18 Southern Association for Information Systems Conference
Transcription
18 Southern Association for Information Systems Conference
18th Southern Association for Information Systems Conference Hilton Head, South Carolina, USA March 20th – 21st, 2015 Welcome From the Conference Chair Welcome to the 18th annual Southern Association for Information Systems (SAIS) conference. I would like to take the opportunity to welcome everyone to Hilton Head, South Carolina. Hilton Head may be a small island, but there is a large number of activities for you to experience during your time here. There are more than 250 restaurants, two dozen golf courses, numerous stores and outlets, and the beautiful beaches that may be too cool to get in right now, but you can certainly enjoy a stroll before you head back home. The island has been intentionally designed to be visually appealing and relaxing for visitors. This year’s conference features two impressive keynote speakers. Harold Itkin, president of IMS, LLC will speak Friday morning on the topic of IT Leader Relevancy. Prior to his current position Harold served as Senior Manager/Principal Consultant at Ciber, Senior Director, Global IT Strategic Initiatives at Teleflex, and Support Alliance Mgr. with SAP among others. As Support Alliance Manager for SAP he developed strategies and support plans to mitigate risks to the most critical initiatives at SAP’s most visible Southeast region customers and integrating the SAP support organization into the overall framework of the account management. These engagements ranged from support of process solutions to migration and governance of data. His accounts included the Coca-Cola Company, Coca-Cola Enterprises and the Home Depot among others. John Girard will give a keynote address Saturday morning. Dr. Girard holds the Peyton Anderson Endowed Chair in Information Technology at Middle Georgia State College’s School of Information Technology and is founder and Chief Knowledge Strategist of Sagology, a firm dedicated to connecting people with people to facilitate collaboration, learning, and knowledge sharing through keynotes, workshops, and consulting. The title of his presentation is: Big Data: Something New, Something Borrowed, or Something Blue? In the past three years there has been a 10-fold increase in Google searches for the term “Big Data.” Clearly there is considerable interest in the term; however, is Big Data helping executives make better decisions? Does Big Data empower, liberate, or overwhelm decision makers? Join John Girard for an engaging and entertaining gallop through the fields of Big Data. Critical to the success of this conference is the Program Chair. This job requires many hours of dedication, including the need to work both closely with authors who have submitted their research, and with the many reviewers we have, who generously give their time. Johnathan Yerby, our Program Chair this year, has done an outstanding job and deserves much appreciation for his dedication and professionalism. The program and coordinating reviewers and authors takes a surprisingly large amount of time and effort, which Johnathan handled extremely well. Personally, it has been a pleasure to work with him over the last twelve months. I also want to recognize Dr. Kevin Floyd, who is our current SAIS president. Kevin’s depth of commitment to SAIS has been inspirational to me, he manages SAIS’s website, and he always has great advice, whenever I needed it. Kevin is truly a team player. Finally, I would like to thank everyone in attendance at this year’s SAIS. It has been a pleasure to serve as your conference chair, and I hope you will enjoy the program and meeting up with old friends, as well as making new ones. Paige Rutner Georgia Southern University 2 18th Southern Association for Information Systems Conference • Hilton Head, SC, March 20th–21st , 2015 Welcome From the Program Chair Once again, this year’s Southern Association for Information Systems (SAIS) conference features an excellent program. Points of pride include a strong showing of papers from scholars and students attending from a number of leading schools in the south, and SAIS continues to attract presenters from both overseas and varied locations within the United States. This year SAIS will have a new social event on Friday, which is designed as an opportunity for informal networking and getting to know the wonderful variety of attendees at SAIS. I certainly hope that you find this conference an excellent opportunity that you plan to return to next year. I know that you have to make tough decisions on which conferences you are able to attend, and SAIS is very thankful to have you here. Listed in this program are fifty-six manuscript reviewers, and I am very grateful to the many people that were happy to offer up their valuable time to help out. The 2015 SAIS conference had an accept rate of 80.3%, and a reject rate of 19.6%. I hope that you find value in the research and relationships being shared at this conference. There were five papers that had to withdraw for scheduling or not being able to fulfill the reviewer requests in time. The quality of reviews was impressive, with many clearly crafted to be both supportive and to offer valuable suggestions as to how authors could improve their research. Some authors made it a point to let me know they were impressed by the helpfulness and quality of the reviews they received. Other comments indicated authors were also highly motivated to address the issues raised by the reviewers. Sometimes it is difficult to know whether the hard work of reviewing is fully appreciated. However, by the end of the review process, I was convinced that for SAIS, such contributions are highly valued, as well as being critical to the success of the conference. I would especially like to thank Kevin Floyd and Paige Rutner for their strong support and for always being there to answer the questions I put to them. Their advice, unwavering collegiality, and continual encouragement made being Program chair a very doable task. Paige has been fantastic about volunteering to do several of the very important small tasks that would have a huge impact if forgotten. I sincerely hope you enjoy the program, and SAIS provides you with an opportunity to catch up with existing colleagues, and to make new friends. Johnathan Yerby Middle Georgia State College 3 18th Southern Association for Information Systems Conference • Hilton Head, SC, March 20th–21st , 2015 Welcome From the SAIS President Hello and welcome to the 18th Southern Association for Information Systems conference in Hilton Head Island, South Carolina! It has been my pleasure to serve as this year’s SAIS President. While there has been much work involved, it has truly been a rewarding experience to work with this year’s Vice President’s and Board to plan what promises to be an exciting and rewarding conference. I hope you take the opportunity to not only enjoy the conference but to also the heritage, rich history, and beautiful scenery that the Island has to offer. The Southern AIS Conference is known for the friendliness of attendees and the collegial atmosphere fostered in the conference. I would like to take the time to recognize two people who deserve special recognition for their service to the 18th Annual Southern AIS Conference. This year’s Program Chair, Johnathan Yerby, has worked very hard to collect papers, assure that reviews were made, and create the Proceedings. These are all time consuming tasks that require dedication to serving Southern AIS. Please join me in thanking Johnathan while you’re at the conference. Paige Rutner is the Conference Chair and the arrangements you are enjoying are the result of her work this past year. Paige has been busy selecting the conference location, making arrangements with the hotel, planning the conference’s first Friday night social event, and generally fielding all of the problems associated with such a large gathering. Paige is to be commended for all of her efforts. Again, welcome to SAIS and Hilton Head Island. I hope that you enjoy the conference and take the opportunity to catch up with existing colleagues, and to make new friends. I look forward to meeting each of you. Kevin S. Floyd Middle Georgia State College 4 18th Southern Association for Information Systems Conference • Hilton Head, SC, March 20th–21st , 2015 SAIS Board Members President Kevin Floyd Adrian Gardiner Past-Past President George Schell Middle Georgia State College Georgia Southern University University of North Carolina – Wilmington VP-Conference Chair VP-Program Chair Secretary Johnathan Yerby Janette Moody Board Member / Student Liaison Board Member Paige Rutner Georgia Southern University Treasurer Jim Wynne Virginia Commonwealth University Board Member Michael Cuellar Georgia Southern University 5 Past President Middle Georgia State College James Smith Kennesaw State University Board Member Camille Rogers Georgia Southern University The Citadel Joy Godin Georgia College and State University Board Member Lakshmi Iyer University of North Carolina - Greensboro 18th Southern Association for Information Systems Conference • Hilton Head, SC, March 20th–21st , 2015 Keynote Speakers Harold Itkin President, IMS, LLC Harold assists clients in establishing the alignment of technology solutions to business objectives while developing a strategy to expedite this process and bringing about the change required to be successful. Throughout his career he has developed strategies and value propositions for comprehensive IT initiatives and has regularly served as an advisor to CIO’s and IT Leadership Teams. Harold also has done extensive work in team development, corporate change management and problem resolution. Previously he led the Applications, Business Relationship Management, DMO and IT Strategy groups at Teleflex Inc. after a ten year stint at SAP in various consulting and leadership roles. He fuels his passion for helping develop the future leaders and influencers of IT by teaching Strategy Courses to Masters’ Candidates at Georgia State University. John Girard, Ph.D. Professor, School of Information Technology, Middle Georgia State College John Girard is a professor, storyteller, and adventurer who has enjoyed the privilege of speaking to groups on six continents about technology, leadership, and culture. John holds the Peyton Anderson Endowed Chair in Information Technology at Middle Georgia State College’s School of Information Technology. Engaging with students on a daily basis ensures he remains current in the ever-changing world in which we live and do business. John has traveled to more than 85 countries investigating globalization and innovation in action. He is founder and Chief Knowledge Strategist of Sagology (www.sagology.com), a firm dedicated to connecting people, facilitating collaboration, learning, and knowledge sharing through keynotes, workshops, and consulting. Prior to transitioning to the academy, John worked as the Director of Knowledge Management at National Defence Headquarters in Ottawa, Canada. He served for 24 years in the Canadian Forces, retiring at the rank of Lieutenant-Colonel. John is a Fellow & Distinguished Scholar of The International Institute for Applied Knowledge Management, a Certified Information Professional, and a Chartered Manager, the Canadian Institute of Management’s senior qualification and chartered professional designation. To learn more about John, visit www.johngirard.net 6 18th Southern Association for Information Systems Conference • Hilton Head, SC, March 20th–21st , 2015 Manuscript Reviewers Zeeshan Ahmed King Abdul Aziz University Adrian Gardiner Georgia Southern U. David Marshburn Sim Ventions Nikhil Bandodkar Clemson University Jennifer Gerow Virginia Military Institute Robert Miller Central Michigan University Shannon Beasley Middle Georgia State College John Girard Middle Georgia State College Michel Mitri James Madison University Bob Brookshire University of South Carolina Joy Godin Georgia College Janette Moody The Citadel Dennis Brown Kennesaw State University Aysegul Gok Georgia State University Meg Murray Kennesaw State University Joseph Budu Ghana Institute of Management and Public Administration Rachel Halfon Bar-Ilan University Thomas Ngo-Ye Dalton State College Geoffrey Hill Kent State University Richelle Oakley Savannah State University Md Hoque University of Dhaka Mark Pendergast Florida Gulf Coast University Angela Jackson Kennesaw State University Brandis Phillips North Carolina A & T State U. Karim Jetha University of Georgia Charlie Pitts Florida State University Shakir Karim Institute of Business Administration Robecca Quammen Health Care Consultants Matt Campbell University of South Alabama Young Choi Regent University Pedro Colon Middle Georgia State College Amy Connolly USC Upstate Michael Cuellar Georgia Southern U. Charles Downing Northern Illinois University Rajeev Dwivedi IMTCDL India Marie Esposito Clemson University Kevin Floyd Middle Georgia State College 7 Kathryn Kimery Saint Mary's University Nima Kordzadeh Idaho State University Myungjae Kwak Middle Georgia State College Jaejoo Lim South Carolina State University Adriane Randolph Kennesaw State University Paige Rutner Georgia Southern U. Chetan Sankar Auburn University George Schell University of North Carolina Wilmington 18th Southern Association for Information Systems Conference • Hilton Head, SC, March 20th–21st , 2015 Manuscript Reviewers James Smith Kennesaw State University / Mercer University Sankara-Subramanian Srinivasan Idaho State University Nelbert St.Clair Middle Georgia State College Russell Thackston Georgia Southern University 8 Xin Tian Old Dominion University Karthikeyan Umapathy University of North Florida Yun Wu Auburn University Jim Wynne Virginia Commonwealth U. Emrah Yasasin University of Regensburg, Johnathan Yerby Middle Georgia State College Kirill Yurov Middle Georgia State College Chi Zhang Kennesaw State University 18th Southern Association for Information Systems Conference • Hilton Head, SC, March 20th–21st , 2015 Conference at a Glance The conference program and proceedings are available on the SAIS website at: http://sais.aisnet.org/ 2:45–3:00 Coffee Break Santee Ballroom Pre-function Foyer Thursday, March 19, 2015 3:00–4:15 Sessions 4A-4D Santee Ballroom Pre-function Foyer 7:00–9:00PM SAIS Board Meeting Chart House 2 Hudson Road, Hilton Head Island, SC Friday, March 20, 2015 7:30-4:15 Registration Santee Ballroom Pre-function Foyer 7:30–8:30 Continental Breakfast Coffee Santee Ballroom Pre-function Foyer 8:30-9:30 Welcome and Keynote Address Santee Ballroom A/B/C 9:30–9:45 Coffee Break Santee Ballroom Pre-function Foyer 9:45–11:00 Sessions 1A-1D Santee Ballroom A/B/C, Charleston, Dorchester, Jasper 11:00–11:15 Coffee Break Santee Ballroom Pre-function Foyer 11:15–12:15 Sessions 2A-2D Santee Ballroom A/B/C, Charleston, Dorchester, Jasper 12:15–1:45 Lunch Santee Ballroom D 1:45–2:45 Sessions 3A-3D Santee Ballroom A/B/C, Charleston, Dorchester, Jasper 9 4:30–6:00 Social Event Oceanfront Beach Pavilion Saturday, March 21, 2015 7:30-12:15 Registration Santee Ballroom Pre-function Foyer 7:30–8:30 Continental Breakfast Coffee Santee Ballroom Pre-function Foyer 8:30–9:30 Keynote Speech Santee Ballroom A/B/C 9:30–9:45 Coffee Break Santee Ballroom Pre-function Foyer 9:45–10:45 Sessions 5A-5D Santee Ballroom A/B/C, Charleston, Dorchester, Jasper 10:45–11:00 Coffee Break Santee Ballroom Pre-function Foyer 11:00–12:15 Sessions 6A-6D Santee Ballroom A/B/C, Charleston, Dorchester, Jasper 12:15–2:00 Lunch & Best Paper Awards Santee Ballroom D 2:00-3:00 SAIS Business Meeting Santee Ballroom A/B/C 18th Southern Association for Information Systems Conference • Hilton Head, SC, March 20th–21st , 2015 Hotel Floorplan Map 1. Meeting Rooms Registration – Santee Ballroom Pre-function Foyer Keynote Addresses – Santee Ballroom A/B/C Other Meeting Rooms – Charleston, Dorchester, and Jasper Meals – Santee Ballroom D Friday Social Event – Oceanfront Beach Pavilion 10 18th Southern Association for Information Systems Conference • Hilton Head, SC, March 20th–21st , 2015 Hotel Floorplan Map 2. Entire Resort Layout Registration – Santee Ballroom Pre-function Foyer Keynote Addresses – Santee Ballroom A/B/C Other Meeting Rooms – Charleston, Dorchester, and Jasper Meals – Santee Ballroom D Friday Social Event – Oceanfront Beach Pavilion 11 18th Southern Association for Information Systems Conference • Hilton Head, SC, March 20th–21st , 2015 Conference Schedule Thursday, March 19, 2015 7:00-9:00PM SAIS Board Meeting Chart House 2 Hudson Road, Hilton Head Island, SC Friday, March 20, 2015 7:30-4:15 Registration Santee Ballroom Pre-function Foyer Session: 1B – Trust and Credibility Session Chair: Karthikeyan Umapathy Charleston 7:30-8:30 Continental Breakfast The Impact of Webpage Visual Characteristics on Consumer's Initial Trust in E-Vendors Santee Ballroom Pre-function Foyer 8:30-9:30 Nikhil Bandodkar (Clemson University) Renu Singh (South Carolina State University) Welcome & Keynote Speech Santee Ballroom A/B/C Kevin Floyd, SAIS President Paige Rutner, SAIS Conference Chair Christopher Kreider (Fulfillment.com) Nima Kordzadeh (Idaho State University) Keynote: “IT Leader Relevancy” Conceptual Model of Website Design Elements That Influences Credibility And Trustworthiness By Harold Itkin President, IMS, LLC. 9:30-9:45 Coffee Break Break Area 9:45-11:00 Request For Adminship (RFA) Within Wikipedia: How Do User Contributions Instill Community Trust? Sessions 1A-1D Session: 1A – Privacy and Big Data Session Chair: Brian McDaniel Santee Ballroom A/B/C Overcoming Privacy Challenges in Mobile-Cloud Computing Jordan Shropshire (University of South Alabama) Matt Campbell (University of South Alabama) Bob Sweeney (University of South Alabama) Christopher LaValley (University of North Florida) Karthikeyan Umapathy (University of North Florida) Session: 1C – Potpourri Session Chair: Sankara Subramanian Srinivasan Dorchester Problematic Technology Use: The Impact of Capital Enhancing Activity Brandis Phillips (North Carolina A&T State University) The Impact of Knowledge from Learning-About Electronic Health Records on IT Innovation Adoption: The Moderating Role of Absorptive Capacity Privacy and the Information Age: A Longitudinal View Yun Wu (Auburn University) Yi-chuan Wang (Auburn University) Jiahe Song (Auburn University) Terry Byrd (Auburn University) Benefits and Risks of Big Data IT Architecture Flexibility as an Antecedent of Absorptive Capacity: A Theoretical Perspective Charles Downing (Northern Illinois University) Dana Cole (Georgia College and State University) Brian McDaniel (Georgia College and State University) Jasmine Nelson (Georgia College and State University) 12 Rishikesh Jena (University of Arkansas) Sankara Subramanian Srinivasan (Idaho State University) 18th Southern Association for Information Systems Conference • Hilton Head, SC, March 20th–21st , 2015 Conference Schedule Session: 1D – Gamification and Cyberforensics Session Chair: Kevin Floyd Jasper Chasing the Truth: An Educational Game for Information Literacy and Student Engagement Dana Casper (Middle Georgia State College) Sarah Hollifield (Middle Georgia State College) Caleb Talmage (Middle Georgia State College) Chris Nylund (Middle Georgia State College) Myungjae Kwak (Middle Georgia State College) Session: 2C – WORKSHOP: Visual Analytics: Tools and Teaching Resources for Business Analytics Session Chair: Lakshmi Iyer Dorchester WORKSHOP: Visual Analytics: Tools and Teaching Resources for Business Analytics Lakshmi Iyer (University of North Carolina at Greensboro) 12:15-1:45 Lunch Santee Ballroom D PANEL: Advanced Cyberforensics Education Consortium Johnathan Yerby (Middle Georgia State College) Kevin Floyd (Middle Georgia State College) Emily Coppa (Middle Georgia State College) 11:00-11:15 Santee Ballroom Pre-function Foyer 11:15-12:15 Coffee Break Sessions 2A-2C Session: 2A – WORKSHOP: We Need to Have a Conversation on Bitcoin: Is it on a Path to Becoming the Ultimate Information System Session Chair: Meg Murray Santee A/B/C WORKSHOP: We Need To Have a Conversation on Bitcoin: Is it on a Path to Becoming the Ultimate Information System Meg Murray (Kennesaw State University) Session: 2B – Internet and Cloud Session Chair: Mehruz Kamal Charleston The Influence of Information Quality on E-Channel Choice: Investigating Moderating Effects of Product Types and Gender Jaejoo Lim (South Carolina State University) 1:45-2:45 Sessions 3A-3D Session: 3A – Resource Considerations Session Chair: Angela Jackson Santee Ballroom A/B/C High Performance Computing: Considerations When Deciding To Rent or Buy Russell Thackston (Georgia Southern University) Ryan Fortenberry (Georgia Southern University) The Role of Judgment and Decision Making Regarding IT Resource Utilization towards Sustainable Competitive Advantage Angela Jackson (Kennesaw State University) Session: 3B – Mobile Devices Session Chair: Myungjae Kwak Charleston MRS: An Autonomous and Remote-Controlled Robotics Platform for STEM Education Timothy Locke (Middle Georgia State College) Peter Colon (Middle Georgia State College) Myungjae Kwak (Middle Georgia State College) aMDFS: Automated Mobile Device Forensics System Using Python and Raspberry Pi Shaun Franks (Middle Georgia State College) Myungjae Kwak (Middle Georgia State College) A Repository of Cloud Services For Small and Micro Enterprises Mehruz Kamal (State University of New York at Brockport) Matthew Panebianco (State University of New York at Brockport) 13 18th Southern Association for Information Systems Conference • Hilton Head, SC, March 20th–21st , 2015 Conference Schedule Session: 3C – WORKSHOP: Data Mining With Excel Session Chair: Cheryl Aasheim Dorchester WORKSHOP: Data Mining With Excel Cheryl Aasheim (Georgia Southern University) It's All In Your Personality: Combatting Technostress in the Workplace Teaching the Systems Approach in the Information Systems Curriculum George Schell (University of North Carolina – Wilmington) Richard Mathieu (James Madison University) Investigating a Method to Modify Student Social Media Behavior Robert Miller (Central Michigan University) James Melton (Central Michigan University) Brent Jensen (Central Michigan University) Santee Ballroom Pre-function Foyer 3:00-4:15 Pamela Galluch (Roanoake College) Session: 4C – Potpourri Session Chair: Caleb Bradberry Dorchester End User Participation in Information Systems Development: Why Does Collaboration Remain Elusive? Marie Esposito (Clemson University) Break Sessions 4A-4D Session: 4A – Social Networking Issues Session Chair: Bob Sweeney Santee Ballroom A/B/C Users’ Generated Content on Facebook: Make or Break For Digital Reputation of Firms Muhammad Naeem Khan (IQRA University Islamabad) Zeeshan Ahmed Bhatti (King Abdul Aziz University) An Empirical Investigation of How to Increase User Engagement on Facebook Business Pages Sundas Liaqat (American University) Zeeshan Ahmed Bhatti (King Abdul Aziz University) A Safety Net for Social Networking: Development of a Predictive Tool for Domestic Terrorism Matt Campbell (University of South Alabama) Jennifer Langhinrichsen-Rohling (University of S. Alabama) Bob Sweeney (University of South Alabama) Jordan Shropshire (University of South Alabama) 14 They Are Not All Enemies: Detecting and Deterring Non-Malicious, Privileged IT User Threat Using a Comprehensive Approach Xiang (Michelle) Liu (Marymount University) Diane Murphy (Marymount University) Session: 3D – Pedagogical Potpourri Session Chair: Robert Miller Jasper 2:45-3:00 Session: 4B – Workplace Issues and Resources Session Chair: Pamela Galluch Charleston The Use of Analytical Platform to Identify Valuable Interventions in Retail Pharmacies Xin Tian (Old Dominion University) Sean Schwartz (Old Dominion University) Who Knew? A Process Perspective for Building Analytics from Electronic Health Records Caleb Bradberry (University of N. Carolina at Greensboro) Session: 4D – Pedagogical Topics Session Chair: James Smith Jasper Leveraging Learning Management System to Accommodate Students with Disabilities: Issues and Experiences with the Canvas LMS Mark Pendergast (Florida Gulf Coast University) The Homogenization of Standards Based Information Security Education: An Example of Differentiation James Smith (Mercer Univ., Kennesaw State University) Adriane Randolph (Kennesaw State University) Integrating NoSQL into the Classroom Brad Fowler (Georgia College and State University) Heather Walker (Georgia College and State University) Daniel McDonald (Georgia College and State University) Jerica Williams (Georgia College and State University) 18th Southern Association for Information Systems Conference • Hilton Head, SC, March 20th–21st , 2015 Conference Schedule 4:30-6:00 Social Event Oceanfront Beach Pavilion Saturday, March 21, 2015 7:30-10:00 Registration Santee Ballroom Pre-function Foyer 8:00-8:30 Continental Breakfast Santee Ballroom Pre-conference Foyer 8:30-9:30 Santee Ballroom A/B/C Keynote Speech Keynote: “Big Data: Something New, Something Borrowed, or Something Blue?” By John Girard, Ph.D. Professor, School of Information Technology Middle Georgia State College 9:30-9:45 Coffee Break Santee Ballroom Pre-conference Foyer 9:45-10:45 Sessions 5A-5C Session: 5A – PANEL: Educating Students within the Era of Big Data: Session Chair: Paige Rutner Santee A/B/C PANEL: Educating Students within the Era of Big Data Lakshmi Iyer (University of North Carolina at Greensboro) Cheryl Aasheim (Georgia Southern University) Adrian Gardiner (Georgia Southern University Susan Williams (Georgia Southern University) Paige Rutner (Georgia Southern University) Session: 5B – WORKSHOP: Connectivity and Continuity: New Fronts in the Platform Wars Session Chair: Meg Murray Charleston WORKSHOP: Connectivity and Continuity: New Fronts in the Platform Wars Jorge Pérez Meg Murray (Kennesaw State University) Session: 5C – Improving Student Outcomes and Motivation WORKSHOP: Microsoft Visual Basic for Applications (VBA)/Macro Session Chair: Thomas Ngo-Ye Dorchester WORKSHOP: Microsoft Visual Basic for Applications (VBA)/Macro Thomas Ngo-Ye (Dalton State College) 10:45-11:00 Santee Ballroom Pre-conference Foyer 15 Break 18th Southern Association for Information Systems Conference • Hilton Head, SC, March 20th–21st , 2015 Conference Schedule 11:00-12:15 Sessions 6A-6D Session: 6A – Technology in Business and Healthcare Session Chair: Young Choi Santee Ballroom A/B/C Wireless Technologies for Customer Service Advancements in Trouble Shooting and Customer Service Session: 6C – Topics in Technology Session Chair: Rebecca Quammen Dorchester Wearable Technologies for Healthcare Innovation Raymond Collier (Kennesaw State University) Adriane Randolph (Kennesaw State University) Employee Perceptions of Information Security Program Non-Compliance Costs Young Choi (Regent University) Breanna Dennis (Regent University) Dennis Brown (Kennesaw State University) Adriane Randolph (Kennesaw State University) Discover and Promote Groupware for Effective Team Collaboration: A Comprehensive Study A Content Analysis on Intuition in Information Systems Research Lei Li (Kennesaw State University) Rong Guo (University of West Georgia) Ghangzhi Zheng (Kennesaw State University) Rebecca Quammen (Kennesaw State University) Adriane Randolph (Kennesaw State University) Developing Business Intelligence Competency in Health IT: Perspectives from Health IT Professionals Session: 6D – Pedagogical Opportunities Session Chair: Thomas Ngo-Ye Jasper Chi Zhang (Kennesaw State University) Lei Li (Kennesaw State University) Guangzhi Zheng (Kennesaw State University) Faculty Informal Self-Learning and Ways to Engage Students Session: 6B – Potpourri Session Chair: Geoffrey Hill Charleston Pedagogical Opportunities of Microsoft's Adventure Works Business Case and Data Model User Generated Content in Social Media as a Source for Assessing Cultural Dimensions Geoffrey Hill (Kent State University) Ontology-Based Personalized Dietary Recommendation for Travelers Shakir Karim (Institute of Business Administration, Karachi) Umari Uddin Shaikh (Institute of Business Administration, Karachi Quratulain Rajput (Institute of Business Administration, Karachi) Thomas Ngo-Ye (Dalton State College) Joe Baxter (Dalton State College) Michel Mitri 12:15-1:45 Lunch and Awards Presentation Johnathan Yerby, SAIS Program Chair Santee Ballroom D 2:00-3:00 Santee Ballroom A/B/C Business Meeting The Role of Grit in Predicting Student Performance in Introductory Programming Courses: An Exploratory Study James Wolf (Illinois State University) Ronnie Jia (Illinois State University) 16 18th Southern Association for Information Systems Conference • Hilton Head, SC, March 20th–21st , 2015 SAIS 2015 Abstracts Aashiem, C. Data Mining With Excel Workshop There is currently a shortage of workers that can deal with big data. Based on an examination of the literature, the skills required for a career in data science include programming, math, and statistics and probability theory as well as good communication skills and core business skills. An examination of some university curricula for programs related to big data leads to the same set of skills as noted in literature with the addition of courses in data mining, business analytics and, in some cases, a course in the tools specific to handling big data. The focus of the proposed workshop is on the data mining portion of a curriculum in data science or data analytics. Specifically, the data mining add-in to Excel will be demonstrated as a tool for doing data mining. A description of each of the features of the DM add-in for Excel is provided the next section and an outline for the workshop follows. Aashiem, C., Gardiner, A., Iyer, L., Rutner, P., Williams S. Educating Students Within The Era Of Big Data This panel discussion will explore the challenges of educating students in an era of big data. Specific attention will be given to the current and potential role of the Information Systems (IS) discipline in analytics education; what types of skills analytical workers will require; to what degree should analytics education be cross-disciplinary and which fields can make claim to analytics education, and should analytics education be also prominent also at the undergraduate level. Bandodkar, N., Singh, R., The Impact Of Webpage Visual Characteristics On Consumer's Initial Trust In E-Vendors In making decisions regarding transacting with web-based vendors, consumers typically consider the uncertainty about vendor behavior or the perceived risk of having personal information misused by vendors. To mitigate these concerns vendors convey cues to improve consumer trust at a very early stage. Initial trust plays a central role in helping consumers overcome perceptions of risk and insecurity and makes them feel comfortable about interacting and transacting with an e-vendor. Therefore, initial trust is critical to both researchers and practitioners. The present paper describes a research-in-progress study that concentrates on webpage visual complexity and order as central factors in the design of web pages to enhance consumers’ initial trust in an online e-vendor. Bradberry, C. Who Knew? A Process Perspective For Building Analytics From Electronic Health Records With the emergence of big data capabilities, as well as legislation leading to the implementation of electronic health records, we find analytics have become a natural extension to our understanding of how organizations can leverage information. Often times, it is the case that a hospital or care provider is capturing more data than it knows what to do with; the market has answered this opportunity with specialty firms that take a provider’s information, and build custom analytics for that provider, based on the provider’s processes, as well as government mandated processes. In this paper, we examine the interposition of the healthcare provider’s data and the opportunity of an analytics firm’s model to gain insights as to how healthcare costs can be lowered from a data-driven process analytics perspective. This research presents the initial findings from case study conducted with a large healthcare provider to define their needs, and an analytics firm to define their offerings. The results will serve as a baseline towards building an understanding of generalizable process analytics that will serve two purposes: 1. Healthcare cost reductions. 2. Patient Suffering reductions. 17 18th Southern Association for Information Systems Conference • Hilton Head, SC, March 20th–21st , 2015 SAIS 2015 Abstracts Brown, D., Randolph, A. Employee Perceptions Of Information Security Program Non-Compliance Costs Information security has received increased attention and become significantly more important to organizational leadership and corporate boards for a wide range of reasons including the cost of security compromises, a potentially degraded public image, decreased customer trust, and consistent increases in the volume of proprietary information requiring protection. Human factors are increasingly recognized as critical to the protection of vital organizational information. As such, it is important to gain more insight into employees’ attitudes and perceptions toward organizational security programs, a critical component for safeguarding proprietary organizational information against loss or compromise system failures. This paper presents background literature on Deterrence Theory and links between information security awareness and training with information security program (ISP) compliance behavior. It offers a conceptual model and hypotheses as guidance for assessing employee perceptions of the cost of non-compliance with organizational ISPs. Campbell, M., Langhinrichsen-Rohling, J., Sweeney, B., Shropshire, J. A Safety Net For Social Networking: Development Of A Predictive Tool For Domestic Terrorism. There is a growing trend of disturbed individuals expressing their unhappiness with elements of government or society in general by committing violent acts. In a high number of these cases, the perpetrators gave clues through social networks as to what they planned to do beforehand. While technology can identify certain key words and phrases, it has not advanced to the point of being able to quickly discern between trivial and non-trivial threats. This paper describes ongoing research into developing a tool that can assist in the prediction of terroristic behavior using data from social networks combined with personal knowledge of the individual. Casper, D., Hollifield, S., Talmage C., Nylund, C., Kwak, M. Chasing The Truth: An Educational Game For Information Literacy And Student Engagement Games have been designed and developed not just for entertainment but also for various other purposes such as health and fitness, politics, marketing, and so on. In the paper, we present an educational game, Chasing the Truth, developed by a group of IT students and librarians at a college to teach information literacy to college level students. The game was designed to follow an interesting crime story that teaches basic plagiarism and citation concepts and the game story was implemented based on an interactive branching dialog system that can enforce learning by trial-and-error and student engagement. Choi, Y., Dennis, B., . Wireless Technologies For Customer Service Advancements In Troubleshooting And Customer Service In this paper we seek to examine the advancements in wireless technology and how it has affected the way businesses handle troubleshooting and customer service. Wireless medium have radically changed the way that people around the world communicate and interact, but troubleshooting efforts must also be adaptive to the new wireless processes. We will prove that providing excellent customer service will allow for a company to develop a reliable customer base that will greatly grow their business. Cole, D., McDaniel, B., Nelson, J. Benefits And Risks Of Big Data Big data is one of the most prevalent topics in information systems today. The purpose of this paper is to explore big data, its past uses, legal history, current and potential security risks, and potential future uses. This literature review primarily focuses on the benefits of big data as well as the risks associated with big data. The research provides a general overview of big data and some of the technologies related to big data. The authors conclude with suggestions for future research of big data. 18 18th Southern Association for Information Systems Conference • Hilton Head, SC, March 20th–21st , 2015 SAIS 2015 Abstracts Collier, R., Randolph, A. Wearable Technologies For Healthcare Innovation Healthcare is becoming more and more prone to technology. For this reason products are being developed geared toward implementing more sufficient ways of providing healthcare. Wearable technology has become one of the leading and considerably most valuable assets within the category. There are many types of wearable technology that do various tasks concerning health. Whether intended focus is on filling a void where human-error can be present or creation of a process where one was obsolete, wearable technology’s presence is felt within healthcare today. This exploratory study reviews wearable technologies that exist, are being used, as well as those that are developing or in the ideation phase concerning healthcare. We present a summary of wearable technologies used in healthcare and sample categorization to serve as a working framework for understanding the future direction of the field. Exemplar cases are provided. Downing, C. Privacy And The Information Age: A Longitudinal View As information systems and data storage capacity become increasingly sophisticated, an important ethical question for organizations is “What can/will/should be done with the personal information that has been and can be collected?” Individuals’ privacy is certainly important, but so is less costly and more targeted business processes. As this conflict intensifies, consumers, managers and policy makers are left wondering: What privacy principles are important to guide organizations in self-regulation? For example, do consumers view the five rights originally stated in the European Data Protection Directive as important? Comprehensive? Is there a product discount point where consumers would forsake these principles? This project explored these questions using a survey of student consumers, first in 2006 and again in 2014. Results show that the consumers believe that not only are the five rights enumerated in the European Data Protection Directive appropriate, but they are also comprehensive. Consumers also would require a steep product discount to forsake these rights. These views have not changed significantly over time. Esposito, M. End User Participation In Information Systems Development: Why Does Collaboration Remain Elusive? This research in progress proposes to look at end user participation (EUP) in the system development life cycle (SDLC) through the dual lenses of Representation Theory and shared affordances. It is known that EUP results in increased end user satisfaction of the information system (IS), yet using EUP during the SDLC remains uncommon. Should EUP occur throughout the SDLC and IS may be developed that converges on a faithful representation of the shared affordances required for all stakeholders, specifically the end user. Effective use is understudied, and this research further delineates between use and effective use. With a better understanding of the impediments to EUP during the SDLC it may be possible to develop antidotes to increase participation and hence success rate. Fowler, B., Walker, H., McDonald, D., Williams, J. Integrating NoSQL Into The Classroom With the increasing popularity of big data, more and more organizations are turning to NoSQL databases as their preferred system for handling the unique demands of capturing and storing massive amounts of data. The likelihood that employees in all sizes of organizations will encounter NoSQL databases is growing every year. College students need to be exposed to this technology and begin to have a functional understanding of how it works and how to use it. This paper offers a teaching case for college instructors to integrate NoSQL into their existing database courses. 19 18th Southern Association for Information Systems Conference • Hilton Head, SC, March 20th–21st , 2015 SAIS 2015 Abstracts Franks, S., Kwak, M. aMDFS: Automated Mobile Device Forensics System Using Python And Raspberry Pi Mobile device forensics is a subdivision of traditional digital forensics to recover digital evidence or data from a mobile device including smart phones and tablets. With a recent proliferation of smart phones, the demand of mobile device forensics is expected to be increased considerably. This paper explores currently available techniques and resources needed for mobile device forensics and presents a low cost automated mobile device forensics system developed by college students by using Python programming language and existing Raspberry Pi cluster system. Galluch, P. It’s All In Your Personality: Combatting Technostress In The Workplace Contemporary information and communication technologies like e-mail and instant messenger are pervasive in the workplace. Our “always-on” lifestyle has had a dramatic impact on business productivity and technology-induced stress, termed technostress. We know very little about how personality influences technostress or how perceptions of stress and objective strain differ from each other. In this study, we examine three personality characteristics: locus of control, self-efficacy, and negative and positive affect to see how they correlate with perceived stress, objective strain, and perceived performance. We found that stress and strain are not correlated and that they inversely correlate with performance. Secondly, we found that an internal locus of control positively influences objective strain. Finally, we found that negative effects are more likely to feel stress and have less confidence in their technology skills. The results provide insight into how personality differently affects stress and strain. Hill, G. User Generated Content In Social Media As A Source For Assessing Cultural Dimensions This research in progress intends to document the process of mining social media text-based content in order to acquire measures of cultural dimensions. This process can potentially be replicated and extended to other topics of inquiry so as to provide researchers with an alternative source for data acquisition related to measuring theoretical constructs. Additionally, we provide an argument supporting the credibility of user generated content (UGC) as a data source for rigorous inquiry. This article describes the mechanism for acquiring pertinent UGC as well as describing the method of assessing and quantifying the valence and magnitude of the various construct values. These measures are intended to be suitable for utilization across a variety of methods for statistical analysis requiring continuous or discrete factor measures. We conclude with a discussion of limitations and benefits and intend to present preliminary results during the conference. Iyer, Lakshmi. Visual Analytics: Tools And Teaching Resources For Business Analytics The purpose of this workshop is to introduce participants to visual analytics (VA), trends in VA, free technologies and resources available for academics VA in business analytics (BA) courses/programs. SAIS attendees interested in the analytics area will benefit from resources readily available to incorporate data visualization module(s) in their existing Business Intelligence/Big Data/Analytics courses. Faculty are faced with preparing students with state of the art technology skills in business analytics to meet industry demands but with limited budgets for adopting new technology in classrooms. In this workshop faculty will learn about free cutting-edge technology and readily available teaching resources prepared by fellow academics to use in their BA courses. Students attending the workshop will have access to all resources except solution to assignments (unless they are doctoral students teaching a BA course). 20 18th Southern Association for Information Systems Conference • Hilton Head, SC, March 20th–21st , 2015 SAIS 2015 Abstracts Jackson, A. The Role Of Judgment And Decision Making Regarding It Resource Utilization Towards Sustainable Competitive Advantage This paper is intended to propose a conceptual model that will help researchers and practitioners better understand the differences in judgment and decision making (JDM) styles of IT leadership and the top management team (TMT) within an organization. For purposes of this study, IT leadership is represented by the position of the Chief Information Officer (CIO) and TMT is represented by the executive management team (i.e. Chief Financial Officer (CFO)) that typically reports to the Chief Executive Officer (CEO). Upon understanding such differences in JDM styles, knowledge of such differences and related impacts in managing IS resource utilization and related IS resource capabilities for firm performance and sustainable competitive advantage can further contribute to the existing body of literature related to individual differences in JDM, IS strategic management, organizational firm performance, and sustainable competitive advantage. Jena, R., Srinivasan, S. It Architecture Flexibility As An Antecedent Of Absorptive Capacity: A Theoretical Perspective A firm’s ability to identify, assimilate, transform, and apply valuable external knowledge has been recognized as a key source of sustained competitive advantage. Prior literature refers to this dynamic capability as absorptive capacity of the firm. The absorptive capacity of the firm has been suggested as a key source of firm’s sustained competitive advantage. Even though prior literature has focused on various antecedents of absorptive capacity, IT architecture as a potential antecedent has been largely overlooked. This study theorizes about the role of IT architecture as a potential antecedent of a firm’s absorptive capacity. This study argues that three unique dimensions namely, open communication standards, cross-functional transparency, and modularity of IT architecture affects absorptive capacity by enabling the knowledge identification capability and knowledge assimilation/transformation capability. The key argument in this conceptual paper is that a firm’s design and architectural characteristics of the IT is a key source of strength that has implications on how firms explore, exploit and transform knowledge. By framing IT architecture as an antecedent of absorptive capacity, the study contributes to the largely overlooked area of the role of IT artifact in influencing a firm’s dynamic capabilities. Kamal, M., Panebianco, M. A Repository Of Cloud Services For Small And Micro Enterprises Cloud Computing offers an opportunity to support the growth and development of small and microenterprises by enabling low cost Information Technology solutions delivered over the Internet to be made available to them so that they may adopt with little effort or skill. Since the ability of small and microenterprises to adopt technology depends upon the unique conditions in which they find themselves, we hope to facilitate this by investigating and assessing the ways in which Cloud Computing functionality and processes may support the growth of small and microenterprises. In this study, we do this through the creation of an online knowledge repository of Cloud Computing applications and services with direct correlations to addressing specific business needs of small and microenterprises. This serves as a very valuable source of information for local community small and microenterprises looking to adopt low cost Information Technology solutions to address common business needs. Karim, S., Uddin Shaikh, U., Rajput, Q. Ontology-Based Personalized Dietary Recommendation For Travelers Tourism is fun that allows a person to know different cultural aspects of the world. In the tour plan, food searching according to nutritional value also plays an important role. However it is a challenging task to facilitate the tourists to be healthy and fit while traveling by selecting the food according to their requirement. This paper aims to develop an ontology based solution that will help the tourists / travelers to plan for a healthy food with personalized option of diet with food safety recommendation according to the region of interest. The proposed approach is tested on a sample data based on a traveler visiting Asian region. 21 18th Southern Association for Information Systems Conference • Hilton Head, SC, March 20th–21st , 2015 SAIS 2015 Abstracts Kreider, C., Kordzadeh, N. Request For Adminship (RFA) Within Wikipedia: How Do User Contributions Instill Community Trust? Research into user driven communities such as Wikipedia often focuses on community level characteristics, paying less attention to social processes performed within these communities. One important process is determining trust of community members. In Wikipedia, the access to specific tools requiring trust is determined through a community voting process known as request for adminship (RFA). In this study, we examine the impact of the contribution made by adminship candidates' on the community's overall decision as to whether to promote the candidate to administrator. To do so, we collected data on 754 RFA cases and used logistic regression to test four hypotheses. Our results supported the role of total contribution, and clarification of contribution in RFA success while the impacts of social contribution was partially supported and the role of content contribution was not supported. Also, both control variables (tenure and number of attempts) showed significant relationships with RFA success. LaValley, C., Umapathy, K., Conceptual Model Of Website Design Elements That Influences Credibility And Trustworthiness In today’s competitive environment, it is important for web designers to understand what design elements are essential for attracting visitors, making the visitor trust the website and perform intended actions like placing an order, and revisiting the site. Trustworthiness of a website heavily relies on a good first impression and visitor’s visual perception of the user interface. Therefore, the focus of this research is to investigate the effects of visual design elements on trustworthiness of a site. In this research-in-progress paper, we develop a conceptual model to depict the relationships among website design elements and trustworthiness. This conceptual model aids website designers understand what elements are appealing to the visual senses, and conjures credibility and trust. Li, L., Guo, R., Zheng, G. Discover And Promote Groupware For Effective Team Collaboration – A Comprehensive Study Be able to work in a team is an important skill for a college student. As a result, many professors design one or more team projects require students to work in groups. This is especially true for upper-level undergraduate courses and graduate-level courses. Groupware is an important tool assisting team members, especially those in virtual teams, to work effectively together. However, groupware wasn't widely adopted in team collaboration despite its promising benefit. In this paper, we propose a comprehensive study on how to groupware to promote effective team collaboration. The research plan includes identify the important features of a groupware, create an evaluation framework, assess available groupware on the market and make a recommendation, and finally empirically validate the effectiveness of the recommended groupware. The detailed research design is presented and the implication of the study is discussed. Liaqat, S., Bhatti, Z. An Empirical Investigation Of How To Increase User Engagement On Facebook Business Pages With the raging trend of networking on social networking sites such as Facebook, almost all businesses are trying to reach their consumers using the social networking site. One way of promoting a company's products and services is by increasing the number of its Facebook page followers. We have studied DeLone & McLean’s model of IS success and have adapted it to the scenario of social networking sites, focusing particularly on Facebook. We have taken into consideration the dimensions of information quality and service quality and have studied their impact on consumer engagement and brand advocacy i.e. word of mouth. The proposed model provides quality dimensions that are hypothesized to influence consumer behavior in terms of their engagement and opinion giving. Results show that dimensions of information quality and service quality are important factors in molding consumer behavior accordingly and they partially effect consumer engagement which leads to brand advocacy. 22 18th Southern Association for Information Systems Conference • Hilton Head, SC, March 20th–21st , 2015 SAIS 2015 Abstracts Lim, J. The Influence Of Information Quality On E-Channel Choice: Investigating Moderating Effects Of Product Types And Gender Online consumers face the uncertainty issue when they attempt to purchase products without personal experiencing them like touching, trying on, etc. With the rapid development of web technologies, a lot of experience attributes can now be substituted with online information incorporating tools like 3-D images, sound clip, and customization tools. We investigated if the online information accommodates personal evaluation of products the same way across different types of products and gender. To test this, as a base model we used the Lim et al.’s (2012) research model on the causal relationship between perceived information quality and its determinants. Using EQS 6.1, Structural equation modeling (SEM) and Lagrange Multiplier Test (LM Test) was run to test 309 sample data. The result shows that there is no effect of gender and product types on the causal relationships. Liu, M. They Are Not All Enemies: Detecting And Deterring Non-Malicious, Privileged It User Threat Using A Comprehensive Approach Different types of insider threats likely result from different motivations and intentions and involve different stakeholders. Thus, a “one size fits all” approach may not be effective for the mitigation of all types of insider threats. In this paper, we take one segment of insiders: the non-malicious, privileged IT users, specifically the IT professionals given “superuser” access. Our goal is to develop a collaborative, multi-disciplinary approach to detect and deter such security threats. We first review the IS Threat Vector Taxonomy where the focus is centered on different types of insider threat. We then take a closer look at non-malicious, privileged IT users and the reasons for noncompliance behavior. Finally, we develop a comprehensive strategy to detect and deter these insider threats. Locke, T., Colon, P., Kwak, M. MRS: An Autonomous And Remote-Controlled Robotics Platform For STEM Education It has been known that robotics can engage students in STEM fields by providing interactive, hands-on, crossdisciplinary learning experiences. This paper represents a multipurpose educational robotics platform designed and implemented by a group of IT students by combining various currently available robot technologies. Its main functions include differential drive, autonomous obstacle avoidance, torso and arms movement, real-time video streaming, and remote control. The robotics platform was developed to engage students at middle school, high school, and college levels in science, engineering, and computer programming. It will be experimented and further enhanced by students in robot programming course at a college. Miller, R., Melton, J., Jensen, B. Investigating A Method To Modify Student Social Media Behavior Empirically validated interventions designed to modify student social media behavior are lacking. The current study was undertaken to design and test the effectiveness of just such an intervention. Students, acting in the role of hiring managers, were asked to rank job candidates based on their resumes and social media profiles. The goal of the intervention was to get students to see how social media and posting behavior can negatively affect future employability. Through a better understanding of the relationship between social media and employability, it was hoped that students would modify their own posting behavior. Although the intervention was not found to be effective, the results of the quasi-experiment provide insights that can be used to develop and test future interventions. Of particular interest were the students’ diverse and sometimes surprising assumptions about social media usage and how it may be evaluated in a professional context. 23 18th Southern Association for Information Systems Conference • Hilton Head, SC, March 20th–21st , 2015 SAIS 2015 Abstracts Mitri, M. Pedagogical Opportunities Of Microsoft’s Adventure Works Business Case And Data Model Database management and querying skills are a key element of a robust information systems curriculum. The data structure and content of a useful pedagogically-oriented database should be realistic and lifelike, and the database should contain data that accurately depicts the business processes, functions, and entities of a realistic organization, organized in a way that demonstrates best practices in database design. Most database textbooks include some sample databases, but these are often relatively small and sparse of data. By contrast, Microsoft’s Adventure Works (AW) database presents a robust, realistic, and comprehensive framework for many important educational objectives in an Information Systems curriculum. This paper introduces the AW business case and database, and illustrates several pedagogical uses in an undergraduate CIS program. Murray, M. We Need To Have A Conversation On Bitcoin : Is It On A Path To Becoming The Ultimate Information System Two themes have encapsulated online commerce: trust in Internet-based monetary transactions and feasible micropayments. Bitcoin, a crypto-currency, described in a white paper in 2009, proposes to address both of these issues. Although surrounded in mystery as the developers of the white paper are anonymous and entering the online payment marketplace without fanfare, Bitcoin has successfully positioned itself as a potential game-changer in how digital assets are exchanged. To financiers, this represents disruption in conventional payment systems, to technologists, this opens a whole new world of possibilities. While still emerging, Bitcoin is on its way to becoming the ultimate information system and we in the IS community need to be engaged in the conversation. This workshop explores the advent of Bitcoin, its current state and its future potential. Naeem Khan, M., Bhatti, Z. Users’ Generated Content On Facebook: Make Or Break For Digital Reputation Of Firms Social Networking Sites have emerged as one of the best way of communication between firms and their customers. Marketers have capitalized on this opportunity to increase brands’ popularity and reputation; on the other hand, a complex network of customers belonging to different backgrounds has emerged. The raging trend of social networking sites usage has given users somewhat control over image and reputation of firms. Marketers’ efforts to boost their firms’ reputation have been managed by online users’ generated content. Due to this change, earned media has taken over the paid media of firms. Whereas, users’ generated content’s dependency over trust is not the same as in offline markets. This research illustrates that online user with low propensity to trust show different behavior than previously studied in offline environment. Further, firms can take lead from this sturdy to change their social network site’s marketing policies to emphasize on earned media. Ngo-Ye, T., Baxter, J. Faculty Informal Self-Learning And Ways To Engage Students Many junior Information Systems (IS) faculty members are facing the challenge of how to find time to learn and bring in fresh subject content to classroom teaching beyond textbooks, given the tight constraint of time consumed by multiple teaching preparations, research activities, and various service commitments. We propose the idea of faculty informal self-learning and then sharing the newly acquired knowledge with students in classroom discussions. We describe the initiative of collaborating with our college IT services department for this purpose. More specifically, we invite college IT services staff to give students a campus network tour and a talk on network administration in our telecommunication class, and speak on cloud service and disaster recovery in our MIS club meetings. We also intentionally engage in informal conversations with the IT services staff to learn new practical knowledge with the aim to share with students and thus motivate their desire to learn. 24 18th Southern Association for Information Systems Conference • Hilton Head, SC, March 20th–21st , 2015 SAIS 2015 Abstracts Ngo-Ye, T. Microsoft Visual Basic For Applications (VBA)/Macro The purpose of this workshop is to introduce IS faculties and students how to write program in Microsoft Visual Basic for Applications (VBA)/Macro. We plan to discuss basic concepts of VBA/Macro such as hierarchical Microsoft Office Object Model and the difference between Macro and VBA. Then we will work on several concrete examples, including "Hello World" VBA code, recording macro in Word and Excel and then editing the automatically generated VBA codes in VBA editor, and some more complex real-world applications. We will also point out resources for additional help on VBA programming, such as books, discussion forum, blogs, and Microsoft MSDN. To maximize the learning experience, we recommend workshop attendees to bring their Windows laptop (with Microsoft Office 2007/2010/2013) to work on VBA coding. Pendergast, M. Leveraging Learning Management System To Accommodate Students With Disabilities: Issues And Experiences With The Canvas LMS Creating an accessible learning environment in virtual and traditional courses supported by learning management system software (LMS) can be a daunting task. University courses and the policies created to support students with disabilities are subject to a multitude of laws. These include the Family Educational Rights and Privacy Act, Health Insurance Portability and Accountability Act, Americans with Disabilities Act, and sections 504 and 508 of the Rehabilitation Act of 1973. This paper will briefly detail the relevant laws, and then explain how features of the Canvas LMS can be used to meet satisfy these laws. Experiences and suggestions for improvement are also provided. Pérez, J., Murray, M. Workshop Connectivity And Continuity: New Fronts In The Platform Wars Smartphones and tablets are replacing notebooks and desktops as computing devices of choice in many homes and corporate environments. Interconnectedness among myriad devices has become a critical battleground for giants Apple, Microsoft and Google. In this workshop, we will distinguish between approaches to device connectivity and application continuity among the big three, give an overview and demonstration of current solutions and share projections for the future of connectivity. Workshop attendees will observe demonstrations of competing approaches to connectivity and continuity, have opportunities for hands-on participation and discuss potential research that explores social and business impacts of connectivity and continuity technologies. Phillips, B. Problematic Technology Use: The Impact Of Capital Enhancing Activity This research-in-progress paper gives a brief overview of the technology addiction literature, as well as an introduction to the capital enhancing activity construct from the sociology literature. Previous information systems literature has shown a variety of information technology (IT) artifacts that possibly lead to technology addiction. Hence, this research attempts to demonstrate that today’s ubiquitous technology allows actors to navigate a multitude of artifacts and that addiction stems from many artifacts. Furthermore, the notion of capital enhancing activity is presented to understand how actors use of technology, which they believe is essential to their social status, can, in fact, become problematic. A research model is offered, along with propositions and a proposed study, to determine how certain types of capital enhancing activities can explain variances in problematic technology use. 25 18th Southern Association for Information Systems Conference • Hilton Head, SC, March 20th–21st , 2015 SAIS 2015 Abstracts Quammen, R., Randolph, A. A Content Analysis On Intuition In Information Systems Research Factors influencing information systems (IS) success have been long researched with modest success in identification of the primary drivers of success. Acceptance of technology is an all-consuming concept in the IS field (Davis et al. 1989; DeLone et al. 1992; Zmud 1979) and as such definition of the dependent variable for IS success has dominated IS research. However, a recent study to understand the independent variables associated with IS success provides evidence that user characteristics such as attitude toward technology, self-efficacy, and technology experience are predictive IS Success measures that merit further empirical research (Petter et al. 2013). This paper extends the current research with a focus on the complex human characteristic of intuition. Exploration of the treatment of intuition in contemporary IS research potentially offers additional insight into the factors impacting IS success. Schell, G., Mathieu, R. Teaching The Systems Approach In The Information Systems Curriculum This paper contends that the systems approach should be the central theme in the information systems curriculum. At the beginning of the information systems discipline in business schools the systems approach was an integral part of the curriculum. As technology became more advanced, more widely available, and a more “sexy” topic the curriculum began to gravitate towards the technology used in information systems. The systems approach is a problem solving approach to supporting organizations. The key stakeholders of information systems programs have a need for the persistent theme of the systems approach throughout the curriculum. This paper will define the systems approach, provide a brief history of the systems approach in the curriculum, examine the IS 2010 Curriculum Guidelines (Topi, et al. 2010) for elements of the systems approach, and propose tactics/strategies to integrate the systems approach to current and future IS students. Shropshire, J., Campbell, M., Sweeney, B. Overcoming Privacy Challenges In Mobile-Cloud Computing The integration of mobile devices with cloud computing systems results in a platform which is well-suited for the aggregation of customer behavior. Many organizations are capitalizing on this opportunity to harvest user data. They offer free software, content, and services in order to observe customer behavior. However, users have grown wary of increasingly comprehensive and granular profiling. The public’s rejection of certain applications show there is growing resistance to this business practice. The present study overcomes these concerns by proposing four alternative privacy models. The viability of these privacy models is assessed using a broad public survey. The results suggest that organizations can alleviate consumers’ privacy concerns by incorporating elements of the proposed alternative privacy models into their businesses. Smith, J., Randolph, A. The Homogenization Of Standards Based Information Security Education: An Example Of Differentiation The development of standardized information security and assurance training in the United States may foster a homogenization in ISA training among post-secondary training and education outlets. This leaves open the question of how bachelor’s programs at universities should differentiate themselves from other post-secondary training and education programs and crate added value for students perusing bachelor’s degrees with ISA content. This article describes the Survey of Strategic Global Cybersecurity course that was developed in 2014 at REDACTED University. The goal of this course was to provide a broader level of global worldview macro level causes and effects as it related to cybersecurity issues than is presented in a standard information security and assurance course. In addition, we examine an early stage investigation into the trends that may be driving homogenization among technical colleges and universities ISA course offerings. 26 18th Southern Association for Information Systems Conference • Hilton Head, SC, March 20th–21st , 2015 SAIS 2015 Abstracts Thackston, R., Fortenberry, R. High Performance Computing: Considerations When Deciding To Rent Or Buy The commercial cloud computing (CCC) industry has reached a level of maturity to make it a truly viable alternative to the traditional, in-house data center. Although there are many notable examples of CCC platforms and technologies being piloted for high performance computing (HPC) tasks, it has yet to enter the mainstream. A variety of obstacles exist which have slowed or hindered adoption of CCC platforms, including implementation complexity, cost confusion, and security concerns. This paper describes the author’s experiences in using CCC for various HPC tasks and compares the results to the same tasks being executed on in-house computing resources. The breakpoint at which CCC becomes more costly than in-house equipment is identified. Lastly, a series of lessons learned are presented to assist researchers in effectively interacting with CCC vendors and platforms. Tian, X., Schwartz, S. The Use Of Analytical Platform To Identify Valuable Interventions In Retail Pharmacies As BI products and services increasing, the cost for collecting data and storing data is reclined. Enterprises could get the data source from customer transactions, website logs and product reviews. BI technology is used in many fields, such as in manufacturing for order shipment and customer support, in financial services for claims analysis and fraud detection, in transportation for fleet management, in retail for user profiling to target grocery coupons during checkout, in utilities for power usage analysis, and health care for outcomes analysis. The profession of pharmacy will be more reliant upon the information that can be extracted from data analytics and BI tools. There is a great opportunity in pharmacy to develop an analytical platform to suit both business needs in retail and the delivery of patient care in pharmacy. This paper proposes an analytical platform to identify valuable interventions in retail pharmacies. Wolf, J., Jia, R. The Role Of Grit In Predicting Student Performance In Introductory Programming Courses: An Exploratory Study This research examines the association between student grit and academic achievement in introductory computer programming courses. While several studies have established a link between grit and student success in classes with lower failure rates, this exploratory work is the first to investigate the relationship in courses with high failure rates. Our survey data show that grittier students earn higher grades in introductory programming courses than less gritty students, thus providing support for extending the student grit-performance relationship to high failure courses. Wu, Y., Wang, Y., Song, J., Byrd, T. The Impact Of Knowledge From Learning-About Electronic Health Records On It Innovation Adoption: The Moderating Role Of Absorptive Capacity Learning-by-doing is a crucial process to successful IT adoption. Yet, this type of organizational learning process is necessary but not sufficient to the adoption success. Learning-about, the pre-adoption learning activity, plays an equally important role in an organization’s IT adoption. In healthcare industry, hospitals are not always able to utilize healthcare information technologies (HITs), such as electronic healthcare records (EHRs), to generate high quality information for decision making. Having pre-adoption knowledge and the capacity to absorb the knowledge is likely to better the adoption results. This research proposes a conceptual model to explain the importance of the knowledge from learning-about EHR technology and explore the role absorptive capacity plays in EHR pre-adoption. This study contributes to the existing EHR literature by (1) adding pre-adoption knowledge into the ingredients of successful adoption, and (2) discussing the moderating effect of absorptive capacity to the relationship between pre-adoption knowledge and outcomes of adoption. 27 18th Southern Association for Information Systems Conference • Hilton Head, SC, March 20th–21st , 2015 SAIS 2015 Abstracts Yerby, J., Floyd, K. Advanced Cyber-forensics Education Consortium: Panel The panel will discuss the work of the National Science Foundation ACE Consortium and how the initiative is helping to build awareness and the workforce pipeline for cyber forensics that will be needed in the next 5-10 years. In addition to Daytona State and Middle Georgia State College other schools include South Piedmont Community College, and Trident Technical College. The panel will discuss how schools at the collegiate, community college, technical, and K-12 levels can get involve and benefit from participation in the ACE Consortium. Zhang, C., Li, L., Zheng, G. Developing Business Intelligence Competency In Health It: Perspectives From Health It Professionals Business intelligence (BI) is a set of methods and technologies that can provide analytical power to help the healthcare industry to tackle the challenges brought by ever-growing and complex health data. To develop a successful Health Information Technology (HIT) or Health Informatics (HI) curriculum with the component of BI or health data analytics, it is critical to first identify the sets of important skills that a HIT student should possess upon graduation, especially from HIT professionals’ perspective. In this paper, we reported findings from a pilot study in which we surveyed a group of HIT practitioners. The implications of the pilot study are discussed. 28 18th Southern Association for Information Systems Conference • Hilton Head, SC, March 20th–21st , 2015