JISAR

Journal of Information Systems Applied Research

Volume 12 - 2019

Table of Contents

Volume 12, Issue No. 3 (December 2019)

Page 4 Where We are with Enterprise Architecture
Leila Halawi, Embry Riddle Aeronautical University
Richard McCarthy, Quinnipiac University
James Farah, Jacksonville University

Page 14 Dangers of Distracted Driving by Mobile Phone Users: An Experimental Approach
Hoon S. Choi, Appalachian State University
Jason Xiong, Appalachian State University
B. Dawn Medlin, Appalachian State University

Page 24 Changes in the Information Technology Field: A Survey of Current Technologies and Future Importance
Jeffrey Cummings, University of North Carolina Wilmington
Thomas Janicki, University of North Carolina Wilmington



Volume 12, Issue No. 2 (August 2019)

Page 4 A Machine Learning Approach to Optimizing Diabetes Healthcare Management Using SAS Analytic Suite
Taiwo Ajani, Ferrum College
George S. Habek, North Carolina State University

Page 18 Aligning the Factors of Skill, Technology and Task to Influence the Continued Use of Mobile Payment Users in China
Charlie Chen, Appalachian State University
Hoon Seok Choi, Appalachian State University
Jason (Jie) Xiong, Appalachian State University
Yong Tang, University of Electronic Science and Technology

Page 30 Security, Privacy, and Legislation Issues related to Commercial Drone Deliveries
Sandra A. Vannoy, Appalachian State University
Dawn Medlin, Appalachian State University

Page 37 Effects of Normalization Techniques on Logistic Regression in Data Science
Adekunle Adeyemo
Hayden Wimmer, Georgia State University
Loreen Powell, Bloomsburg University



Volume 1, Issue No. 1 (April 2019)

Page 4 Drone Delivery Services: An Evaluation of Personal Innovativeness, Opinion Passing and Key Information Technology Adoption Factors
Charlie Chen, Appalachian State University
Hoon S. Choi, Appalachian State University
Danuvasin Charoen, National Institute of Development Administration

Page 17 The use of Snap Length in Lossy Network Traffic Compression for Network Intrusion Detection Applications
Sidney C. Smith, U.S. Army Research Laboratory
Robert J. Hammell II, Towson University

Page 26 Adversarial Machine Learning for Cyber Security
Michael J. De Lucia, U.S. Army Research Laboratory, University of Delaware
Chase Cotton, University of Delaware

Page 36 Standardizing Public Utility Data: A Case Study of a Rural Mid-Size Utility
Edgar Hassler, Appalachian State University
Joseph Cazier, Appalachian State University
Jamie Russell, Appalachian State University
Thomas Mueller, Appalachian State University
Daniel Paprocki, Appalachian State University