default search action
CPR 2015: Newport Beach, CA, USA
- Diana L. Burley, Indira R. Guzman, Daniel P. Manson, Leigh Ellen Potter:
Proceedings of the 2015 ACM SIGMIS Conference on Computers and People Research, Newport Beach, CA, USA, June 4-6, 2015. ACM 2015, ISBN 978-1-4503-3557-7
Doctoral Symposium
- Joseph Taylor:
Crowdsourcing IT Work: A Three-Fold Perspective from the Workers, Buyers, and Platform Providers. 1-2 - Hadi Karimikia, Harminder Singh, Karin Olesen:
The Impact of Positive Informal Behaviors on the Effectiveness of Information Systems Departments. 3-4 - Glourise M. Haya:
Complexity Reduction in Information Security Risk Assessment. 5-6 - John R. Magrane Jr.:
Personal Information Sharing with Major User Concerns in the Online B2C Market: A Social Contract Theory Perspective. 7-8 - Kayla M. Booth:
Youth, Information Quality, and Fitness Information within Social Media: A Brief Look at a Dissertation in Progress. 9-10 - Jose O. Angeles:
Conceptualizing a Business Process Knowledge Construct. 11-12
Focus Group
- Diana L. Burley, Barbara Endicott-Popovsky:
Focus Group: Developing a Resilient, Agile Cybersecurity Educational System (RACES). 13-14
Industry Panel 1
- Indira R. Guzman, Thomas Hilton, Miguel (Mike) O. Villegas, Michelle L. Kaarst-Brown, Jason James, Ashraf Shirani, Shuyuan Mary Ho, Diane Lending:
Panel: Cybersecurity Workforce Development. 15-17
Industry Panel 2
- Jonathan Chow, Eric Crutchlow, Justin Cain:
Industry Cybersecurity Workforce Development. 19
Keynote Address
- Mark G. Graff:
Key Traits of Successful Cyber Security Practitioners. 21
Session 1: Gaming and Competion
- Christopher Herr, Dennis Allen:
Video Games as a Training Tool to Prepare the Next Generation of Cyber Warriors. 23-29 - David H. Tobey:
A Vignette-based Method for Improving Cybersecurity Talent Management through Cyber Defense Competition Design. 31-39
Session 2: Digital Inequality
- Kadeem Fuller, Lynette Kvasny, Eileen M. Trauth, K. D. Joshi:
Understanding Career Choice of African American Men Majoring in Information Technology. 41-48 - Jason M. Pittman:
Does Competitor Grade Level Influence Perception of Cybersecurity Competition Design Gender Inclusiveness? 49-54
Session 3: Cyber Security Skills
- Jordan Shropshire, Art Gowan:
Characterizing the Traits of Top-Performing Security Personnel. 55-59 - Antoine Lemay, Sylvain P. Leblanc, Tiago de Jesus:
Lessons from the Strategic Corporal: Implications of Cyber Incident Response. 61-66 - Leigh Ellen Potter, Gregory Vickers:
What Skills do you Need to Work in Cyber Security?: A Look at the Australian Market. 67-72
Session 4: Team Issues
- Masoud Hayeri Khyavi, Mina Rahimi:
The Missing Circle of ISMS (LL-ISMS). 73-77 - Mohammad Mohammad:
IT Surveillance and Social Implications in the Workplace. 79-85 - Rajendra K. Bandi, Anik Kumar Bose, Ashay Saxena:
Exploring Green IT Awareness and Adoption among Indian Students. 87-96
IT Security Management Panel
- Conrad Shayo, Javier Torner, Frank Lin, Jake Zhu, Joon Son:
Is Managing IT Security a Mirage? 97-98
Cyber Security Competition Panel
- David H. Tobey, Portia Pusey, Josh Chin:
Cybersecurity Competitions in Education: Engaging Learners through Improved Game Balance. 99-100
Session 5: Posters
- Shuyuan Mary Ho, Hengyi Fu, Shashanka Surya Timmarajus, Cheryl Booth, Jung Hoon Baeg, Muye Liu:
Insider Threat: Language-action Cues in Group Dynamics. 101-104 - Rinku Sen, Manojit Chattopadhyay, Nilanjan Sen:
An Efficient Approach to Develop an Intrusion Detection System Based on Multi Layer Backpropagation Neural Network Algorithm: IDS using BPNN Algorithm. 105-108 - Daniel Manson, Portia Pusey, Mark J. Hufe, James Jones, Daniel M. Likarish, Jason M. Pittman, David H. Tobey:
The Cybersecurity Competition Federation. 109-112 - Tina Francis, Muthiya Madiajagan, Vijay Kumar:
Privacy Issues and Techniques in E-Health Systems. 113-115
Session 6: Occupational Stress
- Tenace Kwaku Setor, Damien Joseph, Shirish C. Srivastava:
Professional Obsolescence in IT: The Relationships between the Threat of Professional Obsolescence, Coping and Psychological Strain. 117-122 - Christoph Weinert, Christian Maier, Sven Laumer, Tim Weitzel:
Extending Moore's Exhaustion Model: Including Further Dimensions of Burnout and Investigating Their Influence on Turnover Intention Among IT Professionals. 123-131
Future IT Professionals
- Leigh Ellen Potter, Diane Lending, Michelle L. Kaarst-Brown:
Panel: Preparing the Next Generation of Computer Personnel. 133-134
Session 7: Security Judgement
- Santos M. Galvez, Joshua D. Shackman, Indira R. Guzman, Shuyuan Mary Ho:
Factors Affecting Individual Information Security Practices. 135-144 - Michelle L. Kaarst-Brown, E. Dale Thompson:
Cracks in the Security Foundation: Employee Judgments about Information Sensitivity. 145-151
Session 8: Theoretical Issues
- Christian Sillaber, Ruth Breu:
Using Stakeholder Knowledge for Data Quality Assessment in IS Security Risk Management Processes. 153-159 - Nishtha Kesswani, Sanjay Kumar:
Maintaining Cyber Security: Implications, Cost and Returns. 161-164
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.