SlideShare a Scribd company logo
1 of 9
Jackie Rees <br />100. S. Grant St, West Lafayette, IN 47907<br />Office: (765) 494-0320 Fax: (765) 494-9658jrees@purdue.edu<br />EMPLOYMENT:<br />August 2005 - current: Associate Professor of Management, Management Information Systems, Krannert Graduate School of Management, Purdue University. <br />August 1998 –July 2005: Assistant Professor of Management, Management Information Systems, Krannert Graduate School of Management, Purdue University.  <br />EDUCATION:<br />Doctor of Philosophy (Decision and Information Sciences), <br />University of Florida, Warrington College of Business Administration, 1998.<br />Bachelor of Science in Business Administration (Decision and Information Sciences), University of Florida, Warrington College of Business Administration, 1992.<br />RESEARCH INTERESTS:<br />Information Security: Risk Management, Security Policy and Privacy<br />Machine Learning: Genetic Algorithms, Reinforcement Learning, and Data Mining<br />TEACHING INTERESTS:<br />Information Security Management<br />Programming<br />Database Management Systems<br />Decision Support Systems<br />Artificial Intelligence<br />IS Strategy<br />Systems Analysis and Design<br />JOURNAL PUBLICATIONS:<br />Rees, J. and Allen, J. P. (2008) “The State of Risk Assessment Practices in Information Security: An Exploratory Investigation,” Journal of Organizational Computing and Electronic Commerce. 18(4), 255-277.<br />Altinkemer, K., Rees, J., and Sridhar, S. (2008) “Vulnerabilities and Risk Management of Open Source Software: An Empirical Study,” Journal of Information Systems Security. 4(2), 3-25.<br />,[object Object]
Kannan, K., Rees, J. and Sridhar, S. (2007) “Market Reactions to Information Security Breach Announcements: Insights and Recommendations,” International Journal of Electronic Commerce. 12(1), 69-91.
Choobineh, J., Dhillon, G., Grimaila, M. R., and Rees, J. (2007) “Management of Information Security: Challenges and Research Directions,” Communications of the AIS. 20, Article 57.Rees, J. and Koehler, G. J. (2006) quot;
Learning Genetic Algorithm Parameters Using Hidden Markov Models,quot;
 European Journal of Operational Research. 175(2), 806-820.<br />Bandyopadhyay, S., Rees, J., and Barron, J. (2006) “Simulating Sellers in Online Exchanges,” Decision Support Systems. 41(2), 500-513.<br />Gupta, M., Rees, J., Chaturvedi, A., and Chi, J. (2006) “Matching Information Security Vulnerabilities to Organizational Profiles: A Genetic Algorithm Approach,” Decision Support Systems. 41(3), 592-603.<br />,[object Object]
Rees, J., Bandyopadhyay, S., and Spafford, E. (2003) “PFIRES: A Policy Framework of Information Security for Electronic Commerce,” Communications of the ACM. 46(7), 101-106
Rees, J. and Koehler, G. J. (2002) "An Evolutionary Approach to Group Decision-Making," INFORMS Journal of Computing. 14(3), 278-292.
Rees, J. and Koehler, G. J. (2002) “Evolution in Groups: A Genetic Algorithm Approach to Group Decision Support Systems,” Information Technology and Management. 3(3), 213-227.Rees, J. and Barkhi, R. (2001) quot;
The Problem of Highly Constrained Tasks in Group Decision Support Systems,” European Journal of Operational Research. 135(1), 220-229.<br />,[object Object],REFEREED PROCEEDINGS AND BOOK CHAPTERS:<br />,[object Object]
Sridhar, S., Altinkemer, K., and Rees, J. (2005) “Software Vulnerabilities: Open Source versus Proprietary Software Security,” Proceedings from the Association for Information Systems 2005 Americas Conference on Information Systems (AMCIS 2005), Omaha, NE.
Kannan, K., Rees, J., and Sridhar, S. (2004) “The Effects of Information Security Breach Announcements on Stock Price: Long-Term Impacts and the Role of the Technology Bubble,” Proceedings from the INFORMS Conference on Information Systems and Technology (CIST 2004), Denver, CO.
Kim, J. Y. and Rees, J. (2003) “Examining the Effect of Risk on IS Outsourcing Decisions: A Preliminary Approach,” Proceedings from the INFORMS Conference on Information Systems and Technology (CIST 2003), Atlanta, GA.

More Related Content

Similar to Jackie Rees

Who Watches the Watchers Metrics for Security Strategy - BsidesLV 2015 - Roytman
Who Watches the Watchers Metrics for Security Strategy - BsidesLV 2015 - RoytmanWho Watches the Watchers Metrics for Security Strategy - BsidesLV 2015 - Roytman
Who Watches the Watchers Metrics for Security Strategy - BsidesLV 2015 - RoytmanMichael Roytman
 
Technology delivers improved opportunities for success to an organiz.docx
Technology delivers improved opportunities for success to an organiz.docxTechnology delivers improved opportunities for success to an organiz.docx
Technology delivers improved opportunities for success to an organiz.docxjacqueliner9
 
Running head ANNOTATED BIBLIOGRAPHYANNOTATED BIBLIOGRAPHY2.docx
Running head ANNOTATED BIBLIOGRAPHYANNOTATED BIBLIOGRAPHY2.docxRunning head ANNOTATED BIBLIOGRAPHYANNOTATED BIBLIOGRAPHY2.docx
Running head ANNOTATED BIBLIOGRAPHYANNOTATED BIBLIOGRAPHY2.docxhealdkathaleen
 
Data Metrics and Automation: A Strange Loop - SIRAcon 2015
Data Metrics and Automation: A Strange Loop - SIRAcon 2015Data Metrics and Automation: A Strange Loop - SIRAcon 2015
Data Metrics and Automation: A Strange Loop - SIRAcon 2015Michael Roytman
 
Ics 3210 information systems security and audit - edited
Ics 3210   information systems security and audit - editedIcs 3210   information systems security and audit - edited
Ics 3210 information systems security and audit - editedNelson Kimathi
 
Top 2 Cited Papers in 2017 - International Journal of Network Security & Its ...
Top 2 Cited Papers in 2017 - International Journal of Network Security & Its ...Top 2 Cited Papers in 2017 - International Journal of Network Security & Its ...
Top 2 Cited Papers in 2017 - International Journal of Network Security & Its ...IJNSA Journal
 
BROWN BAG TALK WITH MICAH ALTMAN, SOURCES OF BIG DATA FOR SOCIAL SCIENCES
BROWN BAG TALK WITH MICAH ALTMAN, SOURCES OF BIG DATA FOR SOCIAL SCIENCESBROWN BAG TALK WITH MICAH ALTMAN, SOURCES OF BIG DATA FOR SOCIAL SCIENCES
BROWN BAG TALK WITH MICAH ALTMAN, SOURCES OF BIG DATA FOR SOCIAL SCIENCESMicah Altman
 
Information privacy and Security
Information privacy and SecurityInformation privacy and Security
Information privacy and SecurityAnuMarySunny
 
New Research Articles 2020 September Issue International Journal of Software ...
New Research Articles 2020 September Issue International Journal of Software ...New Research Articles 2020 September Issue International Journal of Software ...
New Research Articles 2020 September Issue International Journal of Software ...ijseajournal
 
Who Watches the Watchers? Metrics for Security Strategy
Who Watches the Watchers? Metrics for Security StrategyWho Watches the Watchers? Metrics for Security Strategy
Who Watches the Watchers? Metrics for Security StrategyKenna
 
Brief bibliography of interestingness measure, bayesian belief network and ca...
Brief bibliography of interestingness measure, bayesian belief network and ca...Brief bibliography of interestingness measure, bayesian belief network and ca...
Brief bibliography of interestingness measure, bayesian belief network and ca...Adnan Masood
 
Running head PROTECTING CONFIDENTIAL INFORMATION1PROTECTIN.docx
Running head PROTECTING CONFIDENTIAL INFORMATION1PROTECTIN.docxRunning head PROTECTING CONFIDENTIAL INFORMATION1PROTECTIN.docx
Running head PROTECTING CONFIDENTIAL INFORMATION1PROTECTIN.docxjeanettehully
 
Relationship Web: Trailblazing, Analytics and Computing for Human Experience
Relationship Web: Trailblazing, Analytics and Computing for Human ExperienceRelationship Web: Trailblazing, Analytics and Computing for Human Experience
Relationship Web: Trailblazing, Analytics and Computing for Human ExperienceAmit Sheth
 
[DSC Croatia 22] Writing scientific papers about data science projects - Mirj...
[DSC Croatia 22] Writing scientific papers about data science projects - Mirj...[DSC Croatia 22] Writing scientific papers about data science projects - Mirj...
[DSC Croatia 22] Writing scientific papers about data science projects - Mirj...DataScienceConferenc1
 
Referensi 5 Topik It
Referensi 5 Topik ItReferensi 5 Topik It
Referensi 5 Topik Itcijerah
 
MITS Advanced Research TechniquesResearch ProposalCandidate.docx
MITS Advanced Research TechniquesResearch ProposalCandidate.docxMITS Advanced Research TechniquesResearch ProposalCandidate.docx
MITS Advanced Research TechniquesResearch ProposalCandidate.docxroushhsiu
 
Reality Mining
Reality MiningReality Mining
Reality MiningCI&T
 
Kato Mivule: COGNITIVE 2013 - An Overview of Data Privacy in Multi-Agent Lear...
Kato Mivule: COGNITIVE 2013 - An Overview of Data Privacy in Multi-Agent Lear...Kato Mivule: COGNITIVE 2013 - An Overview of Data Privacy in Multi-Agent Lear...
Kato Mivule: COGNITIVE 2013 - An Overview of Data Privacy in Multi-Agent Lear...Kato Mivule
 

Similar to Jackie Rees (20)

Who Watches the Watchers Metrics for Security Strategy - BsidesLV 2015 - Roytman
Who Watches the Watchers Metrics for Security Strategy - BsidesLV 2015 - RoytmanWho Watches the Watchers Metrics for Security Strategy - BsidesLV 2015 - Roytman
Who Watches the Watchers Metrics for Security Strategy - BsidesLV 2015 - Roytman
 
Technology delivers improved opportunities for success to an organiz.docx
Technology delivers improved opportunities for success to an organiz.docxTechnology delivers improved opportunities for success to an organiz.docx
Technology delivers improved opportunities for success to an organiz.docx
 
Running head ANNOTATED BIBLIOGRAPHYANNOTATED BIBLIOGRAPHY2.docx
Running head ANNOTATED BIBLIOGRAPHYANNOTATED BIBLIOGRAPHY2.docxRunning head ANNOTATED BIBLIOGRAPHYANNOTATED BIBLIOGRAPHY2.docx
Running head ANNOTATED BIBLIOGRAPHYANNOTATED BIBLIOGRAPHY2.docx
 
Data Metrics and Automation: A Strange Loop - SIRAcon 2015
Data Metrics and Automation: A Strange Loop - SIRAcon 2015Data Metrics and Automation: A Strange Loop - SIRAcon 2015
Data Metrics and Automation: A Strange Loop - SIRAcon 2015
 
Ics 3210 information systems security and audit - edited
Ics 3210   information systems security and audit - editedIcs 3210   information systems security and audit - edited
Ics 3210 information systems security and audit - edited
 
Top 2 Cited Papers in 2017 - International Journal of Network Security & Its ...
Top 2 Cited Papers in 2017 - International Journal of Network Security & Its ...Top 2 Cited Papers in 2017 - International Journal of Network Security & Its ...
Top 2 Cited Papers in 2017 - International Journal of Network Security & Its ...
 
BROWN BAG TALK WITH MICAH ALTMAN, SOURCES OF BIG DATA FOR SOCIAL SCIENCES
BROWN BAG TALK WITH MICAH ALTMAN, SOURCES OF BIG DATA FOR SOCIAL SCIENCESBROWN BAG TALK WITH MICAH ALTMAN, SOURCES OF BIG DATA FOR SOCIAL SCIENCES
BROWN BAG TALK WITH MICAH ALTMAN, SOURCES OF BIG DATA FOR SOCIAL SCIENCES
 
Information privacy and Security
Information privacy and SecurityInformation privacy and Security
Information privacy and Security
 
Contextual Analysis
Contextual AnalysisContextual Analysis
Contextual Analysis
 
New Research Articles 2020 September Issue International Journal of Software ...
New Research Articles 2020 September Issue International Journal of Software ...New Research Articles 2020 September Issue International Journal of Software ...
New Research Articles 2020 September Issue International Journal of Software ...
 
Ist curriculum
Ist curriculumIst curriculum
Ist curriculum
 
Who Watches the Watchers? Metrics for Security Strategy
Who Watches the Watchers? Metrics for Security StrategyWho Watches the Watchers? Metrics for Security Strategy
Who Watches the Watchers? Metrics for Security Strategy
 
Brief bibliography of interestingness measure, bayesian belief network and ca...
Brief bibliography of interestingness measure, bayesian belief network and ca...Brief bibliography of interestingness measure, bayesian belief network and ca...
Brief bibliography of interestingness measure, bayesian belief network and ca...
 
Running head PROTECTING CONFIDENTIAL INFORMATION1PROTECTIN.docx
Running head PROTECTING CONFIDENTIAL INFORMATION1PROTECTIN.docxRunning head PROTECTING CONFIDENTIAL INFORMATION1PROTECTIN.docx
Running head PROTECTING CONFIDENTIAL INFORMATION1PROTECTIN.docx
 
Relationship Web: Trailblazing, Analytics and Computing for Human Experience
Relationship Web: Trailblazing, Analytics and Computing for Human ExperienceRelationship Web: Trailblazing, Analytics and Computing for Human Experience
Relationship Web: Trailblazing, Analytics and Computing for Human Experience
 
[DSC Croatia 22] Writing scientific papers about data science projects - Mirj...
[DSC Croatia 22] Writing scientific papers about data science projects - Mirj...[DSC Croatia 22] Writing scientific papers about data science projects - Mirj...
[DSC Croatia 22] Writing scientific papers about data science projects - Mirj...
 
Referensi 5 Topik It
Referensi 5 Topik ItReferensi 5 Topik It
Referensi 5 Topik It
 
MITS Advanced Research TechniquesResearch ProposalCandidate.docx
MITS Advanced Research TechniquesResearch ProposalCandidate.docxMITS Advanced Research TechniquesResearch ProposalCandidate.docx
MITS Advanced Research TechniquesResearch ProposalCandidate.docx
 
Reality Mining
Reality MiningReality Mining
Reality Mining
 
Kato Mivule: COGNITIVE 2013 - An Overview of Data Privacy in Multi-Agent Lear...
Kato Mivule: COGNITIVE 2013 - An Overview of Data Privacy in Multi-Agent Lear...Kato Mivule: COGNITIVE 2013 - An Overview of Data Privacy in Multi-Agent Lear...
Kato Mivule: COGNITIVE 2013 - An Overview of Data Privacy in Multi-Agent Lear...
 

More from butest

EL MODELO DE NEGOCIO DE YOUTUBE
EL MODELO DE NEGOCIO DE YOUTUBEEL MODELO DE NEGOCIO DE YOUTUBE
EL MODELO DE NEGOCIO DE YOUTUBEbutest
 
1. MPEG I.B.P frame之不同
1. MPEG I.B.P frame之不同1. MPEG I.B.P frame之不同
1. MPEG I.B.P frame之不同butest
 
LESSONS FROM THE MICHAEL JACKSON TRIAL
LESSONS FROM THE MICHAEL JACKSON TRIALLESSONS FROM THE MICHAEL JACKSON TRIAL
LESSONS FROM THE MICHAEL JACKSON TRIALbutest
 
Timeline: The Life of Michael Jackson
Timeline: The Life of Michael JacksonTimeline: The Life of Michael Jackson
Timeline: The Life of Michael Jacksonbutest
 
Popular Reading Last Updated April 1, 2010 Adams, Lorraine The ...
Popular Reading Last Updated April 1, 2010 Adams, Lorraine The ...Popular Reading Last Updated April 1, 2010 Adams, Lorraine The ...
Popular Reading Last Updated April 1, 2010 Adams, Lorraine The ...butest
 
LESSONS FROM THE MICHAEL JACKSON TRIAL
LESSONS FROM THE MICHAEL JACKSON TRIALLESSONS FROM THE MICHAEL JACKSON TRIAL
LESSONS FROM THE MICHAEL JACKSON TRIALbutest
 
Com 380, Summer II
Com 380, Summer IICom 380, Summer II
Com 380, Summer IIbutest
 
The MYnstrel Free Press Volume 2: Economic Struggles, Meet Jazz
The MYnstrel Free Press Volume 2: Economic Struggles, Meet JazzThe MYnstrel Free Press Volume 2: Economic Struggles, Meet Jazz
The MYnstrel Free Press Volume 2: Economic Struggles, Meet Jazzbutest
 
MICHAEL JACKSON.doc
MICHAEL JACKSON.docMICHAEL JACKSON.doc
MICHAEL JACKSON.docbutest
 
Social Networks: Twitter Facebook SL - Slide 1
Social Networks: Twitter Facebook SL - Slide 1Social Networks: Twitter Facebook SL - Slide 1
Social Networks: Twitter Facebook SL - Slide 1butest
 
Facebook
Facebook Facebook
Facebook butest
 
Executive Summary Hare Chevrolet is a General Motors dealership ...
Executive Summary Hare Chevrolet is a General Motors dealership ...Executive Summary Hare Chevrolet is a General Motors dealership ...
Executive Summary Hare Chevrolet is a General Motors dealership ...butest
 
Welcome to the Dougherty County Public Library's Facebook and ...
Welcome to the Dougherty County Public Library's Facebook and ...Welcome to the Dougherty County Public Library's Facebook and ...
Welcome to the Dougherty County Public Library's Facebook and ...butest
 
NEWS ANNOUNCEMENT
NEWS ANNOUNCEMENTNEWS ANNOUNCEMENT
NEWS ANNOUNCEMENTbutest
 
C-2100 Ultra Zoom.doc
C-2100 Ultra Zoom.docC-2100 Ultra Zoom.doc
C-2100 Ultra Zoom.docbutest
 
MAC Printing on ITS Printers.doc.doc
MAC Printing on ITS Printers.doc.docMAC Printing on ITS Printers.doc.doc
MAC Printing on ITS Printers.doc.docbutest
 
Mac OS X Guide.doc
Mac OS X Guide.docMac OS X Guide.doc
Mac OS X Guide.docbutest
 
WEB DESIGN!
WEB DESIGN!WEB DESIGN!
WEB DESIGN!butest
 

More from butest (20)

EL MODELO DE NEGOCIO DE YOUTUBE
EL MODELO DE NEGOCIO DE YOUTUBEEL MODELO DE NEGOCIO DE YOUTUBE
EL MODELO DE NEGOCIO DE YOUTUBE
 
1. MPEG I.B.P frame之不同
1. MPEG I.B.P frame之不同1. MPEG I.B.P frame之不同
1. MPEG I.B.P frame之不同
 
LESSONS FROM THE MICHAEL JACKSON TRIAL
LESSONS FROM THE MICHAEL JACKSON TRIALLESSONS FROM THE MICHAEL JACKSON TRIAL
LESSONS FROM THE MICHAEL JACKSON TRIAL
 
Timeline: The Life of Michael Jackson
Timeline: The Life of Michael JacksonTimeline: The Life of Michael Jackson
Timeline: The Life of Michael Jackson
 
Popular Reading Last Updated April 1, 2010 Adams, Lorraine The ...
Popular Reading Last Updated April 1, 2010 Adams, Lorraine The ...Popular Reading Last Updated April 1, 2010 Adams, Lorraine The ...
Popular Reading Last Updated April 1, 2010 Adams, Lorraine The ...
 
LESSONS FROM THE MICHAEL JACKSON TRIAL
LESSONS FROM THE MICHAEL JACKSON TRIALLESSONS FROM THE MICHAEL JACKSON TRIAL
LESSONS FROM THE MICHAEL JACKSON TRIAL
 
Com 380, Summer II
Com 380, Summer IICom 380, Summer II
Com 380, Summer II
 
PPT
PPTPPT
PPT
 
The MYnstrel Free Press Volume 2: Economic Struggles, Meet Jazz
The MYnstrel Free Press Volume 2: Economic Struggles, Meet JazzThe MYnstrel Free Press Volume 2: Economic Struggles, Meet Jazz
The MYnstrel Free Press Volume 2: Economic Struggles, Meet Jazz
 
MICHAEL JACKSON.doc
MICHAEL JACKSON.docMICHAEL JACKSON.doc
MICHAEL JACKSON.doc
 
Social Networks: Twitter Facebook SL - Slide 1
Social Networks: Twitter Facebook SL - Slide 1Social Networks: Twitter Facebook SL - Slide 1
Social Networks: Twitter Facebook SL - Slide 1
 
Facebook
Facebook Facebook
Facebook
 
Executive Summary Hare Chevrolet is a General Motors dealership ...
Executive Summary Hare Chevrolet is a General Motors dealership ...Executive Summary Hare Chevrolet is a General Motors dealership ...
Executive Summary Hare Chevrolet is a General Motors dealership ...
 
Welcome to the Dougherty County Public Library's Facebook and ...
Welcome to the Dougherty County Public Library's Facebook and ...Welcome to the Dougherty County Public Library's Facebook and ...
Welcome to the Dougherty County Public Library's Facebook and ...
 
NEWS ANNOUNCEMENT
NEWS ANNOUNCEMENTNEWS ANNOUNCEMENT
NEWS ANNOUNCEMENT
 
C-2100 Ultra Zoom.doc
C-2100 Ultra Zoom.docC-2100 Ultra Zoom.doc
C-2100 Ultra Zoom.doc
 
MAC Printing on ITS Printers.doc.doc
MAC Printing on ITS Printers.doc.docMAC Printing on ITS Printers.doc.doc
MAC Printing on ITS Printers.doc.doc
 
Mac OS X Guide.doc
Mac OS X Guide.docMac OS X Guide.doc
Mac OS X Guide.doc
 
hier
hierhier
hier
 
WEB DESIGN!
WEB DESIGN!WEB DESIGN!
WEB DESIGN!
 

Jackie Rees

  • 1.
  • 2. Kannan, K., Rees, J. and Sridhar, S. (2007) “Market Reactions to Information Security Breach Announcements: Insights and Recommendations,” International Journal of Electronic Commerce. 12(1), 69-91.
  • 3.
  • 4. Rees, J., Bandyopadhyay, S., and Spafford, E. (2003) “PFIRES: A Policy Framework of Information Security for Electronic Commerce,” Communications of the ACM. 46(7), 101-106
  • 5. Rees, J. and Koehler, G. J. (2002) "An Evolutionary Approach to Group Decision-Making," INFORMS Journal of Computing. 14(3), 278-292.
  • 6.
  • 7. Sridhar, S., Altinkemer, K., and Rees, J. (2005) “Software Vulnerabilities: Open Source versus Proprietary Software Security,” Proceedings from the Association for Information Systems 2005 Americas Conference on Information Systems (AMCIS 2005), Omaha, NE.
  • 8. Kannan, K., Rees, J., and Sridhar, S. (2004) “The Effects of Information Security Breach Announcements on Stock Price: Long-Term Impacts and the Role of the Technology Bubble,” Proceedings from the INFORMS Conference on Information Systems and Technology (CIST 2004), Denver, CO.
  • 9. Kim, J. Y. and Rees, J. (2003) “Examining the Effect of Risk on IS Outsourcing Decisions: A Preliminary Approach,” Proceedings from the INFORMS Conference on Information Systems and Technology (CIST 2003), Atlanta, GA.
  • 10. Rees, J., Koehler, G. J., and Ozcelik, Y. (2003) “Information Privacy and e-Business Activities: Key Issues for Managers,” in Managing E-Businesses in the 21st Century, eds S. K. Sharma and J. N. D. Gupta.
  • 11. Jaisingh, J. and Rees, J. (2001) “Value at Risk: A Methodology for Information Security Risk Assessment,” Proceedings from the INFORMS Conference on Information Systems and Technology (CIST 2001), Miami, FL.
  • 12. Rees, J. (2001) “Transaction Security in B2C eCommerce: Perceptions and Reality,” Proceedings from the Ninth International Conference on Human-Computer Interaction 2001, New Orleans, LA.
  • 13.
  • 14.
  • 15. “Do Information Security Breach Announcements Provide Profitable Short-Term Investment Opportunities?” T. Wang, K. Kannan, and J. Rees
  • 16. “Competing for Attention: An Empirical Study of Online Reviewers’ Strategic Behaviors,” W. Shen, Y. Hu, and J. Rees
  • 17. “Knowledge Sharing Using KMS: When Do You Ask and When Do You Answer?” A. Mukherjee, J. Hahn, and J. Rees
  • 18.
  • 19. “Investors Perceptions of Information Security Incidents,” T. Wang, K. Kannan, and J. Rees, University of Illinois at Urbana-Champaign Research Seminar, December 8, 2008.
  • 20. “Do Information Security Breach Announcements Provide Profitable Short-Term Investment Opportunities?” with T. Wang and K. Kannan, INFORMS, Washington, DC, October 12-15, 2008.
  • 21. “Reading the Disclosures with New Eyes: Bridging the Gap Between Information Security Disclosures and Incidents,” T. Wang, J. Rees, and K. Kannan, Workshop on the Economics of Information Security (WEIS), Hanover, NH, June 25-28, 2008
  • 22. “Reading the Disclosures with New Eyes: Bridging the Gap Between Information Security Disclosures and Incidents,” with T. Wang and K. Kannan, University of Illinois at Urbana-Champaign Research Seminar, February 22, 2008.
  • 23. “Text Mining: Major Factors of Information Security Risks Disclosed in Financial Reports” with T. Wang, INFORMS, Seattle, WA, November 3-6, 2007.
  • 24. “Future Directions in Methodologies and Tools for the Management of Security” AMCIS 2007, Keystone, CO, August 9-12, 2007.
  • 25. “Survival of the Fittest: Firm Evolution During the DotCom Era” INFORMS, Pittsburgh, PA, November 5-8, 2006.
  • 26. “Open or Closed? An Analysis of Information Security Vulnerabilities in Open Source and Proprietary Software,” with K. Altinkemer, F. Farahmand, and C. Zhang, University of Florida Research Seminar, February 16, 2006.
  • 27. “Vulnerabilities and Risk Management of Open Source Software: An Empirical Study,” with K. Altinkemer and S. Sridhar, Purdue University, MIS Workshop Series, September 23, 2005.
  • 28. “Vulnerabilities and Risk Management of Open Source Software: An Empirical Study,” with K. Altinkemer and S. Sridhar, University of Illinois at Urbana Champaign Research Seminar, March 4, 2005.
  • 29. “Open Source vs. Proprietary Software: A Security Perspective,” with S. Sridhar and K. Altinkemer, INFORMS, Denver, CA, October 2004.
  • 30. “Simulating Heterogeneous Sellers in Online Exchanges,” with S. Bandyopadhyay, INFORMS, Denver, CA, October 2004.
  • 31. “Open Source vs. Proprietary Software: A Security Perspective,” with K. Altinkemer and S. Sridhar, CORS/INFORMS International Meeting, Banff, AB Canada, May 2004.
  • 32. “The State of Risk Assessment Practices in Information Security: An Exploratory Investigation,” University of Nebraska – Lincoln Research Seminar, February 20, 2004.
  • 33. “Fitting Genetic Algorithms Using Hidden Markov Chains,” INFORMS, Atlanta, GA, October, 2003.
  • 34.
  • 35.
  • 36. Project Director/Faculty Sponsor I3P Post-Doctoral Research Fellowship, 2005-2006.
  • 37. Information Technology at Purdue (ITaP) Digital Content Development Grant, 2005.
  • 38. Purdue Research Foundation Summer Grant, 2002, 2004.
  • 39. Krannert Distinguished Teacher, 1999-2003, 2005-2007.
  • 40. Jay N. Ross Young Faculty Scholar Award, 2002.
  • 41.
  • 42. Secretary-Treasurer, INFORMS Information Systems Society, 2007-current.
  • 43. Editorial Review Board Member, Journal of Database Management, 2005 - current.
  • 44. Associate Editor, Communications of the ACM, 2009 – current.
  • 45. Program Committee Member, Midwest Association for Information Systems (AIS) 2005.
  • 46. Program Committee Member, Workshop on Information Technology and Systems (WITS) 2003-current.
  • 47. Program Committee Member, Workshop on eBusiness (WEB) 2003-current.
  • 48. Program Committee Member, Conference on Information Systems (CIST) 2003, 2007.
  • 49. Doctoral Student Activities Coordinator INFORMS Section on Artificial Intelligence 1998-2007.
  • 50. Cluster Co-Chair for College of Artificial Intelligence, INFORMS Annual Meeting, 2001.
  • 51. Session Chair for Artificial Intelligence, INFORMS Annual Meeting 2007, 2004, 2001, 2000, 1999.
  • 52. Session Chair for Information Systems, INFORMS Annual Meeting, 2004, 2003.
  • 53.
  • 54. Internal Advisory Board Member, CERIAS, Purdue University, 2005 - current.
  • 55. Purdue University Educational Technology Advisory Committee, 2006-current.
  • 56. Purdue University Executive IT Steering Committee, 2007-current.
  • 57. Krannert Innovation and Technology Club Faculty Advisor, Purdue University, 2004 current.
  • 58. Information Access Committee Chair, Krannert School of Management 2006-current.
  • 59. Undergraduate Advisory Committee Member, 2008-2009.
  • 60. Information Technology Access Committee Member, Krannert School of Management, 1999, 2003-2006.
  • 61. Masters Program Review - MSIA Subcommittee, Krannert School of Management, 2003-2004.
  • 62. MBA Admissions Committee Member, Krannert Graduate School of Management, 2000-current.
  • 63. Grievance Committee Member, Krannert School of Management, 2001-2002.
  • 64. STAR Committee Member, Krannert School of Management, 2000-2002.
  • 65. Feedback and Evaluation Committee Member, Krannert School of Management, 2000.
  • 66. MIS Association Faculty Advisor, Purdue University, 1999-2000.
  • 67. MIS Ph.D. Student Admissions Committee, Krannert School of Management, 1999-current.
  • 68. MIS Faculty Search Committee, Krannert School of Management, 1998-current.
  • 69.