
Amy Woszczynski- PhD
- Professor of Information Systems at Kennesaw State University
Amy Woszczynski
- PhD
- Professor of Information Systems at Kennesaw State University
Vulnerability Assessment-w/Green & Oliver; Musicology-w/Bandy & Crowell; FinTech Inclusion-w/MAC & others
About
57
Publications
9,077
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
673
Citations
Introduction
Dr. Amy Woszczynski is Professor of IS at Kennesaw State University. She earned a Bachelor's in Engineering at Georgia Tech, an MBA at KSU, and a PhD at Clemson. She researches at the intersection of culture, diversity, and ethics, exploring how IS managers can use information to make policies and secure data. She publishes in CAIS, Government Information Quarterly, JGITM, JCIS, Computers in Human Behavior, Industrial Management & Data Systems, JISE & International Journal of Info Mgt.
Current institution
Additional affiliations
August 2000 - present
Editor roles

Journal of Information Systems Education
Position
- Associate Editor
Education
January 1996 - August 2000
September 1989 - December 1991
September 1984 - September 1988
Publications
Publications (57)
Cash-strapped music entrepreneurs use social media to establish deep connections with listeners but often lack resources to pursue marketing. Here, we present a disintermediated, integrated model (the DI model) to elicit culturally responsive marketing intelligence at little cost. It combines musical attributes (key, length, and tempo) of hit songs...
Vulnerability researchers face difficult choices when considering whether to reporting a finding to an organization with which they are unaffiliated. We used components of Protection Motivation Theory (PMT) to create the Vulnerability Discovery and Disclosure (VDD) model to understand the decision-making processes of vulnerability researchers. PMT...
This editorial piece introduces a special issue of the Journal of Information Systems Education (JISE) on the topic of equality, diversity, and inclusion (EDI) in IS education. A number of contemporary issues are raised, such as inequality and barriers pertaining to gender, ethnicity, disability, sexuality, and socioeconomic status. A set of resear...
This paper outlines a collaborative course design process to develop and implement a required IS course in an online cohort-based MBA program using principles of The Agile Manifesto. The primary goal of this study is to analyze how students in traditionally developed courses and those in collaboratively developed courses differ. Specifically, we so...
U.S. emergency alert systems (EAS) run on legacy software with aging hardware and limited cybersecurity. While EASs are an essential component of the U.S. critical infrastructure, they are often under-funded, and workers frequently lack the knowledge to protect these systems adequately. Recent compromises of various EASs have not inspired public co...
U.S. emergency alert systems (EASs) are part of the nation's critical infrastructure. These systems are built on aging platforms and suffer from a fragmented interconnected network of partnerships. Some EASs have an easily identifiable vulnerability - their management website is available via the Internet. Authorities must secure these systems quic...
Cyber defense competitions (CDCs) simulate a real-world environment where the competitors must protect the information assets of a fictional organization. These competitions are becoming popular at the high school and college levels, as well as in industry and governmental settings. However, there is little research to date on the learning outcomes...
Global outsourcing increases the complexity of managing IT projects. Gender adds another level of difficulty when managing IT projects. Understanding country and gender—level differences may improve chances for success. This paper provides opportunities to better understand underlying country and gender differences of Indian IT workers. We used Hof...
Access to current research materials, pedagogical best practices, and relevant knowledge has become problematic as journal subscription costs have increased. Increasing delays in the traditional publication timeline, coupled with high subscription costs, have resulted in a diminished ability for IS faculty and their students to access the most rele...
The role of women in technology-related fields began with promising contributions from pioneers like Grace Hopper. In recent years, women have moved away from information technology (IT) fields, and the number of women selecting IT majors in universities continues to decline. Likewise, the number of women employed in the IT workforce remains low an...
Much prior research has examined the dearth of women in the IT industry. The purpose of this study is to examine the perceptions of women in IT within the context of information security and assurance. This paper describes results from a study of a relatively new career path to see if there are female-friendly opportunities that have not existed in...
Women in ISA face similar challenges as their counterparts in the more general fields of IT and criminal justice. Women tend to choose ISA less often than their male counterparts and tend to drop out sooner. ISA educators can increase recruiting potential and assist in retaining women by using a variety of strategies. Educators should diversify the...
The role of women in technology-related fields began with promising contributions from pioneers like Grace Hopper. In recent years, women have moved away from information technology (IT) fields, and the number of women selecting IT majors in universities continues to decline. Likewise, the number of women employed in the IT workforce remains low an...
As high schools begin to offer more distance learning courses, universities have an opportunity to establish partnerships to deliver online IT courses. Delivering online courses at the high school level, however, means overcoming obstacles that may not be faced at the university level. In particular, establishing partnerships with high schools requ...
In information technology, unlike many other fields, the need to support the unique perspective of technologically advanced students and deliver technology-rich content presents unique challenges. Today's IT students need the ability to interact with their instructor in near-real time, interact with their peers and project team members, and access...
As high schools begin to offer more distance learning courses, universities have an opportunity to establish partnerships to deliver online IT courses. Delivering online courses at the high school level, however, means overcoming obstacles that may not be faced at the university level. In particular, establishing partnerships with high schools requ...
There is an Information Technology (IT) skills gap in the United States. To address this unmet need, organizations are fervently looking for ways to create a sustainable IT professional assembly line of educated and highly skilled workers with strong ...
As high schools begin to offer more distance learning courses, universities have an opportunity to establish partnerships to deliver online computer science courses. As we face declining enrollment, these partnerships offer the ability to reach a significant portion of students who may not otherwise consider computer science. Particularly for under...
As high schools begin to offer more distance learning courses, universities have an opportunity to establish partnerships to deliver online computer science courses. As we face declining enrollment, these partnerships offer the ability to reach a significant portion of students who may not otherwise consider computer science. Particularly for under...
The title of my talk comes from a Hollywood executive's comments on Fred Astaire's screen test. Much later, Katherine Hepburn remarking on Fred's eventual success with his most frequent partner said, "Fred gave Ginger [Rogers] class, and Ginger gave ...
This study examines student perceptions regarding the desirability of diversity in the IT workplace. Several diversity variables were included: age, disability status, ethnicity, and gender. Participants included upper division students with declared majors in IT fields, as well as upper division students enrolled in an Accounting Information Syste...
Women have been involved with IT since the 19th century, when Ada the countess of Lovelace was the first programmer for Charles Babbage’s analytical engine. Grace Murray Hopper’s contributions to COBOL and computing several decades ago are considered so significant that an annual conference is held in her honor (see http://www.grace hopper.org). In...
Women have been involved with IT since the 19th century, when Ada the countess of Lovelace was the first programmer for Charles Babbage’s analytical engine. Grace Murray Hopper’s contributions to COBOL and computing several decades ago are considered so significant that an annual conference is held in her honor (see http://www.grace hopper.org). In...
Information systems students continue to struggle to successfully complete computer programming classes. Learning how to program is difficult, and failure and attrition rates in college level programming classes remain at an unacceptably high rate. Since many IS students take a programming course as part of their program of study, IS educators shou...
Much prior research has examined the dearth of women in the IT industry. The purpose of this study is to examine the questions surrounding women in IT within the context of Information Security and Assurance. This research-in-progress report describes results from one phase in a study of a relatively new career path to see if there are female-frien...
The introductory course in computer science has been transformed to meet the emerging needs of an increasingly diverse student body. This panel will explore the issues associated with managing this transformation from the perspective of high school students, two-year schools, liberal arts colleges and universities.
Since the birth of computer science some 40 years ago, educators and researchers alike have struggled with improving student success, particularly in the introductory programming courses, which often have a very high failure rate. Although many researchers have studied how and why students succeed in programming courses, no research to date has ana...
First Year Experience (FYE) courses target entering students and introduce them to the college environment and expectations for the college classroom. These courses have gained increasing popularity due to their positive impact on retention of students, as well as increased graduation rates. This workshop will describe how to design a FYE course sp...
Women have been involved with information technology (IT) since the 19th century, when Ada the Countess of Lovelace served as the first programmer of Charles Babbage’s analytical engine. Grace Murray Hopper’s contributions to COBOL and computing several decades ago are considered so significant that an annual conference is held in her honor (see ww...
The purpose of this research is to examine careers in Information Security and Assurance within the context of women in IT. Much prior research has examined the dearth of women and other groups in the IT industry. We are interested in exploring this relatively new career path to see if there are female-friendly opportunities that have not existed i...
This study uses a modified version of the Computer Anxiety Rating Scale (CARS) (Heinnsen, Glass, & Knight, 1987) to longitudinally analyze levels of student anxiety over time. We predict that computer anxiety will behave as a transitory state (Spielberger, 1970) that will respond favorably to interventions. Specifically, we predict that levels of c...
With the quantity and quality of available works in information systems (IS) research, it would seem advantageous to possess a concise list of exemplary works on IS research in order to enable instructors of IS research courses to better prepare students to publish in IS venues. To that end, this study seeks to identify and rank a collection of wor...
IT managers must recruit and retain a skilled and diverse workforce in order to meet the needs of today's and tomorrow's increasingly globalized enterprises. The pipeline for women in IT starts small and shrinks as women are disaffected from the profession at all levels of school and career. This chapter surveys the literature concerning the dearth...
Many IS researchers obtain data through the use of self-reports. However, self-reports have inherent problems and limitations, most notably the problem of common method variance. Common method variance can cause researchers to find a significant effect, when in fact, the true effect is due to the method employed. In this chapter, we examined publis...
IT managers must recruit and retain a skilled and diverse workforce in order to meet the needs of today’s and tomorrow’s increasingly globalized enterprises. The pipeline for women in IT starts small and shrinks as women are disaffected from the profession at all levels of school and career. This chapter surveys the literature concerning the dearth...
Many IS researchers obtain data through the use of self-reports. However, self-reports have inherent problems and limitations, most notably the problem of common method variance. Common method variance can cause researchers to find a significant effect, when in fact, the true effect is due to the method employed. In this chapter, we examined publis...
The editors present work on research methodology and techniques in information systems research, in this book for graduate students in courses in information systems research methods. Articles collected from various journals examine issues related to survey research, rigor and relevance, virtual research, and multicultural and global research. Topi...
This paper reviews the academic community's response through research and curriculum initiatives to the practitioner's requirements for a diverse information technology (IT) workforce. The paper then highlights opportunities for future IT research by matching current academic research to organizational diversity issues, exposing the gaps and opport...
Most IT professionals would agree that diversity in IT leads to positive outcomes. However, few studies have empirically tested differences in diversity perceptions among groups. This research-in-progress develops a survey to test perceptions in four diversity categories: gender, ethnicity, age, and disability. Currently, we have begun collecting d...
In an environment in which information technology has become a critical link between and among suppliers and customers, organizations were recently threatened by potential systems failures that could have erased the gains of the past decade. Although experts predicted that Y2K could lead to devastating results, those dire predictions turned out to...
This paper develops an integrated theory of playfulness in computer interactions using multiple constructs. Although previous researchers have suggested that playfulness in computer interactions should be measured as both a state and a trait, we suggest that fully understanding the relevant constructs involves much more than simply a state-trait me...
This paper develops an integrated theory of playfulness in computer interactions using multiple constructs. Although previous researchers have suggested that playfulness in computer interactions should be measured as both a state and a trait, we suggest that fully understanding the relevant constructs involves much more than simply a state-trait me...
This project will produce a program that calculates incentive pay for a team of workers. This project responds to an increasing need in the textile and apparel industries to provide incentives for work teams. Many firms are exploring modular manufacturing and, even in a piece-rate environment, it is important to encourage people to work together fo...
This project developed a decision support system (DSS) that helps managers reach a sound and logical decision about proposed investments. The cost-benefit advisor helps express anticipated cash flows and their risks, including intangible costs and benefits that are typically ignored but should be considered. The speadsheet-based system provides wor...
In this study, we examine the impact of the Napster decision on RIAA sales. We also present a brief introduction to copyright law and DMCA. We compare RIAA sales to DVD and entertainment software sales, both before and after the Napster decision. Analysis of variance showed no differences in sales growth before Napster; that is, all industries show...
This project will produce a program that calculates incentive pay for a team of workers. This project responds to an increasing need in the textile and apparel industries to provide incentives for work teams. Many firms are exploring modular manufacturing, and even in a piece rate environment, it is important to encourage people to work together fo...
This project will develop a decision support system to help managers reach a sound and logical decision regarding proposed investments. The proposed cost benefit advisor system will help managers express the expected cash flows and their risks, including intangible costs and benefits that might otherwise be ignored. The user of this system will est...
As computer science and information systems departments face declining enrollments, we must find ways to attract and retain students. One option is through partnering with high schools to attract students into the IT field. As we work to reach more students, distance learning offers an alternative method to reach many students. However, some argue...
IS students continue to struggle to complete the programming courses often required in their course of study. In this research-in-progress, we describe how IS educators can learn about the predictors of success in programming courses and translate that knowledge into better advising for their IS students. We plan to administer an open-ended survey...
As high schools begin to offer more distance learning courses, universities have an opportunity to establish partnerships to deliver online IT courses. Delivering online courses at the high school level, however, means overcoming obstacles that may not be faced at the university level. In particular, establishing partnerships with high schools requ...