Max M. North, Ph.D.

71
Max M. North, Max M. North, Ph.D. Ph.D. Applicant for the tenure-track Applicant for the tenure-track faculty position in Management faculty position in Management Information Systems Information Systems March 2006 March 2006 Southern Polytechnic State Southern Polytechnic State University University

description

Max M. North, Ph.D. Applicant for the tenure-track faculty position in Management Information Systems March 2006 Southern Polytechnic State University. Teaching Philosophy & Techniques. Extensive Use of Technology Interactive Examples and Discussion Case Studies Assignments and Handouts - PowerPoint PPT Presentation

Transcript of Max M. North, Ph.D.

Page 1: Max M. North, Ph.D.

Max M. North, Ph.D.Max M. North, Ph.D.

Applicant for the tenure-track faculty Applicant for the tenure-track faculty position in Management Information position in Management Information

SystemsSystems

March 2006March 2006

Southern Polytechnic State UniversitySouthern Polytechnic State University

Page 2: Max M. North, Ph.D.

Teaching Philosophy & TechniquesTeaching Philosophy & Techniques

Extensive Use of TechnologyExtensive Use of TechnologyInteractive Examples and DiscussionInteractive Examples and DiscussionCase Studies Case Studies Assignments and HandoutsAssignments and HandoutsPresentations (Individual and/or Group)Presentations (Individual and/or Group)Brief In-class/Take-home Quizzes and EssaysBrief In-class/Take-home Quizzes and EssaysResearch using Scholarly Site (ACM…) Research using Scholarly Site (ACM…) Research using Internet (Cautiously)Research using Internet (Cautiously)Integrated teaching approachIntegrated teaching approachLearner-centered school of thought (Communication of Learner-centered school of thought (Communication of ACM, April 1996).ACM, April 1996).www.spsu.edu/mgnt/maxwww.spsu.edu/mgnt/max Make Learning FUN! Make Learning FUN!

Page 3: Max M. North, Ph.D.

Where are you from?Where are you from?

Page 4: Max M. North, Ph.D.

What is this?What is this?

Page 5: Max M. North, Ph.D.

What Are The Issues Facing CIOs Today What Are The Issues Facing CIOs Today and How Should They Deal With Them?and How Should They Deal With Them?

Change of terminology… Change of terminology…

ChallengesChallenges, rather than Issues, rather than Issues

Page 6: Max M. North, Ph.D.

CIO’s ChallengesCIO’s ChallengesAcademic-Based PerspectiveAcademic-Based Perspective

The Information Systems Investment The Information Systems Investment

The Strategic Business The Strategic Business

GlobalizationGlobalization

The Information Architecture & InfrastructureThe Information Architecture & Infrastructure

Responsibility and Control Responsibility and Control

Page 7: Max M. North, Ph.D.

CIO’s ChallengesCIO’s ChallengesAcademic Perspective (continued)Academic Perspective (continued)

The Information Systems Investment The Information Systems Investment ChallengeChallenge

-One of the greatest challenges!-One of the greatest challenges!

-To insure that their companies do indeed obtain -To insure that their companies do indeed obtain meaningful returns on their information systems meaningful returns on their information systems investmentsinvestments

-How can we evaluate our information systems -How can we evaluate our information systems investments?investments?

-Are we receiving the return that we should on our -Are we receiving the return that we should on our investments?investments?

Page 8: Max M. North, Ph.D.

Total IT Investment VS. Total IT Investment VS. Total Business InvestmentTotal Business Investment

Page 9: Max M. North, Ph.D.

CIO’s ChallengesCIO’s ChallengesAcademic Perspective (continued)Academic Perspective (continued)

The Strategic ChallengeThe Strategic Challenge

-Computer technology has grown more rapidly than the -Computer technology has grown more rapidly than the ability of organizations to use it.ability of organizations to use it.

-Many companies need to make fundamental changes in -Many companies need to make fundamental changes in employee and management behavior and develop new employee and management behavior and develop new business models etc.business models etc.

-What complementary assets are needed to use -What complementary assets are needed to use information technology effectively?information technology effectively?

Page 10: Max M. North, Ph.D.

CIO’s ChallengesCIO’s ChallengesAcademic Perspective (continued)Academic Perspective (continued)

The Globalization ChallengeThe Globalization Challenge

-The rapid growth in international trade and the -The rapid growth in international trade and the emergence of a global economy call for information emergence of a global economy call for information systems that can support both producing and selling systems that can support both producing and selling goods in many different countiesgoods in many different counties

-How can firms understand the business and system -How can firms understand the business and system requirements of a global economic environment?requirements of a global economic environment?

Page 11: Max M. North, Ph.D.

CIO’s ChallengesCIO’s ChallengesAcademic Perspective (continued)Academic Perspective (continued)

The Information Architecture and The Information Architecture and Infrastructure ChallengeInfrastructure Challenge

-Complex information systems which put constraints on -Complex information systems which put constraints on business strategy and executionbusiness strategy and execution

-How can organizations develop an information -How can organizations develop an information architecture and information technology infrastructure architecture and information technology infrastructure that can support their goals when business conditions that can support their goals when business conditions and technologies are changing so rapidly?and technologies are changing so rapidly?

Page 12: Max M. North, Ph.D.

CIO’s ChallengesCIO’s ChallengesAcademic Perspective (continued)Academic Perspective (continued)The Responsibility and Control ChallengesThe Responsibility and Control Challenges

-Job Elimination-Job Elimination

-Personal Data Collections (Privacy and Security)-Personal Data Collections (Privacy and Security) -System Outages-System Outages -Illegal activities using the Internet-Illegal activities using the Internet -Information Security (more on this later)-Information Security (more on this later) -How can we design information systems that people can -How can we design information systems that people can

control and understand?control and understand? -How can organizations ensure that their information -How can organizations ensure that their information

systems are used in an ethically and socially responsible systems are used in an ethically and socially responsible manner?manner?

Page 13: Max M. North, Ph.D.

What is this?What is this?

Page 14: Max M. North, Ph.D.

CIO’s ChallengesCIO’s ChallengesResearch-Based PerspectiveResearch-Based Perspective

Methodology Methodology

Online Survey of Online Survey of 545545 CIOs (randomly selected) CIOs (randomly selected)

A broad range of industries including A broad range of industries including manufacturing, medical/healthcare, insurance, manufacturing, medical/healthcare, insurance, finance, education, wholesale/retail/distribution finance, education, wholesale/retail/distribution and federal, state and local government.and federal, state and local government.

Annual revenue of less than $100 million (40%). Annual revenue of less than $100 million (40%). Between $101 million and $999.9 million (30%). Between $101 million and $999.9 million (30%). Annual revenue of more than $1 billion (21%). Annual revenue of more than $1 billion (21%).

Page 15: Max M. North, Ph.D.

CIO’s ChallengesCIO’s ChallengesResearch Perspective (continued)Research Perspective (continued)What are the five biggest barriers to your effectiveness What are the five biggest barriers to your effectiveness in your role right now? in your role right now?

1. Unrealistic or unknown expectations1. Unrealistic or unknown expectations 2. Inadequate budgets2. Inadequate budgets 3. Shortage of time for strategic thinking/planning3. Shortage of time for strategic thinking/planning 4. Difficulty proving the value of IT4. Difficulty proving the value of IT 5. Lack of alignment between business goals & IT efforts5. Lack of alignment between business goals & IT efforts 6. Risk and uncertainty due to volatile economic conditions6. Risk and uncertainty due to volatile economic conditions 7. Overwhelming pace of technology change7. Overwhelming pace of technology change 8. Lack of key technical skill sets within IT8. Lack of key technical skill sets within IT 9. Lack of business knowledge within IT department9. Lack of business knowledge within IT department

Page 16: Max M. North, Ph.D.

CIO’s ChallengesCIO’s ChallengesResearch Perspective (continued) Research Perspective (continued)

What are your top five technology priorities?What are your top five technology priorities?

Please guess three now…Please guess three now…

What are your top five technology priorities?What are your top five technology priorities?

Please guess three now…Please guess three now…

Page 17: Max M. North, Ph.D.

CIO’s ChallengesCIO’s ChallengesResearch Perspective (continued) Research Perspective (continued)

What are your top five technology priorities?What are your top five technology priorities? 1. Integrating/enhancing systems and processes1. Integrating/enhancing systems and processes 2. Ensuring data security and integrity2. Ensuring data security and integrity 3. External customer service/relationship management3. External customer service/relationship management 4. Redesigning/rationalizing the IT architecture4. Redesigning/rationalizing the IT architecture 5. Enabling/enhancing e-commerce5. Enabling/enhancing e-commerce 6. Automating/optimizing the supply chain6. Automating/optimizing the supply chain 7. Implementing new technologies7. Implementing new technologies 8. Scaling IT globally8. Scaling IT globally

Page 18: Max M. North, Ph.D.

CIO’s ChallengesCIO’s ChallengesResearch Perspective (continued)Research Perspective (continued)What are your top management priorities? What are your top management priorities?

1. Increasing business efficiency through IT-enabled1. Increasing business efficiency through IT-enabled process improvementprocess improvement 2. Aligning IT and business goals2. Aligning IT and business goals 3. Improving internal customer (user) satisfaction3. Improving internal customer (user) satisfaction 4. Creating competitive advantage through IT4. Creating competitive advantage through IT 5. Controlling IT costs5. Controlling IT costs 6. Staff development/leadership development/developing6. Staff development/leadership development/developing business skills within ITbusiness skills within IT 7. Ensuring privacy of customer and employee data7. Ensuring privacy of customer and employee data 8. Measuring and communicating impact of IT8. Measuring and communicating impact of IT

Page 19: Max M. North, Ph.D.

CIO’s ChallengesCIO’s ChallengesResearch Perspective (continued)Research Perspective (continued)What impact did IT have on the overall business?What impact did IT have on the overall business?

1. Reduced costs through efficiency/increased productivity1. Reduced costs through efficiency/increased productivity

2. Enabled growth2. Enabled growth

3. Enabled business innovation3. Enabled business innovation

4. Improved customer (external) satisfaction4. Improved customer (external) satisfaction

5. Created or enabled competitive advantage5. Created or enabled competitive advantage

6. Enabled global operations6. Enabled global operations

7. Streamlined the supply chain7. Streamlined the supply chain

8. Grew existing revenue8. Grew existing revenue

Page 20: Max M. North, Ph.D.

CIO’s ChallengesCIO’s ChallengesResearch Perspective (continued)Research Perspective (continued)What impact do you expect IT will have in 2005/2006?What impact do you expect IT will have in 2005/2006?

Please guess three now…Please guess three now…

Page 21: Max M. North, Ph.D.

CIO’s ChallengesCIO’s ChallengesResearch Perspective (continued)Research Perspective (continued)What impact do you expect IT will have in 2005/2006?What impact do you expect IT will have in 2005/2006?

1. Reduce costs through efficiency/increase productivity1. Reduce costs through efficiency/increase productivity 2. Enable business innovation2. Enable business innovation 3. Create or enable competitive advantage3. Create or enable competitive advantage 4. Enable growth4. Enable growth 5. Improve customer (external) satisfaction5. Improve customer (external) satisfaction 6. Generate/enable new revenue streams6. Generate/enable new revenue streams 7. Enable global operations7. Enable global operations 8. Streamline the supply chain8. Streamline the supply chain 9. Grow existing revenue streams9. Grow existing revenue streams

Page 22: Max M. North, Ph.D.

CIO’s ChallengesCIO’s ChallengesResearch Perspective (continued)Research Perspective (continued)On which of the following activities do you spend the On which of the following activities do you spend the most time? most time?

[14%][14%] Interacting with your company's CXOs & business executives Interacting with your company's CXOs & business executives [12%][12%] Strategic planning Strategic planning [11%][11%] Interacting with IT vendors/outsourcers/service providers Interacting with IT vendors/outsourcers/service providers [11%][11%] Learning about technologies/making strategic systems decisions Learning about technologies/making strategic systems decisions [10%][10%] Hiring, developing and managing the IT staff Hiring, developing and managing the IT staff [10%][10%] Leading projects Leading projects [ 9%][ 9%] Managing crises/putting out fires Managing crises/putting out fires [ 8%][ 8%] Designing/optimizing business processes Designing/optimizing business processes [ 7%][ 7%] Budgeting Budgeting [ 4%][ 4%] Interacting with outside business partners/suppliers/customers Interacting with outside business partners/suppliers/customers [ 4%][ 4%] Other Other

Page 23: Max M. North, Ph.D.

CIO’s ChallengesCIO’s ChallengesResearch Perspective (continued)Research Perspective (continued)What personal skills are most critical for success in What personal skills are most critical for success in your role? your role?

Please guess three now…Please guess three now…

Page 24: Max M. North, Ph.D.

CIO’s ChallengesCIO’s ChallengesResearch Perspective (continued)Research Perspective (continued)What personal skills are most critical for success in What personal skills are most critical for success in

your role? your role?

[28%][28%] Ability to communicate effectively Ability to communicate effectively

[24%][24%] Strategic thinking and planning Strategic thinking and planning

[22%][22%] Understanding business processes and operations Understanding business processes and operations

[ 9%][ 9%] Understanding industry trends and market forces Understanding industry trends and market forces

[ 7%][ 7%] Negotiation/sales skills Negotiation/sales skills

[ 6%][ 6%] Thorough knowledge of technology options Thorough knowledge of technology options

[ 4%][ 4%] Technical proficiency Technical proficiency

Page 25: Max M. North, Ph.D.

CIO’s ChallengesCIO’s ChallengesResearch Perspective (continued)Research Perspective (continued)What skill set do you believe you will have the greatest What skill set do you believe you will have the greatest need for from new hires?need for from new hires?

Please guess three now…Please guess three now…

Page 26: Max M. North, Ph.D.

CIO’s ChallengesCIO’s ChallengesResearch Perspective (continued)Research Perspective (continued)

What skill set do you believe you will have the greatest What skill set do you believe you will have the greatest

need for from new hires?need for from new hires?

[41%][41%] Infrastructure technology (knowledge of several platforms & Infrastructure technology (knowledge of several platforms & systems) systems)

[ 4%][ 4%] Open source technology Open source technology

[14%][14%] Industry knowledge (knowledge of IT practices in specific industries) Industry knowledge (knowledge of IT practices in specific industries)

[20%][20%] Business knowledge (understanding of business processes, Business knowledge (understanding of business processes,

e.g. profit & loss) e.g. profit & loss)

[10%][10%] Emerging technology (understanding of new or future systems) Emerging technology (understanding of new or future systems)

[11%][11%] Other Other

Page 27: Max M. North, Ph.D.

CIO’s ChallengesCIO’s ChallengesResearch Perspective (continued)Research Perspective (continued)Is your IT investment delivering expected ROI?Is your IT investment delivering expected ROI?

[ ? %][ ? %] YesYes[ ? %][ ? %] NoNo

Please guess now…Please guess now…

Page 28: Max M. North, Ph.D.

CIO’s ChallengesCIO’s ChallengesResearch Perspective (continued)Research Perspective (continued)Is your IT investment delivering expected ROI?Is your IT investment delivering expected ROI?

[54%][54%] YesYes[46%][46%] NoNo

Page 29: Max M. North, Ph.D.

Productivity VS. IT Capital StockProductivity VS. IT Capital Stock

Page 30: Max M. North, Ph.D.

The Summary of Challenges…The Summary of Challenges…

1.1. Fitting technology to the organization Fitting technology to the organization (or vice versa). (or vice versa).

Page 31: Max M. North, Ph.D.

What is this?What is this?

Page 32: Max M. North, Ph.D.

……How to deal with challenges?How to deal with challenges?

Case Studies and ResearchCase Studies and Research - UPS- UPS - Delta- Delta - Google- Google - Pepsi- Pepsi - GM- GM - Boeing- Boeing - …- …

Page 33: Max M. North, Ph.D.

Understand the Scope of Understand the Scope of Management Information Systems!Management Information Systems!

Page 34: Max M. North, Ph.D.

Utilize Various Decision Support SystemsUtilize Various Decision Support Systems

Page 35: Max M. North, Ph.D.

Use Modern and Practical ApproachesUse Modern and Practical Approaches

Systems Development Life Cycle (SDLC)Systems Development Life Cycle (SDLC)– Systems Planning and SelectionSystems Planning and Selection– Systems AnalysisSystems Analysis– Systems DesignSystems Design– Systems ImplementationSystems Implementation

Alternatives to Systems Development Life CycleAlternatives to Systems Development Life Cycle– PrototypingPrototyping– Rapid Application Development (RAD)Rapid Application Development (RAD)– CASECASE– ……

Page 36: Max M. North, Ph.D.

System Development Life CycleSystem Development Life Cycle

Page 37: Max M. North, Ph.D.

General Recommendations…General Recommendations…

CommunicationCommunicationIntegration (using Enterprise Systems)Integration (using Enterprise Systems)Mind ChangeMind ChangeTrainingTrainingStructured ApproachStructured ApproachTechnologyTechnologyDecision Support Systems (all levels)Decision Support Systems (all levels)Use Successful Models & Techniques Use Successful Models & Techniques ……Please list a few more… AssignmentPlease list a few more… Assignment

Page 38: Max M. North, Ph.D.

Research and Creative ActivityResearch and Creative Activity

Human-Computer Interaction/InterfaceHuman-Computer Interaction/Interface A.K.A. Human FactorsA.K.A. Human Factors

Virtual Reality Technology/ApplicationsVirtual Reality Technology/Applications Pioneered Virtual Reality Therapy…Pioneered Virtual Reality Therapy…

CollaborationCollaboration U.S. Army Research LaboratoryU.S. Army Research Laboratory Boeing Computer ServicesBoeing Computer Services NSF, NASA…NSF, NASA… Ga. Tech (GVU), Purdue University, Clark AtlantaGa. Tech (GVU), Purdue University, Clark Atlanta University… University…

Information Security & Ethics AwarenessInformation Security & Ethics Awareness

Page 39: Max M. North, Ph.D.

Virtual Reality Sample IVirtual Reality Sample I

Page 40: Max M. North, Ph.D.

Virtual Reality SampleVirtual Reality Sample IIII

Page 41: Max M. North, Ph.D.

Subject in testing phase of the project, performing Subject in testing phase of the project, performing various operations on the virtual vector containervarious operations on the virtual vector container

Page 42: Max M. North, Ph.D.

The virtual scene showing a virtual Vector The virtual scene showing a virtual Vector implementation in 3D graphics using WorldUp product implementation in 3D graphics using WorldUp product

from the Sense8 Corporationfrom the Sense8 Corporation

Page 43: Max M. North, Ph.D.

Virtual Spider…Virtual Spider…

Page 44: Max M. North, Ph.D.

Virtual Flying…Virtual Flying…

Page 45: Max M. North, Ph.D.

Virtual Speaking…Virtual Speaking…

Page 46: Max M. North, Ph.D.

National Center ofNational Center ofAcademic Excellence in Academic Excellence in

Information Assurance Education for Information Assurance Education for

academic years 2006-2009academic years 2006-2009

Collaboration with the Clark Atlanta University

Page 47: Max M. North, Ph.D.

Information Security & Ethics Awareness: Information Security & Ethics Awareness: A challenge for A challenge for

Management Information SystemsManagement Information Systems

Presented at ACM/SE 2006 Presented at ACM/SE 2006 March 11, 2006March 11, 2006

Collaboration with the Clark Atlanta University

Page 48: Max M. North, Ph.D.

AbstractAbstract

Information Security: A challenge for MISInformation Security: A challenge for MISComputer security and ethics awareness at Historically Computer security and ethics awareness at Historically Black Colleges and Universities (HBCU). Black Colleges and Universities (HBCU). 465 student volunteers (computer technology courses)465 student volunteers (computer technology courses)Questionnaire (21 questions)Questionnaire (21 questions)The majority of the participants had a satisfactory The majority of the participants had a satisfactory awareness of computer security and ethics awareness of computer security and ethics 20% to 52% lack of awareness of computer security is 20% to 52% lack of awareness of computer security is highly riskyhighly risky 14% to 24% violation of the code of ethics is not 14% to 24% violation of the code of ethics is not acceptable acceptable

Page 49: Max M. North, Ph.D.

IntroductionIntroduction

According to a quantitative survey of 435 According to a quantitative survey of 435 higher education institutions by higher education institutions by EDUCAUSE, only a third have security EDUCAUSE, only a third have security awareness training for students and awareness training for students and faculty.faculty.

There is no data that relates to the HBCU There is no data that relates to the HBCU student population. student population.

Page 50: Max M. North, Ph.D.

MethodologyMethodology

Four hundred sixty five (Four hundred sixty five (465465) Introduction ) Introduction to Computer Technology students to Computer Technology students volunteered to participate in the survey.volunteered to participate in the survey.A concise questionnaire consisting of 21 A concise questionnaire consisting of 21 questions was used. questions was used. The first part measured the participant’s The first part measured the participant’s awareness of computer security. awareness of computer security. The second part measured their ethical The second part measured their ethical awareness of computer use. awareness of computer use.

Page 51: Max M. North, Ph.D.

Methodology (continued)Methodology (continued)

Six Parts - Awareness of: Six Parts - Awareness of:

(i) passwords (i) passwords

(ii) data backups, (ii) data backups,

(iii) antivirus software, (iii) antivirus software,

(iv) firewalls, (iv) firewalls,

(v) software updates and patches, and (v) software updates and patches, and

(vi) uninterruptible power supply. (vi) uninterruptible power supply.

Page 52: Max M. North, Ph.D.

Results – Section IResults – Section I

20%0%

80%

Yes

No

Unsure

Q1. Do you have a password on your personal computer?

Page 53: Max M. North, Ph.D.

Results – Section IResults – Section I

86%

1%13%

Yes

No

Unsure

Q2. Do you have to use a password on your university computer?

Page 54: Max M. North, Ph.D.

Results – Section IResults – Section I

29%

71%

0%

Yes

No

Unsure

Q3. Is your password easy to guess?

Page 55: Max M. North, Ph.D.

Results – Section IResults – Section I

78%

20%

2%

Yes

No

Unsure

Q6. Do you have antivirus software installed on your computer?

Page 56: Max M. North, Ph.D.

Results – Section IResults – Section I

24%68%

8%

Yes

No

Unsure

Q6a. Is your antivirus subscription current?

Page 57: Max M. North, Ph.D.

Results – Section IResults – Section I

65%

9%

26% Yes

No

Unsure

Q7. Are you aware that university computers have antivirus software?

Page 58: Max M. North, Ph.D.

Results – Section IIResults – Section II

3%

83%

14%

Yes

No

Unsure

Q15. Have you ever used a computer to harm other people?

Page 59: Max M. North, Ph.D.

Results – Section IIResults – Section II

22%3%

75% Yes

No

Unsure

Q16. Have you ever snooped around in other people’s computer files?

Page 60: Max M. North, Ph.D.

Results – Section IIResults – Section II

15%2%

83%

Yes

No

Unsure

Q17. Have you ever used a computer to steal or bear false witness?

Page 61: Max M. North, Ph.D.

Results – Section IIResults – Section II

23%

2%

75%Yes

No

Unsure

Q18. Have you ever used other people’s computer resources without authorization?

Page 62: Max M. North, Ph.D.

Results – Section IIResults – Section II

16%5%

79%Yes

No

Unsure

Q19. Have you ever interfered with other people’s computer work?

Page 63: Max M. North, Ph.D.

Results – Section IIResults – Section II

24%

71%

5%

Yes

No

Unsure

Q20. Have you ever copied or used proprietary software for which you have not paid?

Page 64: Max M. North, Ph.D.

Results – Section IIResults – Section II

16%2%

82%Yes

No

Unsure

Q.21 Have you ever permitted someone else to use your computer/account for illegal purposes?

Page 65: Max M. North, Ph.D.

Conclusion and RecommendationConclusion and Recommendation

Secure the computers on networks and Secure the computers on networks and provide security software for students to install provide security software for students to install on their computers. on their computers.

Train students on installation, use, and Train students on installation, use, and updating of antivirus software, firewalls, updating of antivirus software, firewalls, passwords, data back-ups and the use of passwords, data back-ups and the use of proper uninterruptible power supply.proper uninterruptible power supply.

Provide workshops on computer security and Provide workshops on computer security and ethics for students, faculty, and all computer ethics for students, faculty, and all computer users.users.

Page 66: Max M. North, Ph.D.

Conclusion and RecommendationConclusion and Recommendation

Include a special section on computer security Include a special section on computer security and ethics in the mandatory introductory and ethics in the mandatory introductory computer technology course.computer technology course.Create and maintain a website for computer Create and maintain a website for computer users to obtain the latest information on security users to obtain the latest information on security software, patches and other related issues. software, patches and other related issues. Conduct periodic computer security and ethics Conduct periodic computer security and ethics surveys to monitor the awareness of computer surveys to monitor the awareness of computer users to observe their progress and provide them users to observe their progress and provide them with the necessary information to guide them with the necessary information to guide them toward a greater awareness of computer security toward a greater awareness of computer security and ethics. and ethics.

Page 67: Max M. North, Ph.D.

AcknowledgmentAcknowledgment

This effort is supported in part by the This effort is supported in part by the National Science Foundation (NSF) Grant National Science Foundation (NSF) Grant No. DUE-0210147. The content of this No. DUE-0210147. The content of this work does not reflect the position or policy work does not reflect the position or policy of the NSF and no official endorsement of the NSF and no official endorsement should be inferred.should be inferred.

Collaborative ResearchCollaborative Research Clark Atlanta UniversityClark Atlanta University

Page 68: Max M. North, Ph.D.

What is this?What is this?

Page 69: Max M. North, Ph.D.

Professional DossierProfessional Dossier

Academic and Professional AchievementsAcademic and Professional Achievements

Teaching, Mentoring and Supervision Teaching, Mentoring and Supervision

Industry and Federal Agency Experience and Industry and Federal Agency Experience and Collaboration Collaboration

Scholarship and Creative Activity Scholarship and Creative Activity

Professional Services Professional Services

www.spsu.edu/mgnt/maxwww.spsu.edu/mgnt/max

Page 70: Max M. North, Ph.D.

Questions?Questions?

Wolf Khan, oil painting

Page 71: Max M. North, Ph.D.

Thanks for the Opportunity!!!Thanks for the Opportunity!!!

Stuart Shils, oil painting