Upload
others
View
3
Download
0
Embed Size (px)
Citation preview
RANDALLJ.BOYLEAssociateProfessorDept.ofBusinessAdministrationGoddardSchoolofBusiness&EconomicsWeberStateUniversity1337EdvalsonSt.,Dept.3801Ogden,UT84408
E-mail:[email protected]:801-626-7831Office:Wattis282LinkedIn:https://www.linkedin.com/in/randallboyle
EDUCATION
Ph.D.,2003,ManagementofInformationSystems,FloridaStateUniversity,Tallahassee,FL.Dissertation:DispersedDeception:Anexaminationoftheimpactsofcomputermediation,proximity,andfamiliarityontruthbias
Master’sinPublicAdministration,2000,BrighamYoungUniversity,Provo,UT. Dean’sList,GPA3.89of4.00B.S.BusinessFinance,1998,BrighamYoungUniversity,Provo,UT.A.A.GeneralEducation,1996,WeberStateUniversity,Ogden,UT.
RESEARCHACTIVITIES
REFEREEDPUBLICATIONS1. Boyle,R.,Clements,J.,andProudfoot,J.,(2017).MeasuringDeception:ALookatAntecedentsto
DeceptiveIntent(ForthcomingatAmericanJournalofPsychology).2. Boyle,R.,Chandrashekar,D.,andClements,J.,(2017)ValuingInformationSecurity:ALookatthe
influenceofuserengagementoninformationsecurityvaluations,JournalofInformationPrivacyandSecurity,13:3,137-156.
3. Proudfoot,J.,Boyle,R.,Schuetzler,R.,(2016).Manvs.machine:Investigatingtheeffectsofadversarialsystemuseonend-userbehaviorinautomateddeceptiondetectioninterviews,DecisionSupportSystems,85:23-33.
4. Clements,J.,Boyle,R.,andProudfoot,J.,(2016).Exploringpoliticalskillanddeception.InternationalJournalofSociologyandSocialPolicy36(3/4):138-156.
5. McDonald,D.,Boyle,R.,Anderson,J.,(2016).WhenDeceitfulChatsLookTruthful.JournalofComputerInformationSystems,56(4):331-340.
6. Boyle,R.,C.Kacmar,J.George(2010)ElectronicDeception:HowProximity,Computer-mediation,andtheTruthBiasmayInfluenceDeceptiveMessages.InInterdisciplinaryPerspectivesonE-Collaboration:EmergingTrendsandApplications.Hershey:IGIGlobal(ISBN-13:978-1615206766).
7. Boyle,R.,C.Kacmar,J.George(2009)DistributedDeception:AnInvestigationoftheEffectivenessofDeceptiveCommunicationinaComputer-mediatedEnvironment.InP.Zaphiris&C.S.Ang(Eds.),HumanComputerInteraction:Concepts,Methodologies,Tools,andApplications(1970-1994).Hershey:IGIGlobal.
8. Boyle,R.,C.Kacmar,J.George(2008)DistributedDeception:AnInvestigationoftheEffectivenessofDeceptiveCommunicationinaComputer-mediatedEnvironment.InternationalJournalofE-Collaboration4(3):14-39.(PaperoftheYear)
2
9. Boyle,R.,Ruppel,C.(2006).On-linePurchasingIntent:TheEffectofPersonalInnovativeness,PerceivedRisk,andComputerSelf-Efficacy.JournalofInternationalTechnologyandInformationManagement15(2):61-74.
10. Thatcher,J.B.,LeeP.Stepina,RandallJ.Boyle(2003).TurnoverofInformationTechnologyWorkers:ExaminingEmpiricallytheInfluenceofAttitudes,JobCharacteristics,andExternalMarkets.JournalofManagementInformationSystems19(3):231-261.
REFEREEDCONFERENCEPAPERS1. Reed,D.,andBoyle,R.,(2017).TheSocialValueofAmendingtheComputerFraudandAbuseAct
andtheElectronicCommunicationsPrivacyAct.PacificSouthwestAcademyofLegalStudiesinBusiness2017AnnualConference,PalmSprings,CA.
2. McDonald,D.,Boyle,R.,andAnderson,J.,(2014).UsinganSOMtoVisualizeDeceptiveChatContent.InternationalAssociationforComputerInformationSystems,LasVegas,NV.
3. Proudfoot,J.,Boyle,R.,Clements,J.,(2013).MitigatingThreatstoCollaborationandCMC:IdentifyingAntecedentsofOnlineDeviance.HawaiiInternationalConferenceonSystemSciences,Waikoloa,HI.
4. Boyle,R.,Clements,J.,Proudfoot,J.,(2012).PredictingDeceptiveBehavior:Exploringantecedentstodeceptivebehaviors.NationalCommunicationAssociation98thAnnualConference,Orlando,FL.
5. Boyle,R.,Ruppel,C.,(2005).TheImpactofMediaRichness,Suspicion,andTruthBiasonDeceptionDetection.HawaiiInternationalConferenceonSystemSciences,Waikoloa,HI.
6. Boyle,R.,Ruppel,C.,(2004).On-linePurchasingIntent:TheEffectofPersonalInnovativeness,PerceivedRisk,andComputerSelf-Efficacy.IntheProceedingsoftheAnnualMeetingoftheSouthernAssociationforInformationSystems,Savannah,GA.
7. Boyle,R.,DeWitt,T.,(2002).Trust:HowM.A.N.InfluencesOnlineTransactions.IntheProceedingsoftheAmericanMarketingAssociationWinter2002EducatorsConference,Austin,TX.
8. Boyle,R.,Thatcher,J.,(2001).OrganizationalCommitmentandITworkers:AConceptualModel.IntheProceedingsoftheAnnualMeetingoftheSouthernAssociationforInformationSystems,Savannah,GA.
CURRENTRESEARCHPAPERS 1. Boyle,R.,andClements,J.,(2017).CompulsiveUseofMobileApplications(underreviewatJournal
oftheAssociationforInformationSystems).2. Proudfoot,J.,Boyle,R.,andClements,J.,(2017).OnlineAnti-SocialBehaviors:Anexaminationof
contributingfactorstocyberbullying(TargetedforInformationSystemsResearch).3. King,S.,Clements,J.,Boyle,R.,andNoack,D.,(2017).TheImpactofBrandSelfPerceptionson
habitualISuse(targetedfortheJournalofMarketing).4. Noack,D.,Boyle,R.,Clements,J.,andKing,S.,(2017).InnovativeHabits:Alookattheimpactof
innovativenessonhabitualISuseandindividualonlinepurchasingintent.5. Clements,J.,Boyle,R.,Noack,D.,andKing,S.,(2017).SinkingHabits:Alookattheimpactofsunk
costsonautomaticISuse(targetedforJAIS).6. Reed,D.,andBoyle,R.,(2017).TheSocialValueofAmendingtheComputerFraudandAbuseAct
andtheElectronicCommunicationsPrivacyAct(TargetedforUtahLawReview).7. Boyle,R.,(2017)BotPurge:Alookathowfraudulentaccountsmayimpactpublicvaluations.
3
8. Boyle,R.,Proudfoot,J.,(2018).CrossPollination:Theeffectsofcross-siteuseraccountsonaccountsecurity.(TargetedforInformationSystemsResearch.)
9. Boyle,R.,Proudfoot,J.,(2018).AdaptiveManglingRules:Acomparisonofpasswordsources,structures,andstrength.(TargetingIEEETransactions)
BOOKS1. Kroenke,D.,Boyle,R.,(2018)ExperiencingMIS(8thedition).NewJersey:Pearson.(ISBN:TBD).2. Kroenke,D.,Boyle,R.,(2017)UsingMIS(10thedition).NewJersey:Pearson.(ISBN:978-
0134606996).3. Kroenke,D.,Boyle,R.,(2016)UsingMIS(9thedition).NewJersey:Pearson.(ISBN:978-0134106786).4. Kroenke,D.,Boyle,R.,(2016)ExperiencingMIS(7thedition).NewJersey:Pearson.(ISBN:978-
0134319063).5. Kroenke,D.,Boyle,R.,(2015)UsingMIS(8thedition).NewJersey:Pearson.(ISBN:978-0133919868).6. Kroenke,D.,Boyle,R.,(2015)ExperiencingMIS(6thedition).NewJersey:Pearson.(ISBN:978-
0133939132).7. Boyle,R.,Panko,R.,(2014)CorporateComputerSecurity(4thedition).NewJersey:Pearson.(ISBN:
978-0133545197).8. Boyle,R.,Proudfoot,J.,(2014).AppliedInformationSecurityLabs:AHands-onApproach(2nd
edition).NewJersey:Pearson.(ISBN:978-0133547436).9. Boyle,R.,Clements,J.,(2014).AppliedNetworkingLabs:AHands-onGuidetoNetworkingandServer
Management(2ndedition).NewJersey:Pearson.(ISBN:978-0133545180).10. Boyle,R.,Panko,R.,(2012)CorporateComputerSecurity(3rdedition).NewJersey:Pearson(ISBN:
0132145359).11. Boyle,R.,(2012).AppliedNetworkingLabs:AHands-onGuidetoNetworkingandServer
Management(��������,farHongliang,Trans.).Beijing,China:TsinghuaUniversity
Press(Originalworkpublished2011).(ISBN:9787302267560).12. Boyle,R.,(2011).AppliedNetworkingLabs:AHands-onGuidetoNetworkingandServer
Management.NewJersey:Pearson.(ISBN:0132310341).13. Boyle,R.,(2010).AppliedInformationSecurity:AHands-onApproach.NewJersey:Pearson.(ISBN:
0136122035).
BOOKSINPROCESS 1. Kroenke,D.,Boyle,R.,(2019)UsingMIS(11thedition).NewJersey:Pearson.(ISBN:TBD).2. Kroenke,D.,Boyle,R.,(2018)ExperiencingMIS(6thedition).ChinesetranslationinTaiwan(Original
workpublished2015).NewJersey:Pearson.(ISBN:TBD).3. Kroenke,D.,Boyle,R.,(2019)ExperiencingMIS(7thedition).Koreantranslation(Originalwork
published2016).NewJersey:Pearson.(ISBN:TBD).4. Boyle,R.,(2018).AppliedManagementInformationSystems:AHands-onGuide(1stedition).5. Boyle,R.,Proudfoot,J.,(2018).AppliedInformationSecurityLabs:AHands-onApproach(3rd
edition).6. Boyle,R.,Clements,J.,(2018).AppliedNetworkingLabs:AHands-onGuidetoNetworkingandServer
Management(3rdedition).
OTHERREVIEWEDPUBLICATIONS1. Boyle,R.,(2017).InstructorslidedeckforExperiencingMIS(8thedition).NewJersey:Pearson.
4
2. Boyle,R.,(2017).Instructor'smanual,studyguide,slidedeck,andtestbankforUsingMIS(10thedition).NewJersey:Pearson.
3. Boyle,R.,andPanko,R.,(2014).Instructor'smanual,studyguide,slidedeck,andtestbankforCorporateComputerSecurity(4rdedition).NewJersey:Pearson.
4. Boyle,R.,(2013,Spring).ANewWaytoSteal.LongwoodMagazine,pp.48.5. Boyle,R.,Panko,R.,(2012).Instructor'smanual,studyguide,slidedeck,andtestbankforCorporate
ComputerSecurity(3rdedition).NewJersey:Pearson.
ACADEMICACTIVITIES
DIRECTEDPROJECTS 1. AdvancedNetworkAdministration(2017)2. EnterpriseDataBreaches(2016)3. EnterpriseSurveillanceSystemImplementation(2012)4. MicrosoftSharePointImplementation(2011)5. ProprietaryIDSImplementation(2011)6. BorderManagementandProxies(2011)7. GreenGridComputing(2010)8. Anti-FraudSystems(2010)
ACADEMICPROGRAMDEVELOPMENT1. CoordinatedcurriculumchangesfortheInformationSystems&TechnologycoursesatTheGoddard
SchoolofBusinessandEconomics(2017/2018).2. CoordinatedandmanagedmajorcurriculumchangesfortheInformationSystems&TechnologyAS,
BS,andBISdegreesatTheGoddardSchoolofBusinessandEconomics(2015/2016).Newcourseswereadded/developed,curriculummapwasreworked,prerequisiteschangedonmostclasses,andallchangesweremanagedthroughvariouscommittees.
3. ManagedasummerITinternshipprogrambetweenLongwoodUniversityandCarnegieMellonUniversity’sITLab(#1nationally)from2013to2015.Allstudentswereofferedroom,board,tuition,airfare,astipend,andasubstantialtuitionscholarshiptowardtheirMastersofScienceinInformationSystemsdegreeatCarnegieMellonUniversity.
4. Designed,created,configured,andmanagedacloud-basedvirtualizedcomputingenvironmentforCyberSecuritytraining.Deployedamulti-OStrainingenvironmentincludingMicrosoftWindows7,MicrosoftWindows8,MicrosoftServer2008,MicrosoftServer2012,Ubuntu,Mint,Fedora,OpenSUSE,BackTrack(KaliLinux),andCentOS.Deployedhundredsofsecurevirtualmachinesforuniversityandacademicuse.Configuredvirtualnetworks,internalandexternalfirewalls,intrusiondetectionsystems,UPS,NAS,applicationfiltering,andinlineantivirusscanning.
5. Coordinated,developed,andmanagedMSISOrientationforinauguralclass.6. Launchednewgraduateprogram(MasterofScienceinInformationSystems)with50+studentsin
theinauguralclass.DevelopedandmanagedMSISprogram.7. Omniture(AdobeCorp.)WebAnalyticsCompetition(2009,2010).Initiated,coordinated,and
managedtheinauguralOWACeventattheUniversityofUtah.8. WorkedtoestablishaMasterofInformationSystems(MSIS)degreeprogramattheUniversityof
Utah.DesignedallcoursesandcontentintheSecuritytrackincludingITForensicsandNetworkDefense.CompletedFall2007.
5
9. EstablishedtheMSDNAcademicAlliance(MSDNAA)programattheU.ofUtah,Spring2007.10. DevelopedandimplementedaTelecommunications/SecurityLab(2004).Provides1)hands-on
trainingforallcoreMicrosoftCertifiedSystemsEngineer(MCSE)exams2)complexnetworksimulations(OPNET),3)Linuxtutorials,and4)34hands-onsecurityexercises.
11. GridComputingImplementation.PlannedSummer2004andcompletedFall2004.ProvideshighcapacitycomputingpowertosolvecomplexresearchproblemsputforthbyUAHresearchers.
12. DevelopGraduateInformationAssuranceCertificateprogramatUAH.PlannedSummer2004,CompletedFall2004.
TEACHINGEXPERIENCE1. DecisionSupportSystems,ISM4117,FSU(SU2001,SU2002)(newprep).2. InformationSystemsAnalysisandDesign,ISM4030,FSU(FA2002)(newprep).3. NetworkingandTelecommunications,ISM4220,FSU(SP2003)(newprep).4. NetworkingandTelecommunications,MIS460/MIS560,UAH(FA2003,SP2004,FA2004,SP2005).5. WebServers,MIS465/MIS565,UAH(FA2003)(newprep).6. NetworkSecurity,MIS660,UAH(SP2004,SP2005)(newprep).7. InformationSystemsinOrganizations,MIS301,UAH(FA2004,SP2005).8. IntroductiontoInformationSystems,IS4410,U.ofUtah(FA2005,SP2006,FA2006,SP2007,FA
2007,SP2008,FA2008,SP2009,FA2009,FA2010,SP2011).9. ITSecurity,IS4470,U.ofUtah(SP2006,FA2006,SP2007,FA2007,SP2008,FA2008,SP2009,FA
2009,SP2010,FA2010,SP2011).10. AdvancedITSecurity,IS5910,U.ofUtah(SP2007).11. ComputerSecurity,ACCTG6520,U.ofUtah(SP2007,SP2008,FA2008).12. Networks&Servers,IS4440,U.ofUtah(FA2008,SP2009,FA2009,SP2010,FA2010,SP2011).13. ITSecurity,IS6570,U.ofUtah(FA2009,SP2010,FA2010,SP2011).14. PrinciplesofIS,ISYS370,LongwoodUniversity(FA2012,SP2013,FA2013,SP2014,FA2014,SP
2015).15. CyberSecurity,ISYS376,LongwoodUniversity(FA2012,FA2013,SP2014,FA2014,SP2015).16. Adv.CyberSecurity,ISYS476,LongwoodUniversity(FA2012(newprep),FA2013).17. NetworkCommunications,ISYS473,LongwoodUniversity(SP2013,SP2014,FA2014,SP2015).18. InformationSystemsInternship,ISYS492,LongwoodUniversity(SU2013,FA2014,SU2014).19. InformationTechnologyforBusiness,IST3110,WeberStateUniversity(FA2015,SP2016).20. Networks&DataCommunications,IST3610,WeberStateUniversity(FA2015,SP2016,FA2016,SP
2017,FA2017).21. InformationSecurityI,IST4600,WeberStateUniversity(FA2015,FA2016,SP2017,FA2017).22. InformationAssuranceintheEnterprise,MBA6640,WeberStateUniversity(FA2016,SP2017,FA
2017).23. IntroductiontoInformationSystems,IST2020,WeberStateUniversity(FA2016,SP2017,FA2017).24. NetworkingandInformationSystems,MBA6630,WeberStateUniversity(SP2017,FA2017).
ACADEMICHONORS
GRANTS1. AcademicResourcesandComputingCommittee,grantforvirtualcomputinglab,WeberState
University,$16,500(2016).
6
2. ResearchgrantfromtheCenterforLeadershipinEthicsandSustainability,WeberStateUniversity,$2,500(2016).
3. GoddardSchoolofBusinessResearchGrant,WeberStateUniversity,$8,000(2016).4. GoddardSchoolofBusinessResearchGrant,WeberStateUniversity$8,000(2015).5. DavidEcclesSchoolofBusinessResearchGrant,UniversityofUtah(2010).6. TeachinggrantforITinfrastructuretosupportcoreIScourses(IS4440,IS4470,andIS4415)($50,000)
(2009).7. DavidEcclesSchoolofBusinessResearchGrant,UniversityofUtah(2009).8. DavidEcclesSchoolofBusinessResearchGrant,UniversityofUtah(2008).9. DavidEcclesSchoolofBusinessResearchGrant,UniversityofUtah(2007).10. CMERResearchGrant,UniversityofAlabamainHuntsville(2004).11. DissertationResearchGrant,FloridaStateUniversity(2003).
TEACHINGAWARDS1. NominatedforCrystalCrestaward,WeberStateUniversity,(2017).2. NominatedfortheAlstonAwardforExcellenceinTeaching,WeberStateUniversity,(2017).3. NominatedfortheH.AldousDixonAward,WeberStateUniversity,(2017)university-wide.4. WeberStateDavisCampusOutstandingProfessor,WeberStateUniversity,(2017)university-wide.5. NominatedforaCrystalCrestaward,WeberStateUniversity,(2016).6. DeltaSigmaPiTeachingAward,LongwoodUniversity,(2015).7. OutstandingFirstYearStudentAdvocate,LongwoodUniversity(2014)university-wide.8. SigmaSigmaSigma(SSS),FavoriteProfessorAward,LongwoodUniversity(2014)university-wide.9. SocietasDigna,CrownedSevenLeadershipAward,LongwoodUniversity(2014)university-wide.10. DeltaSigmaPiTeachingAward,LongwoodUniversity,(2013).11. DistinguishedTeachingAward,CollegeofBusiness&Economics,LongwoodUniversity,$1,500prize
award(2013).12. PiBetaPhiTeacherAppreciationAward,UniversityofUtah(2011),university-wide.13. SigmaChiDistinguishedTeachingAward,UniversityofUtah(2011),university-wide.14. DavidEcclesSchoolofBusinessMSISInfluentialTeacherAward,UniversityofUtah(2011).15. MSISContributionAward,UniversityofUtah(2010).16. DavidEcclesSchoolofBusinessMSISTeachingAward,UniversityofUtah(2010).17. DavidEcclesSchoolofBusinessMSISFacultyExcellenceAward,UniversityofUtah(2010).18. LDSSAExcellenceinEducationAward,UniversityofUtah(2009),university-wide.19. MarvinJ.AshtonTeachingExcellenceAward,UniversityofUtah,$5,000prizeaward(2008).20. UndergraduateTeachingAward,UniversityofAlabamainHuntsville(2005).21. NominatedforUndergraduateTeachingAward,UniversityofAlabamainHuntsville(2004).22. NominatedforDoctoralStudentTeachingAward,FloridaStateUniversity(2003).
ASSISTANTSHIPSANDSCHOLARSHIPS1. ManagementofInformationSystemsTeachingAssistantship,FloridaStateUniversity(2000-2001).2. ManagementofInformationSystemsResearchAssistantship,FloridaStateUniversity(2001-2002).3. PublicAdministrationTeachingAssistantship,BrighamYoungUniversity(1999-2000).4. PublicAdministrationStudentScholarship,BrighamYoungUniversity(1998-2000).5. AcademicScholarshipBrighamYoungUniversity(1996-1998).
7
6. AcademicScholarshipWeberStateUniversity(1995-1996).
FELLOWSHIPS1. CollegeofBusinessFellowship,FloridaStateUniversity(2000-2003).
SERVICE
PROFESSIONALSERVICE1. Executiveboardmember,AssociationofInformationSystems(AIS)SpecialInterestGroupEducation
(SIGED),websitedirector,October,2017-current.2. DARPAProjectReportEvaluation,RKIASystemofSystemsIdentityApproach,ENTCorp.,October
13,2017.3. TechnologyEvaluationandResponsetoU.S.PatentOffice,ENTCorp.,February14,2017.4. TechnologyAssessmentandVetting,ENTCorp.,January11,2016.5. Boardmember,CommonwealthCenterforAdvancedLogisticsSystems(CCALS)TechnicalAdvisory
Council,(2013-2015).6. Reviewer,PearsonHigherEd.,(2011).7. Reviewer,PearsonHigherEd.,(2010).8. Reviewer,InformationSystemsResearch(ISR)(2009).9. Reviewer,InternationalConferenceonInformationSystems(ICIS)(2008).10. Reviewer,InternationalConferenceonInformationSystems(ICIS)(2007).11. SessionChair,2006WinterConferenceonBusinessIntelligence(2006).12. Reviewer,InternationalConferenceonInformationSystems(ICIS)(2006).13. Reviewer,SmallGroupResearch(2006).14. Reviewer,AmericanMarketingAssociationConference(2004).15. Reviewer,SouthernAssociationforInformationSystems(2003).16. Reviewer,HawaiiInternationalConferenceonSystemSciences(2001).17. Volunteer,InternationalConferenceonInformationSystems(ICIS),NewOrleans,Louisiana(2001).18. Reviewer,Group2001,theACM2001InternationalConferenceonSupportingGroupWork(2000-
2001).
UNIVERSITYSERVICE1. CareerServiceAdvisoryGroup,GSBEcommitteemember,WeberStateUniversity,(2017-current).2. IS&TAreaCoordinator,Managementdepartment,WeberStateUniversity,(2015-current).3. InformationTechnologyGovernanceCouncil,universitycommittee,committeemember,Weber
StateUniversity(2016-current).4. AcademicResources&ComputingCommittee,universitycommittee,committeemember,Weber
StateUniversity(2016-current).5. TheGoldenKeyHonorSociety,WeberStateUniversity,facultyadvisor,WeberStateUniversity
(2016-current).6. IS&TCurriculumCommittee,GSBE,committeemember,WeberStateUniversity(2015-current).7. StudentEngagementCommittee,GSBE,committeemember, WeberStateUniversity(2015-current).8. CoordinatorMicrosoftImagineprogramGSBE,WeberStateUniversity(2015-Current).9. ISTFifth-yearProgramReview,GSBE,contributor,WeberStateUniversity(2016).10. MBACurriculumCommittee,LongwoodUniversity(2012-2015).
8
11. TechnologyAdvisoryCommittee,LongwoodUniversity(2012-2015).12. OnlineAdvisoryCommittee,LongwoodUniversity(2012-2015).13. StudentEnvironmentCommittee,LongwoodUniversity(2012-2015).14. InformationSystemsStudentOrganizationAdvisor,LongwoodUniversity(2013-2015).15. CoordinatorforMicrosoftDreamSparkProgram,LongwoodUniversity(2012-2015).16. FacultySearchCommittee,COBE,committeemember,LongwoodUniversity(2014-2015).17. VPofTechnologySearchCommittee,committeemember,LongwoodUniversity(November,2014).18. CyberSecurityEducation,AdmissionsOpenHouse,LongwoodUniversity,(November22,2014).19. FacultySearchCommittee,COBE,committeemember,LongwoodUniversity(2013-2014).20. UndergraduateCurriculumCommittee,DESB,committeemember,U.ofUtah(2011-2012).21. CoordinatorMSDNAAprogramDESB,U.ofUtah(2007-2012).22. DirectorofMasterofScienceinInformationSystems(MSIS)program,U.ofUtah(2008-2010).23. FacultyAdvisortoTauEpsilonKappa(TEK)studentgroup,U.ofUtah(2007-2011)24. MasterofISCommittee,committeemember,U.ofUtah(2007-2011).25. CoordinatorOmnitureCompetition,U.ofUtah(2009-2010)26. UndergraduateISAdvisor,UniversityofUtah(2007-2009).27. DepartmentFacultyEvaluationandPromotionCommittee,UniversityofAlabamainHuntsville,
committeemember(2004-2005).28. DepartmentUndergraduateCurriculumCommittee,UniversityofAlabamainHuntsville,committee
member(2004-2005).29. ComputerNetworkServicesAdvisoryCommittee,UniversityofAlabamainHuntsville,committee
member(2003-2005).30. InformationAssuranceCommittee,UniversityofAlabamainHuntsville,committeemember(2003-
2005).31. UndergraduateCurriculumCommittee,CollegeofAdministrativeScience,committeemember
(2003-2004).
COMPUTEREXPERTISE
CERTIFICATIONS 1. 7-HabbitsLeadershipTrainerCertification2. 7-HabbitsLeadershipCertification3. MCP,MCSE,MCSE+I.4. ImplementingandSupportingWindowsNTWorkstation4.0(70-073).5. ImplementingandSupportingWindowsNTServer4.0(70-076).6. ImplementingandSupportingWindowsNTServer4.0intheEnterprise(70-068).7. NetworkingEssentials(70-058).8. InternetworkingMicrosoftTCP/IPonMicrosoftWindowsNT4.0(70-059).9. InternetInformationServer(70-087).
SECURITY• ThreatSeverityAnalysis,RiskAnalysis• InformationAssurance• IncidentResponseandDisasterRecovery
• Passwordcrackers• Packetsniffers• IntrusionDetectionSystems
9
• Firewalldesignandimplementation• Cryptographictheoryandsystems• Malwaremanagement• Applicationlayersecurity• Wirelesssecurity&Implementation• SpamPrevention• AlternateDataStreams• MobileForensics
• IntrusionPreventionSystems• Steganography• Networkandhostscanners• File/DataRecovery• Forensicdataanalysis• Penetrationtesting• Securityappliances
SYSTEMS• VirtualizedComputingEnvironments• Linux:LinuxMint,Ubuntu,Debian,Fedora,
etc.FreeBSD&Unix• ApacheWebServer,LAMP,WAMP,etc.
• WindowsServerNT,2003,2008,2012,2016
• ActiveDirectory,Exchange,SharePoint• InternetInformationServer(IIS)• OPNET,networkmodeling,design,and
testing
CODING• VisualBasic,HTML,CSS,ASP,PHP.
DATABASE• MicrosoftSQLServer,MySQL,MicrosoftAccess,PowerBuilder,Oracle.
WORKEXPERIENCE
PROFESSIONALPRESENTATIONS 1. UniversityWelcomePanel,PurpleCarpetEvent,WeberStateUniversity,October27,2017.2. PrototypingInnovativeProducts,AmericanPreparatoryAcademyworkshop,WeberState
University,October24,2017.3. MobileApplicationDevelopmentWorkshop,EarlyExecutivesLeadershipAcademy,WeberState
University,August1,2017.4. Panelonsuccessincollegeandtheworkplace,EarlyExecutivesLeadershipAcademy,WeberState
University,August1,2017.5. CareersinCyberSecurity,WSUPREP,WeberStateUniversity,July10,2017.6. MeetingtheDemandforInformationSystemsWorkers,PearsonLiveLecture,PearsonEducation
Inc.,webinar,April7,2017(nation-wide).7. InternetofThings(IoT)andApplicationSecurity,Faculty-in-Residence,WeberStateUniversity,
February10,2017.8. TheTargetDataBreach,WSUMBA,WeberStateUniversity,November30,2016.9. EnteringtheVirtualWorld,PearsonLiveLecture,PearsonEducationInc.,webinar,Sept29,2016
(nation-wide,approximately200participants).10. 3DPrintingandInnovationatGSBE,WSUGSBEAdvisoryBoardMeeting,WeberStateUniversity,
September27,2016.11. CorporateDataBreaches,WSUMBA,WeberStateUniversity,June13,2016.
10
12. TheSocialValueofAmendingtheComputerFraudandAbuseActandtheElectronicCommunicationsPrivacyAct,WeberStateUniversity,April23,2016.
13. Cross-pollinationandIdentificationofBotnets,BetaAlphaPsi,WeberStateUniversity,March29,2016.
14. TheEffectsofPasswordReuseandCross-pollination,Infragard,SaltLakeCity,March23,2016.15. TheTargetDataBreach,WSUMBA,WeberStateUniversity,December2,2015.16. Hashing,Encrypting,andTestingCorporateSecurity,Faculty-in-Residence,WeberStateUniversity,
October30,2015.17. CorporateDataBreaches,BetaAlphaPsi,WeberStateUniversity,October20,2015.18. TheAgeoftheDataBreach,PearsonLiveLecture,PearsonEducationInc.,virtuallecture,April13,
2015(nation-wide).19. TrendsinCyberSecurityEducation,InformationSystemsAuditandControlAssociation(ISACA),
RichmondVirginiachapter,RichmondVA,February5,2015.20. CyberSecurityWorkforceEducation,HealthcareInformationandManagementSystemsSociety
(HIMSS)2014VAConference,WilliamsburgVA,November6,2014.21. OpportunitiesinCyberSecurityEducation,LongwoodDualEnrollmentSeminar,Longwood
University,July12,2014.22. WomeninCyberSecurity,GirlScoutLeadershipInstitute,LongwoodUniversity,June28,2014.23. CareersinInformationSystemsandSecurity,FBLA,LongwoodUniversity,March11,2014.24. DeceptiveCommunication,Faculty-in-Residence,LongwoodUniversity,October23,2013.25. Panel,Skill-basedEducation,Faculty-in-Residence,LongwoodUniversity,March21,2013.26. CareersinInformationSystemsandSecurity,FBLA,LongwoodUniversity,March14,2013.27. TechInvestmentStrategies,StudentInvestmentFund,LongwoodUniversity,February,19,2013.28. Panel,CyberSecurityChallenges,LongwoodUniversity,October,82012.29. NetworkForensicAnalysis.PresentedtoLongwoodUniversity,VA(2012).30. PredictingDeceptiveBehaviors.PresentedtoSuffolkUniversity,MA(2012).31. AttackMethodology.PresentedtoSocietyofFormerSpecialAgentsoftheFederalBureauof
Investigation(FBI)(2011).32. ThreatSeverityAnalysis.TelevisedpresentationtoSaltLakeCityCorporation.(2006).33. NationalSecurityTrends.PresentedtotheUniversityofUtahInformationSystemsAdvisoryBoard
attheUniversityofUtah(2005).
PROFESSIONALEXPERIENCE1. AssociateProfessor,WeberStateUniversity.(2015-current).2. AssociateProfessor,LongwoodUniversity.(2012-2015).3. FullProfessor(lecturer),UniversityofUtah.(2010).4. DirectorMSISProgram,UniversityofUtah.FullResponsibilityfordirectingMSISprogramand
teaching7coreIScoursesannually(2008-2010).5. AssociateProfessor(lecturer),UniversityofUtah.(2009).6. AssistantProfessor(lecturer),UniversityofUtah.(2007-2009).7. VisitingProfessor,UniversityofUtah.Fullresponsibilityfor6coreIScoursesannually(2005-2007).8. AssistantProfessor,UniversityofAlabamainHuntsville.Fullresponsibilityfor6coreIScourses
(2003-2005).
11
9. Instructor,FloridaStateUniversity.FullresponsibilityforcoreinformationsystemsclassesforMISmajors.(2000-2003).
10. TeachingAssistant,BrighamYoungUniversity.ConductedAccountinglabsessions,taughtweeklyAccountingreviewclasses,andgradedpapers(1999-2000).
11. Manager,BoyleApplianceCenter,Ogden,Utah.Managedwarehouseanddeliverypersonnel,trainednewdeliveryandofficepersonnel,andmanagedcomputersystems.(1985-1999).
NEWSMEDIA1. Interviewfortelevision,3scamseverycollegestudentandtheirparentsshouldknow,KSLNews,
October3,2017.https://www.ksl.com/?sid=46035562&nid=148.2. 3-DPrintingMeetsWSU,TheSignpost,InterviewwithDr.RandyBoyle,WeberStateUniversity,
February24,2016,byKelliePlumhof.3. LongwoodUniversity,Expert:Keepyourkidsonyourdesk,notonyourdesktop.InterviewwithDr.
RandyBoyle.LongwoodUniversitypressrelease,March13,2015.4. McWilliams,Matthew,Boyle:Phishingattemptsgettingmuchmoresophisticated,Insider,
LongwoodUniversity,February3,2015.5. Boyle,R.(2015,January17).Why‘Blackhat”isHackingDoneRight,TheDailyBeast,NewYorkCity,
NY,http://www.thedailybeast.com/articles/2015/01/17/why-blackhat-is-hacking-done-right.html.6. Boyle,R.(2014,December4).Cyber-securityonmoremindsasholidayshoppersheadout,TheDaily
Progress,Charlottesville,VA,http://www.dailyprogress.com/news/local/cyber-security-on-more-minds-as-holiday-shoppers-head-out/article_c708fda8-7682-11e4-801b-dbddcd1c1a1f.html.
7. Longwoodstudentsbenefitingfromrelationshipwithtopgraduateprogramininformationsystems,LongwoodUniversity,pressrelease,June11,2014.
8. Boyle,R.(2014,July3).Charlottesville,VA,Understandingdeception[interview].RadiointerviewonNationalPublicRadio(NPR)withSandraHausman’sWithGoodReason.http://withgoodreasonradio.org/2014/10/duping-delight-and-whos-likely-to-lie/.
9. Boyle,R.(2013,June3).Charlottesville,VA,Detectingdeception[interview].RadiointerviewonWVTFwithSandraHausman.
10. Interview,LargeScaleDatabreaches,ABC4News,April12,2012.11. LUProfessorCo-AuthorsDeceptionStudy,FarmvilleHerald,June12,2013.12. FourLongwoodUniversityCollegeofBusinessandEconomicsStudentsSelectedtoAttendCarnegie
Mellon’sITLAB:JuniorSummerInternship.PRWeb,April30,2013.13. StudybyLongwoodprofessorpredictsaperson’swillingnesstolie,LongwoodUniversitypress
release,April30,2013.14. FourLongwoodbusinessstudentschosenforCarnegieMelloninternship,LongwoodUniversity,
pressrelease,May1,2013.
STUDENT-INSTRUCTOREVALUATIONSUMMARY
FloridaStateUniversity
Term Course Hours
FloridaStateUniversityCourseTitle Enrolled Responded
FSUSIEScore
2001 Summer ISM4117_1 3 DecisionSupportSys.† 32 23 4.4*2002 Summer ISM4117_1 3 DecisionSupportSys. 33 25 4.5*Fall ISM4030_2 3 SystemsAnalysis† 11 8 4.8* ISM4030_3 3 SystemsAnalysis 26 23 4.6*2003 Spring ISM4220_1 3 Networking/Telecom† 33 24 4.7* ISM4220_1 3 Networking/Telecom 34 33 4.8*
UniversityofAlabamaatHuntsville
Term Course Hours
U.ofAlabamaHuntsvilleCourseTitle Enrolled Responded
CourseScore
GlobalScore
CollegeAverage
UAHDept.Average
Fall MIS460_1 3 Telecommunications 23 18 4.47 4.44 4.26 4.05 MIS460_2 3 Telecommunications 11 6 4.49 4.67 4.26 4.05 MIS560_1 3 Telecommunications 4 3 4.68 5.00 4.26 4.05 MIS560_2 3 Telecommunications 9 8 4.36 4.63 4.26 4.05 MIS465_1 3 WebServer† 22 12 4.65 4.92 4.26 4.05 MIS565_1 3 WebServer 4 4 4.74 4.75 4.26 4.052004 Spring MIS460_1 3 Telecommunications 30 19 4.83 4.89 4.35 4.22 MIS460_2 3 Telecommunications 10 7 4.68 4.86 4.35 4.22 MIS560_2 3 Telecommunications 2 1 4.80 5.00 4.35 4.22
13
MIS660_1 3 Info.SecurityMgt.† 18 10 4.51 4.70 4.35 4.22Fall MIS460_1 3 Telecommunications 27 25 4.93 4.96 4.39 4.31 MIS460_2 3 Telecommunications 13 13 4.68 4.85 4.39 4.31 MIS560_1 3 Telecommunications 5 5 4.97 5.00 4.39 4.31 MIS560_2 3 Telecommunications 3 - - - 4.39 4.31 MIS301_1 3 IntrotoMIS† 28 21 4.62 4.81 4.39 4.312005 Spring MIS301_1 3 IntrotoMIS 47 45 4.69 4.78 4.40 4.34 MIS460_1 3 Telecommunications 36 32 4.86 4.84 4.40 4.34 MIS560_1 3 Telecommunications 4 3 4.98 5.00 4.40 4.34 MIS490_1 3 SpecialProjects 2 2 5.00 5.00 4.40 4.34 MIS660_2 3 Info.SecurityMgt. 7 4 4.95 5.00 4.40 4.34
UniversityofUtah
Term Course HoursUniversityofUtah
CourseTitle Enrolled RespondedCourseScore
Instr.Score
Fall IS4410_3 3 IntrotoMIS 73 59 5.38 5.53 IS4410_4 3 IntrotoMIS 62 56 5.65 5.772006 Spring IS4410_1 3 IntrotoMIS 73 59 5.47 5.57 IS4470_1 3 Telecom.&Security† 57 50 5.52 5.59Fall IS4410_3 3 IntrotoMIS 83 72 5.50 5.59 IS4410_4 3 IntrotoMIS 73 57 5.19 5.52 IS4470_1 3 Telecom.&Security 40 36 5.50 5.562007 Spring IS4410_1 3 IntrotoMIS 79 70 5.53 5.69 IS4410_70 3 IntrotoMIS 42 39 5.55 5.70 IS4470_1 3 Telecom.&Security 31 29 5.60 5.79 ACC6520_1 3 ComputerSecurity† 16 14 5.87 5.59
14
IS5910_01 3 AdvancedITSecurity 1 1 6.00 6.00Fall IS4410_3 3 IntrotoMIS 105 96 5.53 5.68 IS4410_4 3 IntrotoMIS 72 66 5.52 5.68 IS4470_1 3 Telecom.&Security 69 65 5.64 5.722008 Spring IS4410_2 3 IntrotoMIS 93 79 5.27 5.51 IS4410_70 3 IntrotoMIS 29 27 5.73 5.75 IS4470_1 3 Telecom.&Security 62 52 5.54 5.61 ACC6520_1 3 ComputerSecurity 41 36 5.68 5.73Fall IS4410_4 3 IntrotoMIS 55 44 5.40 5.59 IS4410_5 3 IntrotoMIS 67 52 5.26 5.67 IS4440_1 3 Networking&Servers† 62 51 5.60 5.74 ACC6520_1 3 ComputerSecurity 30 27 5.49 5.61 IS5910_1 3 ComputerSecurity 13 9 5.60 5.762009 Spring IS4410_1 3 IntrotoMIS 68 56 5.46 5.62 IS4410_2 3 IntrotoMIS 95 80 5.63 5.73 IS4440_1 3 Networking&Servers 51 42 5.71 5.83 IS6910_1 3 Networking&Servers 5 4 6.0 6.0 IS6910_4 1.5 ITCertification 1 1 6.0 6.0 IS5910_1 3 Ind.StudyNetworking 1 1 6.0 6.0Fall IS4410_1 3 IntrotoMIS 189 143 5.27 5.55 IS4440_1 3 Networking&Servers 75 64 5.56 5.62 IS6910_1 3 Networking&Servers 5 - - - IS4470_1 3 ITSecurity 56 50 5.84 5.88 IS6570_1 3 ITSecurity 35 29 5.72 5.86
Term Course Hours
UniversityofUtahCourseTitle Enrolled Responded
CourseScore
Instr.Score
15
2010 Spring IS4440_1 3 Networking&Servers 66 55 5.66 5.80 IS6910_1 3 Networking&Servers 2 2 6.00 6.00 IS4470_1 3 ITSecurity 44 37 5.72 5.87 IS6570_1 3 ITSecurity 23 20 5.50 5.67Fall IS4410_1 3 IntrotoMIS 140 106 5.50 5.67 IS4440_1 3 Networking&Servers 75 60 5.73 5.83 IS6910_1 3 Networking&Servers 3 3 6.00 6.00 IS4470_1 3 ITSecurity 35 30 5.82 5.87 IS6570_1 3 ComputerSecurity 35 20 5.51 5.57
Term Course Hours
UniversityofUtahCourseTitle Enrolled Responded
CourseScore
Instr.Score
2011 Spring IS4410_1 3 IntrotoMIS 96 76 5.33 5.53 IS4440_1 3 Networking&Servers 43 34 5.67 5.69 IS6910_1 3 Networking&Servers 2 2 6.00 6.00 IS4470_1 3 ITSecurity 36 34 5.80 5.88 IS6570_1 3 ComputerSecurity 29 24 5.78 5.80Fall IS4410_1 3 IntrotoMIS 139 119 5.7 5.8 IS4440_1 3 Networking&Servers 69 67 5.7 5.8 IS6910_1 3 Networking&Servers 6 †† 5.7 5.8 IS6910_2 1.5 CompTIACertification 5 - - - IS4470_1 3 ITSecurity 48 66 5.7 5.8 IS6570_1 3 ComputerSecurity 27 †† 5.7 5.82012 Spring IS4410_1 3 IntrotoMIS 95 83 5.57 5.73
IS4440_1(IS6640_1)
3 Networking&Servers 54(34) 72 5.86 5.88
16
IS4470_1(IS6570_1)
3 ITSecurity 39(31) 59 5.81 5.83
LongwoodUniversity
Term Course HoursLongwoodUniversity
CourseTitle Enrolled RespondedInstr.Score
(meanQ1-Q10)Fall ISYS370 3 IntrotoIS 26 18 4.89 ISYS376 3 CyberSecurity 12 10 4.98 ISYS476 3 AdvancedCyberSecurity† 5 2 5.02013 Spring ISYS370 3 IntrotoIS 58 35 4.83 ISYS473 3 NetworkComm. 14 9 5.0Summer ISYS492 1-3 ISSecurityInternship 4 - -Fall ISYS370 3 IntrotoIS 43 19 4.87 ISYS376 3 CyberSecurity 19 7 4.8 ISYS476 3 AdvancedCyberSecurity 5 1 5.0 ISYS492 1-3 ISSecurityInternship 2 - -2014 Spring ISYS370 3 IntrotoIS 29 14 4.71 ISYS473 3 NetworkComm. 20 9 4.88 ISYS376 3 CyberSecurity 20 10 4.89Summer ISYS492 1-3 ISSecurityInternship 6 - -Fall ISYS370 3 IntrotoIS 49 19 4.97 ISYS376 3 CyberSecurity 20 5 4.96 ISYS473 3 NetworkComm. 8 2 4.892015 Spring ISYS370 3 IntrotoIS 33 12 4.87 ISYS376 3 CyberSecurity 20 10 4.97 ISYS473 3 NetworkComm. 24 7 4.86
17
Summer ISYS492 1-3 ISSecurityInternship 2 - -
WeberStateUniversityTerm Course Hours WSUCourseTitle Enrolled Responded Instr.Score
Fall IST3110 3 BusinessIT 23 14 6.43 IST3610 3 NetworkingI 8 7 6.57 IST4600 3 InformationSecurityI 14 10 7.00 2016 Spring IST3110 3 BusinessIT 31 23 6.30 IST3110 3 BusinessIT 27 12 6.92 IST3610 3 NetworkingI 14 12 7.00Summer Fall IST2020 3 Intro.ToInformationSystems 47 31 6.74 IST3610 3 NetworkingI 23 15 7.00 IST4600 3 InformationSecurityI 30 19 6.89 MBA6640 3 InformationAssurance 2 1 5.007 2017 Spring IST2020 3 Intro.ToInformationSystems 36 31 6.42 IST3610 3 NetworkingI 17 11 7.00 IST4600 3 InformationSecurityI 14 7 7.00 MBA6640 3 InformationAssurance 4 * * MBA6630 3 Networking&IS 6 * *Summer Fall IST2020 3 Intro.ToInformationSystems 60 IST3610 3 NetworkingI 19 IST4600 3 InformationSecurityI 16 MBA6640 3 InformationAssurance
18
MBA6630 3 Networking&IS 2018 Spring IST2020 3 Intro.ToInformationSystems IST3610 3 NetworkingI IST4600 3 InformationSecurityI MBA6640 3 InformationAssurance MBA6630 3 Networking&IS
†Indicatesanewprep.††Includedwithscoresofthepriorcross-listedcourse.
1. FloridaStateUniversity(FSU)usesaratingsystemfrom1to5,withonebeingthehighest.Forconsistencytheyhavebeenreversecodedtomatchtherestofthescoresusingaratingscalefrom5to1,withfivebeingthehighest.
2. UniversityofAlabamainHuntsville(UAH)usesaratingsystemfrom1to5,withfivebeingthehighest.UAHCollegeaverageswereasfollows:(2003)Fall4.26,(2003)Spring4.35.
3. GlobalItem#20readsasfollows:“ThisinstructorwasamongtheA:top10%,B:top30%,C:AboutAverage,D:Bottom30%,E:Bottom10%”4. UniversityofUtah(UofU)usesaratingsystemfrom1to6,withsixbeingthehighest.5. LongwoodUniversityusesaratingsystemfrom1to5,withfivebeingthehighest.6. WeberStateUniversityusesaratingsystemfrom1to7,withsevenbeingthehighest(Question#11).7. MBAclassesatWeberStateUniversityusearatingsystemfrom1to5,withonebeingthehighest(Question#14).Forconsistency,thisvaluewasrecodedwithone
beinglow,andfivebeinghigh.8. DetailedStudentInstructorEvaluations(SIE)withmorecomprehensivebreakdownsforeachcourseandopen-endedresponsesareavailable.
19
20
21