Information Assurance

A National Center of Academic Excellence in Information Assurance Education

information assurance

Research and Scholarly Work

The Scholarly Works and Research section brings together peer-reviewed research publications, textbooks, invited presentations, service to the research community, and other scholarly and creative products representing a sample of the expertise at our school. For additional information please see our faculty web pages.

A selection of faculty scholarship from the College of Engineering and Computing posted to NSUWorks.

Laszlo, M., Mukherjee, S. (2015). Iterated local search for microaggregation. Journal of Systems and Software. Volume 100. Pages 15-26.

Guillaume Mercère, Olivier Prot, and José Ramos. (2014). “Identification of parameterized gray-box state space systems: from a black-box linear time-invariant representation to a structured one,” IEEE Transactions on Automatic Control, vol. 59, no. 11, pp. 2873 - 2885.

Raigoza, J., Sun, J. (2014) Temporal join processing with the adaptive replacement cache – temporal data policy. Proceedings of 13th IEEE/ACIS International Conference on Computer and Information Science, June 4-6, 2014, pp. 131-136.

Raigoza, J. and Sun, J. (2014). Temporal join processing with hilbert curve space mapping. Proceedings of the 29th ACM Symposium on Applied Computing, March 24-28, 2014, pp. 839-844.

Snyder, M. M. & Dringus, L. P. (2014). An exploration of metacognition in asynchronous student-led discussions: A qualitative inquiry. Journal of Online Learning Consortium (formerly Asynchronous Learning Networks (JALN).

Marnell, J. W. &, Levy, Y. (2014). Towards a model of factors affecting resistance to using multi-method authentication systems in higher-education environments. Information Security Education Journal, 1(1), 36-44.

Mattord, H. J., Levy, Y., & Furnell, S. (2014). Factors for measuring password-based authentication practices. Journal of Information Privacy and Security, 10(2), 71-94. doi:10.1080/15536548.2014.924812

Lee, A., & Levy, Y. (2014). The effect of information quality on trust in e-government systems' transformation. Journal of Transforming Government: People, Process and Policy, 8(1), 76-100. doi:10.1108/TG-10-2012-0011

Yoas, D., Simco, G. (2014).Using Time-Series Analysis to Provide Long-Term CPU Utilization Prediction.Proceedings of ACM SIGIIT/RIIT 2014.

Yoas, D., Simco, G. (2014). Using Long Term-Prediction for Web Service Network Traffic Load. ITNG '14 Proceedings of the 2014 11th International Conference on Information Technology New Generations.

Terrell, S. (2014). The use of experiential learning styles to predict attrition from a limited residency information systems graduate program. The Online Journal of Applied Knowledge Management, 2(1), 1 – 10.

Lohle, M. & Terrell, S. (2014). Real projects, virtual worlds: coworkers, their avatars and the trust conundrum. The Qualitative Report, 19(15), 1-35.

Terrell, S. (2014). Introduction to the special issue of the American Educational Research Association's online teaching and learning special interest group (SIG-OTL). Internet in Higher Education.

Mason, J., Simco, G. (2013). Target Environment Simulation and its Impact on Architecture Validation. MTV '13 Proceedings of the 2013 14th International Workshop on Microprocessor Test and Verification.

Sun, J., Hong, J. (2013). Index selection: A query pattern mining approach. Proceedings of ACM 2013 Research in Adaptive and Convergent Systems, October 1-4, 2013, pp. 100-106.

Zhou, S., Sun, J. (2013). A novel approach for code match in iris recognition. Proceedings of 12th IEEE/ACIS International Conference on Computer and Information Science, June 16-20, 2013, pp. 123-128.

Yoas, D., Simco, G. (2013). Resource Utilization Prediction: Long Term Network Web Service Traffic. Proceedings of ACM SIGIIT/RIIT 2013.

Wilkins, D., Simco, G. (2013). Download Time Reduction Using Recent Performance- Biased Peer Replacement in Stochastic P2P Content Delivery Networks. Proceedings of MoWNet 2013.

Kevorkian, M., Simco, G. (2013). Improving Academic Quality in a Computer Science Program. Proceedings of WORLDCOMP 2013.

Ellis, T.J. (2013). The Impact of time on sense of community in an asynchronous learningn network. Proceedings of the 46th Hawaii International Conference on System Sciences. Piscatay, NJ:IEEE.

Haraty, R. A., Papadopou.los, A. N., and Sun, J. (2013) Editorial message: Special track on database theory, technology, and applications," in the Proceedings of The 2013 ACM Symposium on Applied Computing, pp. 817.

Scovetta, V. and Ellis, T.J. (2013). Defining leadership as an influence on KM success. Proceedings of the 46th Hawaii International Conference on System Sciences. Piscataway, NJ:IEEE.

Mattord, H. J.,Levy, Y.,& Furnell, S. (2013). Anexpert panel approach ondeveloping a unified systemauthenticationbenchmarking index (USA-BI).International Journal ofInterdisciplinaryTelecommunications andNetworking, 5(2), 32-42.doi:10.4018/jitn.2013040103

Levy, Y., Ramim, M. M., &Hackney, R.A. (2013).Assessing ethical severityof e-learning systemssecurity attacks.Journal ofComputer InformationSystems, 53(3), 75-84.

Mujeye, S., &Levy, Y.(2013). Complexpasswords: How far is toofar? The role of cognitiveload on employeeproductivity.Online Journalof Applied KnowledgeManagement, 1(1), 122-132.

Snyder, M.M. (2013). Kinetic art and transcendental phenomenological analysis. The Qualitative Report, 18 (Research Rookies 1)

Laszlo, M. & Mukherjee, S. (2013). Optimal univariate microaggregation with data suppression. Journal of Systems and Software. 86(3), 677–682.

Snyder, M.M., Dringus, L.P., & Terrell, S.R. (2012). Designing an online dissertation research community of practice. International Journal of Designs for Learning, 3(1), 39-51.

Tejay, G., and Zadig, S. (2012). "Investigating the Effectiveness of IS Security Countermeasures Towards Cyber Attacker Deterrence." Proceedings of the 45th Annual Hawaii International Conference on System Sciences (HICSS'12) 2012, Maui, Hawaii, USA, January 4-7, 2012.

Sun, J. (2012) Mining attribute association in query predicates for access path generation," in Proceedings of ACM 2012 Research in Applied Computation Symposium, pp. 106-111.

P. Lopes dos Santos, J. A. Ramos, and J. L. Martins de Carvalho. (2012). “Identification of a Benchmark Wiener-Hammerstein: A Bilinear and Hammerstein-Bilinear Model Approach,” Control Engineering Practice, Vol. 20, No. 11, pp. 1156 – 1164.

Hejazi(§), S.,& Levy, Y.(2012). The role of responsibility factors of reducing inefficiencies in IS projects on Six Sigma certification in service organizations.International Journal of Information Systems in the Service Sector,4(3), 1-28. doi:10.4018/jisss.2012070101

Nziga, Jean-Pierre & Cannady, James (2012) Minimal dataset for Network Intrusion Detection Systems via MID-PCA: A Hybrid Approach. IEEE Conference of Intelligent Systems 2012. pp.453-460

Levy, Y., & Ramim, M. M. (2012). A study of online exams procrastination using data analytics techniques.Interdisciplinary Journal of E-Learning and Learning Objects, 8, 97-113.***Earlier draft of this paper was therecipient ofThe Best Paper Awardin the Chais 2012 conference***

Yoas, D., Simco, G. (2012). Resource Utilization Prediction: A Proposal for Information Technology Research. Proceedings of ACM RIIT 2012, 25-30.

Heaton, B. & Mukherjee, S. (2012). Record ordering heuristics for disclosure control through microaggregation. ACEEE International Journal on Control System and Instrumentation, 3(1) 22–26.

Dringus, L.P. (2012, June). Learning analytics considered harmful. Journal of Asynchronous Learning Networks, 16(3), 87-100.

Schniederjans, D., Schniederjans, M., & Levy, Y. (2012). Equity theory based strategies for students on overcoming problems in Ph.D. dissertation committees. International Journal of Doctoral Studies, 7, 221-234.

Farid, W., & Mitropoulos, F.J. (2012). Novel lightweight engineering artifacts for modeling non-functional requirements in agile processes. Proceedings of IEEE SoutheastCon 2012.

Tribbey, W., & Mitropoulos, F.J. (2012). Construction and analysis of vector space models for use in aspect mining. Proceedings of the 50th Annual ACM Southeast Conference (ACMSE 2012), 220-225.

Edge, C., & Mitropoulos, F.J. (2012). Modularity tradeoffs with aspect-oriented web-tier security pattern implementations. Third Workshop on Empirical Evaluation of Software Composition Techniques (ESCOT 2012), AOSD 2012, Potsdam, Germany.

Terrell, S. (2012). Mixed-methods research methodologies, The Qualitative Report, 17(1).

Laszlo, M. & Mukherjee, S. (2011). A genetic algorithm for the constrained forest problem. ACEEE International Journal on Information Technology, 1(3), 47–51.

Tejay, G., and Shoraka, B. (2011). "Reducing Cyber Harassment Through de jure Standards: A study on the lack of the information security management standard adoption in the U.S." International Journal of Management and Decision Making, Special Issue on Cyber Harassment Impacts on Corporations and Corporate Valuation, Volume 11, Issue 5/6, pp 324-343.

P. J. Lopes dos Santos, T. P. Azevedo Perdicóulis, G. Jank , J. A. Ramos, and J. L. Martins de Carvalho. (2011). “Leakage detection and location in gas pipelines through an LPV identification approach,” Communications in Nonlinear Science and Numerical Simulation, Vol. 16, No. 12, pp. 4657 – 4665.

Parrish, J. L, Mitchell, R. B., Jensen, B. (2011). The Effect of Technology Choice on Message Form. Journal of Research in Business Information Systems, 4.

Levy, Y. & Ellis, T.J. (2011). A Guide for Novice Researchers on Experimental and Quasi-Experimental Studies in Information Systems Research. The Interdisciplinary Journal of Information, Knowledge, and Management, Volume 6, 151-161.

J. A. Ramos, A. Alenany, H. Shang, and P. J. Lopes dos Santos. (2011). “Subspace Algorithms for Identifying Separable in Denominator 2-D Systems with Deterministic Inputs,” IET Control Theory & Applications, Vol. 5, No. 15, pp. 1748 – 1765.

P. Lopes dos Santos, T. P. Azevedo-Perdicóulis, J. A. Ramos, J. L. Martins de Carvalho, G. Jank, and J. Milhinhos. (2011). “An LPV Modeling and Identification Approach to Leakage Detection in High Pressure Natural Gas Transportation Networks,” IEEE Transactions on Control Systems Technology, Vol. 19, No. 1, pp. 77 – 92.

Snyder, M.M. (2011). Intentional design of an online graduate course using Merrill's first principles: A case in progress. Proceedings of the Association of Educational Communications and Technology, Volume 2, 444-451.

Domínguez-Flores, N., & Wang, L. (2011). Online Learning Communities: Enhancing Undergraduate Students' Acquisition of Information Skills. The Journal of Academic Librarianship, 37(6), 495-503.

Tejay, G., and Lee, A.S. (2011). "A Theory Explaining How an Organization Can Live Up to the Letter, But Not the Spirit, of an Information Security Initiative." Proceedings of the Dewald Roode Workshop on Information Systems Security Research IFIP WG8.11/WG11.13, Blacksburg, Virginia, USA, September 23-24, 2011.

Wang, L. (2010). Integrating communities of practice in e-portfolio assessment: Effects and experiences of mutual assessment in an online course. The Internet and Higher Education, 13(4), 267-271.

Parrish, J. L. (2010). PAPA Knows Best: Ethical Guidelines for Social Networking Sites. Journal of Ethics in Information Technology, 12(2), 187-193.

Lehrfeld, M., Simco, G. (2010). Choke-Based Switching Algorithm inStochastic P2P Networks to Reduce File Download Duration. Proceedings of IEEE SoutheastCon 2010, 127-130.

Farhat, S., Simco, G., & Mitropoulos, F. J. (2010). Using Aspects for Testing
Nonfunctional Requirements in Object-Oriented Systems. Proceedings of IEEE SoutheastCon 2010, 356-359.

Cochran, Theodore & Cannady, James (2010) Not so fast flux networks for concealing scam servers. Fifth International Conference on Risks and Security of Internet and Systems. pp. 1-8

Cannady, James (2010). Detection of Distributed Attacks in Mobile Ad-hoc Networks using Self-organizing Temporal Neural Networks. Second International Conference on Agents and Artificial Intelligence (ICAART). pp. 229-234

Levy, Y., & Green (§), B. D. (2009). An empirical study of computer self-efficacy and the technology acceptance model in the military: A case of a U.S. Navy combat informationsystem.Journal of Organizational and End User Computing, 21(3), 1-23. doi:10.4018/joeuc.2009070101.

Parrish, J. L., Courtney, J. F. (2009). Churchman's Inquirers as Design Templates for Knowledge Management Systems: An Object Oriented Approach. Communications of the ACM, 52(7), 4.

P. L. dos Santos, J. A. Ramos, and J. Martins de Carvalho. (2009). “Identification of Bilinear Systems With White Noise Inputs: An Iterative Deterministic-Stochastic Subspace Approach,” IEEE Transactions on Control Systems Technology, Vol. 17, No. 5, pp. 1145 – 1153.

Terrell, S.R., Snyder, M.M., & Dringus, L.P. (2009). The development, validation, and application of the doctoral student connectedness scale. The Internet and Higher Education, 12, 112-116.

Farhat, S., Simco, G., & Mitropoulos, F. J. (2009). Refining and Reasoning about Nonfunctional Requirements. Proceedings of the 47th Annual ACM Southeast Conference (ACMSE 2009), 1-5.

P. Lopes dos Santos, J. A. Ramos and J. L. Martins de Carvalho. (2008). “Subspace identification of linear parameter varying systems with innovation-type noise models,” International Journal of Systems Science, Vol. 39, No. 9, pp. 897 – 911.

Laszlo, M. & Mukherjee, S. (2009). "Approximation Bounds for Minimum Information Loss Microaggregation". IEEE Transactions on Knowledge and Data Engineering, Volume 21, No. 11, 1643–1647.

Ramim, M. M., & Levy, Y. (2006). Securing e-learning systems: A case of insider cyber attacks and novice IT management in a small university. Journal of Cases on InformationTechnology, 8(4), 24-34. doi: 10.4018/jcit.2006100103

D’Eredita, M. and Barreto, C. (2006). “How does tacit knowledge proliferate? An episodic-based perspective,” Organization Studies, 27(12), 1821-1841.

Terrell, S. (2015). Writing a proposal for your dissertation: guidelines and examples. New York: Guilford Press.

Terrell, S. (2012). Statistics translated: a step-by-step guide to analyzing and interpreting data. New York: Guilford Press.

Paulo Lopes dos Santos, Teresa Paula Azevedo Perdicóulis, Carlo Novara, José A. Ramos, and Daniel E. Rivera (editors). (2011). Linear Parameter-Varying System Identification - New Developments and Trends (Advanced Series in Electrical and Computer Engineering – Vol. 14). World Scientific Publishing, Singapore.

Shneiderman, B., Plaisant, C., Cohen, M. & Jacobs, S. (2010). Designing the
User Interface: Strategies for Effective Human-Computer Interaction
, 5th
edition, Addison Wesley.

Littman, M.K. (2010). Implementing RFID technology in hospital environments. In J. Symonds, ed., Ubiquitous and Pervasive Computing: Concepts, Methodologies, Tools, and Application. Hershey, PA and NY: Information Science Reference.

Littman, M. K. (2010). Implementing RFID technology in hospital environments. In N Wickramasinghe, & E. Geisler, eds. Encyclopedia of Healthcare Information Systems, 705-710.Hershey, PA. and NY: Information Science Reference.

Littman, M.K. (2009). Building wireless grids. In M. Khosrow-Pour, ed. The Encyclopedia of Information Science and Education second edition, Volume 1, 433-437. Hershey, PA and NY: Information Science Reference.

Littman, M. K. (2009). Implementing DWDM lambda-grids. In M. Pagani, ed. The Encyclopedia of Multimedia Technology and Networking. Second edition, 661-667. Hershey, PA and NY: Information Science Reference.

Levy, Y.(2006).Assessing the value of e-learning systems. Hershey, PA:Information Science Publishing.

Laszlo, M. (2001). Object-Oriented Programming featuring Graphical Applications in Java, Addison Wesley.

Dr. Trudy Abramson is the Executive Editor of the Journal of Applied Learning Technology which is a quarterly online publication sponsored by the Society for Applied Learning Technology and published by Learning Technology Institute.

Dr. Laurie P. Dringus is the Editor-in-Chief of The Internet and Higher Education Journal which is a quarterly journal devoted to addressing contemporary issues and future developments related to online learning, teaching, and administration on the Internet in post-secondary settings.

Dr. Yair Levy is a member of the Editorial Review Board for the Journal of Information Management and Computer Security, Computer & Security, Information Security Education Journal, Cases in Information Technology, Journal of Computer Information Systems, Information Systems in the Service Sector, Online Journal of Applied Knowledge Management (OJAKM), and Sage Open.

Dr. Yair Levy is a founding member and President of the International Institute for Applied Knowledge Management (IIAKM)

Dr. Yair Levy is a reviewer of the Journal of Organizational and End User Computing (JOEUC), and the Journal of Future Generation Computer Systems.

Dr. Yair Levy is an IEEE Senior Member and has served as the chair of the proceedings/technical committee for IEEE SoutheastCon both in 2005 and 2015.

Dr. James Cannady is a member of the Editorial Review Board for the International Journal of Information Technology & Decision Making (IJITDM).

Dr. José A. Ramos is a member of the IEEE Control Systems Technology Group and member of the Scientific Committee on System identification and Adaptive Control.

Dr. José A. Ramos is a reviewer for Automatica.

Dr. José A. Ramos is a reviewer for IET Control Theory and Applications.

Dr. José A. Ramos is a reviewer for IEEE Control Systems Technology.

Dr. José A. Ramos is a reviewer for International Journal of Controls.

Dr. José A. Ramos is a reviewer for Control Engineering Practice.

Dr. Martha (Marti) Snyder is the communication manager for the Design and Technology SIG of the American Educational Research Association (AERA). She is also a reviewer for the following associations and journals, AERA, Association for Educational Communications and Technology (AECT), Sloan-C Consortium, Informing Science Institute, South Florida Education Research Conference, International Journal of Doctoral Studies, Internet and Higher Education, and New Horizons in Adult Education and Human Resource Development.

Terrell, S., Associate Editor, The Qualitative Report, 2009 through present.

Terrell, S., Associate Editor, Journal of Research on Technology in Education, 2008 through present.

Dringus, L.P. (online program/course, February 2014). Studying online: A guide for students. Online course for the Teaching Online Project (with lead advisor Karen Swan), Publisher: Epigeum, London.

Dringus, L. P. & Seagull, A. B. (2014). A five-year study of sustaining blended learning initiatives to enhance academic engagement in computer and information sciences campus courses. Book chapter in A. Picciano, C. Dziuban, and C. Graham (Eds.) Blended Learning Research Perspectives: Volume II, New York: Routledge.

Sun, J. (2014) Served as Program Committee Member for the 2014 ACM Research in Adaptive and Convergent System Conference, October 2014.

Sun, J. (2014) Served as Program Committee Member for the 2014 IEEE International Conference on Systems, Man, and Cybernetics, October 2014.

Sun, J. (2014) Served as Program Committee Member for the 2014 International Conference on Software Engineering Research, Management, and Applications, August 2014.

Sun, J. (2014) Served as Program Committee for the 15th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD 2014), July,2014.

Sun, J. (2014) Served as Program Committee for the 13th IEEE/ACIS International Conference on Computer and Information Science (ICIS 2014), June,2014.

Sun, J. (2014) Served as a co-chair for database theory, technology, and application track at ACM Symposium on Applied Computing, March 2014

Sun, J. (2014 Serve as International Program Committee of 2014 IAENG International Multi-Conference of Engineers and Computer Scientists, March 2014.

Sun, J. (2014) Served as Co-Chair of The 2014 IAENG International Conference on Data Mining and Applications, Hong Kong, China, March 2014.

Sun, J. (2014) Served as International Program Committee Member for IASTED International Conference on Artificial Intelligence and Applications (AIA 2014), February 2014.

Stevenson, T. & Terrell, S. (2015). Serving military families: using solution-focused therapy in a virtual environment. Paper presented at The Qualitative Report 6th Annual Conference.

Lohle, M. & Terrell, S. (2015). Real projects, virtual worlds: coworkers, their avatars, and the trust conundrum. Paper presented at The Qualitative Report 6th Annual Conference.

Sowers, B. & Snyder, M.M. (2015). An Investigation of Instructional Designers' Decision-Making in Higher Education. Presentation at the 2015 Annual Meeting of the American Educational Research Association (AERA). April 16-20, 2015, Chicago, IL. Awarded Best Research Presentation for the Design and Technology Special Interest Group.

Fernandez, R. & Snyder, M.M. (2015). Application of Cognitive Apprenticeship in an Online Computer Science 1 Course: A Model Construction and Validation Case. Presentation at the 2015 Annual Meeting of the American Educational Research Association (AERA). April 16-20, 2015. Chicago, IL.

Schladen, M.M. & Snyder, M.M. (2015). Qualitative Researchers: 21st Century Renaissance Women? The Qualitative Report Sixth Annual Conference. January 8-10, 2015. Fort Lauderdale, FL.

Terrell, S., Lohle, & Levy, Y. (2014). Systems analysis from a qualitative perspective: an emerging skills set for information systems professionals. Proceedings of the International Association for Computer Information Systems, Las Vegas, Nevada, 2014

Terrell, S. (2014). The use of experiential learning styles to predict attrition from a limited residency information systems graduate program. Paper presented at the annual KM Conference, Blagoevgrad, Bulgaria.

Cool, K. & Terrell, S. (2013). Virtual Hermeneutics: A New Approach for a Brave New [Virtual] World. Paper presented at The Qualitative Report 4th Annual Conference.

Simonsen, M. & Snyder, M.M. (2013). Skeuomorphs, MOOCs and other (ridiculous) ideas…distance education and higher education. NSU Faculty Symposium. March 7, 2013. Fort Lauderdale, FL.

Abramson, G.T. (2013). Alternative Paths for Today's MBAs. New Learning Technologies 2011, Orlando, FL, March 6, 2013. With Bob Matthews, Ph.D., Helen St. Aubin, Ph.D., and Cordelia Twomey, Ph.D.

Snyder, M.M. (2012). Technology-enhanced learning. Blackboard Teaching and Learning Day, October 9, 2012. Orlando, FL.

Tejay, G. (2012). "Information Security Challenges for Complex Organizations: A socio-organizational perspective." Presented at Center for Advanced Management Studies seminar, Ludwig Maximilian University Munich, Munich, Germany, May 2, 2012.

Abramson, G.T. (2012). As the Technology Evolves: 120 Years of Distance Education. New Learning Technologies 2012, Orlando, FL, February 15, 2012.

Lohle, M. & Terrell, S. (2012). Implications for real project management success: a study of avatar identity as an antecedent of virtual team trust. Paper presented at the annual meeting of the Southwest Decision Sciences Institute, New Orleans, LA.

Snyder, M.M., Terrell, S.R., & Dringus, L., (2012, April). The design of an online dissertation research community of practice (CoP): A design case. Paper presented at the 2012 American Educational Research Association Annual Meeting, Vancouver, B.C., April 12 – May 17, 2012.

Abramson, G.T., Ambrose, G. A. (2011). Next Generation E-Portfolios: Educational, Professional and Personal Applications. Interactive Technologies 2011 SALT Conference, Reston, VA: August 17, 2011.

Tejay, G. (2011). "The Importance of Aligned Information Security Governance." Presented at CISO Executive Summit 2011, annual conference of The Leadership Network, Washington, DC, USA, August 18, 2011.

Abramson, G.T. (2011). The Chief Online Learning Officer (COLO): A Business Imperative. New Learning Technologies 2011, Orlando, FL, February 23, 2011.

Ellis, T.J. (2011). Work in progress: The impact of time on building community in an ALN, Frontiers in Education, Rapid City, SD., October 12 - 15, 2011.

Tejay, G. (2011). "Understanding IS Security Initiative in a Government Organization." Presented at Department of Computer & Electrical Engineering and Computer Science, Florida Atlantic University, Boca Raton, Florida, July 14, 2011.