default search action
Glenn B. Dietrich
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2016
- [j6]Diana K. Young, Nicole Beebe, Glenn Dietrich, Charles Zhechao Liu:
An Empirical Examination of an Agile Contingent Project/Method Fit Model. Commun. Assoc. Inf. Syst. 39: 14 (2016) - 2013
- [j5]Xiaogang Chen, Xue Li, Jan Guynes Clark, Glenn B. Dietrich:
Knowledge sharing in open source software project teams: A transactive memory system perspective. Int. J. Inf. Manag. 33(3): 553-563 (2013) - 2011
- [j4]Nicole Lang Beebe, Jan Guynes Clark, Glenn B. Dietrich, Myung S. Ko, Daijin Ko:
Post-retrieval search hit clustering to improve information retrieval effectiveness: Two digital forensics case studies. Decis. Support Syst. 51(4): 732-744 (2011) - 2009
- [j3]Ruben Mancha, Cory R. A. Hallam, Glenn Dietrich:
Self-Efficacy in Software Developers: A Framework for the Study of the Dynamics of Human Cognitive Empowerment. Int. J. Inf. Technol. Syst. Approach 2(2): 34-49 (2009) - 2008
- [j2]Alexander J. McLeod Jr., Jan Guynes Clark, John Warren, Glenn B. Dietrich:
The Impact of Information Systems on End User Performance: Examining the Effects of Cognitive Style Using Learning Curves in an Electronic Medical Record Implementation. Commun. Assoc. Inf. Syst. 22: 9 (2008) - 2005
- [j1]Tim Goles, Gregory B. White, Glenn B. Dietrich:
Dark Screen: An Exercise in Cyber Security. MIS Q. Executive 4(2): 5 (2005)
Conference and Workshop Papers
- 2023
- [c27]Natalie Sjelin, Jeremy West, Glenn Dietrich:
High Value Assets (HVA) Lessons Learned for Small Government Agencies and Small to Mid-sized Organizations. HICSS 2023: 1694-1703 - 2022
- [c26]Glenn Dietrich, Kim-Kwang Raymond Choo, Ali Dehghantanha:
Introduction to the Minitrack on Machine Learning and Cyber Threat Intelligence and Analytics. HICSS 2022: 1-2 - [c25]Matthew Shutock, Glenn Dietrich:
Security Operations Centers: A Holistic View on Problems and Solutions. HICSS 2022: 1-10 - [c24]Natalie Sjelin, Glenn Dietrich:
Method to Identify High Value Assets for Small Government Agencies and Small to Mid-sized Organizations. HICSS 2022: 1-10 - 2021
- [c23]Ali Dehghantanha, Glenn Dietrich, Kim-Kwang Raymond Choo:
Introduction to the Minitrack on Machine Learning and Cyber Threat Intelligence and Analytics. HICSS 2021: 1-3 - 2020
- [c22]Dinesh Reddy, Glenn Dietrich:
A Skills Based Approach to Tackle Failure of Cybersecurity Awareness Programs in Organizations. AMCIS 2020 - 2019
- [c21]Dinesh Reddy, Glenn Dietrich:
Unlocking the Mixed Results of the Effect of Self-Efficacy in Information Security on Compliance. AMCIS 2019 - [c20]Naga Vemprala, Glenn Dietrich:
A Social Network Analysis (SNA) Study On Data Breach Concerns Over Social Media. HICSS 2019: 1-8 - 2017
- [c19]Dinesh Reddy, Glenn B. Dietrich:
Is Self-Efficacy in Information Security Better Modeled as a Predictor Variable or a Mediator Variable in IS literature? AMCIS 2017 - [c18]Cory Smith, Glenn Dietrich, Kim-Kwang Raymond Choo:
Identification of Forensic Artifacts in VMWare Virtualized Computing. ATCS/SePrIoT@SecureComm 2017: 85-103 - 2016
- [c17]Chelsea Hicks, Glenn Dietrich:
An Exploratory Analysis in Android Malware Trends. AMCIS 2016 - [c16]Dinesh Reddy, Glenn Dietrich:
Identifying Multiple Categories of Cybersecurity Skills that Affect User Acceptance of Protective Information Technologies. AMCIS 2016 - 2012
- [c15]Wm. Arthur Conklin, Glenn B. Dietrich:
What the Graduate Needs to Know about Operational Information Security. AMCIS 2012 - 2010
- [c14]Diana K. Young, Wm. Arthur Conklin, Glenn B. Dietrich:
Re-examining the Information Systems Security Problem from a Systems Theory Perspective. AMCIS 2010: 375 - [c13]Wm. Arthur Conklin, Glenn B. Dietrich:
Emergency Communications Using the Web: Matching Media Richness to the Situation. HICSS 2010: 1-9 - 2009
- [c12]Xiaogang Chen, Glenn Dietrich:
Knowledge Location, Differentiation, Credibility and Coordination in Open Source Software Development Teams. AMCIS 2009: 389 - 2008
- [c11]Wm. Arthur Conklin, Glenn B. Dietrich:
Systems Theory Model for Information Security. HICSS 2008: 265 - 2007
- [c10]Ruben Mancha, Glenn Dietrich:
Development of a Framework for Analyzing Individual and Environmental Factors Preceding Attitude toward Information Security. AMCIS 2007: 178 - [c9]Wm. Arthur Conklin, Glenn B. Dietrich:
Secure Software Engineering: A New Paradigm. HICSS 2007: 272 - [c8]Nicole Beebe, Glenn B. Dietrich:
A New Process Model for Text String Searching. IFIP Int. Conf. Digital Forensics 2007: 179-191 - 2006
- [c7]Carlos Dorantes, Alexander J. McLeod Jr., Glenn Dietrich:
Cyber-Emergencies: What Managers Can Learn From Complex Systems and Chaos Theory. AMCIS 2006: 201 - 2005
- [c6]Art Conklin, Glenn B. Dietrich:
Secure Software Design Principles: A Systems Approach. AMCIS 2005: 274 - [c5]Art Conklin, Glenn B. Dietrich:
Modeling End User Behavior to Secure a PC in a Unmanaged Environment. AMCIS 2005: 449 - 2004
- [c4]Art Conklin, Glenn B. Dietrich, Diane B. Walz:
Password-Based Authentication: A System Perspective. HICSS 2004 - [c3]Gregory B. White, Glenn B. Dietrich, Tim Goles:
Cyber Security Exercises: Testing an Organization?s Ability to Prevent, Detect, and Respond to Cyber Security Events. HICSS 2004 - [c2]Sos S. Agaian, Benjamin M. Rodriguez, Glenn B. Dietrich:
Steganalysis using modified pixel comparison and complexity measure. Security, Steganography, and Watermarking of Multimedia Contents 2004: 46-57 - 1999
- [c1]Glenn B. Dietrich, Marcus B. Shipley:
Technology Strategies in a Complex Environment. HICSS 1999
Informal and Other Publications
- 2024
- [i2]Ryan Pavlich, Nima Ebadi, Richard Tarbell, Billy Linares, Adrian Tan, Rachael Humphreys, Jayanta Kumar Das, Rambod Ghandiparsi, Hannah Haley, Jerris George, Rocky Slavin, Kim-Kwang Raymond Choo, Glenn Dietrich, Anthony Rios:
Beyond Text-to-SQL for IoT Defense: A Comprehensive Framework for Querying and Classifying IoT Threats. CoRR abs/2406.17574 (2024) - 2023
- [i1]Richard Tarbell, Kim-Kwang Raymond Choo, Glenn Dietrich, Anthony Rios:
Towards Understanding the Generalization of Medical Text-to-SQL Models and Datasets. CoRR abs/2303.12898 (2023)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-07-23 21:58 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint