I test behavioral theory on information security and privacy. My work also applies a variety of methods to identify, analyze, and communicate fundamental security weaknesses found in an organization’s security policies, data workflows, and technologies in order to make improvement recommendations.
More...Theatrical playwriting and performance are used in my IS and cybersecurity courses to aid students in collaborative knowledge construction and insight into human-computer topics. My research explores how plays enhance student engagement and learning.
More...What distinguishes cybersecurity work from other IT work? One research project examines the job functions and contextual nature of various cybersecurity work roles. I also study job stressors in incident response work and their effects on the workforce. The study objective is to improve worker and skill retention in this role.
More...Selected Publications |
---|
Spears, J. (2023) “Job Stress in the Cybersecurity Incidence Response Work Role,” Workshop on Security (and Privacy) Information Workers (WSIW) at USENIX SOUPS |
Spears, J., Padyab, A. (2021) "Privacy Risk in Contact Tracing Systems," Behaviour & Information Technology, DOI: 10.1080/0144929X.2021.1901990 |
Spears, J., (2018) "Gaining Real-World Experience in Information Security: A Roadmap for a Service Learning Course," Journal of Information Systems Education, vol. 29(4), pp. 183-202, Best Paper Finalist Award |
Mead, N., Shull, F., Spears, J., Hiebl, S., Weber, S., Cleland-Huang, J. (2017) “Crowd Sourcing the Creation of Persona-Non-Gratae for Requirements-Phase Threat Modeling," 25th IEEE International Conference on Requirements Engineering |
Spears, J., San Nicolas-Rocca, T., (2015) “Knowledge Transfer in Information Security Capacity Building for Community-Based Organizations,” International Journal of Knowledge Management |
Spears, J., Barki, H., Barton, R., (2013) “Theorizing the Concept and Role of Assurance in Information Systems Security,” Information & Management |
Spears, J., Barki, H., (2010) “User Participation in IS Security,” MIS Quarterly |
The iSPA (information security and privacy assessment) project develops an interview question bank as a self-assessment tool aimed at community-based nonprofit organizations and small businesses who do not have IT security staff. Moreover, the iSPA interview question bank is purposely written in a language that is minimally-technical so that non-technical staff-persons who have responsibility for managing data-related risk can administer and participate in an internal security risk self-assessment. iSPA contains questions across fundamental security domains (e.g., access control; etc.) and is based on security industry standards and the aggregated, cross-organizational results of students’ risk assessments as part of a cybersecurity course or clinic project.
Call for Participants: Organizational participants are needed to examine iSPA effectiveness as a risk assessment tool by applying the iSPA question bank as part of an internal self-assessment of the organization’s information security. We then need participants to share with the research team feedback on question comprehension and overall tool effectiveness. Organizational projects would be administered as part of DePaul’s cybersecurity clinic. If you’re interested in learning more or participating, please contact me.
In one study, I conduct 1-hour interviews with cybersecurity professionals to learn more about the type of work they do and careers in cybersecurity in general. Research participants have largely included individuals working in incidence response and senior management. Additional participants are needed across cybersecurity work roles, including ethical hackers. If this study interests you, please contact me.
In a separate multi-method study, I examine the job stressors inherent in cybersecurity incident response work and how their impact on the workforce. Interviews, followed by a survey instrument are used to collect data and analyze behavioral theory. The study is motivated by the need to retain highly skilled cybersecurity technologists in the workforce, given experts persistent concerns about a shortage of highly skilled workers. The study’s end goal is to contribute to worker and skill retention within organizations.
Call for Participants: Anonymous survey responses are needed from a large community of cybersecurity workers. If you know of a cybersecurity community who may be interested in this study and is willing to disseminate the survey among its members, please contact me.
Call for Participants: Are you interested in hosting an interactive workshop within your organization that incorporates playwriting and/or acting exercises to enhance greater comprehension of social, ethical, and legal issues in computing or business? If so, please contact me.