International Association for Computer Information Systems
Sunday, June 30, 2024

Table of Contents - Volume 21, Issue 2



PREVENTION OF PHISHING ATTACKS: A THREE-PILLARED APPROACH
Bryon Miller, Katelin Miller, Xihui Zhang, Mark G. Terwilliger
pp. 1-8
https://doi.org/10.48009/2_iis_2020_1-8

HOW GPA, GMAT, WORK EXPERIENCE, AND AGE PREDICT MBA STUDENTS? READINESS FOR THE 4TH INDUSTRIAL REVOLUTION
Jensen J. Zhao, Allen D. Truell, Chris Davison, Edward J. Lazaros
pp. 9-18
https://doi.org/10.48009/2_iis_2020_9-18

A REFLECTIVE LEARNING APPROACH TO TEACHING COMPUTER AND INFORMATION TECHNOLOGY COURSES
Ping Wang
pp. 19-29
https://doi.org/10.48009/2_iis_2020_19-29

ENHANCING LOYALTY TO MOBILE PAYMENT SERVICES: AN EMPIRICAL STUDY
Jason Xiong, Hoon Seok Choi, Charlie Chen, Yong Tang
pp. 30-42
https://doi.org/10.48009/2_iis_2020_30-42

THE INTERNET OF THINGS: AN OVERVIEW OF SELECTED SMART HOME TECHNOLOGY
Calandra E. Weaver, Edward J. Lazaros, Jensen J. Zhao, Christopher B. Davison, Allen D. Truell
pp. 43-48
https://doi.org/10.48009/2_iis_2020_43-48

THE CONNECTED CAR: A GLIMPSE INTO THE FUTURE OF TRANSPORTATION
Dakota L. D. Nicley, Edward J. Lazaros, Allen D. Truell, Jensen J. Zhao, Christopher B. Davison
pp. 49-56
https://doi.org/10.48009/2_iis_2020_49-56

PRIVACY AND SECURITY CONSIDERATIONS OF THE IOT: APPROACHING PRIVACY BY DESIGN
Christopher B. Davison, Edward J. Lazaros, Jensen J. Zhao, Allen D. Truell, Brianna Bowles
pp. 57-63
https://doi.org/10.48009/2_iis_2020_57-63

TRUST IN SECURITY AS A SERVICE: A THEORETICAL MODEL
Thomas L. Ngo-Ye, Derek L. Nazareth, Jae J. Choi
pp. 64-74
https://doi.org/10.48009/2_iis_2020_64-74

INTERNET OF THINGS IN HIGHER EDUCATION
Srecko Natek, Dusan Lesjak
pp. 75-84
https://doi.org/10.48009/2_iis_2020_75-84

USING A MULTILINGUAL CHATBOT FOR FOREIGN LANGUAGE PRACTICE
Mahesh Vanjani, Milam Aiken, Mina Park
pp. 85-92
https://doi.org/10.48009/2_iis_2020_85-92

ANALYZING COLLEGE STUDENTS' PRE-KNOWLEDGE AND POST-KNOWLEDGE OF EMBEDDED SOFTWARE SECURITY AND ITS IMPACT TOWARDS FUTURE INTERNET OF THINGS (IOT) DEVELOPMENTS
Mel Tomeo, David Hertz, John J. Scarpino, Lee Cottrell, Wilfred Mutale
pp. 93-101
https://doi.org/10.48009/2_iis_2020_93-101

A SIX-DIMENSIONAL FRAMEWORK FOR TELEHEALTH DELIVERY
Ganesh Vaidyanathan, Mark Fox
pp. 102-111
https://doi.org/10.48009/2_iis_2020_102-111

A STUDY OF THE ROLE OF VR IN MENTAL HEALTH BASED ON PUBLIC OPINION
Cian S. Renner, Tyler Cross, Daniel Corrales, Wenying Sun
pp. 112-122
https://doi.org/10.48009/2_iis_2020_112-122

TEACHING INTERNET OF THINGS (IOT) THROUGH SOFTWARE SIMULATIONS WITH PACKET TRACER
Ping Wang, Hossein Zare
pp. 123-134
https://doi.org/10.48009/2_iis_2020_123-134

AN APPLIED STUDY OF RNN MODELS FOR PREDICTING CRYPTOCURRENCY PRICES
Dane Vanderbilt, Kun Xie, Wenying Sun
pp. 135-143
https://doi.org/10.48009/2_iis_2020_135-143

THE EPIPHANY: STUDENTS' PERCEPTIONS OF MANAGEMENT AND TECHNICAL CONTENT IN A GRADUATE ANALYTICS COURSE
Michael Lohle, Steven Terrell
pp. 144-149
https://doi.org/10.48009/2_iis_2020_144-149

A COMPUTATIONAL ANALYSIS OF THE IMPACT OF POPULATION AND NUMBER OF POLICE OFFICERS ON ASSAULT AGAINST LAW ENFORCEMENT OFFICERS
Rudra Panda, Priya Sivaprakasam, Manjeet Rege
pp. 150-157
https://doi.org/10.48009/2_iis_2020_150-157

THE DIFFERENCE OF USING SMARTPHONES AND THE PERCEPTION OF FEAR OF MISSING OUT AMONG COLLEGE STUDENTS - A PRELIMINARY STUDY
Kustim Wibowo, Azad Ali
pp. 158-166
https://doi.org/10.48009/2_iis_2020_158-166

USING A TEAM PROJECT IN TEACHING COMPUTER NETWORKING AND DATA COMMUNICATION
Ping Wang, Raed Sbeit
pp. 167-177
https://doi.org/10.48009/2_iis_2020_167-177

IMPROVING TRAINING OF NEURAL NETWORK INTRUSION DETECTION SYSTEMS USING FUZZY LOGIC
Loye L. Ray
pp. 178-185
https://doi.org/10.48009/2_iis_2020_178-185

TOWARD A CONCEPTUAL MODEL FOR UNDERSTANDING THE RELATIONSHIPS AMONG MMORPGS|| GAMERS|| AND ADD-ONS
Qiunan Zhang, Yuelin Zhu, Colin G. Onita, M. Shane Banks, Xihui Zhang
pp. 186-195
https://doi.org/10.48009/2_iis_2020_186-195

PRICE AND PERFORMANCE TRENDS FOR CELLULAR TRAIL CAMERAS EXPLAINED WITH A TIME TREND|| GOOGLE KEYWORD TRENDS|| AND A USE CASE OF SUBURBAN DEER MANAGEMENT
G. Kent Webb
pp. 196-205
https://doi.org/10.48009/2_iis_2020_196-205

IMPACT OF BLOCKCHAIN TECHNOLOGY ON THE CONTINUOUS AUDITING: MEDIATING ROLE OF TRANSACTION COST THEORY
Zsofia Barandi, Assion Lawson-Body, Laurence Lawson-Body, Lori Willoughby
pp. 206-212
https://doi.org/10.48009/2_iis_2020_206-212

DIGITAL TRIBALISM AND THE INTERNET OF THINGS: CHALLENGES AND OPPORTUNITIES
AJ Grant
pp. 213-220
https://doi.org/10.48009/2_iis_2020_213-220

SENTIMENT ANALYSIS ON GOOGLE CLOUD PLATFORM
Terrence E. White, Manjeet Rege
pp. 221-228
https://doi.org/10.48009/2_iis_2020_221-228

BUILDING AN ANALYTICAL MODEL TO PREDICT WORKFORCE OUTCOMES IN MEDICAL EDUCATION
Logan Butler, Manjeet Rege
pp. 229-237
https://doi.org/10.48009/2_iis_2020_229-237

BENFORD'S LAW APPLIED TO PRECINCT LEVEL ELECTION DATA
Ellen Friedman, Rajkumar Kolakaluri, Manjeet Rege
pp. 238-247
https://doi.org/10.48009/2_iis_2020_238-247

GAMIFICATION IN PRESENTATION AND TESTING AND THEIR EFFECT ON PERFORMANCE
Alan Franklin, Eric Jacobs
pp. 248-258
https://doi.org/10.48009/2_iis_2020_248-258

COMPUTER PROGRAMMING LANGUAGES IN 2020: WHAT WE USE|| WHO USES THEM|| AND HOW DO THEY IMPACT JOB SATISFACTION
Alan Peslak, Mauri Conforti
pp. 259-269
https://doi.org/10.48009/2_iis_2020_259-269

PERSONAL EFFECTIVENESS COMPETENCIES OF RECENT CYBERSECURITY GRADUATES
Nelbert St. Clair, John Girard
pp. 270-278
https://doi.org/10.48009/2_iis_2020_270-278

THE INFLUENCE OF COGNITIVE FACTORS AND PERSONALITY TRAITS ON MOBILE DEVICE USER?S INFORMATION SECURITY BEHAVIOR
Nils Lau, Ling Wang, Inkyoung Hur, Marlon Clarke
pp. 279-288
https://doi.org/10.48009/2_iis_2020_279-288

PHPBB3 BULLETIN BOARD SECURITY TESTING
Nishitkumar Patel, Hayden Wimmer, Loreen Marie Powell
pp. 289-299
https://doi.org/10.48009/2_iis_2020_289-299

AN ANALYSIS OF THE MOBILE READINESS OF THE U.S. STATE GOVERNMENT WEBSITES
Juyun Cho
pp. 300-313
https://doi.org/10.48009/2_iis_2020_300-313

THE IMPACT OF MOBILE APPLICATIONS ON MATERNITY EDUCATION: A QUANTITATIVE STUDY OF KENYA
Hussein Abdinoor Mohamed, Chaza Abdul, Wenli Wang, Nancy Mimm
pp. 314-320
https://doi.org/10.48009/2_iis_2020_314-320