Table of Contents -
Volume 17, Issue 4
THE GREY AREAS OF BIG DATA ANALYTICSGwendolyn White, Thilini Ariyachandra
pp. 1-7
https://doi.org/10.48009/4_iis_2016_1-7
SMARTPHONE AND APP USAGE AMONG COLLEGE STUDENTS: USING SMARTPHONES EFFECTIVELY FOR SOCIAL AND EDUCATIONAL NEEDSGayle Jesse
pp. 8-20
https://doi.org/10.48009/4_iis_2016_8-20
SECURING THE INTERNET OF THINGS: A REVIEWMatthew Ahlmeyer, Alina Chircu
pp. 21-28
https://doi.org/10.48009/4_iis_2016_21-28
CONCEPT PAPER FOR RESEARCHING THE PERCEPTIONS OF HIGHER EDUCATION SOCIAL MEDIA SITES: HOW ARE SCHOOL SOCIAL MEDIA SITES ENGAGING DIGITAL NATIVESâ COMPARED TO NON-TRADITIONAL STUDENTS?Kenneth Marsilio
pp. 29-35
https://doi.org/10.48009/4_iis_2016_29-35
DEEP WEB, DARK WEB, INVISIBLE WEB AND THE POST ISIS WORLDRyan Ehney, Jack Shorter
pp. 36-41
https://doi.org/10.48009/4_iis_2016_36-41
INTEGRATING SAP PROJECT SYSTEM INTO AN IS PROJECT MANAGEMENT COURSEMing Wang, Lei Jin
pp. 42-50
https://doi.org/10.48009/4_iis_2016_42-50
WHOâS KNOCKING AT MY DOOR: DEVELOPING A WEB SERVICE VISUALIZATION TOOL FOR MONITORING USER ACCOUNT HEALTHThomas Chapman
pp. 51-57
https://doi.org/10.48009/4_iis_2016_51-57
RECOVERING FROM THE NIGHTMARE OF RANSOMWARE â" HOW SAVVY USERS GET HIT WITH VIRUSES AND MALWARE: A PERSONAL CASE STUDYAzad Ali, Raj Murthy, Frederick Kohun
pp. 58-69
https://doi.org/10.48009/4_iis_2016_58-69
THE BURDEN OF KNOWLEDGE MANAGEMENT IN THE INFORMATION AGE: A THEORETICAL APPROACH TO MITIGATING LOST KNOWLEDGEBenjamin Stahl, Brian Buckles
pp. 70-81
https://doi.org/10.48009/4_iis_2016_70-81
USING TECHNOLOGY TO DETECT AND DETER ELECTRONIC CHEATING AT A LARGE PUBLIC UNIVERSITYNicholas Ball, Robert Wood, Robert Wood, Gove Allen
pp. 82-90
https://doi.org/10.48009/4_iis_2016_82-90
THE DELPHI TECHNIQUE: LESSONS LEARNED FROM A FIRST TIME RESEARCHERChristopher Gray
pp. 91-97
https://doi.org/10.48009/4_iis_2016_91-97
A LEARNING MODULE FOR ADVANCED CRYPTOLOGYWenli Wang
pp. 98-108
https://doi.org/10.48009/4_iis_2016_98-108
GRADUATE STUDENT PERCEPTIONS OF PERSONAL SOCIAL MEDIA RISK: A COMPARISON STUDYSamuel Goh, Paul Gangi, Julio Rivera, James Worrell
pp. 109-119
https://doi.org/10.48009/4_iis_2016_109-119
WAR GAMES: SIMULATION VS. VIRTUAL MACHINES IN CYBERSECURITY EDUCATIONMatthew North
pp. 120-126
https://doi.org/10.48009/4_iis_2016_120-126
TRACING AND MANAGING A ROGUE CLOUD BASED SERVICE THROUGH A MOBILE APPDennis Guster, Paul Safonov, Raqeeb Abdul
pp. 127-136
https://doi.org/10.48009/4_iis_2016_127-136
IDENTIFYING DATA SCIENCE AND ANALYTICS COMPETENCIES BASED ON INDUSTRY DEMANDAshraf Shirani
pp. 137-144
https://doi.org/10.48009/4_iis_2016_137-144
THE INTERNET OF THINGS: A CAUSE FOR ETHICAL CONCERNKyle Ebersold, Richard Glass
pp. 145-151
https://doi.org/10.48009/4_iis_2016_145-151
MOBILE LEARNING IN MALAYSIA EDUCATION INSTITUTIONSMaslin Masrom, Amirah Syahmi Nadzari, Nik Hasnaa Nik Mahmood, Wan Normeza Wan Zakaria, Nor Raihana Mohd Ali
pp. 152-157
https://doi.org/10.48009/4_iis_2016_152-157
FACULTY PERCEPTIONS OF VIDEO CONFERENCING TECHNOLOGYKevin S. Floyd, Neil Rigole, Alan Stines
pp. 158-166
https://doi.org/10.48009/4_iis_2016_158-166
SOCIAL MEDIA IMPLOSION: CONTEXT COLLAPSE!Debra J. Borkovich, Jennifer Breese
pp. 167-177
https://doi.org/10.48009/4_iis_2016_167-177
DOWNLOAD INTENTION IN THE MOBILE APPLICATION MARKETPLACEChien-Yun Yuan, Wen-Hai Chih, Chia-Yi Huang
pp. 178-186
https://doi.org/10.48009/4_iis_2016_178-186
IMPACT OF ELECTRONIC HEALTH RECORDS ON PATIENT OUTCOMESLilian Ndifon, Jude Edwards, Leila Halawi
pp. 187-196
https://doi.org/10.48009/4_iis_2016_187-196
HOW LONG DO EMPLOYEES REMEMBER INFORMATION SECURITY TRAINING PROGRAMS? A STUDY OF KNOWLEDGE ACQUISITION AND RETENTIONPhilip Kim, Joseph Homan, Richard Metzer
pp. 197-207
https://doi.org/10.48009/4_iis_2016_197-207
UNBREAKABLE: A CONCISE OVERVIEW OF CYBERSECURITYKristi Berg, Joseph Crawford, Thomas Seymour
pp. 208-221
https://doi.org/10.48009/4_iis_2016_208-221
A LAYERED ARCHITECTURAL APPROACH TO UNDERSTANDING DISTRIBUTED CRYPTOGRAPHIC LEDGERSRobert Samuel
pp. 222-226
https://doi.org/10.48009/4_iis_2016_222-226
ARCHITECTING A CYBERSECURITY MANGEMENT FRAMEWORKSusan Tisdale
pp. 227-236
https://doi.org/10.48009/4_iis_2016_227-236
USING LMS DATA TO UNDERSTAND HOW STUDENTS USE COURSE TOOLSQueen Booker, Carl Rebman
pp. 237-245
https://doi.org/10.48009/4_iis_2016_237-245
DOWNLOADING MOBILE APPS: ARE STUDENTS AWARE OF THE SECURITY RISKS?Adnan Chawdhry, Karen Paullet, David Douglas, Joseph Compomizzi
pp. 246-253
https://doi.org/10.48009/4_iis_2016_246-253
LEGAL ETHICS AND CONCERNS WITH SECURITY IN A BRING YOUR OWN DEVICE PROGRAMMisty Kiernan
pp. 254-259
https://doi.org/10.48009/4_iis_2016_254-259
KNOWLEDGE MANAGEMENT USING STUDENT FEEDBACK: A STUDY OF ONLINE STUDENTSâ LIVED EXPERIENCES ON VIRTUAL TEAMSMichael Lohle, Steven Terrell
pp. 260-265
https://doi.org/10.48009/4_iis_2016_260-265