Weber State University - Information Systems
Wake Forest University
University of Utah
Florida State University
Managed network of over 4500 production desktop computers; Upgraded software and systems for over 100 plus remote sites\nConducted meetings and trainings for new employees\nResolved over 300 computer trouble tickets per month
Sorenson Communications
Assistant Professor
Weber State University
Teaching Assistant
Teaching Assistant for IS 4410 Introduction to Information Systems
IS 4440 Information Systems Networking and Servers
IS 4470 Information Systems Security. \n\nGuest Lectured classes for both the Networking and Servers Class as well as the IS Security Class. Provided students feedback and support on various class projects and assignments. Held regular office hours for the support of the students during the semester. Graded exams
quizzes and extensive semester projects.
University of Utah
Wake Forest University
Florida State University
PhD candidate
Management Information Systems
Tallahassee
Florida Area
Ph.D
Management Information Systems
Bachelor of Science (BS)
Master of Science (MS)
Entrepreneurship/Entrepreneurial Studies
University of Utah - David Eccles School of Business
Masters of Science
Accomplishments\n\t* Selected to participate in the 2009 Regional MIS CA case competition on the \n Strategic Value of IT. \nSignificant Courses\n**IT Security\t\t\t**Networking and Servers\t\t\n**Database Design\t\t**Data Structures and Algorithms (Java) \n**Systems Analysis &Design\t**Data Mining and Warehousing\n**Web-based Applications\t**Project Management
Information Systems
University of Utah\t August 2010
French
Haitian Creole
Bachelor of Science
Business Entrepreneurship
University of Utah\tDec 2008
YMCA
Coach
Analysis
Strategy
Project Management
Information Technology
Data Analysis
Servers
Security
Business Intelligence
Networking
Access
Relational Databases
Leadership
Computer Hardware
IT Management
Training
Java
Database Administration
Management
Telecommunications
Linux
Remote Influence Tactics (2012)
Research into social influence theory has been extensive and has repeatedly shown the power that influence tactics exert over individuals in an organization. Despite the extant conceptualizations of political influence tactics in organizations
very little research has focused on how these tactics play out for organizations implementing more autonomous team settings
whose interactions are not proximally located close to one another. By extending social influence theory to the inclusion of media synchronicity theory
this research contributes insight into how political influence tactics may operate across a variety of media in organizations employing remote work structures. A conceptual model of remote influence tactics is developed and the implications are discussed as part of this\nresearch agenda.
Remote Influence Tactics (2012)
Applied Networking Labs guides readers through the installation and basic \noperation of software used in the field of networking. DOS Commands; Windows Utilities; \nWeb Tools; Virtualization; Packet Analysis; Network Design; Wireless; Internet Information \nServer (IIS); Apache; Windows Server 2008; Linux; Careers in Networking For anyone \ninterested in understanding the installation and basic operation of software used in the field \nof networking.
Applied Networking Labs (2e) (2014)
Exploring Political Skill and Deception
Understanding the role political skill may play in the attempt by someone engaged in purposeful deceit to achieve political influence is important as it is likely that political skill will further increase the likelihood the individual succeeds in his/her deception efforts. Understanding the roll political skill plays in deception efforts may help explain why the odds of accurately detecting deception are generally so poor. This finding is important as future deception research can then begin to examine the mechanisms by which political skill enables successful deception
thereby increasing our odds of detecting deception. The purpose of this study is to add to and extend our understanding of\npolitical skill and explore the extent to which it can influence deceptive communication efforts.
Exploring Political Skill and Deception
This study looks at the influence of user engagement on users’ information security practices. A model describing how user engagement (user posts) may influence a person’s decision to employ better security measures (stronger passwords) is tested. Password strength was determined by looking at password length
the types of characters used
the variety of character sequences used
the number of duplicate passwords
and the number of uncrackable passwords. Passwords were tested using a variety of cracking techniques. This study found that individuals from an online gaming site who made more posts to the user forum employed stronger passwords.\n\nIntroduction\n\nInformation systems (IS) security is an ongoing challenge facing individuals
organizations
and even nation states. In 2016
hackers broke into the Democratic National Committee’s (DNCs) e-mail servers and subsequent released—through WikiLeaks—thousands of stolen e-mails. This leak of private e-mail information cast doubts on many of the practices of the DNC and led to the stepping down of several ranking DNC members. The hack and WikiLeaks scandal cast doubt on practices of the Democratic Party and arguably lead to the eventual loss of Hillary Clinton to Donald Trump in the 2016 presidential election. Keeping private information private and secure is at the core of IS security. One primary way private information is kept secure is through the use of passwords. Passwords are critical in keeping digital information safe and secure. There is inherent risk involved if proper passwords are not chosen because passwords are the first line of defense against intrusion. According to many experts
the DNC was using incredibly weak passwords which are to blame for the infamous hack.
Valuing Information Security: A Look at the Influence of User Engagement on Information Security Strength\nRandall J. Boyle
Chandrashekar D. Challa & Jeffrey A. Clements\nJournal of Information Privacy and Security Vol. 13
Iss. 3
2017\n
The amount of confidence people have in their ability to deceive others can be an indication of how likely they are to engage in deceptive-communication behaviors and
further
how successful they are in their deceit. This study looks at the role of justified deceit in determining people’s levels of confidence. The study presents a research model and empirically tests it. Findings indicate that two justifications for lying—retaliation and protection—significantly influence people’s deception confidence.
Confident Deception: The Role of Justification
3 Int'l J. Psychol. & Behav. Sci. 178 (2013)
Weber State University
Sorenson Communications
The following profiles may or may not be the same professor: