A collection of published articles from members of the Department of Information Systems at Kennesaw State University.

Visit the full list of Faculty Publications to view the work from other departments on campus.

KSU Faculty can send a current list of their publications to the administrator for inclusion in this series.

Follow


Submissions from 2016

Link

Gender-based Differences in Culture in the Indian IT Workplace, Amy B. Woszczynski, Pamila Dembla, and Humayun Zafar

Submissions from 2014

Link

Dynamic Competition in IT Security: A Differential Games Approach, Tridib Bandyopadhyay, Dengpan Liu, Vijay Mookerjee, and Allen Wilhite

Link

Multilevel Research in Information Systems: Concepts, Strategies, Problems and Pitfalls, France Bélanger, Meghann Cefaratti, Traci Carte, and Steven E. Markham

Link

The Role of Student Characteristics in Predicting Retention in Online Courses, J. Cochran, S. Campbell, H. Baker, and E. Leeds

Link

The Role of Student Characteristics in Predicting Retention in Online Business Courses, J. Cochran, S. Campbell, Hope Baker, and E. Leeds

Link

The adoption of e-learning systems in low income countries: the case of Ethiopia, Yonas Hagos and Solomon Negash

A Primer on Partial Least Squares Structural Equation Modeling (PLS-SEM), Joseph F. Hair, G. Thomas M. Hult, Christian Ringle, and Marko Sarstedt

Link

Partial Least Squares Structural Equation Modeling (PLS-SEM): An Emerging Tool for Business Research, Joseph F. Hair, Marko Sarstedt, Lucas Hopkins, and Volker G. Kuppelwieser

Link

Rethinking FS-ISAC: An IT Security Information Sharing Model for the Financial Services Sector, Charles Liu, Humayun Zafar, and Yoris A. Au

PDF

Rethinking FS-ISAC: An IT Security Information Sharing Network Model for the Financial Services Sector, Charles Zhechao Liu, Humayun Zafar, and Yoris A. Au

Link

Factors for Measuring Password-based Authentication Practices, Herbert J. Mattord, Yair Levy, and Steven Furnell

PDF

Analysis of a Scholarly Social Networking site: The Case of the Dormant User, Meg Murray

PDF

Unraveling the digital literacy paradox: How higher education fails at the fourth literacy., Meg Coffin Murray and Jorge Perez

Link

Distance Learning Immersive Environments: Sense of Presence Exploration, Max M. North

Link

A Comparative Review of Information Technology Project Management in Private and Public Sector Organization, Muhammad Obeidat and Max North

PDF

DRIP - Data Rich, Information Poor: A Concise Synopsis of Data Mining, Muhammad Obeidat, Max North, Lloyd Burgess, and Sarah North

Link

Partial Least Squares Structural Equation Modeling (PLS-SEM): A Useful Tool for Family Business Researchers, Marko Sarstedt, Christian M. Ringle, Donna Smith, and Joseph F. Hair

PDF

Information Security Governance for the Non-security Business Executive, Michael Whitman and Herbert J. Mattord

Link

Security Risk Management in Health Care: A Case Study, Humayun Zafar, Myung S. Ko, and Jan G. Clark

Submissions from 2013

Link

An Examination of Consumers’ High and Low Trust as Constructs for Predicting Online Shopping Behavior, D. Amoroso and T. Mukahi

Link

Comparing Mobile and PC Internet Adoption Factors of Loyalty and Satisfaction with Online Shopping Consumers, D. Amoroso and M. Ogawa

PDF

Quality is Becoming More About Taste and Less About Cost: Eeg and Survey Study on Consumer Behavior, Charnetta Brown, Adriane Randolph, and Janee Burkhalter

WikiED: Using Web 2.0 Tools to Teach Content and Critical Thinking, Jennifer Kreps Frisch, Paula C. Jackson, and Meg Murray

PDF

The Impact of Student Retention Strategies: An Empirical Study, Elke Meyo Leeds, Stacy M. Campbell, Hope Baker, Radwan Ali, Dorothy Brawley, and John Crisp

Link

User Profiles and Personas in the Design and Development of Consumer Health Technologies, Cynthia LeRouge, Jiao Ma, Sweta Sneha, and Kristin Tolle

Evaluating Authentication Components: An Expert Panel Approach, Herbert J. Mattord, Yair Levy, and Steven Furnell

Link

Framework for Information Sharing with Privacy and Priority Control in Long-term Care, S. Miyagawa, S. Yamasaki, K. E. Uchiyama, and D. Amoroso

PDF

Student Interaction with Content in Online and Hybrid Courses: Leading Horses to the Proverbial Water, Meg Murray, Jorge Perez, Debra Geist, and Alison Hedrick

Co-Creation Between Food Allergy Customers and Restaurants Using Mobile Devices, M. Ogawa, A. Tanaka, K. Noda, and D. Amoroso

Key Interactions for Online Programs between Faculty, Students, Technologies, and Institutions: A Holistic Framework, Jomon Paul and J. Cochran

Link

A Model of Consumers' Perceptions of the Invasion of Information Privacy, K. S. Schwaig, A. Segars, V. Grover, and K. Fiedler

An Identification and Evaluation of Information Security and Assurance Research Outlets, Michael Whitman, Humayun Zafar, and Herbert J. Mattord

Link

Human Resource Information Systems: Information Security Concerns for Organizations, Humayun Zafar

Submissions from 2012

Kaizen Blitz, Satya S. Chakravorty and Richard M. Franza

Link

A Framework for Instituting Software Metrics in Small Software Organizations, Donald E. Meredith, Hisham M. Haddad, and Nancy C. Ross

PDF

Student Interaction with Online Course Content: Build It and They Might Come, Meg C. Murray, Jorge Pérez, Debra B. Geist, and Alison Hedrick

Perception of African Youth on Personal Computer Utilization: The Case of Ethiopia and Rwanda, S. Negash

Link

A PhD in Information Systems for Emerging Economies: The Addis Ababa University Model, Solomon Negash, Salehu Anteneh, and Richard T. Watson

Food Allergy Information Collected at Restaurants Using Mobile Devices to Enhance Communication Support, M. Ogawa, A. Tanaka, K. Noda, and D. Amoroso

Link

Effect of Online Social Networking on Student Academic Performance, Jomon Paul, Hope M. Baker, and J. Cochran

Link

Triangulating System Requirements for Users With Severe Motor Disabilities, Adriane B. Randolph

Link

Triangulating System Requirements for Users With Severe Motor Disabilities, Adriane B. Randolph

Link

Silence or Knowing in IT-Facilitated Face-to-Face Meetings Silence or Knowing in IT-Facilitated Face-to-Face Meetings, Arjan Raven and Omar A. El Sawy

Brain Games as a Potential Nonpharmaceutical Alternative for the Treatment of ADHD, Stacy C. Wegrzyn, Doug Hearrington, Tim Martin, and Adriane B. Randolph

Guide to Network Security, Michael E. Whitman

Threats to Information Security Revisited, Michael Whitman and Herbert J. Mattord

Link

Financial Impact of Information Security Breaches on Breached Firms and their Non-Breached Competitors, Humayun Zafar, Myung S. Ko, and Kweku-Muata Osei-Bryson

Link

Ubiquitous Healthcare Information System: Toward Crossing the Security Chasm, Humayun Zafar and Sweta Sneha

Submissions from 2011

PDF

Decision Support Systems For Strategic Dispute Resolution, Anurag Agarwal, Sridhar Ramamoorti, and Vaidyanathan Jayaraman

Link

Model for Understanding Consumer Adoption of Online Technologies, D. Amoroso and S. Hunsinger

Japan’s Model of Mobile Ecosystem Success: The Case of NTT DoCoMo, D. Amoroso and M. Ogawa

Link

Building a Research Model for Mobile Wallet Consumer Adoption: The Case of Mobile Suica in Japan, D. Amoroso and R. Watanabe

Cyber Insurance and the Management of Information Security Risk, Tridib Bandyopadhyay

Cyber Terrorism: Impacts, Vulnerabilities, and U.S. Policy, Tridib Bandyopadhyay

Link

Study Abroad as an Education Experience: Challenges, Realizations, and Lessons Learned, Albert L. Harris, France Belanger, Meg Murray, and Andrew Urbaczewski

PDF

End-User Computing Applications, Mary C. Hill and W. Alan Barnes

Link

Information Privacy: Understanding How Firms Behave Online, Gerald C. Kane, Kathy Stewart Schwaig, and Veda C. Storey

Link

User Profiles and Personas in the Design and Development of Consumer Health Technologies, Cynthia LeRouge, Jiao Ma, Sweta Sneha, and Kristin Tolle

Rethinking Risk-based Information Security, Herbert J. Mattord

PDF

E-Textbooks Are Coming: Are We Ready?, Meg C. Murray and Jorge Pérez

Link

A PhD in Information Systems for Emerging Economies: The Addis Ababa University Model, S. Negash, S. Anteneh, and R. Watson

I Didn't Know I Could Do That: Using Web-Based Tools to Enhance Learning, Jorge Pérez and Kevin Hurysz

Link

Individual Characteristics and Their Effect on Predicting Mu Rhythm Modulation, Adriane B. Randolph, Melody Moore Jackson, and Saurav Karmakar

Running Case: Stratified Custom Manufacturing, Russell Shaver

An Entymological View of Ethical Hacking, Michael E. Whitman

Advanced Topologies, Inc., Michael E. Whitman and Herbert J. Mattord

Principles of Information Security, 4th Edition, Michael E. Whitman and Herbert J. Mattord

Principles of Information Security, 4th Edition, Michael E. Whitman and Herbert J. Mattord

Roadmap to Information Security: For IT and Infosec Managers, Michael E. Whitman and Herbert J. Mattord

Guide to Firewalls and VPNs, 3rd Edition, Michael E. Whitman, Herbert J. Mattord, and Andrew Green

Link

Security Risk Management at a Fortune 500 Firm: A Case Study, Humayun Zafar

An Exploration of Human Resource Management Information Systems Security, Humayun Zafar, Jan Guynes Clark, and Myung Ko

Submissions from 2010

Link

Information and Communication Technology Literacy: What Do Businesses Expect and What Do Business Schools Teach?, Radwan Ali and Irvin R. Katz

Link

Information Security in Networked Supply Chains: Impact of Network Vulnerability and Supply Chain Integration on Incentives to Invest, Tridib Bandyopadhyay, Varghese Jacob, and Srinivasan Raghunathan

Link

SEC XBRL Filing Requirements: An Instructional Case on Tagging Financial Statement Disclosures, Ernest Capozzoli and Stephanie Farewell

Similarities and Differences Between Indian Born and US Born IT Workers, Pamila Dembla and Amy B. Woszcznyski

Link

Toward a Theory of Whistleblowing Intentions: A Benefit-to-Cost Differential Perspective, Mark Keil, Amrit Tiwana, Robert Sainsbury, and Sweta Sneha

PDF

Database Security: What Students Need to Know, Meg C. Murray

PDF

Accessing ICT Enabled Content in Low-Income Countries: Think Big, Start Small, and Scale Up, Solomon Negash

Link

Learning Assessment of a Videoconference-Based Training: Lessons from Medical Training between USA and Ethiopia, Solomon Negash

Link

Integrating an Executive Panel on Communication in Senior Design, Judith Shaul Norback, Elke M. Leeds, and Ketki Kulkarni

Link

The Power and Promise of Web 2.0 Tools, G. Andrew Page and Radwan Ali

PDF

Generativity: The New Frontier for Information and Communication Technology Literacy, Jorge Pérez and Meg C. Murray

Link

Assessing Fit of Nontraditional Assistive Technologies, Adriane B. Randolph and Melody Moore Jackson

PDF

Digital Video Presentation and Student Performance: A Task Technology Fit Perspective, Arjan Raven, Elke M. Leeds, and ChongWoo Park

PDF

Creating Sustainable Education Projects in Roatan, Honduras Through Continuous Process Improvement, Arjan Raven, Adriane B. Randolph, and Shelli Heil

PDF

Analysis of XBRL Literature: A Decade of Progress and Puzzle, Saeed Roohani, Zhao Xianming, Ernest Capozzoli, and Barbara Lamberton

Hands-On Information Security Lab Manual, 3rd Edition, Michael E. Whitman and Herbert J. Mattord

Management of Information Security, 3rd Edition, Michael E. Whitman and Herbert J. Mattord

Management of Information Security, 3rd Edition, Michael E. Whitman and Herbert J. Mattord