A collection of published articles from members of the Department of Information Systems at Kennesaw State University.

Visit the full list of Faculty Publications to view the work from other departments on campus.

KSU Faculty can send a current list of their publications to the administrator for inclusion in this series.

Follow


Submissions from 2010

Similarities and Differences Between Indian Born and US Born IT Workers, Pamila Dembla and Amy B. Woszcznyski

Link

Toward a Theory of Whistleblowing Intentions: A Benefit-to-Cost Differential Perspective, Mark Keil, Amrit Tiwana, Robert Sainsbury, and Sweta Sneha

PDF

Database Security: What Students Need to Know, Meg C. Murray

PDF

Accessing ICT Enabled Content in Low-Income Countries: Think Big, Start Small, and Scale Up, Solomon Negash

Link

Learning Assessment of a Videoconference-Based Training: Lessons from Medical Training between USA and Ethiopia, Solomon Negash

Link

Integrating an Executive Panel on Communication in Senior Design, Judith Shaul Norback, Elke M. Leeds, and Ketki Kulkarni

Link

The Power and Promise of Web 2.0 Tools, G. Andrew Page and Radwan Ali

PDF

Generativity: The New Frontier for Information and Communication Technology Literacy, Jorge Pérez and Meg C. Murray

Link

Assessing Fit of Nontraditional Assistive Technologies, Adriane B. Randolph and Melody Moore Jackson

PDF

Digital Video Presentation and Student Performance: A Task Technology Fit Perspective, Arjan Raven, Elke M. Leeds, and ChongWoo Park

PDF

Creating Sustainable Education Projects in Roatan, Honduras Through Continuous Process Improvement, Arjan Raven, Adriane B. Randolph, and Shelli Heil

PDF

Analysis of XBRL Literature: A Decade of Progress and Puzzle, Saeed Roohani, Zhao Xianming, Ernest Capozzoli, and Barbara Lamberton

Hands-On Information Security Lab Manual, 3rd Edition, Michael E. Whitman and Herbert J. Mattord

Management of Information Security, 3rd Edition, Michael E. Whitman and Herbert J. Mattord

Management of Information Security, 3rd Edition, Michael E. Whitman and Herbert J. Mattord

Readings and Cases in Information Security: Law & Ethics, Michael E. Whitman and Herbert J. Mattord

PDF

A Call to IS Educators to Respond to the Voices of Women in Information Security, Amy B. Woszczynski and Sherri Shade

Link

Modeling Road Traffic Demand of Container Consolidation in a Chinese Port Terminal, Zhongzhen Yang, Gang Chen, and Douglas R. Moodie

Submissions from 2009

PDF

The Impact of Face-to-Face Orientation on Online Retention: A Pilot Study, Radwan Ali and Elke M. Leeds

PDF

Understanding Consumers' Acceptance of Online Purchasing, D. Amoroso and S. Hunsinger

PDF

Analysis of the Factors that Influence Online Purchasing, Donald Amoroso and D. Scott Hunsinger

PDF

Measuring the Acceptance of Internet Technology by Consumers, Donald L. Amoroso and Scott Hunsinger

PDF

Why IT Managers Don't Go for Cyber-Insurance Products, Tridib Bandyopadhyay, Vijay S. Mookerjee, and Ram C. Rao

PDF

Addressing Business Agility Challenges with Enterprise Systems, D. L. Goodhue, D. Q. Chen, M. C. Boudreau, and J. Cochran

Link

Using digital video technology to reduce communication apprehension in business education, Elke M. Leeds and Ruth A. Mauer

PDF

Animated Courseware Support for Teaching Database Design, Meg C. Murray and Mario Guimaraes

Link

Synchronous Hybrid E-Learning: Empirical Comparison with Asynchronous and Traditional Classrooms, Solomon Negash, Michelle Emerson, and John Vandegrieft

Link

Developing Soft Skills to Manage User Expectations in IT Projects: Knowledge Reuse among IT Project Managers, Stacie Petter and Adriane B. Randolph

The Tao To Understanding Enterprise It Project Complexity: Sun-Tzu's Five Factors Revisited, James W. Price Jr. and Pamila Dembla

Link

The Quality of Online Privacy Policies: A Resource-Dependency Perspective, Veda C. Storey, Gerald C. Kane, and Kathy Stewart Schwaig

PDF

ICT Integration Efforts in Higher Education in Developing Economies: The Case of Addis Ababa University, Ethiopia, Dawit Tibebu, Tridib Bandyopadhyay, and Solomon Negash

Cultural and Diversity Perceptions of IT Workers of Indian Descent, Amy B. Woszcznyski, P. Dembla, and Sherri Shade

Link

Interventions and Solutions in Gender and IT, Amy B. Woszczynski and Janette Moody

Submissions from 2008

PDF

An Exploratory Overview of Teaching Computer Game Development, Mario Guimaraes and Meg C. Murray

Link

Learned Ethical Behavior: An Academic Perspective, David E. Gundersen, Ernest Capozzoli, and Rajasree K. Rajamma

PDF

Oil and Gas Financial Reporting Using the USGAAP XBRL Taxonomy, Tim Mahon and Ernest Capozzoli

PDF

A Model for Using a Capstone Experience as One Method of Assessment of an Information Systems Degree Program, Meg C. Murray, Jorge Pérez, and Mario Guimaraes

PDF

A Decision Model For Contracting Helpdesk Services, Meg C. Murray and Joy Young

PDF

Animated Database Courseware: Using Animations to Extend Conceptual Understanding of Database Concepts, Meg Murray and Mario Guimaraes

PDF

Expanding the Database Curriculum, Meg Murray and Mario Guimaraes

Handbook of Distance Learning for Real-Time and Asynchronous Information Technology Education, Solomon Negash

Link

Business Intelligence, Solomon Negash and Paul Gray

PDF

An African PhD Program in Information Systems: The Case of Addis Ababa University, Ethiopia, Solomon Negash, Richard T. Watson, and Detmar W. Straub

PDF

Computing for the Masses: Extending the Computer Science Curriculum with Information Technology Literacy, Jorge Pérez and Meg C. Murray

Link

Strategic Dependence on the IT Resource and Outsourcing: A Test of the Strategic Control Model, Detmar Straub, Peter Weill, and Kathy Stewart Schwaig

Teaching Information Security in a Hybrid Distance Learning Setting, Michael E. Whitman and Herbert J. Mattord

Guide to Firewalls and Network Security: Intrusion Detection and Vpns, 2nd edition, Michael E. Whitman, Herbert J. Mattord, Richard Austin, and Greg Holden

Link

Delivering Online Asynchronous IT Courses to High School Students: Challenges and Lessons Learned, Amy B. Woszczynski

Submissions from 2007

PDF

Developing A Customized Program Assessment Methodology For Assurance Of Learning: A Case Study, Hope Baker, Dorothy Brawley, Jane E. Campbell, Ernest Capozzoli, Linda Malgeri, and Gary B. Roberts

Link

E-Government Deployment Indicators: A Case Study of Georgia's County Government, Ernest Capozzoli and Elke Meyo Leeds

PDF

Organizational Adoption of Web-enabled Services for Information Dissemination, Pamila Dembla, Prashant Palvia, and Lloyd Brooks

Link

Understanding the Adoption of Web-Enabled Transaction Processing by Small Businesses, Pamila Dembla, Prashant Palvia, and Balaji Krishnan

Managing Internationally: Succeeding in a Culturally Diverse World, Kamal Fatehi

Link

Knowledge Creation in Marketing: The Role of Predictive Analytics, Joe F. Hair Jr.

PDF

Learner-Centered Assignments in Computer Literacy, Martha E. Myers, Meg C. Murray, Mario Guimaraes, and Debra B. Geist

Editorial Preface, Solomon Negash

Link

Synchronous Hybrid E-Learning: Teaching Complex Information Systems Classes Online, Solomon Negash, Marlene V. Wilcox, and Michelle Emerson

PDF

The Effects of Web-based Technologies on Knowledge Transfer, Waymond Rogers and Solomon Negash

PDF

Assessing Online Discussion Forum Participation, Matthew Shaul

Management of Information Security, 2nd Edition, Michael E. Whitman and Herbert J. Mattord

Principles of Information Security, 3rd Edition, Michael E. Whitman and Herbert J. Mattord

Submissions from 2006

Link

The Pipeline and Beyond, Martha Myers, Janette Moody, Catherine Beise, and Amy B. Woszczynski

PDF

Journey to the Center of the Core: Computers and the Internet in the Core Curriculum, Jorge Pérez and Meg C. Murray

Information Sharing in Innovation Networks, Jennifer L. Priestley and Subhashish Samaddar

The Role of Ambiguity in the Transfer of Knowledge Within Multi-Organizational Networks, Jennifer L. Priestley and Subhashish Samaddar

PDF

Project management issues in IT offshore outsourcing, Kathy Schwaig, Stephen Gillam, and Elke M. Leeds

Link

Compliance to the Fair Information Practices: How Are the Fortune 500 Handling Online Privacy Disclosures?, Kathy Stewart Schwaig, Gerald C. Kane, and Veda C. Storey

Principles of Incident Response and Disaster Recovery, Michael E. Whitman and Herbert J. Mattord

PDF

Student Perceptions of Diversity Issues in IT, Amy B. Woszczynski, Martha Myers, and Janette Moody

PDF

Realizing the Open-Closed Principle, Chong-wei Xu and Jose Hughes

Submissions from 2005

Link

Women in the IT Profession, Catherine Beise, Janette Moody, Martha Myers, and Amy B. Woszczynski

Link

InfoSec Policy - The Basis for Effective Security Programs, Herbert J. Mattord and Michael E. Whitman

Assessment of Brain Activities in Immersive Environments, Max M. North, Sarah M. North, John Crunk, and Jeff Singleton

Knowledge Transfer Within Interorganizational Networks, Jennifer L. Priestley

Link

The Moderating Effect of On-line Experience on the Antecedents and Consequences of On-Line Satisfaction, Waymond Rogers, Solomon Negash, and Kwanho Suk

Link

Privacy, Fair Information Practices and the Fortune 500: The Virtual Reality of Compliance, Kathy Stewart Schwaig, Gerald C. Kane, and Veda C. Storey

Readings and Cases in the Management of Information Security, Michael E. Whitman and Herbert J. Mattord

Hands-On Information Security Lab Manual, 2nd Edition, Michael E. Whitman, Herbert J. Mattord, and Dave Shackleford

PDF

Personality and Programming, Amy B. Woszczynski, Tracy C. Guthrie, and Sherri Shade

Submissions from 2004

Link

IT Project Managers' Perceptions and Use of Virtual Team Technologies, Catherine M. Beise, Fred Niederman, and Herbert J. Mattord

PDF

Course Revitalization as a Change Driver Throughout Undergraduate Business Curriculum, Elke M. Leeds and Radwan Ali

PDF

Move to Component Based Architectures: Introducing Microsoft's .NET Platform into the College Classroom, Meg C. Murray

Link

Communities of Practice to Overcome Africa’s “Brain-Drain”: The Role of Information Communication Technology, Solomon Negash

Virtual Reality Combats Test Anxiety: A Case Study Report, Max M. North and Sarah M. North

Immersive Visualization Tool for Pedagogical Practices of Computer Science Concepts: A Pilot Study, Max M. North, Joseph Sessum, and Alex Zakalev

Link

In Defense of the Realm: Understanding the Threats to Information Security, Michael E. Whitman

Making Users Mindful of IT Security, Michael E. Whitman and Herbert J. Mattord

Management of Information Security, 1st Edition, Michael E. Whitman and Herbert J. Mattord

Principles of Information Security, 2nd Edition, Michael E. Whitman and Herbert J. Mattord

Link

Exemplary Works on Information Systems Research, Michael E. Whitman and Amy B. Woszczynski

Link

Implementing Voting Systems: The Georgia Method, Brit J. Williams and Merle S. King

Link

Women in Information Technology, Amy B. Woszczynski, Martha Myers, and Catherine Beise

Link

The Problem of Common Method Variance in IS Research, Amy B. Woszczynski and Michael E. Whitman

Submissions from 2003

Internet Pharmaceutical Sales: Attributes, Concerns, and Future Forecast, Katy Bruckel and Ernest Capozzoli

Diversity and the Information Technology Workforce: Barriers and Opportunities, Janette W. Moody, Catherine M. Beise, Amy B. Woszczynski, and Martha Myers

PDF

Some Free - Some Fee: The Emerging Business Model for e-Content Web Sites, Meg C. Murray and Ravi Narayanaswamy

PDF

An IS Capstone Project: The Mywick Property Management System, Martha Myers

Virtual Reality Therapy in Aid of Senior Citizens' Psychological Disorders, Max M. North and Jason Rives

Link

Intertwining Material and Virtual Work, Daniel Robey, Kathy Stewart Schwaig, and Leigh Jin

PDF

Enemy at the Gate: Threats to Information Security, Michael E. Whitman