Intellectual Contributions

University of South Alabama

January 1, 2010 - December 31, 2015

Computer Science

Andel, Todd R. (Associate Professor)

Refereed Journal Articles

Journal Article, Academic Journal

Fadul, J. E., Hopkinson, K. M., Andel, T. R., Sheffield, C. A. (2014). A Trust Management Toolkit for Smart Grid Protection Systems. IEEE Transactions On Power Delivery, 29(4), 1768-1779.

Journal Article, Academic Journal

Cazalas, J., Andel, T. R., McDonald, J. T. (2014). Analysis and Categorical Application of LSB Steganalysis Techniques. Journal of Information Warfare, 13(3), 12-22. www.jinfowar.com/

Journal Article, Academic Journal

Andel, T. R., Fritzke, A., Humphries, J. W., McDonald, J. T. (2014). Design and Implementation of Hiding Techniques to Obfuscate Against Side-Channel Attacks on AES. International Journal of Computing & Network Technology, 2(2), 65-72. http://journals.uob.edu.bh/network

Journal Article, Academic Journal

Andel, T. R., Barron, J., McDonald, J. T., Humphries, J. W. (2014). RSA Power Analysis Obfuscation: A Dynamic Algorithmic Hardware Countermeasure. International Journal of Computing & Digital Systems, 3(2), 69-78. journals.uob.edu.bh/computing

Journal Article, Professional Journal (Submitted)

Koenenn, D. P., Andel, T. R., McDonald, J. T. Active Cyber Defense: Approaches and Legality. IEEE Security and Privacy.

Non-Refereed Journal Articles

Journal Article, Academic Journal (Submitted)

Whitehurst, L. N., Andel, T. R., McDonald, J. T., Al-Assadi, W. Enhancing Security against Software Attacks with Reprogrammable Hardware. Journal of Information Security and Applications (Elsevier).

Conference Proceedings

Conference Proceeding

Carsten, P. W., Andel, T. R., Yampolskiy, M., McDonald, J. T. (2015). In-Vehicle Networks: Attacks, Vulnerabilities, and Proposed Solutions. Oak Ridge, TN: 10th Cyber and Information Security Research Conference (CISRC 2015).

Conference Proceeding

Yampolskiy, M., Andel, T. R., McDonald, J. T., Glisson, W. B., Yasinsac, A. F. Intellectual Property Protection in Additive Layer Manufacturing: Requirements for Secure Outsourcing. Program Protection and Reverse Engineering Workshop (PPREW).

Conference Proceeding

Cazalas, J., Andel, T. R., McDonald, J. T. (2014). In S. Liles (Ed.), Analysis and Categorical Application of LSB Steganalysis Techniques (pp. 25-32). 9th International Conference on Cyber Warfare and Security (ICCWS-2014). toc.proceedings.com/21559webtoc.pdf

Conference Proceeding

Whitehurst, L. N., Andel, T. R., McDonald, J. T. (2014). Exploring Security in ZigBee Networks (pp. 25-28). Oak Ridge, TN: 2014 Cyber and Information Security Research Conference (CISR ’14).

Conference Proceeding (Accepted)

Glisson, W. B., McDonald, J. T., Andel, T. R., Campbell, S. M., Jacobs, M., Mayr, J. (2015). Compromising a Medical Mannequin. Puerto Rico: Americas Conference on Information Systems (AMCIS). www.amcis2015.aisnet.org/

Conference Proceeding (Accepted)

Andel, T. R., Whitehurst, L. N., McDonald, J. T. (in press). Software Security and Randomization through Program Partitioning and Circuit Variation. Scottsdale, AZ: First ACM Workshop on Moving Target Defense (MTD 2014).

Conference Proceeding (Not Accepted)

Stewart, K., Hopkinson, K., Andel, T. R. MA-AHASBE: Multi-Authority Anonymous Hierarchical Attribute-Set Based Encryption from Asymmetric Pairings. 34rd International Cryptology Conference (CRYPTO 2014).

Conference Proceeding (Submitted)

Carsten, P., Andel, T. R., Yampolskiy, M., McDonald, J. T., Russ, S. H. A System to Recognize Intruders in Controller Area Network (CAN). 3rd International Symposium for ICS & SCADA Cyber Security Research 2015.

Conference Proceeding (Submitted)

Davidson, C. C., Dawson, J., Carsten, P., Yampolskiy, M., Andel, T. R. Investigating the Applicability of a Moving Target Defense for SCADA Systems. 3rd International Symposium for ICS & SCADA Cyber Security Research 2015.

Conference Proceeding (Submitted)

Cazalas, J., McDonald, J. T., Andel, T. R., Stakhanova, N. Probing the Limits of Virtualized Software Protection. ACM: 4th Program Protection and Reverse Engineering Workshop (PPREW).

Conference Proceeding (Submitted)

Stewart, K. E., Hopkinson, K. M., Andel, T. R., Clark, M. MA-AHASBE: Multi-Authority Anonymous Hierarchical Attribute-Set Based Encryption from Asymmetric Pairings. IACR International Conference on Practice and Theory of Public-Key Cryptography (PKC).

Other Intellectual Contributions

Abstract (Accepted)

McDonald, J. T., Andel, T. R. (in press). Program Partitioning and Polymorphic Functions A Two-Pronged Approach for Program Protection Research. Software Security and Protection workshop (SSP’14).

Working Paper (Working Paper)

Kynigos, C., Glisson, W. B., Andel, T. R., McDonald, J. T. Utilizing the Cloud to Store Camera-Hijacked Images. Kauai, Hawaii: Hawaii International Conference on System Sciences (HICSS-49). www.hicss.org/

Black, Michael E. (Senior Instructor)

Other Intellectual Contributions

Research Report (Accepted)

Black, M. E., Clark, A. M., Segers, N., Skipper, A. (in press). Advanced Virtual Lab Learning Environment. Mobile, AL: The 17th Annual Colloquium for Information Systems Security Education.

Research Report (Accepted)

Black, M. E., Clark, A. M., Segers, N., Skipper, A. (in press). Advanced Virtual Lab Learning Environment: Final. San Diego, CA: The 18th Annual Colloquium for Information Systems Security Education.

Bourrie, David M. (Assistant Professor)

Refereed Journal Articles

Journal Article, Academic Journal

Cegielski, C. G., Bourrie, D. M., Hazen, B. T. (2013). Evaluating adoption of emerging IT for corporate IT strategy: Developing a model using a qualitative method. Information Systems Management, 30(3), 235-249. www.tandfonline.com/doi/abs/10.1080/10580530.2013.794632#.VDbzovldX3c

Journal Article, Academic Journal

Bourrie, D. M., Sankar, C. S., McDaniel, B. (2012). The impact on ERP implementation by leadership and organizational culture: A case analysis. International Journal of Information Systems and Change Management, 6(2), 112-131. www.inderscience.com/info/inarticle.php?artid=51149

Journal Article, Academic Journal (Accepted)

Bourrie, D. M., Cegielski, C. G., Sankar, C. S., Jones-Farmer, L. A. (2014). Identifying characteristics of dissemination success using an expert panel. Decision Sciences Journal of Innovative Education, 12(4), 357-380.

Journal Article, Academic Journal (Revising to Resubmit)

Bourrie, D. M., Sankar, C. S., Jones-Farmer, L. A. Conceptualizing interactions between innovation chatacteristics and organizational member's readiness to adopt educational innovations. International Journal of Engineering Education.

Journal Article, Academic Journal (Submitted)

Bourrie, D. M., Jones-Farmer, L. A., Sankar, C. S. The influence of characteristics of innovations and readiness of faculty members toward dissemination of educational innovations: An empirical study. IEEE Transactions on Education.

Journal Article, Academic Journal (Submitted)

Bourrie, D. M., Jones-Farmer, L. A., Sankar, C. S. Critical success factors that influence adoption and use of educational innovations. Information and Management.

Campbell, Stephen M. (Assistant Professor)

Book Chapters

Book, Chapter in Scholarly Book-New (Submitted)

Campbell, S. M., Campbell, A. A. Health Informatics: The best career you’ve never considered. Health Informatics for the Curious: Why Study Health Informatics.

Refereed Journal Articles

Journal Article, Academic Journal

Pardue, J. H., Campbell, A., Campbell, S. M., Wisniewski, P. (2014). Mission Impossible? Putting the Patient Back in Patient Care. Communications of the Association of Information Systems, 34. aisel.aisnet.org/cais/vol34/iss1/19

Journal Article, Academic Journal

Stylianou, A., Winter, S., Niu, Y., Giacalone, R., Campbell, S. M. (2013). Understanding The Behavioral Intention To Report Unethical Information Technology Practices: The Role Of Machiavellianism, Gender And Computer Literacy. Journal of Business Ethics, 117(2), 333-343.

Journal Article, Academic Journal

Landry, J. P., Daigle, R. J., Pardue, J. H., Longenecker, H. E., Campbell, S. M. (2012). Health Informatics as an ABET-CAC Accreditable IS Program. Information Systems Education Journal, 10(6), 51-62. isedj.org/2012-10/N6/ISEDJv10n6p51.html

Journal Article, Academic Journal

Campbell, S. M. (2012). What a Difference a Year Makes: An Examination of Time Lag Effect of Information Technology Investment on Firm Performance. Journal of Organizational Computing and Electronic Commerce, 22(3), 237-255.

Journal Article, Academic Journal

Campbell, S. M., Pardue, J. H., Longenecker, H. E., Barnett, L., Landry, J. P. (2012). Treating the Healthcare Workforce Crisis: A Prescription for a Health Informatics Curriculum. Information Systems Education Journal, 10(3), 35-46. http://isedj.org/2012-10/N3/ISEDJv10n3p35.html

Journal Article, Academic Journal

Longenecker, H. E., Campbell, S. M., Landry, J. P., Pardue, J. H., Daigle, R. J. (2012). A Health Informatics Curriculum Congruent with IS 2010 and IMIA Recommendations for an Undergraduate Degree. Information Systems Education Journal, 10(2), 15-32. isedj.org/2012-10/N2/ISEDJv10n2p15.html

Journal Article, Academic Journal

Campbell, S. M. (2011). Could You Repeat That? A Preliminary Study of the Effectiveness of Course Management Systems in the Blended Environment. Issues in Information Systems, 7(2), 95-99.

Journal Article, Academic Journal (Submitted)

Glisson, W. B., Storer, T., Campbell, S. M., Blyth, A., Grispos, G. In-the-Wild Residual Data Research and Privacy. Journal of Information Technology. http://www.palgrave-journals.com/jit/index.html

Non-Refereed Journal Articles

Journal Article, Academic Journal (Submitted)

Campbell, S. M., Stylianou, A. CHOOSING SIDES: AN AGENCY THEORY BASED EXAMINATION OF WHISTLE-BLOWING. International Journal of Technology and Human Interaction.

Journal Article, Academic Journal (Submitted)

Campbell, S. M., Stylianou, A. A STITCH IN TIME SAVES NINE: THE ROLE OF MORAL JUDGMENT IN REDUCING INTERNET POLICY VIOLATIONS. Journal of Business Ethics.

Journal Article, Academic Journal (Working Paper)

Campbell, S. M., Dina, S., Campbell, A. A. Answering the $64,000 Question: A Model of Ambulatory Clinic EHR Adoption.

Conference Proceedings

Conference Proceeding

Stoll, J., Malave, I., Campbell, S. M., White, D. (2013). Gaming the Gap: Designing a Small World Simulation of Human Migration Response to Environmental Stressors. Digital Games Research Association 2013. lmc.gatech.edu/~cpearce3/DiGRA13/papers/paper_222.pdf

Conference Proceeding

Longenecker, H. E., Campbell, S. M., Landry, J. P., Pardue, J. H., Daigle, R. J. (2011). A Health Informatics Curriculum Congruent with IS 2010 and IMIA Recommendations for an Undergraduate Degree. Proceedings of ISECON 2011.

Conference Proceeding

Campbell, S. M. (2011). Could You Repeat That? A Preliminary Study of the Effectiveness of Course Management Systems in the Blended Environment. Proceedings of IACIS 2011.

Conference Proceeding

Landry, J. P., Daigle, R. J., Pardue, J. H., Longenecker, H. E., Campbell, S. M. (2011). Health Informatics as an ABET-CAC Accreditable IS Program. Proceedings of ISECON 2011.

Conference Proceeding

Campbell, S. M., Pardue, J. H., Longenecker, H. E., Barnett, L., Landry, J. P. (2011). Treating the Healthcare Workforce Crisis: A Prescription for a Health Informatics Curriculum. Proceedings of ISECON 2011.

Conference Proceeding

Landry, J. P., Pardue, J. H., Johnsten, T., Campbell, S. M., Patidar, P. (2011). A Threat Tree for Health Information Security and Privacy (pp. 468). Americas Conference for Information Systems AMCIS. aisel.aisnet.org/amcis2011_submissions/468/

Conference Proceeding (Accepted)

Glisson, W. B., McDonald, J. T., Andel, T. R., Campbell, S. M., Jacobs, M., Mayr, J. (2015). Compromising a Medical Mannequin. Puerto Rico: Americas Conference on Information Systems (AMCIS). www.amcis2015.aisnet.org/

Conference Proceeding (Accepted)

Campbell, S. M., Langhinrichsen-Rohling, J., Shropshire, J. D., Sweeney, R. B. (in press). A Safety Net for Social Networking: Development of a Predictive Tool for Domestic Terrorism. Southern Association for Information Systems Conference.

Conference Proceeding (Accepted)

Shropshire, J. D., Campbell, S. M., Sweeney, R. B. (in press). Overcoming Privacy Challenges In Mobile-Cloud Computing.

Conference Proceeding (Accepted)

Campbell, S. M., Glisson, W. B., Loeser, D. L., Campbell, A. A. (2015). Have We Left The Barn Door Open? An exploratory examination of data security in consumer grade bio-monitoring devices. Southeast Decision Sciences Institute.

Conference Proceeding (Accepted)

Campbell, S. M. (2011). Just What the Doctor Ordered? A Case Study of RFID Implementation in a US Hospital. Proceedings of SEDSI 2011.

Conference Proceeding (Submitted)

Campbell, S. M. Diagnosing the Hospital: A student-led exploration of organizational needs. USA Conference on Teaching and Learning.

Conference Proceeding (Submitted)

Campbell, S. M. Using Web-Ex to Create a Virtual Synchronous Classroom Experience. USA Conference on Teaching and Learning.

Conference Proceeding (Working Paper)

Campbell, S. M., Campbell, A., Pardue, J. H. The Health Informatics Bachelor Degree Program: Lessons and Results from the First Year. Americas Conference on Information Systems.

Chapman, Debra L. (Assistant Professor)

Refereed Journal Articles

Journal Article, Academic Journal (Accepted)

Chapman, D. L., Wang, S. (2015). Multimedia Instructional Tools and Student Learning. International Journal of Information Communication and Technology Education, 11 Nr 2(42).

Journal Article, Academic Journal (Accepted)

Chapman, D. L., Wang, S. (2014). MMITs Impact on Student Motivation and Learning Strategies in Computer Applications Courses. Journal of Interactive Learning Research.

Clark, Angela M. (Senior Instructor)

Other Intellectual Contributions

Material Regarding New Courses/Curricula

Clark, A. M. (2014). publication of slides for new text edition. The Architecture of Computer Hardware nad System Software: An Information Technology Approach by Irv Englander (5th ed.). Hoboken, NJ: John Wiley & Sons.

Research Report (Accepted)

Black, M. E., Clark, A. M., Segers, N., Skipper, A. (in press). Advanced Virtual Lab Learning Environment. Mobile, AL: The 17th Annual Colloquium for Information Systems Security Education.

Research Report (Accepted)

Black, M. E., Clark, A. M., Segers, N., Skipper, A. (in press). Advanced Virtual Lab Learning Environment: Final. San Diego, CA: The 18th Annual Colloquium for Information Systems Security Education.

Daigle, Roy J.

Refereed Journal Articles

Journal Article, Academic Journal

Landry, J. P., Daigle, R. J., Pardue, J. H., Longenecker, H. E., Campbell, S. M. (2012). Health Informatics as an ABET-CAC Accreditable IS Program. Information Systems Education Journal, 10(6), 51-62. isedj.org/2012-10/N6/ISEDJv10n6p51.html

Journal Article, Academic Journal

Longenecker, H. E., Campbell, S. M., Landry, J. P., Pardue, J. H., Daigle, R. J. (2012). A Health Informatics Curriculum Congruent with IS 2010 and IMIA Recommendations for an Undergraduate Degree. Information Systems Education Journal, 10(2), 15-32. isedj.org/2012-10/N2/ISEDJv10n2p15.html

Journal Article, Academic Journal

Landry, J. P., Daigle, R. J., Longenecker, H. E., Pardue, J. H. (2010). IS 2002 and ABET Accreditation: Meeting the ABET Program Outcome Criteria. Information Systems Education Journal, 8(67), 51-62. isedj.org/2012-10/N6/ISEDJv10n6p51.html

Conference Proceedings

Conference Proceeding

Landry, J. P., Pardue, J. H., Daigle, R. J., Longenecker, H. E. (2013). A Database Management Assessment Instrument (2nd ed., vol. 11, pp. 63-76). Information Systems Education Journal. isedj.org/2013-11/N2/ISEDJv11n2p63.html

Conference Proceeding

Longenecker, H. E., Campbell, S. M., Landry, J. P., Pardue, J. H., Daigle, R. J. (2011). A Health Informatics Curriculum Congruent with IS 2010 and IMIA Recommendations for an Undergraduate Degree. Proceedings of ISECON 2011.

Conference Proceeding

Landry, J. P., Daigle, R. J., Pardue, J. H., Longenecker, H. E., Campbell, S. M. (2011). Health Informatics as an ABET-CAC Accreditable IS Program. Proceedings of ISECON 2011.

Glisson, William B. (Associate Professor)

Book Chapters

Book, Chapter in Scholarly Book-New (Accepted)

Grispos, G., Glisson, W. B., Storer, T. (in press). Recovering Residual Forensic Data from Smartphone Interactions with Cloud Storage Providers. The Cloud Security Ecosystem: Technical, Legal, Business and Management Issues. Syngress/Elsevier.

Refereed Journal Articles

Journal Article, Academic Journal

Grispos, G., Glisson, W. B., Pardue, J. H., Dickson, M. (2015). Identifying User Behavior from Residual Data in Cloud-based Synchronized Apps. Journal of Information Systems Applied Research, 8. www.jisar.org/

Journal Article, Academic Journal

Glisson, W. B., Welland, R. (2014). Web Engineering Security (WES) Methodology. Communications of the Association for Information Systems, 34(1). aisel.aisnet.org/cais/vol34/iss1/71

Journal Article, Academic Journal

Glisson, W. B., Storer, T., Buchanan-Wollaston, J. (2013). An Empirical Comparison of Results from Mobile Forensic Toolkits in the Wild. Digital Investigations, 10(1), 44-55.

Journal Article, Academic Journal

Grispos, G., Storer, T., Glisson, W. B. (2012). The Calm before the Storm: The Challenges of Cloud Computing in Digital Forensics. International Journal of Digital Crime and Forensics.

Journal Article, Academic Journal

Grispos, G., Storer, T., Glisson, W. B. (2011). A Comparison of Forensic Evidence Recovery Techniques for a Windows Mobile Smart phone. A Comparison of Forensic Evidence Recovery Techniques for a Windows Mobile Smart phone.

Journal Article, Academic Journal (Submitted)

Glisson, W. B., Storer, T., Campbell, S. M., Blyth, A., Grispos, G. In-the-Wild Residual Data Research and Privacy. Journal of Information Technology. http://www.palgrave-journals.com/jit/index.html

Journal Article, Academic Journal

Glisson, W. B., Storer, T., Mayall, G., Moug, I., Grispos, G. (2011). Electronic retention: what does your mobile phone reveal about you? International Journal of Information Security.

Conference Proceedings

Conference Proceeding

Berman, K. J., Glisson, W. B., Glisson, L. M. (2015). Investigating the Impact of Global Positioning System Evidence. 48th Annual Hawaii International Conference on System Sciences (0 ed., vol. 48, pp. 5234-5243). Kauai, Hawaii: Hawaii International Conference on System Sciences (HICSS-48). www.kholden7.wix.com/hicss

Conference Proceeding

Yampolskiy, M., Andel, T. R., McDonald, J. T., Glisson, W. B., Yasinsac, A. F. Intellectual Property Protection in Additive Layer Manufacturing: Requirements for Secure Outsourcing. Program Protection and Reverse Engineering Workshop (PPREW).

Conference Proceeding

Mckeown, S., Maxwell, D., Azzopardi, L., Glisson, W. B. (2014). Investigating People: A Qualitative Analysis of the Search Behaviours of Open-Source Intelligence Analysts. Information Interaction in Context conference. www.iiix2014.ur.de/index.html

Conference Proceeding

Karlsson, K.-J., Glisson, W. B. (2014). Android Anti-forensics: Modifying CyanogenMod. Hawaii International Conference on System Sciences (HICSS-47). www.hicss.hawaii.edu/hicss_47/apahome47.htm

Conference Proceeding

Glisson, W. B., Storer, T. (2013). Investigating Information Security Risks of Mobile Device Use within Organizations. The 19th Americas Conference on Information Systems (AMCIS).

Conference Proceeding

Grispos, G., Glisson, W. B., Storer, T. (2013). Cloud Security Challenges: Investigating Policies, Standards, and Guidelines in a Fortune 500 Organization. The European Conference on Information Systems (ECIS-21).

Conference Proceeding

McMillan, J., Glisson, W. B. (2013). Investigating the Increase in Mobile Phone Evidence in Criminal Activities. Hawaii International Conference on System Sciences (HICSS-46).

Conference Proceeding

Grispos, G., Glisson, W. B., Storer, T. (2013). Using Smartphones as a Proxy for Forensic Evidence contained in Cloud Storage Services. Hawaii International Conference on System Sciences (HICSS-46).

Conference Proceeding

Buchanan-Wollaston, J., Storer, T., Glisson, W. B. (2013). Comparison of the Data Recovery Function of Forensic Tools (pp. 331-347). Advances in Digital Forensics IX.

Conference Proceeding

Storer, T., Glisson, W. B., Renaud, K. (2012). Patterns of Information Security Postures in LargeScale Socio-Technical Systems. The First International Workshop on Cyberpatterns.

Conference Proceeding

Al-Wehaibi, K., Storer, T., Glisson, W. B. Augmenting Password Recovery with Online Profiling (vol. 8, pp. S25-S33). New Orleans, LA, USA: The Proceedings of the Eleventh Annual DFRWS Conference, 11th Annual Digital Forensics Research Conference. http://www.sciencedirect.com/science/journal/17422876/8/supp/S

Conference Proceeding

Tabona, A. Z., Glisson, W. B. (2011). Exploring Solutions Put Forth to Solve Computer Forensic Investigations of Large Storage Media (pp. 16). 6th International Annual Workshop on Digital Forensics & Incident Analysis (WDFIA).

Conference Proceeding

Storer, T., Glisson, W. B., Grispos, G. (2010). Investigating Information recovered from Re-sold Mobile Devices. Privacy and Usability Methods Pow-wow (PUMP). scone.cs.st-andrews.ac.uk/pump2010/papers/storer.pdf

Conference Proceeding

Glisson, W. B., Welland, R., Glisson, L. M. (2010). Security and Computer Forensics in Web Engineering Education. Web Engineering Curricula (WECU). ceur-ws.org/Vol-607/paper7.pdf

Conference Proceeding

Glisson, W. B., Welland, R. (2010). Initial Case Study on “the Good, the Bad and the Ugly” aspects of a New MSc Program in Computer Forensics and E-Discovery.

Conference Proceeding

Hoolachan, S., Glisson, W. B. (2010). Organizational Handling of Digital Evidence. St. Paul, Minnesota: Conference on Digital Forensics, Security and Law (ADFSL). http://www.digitalforensics-conference.org/

Conference Proceeding (Accepted)

Grispos, G., Glisson, W. B., Storer, T. (2015). Security Incident Response Criteria: A Practitioner’s Perspective. Puerto Rico: Americas Conference on Information Systems (AMCIS). amcis2015.aisnet.org/

Conference Proceeding (Accepted)

Glisson, W. B., McDonald, J. T., Andel, T. R., Campbell, S. M., Jacobs, M., Mayr, J. (2015). Compromising a Medical Mannequin. Puerto Rico: Americas Conference on Information Systems (AMCIS). www.amcis2015.aisnet.org/

Conference Proceeding (Accepted)

Campbell, S. M., Glisson, W. B., Loeser, D. L., Campbell, A. A. (2015). Have We Left The Barn Door Open? An exploratory examination of data security in consumer grade bio-monitoring devices. Southeast Decision Sciences Institute.

Conference Proceeding (Accepted)

Grispos, G., Glisson, W. B., Storer, T. (2014). Incident Reaction Evolution: The Assimilation of Agile Incident Response. Savannah, Georgia: Americas Conference on Information Systems (AMCIS). www.amcis2014.aisnet.org/

Other Intellectual Contributions

Abstract

Bromby, M., Glisson, W. B., Storer, T. (2011). Gone But Not Forgotten: Legal Implications of The Retention of Data on Mobile Devices. BILETA.

Abstract (Accepted)

Grispos, G., Glisson, W. B., Pardue, J. H., Dickson, M. (2014). Identifying User Behavior from Residual Data in Cloud-based Synchronized Apps. CONISAR (EDSIG Association of Information Technology Professionals).

Working Paper (Working Paper)

Kynigos, C., Glisson, W. B., Andel, T. R., McDonald, J. T. Utilizing the Cloud to Store Camera-Hijacked Images. Kauai, Hawaii: Hawaii International Conference on System Sciences (HICSS-49). www.hicss.org/

Huang, Jingshan (Assistant Professor)

Refereed Journal Articles

Journal Article, Academic Journal

Huang, J., Dang, J., Borchert, G., Eilbeck, K., Zhang, H., Xiong, M., Jiang, W., Wu, H., Blake, J., Natale, D., Tan, M. (2014). OMIT: Dynamic, Semi-Automated Ontology Development for the microRNA Domain. PLOS ONE, 9(7), 1-16. www.plosone.org/article/info%3Adoi%2F10.1371%2Fjournal.pone.0100855

Journal Article, Academic Journal

Borchert, G. M., Huang, J., Tan, M., Zhang, H., xiong, m., jiang, w., wu, h. (2014). OMIT: Dynamic, Semi-Automated Ontology. PLOS ONE, 9(7e100855), 16. www.plosone.org

Journal Article, Academic Journal

Zhu, M., Wang, W., Liu, B., Huang, J. Efficient Video Panoramic Image Stitching based on an Improved Selection of Harris Corners and a Multiple-Constraint Corner Matching. PLOS ONE, 8(12), 1-15. www.plosone.org/article/info%3Adoi%2F10.1371%2Fjournal.pone.0081182

Journal Article, Academic Journal

Zhu, M., Wang, W., Liu, B., Huang, J. Improved Prototype Selection in Synergetic Pattern Recognition to Recognize Human Face Expressions. Journal of Algorithms and Computational Technology, 7(4), 541-552. multi-science.metapress.com/content/t471350123317139/?p=d1e2c101b10944458ce0e3bcb8c7d471&pi=6

Journal Article, Academic Journal

Zhu, M., Wang, W., Liu, B., Huang, J. A Fast Image Stitching Algorithm via Multiple-Constraint Corner Matching. Mathematical Problems in Engineering, 2013, 1-6. dx.doi.org/10.1155/2013/157847

Journal Article, Academic Journal

Huang, J., Dou, D., Dang, J., Pardue, J. H., Quin, X., Huan, J., Gerthoffer, W. T., Tan, M. (2012). Knowledge acquisition, semantic text mining, and security risks in health and biomedical informatics. World Journal of Biological Chemistry, 3(2), 27-33. www.ncbi.nlm.nih.gov/pmc/articles/PMC3286791/

Journal Article, Academic Journal (Accepted)

Zhu, M., Wang, W., Huang, J. (in press). Improved Initial Cluster Center Selection in K-Means Clustering. Engineering Computations.

Conference Proceedings

Conference Proceeding

Huang, J., Huan, L., Tropsha, A., Dang, J., Zhang, H., Xiong, M. (2013). Semantics-Driven Frequent Data Pattern Mining on Electronic Health Records for Effective Adverse Drug Event Monitoring (vol. Proc. 2013 IEEE International Conference on Bioinformatics and Biomedicine (BIBM-13), pp. 608-611). IEEE.

Conference Proceeding

Huang, J., Dang, J., Lu, X., Xiong, M., Gerthoffer, W., Tan, M. (2013). Semi-Automated microRNA Ontology Development based on Artificial Neural Networks (vol. Proc. 2013 IEEE International Conference on Bioinformatics and Biomedicine (BIBM-13), pp. 526-529). IEEE.

Johnsten, Tom (Associate Professor)

Conference Proceedings

Conference Proceeding

Landry, J. P., Pardue, J. H., Johnsten, T., Campbell, S. M., Patidar, P. (2011). A Threat Tree for Health Information Security and Privacy (pp. 468). Americas Conference for Information Systems AMCIS. aisel.aisnet.org/amcis2011_submissions/468/

Landry, Jeffrey P. (Full Professor)

Refereed Journal Articles

Journal Article, Academic Journal

Landry, J. P., Daigle, R. J., Pardue, J. H., Longenecker, H. E., Campbell, S. M. (2012). Health Informatics as an ABET-CAC Accreditable IS Program. Information Systems Education Journal, 10(6), 51-62. isedj.org/2012-10/N6/ISEDJv10n6p51.html

Journal Article, Academic Journal

Campbell, S. M., Pardue, J. H., Longenecker, H. E., Barnett, L., Landry, J. P. (2012). Treating the Healthcare Workforce Crisis: A Prescription for a Health Informatics Curriculum. Information Systems Education Journal, 10(3), 35-46. http://isedj.org/2012-10/N3/ISEDJv10n3p35.html

Journal Article, Academic Journal

Longenecker, H. E., Campbell, S. M., Landry, J. P., Pardue, J. H., Daigle, R. J. (2012). A Health Informatics Curriculum Congruent with IS 2010 and IMIA Recommendations for an Undergraduate Degree. Information Systems Education Journal, 10(2), 15-32. isedj.org/2012-10/N2/ISEDJv10n2p15.html

Journal Article, Academic Journal

Landry, J. P., Daigle, R. J., Longenecker, H. E., Pardue, J. H. (2010). IS 2002 and ABET Accreditation: Meeting the ABET Program Outcome Criteria. Information Systems Education Journal, 8(67), 51-62. isedj.org/2012-10/N6/ISEDJv10n6p51.html

Conference Proceedings

Conference Proceeding

Pardue, J. H., Purawat, S., Landry, J. P. (2014). A Database-driven Model for Risk Assessment (vol. 20). Association for Information Systems. http://aisel.aisnet.org/cgi/viewcontent.cgi?article=1611&context=amcis2014

Conference Proceeding

Pardue, J. H., Landry, J. P., Sweeney, R. B. (2013). Wiki Mass Authoring for Experiential Learning: A Case Study (6th ed., vol. 11, pp. 59-70). Information Systems Education Journal. isedj.org/2013-11/N6/ISEDJv11n6p59.html

Conference Proceeding

Landry, J. P., Pardue, J. H., Daigle, R. J., Longenecker, H. E. (2013). A Database Management Assessment Instrument (2nd ed., vol. 11, pp. 63-76). Information Systems Education Journal. isedj.org/2013-11/N2/ISEDJv11n2p63.html

Conference Proceeding

Longenecker, H. E., Campbell, S. M., Landry, J. P., Pardue, J. H., Daigle, R. J. (2011). A Health Informatics Curriculum Congruent with IS 2010 and IMIA Recommendations for an Undergraduate Degree. Proceedings of ISECON 2011.

Conference Proceeding

Landry, J. P., Daigle, R. J., Pardue, J. H., Longenecker, H. E., Campbell, S. M. (2011). Health Informatics as an ABET-CAC Accreditable IS Program. Proceedings of ISECON 2011.

Conference Proceeding

Campbell, S. M., Pardue, J. H., Longenecker, H. E., Barnett, L., Landry, J. P. (2011). Treating the Healthcare Workforce Crisis: A Prescription for a Health Informatics Curriculum. Proceedings of ISECON 2011.

Conference Proceeding

Landry, J. P., Pardue, J. H., Johnsten, T., Campbell, S. M., Patidar, P. (2011). A Threat Tree for Health Information Security and Privacy (pp. 468). Americas Conference for Information Systems AMCIS. aisel.aisnet.org/amcis2011_submissions/468/

Conference Proceeding

Pardue, J. H., Yasinsac, A. F., Landry, J. P. (2010). Towards Internet voting security: A threat tree for risk assessment (pp. 1-7). Montreal, QC: Risks and Security of Internet and Systems (CRiSIS).

Other Intellectual Contributions

Assessment

Yasinsac, A. F., Sweeney, R. B., Pardue, J. H., Landry, J. P., Benham, L. Z., Benham, R. M., Epstein, J. J., Lux, P., Sebes, J., Sancho, I. (2010). Elections Operations Assessment. U.S. Election Assistance Commission. http://www.hp.isc.usouthal.edu/EAC/EOA_Threat_Trees_and_Matrices_and_TIRA_EAC_Boards_Review_Draft_Rev_1.pdf

McDonald, Jeffrey T. (Full Professor)

Book Chapters

Book, Chapter in Scholarly Book-New

Ashbee, W. S., Hively, L. M., McDonald, J. T. (2014). Nonlinear Epilepsy Forewarning by Support Vector Machines. In M. D. Holmes (Ed.), Epilepsy Topics (Ch 3 ed., pp. 18). Croatia: InTech. cdn.intechopen.com/pdfs-wm/46250.pdf

Refereed Journal Articles

Journal Article, Academic Journal

Cazalas, J., Andel, T. R., McDonald, J. T. (2014). Analysis and Categorical Application of LSB Steganalysis Techniques. Journal of Information Warfare, 13(3), 12-22. www.jinfowar.com/

Journal Article, Academic Journal

Andel, T. R., Fritzke, A., Humphries, J. W., McDonald, J. T. (2014). Design and Implementation of Hiding Techniques to Obfuscate Against Side-Channel Attacks on AES. International Journal of Computing & Network Technology, 2(2), 65-72. http://journals.uob.edu.bh/network

Journal Article, Academic Journal

Andel, T. R., Barron, J., McDonald, J. T., Humphries, J. W. (2014). RSA Power Analysis Obfuscation: A Dynamic Algorithmic Hardware Countermeasure. International Journal of Computing & Digital Systems, 3(2), 69-78. journals.uob.edu.bh/computing

Journal Article, Professional Journal (Submitted)

Koenenn, D. P., Andel, T. R., McDonald, J. T. Active Cyber Defense: Approaches and Legality. IEEE Security and Privacy.

Non-Refereed Journal Articles

Journal Article, Academic Journal (Accepted)

McDonald, J. T., Hively, L. M. (in press). Multidisciplinary Approaches for Cyber Security. National Cybersecurity Institute's Journal, 1(2), 12.

Journal Article, Academic Journal (Submitted)

Whitehurst, L. N., Andel, T. R., McDonald, J. T., Al-Assadi, W. Enhancing Security against Software Attacks with Reprogrammable Hardware. Journal of Information Security and Applications (Elsevier).

Conference Proceedings

Conference Proceeding

Carsten, P. W., Andel, T. R., Yampolskiy, M., McDonald, J. T. (2015). In-Vehicle Networks: Attacks, Vulnerabilities, and Proposed Solutions. Oak Ridge, TN: 10th Cyber and Information Security Research Conference (CISRC 2015).

Conference Proceeding

Yampolskiy, M., Andel, T. R., McDonald, J. T., Glisson, W. B., Yasinsac, A. F. Intellectual Property Protection in Additive Layer Manufacturing: Requirements for Secure Outsourcing. Program Protection and Reverse Engineering Workshop (PPREW).

Conference Proceeding

Cazalas, J., Andel, T. R., McDonald, J. T. (2014). In S. Liles (Ed.), Analysis and Categorical Application of LSB Steganalysis Techniques (pp. 25-32). 9th International Conference on Cyber Warfare and Security (ICCWS-2014). toc.proceedings.com/21559webtoc.pdf

Conference Proceeding

Whitehurst, L. N., Andel, T. R., McDonald, J. T. (2014). Exploring Security in ZigBee Networks (pp. 25-28). Oak Ridge, TN: 2014 Cyber and Information Security Research Conference (CISR ’14).

Conference Proceeding (Accepted)

Glisson, W. B., McDonald, J. T., Andel, T. R., Campbell, S. M., Jacobs, M., Mayr, J. (2015). Compromising a Medical Mannequin. Puerto Rico: Americas Conference on Information Systems (AMCIS). www.amcis2015.aisnet.org/

Conference Proceeding (Accepted)

Andel, T. R., Whitehurst, L. N., McDonald, J. T. (in press). Software Security and Randomization through Program Partitioning and Circuit Variation. Scottsdale, AZ: First ACM Workshop on Moving Target Defense (MTD 2014).

Conference Proceeding (Submitted)

Carsten, P., Andel, T. R., Yampolskiy, M., McDonald, J. T., Russ, S. H. A System to Recognize Intruders in Controller Area Network (CAN). 3rd International Symposium for ICS & SCADA Cyber Security Research 2015.

Conference Proceeding (Submitted)

Shropshire, J. D., Chapman, J., McDonald, J. T. Security Outside of the (Mobile) Box. Santa Fe, NM: 15th IEEE HotMobile Conference.

Conference Proceeding (Submitted)

Cazalas, J., McDonald, J. T., Andel, T. R., Stakhanova, N. Probing the Limits of Virtualized Software Protection. ACM: 4th Program Protection and Reverse Engineering Workshop (PPREW).

Other Intellectual Contributions

Abstract (Accepted)

McDonald, J. T., Andel, T. R. (in press). Program Partitioning and Polymorphic Functions A Two-Pronged Approach for Program Protection Research. Software Security and Protection workshop (SSP’14).

Working Paper (Working Paper)

Kynigos, C., Glisson, W. B., Andel, T. R., McDonald, J. T. Utilizing the Cloud to Store Camera-Hijacked Images. Kauai, Hawaii: Hawaii International Conference on System Sciences (HICSS-49). www.hicss.org/

Software

McDonald, J. T. (2014). Program Encryption Toolkit. github.com/usaterj/petgit

Shropshire, Jordan D. (Associate Professor)

Refereed Journal Articles

Journal Article, Academic Journal

Shropshire, J. D., Kadlec, C. (2012). Feeling marginalized: Turnover of Public-Sector IT Professionals. Journal of Emerging Trends in Computing and Information Sciences, 3(6), 848-864.

Journal Article, Academic Journal

Shropshire, J. D., kadlec, C. (2012). Where Are You Going? A Comparative Analysis of Job and Career Change Intentions Among IT Workers in the United States. Journal of Internet Banking and Commerce, 17(2), 1-17.

Journal Article, Academic Journal

Shropshire, J. D., Kadlec, C. (2012). I’m leaving the IT field: the Impact of stress, job insecurity, and burnout on IT professionals. International Journal of Information and Communication Technology Research, 11(2), 153-171.

Journal Article, Academic Journal

Aasheim, C., Shropshire, J. D., Li, L., Kadlec, C. (2012). Knowledge and Skill Requirements for Entry-Level IT Workers: A Longitudinal Study. Journal of Information Systems Education, 23(2), 193-204.

Journal Article, Academic Journal

Shropshire, J. D., French, A. (2011). Handheld versus Traditional Computer Security Threats and Practices: A Comparison of End User Perceptions. The Journal of Internet Electronic Commerce Research, 11(2), 153-171.

Journal Article, Academic Journal

Johnston, A., Warkentin, M., Shropshire, J. D. (2011). The influence of the informal social learning environment on information privacy policy compliance efficacy and compliance intention. European Journal of Information Systems, 20(3), 267-284.

Journal Article, Academic Journal

Shropshire, J. D., Kadlec, C. (2010). The relationship between IT director values and extent of IT disaster recovery planning in the banking industry. International Journal of Information Systems for Crisis and Response Management, 2(2), 54-68.

Journal Article, Academic Journal

Johnston, A., Shropshire, J. D., Warkentin, M. (2010). The influence of the informal social learning environment on information privacy policy compliance efficacy and compliance intention. Journal of Computer Information Systems, 51(1), 41-51.

Journal Article, Academic Journal

Shropshire, J. D., Kadlec, C. (2010). Best practices in IT disaster recovery planning among U.S. banks. Journal of Internet Banking and Commerce, 15(1), 1-11.

Journal Article, Academic Journal (Revising to Resubmit)

Shropshire, J. D., Warkentin, M., Straub, D. Fostering employee compliance with information security policies. MIS Quarterly.

Journal Article, Academic Journal (Revising to Resubmit)

Shropshire, J. D., Warkentin, M. (2014). Personality, attitudes, and intentions: Predicting initial adoption of information security behavior. Computers & Security.

Journal Article, Academic Journal (Submitted)

Shropshire, J. D., Gowan, A. Towards Structured Implementation of Network Security Policies. Journal of Information Systems Security.

Conference Proceedings

Conference Proceeding

Shropshire, J. D. (2014). Extending the cloud with fog: Security challenges & opportunities. Savannah, GA: Proceedings of the 20th Americas Conference on Information Systems.

Conference Proceeding

Shropshire, J. D. (2014). Analysis of monolithic and microkernel architectures: Towards secure hypervisor design. Big Island, HI: Proceedings of the 47th Hawaii International Conference on System Sciences (HICSS).

Conference Proceeding

Shropshire, J. D., Gowan, A. (2013). A Measure for assessing the adequacy of DDOS defenses. Chicago, Il: Proceedings of the 19th Americas Conference on Information Systems.

Conference Proceeding

Turnbull, L., Ochieng, H., Kadlec, C., Shropshire, J. D. (2013). Improving Service Continuity: IT Disaster Prevention and Mitigation for Data Centers. Orlando, FL: 13th Annual ACM Conference on IT Education/IT Research (SIGITE).

Conference Proceeding

Shropshire, J. D., Turnbull, L. (2013). Breakpoints: An analysis of potential hypervisor attack vectors. Jacksonville, FL: Proceedings of IEEE SoutheastCon.

Conference Proceeding

Shropshire, J. D., Gowan, A. (2012). A structured approach to effective access control list tuning. Orlando, FL: Proceedings of the 2012 Workshop on Information Security and Privacy (WISP).

Conference Proceeding

Shropshire, J. D. (2011). Environment, motivation, and systems hardening. Blacksburg, VA: IFIP Dewald Roode Information Security Workshop IFIP WG8.11/WG11.13.

Conference Proceeding

Aasheim, C., Li, L., Shropshire, J. D., Kadlec, C. (2011). I.T. program curriculum recommendations based on a survey on knowledge and skill requirements for entry-level workers. Myrtle Beach, SC: 2011 Annual Meeting of the Southeastern Institute for Operations Research and the Management Sciences (SE Informs).

Conference Proceeding

Shropshire, J. D., Burrell, S., Kadlec, C. (2011). This is not what I signed up for: Job modification and IT worker turnover. Savannah, GA: 41st Annual Meeting of the Southeastern Decision Science Institute.

Conference Proceeding (Accepted)

Campbell, S. M., Langhinrichsen-Rohling, J., Shropshire, J. D., Sweeney, R. B. (in press). A Safety Net for Social Networking: Development of a Predictive Tool for Domestic Terrorism. Southern Association for Information Systems Conference.

Conference Proceeding (Accepted)

Shropshire, J. D., Campbell, S. M., Sweeney, R. B. (in press). Overcoming Privacy Challenges In Mobile-Cloud Computing.

Conference Proceeding (Submitted)

Waziri, I., Shropshire, J. D. A Heuristic Migration Logic Between Firewalls in a Federated Cloud Network. Fort Lauderdale, FL: IEEE SoutheastCon 2015.

Conference Proceeding (Submitted)

Shropshire, J. D. Hyperthreats: Hypercall-Based DoS Attacks. Fort Lauderdale, FL: IEEE SoutheastCon 2015.

Conference Proceeding (Submitted)

Shropshire, J. D. PowerCheck: An Out-of-Band Hypervisor Integrity Monitor. Oakland, CA: 36th IEEE Symposium on Security and Privacy.

Conference Proceeding (Submitted)

Chapman, J., Shropshire, J. D., Kadlec, C. A Taxonomy of Android Vulnerabilities. Savannah, GA: Forty-fifth Annual Meeting of the Southeast Decision Sciences Institute.

Conference Proceeding (Submitted)

Shropshire, J. D., Gowan, A. Characterizing The Traits Of Top-Performing Security Personnel. Newport Beach, CA: ACM SIGMIS Computers and People Research 2015.

Conference Proceeding (Submitted)

Shropshire, J. D., Chapman, J., McDonald, J. T. Security Outside of the (Mobile) Box. Santa Fe, NM: 15th IEEE HotMobile Conference.

Sweeney, Robert B. (Associate Professor)

Conference Proceedings

Conference Proceeding

Pardue, J. H., Landry, J. P., Sweeney, R. B. (2013). Wiki Mass Authoring for Experiential Learning: A Case Study (6th ed., vol. 11, pp. 59-70). Information Systems Education Journal. isedj.org/2013-11/N6/ISEDJv11n6p59.html

Conference Proceeding (Accepted)

Campbell, S. M., Langhinrichsen-Rohling, J., Shropshire, J. D., Sweeney, R. B. (in press). A Safety Net for Social Networking: Development of a Predictive Tool for Domestic Terrorism. Southern Association for Information Systems Conference.

Conference Proceeding (Accepted)

Shropshire, J. D., Campbell, S. M., Sweeney, R. B. (in press). Overcoming Privacy Challenges In Mobile-Cloud Computing.

Other Intellectual Contributions

Assessment

Yasinsac, A. F., Sweeney, R. B., Pardue, J. H., Landry, J. P., Benham, L. Z., Benham, R. M., Epstein, J. J., Lux, P., Sebes, J., Sancho, I. (2010). Elections Operations Assessment. U.S. Election Assistance Commission. http://www.hp.isc.usouthal.edu/EAC/EOA_Threat_Trees_and_Matrices_and_TIRA_EAC_Boards_Review_Draft_Rev_1.pdf

Yampolskiy, Mark (Assistant Professor)

Book Chapters

Book, Chapter in Non-Scholarly Book-New

Yampolskiy, M., Fritz, W., Hommel, W. (2013). Managing Network Quality of Service in Current and Future Internet. Network and Traffic Engineering in Emerging Distributed Computing Applications.

Non-Refereed Journal Articles

Journal Article, Academic Journal

Yampolskiy, M., Horvath, P., Koutsoukos, X. D., Xue, Y., Sztipanovits, J. A Lnguage for Describing Attacks on Cyber-Physical Systems. International Journal of Critical Infrastructure Protection (IJCIP).

Journal Article, Academic Journal

Yampolskiy, M., Hommel, W., Liu, F., Koenig, R., Metzker, M. G., Schiffers, M. (2012). Link repair in managed multi‐domain connections with end‐to‐end quality guarantees. International Journal of Network Management, 22(6).

Journal Article, Academic Journal

Yampolskiy, M., Knittl, S., Liu, F. (2012). A Reference Model for Improving an Inter-Organizational IT Management Tool. International Journal On Advances in Internet Technology, 5(1).

Journal Article, Academic Journal

Yampolskiy, M., Hommel, W., Schmitz, D., Schiffers, M. (2012). Generic Function Schema as a Means for Similar-Fashioned Operations on Heterogeneous Connection Properties. International Journal On Advances in Networks and Services, 4(3).

Journal Article, Academic Journal

Danciu, V. A., Kranzlmüller, D., Metzker, M. G., Yampolskiy, M. (2011). A border-friendly, non-overlay mechanism for inter-domain QoS support in the Internet. Journal of Computing and Information Technology (CIT), 19(4).

Journal Article, Academic Journal

Yampolskiy, M., Hommel, W., Danciu, V. A., Metzker, M. G., Hamm, M. K. (2011). Management-aware inter-domain routing for end-to-end quality of service. International Journal on Advances in Internet Technology, 4(1).

Journal Article, Professional Journal

Hamm, M. K., Knittl, S., Marcu, P., Yampolskiy, M. (2010). Modellierung interorganisationaler IT-Service-Managementprozesse. PIK-Praxis der Informationsverarbeitung und Kommunikation, 33(4).

Journal Article, Academic Journal (Accepted)

Horvath, P., Yampolskiy, M., Koutsoukos, X. D. (in press). Efficient evaluation of wireless real-time control networks. Sensors.

Conference Proceedings

Conference Proceeding

Carsten, P. W., Andel, T. R., Yampolskiy, M., McDonald, J. T. (2015). In-Vehicle Networks: Attacks, Vulnerabilities, and Proposed Solutions. Oak Ridge, TN: 10th Cyber and Information Security Research Conference (CISRC 2015).

Conference Proceeding

Yampolskiy, M., Andel, T. R., McDonald, J. T., Glisson, W. B., Yasinsac, A. F. Intellectual Property Protection in Additive Layer Manufacturing: Requirements for Secure Outsourcing. Program Protection and Reverse Engineering Workshop (PPREW).

Conference Proceeding

Forbes, L., Vu, H., Udrea, B., Hagar, H., Koutsoukos, X. D., Yampolskiy, M. (2014). SecureCPS: Defending a Nanosatellite Cyber-Physical System. SPIE Defense+ Security.

Conference Proceeding

Yampolskiy, M., Vorobeychik, Y., Koutsoukos, X. D., Horvath, P., LeBlanc, H. J., Sztipanovits, J. (2014). Resilient distributed consensus for tree topology. 3rd ACM International Conference on High Confidence Networked Systems (HiCoNS).

Conference Proceeding

Horvath, P., Yampolskiy, M., Xue, Y., Koutsoukos, X. D., Sztipanovits, J. (2013). Reliability Analysis of Wireless Real-Time Control Networks. 22nd International Conference on Computer Communications and Networks (ICCCN).

Conference Proceeding

Yampolskiy, M., Horvath, P., Koutsoukos, X. D., Xue, Y., Sztipanovits, J. (2013). Taxonomy for description of cross-domain attacks on CPS. 2nd ACM international conference on High confidence networked systems.

Conference Proceeding

Galizia, A., Yampolskiy, M., Schiffers, M., Quarati, A., Clematis, A. (2013). Modeling energy savings for job migration in Grid environments. 27th International Conference on Advanced Information Networking and Applications Workshops (WAINA).

Conference Proceeding

Liu, F., Marcu, P., Schmitz, D., Yampolskiy, M. (2012). Rethinking Multi-Layer Multi-Domain Network Monitoring. DFN-Forum Kommunikationstechnologien.

Conference Proceeding

Horvath, P., Yampolskiy, M., Xue, Y., Koutsoukos, X. D., Sztipanovits, J. (2012). An integrated system simulation approach for wireless networked control systems. 5th International Symposium on Resilient Control Systems (ISRCS).

Conference Proceeding

Yampolskiy, M., Horvath, P., Koutsoukos, X. D., Xue, Y., Sztipanovits, J. (2012). Systematic analysis of cyber-attacks on CPS-evaluating applicability of DFD-based approach. 5th International Symposium on Resilient Control Systems (ISRCS).

Conference Proceeding

Galizia, A., Quarati, A., Schiffers, M., Yampolskiy, M. (2012). Influences between performance based scheduling and Service Level Agreements. Euro-Par 2011: Parallel Processing Workshops.

Conference Proceeding

Hanemann, A., Yampolskiy, M., Fritz, W. (2011). Dedizierte Wellenlängenverbindungen als reguläres Dienstangebot der europäischen Forschungsnetze.. DFN-Forum Kommunikationstechnologien.

Conference Proceeding

Yampolskiy, M., Fritz, W. A., Hommel, W., Vuagnin, G., Galeazzi, F. (2011). Manual Multi-Domain Routing for Geant E2E Links with the I-SHARe Tool. The Third International Conference on Evolving Internet.

Conference Proceeding

Yampolskiy, M., Hommel, W., Schmitz, D., Hamm, M. K. (2010). Generic function schema for operations on multiple network QoS parameters. The Second International Conferences on Advanced Service Computing.

Conference Proceeding

Yampolskiy, M., Hommel, W., Lichtinger, B., Fritz, W., Hamm, M. K. (2010). Multi-domain end-to-end (E2E) routing with multiple QoS parameters-considering real world user requirements and service provider constraints. Second International Conference on Evolving Internet (INTERNET).

Conference Proceeding

Yampolskiy, M., Hommel, W., Marcu, P., Hamm, M. K. (2010). An information model for the provisioning of network connections enabling customer-specific End-to-End QoS guarantees. 2010 IEEE International Conference on Services Computing (SCC).

Conference Proceeding (Accepted)

Yampolskiy, M., Schuetzle, L., Vaidya, U., Yasinsac, A. F. (in press). Additive Layer Manufacturing with Metallic Alloys: Security Challenges. International Conference on Critical Infrastructure Protection.

Conference Proceeding (Submitted)

Carsten, P., Andel, T. R., Yampolskiy, M., McDonald, J. T., Russ, S. H. A System to Recognize Intruders in Controller Area Network (CAN). 3rd International Symposium for ICS & SCADA Cyber Security Research 2015.

Conference Proceeding (Submitted)

Davidson, C. C., Dawson, J., Carsten, P., Yampolskiy, M., Andel, T. R. Investigating the Applicability of a Moving Target Defense for SCADA Systems. 3rd International Symposium for ICS & SCADA Cyber Security Research 2015.

Yasinsac, Alec F. (Full Professor)

Books

Book, Scholarly-New

(2012). In A. F. Yasinsac & M. Shamos (Eds.), E-Voting Security (5th ed., vol. 10). IEEE Security and Privacy Magazine.

Refereed Journal Articles

Journal Article, Academic Journal

Pardue, J. H., Yasinsac, A. F. (2011). E-Voting Risk Assessment: A Threat Tree for Direct Recording Electronic Systems. Information Security and Privacy, 5(3), 19-35. www.igi-global.com/article/voting-risk-assessment/58980

Journal Article, Academic Journal

Yasinsac, A. F., Pardue, J. H. (2011). Voting System Risk Assessment: A Process Using Threat Trees. Journal of Information Systems Applied Research, 4(1), 4-16. jisar.org/2011-4/N1/JISARv4n1p4.html

Non-Refereed Journal Articles

Journal Article, Professional Journal

Yasinsac, A. F., Irvine, C. (2013). Is there a Trustworthy Systems Doctor in the House? IEEE Security and Privacy Magazine, 11(1).

Journal Article, Academic Journal

Yasinsac, A. F., Irvine, C. (2011). Automating the Security Analysis Process of Secure Ad Hoc Routing. Simulation Modelling Practice and Theory, 19(9), 2032-2049.

Conference Proceedings

Conference Proceeding

Yampolskiy, M., Andel, T. R., McDonald, J. T., Glisson, W. B., Yasinsac, A. F. Intellectual Property Protection in Additive Layer Manufacturing: Requirements for Secure Outsourcing. Program Protection and Reverse Engineering Workshop (PPREW).

Conference Proceeding

Yasinsac, A. F. (2013). Independent Computations for Safe Remote Electronic Voting. Cambridge, UK: Security Protocols XXI, 21st International Workshop.

Conference Proceeding

Pardue, J. H., Yasinsac, A. F., Landry, J. P. (2010). Towards Internet voting security: A threat tree for risk assessment (pp. 1-7). Montreal, QC: Risks and Security of Internet and Systems (CRiSIS).

Conference Proceeding (Accepted)

Yampolskiy, M., Schuetzle, L., Vaidya, U., Yasinsac, A. F. (in press). Additive Layer Manufacturing with Metallic Alloys: Security Challenges. International Conference on Critical Infrastructure Protection.

Other Intellectual Contributions

Review, Journal

Yasinsac, A. F. (2012). Precision In Elections: Extracting a Precise Result from an Imprecise Process. International Journal of Critical Infrastructure Protection 5, 135-136.

Introduction

(2012). In A. F. Yasinsac & M. Shamos (Eds.), The Realities of Evoting Security (5th ed., vol. 10). IEEE Security and Privacy Magazine.

Assessment

Yasinsac, A. F., Sweeney, R. B., Pardue, J. H., Landry, J. P., Benham, L. Z., Benham, R. M., Epstein, J. J., Lux, P., Sebes, J., Sancho, I. (2010). Elections Operations Assessment. U.S. Election Assistance Commission. http://www.hp.isc.usouthal.edu/EAC/EOA_Threat_Trees_and_Matrices_and_TIRA_EAC_Boards_Review_Draft_Rev_1.pdf

Information Systems

Pardue, John H. (Full Professor)

Refereed Journal Articles

Journal Article, Academic Journal

Grispos, G., Glisson, W. B., Pardue, J. H., Dickson, M. (2015). Identifying User Behavior from Residual Data in Cloud-based Synchronized Apps. Journal of Information Systems Applied Research, 8. www.jisar.org/

Journal Article, Academic Journal

Pardue, J. H., Campbell, A., Campbell, S. M., Wisniewski, P. (2014). Mission Impossible? Putting the Patient Back in Patient Care. Communications of the Association of Information Systems, 34. aisel.aisnet.org/cais/vol34/iss1/19

Journal Article, Academic Journal

Landry, J. P., Daigle, R. J., Pardue, J. H., Longenecker, H. E., Campbell, S. M. (2012). Health Informatics as an ABET-CAC Accreditable IS Program. Information Systems Education Journal, 10(6), 51-62. isedj.org/2012-10/N6/ISEDJv10n6p51.html

Journal Article, Academic Journal

Campbell, S. M., Pardue, J. H., Longenecker, H. E., Barnett, L., Landry, J. P. (2012). Treating the Healthcare Workforce Crisis: A Prescription for a Health Informatics Curriculum. Information Systems Education Journal, 10(3), 35-46. http://isedj.org/2012-10/N3/ISEDJv10n3p35.html

Journal Article, Academic Journal

Longenecker, H. E., Campbell, S. M., Landry, J. P., Pardue, J. H., Daigle, R. J. (2012). A Health Informatics Curriculum Congruent with IS 2010 and IMIA Recommendations for an Undergraduate Degree. Information Systems Education Journal, 10(2), 15-32. isedj.org/2012-10/N2/ISEDJv10n2p15.html

Journal Article, Academic Journal

Huang, J., Dou, D., Dang, J., Pardue, J. H., Quin, X., Huan, J., Gerthoffer, W. T., Tan, M. (2012). Knowledge acquisition, semantic text mining, and security risks in health and biomedical informatics. World Journal of Biological Chemistry, 3(2), 27-33. www.ncbi.nlm.nih.gov/pmc/articles/PMC3286791/

Journal Article, Academic Journal

Pardue, J. H., Yasinsac, A. F. (2011). E-Voting Risk Assessment: A Threat Tree for Direct Recording Electronic Systems. Information Security and Privacy, 5(3), 19-35. www.igi-global.com/article/voting-risk-assessment/58980

Journal Article, Academic Journal

Yasinsac, A. F., Pardue, J. H. (2011). Voting System Risk Assessment: A Process Using Threat Trees. Journal of Information Systems Applied Research, 4(1), 4-16. jisar.org/2011-4/N1/JISARv4n1p4.html

Journal Article, Academic Journal

Landry, J. P., Daigle, R. J., Longenecker, H. E., Pardue, J. H. (2010). IS 2002 and ABET Accreditation: Meeting the ABET Program Outcome Criteria. Information Systems Education Journal, 8(67), 51-62. isedj.org/2012-10/N6/ISEDJv10n6p51.html

Conference Proceedings

Conference Proceeding

Pardue, J. H., Purawat, S., Landry, J. P. (2014). A Database-driven Model for Risk Assessment (vol. 20). Association for Information Systems. http://aisel.aisnet.org/cgi/viewcontent.cgi?article=1611&context=amcis2014

Conference Proceeding

Pardue, J. H., Landry, J. P., Sweeney, R. B. (2013). Wiki Mass Authoring for Experiential Learning: A Case Study (6th ed., vol. 11, pp. 59-70). Information Systems Education Journal. isedj.org/2013-11/N6/ISEDJv11n6p59.html

Conference Proceeding

Campbell, D. J., Baxter, A., Ellis, D. N., Pardue, J. H. (2013). The Choices Project: Piloting a Secondary Transition Planning Database. Washington, DC: ERIC. http://files.eric.ed.gov/fulltext/ED543389.pdf

Conference Proceeding

Landry, J. P., Pardue, J. H., Daigle, R. J., Longenecker, H. E. (2013). A Database Management Assessment Instrument (2nd ed., vol. 11, pp. 63-76). Information Systems Education Journal. isedj.org/2013-11/N2/ISEDJv11n2p63.html

Conference Proceeding

Campbell, D. J., Baxter, A., Ellis, D. N., Pardue, J. H. (2013). The Choices Project: Piloting a Secondary Transition Planning Database. In McBride & M. Searson (Eds.), Proceedings of Society for Information Technology & Teacher Education International Conference 2013 (pp. 4998-5002). Chesapeake, VA: AACE. http://www.editlib.org/p/48922

Conference Proceeding

Longenecker, H. E., Campbell, S. M., Landry, J. P., Pardue, J. H., Daigle, R. J. (2011). A Health Informatics Curriculum Congruent with IS 2010 and IMIA Recommendations for an Undergraduate Degree. Proceedings of ISECON 2011.

Conference Proceeding

Landry, J. P., Daigle, R. J., Pardue, J. H., Longenecker, H. E., Campbell, S. M. (2011). Health Informatics as an ABET-CAC Accreditable IS Program. Proceedings of ISECON 2011.

Conference Proceeding

Campbell, S. M., Pardue, J. H., Longenecker, H. E., Barnett, L., Landry, J. P. (2011). Treating the Healthcare Workforce Crisis: A Prescription for a Health Informatics Curriculum. Proceedings of ISECON 2011.

Conference Proceeding

Pardue, J. H., Patidar, P. (2011). Threats to Healthcare Data: A Threat Tree For Risk Assessment (1st ed., vol. 12, pp. 106-113). International Association for Computer Information Systems. iacis.org/iis/2011/106-113_AL2011_1632.pdf

Conference Proceeding

Landry, J. P., Pardue, J. H., Johnsten, T., Campbell, S. M., Patidar, P. (2011). A Threat Tree for Health Information Security and Privacy (pp. 468). Americas Conference for Information Systems AMCIS. aisel.aisnet.org/amcis2011_submissions/468/

Conference Proceeding

Campbell, D. J., Ellis, D. N., Baxter, A., Pardue, J. H. (2011). Improving Transition Outcomes for Students: the Choices Project. Mobile, AL: OSEP Leadership Mega Conference.

Conference Proceeding

Pardue, J. H., Kyper, E., Singh, R. (2011). Sensitvity Analysis of a MonteCarlo Risk Assessment Model for Voting System Threats. South East Decision Sciences Institute.

Conference Proceeding

Pardue, J. H., Yasinsac, A. F., Landry, J. P. (2010). Towards Internet voting security: A threat tree for risk assessment (pp. 1-7). Montreal, QC: Risks and Security of Internet and Systems (CRiSIS).

Conference Proceeding

Ellis, D. N., Baxter, A., Campbell, D. J., Pardue, J. H., Zito, S. (2010). Improving transition outcomes for students in special education. Riga, Latvia: Division of International Special Education and Services of the Council for Exceptional Children.

Conference Proceeding (Working Paper)

Campbell, S. M., Campbell, A., Pardue, J. H. The Health Informatics Bachelor Degree Program: Lessons and Results from the First Year. Americas Conference on Information Systems.

Other Intellectual Contributions

Technical Report

Campbell, D. J., Baxter, A., Ellis, D. N., Pardue, J. H. (2013). CHOICES Parent Manual (pp. 24).

Assessment

Yasinsac, A. F., Sweeney, R. B., Pardue, J. H., Landry, J. P., Benham, L. Z., Benham, R. M., Epstein, J. J., Lux, P., Sebes, J., Sancho, I. (2010). Elections Operations Assessment. U.S. Election Assistance Commission. http://www.hp.isc.usouthal.edu/EAC/EOA_Threat_Trees_and_Matrices_and_TIRA_EAC_Boards_Review_Draft_Rev_1.pdf

Abstract (Accepted)

Grispos, G., Glisson, W. B., Pardue, J. H., Dickson, M. (2014). Identifying User Behavior from Residual Data in Cloud-based Synchronized Apps. CONISAR (EDSIG Association of Information Technology Professionals).

Technical Report (Accepted)

Campbell, D. J., Baxter, A., Ellis, D. N., Pardue, J. H. (2013). IES Final Performance Report.

Wednesday the 20th. QualityJoomlaTemplates
Copyright © 2012
USA School of Computing

150 Jaguar Drive
Shelby Hall, Suite 2101
Mobile, Alabama 36688-0002

1 (251) 460-6390
University of South Alabama Homepage
ACM
USA Online
Paws
Discovering Web.com
Give to USA
Jag Mail
SOC RSS Feed