Victor C. Lee, Ph.D.
Email: **********@*****.*** • Home: 920-***-****
Green Bay, Wisconsin 54311
U.S.A.
Objective
Seeking a position that will utilize my training, education, and experience along with critical thinking skills to provide the organization with the highest level of services. I will be relocating to the San Francisco Bay area. Professional Summary
• Earned a Doctor of Philosophy degree in Computer and Information Security with a 4.0/4.0 G.P.A. in October, 2015.
• Doctoral Dissertation entitled, "Examining the Relationship between Autonomy, Competence, and Relatedness and Security Policy Compliant Behavior".
• Doctoral courses completed include Disaster Recovery, Network Auditing, Cyber Forensics, and Ethical Issues in Information Assurance, Cyber Terrorism, and Computer and Network Security. Teaching Experience
English Teacher TutorABC.com July 2015 to October 2015 Taught English online to Chinese business professionals
• Facilitate learning of English language fundamentals.
• Evaluate lesson plan content and efficacy.
• Incorporate graphical presentation skills into the teaching objectives. Professional Experience
Owner/Manager New Life Cartridge, Inc. • Green Bay, WI U.S.A. Jan. 1994 to Present Started, managed, and operated a five-person small business that offers toner/inkjet cartridge recycling and laser printer repair.
• Oversee daily office operations.
• Prepare and distribute payroll.
• Oversee inventory and office supply purchases.
• Negotiate pricing with vendors regarding wholesale billing and marketing procedures.
• Process accounts receivable and accounts payable.
• Perform accounts receivable duties including invoicing, researching chargebacks, discrepancies and reconciliations.
• Maintain accounting records and file corporate tax returns. Edited: 5/25/2015 Victor C. Lee Page 2 of 2
• Toner cartridge recycling duties and teaching employees how to recycle toner cartridges.
• Clean and repair laser and inkjet cartridges.
SKILLS: Business Organizational, Customer Relationship Management, Technical Leadership, Accounting Principles and Practices, People Management, Computer and Internet. Research Assistant University of Wisconsin - Oshkosh • Oshkosh, WI U.S.A. Sept. 1991 to June 1993 Assisted three business school professors in their teaching and research duties.
• Performed library research for three business school professors.
• Graded undergraduate students' exams and papers.
• Proctored undergraduate and M.B.A. students' exams. SKILLS: Organization and Time Management, Analytical/Research, Leadership Tax Preparer H and R Block, Inc. • Green Bay, WI U.S.A. Dec. 1990 to April 1991 Assessed tax situation of clients and appropriately completed their tax returns.
• Greeted tax clients and scheduled their meetings with tax preparers.
• Interviewed tax clients regarding their income and expenses for the past year.
• Completed appropriate tax return forms based on financial information from the interview.
• Answered questions concerning the tax return and provided advice about next year's tax return. SKILLS: Client relations, Time Management, Tax Knowledge, Client Interviewing Education
Doctor of Philosophy • Computer and Information Security • Completed October, 2015 • 4.0/4.0 G.P.A. Northcentral University • Prescott Valley, AZ
• Specialization coursework:
• Organizations Corporate Computer and Network Security
• Critical Infrastructure Protection, Information Warfare, and Cyber Terrorism
• Disaster Recovery and Contingency Planning for the Security Professional
• Information Assurance from Legal and Ethical Issues
• Cyber Forensics • Network Auditing • Foundations of Computer Network Auditing
• Dissertation: "Examining the Relationship between Autonomy, Competence, and Relatedness and Security Policy Compliant Behavior". Please see Appendix for my dissertation abstract.
• Research interests: Information security policy compliance, Human factors in information security, Social engineering and cybersecurity, and Business ethics in information security Edited: 5/25/2015 Victor C. Lee Page 3 of 2
Master of Business Administration • Business Administration • 1993 • 3.40/4.0 G.P.A. University of Wisconsin - Oshkosh • Oshkosh, WI
Bachelor of Science • Managerial Accounting • 1990 University of Wisconsin - Green Bay • Green Bay, WI References
Dr. Leah Wickersham-Fish, Ph.D., Dissertation Chair • Northcentral University • Phone: 214-***-**** Email: ***************@***.***
Dr. Craig Barton, Ph.D., Method Committee Member • Northcentral University • Phone: 844-***-**** Email: *******@***.***
Appendix
Dissertation Abstract
The rising incidents of data breaches have become a significant societal concern and employees are often considered the weakest link due to their intentional or accidental actions regarding information security (IS). To ensure that employees behave appropriately, organizations implemented IS policies, but employees are not motivated to comply with compulsory IS policies for reasons of convenience; often viewing IS policies as impediments to their work efficiency. Extrinsic motivation based on using punishment is the principal method used by researchers and managers to increase IS policy compliance; however, its efficacy has been questioned because of inconsistent and contradictory research results. Meanwhile, IS policy compliance researchers have ignored intrinsic motivation even though intrinsic motivation is more effective than extrinsic motivation. Researchers have used self-determination theory (SDT) to successfully explain intrinsic motivation in fields such as education, health, and fitness, but the theory has not been fully applied in IS. SDT scholars inform that satisfaction of the basic needs for autonomy, competence, and relatedness leads to improved psychological well-being, motivation, and performance. In this quantitative, non-experimental study, 155 randomly selected participants from SurveyMonkey Audience, a participant recruitment service, completed an online survey consisting of the Basic Need Satisfaction at Work Scale and the Compliant Behavior Scale. Multiple regression was used to analyze the data and determine how accurate the predictor variables of perceived autonomy, perceived competence and perceived relatedness predict the criterion variable of security policy compliant behavior. Results indicated that perceived autonomy, perceived competence, and perceived relatedness significantly predicted security policy compliant behavior (adj. R2 = .158, p < .001). The predictive capability of the relationship was weak as the three predictor variables accounted for only 15.8% of the variability in the criterion variable, and so 84.2% of the variability in the criterion variable was unaccounted for. Additionally, the perceived competence predictor variable made the only significant contribution when explaining the criterion variable (Beta = 0.516, p < .001). A key conclusion was that although the finding that perceived competence was the only predictor variable that made a significant contribution was unexpected, the finding that the overall model was significant suggests that SDT has merit in IS policy compliance research. Recommendations for future research included replicating this study using a different population such as participants from a single company and conducting a qualitative or mixed-method study to determine what other variables may account for security policy compliant behavior