Dr. Jordan Shropshire, PhD



Similar documents
Mark D. Ellard, MBA, CPA. Profile. Education

SANJEEV KUMAR. Technology & Operations, Ross School of Business University of Michigan, Ann Arbor MI sankum@umich.

Lucian Zelazny Assistant Professor Department of Accounting University of Dayton Cell:

Yong Lu, Ph.D. Phone: (570)

VITA EDUCATION. Concentration: Business Education and Office Management Memphis State University, Memphis, TN, 1986 EXPERIENCE

G. Bradley Bennett, CPA, Ph.D.

Dr. Joseph H. Schuessler Tarleton State University Computer Information Systems (254)

SANTOSH S. VENKATRAMAN

CURRICULUM VITAE OF NANCY L. MARTIN, PH.D. I. PROFESSIONAL AFFILIATION AND CONTACT INFORMATION

XIAOBAI (BOB) LI ACADEMIC EXPERIENCE RESEARCH HIGHLIGHTS TEACHING HIGHLIGHTS

Juris Doctorate (JD), Cumberland School of Law, Samford University, Birmingham, AL. (1983)

Xinlin Tang EDUCATION

Cyndi H. Gaudet, Ph.D Episcopal School Road Long Beach MS Voice

Grover S. Kearns, Ph.D., CPA, CFE, CITP

Debra L. Chapman, Ph.D.

Koffi Dodor, Ph.D., CPA College of Business Southern University Baton Rouge, LA

Curriculum Vitae. Continuing Education Offered Through APA and AERA

Certifications Certified Public Accountant, South Carolina INTELLECTUAL CONTRIBUTIONS: Refereed Articles

Jerry Cha-Jan Chang, Ph.D.

CURRICULUM VITA. Richard E. Biehl, Ph.D Whitfield Lane Orlando, Florida, USA

Maria B. Gondo, Ph.D.

VITA. DATE OF FIRST APPOINTMENT: August 2007 (Jackson State University)

Matthew C. Matusiak Department of Criminal Justice, College of Health and Public Affairs, University of Central Florida

VITA. Ph.D. in Business Administration. University of Arizona, Tucson, Arizona, August Major: Accounting, Minor: Judgment and Decision Making.

AUGUST 2015 DATA SHEET OF. Donald E. English

JULIA SEGARS CHIBBARO, Ph.D.LPC

How To Teach Criminology And Criminal Justice

CURRICULUM VITAE. T. Aaron Wachhaus 122 West High Street Elizabethtown, Pennsylvania

Ganesh Bhatt, D.B.A. Associate Professor Information Science & Systems School of Business and Management ganesh.bhatt@morgan.edu

Karen L. Corral Boise State University (208)

JINGQUAN LI, PH.D. Education

Sherrie Drye Cannoy Associate Professor Department of Business Education North Carolina A&T State University

Gregory J. Gerard. M.B.A. Management Information Systems, 1991 University of Pittsburgh, Pittsburgh, PA

Assistant Professor of Management

Kevin L. James, PhD, CPA 1601 East Market Street 224 Merrick Hall Greensboro, NC

SURENDRA SARNIKAR. 820 N Washington Ave, EH7 sarnikar@acm.org Madison, SD Phone:

CURRICULUM VITAE. Jennifer Cruze

Ann Gamble Backof. Certified Public Accountant, State of New York, December 2005

Cheryl Aasheim Georgia Southern University Department of Information Technology (912)

PROFESSIONAL PREPARATION PROFESSIONAL INTERESTS EMPLOYMENT

TAMMY L. RAPP 7801 Angel Ridge Rd. Athens, OH (330)

Marsha B. Keune June 2015

Matthew C. Matusiak Department of Criminal Justice, College of Health and Public Affairs, University of Central Florida

JEFF SHOCKLEY. Department of Supply Chain & Information Management,

University of Louisiana at Lafayette College of Education Faculty Curriculum Vitae Information

MBA College of Business, Korea University, South Korea, 1993 Major: Quantitative Analysis and Operations Management

Roger N. Silvers, CMA

CURRICULUM VITAE. Li Chen

J. RICHELLE JOE, PHD, NCC Curriculum Vitae

FACULTY VITA. Warren G. Ortloff, Ed.D. July 2014

Community Cyber Security. Center for Infrastructure Assurance and Security

SANDIP C. PATEL. (Fulbright Scholar and US citizen)

5/03/2014. EDUCATION 2005 Ph.D. in Computers and Information Systems

Kristen L. B. Moran, PhD, LPC Assistant Professor

Curriculum Vitae JOON-YEOUL OH

GAIL SEARS HUMISTON, Ph.D.

Dr. Lodovico Marziale Managing Partner 504ENSICS, LLC

SUMMARY OF RESEARCH AND INSTRUCTIONAL INTERESTS

CURRICULUM VITA. Mark Alan Davis, Ph.D. Ph.D Virginia Polytechnic Institute and State University, 1984 Industrial and Organizational Psychology

Current Position. Aug to present: University of New Hampshire Associate Professor (tenured) Teaching areas: Auditing and Advanced Auditing

CURRICULUM VITAE. SAMUEL TAWIAH YAW OPOKU MD, PhD. Education

Sara-Beth Plummer, MSW, PhD

ACADEMIC WORK EXPERIENCE

I. Academic Qualifications. Sam M. Walton College of Business, University of Arkansas 2010 Major: Information Systems

LEONARD BRIGHT, PH.D.

Curriculum Vitae. Education

RUI SUN, Ph.D. RESEARCH INTERESTS: Fiscal Federalism State and Local Government Finance Nonprofit finance Economic Development

Jeffrey D. Wall Curriculum Vitae

Dr. Patrick J. Larkin 1200 Murchison Rd. Fayetteville, NC (910)

FANG (Helga) HE, Ph.D. Candidate

Attended Conference, "Course Technology Conference," Cengage Publishing, San Antonio, Texas. (March 7, March 9, 2012).

RESEARCH INTERESTS TEACHING INTERESTS EDUCATION

How To Write A Book

John R. Drake, Ph.D. Assistant Professor Management Information Systems College of Business East Carolina University

WEI CHEN. IT-enabled Innovation, Online Community, Open-Source Software, Startup Angel Funding, Interactive Marketing, SaaS Model

Curriculum Vitae Cassandra A. Atkin-Plunk, Ph.D.

YONGSEOK JANG 133J Bryan Hall PO Box Gainesville, FL (352) June 2015

RUI SUN, Ph.D. College of Business Administration and Public Policy California State University, Dominguez Hills

MADISON NGAFEESON, Ph.D.

2014 Assistant Professor, School of Criminal Justice, University of Southern Mississippi

C. JEANNE HILL Professor of Marketing Prairie View A&M University

Introduction to Information Security Management

R. Todd Stephens, Ph.D. Curriculum Vitae

CURRICULUM VITAE. D. Scott Waltemyer

CURRICULUM VITA. Diane Brothers Cook Allerton Lane Cumming, GA Office (678)

A N N M A R I E H I B B E R T

How To Understand The Cost Of The Death Penalty In California

BRITTANY L ADAMS-POPE

CORBETT F. GAULDEN, JR. CURRICULUM VITAE

VITA. Deborah A. Bell EARNED DEGREES

Katelyn J. Rozenbroek, M.A University Drive, Merrick Bldg, Coral Gables, FL

Curriculum Vitae Yoon Jik Cho

Department of Management Richards College of Business University of West Georgia Carrollton, GA (678)

DRAFT - Duke Alumni Association - DRAFT Support for and Expectation of Regional Alumni Groups

Tuck School of Business, Dartmouth College Assistant Professor of Business Administration, 2013 Present

Transcription:

Dr. Jordan Shropshire, PhD Associate Professor School of Computing University of South Alabama Address: Shelby Hall, 150 Jaguar Dr., Suite 2101 Mobile, Alabama 36688 Telephone: (251)-461-1597 Email: jshropshire@southalabama.edu EDUCATION Doctor of Philosophy in Business Administration (overall GPA: 3.8/4.0) Emphasis in Management Information Systems Dissertation Topic: Predicting compliance with prescribed organizational information security protocols. (Chair: Dr. Merrill Warkentin) Mississippi State University, Starkville, MS (Fall 2008) Bachelors of Business Administration (overall GPA: 3.3/4.0) Concentration in Statistics University of Florida, Gainesville, FL (2004) GRANT FUNDED ACTIVITY Shropshire, J., Principal Investigator (2013-2015). National Science Foundation, Secure and Trustworthy Cyberspace: Securing Cloud Infrastructure: Unobtrusive Techniques for Detecting Hypervisor Compromise $107,704. JOURNAL PUBLICATIONS Accepted Articles Shropshire, J. (2015) On technical skills, motivation and system hardening, Journal of Management Systems, Accepted. Shropshire, J., Warkentin, M., and Sharma, S. (2015) Personality, attitudes, and intentions: Predicting initial adoption of information security behavior, Computers & Security, (29:3) pp.177-191. Aasheim, C., Shropshire, J., Li, L., and Kadlec, C. (2012) "Knowledge and Skill Requirements for Entry-Level IT Workers: A Longitudinal Study," Journal of Information Systems Education, (23:2) pp. 193-204. Shropshire, J. and Kadlec, C. (2012) Where Are You Going? A Comparative Analysis of Job and Career Change Intentions Among IT Workers in the United States, Journal of Internet Banking and Commerce, (17:2) pp.1-17. 1

Shropshire, J. and Kadlec, C. (2012) Feeling marginalized: Turnover of Public-Sector IT Professionals, Journal of Emerging Trends in Computing and Information Sciences, (3:6) pp. 848-864. Shropshire, J. and Kadlec, C. (2012) I m leaving the IT field: the Impact of stress, job insecurity, and burnout on IT professionals, International Journal of Information and Communication Technology Research, (2:1) pp. 6-14. French, A. and Shropshire, J. (2011) Handheld versus Traditional Computer Security Threats and Practices: A Comparison of End User Perceptions, The Journal of Internet Electronic Commerce Research, (11:2) pp. 153-171. Johnston, A., Warkentin, M., and Shropshire, J. (2011) The influence of the informal social learning environment on information privacy policy compliance efficacy and compliance intention European Journal of Information Systems (20:3) pp. 267-284. Shropshire, J., Warkentin, M., and Johnston, A. (2010) Impact of negative message framing on security adoption, Journal of Computer Information Systems. (51:1) pp. 41-51. Kadlec, C. and Shropshire, J. (2010) Best practices in IT disaster recovery planning among U.S. banks Journal of Internet Banking and Commerce. (15:1) pp.1-11. Shropshire, J. and Kadlec, C. (2010) The relationship between IT director values and extent of IT disaster recovery planning in the banking industry, International Journal of Information Systems for Crisis and Response Management. (2:2) pp.54-68. Shropshire, J. and Kadlec, C. (2009) Developing the information technology disaster recovery planning construct, Journal of IT Management, (20:4), pp. 37-56. Shropshire, J. (2009) A canonical analysis of intentional information security breaches by insiders, Information Management and Computer Security, (17:4), pp. 296-310. Shim, J.P., Shropshire, J., Park, S., Harris, H., and N. Campbell (2007). "Podcasting for e-learning, communication, and delivery," Industrial Management & Data Systems (107:4), pp.587-600. Shropshire, J. (2006). A taxonomy of metrics for hosted databases, Journal of Internet Banking and Commerce (11:1). 2

Articles under Review Shropshire, J. A survey of hypervisor attack surfaces: towards a secure architecture International Journal of Information & Computer Security, Under 1 st Review. Campbell, M., Stylianou, A., and Shropshire, J. Impact of attitudinal factors on intention to report workplace internet abuse, Journal of Information Privacy and Security, Revise & resubmit. Campbell, M., Stylianou, A., and Shropshire, J. A stitch in time saves nine: the role of moral judgment in reducing internet policy violations, International Journal of Business Information Systems, Revise & resubmit. Shropshire, J. and Gowan, A. A structured approach to effective access control list tuning, Journal of Information Systems Security, Accepted pending revisions. Shropshire, J., Warkentin, M., and Straub, D. Fostering employee compliance with information security policies, MIS Quarterly. Under 2 nd Review. REFEREED CONFERENCE PROCEEDINGS Shropshire, J. (2015) Strategies for Ensuring High Availability Cloud Services, Proceedings of the 21 th Americas Conference on Information Systems, San Juan, PR. Shropshire, J., and Gowan, A. (2015) Characterizing the traits of top-performing security personnel ACM SIGMIS Computers and People Research 2015, Newport beach, CA. Waziri, I., and Shropshire, J. (2015) A heuristic migration logic between firewalls in a federated cloud Proceedings of the Annual IEEE SoutheastCon, Ft. Lauderdale, Fl. Shropshire, J. (2015) Hyperthreats: hypercall-based DoS attacks Proceedings of the Annual IEEE SoutheastCon, Ft. Lauderdale, Fl. Shropshire, J., Campbell, M., and Sweeney, B. (2015) Overcoming privacy challenges in mobile-cloud computing, Proceedings of the 18 th Annual Conference of the Southern Association for Information Systems, Hilton Head, SC. Campbell, M., Sweeney, B., and Shropshire, J. (2015) A safety net for social networking: development of a predictive tool for domestic terrorism, Proceedings of the 18 th Annual Conference of the Southern Association for Information Systems, Hilton Head, SC. 3

Shropshire, J. Chapman, J., and Kadlec, C. (2015) A Taxonomy of Android Vulnerabilities, Proceedings of the Forty-Fifth Annual Meeting of the Southeast Decision Science Institute, Savannah, GA. Shropshire, J. (2014) Extending the cloud with fog: Security challenges & opportunities, Proceedings of the 20 th Americas Conference on Information Systems, Savannah, GA. Shropshire, J. (2014) Analysis of monolithic and microkernel architectures: Towards secure hypervisor design Proceedings of the 47 th Hawaii International Conference on System Sciences (HICSS), Big Island, HI. Turnbull, L., Ochieng, H., Kadlec, C., and Shropshire, J. (2013) Improving Service Continuity: IT Disaster Prevention and Mitigation for Data Centers, 13 th Annual ACM Conference on IT Education/IT Research (SIGITE), Orlando, FL. Shropshire, J. and Gowan, A. (2013), A Measure for assessing the adequacy of DDOS defenses, Proceedings of the 19th Americas Conference on Information Systems, Chicago, Il. Turnbull, L., and Shropshire, J. (2013), Breakpoints: An analysis of potential hypervisor attack vectors, Proceedings of IEEE SoutheastCon, Jacksonville, FL. Shropshire, J. and Gowan, A. (2012), A structured approach to effective access control list tuning, Proceedings of the 2012 Workshop on Information Security and Privacy (WISP), the SIGSEC pre-icis Workshop, Orlando, FL. Shropshire, J., Burrell, S., and Kadlec, C. (2011), This is not what I signed up for: Job modification and IT worker turnover, 41 st Annual Meeting of the Southeastern Decision Science Institute, Savannah, GA. Aasheim, C., Li, L., Shropshire, J., and Kadlec, C. (2011) I.T. program curriculum recommendations based on a survey on knowledge and skill requirements for entry-level workers, 2011 Annual Meeting of the Southeastern Institute for Operations Research and the Management Sciences (SE Informs), Myrtle Beach, SC. Shropshire, J. (2011) Environment, motivation, and systems hardening, IFIP Dewald Roode Information Security Workshop IFIP WG8.11/WG11.13, Blacksburg, VA. Shropshire, J. and Kadlec, C. (2009) The relationship between IT director values and extent of IT disaster recovery planning 40th Annual Meeting of the Decision Science Institute, New Orleans, LA. 4

Kadlec, C. and Shropshire, J. (2009) Establishing the IT disaster recovery construct Proceedings of the 15th Americas Conference on Information Systems, San Francisco, CA. Shropshire, J. (2008) A canonical analysis of intentional security breaches by insiders. Proceedings of the 2008 Annual Meeting of the Decision Science Institute, Baltimore, MD. Warkentin, M., Shropshire, J., and Johnston, A (2007), The IT security adoption conundrum: An initial step toward the validation of applicable measures. Proceedings of the 13th Americas Conference on Information Systems, Keystone, Colorado. Shim, J.P., Shropshire, J., Park, S., Harris, H., and Campbell, N. (2006), Perceived value of podcasting: Student communication medium-preferences, Proceedings of the 12th Americas Conference on Information Systems, Acapulco, Mexico. Shropshire, J., Warkentin, M., Johnston, M., and Schmidt, M. (2006), Personality and IT security: An application of the five-factor model, Proceedings of the 12th Americas Conference on Information Systems, Acapulco, Mexico. Warkentin, M., Shropshire, J., and Johnston, A. (2006), Security software discontinuance, Proceedings of the 2006 Workshop on Information Security and Assurance (WISA), the SIGSEC pre-icis Workshop, Milwaukee, WI. Warkentin, M., Shropshire, J., and Johnston, A. (2006), Why do we check the box? - A study of security action automation and capitulation, Proceedings of The ISOneWorld Security Conference, Las Vegas, NV. Shropshire, J. and Warkentin, M. (2005), The modified attributes of innovation use, Proceedings of 2005 INFORMS Conference on Information Systems and Technology (CIST), New Orleans, LA. (Conference presentation subsequently cancelled due to Hurricane Katrina.) Research Grants Shropshire, J. Principle Investigator (2013), 1318399: Securing Cloud Infrastructure: Unobtrusive Techniques for Detecting Hypervisor Compromise. $108,000. National Science Foundation, Computer and Network Systems program, Secure and Trustworthy Cyberspace track. Awards College of Information Technology Award for Outstanding Teaching (2011) College of Information Technology Award for Outstanding Research (2010) Emerald Literati Editor s Award for Highly Commended Research Highly Cited Research Category (2010) 5

PROFESSIONAL ACTIVITIES Presentations Shropshire, J. Annual meeting of the Advisory Board of the Allen E. Paulson College of Information and Technology, The State of Information Technology Research, Georgia Southern University, Statesboro, GA. Shropshire, J. (2010) (Keynote Speaker), Annual IT & Operations Conference, "Benchmarking study: IT disaster recovery planning," Georgia Bankers Association, Atlanta, GA. Shropshire, J. (2009) Quarterly meeting of the IT & operation committee, "Executive update: IT disaster recovery planning," Georgia Bankers Association, Atlanta, GA. Reviews & Editorial Service MIS Quarterly Information & Management Journal of Business Research Decision Support Systems Behaviour & Information Technology European Journal of Information Systems Information Systems Journal Information & Organization Americas Conference on Information Systems (AMCIS) (2005, 2006, 2007, 2008, 2009, 2010, 2011, 2012, 2013 Information Security, Technology Adoption, and Management of IT Tracks) International Conference on Information Systems (ICIS) (2006, 2007, 2010, 2011, 2012, 2013 Information Security Track) Decision Sciences Institute Conference (DSI) (2006, 2007, 2008, 2009, 2011 Information Systems Track) Assisted Dr. Ray Vaughn and Dr. Merrill Warkentin (Eds.) with coordination and administration of peer-reviewed book on information security: Enterprise Information Systems Assurance and System Security: Managerial and Technical Issues, Hershey, PA: Idea Group Publishers, 2006. Affiliations Member of the Decision Sciences Institute (2007 present) Member of the Association of Information Systems (2006 present) Member of the Institute for electronics and electrical engineers (2012 present) 6

TEACHING Courses Taught -Database Design -Systems Analysis and Design -IT Infrastructure -Introduction to IT -Network Architecture -Network Security -Introduction to Business -Visual Basic EMPLOYMENT HISTORY 2014 Present: Associate Professor of CIS, School of Computing, University of South Alabama Mobile, Alabama 2013 2014: Associate Professor of IT, Department of IT, Georgia Southern University Statesboro, Georgia 2008 2012: Assistant Professor of IT, Department of IT, Georgia Southern University Statesboro, Georgia 2007 2008: Instructor for the College of Business and Industry, Mississippi State University Starkville, Mississippi 2004-2008: Graduate Research Assistant, Mississippi State University - Starkville, Mississippi CONSULTING Conducted information systems consulting for small, medium, and large organizations in the southeastern United States. Created custom applications and solutions for a variety of business processes. Audited existing system designs and frameworks for security weaknesses. Approximately 40% of past and present consulting projects involve development of new systems; 60% of past and present consulting projects involve systems integration/ creation of middleware to bridge existing systems. Technical skills include: Network engineering, LAMP architecture (Linux Red Hat, Apache Server, MySQL, and PHP), data center management, and systems administration. 7