Curriculum Vitae
Curriculum Vitae Link
Education
-
PhD, Virginia Commonwealth University, 2018
Major: Business - Information Systems
Specialization: Cybersecurity
Dissertation: A Multi-Objective Framework For Public Policy Decisions: The Case of Health Informatics
-
MS, Virginia Commonwealth University, 2015
Major: Business - Information Systems
Current Scheduled Teaching
BCIS 4610.002 | Analysis of Business Information Systems | Fall 2024 |
Syllabus
|
|
BCIS 5750.001 | Blockchain for Business | Fall 2024 |
|
|
Texas Education Code 51.974 (HB 2504) requires each institution of higher education to make available to the public, a syllabus for undergraduate lecture courses offered for credit by the institution.
Previous Scheduled Teaching
BCIS 5750.001 | Blockchain for Business | Spring 2024 |
Syllabus
|
SPOT
|
BCIS 5630.001 | Information Technology Security | Spring 2024 |
Syllabus
|
SPOT
|
BCIS 4610.002 | Analysis of Business Information Systems | Fall 2023 |
Syllabus
|
SPOT
|
BCIS 5630.003 | Information Technology Security | Fall 2023 |
|
SPOT
|
BCIS 4610.001 | Analysis of Business Information Systems | Spring 2023 |
Syllabus
|
SPOT
|
BCIS 5630.001 | Information Technology Security | Spring 2023 |
|
SPOT
|
BCIS 4610.002 | Analysis of Business Information Systems | Fall 2022 |
Syllabus
|
SPOT
|
BCIS 5120.003 | Information Systems Development | Fall 2022 |
|
SPOT
|
BCIS 5120.004 | Information Systems Development | Fall 2022 |
|
SPOT
|
Texas Education Code 51.974 (HB 2504) requires each institution of higher education to make available to the public, a syllabus for undergraduate lecture courses offered for credit by the institution.
Published Intellectual Contributions
- Dhillon, G.S., Smith, K., Hedstr\"om, Karin. (2019). Ensuring Core Competencies for Cybersecurity Specialists. Cybersecurity Education for Awareness and Compliance. 121--133. IGI Global.
- Smith, K., Dhillon, G.S. (2019). Supply chain virtualization: Facilitating agent trust utilizing blockchain technology. Revisiting Supply Chain Risk. 299--311. Springer, Cham.
- Smith, K. (2023). Bad Employees: Examining Deviant Security Behaviors. Journal of Computer Information Systems. 1-14. Taylor & Francis. https://doi.org/10.1080/08874417.2023.2175336
- Smith, K., Dhillon, G.S. (2023). Re-framing the policy conversation for preventing cyberstalking. Other. Emerald Publishing Limited.
- Smith, K. (2023). Wealth effects of firm's strategic technology investments: evidence from Ethereum blockchain. Internet Research.
- Smith, K., Dhillon, G.S. (2023). Re-framing the policy conversation for preventing cyberstalking. Internet Research. 33 (1) 84-123. https://api.elsevier.com/content/abstract/scopus_id/85130914915
- Smith, K., Dhillon, G.S., Otoo, B.A. (2022). iGen user (over) attachment to social media: reframing the policy intervention conversation. Information Systems Frontiers. 1--18. Springer US.
- Soh, F., Smith, K., Dhillon, G.S., others. (2022). The Relationship between Social Capital and Social Media Addiction: The Role of Privacy Self-Efficacy. Other. 26 Australian Computer Society.
- Smith, K., Dhillon, G.S., Otoo, B.A. (2022). iGen User (over) Attachment to Social Media: Reframing the Policy Intervention Conversation. Information Systems Frontiers. 24 (6) 1989-2006. https://api.elsevier.com/content/abstract/scopus_id/85119658977
- Dhillon, G.S., Smith, K., Dissanayaka, I. (2021). Information systems security research agenda: Exploring the gap between research and practice. Other. 30 (4) 101693. North-Holland.
- Smith, K., Dhillon, G.S., Carter, L. (2021). User values and the development of a cybersecurity public policy for the IoT. International Journal of Information Management. 56 102123. Pergamon.
- Smith, K., Dhillon, G.S. (2019). Assessing Blockchain Potential for Improving the Cybersecurity of Financial Transactions. Managerial Finance. Emerald Publishing Limited.
- Coss, D.L., Smith, K., Foster, J., Dhillon, S. (2019). Big Data in Auditing: A Value-Focused Approach to Cybersecurity Management.. Journal of Information System Security. 15 (2)
- Dhillon, G.S., Smith, K. (2019). Defining Objectives for Preventing Cyberstalking. Journal of Business Ethics. 157 (1) 137--158. Springer Netherlands.
- Smith, K., Dhillon, G.S., Hedstr\"om, Karin. (2018). Reconciling Value-based Objectives for Security & Identity Management. Other. 26 (2) 194--212. Emerald Publishing Limited.
- Dhillon, G.S., Smith, K., Dissanayaka, I. (2021). Information systems security research agenda: Exploring the gap between research and practice. Journal of Strategic Information Systems. 30 (4) https://api.elsevier.com/content/abstract/scopus_id/85116553374