Skip to main content

Kane Smith

Title: Assistant Professor

Department: Information Technology and Decision Sciences

College: College of Business

Curriculum Vitae

Curriculum Vitae Link

Education

  • PhD, Virginia Commonwealth University, 2018
    Major: Business - Information Systems
    Specialization: Cybersecurity
    Dissertation: A Multi-Objective Framework For Public Policy Decisions: The Case of Health Informatics
  • MS, Virginia Commonwealth University, 2015
    Major: Business - Information Systems

Current Scheduled Teaching

BCIS 4610.001Analysis of Business Information SystemsSpring 2025
BCIS 5750.001Blockchain for BusinessSpring 2025
BCIS 4610.002Analysis of Business Information SystemsFall 2024 Syllabus
BCIS 5750.001Blockchain for BusinessFall 2024

Previous Scheduled Teaching

BCIS 5750.001Blockchain for BusinessSpring 2024 Syllabus SPOT
BCIS 5630.001Information Technology SecuritySpring 2024 Syllabus SPOT
BCIS 4610.002Analysis of Business Information SystemsFall 2023 Syllabus SPOT
BCIS 5630.003Information Technology SecurityFall 2023 SPOT
BCIS 4610.001Analysis of Business Information SystemsSpring 2023 Syllabus SPOT
BCIS 5630.001Information Technology SecuritySpring 2023 SPOT
BCIS 4610.002Analysis of Business Information SystemsFall 2022 Syllabus SPOT
BCIS 5120.003Information Systems DevelopmentFall 2022 SPOT
BCIS 5120.004Information Systems DevelopmentFall 2022 SPOT

Published Intellectual Contributions

    Book Chapter

  • Dhillon, G.S., Smith, K., Hedstr\"om, Karin. (2019). Ensuring Core Competencies for Cybersecurity Specialists. Cybersecurity Education for Awareness and Compliance. 121--133. IGI Global.
  • Smith, K., Dhillon, G.S. (2019). Supply chain virtualization: Facilitating agent trust utilizing blockchain technology. Revisiting Supply Chain Risk. 299--311. Springer, Cham.
  • Journal Article

  • Smith, K. (2023). Bad Employees: Examining Deviant Security Behaviors. Journal of Computer Information Systems. 1-14. Taylor & Francis. https://doi.org/10.1080/08874417.2023.2175336
  • Smith, K., Dhillon, G.S. (2023). Re-framing the policy conversation for preventing cyberstalking. Other. Emerald Publishing Limited.
  • Smith, K. (2023). Wealth effects of firm's strategic technology investments: evidence from Ethereum blockchain. Internet Research.
  • Smith, K., Dhillon, G.S. (2023). Re-framing the policy conversation for preventing cyberstalking. Internet Research. 33 (1) 84-123. https://api.elsevier.com/content/abstract/scopus_id/85130914915
  • Smith, K., Dhillon, G.S., Otoo, B.A. (2022). iGen user (over) attachment to social media: reframing the policy intervention conversation. Information Systems Frontiers. 1--18. Springer US.
  • Soh, F., Smith, K., Dhillon, G.S., others. (2022). The Relationship between Social Capital and Social Media Addiction: The Role of Privacy Self-Efficacy. Other. 26 Australian Computer Society.
  • Smith, K., Dhillon, G.S., Otoo, B.A. (2022). iGen User (over) Attachment to Social Media: Reframing the Policy Intervention Conversation. Information Systems Frontiers. 24 (6) 1989-2006. https://api.elsevier.com/content/abstract/scopus_id/85119658977
  • Dhillon, G.S., Smith, K., Dissanayaka, I. (2021). Information systems security research agenda: Exploring the gap between research and practice. Other. 30 (4) 101693. North-Holland.
  • Smith, K., Dhillon, G.S., Carter, L. (2021). User values and the development of a cybersecurity public policy for the IoT. International Journal of Information Management. 56 102123. Pergamon.
  • Smith, K., Dhillon, G.S. (2019). Assessing Blockchain Potential for Improving the Cybersecurity of Financial Transactions. Managerial Finance. Emerald Publishing Limited.
  • Coss, D.L., Smith, K., Foster, J., Dhillon, S. (2019). Big Data in Auditing: A Value-Focused Approach to Cybersecurity Management.. Journal of Information System Security. 15 (2)
  • Dhillon, G.S., Smith, K. (2019). Defining Objectives for Preventing Cyberstalking. Journal of Business Ethics. 157 (1) 137--158. Springer Netherlands.
  • Smith, K., Dhillon, G.S., Hedstr\"om, Karin. (2018). Reconciling Value-based Objectives for Security & Identity Management. Other. 26 (2) 194--212. Emerald Publishing Limited.
  • Review, Journal

  • Dhillon, G.S., Smith, K., Dissanayaka, I. (2021). Information systems security research agenda: Exploring the gap between research and practice. Journal of Strategic Information Systems. 30 (4) https://api.elsevier.com/content/abstract/scopus_id/85116553374
,
Overall
Summative Rating
Challenge and
Engagement Index
Response Rate

out of 5

out of 7
%
of
students responded
  • Overall Summative Rating (median):
    This rating represents the combined responses of students to the four global summative items and is presented to provide an overall index of the class’s quality. Overall summative statements include the following (response options include a Likert scale ranging from 5 = Excellent, 3 = Good, and 1= Very poor):
    • The course as a whole was
    • The course content was
    • The instructor’s contribution to the course was
    • The instructor’s effectiveness in teaching the subject matter was
  • Challenge and Engagement Index:
    This rating combines student responses to several SPOT items relating to how academically challenging students found the course to be and how engaged they were. Challenge and Engagement Index items include the following (response options include a Likert scale ranging from 7 = Much higher, 4 = Average, and 1 = Much lower):
    • Do you expect your grade in this course to be
    • The intellectual challenge presented was
    • The amount of effort you put into this course was
    • The amount of effort to succeed in this course was
    • Your involvement in course (doing assignments, attending classes, etc.) was
CLOSE