Jordan Shropshire

According to our database1, Jordan Shropshire authored at least 30 papers between 2006 and 2021.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2021
Near-Real-Time IDS for the U.S. FAA's NextGen ADS-B.
Big Data Cogn. Comput., 2021

Insight from a Containerized Kubernetes Workload Introspection.
Proceedings of the 54th Hawaii International Conference on System Sciences, 2021

2020
Container and VM Visualization for Rapid Forensic Analysis.
Proceedings of the 53rd Hawaii International Conference on System Sciences, 2020

Assessing Cybersecurity Risk in the Extended Project Lifespan: A Pilot Study.
Proceedings of the 26th Americas Conference on Information Systems, 2020

2019
Insight from a Docker Container Introspection.
Proceedings of the 52nd Hawaii International Conference on System Sciences, 2019

2018
Development of a Metric for Assessing Full-Stack Developers' Expertise.
Proceedings of the 24th Americas Conference on Information Systems, 2018

Cybersecurity Threats in the Context of Project Meta-Phases.
Proceedings of the 24th Americas Conference on Information Systems, 2018

2017
Identifying Traits and Values of Top-Performing Information Security Personnel.
J. Comput. Inf. Syst., 2017

A stitch in time saves nine: the role of moral judgement in reducing internet policy violations.
Int. J. Bus. Inf. Syst., 2017

Rootkit detection through phase-space analysis of power voltage measurements.
Proceedings of the 12th International Conference on Malicious and Unwanted Software, 2017

Uncertainty, Personality, and Attitudes toward DevOps.
Proceedings of the 23rd Americas Conference on Information Systems, 2017

2016
Continuance of protective security behavior: A longitudinal study.
Decis. Support Syst., 2016

Defining Audience Awareness for Information Systems Research.
Proceedings of the 2016 ACM SIGMIS Conference on Computers and People Research, 2016

2015
Personality, attitudes, and intentions: Predicting initial adoption of information security behavior.
Comput. Secur., 2015

Characterizing the Traits of Top-Performing Security Personnel.
Proceedings of the 2015 ACM SIGMIS Conference on Computers and People Research, 2015

Strategies for Ensuring High Availability Cloud Services.
Proceedings of the 21st Americas Conference on Information Systems, 2015

2014
Analysis of Monolithic and Microkernel Architectures: Towards Secure Hypervisor Design.
Proceedings of the 47th Hawaii International Conference on System Sciences, 2014

Extending the Cloud with Fog: Security Challenges & Opportunities.
Proceedings of the 20th Americas Conference on Information Systems, 2014

2013
Improving service continuity: IT disaster prevention and mitigation for data centers.
Proceedings of the 2nd annual conference on Research in information technology, 2013

A Measure for Assessing the Adequacy of DDOS Defenses.
Proceedings of the 19th Americas Conference on Information Systems, 2013

2012
Knowledge and Skill Requirements for Entry-Level IT Workers: A Longitudinal Study.
J. Inf. Syst. Educ., 2012

2011
The influence of the informal social learning environment on information privacy policy compliance efficacy and intention.
Eur. J. Inf. Syst., 2011

2010
Impact of Negative Message Framing on Security Adoption.
J. Comput. Inf. Syst., 2010

The Relationship between IT Director Values and Extent of IT Disaster Recovery Planning in the Banking Industry.
Int. J. Inf. Syst. Crisis Response Manag., 2010

2009
A canonical analysis of intentional information security breaches by insiders.
Inf. Manag. Comput. Secur., 2009

Establishing the IT Disaster Recovery Planning Construct.
Proceedings of the 15th Americas Conference on Information Systems, 2009

2007
Podcasting for e-learning, communication, and delivery.
Ind. Manag. Data Syst., 2007

The IT Security Adoption Conundrum: An Initial Step Toward Validation of Applicable Measures.
Proceedings of the Reaching New Heights. 13th Americas Conference on Information Systems, 2007

2006
Personality and IT security: An application of the five-factor model.
Proceedings of the Connecting the Americas. 12th Americas Conference on Information Systems, 2006

Perceived Value of Podcasting: Student Communication-Medium Preferences.
Proceedings of the Connecting the Americas. 12th Americas Conference on Information Systems, 2006


  Loading...