CONISAR Proceeding 2015

Wilmington, North Carolina

Conference Highlights

Tracks


Applied IS Research/Methodologies

A Practice Based Examination of Standardization, and its Relationship with the Design and Use of Healthcare IS (3673)
Case Study: Can Interpersonal-Cultural Communication Sustain Another Innovation? (3668)
Exploratory Study of Effects of eLearning System Acceptance on Learning Outcomes (3655)
Towards a Better Understanding of Factors Affecting Software Project Complexity (3674)

Business Intelligence / Big Data

A Comparison of Open Source Tools for Data Science (3651)

Digital & Multimedia Technologies

Blurred Lines: Defining the Motives for Mobile and Social Media Use for Marketing Strategy (3360)

IT Management / Strategy

Exploring Relationships between the Strategic Importance of IT and the Effectiveness of IT Security and Mobile Device Management (3656)
Leakage of Geolocation Data by Mobile Ad Networks (3666)
Information Technology in Patient Care: Challenges of using IT in Small Ambulatory Healthcare Organizations (3672)
Introducing A Change Resistance Factor in Knowledge Management Model: A Concentration in Organizational Culture (3669)
Social Responsibility Trends and Perceptions in Global IT Outsourcing (3663)

Other/Special Topics

An Expanded Analysis of Internet Dependencies by Demographic Variables (3661)
Assessing Cultural Aspects of Organizations for Knowledge Management Initiativess (3665)
An Optimized Intelligent Home Network Model (3675)
Comparing the Prediction Capabilities of an Artificial Neural Network vs a Phenomenological Model for Predicting the Terminal Ballistics of Kinetic Energy Projectiles (3667)
The Technology-to-Performance Chain: Conceptualizing How Lead Management Systems Drive Inside Sales Performance (3653)
Variation in Best-Case and Worst-Case performance for Sorting Algorithms (3652)

Security / Networks / Communications

Leakage of Geolocation Data by Mobile Ad Networks (3666)

Systems Devel/Software Eng

CASE Tools’ Acceptance in Higher Education – Assessment and Enhanced UTAUT Model (3671)
Moving Beyond Coding: Why Secure Coding Should be Implemented (3651)