- Ed.D., Virginia Polytechnic Institute and State University
- M.A., Appalachian State University
- B.A., Appalachian State University
Dr. B. Dawn Medlin is a Full Professor of Computer Information Systems in the John A. Walker College of Business. Dawn also serves as Coordinator for the College of Business Honors Program. Her teaching, research, and consulting activities have primarily been in the areas of security, health care information systems, webpage development and design, and the interaction between computers and people.
Dr. Medlin is very active in research activities. In May 2014, Dr. Medlin received the College of Business Research Award noting that she had over 100 publications and research activities. Her work has been published in journals such as the Journal of Computer Information Systems, International Journal of Information Security and Privacy, Journal of Information Technology Research, Journal of Information Privacy and Security, Information Systems Security: the (ISC)2 Journal, as well as other national and international publications. Additionally, she had completed several funded research projects and served in several capabilities of leadership to many professional organizations.
Dr. Medlin has taught in France, Spain, Ethiopia and Taiwan as a Visiting Professor. Before joining ASU she owned a Business/Marketing company and worked in the IT field for more than 10 years.
Leon, S. & Medlin. B.D. (2018). A Conceptual Framework for Collaboration in Business Schools," submitted to the International Journal of Social and Organizational Dynamics in IT. International Journal of Social and Organizational Dynamics in IT. Accepted for publication
Medlin. B.D., Vannoy, S.A. & Eggers, A. (2018). PRIVACY, SECURITY, LEGISLATIVE, AND REGULATORY ISSUES SURROUNDING DRONE DELIVERY. Poster Presentation. AMCIS 2018, New Orleans. La.
Choi, H., Medlin, D., Hunsinger, S. (2017). The Effects of Discount Pricing Strategy on Sales of Software-as-a-Service (SaaS): Online Video Game Market Context. Journal of Information Systems Applied Research, 10(1) pp 55-64. http://jisar.org/2017-10/ ISSN: 1946-1836.
Formby, S. K., Medlin, B. D. & Ellington, V. E. (2017). Identifying Microsoft Excel Skills Important for Business School Graduates, Information Systems Education Journal, Information Systems and Computing Academic Professionals, (vol. 15, issue N3, pp. 55-63).
Hartley, R., Medlin, B.D., & Houlik, Z. (2017). Ethical hacking: Educating Future Cybersecurity Professionals, Paper Presentation. EDSIG/CONSIAR CONFERENCE. Austin Texas.
Vannoy, S. A. & Medlin, B.D. (2015). Social computing: An examination of self, social, and use factors. International Journal of Virtual Communities and Social Networking, (vol. 7).
Medlin, B. D., & Cazier, J.A. (2014). Social Engineering Techniques and Password Security: Two Issues Relevant in the Case of Health Care Workers. IGI Global, (vol. 3, issue 2, pp. 58-70).
Vannoy, S. A., Chen, C.-H., & Medlin, B. D. (2013). Differences in kind: Investigating Resource Consumption in Web-based Social Networks. Social Network Analysis and Mining/Springer, (vol. 3, issue 3, pp. 437-456).
Winston, E., Medlin, B. D., & Romaniello, A. (2012). An e-patient’s End-user Community (EUCY): The Value Added of Social Network Applications Computers in Human Behavior, (vol. 28, issue 3, pp. 951-957).
Medlin, B. D., Corley, J. K., & Romaniello, A. (2011). Passwords Selected By Hospital Employees: An Investigative Study International Journal of Advanced Computer Science and Applications, (vol. 2, issue 11).
Vannoy, S. A., Medlin, B. D., & Chen, C.-H. (2011). Enhancing the Trust of Members in Online Social Networks: An Integrative Technical and Marketing Perspective International Journal of Virtual Communities and Social Networking, (vol. 3, issue (4), pp. 15-31.).
Winston, E., & Medlin, B. D. (2011). Information technology implementation and adoption in relation to electronic medical records. Journal of Information Technology Case and Application Research, (vol. 3, issue 1).
Medlin, B. D., & Cazier, J. A. (2010). A Study Of Hard Drive Forensics on consumers PCs: Data Recovery And Exploitation Journal of Management Policy and Practice, (vol. 12, issue 1, pp. 27-35).
Powell, W. E., Hunsinger, D. S., & Medlin, B. D. (2010). Gender Differences Within The Open Source Community: An Exploratory Study Journal of Information Technology Management, (vol. 21, issue 4, pp. 29-37).
May, D. B., Medlin, B. D., & Ingold, W. (2010). Hard Drive Forensics; An Empirical Investigation Journal of Information Privacy and Security.
Powell, W., Hunsinger, D. S., & Medlin, B. D. (2009). Effects of Gender Socialization on Females in the Open Source Community Communications of the ICISA.
Cazier, J. A., Medlin, B. D., & Durfee, A. V. (2009). “Investigating Task Completion for a Complicated Online Travel Search" Journal of Information Technology and Tourism, (vol. 11, issue 1, pp. 43-50).
Romaniello, A., & Medlin, B. D. (2008). Outsourcing Non-Core Business Processes: An Exploratory Study Journal of Information Technology Research, (vol. 1, issue 2, pp. 21-37).
Medlin, B. D., Cazier, J. A., & Foulk, D. (2008). Analyzing the Vulnerability of U.S. Hospitals to Social Engineering Attacks: How Many of Your Employees Would Share Their Password? International Journal of Information Security and Privacy, (vol. 2, issue 3, pp. 71-83).
Chen, C.-H., Medlin, B. D., & Shaw, R. S. (2008). A Cross-Cultural Investigation of Situational Information Security Awareness Programs Information Management & Computer Security, (vol. 16, issue 4, pp. 360-376).
Cassini, J., Medlin, B. D., & Romaniello, A. (2008). Laws and Regulations Dealing with Information Security and Privacy: An Investigative Study International Journal of Information Security and Privacy, (vol. 2, issue 2, pp. 70-82).
Medlin, B. D., & Romaniello, A. (2008). The Cost of Electronic Retailing: Prevalent Security Threats and Their Results International Journal of Electronic Marketing and Retailing, (vol. 2, issue 1, pp. 80-96).
Medlin, B. D., Cazier, J. A., & Weaver, R. M. (2008). Consumer’s PCs: A Study of Hard Drive Forensics, Data Recovery and Exploitation. Journal of Information Privacy and Security, (vol. 4, issue 3, pp. 3-15).
Title: Professor Emeritus
Department: Department of Computer Information Systems
Email address: Email me