A collection of published articles from members of the Department of Information Systems at Kennesaw State University.

Visit the full list of Faculty Publications to view the work from other departments on campus.

Follow


Submissions from 2021

Link

Deepfakes: Awareness, Concerns, and Platform Accountability, Justin D. Cochran and Stuart A. Napshin

Link

The 4th industrial revolution powered by the integration of ai, blockchain, and 5g, Aaron M. French, J. P. Shim, Kai R. Larsen, Marten Risius, and Hemant Jain

Link

The 4th industrial revolution powered by the integration of ai, blockchain, and 5g, Aaron M. French, J. P. Shim, Kai R. Larsen, Marten Risius, and Hemant Jain

Link

The Journal of Organizational Computing and Electronic Commerce: An Analysis of Its Impact on the Information Systems Field in the 21st Century, Aaron M. French and Veda C. Storey

Link

The Journal of Organizational Computing and Electronic Commerce: An Analysis of Its Impact on the Information Systems Field in the 21st Century, Aaron M. French and Veda C. Storey

Link

LES MISÉRABLES: The Tale of COVID-19 and Role of Information, Aaron M. French, Veda C. Storey, and Linda Wallace

Link

LES MISÉRABLES: The Tale of COVID-19 and Role of Information, Aaron M. French, Veda C. Storey, and Linda Wallace

Link

Do social networking fan page posts matter for corporate image? Modified elaboration likelihood model perspective, Soo Il Shin, Dianne J. Hall, Sumin Han, David Paradice, and Teresa Lang

Link

The black hole-star formation connection over cosmic time, Chandra B. Singh, Nelitha Kulasiri, Max North, and David Garofalo

Link

Alleviating Challenges Related to FDA-Approved Medical Wearables Using Blockchain Technology, Sweta Sneha, Alina Panjwani, Brandon Lade, Jiyoun Randolph, and Monica Vickery

Link

Health Internet Technology for Chronic Conditions: Review of Diabetes Management Apps, Sweta Sneha, Srivarun Thalla, Ishaan Rischie, and Hossain Shahriar

Agile Course Design: Multi-University Faculty Collaboration to Design the IS Course for an Online MBA Program, Amy B. Woszczynski, Jeannie L. Pridmore, Tridib Bandyopadhyay, Joy Godin, and Bradley J. Prince

Submissions from 2017

PDF

Examination of the QM Process: Making A Case for Transformative Professional Development Model, Radwan Ali and James Wright

PDF

A Security and Privacy Framework for e-Learning, Radwan Ali and Humayun Zafar

Link

A model to analyze the challenge of using cyber insurance, Tridib Bandyopadhyay and Vijay Mookerjee

Link

A Concise Review of the Emergence of Big Data and Plausible Trends, Max M. North, Ronny Richardson, Ashanta Abron, and Saurabh Gupta

Link

Information Security and Ethics Awareness: A Concise Comparative Investigation., Max M. North, Ronny Richardson, and Sarah M. North

PDF

A Concise Review of Economic Flourishment of China, Max M. North, Ronny Richardson, Rakesh Patel, and Luke Dabbs

PDF

Data Warehousing: A Practical Managerial Approach, Max M. North, Larry Thomas, Ronny Richardson, and Patrick Akpess

PDF

Ransomware: Evolution, Mitigation and Prevention, Ronny Richardson and Max M. North

PDF

Learning Outcomes for Cyber Defense Competitions, Amy B. Woszczynski and Andrew Green

Submissions from 2016

Link

Gender-based Differences in Culture in the Indian IT Workplace, Amy B. Woszczynski, Pamila Dembla, and Humayun Zafar

Submissions from 2014

Link

Dynamic Competition in IT Security: A Differential Games Approach, Tridib Bandyopadhyay, Dengpan Liu, Vijay Mookerjee, and Allen Wilhite

Link

Multilevel Research in Information Systems: Concepts, Strategies, Problems and Pitfalls, France Bélanger, Meghann Cefaratti, Traci Carte, and Steven E. Markham

Link

The Role of Student Characteristics in Predicting Retention in Online Courses, J. Cochran, S. Campbell, H. Baker, and E. Leeds

Link

The Role of Student Characteristics in Predicting Retention in Online Business Courses, J. Cochran, S. Campbell, Hope Baker, and E. Leeds

PDF

The adoption of e-learning systems in low income countries: the case of Ethiopia, Yonas Hagos and Solomon Negash

PDF

Promoting Information Systems Major to Undergraduate Students - A Comprehensive Investigation, Lei Li, Chi Zhang, and Guangzhi Zheng

PDF

Rethinking FS-ISAC: An IT Security Information Sharing Model for the Financial Services Sector, Charles Liu, Humayun Zafar, and Yoris A. Au

PDF

Rethinking FS-ISAC: An IT Security Information Sharing Network Model for the Financial Services Sector, Charles Zhechao Liu, Humayun Zafar, and Yoris A. Au

Link

Factors for Measuring Password-based Authentication Practices, Herbert J. Mattord, Yair Levy, and Steven Furnell

PDF

Analysis of a Scholarly Social Networking site: The Case of the Dormant User, Meg Murray

PDF

Unraveling the digital literacy paradox: How higher education fails at the fourth literacy., Meg Coffin Murray and Jorge Perez

Link

Distance Learning Immersive Environments: Sense of Presence Exploration, Max M. North

PDF

A Comparative Review of Information Technology Project Management in Private and Public Sector Organization, Muhammad Obeidat and Max North

PDF

Information Security Governance for the Non-security Business Executive, Michael Whitman and Herbert J. Mattord

Link

Security Risk Management in Health Care: A Case Study, Humayun Zafar, Myung S. Ko, and Jan G. Clark

Submissions from 2012

Kaizen Blitz, Satya S. Chakravorty and Richard M. Franza

Link

Research Note—An Investigation of the Appropriation of Technology-Mediated Training Methods Incorporating Enactive and Collaborative Learning, Saurabh Gupta and Robert Bostrom

Link

A Framework for Instituting Software Metrics in Small Software Organizations, Donald E. Meredith, Hisham M. Haddad, and Nancy C. Ross

PDF

Student Interaction with Online Course Content: Build It and They Might Come, Meg C. Murray, Jorge Pérez, Debra B. Geist, and Alison Hedrick

File

Perception of African Youth on Personal Computer Utilization: The Case of Ethiopia and Rwanda, S. Negash

Link

A PhD in Information Systems for Emerging Economies: The Addis Ababa University Model, Solomon Negash, Salehu Anteneh, and Richard T. Watson

Link

Triangulating System Requirements for Users With Severe Motor Disabilities, Adriane B. Randolph

Link

Triangulating System Requirements for Users With Severe Motor Disabilities, Adriane B. Randolph

Link

Silence or Knowing in IT-Facilitated Face-to-Face Meetings Silence or Knowing in IT-Facilitated Face-to-Face Meetings, Arjan Raven and Omar A. El Sawy

Brain Games as a Potential Nonpharmaceutical Alternative for the Treatment of ADHD, Stacy C. Wegrzyn, Doug Hearrington, Tim Martin, and Adriane B. Randolph

Guide to Network Security, Michael E. Whitman

File

Threats to Information Security Revisited, Michael Whitman and Herbert J. Mattord

Link

Financial Impact of Information Security Breaches on Breached Firms and their Non-Breached Competitors, Humayun Zafar, Myung S. Ko, and Kweku-Muata Osei-Bryson

Link

Ubiquitous Healthcare Information System: Toward Crossing the Security Chasm, Humayun Zafar and Sweta Sneha

Submissions from 2011

Cyber Insurance and the Management of Information Security Risk, Tridib Bandyopadhyay

Cyber Terrorism: Impacts, Vulnerabilities, and U.S. Policy, Tridib Bandyopadhyay

Link

Study Abroad as an Education Experience: Challenges, Realizations, and Lessons Learned, Albert L. Harris, France Belanger, Meg Murray, and Andrew Urbaczewski

Link

Information Privacy: Understanding How Firms Behave Online, Gerald C. Kane, Kathy Stewart Schwaig, and Veda C. Storey

Link

User Profiles and Personas in the Design and Development of Consumer Health Technologies, Cynthia LeRouge, Jiao Ma, Sweta Sneha, and Kristin Tolle

Rethinking Risk-based Information Security, Herbert J. Mattord

PDF

E-Textbooks Are Coming: Are We Ready?, Meg C. Murray and Jorge Pérez

Link

A PhD in Information Systems for Emerging Economies: The Addis Ababa University Model, S. Negash, S. Anteneh, and R. Watson

I Didn't Know I Could Do That: Using Web-Based Tools to Enhance Learning, Jorge Pérez and Kevin Hurysz

Link

Individual Characteristics and Their Effect on Predicting Mu Rhythm Modulation, Adriane B. Randolph, Melody Moore Jackson, and Saurav Karmakar

Running Case: Stratified Custom Manufacturing, Russell Shaver

An Entymological View of Ethical Hacking, Michael E. Whitman

Advanced Topologies, Inc., Michael E. Whitman and Herbert J. Mattord

Principles of Information Security, 4th Edition, Michael E. Whitman and Herbert J. Mattord