Glenn B. Dietrich

According to our database1, Glenn B. Dietrich authored at least 34 papers between 1999 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Beyond Text-to-SQL for IoT Defense: A Comprehensive Framework for Querying and Classifying IoT Threats.
CoRR, 2024

2023
Towards Understanding the Generalization of Medical Text-to-SQL Models and Datasets.
CoRR, 2023

High Value Assets (HVA) Lessons Learned for Small Government Agencies and Small to Mid-sized Organizations.
Proceedings of the 56th Hawaii International Conference on System Sciences, 2023

2022
Method to Identify High Value Assets for Small Government Agencies and Small to Mid-sized Organizations.
Proceedings of the 55th Hawaii International Conference on System Sciences, 2022

Security Operations Centers: A Holistic View on Problems and Solutions.
Proceedings of the 55th Hawaii International Conference on System Sciences, 2022

2021
Introduction to the Minitrack on Machine Learning and Cyber Threat Intelligence and Analytics.
Proceedings of the 54th Hawaii International Conference on System Sciences, 2021

2020
A Skills Based Approach to Tackle Failure of Cybersecurity Awareness Programs in Organizations.
Proceedings of the 26th Americas Conference on Information Systems, 2020

2019
A Social Network Analysis (SNA) Study On Data Breach Concerns Over Social Media.
Proceedings of the 52nd Hawaii International Conference on System Sciences, 2019

Unlocking the Mixed Results of the Effect of Self-Efficacy in Information Security on Compliance.
Proceedings of the 25th Americas Conference on Information Systems, 2019

2017
Identification of Forensic Artifacts in VMWare Virtualized Computing.
Proceedings of the Security and Privacy in Communication Networks, 2017

Is Self-Efficacy in Information Security Better Modeled as a Predictor Variable or a Mediator Variable in IS literature?
Proceedings of the 23rd Americas Conference on Information Systems, 2017

2016
An Empirical Examination of an Agile Contingent Project/Method Fit Model.
Commun. Assoc. Inf. Syst., 2016

Identifying Multiple Categories of Cybersecurity Skills that Affect User Acceptance of Protective Information Technologies.
Proceedings of the 22nd Americas Conference on Information Systems, 2016

An Exploratory Analysis in Android Malware Trends.
Proceedings of the 22nd Americas Conference on Information Systems, 2016

2013
Knowledge sharing in open source software project teams: A transactive memory system perspective.
Int. J. Inf. Manag., 2013

2012
What the Graduate Needs to Know about Operational Information Security.
Proceedings of the 18th Americas Conference on Information Systems, 2012

2011
Post-retrieval search hit clustering to improve information retrieval effectiveness: Two digital forensics case studies.
Decis. Support Syst., 2011

2010
Emergency Communications Using the Web: Matching Media Richness to the Situation.
Proceedings of the 43rd Hawaii International International Conference on Systems Science (HICSS-43 2010), 2010

Re-examining the Information Systems Security Problem from a Systems Theory Perspective.
Proceedings of the Sustainable IT Collaboration Around the Globe. 16th Americas Conference on Information Systems, 2010

2009
Self-Efficacy in Software Developers: A Framework for the Study of the Dynamics of Human Cognitive Empowerment.
Int. J. Inf. Technol. Syst. Approach, 2009

Knowledge Location, Differentiation, Credibility and Coordination in Open Source Software Development Teams.
Proceedings of the 15th Americas Conference on Information Systems, 2009

2008
The Impact of Information Systems on End User Performance: Examining the Effects of Cognitive Style Using Learning Curves in an Electronic Medical Record Implementation.
Commun. Assoc. Inf. Syst., 2008

Systems Theory Model for Information Security.
Proceedings of the 41st Hawaii International International Conference on Systems Science (HICSS-41 2008), 2008

2007
A New Process Model for Text String Searching.
Proceedings of the Advances in Digital Forensics III, 2007

Secure Software Engineering: A New Paradigm.
Proceedings of the 40th Hawaii International International Conference on Systems Science (HICSS-40 2007), 2007

Development of a Framework for Analyzing Individual and Environmental Factors Preceding Attitude toward Information Security.
Proceedings of the Reaching New Heights. 13th Americas Conference on Information Systems, 2007

2006
Cyber-Emergencies: What Managers Can Learn From Complex Systems and Chaos Theory.
Proceedings of the Connecting the Americas. 12th Americas Conference on Information Systems, 2006

2005
Dark Screen: An Exercise in Cyber Security.
MIS Q. Executive, 2005

Modeling End User Behavior to Secure a PC in a Unmanaged Environment.
Proceedings of the A Conference on a Human Scale. 11th Americas Conference on Information Systems, 2005

Secure Software Design Principles: A Systems Approach.
Proceedings of the A Conference on a Human Scale. 11th Americas Conference on Information Systems, 2005

2004
Steganalysis using modified pixel comparison and complexity measure.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VI, 2004

Cyber Security Exercises: Testing an Organization?s Ability to Prevent, Detect, and Respond to Cyber Security Events.
Proceedings of the 37th Hawaii International Conference on System Sciences (HICSS-37 2004), 2004

Password-Based Authentication: A System Perspective.
Proceedings of the 37th Hawaii International Conference on System Sciences (HICSS-37 2004), 2004

1999
Technology Strategies in a Complex Environment.
Proceedings of the 32nd Annual Hawaii International Conference on System Sciences (HICSS-32), 1999


  Loading...