C. Bryan Foltz
University of Tennessee at Martin
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by C. Bryan Foltz.
Communications of The ACM | 2006
Timothy Paul Cronan; C. Bryan Foltz; Thomas W. Jones
Who commits software misuse? Knowing the answer to this question will help organizations protect their information systems.
Information Management & Computer Security | 2004
C. Bryan Foltz
The term cyberterrorism is being used with increasing frequency today. Since widespread concern with cyberterrorism is relatively new, understanding of the term is somewhat limited. Government officials and experts are often heard claiming that the world is unprepared for cyberterrorism; however, other officials and experts state that cyberterrorism does not pose a threat to anyone. Examines the reasons for these disparate viewpoints and reviews the theoretical and actual forms in which cyberterrorism may occur. Further, proposes the use (and refocusing) of an existing model of computer security to help understand and defend against cyberterrorism.
Campus-wide Information Systems | 2004
C. Bryan Foltz; Margaret T. O'Hara; Harold Wise
Although many universities require courses in management information systems for their business majors, little information exists as to what objectives should be included in the course, and the course topics vary greatly across institutions. Differences in course objectives even exist within schools if multiple sections of the course are taught by different faculty. Typically, a significant portion of the class is devoted to database concepts. In many cases, the course requirements include developing a database for a small business. This database project can consume faculty time and resources, especially if student teams choose their own projects and no guidelines exist for faculty reference. In this paper, guidelines for developing a standardized database project that challenges students while freeing up faculty resources are presented. Experiences in dealing with these projects in both face‐to‐face and online classes at one university are detailed.
The Journal of Education for Business | 2011
C. Bryan Foltz; Janet S. Renwick
The authors examined the extent to which information systems (IS) security and computer crime are covered in information systems programs. Results suggest that IS faculty believe security coverage should be increased in required, elective, and non-IS courses. However, respondent faculty members are concerned that existing curricula leave little time for additional topics.
conference on information technology education | 2011
Janet S. Renwick; C. Bryan Foltz
This poster presents research into the learning styles of information technology students. The study reveals that, similar to the general student population, IT students exhibit a high level of preference for kinesthetic learning.
Industrial Management and Data Systems | 2008
C. Bryan Foltz; Paul H. Schwager; John E. Anderson
International Academy for Information Management Annual Conference | 2002
Deborah K. Smith; William Wittman; C. Bryan Foltz
Journal of Theoretical and Applied Electronic Commerce Research | 2016
C. Bryan Foltz; Henry E. Newkirk; Paul H. Schwager
Archive | 2009
C. Bryan Foltz; Paul H. Schwager
Journal of Management Information and Decision Sciences | 2005
C. Bryan Foltz; Richard Hauser