Profiles

Photo
David Biros Associate Professor Management Science and Information Systems 406 Business Building Stillwater Campus 405-744-7156 (Phone) 405-744-5180 (Fax)

PhD from Florida State University. Retired Air Force Lt Col with a background in information technology and security. Published in MIS Quarterly, Decision Support Systems and many other journals and conference proceedings. Actively involved in student recruitment efforts.

Education

Ph D, Florida State UniversityInformation and Management Sciences1998
MS, Air Force Institute of TechnologyInformation Resource Management1992
MA, The Troy State UniversityPublic Administration1990
BA, Flagler CollegeHistory and Secondary Education1985

Publications

Nan Peter Liang, David Biros & Andy Luse. "An Empirical Validation of Malicious Insider Characteristics”, Journal of Management Information Systems". Journal of Management Information Systems, (Forthcoming).

Nan Liang, David P Biros & Andy Luse. (2016). "Malicious Insiders: Who Might be the Ephialtes in Your Organization". Journal for the Colloquium of Information System Security Education. 4 (1), 16.

David Sikolia & David P Biros. "Motivating Employees to Comply with Information Security Policies". Journal of the the Midwest AIS. (Forthcoming).

David Biros & N. Liang. "Identifying Common Characteristics of Malicious Insiders". Proceedings of the Conference on Digital Forensics, Security and Law. (Forthcoming).

C.M. Fuller, D.P. Twitchell, David Biros & Rick Wilson. (2015). "Real-World Deception and the Impact of Severity". Journal of Computer Information Systems (JCIS). 55 (2), 59-67.

J.Y. Thomas & David Biros. "Theoretical Validation of IDT in Real-World, High-Stakes Deceptive Speech". 48th Hawaii International Conference on System Science (HICSS) Symposium on Rapid Screening Technologies, Deception Detection, and Credibility Assessment. (Forthcoming).

David Sikolia, Marlys Mason, David Biros & Mark Weiser. (2014). "A Theory of Employee Compliance with Information Security". Ames, IA: Midwest Association for Information Systems Conference Proceedings.

David Sikolia, David Biros, Mark Weiser & Marlys Mason. (2013). "Trustworthiness of Grounded Theory Methodology Research in Information Systems". Proceedings of the Midwest Association for Information Systems.

Ramesh Sharda & David Biros. (2013). "Taking Research to Practice in Technology: Development of an Ammunition Multimedia Encyclopedia". Decision Line. 44 (1)

Christie Fuller, David Biros, Judee Burgoon & Jay F. Nunamaker. (2013). "An Examination and Validation of Linguistic Constructs for Studying High-Stakes Deception". Group Decision and Negotiation.

Jason R. Nichols, David Biros, Ramesh Sharda & Upton Shimp. (2012). "The Emergence of Organizational Process Liability as a Future Direction for Research on Technology Acceptance". International Journal of Social and Organizational Dynamics in Information Technology . 2 (4) http://dx.doi.org/10.4018/ijsodit.2012100101.

Jason R. Nichols, David Biros & Mark Weiser. (2012). "Towards Alignment Between Communities of Practice and Knowledge-Based Decision Support". Journal of Digital Forensics, Security and Law. 7 (2)

David Sikolia, David Biros & Mark Weiser. (2011). "A Financial Case for RFID in Grain Transport and Storage". 42nd Annual Meeting of the Decision Sciences Institute.

Supavich Pengnate, Ramesh Sharda, David Biros, Michael Hass & U. Shimp. (2011). "Mobile AME: A Handheld Application to Support Decision Making for Ammunition Personnel". Annals of Information Systems. 13 (2011), 319-336.

Christie M. Fuller, David Biros & Dursun Delen. (2011). "An Investigation of Data and Text Mining Methods for Real World Deception Detection". Expert Systems with Applications. 38 (7), 8392-8398.

Christie Fuller, Dursun Delen & David Biros. (2011). "Data and Text Mining methods applied to the task of Detecting Deception in Real World Crime Investigation Records". Expert Systems with Applications.

David Biros & J Thomas. (2011). "A Conceptual Model of Real World, High Stakes Deception Detection". Proceedings of the 44nd Hawaii International Conference on System Science.

J Lucca, Ramesh Sharda, J Ruffner, U Shimp, David Biros & A Clower. (2011). "Ammunition Multimedia Encyclopedia (AME): A Case Study". Proceedings of the 44nd Hawaii International Conference on System Science.

Michael Hass, David Biros & j Thomas. (2011). "Employing Deception Detection Methods in Trustworthiness Assessment Research". Proceedings of the 44nd Hawaii International Conference on System Science.

David Sikolia, David Biros & Mark Weiser. (2010). "A Business Case for RFID in Grain Storage". 41st Annual Meeting of the Decision Sciences Institute.

David Sikolia, David Biros, Mark Weiser & Nicholas Romano. (2010). "Trust in Mobile Banking: The Effect of Culture". Atlanta, Georgia: Proceedings of the 5th Midwest Association for Information Systems (MWAIS). , see: http://aisel.aisnet.org/mwais2010/4.

Christie Fuller, David Biros & Rick Wilson. (2009). "Decision Support for Determining Veracity via Linguistic Based Cues". Decision Support Systems, 46, 695-703.

Subramanian Iyer, Ramesh Sharda, David Biros, J. Lucca & U. Shimp. (2009). "Organization of Lessons Learned Knowledge: A Taxonomy of Implementation". International Journal of Knowledge Management. 5 (3), 1-20. http://dx.doi.org/10.4018/978-1-60960-555-1.ch013.

Michael Hass, Jason R. Nichols, David Biros, Mark Weiser, James R. Burkman & J. Thomas. (2009). "Motivating Knowledge Sharing in Diverse Organizational Contexts: An Argument for Reopening the Intrinsic vs. Extrinsic Debate". Proceeding of the 15th Americas Conference on Information Systems.

Supavich Pengnate, Ramesh Sharda, David Biros & Michael Hass. (2009). "Mobile AME: A handheld application to support decision making for ammunition personnel". San Francisco, CA: of the 16th Americas Conference on Information Systems.

David Biros. (2009). "A Case-Based Exploration of Task/Technology Fit in an Applied Knowledge Management Context". Knowledge Management and E-Learning.

Christie Fuller, D. Twitchell & David Biros. (2009). "Deception and the Impact of Complexity on a Group Decision Making Task". Proceedings of the 42nd Hawaii International Conference on System Science.

J.F. George, David Biros, J.K. Burgoon, J.F. Nunamaker & J.M. Crews. (2008). "The Role of E-Training in Protecting Information Assets Against Deception Attacks". MISQ Executive. 7 (2) 1540-1960 .

J. George, David Biros, J. Burgoon, J. Nunamaker, J. Cao, M. Lin, K. Marett & J. Crews. (2008). "Defeating Deception Through E-Training". MIS Quarterly Executive. 7 (2)

David Biros, David Sikolia & Michael Hass. (2008). "The Perceived Dichotomy Between Current Green IT Initiatives and Information Security". Cutter IT Journal. 21 (2)

Christie Fuller, David Biros & Dursun Delen. (2008). "Exploration of Feature Selection and Advanced Classification Models for High-Stakes Deception Detection". Proceedings of the 41st Annual Hawaii International Conference on System Sciences.

Mark Weiser & David Biros. (2007). "Managing Digital Forensic Knowledge: An Applied Approach". Proceedings of the 5th Australian Digital Forensics Conference.

J.K. Burgoon, J.F. Nunamaker, J.F. George, M. Adkins, J. Kruse & David Biros. (2007). "“Detecting Deception in the Military Infosphere: Improving and Integrating Detection Capabilities with Automated Tools”. In C. Wang et al., (Eds.), Information Security Research: New Methods for Protecting Against Cyber Threats ". Indianapolis, IN: Wiley: C. Wang et al., (Eds.), Information Security Research: New Methods for Protecting Against Cyber Threats . , 606-627.

S. Barnes, David Biros, Mark Weiser & Nicholas Romano. (2007). "Integrating Information Security in Systems Analysis and Design Classrooms". Information Security Curriculum Development Conference.

S.D. Barnes & David Biros. (2007). "An Exploratory Study of Computer Mediated Communications on Cyber Stalking Severity". Journal of Digital Forensics, Security, and Law. 2 (3), 7-27. 1558-7215.

Christie Fuller, David Biros & M.J. Imperial. (2007). "Knowledge Retention in Information Assurance Computer Based Training: A Comparative Study of Two Courses for Network User Training". Proceedings of the Sixth Annual Security Conference.

Christie Fuller, David Biros, M. Adkins, J.K. Burgoon, J.F. Nunamaker & S. Coulan. (2006). ""Detecting Deception in Person-of-Interest Statements,” in Mehrotra et al. (eds.), IEEE Intelligence and Security Informatics, LCNS 3975". Berlin: Springer-Verlag. , 504-509.

Mark Weiser, David Biros & G Mosier. (2006). "Development of a National Repository of Digital Forensic Intelligence". Journal of Digital Forensics, Security and Law. (1 (2)), 5-17.

Christie Fuller, David Biros, D.P. Twitchell, J.K. Burgoon & M. Adkins. (2006). "An Analysis of Text-Based Deception Detection Tools". Proceedings of the Twelfth Americas Conference on Information Systems.

Mark Weiser, David Biros & G. Mosier. (2006). "Building a National Forensics Case Repository for Forensic Intelligence". Journal of Digital Forensics, Security, and Law. 1 (2)

David Biros, D.P. Twitchell, N. Forsgren, J.K. Burgoon & J.F. Nunamaker. (2006). "Automated Determination of the Veracity of Interview Statements from People of Interest to an Operational Security Force". Proceedings of the 39th Hawaii International Conference on System Science.

David Biros, K. Marett & B.T. Langhels. (2006). "Vigilance and Error Detection in an Automated Command and Control Environment". Kona, HI: Proceedings of the 39th Hawaii International Conference on System Science.

David Biros, D.P. Twitchell, N. Forsgren, J.K. Burgoon & J.F. Nunamaker. (2005). "Assessing the Veracity of Criminal and Detainee Statements: A Real-World Study". Washington, D.C.: Proceedings of the Mitre Conference on Intelligent Systems.

David Biros, J.F. George & R.W. Zmud. (2005). "Inside the Fence: Sensitizing Employees to Deception in Information Technology". MIS Quarterly Executive. 4 (1)

David Biros, J. Sakamoto, M. Adkins, J. Kruse, J. Burgoon & J.F. Nunamaker. (2005). "A Quasi-Experiment to Determine the Impact of a Computer Based Deception Detection Training System: The Use of Agent99 Trainer in the U.S. Military". Kona, HI: Proceedings of the 38th Hawaii International Conference on System Sciences.

David Biros, Michael Hass, J.F. George, K. Weirs, D. Twitchell, M Adkins, J.K. Burgoon & J.F. Nunamaker. (2005). "Task Performance Under Deceptive Conditions: Using Military Scenarios in Deception Detection Research". Proceedings of the 38th Hawaii International Conference on System Science.

K. Marett, David Biros & M.L. Knode. (2004). "“Self-Efficacy, Training Effectiveness, and Deception Detection: A Longitudinal Study of Lie Detection Training.” In Chen, H. et al. (eds), IEEE Intelligence and Security Informatics". Berlin: Springer-Verlag. , 187-200.

J.F. George, David Biros, M. Adkins, J.K. Burgoon & J.F. Nunamaker. (2004). "“Testing Various Modes of Computer-Based Training for Deception Detection.” In Chen, H. et al. (eds), IEEE Intelligence and Security Informatics". Berlin: Springer-Verlag. , 411-417.

David Biros, M. Daly & G. Gunsch. (2004). "Task Load and Automation Use in an Uncertain Environment". Group Decision and Negotiations. 13 (2)

J.F. George, David Biros, J.K. Burgoon & J.F. Nunamaker. (2003). "“Training Professionals to Detect Deception.” In Chen, H. et al. (eds), IEEE Intelligence and Security Informatics". Berlin: Springer-Verlag. , 366-370.

David Biros, J. George & R.W. Zmud. (2002). "Inducing Sensitivity to Deception". MIS Quarterly, 26 (2), 119-144. 0276-7783.

Awards and Honors

Richard W. Poole Research Excellence Award (2009)
MSIS Faculty Award (2007)
2001 Outstanding Senior Military Officer (2001)
Air Force Inspector General “Outstanding Performer (2000)
Instructor of the Year, 335th Training Squadron (1993)

Editorial and Review Activities

Electronic Markets
Invited Manuscript Reviewer

Group Decision and Negotiation
Invited Manuscript Reviewer

NSA Reviewer for Center of Academic Excellence in Information Assurance
Invited Manuscript Reviewer

Journal of Digital Forensics Security and Law
Editor or Co-Editor
2013

JAIS
Invited Manuscript Reviewer
2012

Institutional and Economic Foundations of Cyber Crimes
Invited Manuscript Reviewer
2008

Conference on Computer Forensics, Security, and Law
Associate Editor
2006

Journal of Digital Forensics, Security, and Law
Associate Editor
2006

MIS Quarterly
Invited Manuscript Reviewer
2005

Journal of Digital Forensics Security and Law
Associate Editor
2007 - 2012

Midwest AIS Conference
Invited Manuscript Reviewer

Midwest AIS Conference Proceedings

Hawaii International Conference on System Sciences
Invited Manuscript Reviewer
2003 - 2005

Academic, Military, and Professional Positions

Oklahoma State University, Associate Professor of Management Science and Information Systems, July 1 2010
Edith Cowen University, Australia, Adjunct Professor, October 2007
Oklahoma State University, Assistant Professor of Management Science and Information Systems, August 15 2005 - June 30 2010
Air Force Institute of Technology, Adjunct Professor, June 2002 - August 2005
US Air Force, Pentagon, Chief Information Assurance Officer, AF-CIO, June 2002 - August 2005
Air Force Institute of Technology, Assistant Professor of Information Resource Management, August 1998 - June 2002
University of Dayton, Adjunct Professor, March 1999 - December 2001
Central Michigan University, Adjunct Professor, May 1999 - November 2001
335th Training Squadron, 81st Training Wing, Chief, Information Management Courses, January 1993 - July 1995