CONISAR Proceedings 2009

Washington DC

Papers Presented

CONISAR Papers Chair

Scott Hunsinger

§1542 A Conceptual Model of Knowledge Elicitation
§1543 Difficulties in Quantifying IT Projects with Intangible Benefits: A Survey of Local IT Professionals
§1544 Contingency Planning: Disaster Recovery Strategies for Successful Educational Continuity
§1545 Component-based Software Development: Life Cycles and Design Science-based Recommendations
§2115 Welcome to CONISAR 2009 Washington D.C.
§2332 The Ethic and Moral Implications of Affective Computing
§2362 The Relationship between Information Technology Critical Success Factors and Project Performance
§2363 Factors that Persuade and Deter Membership in Professional Computing Associations
§2364 The Impact of Transition Costs on Offshore Systems Development
§2365 Using A Group Support System in Strategic Academic Planning – A Field Experimental Study on the Influence of Facilitation
§2366 A Follow-up Study of Detecting Phishing Emails
§3124 The Impact of Electronic Data Interchange Information Technology on External Auditors
§3125 An Ontological Characterization of the ‘Structured Information Flow’ (SIF) Model
§3142 Towards an Abstract Model for Academia and Information Technology Sector Collaborative Partnerships: Responding to the “West Texas Coalition for Innovation and Commercialization” Initiative
§3143 Can Management Predict Information Security Threats by Utilizing a Data Warehouse?
§3144 Spyware: What Influences College Students to Use Anti-Spyware Tools?
§3145 Workflow Automation and Management Services in Web 2.0: An Object-based Approach to Distributed Workflow Enactment
§3155 Business Requirements of Knowledge Management Ontology to Support a Software Deployment Process
§3362 An Exploratory Study of Relationships between Workforce Characteristics and the Use of Collaboration and Social Networking Tools in a Global Technology Firm
§3363 Synchronizing Development Life-Cycles: Rationale and Integrative Approach to Construction of eLearning Systems and Online Courses at a Tier 1 Research Institution
§3364 E-Commerce Security
§3523 The Results of Implementing a Knowledge Management Initiative to Enhance Network Access Controls
§3544 Analyzing Community Websites: A Main Street Perspective
§3562 On Design Science, MCDM, and its Outsourcing Decisions
§3563 Some Observations on the Occurrences of Data Breaches
§3564 Knowledge Mapping in a Not-For-Profit Firm: A Case Study
§3732 A Study of the Perceptions of Students on Privacy and Security on Social Networking Sites (SNS) on the Internet
§3733 Elements of Technology and Success in Virtual Teams
§3742 Some Observations on the Occurrences of Phishing
§3743 Object Reuse and Integration in Object-Relational Databases Development
§3763 An Empirical Study of Text Messaging Behavioral Intention and Usage
§4132 Women's Technology Acceptance of Mentoring on the Internet
§4133 Virtual Organizations: A Definitional Framework
§4134 The Two Leading Freeware Image Editing Applications – An Overview, Comparative Evaluation and Guide for the IS Community
§4135 Sustainability and Greening through Information Technology Management
§4152 Spatial Interpolation for a Wireless Sensor Network of Chemical Point Detectors: Preliminary Results
§4153 Superfund Site Analysis Using Web 2.0 Technologies
§4353The Effect of Gender on the Application of Ethics within Information Technology: A Meta-analysis