Table of Contents -
Volume 21, Issue 2
PREVENTION OF PHISHING ATTACKS: A THREE-PILLARED APPROACHBryon Miller, Katelin Miller, Xihui Zhang, Mark G. Terwilliger
pp. 1-8
https://doi.org/10.48009/2_iis_2020_1-8
HOW GPA, GMAT, WORK EXPERIENCE, AND AGE PREDICT MBA STUDENTS? READINESS FOR THE 4TH INDUSTRIAL REVOLUTIONJensen J. Zhao, Allen D. Truell, Chris Davison, Edward J. Lazaros
pp. 9-18
https://doi.org/10.48009/2_iis_2020_9-18
A REFLECTIVE LEARNING APPROACH TO TEACHING COMPUTER AND INFORMATION TECHNOLOGY COURSESPing Wang
pp. 19-29
https://doi.org/10.48009/2_iis_2020_19-29
ENHANCING LOYALTY TO MOBILE PAYMENT SERVICES: AN EMPIRICAL STUDYJason Xiong, Hoon Seok Choi, Charlie Chen, Yong Tang
pp. 30-42
https://doi.org/10.48009/2_iis_2020_30-42
THE INTERNET OF THINGS: AN OVERVIEW OF SELECTED SMART HOME TECHNOLOGYCalandra E. Weaver, Edward J. Lazaros, Jensen J. Zhao, Christopher B. Davison, Allen D. Truell
pp. 43-48
https://doi.org/10.48009/2_iis_2020_43-48
THE CONNECTED CAR: A GLIMPSE INTO THE FUTURE OF TRANSPORTATIONDakota L. D. Nicley, Edward J. Lazaros, Allen D. Truell, Jensen J. Zhao, Christopher B. Davison
pp. 49-56
https://doi.org/10.48009/2_iis_2020_49-56
PRIVACY AND SECURITY CONSIDERATIONS OF THE IOT: APPROACHING PRIVACY BY DESIGNChristopher B. Davison, Edward J. Lazaros, Jensen J. Zhao, Allen D. Truell, Brianna Bowles
pp. 57-63
https://doi.org/10.48009/2_iis_2020_57-63
TRUST IN SECURITY AS A SERVICE: A THEORETICAL MODELThomas L. Ngo-Ye, Derek L. Nazareth, Jae J. Choi
pp. 64-74
https://doi.org/10.48009/2_iis_2020_64-74
INTERNET OF THINGS IN HIGHER EDUCATIONSrecko Natek, Dusan Lesjak
pp. 75-84
https://doi.org/10.48009/2_iis_2020_75-84
USING A MULTILINGUAL CHATBOT FOR FOREIGN LANGUAGE PRACTICEMahesh Vanjani, Milam Aiken, Mina Park
pp. 85-92
https://doi.org/10.48009/2_iis_2020_85-92
ANALYZING COLLEGE STUDENTS' PRE-KNOWLEDGE AND POST-KNOWLEDGE OF EMBEDDED SOFTWARE SECURITY AND ITS IMPACT TOWARDS FUTURE INTERNET OF THINGS (IOT) DEVELOPMENTSMel Tomeo, David Hertz, John J. Scarpino, Lee Cottrell, Wilfred Mutale
pp. 93-101
https://doi.org/10.48009/2_iis_2020_93-101
A SIX-DIMENSIONAL FRAMEWORK FOR TELEHEALTH DELIVERYGanesh Vaidyanathan, Mark Fox
pp. 102-111
https://doi.org/10.48009/2_iis_2020_102-111
A STUDY OF THE ROLE OF VR IN MENTAL HEALTH BASED ON PUBLIC OPINIONCian S. Renner, Tyler Cross, Daniel Corrales, Wenying Sun
pp. 112-122
https://doi.org/10.48009/2_iis_2020_112-122
TEACHING INTERNET OF THINGS (IOT) THROUGH SOFTWARE SIMULATIONS WITH PACKET TRACER Ping Wang, Hossein Zare
pp. 123-134
https://doi.org/10.48009/2_iis_2020_123-134
AN APPLIED STUDY OF RNN MODELS FOR PREDICTING CRYPTOCURRENCY PRICESDane Vanderbilt, Kun Xie, Wenying Sun
pp. 135-143
https://doi.org/10.48009/2_iis_2020_135-143
THE EPIPHANY: STUDENTS' PERCEPTIONS OF MANAGEMENT AND TECHNICAL CONTENT IN A GRADUATE ANALYTICS COURSEMichael Lohle, Steven Terrell
pp. 144-149
https://doi.org/10.48009/2_iis_2020_144-149
A COMPUTATIONAL ANALYSIS OF THE IMPACT OF POPULATION AND NUMBER OF POLICE OFFICERS ON ASSAULT AGAINST LAW ENFORCEMENT OFFICERSRudra Panda, Priya Sivaprakasam, Manjeet Rege
pp. 150-157
https://doi.org/10.48009/2_iis_2020_150-157
THE DIFFERENCE OF USING SMARTPHONES AND THE PERCEPTION OF FEAR OF MISSING OUT AMONG COLLEGE STUDENTS - A PRELIMINARY STUDYKustim Wibowo, Azad Ali
pp. 158-166
https://doi.org/10.48009/2_iis_2020_158-166
USING A TEAM PROJECT IN TEACHING COMPUTER NETWORKING AND DATA COMMUNICATIONPing Wang, Raed Sbeit
pp. 167-177
https://doi.org/10.48009/2_iis_2020_167-177
IMPROVING TRAINING OF NEURAL NETWORK INTRUSION DETECTION SYSTEMS USING FUZZY LOGICLoye L. Ray
pp. 178-185
https://doi.org/10.48009/2_iis_2020_178-185
TOWARD A CONCEPTUAL MODEL FOR UNDERSTANDING THE RELATIONSHIPS AMONG MMORPGS|| GAMERS|| AND ADD-ONSQiunan Zhang, Yuelin Zhu, Colin G. Onita, M. Shane Banks, Xihui Zhang
pp. 186-195
https://doi.org/10.48009/2_iis_2020_186-195
PRICE AND PERFORMANCE TRENDS FOR CELLULAR TRAIL CAMERAS EXPLAINED WITH A TIME TREND|| GOOGLE KEYWORD TRENDS|| AND A USE CASE OF SUBURBAN DEER MANAGEMENTG. Kent Webb
pp. 196-205
https://doi.org/10.48009/2_iis_2020_196-205
IMPACT OF BLOCKCHAIN TECHNOLOGY ON THE CONTINUOUS AUDITING: MEDIATING ROLE OF TRANSACTION COST THEORYZsofia Barandi, Assion Lawson-Body, Laurence Lawson-Body, Lori Willoughby
pp. 206-212
https://doi.org/10.48009/2_iis_2020_206-212
DIGITAL TRIBALISM AND THE INTERNET OF THINGS: CHALLENGES AND OPPORTUNITIESAJ Grant
pp. 213-220
https://doi.org/10.48009/2_iis_2020_213-220
SENTIMENT ANALYSIS ON GOOGLE CLOUD PLATFORMTerrence E. White, Manjeet Rege
pp. 221-228
https://doi.org/10.48009/2_iis_2020_221-228
BUILDING AN ANALYTICAL MODEL TO PREDICT WORKFORCE OUTCOMES IN MEDICAL EDUCATIONLogan Butler, Manjeet Rege
pp. 229-237
https://doi.org/10.48009/2_iis_2020_229-237
BENFORD'S LAW APPLIED TO PRECINCT LEVEL ELECTION DATAEllen Friedman, Rajkumar Kolakaluri, Manjeet Rege
pp. 238-247
https://doi.org/10.48009/2_iis_2020_238-247
GAMIFICATION IN PRESENTATION AND TESTING AND THEIR EFFECT ON PERFORMANCEAlan Franklin, Eric Jacobs
pp. 248-258
https://doi.org/10.48009/2_iis_2020_248-258
COMPUTER PROGRAMMING LANGUAGES IN 2020: WHAT WE USE|| WHO USES THEM|| AND HOW DO THEY IMPACT JOB SATISFACTIONAlan Peslak, Mauri Conforti
pp. 259-269
https://doi.org/10.48009/2_iis_2020_259-269
PERSONAL EFFECTIVENESS COMPETENCIES OF RECENT CYBERSECURITY GRADUATESNelbert St. Clair, John Girard
pp. 270-278
https://doi.org/10.48009/2_iis_2020_270-278
THE INFLUENCE OF COGNITIVE FACTORS AND PERSONALITY TRAITS ON MOBILE DEVICE USER?S INFORMATION SECURITY BEHAVIORNils Lau, Ling Wang, Inkyoung Hur, Marlon Clarke
pp. 279-288
https://doi.org/10.48009/2_iis_2020_279-288
PHPBB3 BULLETIN BOARD SECURITY TESTING Nishitkumar Patel, Hayden Wimmer, Loreen Marie Powell
pp. 289-299
https://doi.org/10.48009/2_iis_2020_289-299
AN ANALYSIS OF THE MOBILE READINESS OF THE U.S. STATE GOVERNMENT WEBSITES Juyun Cho
pp. 300-313
https://doi.org/10.48009/2_iis_2020_300-313
THE IMPACT OF MOBILE APPLICATIONS ON MATERNITY EDUCATION:
A QUANTITATIVE STUDY OF KENYA
Hussein Abdinoor Mohamed, Chaza Abdul, Wenli Wang, Nancy Mimm
pp. 314-320
https://doi.org/10.48009/2_iis_2020_314-320