Courses Offered
Undergraduate
- BCIS 1305 Business Computer Applications
- BCIS 3347 Data Communications
Graduate
- BCIS 5304 Telecommunications for Managers (Summer and Fall (Online))
- BCIS 5311 Managing Information Systems (I no longer teach this class)
- BCIS 5317 Topics: Security
- BCIS 5317 Topics: Emerging Technologies
- BCIS 5319 Decision Support Systems (I no longer teach this class)
- BCIS 5351 IT Project Management (I no longer teach this class)
- BCIS 5376 Network Administration and Design (LAN) (Fall (Online))
- BCIS 5378 Network Design and Administration (WAN) (Spring (Online))
- BCIS 5379 Technology of E-Business (Spring (Online))
- BCIS 5390 Topics: Social Media
Research and Scholarly Activities
Research Activities
- My research stream is focused on personal and organizational security posture. Specifically, the positions that organizations and individuals place themselves in as it relates to information systems security based on personal/professional characteristics.
Scholarly Activities
- I regularly attend discipline related conferences, present research conducted, and pursue appropriate journal outlets for my research.
Publications
Refereed Publications
- Nagy, D., Schuessler, J., Dubinsky, A. (2015). Defining and Identifying Disruptive Innovations. Industrial Marketing Management
- Schuessler, J., Windsor, J., Wu, A. (2015). Assessing Information Systems Security Effectiveness in Large Versus Small Businesses. Journal of Information System Security, 10(1).
- Schuessler, J., Hite, D. (2014). Pre-Employment Screening for Security Risk: An Exploratory Study. Journal of Applied Business and Economics, 16(1), 84-95.
- Schuessler, J. (2013). Contemporary Threats and Countermeasures. Journal of Information Privacy and Security (9) 2, p. 3-20.
- Schuessler, J., Nagy, D., Fulk, H. K., Holton, C. (2016). An Evaluation of Past Stage Models of Information Systems Security (Abstract). Oklahoma City, Oklahoma: 2016 SWDSI Annual Meeting.
- Schuessler, J., Nagy, D., Dearing, A., Fulk, H. K. (2015). Data Breach Laws: Do They Work? An Exploratory Study (Abstract). Houston, Texas: 2015 SWDSI Annual Meeting.
- Schuessler, J., Ramakrishnan, T. (2014). Cognitive Ability, Personal Computer Security Posture, and Employability: An Exploratory Study (Abstract). Tampa, Florida: 2014 Annual Meeting of Decision Sciences Institute.
- Nagy, D., Schuessler, J. (2014). Defining and Predicting Disruptive Innovations. Tampa, Florida: Decision Sciences Institute.
- Schuessler, J., Hite, D. (2013). Pre-Employment Screening for Security Risk: An Exploratory Study (pp. 9). Albuquerque, New Mexico: Southwest Decision Sciences Institute.
- Schuessler, J. (2012). In Mohan Rao (Ed.), Threats and Countermeasures of the Realm in 2011 (pp. 801-809). Houston, Texas: Southwest Decision Sciences Forty-Third Annual Meeting.
- Schuessler, J. (2011). In Mohan Rao (Ed.), Information Systems Security: Developing a Stage Theory (pp. 1-13). 2011 Southwest Decision Sciences Institute Conference.
- Schuessler, J., Ibragimova, B. (2009). In Gurpreet Dhillon (Ed.), Hacking Framework Extended: The Role of Vulnerabilities. Virginia Commonwealth University.
- Schuessler, J., Ibragimova, B. (2009). In Gurpreet Dhillon (Ed.), Portable Privacy: Mobile Device Adoption. Virginia Commonwealth University.
- Schuessler, J. (2007). An Information Systems Security Framework. AIS.
Non-Refereed Publications
- Schuessler, J. (Presenter & Author), MIS Departmental Seminar, “Information Systems Security: A Preliminary Stage Theory,” MIS Department, Bloomsburg, Pennsylvania. (December 9, 2009).
- Schuessler, J. (Presenter & Author), ISRC Annual Meeting, “General Deterrence Theory: Assessing Information Systems Security Effectiveness in Large Versus Small Business,” ISRC, Denton, Texas. (December 6, 2007).
Presentations
- Schuessler, J. (Presenter & Author), Nagy, D. (Author Only), Fulk, H. K. (Author Only), Holton, C. (Author Only), 2016 Annual Meeting of the Southwest Decision Sciences Institute, “An Evaluation of Past Stage Models of Information Systems Security,” Southwest Decision Sciences Institute, Oklahoma City, Oklahoma. (March 10, 2016).
- Schuessler, J. (Presenter & Author), 13th Annual Excellence in Teaching Conference, “Engaging Students in Online Classes Through Social Media and other Cloud Based Services,” CII Tarleton State University, Stephenville, Texas. (February 12, 2016).
- Schuessler, J. (Presenter & Author), Nagy, D. (Author Only), Dearing, A. (Author Only), Fulk, H.K. (Author Only), Southwest Decision Sciences Forty-Fifth Annual Meeting, “Data Breach Laws: Do They Work? An Exploratory Study (Abstract),” Southwest Decision Sciences Institute, Houston, Texas. (March 12, 2015).
- Nagy, D. (Author Only), Schuessler, J. (Author Only), Fulk, H. K. (Presenter & Author), Holton, C. (Author Only), 2015 Annual Meeting of the Southwest Decision Sciences Institute, “Understanding Enterprise System Innovation: A Belief, Action, Outcome Proposal,” Southwest Decision Sciences Institute, Houston, Texas. (March 12, 2015).
- Schuessler, J., 2014 Annual Meeting of the Decision Sciences Institute, “Cognitive Ability, Personal Computer Security Posture, and Employability: An Exploratory Study,” Decision Sciences Institute, Tampa, Florida. (November 24, 2014).
- Guest Speaker, Tolar ISD, Tolar, Texas. (May 8, 2013).
- Guest Speaker, Granbury ISD, Granbury, Texas. (May 6, 2013).
- Schuessler, J. (Presenter & Author), Hite, D. M. (Author Only), Southwest Decision Sciences Forty-Fourth Annual Meeting, “Pre-Employment Screening for Security Risk: An Exploratory Study,” Southwest Decision Sciences Institute, Albuquerque, New Mexico. (March 16, 2013).
- Guest Speaker, Denton ISD Advanced Technology Center, Denton, Texas. (May 22, 2012 – May 23, 2012).
- Schuessler, J. (Presenter & Author), Southwest Decision Sciences Forty-Third Annual Meeting, “Threats and Countermeasures of the Realm in 2011,” Southwest Decision Sciences Institute, New Orleans, Louisiana. (March 1, 2012).
- Schuessler, J. (Presenter & Author), Southwest Decision Sciences Forty-Second Annual Meeting, “Information Systems Security: Developing a Stage Theory,” Southwest Decision Sciences Institute, Houston, Texas. (March 10, 2011).
- Schuessler, J. (Presenter & Author), MIS Departmental Seminar, “Information Systems Security: A Preliminary Stage Theory,” MIS Department, Bloomsburg, Pennsylvania. (December 9, 2009).
- Schuessler, J. (Presenter & Author), Ibragimova, B. (Author Only), 8th Annual Security Conference – Discourses in Security, Assurance and Privacy, “Hacking Framework Extended: The Role of Vulnerabilities,” The Security Conference, Las Vegas, Nevada. (April 15, 2009).
- Schuessler, J. (Presenter & Author), Ibragimova, B. (Author Only), 8th Annual Security Conference – discourses in security, assurance and privacy, “Portable Privacy: Mobile Device Adoption,” The Security Conference, Las Vegas, Nevada. (April 15, 2009).
- Schuessler, J. (Presenter & Author), International Conference on Information Systems, “General Deterrence Theory: Assessing Information Systems Security Effectiveness in Large Versus Small Business,” Association for Information Systems, Montreal, Canada. (December 6, 2007).
- Schuessler, J. (Presenter & Author), ISRC Annual Meeting, “General Deterrence Theory: Assessing Information Systems Security Effectiveness in Large Versus Small Business,” ISRC, Denton, Texas. (December 6, 2007).
- Schuessler, J. (Presenter & Author), 2007 AMCIS: Reaching New Heights, “An Information Systems Security Framework,” Association for Information Systems, Keystone, Colorado. (August 12, 2007).
Professional Affiliations & Accreditations
Professional Certifications and Licenses
CompTIA A+, TestOut PC Pro, CompTIA Network+, TestOut Network Pro, CompTIA Security+, QM Certified Master Reviewer, QM Peer Reviewer
Degrees
- Ph.D., Business Computer Information Systems, University of North Texas, 2009.
- M.S., Information Technology, University of North Texas, 2003
- M.B.A., Business Computer Information Systems, University of North Texas, 2001
- B.B.A., Strategic Management, University of North Texas, 1994
Graduate Group Memberships
- Tarleton State University Graduate Faculty Status
Interests
Teaching Interests: Network Administration, Network Security
Research Interests: Computer and Network Security