Ann L Fruhling

Ann L. Fruhling is an Associate Professor at the Peter Kiewit Institute, College of Information Science and Technology, the University of Nebraska–Omaha (UNO). She teaches core courses for the Management Information Systems graduate program. In 2007, she received the UNO Alumni Outstanding Teaching Award. Dr. Fruhling is a member of the Association for Information Systems (AIS) and serves on the Executive Board of the AIS IT in Healthcare Special Interest Group. In addition, she is a research scholar for Northrop Grumman on the C2SES project located at the U.S. Strategic Command.

Jane Fedorowicz

Jane Fedorowicz, Chester B. Slade Professor of Accounting and Information systems, holds a joint appointment in the Accountancy and Information & Process Management departments at Bentley University, where she teaches courses on enterprise system configuration, business processes, and internal controls. She is principal investigator of a National Science Foundation project team studying design issues for police and government agency collaboration using public safety networks.

David Closs

David J. Closs is the John H. McConnell Chaired Professor of Business Administration in the Department of Marketing and Supply Chain Management at Michigan State University. He has been extensively involved in the development and application of computer models and information systems for supply chain operations and planning. Dr.

Paul Wormeli

Paul Wormeli is Executive Director Emeritus of the Integrated Justice Information Systems Institute, a non-profit corporation formed to help state and local governments develop ways to share information among the disciplines engaged in homeland security, justice, and public safety. He has had a long career in the field of law enforcement and justice technology.

Paul Wormeli

Paul Wormeli is Executive Director Emeritus of the Integrated Justice Information Systems Institute, a non-profit corporation formed to help state and local governments develop ways to share information among the disciplines engaged in homeland security, justice, and public safety. He has had a long career in the field of law enforcement and justice technology.

Timothy J Burns, PhD

Timothy J. Burns is an Assistant Professor of Information Systems in the Anisfield School of Business at Ramapo College of New Jersey, where he teaches courses in the principles of information systems and in systems analysis and design. Dr. Burns has more than 25 years of experience working as a practitioner in the information systems field, primarily as a consultant to organizations in a multitude of industries, including several Fortune 100 companies.

Randy V. Bradley

Randy V. Bradley is an assistant professor of Information Systems and Supply Chain Management in the Department of Marketing and Supply Chain Management at The University of Tennessee, Knoxville. He holds a PhD in Management of Information Technology and Innovation from Auburn University.

France Belanger

Dr. France Bélanger is Director of the Center for Global Electronic Commerce and Assistant Professor of Information Systems in the Department of Accounting and Information Systems at Virginia Tech. Prior to her academic career, Dr. Bélanger held various technical, marketing, and managerial positions in large information systems and telecommunicationscorporations. She is also a consultant in electronic business and distance learning.

Creating a Balanced Portfolio of Information Technology Metrics

Information technology has made possible the availability of real-time data and the tools to display that data, such as dashboards, scorecards, and heat maps. This has boosted the use of data and evidence by government decision makers in meeting their agency and program missions. But what about the use of performance metrics by agency chief information officers themselves?

A Best Practices Guide to Information Security

Organizations take great pains to use technology to defend against outside attacks; they work hard to spot and stop the malicious insider who is willfully trying to do ill to systems. However, most organizations fall short in equipping their workers with best practices to make them part of the solution to information security.