International Association for Computer Information Systems
Tuesday, May 11, 2021

Table of Contents - Volume 20, Issue 2



A COMPARATIVE STUDY ANALYZING COMPUTER PROGRAMMING COLLEGE STUDENTS' PRE-KNOWLEDGE AND POST-KNOWLEDGE OF SOFTWARE APPLICATION SECURITY USING OWASP
Mel Tomeo, Wilfred Mutale, John Scarpino, Lee Cottrell
pp. 1-8
https://doi.org/10.48009/2_iis_2019_1-8

STUDENT PERCEPTIONS OF SKILLS AND COMPETENCIES NEEDED FOR CYBERSECURITY PROGRAMS AND CAREERS
Sushma Mishra, Jamie Pinchot, Donna Cellante, Karen Paullet
pp. 9-17
https://doi.org/10.48009/2_iis_2019_9-17

AN EXPLORATORY STUDY OF EFFICACY OF COMMON BUSINESS CRITICAL THINKING COURSE: DO CIS MAJORS PERFORM BETTER THAN OTHER BUSINESS MAJORS?
Kazuo Nakatani, Judy Wynekoop
pp. 18-28
https://doi.org/10.48009/2_iis_2019_18-28

A DESIGN OF AN AUTOMATED PARKING SYSTEM ON A SMART CAMPUS
Delaney Brown, SeongYong Hong
pp. 29-37
https://doi.org/10.48009/2_iis_2019_29-37

EMPHASIZING SECURITY AND WRITING IN A CROSS-DISCIPLINARY COURSE FOR COMPUTER INFORMATION SYSTEMS AND BUSINESS LAW STUDENTS
Lorrie Willey, Barbara Jo White
pp. 38-46
https://doi.org/10.48009/2_iis_2019_38-46

TRENDS IN BLOCKCHAIN AND NEWER TECHNOLOGIES USES IN LOGISTICS AND SUPPLY CHAIN MANAGEMENT
Ephrem Eyob, Simon Eyob
pp. 47-55
https://doi.org/10.48009/2_iis_2019_47-55

THE USE OF MACHINE LEARNING IN HIGHER EDUCATION
Frank Swiontek, Assion Lawson-Body, Laurence Lawson-Body
pp. 56-61
https://doi.org/10.48009/2_iis_2019_56-61

WHAT IS CYBERSECURITY AND WHAT CYBERSECURITY SKILLS ARE EMPLOYERS SEEKING?
Alan Peslak, D. Scott Hunsinger
pp. 62-72
https://doi.org/10.48009/2_iis_2019_62-72

HEALTHCARE PROFESSIONALS' PERCEPTION OF THE USABILITY OF ELECTRONIC MEDICAL RECORDS
Peter Draus, Sushma Mishra, Kevin Slonka, Natalya Bromall, Kelli Slonka
pp. 73-82
https://doi.org/10.48009/2_iis_2019_73-82

CYBERBULLYING: IMPORTANT CONSIDERATIONS
Allen D. Truell, Jensen J. Zhao, Edward J. Lazaros, Christopher Davison, Dakota L. D. Nicley
pp. 83-88
https://doi.org/10.48009/2_iis_2019_83-88

RESEARCH ON SECURITY VISUALIZATION: A SURVEY
Shuyi Liu, Wu He, Xin Tian
pp. 89-96
https://doi.org/10.48009/2_iis_2019_89-96

COMPARISON OF PUBLISHED PROGRAM OUTCOMES WITH STUDENT AND FACULTY EXPECTED OUTCOMES USING A CONSTRUCTIVIST ALIGNMENT APPROACH
Peter Draus
pp. 97-104
https://doi.org/10.48009/2_iis_2019_97-104

THE EFFECTS OF NATIONAL CULTURE DIMENSIONS AND ONLINE MEDIUM TYPE ON DECISION CONFIDENCE: A STUDY BASED ON US AND CHINA
Xiang Fang, T.M. Rajkumar, Mark P. Sena
pp. 105-116
https://doi.org/10.48009/2_iis_2019_105-116

A NOVEL OS-ELM CLASSIFIER BASED ON HOG FEATURE EXTRACTION AND VIOLA JONES ALGORITHM FOR FACIAL RECOGNITION
Ankit Rajpal, Anurag Mishra, Khushwant Sehra
pp. 117-127
https://doi.org/10.48009/2_iis_2019_117-127

THE YIN AND YANG OF A DOCTOR OF SCIENCE IN INFORMATION SYSTEMS AND COMMUNICATIONS PROGRAM: PERSONAL REFLECTIONS AND REVERSE ENGINEERING
Fred Hoffman, Chaojie Wang, Alvi Lim, Jin Kwon
pp. 128-139
https://doi.org/10.48009/2_iis_2019_128-139

BLOCKCHAIN TECHNOLOGY ADOPTION IN SUPPLY CHANGE MANAGEMENT: TWO THEORETICAL PERSPECTIVES
Jennifer L. Breese, Sung-Jin Park, Ganesh Vaidyanathan
pp. 140-150
https://doi.org/10.48009/2_iis_2019_140-150

DEVELOPING AN E-COMMERCE DATABASE WEB APPLICATION FOR UNIVERSITY SPORT CONCESSION EVENT: A TEACHING CASE
Thomas L. Ngo-Ye, Jae J. Choi, Dexter Gittens
pp. 151-161
https://doi.org/10.48009/2_iis_2019_151-161

ECONOMIC COSTS AND IMPACTS OF BUSINESS DATA BREACHES
Ping Wang, Hubert D'Cruze, David Wood
pp. 162-171
https://doi.org/10.48009/2_iis_2019_162-171

PRIVACY AND SECURITY TRIBULATIONS IN THE DIGITAL CULTURE
S.C. Spangler
pp. 172-182
https://doi.org/10.48009/2_iis_2019_172-182

FALSIFYING PERSONAL DATA TO ADDRESS ONLINE PRIVACY ISSUES
Vasilka Chergarova, Ling Wang
pp. 183-194
https://doi.org/10.48009/2_iis_2019_183-194

MAPPING THE STRUCTURE OF A TWITTER 'SECURITY EXPERT' SOCIAL NETWORK
John E. Anderson, Daniel McDonald
pp. 195-205
https://doi.org/10.48009/2_iis_2019_195-205

ENTER THE TWILIGHT ZONE: THE PARADOX OF THE DIGITAL NATIVE
Nancy Marksbury, Enid Arbelo Bryant
pp. 206-215
https://doi.org/10.48009/2_iis_2019_206-215

INFORMATION TECHNOLOGY STRATEGIES FOR SMALL BUSINESSES
Mysore Ramaswamy
pp. 216-225
https://doi.org/10.48009/2_iis_2019_216-225