Kathryn Stam | SUNY Institute of Technology (original) (raw)

Papers by Kathryn Stam

Research paper thumbnail of Recovering from Statelessness: Resettled Bhutanese-Nepali and Karen Refugees Reflect on Lack of Legal Nationality

Journal of Human Rights, 2015

Research paper thumbnail of Lettre à l' être aimé : "Je t' en prie, ne ramène pas le VIH à la maison

Research paper thumbnail of Like dogs in December: Women's perspectives on HIV/AIDS prevention programs and married life in rural northeast Thailand

HIV/AIDS has spread rapidly in Thailand since the first documented cases in 1984, due to the prev... more HIV/AIDS has spread rapidly in Thailand since the first documented cases in 1984, due to the prevalence and nature of the commercial sex industry and the social norms surrounding extramarital sex and condom use. Because the highest incidence of HIV/AIDS continues to be ...

Research paper thumbnail of Struggling to start over: human rights challenges for Somali Bantu refugees in the United States

The International Journal of Human Rights, 2015

Research paper thumbnail of Contexts and patterns of men's commercial sexual partnerships in northeastern Thailand: implications for AIDS prevention

Social science & medicine (1982), 1997

Results of an exploratory research project elaborating the contexts, patterns and specific scenar... more Results of an exploratory research project elaborating the contexts, patterns and specific scenarios of the commercial sexual activity of northeastern Thai men are reported. Data were collected using face-to-face surveys, focus groups, key informant interviews and observations in 32 northeastern villages (n = 744 men), 18 migrant labour camps housing sugarcane workers (n = 219 men), and five cattlemarkets in northeast Thailand. Fifty percent of married men and 43% of single men had visited female sex workers (FSW). Female sex worker visits occurred primarily prior to marriage, though 13% of married men had purchased sexual services within the past year. Nonmarital sexual activity was set within the socio-cultural frameworks of poverty, circular migration, a large commercial sex sector, and a belief system about men's sexuality and men's and women's gender roles. Sexual services were typically purchased as part of friendship group partying (paiy tiaow) and generally inclu...

Research paper thumbnail of Letters to loved ones: please don't bring HIV home

World health forum, 1997

PIP: While away from their families and communities, migrant workers often engage in behavior whi... more PIP: While away from their families and communities, migrant workers often engage in behavior which puts them at increased risk of HIV infection. Such behavior includes drug and alcohol use, and sex with multiple partners or prostitutes. A significant proportion of northeast ...

Research paper thumbnail of Relaying the message of safer sex: condom races for community-based skills training

Health Education Research, 1998

This paper describes a community-based HTV prevention program designed to improve confidence in c... more This paper describes a community-based HTV prevention program designed to improve confidence in condom use skills by giving community members 'hands-on' experience in using condoms correctly. A condom race activity which had been effective in increasing condom skills confidence among university students in the US was modified and implemented with the general population in rural Northeast Thailand. In addition to providing training in condom use skills, the condom race was part of an integrated condom promotion and distribution campaign which responded to needs identified by the community, built upon the credibility and influence of local leaders and peers, and extended access to condoms into rural communities. Local leaders who had participated in a training-oftrainers program organized condom races in their communities, serving as positive role models for community acceptance of condom use. The condom race stimulated community discussion about condoms and increased participants' feelings of self-efficacy in correct condom use. Participation in the condom race activity was particularly empowering to women, who reported increased confidence in their ability to use condoms and to suggest using condoms with their partners after the race.

Research paper thumbnail of Like dogs in December: Women's perspectives on HIV/AIDS prevention programs and married life in rural northeast Thailand

HIV/AIDS has spread rapidly in Thailand since the first documented cases in 1984, due to the prev... more HIV/AIDS has spread rapidly in Thailand since the first documented cases in 1984, due to the prevalence and nature of the commercial sex industry and the social norms surrounding extramarital sex and condom use. Because the highest incidence of HIV/AIDS continues to be ...

Research paper thumbnail of Online advocacy: Analysis of human rights NGO websites

Research paper thumbnail of What to Do with Geeks and Nerds? A Collaborative Website Analysis Workshop

Social scientists no longer have to travel far and wide for data on social life, as it is now ava... more Social scientists no longer have to travel far and wide for data on social life, as it is now available at our fingertips on the web. However, many of the techniques normally used in traditional research such as participant-observation and the writing of field notes, need to be adapted quite a bit for use in this new media. Rather than data being expensive and precious, the dilemma becomes how to choose from so much information and how to store and analyze it in meaningful ways that remain acceptable within more traditional fields of study. In this interactive workshop, we will start by introducing our previous work on IT occupational culture, the stereotypes of geeks and nerds, and the potential implications of these stereotypes in the recruiting of people to information technology careers. Taking the topic of geeks and nerds in the IT culture as the topic for our web research, we will describe our experiences on conducting web research by archiving websites using the Mozilla Firef...

Research paper thumbnail of Exploring security and privacy issues in hospital information system: an Information Boundary Theory perspective

AMIA ... Annual Symposium proceedings / AMIA Symposium. AMIA Symposium, 2003

A small community hospital (67 beds) in Central New York was undergoing a major technological cha... more A small community hospital (67 beds) in Central New York was undergoing a major technological change within the organization, as they move from the use of several legacy information systems to a hospital-wide information system. The focus of the present research is to explore the privacy and security information issues using a framework called Information Boundary Theory [Stanton, 2002]. IBT explains the motivational factors that lead to the revelation or disclosing of information.

Research paper thumbnail of Human Factors in Security

Threat Analysis and Response Solutions, 2009

Research paper thumbnail of Studying Online Communication Features on International and Cross-Cultural Web Pages Using Websphere Analysis Methodology

International Interactions in Online Environments, 2012

Studying Online Communication Features on International and Cross-Cultural Web Pages Using Websph... more Studying Online Communication Features on International and Cross-Cultural Web Pages Using Websphere Analysis Methodology (9781609608330): Kathryn Stam, Indira R. Guzman, Dennis Thoryk: Book Chapters.

Research paper thumbnail of Conflict and Cooperation: Occupational Subculture of IT Employees

Research paper thumbnail of The occupational culture of IS/IT personnel within organizations

ACM SIGMIS Database, 2008

Page 1. The Occupational Culture of IS/IT Personnel within Organizations Indira R. Guzman TUI Uni... more Page 1. The Occupational Culture of IS/IT Personnel within Organizations Indira R. Guzman TUI University Kathryn R. Stam State University of New York Jeffrey M. Stanton Syracuse University Acknowledgments This research ...

Research paper thumbnail of Events, emotions, and technology: examining acceptance of workplace technology changes

Information Technology & People, 2010

Purpose -The purpose of this article is to understand the relationship between emotional salience... more Purpose -The purpose of this article is to understand the relationship between emotional salience and workplace events related to technology change by using a combination of key features of two popular psychological theories -regulatory focus theory and affective events theory -to view the change process in diverse settings. Design/methodology/approach -This paper is based on analysis of 18 months of qualitative interview data (n ¼ 52 respondents) collected before, during and after the introduction of three different new technologies in three organizations -a hospital, a manufacturing facility, and a psychological counseling center. The mixed methods approach combined descriptive case studies and a structured coding approach derived from a synthesis of the two theories with which the transition processes at each organization were examined. Findings -Employees with a so-called promotion-focused orientation were more likely to accept an IT change and the events related to it. Organizational cultures and the staging of events play a role in individuals' affective reactions and behavior. The use of the framework is promising for illuminating the role of emotions, the timing of change events, and subsequent behavior in response to organizational change.

Research paper thumbnail of Analysis of End User Security Behaviors

Many information security specialists believe that promoting good end user behaviors and constra... more Many information security specialists believe that promoting good end user behaviors and constraining bad end user behaviors provide one important method for making information security effective within organizations. Because of the important of end user security-related behaviors, having a systematic viewpoint on the different kinds of behavior that end users enact could provide helpful benefits for managers, auditors, information technologists, and others with an interest in assessing and/or influencing end user behavior. In the present article, we describe our efforts to work with subject matter experts to develop a taxonomy of end user security- related behaviors, test the consistency of that taxonomy, and use behaviors from that taxonomy to conduct a U.S. survey of an important set of end user behaviors. We interviewed 110 individuals who possessed knowledge of end user security-related behaviors, conducted a behavior rating exercise with 49 information technology subject matter experts, and ran a U.S. survey of 1167 end users to obtain self-reports of their password-related behaviors. Results suggested that six categories of end-user security related behaviors appeared to fit well on a two- dimensional map where one dimension captured the level of technical knowledge needed to enact the behavior and another dimension captured the intentionality of the behavior (including malicious, neutral, and benevolent intentions). Our U.S. survey of non-malicious, low technical knowledge behaviors related to password creation and sharing showed that password “hygiene” was generally poor but varied substantially across different organization types (e.g., military organizations versus telecommunications companies). Further, we documented evidence that good password hygiene was related to training, awareness, monitoring, and motivation.

Research paper thumbnail of Behavioral Information Security: Defining the Criterion Space Jeffrey M. Stanton Cavinda Caldera Ashley Isaac

sai.syr.edu

Page 1. Behavioral Information Security Behavioral Information Security: Defining the Criterion S... more Page 1. Behavioral Information Security Behavioral Information Security: Defining the Criterion Space Jeffrey M. Stanton Cavinda Caldera Ashley Isaac Kathryn R. Stam Slawomir J. Marcinkowski Syracuse University Authors ...

Research paper thumbnail of Examining personal and cultural assumptions about information technology using a technology abstinence exercise

Journal of Information Systems Education, 2004

Page 1. Journal of Information Systems Education, Vol. 15(1) Examining Personal and Cultural Assu... more Page 1. Journal of Information Systems Education, Vol. 15(1) Examining Personal and Cultural Assumptions about Information Technology Using a Technology Abstinence Exercise Kathryn R. Stam Jeffrey M. Stanton School ...

Research paper thumbnail of The visible employee: using workplace monitoring and surveillance to protect information assets--without compromising employee privacy or trust

Page 1. "An eye-opening book for employees with privacy concerns and employers w... more Page 1. "An eye-opening book for employees with privacy concerns and employers worried about information security. Carefully researched and remarkable for its objectivity." —Ted Demopoulos, Demopoulos Associates 9. Using ...

Research paper thumbnail of Recovering from Statelessness: Resettled Bhutanese-Nepali and Karen Refugees Reflect on Lack of Legal Nationality

Journal of Human Rights, 2015

Research paper thumbnail of Lettre à l' être aimé : "Je t' en prie, ne ramène pas le VIH à la maison

Research paper thumbnail of Like dogs in December: Women's perspectives on HIV/AIDS prevention programs and married life in rural northeast Thailand

HIV/AIDS has spread rapidly in Thailand since the first documented cases in 1984, due to the prev... more HIV/AIDS has spread rapidly in Thailand since the first documented cases in 1984, due to the prevalence and nature of the commercial sex industry and the social norms surrounding extramarital sex and condom use. Because the highest incidence of HIV/AIDS continues to be ...

Research paper thumbnail of Struggling to start over: human rights challenges for Somali Bantu refugees in the United States

The International Journal of Human Rights, 2015

Research paper thumbnail of Contexts and patterns of men's commercial sexual partnerships in northeastern Thailand: implications for AIDS prevention

Social science & medicine (1982), 1997

Results of an exploratory research project elaborating the contexts, patterns and specific scenar... more Results of an exploratory research project elaborating the contexts, patterns and specific scenarios of the commercial sexual activity of northeastern Thai men are reported. Data were collected using face-to-face surveys, focus groups, key informant interviews and observations in 32 northeastern villages (n = 744 men), 18 migrant labour camps housing sugarcane workers (n = 219 men), and five cattlemarkets in northeast Thailand. Fifty percent of married men and 43% of single men had visited female sex workers (FSW). Female sex worker visits occurred primarily prior to marriage, though 13% of married men had purchased sexual services within the past year. Nonmarital sexual activity was set within the socio-cultural frameworks of poverty, circular migration, a large commercial sex sector, and a belief system about men's sexuality and men's and women's gender roles. Sexual services were typically purchased as part of friendship group partying (paiy tiaow) and generally inclu...

Research paper thumbnail of Letters to loved ones: please don't bring HIV home

World health forum, 1997

PIP: While away from their families and communities, migrant workers often engage in behavior whi... more PIP: While away from their families and communities, migrant workers often engage in behavior which puts them at increased risk of HIV infection. Such behavior includes drug and alcohol use, and sex with multiple partners or prostitutes. A significant proportion of northeast ...

Research paper thumbnail of Relaying the message of safer sex: condom races for community-based skills training

Health Education Research, 1998

This paper describes a community-based HTV prevention program designed to improve confidence in c... more This paper describes a community-based HTV prevention program designed to improve confidence in condom use skills by giving community members 'hands-on' experience in using condoms correctly. A condom race activity which had been effective in increasing condom skills confidence among university students in the US was modified and implemented with the general population in rural Northeast Thailand. In addition to providing training in condom use skills, the condom race was part of an integrated condom promotion and distribution campaign which responded to needs identified by the community, built upon the credibility and influence of local leaders and peers, and extended access to condoms into rural communities. Local leaders who had participated in a training-oftrainers program organized condom races in their communities, serving as positive role models for community acceptance of condom use. The condom race stimulated community discussion about condoms and increased participants' feelings of self-efficacy in correct condom use. Participation in the condom race activity was particularly empowering to women, who reported increased confidence in their ability to use condoms and to suggest using condoms with their partners after the race.

Research paper thumbnail of Like dogs in December: Women's perspectives on HIV/AIDS prevention programs and married life in rural northeast Thailand

HIV/AIDS has spread rapidly in Thailand since the first documented cases in 1984, due to the prev... more HIV/AIDS has spread rapidly in Thailand since the first documented cases in 1984, due to the prevalence and nature of the commercial sex industry and the social norms surrounding extramarital sex and condom use. Because the highest incidence of HIV/AIDS continues to be ...

Research paper thumbnail of Online advocacy: Analysis of human rights NGO websites

Research paper thumbnail of What to Do with Geeks and Nerds? A Collaborative Website Analysis Workshop

Social scientists no longer have to travel far and wide for data on social life, as it is now ava... more Social scientists no longer have to travel far and wide for data on social life, as it is now available at our fingertips on the web. However, many of the techniques normally used in traditional research such as participant-observation and the writing of field notes, need to be adapted quite a bit for use in this new media. Rather than data being expensive and precious, the dilemma becomes how to choose from so much information and how to store and analyze it in meaningful ways that remain acceptable within more traditional fields of study. In this interactive workshop, we will start by introducing our previous work on IT occupational culture, the stereotypes of geeks and nerds, and the potential implications of these stereotypes in the recruiting of people to information technology careers. Taking the topic of geeks and nerds in the IT culture as the topic for our web research, we will describe our experiences on conducting web research by archiving websites using the Mozilla Firef...

Research paper thumbnail of Exploring security and privacy issues in hospital information system: an Information Boundary Theory perspective

AMIA ... Annual Symposium proceedings / AMIA Symposium. AMIA Symposium, 2003

A small community hospital (67 beds) in Central New York was undergoing a major technological cha... more A small community hospital (67 beds) in Central New York was undergoing a major technological change within the organization, as they move from the use of several legacy information systems to a hospital-wide information system. The focus of the present research is to explore the privacy and security information issues using a framework called Information Boundary Theory [Stanton, 2002]. IBT explains the motivational factors that lead to the revelation or disclosing of information.

Research paper thumbnail of Human Factors in Security

Threat Analysis and Response Solutions, 2009

Research paper thumbnail of Studying Online Communication Features on International and Cross-Cultural Web Pages Using Websphere Analysis Methodology

International Interactions in Online Environments, 2012

Studying Online Communication Features on International and Cross-Cultural Web Pages Using Websph... more Studying Online Communication Features on International and Cross-Cultural Web Pages Using Websphere Analysis Methodology (9781609608330): Kathryn Stam, Indira R. Guzman, Dennis Thoryk: Book Chapters.

Research paper thumbnail of Conflict and Cooperation: Occupational Subculture of IT Employees

Research paper thumbnail of The occupational culture of IS/IT personnel within organizations

ACM SIGMIS Database, 2008

Page 1. The Occupational Culture of IS/IT Personnel within Organizations Indira R. Guzman TUI Uni... more Page 1. The Occupational Culture of IS/IT Personnel within Organizations Indira R. Guzman TUI University Kathryn R. Stam State University of New York Jeffrey M. Stanton Syracuse University Acknowledgments This research ...

Research paper thumbnail of Events, emotions, and technology: examining acceptance of workplace technology changes

Information Technology & People, 2010

Purpose -The purpose of this article is to understand the relationship between emotional salience... more Purpose -The purpose of this article is to understand the relationship between emotional salience and workplace events related to technology change by using a combination of key features of two popular psychological theories -regulatory focus theory and affective events theory -to view the change process in diverse settings. Design/methodology/approach -This paper is based on analysis of 18 months of qualitative interview data (n ¼ 52 respondents) collected before, during and after the introduction of three different new technologies in three organizations -a hospital, a manufacturing facility, and a psychological counseling center. The mixed methods approach combined descriptive case studies and a structured coding approach derived from a synthesis of the two theories with which the transition processes at each organization were examined. Findings -Employees with a so-called promotion-focused orientation were more likely to accept an IT change and the events related to it. Organizational cultures and the staging of events play a role in individuals' affective reactions and behavior. The use of the framework is promising for illuminating the role of emotions, the timing of change events, and subsequent behavior in response to organizational change.

Research paper thumbnail of Analysis of End User Security Behaviors

Many information security specialists believe that promoting good end user behaviors and constra... more Many information security specialists believe that promoting good end user behaviors and constraining bad end user behaviors provide one important method for making information security effective within organizations. Because of the important of end user security-related behaviors, having a systematic viewpoint on the different kinds of behavior that end users enact could provide helpful benefits for managers, auditors, information technologists, and others with an interest in assessing and/or influencing end user behavior. In the present article, we describe our efforts to work with subject matter experts to develop a taxonomy of end user security- related behaviors, test the consistency of that taxonomy, and use behaviors from that taxonomy to conduct a U.S. survey of an important set of end user behaviors. We interviewed 110 individuals who possessed knowledge of end user security-related behaviors, conducted a behavior rating exercise with 49 information technology subject matter experts, and ran a U.S. survey of 1167 end users to obtain self-reports of their password-related behaviors. Results suggested that six categories of end-user security related behaviors appeared to fit well on a two- dimensional map where one dimension captured the level of technical knowledge needed to enact the behavior and another dimension captured the intentionality of the behavior (including malicious, neutral, and benevolent intentions). Our U.S. survey of non-malicious, low technical knowledge behaviors related to password creation and sharing showed that password “hygiene” was generally poor but varied substantially across different organization types (e.g., military organizations versus telecommunications companies). Further, we documented evidence that good password hygiene was related to training, awareness, monitoring, and motivation.

Research paper thumbnail of Behavioral Information Security: Defining the Criterion Space Jeffrey M. Stanton Cavinda Caldera Ashley Isaac

sai.syr.edu

Page 1. Behavioral Information Security Behavioral Information Security: Defining the Criterion S... more Page 1. Behavioral Information Security Behavioral Information Security: Defining the Criterion Space Jeffrey M. Stanton Cavinda Caldera Ashley Isaac Kathryn R. Stam Slawomir J. Marcinkowski Syracuse University Authors ...

Research paper thumbnail of Examining personal and cultural assumptions about information technology using a technology abstinence exercise

Journal of Information Systems Education, 2004

Page 1. Journal of Information Systems Education, Vol. 15(1) Examining Personal and Cultural Assu... more Page 1. Journal of Information Systems Education, Vol. 15(1) Examining Personal and Cultural Assumptions about Information Technology Using a Technology Abstinence Exercise Kathryn R. Stam Jeffrey M. Stanton School ...

Research paper thumbnail of The visible employee: using workplace monitoring and surveillance to protect information assets--without compromising employee privacy or trust

Page 1. "An eye-opening book for employees with privacy concerns and employers w... more Page 1. "An eye-opening book for employees with privacy concerns and employers worried about information security. Carefully researched and remarkable for its objectivity." —Ted Demopoulos, Demopoulos Associates 9. Using ...