Research

My primary research interests focus upon information systems security, privacy, and cloud computing. I am also interested in social networking, database, and small business.

Revised 10/20/2023

Journal Articles

  • Foltz, C. B., Foltz, L. G. (2021). MUIPC and Intent to Change IoT Privacy Settings. Journal of Computing Sciences in Colleges, 36(7), 27-38.
  • Foltz, C. B., Foltz, L. (2020). Mobile users’ information privacy concerns instrument and IoT. Information and Computer Security, 28(3), 359-371.
  • Foltz, C. B., Newkirk, H., Schwager, P. (2016). An Empirical Investigation of Factors that Influence Individual Behavior Toward Changing Social Networking Security Settings. Journal of Theoretical and Applied Electronic Commerce Research, 11(2), 1-15. http://jtaer.com/statistics/download/download.php?co_id=JTA20160201
  • Foltz, L., Foltz, C. B., Kirschman, S. (2015). Planning for Science, Technology, Engineering, and Math (STEM) Retention: Understanding the Implications of the Theory of Planned Behavior. Planning for Higher Education Journal. https://www.scup.org/page/phe/read/article?data_id=31616&view=article
  • Foltz, C. B., Renwick, J. S. (2011). Information Systems Security and Computer Crime in the IS Curriculum: A detailed Examination.”. Journal of Education for Business, 86(2), 119-125.
  • Foltz, C. B., Schwager, P. H., Anderson, J. E. (2008). Why Users (Fail To) Read Computer Usage Policies. Industrial Management & Data Systems, 108(6), 701-712.
  • Cronan, T. P., Foltz, C. B., Jones, T. W. (2006). Information Systems Misuse and Computer Crime: An Analysis of Demographic Factors and Awareness of University Computer Usage Policies. Communications of the ACM, 49(6), 84-90.
  • Bradley, J., Foltz, C. B., White, B. J., Wise, H. (2006). The Impact of Goal Congruence on Project Team Performance. International Journal of Applied Management & Technology, 4(2), 219-228.
  • Foltz, C. B., Cronan, T. P., Jones, T. W. (2005). Have You Met Your Organization’s Computer Usage Policy? Industrial Management & Data Systems, 105(2), 137-146.
  • Kros, J. F., Foltz, C. B., Metcalf, C. L. (2004). Assessing & Quantifying the Loss of Network Intrusion. Journal of Computer Information Systems, XLV(2), 36-43.
  • Foltz, C. B. (2004). Cyberterrorism, Computer Crime, and Reality. Information Management and Computer Security, 12(2), 154-166.
  • Foltz, C. B., O’Hara, M., Wise, H. (2004). Standardizing the MIS Course: Benefits and Pitfalls. Campus-Wide Information Systems, 21(4), 163-169.
  • Foltz, C. B., Hauser, R. (2004). The MIS Academic Area: The State of the Profession. Academy of Information and Management Sciences Journal, 7(1), 37-46.
  • DelVecchio, S., Meric, H., Foltz, C. B., Pelletier, J.-R. (2002). Exploring Consumers’ Perceptions of Online Credit Card Theft. Journal of Internet Commerce, 1(2), 17-36.
  • Remington, W. S., Swanson, Z., Foltz, C. B., Moores, T. (2000). Electronic Commerce Viability by Industry Group. The Mountain Plains Journal of Business and Economics.

Reprint

  • Cronan, P., Foltz, C. B., Jones, T. (2008). Piracy, Computer Crime, and IS Misuse at the University. In P. De Palma (Ed.), Computers in Society 08/09 Computers in Society.

Conference Proceedings

  • Foltz, C. B., Foltz, L. D. (2019). Privacy, Awareness, and the Internet of Things. Decision Sciences Institute, New Orleans, LA , pp. 432-445.
  • Foltz, L., Foltz, C. B., Kirschmann, S. (2018). In Search Of An Actionable Student Retention Theory: The Theory of Planned Behavior. Proceedings of the 14th Annual National Symposium on Student Retention, Consortium for Student Retention Data Exchange, pp. 217-229.
  • Foltz, C. B., Foltz, L. G. (2018). Bring Your Own Device, Computer Usage Policies, and User Privacy Fall Conference Proceedings. Mid-Southeast Chapter of the ACM, Gatlinburg, TN, pp. 52.
  • Foltz, C. B., Foltz, B. (2015). Active and Problem Based Learning and College Student Persistence. Decision Sciences Institute.
  • Foltz, C. B., Foltz, L. (2015). The Impact of Training Upon Information Systems Security Awareness: An Empirical Investigation. Decision Sciences Institute.
  • Foltz, C. B. (2014). Network Administration with the Raspberry Pi- Nifty Assignment. Computing Sciences in Colleges: Mid-South Conference. Memphis TN.
  • Foltz, C. B., Foltz, L., Kirschman, S. (2012). Utilizing the Theory of Planned Behavior to Examine Computer Science Students Who Persist or Dropout in Their First Introductory Course. Decision Sciences Institute.
  • Renwick, J. S., Foltz, C. B. (2011). Student Learning in Computer Programming Concepts: Learning Styles and Computer Self- Efficacy. Decision Sciences Institute.
  • Renwick, J. S., Foltz, C. B. (2011). Learning Styles of Information Technology Students. National Proceedings of the Special Interest Group for IT Education (SIGITE).
  • Foltz, C. B., Renwick, J. S. (2009). Information Systems Misuse and Computer Security in the Small Business. Decision Sciences Institute.
  • Foltz, C. B., Riemenscheider, C., Foltz, C. B. (2009). Recruiting and Retaining Women in Computing Professions. Consortium for Computing Sciences in Colleges.
  • Schwager, P. H., Foltz, C. B. (2009). Social Network Privacy: Expectations vs Reality. Southern Association of Information Systems.
  • Renwick, J., Foltz, C. B. (2008). Assessment: A Comparison of Three Approaches Decision Sciences Institute, pp. 261-2616.
  • Foltz, C. B., Anderson, J. E., Schwager, P. H. (2007). Factors Influencing Awareness of Computer Usage Policies. Federation of Business Disciplines / Southwest Decision Sciences Institute, San Diego, CA, pp. 243-252.
  • Foltz, C. B., Renwick, J. (2007). Information Systems Security and Computer Crime in the IS Curriculum: A Detailed Examination. Decision Sciences Institute, Phoenix, AZ, pp. 2011-2016.
  • Kros, J. F., Foltz, C. B., Metcalf, C. L. (2005). Assessing & Quantifying the Loss of Network Intrusion Employing a Simulation Model. Southeast Decision Sciences Institute, Raleigh, NC.
  • O’Hara, M. T., Capen, M.M., and Foltz, C. B. (2005). Distance Education and Entrepreneurial Attitudes: A Parametric versus Non-Parametric Analysis of Results. Southeast Decision Sciences Institute, Raleigh, NC.
  • Foltz, C. B. and Hauser, R. (2005). Factors Affecting Knowledge of Computer Usage Policies in an Academic Setting. Decision Sciences Institute, San Francisco, CA, pp. 13811-13815.
  • Foltz, C. B. and Hauser, R. (2004). Faculty Awareness of Computer Security Regulations. Decision Sciences Institute, Boston, MA, pp. 4501-4506.
  • Foltz, C. B. and Hauser, R. (2004). The MIS Academic Area: The State of the Profession. Allied Academies International Conference, New Orleans, LA, April 9, pp. 19-24.
  • Foltz, C. B. and Hauser, R. (2004). Distance Education: A Survey of the Perceptions of IS Faculty. Southeast Decision Sciences Institute, Charleston, SC, pp. 295-297.
  • Foltz, C. B. and O’Hara, M. (2004). The Visual Computer: Exploring The Internal Workings of a PC in Three Dimensions. Allied Academies International Conference, New Orleans, LA, April 9, pp. 25-30.
  • Foltz, C. B., Cronan, T.P, Jones, T. (2004). Student Awareness of University Computer Usage Policies: Is a Single Exposure Enough? Federation of Business Disciplines, Southwest Decision Sciences Institute, Orlando, FL, pp. 293-299.
  • Bradley, J., White, B.J., Foltz, C. B., Wise, H., and Mennecke, B. (2003). The Impact of Goal Congruence on Management Information Systems Development Team Performance. Southeast Decision Sciences Institute, Williamsburg, VA, pp. 201-203.
  • Foltz, C. B., Cronan, T. P., and Jones, T. W. (2002). Human Behavior as a Factor in the Control of Information Systems Misuse and Computer Crime. Decision Sciences Institute, San Diego, CA., pp. 1246-1251.
  • Foltz, C. B. and Hauser, R. (2002). The MIS Academic’s Lot: The Effects of Faculty Shortages on the Profession. Decision Sciences Institute, San Diego, CA., pp. 1327-1332.
  • Foltz, C. B., Cronan, T.P., and Jones, T.W. (2001). Information Systems Misuse and Computer Crime: An Analysis of Demographic Factors and Awareness of University Computer Usage Policies. Decision Sciences Institute, San Francisco, CA., pp. 349-351.
  • Bradley, J., Foltz, C.B., and Mennecke, B. (2001). Using GIS in a Natural Disaster. American Society of Business and Behavioral Sciences Proceeding, Las Vegas, NV, February 21-26, pp. 83-85.
  • Smith, D., Wittman, W., and Foltz, C.B. (2000). Metacognitive Miscalibration and Underachievement in a Computer Literacy Course: Some Preliminary Observations. International Academy for Information Management, December 8-10, Brisbane, Australia, pp. 1-6.
  • Smith, D. and Foltz, C.B. (2000). Metacognitive Miscalibration and Underachievement. Allied Academies National Conference Proceedings, Myrtle Beach, South Carolina, pp. 69-73.
  • Remington, W.S., Moores, T., Swanson, Z., and Foltz, C.B. (1999). Electronic Commerce and the Challenge for IS Planning: Who Will be the EC-Winners?. Americas Conference on Information Systems Proceedings, Milwaukee, WI., pp. 127-129.
  • Foltz, C.B. (1999). A Behavioral Framework for the Study of Information Systems Misuse and Computer Crime. Southwestern Decision Sciences Institute, Houston, TX, pp. 28-30.
  • Heilman, G., Foltz, C.B, and Hardgrave, W. (1996). Object-Oriented Methodologies: A Comparison Based Upon Objective Characteristics. Decision Sciences Institute, Orlando, FL, pp. 820-822.
  • Heilman, G. and Foltz, C.B. (1995). Information Systems Security: An Extended Framework. Decision Sciences Institute,Boston, MA, pp. 664-666.
  • Foltz, C.B. (1995). Awareness and Implementation of Security Measures in Small Businesses: An Empirical Study. Southwestern Decision Sciences Institute, Houston, TX, pp. 19-21.
  • Foltz, C.B. and Heilman, G. (1994). An Evaluation of Small Business Software Acquisition Procedures: A Life Cycle Approach. Decision Sciences Institute, Honolulu, HI, pp. 994-996. McHaney, R., White, D. and Foltz, C.B. (1993). Simulation Case Study: Development of an Educational Method. Decision Sciences Institute, Washington, DC, pp. 346-348.

Presentations

  • Moquin, R., Flowerday, S., Foltz, C. B., and Jones, R., (2023). Exploring Rationality-Based Cybersecurity Decisions: Is The Benefit Worth The Risk?, International Association for Computer Information Systems, Sheraton Sand Key Resort, Clearwater Beach, Florida,  Clearwater Beach, FL, United States.
  • Foltz, C. B., and Foltz, L. (2023). Privacy and the Intention to Read Computer Usage Policies, International Association for Computer Information Systems, Sheraton Sand Key Resort, Clearwater Beach, Florida, Clearwater Beach, FL, United States.
  • Foltz, C. B., Foltz, L. (2022). Examining Intentions to Use Online Tools Post-Pandemic With UTAUT for m-Learning Model, Mid-Southeast Chapter of the ACM, Glenstone Lodge, Gatlinburg, TN.
  • Foltz, C. B., Foltz, L. (2021). Online Education Continuance Following the Pandemic: An Empirical Evaluation, Decision Sciences Institute 52nd Annual Conference, virtual.
  • Foltz, C. B., Foltz, L. (2021). MUIPC and Intent to Change IoT Privacy Settings, Consortium for Computing Sciences in Colleges: South Central Conference, virtual.
  • Foltz, C. B., Foltz, L. (2020). Toward a Better Understanding of Emergency Remote Instruction, Decision Sciences Institute.
  • Foltz, C. B., Foltz, L. (2019). Privacy, Awareness, and the Internet of Things, Decision Sciences Institute, New Orleans, LA, United States.
  • Foltz, C. B., Foltz, L. G. (2018). Bring Your Own Device, Computer Usage Policies, and User Privacy, Mid-Southeast Chapter of the ACM, Gatlinburg, TN, United States.
  • Foltz, C. B. (2017). Intention to Secure Internet of Things Devices, Mid-Southeast Chapter of the ACM, Gatlinburg, TN, United States.
  • Foltz, C. B., Foltz, L. (2016). Awareness and Compliance with University Acceptable Use Policies, Revisited, Decision Sciences Institute, Austin TX.
  • Foltz, C. B. (2015). Active and Problem Based Learning and College Student Persistence, Decision Sciences Institute.
  • Foltz, C. B., Foltz, L., (2015). The Impact of Training Upon Information Systems Security Awareness: An Empirical Investigation, Decision Sciences Institute.
  • Foltz, C. B. (2014). Exploring the Use of Security on Mobile devices under BYOB, Decision Sciences Institute, Tampa, FL.
  • Foltz, C. B. (2014). Network Administration with the Raspberry Pi- Nifty Assignment, Computing Sciences in Colleges: Mid- South Conference, , Memphis, TN.
  • Foltz, C. B., Foltz, L., Kirschman, S. L. (2012). Utilizing the Theory of Planned Behavior to Examine Computer Science Students Who Persist or Dropout in their first introductory Course, Decision Sciences Institute, San Francisco, CA.
  • Renwick, J. S., Foltz, C. B. (2011). Student Learning in Computer Programming Concepts: Learning Styles and Computer Self- Efficacy, Boston, MA.
  • Renwick, J. S., Foltz, C. B. (2010). Testing a New Approach to Information Systems Security Education, Decision Sciences Institute, San Diego, CA.
  • Foltz, C. B., Renwick, J. S. (2009). Information Systems Misuse and Computer Security in the Small Business, Decision Sciences Institute, New Orleans, LA.
  • Schwager, P., Foltz, C. B. (2009). Social Network Privacy: Expectations vs Reality, Southern Association of Information Systems. Charleson, SC.
  • Renwick, J., Foltz, C. B. (2008). Assessment: A Comparison of Three Approaches, Decision Sciences Institute, Baltimore MD.
  • Foltz, C.B. and Renwick, J. (2007). Information Systems Security and Computer Crime in the IS Curriculum: A Detailed Examination. Decision Sciences Institute, Phoenix AZ.
  • Foltz, C.B., Anderson, J.E., and Schwager, P.H. (2007). Factors Influencing Awareness of Computer Usage Policies. Federation of Business Disciplines, Southwest Decision Sciences Institute, San Diego.
  • Kros, J.F., Foltz, C.B., and Metcalf, C.L. (2005). Assessing & Quantifying the Loss of Network Intrusion Employing A Simulation Model. Southeast Decision Sciences Institute, Raleigh, NC.
  • Foltz, C.B. and Hauser, R. (2005). Factors Affecting Knowledge of Computer Usage Policies in an Academic Setting. Decision Sciences Institute, San Francisco, CA.
  • Foltz, C.B. and Hauser, R. (2004). Faculty Awareness of Computer Security Regulations. Decision Sciences Institute, Boston, MA.
  • Foltz, C.B. and Hauser, R. (2004). Distance Education: A Survey of the Perceptions of IS Faculty. Southeast Decision Sciences Institute.
  • Foltz, C.B., Cronan, T.P., and Jones, T.W. (2004). Student Awareness of University Computer Usage Policies: Is a Single Exposure Enough? Federation of Business Disciplines, Southwest Decision Sciences Institute, Orlando, FL.
  • Foltz, C.B., Cronan, T.P., and Jones, T.W. (2002). Human Behavior as a Factor in the Control of Information Systems Misuse and Computer Crime. Decision Sciences Institute, San Diego, CA.
  • Foltz, C.B., Cronan, T.P., and Jones, T.W. (2001). Information Systems Misuse and Computer Crime: An Analysis of Demographic Factors and Awareness of University Computer Usage Policies. Decision Sciences Institute, San Francisco, CA.
  • Foltz, C.B. (1999). A Behavioral Framework for the Study of Information Systems Misuse and Computer Crime. Southwestern Decision Sciences Institute, Houston, TX.
  • Heilman, G., Foltz, C.B., and Hardgrave, W. (1996). Object-Oriented Methodologies: A Comparison Based Upon Objective Characteristics. Decision Sciences Institute, Orlando, FL.
  • Heilman, G. and Foltz, C.B. (1995). Information Systems Security: An Extended Framework. Decision Sciences Institute, Boston, MA.
  • Foltz, C.B. (1995). Awareness and Implementation of Security Measures in Small Businesses: An Empirical Study. Southwestern Decision Sciences Institute, Houston, TX.
  • Foltz, C.B. and Heilman, G. (1994). An Evaluation of Small Business Software Acquisition Procedures: A Life Cycle Approach. Decision Sciences Institute, Honolulu, HI.