Jeffrey Clements

 JeffreyA. Clements

Jeffrey A. Clements

  • Courses3
  • Reviews3

Biography

Weber State University - Information Systems


Resume

  • 2014

    Wake Forest University

    University of Utah

    Florida State University

    Managed network of over 4500 production desktop computers; Upgraded software and systems for over 100 plus remote sites\nConducted meetings and trainings for new employees\nResolved over 300 computer trouble tickets per month

    Sorenson Communications

    Assistant Professor

    Weber State University

    Teaching Assistant

    Teaching Assistant for IS 4410 Introduction to Information Systems

    IS 4440 Information Systems Networking and Servers

    IS 4470 Information Systems Security. \n\nGuest Lectured classes for both the Networking and Servers Class as well as the IS Security Class. Provided students feedback and support on various class projects and assignments. Held regular office hours for the support of the students during the semester. Graded exams

    quizzes and extensive semester projects.

    University of Utah

    Wake Forest University

    Florida State University

    PhD candidate

    Management Information Systems

    Tallahassee

    Florida Area

  • 2010

    Ph.D

    Management Information Systems

  • 2008

    Bachelor of Science (BS)

    Master of Science (MS)

    Entrepreneurship/Entrepreneurial Studies

    University of Utah - David Eccles School of Business

    Masters of Science

    Accomplishments\n\t* Selected to participate in the 2009 Regional MIS CA case competition on the \n Strategic Value of IT. \nSignificant Courses\n**IT Security\t\t\t**Networking and Servers\t\t\n**Database Design\t\t**Data Structures and Algorithms (Java) \n**Systems Analysis &Design\t**Data Mining and Warehousing\n**Web-based Applications\t**Project Management

    Information Systems

    University of Utah\t August 2010

  • 2004

    French

    Haitian Creole

    Bachelor of Science

    Business Entrepreneurship

    University of Utah\tDec 2008

  • YMCA

    Coach

    Analysis

    Strategy

    Project Management

    Information Technology

    Data Analysis

    Servers

    Security

    Business Intelligence

    Networking

    Access

    Relational Databases

    Leadership

    Computer Hardware

    IT Management

    Training

    Java

    Database Administration

    Management

    Telecommunications

    Linux

    Remote Influence Tactics (2012)

    Research into social influence theory has been extensive and has repeatedly shown the power that influence tactics exert over individuals in an organization. Despite the extant conceptualizations of political influence tactics in organizations

    very little research has focused on how these tactics play out for organizations implementing more autonomous team settings

    whose interactions are not proximally located close to one another. By extending social influence theory to the inclusion of media synchronicity theory

    this research contributes insight into how political influence tactics may operate across a variety of media in organizations employing remote work structures. A conceptual model of remote influence tactics is developed and the implications are discussed as part of this\nresearch agenda.

    Remote Influence Tactics (2012)

    Applied Networking Labs guides readers through the installation and basic \noperation of software used in the field of networking. DOS Commands; Windows Utilities; \nWeb Tools; Virtualization; Packet Analysis; Network Design; Wireless; Internet Information \nServer (IIS); Apache; Windows Server 2008; Linux; Careers in Networking For anyone \ninterested in understanding the installation and basic operation of software used in the field \nof networking.

    Applied Networking Labs (2e) (2014)

    Exploring Political Skill and Deception

    Understanding the role political skill may play in the attempt by someone engaged in purposeful deceit to achieve political influence is important as it is likely that political skill will further increase the likelihood the individual succeeds in his/her deception efforts. Understanding the roll political skill plays in deception efforts may help explain why the odds of accurately detecting deception are generally so poor. This finding is important as future deception research can then begin to examine the mechanisms by which political skill enables successful deception

    thereby increasing our odds of detecting deception. The purpose of this study is to add to and extend our understanding of\npolitical skill and explore the extent to which it can influence deceptive communication efforts.

    Exploring Political Skill and Deception

    This study looks at the influence of user engagement on users’ information security practices. A model describing how user engagement (user posts) may influence a person’s decision to employ better security measures (stronger passwords) is tested. Password strength was determined by looking at password length

    the types of characters used

    the variety of character sequences used

    the number of duplicate passwords

    and the number of uncrackable passwords. Passwords were tested using a variety of cracking techniques. This study found that individuals from an online gaming site who made more posts to the user forum employed stronger passwords.\n\nIntroduction\n\nInformation systems (IS) security is an ongoing challenge facing individuals

    organizations

    and even nation states. In 2016

    hackers broke into the Democratic National Committee’s (DNCs) e-mail servers and subsequent released—through WikiLeaks—thousands of stolen e-mails. This leak of private e-mail information cast doubts on many of the practices of the DNC and led to the stepping down of several ranking DNC members. The hack and WikiLeaks scandal cast doubt on practices of the Democratic Party and arguably lead to the eventual loss of Hillary Clinton to Donald Trump in the 2016 presidential election. Keeping private information private and secure is at the core of IS security. One primary way private information is kept secure is through the use of passwords. Passwords are critical in keeping digital information safe and secure. There is inherent risk involved if proper passwords are not chosen because passwords are the first line of defense against intrusion. According to many experts

    the DNC was using incredibly weak passwords which are to blame for the infamous hack.

    Valuing Information Security: A Look at the Influence of User Engagement on Information Security Strength\nRandall J. Boyle

    Chandrashekar D. Challa & Jeffrey A. Clements\nJournal of Information Privacy and Security Vol. 13

    Iss. 3

    2017\n

    The amount of confidence people have in their ability to deceive others can be an indication of how likely they are to engage in deceptive-communication behaviors and

    further

    how successful they are in their deceit. This study looks at the role of justified deceit in determining people’s levels of confidence. The study presents a research model and empirically tests it. Findings indicate that two justifications for lying—retaliation and protection—significantly influence people’s deception confidence.

    Confident Deception: The Role of Justification

    3 Int'l J. Psychol. & Behav. Sci. 178 (2013)

    Weber State University

    Sorenson Communications

Possible Matching Profiles

The following profiles may or may not be the same professor: