A collection of published articles from members of the Department of Information Systems at Kennesaw State University.
Visit the full list of Faculty Publications to view the work from other departments on campus.
Submissions from 2012
Financial Impact of Information Security Breaches on Breached Firms and their Non-Breached Competitors, Humayun Zafar, Myung S. Ko, and Kweku-Muata Osei-Bryson
Ubiquitous Healthcare Information System: Toward Crossing the Security Chasm, Humayun Zafar and Sweta Sneha
Submissions from 2011
Cyber Insurance and the Management of Information Security Risk, Tridib Bandyopadhyay
Cyber Terrorism: Impacts, Vulnerabilities, and U.S. Policy, Tridib Bandyopadhyay
Study Abroad as an Education Experience: Challenges, Realizations, and Lessons Learned, Albert L. Harris, France Belanger, Meg Murray, and Andrew Urbaczewski
Information Privacy: Understanding How Firms Behave Online, Gerald C. Kane, Kathy Stewart Schwaig, and Veda C. Storey
User Profiles and Personas in the Design and Development of Consumer Health Technologies, Cynthia LeRouge, Jiao Ma, Sweta Sneha, and Kristin Tolle
Rethinking Risk-based Information Security, Herbert J. Mattord
E-Textbooks Are Coming: Are We Ready?, Meg C. Murray and Jorge Pérez
A PhD in Information Systems for Emerging Economies: The Addis Ababa University Model, S. Negash, S. Anteneh, and R. Watson
I Didn't Know I Could Do That: Using Web-Based Tools to Enhance Learning, Jorge Pérez and Kevin Hurysz
Individual Characteristics and Their Effect on Predicting Mu Rhythm Modulation, Adriane B. Randolph, Melody Moore Jackson, and Saurav Karmakar
Running Case: Stratified Custom Manufacturing, Russell Shaver
An Entymological View of Ethical Hacking, Michael E. Whitman
Advanced Topologies, Inc., Michael E. Whitman and Herbert J. Mattord
Principles of Information Security, 4th Edition, Michael E. Whitman and Herbert J. Mattord
Roadmap to Information Security: For IT and Infosec Managers, Michael E. Whitman and Herbert J. Mattord
Guide to Firewalls and VPNs, 3rd Edition, Michael E. Whitman, Herbert J. Mattord, and Andrew Green
Security Risk Management at a Fortune 500 Firm: A Case Study, Humayun Zafar
An Exploration of Human Resource Management Information Systems Security, Humayun Zafar, Jan Guynes Clark, and Myung Ko
Submissions from 2010
Information and Communication Technology Literacy: What Do Businesses Expect and What Do Business Schools Teach?, Radwan Ali and Irvin R. Katz
Information Security in Networked Supply Chains: Impact of Network Vulnerability and Supply Chain Integration on Incentives to Invest, Tridib Bandyopadhyay, Varghese Jacob, and Srinivasan Raghunathan
SEC XBRL Filing Requirements: An Instructional Case on Tagging Financial Statement Disclosures, Ernest Capozzoli and Stephanie Farewell
Similarities and Differences Between Indian Born and US Born IT Workers, Pamila Dembla and Amy B. Woszcznyski
Toward a Theory of Whistleblowing Intentions: A Benefit-to-Cost Differential Perspective, Mark Keil, Amrit Tiwana, Robert Sainsbury, and Sweta Sneha
Database Security: What Students Need to Know, Meg C. Murray
Accessing ICT Enabled Content in Low-Income Countries: Think Big, Start Small, and Scale Up, Solomon Negash
Learning Assessment of a Videoconference-Based Training: Lessons from Medical Training between USA and Ethiopia, Solomon Negash
Integrating an Executive Panel on Communication in Senior Design, Judith Shaul Norback, Elke M. Leeds, and Ketki Kulkarni
The Power and Promise of Web 2.0 Tools, G. Andrew Page and Radwan Ali
Generativity: The New Frontier for Information and Communication Technology Literacy, Jorge Pérez and Meg C. Murray
Assessing Fit of Nontraditional Assistive Technologies, Adriane B. Randolph and Melody Moore Jackson
Digital Video Presentation and Student Performance: A Task Technology Fit Perspective, Arjan Raven, Elke M. Leeds, and ChongWoo Park
Creating Sustainable Education Projects in Roatan, Honduras Through Continuous Process Improvement, Arjan Raven, Adriane B. Randolph, and Shelli Heil
Analysis of XBRL Literature: A Decade of Progress and Puzzle, Saeed Roohani, Zhao Xianming, Ernest Capozzoli, and Barbara Lamberton
Hands-On Information Security Lab Manual, 3rd Edition, Michael E. Whitman and Herbert J. Mattord
Management of Information Security, 3rd Edition, Michael E. Whitman and Herbert J. Mattord
Management of Information Security, 3rd Edition, Michael E. Whitman and Herbert J. Mattord
Readings and Cases in Information Security: Law & Ethics, Michael E. Whitman and Herbert J. Mattord
A Call to IS Educators to Respond to the Voices of Women in Information Security, Amy B. Woszczynski and Sherri Shade
Submissions from 2009
The Impact of Face-to-Face Orientation on Online Retention: A Pilot Study, Radwan Ali and Elke M. Leeds
Analysis of the Factors that Influence Online Purchasing, Donald Amoroso and D. Scott Hunsinger
Measuring the Acceptance of Internet Technology by Consumers, Donald L. Amoroso and Scott Hunsinger
Why IT Managers Don't Go for Cyber-Insurance Products, Tridib Bandyopadhyay, Vijay S. Mookerjee, and Ram C. Rao
Using digital video technology to reduce communication apprehension in business education, Elke M. Leeds and Ruth A. Mauer
Animated Courseware Support for Teaching Database Design, Meg C. Murray and Mario Guimaraes
Synchronous Hybrid E-Learning: Empirical Comparison with Asynchronous and Traditional Classrooms, Solomon Negash, Michelle Emerson, and John Vandegrieft
Developing Soft Skills to Manage User Expectations in IT Projects: Knowledge Reuse among IT Project Managers, Stacie Petter and Adriane B. Randolph
The Tao To Understanding Enterprise It Project Complexity: Sun-Tzu's Five Factors Revisited, James W. Price Jr. and Pamila Dembla
The Quality of Online Privacy Policies: A Resource-Dependency Perspective, Veda C. Storey, Gerald C. Kane, and Kathy Stewart Schwaig
ICT Integration Efforts in Higher Education in Developing Economies: The Case of Addis Ababa University, Ethiopia, Dawit Tibebu, Tridib Bandyopadhyay, and Solomon Negash
Cultural and Diversity Perceptions of IT Workers of Indian Descent, Amy B. Woszcznyski, P. Dembla, and Sherri Shade
Interventions and Solutions in Gender and IT, Amy B. Woszczynski and Janette Moody
Submissions from 2008
An Exploratory Overview of Teaching Computer Game Development, Mario Guimaraes and Meg C. Murray
Learned Ethical Behavior: An Academic Perspective, David E. Gundersen, Ernest Capozzoli, and Rajasree K. Rajamma
Oil and Gas Financial Reporting Using the USGAAP XBRL Taxonomy, Tim Mahon and Ernest Capozzoli
A Model for Using a Capstone Experience as One Method of Assessment of an Information Systems Degree Program, Meg C. Murray, Jorge Pérez, and Mario Guimaraes
A Decision Model For Contracting Helpdesk Services, Meg C. Murray and Joy Young
Animated Database Courseware: Using Animations to Extend Conceptual Understanding of Database Concepts, Meg Murray and Mario Guimaraes
Expanding the Database Curriculum, Meg Murray and Mario Guimaraes
Handbook of Distance Learning for Real-Time and Asynchronous Information Technology Education, Solomon Negash
Business Intelligence, Solomon Negash and Paul Gray
An African PhD Program in Information Systems: The Case of Addis Ababa University, Ethiopia, Solomon Negash, Richard T. Watson, and Detmar W. Straub
Computing for the Masses: Extending the Computer Science Curriculum with Information Technology Literacy, Jorge Pérez and Meg C. Murray
Strategic Dependence on the IT Resource and Outsourcing: A Test of the Strategic Control Model, Detmar Straub, Peter Weill, and Kathy Stewart Schwaig
Teaching Information Security in a Hybrid Distance Learning Setting, Michael E. Whitman and Herbert J. Mattord
Guide to Firewalls and Network Security: Intrusion Detection and Vpns, 2nd edition, Michael E. Whitman, Herbert J. Mattord, Richard Austin, and Greg Holden
Delivering Online Asynchronous IT Courses to High School Students: Challenges and Lessons Learned, Amy B. Woszczynski
Submissions from 2007
Developing A Customized Program Assessment Methodology For Assurance Of Learning: A Case Study, Hope Baker, Dorothy Brawley, Jane E. Campbell, Ernest Capozzoli, Linda Malgeri, and Gary B. Roberts
E-Government Deployment Indicators: A Case Study of Georgia's County Government, Ernest Capozzoli and Elke Meyo Leeds
Organizational Adoption of Web-enabled Services for Information Dissemination, Pamila Dembla, Prashant Palvia, and Lloyd Brooks
Understanding the Adoption of Web-Enabled Transaction Processing by Small Businesses, Pamila Dembla, Prashant Palvia, and Balaji Krishnan
Managing Internationally: Succeeding in a Culturally Diverse World, Kamal Fatehi
Learner-Centered Assignments in Computer Literacy, Martha E. Myers, Meg C. Murray, Mario Guimaraes, and Debra B. Geist
Editorial Preface, Solomon Negash
Synchronous Hybrid E-Learning: Teaching Complex Information Systems Classes Online, Solomon Negash, Marlene V. Wilcox, and Michelle Emerson
The Effects of Web-based Technologies on Knowledge Transfer, Waymond Rogers and Solomon Negash
Assessing Online Discussion Forum Participation, Matthew Shaul
Management of Information Security, 2nd Edition, Michael E. Whitman and Herbert J. Mattord
Principles of Information Security, 3rd Edition, Michael E. Whitman and Herbert J. Mattord
Submissions from 2006
The Pipeline and Beyond, Martha Myers, Janette Moody, Catherine Beise, and Amy B. Woszczynski
Journey to the Center of the Core: Computers and the Internet in the Core Curriculum, Jorge Pérez and Meg C. Murray
Project management issues in IT offshore outsourcing, Kathy Schwaig, Stephen Gillam, and Elke M. Leeds
Compliance to the Fair Information Practices: How Are the Fortune 500 Handling Online Privacy Disclosures?, Kathy Stewart Schwaig, Gerald C. Kane, and Veda C. Storey
Principles of Incident Response and Disaster Recovery, Michael E. Whitman and Herbert J. Mattord
Student Perceptions of Diversity Issues in IT, Amy B. Woszczynski, Martha Myers, and Janette Moody
Realizing the Open-Closed Principle, Chong-wei Xu and Jose Hughes
Submissions from 2005
Women in the IT Profession, Catherine Beise, Janette Moody, Martha Myers, and Amy B. Woszczynski
InfoSec Policy - The Basis for Effective Security Programs, Herbert J. Mattord and Michael E. Whitman
Assessment of Brain Activities in Immersive Environments, Max M. North, Sarah M. North, John Crunk, and Jeff Singleton
The Moderating Effect of On-line Experience on the Antecedents and Consequences of On-Line Satisfaction, Waymond Rogers, Solomon Negash, and Kwanho Suk
Privacy, Fair Information Practices and the Fortune 500: The Virtual Reality of Compliance, Kathy Stewart Schwaig, Gerald C. Kane, and Veda C. Storey
Readings and Cases in the Management of Information Security, Michael E. Whitman and Herbert J. Mattord
Hands-On Information Security Lab Manual, 2nd Edition, Michael E. Whitman, Herbert J. Mattord, and Dave Shackleford
Personality and Programming, Amy B. Woszczynski, Tracy C. Guthrie, and Sherri Shade
Submissions from 2004
IT Project Managers' Perceptions and Use of Virtual Team Technologies, Catherine M. Beise, Fred Niederman, and Herbert J. Mattord
Course Revitalization as a Change Driver Throughout Undergraduate Business Curriculum, Elke M. Leeds and Radwan Ali
Move to Component Based Architectures: Introducing Microsoft's .NET Platform into the College Classroom, Meg C. Murray
Communities of Practice to Overcome Africa’s “Brain-Drain”: The Role of Information Communication Technology, Solomon Negash
Virtual Reality Combats Test Anxiety: A Case Study Report, Max M. North and Sarah M. North