Lisa Yeo

 Lisa Yeo

Lisa M. Yeo

  • Courses1
  • Reviews4
  • School: Loyola University Maryland
  • Campus:
  • Department: Information Systems & Operations Management
  • Email address: Join to see
  • Phone: Join to see
  • Location: 4501 North Charles Street
    Baltimore, MD - 21210
  • Dates at Loyola University Maryland: December 2013 - September 2015
  • Office Hours: Join to see

Biography

Loyola University Maryland - Information Systems & Operations Management

Professor, student, author, curious human. Math geek. Biker.
Higher Education
Lisa
Yeo
Merced, California Area
Held GSEC and GCWN certifications from SANS. Currently an advisory board member for both certifications.

Specialties: Windows system administration and security, network design


Experience

  • University of Alberta

    PhD Candidate

    Studying Management Science and Management Information Systems (Math and Computers) in the School of Business.

    Research interests: Information Security and Privacy, Collaboration enabling technologies.

  • University of Alberta

    Sessional Lecturer

    MIS 311 Introduction to Management Information Systems (2005, 2006)
    MIS 686 Introduction to Management Information systems (2006, 2007)
    MIS 441 Management Information Systems Strategy (2007)
    SLIS 598 Information Security (2010, 2011)
    MGTSC 312 Business Statistics (2011)
    MGTSC 501 (labs) Data Analysis & Decision Making (2010, 2011)

  • The Alberta Library

    SuperNet Project Coordinator

    Providing coordination services to public libraries in Alberta as they prepare to participate in a province-wide high-speed fibre network. Duties include RFPs for hardware and services, education, security considerations, and aiding in the development of new library services.

  • The Alberta Library

    IT Manager

    Managing IT resources for the organization including IT strategy and consulting for the public library community. I have retained responsibility for SuperNet project coordination.

  • Loyola University Maryland

    Assistant Professor

    Research interests: Information Security and Privacy, Collaboration enabling technologies.

    Undergraduate Courses:
    Introduction to Information Systems
    Networks & Security

    Graduate Courses:
    Systems Thinking & Risk Assessment

  • University of California, Merced

    Assistant Professor

    Member of the Department of Management-Complex Systems in the School of Engineering.

  • SANS Institute

    Volunteer

    GCWN Board (2000-)
    GSEC Board (2005-)
    GCWN Authorized Grader (2003-2005)
    Local Mentor for Security Kick-start (2001)

  • Big Fluffy Dog Rescue

    Foster home for dogs as they await adoption.

    To help my fosters find their furever homes, I maintain a FaceBook page (https://www.facebook.com/SheepRiverFaust) where they write daily stories. Feel free to follow them there.

Education

  • University of Waterloo

    BMath, Honours

    Applied Math, Engineering

  • University of Alberta

    PhD

    Operations and Information Systems

  • University of Alberta

    MBA-International Business Specialization

    Technology Commercialization, MIS

  • University of Alberta

    PhD Candidate


    Studying Management Science and Management Information Systems (Math and Computers) in the School of Business. Research interests: Information Security and Privacy, Collaboration enabling technologies.

  • University of Alberta

    Sessional Lecturer


    MIS 311 Introduction to Management Information Systems (2005, 2006) MIS 686 Introduction to Management Information systems (2006, 2007) MIS 441 Management Information Systems Strategy (2007) SLIS 598 Information Security (2010, 2011) MGTSC 312 Business Statistics (2011) MGTSC 501 (labs) Data Analysis & Decision Making (2010, 2011)

Publications

  • Behavioral operations: The state of the field

    Journal of Operations Management

    The field of behavioral operations has matured into an established area within the discipline of operations management. The field fills an essential void by laying the micro-foundations for the broader discipline of operations management. As such, the field examines a variety of topics and is methodologically diverse.

  • Behavioral operations: The state of the field

    Journal of Operations Management

    The field of behavioral operations has matured into an established area within the discipline of operations management. The field fills an essential void by laying the micro-foundations for the broader discipline of operations management. As such, the field examines a variety of topics and is methodologically diverse.

  • Information Quality in Wikipedia: The Effects of Group Composition and Task Conflict

    Journal of Management Information Systems

    O Arazy, O Nov, R Patterson, L Yeo Journal of Management Information Systems 27 (4), 71-98

  • Behavioral operations: The state of the field

    Journal of Operations Management

    The field of behavioral operations has matured into an established area within the discipline of operations management. The field fills an essential void by laying the micro-foundations for the broader discipline of operations management. As such, the field examines a variety of topics and is methodologically diverse.

  • Information Quality in Wikipedia: The Effects of Group Composition and Task Conflict

    Journal of Management Information Systems

    O Arazy, O Nov, R Patterson, L Yeo Journal of Management Information Systems 27 (4), 71-98

  • Security and Privacy in Outsourcing with Customer-Specified Risk Tolerance

    eJeta.org Special Issue. Emerging Security Paradigms in the Knowledge Era

    Outsourcing coupled with technology that enables data to reside anywhere has opened up new challenges to the protection of personal privacy. Privacy laws differ internationally as does the value different cultures place on personal privacy. Such differences have implications for government as well as businesses. The corporation must be aware of the security efforts of all its partners and consumers must be aware of the security of all service providers in the extended value chain, not just the business they are interacting with directly. In this paper we propose a method for controlling risks associated with spreading personal information across an extended value chain. In addition, this method accommodates customer-specified levels of risk tolerance. For businesses, the goal is to minimize the cost of securing data spread across vendors and international boundaries.

  • Behavioral operations: The state of the field

    Journal of Operations Management

    The field of behavioral operations has matured into an established area within the discipline of operations management. The field fills an essential void by laying the micro-foundations for the broader discipline of operations management. As such, the field examines a variety of topics and is methodologically diverse.

  • Information Quality in Wikipedia: The Effects of Group Composition and Task Conflict

    Journal of Management Information Systems

    O Arazy, O Nov, R Patterson, L Yeo Journal of Management Information Systems 27 (4), 71-98

  • Security and Privacy in Outsourcing with Customer-Specified Risk Tolerance

    eJeta.org Special Issue. Emerging Security Paradigms in the Knowledge Era

    Outsourcing coupled with technology that enables data to reside anywhere has opened up new challenges to the protection of personal privacy. Privacy laws differ internationally as does the value different cultures place on personal privacy. Such differences have implications for government as well as businesses. The corporation must be aware of the security efforts of all its partners and consumers must be aware of the security of all service providers in the extended value chain, not just the business they are interacting with directly. In this paper we propose a method for controlling risks associated with spreading personal information across an extended value chain. In addition, this method accommodates customer-specified levels of risk tolerance. For businesses, the goal is to minimize the cost of securing data spread across vendors and international boundaries.

  • Personal Firewalls for Administrators and Remote Users

    Prentice Hall

  • Behavioral operations: The state of the field

    Journal of Operations Management

    The field of behavioral operations has matured into an established area within the discipline of operations management. The field fills an essential void by laying the micro-foundations for the broader discipline of operations management. As such, the field examines a variety of topics and is methodologically diverse.

  • Information Quality in Wikipedia: The Effects of Group Composition and Task Conflict

    Journal of Management Information Systems

    O Arazy, O Nov, R Patterson, L Yeo Journal of Management Information Systems 27 (4), 71-98

  • Security and Privacy in Outsourcing with Customer-Specified Risk Tolerance

    eJeta.org Special Issue. Emerging Security Paradigms in the Knowledge Era

    Outsourcing coupled with technology that enables data to reside anywhere has opened up new challenges to the protection of personal privacy. Privacy laws differ internationally as does the value different cultures place on personal privacy. Such differences have implications for government as well as businesses. The corporation must be aware of the security efforts of all its partners and consumers must be aware of the security of all service providers in the extended value chain, not just the business they are interacting with directly. In this paper we propose a method for controlling risks associated with spreading personal information across an extended value chain. In addition, this method accommodates customer-specified levels of risk tolerance. For businesses, the goal is to minimize the cost of securing data spread across vendors and international boundaries.

  • Personal Firewalls for Administrators and Remote Users

    Prentice Hall

  • What makes corporate wikis work? wiki affordances and their suitability for corporate knowledge work

    Design Science Research in Information Systems. Advances in Theory and Practice

    Wikis were originally intended for knowledge work in the open Internet environment, and there seems to be an inherent tension between wikis' affordances and the nature knowledge work in organizations. The objective of this paper is to investigate how tailoring wikis to corporate settings would impact users' wiki activity. We begin by synthesizing prior works on wikis' design principles; identifying several areas where we anticipate high tension between wikis' affordances and organizational work practices.

  • Behavioral operations: The state of the field

    Journal of Operations Management

    The field of behavioral operations has matured into an established area within the discipline of operations management. The field fills an essential void by laying the micro-foundations for the broader discipline of operations management. As such, the field examines a variety of topics and is methodologically diverse.

  • Information Quality in Wikipedia: The Effects of Group Composition and Task Conflict

    Journal of Management Information Systems

    O Arazy, O Nov, R Patterson, L Yeo Journal of Management Information Systems 27 (4), 71-98

  • Security and Privacy in Outsourcing with Customer-Specified Risk Tolerance

    eJeta.org Special Issue. Emerging Security Paradigms in the Knowledge Era

    Outsourcing coupled with technology that enables data to reside anywhere has opened up new challenges to the protection of personal privacy. Privacy laws differ internationally as does the value different cultures place on personal privacy. Such differences have implications for government as well as businesses. The corporation must be aware of the security efforts of all its partners and consumers must be aware of the security of all service providers in the extended value chain, not just the business they are interacting with directly. In this paper we propose a method for controlling risks associated with spreading personal information across an extended value chain. In addition, this method accommodates customer-specified levels of risk tolerance. For businesses, the goal is to minimize the cost of securing data spread across vendors and international boundaries.

  • Personal Firewalls for Administrators and Remote Users

    Prentice Hall

  • What makes corporate wikis work? wiki affordances and their suitability for corporate knowledge work

    Design Science Research in Information Systems. Advances in Theory and Practice

    Wikis were originally intended for knowledge work in the open Internet environment, and there seems to be an inherent tension between wikis' affordances and the nature knowledge work in organizations. The objective of this paper is to investigate how tailoring wikis to corporate settings would impact users' wiki activity. We begin by synthesizing prior works on wikis' design principles; identifying several areas where we anticipate high tension between wikis' affordances and organizational work practices.

IS 251

3.3(4)