Loyola University Maryland - Information Systems & Operations Management
Professor, student, author, curious human. Math geek. Biker.
Higher Education
Lisa
Yeo
Merced, California Area
Held GSEC and GCWN certifications from SANS. Currently an advisory board member for both certifications.
Specialties: Windows system administration and security, network design
PhD Candidate
Studying Management Science and Management Information Systems (Math and Computers) in the School of Business.
Research interests: Information Security and Privacy, Collaboration enabling technologies.
Sessional Lecturer
MIS 311 Introduction to Management Information Systems (2005, 2006)
MIS 686 Introduction to Management Information systems (2006, 2007)
MIS 441 Management Information Systems Strategy (2007)
SLIS 598 Information Security (2010, 2011)
MGTSC 312 Business Statistics (2011)
MGTSC 501 (labs) Data Analysis & Decision Making (2010, 2011)
SuperNet Project Coordinator
Providing coordination services to public libraries in Alberta as they prepare to participate in a province-wide high-speed fibre network. Duties include RFPs for hardware and services, education, security considerations, and aiding in the development of new library services.
IT Manager
Managing IT resources for the organization including IT strategy and consulting for the public library community. I have retained responsibility for SuperNet project coordination.
Assistant Professor
Research interests: Information Security and Privacy, Collaboration enabling technologies.
Undergraduate Courses:
Introduction to Information Systems
Networks & Security
Graduate Courses:
Systems Thinking & Risk Assessment
Assistant Professor
Member of the Department of Management-Complex Systems in the School of Engineering.
Volunteer
GCWN Board (2000-)
GSEC Board (2005-)
GCWN Authorized Grader (2003-2005)
Local Mentor for Security Kick-start (2001)
Foster home for dogs as they await adoption.
To help my fosters find their furever homes, I maintain a FaceBook page (https://www.facebook.com/SheepRiverFaust) where they write daily stories. Feel free to follow them there.
BMath, Honours
Applied Math, Engineering
PhD
Operations and Information Systems
MBA-International Business Specialization
Technology Commercialization, MIS
PhD Candidate
Studying Management Science and Management Information Systems (Math and Computers) in the School of Business.
Research interests: Information Security and Privacy, Collaboration enabling technologies.
Sessional Lecturer
MIS 311 Introduction to Management Information Systems (2005, 2006)
MIS 686 Introduction to Management Information systems (2006, 2007)
MIS 441 Management Information Systems Strategy (2007)
SLIS 598 Information Security (2010, 2011)
MGTSC 312 Business Statistics (2011)
MGTSC 501 (labs) Data Analysis & Decision Making (2010, 2011)
Journal of Operations Management
The field of behavioral operations has matured into an established area within the discipline of operations management. The field fills an essential void by laying the micro-foundations for the broader discipline of operations management. As such, the field examines a variety of topics and is methodologically diverse.
Journal of Operations Management
The field of behavioral operations has matured into an established area within the discipline of operations management. The field fills an essential void by laying the micro-foundations for the broader discipline of operations management. As such, the field examines a variety of topics and is methodologically diverse.
Journal of Management Information Systems
O Arazy, O Nov, R Patterson, L Yeo Journal of Management Information Systems 27 (4), 71-98
Journal of Operations Management
The field of behavioral operations has matured into an established area within the discipline of operations management. The field fills an essential void by laying the micro-foundations for the broader discipline of operations management. As such, the field examines a variety of topics and is methodologically diverse.
Journal of Management Information Systems
O Arazy, O Nov, R Patterson, L Yeo Journal of Management Information Systems 27 (4), 71-98
eJeta.org Special Issue. Emerging Security Paradigms in the Knowledge Era
Outsourcing coupled with technology that enables data to reside anywhere has opened up new challenges to the protection of personal privacy. Privacy laws differ internationally as does the value different cultures place on personal privacy. Such differences have implications for government as well as businesses. The corporation must be aware of the security efforts of all its partners and consumers must be aware of the security of all service providers in the extended value chain, not just the business they are interacting with directly. In this paper we propose a method for controlling risks associated with spreading personal information across an extended value chain. In addition, this method accommodates customer-specified levels of risk tolerance. For businesses, the goal is to minimize the cost of securing data spread across vendors and international boundaries.
Journal of Operations Management
The field of behavioral operations has matured into an established area within the discipline of operations management. The field fills an essential void by laying the micro-foundations for the broader discipline of operations management. As such, the field examines a variety of topics and is methodologically diverse.
Journal of Management Information Systems
O Arazy, O Nov, R Patterson, L Yeo Journal of Management Information Systems 27 (4), 71-98
eJeta.org Special Issue. Emerging Security Paradigms in the Knowledge Era
Outsourcing coupled with technology that enables data to reside anywhere has opened up new challenges to the protection of personal privacy. Privacy laws differ internationally as does the value different cultures place on personal privacy. Such differences have implications for government as well as businesses. The corporation must be aware of the security efforts of all its partners and consumers must be aware of the security of all service providers in the extended value chain, not just the business they are interacting with directly. In this paper we propose a method for controlling risks associated with spreading personal information across an extended value chain. In addition, this method accommodates customer-specified levels of risk tolerance. For businesses, the goal is to minimize the cost of securing data spread across vendors and international boundaries.
Prentice Hall
Journal of Operations Management
The field of behavioral operations has matured into an established area within the discipline of operations management. The field fills an essential void by laying the micro-foundations for the broader discipline of operations management. As such, the field examines a variety of topics and is methodologically diverse.
Journal of Management Information Systems
O Arazy, O Nov, R Patterson, L Yeo Journal of Management Information Systems 27 (4), 71-98
eJeta.org Special Issue. Emerging Security Paradigms in the Knowledge Era
Outsourcing coupled with technology that enables data to reside anywhere has opened up new challenges to the protection of personal privacy. Privacy laws differ internationally as does the value different cultures place on personal privacy. Such differences have implications for government as well as businesses. The corporation must be aware of the security efforts of all its partners and consumers must be aware of the security of all service providers in the extended value chain, not just the business they are interacting with directly. In this paper we propose a method for controlling risks associated with spreading personal information across an extended value chain. In addition, this method accommodates customer-specified levels of risk tolerance. For businesses, the goal is to minimize the cost of securing data spread across vendors and international boundaries.
Prentice Hall
Design Science Research in Information Systems. Advances in Theory and Practice
Wikis were originally intended for knowledge work in the open Internet environment, and there seems to be an inherent tension between wikis' affordances and the nature knowledge work in organizations. The objective of this paper is to investigate how tailoring wikis to corporate settings would impact users' wiki activity. We begin by synthesizing prior works on wikis' design principles; identifying several areas where we anticipate high tension between wikis' affordances and organizational work practices.
Journal of Operations Management
The field of behavioral operations has matured into an established area within the discipline of operations management. The field fills an essential void by laying the micro-foundations for the broader discipline of operations management. As such, the field examines a variety of topics and is methodologically diverse.
Journal of Management Information Systems
O Arazy, O Nov, R Patterson, L Yeo Journal of Management Information Systems 27 (4), 71-98
eJeta.org Special Issue. Emerging Security Paradigms in the Knowledge Era
Outsourcing coupled with technology that enables data to reside anywhere has opened up new challenges to the protection of personal privacy. Privacy laws differ internationally as does the value different cultures place on personal privacy. Such differences have implications for government as well as businesses. The corporation must be aware of the security efforts of all its partners and consumers must be aware of the security of all service providers in the extended value chain, not just the business they are interacting with directly. In this paper we propose a method for controlling risks associated with spreading personal information across an extended value chain. In addition, this method accommodates customer-specified levels of risk tolerance. For businesses, the goal is to minimize the cost of securing data spread across vendors and international boundaries.
Prentice Hall
Design Science Research in Information Systems. Advances in Theory and Practice
Wikis were originally intended for knowledge work in the open Internet environment, and there seems to be an inherent tension between wikis' affordances and the nature knowledge work in organizations. The objective of this paper is to investigate how tailoring wikis to corporate settings would impact users' wiki activity. We begin by synthesizing prior works on wikis' design principles; identifying several areas where we anticipate high tension between wikis' affordances and organizational work practices.