A collection of published articles from members of the Department of Information Systems at Kennesaw State University.

Visit the full list of Faculty Publications to view the work from other departments on campus.

Follow


Submissions from 2011

Cyber Insurance and the Management of Information Security Risk, Tridib Bandyopadhyay

Cyber Terrorism: Impacts, Vulnerabilities, and U.S. Policy, Tridib Bandyopadhyay

Link

Study Abroad as an Education Experience: Challenges, Realizations, and Lessons Learned, Albert L. Harris, France Belanger, Meg Murray, and Andrew Urbaczewski

Link

Information Privacy: Understanding How Firms Behave Online, Gerald C. Kane, Kathy Stewart Schwaig, and Veda C. Storey

Link

User Profiles and Personas in the Design and Development of Consumer Health Technologies, Cynthia LeRouge, Jiao Ma, Sweta Sneha, and Kristin Tolle

Rethinking Risk-based Information Security, Herbert J. Mattord

PDF

E-Textbooks Are Coming: Are We Ready?, Meg C. Murray and Jorge Pérez

Link

A PhD in Information Systems for Emerging Economies: The Addis Ababa University Model, S. Negash, S. Anteneh, and R. Watson

I Didn't Know I Could Do That: Using Web-Based Tools to Enhance Learning, Jorge Pérez and Kevin Hurysz

Link

Individual Characteristics and Their Effect on Predicting Mu Rhythm Modulation, Adriane B. Randolph, Melody Moore Jackson, and Saurav Karmakar

Running Case: Stratified Custom Manufacturing, Russell Shaver

An Entymological View of Ethical Hacking, Michael E. Whitman

Advanced Topologies, Inc., Michael E. Whitman and Herbert J. Mattord

Principles of Information Security, 4th Edition, Michael E. Whitman and Herbert J. Mattord

Roadmap to Information Security: For IT and Infosec Managers, Michael E. Whitman and Herbert J. Mattord

Guide to Firewalls and VPNs, 3rd Edition, Michael E. Whitman, Herbert J. Mattord, and Andrew Green

Link

Security Risk Management at a Fortune 500 Firm: A Case Study, Humayun Zafar

File

An Exploration of Human Resource Management Information Systems Security, Humayun Zafar, Jan Guynes Clark, and Myung Ko

Submissions from 2010

Link

Information and Communication Technology Literacy: What Do Businesses Expect and What Do Business Schools Teach?, Radwan Ali and Irvin R. Katz

Link

Information Security in Networked Supply Chains: Impact of Network Vulnerability and Supply Chain Integration on Incentives to Invest, Tridib Bandyopadhyay, Varghese Jacob, and Srinivasan Raghunathan

Link

SEC XBRL Filing Requirements: An Instructional Case on Tagging Financial Statement Disclosures, Ernest Capozzoli and Stephanie Farewell

Similarities and Differences Between Indian Born and US Born IT Workers, Pamila Dembla and Amy B. Woszcznyski

Link

Toward a Theory of Whistleblowing Intentions: A Benefit-to-Cost Differential Perspective, Mark Keil, Amrit Tiwana, Robert Sainsbury, and Sweta Sneha

PDF

Database Security: What Students Need to Know, Meg C. Murray

PDF

Accessing ICT Enabled Content in Low-Income Countries: Think Big, Start Small, and Scale Up, Solomon Negash

Link

Learning Assessment of a Videoconference-Based Training: Lessons from Medical Training between USA and Ethiopia, Solomon Negash

Link

Integrating an Executive Panel on Communication in Senior Design, Judith Shaul Norback, Elke M. Leeds, and Ketki Kulkarni

Link

The Power and Promise of Web 2.0 Tools, G. Andrew Page and Radwan Ali

PDF

Generativity: The New Frontier for Information and Communication Technology Literacy, Jorge Pérez and Meg C. Murray

Link

Assessing Fit of Nontraditional Assistive Technologies, Adriane B. Randolph and Melody Moore Jackson

PDF

Digital Video Presentation and Student Performance: A Task Technology Fit Perspective, Arjan Raven, Elke M. Leeds, and ChongWoo Park

PDF

Creating Sustainable Education Projects in Roatan, Honduras Through Continuous Process Improvement, Arjan Raven, Adriane B. Randolph, and Shelli Heil

PDF

Analysis of XBRL Literature: A Decade of Progress and Puzzle, Saeed Roohani, Zhao Xianming, Ernest Capozzoli, and Barbara Lamberton

Hands-On Information Security Lab Manual, 3rd Edition, Michael E. Whitman and Herbert J. Mattord

Management of Information Security, 3rd Edition, Michael E. Whitman and Herbert J. Mattord

Management of Information Security, 3rd Edition, Michael E. Whitman and Herbert J. Mattord

Readings and Cases in Information Security: Law & Ethics, Michael E. Whitman and Herbert J. Mattord

PDF

A Call to IS Educators to Respond to the Voices of Women in Information Security, Amy B. Woszczynski and Sherri Shade

Submissions from 2009

PDF

The Impact of Face-to-Face Orientation on Online Retention: A Pilot Study, Radwan Ali and Elke M. Leeds

PDF

Analysis of the Factors that Influence Online Purchasing, Donald Amoroso and D. Scott Hunsinger

PDF

Measuring the Acceptance of Internet Technology by Consumers, Donald L. Amoroso and Scott Hunsinger

PDF

Why IT Managers Don't Go for Cyber-Insurance Products, Tridib Bandyopadhyay, Vijay S. Mookerjee, and Ram C. Rao

Link

Using digital video technology to reduce communication apprehension in business education, Elke M. Leeds and Ruth A. Mauer

PDF

Animated Courseware Support for Teaching Database Design, Meg C. Murray and Mario Guimaraes

Link

Synchronous Hybrid E-Learning: Empirical Comparison with Asynchronous and Traditional Classrooms, Solomon Negash, Michelle Emerson, and John Vandegrieft

Link

Developing Soft Skills to Manage User Expectations in IT Projects: Knowledge Reuse among IT Project Managers, Stacie Petter and Adriane B. Randolph

The Tao To Understanding Enterprise It Project Complexity: Sun-Tzu's Five Factors Revisited, James W. Price Jr. and Pamila Dembla

Link

The Quality of Online Privacy Policies: A Resource-Dependency Perspective, Veda C. Storey, Gerald C. Kane, and Kathy Stewart Schwaig

PDF

ICT Integration Efforts in Higher Education in Developing Economies: The Case of Addis Ababa University, Ethiopia, Dawit Tibebu, Tridib Bandyopadhyay, and Solomon Negash

File

Cultural and Diversity Perceptions of IT Workers of Indian Descent, Amy B. Woszcznyski, P. Dembla, and Sherri Shade

Link

Interventions and Solutions in Gender and IT, Amy B. Woszczynski and Janette Moody

Submissions from 2008

PDF

An Exploratory Overview of Teaching Computer Game Development, Mario Guimaraes and Meg C. Murray

Link

Learned Ethical Behavior: An Academic Perspective, David E. Gundersen, Ernest Capozzoli, and Rajasree K. Rajamma

PDF

Oil and Gas Financial Reporting Using the USGAAP XBRL Taxonomy, Tim Mahon and Ernest Capozzoli

PDF

A Model for Using a Capstone Experience as One Method of Assessment of an Information Systems Degree Program, Meg C. Murray, Jorge Pérez, and Mario Guimaraes

PDF

A Decision Model For Contracting Helpdesk Services, Meg C. Murray and Joy Young

PDF

Animated Database Courseware: Using Animations to Extend Conceptual Understanding of Database Concepts, Meg Murray and Mario Guimaraes

PDF

Expanding the Database Curriculum, Meg Murray and Mario Guimaraes

Handbook of Distance Learning for Real-Time and Asynchronous Information Technology Education, Solomon Negash

Link

Business Intelligence, Solomon Negash and Paul Gray

PDF

An African PhD Program in Information Systems: The Case of Addis Ababa University, Ethiopia, Solomon Negash, Richard T. Watson, and Detmar W. Straub

PDF

Computing for the Masses: Extending the Computer Science Curriculum with Information Technology Literacy, Jorge Pérez and Meg C. Murray

Link

Strategic Dependence on the IT Resource and Outsourcing: A Test of the Strategic Control Model, Detmar Straub, Peter Weill, and Kathy Stewart Schwaig

Teaching Information Security in a Hybrid Distance Learning Setting, Michael E. Whitman and Herbert J. Mattord

Guide to Firewalls and Network Security: Intrusion Detection and Vpns, 2nd edition, Michael E. Whitman, Herbert J. Mattord, Richard Austin, and Greg Holden

Link

Delivering Online Asynchronous IT Courses to High School Students: Challenges and Lessons Learned, Amy B. Woszczynski

Submissions from 2007

PDF

Developing A Customized Program Assessment Methodology For Assurance Of Learning: A Case Study, Hope Baker, Dorothy Brawley, Jane E. Campbell, Ernest Capozzoli, Linda Malgeri, and Gary B. Roberts

Link

E-Government Deployment Indicators: A Case Study of Georgia's County Government, Ernest Capozzoli and Elke Meyo Leeds

PDF

Organizational Adoption of Web-enabled Services for Information Dissemination, Pamila Dembla, Prashant Palvia, and Lloyd Brooks

Link

Understanding the Adoption of Web-Enabled Transaction Processing by Small Businesses, Pamila Dembla, Prashant Palvia, and Balaji Krishnan

Managing Internationally: Succeeding in a Culturally Diverse World, Kamal Fatehi

PDF

Learner-Centered Assignments in Computer Literacy, Martha E. Myers, Meg C. Murray, Mario Guimaraes, and Debra B. Geist

Editorial Preface, Solomon Negash

Link

Synchronous Hybrid E-Learning: Teaching Complex Information Systems Classes Online, Solomon Negash, Marlene V. Wilcox, and Michelle Emerson

PDF

The Effects of Web-based Technologies on Knowledge Transfer, Waymond Rogers and Solomon Negash

PDF

Assessing Online Discussion Forum Participation, Matthew Shaul

Management of Information Security, 2nd Edition, Michael E. Whitman and Herbert J. Mattord

Principles of Information Security, 3rd Edition, Michael E. Whitman and Herbert J. Mattord

Submissions from 2006

Link

The Pipeline and Beyond, Martha Myers, Janette Moody, Catherine Beise, and Amy B. Woszczynski

PDF

Journey to the Center of the Core: Computers and the Internet in the Core Curriculum, Jorge Pérez and Meg C. Murray

PDF

Project management issues in IT offshore outsourcing, Kathy Schwaig, Stephen Gillam, and Elke M. Leeds

Link

Compliance to the Fair Information Practices: How Are the Fortune 500 Handling Online Privacy Disclosures?, Kathy Stewart Schwaig, Gerald C. Kane, and Veda C. Storey

Principles of Incident Response and Disaster Recovery, Michael E. Whitman and Herbert J. Mattord

PDF

Student Perceptions of Diversity Issues in IT, Amy B. Woszczynski, Martha Myers, and Janette Moody

PDF

Realizing the Open-Closed Principle, Chong-wei Xu and Jose Hughes

Submissions from 2005

Link

Women in the IT Profession, Catherine Beise, Janette Moody, Martha Myers, and Amy B. Woszczynski

Link

InfoSec Policy - The Basis for Effective Security Programs, Herbert J. Mattord and Michael E. Whitman

Assessment of Brain Activities in Immersive Environments, Max M. North, Sarah M. North, John Crunk, and Jeff Singleton

Link

The Moderating Effect of On-line Experience on the Antecedents and Consequences of On-Line Satisfaction, Waymond Rogers, Solomon Negash, and Kwanho Suk

Link

Privacy, Fair Information Practices and the Fortune 500: The Virtual Reality of Compliance, Kathy Stewart Schwaig, Gerald C. Kane, and Veda C. Storey

Readings and Cases in the Management of Information Security, Michael E. Whitman and Herbert J. Mattord

Hands-On Information Security Lab Manual, 2nd Edition, Michael E. Whitman, Herbert J. Mattord, and Dave Shackleford

PDF

Personality and Programming, Amy B. Woszczynski, Tracy C. Guthrie, and Sherri Shade