Table of Contents -
Volume 20, Issue 3
REFLECTIONS ON SECURITY COURSES IN CIS CURRICULUM AFTER ATTENDING A CAE WORKSHOP Lisa Z. Bain, Suzanne Mello-Stark
pp. 1-10
https://doi.org/10.48009/3_iis_2019_1-10
ANTECEDENTS TO SUCCESSFUL SOFTWARE TRAINING: A RESEARCH FRAMEWORK & PRELIMINARY EVIDENCE Douglas Havelka, T.M. Rajkumar
pp. 11-21
https://doi.org/10.48009/3_iis_2019_11-21
SOCIAL MEDIA AND CHEATING: IS THERE A NEED TO REVIEW YOUR ACADEMIC INTEGRITY POLICY? Philip Kim, Joseph V. Homan
pp. 22-27
https://doi.org/10.48009/3_iis_2019_22-27
CYBER-SECURITY INSTRUCTIONAL TECHNOLOGY DESIGN Billy Carrie, Hayden Wimmer, Loreen Powell, Carl Rebman
pp. 28-36
https://doi.org/10.48009/3_iis_2019_28-36
SECURE PROTOCOLS AND VIRTUAL PRIVATE NETWORKS: AN EVALUATION Raymond Angelo
pp. 37-46
https://doi.org/10.48009/3_iis_2019_37-46
BROADENING PARTICIPATION IN CYBERSECURITY EDUCATION: USING AN INTERSECTIONALITY LENS TO UNCOVER NEW PERSPECTIVES Debra Nakama, Karen Paullet
pp. 47-56
https://doi.org/10.48009/3_iis_2019_47-56
COMMAND-BASED CODING USING R FOR DATA SCIENCE Jianfeng Wang, Linwu Gu
pp. 57-63
https://doi.org/10.48009/3_iis_2019_57-63
FACTORS INFLUENCING CURRICULUM ADOPTION IN UNDERGRADUATE CYBERSECURITY PROGRAMS Todd A. Whittaker, Cherie Noteboom
pp. 64-73
https://doi.org/10.48009/3_iis_2019_64-73
HIGH SCHOOL STUDENTS? PERCEPTIONS OF CYBERSECURITY: AN EXPLANATORY CASE STUDY Kodey S. Crandall, Cherie Noteboom, Omar El-Gayar, Kalee Crandall
pp. 74-82
https://doi.org/10.48009/3_iis_2019_74-82
CONDUCTING SYSTEMATIC LITERATURE REVIEWS IN INFORMATION SYSTEMS: AN ANALYSIS OF GUIDELINES Zefeng Bai, Nitin Jain, Roman Kurdyukov, Joanna Walton, Ying Wang, Tyler Wasson, Xiaolin Zhu, Alina M. Chircu
pp. 83-93
https://doi.org/10.48009/3_iis_2019_83-93
THE AGILE PROJECT MANAGEMENT UNDERPINNINGS: BACKLOG REFINEMENT, TEAM COMPOSITION, AND BACKLOG PREPARATION Rosarito Sanchez-Morcilio, Francisco Quiles-Torres
pp. 94-106
https://doi.org/10.48009/3_iis_2019_94-106
EXAMINING A DEEP LEARNING NETWORK SYSTEM FOR IMAGE IDENTIFICATION AND CLASSIFICATION FOR PREVENTING UNAUTHORIZED ACCESS FOR A SMART HOME SECURITY SYSTEM Beloved Egbedion, Hayden Wimmer, Carl M. Rebman Jr., Loreen M. Powell
pp. 107-116
https://doi.org/10.48009/3_iis_2019_107-116
USING DATA MINING TECHNIQUES FOR GAME RULE EXTRACTION Chen-Huei Chou
pp. 117-127
https://doi.org/10.48009/3_iis_2019_117-127
A CASE BASED ANALYSIS OF ORGANIZATIONAL SECURITY GOVERNANCE DIMENSIONS: USER INVOLVEMENT, PROCESS INTEGRITY AND RESOURCE ALLOCATION Sushma Mishra
pp. 128-138
https://doi.org/10.48009/3_iis_2019_128-138
CYBERSECURITY INERTIA AND SOCIAL ENGINEERING: WHO'S WORSE, EMPLOYEES OR HACKERS? Debra J. Borkovich, Robert Joseph Skovira
pp. 139-150
https://doi.org/10.48009/3_iis_2019_139-150
A MODEL GRADUATE ENTERPRISE SECURITY COURSE Manouchehr Tabatabaei, James K. Harris
pp. 151-157
https://doi.org/10.48009/3_iis_2019_151-157
IS WECHAT SOCIAL TECHNOLOGY FITTING TO A WECHAT BRAND GROUP? Linwu Gu, Jianfeng Wang
pp. 158-164
https://doi.org/10.48009/3_iis_2019_158-164
STRATEGIC MARKETING AND CYBERSECURITY: THE CASE OF DATA BREACHES George Kirk, Jose Noguera
pp. 165-174
https://doi.org/10.48009/3_iis_2019_165-174
POLICE USE OF SOCIAL MEDIA: COMPARING CLASSIFICATION METHODS Kevin Mentzer, Jane Fedorowicz, Christine Williams
pp. 175-185
https://doi.org/10.48009/3_iis_2019_175-185
INCREASING THE EFFECTIVENESS OF THE CYBERSECURITY TEACHING AND LEARNING BY APPLYING ACTIVITY THEORY AND NARRATIVE RESEARCH Constanta-Nicoleta Bodea, Maria-Iuliana Dascalu, Mihail Cazacu
pp. 186-193
https://doi.org/10.48009/3_iis_2019_186-193
INTEGRATING EXPERIENTIAL LEARNING: USING AN EHR SYSTEM TO TEACH CDSS IN HEALTH INFORMATICS Kalyani Ankem, Vishal Uppala, Adam Durst
pp. 194-207
https://doi.org/10.48009/3_iis_2019_194-207
A FRAMEWORK FOR A SMARPHONE NATURAL LANGUAGE-DRIVEN HEALTHCARE MONITOR AND ADVISOR USING WEARABLE DEVICES George Stefanek, Marianne Curia, Janet Garwood
pp. 208-213
https://doi.org/10.48009/3_iis_2019_208-213