JISAR

Journal of Information Systems Applied Research

Volume 15 - 2022

Table of Contents

Volume 15, Issue No. 2 (July, 2022)

Page 4 Examining Cloud Data Security Vulnerabilities During Usage
Daniel Amoah, Microsoft Corporation
Samuel Sambasivam, Woodbury University

Page 17 Cybersecurity Maturity Model Certification Initial Impact on the Defense Industrial Base
Hala Strohmier, University of North Carolina Wilmington
Geoff Stoker, University of North Carolina Wilmington
Manoj Vanajakumari, University of North Carolina Wilmington
Ulku Clark, University of North Carolina Wilmington
Jeff Cummings, University of North Carolina Wilmington
Minoo Modaresnezhad, University of North Carolina Wilmington

Page 30 The COVID-19 Pandemic’s Impact on Information Technology Employment, Salaries, and Career Opportunities
Patricia Sendall, Merrimack College
Alan Peslak, Penn State University
Wendy Ceccucci, Quinnipiac University
D. Scott Hunsinger, Appalachian State University

Page 39 A Comparison of Internationalization and Localization Solutions for Web and Mobile Applications
Peng Wang, Pinterest, Inc.
Hee Jung Sion Yoon, City University of Seattle
Sam Chung, City University of Seattle

Page 47 GIS for Democracy: Toward A Solution Against Gerrymandering
Peter Y. Wu, Robert Morris University
Diane A. Igoche, Robert Morris University


Page 54 Determinants of Health Professionals’ Intention to Adopt Electronic Health Record Systems
Jie Du, Grand Valley State University
Jenna Sturgill, Grand Valley State University



Volume 15, Issue No. 1 (March, 2022)

Page 4 Security Control Techniques: Cybersecurity & Medical Wearable Devices
Jeff Deal, N6Networks
Samuel Sambasivam, Woodbury University

Page 11 The Effect of Review Valence on Purchase of Time-Constrained and Discounted Goods
Prathamesh Muzumdar, University of South Florida

Page 24 Harvesting Intrinsically Verifiable Trust: Building a Honey Traceability System for Sustainable Development
Max A. S. Rünzel, Appalachian State University
Edgar Hassler, Appalachian State University
Brandy Hadley, Appalachian State University
Aaron Ratcliffe, Appalachian State University
James T. Wilkes, Appalachian State University
Joseph A. Cazier, Appalachian State University

Page 35 Combating Private Blockchain Fraud: A Virtual Reality & Artificial Intelligence Model
Ehi E. Aimiuwu, Campbellsville University