Table of Contents -
Volume 20, Issue 1
PREDICTORS OF SUCCESS IN SECURITY AND DATA PROTECTION AWARENESS OF MOBILE DEVICES: TRUST AND PRIVACY Alex Koohang, Joanna Paliszkiewicz, Jeretta Horn Nord, Karen Paullet, Tara Underwood
pp. 1-11
https://doi.org/10.48009/1_iis_2019_1-11
OVERVIEW OF BLOCKCHAIN LEGISLATION AND ADOPTION: STATUS AND CHALLENGES Selam E. Eyassu
pp. 12-21
https://doi.org/10.48009/1_iis_2019_12-21
FACTORS RELATED TO LARGER BUT FEWER WILDFIRES AND FEWER DEER IN CALIFORNIA: A GOOGLE SITES KNOWLEDGE BASE G. Kent Webb
pp. 22-31
https://doi.org/10.48009/1_iis_2019_22-31
APPROPRIATE SAMPLE FOR TECHNOLOGY ADOPTION STUDIES IN TECHNICAL EDUCATION Shannon W. Beasley
pp. 32-39
https://doi.org/10.48009/1_iis_2019_32-39
WHAT REALLY MATTERS IN ONLINE EDUCATION? Wenli Wang, Alan Peslak, Paul Kovacs, Lisa Kovalchick
pp. 40-48
https://doi.org/10.48009/1_iis_2019_40-48
IT PROFESSIONAL USERS AND VENDORS? PERCEPTIONS OF THE KEY FACTORS IN ADOPTING CLOUD-MANAGED NETWORKS TECHNOLOGY Chalermpon Kesa, Peter Draus
pp. 49-59
https://doi.org/10.48009/1_iis_2019_49-59
HABITS OF HIGHLY PRODUCTIVE INFORMATION SYSTEMS USERS: A LOOK AT ONE UNIVERSITY'S FACULTY, STAFF, AND STUDENTS Gayle R. Jesse, Lily J. Pharris
pp. 60-69
https://doi.org/10.48009/1_iis_2019_60-69
BIG DATA STUDIES: A SYSTEMATIC REVIEW Mehmet Ali Koseoglu, Mehmet Yildiz, John P. Girard
pp. 70-79
https://doi.org/10.48009/1_iis_2019_70-79
CYBER CRIME AND CYBER SECURITY AWARENESS AMONG STUDENTS: A COMPARATIVE STUDY IN ISRAEL AND SLOVENIA Dusan Lesjak, Moti Zwilling, Galit Klein
pp. 80-87
https://doi.org/10.48009/1_iis_2019_80-87
DESIGNING A DOCTORAL PROGRAM IN CYBERSECURITY FOR WORKING PROFESSIONALS Ping Wang, Fred Kohun
pp. 88-99
https://doi.org/10.48009/1_iis_2019_88-99
ENHANCING ORGANIZATIONAL CYBERSECURITY: A HANDS-ON IMMERSIVE LEARNING PROJECT Jensen J. Zhao, Allen D. Truell, Edward J. Lazaros, Chris Davison
pp. 100-107
https://doi.org/10.48009/1_iis_2019_100-107
A PRELIMINARY INVESTIGATION OF QUALITY METRICS AND PERFORMANCE FOR SELECTED INSTITUTIONS DELIVERING TECHNOLOGY MEDIATED HIGHER EDUCATION Suhong Li, Kamel Rouibah, Hal Records, Robert Behling
pp. 108-118
https://doi.org/10.48009/1_iis_2019_108-118
INDUSTRIAL INTERNET OF THINGS VULNERABILITIES AND THREATS: WHAT STAKEHOLDERS NEED TO CONSIDER Fred Hoffman
pp. 119-133
https://doi.org/10.48009/1_iis_2019_119-133
AN EVALUATION OF A MULTILINGUAL CHATBOT Mahesh Vanjani, Jamison Posey, Milam Aiken
pp. 134-143
https://doi.org/10.48009/1_iis_2019_134-143
AGILE AND SECURE SOFTWARE DEVELOPMENT: AN UNFINISHED STORY David Bishop, Pam Rowland
pp. 144-156
https://doi.org/10.48009/1_iis_2019_144-156
PROPOSING A NEW GRADUATE DEGREE IN DATA ENGINEERING AND ANALYTICS Kimberly W. Bartholomew, John E. Anderson
pp. 157-167
https://doi.org/10.48009/1_iis_2019_157-167
INFLUENCING THE FUTURE: ADOLESCENT GIRLS? PERCEPTIONS OF CYBERSECURITY CAREERS Pam Rowland, Cherie Noteboom
pp. 168-177
https://doi.org/10.48009/1_iis_2019_168-177
PRIVACY: THE MISSING "V" IN BIG DATA ANALYTICS Christopher B. Davison, Allen D. Truell, Edward J. Lazaros, Jensen J. Zhao
pp. 178-185
https://doi.org/10.48009/1_iis_2019_178-185
YOU'VE BEEN HACKED: A TECHNIQUE FOR RAISING CYBER SECURITY AWARENESS David T. Smith, Azad I. Ali
pp. 186-194
https://doi.org/10.48009/1_iis_2019_186-194
SELECTING ENTERPRISE APPLICATIONS FOR CURRICULUM: INSIGHTS FROM A TEACHING INITIATIVE Jae J. Choi, Thomas L. Ngo-Ye
pp. 195-203
https://doi.org/10.48009/1_iis_2019_195-203
PAIRING CONSTRUCTIVISM WITH THE MULTIDISCIPLINARITY OF IS EDUCATION Samuel B. Fee, Amanda Holland-Minkley, Thomas Lombardi
pp. 204-212
https://doi.org/10.48009/1_iis_2019_204-212
A LONGITUDINAL STUDY OF FACEBOOK PRIVACY POLICIES Alan Peslak, Mauri Conforti
pp. 213-223
https://doi.org/10.48009/1_iis_2019_213-223
THE ROLE OF TRADITION IN SYSTEMS ENGINEERING PRACTICE A PRELIMINARY ETHNOGRAPHIC STUDY Paul D. Nugent, Jennifer Flynn
pp. 224-232
https://doi.org/10.48009/1_iis_2019_224-232