• Stanton, J., Guzman, I., and Stam, K. (2010). Information Nation: Education and Careers in the Emerging Information Professions. Information Today, Inc., In Press.
  • Stanton, J. and Stam, K. (2006).  The Visible Employee: Using Workplace Monitoring and Surveillance to Protect Information Assets- Without Compromising Employee Privacy or Trust. Information Today, New Bedford, NJ.

Publications (peer-reviewed):

  • Kingston, L.  and Stam, K. (2017). “Recovering from Statelessness: Resettled Bhutanese-Nepali and Karen Refugees Reflect on Lack of Legal Nationality.” The Journal of Human Rights.
  • Stam, K. (under review- Sept. 2016). Book Chapter: “Refugee Perspectives on Identity and Community After Resettlement to the United States.” The Crux of Refugee Resettlement: Rebuilding Social Networks. Berghahn Books.
  • Coughlan, R., Stam, K. & Kingston, L. (2015). “Struggling to Start Over: Human Rights Challenges for Somali-Bantu Refugees in the United States.” The International Journal of Human Rights.
  • Stam, K. (2014). “The Content and Meaning of Northeast Thai Memorial Books in Contemporary Life.” In Sucharithanarugse (ed.) Interpretative Studies on Southeast Asian Culture. Thai Studies, Chulalongkorn University, Thailand.
  • Kingston, L. & Stam, K. (2013). “Online Advocacy: Analysis of Human Rights NGO Websites,”  The Journal of Human Rights Practice, Jan. 22, 2012.
  • Stam, K. (2011).  “All You Need Is An Open Mind: Visits to Second Life as part of an online virtual worlds course,” for book Transformation in Teaching: Social Media Strategies in Higher Education-Virtual worlds. Eds. Catheryn Cheal. John Coughlin, and Shaun Moor, E-Lis.
  • Guzman, Indira R.; Galvez, Santos M.; Stanton, Jeffrey M.; and Stam, Kathryn R., “Information Security Practices in Latin America: The case of Bolivia” (2010). AMCIS 2010 Proceedings. Paper 492.
  • Stam, K., Guzman, I. (2010). Book chapter, “Studying Online Communication Features on International Webpages Using Websphere Analysis Methodology,” in Computer-Mediated Communication across Cultures: International Interactions in Online Environments, IGI Global. In Press.
  • Stam, K. and Stanton, J. (2010). Events, Emotions, and Technology: Examining Acceptance of Workplace Technology Changes. Information Technology and People. Received Outstanding Paper Award for this article.
  • Guzman, I. Stam, K., Hans, S. and Angolano, C. (2008). Book chapter, “Human factors in Security: the role of the information security professionals within organizations,” with Indira Guzman and S. Hans, D. K. J. Knapp (Ed.), Cyber-Security and Global Information Assurance: Threat Analysis and Response Solutions: IGI Global.
  • Stam, K. and Scialdone, M. (2008). “Where Dreams and Dragons Meet: An Ethnographic Analysis of Two Examples of Massive Multiplayer Online Role-Playing Games (MMORPGs),” Heidelberg Journal of Religions on the Internet Special Issue: Being Virtually Real? Virtual Worlds from a Cultural Studies’ Perspective, 3(1).
  • Guzman, I., Stam, K. and Stanton, J. (2008). “The Occupational Subcultures of IS/IT Personnel Within Organizations,”  ACM SIGMIS Database Journal, 39 (1) Feb.
  • Stanton, J.,  Stam, K., Mastrangelo, P., and Jolton, J. (2005).  “Behavioral Information Security: An Overview, Results, and Research Agenda.” Chapter in AMIS Volume on Human-Computer Interaction in Management Information Systems.
  • Stam, K., Stanton, J., and I. Guzman (2004). “The Local Order and History of Employee Resistance to Information Technology Change in a Social Service Agency: A Membership Category Approach.” Journal of Digital Information Special Issue on the Social Aspects of Digital Information in Organizations.
  • Stanton J., Jolton, J. and Stam, K. (2004). “Analysis of End User Security Behaviors.” Computers and Security.
  • Guzman, I., Stanton, J., Stam, K., Vijayasri, V., Yamodo, I., Zakaria, N., and C. Caldera (2004). “Cultural and Skill Alignment in Organizations: A qualitative study of the occupational subculture of information systems employees in organizations.” Proceedings of the 2004 SIGMIS conference on computer personnel research: Careers, culture, and ethics in a networked environment.
  • Stanton, J., & Stam, K. (2004). Behavioral Information Security: Two end user survey studies of motivation and security practices. AMCIS Proceedings, Paper 175.
  • Stanton, J.M., Stam, K.R., Guzman, I, & Caldera, C.  (2003). “Examining the Linkage between organizational commitment and information security.” Systems, Man, and Cybernetics. IEEE International Conference. 3: p. 2501-2506.
  • Stam, K. & Stanton, J.M. (2003). “Examining Personal and Cultural Assumptions about Information Technology Using a Technology Abstinence Exercise.”  Journal of Information Systems Education, 15 (1).
  • Stanton, J.M. and K. Stam (2003). “Information Technology, Privacy, and Power within Organizations: A Merger of Boundary Theory and Social Exchange Perspectives.”  Surveillance and Society, Vol. 2, Spring.
  • Zakaria, N., Stanton, J., and Stam, K. (2003). Exploring security and privacy issues in hospital information system: An Information Boundary Perspective. AMIA Annual Symposium Proceedings, 1059.
  • Elkins, D., Dole, L.,  Maticka-Tyndale, E. and Kathryn Stam (1998).  “Relaying the message  of safer sex: Condom races for community-based skills training. Health Education Research. 13 (3): 357-379.
  • Stam, K., Elkins, D., Dole, L., and Somboonsuk, B. (1997). “Letters to loved ones: please don’t bring HIV home.”  World Health Forum, 18.
  • Maticka-Tyndale, E., Elkins, D., Haswell-Elkins, M., Rujkarakorn, D., Kuyyakanond,  T., and K. Stam (1997). “Contexts and Patterns of Men’s Commercial Sexual Partnerships in Northeast Thailand.” Social Science and Medicine, 44 (2).


Request More Information

Detailed information, brochures and forms can be mailed to you upon request.


Let's Start The Process     

Complete and submit your application to SUNY Polytechnic Institute.