Glenn B. Dietrich
According to our database1,
Glenn B. Dietrich
authored at least 34 papers
between 1999 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Beyond Text-to-SQL for IoT Defense: A Comprehensive Framework for Querying and Classifying IoT Threats.
CoRR, 2024
2023
CoRR, 2023
High Value Assets (HVA) Lessons Learned for Small Government Agencies and Small to Mid-sized Organizations.
Proceedings of the 56th Hawaii International Conference on System Sciences, 2023
2022
Method to Identify High Value Assets for Small Government Agencies and Small to Mid-sized Organizations.
Proceedings of the 55th Hawaii International Conference on System Sciences, 2022
Proceedings of the 55th Hawaii International Conference on System Sciences, 2022
2021
Introduction to the Minitrack on Machine Learning and Cyber Threat Intelligence and Analytics.
Proceedings of the 54th Hawaii International Conference on System Sciences, 2021
2020
A Skills Based Approach to Tackle Failure of Cybersecurity Awareness Programs in Organizations.
Proceedings of the 26th Americas Conference on Information Systems, 2020
2019
Proceedings of the 52nd Hawaii International Conference on System Sciences, 2019
Unlocking the Mixed Results of the Effect of Self-Efficacy in Information Security on Compliance.
Proceedings of the 25th Americas Conference on Information Systems, 2019
2017
Proceedings of the Security and Privacy in Communication Networks, 2017
Is Self-Efficacy in Information Security Better Modeled as a Predictor Variable or a Mediator Variable in IS literature?
Proceedings of the 23rd Americas Conference on Information Systems, 2017
2016
Commun. Assoc. Inf. Syst., 2016
Identifying Multiple Categories of Cybersecurity Skills that Affect User Acceptance of Protective Information Technologies.
Proceedings of the 22nd Americas Conference on Information Systems, 2016
Proceedings of the 22nd Americas Conference on Information Systems, 2016
2013
Knowledge sharing in open source software project teams: A transactive memory system perspective.
Int. J. Inf. Manag., 2013
2012
Proceedings of the 18th Americas Conference on Information Systems, 2012
2011
Post-retrieval search hit clustering to improve information retrieval effectiveness: Two digital forensics case studies.
Decis. Support Syst., 2011
2010
Proceedings of the 43rd Hawaii International International Conference on Systems Science (HICSS-43 2010), 2010
Re-examining the Information Systems Security Problem from a Systems Theory Perspective.
Proceedings of the Sustainable IT Collaboration Around the Globe. 16th Americas Conference on Information Systems, 2010
2009
Self-Efficacy in Software Developers: A Framework for the Study of the Dynamics of Human Cognitive Empowerment.
Int. J. Inf. Technol. Syst. Approach, 2009
Knowledge Location, Differentiation, Credibility and Coordination in Open Source Software Development Teams.
Proceedings of the 15th Americas Conference on Information Systems, 2009
2008
The Impact of Information Systems on End User Performance: Examining the Effects of Cognitive Style Using Learning Curves in an Electronic Medical Record Implementation.
Commun. Assoc. Inf. Syst., 2008
Proceedings of the 41st Hawaii International International Conference on Systems Science (HICSS-41 2008), 2008
2007
Proceedings of the Advances in Digital Forensics III, 2007
Proceedings of the 40th Hawaii International International Conference on Systems Science (HICSS-40 2007), 2007
Development of a Framework for Analyzing Individual and Environmental Factors Preceding Attitude toward Information Security.
Proceedings of the Reaching New Heights. 13th Americas Conference on Information Systems, 2007
2006
Proceedings of the Connecting the Americas. 12th Americas Conference on Information Systems, 2006
2005
Proceedings of the A Conference on a Human Scale. 11th Americas Conference on Information Systems, 2005
Proceedings of the A Conference on a Human Scale. 11th Americas Conference on Information Systems, 2005
2004
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VI, 2004
Cyber Security Exercises: Testing an Organization?s Ability to Prevent, Detect, and Respond to Cyber Security Events.
Proceedings of the 37th Hawaii International Conference on System Sciences (HICSS-37 2004), 2004
Proceedings of the 37th Hawaii International Conference on System Sciences (HICSS-37 2004), 2004
1999
Proceedings of the 32nd Annual Hawaii International Conference on System Sciences (HICSS-32), 1999