CONISAR Proceedings 2016

CONISAR Proceeding 2016

Las Vegas, Nevada

Conference Highlights

Tracks


Applied IS Research / Methodologies

A Comprehensive Current Review of Text Messaging Usage (4287)
Analysis of the Risks of NFC Mobile Payment Systems (4279)
Causes of cyberbullying in multi-player online gaming environments: Gamer perceptions (4258)
Crowdsourcing Surveys: Alternative Approaches to Survey Collection (4260)
Identifying the Critical Success Factors for Information Systems to Manage Sponsored Research Activities at Institutions of Higher Education (4272)
Sentiment Analysis and Opinion Mining: Current State of the Art and Review of Google and Yahoo Search Engines’ Privacy Policies (4254)

Business Intelligence / Big Data

Achieving Effective Data Analytics: An Agile Framework (4269)
An Interactive Toolbox for Twitter Content Analytics (4259)
Principle Component Analysis for Feature Reduction and Data Preprocessing in Data Science (4257)
Understanding User Behavior on Pinterest: Findings and Insights (4277)

Cloud Computing

An Empirical Study on the Impact of Price Discount on Sales in Software-as-a-Service (SaaS) Market (4264)

Database Management / Storage

Patient Healthcare Smart Card System: A Unified Medical Record for Access and Analytics (4275)

ERP / Supply Chain

E-commerce Adoption: A Revelatory Case Study in the German Oncology Pharmaceutical Supply Chain (4273)

IT Management / Strategy

Building Client Vendor Alignment Capability in Strategic Information Systems Outsourcing (4252)
On Assessment of Risks in Offshore Outsourcing of Information Technology (4267)
System Analysis of the Infrastructure of an IT services provider (4290)

Other Applied Research Topics

A Simulation Modeling Approach to Improve JIT Implementation in a Highly Dynamic Manufacturing Environment (4289)
Evidence of Wikipedia usage during the school year: A numerical study (4263)

Security / Networks / Communications

3D Printing: The Future Crime of the Present (4274)
Are Students Using Security Measures to Protect their Data when Downloading Mobile Applications? (4268)
Malvertising - A Rising Threat To The Online Ecosystem (4266)
Proposal for Kelly Criterion-Inspired Lossy Network Compression for Network Intrusion Applications (4265)
Subjective norm and measuring its impact on information security behavioral intention in organizations. (4253)
The Effects of Perceived Functionality and Usability on Privacy and Security Concerns about Adopting Cloud Applications (4255)

Software Engineering / Application Development

Prototype to Production: A Case Study (4286)