randall j. boyle · collaboration: emerging trends and applications. hershey: igi global (isbn-13:...

Post on 14-Jul-2020

0 Views

Category:

Documents

0 Downloads

Preview:

Click to see full reader

TRANSCRIPT

RANDALLJ.BOYLEAssociateProfessorDept.ofBusinessAdministrationGoddardSchoolofBusiness&EconomicsWeberStateUniversity1337EdvalsonSt.,Dept.3801Ogden,UT84408

E-mail:RandyBoyle@Weber.eduPhone:801-626-7831Office:Wattis282LinkedIn:https://www.linkedin.com/in/randallboyle

EDUCATION

Ph.D.,2003,ManagementofInformationSystems,FloridaStateUniversity,Tallahassee,FL.Dissertation:DispersedDeception:Anexaminationoftheimpactsofcomputermediation,proximity,andfamiliarityontruthbias

Master’sinPublicAdministration,2000,BrighamYoungUniversity,Provo,UT. Dean’sList,GPA3.89of4.00B.S.BusinessFinance,1998,BrighamYoungUniversity,Provo,UT.A.A.GeneralEducation,1996,WeberStateUniversity,Ogden,UT.

RESEARCHACTIVITIES

REFEREEDPUBLICATIONS1. Boyle,R.,Clements,J.,andProudfoot,J.,(2017).MeasuringDeception:ALookatAntecedentsto

DeceptiveIntent(ForthcomingatAmericanJournalofPsychology).2. Boyle,R.,Chandrashekar,D.,andClements,J.,(2017)ValuingInformationSecurity:ALookatthe

influenceofuserengagementoninformationsecurityvaluations,JournalofInformationPrivacyandSecurity,13:3,137-156.

3. Proudfoot,J.,Boyle,R.,Schuetzler,R.,(2016).Manvs.machine:Investigatingtheeffectsofadversarialsystemuseonend-userbehaviorinautomateddeceptiondetectioninterviews,DecisionSupportSystems,85:23-33.

4. Clements,J.,Boyle,R.,andProudfoot,J.,(2016).Exploringpoliticalskillanddeception.InternationalJournalofSociologyandSocialPolicy36(3/4):138-156.

5. McDonald,D.,Boyle,R.,Anderson,J.,(2016).WhenDeceitfulChatsLookTruthful.JournalofComputerInformationSystems,56(4):331-340.

6. Boyle,R.,C.Kacmar,J.George(2010)ElectronicDeception:HowProximity,Computer-mediation,andtheTruthBiasmayInfluenceDeceptiveMessages.InInterdisciplinaryPerspectivesonE-Collaboration:EmergingTrendsandApplications.Hershey:IGIGlobal(ISBN-13:978-1615206766).

7. Boyle,R.,C.Kacmar,J.George(2009)DistributedDeception:AnInvestigationoftheEffectivenessofDeceptiveCommunicationinaComputer-mediatedEnvironment.InP.Zaphiris&C.S.Ang(Eds.),HumanComputerInteraction:Concepts,Methodologies,Tools,andApplications(1970-1994).Hershey:IGIGlobal.

8. Boyle,R.,C.Kacmar,J.George(2008)DistributedDeception:AnInvestigationoftheEffectivenessofDeceptiveCommunicationinaComputer-mediatedEnvironment.InternationalJournalofE-Collaboration4(3):14-39.(PaperoftheYear)

2

9. Boyle,R.,Ruppel,C.(2006).On-linePurchasingIntent:TheEffectofPersonalInnovativeness,PerceivedRisk,andComputerSelf-Efficacy.JournalofInternationalTechnologyandInformationManagement15(2):61-74.

10. Thatcher,J.B.,LeeP.Stepina,RandallJ.Boyle(2003).TurnoverofInformationTechnologyWorkers:ExaminingEmpiricallytheInfluenceofAttitudes,JobCharacteristics,andExternalMarkets.JournalofManagementInformationSystems19(3):231-261.

REFEREEDCONFERENCEPAPERS1. Reed,D.,andBoyle,R.,(2017).TheSocialValueofAmendingtheComputerFraudandAbuseAct

andtheElectronicCommunicationsPrivacyAct.PacificSouthwestAcademyofLegalStudiesinBusiness2017AnnualConference,PalmSprings,CA.

2. McDonald,D.,Boyle,R.,andAnderson,J.,(2014).UsinganSOMtoVisualizeDeceptiveChatContent.InternationalAssociationforComputerInformationSystems,LasVegas,NV.

3. Proudfoot,J.,Boyle,R.,Clements,J.,(2013).MitigatingThreatstoCollaborationandCMC:IdentifyingAntecedentsofOnlineDeviance.HawaiiInternationalConferenceonSystemSciences,Waikoloa,HI.

4. Boyle,R.,Clements,J.,Proudfoot,J.,(2012).PredictingDeceptiveBehavior:Exploringantecedentstodeceptivebehaviors.NationalCommunicationAssociation98thAnnualConference,Orlando,FL.

5. Boyle,R.,Ruppel,C.,(2005).TheImpactofMediaRichness,Suspicion,andTruthBiasonDeceptionDetection.HawaiiInternationalConferenceonSystemSciences,Waikoloa,HI.

6. Boyle,R.,Ruppel,C.,(2004).On-linePurchasingIntent:TheEffectofPersonalInnovativeness,PerceivedRisk,andComputerSelf-Efficacy.IntheProceedingsoftheAnnualMeetingoftheSouthernAssociationforInformationSystems,Savannah,GA.

7. Boyle,R.,DeWitt,T.,(2002).Trust:HowM.A.N.InfluencesOnlineTransactions.IntheProceedingsoftheAmericanMarketingAssociationWinter2002EducatorsConference,Austin,TX.

8. Boyle,R.,Thatcher,J.,(2001).OrganizationalCommitmentandITworkers:AConceptualModel.IntheProceedingsoftheAnnualMeetingoftheSouthernAssociationforInformationSystems,Savannah,GA.

CURRENTRESEARCHPAPERS 1. Boyle,R.,andClements,J.,(2017).CompulsiveUseofMobileApplications(underreviewatJournal

oftheAssociationforInformationSystems).2. Proudfoot,J.,Boyle,R.,andClements,J.,(2017).OnlineAnti-SocialBehaviors:Anexaminationof

contributingfactorstocyberbullying(TargetedforInformationSystemsResearch).3. King,S.,Clements,J.,Boyle,R.,andNoack,D.,(2017).TheImpactofBrandSelfPerceptionson

habitualISuse(targetedfortheJournalofMarketing).4. Noack,D.,Boyle,R.,Clements,J.,andKing,S.,(2017).InnovativeHabits:Alookattheimpactof

innovativenessonhabitualISuseandindividualonlinepurchasingintent.5. Clements,J.,Boyle,R.,Noack,D.,andKing,S.,(2017).SinkingHabits:Alookattheimpactofsunk

costsonautomaticISuse(targetedforJAIS).6. Reed,D.,andBoyle,R.,(2017).TheSocialValueofAmendingtheComputerFraudandAbuseAct

andtheElectronicCommunicationsPrivacyAct(TargetedforUtahLawReview).7. Boyle,R.,(2017)BotPurge:Alookathowfraudulentaccountsmayimpactpublicvaluations.

3

8. Boyle,R.,Proudfoot,J.,(2018).CrossPollination:Theeffectsofcross-siteuseraccountsonaccountsecurity.(TargetedforInformationSystemsResearch.)

9. Boyle,R.,Proudfoot,J.,(2018).AdaptiveManglingRules:Acomparisonofpasswordsources,structures,andstrength.(TargetingIEEETransactions)

BOOKS1. Kroenke,D.,Boyle,R.,(2018)ExperiencingMIS(8thedition).NewJersey:Pearson.(ISBN:TBD).2. Kroenke,D.,Boyle,R.,(2017)UsingMIS(10thedition).NewJersey:Pearson.(ISBN:978-

0134606996).3. Kroenke,D.,Boyle,R.,(2016)UsingMIS(9thedition).NewJersey:Pearson.(ISBN:978-0134106786).4. Kroenke,D.,Boyle,R.,(2016)ExperiencingMIS(7thedition).NewJersey:Pearson.(ISBN:978-

0134319063).5. Kroenke,D.,Boyle,R.,(2015)UsingMIS(8thedition).NewJersey:Pearson.(ISBN:978-0133919868).6. Kroenke,D.,Boyle,R.,(2015)ExperiencingMIS(6thedition).NewJersey:Pearson.(ISBN:978-

0133939132).7. Boyle,R.,Panko,R.,(2014)CorporateComputerSecurity(4thedition).NewJersey:Pearson.(ISBN:

978-0133545197).8. Boyle,R.,Proudfoot,J.,(2014).AppliedInformationSecurityLabs:AHands-onApproach(2nd

edition).NewJersey:Pearson.(ISBN:978-0133547436).9. Boyle,R.,Clements,J.,(2014).AppliedNetworkingLabs:AHands-onGuidetoNetworkingandServer

Management(2ndedition).NewJersey:Pearson.(ISBN:978-0133545180).10. Boyle,R.,Panko,R.,(2012)CorporateComputerSecurity(3rdedition).NewJersey:Pearson(ISBN:

0132145359).11. Boyle,R.,(2012).AppliedNetworkingLabs:AHands-onGuidetoNetworkingandServer

Management(��������,farHongliang,Trans.).Beijing,China:TsinghuaUniversity

Press(Originalworkpublished2011).(ISBN:9787302267560).12. Boyle,R.,(2011).AppliedNetworkingLabs:AHands-onGuidetoNetworkingandServer

Management.NewJersey:Pearson.(ISBN:0132310341).13. Boyle,R.,(2010).AppliedInformationSecurity:AHands-onApproach.NewJersey:Pearson.(ISBN:

0136122035).

BOOKSINPROCESS 1. Kroenke,D.,Boyle,R.,(2019)UsingMIS(11thedition).NewJersey:Pearson.(ISBN:TBD).2. Kroenke,D.,Boyle,R.,(2018)ExperiencingMIS(6thedition).ChinesetranslationinTaiwan(Original

workpublished2015).NewJersey:Pearson.(ISBN:TBD).3. Kroenke,D.,Boyle,R.,(2019)ExperiencingMIS(7thedition).Koreantranslation(Originalwork

published2016).NewJersey:Pearson.(ISBN:TBD).4. Boyle,R.,(2018).AppliedManagementInformationSystems:AHands-onGuide(1stedition).5. Boyle,R.,Proudfoot,J.,(2018).AppliedInformationSecurityLabs:AHands-onApproach(3rd

edition).6. Boyle,R.,Clements,J.,(2018).AppliedNetworkingLabs:AHands-onGuidetoNetworkingandServer

Management(3rdedition).

OTHERREVIEWEDPUBLICATIONS1. Boyle,R.,(2017).InstructorslidedeckforExperiencingMIS(8thedition).NewJersey:Pearson.

4

2. Boyle,R.,(2017).Instructor'smanual,studyguide,slidedeck,andtestbankforUsingMIS(10thedition).NewJersey:Pearson.

3. Boyle,R.,andPanko,R.,(2014).Instructor'smanual,studyguide,slidedeck,andtestbankforCorporateComputerSecurity(4rdedition).NewJersey:Pearson.

4. Boyle,R.,(2013,Spring).ANewWaytoSteal.LongwoodMagazine,pp.48.5. Boyle,R.,Panko,R.,(2012).Instructor'smanual,studyguide,slidedeck,andtestbankforCorporate

ComputerSecurity(3rdedition).NewJersey:Pearson.

ACADEMICACTIVITIES

DIRECTEDPROJECTS 1. AdvancedNetworkAdministration(2017)2. EnterpriseDataBreaches(2016)3. EnterpriseSurveillanceSystemImplementation(2012)4. MicrosoftSharePointImplementation(2011)5. ProprietaryIDSImplementation(2011)6. BorderManagementandProxies(2011)7. GreenGridComputing(2010)8. Anti-FraudSystems(2010)

ACADEMICPROGRAMDEVELOPMENT1. CoordinatedcurriculumchangesfortheInformationSystems&TechnologycoursesatTheGoddard

SchoolofBusinessandEconomics(2017/2018).2. CoordinatedandmanagedmajorcurriculumchangesfortheInformationSystems&TechnologyAS,

BS,andBISdegreesatTheGoddardSchoolofBusinessandEconomics(2015/2016).Newcourseswereadded/developed,curriculummapwasreworked,prerequisiteschangedonmostclasses,andallchangesweremanagedthroughvariouscommittees.

3. ManagedasummerITinternshipprogrambetweenLongwoodUniversityandCarnegieMellonUniversity’sITLab(#1nationally)from2013to2015.Allstudentswereofferedroom,board,tuition,airfare,astipend,andasubstantialtuitionscholarshiptowardtheirMastersofScienceinInformationSystemsdegreeatCarnegieMellonUniversity.

4. Designed,created,configured,andmanagedacloud-basedvirtualizedcomputingenvironmentforCyberSecuritytraining.Deployedamulti-OStrainingenvironmentincludingMicrosoftWindows7,MicrosoftWindows8,MicrosoftServer2008,MicrosoftServer2012,Ubuntu,Mint,Fedora,OpenSUSE,BackTrack(KaliLinux),andCentOS.Deployedhundredsofsecurevirtualmachinesforuniversityandacademicuse.Configuredvirtualnetworks,internalandexternalfirewalls,intrusiondetectionsystems,UPS,NAS,applicationfiltering,andinlineantivirusscanning.

5. Coordinated,developed,andmanagedMSISOrientationforinauguralclass.6. Launchednewgraduateprogram(MasterofScienceinInformationSystems)with50+studentsin

theinauguralclass.DevelopedandmanagedMSISprogram.7. Omniture(AdobeCorp.)WebAnalyticsCompetition(2009,2010).Initiated,coordinated,and

managedtheinauguralOWACeventattheUniversityofUtah.8. WorkedtoestablishaMasterofInformationSystems(MSIS)degreeprogramattheUniversityof

Utah.DesignedallcoursesandcontentintheSecuritytrackincludingITForensicsandNetworkDefense.CompletedFall2007.

5

9. EstablishedtheMSDNAcademicAlliance(MSDNAA)programattheU.ofUtah,Spring2007.10. DevelopedandimplementedaTelecommunications/SecurityLab(2004).Provides1)hands-on

trainingforallcoreMicrosoftCertifiedSystemsEngineer(MCSE)exams2)complexnetworksimulations(OPNET),3)Linuxtutorials,and4)34hands-onsecurityexercises.

11. GridComputingImplementation.PlannedSummer2004andcompletedFall2004.ProvideshighcapacitycomputingpowertosolvecomplexresearchproblemsputforthbyUAHresearchers.

12. DevelopGraduateInformationAssuranceCertificateprogramatUAH.PlannedSummer2004,CompletedFall2004.

TEACHINGEXPERIENCE1. DecisionSupportSystems,ISM4117,FSU(SU2001,SU2002)(newprep).2. InformationSystemsAnalysisandDesign,ISM4030,FSU(FA2002)(newprep).3. NetworkingandTelecommunications,ISM4220,FSU(SP2003)(newprep).4. NetworkingandTelecommunications,MIS460/MIS560,UAH(FA2003,SP2004,FA2004,SP2005).5. WebServers,MIS465/MIS565,UAH(FA2003)(newprep).6. NetworkSecurity,MIS660,UAH(SP2004,SP2005)(newprep).7. InformationSystemsinOrganizations,MIS301,UAH(FA2004,SP2005).8. IntroductiontoInformationSystems,IS4410,U.ofUtah(FA2005,SP2006,FA2006,SP2007,FA

2007,SP2008,FA2008,SP2009,FA2009,FA2010,SP2011).9. ITSecurity,IS4470,U.ofUtah(SP2006,FA2006,SP2007,FA2007,SP2008,FA2008,SP2009,FA

2009,SP2010,FA2010,SP2011).10. AdvancedITSecurity,IS5910,U.ofUtah(SP2007).11. ComputerSecurity,ACCTG6520,U.ofUtah(SP2007,SP2008,FA2008).12. Networks&Servers,IS4440,U.ofUtah(FA2008,SP2009,FA2009,SP2010,FA2010,SP2011).13. ITSecurity,IS6570,U.ofUtah(FA2009,SP2010,FA2010,SP2011).14. PrinciplesofIS,ISYS370,LongwoodUniversity(FA2012,SP2013,FA2013,SP2014,FA2014,SP

2015).15. CyberSecurity,ISYS376,LongwoodUniversity(FA2012,FA2013,SP2014,FA2014,SP2015).16. Adv.CyberSecurity,ISYS476,LongwoodUniversity(FA2012(newprep),FA2013).17. NetworkCommunications,ISYS473,LongwoodUniversity(SP2013,SP2014,FA2014,SP2015).18. InformationSystemsInternship,ISYS492,LongwoodUniversity(SU2013,FA2014,SU2014).19. InformationTechnologyforBusiness,IST3110,WeberStateUniversity(FA2015,SP2016).20. Networks&DataCommunications,IST3610,WeberStateUniversity(FA2015,SP2016,FA2016,SP

2017,FA2017).21. InformationSecurityI,IST4600,WeberStateUniversity(FA2015,FA2016,SP2017,FA2017).22. InformationAssuranceintheEnterprise,MBA6640,WeberStateUniversity(FA2016,SP2017,FA

2017).23. IntroductiontoInformationSystems,IST2020,WeberStateUniversity(FA2016,SP2017,FA2017).24. NetworkingandInformationSystems,MBA6630,WeberStateUniversity(SP2017,FA2017).

ACADEMICHONORS

GRANTS1. AcademicResourcesandComputingCommittee,grantforvirtualcomputinglab,WeberState

University,$16,500(2016).

6

2. ResearchgrantfromtheCenterforLeadershipinEthicsandSustainability,WeberStateUniversity,$2,500(2016).

3. GoddardSchoolofBusinessResearchGrant,WeberStateUniversity,$8,000(2016).4. GoddardSchoolofBusinessResearchGrant,WeberStateUniversity$8,000(2015).5. DavidEcclesSchoolofBusinessResearchGrant,UniversityofUtah(2010).6. TeachinggrantforITinfrastructuretosupportcoreIScourses(IS4440,IS4470,andIS4415)($50,000)

(2009).7. DavidEcclesSchoolofBusinessResearchGrant,UniversityofUtah(2009).8. DavidEcclesSchoolofBusinessResearchGrant,UniversityofUtah(2008).9. DavidEcclesSchoolofBusinessResearchGrant,UniversityofUtah(2007).10. CMERResearchGrant,UniversityofAlabamainHuntsville(2004).11. DissertationResearchGrant,FloridaStateUniversity(2003).

TEACHINGAWARDS1. NominatedforCrystalCrestaward,WeberStateUniversity,(2017).2. NominatedfortheAlstonAwardforExcellenceinTeaching,WeberStateUniversity,(2017).3. NominatedfortheH.AldousDixonAward,WeberStateUniversity,(2017)university-wide.4. WeberStateDavisCampusOutstandingProfessor,WeberStateUniversity,(2017)university-wide.5. NominatedforaCrystalCrestaward,WeberStateUniversity,(2016).6. DeltaSigmaPiTeachingAward,LongwoodUniversity,(2015).7. OutstandingFirstYearStudentAdvocate,LongwoodUniversity(2014)university-wide.8. SigmaSigmaSigma(SSS),FavoriteProfessorAward,LongwoodUniversity(2014)university-wide.9. SocietasDigna,CrownedSevenLeadershipAward,LongwoodUniversity(2014)university-wide.10. DeltaSigmaPiTeachingAward,LongwoodUniversity,(2013).11. DistinguishedTeachingAward,CollegeofBusiness&Economics,LongwoodUniversity,$1,500prize

award(2013).12. PiBetaPhiTeacherAppreciationAward,UniversityofUtah(2011),university-wide.13. SigmaChiDistinguishedTeachingAward,UniversityofUtah(2011),university-wide.14. DavidEcclesSchoolofBusinessMSISInfluentialTeacherAward,UniversityofUtah(2011).15. MSISContributionAward,UniversityofUtah(2010).16. DavidEcclesSchoolofBusinessMSISTeachingAward,UniversityofUtah(2010).17. DavidEcclesSchoolofBusinessMSISFacultyExcellenceAward,UniversityofUtah(2010).18. LDSSAExcellenceinEducationAward,UniversityofUtah(2009),university-wide.19. MarvinJ.AshtonTeachingExcellenceAward,UniversityofUtah,$5,000prizeaward(2008).20. UndergraduateTeachingAward,UniversityofAlabamainHuntsville(2005).21. NominatedforUndergraduateTeachingAward,UniversityofAlabamainHuntsville(2004).22. NominatedforDoctoralStudentTeachingAward,FloridaStateUniversity(2003).

ASSISTANTSHIPSANDSCHOLARSHIPS1. ManagementofInformationSystemsTeachingAssistantship,FloridaStateUniversity(2000-2001).2. ManagementofInformationSystemsResearchAssistantship,FloridaStateUniversity(2001-2002).3. PublicAdministrationTeachingAssistantship,BrighamYoungUniversity(1999-2000).4. PublicAdministrationStudentScholarship,BrighamYoungUniversity(1998-2000).5. AcademicScholarshipBrighamYoungUniversity(1996-1998).

7

6. AcademicScholarshipWeberStateUniversity(1995-1996).

FELLOWSHIPS1. CollegeofBusinessFellowship,FloridaStateUniversity(2000-2003).

SERVICE

PROFESSIONALSERVICE1. Executiveboardmember,AssociationofInformationSystems(AIS)SpecialInterestGroupEducation

(SIGED),websitedirector,October,2017-current.2. DARPAProjectReportEvaluation,RKIASystemofSystemsIdentityApproach,ENTCorp.,October

13,2017.3. TechnologyEvaluationandResponsetoU.S.PatentOffice,ENTCorp.,February14,2017.4. TechnologyAssessmentandVetting,ENTCorp.,January11,2016.5. Boardmember,CommonwealthCenterforAdvancedLogisticsSystems(CCALS)TechnicalAdvisory

Council,(2013-2015).6. Reviewer,PearsonHigherEd.,(2011).7. Reviewer,PearsonHigherEd.,(2010).8. Reviewer,InformationSystemsResearch(ISR)(2009).9. Reviewer,InternationalConferenceonInformationSystems(ICIS)(2008).10. Reviewer,InternationalConferenceonInformationSystems(ICIS)(2007).11. SessionChair,2006WinterConferenceonBusinessIntelligence(2006).12. Reviewer,InternationalConferenceonInformationSystems(ICIS)(2006).13. Reviewer,SmallGroupResearch(2006).14. Reviewer,AmericanMarketingAssociationConference(2004).15. Reviewer,SouthernAssociationforInformationSystems(2003).16. Reviewer,HawaiiInternationalConferenceonSystemSciences(2001).17. Volunteer,InternationalConferenceonInformationSystems(ICIS),NewOrleans,Louisiana(2001).18. Reviewer,Group2001,theACM2001InternationalConferenceonSupportingGroupWork(2000-

2001).

UNIVERSITYSERVICE1. CareerServiceAdvisoryGroup,GSBEcommitteemember,WeberStateUniversity,(2017-current).2. IS&TAreaCoordinator,Managementdepartment,WeberStateUniversity,(2015-current).3. InformationTechnologyGovernanceCouncil,universitycommittee,committeemember,Weber

StateUniversity(2016-current).4. AcademicResources&ComputingCommittee,universitycommittee,committeemember,Weber

StateUniversity(2016-current).5. TheGoldenKeyHonorSociety,WeberStateUniversity,facultyadvisor,WeberStateUniversity

(2016-current).6. IS&TCurriculumCommittee,GSBE,committeemember,WeberStateUniversity(2015-current).7. StudentEngagementCommittee,GSBE,committeemember, WeberStateUniversity(2015-current).8. CoordinatorMicrosoftImagineprogramGSBE,WeberStateUniversity(2015-Current).9. ISTFifth-yearProgramReview,GSBE,contributor,WeberStateUniversity(2016).10. MBACurriculumCommittee,LongwoodUniversity(2012-2015).

8

11. TechnologyAdvisoryCommittee,LongwoodUniversity(2012-2015).12. OnlineAdvisoryCommittee,LongwoodUniversity(2012-2015).13. StudentEnvironmentCommittee,LongwoodUniversity(2012-2015).14. InformationSystemsStudentOrganizationAdvisor,LongwoodUniversity(2013-2015).15. CoordinatorforMicrosoftDreamSparkProgram,LongwoodUniversity(2012-2015).16. FacultySearchCommittee,COBE,committeemember,LongwoodUniversity(2014-2015).17. VPofTechnologySearchCommittee,committeemember,LongwoodUniversity(November,2014).18. CyberSecurityEducation,AdmissionsOpenHouse,LongwoodUniversity,(November22,2014).19. FacultySearchCommittee,COBE,committeemember,LongwoodUniversity(2013-2014).20. UndergraduateCurriculumCommittee,DESB,committeemember,U.ofUtah(2011-2012).21. CoordinatorMSDNAAprogramDESB,U.ofUtah(2007-2012).22. DirectorofMasterofScienceinInformationSystems(MSIS)program,U.ofUtah(2008-2010).23. FacultyAdvisortoTauEpsilonKappa(TEK)studentgroup,U.ofUtah(2007-2011)24. MasterofISCommittee,committeemember,U.ofUtah(2007-2011).25. CoordinatorOmnitureCompetition,U.ofUtah(2009-2010)26. UndergraduateISAdvisor,UniversityofUtah(2007-2009).27. DepartmentFacultyEvaluationandPromotionCommittee,UniversityofAlabamainHuntsville,

committeemember(2004-2005).28. DepartmentUndergraduateCurriculumCommittee,UniversityofAlabamainHuntsville,committee

member(2004-2005).29. ComputerNetworkServicesAdvisoryCommittee,UniversityofAlabamainHuntsville,committee

member(2003-2005).30. InformationAssuranceCommittee,UniversityofAlabamainHuntsville,committeemember(2003-

2005).31. UndergraduateCurriculumCommittee,CollegeofAdministrativeScience,committeemember

(2003-2004).

COMPUTEREXPERTISE

CERTIFICATIONS 1. 7-HabbitsLeadershipTrainerCertification2. 7-HabbitsLeadershipCertification3. MCP,MCSE,MCSE+I.4. ImplementingandSupportingWindowsNTWorkstation4.0(70-073).5. ImplementingandSupportingWindowsNTServer4.0(70-076).6. ImplementingandSupportingWindowsNTServer4.0intheEnterprise(70-068).7. NetworkingEssentials(70-058).8. InternetworkingMicrosoftTCP/IPonMicrosoftWindowsNT4.0(70-059).9. InternetInformationServer(70-087).

SECURITY• ThreatSeverityAnalysis,RiskAnalysis• InformationAssurance• IncidentResponseandDisasterRecovery

• Passwordcrackers• Packetsniffers• IntrusionDetectionSystems

9

• Firewalldesignandimplementation• Cryptographictheoryandsystems• Malwaremanagement• Applicationlayersecurity• Wirelesssecurity&Implementation• SpamPrevention• AlternateDataStreams• MobileForensics

• IntrusionPreventionSystems• Steganography• Networkandhostscanners• File/DataRecovery• Forensicdataanalysis• Penetrationtesting• Securityappliances

SYSTEMS• VirtualizedComputingEnvironments• Linux:LinuxMint,Ubuntu,Debian,Fedora,

etc.FreeBSD&Unix• ApacheWebServer,LAMP,WAMP,etc.

• WindowsServerNT,2003,2008,2012,2016

• ActiveDirectory,Exchange,SharePoint• InternetInformationServer(IIS)• OPNET,networkmodeling,design,and

testing

CODING• VisualBasic,HTML,CSS,ASP,PHP.

DATABASE• MicrosoftSQLServer,MySQL,MicrosoftAccess,PowerBuilder,Oracle.

WORKEXPERIENCE

PROFESSIONALPRESENTATIONS 1. UniversityWelcomePanel,PurpleCarpetEvent,WeberStateUniversity,October27,2017.2. PrototypingInnovativeProducts,AmericanPreparatoryAcademyworkshop,WeberState

University,October24,2017.3. MobileApplicationDevelopmentWorkshop,EarlyExecutivesLeadershipAcademy,WeberState

University,August1,2017.4. Panelonsuccessincollegeandtheworkplace,EarlyExecutivesLeadershipAcademy,WeberState

University,August1,2017.5. CareersinCyberSecurity,WSUPREP,WeberStateUniversity,July10,2017.6. MeetingtheDemandforInformationSystemsWorkers,PearsonLiveLecture,PearsonEducation

Inc.,webinar,April7,2017(nation-wide).7. InternetofThings(IoT)andApplicationSecurity,Faculty-in-Residence,WeberStateUniversity,

February10,2017.8. TheTargetDataBreach,WSUMBA,WeberStateUniversity,November30,2016.9. EnteringtheVirtualWorld,PearsonLiveLecture,PearsonEducationInc.,webinar,Sept29,2016

(nation-wide,approximately200participants).10. 3DPrintingandInnovationatGSBE,WSUGSBEAdvisoryBoardMeeting,WeberStateUniversity,

September27,2016.11. CorporateDataBreaches,WSUMBA,WeberStateUniversity,June13,2016.

10

12. TheSocialValueofAmendingtheComputerFraudandAbuseActandtheElectronicCommunicationsPrivacyAct,WeberStateUniversity,April23,2016.

13. Cross-pollinationandIdentificationofBotnets,BetaAlphaPsi,WeberStateUniversity,March29,2016.

14. TheEffectsofPasswordReuseandCross-pollination,Infragard,SaltLakeCity,March23,2016.15. TheTargetDataBreach,WSUMBA,WeberStateUniversity,December2,2015.16. Hashing,Encrypting,andTestingCorporateSecurity,Faculty-in-Residence,WeberStateUniversity,

October30,2015.17. CorporateDataBreaches,BetaAlphaPsi,WeberStateUniversity,October20,2015.18. TheAgeoftheDataBreach,PearsonLiveLecture,PearsonEducationInc.,virtuallecture,April13,

2015(nation-wide).19. TrendsinCyberSecurityEducation,InformationSystemsAuditandControlAssociation(ISACA),

RichmondVirginiachapter,RichmondVA,February5,2015.20. CyberSecurityWorkforceEducation,HealthcareInformationandManagementSystemsSociety

(HIMSS)2014VAConference,WilliamsburgVA,November6,2014.21. OpportunitiesinCyberSecurityEducation,LongwoodDualEnrollmentSeminar,Longwood

University,July12,2014.22. WomeninCyberSecurity,GirlScoutLeadershipInstitute,LongwoodUniversity,June28,2014.23. CareersinInformationSystemsandSecurity,FBLA,LongwoodUniversity,March11,2014.24. DeceptiveCommunication,Faculty-in-Residence,LongwoodUniversity,October23,2013.25. Panel,Skill-basedEducation,Faculty-in-Residence,LongwoodUniversity,March21,2013.26. CareersinInformationSystemsandSecurity,FBLA,LongwoodUniversity,March14,2013.27. TechInvestmentStrategies,StudentInvestmentFund,LongwoodUniversity,February,19,2013.28. Panel,CyberSecurityChallenges,LongwoodUniversity,October,82012.29. NetworkForensicAnalysis.PresentedtoLongwoodUniversity,VA(2012).30. PredictingDeceptiveBehaviors.PresentedtoSuffolkUniversity,MA(2012).31. AttackMethodology.PresentedtoSocietyofFormerSpecialAgentsoftheFederalBureauof

Investigation(FBI)(2011).32. ThreatSeverityAnalysis.TelevisedpresentationtoSaltLakeCityCorporation.(2006).33. NationalSecurityTrends.PresentedtotheUniversityofUtahInformationSystemsAdvisoryBoard

attheUniversityofUtah(2005).

PROFESSIONALEXPERIENCE1. AssociateProfessor,WeberStateUniversity.(2015-current).2. AssociateProfessor,LongwoodUniversity.(2012-2015).3. FullProfessor(lecturer),UniversityofUtah.(2010).4. DirectorMSISProgram,UniversityofUtah.FullResponsibilityfordirectingMSISprogramand

teaching7coreIScoursesannually(2008-2010).5. AssociateProfessor(lecturer),UniversityofUtah.(2009).6. AssistantProfessor(lecturer),UniversityofUtah.(2007-2009).7. VisitingProfessor,UniversityofUtah.Fullresponsibilityfor6coreIScoursesannually(2005-2007).8. AssistantProfessor,UniversityofAlabamainHuntsville.Fullresponsibilityfor6coreIScourses

(2003-2005).

11

9. Instructor,FloridaStateUniversity.FullresponsibilityforcoreinformationsystemsclassesforMISmajors.(2000-2003).

10. TeachingAssistant,BrighamYoungUniversity.ConductedAccountinglabsessions,taughtweeklyAccountingreviewclasses,andgradedpapers(1999-2000).

11. Manager,BoyleApplianceCenter,Ogden,Utah.Managedwarehouseanddeliverypersonnel,trainednewdeliveryandofficepersonnel,andmanagedcomputersystems.(1985-1999).

NEWSMEDIA1. Interviewfortelevision,3scamseverycollegestudentandtheirparentsshouldknow,KSLNews,

October3,2017.https://www.ksl.com/?sid=46035562&nid=148.2. 3-DPrintingMeetsWSU,TheSignpost,InterviewwithDr.RandyBoyle,WeberStateUniversity,

February24,2016,byKelliePlumhof.3. LongwoodUniversity,Expert:Keepyourkidsonyourdesk,notonyourdesktop.InterviewwithDr.

RandyBoyle.LongwoodUniversitypressrelease,March13,2015.4. McWilliams,Matthew,Boyle:Phishingattemptsgettingmuchmoresophisticated,Insider,

LongwoodUniversity,February3,2015.5. Boyle,R.(2015,January17).Why‘Blackhat”isHackingDoneRight,TheDailyBeast,NewYorkCity,

NY,http://www.thedailybeast.com/articles/2015/01/17/why-blackhat-is-hacking-done-right.html.6. Boyle,R.(2014,December4).Cyber-securityonmoremindsasholidayshoppersheadout,TheDaily

Progress,Charlottesville,VA,http://www.dailyprogress.com/news/local/cyber-security-on-more-minds-as-holiday-shoppers-head-out/article_c708fda8-7682-11e4-801b-dbddcd1c1a1f.html.

7. Longwoodstudentsbenefitingfromrelationshipwithtopgraduateprogramininformationsystems,LongwoodUniversity,pressrelease,June11,2014.

8. Boyle,R.(2014,July3).Charlottesville,VA,Understandingdeception[interview].RadiointerviewonNationalPublicRadio(NPR)withSandraHausman’sWithGoodReason.http://withgoodreasonradio.org/2014/10/duping-delight-and-whos-likely-to-lie/.

9. Boyle,R.(2013,June3).Charlottesville,VA,Detectingdeception[interview].RadiointerviewonWVTFwithSandraHausman.

10. Interview,LargeScaleDatabreaches,ABC4News,April12,2012.11. LUProfessorCo-AuthorsDeceptionStudy,FarmvilleHerald,June12,2013.12. FourLongwoodUniversityCollegeofBusinessandEconomicsStudentsSelectedtoAttendCarnegie

Mellon’sITLAB:JuniorSummerInternship.PRWeb,April30,2013.13. StudybyLongwoodprofessorpredictsaperson’swillingnesstolie,LongwoodUniversitypress

release,April30,2013.14. FourLongwoodbusinessstudentschosenforCarnegieMelloninternship,LongwoodUniversity,

pressrelease,May1,2013.

STUDENT-INSTRUCTOREVALUATIONSUMMARY

FloridaStateUniversity

Term Course Hours

FloridaStateUniversityCourseTitle Enrolled Responded

FSUSIEScore

2001 Summer ISM4117_1 3 DecisionSupportSys.† 32 23 4.4*2002 Summer ISM4117_1 3 DecisionSupportSys. 33 25 4.5*Fall ISM4030_2 3 SystemsAnalysis† 11 8 4.8* ISM4030_3 3 SystemsAnalysis 26 23 4.6*2003 Spring ISM4220_1 3 Networking/Telecom† 33 24 4.7* ISM4220_1 3 Networking/Telecom 34 33 4.8*

UniversityofAlabamaatHuntsville

Term Course Hours

U.ofAlabamaHuntsvilleCourseTitle Enrolled Responded

CourseScore

GlobalScore

CollegeAverage

UAHDept.Average

Fall MIS460_1 3 Telecommunications 23 18 4.47 4.44 4.26 4.05 MIS460_2 3 Telecommunications 11 6 4.49 4.67 4.26 4.05 MIS560_1 3 Telecommunications 4 3 4.68 5.00 4.26 4.05 MIS560_2 3 Telecommunications 9 8 4.36 4.63 4.26 4.05 MIS465_1 3 WebServer† 22 12 4.65 4.92 4.26 4.05 MIS565_1 3 WebServer 4 4 4.74 4.75 4.26 4.052004 Spring MIS460_1 3 Telecommunications 30 19 4.83 4.89 4.35 4.22 MIS460_2 3 Telecommunications 10 7 4.68 4.86 4.35 4.22 MIS560_2 3 Telecommunications 2 1 4.80 5.00 4.35 4.22

13

MIS660_1 3 Info.SecurityMgt.† 18 10 4.51 4.70 4.35 4.22Fall MIS460_1 3 Telecommunications 27 25 4.93 4.96 4.39 4.31 MIS460_2 3 Telecommunications 13 13 4.68 4.85 4.39 4.31 MIS560_1 3 Telecommunications 5 5 4.97 5.00 4.39 4.31 MIS560_2 3 Telecommunications 3 - - - 4.39 4.31 MIS301_1 3 IntrotoMIS† 28 21 4.62 4.81 4.39 4.312005 Spring MIS301_1 3 IntrotoMIS 47 45 4.69 4.78 4.40 4.34 MIS460_1 3 Telecommunications 36 32 4.86 4.84 4.40 4.34 MIS560_1 3 Telecommunications 4 3 4.98 5.00 4.40 4.34 MIS490_1 3 SpecialProjects 2 2 5.00 5.00 4.40 4.34 MIS660_2 3 Info.SecurityMgt. 7 4 4.95 5.00 4.40 4.34

UniversityofUtah

Term Course HoursUniversityofUtah

CourseTitle Enrolled RespondedCourseScore

Instr.Score

Fall IS4410_3 3 IntrotoMIS 73 59 5.38 5.53 IS4410_4 3 IntrotoMIS 62 56 5.65 5.772006 Spring IS4410_1 3 IntrotoMIS 73 59 5.47 5.57 IS4470_1 3 Telecom.&Security† 57 50 5.52 5.59Fall IS4410_3 3 IntrotoMIS 83 72 5.50 5.59 IS4410_4 3 IntrotoMIS 73 57 5.19 5.52 IS4470_1 3 Telecom.&Security 40 36 5.50 5.562007 Spring IS4410_1 3 IntrotoMIS 79 70 5.53 5.69 IS4410_70 3 IntrotoMIS 42 39 5.55 5.70 IS4470_1 3 Telecom.&Security 31 29 5.60 5.79 ACC6520_1 3 ComputerSecurity† 16 14 5.87 5.59

14

IS5910_01 3 AdvancedITSecurity 1 1 6.00 6.00Fall IS4410_3 3 IntrotoMIS 105 96 5.53 5.68 IS4410_4 3 IntrotoMIS 72 66 5.52 5.68 IS4470_1 3 Telecom.&Security 69 65 5.64 5.722008 Spring IS4410_2 3 IntrotoMIS 93 79 5.27 5.51 IS4410_70 3 IntrotoMIS 29 27 5.73 5.75 IS4470_1 3 Telecom.&Security 62 52 5.54 5.61 ACC6520_1 3 ComputerSecurity 41 36 5.68 5.73Fall IS4410_4 3 IntrotoMIS 55 44 5.40 5.59 IS4410_5 3 IntrotoMIS 67 52 5.26 5.67 IS4440_1 3 Networking&Servers† 62 51 5.60 5.74 ACC6520_1 3 ComputerSecurity 30 27 5.49 5.61 IS5910_1 3 ComputerSecurity 13 9 5.60 5.762009 Spring IS4410_1 3 IntrotoMIS 68 56 5.46 5.62 IS4410_2 3 IntrotoMIS 95 80 5.63 5.73 IS4440_1 3 Networking&Servers 51 42 5.71 5.83 IS6910_1 3 Networking&Servers 5 4 6.0 6.0 IS6910_4 1.5 ITCertification 1 1 6.0 6.0 IS5910_1 3 Ind.StudyNetworking 1 1 6.0 6.0Fall IS4410_1 3 IntrotoMIS 189 143 5.27 5.55 IS4440_1 3 Networking&Servers 75 64 5.56 5.62 IS6910_1 3 Networking&Servers 5 - - - IS4470_1 3 ITSecurity 56 50 5.84 5.88 IS6570_1 3 ITSecurity 35 29 5.72 5.86

Term Course Hours

UniversityofUtahCourseTitle Enrolled Responded

CourseScore

Instr.Score

15

2010 Spring IS4440_1 3 Networking&Servers 66 55 5.66 5.80 IS6910_1 3 Networking&Servers 2 2 6.00 6.00 IS4470_1 3 ITSecurity 44 37 5.72 5.87 IS6570_1 3 ITSecurity 23 20 5.50 5.67Fall IS4410_1 3 IntrotoMIS 140 106 5.50 5.67 IS4440_1 3 Networking&Servers 75 60 5.73 5.83 IS6910_1 3 Networking&Servers 3 3 6.00 6.00 IS4470_1 3 ITSecurity 35 30 5.82 5.87 IS6570_1 3 ComputerSecurity 35 20 5.51 5.57

Term Course Hours

UniversityofUtahCourseTitle Enrolled Responded

CourseScore

Instr.Score

2011 Spring IS4410_1 3 IntrotoMIS 96 76 5.33 5.53 IS4440_1 3 Networking&Servers 43 34 5.67 5.69 IS6910_1 3 Networking&Servers 2 2 6.00 6.00 IS4470_1 3 ITSecurity 36 34 5.80 5.88 IS6570_1 3 ComputerSecurity 29 24 5.78 5.80Fall IS4410_1 3 IntrotoMIS 139 119 5.7 5.8 IS4440_1 3 Networking&Servers 69 67 5.7 5.8 IS6910_1 3 Networking&Servers 6 †† 5.7 5.8 IS6910_2 1.5 CompTIACertification 5 - - - IS4470_1 3 ITSecurity 48 66 5.7 5.8 IS6570_1 3 ComputerSecurity 27 †† 5.7 5.82012 Spring IS4410_1 3 IntrotoMIS 95 83 5.57 5.73

IS4440_1(IS6640_1)

3 Networking&Servers 54(34) 72 5.86 5.88

16

IS4470_1(IS6570_1)

3 ITSecurity 39(31) 59 5.81 5.83

LongwoodUniversity

Term Course HoursLongwoodUniversity

CourseTitle Enrolled RespondedInstr.Score

(meanQ1-Q10)Fall ISYS370 3 IntrotoIS 26 18 4.89 ISYS376 3 CyberSecurity 12 10 4.98 ISYS476 3 AdvancedCyberSecurity† 5 2 5.02013 Spring ISYS370 3 IntrotoIS 58 35 4.83 ISYS473 3 NetworkComm. 14 9 5.0Summer ISYS492 1-3 ISSecurityInternship 4 - -Fall ISYS370 3 IntrotoIS 43 19 4.87 ISYS376 3 CyberSecurity 19 7 4.8 ISYS476 3 AdvancedCyberSecurity 5 1 5.0 ISYS492 1-3 ISSecurityInternship 2 - -2014 Spring ISYS370 3 IntrotoIS 29 14 4.71 ISYS473 3 NetworkComm. 20 9 4.88 ISYS376 3 CyberSecurity 20 10 4.89Summer ISYS492 1-3 ISSecurityInternship 6 - -Fall ISYS370 3 IntrotoIS 49 19 4.97 ISYS376 3 CyberSecurity 20 5 4.96 ISYS473 3 NetworkComm. 8 2 4.892015 Spring ISYS370 3 IntrotoIS 33 12 4.87 ISYS376 3 CyberSecurity 20 10 4.97 ISYS473 3 NetworkComm. 24 7 4.86

17

Summer ISYS492 1-3 ISSecurityInternship 2 - -

WeberStateUniversityTerm Course Hours WSUCourseTitle Enrolled Responded Instr.Score

Fall IST3110 3 BusinessIT 23 14 6.43 IST3610 3 NetworkingI 8 7 6.57 IST4600 3 InformationSecurityI 14 10 7.00 2016 Spring IST3110 3 BusinessIT 31 23 6.30 IST3110 3 BusinessIT 27 12 6.92 IST3610 3 NetworkingI 14 12 7.00Summer Fall IST2020 3 Intro.ToInformationSystems 47 31 6.74 IST3610 3 NetworkingI 23 15 7.00 IST4600 3 InformationSecurityI 30 19 6.89 MBA6640 3 InformationAssurance 2 1 5.007 2017 Spring IST2020 3 Intro.ToInformationSystems 36 31 6.42 IST3610 3 NetworkingI 17 11 7.00 IST4600 3 InformationSecurityI 14 7 7.00 MBA6640 3 InformationAssurance 4 * * MBA6630 3 Networking&IS 6 * *Summer Fall IST2020 3 Intro.ToInformationSystems 60 IST3610 3 NetworkingI 19 IST4600 3 InformationSecurityI 16 MBA6640 3 InformationAssurance

18

MBA6630 3 Networking&IS 2018 Spring IST2020 3 Intro.ToInformationSystems IST3610 3 NetworkingI IST4600 3 InformationSecurityI MBA6640 3 InformationAssurance MBA6630 3 Networking&IS

†Indicatesanewprep.††Includedwithscoresofthepriorcross-listedcourse.

1. FloridaStateUniversity(FSU)usesaratingsystemfrom1to5,withonebeingthehighest.Forconsistencytheyhavebeenreversecodedtomatchtherestofthescoresusingaratingscalefrom5to1,withfivebeingthehighest.

2. UniversityofAlabamainHuntsville(UAH)usesaratingsystemfrom1to5,withfivebeingthehighest.UAHCollegeaverageswereasfollows:(2003)Fall4.26,(2003)Spring4.35.

3. GlobalItem#20readsasfollows:“ThisinstructorwasamongtheA:top10%,B:top30%,C:AboutAverage,D:Bottom30%,E:Bottom10%”4. UniversityofUtah(UofU)usesaratingsystemfrom1to6,withsixbeingthehighest.5. LongwoodUniversityusesaratingsystemfrom1to5,withfivebeingthehighest.6. WeberStateUniversityusesaratingsystemfrom1to7,withsevenbeingthehighest(Question#11).7. MBAclassesatWeberStateUniversityusearatingsystemfrom1to5,withonebeingthehighest(Question#14).Forconsistency,thisvaluewasrecodedwithone

beinglow,andfivebeinghigh.8. DetailedStudentInstructorEvaluations(SIE)withmorecomprehensivebreakdownsforeachcourseandopen-endedresponsesareavailable.

19

20

21

top related