This paper identifies what academic conference attendees in the Information Systems (IS) field consider to be attributes of successful and unsuccessful academic presentations.
Research
A list of double-blind peer-reviewed journal articles. At last count (02/2013) the total citation count on these articles were over 3800.
This study addressed college students’ acceptance of push communication (i.e., email and SMS messaging) as a means of receiving course-related content.
This research aims to investigate what factors influence the users on StackOverflow to participate.
The purpose of this study was to identify the factors that influence the acceptance of electronic collaboration technology by higher education students and that influence their predicted usage of the technology for virtual team collaboration.
This study examines 83 IS qualitative studies in leading IS journals for the following purposes: (a) identifying the extent to which IS qualitative studies employ best practices of justifying sample size; (b) identifying optimal ranges of interviews for various types of qualitative research; and (c) identifying the extent to which cultural factors (such as journal of publication, number of authors, world region) impact sample size of interviews.
This paper details some of the obstacles to cloud computing that have been identified in recent literature, grouping organizational concerns into four categories, namely security, organizational resistance, performance, and lack of economic gains.
This article describes the growing adoption of enterprise social networking platforms by organizations in an attempt to foster better team communication and collaboration.
The project-based approach to foundational IS topics in an introductory course provides modest benefits in interest in MIS majors and minors.
We examined the impacts of the team listening environment and the frequency of team communication on team coordination in business environments.
In this research paper, we describe the process we took to go green in one of the computer labs on our campus.
There are many blogs and columns available online as to what security measure is the best to implement and when, however very few articles actually compare and contrast methods side by side.
This paper describes our approach to using virtualization in two courses for MIS students.
This article presents a cross-cultural training method that focuses on horizontal and vertical individualism and collectivism.
The purpose of this paper is to examine the role end-user training has on performance expectancy and effort expectancy, two variables associated with technology acceptance.
This paper identifies some key attributes Information System (IS) graduates should be aware of in their quest to find a job.
The objective of this research project is to apply the method of web-based learning to overcome the limitations of comment-based code learning.
The primary focus of this study was to determine why and how small businesses implement content management and to clarify the relationship of content management to regulatory compliance issues presented by the Health Insurance Portability and Accountability and Sarbanes-Oxley Act.
This paper reviews Web Services technologies, challenges to their implementation, demonstrates nine ways that traditional assumptions regarding security are inapplicable to Web Services, and suggests possible solutions to these problems.
The focus of this paper is to elaborate on how such an integration would be accomplished in an advanced database course.
This paper reviews Web Services technologies, challenges to their implementation, demonstrates nine ways that traditional security best practices are inapplicable to Web Services, and suggests possible solutions to these problems.