https://doi.org/10.48009/1_iis_2016_260-264