International Association for Computer Information Systems
Sunday, August 01, 2021

Table of Contents - Volume 9, Issue 2



SALARY COMPARISON STUDY OF SAP VS. NON-SAP BUSINESS GRADUATES
Frank Andera, Amanda Dittmer, Katherine Soave
pp. 1-7
https://doi.org/10.48009/2_iis_2008_1-7

A VULNERABILITY AUDIT OF THE U.S. STATE E-GOVERNMENT NETWORK SYSTEMS
Jensen Zhao, Allen Truell, Melody Alexander, Rod Davis
pp. 8-13
https://doi.org/10.48009/2_iis_2008_8-13

OUTSOURCING: DATA SECURITY AND PRIVACY ISSUES IN INDIA
Nipul Patel, Susan Conners
pp. 14-20
https://doi.org/10.48009/2_iis_2008_14-20

THE CHALLENGE OF SUPPORTABLE OPEN SOURCE SOFTWARE: IS IT REALLY OPEN?
Arthur McAdams, Winston Tellis
pp. 21-24
https://doi.org/10.48009/2_iis_2008_21-24

A QUALITATIVE STUDY OF CUSTOMER SATISFACTION FROM AN ELECTRONIC COMMERCE PERSPECTIVE
Laurence Mukankusi, Fred Celimene, Louicius Michel, Assion Lawson-Body
pp. 25-36
https://doi.org/10.48009/2_iis_2008_25-36

AN EXAMINATION OF DECISION CONFIDENCE AND ILLUSION OF CONTROL IN A GROUP SETTING
Sathasivam Mathiyalakan
pp. 37-45
https://doi.org/10.48009/2_iis_2008_37-45

A CONCEPTION OF THE E-BUSINESS RECEPTION MODEL (EBRM)
Zbigniew Pastuszak
pp. 46-55
https://doi.org/10.48009/2_iis_2008_46-55

SOCIAL PRESENCE, PERSONALITY TYPES, AND IT-SUPPORTED TEACHING METHODS
Kamal Hingorani
pp. 56-62
https://doi.org/10.48009/2_iis_2008_56-62

A TECHNIQUE FOR PEER AND GROUP MEMBER EVALUATIONS OF TEAMWORK IN THE UNDERGRADUATE CLASSROOM
Ranida Harris, Kenneth Harris, Kara Vaught
pp. 63-71
https://doi.org/10.48009/2_iis_2008_63-71

SUPPLY CHAIN MANAGEMENT SOFTWARE SYSTEMS INTEGRATION AND VERSION UPGRADES: VENDOR AND CUSTOMER BASED FRAMEWORK
Ganesh Vaidyanathan, Asghar Sabbaghi, Yan Fu
pp. 72-79
https://doi.org/10.48009/2_iis_2008_72-79

EXECUTIVE INFORMATION FOR STRATEGIC DECISION MAKING
Eugene Calvasina, Mysore Ramaswamy, Richard Calvasina, Gerald Calvasina
pp. 80-86
https://doi.org/10.48009/2_iis_2008_80-86

SOCIAL NETWORKING WEBSITES IN INDIA AND THE UNITED STATES: A CROSS-NATIONAL COMPARISON OF ONLINE PRIVACY AND COMMUNICATION
Bryan Marshall, Peter Cardon, Daniel Norris, Natalya Goreva, Ryan D'Souza
pp. 87-94
https://doi.org/10.48009/2_iis_2008_87-94

MEASURING STUDENTS PERCEPTIONS OF BLACKBOARD USING THE TECHNOLOGY ACCEPTANCE MODEL: A PLS APPROACH
Leila Halawi, Richard McCarthy
pp. 95-102
https://doi.org/10.48009/2_iis_2008_95-102

NATIONAL CULTURE AND TECHNOLOGY ACCEPTANCE: THE IMPACT OF UNCERTAINTY AVOIDANCE
Peter Cardon, Bryan Marshall
pp. 103-110
https://doi.org/10.48009/2_iis_2008_103-110

USING GOOGLE KEYWORD STATISTICS TO EXPLAIN CHANGES IN TRAFFIC TO INTERNET SITES RELATED TO GLOBAL ENVIRONMENTAL MANAGEMENT
G. Webb
pp. 111-116
https://doi.org/10.48009/2_iis_2008_111-116

A NOVEL APPROACH FOR IDENTIFYING ENTITY TYPES FOR CONCEPTUAL DATA MODELING IN DEVELOPING DATA-INTENSIVE WEB APPLICATIONS
Seung Lee
pp. 117-122
https://doi.org/10.48009/2_iis_2008_117-122

A FRAMEWORK FOR A GREEN PRODUCT LIFECYCLE MANAGEMENT SYSTEM
Amy Trappey, Fataneh Taghaboni-Dutta, Charles Trappey
pp. 123-131
https://doi.org/10.48009/2_iis_2008_123-131

ENCHANCING THE USE OF BIDSS/CI SYSTEMS: A PROPOSED FRAMEWORK
Monica Holmes, Roger Hayen, Jie Zeng
pp. 132-138
https://doi.org/10.48009/2_iis_2008_132-138

DOMAIN NAME DISPUTES: TECHNOLOGY OUTPACES THE LEGAL SYSTEM
Sam Ramanujan, Someswar Kesh, Steve Ewens
pp. 139-145
https://doi.org/10.48009/2_iis_2008_139-145

AN ANALYSIS OF A SOFTWARE QUALITY ASSURANCE TOOL'S IMPLEMENTATION: A CASE STUDY
John Scarpino, Paul Kovacs
pp. 146-152
https://doi.org/10.48009/2_iis_2008_146-152

BENCHMARK NEW PRODUCT DEVELOPMENT PROCESSES USING DEA-BASED MODULARIZED APPROACH
Tzu-An Chiang, Amy Trappey, Wen-Chih Chen
pp. 153-162
https://doi.org/10.48009/2_iis_2008_153-162

A CLUSTER ANALYSIS OF CAMPUS PORTAL IMPLEMENTATION
Suhong Li, Wallace Wood
pp. 163-170
https://doi.org/10.48009/2_iis_2008_163-170

AN ETHNOGRAPHIC STUDY COMPARING RESTRICTED AND OPEN ENGINEERING LABS FOR INFORMATION CONTROL
Lee Steen, Robert Skovira
pp. 171-181
https://doi.org/10.48009/2_iis_2008_171-181

CARRIER SERVICE INFRASTRUCTURES: ESSENTIAL COST ELEMENTS FOR GLOBAL E-COMMERCE
Timothy Kelly
pp. 182-187
https://doi.org/10.48009/2_iis_2008_182-187

ISSUES AND CHALLENGES OF AGILE SOFTWARE DEVELOPMENT WITH SCRUM
Juyun Cho
pp. 188-195
https://doi.org/10.48009/2_iis_2008_188-195

USING THE TASK TECHNOLOGY FIT MODEL AS A DIAGNOSTIC TOOL FOR ELECTRONIC MEDICAL RECORDS SYSTEMS EVALUATION
Carol Kilmon, Mary Fagan, Vivek Pandey, Thomas Belt
pp. 196-204
https://doi.org/10.48009/2_iis_2008_196-204

TECHNOLOGY AND CULTURE: FIVE ORTHODOXIES
Aj Grant, Robert Skovira
pp. 205-210
https://doi.org/10.48009/2_iis_2008_205-210

AMPLIFYING TEAMWORK ISSUES THROUGH THE USE OF SITUATIONAL VIGNETTES
James Cappel
pp. 211-218
https://doi.org/10.48009/2_iis_2008_211-218

INFORMATION AGE ORGANIZATION: MOVING FROM INFORMATION TO KNOWLEDGE TO LONG-TERM SUCCESS
Honora Rockar
pp. 219-226
https://doi.org/10.48009/2_iis_2008_219-226

CORPORATE SOCIAL NETWORKING
James Sena, Mark Sena
pp. 227-231
https://doi.org/10.48009/2_iis_2008_227-231

CICERO COLORING SCHEMA FOR DATA MODELING
Vladan Jovanovic, Lily Cupic
pp. 232-237
https://doi.org/10.48009/2_iis_2008_232-237

A SYMBOL SET FOR DIAGRAMMING NETWORKS
Vladan Jovanovic, Eric Stone
pp. 238-242
https://doi.org/10.48009/2_iis_2008_238-242

ASSESSING STUDENTS' PERCEPTIONS OF PROJECT MANAGEMENT BEFORE AND AFTER COMPLETION OF A PROJECT MANAGEMENT COURSE
Thomas Case, Manouchehr Tabatabaei
pp. 243-251
https://doi.org/10.48009/2_iis_2008_243-251

INFORMATION THE TRANSFORMATION OF PUBLIC ADMINISTRATIONS: THE CASE OF E-HOUSEKEEPER IN TAIWAN
Su-Houn Liu, Tsang-Yao Chen, Hsiu-Li Liao
pp. 251-257
https://doi.org/10.48009/2_iis_2008_251-257

UTILIZING NEURAL NETWORKS TO ASSESS COMMUNITY-LEVEL VULNERABILITY TO THE METHAMPHETAMINE EPIDEMIC
Cretson Dalmadge, Monica Cain
pp. 258-266
https://doi.org/10.48009/2_iis_2008_258-266

AN EMPIRICAL EXPLORATION OF SOFTWARE DEVELOPMENT QUALITY
Harry Benham
pp. 267-271
https://doi.org/10.48009/2_iis_2008_267-271

PERCEPTION AND REALITY: AN INTROSPECTIVE STUDY ON SUPPLY CHAIN INFORMATION SECURITY RISK
Gregory Smith, Kevin Watson, Wade Baker
pp. 272-278
https://doi.org/10.48009/2_iis_2008_272-278

A FRAMEWORK FOR A WEBSITE SNAPSHOT MANAGEMENT SYSTEM
David Chao, Sam Gill
pp. 279-285
https://doi.org/10.48009/2_iis_2008_279-285

UNINTENDED BENEFITS OF INFORMAL LEARNING ON THE PREPARATION OF STUDENTS FOR ADVANCED DEGREE PROGRAMS
M.A. Reese, G.M. Boff
pp. 286-293
https://doi.org/10.48009/2_iis_2008_286-293

TOPIC INFLUENCES ON ELECTRONIC MEETING RELEVANT COMMENTS
Milam Aiken, Linwu Gu, Jianfeng Wang, Mahesh Vanjani
pp. 300-304
https://doi.org/10.48009/2_iis_2008_300-304

IMPROVING END-USER DATABASE DEVELOPMENT QUALITY: A 5C DATA MODELING METHOD
Hsiang-Jui Kung, Hui-Lien Tung, Adrian Gardiner
pp. 305-312
https://doi.org/10.48009/2_iis_2008_305-312

ASSESSING WEB SERVICE QUALITY DIMENSIONS: THE E-SERVPERF APPROACH
Godwin Udo, Kallol Bagchi, Peeter Kirs
pp. 313-322
https://doi.org/10.48009/2_iis_2008_313-322

CREATING CUSTOMIZED DATABASE VIEWS WITH USER-DEFINED NON-CONSISTENCY REQUIREMENTS
David Chao, Robert Nickerson
pp. 323-329
https://doi.org/10.48009/2_iis_2008_323-329

ENTERPRISE CONTENT MANAGEMENT: A USABILITY STUDY
Robert Totterdale
pp. 330-336
https://doi.org/10.48009/2_iis_2008_330-336

THE IMPACT OF BANNER AD STYLES ON INTERACTION AND CLICK-THROUGH RATES
Adam Sigel, Gerald Braun, Mark Sena
pp. 337-342
https://doi.org/10.48009/2_iis_2008_337-342

GROUP WISDOM SUPPORT SYSTEMS: AGGREGATING THE INSIGHTS OF MANY THROUGH INFORMATION TECHNOLOGY
Christian Wagner, Andrea Back
pp. 343-350
https://doi.org/10.48009/2_iis_2008_343-350

A MODELING TECHNIQUE FOR BPR BASED ON EXTENDED PETRI NET
Tang Zhi-Wei, Zong Dai
pp. 351-360
https://doi.org/10.48009/2_iis_2008_351-360

E-SOCIAL BEHAVIOR: ARE ACADEMIC CLASS AND IDENTITY THEFT FACTORS?
Carl Case, Darwin King, Michael Kasperski, Ann Lehman
pp. 361-368
https://doi.org/10.48009/2_iis_2008_361-368

ANALYZING POWER AS INFORMATION IN ORGANIZATIONS: THINKING ABOUT HOW TO DO IT!
Robert Skovira
pp. 369-377
https://doi.org/10.48009/2_iis_2008_369-377

ISSUES IN NETWORK ANALYSIS AND DESIGN: A CRITICAL EXAMINATION
Someswar Kesh, Sam Ramanujan
pp. 378-384
https://doi.org/10.48009/2_iis_2008_378-384

REAL SECURITY IN VIRTUAL SYSTEMS: A PROPOSED MODEL FOR A COMPREHENSIVE APPROACH TO SECURING VIRTUALIZED ENVIRONMENTS
Manal Yunis, Jerald Hughes, Joseph Roge`
pp. 385-395
https://doi.org/10.48009/2_iis_2008_385-395

EXAMINING HEALTHCARE PROFESSIONALS' ACCEPTANCE OF ELECTRONIC MEDICAL RECORDS USING UTAUT
Matthew Wills, Omar El-Gayar, Dorine Bennett
pp. 396-401
https://doi.org/10.48009/2_iis_2008_396-401

INFORMATION TECHNOLOGY AND BUSINESS PROCESS OUTSOURCING TO INDIA: IMPLICATIONS AND CHALLENGES
Kamal Hingorani
pp. 402-411
https://doi.org/10.48009/2_iis_2008_402-411

A COMPARISON OF STUDENT USE AND UNDERSTANDING OF TEXT MESSAGING SHORTHAND AT TWO UNIVERSITIES
Betty Kleen, Lynn Heinrichs
pp. 412-420
https://doi.org/10.48009/2_iis_2008_412-420

INFLUENCE OF TRUST PREDICTORS ON DIFFERENT DIMENSIONS OF TRUST IN M-COMMERCE
Sunitha Mogenahalli, Pruthikrai Mahatanankoon, Billy Lim
pp. 421-428
https://doi.org/10.48009/2_iis_2008_421-428

SYNCHRONIZING KNOWLEDGE IN MILITARY DECISION MAKING: A RESEARCH APPROACH FOR EXPLORING THE EFFECTS OF ORGANIZATIONAL CULTURE
Larry George, Robert Skovira, A. J. Grant, Ann Jabro
pp. 429-438
https://doi.org/10.48009/2_iis_2008_429-438

E-BUSINESS IN SLOVENIAN SMES
Viktorija Sulcic, Dusan Lesjak
pp. 439-444
https://doi.org/10.48009/2_iis_2008_439-444

EXAMINING THE EFFECTIVENESS OF VIRTUAL COMMUNITIES OF PRACTICE: A RESEARCH FRAMEWORK
Sean McGann, Hala Annabi
pp. 445-451
https://doi.org/10.48009/2_iis_2008_445-451

ASSESSING THE READABILTIY OF FREEWARE END-USER LICENSING AGREEMENTS
Janet Prichard, Michael Hayden
pp. 452-459
https://doi.org/10.48009/2_iis_2008_452-459

AN EMPIRICAL STUDY OF UNIVERSITY WEBSITES
Marzie Astani, Mohamed Elhindi
pp. 460-465
https://doi.org/10.48009/2_iis_2008_460-465

PRIVATE SECTOR VERSUS PUBLIC SECTOR RESEARCH ON SOFTWARE PROJECT MANAGEMENT: AN EXPLORATORY STUDY
Kevin Elder, Michael Garman
pp. 466-475
https://doi.org/10.48009/2_iis_2008_466-475

(AN INVESTIGATION INTO WHETHER) THE AD-HOC NATURE OF PROJECT ENVIRONMENTS INCREASES THE NEED FOR STRONG PROJECT LEADERS
Lambi Hubbard
pp. 476-478
https://doi.org/10.48009/2_iis_2008_476-478

SIX SIGMA INFORMATION SYSTEMS: A PAYROLL APPLICATION
Roger Hayen
pp. 479-488
https://doi.org/10.48009/2_iis_2008_479-488

FROM CONCEPT TO COMPLETION: A DATA WAREHOUSE FOR MEASURING PERFORMANCE WITHIN THE CORPS OF ENGINEERS OPERATIONS AND MAINTENANCE DIVISION
James Sissom
pp. 489-493
https://doi.org/10.48009/2_iis_2008_489-493

A CROSS-NATIONAL ANALYSIS OF E-GOVERNMENT IMPLEMENTATION: A RESEARCH NOTE
Saviour Nwachukwu, Syed Khalil, Ashagre Yigletu, Donald Andrews
pp. 494-499
https://doi.org/10.48009/2_iis_2008_494-499

USER SATISFACTION IN DATAWAREHOUSING: AN EMPIRICAL INVESTIGATION OF SALIENT VARIABLES
Kimberly Merritt
pp. 500-508
https://doi.org/10.48009/2_iis_2008_500-508

GROWING COMPUTER ADOPTION SUPPORTS INFORMATION SYSTEMS IN NONTRADITIONAL SETTINGS
Jean Adams
pp. 509-517
https://doi.org/10.48009/2_iis_2008_509-517

EFFECT OF MANAGEMENT CHANGE ON R&D/IA AND STOCK RETURN IN IT COMPANIES
Yun-Chia Yan, Hua-Wei Huang, Hsiao-Wen Huang
pp. 518-522
https://doi.org/10.48009/2_iis_2008_518-522

MOBILE COMPUTING WITH WEB 2.0: CURRENT STATE-OF-THE-ART, ISSUES AND CHALLENGES
Hiren Nagar, Billy Lim
pp. 523-529
https://doi.org/10.48009/2_iis_2008_523-529

EXAMINING THE USE OF COMPETITIVE INTELLIGENCE IN STAFFING MUNICIPAL POLICE DEPARTMENTS: AN EXPLORATORY STUDY
Queen Booker, Fred Kitchens, Carl M. Rebman
pp. 530-537
https://doi.org/10.48009/2_iis_2008_530-537

USING UML FOR OBJECT-RELATIONAL DATABASE SYSTEMS DEVELOPMENT: A FRAMEWORK
Ming Wang
pp. 538-543
https://doi.org/10.48009/2_iis_2008_538-543

AN ANALYSIS OF DISTRIBUTED DATABASE INDEXING METHOD IN REGARD TO PERFORMANCE OF EXTRACT/TRANSFORM/LOAD (ETL) PROCESSES
Dennis Guster, Paul Safonov, Christopher Brown, Brittany Jansen
pp. 544-550
https://doi.org/10.48009/2_iis_2008_544-550

X-WINDOWS, GUI PROGRAMMING, AND MICROSOFT WINDOWS
Herbert Carew, Meledath Damodaran
pp. 551-559
https://doi.org/10.48009/2_iis_2008_551-559

FRAMEWORK OF MEETING SCHEDULING IN COMPUTER SYSTEMS
Goran Martinovic
pp. 560-569
https://doi.org/10.48009/2_iis_2008_560-569

HOW DO CONCERNS ABOUT ORGANIZATIONAL FAIRNESS AND PROFILING AFFECT INDIVIDUALS' FEELING OF ALIENATION?
Joseph Mollick
pp. 570-577
https://doi.org/10.48009/2_iis_2008_570-577

ERP SYSTEMS AND INTERNAL AUDIT
Aditya Saharia, Bruce Koch, Robert Tucker
pp. 578-586
https://doi.org/10.48009/2_iis_2008_578-586

USE OF MOBILE AGENTS IN A FEDERATED IDENTITY STRUCTURE
Farah Layouni, Yann Pollet
pp. 587-593
https://doi.org/10.48009/2_iis_2008_587-593

FROM ADOPTION TO ACTION: MAPPING TECHNOLOGY ADOPTION CONSTRUCTS FOR THE SMALL TO MEDIUM ENTERPRISE INNOVATION SUCCESS
Daniel Norris, Roger Yin
pp. 594-606
https://doi.org/10.48009/2_iis_2008_594-606

CURRENT PRACTICES IN ELECTRONIC COMMUNICATION MANAGEMENT
Richard Glass, Nancy Records, Hal Records, Robert Behling
pp. 607-612
https://doi.org/10.48009/2_iis_2008_607-612

THE RELATIONSHIP OF E-COMMERCE READINESS TO TECHNOLOGY ACCEPTANCE: THE CASE OF BARBADOS
Jude Edwards, Leila Halawi, Richard McCarthy
pp. 613-621
https://doi.org/10.48009/2_iis_2008_613-621

AN EMPIRICAL STUDY OF INSTANT MESSAGING BEHAVIOR BASED ON THE TECHNOLOGY ASSESSMENT MODEL (TAM)
Alan Peslak
pp. 622-627
https://doi.org/10.48009/2_iis_2008_622-627

AN AGENT BASED SIMULATION MODEL TO LOCATING SELLERS USING GEOGRAPHIC INFORMATION SYSTEMS
Ali Pouyan, Ali Bazghandi
pp. 628-633
https://doi.org/10.48009/2_iis_2008_628-633

SECURITY OF PERSONAL IDENTIFIABLE INFORMATION
Jack Shorter, Karen Forcht, Alicia Aldridge, Daphyne Thomas
pp. 634-638
https://doi.org/10.48009/2_iis_2008_634-638

THE WORLD OF DROP-SHIP ETAILING: EFFECTIVE WAY TO USE E-BAY
Jack Shorter, Karen Forcht, Alicia Aldridge, Susan Kruck
pp. 639-644
https://doi.org/10.48009/2_iis_2008_639-644