
This is software (AWS) generated transcription and it is not perfect.
I will elaborate on this a little more with some of the later questions but I teach at IT risk management and that's part of our MBA program. We also have a masters information technology program which has science in there and there's cybersecurity concentration program, we also have projects related to data analytics so we have a traditional MBA and also the managers ofIT program. I will tell you that our students do well in the job market. There's a lot of banks looking with Wilmington, Delaware, area. A lot of companies just on our way to Delaware because of tax laws but we do have a lot of our students work for JP Morgan, Bank of America, companies such as those. That's a little bit about our programs and also where our students end upworking.
We put an emphasis on trying to differentiate are program from some of the nearby programs. It's a pretty competitive area around here in the Philadelphia region. Many schools, their graduate and undergraduate programs so one of our distinguishing factors are experiential focus and the ability to work closely with firms, we have a great relationship with firms and some of the firms in the Wilmington area. They're heavily involved in our program's way. We have experiential programs where students are feeders to companies like JP morgan chase and other credit card companies and they work on things such as trying to detect fraud, working on various databases that are useful to the company. So I would encourage students to really read up about our programs and see that the experiential factor is something really interesting. I would say it's more of a hands-on the program as opposed to some of the other ones in our region in terms of any misconceptions about potentially discouraging students from applying. I particular I can tell you that our business school overall and then also within our programs, we have a huge emphasis on really encouraging females and more female representation in information technology programs. We want to program the woman's leadership forum where we have monthly gatherings where executives from the campus share their experiences and some of the challenges they face and I think the feedback we've gotten from some of the students, not just female students, It's very encouraging. Collaborative environment or students who may be typical would not have thought about perhaps a career in information technology.
I would say my general area now is called Cyber Security, back when I started, it was referred to as information security. Cybersecurity is now determined and that's kind of a blanket area but pretty much everything I've done and I finished my Ph.D. in 2005 so in my 12-13 year career I've been working in that research space for the most part. A huge emphasis of my research is being on the human side of cybersecurity trying to understand some of the individual and effectual factors in the workplace that lead to misuse of information systems, employee's misuse of the information in the workplace. So from the major projects I've worked on have been organizational deterrence due to information technology policy violations, when I say deterrence, it means countermeasures but more of security policies or technical countermeasures such as access controls and what intentions did they have been possibly carrying inappropriate use of information technology. Well, if you're trying to understand how we can better when it comes to information systems in a way that is pro security. More recently some of my work in cybersecurity I have been looking at some of the organizational level factors that decked and contribute to data pursuit information on data breaches are readily available whereas it wasn't in the beginning.