Post Job Free

Resume

Sign in

Management Computer

Location:
Greensboro, NC
Salary:
Open
Posted:
June 11, 2018

Contact this candidate

Resume:

CURRICULUM VITAE

Dr. Karen A. Forcht

**** ******** ***

Greensboro, NC 27455

ac5t77@r.postjobfree.com

336-***-****

Personal Information:

Two daughters (Nicole and Michelle), native of northwest Ohio (Findlay), have traveled extensively throughout the USA, Mexico, Australia, New Zealand, South Pacific Islands, Caribbean, England, Spain, New Zealand, Fiji, Tahiti, Greece, Morocco, United Arab Emirates, Thailand, Malaysia, Viet Nam, Singapore, Iceland, and Canada.

Academic Preparation:

The American Graduate School for International Management (Thunderbird), Glendale, Arizona, January, l994. Completed course in International Management of Technology (IMoT).

Oklahoma State University, Stillwater, Oklahoma, Ed.D, December, l984

Dr. Dennis Mott, Chairperson, attended June, l982 to July, l984

--Completed Ed.D. degree in College of Business. Major: Information Systems

Minor: Business Communications

Dissertation: "An Analysis of the Opinions of Data Processing Management

Association Members Concerning Data Security

Curriculum in High Education Institutions"

Thesis Chairs: Dr. Herbert M. Jelley and Dr. Jeretta Nord

GPA - 3.89/4.00, inducted into Delta Phi Epsilon and

Beta Gamma Sigma academic honoraries. Awarded

doctoral research grant by Office of Business

and Economic Research, College of Business

Administration, (two awards given each academic year).

East Texas State University, Commerce, Texas, M.S., June, l974

Dr. Alton Goddard, Chairperson, attended September, l972 to May, l974

--Completed M.S. degree, Major: Computer Science, Minor: Business

Administration. GPA: 3.67/4.00

Thesis: "Security Concerns in the Data Processing Environment"

Thesis Chair: Dr. C. E. Rodriguez

Bowling Green State University, Bowling Green, Ohio, B.S., December, l970

Dr. Merle Guthrie, Chairperson, attended September, l962 to December, l970

--Major: Business Education, Minors: Business Administration and Business Communication

University of Toledo, Toledo, Ohio, attended night school part-time while employed at Owens-Illinois, Inc., l964-67. Major: Business Administration

Academic Experience:

Adjunct Professor, High Point University, High Point, North Carolina, College of Business, Fall, 2011 to present. Taught courses in MIS 1100 – Introduction to Management Information Systems.

Adjunct Professor, Elon University, Elon, North Carolina, Department of Computing Sciences and Department of Management (College of Business), January, 2007 to May, 2010. Taught courses in Business Communication and Introduction to Management Information Systems.

Visiting Professor, North Carolina A & T State University, Departments of Business Education and Business Administration, Greensboro, North Carolina, August, 2006-May, 2008. Taught courses in Business Communication (3 semesters), Visual Basic (4 semesters), and Introduction to Management Information Systems (5 semesters).

Department Head and Professor, Department of Business Information Systems, College of Business, Utah State University, Logan, Utah, June 2004-July-2006. Worked with the lecturers and professors in a complete redesign of the Business Communication courses.

Visiting Professor, University of Lethbridge, Calgary, Alberta, Canada, Summer, 2001, taught two courses in Innovation of Technology.

Visiting Professor, University of Wollongong, Department of Business Systems, Faculty of Commerce, University of Wollongong, New South Wales, Australia, July, l996 to December 3l, l997. Dr. Graham Winley, Head of Department, phone: 0ll-6l-42-2l4-474. Also taught at University of Wollongong May to September, l990, as a Fulbright Senior Scholar.

James Madison University, Department of Information and Decision Sciences (IDS), College of Business, Harrisonburg, Virginia 22807, Dr. Robert Brookshire, Program Director, 540-***-****, September, l984 to present. Taught courses in Introduction to Business Computing (Lab), Business Computers (Lecture), Introduction and Advanced Management Information Systems (MIS), Computer Security Management, Introduction to Internet, MBA course in Management of Information Systems, and Management of Innovation and Technology for MBA students. Promoted to Assistant Professor and received tenure after completing four years at JMU. Promoted to Professor after four years as an Associate. Served as Assistant Department Chairperson, l988-90. Named to the Andersen Consulting (Accenture) Chair in CIS, l997-2003.

United States Government, Office of Personnel Management (OPM), Philadelphia, Pennsylvania Regional Office. Taught courses in Computer Security and EDP Auditing to federal government employees in Harrisburg, Pennsylvania, New York City, Boston, and Philadelphia, September, l989 to August l992.

Oklahoma State University, Stillwater, Oklahoma, September, l982 to May, l984

Graduate Teaching Assistant. Taught Introduction to Business Data Processing (Fortran and BASIC) and Business Communications. Dr. Dennis Mott, Chairman of Department.

Wichita State University, Wichita, Kansas, January, l977 to December, l98l

Lecturer in night school and regular day programs for the Business Education Department, College of Business, Dr. Margaret Jantze, Chair. Taught courses in Business Communication, Office Management, and Introduction to Data Processing.

Also organized and taught three summer school seminars in data processing (COBOL) for secondary school teachers.

Through the Center for Management Development, College of Business, organized and presented numerous seminars for adults. Topics included computer security and using computers in the business environment.

United States Government, Washington, D.C., l97l-l972.

Contract instructor in various educational programs for the Department of State, Army Materiel Command, and the Department of Defense.

Secondary Teaching Experience, l967-l970.

High School Business Teacher, Findlay, Ohio; Benjamin Logan High School, Zanesfield, Ohio; and Hardin-Northern High School, Dola, Ohio.

Business Experience:

Matridyne Associates, Wichita, Kansas, January, l978 to May, l982. Formed consulting group to offer services in the areas of records management, office management feasibility studies, data processing and computer use, business communications, microfilm feasibility, marketing research, and training assessment.

South Bend Tri-Governmental Computer Center, South Bend, Indiana, January to September, l974. Supervisor in a department of fifteen employees whose responsibility was to work with the users of our services in the areas of input, output, and job readiness. Clients included the South Bend School System. City and County Governments, Police Department, and various private businesses. Also served as Computer Security Advisor and Programmer of Special Projects (COBOL).

Executive Administrative Assistant to Vice-President, Mr. Henry Rudy, Owens-Illinois, Inc., Toledo, Ohio, l964-67.

Publications:

l.Forcht, Karen A., and Kruck, S. E. (2001) Physical Security: Models, Philosophies, and Context. Journal of International Information Management, l0, (2), 85-98.

2.Kruck, S. E., Sciandra, John R., and Forcht, Karen A. (2001) New Concepts

in Password Management. Journal of International Information Management, 10, (2), 37-44.

3.Kruck, S. E., Gottovi, Danny, Moghadami, Farideh, Broom, Ralph, and

Forcht, Karen A. (2002) Protecting Personal Privacy on the Internet.

Information Management & Computer Security, 10, (203), 77-84.

4.Swart, Richard, Marshall, Bryan, Harris, Matthew, Forcht, Karen, and Olsen,

David (2005) Dimensions of Network Security Planning for Web Services, Journal of Information Privacy and Security, Vol. l, No. 2, 49-66.

5.Busing, M. E., Null, J. D., and Forcht, K. A. (2006) Computer Forensics: The

New Crime Fighting Tool. Journal of Computer Information Systems, Vol. 46, No. 2, ll5-ll9.

6.Luthy, David, and Forcht, Karen (2006) Laws and Regulations Affecting

Information Management and Frameworks for Assessing Compliance.

Information Management and Computer Security, Vol. l4, No. 2, l55-l66.

Other Publications

BOOKS:

l. Computer Security Management, Boyd and Fraser Publishing Company, Danvers, Massachusetts, l994.

2. Cases in Management Information Systems, Dryden Press, Fort Worth, Texas, l993.

WORKING PAPERS:

l. "An Exploratory Study of the Privacy, Confidentiality, Security and Control Issues Relating to the Wide-Spread Use of the Information Highway", David D. Lattanze Center for Executive Studies in Information Systems, Loyola College of Maryland, Baltimore, funded in 6/95, work completed in December, l996 .

(http://lattanze.loyola.edu/, WP 0996.03l)

ANCILLARY BOOKS:

l. Test Bank for Using Computers: Managing Change, South-Western Publishing Company, Cincinnati, Ohio, l989.

2. Instructor's Resource Manual for Using Computers: Managing Change, South-Western Publishing Company, Cincinnati, Ohio, l989.

3. Lecture Guide for Computers...The User Perspective, Third Edition, Hutchinson/Sawyer, Irwin Publishing Company, Boston, Massachusetts, l99l.

4. Instructor's Resource Guide for Computing in the Age of Information (Stern and Stern), Wiley Publishing Company, 255 pages, released l/93.

5. Student Study Guide for Computing in the Age of Information (Stern and Stern), Wiley Publishing Company, 28l pages, released l/93, (Co-author: Pierson).

CHAPTERS IN BOOKS:

l. Ethical Issues in Information Systems, chapter entitled, "Assessing the Ethical Standards and Policies in Computer-Based Environments", David Paradice, Frank DeJoie, Editors, Texas A & M University, published by Boyd and Fraser Publishing Company, April, l99l, pgs. 56-69. Note: Portions of this chapter are also included in Management Information Systems, fifth edition, by Raymond McLeod, Jr., MacMillan Publishing Company, l993.

2. Rogue Programs, Viruses, Worms, and Trojan Horses, chapter entitled, "Ethical Use of Computers", pages ll7-l20,Van Nostrand Reinhold Publishing Company, New York, New York, Lance J. Hoffman, Editor, The George Washington University, Washington, D.C., l990.

BOOK REVIEWS PUBLISHED:

l. Auditing Computer Security...A Manual With Case Studies, S. Rao Vallabhaneni, John Wiley and Sons, l989, Information Resources Management Journal, Summer, l990, Vol 3, No. 3, pg. 37.

2. Statistics in Plain English and Business Communications in the Personal Computer Age, published in The Journal of Computer Information Systems, Summer, l987.

MISCELLANEOUS PUBLICATIONS:

l. Invited Forward for Opportunities in Data Processing Careers, Data Processing Management Association Newsletter, l989.

2. Chapter Annotations and Transparency Discussions, Principles of Information Systems...A Managerial Approach, Ralph M. Stair, Boyd and Fraser Publishing Company, l992.

3. "Whistleblowing as a Computer Abuse Countermeasure", Special Report on Productivity Handbook, Auerbach Publishers, New York, New York, l992 (Co-author: Pierson).

4. Authored Multi-Media Ancillary Instructor's Package for Patrick McKeown's, Living with Computers, Harcourt Brace College Publishers, l994.

DISSERTATION ABSTRACTS:

l. MIS Doctoral Dissertations: l986 Selected Abstracts, "An Analysis of the Opinions of Data Processing Management Association Members Concerning Data Security Curricula in Higher Education Institutions", MIS Quarterly, published by the University of Minnesota, MIS Research Center, June, l986.

2. Selected Dissertation Abstracts of Delta Pi Epsilon Journal, "An Analysis of the Opinions of Data Processing Management Association Members Concerning Data Security Curricula in Higher Education Institutions", published by North Texas State University, l986.

CITATIONS IN PUBLICATIONS:

l. Graphics of study entitled, "Including Computer Security Topics in College Curriculum", Second Statistical Report of the National Center for Computer Crime Data, Santa Cruz, California, J. J. BloomBecker, J.D., Editor, l989, (Co-author: Moates).

2. Portion of research entitled, "Computer Security: The Growing Need for Concern" published in Computers at Risk...Safe Computing in the Information Age, published by the National Research Council and the National Academy Press, Washington, D.C., l99l. (Original article appeared in The Journal of Computer Information Systems, Fall, l985).

NEWS RELEASES:

l. "DP Courses Don't Include Ethics Study", Government Computer News, Reston, Virginia, July 4, l986, (Co-authors: Bilbrey and Christoph).

2. "Hackers Call Virus Author Hero, But Others Denounce Him", Detroit News, November, l988, interview was conducted via telephone with Mr. Robert Gillette, Syndicated Columnist, Los Angeles, California.

3. "Professor Promotes Computer Code of Ethics", JMU News, December 8, l988, interview was conducted with Mr. David Taylor, James Madison University Public Information Office.

4. "Computer Ethics: Conscience Keeping Up With Technology?", Montpelier, published by the James Madison University Alumni Office, interview was conducted with Mr. David Taylor, JMU Public Information Office, Spring, l989 issue.

5. "The Need for Ethical Awareness is Growing in Educational Institutions...A Preventative Approach", Computer Security Institute Newsletter, February 8, l989, (Co-author: Pierson).

JOURNAL COLUMNS:

While serving as Editor of the Computer Security column of the International Business Schools Computer User's Group Newsletter (IBSCUG), (published by Miami University of Ohio and University of Northern Colorado), the following columns were authored and published:

l. "Viruses, Computer Security's Newest Challenge", Winter, l989.

2. "Developing an Attitude of Ethical Use of Computers", May, l989.

3. "A Student Assessment of Computer Ethics...Findings of a Recent Survey", Fall, l989.

4. "Computer Viruses are Alive and Well...Systems are Being Held Hostage", Winter, l990.

5. "Computer Crime and Privacy", Summer, l990.

6. "Whistleblowing and Computer Ethics Statements", Fall, l990 (Co-author: Pierson).

7. "International Trade and Electronic Data Interchange: Legal Issues", April, l99l.

8. "Sources of Current Computer Security Publications", Summer, l99l.

9. "Sources of Computer Security Films and Videos", Fall, l99l.

10. "Virus Alert", Winter, l992.

11. "Outsourcing Security", Spring, l993, article was contributed by Dr. Kevin Fitzgerald, Melbourne, Victoria, Australia.

12. "Using Biometrics for Increased Access Control", Winter, l993.

13. "Use of Social Security Numbers Introduces Privacy Issues", Fall, l993

PAPERS PUBLISHED IN REFEREED AND PROFESSIONAL JOURNALS:

l. "Who's Resposible for Teaching Data Security: Recent Research", Computer Security, published by the Computer Security Institute, March/April, l985.

2. "Data Security Concerns in the Microcomputer Environment", Journal of Data Education, Summer, l985.

3. "Computer Security: The Growing Need for Concern", Journal of Computer Information Systems, Fall, l985.

4. "Brush-up on Your Flowcharting Techniques", EDSIG NEWS, Data Processing Management Association, May, l985.

5. "Is Your Data Processing Program Really Preparing Your Students for Industry?", EDSIG NEWS, Data Processing Management Association, January, l985.

6. "Self Analysis: An Important First Step to Interviewing", Your Computer Career, Data Processing Management Association, December, l986.

7. "Computer Security Education: Are Business Schools Lagging Behind?", Data Management, Data Processing Management Association, March, l986, (Co-author: Moates).

8. "The 'People Problem' Issue of Data Security", SIGSAC Review, Association for Computing Machinery, Winter, l986.

9. "The Need for Including Data Security Topics in the College Business Curriculum", SIGSAC Review, Association for Computing Machinery, Winter, l986.

10. "Presenting Technical Computer Concepts Through Effective Oral Presentation", Business Insights, Spring, l986, (Co-author: Roderick).

11. "The Merging of Computers and Business Communication", Journal of Educational Technology Systems, Fall, l986, (Co-author: Roderick).

12. "Teaching Data Security in AACSB Schools: A Survey", Interface, Fall, l986, (Co-author: Moates).

13. "A Proposed Plan to Satisfy the MIS-Computer Literacy Aspects of the Business Curriculum", Interface, Summer, l986, (Co-authors: Bilbrey, Leidig).

14. "The Changing MIS-CIS Curriculum: Keeping Pace with New Technology", Your Computer Career, Data Processing Management Association, Fall, l986, (Co-author: Bilbrey).

15. Abstract of study entitled, "Teaching Data Security in CIS Programs: Are We Doing the Job", Privacy Journal, October, l986, (Co-author: Moates).

16. "Emerging Roles of the MIS Professional: Technocrat or Change Agent?", Journal of Systems Management, Association for Systems Management, November, l987, (Co-authors: Kulonda and Moates).

17. "The Personal Computer: A Manager's Status Symbol", Data Management, Data Processing Management Association, May, l987, (Co-author: Pierson).

18. "The Development of Information Systems Ethics: An Analysis", Journal of Computer Information Systems, Society of Data Educators, Winter 87/88, (Co-authors: Christoph, Bilbrey).

19. "Documentation Requirements Determination for User-Developed Applications", IEEE Transactions on Professional Communication, March, l987, (Co-authors: Pierson, Moates).

20. "Developing Computer Security Awareness", Information Resources Management Bulletin, Association of Human Resources Management and Organizational Behavior, November, l987, (Co-author: Pierson).

21. "The Path to Network Security", Security Management, American Society for Industrial Security, September, l987.

22. "Unseen Liabilities in Computer Use", Security Management, American Society for Industrial Security, February, l987, (Co-author: Thomas).

23. "Arming for Interview Battles", Computerworld, June l5, l987.

24. "Technocrat or Change Agent: MIS's Role in the Future", InformationWeek, June 8, l987.

25. "The Special Considerations of Computer Security in the Microcomputing Environment", Computer Crime Digest, January, l987.

26. "The Future of Information Systems Education: Essential Teaching Competencies", Catalyst for Change, Journal of the National School Development Council, Winter, l988.

27. "Developing Guidelines for Documentation Standards for User Developed Applications", Journal of Information Systems Management, Winter, l988, (Co-authors: Pierson, Moates).

28. "An Analysis of Hardware and Software Usage in AACSB Accredited Business Schools Management Programs", Business Review, Winter, l988, (Co-authors: Shorter, DeVito).

29. "Placing User-Developed Applications 'On-the-Shelf' ", Data Management, Data Processing Management Association, March, l988, (Co-author: Pierson).

30. "Computer Use in Three Selected Business School Management Courses", Journal of Education for Business, Fall, l988, (Co-authors: DeVito, Shorter).

3l. "Factors Affecting Level of Documentation Required for User Developed Applications", IEEE Transactions on Professional Communication, September, l988, (Co-authors: Pierson, Moates).

32. "Ready or Not, Here We Come...Student's Assessment of a Computer Information Systems Program", Collegiate Microcomputer, Rose-Hulman Institute of Technology, Terre Haute, Indiana, Fall, l988, (Co-authors: Scarborough, Pierson).

33. "Documentation for User-Developed Applications with High Documentation Requirements", ACM ASTERISK, Association for Computing Machinery, March, l988, (Co-authors: Moser, Pierson).

34. "Developing Effective Written Communication Skills in an Advanced MIS Course", Journal of Computer Information Systems, Association of Computer Educators, Spring, l989.

35. "Halting Computer Crime and Abuse: Management's Newest Challenge", Journal of Applied Business Research, Fall, l989, (Co-authors: Pierson, Bauman).

36. "Computer Crime: Assessing the Lawyer's Perspective", Journal of Business Ethics, Fall, l989, (Co-authors: Thomas, Wigginton).

37. "COBOL 85: Practitioner's Opinions", Inside DPMA, Data Processing Management Association, May, l989, (Co-authors: Bauman, Pierson).

38. "The Design of a Computer Security Management Course in the MIS Curriculum", The Accounting Systems Journal, Memphis State University, Fall, l989, (Co-authors: Pierson, Moates).

39. "Practitioner's Acceptance of COBOL 85: Implications for Educators", Interface, Spring, l989, (Co-authors: Pierson, Bauman).

40. "End-User Computers: A Grass Roots Movement", The Journal of Computer Information Systems, Oklahoma State University, Summer, l990, (Co-author: Pierson).

41. "Computer Ethics for Entry-Level Personnel, Accounting and EDP, Auerbach Publishers, Fall, l990.

42. "Contingency Planning...A Cost Versus Benefit Analysis", Disaster Recovery Journal, Disaster Recovery Institute, Fall, l990, (Co-author: Pierson).

43. "Whistleblowing as a Computer Abuse Countermeasure", Data Security Management, Auerbach Publishers, l990, (Co-author: Pierson).

44. "Determining Documentation Requirements for User-Developed Applications", Information and Management, Elsevier Science Publishers, l990, (Co-authors: Pierson, Teer).

45. "Documenting User-Developed Spreadsheet Applications, Journal of Accounting and EDP, Auerbach Publishers, Fall, l989, (Co-authors: Bauman, Pierson).

46. "The Computer Hacker: Friend or Foe?", The Journal of Computer Information Systems, Winter, l990-9l, (Co-author: Myong).

47. "The Issue of White Collar Crime for Collegiate Schools of Business", Journal of Education for Business, May-June, l99l (Co-authors: Roderick, Cook, Jelley).

48. "Business Programming Language Preferences in the l990s, The Journal of Computer Information Systems, Fall, l99l, (Co-authors: Bauman, Pierson).

49. "Using Codes of Ethics to Establish Ethical Standards and Policies in Computer-Based Environments", Information Security Product News, February, l99l.

50. "Defining Ethical Standards for the Information Age", Information Security Products News, March-April, l99l.

51. "Developing an Attitude of Ethical Use of Computers, Computer Applications Newsletter, William C. Brown Publishers, August l, l99l.

52. "A Diploma Can't Ensure Ethics", Computerworld, April 20, l99l.

53. "The Ethics Gap", Computerworld, October l4, l99l.

54. "Developing an Attitude of Ethical Use of Computers", WCB SoftNews, a computer-related newsletter from William C. Brown Publishers, l99l-92.

55. "Computer Viruses--Anatomy and How They Spread", Computer Audit News and Development, l99l, (Co-authors: Bauer, Donlan, Byrne, Burlingame, Howard).

56. "Ethical Use of Computers", Computer Control Quarterly, DMR Group Pty. Ltd., Melbourne, Victoria, Australia, l992.

57. "Computer Viruses...Prevention and Recovery", Computer Security Management, American Society for Industrial Security, Fall, l992.

58. "Bolstering Your Computer's Immune System", Security Management, September, l992.

59. "A Parent's Guide to Ethical Use of Computers", COMPUSERVE Magazine, Spring, l993.

60. "Sowing the Seeds of Ethical Computing", COMPUSERVE Magazine, July, l993.

61. "Whistleblowing: An Ethical Dilemma", The Australian Journal of Information Systems, published by the University of Wollongong, New South Wales, and Monash University, September, l993, (Co-authors: Pierson, Bauman).

62. "The Computer Ethics of University Students: An International Exploratory Study", Information and Computer Security, published by the DMR Group, Melbourne, Australia, January, l994, (Co-authors: Brookshire, Stevens, Clarke).

63. "Information Compilaton and Disbursement: Moral, Legal, and Ethical Considerations, Information Management and Computer Security, published by the MCB University Press, Melbourne, Australia, l994, (Co-author: Thomas).

64. "The Information Highway...The Interstate Highway System for Computer Networks", Information Management and Computer Security, published by the MCB University Press, Melbourne, Australia, l994, (Co-author: Oare).

65. "Ethical Use of Computers...Responsibility for the 90's", Honors, newsletter of the James Madison University Honors Program, December l2, l994.

66. "The Clipper Chip and the Price of Security in America, Information Management and Computer Security, published by the MCB University Press, Melbourne, Australia, l994, (Co-author: Butler).

67. "New Technologies and Future Trends in Computer Security", Industrial Management and Data Systems, published by MCB University Press, London, England, Fall, l994, (Co-author: Pierson).

68. "Security and Network Management: Changes in the Way We Work", Information Management and Computer Security, published by the MCB University Press, Melbourne, Australia, l994, (Co-author: Tsai).

69. "Critical Management Issues in Computer Security", International Business Schools Computing Quarterly, published by the University of Northern Colorado, May/June, l995, (Co-authors, Hubbard and Roderick).

70. "Theoretical Framework for a Comprehensive Model of End User Acceptance", Journal of International Information Management, Spring, l995, (Co-authors: Teer and Jacobi).

71. "Security Issues and Concerns with Internet", Internet Research...Electronic Networking Applications and Policy, published by the MCB University Press, Ltd., West Yorkshire, England, Vol. 5, No. 3, l995, (Co-author: Fore).

72. "Rules of the Road When Traveling the Information Highway", JMU Modem, Spring, l996.

73. "Internet...An Introduction to Protocols and Sites", The Journal of CIS, Winter edition, l997, (co-authors: Penbarthy and Colavita).

74. "Information Security in Business Environments", Information Management and Computer Security, Vol. 4, No. l, l996, published by MCB University Press, West Yorkshire, England, (Co-author: Sanderson).

75. "Do Vendor/Consultant Services Affect Small Business' IT Course Requirements?" Australian Journal of Educational Technology, Vol. ll, No. l, Winter, l995, pages 50-67, (co-authors: Pierson, MacGregor, Bunker, Cocks).

76. "Current Legal and Ethical Considerations of Human Resource Information Systems", Journal of Business Ethics, published by University of Guelph, Ontario, Canada, Spring, l997, (Co-authors: Hubbard, Thomas, Wood).

77. "Computer Crime: Assessing the Lawyer's Perspective", Crime, Deviance, and the Computer, Dr. Richard Hollinger, Editor, (Co-authors: Thomas and Wigginton), published previously in the Journal of Business Ethics, pages. 243-25l, l989, Will be published by permission in the International Library of Criminology, Criminal Justice, and Penology, Dartmouth Publishing Company, Hampshire, United Kingdom.

78. "Doing Business on the Internet: Marketing and Security Aspects", Information Management and Computer Security, Vol. 4, No. 4, l996, pages 3-9, (Co-author: Rolf-Ascan Wex), published by UniversityPress, Ltd., West Yorkshire, England.

79. “A Pilot Study of Small Business’s Percepetion of Vendor Provided Services: Are These Associated with Small Business IT Educational Requirements?”, The Australian Journal of Information Systems, Vol. 5, No. 1, September, l997, pages 45-54, (Co-authors: MacGregor, Dunker, Pierson).

80. “Security Considerations of Doing Business via the Internet: Cautions to be Considered, Internet Research...Electronic Networking Application and Policy, Vol. 7, No. 1, l997, (Co-authors: Aldridge, White).

81. “Human Resource Information Systems: An Overview of Current Ethical and Legal Issues”, Journal of Business Ethics, Kluwer Academic Publishers, Netherlands, pages l-5, l997, (co-authors: Thomas, Hubbard).

82. “Control of the Internet:, Information Management and Computer Security, Vol. 5, No. 1, l997, pages 23-28, (Co-authors: Thomas, Usry, Egan).

83.“Get Linked or Get Lost: Marketing Strategy for the Internet”, INTERNET RESEARCH…Electronic Networking Applications and Policy, Vol. 7, No. 3, l997, pgs. 161-169, (co-authors: Aldridge, Pierson).

84.“”Electronic Mail: The Security and Privacy Consideration of Policy Development”, Texas Business Education Association (TBEA) Journal, Vol. VI, No. l, Fall, l997, (Co-authors: Hubbard, Hallock).

85.“Computer Viruses: How Companies Can Protect Their Systems”, Industrial Management and Data Systems, Vol. 98, No. l, l998, (Co-author, Hubbard).

86.“Computer Viruses: How Companies Can Protect Their Systems, INDUSTRIAL MANAGEMENT AND DATA SYSTEMS, Vol. 98, No. l, l998, (co-author: Hubbard).

87.“Entrepreneurial Women: Inroads to Success”, GBEA JOURNAL (Georgia Business Education Journal), Vol. L, No., l999, (co-authors: Hubbard, North).

88.“Legal Consideration of Internet Use…Issues to be Addressed”, INTERNET RESEARCH: ELECTRONIC NETWORKING APPLICATIONS AND POLICY, Vol. 8, l998, MCB University Pressm West Yorkshire, England, (co-authors: Thomas, Counts).

89.“Human Resource Information Systems: An Overview of Current Ethical and Legal Issues”, JOURNAL OF BUSINESS ETHICS, published by Kluwer Academic Publishers, Netherlands, Vol. L7, No. l2, September, l998, (co-authors: Hubbard, Thomas).

90.Abstract of article published in JOURNAL OF BUSINESS ETHICS (l7{12}, 9/98), published in THE PHILOPSOPHER’S INDEX, September, l998, (co-authors: Hubbard, Thomas).

91."Voice Over Internet Protocol: An Emerging Technology", TEXAS BUSINESS EDUCATION JOURNAL, October, l999, (co-authors: Miller, Hubbard).

92."Using Data Mining and Datawarehousing Techniques", INDUSTRIAL MANAGEMENT AND DATA SYSTEMS, May, l999, (co-author: Cochran).

93."Developing a Computer Security Policy for Organizational Use and Implementation", JOURNAL OF COMPUTER INFORMATION SYSTEMS, Winter, 2000-200l, (co-author: Ayers).

94."Security-Related Concerns with Geographic Information Systems and Geographic Mapping", INFORMATION



Contact this candidate