[AISWorld] Journal of Information Systems Applied Research - Vol. 4 Issue 1 - Abstracts

Scott Hunsinger hunsingerds at appstate.edu
Wed Apr 27 16:17:22 EDT 2011


Abstracts from the latest issue of the Journal of Information Systems
Applied Research (JISAR)
http://jisar.org/  = Volume #4, Issue #1 

Editor: Scott Hunsinger, Appalachian State University, USA
Publisher: Tom Janicki, University of North Carolina at Wilmington, USA
In this issue:
4 A Process for Assessing Voting System Risk Using Threat Trees
<http://jisar.org/2011-4/N1/JISARv4n1p4.html> 
Alec Yasinsac, University of South Alabama
Harold Pardue, University of South Alabama

Abstract: Security continues to be a critical issue in the safe operation of
electronic voting machines. Risk assessment is the process of determining if
a particular voting system is at risk and what steps can be taken to
mitigate the risk. We propose an iterative risk assessment process using
threat trees. This process involves using a voting system risk taxonomy to
categorize a threat, a schema to express logical hypothesis about a threat,
generating a threat tree through functional decomposition, expressing threat
instance semantics as nodal properties with metrics, validating the threat
instance through independent representations, and finally pruning the tree
for enhanced usability and understandability. This process provides guidance
to an analyst in using threat trees to conduct risk assessment of electronic
voting systems. Because this process is based on abstract and extendable
structures, it facilitates the comparison and validation of independent risk
evaluations. Prospective voting system risk assessment metrics are provided.

17 Development of an Evaluation Model for XBRL-enabled Tools Intended for
Investors <http://jisar.org/2011-4/N1/JISARv4n1p17.html> 
Barbara Clements, Southeast Missouri State University
Dana Schwieger, Southeast Missouri State University
Ken Surendran, Southeast Missouri State University

Abstract: As the first decade of the new millennium draws to a close,
individual investors will find that a new era in financial analysis is
beginning. The United States Securities and Exchange Commission (SEC) now
requires corporations to use eXtensible Business Reporting Language (XBRL)
when submitting their disclosure filings. XBRL has been developed by an
international nonprofit consortium to meet corporate reporting needs. XBRL
documents will be made available to the public as soon as they are filed.
XBRL-enabled financial analysis tools will enable investors to perform their
financial analysis more quickly and accurately. It is now time to consider
the needs of financial information stakeholders who will use the information
contained in XBRL instance documents. The SEC is encouraging software
developers to create XBRL-enabled tools to meet the needs of individual
investors and other financial information stakeholders. This paper proposes
an evaluation model for reviewing XBRL-enabled financial analysis tools to
be used by individual investors. Four freely available XBRL viewers were
examined using the evaluation model. The SEC's currently available tool was
evaluated in detail to better demonstrate the use of the model. To place
this evaluation model in its proper context, this paper examines what XBRL
is and how it will contribute to financial analysis. The SEC's XBRL tool is
then evaluated in detail in light of the model and suggestions are made for
how future tools can be developed to fill the needs of individual investors.

30 Factors Influencing People to Use Linux
 <http://jisar.org/2011-4/N1/JISARv4n1p30.html> D. Scott Hunsinger,
Appalachian State University
Susanna Fransen, Appalachian State University

Abstract: Linux is a free open source operating system that serves as a
viable alternative to using Windows and other operating systems. Significant
research has been conducted concerning Linux and why it is a reliable
operating system. Yet, the question remains: Why aren't more people using
Linux operating systems? To explore this question we researched two
theories: the Theory of Planned Behavior and the Technology Acceptance
Model, to better understand what factors influence a person's usage of Linux
on a desktop or laptop computer. We used these theories to guide our
research and limited the scope of our study to college students since they
are readily available and will be entering the workforce within the next
several years. To determine what factors influence people whether to use a
Linux operating system, we conducted interviews (n=15) and a survey (n=168).
We discovered that two constructs from the Theory of Planned Behavior
(Attitude and Perceived Behavioral Control) and two constructs from the
Technology Acceptance Model (Perceived Ease of Use and Perceived Usefulness)
are significantly correlated with a person's intention to use a Linux
operating system, while the Subjective Norm construct holds less importance.

39 How Mobile Technology is Changing Our Culture
 <http://jisar.org/2011-4/N1/JISARv4n1p39.html> Jamie Pinchot, Robert Morris
University
Karen Paullet, Robert Morris University
Daniel Rota, Robert Morris University

Abstract: Cell phones have become ubiquitous within our society, and many
would now consider them a necessity rather than a convenience. This
widespread use of cell phones and other mobile communication devices has
brought with it an increasing acceptance of their use in virtually all
social situations. It is no longer taboo to be caught with a ringing cell
phone at a dinner with family and friends, at a sporting event, or even
during a church service. Incoming calls are no longer seen as interruptions
of the primary activity taking place, but are instead treated as equally
important communications. Proximity is becoming inconsequential in terms of
social interaction. This study seeks to determine how mobile technology has
changed our culture and identifies the ways in which we now perceive
socially acceptable communication.

49 Creating a Framework for Research on Virtual Organizations
 <http://jisar.org/2011-4/N1/JISARv4n1p49.html> Bryan Reinicke, University
of North Carolina Wilmington

Abstract: In recent years the concept of the virtual organization (VO) has
received a great deal of attention in both the business press and academia.
While a fair amount of research has focused on the virtual organization,
very little agreement exists on how to define it, or even approach it as a
concept or an organizational form. This makes it difficult to build a
coherent research stream in virtual organizations, as there is no good way
to link the research that has been done. In fact, it is impossible to relate
or compare the research that has been done under various definitions of the
VO without a common framework to relate them to one another. The purpose of
this paper is not to develop another definition of the virtual organization,
but rather to provide a definitional framework for the virtual organization
which can assist researchers in relating the work done on VO's using various
definitions.

57 The Potential Reality of Service-Oriented Architecture (SOA) in a Cloud
Computing Strategy <http://jisar.org/2011-4/N1/JISARv4n1p57.html> 
James P. Lawler, Pace University
Anthony Joseph, Pace University 

Abstract: The constraints of the current economy continue to affect business
firms investing in information systems. This paper analyzes the extent of
implemented initiatives in Service-Oriented Architecture (SOA) that may be
impacted by limited investment in technology. Derived from an earlier study
of SOA published in 2008, the findings from a literature survey and a case
study in the current paper disclose that few firms identified in the earlier
study have advanced noticeably to enterprise integrated and matured
processes enabled by SOA, though the bulk of the firms continue investment
in projects of SOA. The implications however indicate that continued
investment in the projects may facilitate a foundation for initiatives in
cloud computing. This paper might benefit educators considering expansion of
SOA in curricula of information systems, and it may help practitioners
considering increased investment in SOA as a potential strategy to be
positioned to take advantage of cloud computing.

-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.aisnet.org/pipermail/aisworld_lists.aisnet.org/attachments/20110427/0ba904d4/attachment.html>


More information about the AISWorld mailing list