Amy Woszczynski

Amy Woszczynski
  • PhD
  • Professor of Information Systems at Kennesaw State University

Vulnerability Assessment-w/Green & Oliver; Musicology-w/Bandy & Crowell; FinTech Inclusion-w/MAC & others

About

57
Publications
9,077
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
673
Citations
Introduction
Dr. Amy Woszczynski is Professor of IS at Kennesaw State University. She earned a Bachelor's in Engineering at Georgia Tech, an MBA at KSU, and a PhD at Clemson. She researches at the intersection of culture, diversity, and ethics, exploring how IS managers can use information to make policies and secure data. She publishes in CAIS, Government Information Quarterly, JGITM, JCIS, Computers in Human Behavior, Industrial Management & Data Systems, JISE & International Journal of Info Mgt.
Current institution
Kennesaw State University
Current position
  • Professor of Information Systems
Additional affiliations
August 2000 - present
Kennesaw State University
Position
  • Professor of Information Systems
Editor roles
Education
January 1996 - August 2000
Clemson University
Field of study
  • Management
September 1989 - December 1991
Kennesaw State University
Field of study
  • Organizational Management
September 1984 - September 1988
Georgia Institute of Technology
Field of study
  • Industrial Engineering

Publications

Publications (57)
Article
Cash-strapped music entrepreneurs use social media to establish deep connections with listeners but often lack resources to pursue marketing. Here, we present a disintermediated, integrated model (the DI model) to elicit culturally responsive marketing intelligence at little cost. It combines musical attributes (key, length, and tempo) of hit songs...
Article
Vulnerability researchers face difficult choices when considering whether to reporting a finding to an organization with which they are unaffiliated. We used components of Protection Motivation Theory (PMT) to create the Vulnerability Discovery and Disclosure (VDD) model to understand the decision-making processes of vulnerability researchers. PMT...
Article
Full-text available
This editorial piece introduces a special issue of the Journal of Information Systems Education (JISE) on the topic of equality, diversity, and inclusion (EDI) in IS education. A number of contemporary issues are raised, such as inequality and barriers pertaining to gender, ethnicity, disability, sexuality, and socioeconomic status. A set of resear...
Article
This paper outlines a collaborative course design process to develop and implement a required IS course in an online cohort-based MBA program using principles of The Agile Manifesto. The primary goal of this study is to analyze how students in traditionally developed courses and those in collaboratively developed courses differ. Specifically, we so...
Article
Full-text available
U.S. emergency alert systems (EAS) run on legacy software with aging hardware and limited cybersecurity. While EASs are an essential component of the U.S. critical infrastructure, they are often under-funded, and workers frequently lack the knowledge to protect these systems adequately. Recent compromises of various EASs have not inspired public co...
Article
Full-text available
U.S. emergency alert systems (EASs) are part of the nation's critical infrastructure. These systems are built on aging platforms and suffer from a fragmented interconnected network of partnerships. Some EASs have an easily identifiable vulnerability - their management website is available via the Internet. Authorities must secure these systems quic...
Article
Full-text available
Cyber defense competitions (CDCs) simulate a real-world environment where the competitors must protect the information assets of a fictional organization. These competitions are becoming popular at the high school and college levels, as well as in industry and governmental settings. However, there is little research to date on the learning outcomes...
Article
Global outsourcing increases the complexity of managing IT projects. Gender adds another level of difficulty when managing IT projects. Understanding country and gender—level differences may improve chances for success. This paper provides opportunities to better understand underlying country and gender differences of Indian IT workers. We used Hof...
Article
Access to current research materials, pedagogical best practices, and relevant knowledge has become problematic as journal subscription costs have increased. Increasing delays in the traditional publication timeline, coupled with high subscription costs, have resulted in a diminished ability for IS faculty and their students to access the most rele...
Chapter
The role of women in technology-related fields began with promising contributions from pioneers like Grace Hopper. In recent years, women have moved away from information technology (IT) fields, and the number of women selecting IT majors in universities continues to decline. Likewise, the number of women employed in the IT workforce remains low an...
Article
Full-text available
Much prior research has examined the dearth of women in the IT industry. The purpose of this study is to examine the perceptions of women in IT within the context of information security and assurance. This paper describes results from a study of a relatively new career path to see if there are female-friendly opportunities that have not existed in...
Article
Women in ISA face similar challenges as their counterparts in the more general fields of IT and criminal justice. Women tend to choose ISA less often than their male counterparts and tend to drop out sooner. ISA educators can increase recruiting potential and assist in retaining women by using a variety of strategies. Educators should diversify the...
Article
The role of women in technology-related fields began with promising contributions from pioneers like Grace Hopper. In recent years, women have moved away from information technology (IT) fields, and the number of women selecting IT majors in universities continues to decline. Likewise, the number of women employed in the IT workforce remains low an...
Article
As high schools begin to offer more distance learning courses, universities have an opportunity to establish partnerships to deliver online IT courses. Delivering online courses at the high school level, however, means overcoming obstacles that may not be faced at the university level. In particular, establishing partnerships with high schools requ...
Book
In information technology, unlike many other fields, the need to support the unique perspective of technologically advanced students and deliver technology-rich content presents unique challenges. Today's IT students need the ability to interact with their instructor in near-real time, interact with their peers and project team members, and access...
Chapter
As high schools begin to offer more distance learning courses, universities have an opportunity to establish partnerships to deliver online IT courses. Delivering online courses at the high school level, however, means overcoming obstacles that may not be faced at the university level. In particular, establishing partnerships with high schools requ...
Conference Paper
Full-text available
There is an Information Technology (IT) skills gap in the United States. To address this unmet need, organizations are fervently looking for ways to create a sustainable IT professional assembly line of educated and highly skilled workers with strong ...
Conference Paper
As high schools begin to offer more distance learning courses, universities have an opportunity to establish partnerships to deliver online computer science courses. As we face declining enrollment, these partnerships offer the ability to reach a significant portion of students who may not otherwise consider computer science. Particularly for under...
Article
As high schools begin to offer more distance learning courses, universities have an opportunity to establish partnerships to deliver online computer science courses. As we face declining enrollment, these partnerships offer the ability to reach a significant portion of students who may not otherwise consider computer science. Particularly for under...
Conference Paper
The title of my talk comes from a Hollywood executive's comments on Fred Astaire's screen test. Much later, Katherine Hepburn remarking on Fred's eventual success with his most frequent partner said, "Fred gave Ginger [Rogers] class, and Ginger gave ...
Article
Full-text available
This study examines student perceptions regarding the desirability of diversity in the IT workplace. Several diversity variables were included: age, disability status, ethnicity, and gender. Participants included upper division students with declared majors in IT fields, as well as upper division students enrolled in an Accounting Information Syste...
Article
Women have been involved with IT since the 19th century, when Ada the countess of Lovelace was the first programmer for Charles Babbage’s analytical engine. Grace Murray Hopper’s contributions to COBOL and computing several decades ago are considered so significant that an annual conference is held in her honor (see http://www.grace hopper.org). In...
Chapter
Women have been involved with IT since the 19th century, when Ada the countess of Lovelace was the first programmer for Charles Babbage’s analytical engine. Grace Murray Hopper’s contributions to COBOL and computing several decades ago are considered so significant that an annual conference is held in her honor (see http://www.grace hopper.org). In...
Article
Full-text available
Information systems students continue to struggle to successfully complete computer programming classes. Learning how to program is difficult, and failure and attrition rates in college level programming classes remain at an unacceptably high rate. Since many IS students take a programming course as part of their program of study, IS educators shou...
Conference Paper
Much prior research has examined the dearth of women in the IT industry. The purpose of this study is to examine the questions surrounding women in IT within the context of Information Security and Assurance. This research-in-progress report describes results from one phase in a study of a relatively new career path to see if there are female-frien...
Conference Paper
The introductory course in computer science has been transformed to meet the emerging needs of an increasingly diverse student body. This panel will explore the issues associated with managing this transformation from the perspective of high school students, two-year schools, liberal arts colleges and universities.
Conference Paper
Since the birth of computer science some 40 years ago, educators and researchers alike have struggled with improving student success, particularly in the introductory programming courses, which often have a very high failure rate. Although many researchers have studied how and why students succeed in programming courses, no research to date has ana...
Conference Paper
First Year Experience (FYE) courses target entering students and introduce them to the college environment and expectations for the college classroom. These courses have gained increasing popularity due to their positive impact on retention of students, as well as increased graduation rates. This workshop will describe how to design a FYE course sp...
Article
Women have been involved with information technology (IT) since the 19th century, when Ada the Countess of Lovelace served as the first programmer of Charles Babbage’s analytical engine. Grace Murray Hopper’s contributions to COBOL and computing several decades ago are considered so significant that an annual conference is held in her honor (see ww...
Article
The purpose of this research is to examine careers in Information Security and Assurance within the context of women in IT. Much prior research has examined the dearth of women and other groups in the IT industry. We are interested in exploring this relatively new career path to see if there are female-friendly opportunities that have not existed i...
Article
Full-text available
This study uses a modified version of the Computer Anxiety Rating Scale (CARS) (Heinnsen, Glass, & Knight, 1987) to longitudinally analyze levels of student anxiety over time. We predict that computer anxiety will behave as a transitory state (Spielberger, 1970) that will respond favorably to interventions. Specifically, we predict that levels of c...
Article
With the quantity and quality of available works in information systems (IS) research, it would seem advantageous to possess a concise list of exemplary works on IS research in order to enable instructors of IS research courses to better prepare students to publish in IS venues. To that end, this study seeks to identify and rank a collection of wor...
Conference Paper
IT managers must recruit and retain a skilled and diverse workforce in order to meet the needs of today's and tomorrow's increasingly globalized enterprises. The pipeline for women in IT starts small and shrinks as women are disaffected from the profession at all levels of school and career. This chapter surveys the literature concerning the dearth...
Article
Many IS researchers obtain data through the use of self-reports. However, self-reports have inherent problems and limitations, most notably the problem of common method variance. Common method variance can cause researchers to find a significant effect, when in fact, the true effect is due to the method employed. In this chapter, we examined publis...
Article
IT managers must recruit and retain a skilled and diverse workforce in order to meet the needs of today’s and tomorrow’s increasingly globalized enterprises. The pipeline for women in IT starts small and shrinks as women are disaffected from the profession at all levels of school and career. This chapter surveys the literature concerning the dearth...
Chapter
Many IS researchers obtain data through the use of self-reports. However, self-reports have inherent problems and limitations, most notably the problem of common method variance. Common method variance can cause researchers to find a significant effect, when in fact, the true effect is due to the method employed. In this chapter, we examined publis...
Article
Full-text available
The editors present work on research methodology and techniques in information systems research, in this book for graduate students in courses in information systems research methods. Articles collected from various journals examine issues related to survey research, rigor and relevance, virtual research, and multicultural and global research. Topi...
Article
This paper reviews the academic community's response through research and curriculum initiatives to the practitioner's requirements for a diverse information technology (IT) workforce. The paper then highlights opportunities for future IT research by matching current academic research to organizational diversity issues, exposing the gaps and opport...
Conference Paper
Most IT professionals would agree that diversity in IT leads to positive outcomes. However, few studies have empirically tested differences in diversity perceptions among groups. This research-in-progress develops a survey to test perceptions in four diversity categories: gender, ethnicity, age, and disability. Currently, we have begun collecting d...
Article
In an environment in which information technology has become a critical link between and among suppliers and customers, organizations were recently threatened by potential systems failures that could have erased the gains of the past decade. Although experts predicted that Y2K could lead to devastating results, those dire predictions turned out to...
Article
This paper develops an integrated theory of playfulness in computer interactions using multiple constructs. Although previous researchers have suggested that playfulness in computer interactions should be measured as both a state and a trait, we suggest that fully understanding the relevant constructs involves much more than simply a state-trait me...
Article
This paper develops an integrated theory of playfulness in computer interactions using multiple constructs. Although previous researchers have suggested that playfulness in computer interactions should be measured as both a state and a trait, we suggest that fully understanding the relevant constructs involves much more than simply a state-trait me...
Article
This project will produce a program that calculates incentive pay for a team of workers. This project responds to an increasing need in the textile and apparel industries to provide incentives for work teams. Many firms are exploring modular manufacturing and, even in a piece-rate environment, it is important to encourage people to work together fo...
Article
This project developed a decision support system (DSS) that helps managers reach a sound and logical decision about proposed investments. The cost-benefit advisor helps express anticipated cash flows and their risks, including intangible costs and benefits that are typically ignored but should be considered. The speadsheet-based system provides wor...
Article
Full-text available
In this study, we examine the impact of the Napster decision on RIAA sales. We also present a brief introduction to copyright law and DMCA. We compare RIAA sales to DVD and entertainment software sales, both before and after the Napster decision. Analysis of variance showed no differences in sales growth before Napster; that is, all industries show...
Article
This project will produce a program that calculates incentive pay for a team of workers. This project responds to an increasing need in the textile and apparel industries to provide incentives for work teams. Many firms are exploring modular manufacturing, and even in a piece rate environment, it is important to encourage people to work together fo...
Article
This project will develop a decision support system to help managers reach a sound and logical decision regarding proposed investments. The proposed cost benefit advisor system will help managers express the expected cash flows and their risks, including intangible costs and benefits that might otherwise be ignored. The user of this system will est...
Article
Full-text available
As computer science and information systems departments face declining enrollments, we must find ways to attract and retain students. One option is through partnering with high schools to attract students into the IT field. As we work to reach more students, distance learning offers an alternative method to reach many students. However, some argue...
Article
IS students continue to struggle to complete the programming courses often required in their course of study. In this research-in-progress, we describe how IS educators can learn about the predictors of success in programming courses and translate that knowledge into better advising for their IS students. We plan to administer an open-ended survey...
Article
Full-text available
As high schools begin to offer more distance learning courses, universities have an opportunity to establish partnerships to deliver online IT courses. Delivering online courses at the high school level, however, means overcoming obstacles that may not be faced at the university level. In particular, establishing partnerships with high schools requ...

Network

Cited By