Skip to content

Instantly share code, notes, and snippets.

@twitched
Last active December 8, 2016 23:20
Show Gist options
  • Save twitched/b695b4e8ab21923ba465605b9515e112 to your computer and use it in GitHub Desktop.
Save twitched/b695b4e8ab21923ba465605b9515e112 to your computer and use it in GitHub Desktop.
<!DOCTYPE html>
<html lang="en">
<head>
<meta charset="utf-8">
<meta name="generator" content="pandoc">
<meta name="viewport" content="width=device-width, initial-scale=1.0, user-scalable=yes">
<title>Curriculum Vitae for Douglas P. Twitchell</title>
<style type="text/css">code{white-space: pre;}</style>
<!--[if lt IE 9]>
<script src="http://html5shim.googlecode.com/svn/trunk/html5.js"></script>
<![endif]-->
<style type="text/css">
body {
-webkit-font-smoothing:antialiased;
font:normal 1em/1.25em Helvetica,Arial,Verdana,sans-serif;
margin:.5in 1in 1in 1in;
max-width:8in;
}
h1 {
color:#000;
font-size:1.75em;
font-weight: bold;
margin-top: 1em;
margin-bottom: .5em;
margin-left: 0;
margin-right: 0;
}
h2 {
color:#111;
font-size:1.5em;
font-weight: bold;
margin-top: .75em;
margin-bottom: .5em;
margin-left: 0;
margin-right: 0;
}
h3 {
color:#111;
font-size:1.25em;
font-style: bold;
margin: .5em 0;
padding: 0;
}
h4 {
color:#111;
font-size:1em;
font-weight: bold;
margin: 0;
padding: 0;
}
h5 {
color:#111;
font-size:1em;
font-style: bold;
}
h6 {
color:#111;
font-size:1em;
font-style: bold;
}
p {
margin-left:.5in;
margin-top: .75em;
margin-bottom: .75em;
}
@media print {
body {
font-family: "Palatino Linotype","Book Antiqua",Palatino,serif;
margin-top: 1.5in;
margin-bottom: 1.5in;
margin-left: 1in;
margin-right: 1in;
}
h1 {
font-size:1.5;
}
h2 {
font-size:1.25em;
}
h3 {
font-size:1.1em;
}
img, pre, blockquote, table, figure, p {
page-break-inside: avoid;
widows: 3;
orphans: 3;
}
}
@media screen {
::selection { background:rgba(157, 193, 200,.5)}
h1::selection { background-color:rgba(45, 156, 208, .3)}
h2::selection { background-color:rgba(90, 182, 224, .3)}
h3::selection,
h4::selection,
h5::selection,
h6::selection,li::selection,ol::selection { background-color:rgba(133, 201, 232, .3)}
code::selection { background-color:rgba(0,0,0,.7);color:#eee}
code span::selection {background-color:rgba(0,0,0,.7) !important;color:#eee !important}
a::selection { background-color:rgba(255, 230, 102,.2)}
.inverted a::selection { background-color:rgba(255, 230, 102,.6)}
td::selection,th::selection,caption::selection { background-color: rgba(180, 237, 95, .5);}
}
</style>
</head>
<body>
<h1 id="douglas-twitchell">Douglas Twitchell</h1>
<p>College of Business and Economics<br />Boise State University<br />1910 University Drive<br />Boise, ID 83725<br />DougTwitchell@boisestate.edu<br />(208) 426-1095</p>
<h2 id="education">Education</h2>
<p><strong>Doctor of Philosophy</strong> in Management Information Systems with Linguistics minor. Eller School of Management, University of Arizona, May 2005.</p>
<p><strong>Master of Information Systems Management</strong> Marriott School of Management, Brigham Young University, April 1999.</p>
<p><strong>Bachelor of Science</strong> in Management with emphasis in Information Systems, Marriott School of Management, Brigham Young University, April 1999.</p>
<h2 id="academic-appointments">Academic Appointments</h2>
<p><strong>Boise State University</strong>, <em>Boise, ID</em>, Assistant Professor (August 2016 – Present)</p>
<p><strong>Illinois State University</strong>, <em>Normal, IL</em>, School of Information Technology Graduate Coordinator (April 2015 – Present), Associate Professor (July 2011 – July 2016), Assistant Professor (July 2005 – July 2011)</p>
<p><strong>Spears School of Business, Oklahoma State University</strong>, <em>Stillwater, OK</em>, Visiting Scholar (September 2011 – November, 2011)</p>
<p><strong>Center for the Management of Information, Eller School of Business</strong>, <em>Tucson, AZ</em>, Research Associate (August 2001 – May 2005)</p>
<h2 id="work-experience">Work Experience</h2>
<p><strong>Information Technology International</strong>, Java Developer, (Phoenix, AZ; May, 2000 – August 2001)</p>
<p><strong>Arthur Andersen Business Consulting</strong>, Consultant, (Phoenix, AZ; May 1999 – May 2000)</p>
<p><strong>Electronic Data Systems</strong>, Intern, (Salt Lake City, UT; May 1998 – August 1998)</p>
<h2 id="certifications">Certifications</h2>
<p>Sun Certified Java Programmer 1999<br />Certified Information Systems Security Professional (CISSP) 2012 - Present</p>
<h1 id="research">Research</h1>
<hr />
<h2 id="peer-reviewed-journal-articles">Peer-Reviewed Journal Articles</h2>
<p>Fuller, Christie M., David P. Biros, Douglas P. Twitchell, and Rick L. Wilson. 2015. “Real-World Deception and the Impact of Severity.” <em>Journal of Computer Information Systems</em> 55 (2): 59–67. <a href="http://www.iacis.org/jcis/jcis_toc.php?volume=55&amp;issue=2">http://www.iacis.org/jcis/jcis_toc.php?volume=55&amp;issue=2</a>.</p>
<p>Twitchell, Douglas P., Matthew L. Jensen, Douglas C. Derrick, Judee K. Burgoon, and Jay F. Nunamaker. 2013. “Negotiation Outcome Classification Using Language Features.” <em>Group Decision and Negotiation</em> 22 (1): 135–51. doi:<a href="http://doi.org/10.1007/s10726-012-9301-y">10.1007/s10726-012-9301-y</a>.</p>
<p>Sagers, Glen, Kathleen Ball, Bryan Hosack, Douglas P. Twitchell, and David Wallace. 2013. “The Mainframe Is Dead. Long Live the Mainframe!” <em>AIS Transactions on Enterprise Systems</em> 4 (1): 4–10. <a href="http://gito.de/homepage/aes/aeshp_new.nsf/0/4AA392810130E5E9C1257BEF004D3F5C/$FILE/AIS-TES_2013_article_1.pdf">http://gito.de/homepage/aes/aeshp_new.nsf/0/4AA392810130E5E9C1257BEF004D3F5C/$FILE/AIS-TES_2013_article_1.pdf</a>.</p>
<p>Fuller, Christie M., Kent Marett, and Douglas P. Twitchell. 2012. “An Examination of Deception in Virtual Teams: Effects of Deception on Task Performance, Mutuality, and Trust.” <em>IEEE Transactions on Professional Communication</em> 55 (1): 20–35. doi:<a href="http://doi.org/10.1109/TPC.2011.2172731">10.1109/TPC.2011.2172731</a>.</p>
<p>Fuller, Christie M., Douglas P. Twitchell, Kent Marett, and A. J. Burns. 2012. “The Impact of Ability and Participation on Trustworthiness and Task Performance in Virtual Teams:” <em>International Journal of Social and Organizational Dynamics in IT</em> 2 (2): 1–17. doi:<a href="http://doi.org/10.4018/ijsodit.2012040101">10.4018/ijsodit.2012040101</a>.</p>
<p>Burgoon, Judee K., Fang Chen, and Douglas P. Twitchell. 2010. “Deception and Its Detection Under Synchronous and Asynchronous Computer-Mediated Communication.” <em>Group Decision and Negotiation</em> 19 (4): 345–66. doi:<a href="http://doi.org/10.1007/s10726-009-9168-8">10.1007/s10726-009-9168-8</a>.</p>
<p>Burgoon, Judee K., Douglas P. Twitchell, Matthew L. Jensen, Thomas O. Meservy, Mark Adkins, John Kruse, Amit Deokar, et al. 2009. “Detecting Concealment of Intent in Transportation Screening: A Proof of Concept.” <em>IEEE Transactions on Intelligent Transportation Systems</em> 10 (1): 103–12. doi:<a href="http://doi.org/10.1109/TITS.2008.2011700">10.1109/TITS.2008.2011700</a>.</p>
<p>Twitchell, Douglas P. 2007. “SecurityCom: A Multi-Player Game for Researching and Teaching Information Security Teams.” <em>Journal of Digital Forensics, Security and Law</em> 2 (4): 9–18. <a href="http://ojs.jdfsl.org/index.php/jdfsl/article/view/187">http://ojs.jdfsl.org/index.php/jdfsl/article/view/187</a>.</p>
<p>Meservy, Thomas O., Matthew L. Jensen, John Kruse, Douglas P. Twitchell, Gabriel Tsechpenakis, Judee K. Burgoon, Dimitris N. Metaxas, and Jay F. Nunamaker Jr. 2005. “Deception Detection Through Automatic, Unobtrusive Analysis of Nonverbal Behavior.” <em>IEEE Intelligent Systems</em> 20 (5): 36–43. doi:<a href="http://doi.org/10.1109/MIS.2005.85">10.1109/MIS.2005.85</a>.</p>
<p>Zhou, Lina, Douglas P. Twitchell, Tiantian Qin, Judee K. Burgoon, and Jay F. Nunamaker. 2004. “A Comparison of Classification Methods for Predicting Deception in Computer-Mediated Communication.” <em>Journal of Management Information Systems</em> 20 (4): 139–66. doi:<a href="http://doi.org/10.1080/07421222.2004.11045779">10.1080/07421222.2004.11045779</a>.</p>
<p>Zhou, Lina, Judee K. Burgoon, Jay F. Nunamaker, and Douglas P. Twitchell. 2004. “Automated Linguistics Based Cues for Detecting Deception in Text-Based Asynchronous Computer-Mediated Communication: An Empirical Investigation.” <em>Group Decision and Negotiation</em> 13 (1): 81–106. doi:<a href="http://doi.org/10.1023/B:GRUP.0000011944.62889.6f">10.1023/B:GRUP.0000011944.62889.6f</a>.</p>
<h2 id="funded-grants">Funded Grants</h2>
<p>Award Date: August 2014<br />Title: 2015 Central Illinois High School Cyber Defense Competition Awards<br />Agency: National Security Agency<br />Role: Principal Investigator<br />Amount: $6,100</p>
<p>Award Date: August 2013<br />Title: 2014 Central Illinois High School Cyber Defense Competition Awards<br />Agency: National Security Agency<br />Role: Principal Investigator<br />Amount: $3,600</p>
<p>Award Date: August 2011<br />Title: 2012 Central Illinois High School Cyber Defense Competition<br />Agency: Department of Defense Information Assurance Scholarship Program<br />Role: Principal Investigator<br />Amount: $56,491.90</p>
<p>Award Date: August 2006<br />Title: SecurityCom: A multi‐player game for researching and teaching information security teams Agency: Illinois State University Research Grant Role: principal investigator Amount: $5,900</p>
<h2 id="peer-reviewed-conference-proceedings">Peer-Reviewed Conference Proceedings</h2>
<p>Sagers, Glen, and Douglas P. Twitchell. 2016. “A Caution for the AIS Bright ICT Initiative.” In <em>2nd Annual Workshop on Bright ICT 2016</em>. Dublin, Ireland.</p>
<p>Sagers, Glen, and Douglas P. Twitchell. 2016. “A Response to the AIS Bright ICT Initiative.” In <em>Proceedings of the 22nd Americas Conference on Information Systems</em>. San Diego, CA: AIS. <a href="http://aisel.aisnet.org/amcis2016/ITProj/Presentations/27/">http://aisel.aisnet.org/amcis2016/ITProj/Presentations/27/</a>.</p>
<p>Sikolia, David, Douglas P. Twitchell, and Glen Sagers. 2016. “Employees’ Adherence to Information Security Policies: A Partial Replication.” In <em>Proceedings of the 22nd Americas Conference on Information Systems</em>. San Diego, CA: AIS. <a href="http://aisel.aisnet.org/amcis2016/TRR/Presentations/5/">http://aisel.aisnet.org/amcis2016/TRR/Presentations/5/</a>.</p>
<p>Sagers, Glen, Bryan Hosack, R.J. Rowley, Douglas P. Twitchell, and Ranjitha Nagaraj. 2015. “Where’s the Security in WiFi? An Argument for Industry Awareness.” In <em>Proceedings of the 49th Hawaii International Conference on Systems Sciences</em>, 5453–61. Kauai, Hawaii: IEEE. doi:<a href="http://doi.org/10.1109/HICSS.2015.641">10.1109/HICSS.2015.641</a>.</p>
<p>Shesh, Amit, and Douglas Twitchell. 2013. “Interplay of Desktop and Mobile Apps with Web Services in an Introductory Programming Course.” In <em>Proceedings of the 2013 Americas Conference on Information Systems</em>. Chicago, Illinois: AIS. <a href="http://aisel.aisnet.org/amcis2013/ISEducation/GeneralPresentations/7">http://aisel.aisnet.org/amcis2013/ISEducation/GeneralPresentations/7</a>.</p>
<p>Twitchell, Douglas, Christie Fuller, David Biros, and Kent Marett. 2012. “CollabSec: A Multi-Player Game for Researching and Teaching Information System Risk Assessment.” In <em>Proceedings of the Seventh Pre-ICIS Workshop on Information Security and Privacy</em>. Orlando, Florida. <a href="http://aisel.aisnet.org/wisp2012/6">http://aisel.aisnet.org/wisp2012/6</a>.</p>
<p>Twitchell, Douglas P., Bryan Hosack, Glen Sagers, and Crystal Speed. 2010. “Compliance Amid Security Policy Changes: An Empirical Study.” In <em>2010 Workshop on Information Security and Privacy (WISP 2010)</em>. St. Louis, MO.</p>
<p>Twitchell, Douglas P., Bryan Hosack, and Glen Sagers. 2009. “Effects of Education on User Compliance with Security Policies: Ignore or Comply?” In <em>Workshop on Information Security &amp; Privacy (WISP 2009)</em>. Phoenix, AZ.</p>
<p>Fuller, Christie M., Douglas P. Twitchell, and David P. Biros. 2009. “Deception and the Impact of Complexity on a Group Decision Making Task.” In <em>Symposium on Credibility Assessment and Data Quality</em>.</p>
<p>Twitchell, Douglas P. 2009. “Assessing the Credibility of Hackers: A Research Agenda for Advancing the Understanding of Social Engineering Attacks on Information Systems.” In <em>Symposium on Credibility Assessment and Information Quality</em>. Big Island, Hawaii.</p>
<p>Twitchell, Douglas P. 2007. “SecurityCom: A Multi-Player Game for Researching and Teaching Information Security Teams.” In <em>Proceedings of the I Information Security Curriculum Development Conference</em>. Kennesaw, Georgia: ACM Press. doi:<a href="http://doi.org/10.1145/1409908.1409919">10.1145/1409908.1409919</a>.</p>
<p>Twitchell, Douglas P. 2006. “Social Engineering in Information Assurance Curricula.” In <em>Information Security Curriculum Development Conference</em>. Kennesaw, Georgia. doi:<a href="http://doi.org/10.1145/1231047.1231062">10.1145/1231047.1231062</a>.</p>
<p>Fuller, Christie M., David P. Biros, Douglas P. Twitchell, Judee K. Burgoon, and Mark Adkins. 2006. “An Analysis of Text-Based Deception Detection Tools.” In <em>Proceedings of the Twelfth Americas Conference on Information Systems</em>. Acapulco, Mexico. <a href="http://aisel.aisnet.org/amcis2006/418">http://aisel.aisnet.org/amcis2006/418</a>.</p>
<p>Twitchell, Douglas P., David Cox, and Matthew Kuofie. 2006. “Diversification of Personality Type and Systems Security.” In <em>Proceedings of the Fifth Annual Security Conference</em>. Las Vegas, Nevada.</p>
<p>Twitchell, Douglas P. 2006. “Augmenting Detection of Social Engineering Attacks Using Deception Detection Technology.” In <em>International Conference on I-Warfare and Security</em>. Princess Anne, Maryland.</p>
<p>Twitchell, Douglas P., David P. Biros, Mark Adkins, Nicole Forsgren, Judee K. Burgoon, and Jay F. Nunamaker. 2006. “Automated Determination of the Veracity of Interview Statements from People of Interest to an Operational Security Force.” In <em>Proceedings of the 38th Annual Hawaii International Conference on System Sciences</em>, 17.1. Kauai, Hawaii: IEEE Computer Society. doi:<a href="http://doi.org/10.1109/HICSS.2006.70">10.1109/HICSS.2006.70</a>.</p>
<p>Biros, David P., Michael C. Hass, Karl Wiers, Douglas P. Twitchell, Mark Adkins, Judee K. Burgoon, and Jay F. Nunamaker Jr. 2005. “Task Performance Under Deceptive Conditions: Using Military Scenarios in Deception Detection Research.” In <em>Proceedings of the 38th Annual Hawaii International Conference on System Sciences</em>, 22.2. Big Island, Hawaii: IEEE Computer Society. doi:<a href="http://doi.org/10.1109/HICSS.2005.578">10.1109/HICSS.2005.578</a>.</p>
<p>Burgoon, J.K., F. Chen, and D.P. Twitchell. 2005. “Deception and Its Detection Under Synchronous and Asynchronous Computer-Mediated Communication.” In <em>International Communication Association</em>. New York, New York.</p>
<p>Burgoon, Judee, Mark Adkins, John Kruse, Matthew L. Jensen, Thomas Meservy, Douglas P. Twitchell, Amit Deokar, et al. 2005. “An Approach for Intent Identification by Building on Deception Detection.” In <em>Proceedings of the 38th Annual Hawaii International Conference on System Sciences</em>, 21.1. Big Island, Hawaii: IEEE Computer Society. doi:<a href="http://doi.org/10.1109/HICSS.2005.78">10.1109/HICSS.2005.78</a>.</p>
<p>Twitchell, Douglas P., David P. Biros, Nicole Forsgren, Judee K. Burgoon, and Jay F. Nunamaker. 2005. “Assessing the Veracity of Criminal and Detainee Statements: A Study of Real-World Data.” In <em>International Conference on Intelligence Analysis</em>.</p>
<p>Twitchell, Douglas P., Nicole Forsgren, Karl Wiers, Judee K. Burgoon, and Jay F. Nunmaker. 2005. “Detecting Deception in Synchronous Computer-Mediated Communication Using Speech Act Profiling.” In <em>Intelligence and Security Informatics</em>, edited by Paul Kantor, Gheorghe Muresan, Fred Roberts, Daniel D. Zeng, Fei-Yue Wang, Hsinchun Chen, and Ralph C. Merkle, 3495:471–78. Berlin, Heidelberg: Springer Berlin Heidelberg. <a href="http://link.springer.com/10.1007/11427995_45">http://link.springer.com/10.1007/11427995_45</a>.</p>
<p>Twitchell, Douglas P., Karl Wiers, Mark Adkins, Judee K. Burgoon, and Jay F. Nunamaker. 2005. “StrikeCOM: A Multi-Player Online Strategy Game for Researching and Teaching Group Dynamics.” In <em>Proceedings of the 38th Annual Hawaii International Conference on System Sciences</em>, 45.2. Big Island, Hawaii: IEEE Computer Society. doi:<a href="http://doi.org/10.1109/HICSS.2005.566">10.1109/HICSS.2005.566</a>.</p>
<p>Burgoon, Judee K., Mark Adkins, John Kruse, Matthew L. Jensen, Amit Deokar, Douglas P. Twitchell, Shan Lu, Dimitris N. Metaxas, Jay F. Nunamaker, and Robert Younger. 2004. “Moving Toward Intent Detection: A Tool-Based Approach.” In <em>IEEE Conference on Intelligent Transportation Systems</em>. Washington, D.C.: IEEE. doi:<a href="http://doi.org/10.1109/ITSC.2004.1398883">10.1109/ITSC.2004.1398883</a>.</p>
<p>Adkins, Mark, Douglas P. Twitchell, Judee K. Burgoon, and Jay F. Nunamaker. 2004. “Advances in Automated Deception Detection in Text-Based Computer-Mediated Communication.” In <em>SPIE Defense and Security Symposium</em>. Orlando, Florida.</p>
<p>Twitchell, D.P., M.L. Jensen, J.K. Burgoon, and J.F. Nunamaker. 2004. “Detecting Deception in Secondary Screening Interviews Using Linguistic Analysis.” In <em>IEEE Conference on Intelligent Transportation Systems</em>, 118–23. IEEE. doi:<a href="http://doi.org/10.1109/ITSC.2004.1398882">10.1109/ITSC.2004.1398882</a>.</p>
<p>Twitchell, Douglas P., Mark Adkins, Jay F. Nunamaker, Judee K. Burgoon, D. P. Twitchell, M. Adkins, J. F. Nunamake R, and J. K. Burgoon. 2004. “Using Speech Act Theory to Model Conversations for Automated Classification and Retrieval.” In <em>Ninth International Working Conference on the Language Action Perspective on Communication Modeling</em>. New Brunswick, New Jersey. <a href="http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.83.7638">http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.83.7638</a>.</p>
<p>Twitchell, Douglas P., and Jay F. Nunamaker. 2004. “Speech Act Profiling: A Probabilistic Method for Analyzing Persistent Conversations and Their Participants.” In <em>Proceedings of the 37th Annual Hawaii International Conference on System Sciences</em>. Big Island, Hawaii: IEEE Computer Society Press.</p>
<p>Twitchell, Douglas P., Jay F. Nunamaker, and Judee K. Burgoon. 2004. “Using Speech Act Profiling for Deception Detection.” In <em>Intelligence and Security Informatics</em>, edited by Hsinchun Chen, Reagan Moore, Daniel D. Zeng, and John Leavitt, 3073:403–10. Berlin, Heidelberg: Springer Berlin Heidelberg. <a href="http://link.springer.com/10.1007/978-3-540-25952-7_30">http://link.springer.com/10.1007/978-3-540-25952-7_30</a>.</p>
<p>Wiers, Karl, and Douglas P. Twitchell. 2004. “StrikeCOM: A Multi-Player Strategy Game.” In <em>Workshop on Affective Dialogue Systems</em>. Kloster Irsee, Germany.</p>
<p>Zhou, Lina, Judee K. Burgoon, and Douglas P. Twitchell. 2003. “A Longitudinal Analysis of Language Behavior of Deception in E-Mail.” In <em>Intelligence and Security Informatics</em>, edited by Hsinchun Chen, Richard Miranda, Daniel D. Zeng, Chris Demchak, Jenny Schroeder, and Therani Madhusudan, 2665:102–10. Berlin, Heidelberg: Springer Berlin Heidelberg. <a href="http://link.springer.com/10.1007/3-540-44853-5_8">http://link.springer.com/10.1007/3-540-44853-5_8</a>.</p>
<p>Zhou, Lina, Douglas P. Twitchell, Tiantian Qin, Judee K. Burgoon, and Jr Jay F. Nunamaker. 2003. “An Exploratory Study into Deception Detection in Text-Based Computer-Mediated Communication.” In <em>Proceedings of the 36th Annual Hawaii International Conference on System Sciences</em>, 44.2. Big Island, Hawaii: IEEE Computer Society. doi:<a href="http://doi.org/10.1109/HICSS.2003.1173793">10.1109/HICSS.2003.1173793</a>.</p>
<h2 id="peer-reviewed-book-chapters">Peer-Reviewed Book Chapters</h2>
<p>Twitchell, Douglas P. (2008). “Social Engineering and Its Countermeasures.” In M. Gupta &amp; R. Sharman (Eds.), <em>Handbook of Research on Social and Organizational Liabilities in Information Security.</em> Hershey, Pennsylvania: IGI Global</p>
<h2 id="other-book-chapters">Other Book Chapters</h2>
<p>Burgoon, Judee K. , Twitchell, Douglas P., Jensen , Matthew L. , Adkins , Mark, Kruse, John, Deokar, Amit, Lu, Shan, Metaxas, Dimitris N., Nunamaker, Jay F., and Younger, Robert. E. (2007). “Detecting concealment of intent in Transportation screening: A proof‐of‐concept.” In C. Wang et al., (Eds.), <em>Information Security Research: New Methods for Protecting against CyberThreats</em> (pp. 628‐644). Indianapolis , IN : Wiley</p>
<h2 id="technical-reports">Technical Reports</h2>
<p>Biros, David; Twitchell, Douglas P., Marett, Kent; Fuller, Christie. (2008) Human Intelligence Workgroup Report. Credibility Assessment Research Summit sponsored by the U.S. Defense Agency for Credibility Assessment. November 2008.</p>
<p>A Research Agenda for Deception Detection – Authored with many others at the University of Maryland’s Center for Advanced Study of Language Deception Detection Workshop, June 2004</p>
<h2 id="presentations">Presentations</h2>
<p>Interplay of Desktop and Mobile Apps with Web Services in an Introductory Programming Course. <em>2013 Americas Conference on Information Systems</em>. Chicago, Illinois.</p>
<p>CollabSec: A Multi-Player Game for Researching and Teaching Information System Risk Assessment. <em>The Seventh Pre-ICIS Workshop on Information Security and Privacy (WISP 2012)</em>. Orlando, Florida.</p>
<p>Compliance Amid Security Policy Changes: An Empirical Study. In <em>2010 Workshop on Information Security and Privacy (WISP 2010)</em>. St. Louis, MO.</p>
<p>Effects of Education on User Compliance with Security Policies: Ignore or Comply? <em>Workshop on Information Security and Privacy</em>, Phoenix, Arizona, December 2009</p>
<p>Deception and the Impact of Complexity on a Group Decision Making Task. <em>Symposium on Credibility Assessment and Data Quality</em>, HICSS 42. Big Island, Hawaii. January, 2009</p>
<p>Assessing the Credibility of Hackers: A Research Agenda for Advancing the Understanding of Social Engineering Attacks on Information Systems. <em>Symposium on Credibility Assessment and Information Quality</em>, HICSS 42. Big Island, Hawaii. January, 2009</p>
<p>SecurityCom: A multi‐player game for researching and teaching information security teams. <em>The 2007 Information Security Curriculum Development Conference.</em> Kennesaw, Georgia. September, 2007</p>
<p>An Investigation into the Effect of Personality Diversity on the Process and Results of Idea‐ Generating Groups as it Relates to Systems Security, <em>Fifth Annual Security Conference.</em> Las Vegas, Nevada, April, 2007</p>
<p>Social Engineering in Information Assurance Curricula. <em>The 2006 Information Security Curriculum Development Conference.</em> Kennesaw, Georgia. September, 2006</p>
<p>Diversification of Personality Type and Systems Security, <em>Fifth Annual Security Conference.</em> Las Vegas, Nevada, April, 2006</p>
<p>Augmenting Detection of Social Engineering Attacks Using Deception Detection Technology. <em>International Conference on i‐Warfare and Security</em>. University of Maryland Eastern Shore. March, 2006</p>
<p>Detecting Deception in Secondary Screening Interviews Using Linguistic Analysis. <em>IEEE Conference on Intelligent Transportation Systems.</em> Washington, D.C., 2004</p>
<p>Using Speech Act Profiling for Deception Detection. <em>Second Symposium on Intelligence and Security Informatics.</em> Tucson, Arizona. 2004</p>
<p>Using Speech Act Theory to Model Conversations for Automated Classification and Retrieval. <em>Ninth International Working Conference on the Language Action Perspective on Communication Modeling</em>, New Brunswick, New Jersey, 2004</p>
<p>Hands‐on Demonstration of StrikeCom, a Computer‐Mediated Multiplayer Collaborative Game. <em>United States Department of Defense Office of Force Transformation short course on Network Centric Warfare</em>, April 2004, McClean Virginia; July 2004, Monterrey California; September 2004, Münich, Germany; October 2004, Washington, D.C.</p>
<p>Speech Act Profiling: A probabilistic method for analyzing persistent conversations and their participants. <em>Thirty‐Seventh Annual Hawaii International Conference on System Sciences</em>, Big Island, Hawaii, January 2004</p>
<p>Deception Cues in Text‐based Computer‐Mediated Communication. <em>National Science Foundation Industry/University Cooperative Research Center Industry Advisory Board Meeting</em>, October 17, 2002. Tucson, Arizona</p>
<p>Hands‐on Demonstration of StrikeCom, a Computer‐Mediated Multiplayer Collaborative Game. <em>National Science Foundation Industry/University Cooperative Research Center Industry Advisory Board Meeting,</em> October 17, 2002. Tucson, Arizona</p>
<p>Deception Detection in Computer‐Mediated Communication. <em>Air Force Office of Scientific Research Grant Review.</em> May 5, 2002. Tucson, Arizona</p>
<p>Deception Detection Prototype. <em>National Science Foundation Industry/University Cooperative Research Center Industry Advisory Board Meeting,</em> March 14, 2002. Tucson, Arizona</p>
<h1 id="teaching">Teaching</h1>
<hr />
<h2 id="courses-taught">Courses Taught</h2>
<h3 id="boise-state-university-fall-2016-present">Boise State University, Fall 2016 – Present</h3>
<p>ITM 455: Information Security, 1 Section</p>
<h3 id="illinois-state-university-fall-2005-spring-2016">Illinois State University, Fall 2005 – Spring 2016</h3>
<p>IT 164: Introduction to Programming Concepts, 3 section<br />IT 168: Structured Problem Solving Using the computer, 4 sections<br />IT 178: IT Computer Application Programming, 14 sections<br />IT 261: Systems Development 1, 1 section<br />IT 350: Fundamentals of Information Assurance and Security, 12 sections<br />IT 351: Advanced Information Assurance and Applied Cryptography, 14 sections<br />IT 450: Policy and Administration in Information Assurance and Security (Graduate), 5 sections<br />IT 451: Tools and applications in Information Assurance and Security (Graduate), 2 sections</p>
<h3 id="university-of-arizona-fall-2004">University of Arizona, Fall 2004</h3>
<p>Object Oriented Programming, 1 section</p>
<h3 id="brigham-young-university-fall-1998">Brigham Young University, Fall 1998</h3>
<p>Object Oriented Programming, 1 section</p>
<h2 id="teaching-awards">Teaching Awards</h2>
<p>Illinois State University <em>Impact Award</em>. Spring 2013</p>
<p>School of Information Technology <em>Sophomore Favorite Faculty Member</em>. Spring 2013</p>
<h2 id="other-significant-teaching-activities">Other Significant Teaching Activities</h2>
<p>Advised teams that competed in the Illinois Collegiate Cyber Defense Competitions in 2007, 2008, 2009, 2010, 2011, 2012, 2013, and 2014</p>
<p>Lead Building of cloud‐based remote lab capabilities using VMWare ESX Server, VMWare vCenter Server, and VMWare Lab Manager. These have been used for remote lab assignments in IT 350, 351, and several projects</p>
<p>Created a Web Application Security Curriculum that was shared with Heartland Community College (2008)</p>
<p>Lead efforts to certify Illinois State University’s IT Curriculum under the National Security Agency’s Information Assurance Courseware Evaluation program (CNSS 4011 and 4013) (2006)</p>
<p>Created four new courses, significantly revised four courses, created a new major and a new sequence in a major</p>
<p>Searved as committee chair for six Master’s theses, as committee member for six Master’s theses, as committee chair for eight Master’s projects, and as committee member for three Master’s projects</p>
<p>Directed eight independent studies</p>
<h1 id="service">Service</h1>
<hr />
<h2 id="university-service">University Service</h2>
<p>Learning Technology Advisory Group (2016 - Present)</p>
<p>Illinois State University 9.8 Policy Committee (2012 - 2016). This Committee, headed by the university Chief Information Security Officer, creates, revises, and maintains university policy and procedure concerning information Security</p>
<h2 id="college-service">College Service</h2>
<p>College of Applied Science and Technology Council, August, 2012 – May, 2015</p>
<h2 id="department-service">Department Service</h2>
<p>Graduate Coordinator, August 2015 - July 2016<br />Administrative Council, August 2015 - July 2016<br />School Faculty Status Committee, 2012 – July 2016<br />Curriculum Committee, 2009 – 2012, 2014 - Present (Interim Chair, Fall 2014)<br />IT Director Search Committee, Attendee, August 2013 - April 2014<br />New faculty mentor for David Sikolia, Faculty Mentor, August 2013 - May 2014<br />Phi Kappa Psi, Faculty Advisor, September 2012 – September 2013<br />New Faculty Search Committee, August 2012 – February 2013<br />Assessment Committee Chair, 2009 – 2014<br />Graduate Program Committee, 2007 – 2008<br />Information Systems Search Committee, 2006, 2012</p>
<h2 id="affiliations">Affiliations</h2>
<p>Member, Association for Information Systems</p>
<h2 id="significant-service-activities">Significant Service Activities</h2>
<p>Helped organized and lead the first State Farm/Illinois State University <em>Capture the Flag Event</em> (2015)</p>
<p>Organized and lead the <em>Central Illinois High School Cyber Defense Competition</em> . This event brings high school students from around Central Illinois to ISU to compete in a competition that requires them to defend a network of computers against attack. (2012, 2013, 2014, and 2015)</p>
<p>Lead the School’s successful application to renew its status as a Center of Academic Excellence in Information Assurance and Cyber Defense (2014)</p>
<p>Wrote ABET accreditation reports for Information Systems (2010, 2012, and 2014)</p>
<p>Wrote the Program Review Self-Study for Information Systems (2014)</p>
<p>Coordinated efforts to obtain $286,000 in information security equipment and software licenses from Trustwave, Inc. for use in classroom instruction and research (2010)</p>
<p>Completed application for Illinois State University’s designation as a National Security Agency/Department of Homeland Security Center of Academic Excellence in Information Assurance Education. Application was accepted. (2009)</p>
<p>Completed application for Illinois State University’s designation as a National Security Agency/Department of Homeland Security Center of Academic Excellence in Information Assurance Education. Application was rejected. (2006)</p>
<p>Created and served as director of the Center for Information Assurance and Security Education (2006 – Present)</p>
<p>Featured or quoted in 16 news stories</p>
<p>Performed numerous peer reviews, served as minitrack co-chair for AMCIS, and served on the program board for the International Conference on i-Warfare</p>
</body>
</html>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment