CONISAR Proceeding 2009

Washington, DC

Papers Presented

CONISAR Papers Chair

Scott Hunsinger

§1542 A Conceptual Model of Knowledge Elicitation
§1543Difficulties in Quantifying IT Projects with Intangible Benefits: A Survey of Local IT Professionals
§1544Contingency Planning: Disaster Recovery Strategies for Successful Educational Continuity
§1545Component-based Software Development: Life Cycles and Design Science-based Recommendations
§2115Welcome to CONISAR 2009 Washington D.C.
§2332The Ethic and Moral Implications of Affective Computing
§2362The Relationship between Information Technology Critical Success Factors and Project Performance
§2363Factors that Persuade and Deter Membership in Professional Computing Associations
§2364The Impact of Transition Costs on Offshore Systems Development
§2365Using A Group Support System in Strategic Academic Planning – A Field Experimental Study on the Influence of Facilitation
§2366A Follow-up Study of Detecting Phishing Emails
§3124The Impact of Electronic Data Interchange Information Technology on External Auditors
§3125An Ontological Characterization of the ‘Structured Information Flow’ (SIF) Model
§3142Towards an Abstract Model for Academia and Information Technology Sector Collaborative Partnerships: Responding to the “West Texas Coalition for Innovation and Commercialization” Initiative
§3143Can Management Predict Information Security Threats by Utilizing a Data Warehouse?
§3144Spyware: What Influences College Students to Use Anti-Spyware Tools?
§3145Workflow Automation and Management Services in Web 2.0: An Object-based Approach to Distributed Workflow Enactment
§3155Business Requirements of Knowledge Management Ontology to Support a Software Deployment Process
§3362An Exploratory Study of Relationships between Workforce Characteristics and the Use of Collaboration and Social Networking Tools in a Global Technology Firm
§3363Synchronizing Development Life-Cycles: Rationale and Integrative Approach to Construction of eLearning Systems and Online Courses at a Tier 1 Research Institution
§3364E-Commerce Security
§3523The Results of Implementing a Knowledge Management Initiative to Enhance Network Access Controls
§3544Analyzing Community Websites: A Main Street Perspective
§3562On Design Science, MCDM, and its Outsourcing Decisions
§3563Some Observations on the Occurrences of Data Breaches
§3564Knowledge Mapping in a Not-For-Profit Firm: A Case Study
§3732A Study of the Perceptions of Students on Privacy and Security on Social Networking Sites (SNS) on the Internet
§3733Elements of Technology and Success in Virtual Teams
§3742Some Observations on the Occurrences of Phishing
§3743Object Reuse and Integration in Object-Relational Databases Development
§3763An Empirical Study of Text Messaging Behavioral Intention and Usage
§4132Women's Technology Acceptance of Mentoring on the Internet
§4133Virtual Organizations: A Definitional Framework
§4134The Two Leading Freeware Image Editing Applications – An Overview, Comparative Evaluation and Guide for the IS Community
§4135Sustainability and Greening through Information Technology Management
§4152Spatial Interpolation for a Wireless Sensor Network of Chemical Point Detectors: Preliminary Results
§4153Superfund Site Analysis Using Web 2.0 Technologies
§4353The Effect of Gender on the Application of Ethics within Information Technology: A Meta-analysis