Professor of Information Systems
Cedar City, UT, UNITED STATES
Specializing in management of electronic commerce, gender equality in computing, and disaster recovery
Ph.D., Information Systems
MPhil., Information Systems
M.Sc., Analysis, Design and Management Information Systems
B. A., subjects include Maths and Business Data Processing
Utah Women in Higher Education Network , 2021
Utah Association of Career and Technology, 2017
Women Tech Council, 2016
Southern Utah University, 2011
Southern Utah University, 2010
Iron County Today online
2019-03-15
In celebration of International Women’s Day last Friday, several local organizations collaborated to provide a Women and Technology luncheon at Southwest Technical College.
view moreBoys & Girls Clubs of America online
2019-03-08
In the Microsoft research report “Closing the STEM Gap,” Dr. Shalini Kesar, Associate Professor of Information Systems at Southern Utah University writes, “Despite the high priority placed on STEM and computer science education across the United States, the fact remains that only a fraction of girls and women are likely to pursue STEM degrees and careers... Failing to bring the minds and perspectives of half the population to STEM and computer science fields stifles innovation and makes it less likely that we can solve today’s social challenges at scale.”
view moreIron County Today online
2019-03-06
The Southern Utah location of the Women’s Business Center of Utah is partnering with several organizations to help celebrate International Women’s Day this Friday at noon.
view moreThe Atlanta Voice online
2019-03-03
In a study created by Microsoft and Dr. Shalini Kesar, Associate Professor Department of Computer Science and Information Systems at Southern Utah University, young girls are more likely to explore STEM careers when they see successful women representation.
view moreForbes online
2019-02-11
One of the largest and most resource-intensive projects to be carried out on this topic recently is from Microsoft and conducted by Dr. Shalini Kesar, an Associate Professor in the Department of Computer Science & Information Systems at Southern Utah University. The research was first conducted in the EU in 2017, and Microsoft has now released U.S. statistics and recommendations.
view moreThe Spectrum print
2018-05-07
SUGIT is the brainchild of Kesar, an SUU associate professor of information systems who wants to increase the participation of women in technology. She heads several technology outreach projects including Southern Utah’s participation in the national Aspirations in Computing competition sponsored by the National Center for Women & Information Technology.
view moreGood4Utah tv
2018-04-05
Dr. Keser has been leading a STEM program for high school girls across 14 Utah and Nevada counties. In the last five years the university says more than 400 high schools have applied to the free online competition.
view moreSUU News online
2018-03-26
Even with a higher priority placed on science, technology, engineering and math (STEM) throughout education in the US, only a fraction of girls are likely to pursue a STEM career. According to the National Center for Education Statistics, while more than 57 percent of college undergraduates are women, only 18 percent progress into STEM careers. With a clear gap, Microsoft set out to better understand what causes girls and women to lose interest in STEM subjects and careers, as well as what strategies have the greatest potential to reverse the trend.
view moreSt. George Daily Spectrum online
2017-05-19
“We want to give them this experience to show them STEM isn’t boring and doesn’t have to be just for boys,” Kesar said. “STEM used to be very scientific and programming-oriented, but now it’s changing and is so much more than just sitting at a computer.”
view moreKSL online
2016-11-21
Dr. Shalini Kesar is an Associate Professor at Southern Utah University and leads Southern Utah Aspirations in Computing (SUAIC), a chapter of NCWIT. She said, “I think globally there is a gap…the pipeline is a factor.” Dr. Kesar works both in K-12 and higher education to increase the number of women in that pipeline...
view moreKSL online
2016-09-27
On Thursday at the Grand America hotel, Dr. Shalini Kesar related her story while she was in Salt Lake City for the Women Tech Council Awards.
view moreSouthern Utah University News online
2016-04-11
According to the National Center for Education Statistics, more than 57 percent of college undergraduates are women, yet only 18 percent progress into STEM (science, technology, engineering and mathematics) as a career. Despite this national need for a female presence in computing and technology workplaces, southern Utah is showing initiative on this front.
view moreACM SIGCAS Computers and Society
2016-09-01
This paper's discusses five real business capstone projects that were designed to provide an educational experiential learning to include ethics and professionalism in the pedagogy. This class comprised senior undergraduate Computer Science (CS) and Information Systems (IS) students. The projects involved teamwork and lasted fifteen weeks. The aim of the capstone curriculum was to foster a teaching environment to: 1) include interdisciplinary partnership among university departments; 2) cultivate local industry alliances; 3) encourage students' analysis and synthesis of skills and knowledge in a real business setting project. The National Society for Experiential Education (NSEE) practices were used while developing the curriculum and their eight Guiding Principles of Ethical Practices are used to describe the initial findings and lesson learned.
Ethicomp Internal Conference Proceedings
Taking into account various studies on the increasing problem of computer crime within organizations, the researcher argues that management of such crimes requires an equal focus on technical, formal and, informal (social) issues associated with Information Technology (IT). This is because focusing on the technical issues only provides a partial solution while managing such crimes. While understanding management of computer crime, this paper contributes to provide a different perspective by using the organizational theory, Triple Loop Learning (TLL).
Journal of International Commerce Law and Technology
Kesar, Shalini
2011
This paper provides an insight to the increasing problem of cybercrime in the context of electronic government. It takes examples from the UK government to argue that it is no longer possible to just rely on technical controls while securing electronic government transactions. Reports and studies reflect that illicit acts such as cybercrime are predominantly the result of not only disregard for basic information security and but also lack of awareness about the importance of social issues associated with information technology. Consequently, focusing on the technical controls provides only a partial solution while managing cybercrime particularly in electronic government context.
Electronic Government, an International Journal
Jain, Vikas, and Kesar, Shalini
2011
In this paper, we compare and contrast the issues facing citizens with those faced by managers responsible for e-government implementation. We report the findings of a case study of e-government implementation undertaken recently at a local government authority in the UK. We use the design-reality gap analysis framework based on seven 'ITPOSMO' dimensions proposed by Heeks...
International Journal of Business Information Systems
Kesar, Shalini
2008
Managing the growing problem of computer fraud within organisations has led researchers and practitioners to emphasise the need to take into account the 'social' aspects of information security. In addition, wider organisational issues such as lack of communication have been associated with computer fraud. In trying to minimise 'opportunities' for computer fraud, this paper argues that managers' awareness and knowledge of how an organisation functions can significantly affect the effectiveness of management information security. This is because managers can send 'cues' to other employees, which influence how the latter perceive and abide by information security and other policies and procedures in their daily activities. Such perception and application are examples of tacit knowledge development and use. In developing the argument, this paper uses the case of Barings Bank together with Mintzberg's five functions of an organisation. Thus it contributes in effective management of information security from a knowledge management perspective.
Electronic Government, an International Journal
Jain, Vikas and Kesar, Shalini
2007
Governments in many countries have invested significantly in building electronic infrastructures to support e–government initiatives. However, there is mixed evidence about the success of e–government initiatives. In this paper, we report the findings of a case study of e–government implementation undertaken recently at a local government authority in the UK. Despite the success of such efforts at National Health Services Direct (NHSD) in the UK, local authorities in the UK have not been able to replicate the success of e–government initiatives at NHSD. Consequently, local authorities in the UK have largely failed to meet the expectations of the UK government. We use the framework proposed by Heeks to understand the underlying reasons for the failure of local authorities to implement e–government. Using a case study at a local authority in the UK, this paper contributes to our understanding about successful implementation and adoption of e–government initiatives at the local level.
Designed to explore concepts of microcomputer systems. Concepts include: windows and general information, word processing, spreadsheets, database, presentations, and the Internet. Students gain proficiency with the basic command structures of each application in an integrated office suite.
Designed as a telecommunications and networking foundation in network connectivity, data communication concepts and communication protocols. Students learn to analyze cost-benefits and to evaluate, select, and implement different communication options.
Introduces students to the management, technical, and administrative aspects of Information Security. Includes legal and ethical issues, risk management, technical and physical security.
This examines research methods for interdisciplinary study and explore different perspectives on a variety of topics. Students develop their ideas for their interdisciplinary capstone project by evaluating and comparing the methodologies presented in the course.
In this course students will complete and interdisciplinary capstone project in which hey utilize and expand upon the knowledge and skills from previous coursework. Students will also create a portfolio that will reflect critical thinking; research, and oral and written communication skills.
Provides a general survey of key technological elements of electronic business and important business strategies essential to maintaining e-business infrastructures. Students will design and develop web sites that have e-business capabilities.
An examination of systematic, disciplined and quantifiable approaches to the development, operation, and maintenance of software. This course offers a major programming project which provides an opportunity to apply much of the material the student has learned in previous computer science coursework.
Provides opportunity to manage a major information systems development/enhancement project. Students apply what they have learned from various other courses to one project with an emphasis on enterprise-level project management.
This course will teach the student methods in identifying vulnerabilities, and take appropriate countermeasures to prevent and mitigate failure risks for an organization. It also provides the security professional with a foundation in procedures; assessment of risks in the enterprise, etc.
This course requires the student to be engaged in either a Thesis project of approved Internship.
Social