This document provides a summary of Jackie Rees' employment history, education, research interests, teaching interests, publications, presentations, student advising, and other professional activities. It shows that Jackie Rees is an Associate Professor of Management and Management Information Systems at Purdue University's Krannert Graduate School of Management, with research interests in information security, machine learning, and data mining. She has numerous publications in top journals and conferences and has advised many PhD students in completing their dissertations.
2. Kannan, K., Rees, J. and Sridhar, S. (2007) “Market Reactions to Information Security Breach Announcements: Insights and Recommendations,” International Journal of Electronic Commerce. 12(1), 69-91.
3.
4. Rees, J., Bandyopadhyay, S., and Spafford, E. (2003) “PFIRES: A Policy Framework of Information Security for Electronic Commerce,” Communications of the ACM. 46(7), 101-106
5. Rees, J. and Koehler, G. J. (2002) "An Evolutionary Approach to Group Decision-Making," INFORMS Journal of Computing. 14(3), 278-292.
6.
7. Sridhar, S., Altinkemer, K., and Rees, J. (2005) “Software Vulnerabilities: Open Source versus Proprietary Software Security,” Proceedings from the Association for Information Systems 2005 Americas Conference on Information Systems (AMCIS 2005), Omaha, NE.
8. Kannan, K., Rees, J., and Sridhar, S. (2004) “The Effects of Information Security Breach Announcements on Stock Price: Long-Term Impacts and the Role of the Technology Bubble,” Proceedings from the INFORMS Conference on Information Systems and Technology (CIST 2004), Denver, CO.
9. Kim, J. Y. and Rees, J. (2003) “Examining the Effect of Risk on IS Outsourcing Decisions: A Preliminary Approach,” Proceedings from the INFORMS Conference on Information Systems and Technology (CIST 2003), Atlanta, GA.
10. Rees, J., Koehler, G. J., and Ozcelik, Y. (2003) “Information Privacy and e-Business Activities: Key Issues for Managers,” in Managing E-Businesses in the 21st Century, eds S. K. Sharma and J. N. D. Gupta.
11. Jaisingh, J. and Rees, J. (2001) “Value at Risk: A Methodology for Information Security Risk Assessment,” Proceedings from the INFORMS Conference on Information Systems and Technology (CIST 2001), Miami, FL.
12. Rees, J. (2001) “Transaction Security in B2C eCommerce: Perceptions and Reality,” Proceedings from the Ninth International Conference on Human-Computer Interaction 2001, New Orleans, LA.
13.
14.
15. “Do Information Security Breach Announcements Provide Profitable Short-Term Investment Opportunities?” T. Wang, K. Kannan, and J. Rees
16. “Competing for Attention: An Empirical Study of Online Reviewers’ Strategic Behaviors,” W. Shen, Y. Hu, and J. Rees
17. “Knowledge Sharing Using KMS: When Do You Ask and When Do You Answer?” A. Mukherjee, J. Hahn, and J. Rees
18.
19. “Investors Perceptions of Information Security Incidents,” T. Wang, K. Kannan, and J. Rees, University of Illinois at Urbana-Champaign Research Seminar, December 8, 2008.
20. “Do Information Security Breach Announcements Provide Profitable Short-Term Investment Opportunities?” with T. Wang and K. Kannan, INFORMS, Washington, DC, October 12-15, 2008.
21. “Reading the Disclosures with New Eyes: Bridging the Gap Between Information Security Disclosures and Incidents,” T. Wang, J. Rees, and K. Kannan, Workshop on the Economics of Information Security (WEIS), Hanover, NH, June 25-28, 2008
22. “Reading the Disclosures with New Eyes: Bridging the Gap Between Information Security Disclosures and Incidents,” with T. Wang and K. Kannan, University of Illinois at Urbana-Champaign Research Seminar, February 22, 2008.
23. “Text Mining: Major Factors of Information Security Risks Disclosed in Financial Reports” with T. Wang, INFORMS, Seattle, WA, November 3-6, 2007.
24. “Future Directions in Methodologies and Tools for the Management of Security” AMCIS 2007, Keystone, CO, August 9-12, 2007.
25. “Survival of the Fittest: Firm Evolution During the DotCom Era” INFORMS, Pittsburgh, PA, November 5-8, 2006.
26. “Open or Closed? An Analysis of Information Security Vulnerabilities in Open Source and Proprietary Software,” with K. Altinkemer, F. Farahmand, and C. Zhang, University of Florida Research Seminar, February 16, 2006.
27. “Vulnerabilities and Risk Management of Open Source Software: An Empirical Study,” with K. Altinkemer and S. Sridhar, Purdue University, MIS Workshop Series, September 23, 2005.
28. “Vulnerabilities and Risk Management of Open Source Software: An Empirical Study,” with K. Altinkemer and S. Sridhar, University of Illinois at Urbana Champaign Research Seminar, March 4, 2005.
29. “Open Source vs. Proprietary Software: A Security Perspective,” with S. Sridhar and K. Altinkemer, INFORMS, Denver, CA, October 2004.
31. “Open Source vs. Proprietary Software: A Security Perspective,” with K. Altinkemer and S. Sridhar, CORS/INFORMS International Meeting, Banff, AB Canada, May 2004.
32. “The State of Risk Assessment Practices in Information Security: An Exploratory Investigation,” University of Nebraska – Lincoln Research Seminar, February 20, 2004.