


default search action
CPR 2015: Newport Beach, CA, USA
- Diana L. Burley, Indira R. Guzman, Daniel P. Manson, Leigh Ellen Potter:

Proceedings of the 2015 ACM SIGMIS Conference on Computers and People Research, Newport Beach, CA, USA, June 4-6, 2015. ACM 2015, ISBN 978-1-4503-3557-7
Doctoral Symposium
- Joseph Taylor

:
Crowdsourcing IT Work: A Three-Fold Perspective from the Workers, Buyers, and Platform Providers. 1-2 - Hadi Karimikia, Harminder Singh

, Karin Olesen:
The Impact of Positive Informal Behaviors on the Effectiveness of Information Systems Departments. 3-4 - Glourise M. Haya:

Complexity Reduction in Information Security Risk Assessment. 5-6 - John R. Magrane Jr.:

Personal Information Sharing with Major User Concerns in the Online B2C Market: A Social Contract Theory Perspective. 7-8 - Kayla M. Booth

:
Youth, Information Quality, and Fitness Information within Social Media: A Brief Look at a Dissertation in Progress. 9-10 - Jose O. Angeles:

Conceptualizing a Business Process Knowledge Construct. 11-12
Focus Group
- Diana L. Burley, Barbara Endicott-Popovsky:

Focus Group: Developing a Resilient, Agile Cybersecurity Educational System (RACES). 13-14
Industry Panel 1
- Indira R. Guzman

, Thomas Hilton, Miguel (Mike) O. Villegas, Michelle L. Kaarst-Brown, Jason James, Ashraf Shirani, Shuyuan Mary Ho, Diane Lending:
Panel: Cybersecurity Workforce Development. 15-17
Industry Panel 2
- Jonathan Chow, Eric Crutchlow, Justin Cain:

Industry Cybersecurity Workforce Development. 19
Keynote Address
- Mark G. Graff:

Key Traits of Successful Cyber Security Practitioners. 21
Session 1: Gaming and Competion
- Christopher Herr, Dennis Allen:

Video Games as a Training Tool to Prepare the Next Generation of Cyber Warriors. 23-29 - David H. Tobey:

A Vignette-based Method for Improving Cybersecurity Talent Management through Cyber Defense Competition Design. 31-39
Session 2: Digital Inequality
- Kadeem Fuller, Lynette Kvasny

, Eileen M. Trauth, K. D. Joshi:
Understanding Career Choice of African American Men Majoring in Information Technology. 41-48 - Jason M. Pittman

:
Does Competitor Grade Level Influence Perception of Cybersecurity Competition Design Gender Inclusiveness? 49-54
Session 3: Cyber Security Skills
- Jordan Shropshire, Art Gowan:

Characterizing the Traits of Top-Performing Security Personnel. 55-59 - Antoine Lemay, Sylvain P. Leblanc

, Tiago de Jesus:
Lessons from the Strategic Corporal: Implications of Cyber Incident Response. 61-66 - Leigh Ellen Potter

, Gregory Vickers:
What Skills do you Need to Work in Cyber Security?: A Look at the Australian Market. 67-72
Session 4: Team Issues
- Masoud Hayeri Khyavi, Mina Rahimi:

The Missing Circle of ISMS (LL-ISMS). 73-77 - Mohammad Mohammad:

IT Surveillance and Social Implications in the Workplace. 79-85 - Rajendra K. Bandi, Anik Kumar Bose, Ashay Saxena:

Exploring Green IT Awareness and Adoption among Indian Students. 87-96
IT Security Management Panel
- Conrad Shayo, Javier Torner, Frank Lin, Jake Zhu, Joon Son:

Is Managing IT Security a Mirage? 97-98
Cyber Security Competition Panel
- David H. Tobey, Portia Pusey

, Josh Chin:
Cybersecurity Competitions in Education: Engaging Learners through Improved Game Balance. 99-100
Session 5: Posters
- Shuyuan Mary Ho, Hengyi Fu, Shashanka Surya Timmarajus, Cheryl Booth, Jung Hoon Baeg, Muye Liu:

Insider Threat: Language-action Cues in Group Dynamics. 101-104 - Rinku Sen, Manojit Chattopadhyay, Nilanjan Sen:

An Efficient Approach to Develop an Intrusion Detection System Based on Multi Layer Backpropagation Neural Network Algorithm: IDS using BPNN Algorithm. 105-108 - Daniel Manson, Portia Pusey

, Mark J. Hufe, James Jones, Daniel M. Likarish, Jason M. Pittman
, David H. Tobey:
The Cybersecurity Competition Federation. 109-112 - Tina Francis, Muthiya Madiajagan, Vijay Kumar:

Privacy Issues and Techniques in E-Health Systems. 113-115
Session 6: Occupational Stress
- Tenace Kwaku Setor, Damien Joseph

, Shirish C. Srivastava:
Professional Obsolescence in IT: The Relationships between the Threat of Professional Obsolescence, Coping and Psychological Strain. 117-122 - Christoph Weinert

, Christian Maier, Sven Laumer, Tim Weitzel:
Extending Moore's Exhaustion Model: Including Further Dimensions of Burnout and Investigating Their Influence on Turnover Intention Among IT Professionals. 123-131
Future IT Professionals
- Leigh Ellen Potter

, Diane Lending, Michelle L. Kaarst-Brown:
Panel: Preparing the Next Generation of Computer Personnel. 133-134
Session 7: Security Judgement
- Santos M. Galvez, Joshua D. Shackman, Indira R. Guzman

, Shuyuan Mary Ho:
Factors Affecting Individual Information Security Practices. 135-144 - Michelle L. Kaarst-Brown, E. Dale Thompson:

Cracks in the Security Foundation: Employee Judgments about Information Sensitivity. 145-151
Session 8: Theoretical Issues
- Christian Sillaber, Ruth Breu:

Using Stakeholder Knowledge for Data Quality Assessment in IS Security Risk Management Processes. 153-159 - Nishtha Kesswani, Sanjay Kumar:

Maintaining Cyber Security: Implications, Cost and Returns. 161-164

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














