Submissions from 2009
Decision Making Systems in Smart Buildings, Mohammed Alsaigh
Music Sharing in China: Theoretical Foundations, Donald Amoroso and Pamila Dembla
Factors Affecting PC Use Among African Youth: Empirical Study from Ethiopia and Rwanda, Tridib Bandyopadhyay and Solomon Negash
Addressing Enrollment Declines Through International Partnerhips, Andrew P. Ciganek
The Impact of Culture on Global Information Security Regulations , Andrew P. Ciganek and Guillermo A. Francia III
Individual’s Intentions to use Self Diagnostic Medical Support Systems, David L. Coss
Improving I.S. student Engagement and Perceived Course Value , Kevin S. Floyd, Susan J. Harrington, and Julie Santiago
Losing the Battle: Student and Instructor Perspectives on Attention Loss in the Classroom, Pamela Galluch, Caroline Long, Tyler Bratton, Mike Gee, and Micah Groeber
Implementing a SOA Using Scrum: Achieving Improved Productivity using Service Trees, VamshiKiran Gireddy and Andrew P. Ciganek
Applying the TAM to Determine Intention to Use a DSS, Goran Gustavsson
IS Student Resume Writing Exercise , Gary Hackbarth
Chief Information Officers and Industry Characteristics: Is Profiling Possible?, Gary HackBarth and Vijay V. Raghavan
Winning the Recruiting Challenge: Hiring Diverse and Talented IS Faculty Members, Hisham M. Haddad and Amy B. Woszczynski
Implementation of Information Systems for Supply Chain Collaboration with Geographically-Dispersed Partners, Anand Jeyaraj and Vikram Sethi
Computing Services in the Cloud, Harry Katzan Jr.
Evaluating Open Source Applications to Support Online Learning, Rosemary H. Kim
Data Center Security: Analysis of Two Audit Reports, Ken Knapp, Gary D. Denney, and Mark E. Barner
Information Systems and strategic decisions: A literature Review, Stephen Larson
Customer Acceptance of Internet Banking: An Integration of Technology and Service Perspectives, Xin Li
Improving End User Value in Information Technology Projects: Exploring The Benefits of Q-sort Analysis , William Lomerson and Stephen Wingreen
An Assessment of the Mathematics Information Processing Scale: A Potential Instrument for Extending Technology Education Research, R. Franklin Morris Jr., L. Allison Jones-Farmer, and R. Kelly Rainer Jr.
Tutorial: Teaching Database Security using a set of Software Animations , Meg Murray and Mario Guimaraes
Panel: Launching a Journal in the ERA of Web 2.0 The Case of JSAIS, Meg Murray, Bill Lomerson, and Craig Van Slyke
“Liisa, Liisa, the Machine Says I Have Performed an Illegal Action. Should I Tell the Police..?” A Survey and Observations of Inexperienced Elderly Internet Users, Harri Oinas-Kukkonnen and Liisa Mantila
Investigating Literacy as a Predictor of Adoption and Usage , Ebrahim Randeree
Using Inefficiencies in Telecoms Product Life Cycle as Determinants of Strategies for Increasing Revenues from Telecoms: A Methodology and an Illustrative Example, Sergey Samoilenko and Ilya Ilienko
Changes in Perceptions of Web-Based learning Materials, George Schell and Ling He
Social Network Privacy: Expectations vs Reality, Paul H. Schwager and Bryan C. Foltz
Productivity and Usability Effects of Using a Two-Factor Security System, Dennis Strouble, Gregory M. Shechtman, and Alan S. Alsop
Understanding the Principles of High Reliability in Health Care Systems: A proposed Research Design, John Sullivan and M. Gordon Hunter
Student Perceptions of Project Management: Comparing students’ start and end of course Perceptions of the importance of PM, PMBOK Categories, and Contributing Subject Areas, Manouchehr Tabatabaei, Thomas Case, and James Whitworth
Time is Money, More Bang for the Buck: An Introduction of the GC-Index for Assessing Research, Hirotoshi Takeda
Information Extraction From Different Data Representation Forms: Charts and Tables, Karthikeyan Umapathy, Janice M. Engberg, and Layne F. Wallas
The Role of National Culture Differences in User Adoption of Social Netowrking, Natasha F. Veltri and Wafa Elgarah
Human/Technology Adaptation Fit Theory for Healthcare, Fred Weigel, Dianne J. Hall, and W. Heath Landrum
Exploring Software project characteristics on Scope Creep , Denise Williams and David Williams
A Comparative Assessment of knowledge management education across the United States department of defense Summer Bartczak (University of Central Arkansas), Gary L. Wright, Todd A. Peachey, and Alan R. Heminger