Faculty Profile

Kane Smith

Title
Assistant Professor
Department
Information Technology and Decision Sciences
College
College of Business

    

Education

PhD, Virginia Commonwealth University, 2018.
Major: Business - Information Systems
Degree Specialization: Cybersecurity
Dissertation Title: A Multi-Objective Framework For Public Policy Decisions: The Case of Health Informatics
MS, Virginia Commonwealth University, 2015.
Major: Business - Information Systems

Current Scheduled Teaching*

BCIS 5750.001, Blockchain for Business, Spring 2024 Syllabus
BCIS 5630.001, Information Technology Security, Spring 2024 Syllabus

* Texas Education Code 51.974 (HB 2504) requires each institution of higher education to make available to the public, a syllabus for undergraduate lecture courses offered for credit by the institution.

Previous Scheduled Teaching*

BCIS 4610.002, Analysis of Business Information Systems, Fall 2023 Syllabus SPOT
BCIS 5630.003, Information Technology Security, Fall 2023 Syllabus SPOT
BCIS 4610.001, Analysis of Business Information Systems, Spring 2023 Syllabus SPOT
BCIS 5630.001, Information Technology Security, Spring 2023 Syllabus SPOT
BCIS 4610.002, Analysis of Business Information Systems, Fall 2022 Syllabus SPOT
BCIS 5120.003, Information Systems Development, Fall 2022 Syllabus SPOT
BCIS 5120.004, Information Systems Development, Fall 2022 Syllabus SPOT

* Texas Education Code 51.974 (HB 2504) requires each institution of higher education to make available to the public, a syllabus for undergraduate lecture courses offered for credit by the institution.

Published Publications

Published Intellectual Contributions

Book Chapter
Dhillon, G. S., Smith, K., Hedstr\"om, Karin, (2019). Ensuring Core Competencies for Cybersecurity Specialists. Cybersecurity Education for Awareness and Compliance. 121--133. IGI Global.
Smith, K., Dhillon, G. S. (2019). Supply chain virtualization: Facilitating agent trust utilizing blockchain technology. Revisiting Supply Chain Risk. 299--311. Springer, Cham.
Journal Article
Smith, K. (2023). Bad Employees: Examining Deviant Security Behaviors. Journal of Computer Information Systems. 1-14. Taylor & Francis. https://doi.org/10.1080/08874417.2023.2175336
Smith, K., Dhillon, G. S. (2023). Re-framing the policy conversation for preventing cyberstalking. Other. Emerald Publishing Limited.
Smith, K. (2023). Wealth effects of firm's strategic technology investments: evidence from Ethereum blockchain. Internet Research.
Smith, K., Dhillon, G. S. (2023). Re-framing the policy conversation for preventing cyberstalking. Internet Research. 33(1), 84-123. https://api.elsevier.com/content/abstract/scopus_id/85130914915
Smith, K., Dhillon, G. S., Otoo, B. A. (2022). iGen user (over) attachment to social media: reframing the policy intervention conversation. Information Systems Frontiers. 1--18. Springer US.
Soh, F., Smith, K., Dhillon, G. S., others, (2022). The Relationship between Social Capital and Social Media Addiction: The Role of Privacy Self-Efficacy. Other. 26, . Australian Computer Society.
Smith, K., Dhillon, G. S., Otoo, B. A. (2022). iGen User (over) Attachment to Social Media: Reframing the Policy Intervention Conversation. Information Systems Frontiers. 24(6), 1989-2006. https://api.elsevier.com/content/abstract/scopus_id/85119658977
Dhillon, G. S., Smith, K., Dissanayaka, I. (2021). Information systems security research agenda: Exploring the gap between research and practice. Other. 30(4), 101693. North-Holland.
Smith, K., Dhillon, G. S., Carter, L. (2021). User values and the development of a cybersecurity public policy for the IoT. International Journal of Information Management. 56, 102123. Pergamon.
Smith, K., Dhillon, G. S. (2019). Assessing Blockchain Potential for Improving the Cybersecurity of Financial Transactions. Managerial Finance. Emerald Publishing Limited.
Coss, D. L., Smith, K., Foster, J., Dhillon, S. (2019). Big Data in Auditing: A Value-Focused Approach to Cybersecurity Management.. Journal of Information System Security. 15(2), .
Dhillon, G. S., Smith, K. (2019). Defining Objectives for Preventing Cyberstalking. Journal of Business Ethics. 157(1), 137--158. Springer Netherlands.
Smith, K., Dhillon, G. S., Hedstr\"om, Karin, (2018). Reconciling Value-based Objectives for Security & Identity Management. Other. 26(2), 194--212. Emerald Publishing Limited.
Review, Journal
Dhillon, G. S., Smith, K., Dissanayaka, I. (2021). Information systems security research agenda: Exploring the gap between research and practice. Journal of Strategic Information Systems. 30(4), . https://api.elsevier.com/content/abstract/scopus_id/85116553374
,
Overall
Summative Rating
Challenge and
Engagement Index
Response Rate

out of 5

out of 7
%
of
students responded
  • Overall Summative Rating (median):
    This rating represents the combined responses of students to the four global summative items and is presented to provide an overall index of the class’s quality. Overall summative statements include the following (response options include a Likert scale ranging from 5 = Excellent, 3 = Good, and 1= Very poor):
    • The course as a whole was
    • The course content was
    • The instructor’s contribution to the course was
    • The instructor’s effectiveness in teaching the subject matter was
  • Challenge and Engagement Index:
    This rating combines student responses to several SPOT items relating to how academically challenging students found the course to be and how engaged they were. Challenge and Engagement Index items include the following (response options include a Likert scale ranging from 7 = Much higher, 4 = Average, and 1 = Much lower):
    • Do you expect your grade in this course to be
    • The intellectual challenge presented was
    • The amount of effort you put into this course was
    • The amount of effort to succeed in this course was
    • Your involvement in course (doing assignments, attending classes, etc.) was
CLOSE