18 Southern Association for Information Systems Conference

Transcription

18 Southern Association for Information Systems Conference
18th Southern Association for Information Systems
Conference
Hilton Head, South Carolina, USA
March 20th – 21st, 2015
Welcome From the Conference Chair
Welcome to the 18th annual Southern Association for Information Systems (SAIS) conference. I would
like to take the opportunity to welcome everyone to Hilton Head, South Carolina. Hilton Head may be a
small island, but there is a large number of activities for you to experience during your time here. There
are more than 250 restaurants, two dozen golf courses, numerous stores and outlets, and the beautiful
beaches that may be too cool to get in right now, but you can certainly enjoy a stroll before you head
back home. The island has been intentionally designed to be visually appealing and relaxing for visitors.
This year’s conference features two impressive keynote speakers. Harold Itkin, president of IMS, LLC will
speak Friday morning on the topic of IT Leader Relevancy. Prior to his current position Harold served as
Senior Manager/Principal Consultant at Ciber, Senior Director, Global IT Strategic Initiatives at Teleflex,
and Support Alliance Mgr. with SAP among others. As Support Alliance Manager for SAP he developed
strategies and support plans to mitigate risks to the most critical initiatives at SAP’s most visible
Southeast region customers and integrating the SAP support organization into the overall framework of
the account management. These engagements ranged from support of process solutions to migration
and governance of data. His accounts included the Coca-Cola Company, Coca-Cola Enterprises and the
Home Depot among others.
John Girard will give a keynote address Saturday morning. Dr. Girard holds the Peyton Anderson
Endowed Chair in Information Technology at Middle Georgia State College’s School of Information
Technology and is founder and Chief Knowledge Strategist of Sagology, a firm dedicated to connecting
people with people to facilitate collaboration, learning, and knowledge sharing through keynotes,
workshops, and consulting. The title of his presentation is: Big Data: Something New, Something
Borrowed, or Something Blue? In the past three years there has been a 10-fold increase in Google
searches for the term “Big Data.” Clearly there is considerable interest in the term; however, is Big Data
helping executives make better decisions? Does Big Data empower, liberate, or overwhelm decision
makers? Join John Girard for an engaging and entertaining gallop through the fields of Big Data.
Critical to the success of this conference is the Program Chair. This job requires many hours of
dedication, including the need to work both closely with authors who have submitted their research,
and with the many reviewers we have, who generously give their time. Johnathan Yerby, our Program
Chair this year, has done an outstanding job and deserves much appreciation for his dedication and
professionalism. The program and coordinating reviewers and authors takes a surprisingly large amount
of time and effort, which Johnathan handled extremely well. Personally, it has been a pleasure to work
with him over the last twelve months. I also want to recognize Dr. Kevin Floyd, who is our current SAIS
president. Kevin’s depth of commitment to SAIS has been inspirational to me, he manages SAIS’s
website, and he always has great advice, whenever I needed it. Kevin is truly a team player. Finally, I
would like to thank everyone in attendance at this year’s SAIS. It has been a pleasure to serve as your
conference chair, and I hope you will enjoy the program and meeting up with old friends, as well as
making new ones.
Paige Rutner
Georgia Southern University
2
18th Southern Association for Information Systems Conference • Hilton Head, SC, March 20th–21st , 2015
Welcome From the Program Chair
Once again, this year’s Southern Association for Information Systems (SAIS) conference features an
excellent program. Points of pride include a strong showing of papers from scholars and students
attending from a number of leading schools in the south, and SAIS continues to attract presenters from
both overseas and varied locations within the United States. This year SAIS will have a new social event
on Friday, which is designed as an opportunity for informal networking and getting to know the
wonderful variety of attendees at SAIS. I certainly hope that you find this conference an excellent
opportunity that you plan to return to next year. I know that you have to make tough decisions on which
conferences you are able to attend, and SAIS is very thankful to have you here.
Listed in this program are fifty-six manuscript reviewers, and I am very grateful to the many people that
were happy to offer up their valuable time to help out. The 2015 SAIS conference had an accept rate of
80.3%, and a reject rate of 19.6%. I hope that you find value in the research and relationships being
shared at this conference. There were five papers that had to withdraw for scheduling or not being able
to fulfill the reviewer requests in time. The quality of reviews was impressive, with many clearly crafted
to be both supportive and to offer valuable suggestions as to how authors could improve their research.
Some authors made it a point to let me know they were impressed by the helpfulness and quality of the
reviews they received. Other comments indicated authors were also highly motivated to address the
issues raised by the reviewers. Sometimes it is difficult to know whether the hard work of reviewing is
fully appreciated. However, by the end of the review process, I was convinced that for SAIS, such
contributions are highly valued, as well as being critical to the success of the conference.
I would especially like to thank Kevin Floyd and Paige Rutner for their strong support and for always
being there to answer the questions I put to them. Their advice, unwavering collegiality, and continual
encouragement made being Program chair a very doable task. Paige has been fantastic about
volunteering to do several of the very important small tasks that would have a huge impact if forgotten.
I sincerely hope you enjoy the program, and SAIS provides you with an opportunity to catch up with
existing colleagues, and to make new friends.
Johnathan Yerby
Middle Georgia State College
3
18th Southern Association for Information Systems Conference • Hilton Head, SC, March 20th–21st , 2015
Welcome From the SAIS President
Hello and welcome to the 18th Southern Association for Information Systems conference in Hilton Head
Island, South Carolina! It has been my pleasure to serve as this year’s SAIS President. While there has
been much work involved, it has truly been a rewarding experience to work with this year’s Vice
President’s and Board to plan what promises to be an exciting and rewarding conference.
I hope you take the opportunity to not only enjoy the conference but to also the heritage, rich history,
and beautiful scenery that the Island has to offer. The Southern AIS Conference is known for the
friendliness of attendees and the collegial atmosphere fostered in the conference.
I would like to take the time to recognize two people who deserve special recognition for their service to
the 18th Annual Southern AIS Conference. This year’s Program Chair, Johnathan Yerby, has worked very
hard to collect papers, assure that reviews were made, and create the Proceedings. These are all time
consuming tasks that require dedication to serving Southern AIS. Please join me in thanking Johnathan
while you’re at the conference.
Paige Rutner is the Conference Chair and the arrangements you are enjoying are the result of her work
this past year. Paige has been busy selecting the conference location, making arrangements with the
hotel, planning the conference’s first Friday night social event, and generally fielding all of the problems
associated with such a large gathering. Paige is to be commended for all of her efforts.
Again, welcome to SAIS and Hilton Head Island. I hope that you enjoy the conference and take the
opportunity to catch up with existing colleagues, and to make new friends. I look forward to meeting
each of you.
Kevin S. Floyd
Middle Georgia State College
4
18th Southern Association for Information Systems Conference • Hilton Head, SC, March 20th–21st , 2015
SAIS Board Members
President
Kevin Floyd
Adrian Gardiner
Past-Past President
George Schell
Middle Georgia State College
Georgia Southern University
University of North Carolina – Wilmington
VP-Conference Chair
VP-Program Chair
Secretary
Johnathan Yerby
Janette Moody
Board Member /
Student Liaison
Board Member
Paige Rutner
Georgia Southern University
Treasurer
Jim Wynne
Virginia Commonwealth University
Board Member
Michael Cuellar
Georgia Southern University
5
Past President
Middle Georgia State College
James Smith
Kennesaw State University
Board Member
Camille Rogers
Georgia Southern University
The Citadel
Joy Godin
Georgia College and State University
Board Member
Lakshmi Iyer
University of North Carolina - Greensboro
18th Southern Association for Information Systems Conference • Hilton Head, SC, March 20th–21st , 2015
Keynote Speakers
Harold Itkin
President, IMS, LLC
Harold assists clients in establishing the alignment of technology solutions
to business objectives while developing a strategy to expedite this process
and bringing about the change required to be successful. Throughout his
career he has developed strategies and value propositions for
comprehensive IT initiatives and has regularly served as an advisor to CIO’s
and IT Leadership Teams. Harold also has done extensive work in team
development, corporate change management and problem
resolution. Previously he led the Applications, Business Relationship Management, DMO and IT Strategy
groups at Teleflex Inc. after a ten year stint at SAP in various consulting and leadership roles. He fuels his
passion for helping develop the future leaders and influencers of IT by teaching Strategy Courses to
Masters’ Candidates at Georgia State University.
John Girard, Ph.D.
Professor, School of Information Technology, Middle Georgia State College
John Girard is a professor, storyteller, and adventurer who has enjoyed the
privilege of speaking to groups on six continents about technology,
leadership, and culture. John holds the Peyton Anderson Endowed Chair in
Information Technology at Middle Georgia State College’s School of
Information Technology. Engaging with students on a daily basis ensures he
remains current in the ever-changing world in which we live and do business.
John has traveled to more than 85 countries investigating globalization and
innovation in action. He is founder and Chief Knowledge Strategist of
Sagology (www.sagology.com), a firm dedicated to connecting people, facilitating collaboration,
learning, and knowledge sharing through keynotes, workshops, and consulting.
Prior to transitioning to the academy, John worked as the Director of Knowledge Management at
National Defence Headquarters in Ottawa, Canada. He served for 24 years in the Canadian Forces,
retiring at the rank of Lieutenant-Colonel. John is a Fellow & Distinguished Scholar of The International
Institute for Applied Knowledge Management, a Certified Information Professional, and a Chartered
Manager, the Canadian Institute of Management’s senior qualification and chartered professional
designation. To learn more about John, visit www.johngirard.net
6
18th Southern Association for Information Systems Conference • Hilton Head, SC, March 20th–21st , 2015
Manuscript Reviewers
Zeeshan Ahmed
King Abdul Aziz University
Adrian Gardiner
Georgia Southern U.
David Marshburn
Sim Ventions
Nikhil Bandodkar
Clemson University
Jennifer Gerow
Virginia Military Institute
Robert Miller
Central Michigan University
Shannon Beasley
Middle Georgia State College
John Girard
Middle Georgia State College
Michel Mitri
James Madison University
Bob Brookshire
University of South Carolina
Joy Godin
Georgia College
Janette Moody
The Citadel
Dennis Brown
Kennesaw State University
Aysegul Gok
Georgia State University
Meg Murray
Kennesaw State University
Joseph Budu
Ghana Institute of
Management and Public
Administration
Rachel Halfon
Bar-Ilan University
Thomas Ngo-Ye
Dalton State College
Geoffrey Hill
Kent State University
Richelle Oakley
Savannah State University
Md Hoque
University of Dhaka
Mark Pendergast
Florida Gulf Coast University
Angela Jackson
Kennesaw State University
Brandis Phillips
North Carolina A & T State U.
Karim Jetha
University of Georgia
Charlie Pitts
Florida State University
Shakir Karim
Institute of Business
Administration
Robecca Quammen
Health Care Consultants
Matt Campbell
University of South Alabama
Young Choi
Regent University
Pedro Colon
Middle Georgia State College
Amy Connolly
USC Upstate
Michael Cuellar
Georgia Southern U.
Charles Downing
Northern Illinois University
Rajeev Dwivedi
IMTCDL India
Marie Esposito
Clemson University
Kevin Floyd
Middle Georgia State College
7
Kathryn Kimery
Saint Mary's University
Nima Kordzadeh
Idaho State University
Myungjae Kwak
Middle Georgia State College
Jaejoo Lim
South Carolina State
University
Adriane Randolph
Kennesaw State University
Paige Rutner
Georgia Southern U.
Chetan Sankar
Auburn University
George Schell
University of North Carolina
Wilmington
18th Southern Association for Information Systems Conference • Hilton Head, SC, March 20th–21st , 2015
Manuscript Reviewers
James Smith
Kennesaw State University /
Mercer University
Sankara-Subramanian
Srinivasan
Idaho State University
Nelbert St.Clair
Middle Georgia State College
Russell Thackston
Georgia Southern University
8
Xin Tian
Old Dominion University
Karthikeyan Umapathy
University of North Florida
Yun Wu
Auburn University
Jim Wynne
Virginia Commonwealth U.
Emrah Yasasin
University of Regensburg,
Johnathan Yerby
Middle Georgia State College
Kirill Yurov
Middle Georgia State College
Chi Zhang
Kennesaw State University
18th Southern Association for Information Systems Conference • Hilton Head, SC, March 20th–21st , 2015
Conference at a Glance
The conference program and proceedings are
available on the SAIS website at:
http://sais.aisnet.org/
2:45–3:00
Coffee Break
Santee Ballroom Pre-function Foyer
Thursday, March 19, 2015
3:00–4:15
Sessions 4A-4D
Santee Ballroom Pre-function Foyer
7:00–9:00PM
SAIS Board Meeting
Chart House
2 Hudson Road, Hilton Head Island, SC
Friday, March 20, 2015
7:30-4:15
Registration
Santee Ballroom Pre-function Foyer
7:30–8:30
Continental Breakfast
Coffee
Santee Ballroom Pre-function Foyer
8:30-9:30
Welcome and Keynote Address
Santee Ballroom A/B/C
9:30–9:45
Coffee Break
Santee Ballroom Pre-function Foyer
9:45–11:00
Sessions 1A-1D
Santee Ballroom A/B/C, Charleston, Dorchester,
Jasper
11:00–11:15
Coffee Break
Santee Ballroom Pre-function Foyer
11:15–12:15
Sessions 2A-2D
Santee Ballroom A/B/C, Charleston, Dorchester,
Jasper
12:15–1:45
Lunch
Santee Ballroom D
1:45–2:45
Sessions 3A-3D
Santee Ballroom A/B/C, Charleston, Dorchester,
Jasper
9
4:30–6:00
Social Event
Oceanfront Beach Pavilion
Saturday, March 21, 2015
7:30-12:15
Registration
Santee Ballroom Pre-function Foyer
7:30–8:30
Continental Breakfast
Coffee
Santee Ballroom Pre-function Foyer
8:30–9:30
Keynote Speech
Santee Ballroom A/B/C
9:30–9:45
Coffee Break
Santee Ballroom Pre-function Foyer
9:45–10:45
Sessions 5A-5D
Santee Ballroom A/B/C, Charleston, Dorchester,
Jasper
10:45–11:00
Coffee Break
Santee Ballroom Pre-function Foyer
11:00–12:15
Sessions 6A-6D
Santee Ballroom A/B/C, Charleston, Dorchester,
Jasper
12:15–2:00
Lunch & Best Paper Awards
Santee Ballroom D
2:00-3:00
SAIS Business Meeting
Santee Ballroom A/B/C
18th Southern Association for Information Systems Conference • Hilton Head, SC, March 20th–21st , 2015
Hotel Floorplan
Map 1. Meeting Rooms
Registration – Santee Ballroom Pre-function Foyer
Keynote Addresses – Santee Ballroom A/B/C
Other Meeting Rooms – Charleston, Dorchester, and Jasper
Meals – Santee Ballroom D
Friday Social Event – Oceanfront Beach Pavilion
10
18th Southern Association for Information Systems Conference • Hilton Head, SC, March 20th–21st , 2015
Hotel Floorplan
Map 2. Entire Resort Layout
Registration – Santee Ballroom Pre-function Foyer
Keynote Addresses – Santee Ballroom A/B/C
Other Meeting Rooms – Charleston, Dorchester, and Jasper
Meals – Santee Ballroom D
Friday Social Event – Oceanfront Beach Pavilion
11
18th Southern Association for Information Systems Conference • Hilton Head, SC, March 20th–21st , 2015
Conference Schedule
Thursday, March 19, 2015
7:00-9:00PM
SAIS Board Meeting
Chart House
2 Hudson Road, Hilton Head Island, SC
Friday, March 20, 2015
7:30-4:15
Registration
Santee Ballroom Pre-function Foyer
Session: 1B – Trust and Credibility
Session Chair: Karthikeyan Umapathy
Charleston
7:30-8:30
Continental Breakfast
The Impact of Webpage Visual Characteristics on
Consumer's Initial Trust in E-Vendors
Santee Ballroom Pre-function Foyer
8:30-9:30
Nikhil Bandodkar (Clemson University)
Renu Singh (South Carolina State University)
Welcome & Keynote Speech
Santee Ballroom A/B/C
Kevin Floyd, SAIS President
Paige Rutner, SAIS Conference Chair
Christopher Kreider (Fulfillment.com)
Nima Kordzadeh (Idaho State University)
Keynote: “IT Leader Relevancy”
Conceptual Model of Website Design Elements
That Influences Credibility And Trustworthiness
By Harold Itkin
President, IMS, LLC.
9:30-9:45
Coffee Break
Break Area
9:45-11:00
Request For Adminship (RFA) Within Wikipedia:
How Do User Contributions Instill Community
Trust?
Sessions 1A-1D
Session: 1A – Privacy and Big Data
Session Chair: Brian McDaniel
Santee Ballroom A/B/C
Overcoming Privacy Challenges in Mobile-Cloud
Computing
Jordan Shropshire (University of South Alabama)
Matt Campbell (University of South Alabama)
Bob Sweeney (University of South Alabama)
Christopher LaValley (University of North Florida)
Karthikeyan Umapathy (University of North Florida)
Session: 1C – Potpourri
Session Chair: Sankara Subramanian Srinivasan
Dorchester
Problematic Technology Use: The Impact of
Capital Enhancing Activity
Brandis Phillips (North Carolina A&T State University)
The Impact of Knowledge from Learning-About
Electronic Health Records on IT Innovation
Adoption: The Moderating Role of Absorptive
Capacity
Privacy and the Information Age: A Longitudinal
View
Yun Wu (Auburn University)
Yi-chuan Wang (Auburn University)
Jiahe Song (Auburn University)
Terry Byrd (Auburn University)
Benefits and Risks of Big Data
IT Architecture Flexibility as an Antecedent of
Absorptive Capacity: A Theoretical Perspective
Charles Downing (Northern Illinois University)
Dana Cole (Georgia College and State University)
Brian McDaniel (Georgia College and State University)
Jasmine Nelson (Georgia College and State University)
12
Rishikesh Jena (University of Arkansas)
Sankara Subramanian Srinivasan (Idaho State University)
18th Southern Association for Information Systems Conference • Hilton Head, SC, March 20th–21st , 2015
Conference Schedule
Session: 1D – Gamification and Cyberforensics
Session Chair: Kevin Floyd
Jasper
Chasing the Truth: An Educational Game for
Information Literacy and Student Engagement
Dana Casper (Middle Georgia State College)
Sarah Hollifield (Middle Georgia State College)
Caleb Talmage (Middle Georgia State College)
Chris Nylund (Middle Georgia State College)
Myungjae Kwak (Middle Georgia State College)
Session: 2C – WORKSHOP: Visual Analytics:
Tools and Teaching Resources for Business
Analytics
Session Chair: Lakshmi Iyer
Dorchester
WORKSHOP: Visual Analytics: Tools and Teaching
Resources for Business Analytics
Lakshmi Iyer (University of North Carolina at Greensboro)
12:15-1:45
Lunch
Santee Ballroom D
PANEL: Advanced Cyberforensics Education
Consortium
Johnathan Yerby (Middle Georgia State College)
Kevin Floyd (Middle Georgia State College)
Emily Coppa (Middle Georgia State College)
11:00-11:15
Santee Ballroom Pre-function Foyer
11:15-12:15
Coffee Break
Sessions 2A-2C
Session: 2A – WORKSHOP: We Need to Have a
Conversation on Bitcoin: Is it on a Path to
Becoming the Ultimate Information System
Session Chair: Meg Murray
Santee A/B/C
WORKSHOP: We Need To Have a Conversation on
Bitcoin: Is it on a Path to Becoming the Ultimate
Information System
Meg Murray (Kennesaw State University)
Session: 2B – Internet and Cloud
Session Chair: Mehruz Kamal
Charleston
The Influence of Information Quality on E-Channel
Choice: Investigating Moderating Effects of
Product Types and Gender
Jaejoo Lim (South Carolina State University)
1:45-2:45
Sessions 3A-3D
Session: 3A – Resource Considerations
Session Chair: Angela Jackson
Santee Ballroom A/B/C
High Performance Computing: Considerations
When Deciding To Rent or Buy
Russell Thackston (Georgia Southern University)
Ryan Fortenberry (Georgia Southern University)
The Role of Judgment and Decision Making
Regarding IT Resource Utilization towards
Sustainable Competitive Advantage
Angela Jackson (Kennesaw State University)
Session: 3B – Mobile Devices
Session Chair: Myungjae Kwak
Charleston
MRS: An Autonomous and Remote-Controlled
Robotics Platform for STEM Education
Timothy Locke (Middle Georgia State College)
Peter Colon (Middle Georgia State College)
Myungjae Kwak (Middle Georgia State College)
aMDFS: Automated Mobile Device Forensics
System Using Python and Raspberry Pi
Shaun Franks (Middle Georgia State College)
Myungjae Kwak (Middle Georgia State College)
A Repository of Cloud Services For Small and Micro
Enterprises
Mehruz Kamal (State University of New York at Brockport)
Matthew Panebianco (State University of New York at
Brockport)
13
18th Southern Association for Information Systems Conference • Hilton Head, SC, March 20th–21st , 2015
Conference Schedule
Session: 3C – WORKSHOP: Data Mining With
Excel
Session Chair: Cheryl Aasheim
Dorchester
WORKSHOP: Data Mining With Excel
Cheryl Aasheim (Georgia Southern University)
It's All In Your Personality: Combatting
Technostress in the Workplace
Teaching the Systems Approach in the Information
Systems Curriculum
George Schell (University of North Carolina – Wilmington)
Richard Mathieu (James Madison University)
Investigating a Method to Modify Student Social
Media Behavior
Robert Miller (Central Michigan University)
James Melton (Central Michigan University)
Brent Jensen (Central Michigan University)
Santee Ballroom Pre-function Foyer
3:00-4:15
Pamela Galluch (Roanoake College)
Session: 4C – Potpourri
Session Chair: Caleb Bradberry
Dorchester
End User Participation in Information Systems
Development: Why Does Collaboration Remain
Elusive?
Marie Esposito (Clemson University)
Break
Sessions 4A-4D
Session: 4A – Social Networking Issues
Session Chair: Bob Sweeney
Santee Ballroom A/B/C
Users’ Generated Content on Facebook: Make or
Break For Digital Reputation of Firms
Muhammad Naeem Khan (IQRA University Islamabad)
Zeeshan Ahmed Bhatti (King Abdul Aziz University)
An Empirical Investigation of How to Increase User
Engagement on Facebook Business Pages
Sundas Liaqat (American University)
Zeeshan Ahmed Bhatti (King Abdul Aziz University)
A Safety Net for Social Networking: Development
of a Predictive Tool for Domestic Terrorism
Matt Campbell (University of South Alabama)
Jennifer Langhinrichsen-Rohling (University of S. Alabama)
Bob Sweeney (University of South Alabama)
Jordan Shropshire (University of South Alabama)
14
They Are Not All Enemies: Detecting and Deterring
Non-Malicious, Privileged IT User Threat Using a
Comprehensive Approach
Xiang (Michelle) Liu (Marymount University)
Diane Murphy (Marymount University)
Session: 3D – Pedagogical Potpourri
Session Chair: Robert Miller
Jasper
2:45-3:00
Session: 4B – Workplace Issues and Resources
Session Chair: Pamela Galluch
Charleston
The Use of Analytical Platform to Identify Valuable
Interventions in Retail Pharmacies
Xin Tian (Old Dominion University)
Sean Schwartz (Old Dominion University)
Who Knew? A Process Perspective for Building
Analytics from Electronic Health Records
Caleb Bradberry (University of N. Carolina at Greensboro)
Session: 4D – Pedagogical Topics
Session Chair: James Smith
Jasper
Leveraging Learning Management System to
Accommodate Students with Disabilities: Issues
and Experiences with the Canvas LMS
Mark Pendergast (Florida Gulf Coast University)
The Homogenization of Standards Based
Information Security Education: An Example of
Differentiation
James Smith (Mercer Univ., Kennesaw State University)
Adriane Randolph (Kennesaw State University)
Integrating NoSQL into the Classroom
Brad Fowler (Georgia College and State University)
Heather Walker (Georgia College and State University)
Daniel McDonald (Georgia College and State University)
Jerica Williams (Georgia College and State University)
18th Southern Association for Information Systems Conference • Hilton Head, SC, March 20th–21st , 2015
Conference Schedule
4:30-6:00
Social Event
Oceanfront Beach Pavilion
Saturday, March 21, 2015
7:30-10:00
Registration
Santee Ballroom Pre-function Foyer
8:00-8:30
Continental Breakfast
Santee Ballroom Pre-conference Foyer
8:30-9:30
Santee Ballroom A/B/C
Keynote Speech
Keynote: “Big Data: Something New, Something
Borrowed, or Something Blue?”
By John Girard, Ph.D.
Professor, School of Information Technology
Middle Georgia State College
9:30-9:45
Coffee Break
Santee Ballroom Pre-conference Foyer
9:45-10:45
Sessions 5A-5C
Session: 5A – PANEL: Educating Students within
the Era of Big Data:
Session Chair: Paige Rutner
Santee A/B/C
PANEL: Educating Students within the Era of Big
Data
Lakshmi Iyer (University of North Carolina at Greensboro)
Cheryl Aasheim (Georgia Southern University)
Adrian Gardiner (Georgia Southern University
Susan Williams (Georgia Southern University)
Paige Rutner (Georgia Southern University)
Session: 5B – WORKSHOP: Connectivity and
Continuity: New Fronts in the Platform Wars
Session Chair: Meg Murray
Charleston
WORKSHOP: Connectivity and Continuity: New
Fronts in the Platform Wars
Jorge Pérez
Meg Murray (Kennesaw State University)
Session: 5C – Improving Student Outcomes and
Motivation WORKSHOP: Microsoft Visual Basic
for Applications (VBA)/Macro
Session Chair: Thomas Ngo-Ye
Dorchester
WORKSHOP: Microsoft Visual Basic for
Applications (VBA)/Macro
Thomas Ngo-Ye (Dalton State College)
10:45-11:00
Santee Ballroom Pre-conference Foyer
15
Break
18th Southern Association for Information Systems Conference • Hilton Head, SC, March 20th–21st , 2015
Conference Schedule
11:00-12:15
Sessions 6A-6D
Session: 6A – Technology in Business and
Healthcare
Session Chair: Young Choi
Santee Ballroom A/B/C
Wireless Technologies for Customer Service
Advancements in Trouble Shooting and Customer
Service
Session: 6C – Topics in Technology
Session Chair: Rebecca Quammen
Dorchester
Wearable Technologies for Healthcare Innovation
Raymond Collier (Kennesaw State University)
Adriane Randolph (Kennesaw State University)
Employee Perceptions of Information Security
Program Non-Compliance Costs
Young Choi (Regent University)
Breanna Dennis (Regent University)
Dennis Brown (Kennesaw State University)
Adriane Randolph (Kennesaw State University)
Discover and Promote Groupware for Effective
Team Collaboration: A Comprehensive Study
A Content Analysis on Intuition in Information
Systems Research
Lei Li (Kennesaw State University)
Rong Guo (University of West Georgia)
Ghangzhi Zheng (Kennesaw State University)
Rebecca Quammen (Kennesaw State University)
Adriane Randolph (Kennesaw State University)
Developing Business Intelligence Competency in
Health IT: Perspectives from Health IT
Professionals
Session: 6D – Pedagogical Opportunities
Session Chair: Thomas Ngo-Ye
Jasper
Chi Zhang (Kennesaw State University)
Lei Li (Kennesaw State University)
Guangzhi Zheng (Kennesaw State University)
Faculty Informal Self-Learning and Ways to
Engage Students
Session: 6B – Potpourri
Session Chair: Geoffrey Hill
Charleston
Pedagogical Opportunities of Microsoft's
Adventure Works Business Case and Data Model
User Generated Content in Social Media as a
Source for Assessing Cultural Dimensions
Geoffrey Hill (Kent State University)
Ontology-Based Personalized Dietary
Recommendation for Travelers
Shakir Karim (Institute of Business Administration, Karachi)
Umari Uddin Shaikh (Institute of Business Administration,
Karachi
Quratulain Rajput (Institute of Business Administration,
Karachi)
Thomas Ngo-Ye (Dalton State College)
Joe Baxter (Dalton State College)
Michel Mitri
12:15-1:45
Lunch
and Awards Presentation
Johnathan Yerby, SAIS Program Chair
Santee Ballroom D
2:00-3:00
Santee Ballroom A/B/C
Business Meeting
The Role of Grit in Predicting Student Performance
in Introductory Programming Courses: An
Exploratory Study
James Wolf (Illinois State University)
Ronnie Jia (Illinois State University)
16
18th Southern Association for Information Systems Conference • Hilton Head, SC, March 20th–21st , 2015
SAIS 2015 Abstracts
Aashiem, C. Data Mining With Excel Workshop
There is currently a shortage of workers that can deal with big data. Based on an examination of the literature, the
skills required for a career in data science include programming, math, and statistics and probability theory as well
as good communication skills and core business skills. An examination of some university curricula for programs
related to big data leads to the same set of skills as noted in literature with the addition of courses in data mining,
business analytics and, in some cases, a course in the tools specific to handling big data. The focus of the proposed
workshop is on the data mining portion of a curriculum in data science or data analytics. Specifically, the data
mining add-in to Excel will be demonstrated as a tool for doing data mining. A description of each of the features of
the DM add-in for Excel is provided the next section and an outline for the workshop follows.
Aashiem, C., Gardiner, A., Iyer, L., Rutner, P., Williams S. Educating Students Within The Era Of Big Data
This panel discussion will explore the challenges of educating students in an era of big data. Specific attention will
be given to the current and potential role of the Information Systems (IS) discipline in analytics education; what
types of skills analytical workers will require; to what degree should analytics education be cross-disciplinary and
which fields can make claim to analytics education, and should analytics education be also prominent also at the
undergraduate level.
Bandodkar, N., Singh, R., The Impact Of Webpage Visual Characteristics On Consumer's Initial Trust In E-Vendors
In making decisions regarding transacting with web-based vendors, consumers typically consider the uncertainty
about vendor behavior or the perceived risk of having personal information misused by vendors. To mitigate these
concerns vendors convey cues to improve consumer trust at a very early stage. Initial trust plays a central role in
helping consumers overcome perceptions of risk and insecurity and makes them feel comfortable about interacting
and transacting with an e-vendor. Therefore, initial trust is critical to both researchers and practitioners. The
present paper describes a research-in-progress study that concentrates on webpage visual complexity and order as
central factors in the design of web pages to enhance consumers’ initial trust in an online e-vendor.
Bradberry, C. Who Knew? A Process Perspective For Building Analytics From Electronic Health Records
With the emergence of big data capabilities, as well as legislation leading to the implementation of electronic health
records, we find analytics have become a natural extension to our understanding of how organizations can leverage
information. Often times, it is the case that a hospital or care provider is capturing more data than it knows what to
do with; the market has answered this opportunity with specialty firms that take a provider’s information, and build
custom analytics for that provider, based on the provider’s processes, as well as government mandated processes.
In this paper, we examine the interposition of the healthcare provider’s data and the opportunity of an analytics
firm’s model to gain insights as to how healthcare costs can be lowered from a data-driven process analytics
perspective. This research presents the initial findings from case study conducted with a large healthcare provider
to define their needs, and an analytics firm to define their offerings. The results will serve as a baseline towards
building an understanding of generalizable process analytics that will serve two purposes: 1. Healthcare cost
reductions. 2. Patient Suffering reductions.
17
18th Southern Association for Information Systems Conference • Hilton Head, SC, March 20th–21st , 2015
SAIS 2015 Abstracts
Brown, D., Randolph, A. Employee Perceptions Of Information Security Program Non-Compliance Costs
Information security has received increased attention and become significantly more important to organizational
leadership and corporate boards for a wide range of reasons including the cost of security compromises, a
potentially degraded public image, decreased customer trust, and consistent increases in the volume of proprietary
information requiring protection. Human factors are increasingly recognized as critical to the protection of vital
organizational information. As such, it is important to gain more insight into employees’ attitudes and perceptions
toward organizational security programs, a critical component for safeguarding proprietary organizational
information against loss or compromise system failures. This paper presents background literature on Deterrence
Theory and links between information security awareness and training with information security program (ISP)
compliance behavior. It offers a conceptual model and hypotheses as guidance for assessing employee perceptions
of the cost of non-compliance with organizational ISPs.
Campbell, M., Langhinrichsen-Rohling, J., Sweeney, B., Shropshire, J. A Safety Net For Social Networking:
Development Of A Predictive Tool For Domestic Terrorism.
There is a growing trend of disturbed individuals expressing their unhappiness with elements of government or
society in general by committing violent acts. In a high number of these cases, the perpetrators gave clues through
social networks as to what they planned to do beforehand. While technology can identify certain key words and
phrases, it has not advanced to the point of being able to quickly discern between trivial and non-trivial threats. This
paper describes ongoing research into developing a tool that can assist in the prediction of terroristic behavior using
data from social networks combined with personal knowledge of the individual.
Casper, D., Hollifield, S., Talmage C., Nylund, C., Kwak, M. Chasing The Truth: An Educational Game For
Information Literacy And Student Engagement
Games have been designed and developed not just for entertainment but also for various other purposes such as
health and fitness, politics, marketing, and so on. In the paper, we present an educational game, Chasing the Truth,
developed by a group of IT students and librarians at a college to teach information literacy to college level
students. The game was designed to follow an interesting crime story that teaches basic plagiarism and citation
concepts and the game story was implemented based on an interactive branching dialog system that can enforce
learning by trial-and-error and student engagement.
Choi, Y., Dennis, B., . Wireless Technologies For Customer Service Advancements In Troubleshooting And
Customer Service
In this paper we seek to examine the advancements in wireless technology and how it has affected the way
businesses handle troubleshooting and customer service. Wireless medium have radically changed the way that
people around the world communicate and interact, but troubleshooting efforts must also be adaptive to the new
wireless processes. We will prove that providing excellent customer service will allow for a company to develop a
reliable customer base that will greatly grow their business.
Cole, D., McDaniel, B., Nelson, J. Benefits And Risks Of Big Data
Big data is one of the most prevalent topics in information systems today. The purpose of this paper is to explore big
data, its past uses, legal history, current and potential security risks, and potential future uses. This literature review
primarily focuses on the benefits of big data as well as the risks associated with big data. The research provides a
general overview of big data and some of the technologies related to big data. The authors conclude with
suggestions for future research of big data.
18
18th Southern Association for Information Systems Conference • Hilton Head, SC, March 20th–21st , 2015
SAIS 2015 Abstracts
Collier, R., Randolph, A. Wearable Technologies For Healthcare Innovation
Healthcare is becoming more and more prone to technology. For this reason products are being developed geared
toward implementing more sufficient ways of providing healthcare. Wearable technology has become one of the
leading and considerably most valuable assets within the category. There are many types of wearable technology
that do various tasks concerning health. Whether intended focus is on filling a void where human-error can be
present or creation of a process where one was obsolete, wearable technology’s presence is felt within healthcare
today. This exploratory study reviews wearable technologies that exist, are being used, as well as those that are
developing or in the ideation phase concerning healthcare. We present a summary of wearable technologies used in
healthcare and sample categorization to serve as a working framework for understanding the future direction of the
field. Exemplar cases are provided.
Downing, C. Privacy And The Information Age: A Longitudinal View
As information systems and data storage capacity become increasingly sophisticated, an important ethical question
for organizations is “What can/will/should be done with the personal information that has been and can be
collected?” Individuals’ privacy is certainly important, but so is less costly and more targeted business processes. As
this conflict intensifies, consumers, managers and policy makers are left wondering: What privacy principles are
important to guide organizations in self-regulation? For example, do consumers view the five rights originally stated
in the European Data Protection Directive as important? Comprehensive? Is there a product discount point where
consumers would forsake these principles? This project explored these questions using a survey of student
consumers, first in 2006 and again in 2014. Results show that the consumers believe that not only are the five rights
enumerated in the European Data Protection Directive appropriate, but they are also comprehensive. Consumers
also would require a steep product discount to forsake these rights. These views have not changed significantly over
time.
Esposito, M. End User Participation In Information Systems Development: Why Does Collaboration Remain
Elusive? This research in progress proposes to look at end user participation (EUP) in the system development life
cycle (SDLC) through the dual lenses of Representation Theory and shared affordances. It is known that EUP results
in increased end user satisfaction of the information system (IS), yet using EUP during the SDLC remains uncommon.
Should EUP occur throughout the SDLC and IS may be developed that converges on a faithful representation of the
shared affordances required for all stakeholders, specifically the end user. Effective use is understudied, and this
research further delineates between use and effective use. With a better understanding of the impediments to EUP
during the SDLC it may be possible to develop antidotes to increase participation and hence success rate.
Fowler, B., Walker, H., McDonald, D., Williams, J. Integrating NoSQL Into The Classroom
With the increasing popularity of big data, more and more organizations are turning to NoSQL databases as their
preferred system for handling the unique demands of capturing and storing massive amounts of data. The likelihood
that employees in all sizes of organizations will encounter NoSQL databases is growing every year. College students
need to be exposed to this technology and begin to have a functional understanding of how it works and how to use
it. This paper offers a teaching case for college instructors to integrate NoSQL into their existing database courses.
19
18th Southern Association for Information Systems Conference • Hilton Head, SC, March 20th–21st , 2015
SAIS 2015 Abstracts
Franks, S., Kwak, M. aMDFS: Automated Mobile Device Forensics System Using Python And Raspberry Pi
Mobile device forensics is a subdivision of traditional digital forensics to recover digital evidence or data from a
mobile device including smart phones and tablets. With a recent proliferation of smart phones, the demand of
mobile device forensics is expected to be increased considerably. This paper explores currently available techniques
and resources needed for mobile device forensics and presents a low cost automated mobile device forensics
system developed by college students by using Python programming language and existing Raspberry Pi cluster
system.
Galluch, P. It’s All In Your Personality: Combatting Technostress In The Workplace
Contemporary information and communication technologies like e-mail and instant messenger are pervasive in the
workplace. Our “always-on” lifestyle has had a dramatic impact on business productivity and technology-induced
stress, termed technostress. We know very little about how personality influences technostress or how perceptions
of stress and objective strain differ from each other. In this study, we examine three personality characteristics:
locus of control, self-efficacy, and negative and positive affect to see how they correlate with perceived stress,
objective strain, and perceived performance. We found that stress and strain are not correlated and that they
inversely correlate with performance. Secondly, we found that an internal locus of control positively influences
objective strain. Finally, we found that negative effects are more likely to feel stress and have less confidence in
their technology skills. The results provide insight into how personality differently affects stress and strain.
Hill, G. User Generated Content In Social Media As A Source For Assessing Cultural Dimensions
This research in progress intends to document the process of mining social media text-based content in order to
acquire measures of cultural dimensions. This process can potentially be replicated and extended to other topics of
inquiry so as to provide researchers with an alternative source for data acquisition related to measuring theoretical
constructs. Additionally, we provide an argument supporting the credibility of user generated content (UGC) as a
data source for rigorous inquiry. This article describes the mechanism for acquiring pertinent UGC as well as
describing the method of assessing and quantifying the valence and magnitude of the various construct values.
These measures are intended to be suitable for utilization across a variety of methods for statistical analysis
requiring continuous or discrete factor measures. We conclude with a discussion of limitations and benefits and
intend to present preliminary results during the conference.
Iyer, Lakshmi. Visual Analytics: Tools And Teaching Resources For Business Analytics
The purpose of this workshop is to introduce participants to visual analytics (VA), trends in VA, free technologies
and resources available for academics VA in business analytics (BA) courses/programs. SAIS attendees interested in
the analytics area will benefit from resources readily available to incorporate data visualization module(s) in their
existing Business Intelligence/Big Data/Analytics courses. Faculty are faced with preparing students with state of the
art technology skills in business analytics to meet industry demands but with limited budgets for adopting new
technology in classrooms. In this workshop faculty will learn about free cutting-edge technology and readily
available teaching resources prepared by fellow academics to use in their BA courses. Students attending the
workshop will have access to all resources except solution to assignments (unless they are doctoral students
teaching a BA course).
20
18th Southern Association for Information Systems Conference • Hilton Head, SC, March 20th–21st , 2015
SAIS 2015 Abstracts
Jackson, A. The Role Of Judgment And Decision Making Regarding It Resource Utilization Towards Sustainable
Competitive Advantage
This paper is intended to propose a conceptual model that will help researchers and practitioners better understand
the differences in judgment and decision making (JDM) styles of IT leadership and the top management team (TMT)
within an organization. For purposes of this study, IT leadership is represented by the position of the Chief
Information Officer (CIO) and TMT is represented by the executive management team (i.e. Chief Financial Officer
(CFO)) that typically reports to the Chief Executive Officer (CEO). Upon understanding such differences in JDM
styles, knowledge of such differences and related impacts in managing IS resource utilization and related IS resource
capabilities for firm performance and sustainable competitive advantage can further contribute to the existing body
of literature related to individual differences in JDM, IS strategic management, organizational firm performance, and
sustainable competitive advantage.
Jena, R., Srinivasan, S. It Architecture Flexibility As An Antecedent Of Absorptive Capacity: A Theoretical
Perspective
A firm’s ability to identify, assimilate, transform, and apply valuable external knowledge has been recognized as a
key source of sustained competitive advantage. Prior literature refers to this dynamic capability as absorptive
capacity of the firm. The absorptive capacity of the firm has been suggested as a key source of firm’s sustained
competitive advantage. Even though prior literature has focused on various antecedents of absorptive capacity, IT
architecture as a potential antecedent has been largely overlooked. This study theorizes about the role of IT
architecture as a potential antecedent of a firm’s absorptive capacity. This study argues that three unique
dimensions namely, open communication standards, cross-functional transparency, and modularity of IT
architecture affects absorptive capacity by enabling the knowledge identification capability and knowledge
assimilation/transformation capability. The key argument in this conceptual paper is that a firm’s design and
architectural characteristics of the IT is a key source of strength that has implications on how firms explore, exploit
and transform knowledge. By framing IT architecture as an antecedent of absorptive capacity, the study contributes
to the largely overlooked area of the role of IT artifact in influencing a firm’s dynamic capabilities.
Kamal, M., Panebianco, M. A Repository Of Cloud Services For Small And Micro Enterprises
Cloud Computing offers an opportunity to support the growth and development of small and microenterprises by
enabling low cost Information Technology solutions delivered over the Internet to be made available to them so
that they may adopt with little effort or skill. Since the ability of small and microenterprises to adopt technology
depends upon the unique conditions in which they find themselves, we hope to facilitate this by investigating and
assessing the ways in which Cloud Computing functionality and processes may support the growth of small and
microenterprises. In this study, we do this through the creation of an online knowledge repository of Cloud
Computing applications and services with direct correlations to addressing specific business needs of small and
microenterprises. This serves as a very valuable source of information for local community small and
microenterprises looking to adopt low cost Information Technology solutions to address common business needs.
Karim, S., Uddin Shaikh, U., Rajput, Q. Ontology-Based Personalized Dietary Recommendation For Travelers
Tourism is fun that allows a person to know different cultural aspects of the world. In the tour plan, food searching
according to nutritional value also plays an important role. However it is a challenging task to facilitate the tourists
to be healthy and fit while traveling by selecting the food according to their requirement. This paper aims to
develop an ontology based solution that will help the tourists / travelers to plan for a healthy food with
personalized option of diet with food safety recommendation according to the region of interest. The proposed
approach is tested on a sample data based on a traveler visiting Asian region.
21
18th Southern Association for Information Systems Conference • Hilton Head, SC, March 20th–21st , 2015
SAIS 2015 Abstracts
Kreider, C., Kordzadeh, N. Request For Adminship (RFA) Within Wikipedia: How Do User Contributions Instill
Community Trust?
Research into user driven communities such as Wikipedia often focuses on community level characteristics, paying
less attention to social processes performed within these communities. One important process is determining trust
of community members. In Wikipedia, the access to specific tools requiring trust is determined through a
community voting process known as request for adminship (RFA). In this study, we examine the impact of the
contribution made by adminship candidates' on the community's overall decision as to whether to promote the
candidate to administrator. To do so, we collected data on 754 RFA cases and used logistic regression to test four
hypotheses. Our results supported the role of total contribution, and clarification of contribution in RFA success
while the impacts of social contribution was partially supported and the role of content contribution was not
supported. Also, both control variables (tenure and number of attempts) showed significant relationships with RFA
success.
LaValley, C., Umapathy, K., Conceptual Model Of Website Design Elements That Influences Credibility And
Trustworthiness
In today’s competitive environment, it is important for web designers to understand what design elements are
essential for attracting visitors, making the visitor trust the website and perform intended actions like placing an
order, and revisiting the site. Trustworthiness of a website heavily relies on a good first impression and visitor’s
visual perception of the user interface. Therefore, the focus of this research is to investigate the effects of visual
design elements on trustworthiness of a site. In this research-in-progress paper, we develop a conceptual model to
depict the relationships among website design elements and trustworthiness. This conceptual model aids website
designers understand what elements are appealing to the visual senses, and conjures credibility and trust.
Li, L., Guo, R., Zheng, G. Discover And Promote Groupware For Effective Team Collaboration – A Comprehensive
Study
Be able to work in a team is an important skill for a college student. As a result, many professors design one or more
team projects require students to work in groups. This is especially true for upper-level undergraduate courses and
graduate-level courses. Groupware is an important tool assisting team members, especially those in virtual teams,
to work effectively together. However, groupware wasn't widely adopted in team collaboration despite its
promising benefit. In this paper, we propose a comprehensive study on how to groupware to promote effective
team collaboration. The research plan includes identify the important features of a groupware, create an evaluation
framework, assess available groupware on the market and make a recommendation, and finally empirically validate
the effectiveness of the recommended groupware. The detailed research design is presented and the implication of
the study is discussed.
Liaqat, S., Bhatti, Z. An Empirical Investigation Of How To Increase User Engagement On Facebook Business Pages
With the raging trend of networking on social networking sites such as Facebook, almost all businesses are trying to
reach their consumers using the social networking site. One way of promoting a company's products and services is
by increasing the number of its Facebook page followers. We have studied DeLone & McLean’s model of IS success
and have adapted it to the scenario of social networking sites, focusing particularly on Facebook. We have taken
into consideration the dimensions of information quality and service quality and have studied their impact on
consumer engagement and brand advocacy i.e. word of mouth. The proposed model provides quality dimensions
that are hypothesized to influence consumer behavior in terms of their engagement and opinion giving. Results
show that dimensions of information quality and service quality are important factors in molding consumer
behavior accordingly and they partially effect consumer engagement which leads to brand advocacy.
22
18th Southern Association for Information Systems Conference • Hilton Head, SC, March 20th–21st , 2015
SAIS 2015 Abstracts
Lim, J. The Influence Of Information Quality On E-Channel Choice: Investigating Moderating Effects Of Product
Types And Gender
Online consumers face the uncertainty issue when they attempt to purchase products without personal
experiencing them like touching, trying on, etc. With the rapid development of web technologies, a lot of
experience attributes can now be substituted with online information incorporating tools like 3-D images, sound
clip, and customization tools. We investigated if the online information accommodates personal evaluation of
products the same way across different types of products and gender. To test this, as a base model we used the Lim
et al.’s (2012) research model on the causal relationship between perceived information quality and its
determinants. Using EQS 6.1, Structural equation modeling (SEM) and Lagrange Multiplier Test (LM Test) was run to
test 309 sample data. The result shows that there is no effect of gender and product types on the causal
relationships.
Liu, M. They Are Not All Enemies: Detecting And Deterring Non-Malicious, Privileged It User Threat Using A
Comprehensive Approach
Different types of insider threats likely result from different motivations and intentions and involve different
stakeholders. Thus, a “one size fits all” approach may not be effective for the mitigation of all types of insider
threats. In this paper, we take one segment of insiders: the non-malicious, privileged IT users, specifically the IT
professionals given “superuser” access. Our goal is to develop a collaborative, multi-disciplinary approach to detect
and deter such security threats. We first review the IS Threat Vector Taxonomy where the focus is centered on
different types of insider threat. We then take a closer look at non-malicious, privileged IT users and the reasons for
noncompliance behavior. Finally, we develop a comprehensive strategy to detect and deter these insider threats.
Locke, T., Colon, P., Kwak, M. MRS: An Autonomous And Remote-Controlled Robotics Platform For STEM
Education
It has been known that robotics can engage students in STEM fields by providing interactive, hands-on, crossdisciplinary learning experiences. This paper represents a multipurpose educational robotics platform designed and
implemented by a group of IT students by combining various currently available robot technologies. Its main
functions include differential drive, autonomous obstacle avoidance, torso and arms movement, real-time video
streaming, and remote control. The robotics platform was developed to engage students at middle school, high
school, and college levels in science, engineering, and computer programming. It will be experimented and further
enhanced by students in robot programming course at a college.
Miller, R., Melton, J., Jensen, B. Investigating A Method To Modify Student Social Media Behavior
Empirically validated interventions designed to modify student social media behavior are lacking. The current study
was undertaken to design and test the effectiveness of just such an intervention. Students, acting in the role of
hiring managers, were asked to rank job candidates based on their resumes and social media profiles. The goal of
the intervention was to get students to see how social media and posting behavior can negatively affect future
employability. Through a better understanding of the relationship between social media and employability, it was
hoped that students would modify their own posting behavior. Although the intervention was not found to be
effective, the results of the quasi-experiment provide insights that can be used to develop and test future
interventions. Of particular interest were the students’ diverse and sometimes surprising assumptions about social
media usage and how it may be evaluated in a professional context.
23
18th Southern Association for Information Systems Conference • Hilton Head, SC, March 20th–21st , 2015
SAIS 2015 Abstracts
Mitri, M. Pedagogical Opportunities Of Microsoft’s Adventure Works Business Case And Data Model
Database management and querying skills are a key element of a robust information systems curriculum. The data
structure and content of a useful pedagogically-oriented database should be realistic and lifelike, and the database
should contain data that accurately depicts the business processes, functions, and entities of a realistic organization,
organized in a way that demonstrates best practices in database design. Most database textbooks include some
sample databases, but these are often relatively small and sparse of data. By contrast, Microsoft’s Adventure Works
(AW) database presents a robust, realistic, and comprehensive framework for many important educational
objectives in an Information Systems curriculum. This paper introduces the AW business case and database, and
illustrates several pedagogical uses in an undergraduate CIS program.
Murray, M. We Need To Have A Conversation On Bitcoin : Is It On A Path To Becoming The Ultimate Information
System
Two themes have encapsulated online commerce: trust in Internet-based monetary transactions and feasible
micropayments. Bitcoin, a crypto-currency, described in a white paper in 2009, proposes to address both of these
issues. Although surrounded in mystery as the developers of the white paper are anonymous and entering the
online payment marketplace without fanfare, Bitcoin has successfully positioned itself as a potential game-changer
in how digital assets are exchanged. To financiers, this represents disruption in conventional payment systems, to
technologists, this opens a whole new world of possibilities. While still emerging, Bitcoin is on its way to becoming
the ultimate information system and we in the IS community need to be engaged in the conversation. This
workshop explores the advent of Bitcoin, its current state and its future potential.
Naeem Khan, M., Bhatti, Z. Users’ Generated Content On Facebook: Make Or Break For Digital Reputation Of
Firms
Social Networking Sites have emerged as one of the best way of communication between firms and their customers.
Marketers have capitalized on this opportunity to increase brands’ popularity and reputation; on the other hand, a
complex network of customers belonging to different backgrounds has emerged. The raging trend of social
networking sites usage has given users somewhat control over image and reputation of firms. Marketers’ efforts to
boost their firms’ reputation have been managed by online users’ generated content. Due to this change, earned
media has taken over the paid media of firms. Whereas, users’ generated content’s dependency over trust is not
the same as in offline markets. This research illustrates that online user with low propensity to trust show different
behavior than previously studied in offline environment. Further, firms can take lead from this sturdy to change
their social network site’s marketing policies to emphasize on earned media.
Ngo-Ye, T., Baxter, J. Faculty Informal Self-Learning And Ways To Engage Students
Many junior Information Systems (IS) faculty members are facing the challenge of how to find time to learn and
bring in fresh subject content to classroom teaching beyond textbooks, given the tight constraint of time consumed
by multiple teaching preparations, research activities, and various service commitments. We propose the idea of
faculty informal self-learning and then sharing the newly acquired knowledge with students in classroom
discussions. We describe the initiative of collaborating with our college IT services department for this purpose.
More specifically, we invite college IT services staff to give students a campus network tour and a talk on network
administration in our telecommunication class, and speak on cloud service and disaster recovery in our MIS club
meetings. We also intentionally engage in informal conversations with the IT services staff to learn new practical
knowledge with the aim to share with students and thus motivate their desire to learn.
24
18th Southern Association for Information Systems Conference • Hilton Head, SC, March 20th–21st , 2015
SAIS 2015 Abstracts
Ngo-Ye, T. Microsoft Visual Basic For Applications (VBA)/Macro
The purpose of this workshop is to introduce IS faculties and students how to write program in Microsoft Visual
Basic for Applications (VBA)/Macro. We plan to discuss basic concepts of VBA/Macro such as hierarchical Microsoft
Office Object Model and the difference between Macro and VBA. Then we will work on several concrete examples,
including "Hello World" VBA code, recording macro in Word and Excel and then editing the automatically generated
VBA codes in VBA editor, and some more complex real-world applications. We will also point out resources for
additional help on VBA programming, such as books, discussion forum, blogs, and Microsoft MSDN. To maximize the
learning experience, we recommend workshop attendees to bring their Windows laptop (with Microsoft Office
2007/2010/2013) to work on VBA coding.
Pendergast, M. Leveraging Learning Management System To Accommodate Students With Disabilities: Issues And
Experiences With The Canvas LMS
Creating an accessible learning environment in virtual and traditional courses supported by learning management
system software (LMS) can be a daunting task. University courses and the policies created to support students with
disabilities are subject to a multitude of laws. These include the Family Educational Rights and Privacy Act, Health
Insurance Portability and Accountability Act, Americans with Disabilities Act, and sections 504 and 508 of the
Rehabilitation Act of 1973. This paper will briefly detail the relevant laws, and then explain how features of the
Canvas LMS can be used to meet satisfy these laws. Experiences and suggestions for improvement are also
provided.
Pérez, J., Murray, M. Workshop Connectivity And Continuity: New Fronts In The Platform Wars
Smartphones and tablets are replacing notebooks and desktops as computing devices of choice in many homes and
corporate environments. Interconnectedness among myriad devices has become a critical battleground for giants
Apple, Microsoft and Google. In this workshop, we will distinguish between approaches to device connectivity and
application continuity among the big three, give an overview and demonstration of current solutions and share
projections for the future of connectivity. Workshop attendees will observe demonstrations of competing
approaches to connectivity and continuity, have opportunities for hands-on participation and discuss potential
research that explores social and business impacts of connectivity and continuity technologies.
Phillips, B. Problematic Technology Use: The Impact Of Capital Enhancing Activity
This research-in-progress paper gives a brief overview of the technology addiction literature, as well as an
introduction to the capital enhancing activity construct from the sociology literature. Previous information systems
literature has shown a variety of information technology (IT) artifacts that possibly lead to technology addiction.
Hence, this research attempts to demonstrate that today’s ubiquitous technology allows actors to navigate a
multitude of artifacts and that addiction stems from many artifacts. Furthermore, the notion of capital enhancing
activity is presented to understand how actors use of technology, which they believe is essential to their social
status, can, in fact, become problematic. A research model is offered, along with propositions and a proposed study,
to determine how certain types of capital enhancing activities can explain variances in problematic technology use.
25
18th Southern Association for Information Systems Conference • Hilton Head, SC, March 20th–21st , 2015
SAIS 2015 Abstracts
Quammen, R., Randolph, A. A Content Analysis On Intuition In Information Systems Research
Factors influencing information systems (IS) success have been long researched with modest success in
identification of the primary drivers of success. Acceptance of technology is an all-consuming concept in the IS field
(Davis et al. 1989; DeLone et al. 1992; Zmud 1979) and as such definition of the dependent variable for IS success
has dominated IS research. However, a recent study to understand the independent variables associated with IS
success provides evidence that user characteristics such as attitude toward technology, self-efficacy, and technology
experience are predictive IS Success measures that merit further empirical research (Petter et al. 2013). This paper
extends the current research with a focus on the complex human characteristic of intuition. Exploration of the
treatment of intuition in contemporary IS research potentially offers additional insight into the factors impacting IS
success.
Schell, G., Mathieu, R. Teaching The Systems Approach In The Information Systems Curriculum
This paper contends that the systems approach should be the central theme in the information systems curriculum.
At the beginning of the information systems discipline in business schools the systems approach was an integral part
of the curriculum. As technology became more advanced, more widely available, and a more “sexy” topic the
curriculum began to gravitate towards the technology used in information systems. The systems approach is a
problem solving approach to supporting organizations. The key stakeholders of information systems programs have
a need for the persistent theme of the systems approach throughout the curriculum. This paper will define the
systems approach, provide a brief history of the systems approach in the curriculum, examine the IS 2010
Curriculum Guidelines (Topi, et al. 2010) for elements of the systems approach, and propose tactics/strategies to
integrate the systems approach to current and future IS students.
Shropshire, J., Campbell, M., Sweeney, B. Overcoming Privacy Challenges In Mobile-Cloud Computing
The integration of mobile devices with cloud computing systems results in a platform which is well-suited for the
aggregation of customer behavior. Many organizations are capitalizing on this opportunity to harvest user data.
They offer free software, content, and services in order to observe customer behavior. However, users have grown
wary of increasingly comprehensive and granular profiling. The public’s rejection of certain applications show there
is growing resistance to this business practice. The present study overcomes these concerns by proposing four
alternative privacy models. The viability of these privacy models is assessed using a broad public survey. The results
suggest that organizations can alleviate consumers’ privacy concerns by incorporating elements of the proposed
alternative privacy models into their businesses.
Smith, J., Randolph, A. The Homogenization Of Standards Based Information Security Education: An Example Of
Differentiation
The development of standardized information security and assurance training in the United States may foster a
homogenization in ISA training among post-secondary training and education outlets. This leaves open the question
of how bachelor’s programs at universities should differentiate themselves from other post-secondary training and
education programs and crate added value for students perusing bachelor’s degrees with ISA content. This article
describes the Survey of Strategic Global Cybersecurity course that was developed in 2014 at REDACTED University.
The goal of this course was to provide a broader level of global worldview macro level causes and effects as it
related to cybersecurity issues than is presented in a standard information security and assurance course. In
addition, we examine an early stage investigation into the trends that may be driving homogenization among
technical colleges and universities ISA course offerings.
26
18th Southern Association for Information Systems Conference • Hilton Head, SC, March 20th–21st , 2015
SAIS 2015 Abstracts
Thackston, R., Fortenberry, R. High Performance Computing: Considerations When Deciding To Rent Or Buy
The commercial cloud computing (CCC) industry has reached a level of maturity to make it a truly viable alternative
to the traditional, in-house data center. Although there are many notable examples of CCC platforms and
technologies being piloted for high performance computing (HPC) tasks, it has yet to enter the mainstream. A
variety of obstacles exist which have slowed or hindered adoption of CCC platforms, including implementation
complexity, cost confusion, and security concerns. This paper describes the author’s experiences in using CCC for
various HPC tasks and compares the results to the same tasks being executed on in-house computing resources. The
breakpoint at which CCC becomes more costly than in-house equipment is identified. Lastly, a series of lessons
learned are presented to assist researchers in effectively interacting with CCC vendors and platforms.
Tian, X., Schwartz, S. The Use Of Analytical Platform To Identify Valuable Interventions In Retail Pharmacies
As BI products and services increasing, the cost for collecting data and storing data is reclined. Enterprises could get
the data source from customer transactions, website logs and product reviews. BI technology is used in many fields,
such as in manufacturing for order shipment and customer support, in financial services for claims analysis and
fraud detection, in transportation for fleet management, in retail for user profiling to target grocery coupons during
checkout, in utilities for power usage analysis, and health care for outcomes analysis. The profession of pharmacy
will be more reliant upon the information that can be extracted from data analytics and BI tools. There is a great
opportunity in pharmacy to develop an analytical platform to suit both business needs in retail and the delivery of
patient care in pharmacy. This paper proposes an analytical platform to identify valuable interventions in retail
pharmacies.
Wolf, J., Jia, R. The Role Of Grit In Predicting Student Performance In Introductory Programming Courses: An
Exploratory Study
This research examines the association between student grit and academic achievement in introductory computer
programming courses. While several studies have established a link between grit and student success in classes with
lower failure rates, this exploratory work is the first to investigate the relationship in courses with high failure rates.
Our survey data show that grittier students earn higher grades in introductory programming courses than less gritty
students, thus providing support for extending the student grit-performance relationship to high failure courses.
Wu, Y., Wang, Y., Song, J., Byrd, T. The Impact Of Knowledge From Learning-About Electronic Health Records On It
Innovation Adoption: The Moderating Role Of Absorptive Capacity
Learning-by-doing is a crucial process to successful IT adoption. Yet, this type of organizational learning process is
necessary but not sufficient to the adoption success. Learning-about, the pre-adoption learning activity, plays an
equally important role in an organization’s IT adoption. In healthcare industry, hospitals are not always able to
utilize healthcare information technologies (HITs), such as electronic healthcare records (EHRs), to generate high
quality information for decision making. Having pre-adoption knowledge and the capacity to absorb the knowledge
is likely to better the adoption results. This research proposes a conceptual model to explain the importance of the
knowledge from learning-about EHR technology and explore the role absorptive capacity plays in EHR pre-adoption.
This study contributes to the existing EHR literature by (1) adding pre-adoption knowledge into the ingredients of
successful adoption, and (2) discussing the moderating effect of absorptive capacity to the relationship between
pre-adoption knowledge and outcomes of adoption.
27
18th Southern Association for Information Systems Conference • Hilton Head, SC, March 20th–21st , 2015
SAIS 2015 Abstracts
Yerby, J., Floyd, K. Advanced Cyber-forensics Education Consortium: Panel
The panel will discuss the work of the National Science Foundation ACE Consortium and how the initiative is helping
to build awareness and the workforce pipeline for cyber forensics that will be needed in the next 5-10 years. In
addition to Daytona State and Middle Georgia State College other schools include South Piedmont Community
College, and Trident Technical College. The panel will discuss how schools at the collegiate, community college,
technical, and K-12 levels can get involve and benefit from participation in the ACE Consortium.
Zhang, C., Li, L., Zheng, G. Developing Business Intelligence Competency In Health It: Perspectives From Health It
Professionals
Business intelligence (BI) is a set of methods and technologies that can provide analytical power to help the
healthcare industry to tackle the challenges brought by ever-growing and complex health data. To develop a
successful Health Information Technology (HIT) or Health Informatics (HI) curriculum with the component of BI or
health data analytics, it is critical to first identify the sets of important skills that a HIT student should possess upon
graduation, especially from HIT professionals’ perspective. In this paper, we reported findings from a pilot study in
which we surveyed a group of HIT practitioners. The implications of the pilot study are discussed.
28
18th Southern Association for Information Systems Conference • Hilton Head, SC, March 20th–21st , 2015