Part-time, shared (inter departmental, other institution, etc.), adjunct (industry expert, etc.) teaching IA/CD courses

Howard Schmidt:

  • Prof. Howard A. Schmidt,
  • CISSP, CSSLP
  • Former Special Assistant to the President
  • Cybersecurity Coordinator for President Obama
  • Prof. Howard A. Schmidt has had a long distinguished career in defense, law enforcement, and corporate security spanning more than 40 years. He brings together the talents of business, defense, intelligence, law enforcement, privacy, academia and international relations through his distinguished career. He retired as Special Assistant to the President and the Cybersecurity Coordinator for the President Obama. In this role Prof. Schmidt was responsible for coordinating interagency Cybersecurity policy development and implementation and is responsible coordinating engagement with federal, state, local, international, and private sector Cybersecurity partners.
  • Previously, Prof. Schmidt was the President and CEO of the Information Security Forum (ISF), a nonprofit international corporate membership association comprising of approximately 300 members. The ISF conducts research and develops best practices in cyber security, risk management and critical infrastructure protection. Before ISF, he served as Vice President and Chief Information Security Officer and Chief Security Strategist for eBay Inc. He also served in the position of Chief Security Strategist for the US CERT Partners Program for the National Cyber Security Division, Department of Homeland Security.
  • Prof. Schmidt has been a member of the Information Security Privacy Advisory Board (ISPAB) to advise the National Institute of Standards and Technology (NIST), the Secretary of Commerce and the Director of the Office of Management and Budget on information security and privacy issues. He has also been a member of the Permanent Stakeholders Group (PSG) for the European Network Information Security Agency (ENISA). He was a member of the High Level Experts Group (HLEG) for the ITU and the Global Cyber - security Agenda (GCA).
  • Prof. Schmidt holds a bachelor's degree in business administration (BSBA) and a master's degree in organizational management (MAOM) from the University of Phoenix. He also holds an Honorary Doctorate degree in Humane Letters. Howard was an Professor of Practice at GA Tech, GTISC, Professor of Research at Idaho State University and Adjunct Distinguished Fellow with Carnegie Mellon's CyLab and a Distinguished Fellow of the Ponemon Privacy Institute.

Dr. Larry Liebrock

University Teaching and Instructional Experience

    • Associate Dean - Technology Officer, Graduate School of Business, University of Texas. September 1996 to August 2003
    • Teaching Award 1998 -
    • Taught courses in:
      • Cases in Global E-Business
      • Cases in IT Consulting
      • Digital Evidence Investigations, Audits and Forensics
      • Hardware and Software Telecommunications
      • Information Systems Auditing and Systems Security
      • Information Systems Design and Implementation
      • Introduction to Forensics Tradecraft
      • Managing Internet/Intranet Development
      • NT - UNIX Systems Security
      • Project Management Practicum
      • System and Process for Network Auditing and Security
      • Systems Security, Audits and Forensics
    • Other
      • March 2000 - Harvard Business School - Taught MBA Class session: The Trading Server Case with Professor Rob Austin
      • January 2000 - May 2000 - Visiting Professor of Practice - Emory University - Goizueta Business School - Taught College Course in: Frameworks for E-Business Initiatives
      • December 1994 - January 1995, Lecturer - University of Texas - Bachelor and Graduate Level Courses in Digital Systems Analysis and Advanced Internet Techniques and Multimedia in Business Applications
      • September 1994 - December 1994, Lecturer, University of Texas at Austin Competitiveness, National Security and Information Policy (co-taught with Admiral Bob Inman)
      • January 1994 - May 1994, Lecturer, University of Texas at Austin-
    • Professional Interests
      • Digital Forensics - Enterprise Information systems management practices, e-systems security/privacy issues,
      • Digital Information Security Practices: Assessments, Audits, Privacy Protection, Incident Response, Critical Infrastructures and Forensics Frameworks for Digital Data
      • Enterprise Systems - Extranet/Internet/Intranet Systems Management and New Information Technology Deployments - Work Group Support
      • Secure Computing Tools, Cryptographic and Steganographic Mechanisms, Key Infrastructures and Systems Survivability Procedures

Academic Education

      • Ph.D. - Information Sciences, University of Texas, 1994, Concentrations: Information Resources Management, Information Policy, Computer Networking and Systems Management. Dissertation -- The Polysemy of Computer Supported Collaborative Work: Experiments in Cognition, Education and Learning Organizations.
      • M.B.A - University of Texas, 1983 Master Thesis: Adventures in Decision Analysis: Pilot Decision Support System Employing Cardinal Utility Heuristics for Multiple Criteria Problems.
      • Graduate Studies in Area Studies, Operations Research, Computer Sciences, North Carolina State University, 1973-1975
      • B.A - Double Majors in Economics - Political Science and History, Midwestern University, 1970

Academic Appointments

      • Visiting Professor - IMADEC University, Vienna, Austria 2004
      • Associate Dean and Chief Technology Officer - McCombs College of Business Administration and Graduate School of Business -The University of Texas (retired August 2003)
      • J. Anderson Fitzgerald Centennial Fellowship in Information Systems-McCombs Business School - The University of Texas
      • Teaching Lectureships (non-tenured) in the Departments of Management Science and Information Systems, Accounting and Marketing -The University of Texas
      • Adjunct Professor - College of Law - The University of Texas 2001 and 2002
      • Professor of Practice - Goezieta Business School - Emory University - Atlanta 2001-2002
      • Visiting Professor - Helsinki School of Economics 2001-2003
      • Institute Technologica Monterrey (ITESM) - Mexico City and Monterey 2001 and 2002

Professional Experience

  • HQ CENTCOM CJ3/JS/FP/CI MacDill AFB - 06/2012 -GS Grade: 15 Operations Field Officer - Counter Improvised Explosives Devices - Central Asia Serves as subject-matter-expert in improvised Explosive Devices and Home Made Explosives supporting - National Security Strategy, CENTCOM Campaign Plan and CDR ISAF's guidance - Specialized AFPAK knowledge-skills-experience - Senior Member of Joint Chief if Staff AFPAK HAND Program and IRAN CADRE Program - Currently attached - special duty to CENTCOM - Have current TS/Compartmented Intel clearance. Maintain Department of Justice, Homeland Security and Intelligence Community CIED liaisons - Part-time Adjunct Professor - National Intelligence University - Teaching Pakistan Intelligence Issues Graduate Course
  • 7th Special Force Group - Kandahar, Afghanistan - 11/2011 - 06/2012 GS Grade: 15 Served as intelligence/operations officer for Special Forces/Civil Affairs program and operational support for Village Stability Counter-insurgency program - Developed force protection training to meetsuicide bomber, hostile shooter situations and developed/delivered Operating in High Risk Environments (HRE) - Conferred with Installation CDR to review operations security and force-protection requirements were being resolved- Received DOD Civilian Service Award and NATO ISAF Service Award
  • AFGHAN MILITARY ACADEMY Kabul, Afghanistan 01/2011 - 11/2011 - GS Grade: 15 Operations Officer planned, directed, coordinated and supervise the development of personnel conducting COIN training (COIN, Governance, Intelligence and CIED) for US, Allied and GIRoA (Afghan Military and Civilian personnel. Cross functional support for the Installation Operation Center. Provided intelligence training dealing with hostile shooter and IED attacks - Reviewed and supervised the development and implementation of forensics/intelligence training plans, operations, policies to meet collection requirements Implemented an OPSEC/COMSEC program for US and Afghan personnel.
  • Defense Intelligence Agency - AFPAK HAND Augmentation- 09/2009 - 01/2011 GS Grade: 15 Operations Officer utilized prior training, skills and experience in conducting bi-lateral intelligence operations which involved development, planning, direction, coordination and supervision of special intelligence/ops programs. Extensive training and use of photography, special forensics intelligence and HUMINT operations - Identified overall bi-lateral strategic and operation objectives and formulated developmental and operation plans for 25 personnel. With both US and Afghan stakeholders, reviewed and supervised the implementation of operational and strategic plans, policies and other action documents. Expert use of cell phone telephony, GPS and GEOINT tools - Received DOD Civilian Service Award
  • Weapons Technical Intelligence Operations Officer 07/2007 - 12/2009 Excepted Service-JIEDDO PM Office - Department of Defense assigned to Washington DC - Deployed to Iraq and Afghanistan served in 3 deployments to OEF and OIF - Developed, deployed and supervised, cross-functional High-Value-Targets Team conducting CIED initiatives congruent with force-protection guidance and CDR's intent. Identified Special Access Program (SAP) overall objectives and formulated execution plans to meet CDR's guidance. Reviewed and supervised the implementation of interagency plans, reports, policies and directive documents. Delivered special IED briefing to Washington Metro police - Conducted special CIED training for State, Federal interagency partners in suicide attacks and post-blast incident response - Developed and delivered special IED collection training at field location. Delivered special crime-scene photography training for Federal, State and local force protection personnel - Maintained TS/SCI caveats
  • Operation Iraqi Freedom - Forensics Exploitation Operations Officer - Baghdad, Tikrit, Al Anbar, Diyala Iraq 07/2006 - 04/2007 Excepted Service - Operations Officer - Forensics and Exploitation Operations planned, staffed directed, coordinated and supervised the forensics/exploitation plans, collection-operations, skills-training and security programs for special exploitation cell. - Briefed base police and security reaction teams about CIED incident response - Utilized special tools to corroborate responses to tactical questioning and interrogations- Maintained TS Clearance
  • Chief Technology Officer and Senior Lecturer - University of Texas Austin, TX 06/1995 - 07/2006 Served as Chief Technology Officer for University of Texas Business School- Managed complex client/server environment supporting 4000 users- Developed and managed a 3 million dollar cost-recovery budget- Developed a 7/24 hour operations center to support systems availability and security for networks and users support. This operations center was based on detailed understanding and knowledge of installation operation center consistent with enterprise environment service-level agreements- Developed, validated and deployed a layered security framework based on detailed knowledge of site and installation security for information systems.
  • Served as University of Texas senior lecturer in graduate-level courses in:
    1. Information technology management,
    2. Internet Systems and computer security
    3. IT project management and
    4. Digital Forensics
  • Adjunct Professor at Emory University, Texas Instruments MBA, Mexico City MBA, Helsinki School of Economics - Co-Author Harvard Business School Case - Ipremier Denial of Service Attack
  • Served on State of Texas Critical Infrastructure incident planning team - Worked with Texas Incident Response center in responding to malicious penetration attacks - Developed training for Texas State and local government crisis response teams,
  • Battalion Commander (Part-Time) Texas Army National Guard 09/1990 - 09/1994 Served as Battalion Commander for a Mechanized Infantry Battalion located in south Texas- Responsible for all aspects of planning and execution in the areas of budgets, training, readiness, administration and logistics - Responsible for producing a full strength well trained infantry unit capable of being deployed into combat operations upon Federal/State emergency or Federal recall. Unit deployed to meet State disaster and performed at highest level during NTC rotation.

Jonathan Lawson

EDUCATION

  • Ph.D. - Texas Christian University, English, 1970.
  • M.A. - Texas Christian University, English, 1966.
  • B.F.A. - Texas Christian University, Speech (Radio/TV/Film) and English, 1964.
  • A.A. - York College of Pennsylvania, 1962.
  • American Council on Education Fellow in Academic Administration, 1979-80.

Professor Emeritus. Founding Chair, Graduate Department of Educational Leadership & Instructional Design: Supervising Dissertations, Doctoral seminars in Curriculum; Assessment and Accountability; History and Philosophy of Higher Education; Contemporary Issues in Higher Education, Change Theory, Leadership and Organizational Development, The Modern Community College, Government and External Relations, Capstone Seminar. Supervising 11 dissertations. Tenured in 1995. Chair, COE Executive Council.

ADMINISTRATIVE EXPERIENCE

  • Vice President for Academic Affairs, Tenured Professor of English and Education Leadership, Idaho State University, AVP from 1995 - December 2004. A doctoral research, NASULGC/AASCU member institution enrolling 14,000 (2,000 graduate students), ISU consists of the Colleges of Arts and Sciences, Business, Education, Engineering, Health Professions, Pharmacy, Technology and the Graduate School. The university has state-designated leadership in health professions and has responsibility for Idaho's dental education program, a family practice residency program, the national center for the Doctor of Arts degree programs, the Idaho Accelerator Center, The Institute for Nuclear Science and Engineering, and the Idaho Museum of Natural History. Idaho State's outreach centers deliver applied technology programs in a dozen communities, baccalaureate and masters programs in others, and programs through the doctorate in the Idaho Falls Higher Education Center. ISU's distance learning capacities are extensive; over two hundred courses are delivered through interactive microwave, compressed video, or the Internet each term. With 603 full time faculty and 200 part time, the university maintains a 17:1 student-faculty ratio across 220 teaching disciplines. All professional programs hold the available specialized accreditations. The institution has a remarkably flat administrative structure. The vice president is responsible for strategic planning, the colleges and graduate school, libraries, academic computing and distance learning, admissions and financial aid, the registrar, the museum, and the outreach centers. The vice president staffs committees of the State Board of Education, and joins the president in legislative relations work. The vice \president teaches in the Freshman Seminar Program and the doctoral program in Educational Leadership and serves on dissertation committees.
  • Senior Vice President for Academic Affairs and Dean of the Faculty, University of Hartford, December 1985 - 1995. Hartford is an independent, comprehensive institution serving 8,000 undergraduate and graduate students. Nine schools and colleges (Barney School of Business and Public Administration; College of Arts and Sciences; Hillyer College; College of Education, Nursing, and Health Professions; College of Engineering; Hartford Art School; Hartt School of Music; Hartford College for Women; and Ward College of Technology) compose an administratively complex campus with 350 full-time and 500 part-time faculty offering over 120 undergraduate and graduate programs through the doctoral level. Also reporting to Academic Affairs are Admissions and Student Financial Aid, Learning Resources, Graduate Studies, International Programs, the registrar's office, Summer and Special Programs, Professional and Continuing Education, the Grants and Contracts, and Computer Services. Charged with all campus operations in the absence of the President, the Sr. V.P. co-chairs the Budget Advisory Team, and chairs the University Strategic Planning Group and the Council of Deans. Responsible for an operating budget of 60 million dollars and revenues of 70 million dollars, the V.P. also has direct involvement in capital campaign strategy, major donor solicitation and staffs committees of the Board. Served as interim Dean of Engineering, 1993-94 and President, U of H Business School, Paris, France, 1990-1995.
  • Dean of the College of Arts and Sciences, University of Hartford, 1984 - December, 1985. Fourteen departments stage 45 undergraduate programs with majors in the traditional areas of the liberal arts, social sciences, and laboratory science and mathematics as well as professional programs. The College offers five masters degrees and a Psy.D. in Clinical Psychology. Additionally, the College houses such academic support units as the English Language Institute, the Humanities Center, the Learning Skills Center, the Mathematics Lab, the Greenberg Center for Jewish Studies, and the Gilman Center for Technologic Communication. The College has an annual budget of 4.4 million dollars and employs 110 full-time and 155 part-time faculty. In the context of a strong system of faculty governance, the Dean functions as chief academic and fiscal officer of the College, conducts annual merit evaluations of faculty, and recommends to the V.P. on issues of tenure, promotion, and initial and terminal personnel actions. In addition to normal line responsibilities within the College, the Dean serves the University as liaison officer to N.Y.U.'s Faculty Resources Network.
  • Dean of Liberal Arts, Winona State University, 1981 - 1984. Winona State University, one of seven institutions in the Minnesota State University System, is a comprehensive regional university serving approximately 7,000 students. Liberal Arts is the largest administrative unit, encompassing thirteen departments in the Arts, Humanities and Social Sciences; it includes professional programs in Criminal Justice, Mass Communications, Public Administration, Social Work, an A.B.A. approved Paralegal Studies program and a NASM accredited music program. The University Honors Program is also housed in Liberal Arts. The area has 109 full and part-time faculty. The dean in consultation with area chairs develops and presents the area budget for twenty-two cost centers, exercising budgetary control of approximately 3.8 million dollars. As a member of the Academic Deans' Council, the dean recommends on personnel and academic policy issues to the Academic Vice President. In addition to normal line duties, that Liberal Arts Dean has all-university responsibilities for grants, faculty development, and strategic planning.
  • Special Assistant Vice Chancellor for Academic Affairs, Minnesota State University System - temporary assignment, 1980 - 1981. The Assistant Vice Chancellor provides staff assistance to the Vice Chancellor for Academic Affairs and the Chancellor and is a staff member of the System Council of Academic Vice Presidents, providing assistance in academic planning, program development and evaluation. The AVC reviews the System's new academic program proposals and campus grant proposals, prepares legislative briefing materials, writes legislative testimony for System Presidents, assists in collective bargaining contract preparation, and conducts and reports research: specifically, researches and drafts position papers for the Vice Chancellor and State University Board on such issues as programmatic duplication in Minnesota Community Colleges, AVTIs and State Universities. AVC is also Project Director for a three-year, $989,950 faculty development grant from the Bush Foundation to the System and chairs the related Chancellor's advisory committee composed of all Academic Vice Presidents and campus representatives of two bargaining units.
  • The AVC also serves as Project Director for the American Council on Education/State University System Departmental Leadership Institute. Liaison and development for other system grants and projects includes computerization of System library services, a Computerized Clearinghouse and Information Retrieval System (CHAIRS) for the Science and Technology Office of the Minnesota Legislature, cooperative programming with the Science Museum of Minnesota, and Minnesota's Project to Improve the Public Understanding of Liberal Learning (IMPULL).
  • Associate Dean, Liberal Arts and Sciences, St. Cloud State University (SCSU), 1977 - 1981. Saint Cloud State University is a comprehensive regional university serving approximately 14,000 students. The College of Liberal Arts and Sciences was the largest single academic unit in the State University System, with fourteen departments and one center, 255 full-time faculty and more than fifty part-time faculty. The associate dean is responsible for the advising system, academic calendars, and professional development and faculty travel. The associate dean has primary responsibility for student grievances, curriculum development, grants, and liaison with all campus administrative units. The associate dean serves on the Liberal Arts and Sciences Dean's Council, President's Cabinet and Academic Dean's Council (agenda), the Advising Council, New Student Orientation Council, Institutional Review Board for the Protection of Human Subjects, Student Activities Board and other all-university bodies. The associate dean advises the dean on personnel processes, budget and other issues and functions as chief collegiate officer in the dean's absence.
  • Academic Vice President's staff, A.C.E. Fellowship, SCSU, 1979 - 1980. Fellowship year was devoted to learning and participating in all functions of the Vice President's office including personnel and budget processes. Fellow was a visiting member of the President's Cabinet. Duties included curriculum negotiations with bargaining unit faculty.
  • Director of Composition, SCSU, 1971 - 1977. The Director of Composition is responsible for recruitment, selection, training and supervision of teaching assistants. The Director also schedules the department's composition offerings and has responsibilities for curriculum and policy development and implementation, text selection, and student grievances.
  • Assistant to the Graduate Dean, Texas Christian University, Summer, 1969. The assistant reviews theses and dissertations, processes graduate admissions, and directs graduate registration.

TEACHING

  • Professor of English and Higher Education Leadership , Idaho State University, 1995 -- . University of Hartford, 1984 -- 1995.
  • Professor of English, SCSU, 1979. Associate Professor, 1975. Tenure, 1972.
  • Assistant Professor, 1970.
  • Instructor of English, Texas Christian University, 1969-70.
  • Assistant Professor, Evening College, Tarrant County Junior College, 1968-70.

HONORS, GRANTS AND FELLOWSHIPS

  • First Hon. Alumni, Leadership Pocatello, 2002.
  • President's Award, Greater Pocatello Chamber of Commerce, 2001.
  • Co-P.I., AAHE Projects with Promise, Post Tenure Review, 2-year project, 1998-99.
  • Co-P.I., SBOE Technology Innovation Grant, 5 yr. $471K annually. Honorary Membership, Alpha Chi, 1993.
  • Hartford Foundation for Public Giving/CT Commission on the Arts Grant, with Michael Jaffe, Hartt School of Music: $200,000 Project SEAL, an inner-city string music program for junior high students, 1990.
  • Leadership Greater Hartford Program, Class of 1985.
  • Project Director, $898.000 Bush Coundation Grant to Minnesota State University System (MUSU). MSUS Teaching/Learning Grant: Freshman Early Entry Program, SCSU, 1979.
  • Honorary Member, Lambda Iota Tau, International Honor Society in Literature, 1974.
  • Minnesota State University Research Fund Grant: Literary Research in England, Summer, 1972.
  • Texas Christian University Research Foundation Grant: Study at the British Museum, Spring 1969.
  • University Fellowship, Texas Christian University, 1966-69.
  • N.D.E.A. Fellowship, Texas Christian University, 1965-66.

PROFESSIONAL SERVICE AND MEMBERSHIPS

  • National, State, Regional:
    • Board of Dir. Bannock Development Corp, Treas, 1998 - 2003.
    • S.E. Idaho Works Board, 2000 - 2003.
    • Board of Dir. Greater Pocatello Chamber of Commerce, 1998 - 2005.
    • The Renaissance Group, Executive Committee, Board of Governors, 2002-2005.
    • Policy Advisory Board Member, Intermountain Center for Educational Effectiveness, 1999-05.
    • Academic Affairs Resource Center, AASCU. - Council on Academic Affairs, NASULGC.
    • Idaho State Board of Education Task Forces: Minority Affairs, Health Professions, 2000-.05
    • Idaho State Board of Education (SBOE) Committee on Community Colleges, 1997- 98..
    • Academic Affairs Program Committee Staff, Idaho State Board of Education (SBOE), 1995-
    • SBOE Committee on Alternative Educational Delivery Systems, 1996.
    • Board of Trustees, Hartford College for Women, July, 1991 -- 1994.
    • Chair of Board, Asian Studies Consortium (Four college group operating an undergraduate study abroad program in Japan), 1992-- 1994.
    • Regional Advisory Council of Capital Community-Technical College, Hartford, CT. Appointed, Jan., 1990. Reappointed, 1992 -- 94 term.
    • Member, Academic Affairs Think Tank (A2T2), New England Resource Center for Higher Education, UMASS Boston, 1989-1995, with Ernest Lynton, Zelda Gamson, etc.
    • Board of Governors Advisory Committee on Accreditation, Connecticut Council on Higher Education, 1986-91.
    • New England Association of Schools and Colleges (NEASC), Board of Trustees Member -'95,
    • Commission on Institutions of Higher Education (CIHE) - 1992-95. Chair, '95.
    • Member, Task Force on Implementation of Revised Standards, 1992.
    • Chairperson, Institutional Appeals Committee, CIHE, 1992.
  • Seminar Leader:
    • Evaluators' Workshop, September, 1990 & '94. Team Leader Workshop, March, 1991 & '94. Self-Study Workshops, September, 1993 & '94. Seminar for Presidents and System Heads, "CIHE & SPREs", November, 1994.
  • *Team Chair: Green Mountain College, March, 1992. Assumption College, March, 1991. St. Michael's College, March, 1990. (Report chosen as model for evaluation team training by NEASC) Merrimack College, March, 1989. Providence College, September, 1987. Team Member: University of New England, 1986. Maine Maritime Academy, 1986. * Team chairs are primary authors of Evaluation Committee reports and make formal presentations to the Commission on Institutions of Higher Education. -Northwest Association of Schools and Colleges
  • Team Member:
    • Utah State, 1997. Selected to present report to Commission.
    • Eastern Oregon University, October, 1998.
    • Central Washington University, October, 1999.
    • University of Washington, April 2009.
    • University of Montana - April, 2010. **Team Chair:
    • Dixie State College of Utah, October, 2002.
    • University of Nevada, Las Vegas, April, 2003.
    • Southern Utah University, October, 2003.
    • Montana Tech of the U of M, April, 2005.
    • Utah State College, Oct. 2007,
    • Eastern Washington University, April, 2008
    • Bellevue College, October, 2009.
    • Utah Valley University, November, 2010
    • Willamette University, April, 2011.
    • *Capilano University, British Columbia, October 2012.
    • Evergreen State College, October, 2013.
    * Capilano University is the first Canadian University to successfully seek accreditation from a U.S. regional accrediting agency. ** Team chairs are first author of Evaluation Committee Reports and make formal presentations to the NWCCU Commission.
  • Minnesota State U. System Strategic Planning Committee, Chancellor's appointee 1983-84..
  • Executive Secretary, Lambda Iota Tau, International Honor Society in Literature, 1974-80.
  • A.C.E. Departmental Leadership Institute, Project Director, System Workshops, 1980.
  • A.C.E. National Identification Program Panelist, Mankato State University, 1981.
  • A.A.U.P. Council of Minnesota Chapter Presidents, Council Member, 1973-74
  • Local:
    • S.E. Idaho Legislative Tour committee, 2005, 2006.
    • Southeast "Idaho Works" Board, 1999 - 03.
    • Bannock Development Corporation, Board of Directors, 1998-2006. Treas., 2000 - 2006.
    • Board of Directors, Greater Pocatello Chamber of Commerce, 1997-. V.P., 2000 - 05.
    • Leadership Greater Hartford -- Program Participant, Class of 1986.
    • WSU Presidential Search Committee, elected administrative representative, 1983.
    • Acting Honors Director, WSU, 1982-84.
    • Winona United Way, Higher Education Committee, 1984.
    • Winona Area Chamber of Commerce Higher Education Task Force, 1984.
    • Community Theater, St. Cloud, 1975-78.
    • Faculty Senate, SCSU, 1973-75.
    • A.A.U.P. Chapter President, SCSU, 1973-74.

PUBLICATIONS

  • Books:
    • "Robert Bloomfield," Twayne English Authors Series. Boston: G.K. Hall and Company, 1980. Collected Poems (1800-1822) by Robert Bloomfield, 5 vol. in one. Gainesville, Florida: Scholars' Facsimiles and Reprints, 1971.
    • In progress: Regional Accreditation in the United States: It's History and Future.
  • Other:
    • "Redesigning Post-Tenure Review: Meeting Accreditation Requirements," with Ann S. Hunter. In Post-Tenure Faculty Review and Renewal: Experienced Voices -- Creative Solutions. AAHE, 2002.
    • "Robert Bloomfield," British Romantic Poets (1789-1832) First Series. Ed. John Greenfield. In "Dictionary of Literary Biography." Detroit, New York, London: Bruccoli Clark Layman, Gale Research Company, 1990.
    • "Winona State University Campus Plan 1983-1993 with James Reynolds," Winona State University, 1984. Presented to State University Board and State Legislature.
    • "Robert Bloomfield," Reader's Encyclopedia of English Literature. Ed. Edgar Johnson. New York: Thomas Y. Crowell, 1979.
    • "The Survival of English, A Review," Rhetoric Society Quarterly, Vol. 5, No. 1, January, 1975.
    • Associate Editor, The Rhetoric Society Quarterly, 1974-79.
    • Editorial Consultant and Pre-publication Reviewer, 1974-- : Harcourt Brace Jovanovich, D. C. Heath, Little Brown, Random House, Scott Foresman, St. Martins, and Wadsworth. (Field editing or pre-publication reviews of over twenty composition and literature texts).
  • SELECTED PAPERS AND PRESENTATIONS
    • "Resonant Leadership," A Presentation for the Academic Administration at the College of Southern Idaho, December 2, 2009.
    • "Centers for Teaching and Learning," Moderator and presenter, AASCU Academic Affairs Winter Meeting, San Diego, CA, February 7, 2005. (Invited paper).
    • "The Local Impact of the Politics of Evaluation," speaker/panelist, Plenary Session, Commission On Colleges and Universities, Northwest Association of Schools and of Colleges and Universities, Bellevue, Washington, December 14, 2002.
    • "Responding to Evaluation Issues and Accreditation Expectations -- Which Way to Go: Post Tenure Review or Enhanced Annual Review?" moderator and panelist with Dean Linda Hatzenbuehler et at, AAHE Conference of Faculty Roles and Rewards, Tampa, February 2, 2001. (Invited Presentation).
    • "Working with Faculty -- Core Education: Facilitating Change," with Rita Rice Morris, AASCU/AARC Winter Meeting, New Orleans, LA, February 10, 2001. (Invited presentation).
    • "Accreditation: Swimming in Alphabet Soup or Institutional Opportunity,: with Rita Rice Morris, AASCU/AARC Winter Meeting, San Diego, CA, February 14, 2000. (Invited presentation).
    • "Making Lists; Setting Goals: A Collaborative Planning Process for Faculty and Administrators," with Dr. Linda Hill, Faculty Senate Chair and Dean Ranaye Marsh, Sixth Annual AAHE Conference on Faculty Roles and Rewards, Orlando, FL, February 1, 1998.
    • "An Innovative Approach to Study in Japan," Coleman, Narduzzi, Lawson, Colarulli, International Education Forum, 1994. (Book Chapter).
    • "Accreditation and Post Secondary Review Entities (SPREs)," Commission Chair's address at the Annual Meeting, New England Association of Schools and Colleges, Boston, MA, December 8, 1994.
    • "Articulating Values and Vision in a Comprehensive University," with Dr. Elizabeth McDaniel, 32nd Annual Meeting of the Association for General and Liberal Studies, Columbus, OH, October 8-10, 1992. (Invited paper).
    • "Second State Board of Education Symposium: Accountability," Moderator, with Robert D. Kennedy, CEO and Chairman of the Board, Union Carbide Corporation; James R. Oglesby, President, National School Boards Association and David Hornbeck, Chairman of the Board, Carnegie Foundation for the Advancement of Teaching, University of Hartford, March 6, 1990.
    • "The Hartford Half-Tuition Plan: Access for Inner-City Students," an interview with Jeff Cole, New England Sunday Morning, WFSB Television, October 29, 1989.
    • "Beyond Those Boundaries: A Liberal Education Curriculum," with Dr. G. C. Colarulli, 27th Annual Meeting of the Association for General and Liberal Studies, Cincinnati, OH, October 29 - 31, 1988. (Invited paper).
    • "Pulling the Levers: A Seminar on the Practical Aspects of Academic Administration," presented to the 1987 - 88 ACE Fellows Class, Mission Inn, Howie-in-the-Hills, FL, January, 1987. (Invited paper).
    • "Liberal Education in the Late 1980's," Plenary Address to the 16th Annual Conference of the New England Transfer Articulation Association, Newport, RI, April, 1987. (Speaker).
    • "General Education Reform in a Comprehensive University: Lessons Along the Way," with Dr. G. C. Colarulli. Association for General and Liberal Education, Atlanta, GA, November, 1985. (Invited Paper).
    • "The Winona/Rochester Higher Education Controversy," a panel discussion with Ron Semple, Publisher, Winona Daily News, Dr. Andrew Edin, Chair and John Marshall Hobbes, Executive Director, Winona Area Chamber of Commerce, Group W Cable. November, 1983.
    • "Liberal Learning and the Professions: A Discussion of the Influence of the Humanities on Higher Education." Part one of a four part radio series sponsored by the University of Minnesota Rochester Center and broadcast by Minnesota Public Radio, KLSE, February, 1983. (Series rebroadcast by MPR on Morning Edition and Midday, Summer, 1983.) (Discussant).
    • "A Symposium on Basic Writing Skills," sponsored by the departments of English and Philosophy and the Rhetoric Society Quarterly, SCSU, 1979. (Moderator).
    • "Who's Afraid of Virginia Woolf: An Actor's Viewpoint," SCSU Theater Department Symposium in conjunction with Edward Albee's brief residency, 1979. (Discussant).
    • "A Symposium on Hirsh's The Philosophy of Composition," Minnesota Council of Teachers of English, Rochester, MN, Spring, 1978. (Moderator).
    • "Who Should Teach Freshman Composition? The Professional and Ethical Dilemma of Staffing," Wyoming Conference on Freshman and Sophomore English, University of Wyoming, July, 1977. ERIC
    • "Adopting Freshman English Texts: Unified Adoptions vs. Fragmentation," Wyoming Conference on Freshman and Sophomore English, University of Wyoming, July, 1976. ERIC
    • "Graduate Admissions, Fact or Fancy?" American Association of Collegiate Registrars and Admissions Officers, Dallas, April, 1969. Abstract in College and University, Vol. 44, No. 4, 1969. (Panelist).
  • CONSULTING:
    • Presidents of Association of Independent Colleges and Universities in Massachusetts (AICUM), November, 1998: Assessment: Theory and Practice, with Trudy Banta, IUPUI.
    • Sacred Heart University, Fall, 1994: Accreditation as a Tool for Planning.

Thomas A. Ottaway, Ph.D.

  • Dean
  • Professor of Informatics
  • College of Business Idaho State University 921 South 8th Avenue Pocatello, ID 83209-8020

Education

  • Doctor of Philosophy, 1995
  • Texas Tech University
    • College of Business
    • Concentration: Production and Operations Management
    • First Supporting Field: Management Information Systems
    • Second Supporting Field: Computer Integrated Manufacturing
  • Master of Science, 1993
    • Texas Tech University
    • College of Business
    • Concentration: Management Information Systems
  • Bachelor of Science, 1990
    • Wichita State University
    • College of Liberal Arts and Sciences
    • Major: Computer Science
    • Minor: Mathematics

Academic Employment

  • 2001-Present
    Idaho State University
    College of Business
    • Dean (2013-Present)
    • Interim Dean (2012-2013)
    • Associate Dean (2011-2012)
    • Department Chair, Computer Information Systems (2008-2012)
    • Professor of Computer Information Systems (2007-Present)
    • Associate Professor of Computer Information Systems (2003-2007)
    • Assistant Professor of Computer Information Systems (2001-2003)
  • 1999-2001
    Kansas State University
    College of Business Administration Assistant Professor of Management
  • 1995-1999
    University of Montana
    College of Business Administration Assistant Professor of Management
  • 1991-1995
    Texas Tech University
    College of Business Administration Lecturer

Other Work Experience

  • 1985-1991
    The Boeing Company
    Systems Analyst, Computer-Aided Design/Computer-Aided Manufacturing
  • 1980-1982
    Aircraft Porous Media
    Machinist

Refereed Journal Publications

  • Parker, K.R., Chao, J.T., Ottaway, T.A., and Chang, J. (2006). "A Formal Programming Language Selection Process for Introductory Courses." Journal of Information Technology Education, (5), pp. 133-151.
  • Parker, K.R., Ottaway, T.A., & Chao, J.T. (2006). "Criteria for the Selection of a Programming Language for Introductory Courses." International Journal of Knowledge and Learning, 2 (1/2), pp. 119-139.
  • Nitse, P.S., Parker, K.R., Ottaway, T.A., & Krumwiede, D.W. (2004). "The Impact of Color in the E-commerce Marketing of Fashions: An Exploratory Study," European Journal of Marketing, 38 (7/8), pp. 898-915.
  • Bruce B. Niendorf and Thomas A. Ottaway (2003), "Multi-Agent Simulation and Genetic Algorithms: An Investigation of Market Risk Premiums," Journal of Financial and Economic Practice, 1(2), pp. 67-74.
  • Ottaway, Thomas A., Carol L. Bruneau, and Gerald E. Evans (2003), "The Impact of Auction Item Image and Buyer/Seller Feedback Rating on Electronic Auctions," Journal of Computer Information Systems, 43(3), pp 56-60.
  • Niendorf, Bruce B. and Thomas A. Ottaway (2002), "Market Risk Premiums: Investor Incentive to Vary Individual Risk Preferences," Journal of Economics and Finance, 26(1), pp. 77-87.
  • Ottaway, Thomas A., and James R. Burns (2000), "An Adaptive Production Control System Utilizing Agent Technology," International Journal of Production Research, 38(4), pp. 721-737.
  • Ottaway, Thomas A., and James R. Burns (1997), "Adaptive, Agile Approaches to Organizational Architecture Utilizing Agent Technology," Decision Sciences, 28(3), pp. 483-511.

Refereed Conference Papers

  • Ottaway, Thomas A., Kevin R. Parker, and Joseph T. Chao (2006). "The Selection of a Language for Introductory Programming Courses: An Exploratory Survey." Proceedings of the Western Decision Sciences Institute, Waikoloa, Hawaii, April 11-15 (pp. 270-272).
  • Ottaway, Thomas A., and Dennis W. Krumwiede (2005), "Separate and Distinct: Definitions of Supply Chain Scheduling and Supply Chain Coordination," 2005 Proceedings of the Decision Sciences Institute, Decision Sciences Institute.
  • Krumwiede, Dennis W., Kevin R. Parker, Philip S. Nitse, and Thomas A. Ottaway (2004), "Customer Sensitivity to Electronically Reproduced Color Products: Its effect on the Operation of Return Goods." Distribution Business Management Association Annual Conference Proceedings, Distribution Business Management Association.
  • Krumwiede, Dennis W., Philip S. Nitse, Kevin R. Parker, and Thomas A. Ottaway (2003), "Returning Internet Purchased Color Sensitive Products: The Effect On The Supply Chain," 7th International Conference of the Decision Sciences Institute, Decision Sciences Institute.
  • Ottaway, Thomas A. and Bruce B. Niendorf (2002), "Multi-Agent Simulation and Genetic Algorithms: An Investigation of Market Risk Premiums," Decision Sciences Institute 2002 Annual Meeting Proceedings, Decision Sciences Institute.
  • Ottaway, Thomas A. and Kevin R. Parker (2002), "A Conceptual Model of Structural Adaptation in Agent-based Workflow Management Systems." Proceedings of the 2002 Americas Conference on Information Systems (AMCIS 2002), Association for Information Systems.
  • Nitse, Philip S., Kevin R. Parker, Thomas Ottaway, and Dennis Krumwiede (2002), "The Impact Of Consumer Perceptions On E-Commerce Transactions," Proceedings of The International Applied Business Research Conference.
  • Niendorf, Bruce B., and Thomas A. Ottaway (2002), "Time Variation in Investor Risk Preferences, Market Volatility, and Market Risk Premiums," Proceedings of the 53rd International Atlantic Economic Conference, International Atlantic Economic Society.
  • Ottaway, Thomas A., Carol L. Bruneau, and Gerald E. Evans (2001), "The Impact of Auction Item Image and Buyer/Seller Feedback Rating on Electronic Auctions," Proceedings of the Seventh Americas Conference on Information Systems, Association for Information Systems.
  • Niendorf, Bruce B. and Thomas A. Ottaway (2000), "Market Risk Premiums: Investor Incentive to Vary Individual Risk Preferences," Proceedings of the 2000 FMA Annual Meeting, Financial Management Association.
  • Bruneau, Carol L. and Thomas A. Ottaway (2000), "Electronic Auctions: What Is A Picture Worth," Proceedings of the Annual Meeting of the American Society of Business and Behavioral Sciences, American Society of Business and Behavioral Sciences.
  • Willis, Geoffrey P. and Thomas A. Ottaway (1998), "An Investigation of Buffer Size, Data Distribution, Bottleneck Location, and Line Length Impact on the Performance of a Simulated Flow Shop," 1998 Proceedings of the Decision Sciences Institute, Decision Sciences Institute.
  • Ottaway, Thomas A., and Geoffrey P. Willis (1997), "An Adaptive Workflow Management System Utilizing Agent Technology," 1997 Proceedings of the Decision Sciences Institute, Decision Sciences Institute.
  • Ottaway, Thomas A., and Gerald E. Evans (1996), "An Adaptive Information Architecture to Support Business Process Reengineering," 1996 Proceedings of the Decision Sciences Institute, Decision Sciences Institute.
  • Ottaway, Thomas A., and Gerald E. Evans (1996), "Effectiveness of Voluntary Restraint Agreements on the U.S. Machine Tool Industry," 1996 Proceedings of the Decision Sciences Institute, Decision Sciences Institute, (Abstract Only).
  • Evans, Gerald E., Roberta D. Evans, and Thomas A. Ottaway (1996), "Information Systems as Interventions: The Case for Outcomes-Based Evaluations," 1996 Proceedings of the Decision Sciences Institute, Decision Sciences Institute, (Abstract Only).
  • Ottaway, Thomas A. (1995), "An Intelligent and Adaptive Information System for FMS Control," 1995 Proceedings of the Decision Sciences Institute, Decision Sciences Institute.
  • Ottaway, Thomas A. (1995), "A Model and Prototype for Dynamically Adaptive Manufacturing Control," Bulletin of the Fifth Annual Meeting of the Production and Operations Management Society, Production and Operations Management.

Funded Research

  • Consulting Contracts Awarded:
    • 1999-2000 Net-Centric Command and Control Study, United States Navy, $84,226.75

Competitive Grants And Field Research Awarded:

  • 2003 "A Telecommunications Inventory of Southeast Idaho," Idaho National Engineering and Environmental Laboratory, $7,958
  • 2002 Michael C. Ruettgers Initiative, College of Business, Idaho State University, $5,000
  • 1998 Montanans On a New Trac for Science (MONTS), National Science Foundation, $25,000
  • 1997 Summer Research Grant, School of Business Administration, University of Montana, $3000
  • 1996 University Research Grant, University of Montana, $2,200
  • 1996 Summer Research Grant, School of Business Administration, University of Montana, $3000
  • 1995 Summer Research Grant, School of Business Administration, University of Montana, $3000

Awards

  • Recipient, Beta Gamma Sigma Outstanding Teaching Award, 1996-1997.

Professional Affiliations

  • Decision Sciences Institute
  • Association of Computing Machinery
  • Association for Information Systems

Kevin Parker, PhD.

Dr. Kevin Parker joined the Idaho State University faculty in 1999 and is now Chair and Professor of the Informatics and Computer Science department.

Dr. Parker prides himself on being very student-oriented. Although his courses are notable for his demanding expectations, he has always received above-average teaching evaluations. Dr. Parker received the ISU College of Business 2002-2003 Outstanding Teacher Award. He was recognized as a 2010-2011 Outstanding Master Teacher by Idaho State University. That same year he was recognized as the 2011 Faculty Member of the Year by the Associated Students of Idaho State University. In 2012 he was again recognized as one of the 2011-2012 Outstanding Master Teachers by Idaho State University. His courses at ISU have included both introductory and advanced programming, object-oriented development using Java, systems analysis and design, database design, interactive web development, and web development for eCommerce. He has also taught courses for the computer science department.

Born in upstate New York, Dr. Parker was reared in southeastern New Mexico. He graduated second in his high school class of 440 students. His higher education spans Computer Science and Information Systems. He received his undergraduate degree in Computer Science from the University of Texas at Austin in 1982. He was named to the Dean's Honor List each of his semesters at the University of Texas at Austin, where he was selected as a member of the Golden Key National Honor Fraternity.

After completing his undergraduate degree at Texas, he became a Programmer/Analyst for Conoco, Inc., listed in the top five of the Fortune 500 companies. While with Conoco, he also served as an adjunct programming instructor at both the University of the Southwest and New Mexico Junior College (NMJC). NMJC eventually lured him into academia full time.

After teaching computer science classes for several years, he again assumed the role of student at Texas Tech University. He received his Master's degree in Computer Science from Texas Tech in 1991 and then, drawn by the application of computing systems in the business environment, shifted his focus to Information Systems and earned his Ph.D. from Texas Tech in 1995. He maintained a 3.935 grade point average during his graduate studies at Texas Tech University, where he was inducted into Upsilon Pi Epsilon, an honor society in the computing sciences.

Upon graduation from Texas Tech he joined the MIS department at Saint Louis University (SLU), a private Jesuit university in St. Louis, Missouri. During his four years at SLU, Dr. Parker taught management information systems courses in systems analysis and design, database design, object-oriented programming using C++, object-oriented programming using Java, and emerging technologies. He played a major role in undergraduate curriculum revisions as well as in the design of a new Master of Science degree in MIS. He served on numerous recruiting committees to evaluate candidates for both MIS and AIS positions. He founded and served as the faculty advisor for the MIS Club of SLU, which quickly became the largest student organization in the School of Business. He took an active role in involving the business community in the activities of the club and increased the number of MIS majors recruited by the major consulting firms.

His research interests include web accessibility for the elderly, competitive intelligence, knowledge management, e-commerce accuracy, and information assurance in software development. Dr. Parker received the ISU College of Business 2005-2006 Outstanding Research Award, and in 2007 was awarded a Curtin University of Technology Research Fellowship in Perth, Australia.

His hobbies include traveling, hiking, snorkeling, and playing with his dogs. His wife, Lori, is a CPA.

Publications

  • Chao, J. C., Parker, K. R., & Davey, B. (2013). Navigating the framework jungle for teaching web application development. Journal of Issues in Informing Science and Information Technology, 10, 95-109.
  • Chao, J. C., Parker, K. R., & Fontana, A. (2011). Developing a social media interactive learning environment. Journal of Issues in Informing Science and Information Technology, 8, 323-334.
  • Park, J., Fables, W., Parker, K. R., & Nitse, P. S. (2010). The role of culture in business intelligence. International Journal of Business Intelligence Research, 1 (3), 1-14.
  • Parker, K. R. (2010). Selecting software tools for IS/IT curricula. Education and Information Technologies (Special Issue on Information Systems Curriculum), 15 (4), 255-275.
  • Parker, K. R. (2010). The reference list formatter: An object-oriented development project. Interdisciplinary Journal of Information, Knowledge, and Management, 5, 23-48.
  • Trimmer, K., Parker, K. R., & Schou, C. (2009). Functional requirements: The reference monitor and use case. Academy of Information and Management Sciences Journal, 12 (2), 113-119.
  • Parker, K. R., Nitse, P. S., & Tay, A. (2009). The impact of inaccurate color on customer retention and CRM. Informing Science: the International Journal of an Emerging Transdiscipline, 12, 105-112.
  • Parker, K. R., Williams, R. F, Nitse, P. S., & Tay, A. (2008). Use of the normalized word vector approach in document classification for an LKMC. Journal of Issues in Informing Science and Information Technology, 5.
  • Trimmer, K., Parker, K. R., & Schou, C. (2007). Forcing early implementation of information assurance precepts throughout the design phase. Journal of Informatics Education Research, 9 (1), 95-120.
  • Parker, K. R., & Chao, J. (2007). Wiki as a teaching tool. Interdisciplinary Journal of Knowledge and Learning Objects, 3, 57-72.
  • Parker, K. R., & Nitse, P. S. (2007). Bilgi yönetim merkezleri olarak kütüphaneler. (C. Aydýn, Trans.). Journal of Turkish Librarianship, 21 (1), 88-103. Parker, K. R., Chao, J. T., Ottaway, T. A., & Chang, J. (2006). A formal language selection process for introductory programming courses. Journal of Information Technology Education, 5, 133-151.
  • Parker, K. R., Ottaway, T. A., & Chao, J. T. (2006). Criteria for the selection of a programming language for introductory courses. International Journal of Knowledge and Learning, 2 (1/2), 119-139.
  • Parker, K. R. (2005). Lost river wind riders: A project for teaching database design. Communications of the Association for Information Systems, 16 (24), 475-494.
  • Beachboard, J. C., & Parker, K. R. (2005). Understanding information technology: What dgraduates from business-oriented IS curricula need tknow? Journal of Issues in Informing Science and Information Technology, 2, 219-236.
  • Parker, K. R., Nitse, P. S., & Flowers K. A. (2005). Libraries as knowledge management centers. Library Management Journal (Special Issue on Digital Libraries in the Knowledge Era: Knowledge Management and Semantic Web Technology), 26 (4/5), 176-189.
  • Parker, K. R., & Nitse, P. S. (2005). Improving competitive intelligence for knowledge management systems. International Journal of Internet and Enterprise Management (Special Issue on Business Intelligence for Competitive Advantages), 3 (1), 24-45.
  • Parker, K. R., LeRouge, C., & Trimmer, K. (2005). Alternative instructional strategies in an IS curriculum. Journal of Information Technology Education, 4, 43-60.
  • Nitse, P. S., Parker, K. R., Ottaway, T. A., & Krumwiede, D. W. (2004). The impact of color in the e-commerce marketing of fashions: An exploratory study. European Journal of Marketing, 38 (7/8), 898-915.
  • Parker, K. R. (2004). A data model validation approach for relational database design courses. Journal of Issues in Informing Science and Information Technology, 1, 813-825.
  • Nitse, P. S., & Parker, K. R. (2003). Library science, knowledge management, competitive intelligence: Archive theory the common link. The Reference Librarian, 38 (79/80), 395-407.
  • Parker, K. R. (2003). A database design case: Teton whitewater kayak. Journal of Information Systems Education (Special Issue on IS Teaching Cases), 14 (3), 271-274.
  • Nitse, P. S., Parker, K. R., & Dishman, P. L. (2003). Multi-class interest profile applications in the intelligence process. Marketing Intelligence and Planning, 21 (5), 263-271.
  • Parker, K. R. (2002). Using and enhancing online lecture materials. Mountain Plains Journal of Business and Economics, 3.
  • Saxby, C. L., Parker, K. R., Nitse, P. S., & Dishman, P. L. (2002). Environmental scanning and organizational culture. Marketing Intelligence and Planning, 20 (1), 28-34.

Referred Chapters

  • Parker, K. R., & Davey, B. (2012). The history of computer language selection. In A. Tatnall (Ed.), Reflections on the History of Computing: Preserving Memories and Sharing Stories (pp. 166-179). Boston, MA: Springer.
  • Davey, B., & Parker, K. R. (2010). Turning points in computer education. In A. Tatnall (Ed.), IFIP International Federation for Information Processing, Vol. 325 History of Computing: Learning from the Past (pp. 159-168). Boston, MA: Springer.
  • Parker, K. R., & Chao, J. (2008). Weaving a knowledge web with wikis. In M. D. Lytras, R. D. Tennyson, & P. Ordóñez de Pablos (Eds.), Knowledge Networks: The Social Software Perspective (pp. 28-45). Hershey, PA: Information Science Reference.
  • Parker, K. R., Nitse, P. S., & Davey, B. (2008). History of computing education trends: The emergence of competitive intelligence. In J. Impagliazz (Ed.), IFIP International Federation for Information Processing, Vol. 269 History of Computing and Education 3 (pp. 113-127). Boston, MA: Springer.
  • Davey, B., & Parker, K. R. (2006). Language history ‒ A tale of twcountries. In J. Impagliazz(Ed.), IFIP International Federation for Information Processing, Vol. 215 History of Computing and Education 2 (pp. 139-151). Boston, MA: Springer.
  • Parker, K. R. (2006). Enabling technologies for the semantic web. In M. D. Lytras, & A. Naeve (Eds.), Intelligent Learning Infrastructures for Knowledge Intensive Organizations: A Semantic Web Perspective (pp. 39-56). Hershey, PA: Information Science Reference.
  • Parker, K. R., & Nitse, P. S. (2006). Competitive intelligence gathering. In D. G. Schwartz (Ed.), Encyclopedia of Knowledge Management (pp. 44-50). Hershey, PA: Information Science Reference.

Referred Proceeding

  • Beard, D.V., Parker, K. R., Ottaway, T.A., Davey, W.F., & Schou, C.D. (2013). Requiring a systems analysis and design course for a computer science major. Proceedings of the 9th International Conference on Frontiers in Education: Computer Science & Computer Engineering, FECS 2013, July 22-25, Las Vegas, Nevada, USA. CSREA Press.
  • Parker, K. R., & Davey, B. (2011). Applied learning with the virtual teaching assistant. Proceedings of the Seventeenth Americas Conference on Information Systems, Detroit, MI: August 4-7, Paper 24.
  • Davey, B., Parker, K. R., & Lukaitis, A. (2011). e-Government and the elderly: A twcountry comparison. Proceedings of the Seventeenth Americas Conference on Information Systems, Detroit, MI: August 4-7, Paper 171.
  • Davey, B., & Parker, K. R. (2010). Technology in education: An agile systems approach. Proceedings of 2010 Informing Science + Information Technology Education (InSITE) Conference, Cassino, Italy: June 21-24 (pp. 297-306).
  • Trimmer, K., Parker, K. R., & Schou, C. (2008). Functional requirements: The reference monitor and use case. Proceedings of the Academy of Information and Management Sciences, Reno, NV: October 15-17 (p. 264).
  • Chin, K. L., Chang, E., Atkinson, D., & Parker, K. R. (2007). Ontology-based IT pedagogical knowledge framework. Proceedings of the 2007 Computer Science & Information Technology Education Conference, Mauritius: November 16-18 (pp. 155-166).
  • Parker, K. R., Davis, T., & Ward, D. M. (2007). Herbicide damage tracking system: An IS case study. Proceedings of the North American Case Research Association, 21 (10), Keystone, CO: October 18-20 (p. 58).
  • Trimmer, K., Parker, K., & Creelman, J. (2006). Lessons learned in a collaborative development project-documentation for physical therapy education. Proceedings of the International Conference on Informatics Education Research, Milwaukee, WI: December 9-10.
  • Ottaway, T. A., Parker, K. R., & Chao, J. T. (2006). The selection of a language for introductory programming courses: An exploratory survey. Proceedings of the Western Decision Sciences Institute, Waikoloa, HI: April 11-15 (pp. 270-272).
  • Schou, C., Trimmer, K., & Parker, K. R. (2005). Forcing early binding of security using a design reference monitor concept in systems analysis and design courses. Proceedings of the International Conference on Informatics Education and Research, Las Vegas, NV: December 9-11 (pp. 321-331).
  • Nitse, P. S., & Parker, K. R. (2005). Gathering information in the digital age using the semantic web. Frontiers of e-Business Research, Tampere, Finland: September 26-28 (pp. 603-614).
  • Parker, K. R., Trimmer, K., & LeRouge, C. (2005). The REA ontology as an alternative tdata flow diagrams. Proceedings of the 2005 Americas Conference on Information Systems, Omaha, NE: August 11-14 (pp. 2793-2801).
  • Nitse, P. S., & Parker, K. R. (2005). Integrating knowledge management and competitive intelligence intboth the retailing and services businesses. Proceedings of the 12th International Conference on Recent Advances in Retailing and Services Science, Orlando, FL: July 21-24.
  • Bezik, M. H., Smith, K., & Parker, K. R. (2005). SPUD's - A computer-assisted interactive project for use in intermediate accounting courses. 2005 Western Region American Accounting Association Meeting, Sacramento, CA: April 29-30.
  • Parker, K. R., Trimmer, K., & LeRouge, C. (2005). The correspondence between the REA ontology and data flow diagrams. 2005 Western Region American Accounting Association Meeting, Sacramento, CA: April 29-30.
  • Trimmer, K., & Parker, K. R. (2004). Revising instructional strategies in systems analysis and design. Proceedings of the 2004 International Conference on Informatics Education Research, Washington, DC: December 10-12.
  • Nitse, P. S., & Parker, K. R. (2004). Consumer perception of color depicted on e-commerce websites: An exploratory study. Proceedings of the 11th International EIRASS Conference on Recent Advances in Retailing and Services Science, Prague, Czechoslovakia: July 10-13.
  • Krumwiede, D., Parker, K. R., Nitse, P. S., & Ottaway, T. A. (2004). Customer sensitivity telectronically reproduced color products: Its effect on the operation of return goods. Distribution Business Management Association Annual Conference Proceedings, Chicago, IL: May 18-20 (pp. 1-9).
  • Parker, K. R., & Nitse, P. S. (2004). The impact of color inaccuracies on e-commerce sites. Proceedings of the Information Technology & Global Business Research Conference, Cancun, Mexico: March 10-13 (pp. 50-56).
  • Beachboard, J. C., & Parker, K. R. (2003). How much is enough? Teaching information technology in a business-oriented IS curriculum. Proceedings of the 2003 Americas Conference on Information Systems, Tampa, FL: August 4-6 (pp. 3026-3031).
  • Krumwiede, D., Nitse, P. S., Parker, K. R., & Ottaway, T. A. (2003). Returning internet purchased color sensitive products: The effect on the supply chain. Proceedings of the 7th International Conference of the Decision Sciences Institute, Shanghai, China: July 4-8.
  • Ottaway, T. A., & Parker, K. R. (2002). A conceptual model of structural adaptation in agent-based workflow management systems. Proceedings of the 2002 Americas Conference on Information Systems, Dallas, TX: August 9-11 (pp. 1476-1483).
  • Nitse, P. S., Parker, K. R., Ottaway, T. A., & Krumwiede, D. W. (2002). The impact of consumer perception on e-commerce transactions. Proceedings of the International Applied Business Research Conference, PuertVallarta, Mexico: March 14-19, CD-ROM.
  • Parker, K. R. (2001). Techniques tenhance online lecture materials. Proceedings of the 2001 Mountain Plains Management Conference, Pocatello, ID: October 17-19.
  • Aytes, K., & Parker, K. R. (2001). Using the web tcreate a dynamic, interactive learning environment. Proceedings of the 2001 Mountain Plains Management Conference, Pocatello, ID: October 17-19.
  • LeBlanc, R., & Parker, K. R. (2001). A customer-based framework for understanding e-commerce relationships. Proceedings of the International Business & Economics Research Conference 2001, Reno, NV: October 8-12. Received Best Paper Award.
  • Parker, K., & Nitse, P. S. (2001). Improving competitive intelligence gathering for knowledge management systems. Proceedings of the 2001 International Symposium on Information Systems and Engineering (ISE'2001-Workshop: Knowledge Management Systems: Concepts, Technologies and Applications), Las Vegas, NV: June 25-28 (pp. 122-128).
  • Parker, K. R., & Nitse, P. S. (2000). A multi-class interest profile (M-CLIP) for online competitive intelligence systems. Proceedings of the Society of Competitive Intelligence Professionals (SCIP) Academic Conference on Competitive Intelligence: Curriculum and Research, Philadelphia, PA: December 8.

Sean K. Anderson, PhD

  • Professor
  • Political Science

Academic Degrees:

  • Ph.D.--Political Science--University of Oklahoma, 1993
  • M.A.--Political Science--University of Oklahoma, 1992
  • M.B.A.--Business Economics--University of Washington, 1978
  • B.A.--Philosophy and Classical Languages--Western Washington University, 1975

Doctoral Fields:

  • Comparative Politics
  • International Relations
  • American Politics
  • The Impact of Internal Islamic Fundamentalism on Iranian Support for Transnational Terrorism

Professional Experience:

  • Professor--Department of Political Science, Idaho State University, 2003--
  • Associate Professor--Department of Political Science, Idaho State University, 1998--2003
  • Assistant Professor--Department of Political Science, Idaho State University, 1993-1998
  • Graduate Teaching Assistant--Department of Political Science, University of Oklahoma, 1989-1993
  • Research Assistant--Bureau of Government Research, University of Oklahoma, 1988-89
  • Research Analyst--Dalton and Associates, Inc., 1983-88
  • Chief Editor--International Department, Pars News Agency (Tehran), 1980-82

Courses Taught:

  • Introduction to Administrative Process--Idaho State University
  • Introduction to Comparative Politics--Idaho State University
  • Introduction to Politics--Idaho State University
  • Terrorism and Political Violence--Idaho State University
  • Senior Seminar on Religion, Culture and Politics--Idaho State University
  • Resurgence Movements Doctoral Seminar--Idaho State University
  • Political Order and Change--Idaho State University
  • Politics of Developing Nations--Idaho State University
  • Government of the United States--University of Oklahoma and Idaho State University
  • The Middle East: Contemporary Politics and Problems--Oklahoma Center for Continuing Education and Idaho State University

Memberships in Professional Associations:

  • American Political Science Association, Comparative Politics and American Politics sections 1991--
  • Pacific Northwest Political Science Association 1995--
  • Academy of Criminal Justice Sciences 1995--
  • American Society for Industrial Security 1996--
  • International Association for Counterterrorism and Security Professionals 2001--

Professional Writing:

  1. "U.S. Counter-Insurgency vs. Iranian-Sponsored Terrorism," submitted for publication to Low Intensity Conflict & Law Enforcement (Frank Cass publishers) special issue on "Networks, Terrorism, and Global Insurgency," February 2004.
  2. Entry on "Al-Qaeda" accepted for publication in Encyclopedia of International Relations and Global Politics, ed. Martin Griffiths, Routledge: London, 2004.
  3. Book Review of Inside Al-Qaeda: Global Network of Terror by Rohan Gunaratna, Governance: An International Journal of Policy and Administration, Volume 16, Number 4, October 2003 (pp. 625-635).
  4. (with Stephen Sloan), Terrorism: Assassins to Zealots, (Blue Summit Ridge, PA: Rowman & Littlefield/University Press of America, Feb 2003).
  5. (with Stephen Sloan), Historical Dictionary of Terrorism, Second Edition, (Blue Summit Ridge, PA: Rowman & Littlefield/University Press of America, March 2002).
  6. "Warnings versus Alarms: Terrorist Threat Analysis Applied to the Iranian State-Run Media," in Richard Harvey W. Kushner, ed., Essential Readings On Political Terrorism (Lincoln: University of Nebraska Press, May 2002).
  7. Book Review of The Constitution of Iran: Politics and the State in the Islamic Republic by Asghar Schirazi, accepted for publication by Governance: An International Journal of Policy and Administration, Volume 13, Number 3, July 2000 (pp. 409-438).
  8. Book Review of Comparing Asian Politics: India, China, and Japan by Sue Ellen M. Charlton, Social Science Journal, 37 (Winter(1): 2000), 145-160.
  9. "Warnings versus Alarms: Terrorist Threat Analysis Applied to the Iranian State-Run Media," Studies in Conflict and Terrorism, 21 (Fall 1998): 277-303.
  10. (with Stephen Sloan), "Patterns of State-Sponsored Terrorism: A Comparative Study of the 1980s and Changes in the 1990s", in FOA Report on Terrorism, edited by Dr. Gunnar Jervas, (Stockholm, Sweden: Defence Research Establishment, June 1998)
  11. Book Review of Islamic Fundamentalist Terrorism, 1979-95: The Iranian Connection by Edgar O'Ballance, Journal of Conflict Studies, 18 (spring 1998): 161-163.
  12. (with Stephen Sloan), Historical Dictionary of Terrorism, (Metuchen, NJ: Scarecrow Press/University Press of America, 1995).
  13. "Iran: Terrorism and Islamic Fundamentalism," in Edwin G. Corr and Stephen Sloan, eds., Low-Intensity Conflict: Old Threats in a New World (Boulder: Westview Press, 1992), pp. 173-95.
  14. (with David R. Morgan), "Assessing the Effects of Political Culture: Religious Affiliation and County Political Behavior," The Social Science Journal, 28 (Spring 1991): 163-74--presented at the 1989 Southwest Political Science Association Meeting, Little Rock, Arkansas.
  15. "Iranian State Sponsorship of Terrorism," Conflict Quarterly, 11 (Fall 1991): 19-34--presented at the 1990 Conference of the University of Manitoba Counter-Terror Study Centre, Winnipeg, Manitoba.

Other Professional Activities:

  • "Understanding Terrorism and Counter-Terrorism," presented for the Casper College Continuing Education Program Series, Casper, Wyoming, April 25, 2003.
  • "Forum on Iraq" presented on February 11, 2003 at the United Methodist Church of Pocatello, presenting the history and political culture of Iraq, the background of the Ba`thist Party and Saddam Hussein, and the controversy over the purported weapons of mass destruction
  • "The Political Culture of the Middle East," presented for the College of Southern Idaho, Symposium on International Relations Twin Falls, Idaho, November 28, 2002.
  • "Psychology of Terrorists and Terrorist Groups," presented at the McMahon Symposium on International Affairs held in Norman, Oklahoma on February 25, 2002, a public forum at the University of Oklahoma sponsored by the OU School of Journalism.
  • "Iran: Present and Future Prospects", presented for the Casper Committee on Foreign Relations, Casper, Wyoming, December 13, 2001.
  • "Terrorism in the New Millennium," presented for the Student Program Board of Boise State University, Boise, Idaho, October 4, 2001.
  • "Pro-Active U.S. Intervention Overseas and Anti-U.S. State- Sponsored Terrorism: Evidence from the Iranian Case 1980-1990," presented at the the International Relations panel of the Pacific Northwest Political Science Association annual conference held October 19, 2001 in Coeur d'Alene, Idaho.
  • "Understanding What Terrorism Means to Rural Idaho," co-presented with Stephen Sloan Conferences held from August 14 through August 17, 2000, in Twin Falls, Pocatello, and Idaho Falls in conjunction with Idaho Bureau of Disaster Services.
  • "Profiles of Terrorist Groups and Individuals," workshop presented at Idaho At Risk: Domestic Preparedness and Emergency Response to Terrorism Conference" co-hosted by ISU Continuing Education and Special Programs Office and the Federal Emergency Management Agency on July 28, 2000.
  • "Pro-Active U.S. Intervention Overseas and Anti-U.S. State- Sponsored Terrorism: Evidence from the Iranian Case 1980-1990," presented at the conference "Terrorism and Beyond: The 21st Century,"co-sponsored by the Oklahoma City National Memorial Institute for the Prevention of Terrorism and Rand Corporation on March 17, 2000 in Oklahoma City.
  • "International Terrorism in the 21st Century", presented for the Casper Committee on Foreign Relations, Casper, Wyoming, October 28, 1999.
  • Co-Author, Active Learning Guide for American Government, (NewYork: Addison-Wesley, 2000)
  • Participant, joint American Society for Industrial Security and Webster University Education Symposium held June 6-8, 1997 at Webster University, St. Louis, Missouri.
  • "Idaho Elections 1994-1996: The Role of Political Culture in the Making of the Most Republican State," presented at the annual meeting of the Southwestern Social Sciences Association held at New Orleans, March 26 - 29, 1997.
  • "Islamic Fundamentalism, Middle Eastern Terrorism and Future Threats to U.S. Interests," address presented on September 20 at the 1994 annual convention of the American Society for Industrial Security, Las Vegas, Nevada.
  • "Warnings versus Alarms: Terrorist Threat Analysis Applied to the Iranian State-Run Media," paper presented on March 10 at the 1995 annual convention of the Academy of Criminal Justice Sciences, Boston, Massachusetts.
  • "The Abkhazian Secession: Regional and International Ramifications," paper (co-authored with Dennis P. Wilkinson) presented on March 16 before the panel on "Foreign Policy and Regional Relations of the Former Soviet Union" of the 1995 Western Political Science Association Meeting, Portland, Oregon.
  • "Amal and Hizballah: Diversity Within The Shi`a Islamic Resurgence Movements," paper (co-authored with Justin K. Elledge) presented on March 17 before the panel on "Politics of Diversity in Emerging Nations," of the 1995 Western Political Science Association Meeting, Portland, Oregon.

Special Interests and Skills:

  • Policy Interests:
    • Middle Eastern Politics
    • Islamic resurgence
    • transnational terrorism
    • national security policy
    • religion and politics in contemporary American society
  • Languages:
    • Persian
    • Arabic
    • French
    • German
  • Quantitative Methods:
    • econometrics
    • regression and times-series analysis
    • factor analysis
    • discriminant and cluster analysis
  • Honors and Awards:
    • John Leek Scholarship--University of Oklahoma, 1989-1992
    • United States Department of Defense Foreign Languages and Area Studies Fellowship--University of Utah, Summer 1989
    • Distinguished Graduate Awards in Honors Program and Philosophy-- Western Washington University, 1975
  • Personal Interests:
    • Powerlifting
    • Mountaineering and Hiking
    • Old and New Testament Biblical Studies
    • Non-Human Primates

References:

  • Ambassador Edwin G. Corr, University of Oklahoma, Director of Energy Institute of the Americas, Associate Director of the International Program Center
  • Admiral William J. Crowe, Jr. (USN, Ret.), University of Oklahoma, University Professor of Geopolitics emeritus, Senior Fellow, Center for Strategic and International Studies
  • Dr. James A. Aho, Professor of Sociology, Idaho State University
  • Dr. Stephen Sloan, Professor of Political Science, University of Oklahoma
  • Dr. Brent L. Smith, Professor and Chair, Department of Justice Sciences, University of Alabama at Birmingham

Curriculum Vitae

Professor Jill Slay AM PhD




Nationality British and Australian

 

Academic Qualifications

YearQualificationUniversity
2000 PhD Curtin University of Technology, Australia
1994 Graduate Diploma in Further Education University of Southern Queensland, Australia
1990 Graduate Diploma in Applied Computing Central Queensland University, Australia
1975 B.Sc. Hons Engineering (Mechanical) Hatfield Polytechnic (University of Herts) UK.

 

Other Qualifications

YearQualificationUniversity
2012 Strategic Leadership and Culture Mount Eliza Business School, Melbourne.
2005 Leadership Development Program Mount Eliza Business School, Melbourne
1992-94 Mandarin Language: BA Honours Intensive USQ/ Monash / Nanjing Normal University

 

Honours, Professional Memberships and Distinctions

2013
International Information Systems Security Certification Consortium (ISC2) Certified Cyber Forensics Professional
2012
Director and Member of Board of International Information Systems Security Certification Consortium.
2011
Member of the Order of Australia (AM) for service to the information technology industry through contributions in the areas of forensic computer science, security, protection of infrastructure and cyber-terrorism.
2010
Fellow International Information Systems Security Certification Consortium for service to information security industry.
2008
Fellow Australian Computer Society for service to Australian IT research and education.
2004
International Information Systems Security Certification Consortium (ISC2) Certified Information Systems Security Professional.
2002
Member Institute of Electrical and Electronic Engineers.
2002
Adjunct Professor at Idaho State University , National Information Assurance Training and Education Center, designated National Center of Academic Excellence in Information Assurance Education by the National Security Agency.

 

Employment History

2014 ongoing

Director, Australian Centre for Cyber Security Centre, University of New South Wales, Canberra, Australia.

I lead and direct The Australian Centre for Cyber Security (ACCS) is a unique, interdisciplinary cyber security research and teaching centre located at UNSW Canberra. ACCS provides cutting-edge, long-term, international thought-leadership in cyber security through research, education and external engagement, at a time when cyber security is moving to the top of global political, scholarly and commercial agendas.

The center enhances UNSW's existing and emerging research strengths in five broad research areas:

  1. computer and network security
  2. risk management
  3. international politics and ethics
  4. law, regulation and justice and
  5. big data analytics for security

ACCS combines expertise from a range of relevant communities; political, cyber industry, defence, academic, individual and organisational users, and the media. The centre builds on close working relationships with both domestic and international industry and government, including UNSW's unique half-century relationship with Defence.

2012 - 2013

Executive Dean of IT: Polytechnic of Namibia (Namibia University of Science and Technology) / Professor of Forensic Computing, University of South Australia

On an extended sabbatical, I led the School of IT at the Polytechnic of Namibia and managed 50 staff who teach 1000 students at Bachelor, Honours and Masters/PhD level in Networking, Software Engineering and Business Computing. I have redeveloped curriculum in line with IEEE/ ACM/ AIS and am preparing for the transition of the Polytechnic to the Namibia University of Science and Technology at the end of 2013.

I also led a Forensic Computing Research group with 8 members and supervise 2 Masters in the area. I am advising the Namibian President's Department and other Namibian Government Ministries on Cybersecurity issues for both military and civilian applications with a view to developing National Information Security Management policies and supporting the urgent development of Cybercrime legislation in Namibia.

In Australia, I also led the UnISA Information Assurance Research Group and its Forensic Computing lab. I graduated 5 PhDs in 2012 and in 2013 had 4 more students complete their PhD studies. In 2012, I also won another Australian Category 1 NDLERF grant ($300k) and have ongoing grant funded research in Cloud and Mobile forensics at the University of South Australia.

2009 - 2012

Dean: Research/ Professor of Forensic Computing

Division of IT, Engineering and the Environment

University of South Australia, Mawson Lakes, South Australia

In this role I:

  1. Ensured my Division of the University of South Australia made strategic research submissions to the Australian government.
  2. Built University research quality by:
    • Collaborating in development of fellowship and grant application policy;
    • Writing large grants, leading bids and tenders for national collaborative research centres;
    • Reviewing and mediating in complex research ethics disputes;
    • Membership of Research Degrees Committee, Research Policy Committee and 4 other strategic research committees;
    • Leading Excellence in Research Australia Internal Reference groups.
  3. Implemented strategies for focusing and growing Divisional research.
  4. Grew PhD student load by supporting scholarships, developing international relationships and promoting research strength in local and overseas markets (including setting up new international research collaborations in India, Malaysia and China).
  5. Chaired Divisional research management and research degrees committees and managed the research lifecycle of 380 PhD students via a network of 9 Research degree co-ordinators and 10 administrative staff.
  6. Directed the Division's Senior Business Manager and accountants to ensure that key research and research education financial targets from fees, grants, contracting, consulting and commercialisation were being met and that forecasting and budgeting were effectively carried out.

2007 - 2008

Director: Forensic Computing Research

Center Defense and Systems Institute

University of South Australia, Mawson Lakes

During this period (and in my previous position) I established an international research reputation in forensic computer science, IT security, critical infrastructure protection and cyber terrorism. I set up the Information Assurance Research Group and its Foresic Computing lab and led 20 plus researchers and graduate students in a range of research projects in Forensic Computing and set up and developed curriculum and taught a Masters Degree in Forensic Computing and Security which has developed successfully and is about to be offered through OUA.

With a variety of collaborators, I instigated cross-disciplinary research that draws on social science, anthropology, law, drugs and crime, police and justice studies, as well as systems and communications engineering and IT, to achieve its aims.

In this time, I developed trusted relationships with government and industry within an Australian security research agenda and led up to 5 major research projects with law enforcement and industry, and approximately 20 industry based researchers in these tasks. Twenty of my Honours, Masters and PhD graduates produced in this time were employed in developing computer forensic and IT security software and networking solutions for industry and Federal government agencies and in advising industry and government on strategy and policy in this research domain.

I advised both federal and state police and government and was responsible for setting up the National Standards for Forensic Computing software validation and verification in Australia, in conjunction with all state and federal law enforcement and the Australian National Institute of Forensic Science. This involved a team of up to forty researchers and practitioners.

2005 - 2006

Director of International Program

School of Computer & Information Science

University of South Australia, Mawson Lakes

From January 2000 until December 2004, I was Director of International Programs in the School of Computer and Information Science (CIS). This involved:

  • acting as Program Director for all onshore Masters degrees and relationship manager for all CIS transnational programs (more than 1000 students at our peak in HK, Singapore and Malaysia)
  • the oversight of pastoral care and student support for all CIS onshore fee paying international students (approximately 300 students)
  • the development of articulation and credit transfer relationships with transnational partners; • the recruitment and induction of offshore academic staff with trans-national partners

During the period 2000-2006, I also developed and acted as Course Coordinator for a new stream of four courses in the previously untaught University of South Australia specialization of Information Assurance (Holistic Information Security).

  1. Secure and High Integrity Systems: 3rd Year core Computer Science course and taught annually to approximately 400 students in Adelaide, Hong Kong and Malaysia from 2001 to 2006.
  2. Wireless Networking and Security: 4th Year elective course for honours and Masters coursework courses and taught annually to approximately 100 students in Computer Science and Telecommunications Engineering in 2005 and 2006.
  3. Secure and High Integrity Systems M: This course is similar in structure and content to Secure and High Integrity Systems, and was developed for Masters of ICT Management students and is cross-disciplinary with no IT prerequisite.
  4. Forensic Computing: Tools and Techniques: 4th Year elective course for honours and Masters coursework in Engineering and ICT developed in collaboration with South Australian and New South Wales Police.

Research Income

  • 2013: Evidence-based Digital Forensic Framework for Cloud Computing and Solid State Drives - ZAR 400,000 Chief Investigator withProfessor Hein Venter (University of Pretoria) on a South African NRF Grant.
  • 2013: Cloud Forensics - Australian National Drug Law Enforcement Research Fund (Cat 1) - $265,000. Development of forensic tools for the investigation into cloud forensics. Commencing.
  • 2011: Fulbright Grant - Securing Our Cyber Future - $30,000. Chief Investigator with Dr Raymond Choo.
  • 2011: Detecting Hidden Groups in High Dimensional Network Structures - Defence Science and Technology Organisation - $360,000.
  • Chief Investigator with Dr Belinda Chiera and Professor Lang White
  • 2010: Mobile Phone Forensics - Australian National Drug Law Enforcement Research Fund (Cat 1) - $300,000 Chief Investigator: Development of forensic tools for the investigation into mobile phone forensics. Still ongoing with several State Police agencies
  • 2009: Relationship between the usage of Information and Communication Technologies (ICT) by Muslim, migrant and second generation Australian youth and social and political Participation in Australian Society and access to Services. - Department of Immigration and Citizenship $88,000. Lead Chief Investigator with Professor Pal Ahluwalia: a cross-disciplinary report on best practice for Government.
  • 2009: Data Exploitation for Critical Infrastructure Protection: Gathering Intelligence from Digital Evidence Collected from IT Networks and Process Control Systems. Australian Research Council $560,000. Chief Investigator: Future Fellowship.
  • 2008: Extraction of Electronic Evidence from Voice over Internet Protocol - Australian Research Council Linkage Grant $78,000. Chief Investigator :A methodology, and proof-of-concept application, to collect electronic evidence dynamically from networks where VoIP conversations play an important role in suspected criminal activity or communications. Led team of 20 plus scattered across Australia.
  • 2008: Australian Department of Prime Minister and Cabinet National Security Science and Technology (PMC-NSST- Cat 1) Grant $60,000. Sole Chief Investigator: SCADA Security and Forensic Architectures.
  • 2007: VoIP Privacy and Forensics - Australian Research Council Discovery Grant $80,000. Sole Chief Investigator: Extension of the investigation into the effect of VoIP on user privacy and the ability of law enforcement to carry out forensic analysis.
  • 2007: Validation and Verification of Electronic Evidence: Developing a Testing Regime for Digital Forensic Software Reliability - Australian Research Council Linkage Grant $132,000. Chief Investigator: A functional analysis of the Electronic Evidence preservation and analysis processes currently used to provide national specifications for forensic software development, tool testing and validation. Led team of 20 plus scattered across Australia.
  • 2006: VoIP Privacy and Forensics - Federal Department of Communications, IT and the Arts (DCITA) Telecommunication Research Grant (Cat 1) $68,000. Chief Investigator: The effect of VoIP on user privacy and the ability of law enforcement to carry out forensic analysis
  • 2006: Forensic Tools for Internet-mediated drug crime - funded by Australian National Drug Law Enforcement Research Fund (NDLERF - Cat 1) - $195,000. Chief Investigator: Development of forensic tools for the investigation of internet mediated drug crime and a comprehensive review of the nature of the major types of drug crime in Australia. The use of the Internet within such drug crimes was also being determined and suitable software solutions were developed. Worked with several Australian Government departments and multiple team members.

Selected Editorial Boards, Conference Organisation, Reviews, Thesis Examination.

  • Editor-in-Chief Information Security Journal: A Global Perspective. Taylor and Francis
  • Associate Editor of the International Journal of Digital Crime and Forensics
  • Member of the Editorial Boards of:
    • Journal of Digital Forensics, Security and Law (USA)
    • Journal of Small Device Forensics
  • Joint Chair of the First National Forensic Practitioners Conference in Adelaide 2008
  • Joint Program Chair of ARES 2008; Workshop Chair 2008, 2009, 2010, 2011
  • Member of the Conference Committees of:
    • Australian Computer Science week - AISC 2012, 2013, 2014
    • DFIS-2013
    • ICCSM 2013
    • ICDFI 2012, 2103
    • ISSA 2013
    • E-Forensics 2008, 2009
    • Colloquium on Information Systems Security Education (CISSE) 2005, 2006
    • SEC 2004- IFIP 11.1 Workshop and WISE 4 IFIP 11.8 Workshop
    • 5th , 6th , 7th Australian IW Conference
    • 2nd and 3rd Australian Computer Forensics Conference
    • InfoSec 2004
    • 2nd , 3rd , 4th and 5th European Information Warfare Conferences
    • 1st and 2nd Australian InfoSec Conferences, 2003 and 2004
    • EICAR 2004, 2005, 2006
  • Examined 17 PhD theses and 2 research Masters theses in IT Security and Forensic Computing, and 2 PhDs in online learning environments
  • Research Assessor for Australian Research Council 2009, 2010, 2011, 2012
  • Evaluator for South African National Research Foundation rating scheme 2009, 2010
  • Expert Evaluator in Security for EU Framework 7, 2011

PhD Completions

  1. Dr Benjamin Turnbull 2007- Wi-Fi as Electronic Evidence: Policy, Process and Tools- now DSTO Senior Scientist.
  2. Dr Jason Beckett 2008- Forensic Computing: A Deterministic Model For Validation And Verification Through An Ontological Examination Of Forensic Functions And Processes- now Research Leader at an Australian Federal Government Lab.
  3. Dr Yi Chi Lin 2008 - A Study of Computer Forensics from A Cross-Cultural Perspective: Australia and Taiwan - now at SAPOL Forensic Computing Lab.
  4. Associate Professor Ray Hunt 2009 - Development of Internet Technology, Infrastructure and Security- now at University of Canterbury, NZ
  5. Dr Sameera Mubarak 2009 - Awareness of Computer Crime and its impact on Information Security Management among law practices in relation to trust accounts: Guidelines for best practice - Lecturer at University of South Australia
  6. Dr Matt Simon 2012 - Physical Memory Forensics for Investgating Internet-based communication Technologies-now at SAPOL Forensic Computing Lab
  7. Dr Grant Osborne 2012 - The ExPlore, Investigate and Correlate Process for Information Visualisation in Digital Forensics - now DSTO Scientist.
  8. Associate Professor Dhenesh Virallikattur 2012 - Integrated Tool-support for small Team meetings within Organisations- VIT India
  9. Dr Sally Legg 2012 - Environmental Law- University of South Australia
  10. Dr Allan Watt 2013 - Development of a Framework for the Investigation into the Methods Used for the Electronic Trafficking and Concealment of Child Abuse Material - now at NSW Police / Macquarie University.
  11. Dr Angela Irwin - Money laundering and terrorism financing in virtual environments: a feasibility study - UniSA
  12. Dr David Irwin - The Extraction of Electronic Evidence form the Voice over IP Protocol - UniSA
  13. Aswami Arrifin - A General Model of Forensic Data Recovery Framework for Digital CCTV Systems - now, and previously, CTO Cybersecurity Malaysia

PhD Ongiong

  1. Ben Martini- Cloud forensics - UniSA
  2. Suhailia - SCADA System Security Measures for Critical Infrastructures - UniSA
  3. John Shimaneni - A Forensic Framework for Namibia - NUST and Pretoria.

Research Reports

  • Slay, J., Gordon, S., & Zhao, WQ., 2005. Mobile Communications and Customer Confidence: Closing the Security Gap. Prepared for Department of Communications, Information Technology and the Arts
  • Slay, J.,& Simon, M., 2007. Voice over IP: Privacy and Electronic Evidence Implications. Prepared for Department of Communications, Information Technology and the Arts. Defence and Systems Institute. University of South Australia.
  • Turnbull, B., & Slay, J., 2009. Tools to Police Internet-Based Drug Crime. Developed for the National Drug Law Enforcement Research Fund and summary to be published as a Research Monograph.

Invited Plenary Addresses at Conferencs

  1. Plenary Address SecureAsia@Beijing, 7-8 August 2014
  2. Plenary Address SecureAsia@Manila, 7-8 August 2013, 'Mobile Phone forensics'
  3. Keynote Address Secure Johannesburg, November 2012, 'Cloud forensics'
  4. Plenary Address SecureAsia@Jakarta 26-27 July 2011, 'Cloud forensics'
  5. Plenary Address Secure Sydney, July 2011, 'Cloud forensics'
  6. Plenary Address Cyber security Malaysia , July 8th 2009. 'Developing a Forensics Plan for SCADA Networks
  7. Plenary Address SCADA Security and Controls. Singapore 2009. 'Developing a Forensics Plan for SCADA Networks
  8. Keynote speaker 10th Cyberspace, Cyber-security, Cybercrime and Cyber-law Conference 2009, Fu Jen University , Taiwan. 'SCADA and process control system security and forensics'
  9. Keynote Speaker ITARC Singapore 2008, 'A Systems Approach to SCADA Security Architecture'
  10. Invited Speaker Australasian Areva Users Conference 2008. 'Cyber- Security and Forensics for SCADA'
  11. Keynote Speaker Secure HK Conference 2008. 'SCADA Security and Forensics'
  12. Keynote Speaker Bridgepoint Australia IT Security Forum 2008. 'SCADA Security and Forensics'
  13. Keynote Speaker E-Forensics 2008, Adelaide University. Voice over IP and forensics'
  14. Keynote Speaker Central Police University, Taiwan, 2007. 'Advances in Forensic Computing research'

Selected Publications 2007 - 2014

Book Chapters

  1. S Ismail, E Sitnikova, J Slay 2014.Towards Developing SCADA Systems Security Measures for Critical Infrastructures against Cyber-Terrorist Attacks'. ICT Systems Security and Privacy 'Protection, 242-249.
  2. Arrifin, A., Slay, J & Choo, R. 2013. 'Digital CCTV forensics: Recovery of data stored in proprietary-formatted files on a CCTV hard disk' . Advances in Digital Forensics IX, Springer
  3. Irwin, D & Slay, J. 2011.' A Digital Forensic Tool For The Extraction Of Electronic Evidence From The Voice Over Internet Protocol'. Advances in Digital Forensics V7. Volume 338 of Advances in Information and Communication Technology; Springer-Verlag GmbH, Boston (accepted 20/1/2011)
  4. Guo, YH., & Slay, J., 2010. 'Data Recovery Function Testing for Digital Forensic Tools' in Advances in Digital Forensics VI. Volume 337 of Advances in Information and Communication Technology; Springer-Verlag GmbH, Boston. pp. 297-311
  5. Slay, J., Lin, Y.C., Turnbull, B., Beckett, J.J., Lin, P.I.L 2009. 'Towards a Formalization of Digital Forensics', in Advances in Digital Forensics V. Springer, Boston. pp. 37-47
  6. Slay, J. & Sitnikova, E, 2009. 'The Development of a Generic Framework for the Forensic Analysis of SCADA and Process Control Systems.' In Forensics in Telecommunications, Information and Multimedia. Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, Springer , Boston, USA, Vol. 8, pp.76-81
  7. Turnbull, B, Slay, J & Pavlic, T 2008, 'Evidence Collection Using Google Desktop Search' in Advances in Digital Forensics. Springer, Boston, USA. pp. 43-50
  8. Simon, M & Slay, J 2007, 'Forensic Computing Training, Certification, and Accreditation: An Australian Overview, in Fulcher, L., Dodge, R., (Eds) IFIP International Federation for Information Processing, Volume 237, Fifth World Conference on Information Security Education, Springer, Boston, pp. 1-8
  9. Slay, J & Miller 2007, 'The Maroochy Water SCADA Breach: Implications of Lessons Learned for Research', in Advances in Critical Infrastructure Protection. Springer, Boston, USA, pp. 73-82
  10. Slay, J 2007, 'Naturalistic Inquiry in Cross-Cultural research: a Narrative Turn' in Taylor, P.C.& Wallace, J. (Eds.) . Contemporary qualitative research: Exemplars for science and mathematics educators. Springer, Boston, pp. 90-101
  11. Taylor, J, Slay, J & Kurzel, F 2007, 'Learning Object Applications & Future Directions' in A. Koohang & K. Harman (Eds.) Learning Objects: Applications, Implications, & Future Directions ISBN 83-922337-8-6, Informing Science Press, pp. 35-61

Peer - Refereed Journal Articles

  1. Irwin ASM, Slay J, Choo K-K R and Liu L. 2014. 'Money laundering and terrorism financing in virtual environments: A feasibility study'. Journal of Money Laundering Control. 7 (1), 50-75
  2. Tassone C, Martini C, Choo K-K R and Slay J. 2013. ' Mobile device forensics: A snapshot'. Trends & Issues in Crime and Criminal Justice
  3. ASM Irwin, J Slay, KKR Choo, L Liu. 2013 'Are the financial transactions conducted inside virtual environments truly anonymous?: An experimental research from an Australian perspective?'. Journal of Money Laundering Control. 16 (1), 6-40
  4. Virallikattur S Dhenesh, Elena Sitnikova and Jill Slay. 2012. ' An Integrated Tool-Support for Small Team Meetings: Lessons from Observations of Team Meetings in Organisations'. International Journal of Computer Applications 45(7):1-7, May 2012
  5. Arrifin, A., Jazri, H, Slay, J. and Lee, I. 2012. 'Digital Forensics Institute in Malaysia: The Way Forward'. Digital Evidence and Electronic Signature Law Review. Digital Evidence & Elec. Signature L. Rev. 9, 51
  6. Irwin, D & Slay, J, Dadej, A and Shore, M. 2011. 'Extraction of Electronic Evidence From VoIP: Forensic Analysis Of A Virtual Hard Disk Vs Ram", Journal of Digital Forensics Security & Law. 6(1), 6 (1), 8-12
  7. Slay, Jill 2011, 'Being, becoming and belonging: Some thoughts on academic disciplinary effects'. Cultural Studies of Science Education. http://www.springerlink.com/content/vx2l374x7x8t1k05/fulltext.html.
  8. Beckett, J & Slay, J. 2011. ' Scientific Underpinnings And Background To Standards And Accreditation In Digital Forensics'. Digital Investigation. 8(2), 114-121
  9. Simon, M & Slay, J. 2011. ' Investigating Modern Communication Technologies: The effect of Internet-based Communication Technologies on the Investigation Process. Journal of Digital Forensics Security & Law. Vol6n4
  10. Mubarak, S., & Slay, J. 2010. 'Protecting clients from insider attacks on trust accounts'. Information Security Technical Report (Elsevier). 202-209
  11. Guo, Y., Slay, J., & Beckett, J., 2010 'Testing Forensic Copy Function of Computer Forensics Investigation Tools'. Journal of Digital Forensic Practice, 1556-7346, Volume 3, Issue 1, 46 - 61
  12. Guo, Y. & Slay,J. 2010 'Computer Forensic Functions Testing: Media Preparation, Write protection and Verification", Journal of Digital Forensics Security & Law, v5n2, pp. 5-20
  13. Guo, Y., Slay, J., & Beckett, J., 2009, 'Validation and verification of computer forensic software tools-searching function,' Digital Investigation, 6(1), pp. S12 - S22. (A - Impact factor 0.96).
  14. Zhang, LR, Cook, S, & Slay, J., 'Multi-layer security architecture for military communications over Internet', Accepted for publication in ACM Trans. on Information and System Security, Sep. 2008. (A* -Impact factor 4.529)
  15. Slay, J., & Simon, M., 2009. Voice over IP: Privacy and Forensic Implications. International Journal of Digital Crime and Forensics. 1(1)
  16. Pavlic, T., Slay, J. & Turnbull, B. 2008, 'Developing a Process Model for the Forensic Extraction of Information from Desktop Search Applications', Journal of Digital Forensics, Security and Law, 3(1), pp. 33-55
  17. Budimir, N., & Slay, J. 2007. 'Identifying Non-Volatile Data Storage Areas: Unique Notebook Identification Information as Digital Evidence. Journal of Digital Forensics, Security and Law, 2(1), pp.75-91

Peer - refereed Conference Papers

  1. S Ismail, E Sitnikova, J Slay. 2014. Using integrated system theory approach to assess security for SCADA systems cyber security for critical infrastructures: A pilot study. 11th International Conference on Fuzzy Systems and Knowledge Discovery (FSKD)
  2. Arrifin A, D'Orazio C, Choo K-K R and Slay J. 2013. 'iOS Forensics: How can we recover deleted image files with timestamp in a forensically sound manner?' In International Conference on Availability, Reliability and Security, Prague (ARES 2013), University of Regensburg, Germany, 2 - 6 September 2013
  3. Ariffin A, Choo K-K R and Slay J. 2013. 'Digital Camcorder Forensics'. In Australasian Information Security Conference (ACSW-AISC 2013), Adelaide, South Australia, Volume 138 of the ACS Conferences in Research and Practice in Information Technology (CRPIT) series (pp. 39-47), Australian Computer Society, 29 January - 1 February
  4. Slay, J. 2012. 'Forensic Computing: A Review of Research and Operational Challenges'. Secure Sydney, August 2912
  5. Slay, J., Machanja, A., Martini, B., & Choo, R.K.K. 2012. 'Towards a holistic service-oriented framework for digital forensic investigation in the cloud'. SATN 2012, PON
  6. Grant Osborne, Benjamin Turnbull, Jill Slay. Development of InfoVis Software for Digital Forensics. In Proceedings of COMPSAC Workshops 2012: 213-217
  7. Sitnikova E., Slay J. 2012. 'Pathway into a Security Professional: A new Cyber Security and Forensic Computing Curriculum', ADFSL Conference on Digital Forensics, Security and Law Richmond, Virginia, USA ,May 30-31, 2012
  8. Hunt, R., and Slay, J., A New Approach to Developing Attack Taxonomies for Network Security - Including Case Studies, Proceedings of the 17th IEEE International Conference on Networks, Dec. 14-16, 2011, Singapore
  9. Simon, M & Slay, J. 2011. ' Recovery of Pidgin Chat Communication Artefacts from Physical Memory: A Pilot Test to Determine Feasibility'. ARES 2011
  10. Osborne, G & Slay, J. 2011. 'Digital Forensics Infovis: An implementation of a process for visualisation of digital evidence' ARES 2011
  11. Hunt, R. & Slay, J., 2010, 'The Design of Real-time Adaptive Forensically Sound Secure Critical Infrastructure'. NSS2010, Melbourne, September 1-3 2010
  12. Simon, M., & Slay, J., 2010. What Are You Looking For: Identification of Remnant Communication Artefacts in Physical Memory! International Cyber Resilience Conference, ECU, Perth August 2010
  13. Irwin, A & Slay J., 2010 "Is money laundering and terrorism financing in virtual environments fantasy or reality", International Cyber Resilience Conference, ECU, Perth August 2010
  14. Hunt, R. & Slay, J., 2010. 'Design of Forensic-based Security Architectures for Critical Infrastructure Protection'. PST2010, Ottawa, Canada. August 2010
  15. Simon, M., & Slay, J., 2010 'Recovery of Skype Application Activity Data from Physical Memory'. ARES 2010 - 5th International Conference on Availability, Reliability, and Security 2010, , pp.283-288. (CORE B)
  16. Osborne, G, Slay, J., & Turnbull, B, 2010 'Explore, Investigate and Correlate' (EIC) conceptual framework for digital forensics Information Visualisation. ARES 2010 - 5th International Conference on Availability, Reliability, and Security 2010, pp.629-634. (CORE B)
  17. Guo, Y & Slay, J., 2010 "A Function Oriented Methodology to Validate and Verify Forensic Copy Function of Digital Forensic Tools", in Proceedings of Fifth International Conference on Availability, Reliability and Security (ARES 2010), February, Krakow, Poland
  18. Guo, D and Slay, J. 2009.'Validation and verification of computer forensic software tools-Searching Function'. DFRWS 2009 9th Digital Forensic Research Conference, Montreal, Canada, August 17
  19. Slay, J., Sitnikova, E., Campbell, P. and Daniels, B. 2009. 'Process Control System Security and Forensics: A Risk Management Simulation', SIMTECT 2009, Adelaide, June 15-19
  20. Simon, M., & Slay, J., 2009. 'Enhancement of Forensic Computing Investigations through Memory Forensic Techniques'. WSDF 2009, Fukuoka, Japan. March. (CORE B).
  21. Slay, J., Lin, Y.C., Turnbull, B., Beckett, J.J., Lin, P.I.L 2009. 'Towards a Formalization of Digital Forensics'. IFIP 11.9 Orlando, January 2009
  22. Slay, J. & Sitnikova, E, 2009. 'The Development of a Generic Framework for the Forensic Analysis of SCADA and Process Control Systems.' E-Forensics, Adelaide Uni, Jan 2009
  23. Lin, YC, Slay, J & Lin, YL, 2008, 'Computer forensics and Culture, Pacific Asia Workshop on Cybercrime and Computer Forensics at ISI 2008, Taipei, Taiwan June 20 2008
  24. Slay, J & Sitnikova, E 2008, 'Developing SCADA Systems Security Course within a Systems Engineering Program, Proceedings of the 12th Colloquium for Information Systems Security Education University of Texas, June 2 -4, 2008 International Workshop on Digital Forensics (WSDF'08) at ARES-2008, Barcelona, Mar 4-7 2008
  25. Turnbull, B & Slay, J 2008, 'Wi-Fi Network Signals as a Source of Digital Evidence: Wireless Network Forensics'
  26. Slay, J, Turnbull, B & Broadway, J 2008, 'Improving the Analysis of Lawfully Intercepted Network Packet Data Captured For Forensic Analysis', International Workshop on Digital Forensics (WSDF'08) at ARES2008, Barcelona, Mar 4-7 2008
  27. Simon, M & Slay, J 2008, 'Voice over IP Forensics', E-Forensics, Adelaide University, January 21, 2008
  28. Sitnikova, E. and Slay, J., 2009, 'Enhancing Industrial Control Systems Cyber-Security Capabilities: Strategic Plans, Prevention and Response', Proceedings of the Automation & Communications Technologies in Power Conference, 1-3 September 2009, Sydney Australia
  29. Lin, V., Slay, J. and Lin, P., 2007, 'A Study on the Necessity of Integration Non-Repudiation into MANET: From Computer Forensic Perspective', Proceedings of Cyber Security, Cyber Crime and Cyber Law Cyberspace 2007 Conference, Taiwan, pp 437 to 443
  30. Morrison, J & Slay, J 2007, 'Does Knowledge Management Theory Support the Achievement of Knowledge Superiority in Defence?' Simtect 2007, June 4th 2007
  31. Turnbull, B & Slay, J 2007, Wireless Forensic Analysis Tools for use in the Electronic Evidence Collection Process, HICSS-40, January 3rd 2007 Hawaii
  32. Slay, J & Przibilla, A 2007, 'Ipod Forensics: Forensically Sound Examination of an Apple Ipod', HICSS40, January 3rd 2007 Hawaii
  33. Beckett, J.J & Slay, J 2007, 'Digital Forensics: Validation and Verification in a Dynamic Work Environment', HICSS-40, January 3rd 2007 Hawaii
  34. Radenovich, V & Slay J, 2007, 'Role of Multidirectional Network Bridges in Ecommerce' Proceedings of ECIW 2007, Cranfield, July 2nd 2007

David Volk Beard

Education

1985
Computer Science, University of Michigan at Ann Arbor.
Thesis: Automatically Generated Form Screens as a Database Interface Language.
Advisors: Teorey(Computer Engineering) & Mantei(Graduate School of Business).
1983
M.S. - Computer Science, University of Michigan at Ann Arbor.
1978
B.A. - Dual Majors: Math and Philosophy. Hope College, Holland, Michigan.

Work Experience

2009-
Professor, and Program Director, Computer Science, Idaho State University
1995-2011
Professor of Computer Information Systems, College of Business,
Associate Professor, Computer Information Systems, Idaho State University
2003
Government Funding Strategist, Siemens Corporate Research (Sabbatical)
1988-1995
Research Associate Professor of Radiology, UNC at Chapel Hill, NC.
Adjunct Associate Professor and Adjunct Assistant Professor of Computer Science.
Research Assistant Professor of Radiology
Member of the faculty, UNC Medical Informatics Program.
1985-1988
Assistant Professor of Computer Science, UNC at Chapel Hill, NC.
1985-1988
Assistant Professor of Computer Science, UNC at Chapel Hill, NC.
1985-1996
Occasional Consultant, GTE Government Systems. GTE Direct Marketing.
Technology Marketing Group (Medical Image Display), Aurora Technology.
1979-1985
Graduate School, University of Michigan, Ann Arbor, MI.
TA for Data Structures and Programming, RA for Friedman and Teorey
1978-1979
Programmer Analyst, Ford Motor Co. Engineering Div., Dearborn, MI.
Designed and implemented applications for a 900-relation decision-support system.
Multics, GCOS, PL-1, Fortran, Assembly.

Grants and Gifts

2000-2002
PI, Structure Chart Tools, Idaho State Technical Award, $34,375
1994-1995
PI, "Mammography Database," $429,149 Army ( sub project from U. Chicago)
1994-1995
Co-PI, "Digital Mammography Display," $747,891 Army.
1991-1995
PI, "New Visualizations for Medical Image Workstations," $1,144,024 NIH/NCI R01 Grant.
1993-1995
Co-PI, "Digital Mammography Greyscale," $715,000 NIH/NCI R01.
1991-1995
PI, "Medical Image Presentation" $6,523,426 NIH/NCI P01 Project
1991-1994
PI, Equipment Grants, Fujitsu Switching Systems & Sun Microsystems.
1988-1989
PI, "Cost Analysis of an ATM PACS," Bell Northern Research. $50,000.
1988-1991
CO-PI "Medical Image Processing" $6,315,723 NIH/NCI P01 subproject.
1986-1988
Co-PI, "Radiology Workstations," NIH/NCI $730,712 RO1 Grant.
1986
"3D Interactive Graphics", NSF and ACM conference grants.

Professional Service Activities

  • Faculty Senate, 2005-2011
  • Institutional Governance Advisory Committee, Chair 2011
  • University Special Budget Committee and Budget Committee 2009-2012
  • Academic Affairs Advisory Board 2009-2010
  • University Grievance Committee 2008-2010
  • University Registrar Search Committee 2007
  • Beta Alpha Phi Co-Faculty and Honorary member Advisor, 2002-2006
  • Chair, ISU Faculty Professional Policy Council, 1999-2002
  • PhD Committee, University of Utrich, Netherlands, 2000
  • National Institutes of Health Diagnostic Imaging Study Section, 1998, 1999
  • Member: Army Breast Cancer Research Study Section, Nov, 1995.
  • Session Chair & Program Comm., SPIE Medical Imaging1991 1994.
  • Chair, Treasurer, Board Member, Society for Computer Applications in Radiology, Guest Faculty, 2nd PACS-RIS School, Bowman Gray, Winston-Salem, NC 1992.
  • UNC Chapel Hill Computer Science MS, PhD Admissions committee, 1985-1988
  • Treasurer: 1986 workshop on 3D interactive graphics.
  • Demonstration Chair, 1986 ACM SIGCHI.
  • Reviewer:
    • HICSS, J. Investigative Radiology
    • J. Digital Imaging
    • J. Behaviour & Information Technology
    • International Journal of Man-Machine Studies
    • National Science Foundation
    • Symposium for Computer Assisted Radiology
    • IEEE Transactions on Medical Imaging
    • Numerous textbooks

Professional Organizations

  • Radiological Society of North America-Elected Member
  • Human Factors Society-Elected Member
  • Society for Computer Applications in Radiology
  • ACM
  • SIGCHI
  • Beta Alpha Phi

Refereed Journal Publications and Patents

  • Masticola SP, Beard DV, Comaniciu D, Justinian R, Video and Audio Monitoring for Syndromic Surveillance for Infectious Diseases, 20080279420. 2009.
  • Beard DV Beard DV Beginning Programming for Accounting Students, J. Ethics and Critical Thinking January 2008(1),18.
  • Beard DV A Rigorous Programming Course To Improve Performance in 2nd Intermediate Accounting J. Ethics and Critical Thinking, 2006(1) 1
  • Beachboard, JC, Beard DV Innovations in Information Systems Education II Enterprise IS Management: A Capstone Course for Undergraduate IS Majors, Communications of the Association of Information Systems, vol. 15 315, 2005
  • Beard DV, Trimmer KJ, Peterson, T Three CIS courses for enhancing critical thinking and improving technical skills of accounting students, (reprint) Global Education Journal 2004(2), 82.
  • Beard DV Conjunctive grading for assessing and motivating beginning programming students in the context of plagiarism, J. Ethics and Critical Thinking, 2004(1) 34-56.
  • Beard DV, Trimmer KJ, Peterson, T Three CIS courses for enhancing critical thinking and improving technical skills of accounting students, J. Ethics and Critical Thinking, J 2003(2), 1-21.
  • Beard DV Interactive Interim Techniques for Reduced Costs and a Better Mammography Workstation, J. Digital Imaging, Nov 2000, 13(4).
  • Beard DV Hemminger BM Managing Remote Ultrasound with Cooperative Video: A Field Study. J. Behaviour & Information Technology, Jan1998, 17(1), 10-17
  • Beard DV, et al Quick GOMS: A Visual Software Engineering Tool for Simple Rapid Time-Motion Modeling, ACM Interactions, May/June 1997, volume 4, number 3, 31-36.
  • Beard DV, et al Pilot Study of Eye Movement During Mammography Interpretation: Eyetracker Results and Workstation Design Implications. J. Digital Imaging, Feb 1996.
  • Beard DV, et al, Quick and Dirty GOMS: A Case Study of Computed Tomography Interpretation, J. Human Computer Interaction 11:157-180, 1996.
  • Beard DV, et al Interpretation Time of Serial Chest CT Examinations with Stacked-Metaphor Workstation versus Film Alternator, J. Radiology, 197:753-758, 1995.
  • Beard DV, et al Eye-Movement During CT Interpretation: Eyetracker Results & Image-Display-Time Implications J. Digital Imaging, Nov.1994; 7(2):189.
  • Beard DV, et al Computed Tomography Interpretations with a Low Cost Workstation: A Timing Study. J. Digital Imaging, Aug 1994; 7(3):133-139.
  • Hemminger BM Beard DV Review of 3D Imaging in Medicine, J. Academic Radiology 1994.
  • Beard DV, Hemminger BM, Denelsbeck KM, Johnston RE How many screens does a CT workstation need? J. Digital Imaging, May1994; 7(2):69-76.
  • Beard DV, et al, J. Investigative Radiology, 1993; 28(8):732-734.
  • Beard DV Review of Computed Digital Radiography in Clinical Practice, J. Investigative Radiology 1993;28(1):90.
  • Beard DV, et al. Single-Screen Workstation vs. Film Alternator for fast CT Interpretation, J. Radiology, 1993; 187(2):1-6.
  • Beard DV Computer Human Interaction for Image Information Systems, J. American Society for Information Science, 1991; 42(8):600-608.
  • Beard DV, Johnston RE, Toki O, & Wilcox C A Study of Radiologists Viewing Multiple Computed Tomography Studies Using an Eyetracking Device, J. Digital Imaging, Nov. 1990;3(4):230-237.
  • Beard DV Designing a Radiology Workstation: A Focus on Navigation During the Interpretation Task, J. Digital Imaging, Aug. 1990;3(3):152-163.
  • Beard DV, Palaniappan M, Humm A, et al. A Visual Calendar for Scheduling Group Meetings, ACM - CSCW 1990 134.
  • Beard DV, Parrish D, Stevenson D A Cost Analysis of Film Image Management & Four PACS systems based on Four Network Protocols, J. Digital Imaging, 1990;3(2):108-118.
  • Beard DV Walker JQ Navigation Techniques to Improve the Display of Large Two Dimensional Spaces, J. Behaviour & Information Technology, 1990;9(6):451-466.
  • Pizer SM Beard DV Medical Image Workstations: State of Science & Technology. J. Digital Imaging, Nov.1989;2(4):185-193.
  • Beard DV, Mantei MM, Teorey TJ Metaform: Updatable Form Screens and Their Application to the Use of Office Metaphors in Query Language Instruction, J. Behavior and Information Technology, 1987;6(2):135-157.
  • Pizer SM, Johnston RE, Rogers DC, Beard DV Effective Presentation of Medical Images on an Electronic Display Station, J. RadioGraphics, 1987;7(6):1267-1274.
  • Beard DV Automatically Generated Form Screens as a Database Interface Language, Ph.D. Dissertation, University of Michigan, Ann Arbor, MI, 1985.

Other Refereed Publications

  • Beard DV, Parker KR, Ottaway TA, Davey WF, Schou CD, Requiring a Systems Analysis and Design Course for a Computer Science Major, FECS’13, Las Vegas NV, July 2013.
  • Mamykina L, Goose S, Hedqvist D, Beard DV Deconstructing Nursing narratives for trend analysis, ACM CHI 2004.
  • Beard DV, Trimmer KJ, Smith, KA A Rigorous Programming Course for Improved Problem solving Skills and a Better CPA, ASBBS, Las Vegas NV Feb 2003.
  • Beard DV Trimmer KJ Systems Analysis and Design and the Improved Accountant, SAIS Savannah, GA – March, 2003.
  • Beard DV Beginning Programming for Accounting Students using Object-Oriented Visual Basic.NET: Avoiding a Disaster, ASBBS Las Vegas NV Feb 2003.
  • Beard DV, Trimmer KJ, Bezik MA, Peterson T, Smith, KA A CIS Database Management and Design Course: Better for Accounting Majors than Traditional AIS, ASBBS, Las Vegas NV Feb 2002.
  • Beard DV, Bezik MA, Trimmer KJ, Smith KA, Systems Analysis and Design: Better for Accounting Majors than traditional AIS? Third Annual AIS Educator Conference, Estes Park Colorado, August, 2001.
  • Beard DV, Smith, KA Beginning Programming Course for Accounting: Relative Performance of Declared CIS and Accounting Majors, ASBBS, Las Vegas NV Feb 2001.
  • Beard DV, et al QGOMS: A Direct-Manipulation Tool for Simple GOMS Models, ACM - CHI 1996 Vol 2 25
  • Beard DV, Molina P, Denelsbeck KM, Hemminger BM, et. al. Stacked-Metaphor Workstation Faster than Film for Serial Staging CT, CAR, Berlin 1995.
  • Soltys M, Beard DV, et. al Experimentally Evaluating Manual Registration of Multiple Modality 3D Medical Imaging Data, SPIE Medical Imaging, 1995.
  • Hemminger BM, Molina PL, Braeuning PM, Detterbeck FC, Egan TM, Pisano ED, & Beard DV Clinical Applications of Realtime Volume Rendering, SPIE Medical Imaging , 1995.
  • Beard DV, Hemminger KM, Denelsbeck KM, Johnston RE Cognitive Load during CT Interpretation, SPIE Medical Imaging: Image Perception, 1994.
  • Beard DV, Eberly DH, et al. Interacting with image hierarchies for fast and accurate object segmentation, SPIE Medical Imaging: Image Processing, 1994.
  • Beard DV, Faith RE, Eberly D, Pizer SM, Kurak C, Johnston RE The Magic Crayon: An Object Definition & Volume Calculation Testbed, SPIE Medical Imaging, 1993.
  • Beard DV, Hemminger BM, Denelsbeck KM, Brown PH A Time-motion Comparison of Several Radiology Workstation Designs and Film, SCAR,1992.
  • Beard DV, Hemminger BM, Brown P, Perry R, Thompson R Remote consultation with a multiple screen FilmPlane radiology workstation, SPIE Medical Imaging, 1992.
  • Beard DV, Brown P, Misra R Scrolling Radiologic Images: Requirements, Designs, & Analyses, CAR, Berlin 1991.
  • Beard DV, Perry R, Muller K, et al. Evaluation of Total Workstation Interpretation Quality with CT: A Pilot Study, SPIE Medical Imaging 1991.
  • Beard DV, Johnson RE, Pisano E, et al A Radiology Workstation for Mammography: Preliminary Observations, Eyetracker Studies, & Design, SPIE Medical Imaging 1991.
  • Beard DV Critical Characteristics of Radiology Workstation Navigation, SCAR 1990.
  • Walker J & Beard DV FilmPlane2: Design & Implementation, SPIE Medical Imaging 1990.
  • Beard DV, Parrish DM, Stevenson D A Cost Analysis of Film Image Management & Four PACS systems, SPIE, Medical Imaging, 1990.
  • Ouh-young M, Beard DV, Brooks FP Force Display Performs Better than Visual Display in a Simple 6-D Docking Task, IEEE Int. Conf. on Robotics and Automation, 1989.
  • Stevenson D, Beard DV, Parrish DM Medical Image Communications as an Application for Broadband ISDN, SPIE Vol 1179 Fiber Networking & Telecommunications, 1989.
  • Beard DV, Walker J, Bell I, Cromartie R Evolving Design of a Radiology Workstation Using Time-Motion Analysis & the Keystroke Model, SPIE Med. Imaging 1989.
  • Parrish, D, Beard DV, Kilpatrick KE, Scatliff JH, Thompson BG Operational Modeling for PACS: How do we decide if it is Cost Effective? SPIE Medical Imaging 1989.
  • Beard DV, Creasy J, Symon J, Cromartie R Experiment Comparing Image-Locating on Film & the FILM-PLANE Radiology Workstation, SPIE Med. Imaging, 1988.
  • Smith JB, Weiss SF, Ferguson GJ, Bolter JD, Lansman M Beard DV WE: A writing environment for professionals, Proc. of the National Computer Conference '87. Reston, VA: AFIPS Press, 1987
  • Johnston RE, Rogers DC, Creasy J, Beard DV, Hemminger BM, Perry J, Pizer SM How to Evaluate a Medical Imaging Workstation, SPIE Medical Imaging,1987.
  • Beard DV, Pizer SM, Rogers DC, Cromartie R A Prototype Single-Screen PACs Console Development Using Human Computer Interaction Techniques, SPIE Med. Imaging, 1987.
  • Kochan H, Banish F, & Beard DV The Display of Manufacturing & Assembly Information, Conference on Intelligent Systems and Machines, 1984.

Other Publications, Presentations, and Abstracts

  • Beard DV A Computer Human Interaction Approach for Evolving Complex Tools, Advances in Nuclear Science and Engineering Working Conference, 2012.
  • Beard DV Comparison of an accounting department’s CPA pass rates and national pass rates normalized for ACT scores Conference on Ethics and Critical Thinking, Kings College PA Dec 2008.
  • Beard DV Beginning Programming for Accounting Students, Conference on Ethics and Critical Thinking Dallas Tx, Dec 2007.
  • Beard DV Negotiating Software Project Cost Estimates, Conflict Resolution and Negotiation Conference, Minnesota State University, Oct 2007.
  • Beard DV Critical Thinking and Intellectual Rigor, Conference on Ethics and Critical Thinking, Dallas TX, Dec 2006
  • Beachboard, JC, Beard DV Enterprise IS Management: A Capstone Course for Undergraduate IS Majors, Proceedings of the 46th Annual Fall Conference Mountain Plains Management Assoc., 200.
  • Beard DV A Rigorous Programming Course To Improve Performance in 2nd Intermediate Accounting Conference on Ethics and Critical Thinking, Dallas TX, Dec 2005.
  • Beard DV International Software Development and Extreme Programming, Business Entrepreneurs Conference, Southwest Missouri State University Business School, 25Feb05
  • Beard DV On choosing employees in an age of rampant college cheating, Business Entrepreneurs, Missouri State University School of Business 2004
  • Beard DV How to write an Fundable NIH Proposal, Workshop, Siemens Corporate Research, Princeton, NJ, Nov 2003.
  • Beard DV Frischmann P, Introduction of critical and analytical thinking in an accounting program through advanced CIS courses, American Accounting Association Western Regional Meeting, Breckenridge CO, 2003.
  • Beard DV Smith KA A Beginning Programming Course for the CPA Fourth Annual AIS Educator Conference, 2002.
  • Beard DV Trimmer KJ, Bezik MA, Smith KA Accommodating Accounting Majors in a Required CIS Beginning Programming Course: Approach and Results IAIM Dec 2001.
  • Beard DV & Smith KA Designing a Beginning Programming Course for Both Accounting and CIS Majors: Approach and Results MPMC, 2001
  • Schou, C, Frost, J, Beard DV Applications of Group Process Support Systems (GPSS) National INFORMS 96, 1996.
  • Schou, C, Frost, J, Beard DV Structure of an Undergraduate MMT Curriculum, National INFORMS 96, 1996.
  • Beard DV Cost-effective Teleradiology, invited workshop at the 1996 Idaho Conference on Health Care, Oct 1996.
  • Beard DV Interpretation of Multiple Chest CT Examinations: Stacked Workstation versus Film, Presented at the AIMA Summer Conference, Medical Imaging Group, Boston, 1995.
  • Rosenman J, Beard DV, Soltys M A new method to simultaneously view multiple medical images, ASTRO 1995.
  • Hemminger BM, Beard DV, et al Realtime 3D visualizations for Surgical Procedure Planning, Demonstration at RSNA InfoRad, Nov. 1994.
  • Perry JR, Rosenman J, Soltys M, Reavis R, Chen J, Liu A, Beard DV, Pizer SM 3D Image Fusion of Lung Perfusion SPECT & Chest CT Data in Radiation Treatment Planning for Lung Cancer Patients, World Federation of Nuclear Med. & Biology, 1994.
  • Robinson EN & Beard DV Relational Database Design: Evaluation of Recognition, Isolation & Treatment of Hospitalized Patients with Tuberculosis, AIMA Sym. on Computer Applications in Medical Care, 1994.
  • Beard DV Fast & accurate medical image interpretation using electronic lightboxes, invited pres: RSNA InfoRad, 1992.
  • Beard DV Hemminger BM, Medical Imaging Workstations, RSNA InfoRad 1992.
  • Beard DV, Hemminger BM, Keefe B, Mittelstaedt CA Remote Ultrasound: A Pilot Study, Pres. at AUR 1992.
  • Beard DV, Hemminger BM, Mauro MA, Perry JR A Speed and Accuracy Comparison of Film vs. Electronic Display, AUR 1992.
  • Horii SC, Stabb EV, Beard DV, Gatsonis C, Kundel HL Panel Discussion on Radiology Workstation Evaluation, published in SPIE, Medical Imaging, 1990.
  • Beard DV, Walker JGF, & Toki O Fingerpointing and Eyetrackers for Task Analysis of Medical Image Information Systems, SIGCHI 90, 1990
  • Beard DV Medical Image Display at UNC, Invited presentation at the University of Maryland Computer Science Department, February 1990.
  • Stevenson D, Beard DV, Parrish DP Medical Imaging as an Application for Broadband Communications, Third Triangle Conference on Computer Comm. Raleigh, NC, 1990.
  • Beard DV, Johnston RE, Toki O, Wilcox C A Study of Radiologists Viewing Multiple CT Studies Using an Eyetracking Device, RSNA, Nov. 1989.
  • Beard DV et al The Visual Scheduler for Scheduling Small Group Meetings, ACM SIGCHI 1988.
  • Johnston RE, Beard DV, Creasy J, Perry J UNC PACS II: Consoles, 9Th Conference on Computer Applications in Radiology, Hilton Head, SC., 1988
  • Parrish D, Beard DV, Creasy J, Thompson R UNC PACS I: Modeling The Radiology Operation, 9Th Conf. on Computer Applications in Radiology, Hilton Head, SC, 1988.
  • Beard DV Design & Telecommunication Requirements for PACS consoles, 1988 Triangle Telecommunications Symposium, 1988.
NIATEC National Science Foundation Information Assurance Directorate Department of Homeland Security CISSE Scholarship For Service