Skip to Main Content
Idaho State University home

Full-time, Part-time, shared (inter departmental, other institution, etc.), adjunct (industry expert, etc.) teaching IA/CD courses

Dr. Larry Liebrock

University Teaching and Instructional Experience

    • Associate Dean - Technology Officer, Graduate School of Business, University of Texas. September 1996 to August 2003
    • Teaching Award 1998 -
    • Taught courses in:
      • Cases in Global E-Business
      • Cases in IT Consulting
      • Digital Evidence Investigations, Audits and Forensics
      • Hardware and Software Telecommunications
      • Information Systems Auditing and Systems Security
      • Information Systems Design and Implementation
      • Introduction to Forensics Tradecraft
      • Managing Internet/Intranet Development
      • NT - UNIX Systems Security
      • Project Management Practicum
      • System and Process for Network Auditing and Security
      • Systems Security, Audits and Forensics
    • Other
      • March 2000 - Harvard Business School - Taught MBA Class session: The Trading Server Case with Professor Rob Austin
      • January 2000 - May 2000 - Visiting Professor of Practice - Emory University - Goizueta Business School - Taught College Course in: Frameworks for E-Business Initiatives
      • December 1994 - January 1995, Lecturer - University of Texas - Bachelor and Graduate Level Courses in Digital Systems Analysis and Advanced Internet Techniques and Multimedia in Business Applications
      • September 1994 - December 1994, Lecturer, University of Texas at Austin Competitiveness, National Security and Information Policy (co-taught with Admiral Bob Inman)
      • January 1994 - May 1994, Lecturer, University of Texas at Austin-
    • Professional Interests
      • Digital Forensics - Enterprise Information systems management practices, e-systems security/privacy issues,
      • Digital Information Security Practices: Assessments, Audits, Privacy Protection, Incident Response, Critical Infrastructures and Forensics Frameworks for Digital Data
      • Enterprise Systems - Extranet/Internet/Intranet Systems Management and New Information Technology Deployments - Work Group Support
      • Secure Computing Tools, Cryptographic and Steganographic Mechanisms, Key Infrastructures and Systems Survivability Procedures

Academic Education

      • Ph.D. - Information Sciences, University of Texas, 1994, Concentrations: Information Resources Management, Information Policy, Computer Networking and Systems Management. Dissertation -- The Polysemy of Computer Supported Collaborative Work: Experiments in Cognition, Education and Learning Organizations.
      • M.B.A - University of Texas, 1983 Master Thesis: Adventures in Decision Analysis: Pilot Decision Support System Employing Cardinal Utility Heuristics for Multiple Criteria Problems.
      • Graduate Studies in Area Studies, Operations Research, Computer Sciences, North Carolina State University, 1973-1975
      • B.A - Double Majors in Economics - Political Science and History, Midwestern University, 1970

Academic Appointments

      • Visiting Professor - IMADEC University, Vienna, Austria 2004
      • Associate Dean and Chief Technology Officer - McCombs College of Business Administration and Graduate School of Business -The University of Texas (retired August 2003)
      • J. Anderson Fitzgerald Centennial Fellowship in Information Systems-McCombs Business School - The University of Texas
      • Teaching Lectureships (non-tenured) in the Departments of Management Science and Information Systems, Accounting and Marketing -The University of Texas
      • Adjunct Professor - College of Law - The University of Texas 2001 and 2002
      • Professor of Practice - Goezieta Business School - Emory University - Atlanta 2001-2002
      • Visiting Professor - Helsinki School of Economics 2001-2003
      • Institute Technologica Monterrey (ITESM) - Mexico City and Monterey 2001 and 2002

Professional Experience

  • HQ CENTCOM CJ3/JS/FP/CI MacDill AFB - 06/2012 -GS Grade: 15 Operations Field Officer - Counter Improvised Explosives Devices - Central Asia Serves as subject-matter-expert in improvised Explosive Devices and Home Made Explosives supporting - National Security Strategy, CENTCOM Campaign Plan and CDR ISAF's guidance - Specialized AFPAK knowledge-skills-experience - Senior Member of Joint Chief if Staff AFPAK HAND Program and IRAN CADRE Program - Currently attached - special duty to CENTCOM - Have current TS/Compartmented Intel clearance. Maintain Department of Justice, Homeland Security and Intelligence Community CIED liaisons - Part-time Adjunct Professor - National Intelligence University - Teaching Pakistan Intelligence Issues Graduate Course
  • 7th Special Force Group - Kandahar, Afghanistan - 11/2011 - 06/2012 GS Grade: 15 Served as intelligence/operations officer for Special Forces/Civil Affairs program and operational support for Village Stability Counter-insurgency program - Developed force protection training to meetsuicide bomber, hostile shooter situations and developed/delivered Operating in High Risk Environments (HRE) - Conferred with Installation CDR to review operations security and force-protection requirements were being resolved- Received DOD Civilian Service Award and NATO ISAF Service Award
  • AFGHAN MILITARY ACADEMY Kabul, Afghanistan 01/2011 - 11/2011 - GS Grade: 15 Operations Officer planned, directed, coordinated and supervise the development of personnel conducting COIN training (COIN, Governance, Intelligence and CIED) for US, Allied and GIRoA (Afghan Military and Civilian personnel. Cross functional support for the Installation Operation Center. Provided intelligence training dealing with hostile shooter and IED attacks - Reviewed and supervised the development and implementation of forensics/intelligence training plans, operations, policies to meet collection requirements Implemented an OPSEC/COMSEC program for US and Afghan personnel.
  • Defense Intelligence Agency - AFPAK HAND Augmentation- 09/2009 - 01/2011 GS Grade: 15 Operations Officer utilized prior training, skills and experience in conducting bi-lateral intelligence operations which involved development, planning, direction, coordination and supervision of special intelligence/ops programs. Extensive training and use of photography, special forensics intelligence and HUMINT operations - Identified overall bi-lateral strategic and operation objectives and formulated developmental and operation plans for 25 personnel. With both US and Afghan stakeholders, reviewed and supervised the implementation of operational and strategic plans, policies and other action documents. Expert use of cell phone telephony, GPS and GEOINT tools - Received DOD Civilian Service Award
  • Weapons Technical Intelligence Operations Officer 07/2007 - 12/2009 Excepted Service-JIEDDO PM Office - Department of Defense assigned to Washington DC - Deployed to Iraq and Afghanistan served in 3 deployments to OEF and OIF - Developed, deployed and supervised, cross-functional High-Value-Targets Team conducting CIED initiatives congruent with force-protection guidance and CDR's intent. Identified Special Access Program (SAP) overall objectives and formulated execution plans to meet CDR's guidance. Reviewed and supervised the implementation of interagency plans, reports, policies and directive documents. Delivered special IED briefing to Washington Metro police - Conducted special CIED training for State, Federal interagency partners in suicide attacks and post-blast incident response - Developed and delivered special IED collection training at field location. Delivered special crime-scene photography training for Federal, State and local force protection personnel - Maintained TS/SCI caveats
  • Operation Iraqi Freedom - Forensics Exploitation Operations Officer - Baghdad, Tikrit, Al Anbar, Diyala Iraq 07/2006 - 04/2007 Excepted Service - Operations Officer - Forensics and Exploitation Operations planned, staffed directed, coordinated and supervised the forensics/exploitation plans, collection-operations, skills-training and security programs for special exploitation cell. - Briefed base police and security reaction teams about CIED incident response - Utilized special tools to corroborate responses to tactical questioning and interrogations- Maintained TS Clearance
  • Chief Technology Officer and Senior Lecturer - University of Texas Austin, TX 06/1995 - 07/2006 Served as Chief Technology Officer for University of Texas Business School- Managed complex client/server environment supporting 4000 users- Developed and managed a 3 million dollar cost-recovery budget- Developed a 7/24 hour operations center to support systems availability and security for networks and users support. This operations center was based on detailed understanding and knowledge of installation operation center consistent with enterprise environment service-level agreements- Developed, validated and deployed a layered security framework based on detailed knowledge of site and installation security for information systems.
  • Served as University of Texas senior lecturer in graduate-level courses in:
    1. Information technology management,
    2. Internet Systems and computer security
    3. IT project management and
    4. Digital Forensics
  • Adjunct Professor at Emory University, Texas Instruments MBA, Mexico City MBA, Helsinki School of Economics - Co-Author Harvard Business School Case - Ipremier Denial of Service Attack
  • Served on State of Texas Critical Infrastructure incident planning team - Worked with Texas Incident Response center in responding to malicious penetration attacks - Developed training for Texas State and local government crisis response teams,
  • Battalion Commander (Part-Time) Texas Army National Guard 09/1990 - 09/1994 Served as Battalion Commander for a Mechanized Infantry Battalion located in south Texas- Responsible for all aspects of planning and execution in the areas of budgets, training, readiness, administration and logistics - Responsible for producing a full strength well trained infantry unit capable of being deployed into combat operations upon Federal/State emergency or Federal recall. Unit deployed to meet State disaster and performed at highest level during NTC rotation.

Thomas A. Ottaway, Ph.D.

  • Dean
  • Professor of Informatics
  • College of Business Idaho State University 921 South 8th Avenue Pocatello, ID 83209-8020

Education

  • Doctor of Philosophy, 1995
  • Texas Tech University
    • College of Business
    • Concentration: Production and Operations Management
    • First Supporting Field: Management Information Systems
    • Second Supporting Field: Computer Integrated Manufacturing
  • Master of Science, 1993
    • Texas Tech University
    • College of Business
    • Concentration: Management Information Systems
  • Bachelor of Science, 1990
    • Wichita State University
    • College of Liberal Arts and Sciences
    • Major: Computer Science
    • Minor: Mathematics

Academic Employment

  • 2001-Present
    Idaho State University
    College of Business
    • Dean (2013-Present)
    • Interim Dean (2012-2013)
    • Associate Dean (2011-2012)
    • Department Chair, Computer Information Systems (2008-2012)
    • Professor of Computer Information Systems (2007-Present)
    • Associate Professor of Computer Information Systems (2003-2007)
    • Assistant Professor of Computer Information Systems (2001-2003)
  • 1999-2001
    Kansas State University
    College of Business Administration Assistant Professor of Management
  • 1995-1999
    University of Montana
    College of Business Administration Assistant Professor of Management
  • 1991-1995
    Texas Tech University
    College of Business Administration Lecturer

Other Work Experience

  • 1985-1991
    The Boeing Company
    Systems Analyst, Computer-Aided Design/Computer-Aided Manufacturing
  • 1980-1982
    Aircraft Porous Media
    Machinist

Refereed Journal Publications

  • Parker, K.R., Chao, J.T., Ottaway, T.A., and Chang, J. (2006). "A Formal Programming Language Selection Process for Introductory Courses." Journal of Information Technology Education, (5), pp. 133-151.
  • Parker, K.R., Ottaway, T.A., & Chao, J.T. (2006). "Criteria for the Selection of a Programming Language for Introductory Courses." International Journal of Knowledge and Learning, 2 (1/2), pp. 119-139.
  • Nitse, P.S., Parker, K.R., Ottaway, T.A., & Krumwiede, D.W. (2004). "The Impact of Color in the E-commerce Marketing of Fashions: An Exploratory Study," European Journal of Marketing, 38 (7/8), pp. 898-915.
  • Bruce B. Niendorf and Thomas A. Ottaway (2003), "Multi-Agent Simulation and Genetic Algorithms: An Investigation of Market Risk Premiums," Journal of Financial and Economic Practice, 1(2), pp. 67-74.
  • Ottaway, Thomas A., Carol L. Bruneau, and Gerald E. Evans (2003), "The Impact of Auction Item Image and Buyer/Seller Feedback Rating on Electronic Auctions," Journal of Computer Information Systems, 43(3), pp 56-60.
  • Niendorf, Bruce B. and Thomas A. Ottaway (2002), "Market Risk Premiums: Investor Incentive to Vary Individual Risk Preferences," Journal of Economics and Finance, 26(1), pp. 77-87.
  • Ottaway, Thomas A., and James R. Burns (2000), "An Adaptive Production Control System Utilizing Agent Technology," International Journal of Production Research, 38(4), pp. 721-737.
  • Ottaway, Thomas A., and James R. Burns (1997), "Adaptive, Agile Approaches to Organizational Architecture Utilizing Agent Technology," Decision Sciences, 28(3), pp. 483-511.

Refereed Conference Papers

  • Ottaway, Thomas A., Kevin R. Parker, and Joseph T. Chao (2006). "The Selection of a Language for Introductory Programming Courses: An Exploratory Survey." Proceedings of the Western Decision Sciences Institute, Waikoloa, Hawaii, April 11-15 (pp. 270-272).
  • Ottaway, Thomas A., and Dennis W. Krumwiede (2005), "Separate and Distinct: Definitions of Supply Chain Scheduling and Supply Chain Coordination," 2005 Proceedings of the Decision Sciences Institute, Decision Sciences Institute.
  • Krumwiede, Dennis W., Kevin R. Parker, Philip S. Nitse, and Thomas A. Ottaway (2004), "Customer Sensitivity to Electronically Reproduced Color Products: Its effect on the Operation of Return Goods." Distribution Business Management Association Annual Conference Proceedings, Distribution Business Management Association.
  • Krumwiede, Dennis W., Philip S. Nitse, Kevin R. Parker, and Thomas A. Ottaway (2003), "Returning Internet Purchased Color Sensitive Products: The Effect On The Supply Chain," 7th International Conference of the Decision Sciences Institute, Decision Sciences Institute.
  • Ottaway, Thomas A. and Bruce B. Niendorf (2002), "Multi-Agent Simulation and Genetic Algorithms: An Investigation of Market Risk Premiums," Decision Sciences Institute 2002 Annual Meeting Proceedings, Decision Sciences Institute.
  • Ottaway, Thomas A. and Kevin R. Parker (2002), "A Conceptual Model of Structural Adaptation in Agent-based Workflow Management Systems." Proceedings of the 2002 Americas Conference on Information Systems (AMCIS 2002), Association for Information Systems.
  • Nitse, Philip S., Kevin R. Parker, Thomas Ottaway, and Dennis Krumwiede (2002), "The Impact Of Consumer Perceptions On E-Commerce Transactions," Proceedings of The International Applied Business Research Conference.
  • Niendorf, Bruce B., and Thomas A. Ottaway (2002), "Time Variation in Investor Risk Preferences, Market Volatility, and Market Risk Premiums," Proceedings of the 53rd International Atlantic Economic Conference, International Atlantic Economic Society.
  • Ottaway, Thomas A., Carol L. Bruneau, and Gerald E. Evans (2001), "The Impact of Auction Item Image and Buyer/Seller Feedback Rating on Electronic Auctions," Proceedings of the Seventh Americas Conference on Information Systems, Association for Information Systems.
  • Niendorf, Bruce B. and Thomas A. Ottaway (2000), "Market Risk Premiums: Investor Incentive to Vary Individual Risk Preferences," Proceedings of the 2000 FMA Annual Meeting, Financial Management Association.
  • Bruneau, Carol L. and Thomas A. Ottaway (2000), "Electronic Auctions: What Is A Picture Worth," Proceedings of the Annual Meeting of the American Society of Business and Behavioral Sciences, American Society of Business and Behavioral Sciences.
  • Willis, Geoffrey P. and Thomas A. Ottaway (1998), "An Investigation of Buffer Size, Data Distribution, Bottleneck Location, and Line Length Impact on the Performance of a Simulated Flow Shop," 1998 Proceedings of the Decision Sciences Institute, Decision Sciences Institute.
  • Ottaway, Thomas A., and Geoffrey P. Willis (1997), "An Adaptive Workflow Management System Utilizing Agent Technology," 1997 Proceedings of the Decision Sciences Institute, Decision Sciences Institute.
  • Ottaway, Thomas A., and Gerald E. Evans (1996), "An Adaptive Information Architecture to Support Business Process Reengineering," 1996 Proceedings of the Decision Sciences Institute, Decision Sciences Institute.
  • Ottaway, Thomas A., and Gerald E. Evans (1996), "Effectiveness of Voluntary Restraint Agreements on the U.S. Machine Tool Industry," 1996 Proceedings of the Decision Sciences Institute, Decision Sciences Institute, (Abstract Only).
  • Evans, Gerald E., Roberta D. Evans, and Thomas A. Ottaway (1996), "Information Systems as Interventions: The Case for Outcomes-Based Evaluations," 1996 Proceedings of the Decision Sciences Institute, Decision Sciences Institute, (Abstract Only).
  • Ottaway, Thomas A. (1995), "An Intelligent and Adaptive Information System for FMS Control," 1995 Proceedings of the Decision Sciences Institute, Decision Sciences Institute.
  • Ottaway, Thomas A. (1995), "A Model and Prototype for Dynamically Adaptive Manufacturing Control," Bulletin of the Fifth Annual Meeting of the Production and Operations Management Society, Production and Operations Management.

Funded Research

  • Consulting Contracts Awarded:
    • 1999-2000 Net-Centric Command and Control Study, United States Navy, $84,226.75

Competitive Grants And Field Research Awarded:

  • 2003 "A Telecommunications Inventory of Southeast Idaho," Idaho National Engineering and Environmental Laboratory, $7,958
  • 2002 Michael C. Ruettgers Initiative, College of Business, Idaho State University, $5,000
  • 1998 Montanans On a New Trac for Science (MONTS), National Science Foundation, $25,000
  • 1997 Summer Research Grant, School of Business Administration, University of Montana, $3000
  • 1996 University Research Grant, University of Montana, $2,200
  • 1996 Summer Research Grant, School of Business Administration, University of Montana, $3000
  • 1995 Summer Research Grant, School of Business Administration, University of Montana, $3000

Awards

  • Recipient, Beta Gamma Sigma Outstanding Teaching Award, 1996-1997.

Professional Affiliations

  • Decision Sciences Institute
  • Association of Computing Machinery
  • Association for Information Systems

Kevin Parker, PhD.

Dr. Kevin Parker joined the Idaho State University faculty in 1999 and is now Chair and Professor of the Informatics and Computer Science department.

Dr. Parker prides himself on being very student-oriented. Although his courses are notable for his demanding expectations, he has always received above-average teaching evaluations. Dr. Parker received the ISU College of Business 2002-2003 Outstanding Teacher Award. He was recognized as a 2010-2011 Outstanding Master Teacher by Idaho State University. That same year he was recognized as the 2011 Faculty Member of the Year by the Associated Students of Idaho State University. In 2012 he was again recognized as one of the 2011-2012 Outstanding Master Teachers by Idaho State University. His courses at ISU have included both introductory and advanced programming, object-oriented development using Java, systems analysis and design, database design, interactive web development, and web development for eCommerce. He has also taught courses for the computer science department.

Born in upstate New York, Dr. Parker was reared in southeastern New Mexico. He graduated second in his high school class of 440 students. His higher education spans Computer Science and Information Systems. He received his undergraduate degree in Computer Science from the University of Texas at Austin in 1982. He was named to the Dean's Honor List each of his semesters at the University of Texas at Austin, where he was selected as a member of the Golden Key National Honor Fraternity.

After completing his undergraduate degree at Texas, he became a Programmer/Analyst for Conoco, Inc., listed in the top five of the Fortune 500 companies. While with Conoco, he also served as an adjunct programming instructor at both the University of the Southwest and New Mexico Junior College (NMJC). NMJC eventually lured him into academia full time.

After teaching computer science classes for several years, he again assumed the role of student at Texas Tech University. He received his Master's degree in Computer Science from Texas Tech in 1991 and then, drawn by the application of computing systems in the business environment, shifted his focus to Information Systems and earned his Ph.D. from Texas Tech in 1995. He maintained a 3.935 grade point average during his graduate studies at Texas Tech University, where he was inducted into Upsilon Pi Epsilon, an honor society in the computing sciences.

Upon graduation from Texas Tech he joined the MIS department at Saint Louis University (SLU), a private Jesuit university in St. Louis, Missouri. During his four years at SLU, Dr. Parker taught management information systems courses in systems analysis and design, database design, object-oriented programming using C++, object-oriented programming using Java, and emerging technologies. He played a major role in undergraduate curriculum revisions as well as in the design of a new Master of Science degree in MIS. He served on numerous recruiting committees to evaluate candidates for both MIS and AIS positions. He founded and served as the faculty advisor for the MIS Club of SLU, which quickly became the largest student organization in the School of Business. He took an active role in involving the business community in the activities of the club and increased the number of MIS majors recruited by the major consulting firms.

His research interests include web accessibility for the elderly, competitive intelligence, knowledge management, e-commerce accuracy, and information assurance in software development. Dr. Parker received the ISU College of Business 2005-2006 Outstanding Research Award, and in 2007 was awarded a Curtin University of Technology Research Fellowship in Perth, Australia.

His hobbies include traveling, hiking, snorkeling, and playing with his dogs. His wife, Lori, is a CPA.

Publications

  • Chao, J. C., Parker, K. R., & Davey, B. (2013). Navigating the framework jungle for teaching web application development. Journal of Issues in Informing Science and Information Technology, 10, 95-109.
  • Chao, J. C., Parker, K. R., & Fontana, A. (2011). Developing a social media interactive learning environment. Journal of Issues in Informing Science and Information Technology, 8, 323-334.
  • Park, J., Fables, W., Parker, K. R., & Nitse, P. S. (2010). The role of culture in business intelligence. International Journal of Business Intelligence Research, 1 (3), 1-14.
  • Parker, K. R. (2010). Selecting software tools for IS/IT curricula. Education and Information Technologies (Special Issue on Information Systems Curriculum), 15 (4), 255-275.
  • Parker, K. R. (2010). The reference list formatter: An object-oriented development project. Interdisciplinary Journal of Information, Knowledge, and Management, 5, 23-48.
  • Trimmer, K., Parker, K. R., & Schou, C. (2009). Functional requirements: The reference monitor and use case. Academy of Information and Management Sciences Journal, 12 (2), 113-119.
  • Parker, K. R., Nitse, P. S., & Tay, A. (2009). The impact of inaccurate color on customer retention and CRM. Informing Science: the International Journal of an Emerging Transdiscipline, 12, 105-112.
  • Parker, K. R., Williams, R. F, Nitse, P. S., & Tay, A. (2008). Use of the normalized word vector approach in document classification for an LKMC. Journal of Issues in Informing Science and Information Technology, 5.
  • Trimmer, K., Parker, K. R., & Schou, C. (2007). Forcing early implementation of information assurance precepts throughout the design phase. Journal of Informatics Education Research, 9 (1), 95-120.
  • Parker, K. R., & Chao, J. (2007). Wiki as a teaching tool. Interdisciplinary Journal of Knowledge and Learning Objects, 3, 57-72.
  • Parker, K. R., & Nitse, P. S. (2007). Bilgi yönetim merkezleri olarak kütüphaneler. (C. Aydýn, Trans.). Journal of Turkish Librarianship, 21 (1), 88-103. Parker, K. R., Chao, J. T., Ottaway, T. A., & Chang, J. (2006). A formal language selection process for introductory programming courses. Journal of Information Technology Education, 5, 133-151.
  • Parker, K. R., Ottaway, T. A., & Chao, J. T. (2006). Criteria for the selection of a programming language for introductory courses. International Journal of Knowledge and Learning, 2 (1/2), 119-139.
  • Parker, K. R. (2005). Lost river wind riders: A project for teaching database design. Communications of the Association for Information Systems, 16 (24), 475-494.
  • Beachboard, J. C., & Parker, K. R. (2005). Understanding information technology: What dgraduates from business-oriented IS curricula need tknow? Journal of Issues in Informing Science and Information Technology, 2, 219-236.
  • Parker, K. R., Nitse, P. S., & Flowers K. A. (2005). Libraries as knowledge management centers. Library Management Journal (Special Issue on Digital Libraries in the Knowledge Era: Knowledge Management and Semantic Web Technology), 26 (4/5), 176-189.
  • Parker, K. R., & Nitse, P. S. (2005). Improving competitive intelligence for knowledge management systems. International Journal of Internet and Enterprise Management (Special Issue on Business Intelligence for Competitive Advantages), 3 (1), 24-45.
  • Parker, K. R., LeRouge, C., & Trimmer, K. (2005). Alternative instructional strategies in an IS curriculum. Journal of Information Technology Education, 4, 43-60.
  • Nitse, P. S., Parker, K. R., Ottaway, T. A., & Krumwiede, D. W. (2004). The impact of color in the e-commerce marketing of fashions: An exploratory study. European Journal of Marketing, 38 (7/8), 898-915.
  • Parker, K. R. (2004). A data model validation approach for relational database design courses. Journal of Issues in Informing Science and Information Technology, 1, 813-825.
  • Nitse, P. S., & Parker, K. R. (2003). Library science, knowledge management, competitive intelligence: Archive theory the common link. The Reference Librarian, 38 (79/80), 395-407.
  • Parker, K. R. (2003). A database design case: Teton whitewater kayak. Journal of Information Systems Education (Special Issue on IS Teaching Cases), 14 (3), 271-274.
  • Nitse, P. S., Parker, K. R., & Dishman, P. L. (2003). Multi-class interest profile applications in the intelligence process. Marketing Intelligence and Planning, 21 (5), 263-271.
  • Parker, K. R. (2002). Using and enhancing online lecture materials. Mountain Plains Journal of Business and Economics, 3.
  • Saxby, C. L., Parker, K. R., Nitse, P. S., & Dishman, P. L. (2002). Environmental scanning and organizational culture. Marketing Intelligence and Planning, 20 (1), 28-34.

Referred Chapters

  • Parker, K. R., & Davey, B. (2012). The history of computer language selection. In A. Tatnall (Ed.), Reflections on the History of Computing: Preserving Memories and Sharing Stories (pp. 166-179). Boston, MA: Springer.
  • Davey, B., & Parker, K. R. (2010). Turning points in computer education. In A. Tatnall (Ed.), IFIP International Federation for Information Processing, Vol. 325 History of Computing: Learning from the Past (pp. 159-168). Boston, MA: Springer.
  • Parker, K. R., & Chao, J. (2008). Weaving a knowledge web with wikis. In M. D. Lytras, R. D. Tennyson, & P. Ordóñez de Pablos (Eds.), Knowledge Networks: The Social Software Perspective (pp. 28-45). Hershey, PA: Information Science Reference.
  • Parker, K. R., Nitse, P. S., & Davey, B. (2008). History of computing education trends: The emergence of competitive intelligence. In J. Impagliazz (Ed.), IFIP International Federation for Information Processing, Vol. 269 History of Computing and Education 3 (pp. 113-127). Boston, MA: Springer.
  • Davey, B., & Parker, K. R. (2006). Language history ‒ A tale of twcountries. In J. Impagliazz(Ed.), IFIP International Federation for Information Processing, Vol. 215 History of Computing and Education 2 (pp. 139-151). Boston, MA: Springer.
  • Parker, K. R. (2006). Enabling technologies for the semantic web. In M. D. Lytras, & A. Naeve (Eds.), Intelligent Learning Infrastructures for Knowledge Intensive Organizations: A Semantic Web Perspective (pp. 39-56). Hershey, PA: Information Science Reference.
  • Parker, K. R., & Nitse, P. S. (2006). Competitive intelligence gathering. In D. G. Schwartz (Ed.), Encyclopedia of Knowledge Management (pp. 44-50). Hershey, PA: Information Science Reference.

Referred Proceeding

  • Beard, D.V., Parker, K. R., Ottaway, T.A., Davey, W.F., & Schou, C.D. (2013). Requiring a systems analysis and design course for a computer science major. Proceedings of the 9th International Conference on Frontiers in Education: Computer Science & Computer Engineering, FECS 2013, July 22-25, Las Vegas, Nevada, USA. CSREA Press.
  • Parker, K. R., & Davey, B. (2011). Applied learning with the virtual teaching assistant. Proceedings of the Seventeenth Americas Conference on Information Systems, Detroit, MI: August 4-7, Paper 24.
  • Davey, B., Parker, K. R., & Lukaitis, A. (2011). e-Government and the elderly: A twcountry comparison. Proceedings of the Seventeenth Americas Conference on Information Systems, Detroit, MI: August 4-7, Paper 171.
  • Davey, B., & Parker, K. R. (2010). Technology in education: An agile systems approach. Proceedings of 2010 Informing Science + Information Technology Education (InSITE) Conference, Cassino, Italy: June 21-24 (pp. 297-306).
  • Trimmer, K., Parker, K. R., & Schou, C. (2008). Functional requirements: The reference monitor and use case. Proceedings of the Academy of Information and Management Sciences, Reno, NV: October 15-17 (p. 264).
  • Chin, K. L., Chang, E., Atkinson, D., & Parker, K. R. (2007). Ontology-based IT pedagogical knowledge framework. Proceedings of the 2007 Computer Science & Information Technology Education Conference, Mauritius: November 16-18 (pp. 155-166).
  • Parker, K. R., Davis, T., & Ward, D. M. (2007). Herbicide damage tracking system: An IS case study. Proceedings of the North American Case Research Association, 21 (10), Keystone, CO: October 18-20 (p. 58).
  • Trimmer, K., Parker, K., & Creelman, J. (2006). Lessons learned in a collaborative development project-documentation for physical therapy education. Proceedings of the International Conference on Informatics Education Research, Milwaukee, WI: December 9-10.
  • Ottaway, T. A., Parker, K. R., & Chao, J. T. (2006). The selection of a language for introductory programming courses: An exploratory survey. Proceedings of the Western Decision Sciences Institute, Waikoloa, HI: April 11-15 (pp. 270-272).
  • Schou, C., Trimmer, K., & Parker, K. R. (2005). Forcing early binding of security using a design reference monitor concept in systems analysis and design courses. Proceedings of the International Conference on Informatics Education and Research, Las Vegas, NV: December 9-11 (pp. 321-331).
  • Nitse, P. S., & Parker, K. R. (2005). Gathering information in the digital age using the semantic web. Frontiers of e-Business Research, Tampere, Finland: September 26-28 (pp. 603-614).
  • Parker, K. R., Trimmer, K., & LeRouge, C. (2005). The REA ontology as an alternative tdata flow diagrams. Proceedings of the 2005 Americas Conference on Information Systems, Omaha, NE: August 11-14 (pp. 2793-2801).
  • Nitse, P. S., & Parker, K. R. (2005). Integrating knowledge management and competitive intelligence intboth the retailing and services businesses. Proceedings of the 12th International Conference on Recent Advances in Retailing and Services Science, Orlando, FL: July 21-24.
  • Bezik, M. H., Smith, K., & Parker, K. R. (2005). SPUD's - A computer-assisted interactive project for use in intermediate accounting courses. 2005 Western Region American Accounting Association Meeting, Sacramento, CA: April 29-30.
  • Parker, K. R., Trimmer, K., & LeRouge, C. (2005). The correspondence between the REA ontology and data flow diagrams. 2005 Western Region American Accounting Association Meeting, Sacramento, CA: April 29-30.
  • Trimmer, K., & Parker, K. R. (2004). Revising instructional strategies in systems analysis and design. Proceedings of the 2004 International Conference on Informatics Education Research, Washington, DC: December 10-12.
  • Nitse, P. S., & Parker, K. R. (2004). Consumer perception of color depicted on e-commerce websites: An exploratory study. Proceedings of the 11th International EIRASS Conference on Recent Advances in Retailing and Services Science, Prague, Czechoslovakia: July 10-13.
  • Krumwiede, D., Parker, K. R., Nitse, P. S., & Ottaway, T. A. (2004). Customer sensitivity telectronically reproduced color products: Its effect on the operation of return goods. Distribution Business Management Association Annual Conference Proceedings, Chicago, IL: May 18-20 (pp. 1-9).
  • Parker, K. R., & Nitse, P. S. (2004). The impact of color inaccuracies on e-commerce sites. Proceedings of the Information Technology & Global Business Research Conference, Cancun, Mexico: March 10-13 (pp. 50-56).
  • Beachboard, J. C., & Parker, K. R. (2003). How much is enough? Teaching information technology in a business-oriented IS curriculum. Proceedings of the 2003 Americas Conference on Information Systems, Tampa, FL: August 4-6 (pp. 3026-3031).
  • Krumwiede, D., Nitse, P. S., Parker, K. R., & Ottaway, T. A. (2003). Returning internet purchased color sensitive products: The effect on the supply chain. Proceedings of the 7th International Conference of the Decision Sciences Institute, Shanghai, China: July 4-8.
  • Ottaway, T. A., & Parker, K. R. (2002). A conceptual model of structural adaptation in agent-based workflow management systems. Proceedings of the 2002 Americas Conference on Information Systems, Dallas, TX: August 9-11 (pp. 1476-1483).
  • Nitse, P. S., Parker, K. R., Ottaway, T. A., & Krumwiede, D. W. (2002). The impact of consumer perception on e-commerce transactions. Proceedings of the International Applied Business Research Conference, PuertVallarta, Mexico: March 14-19, CD-ROM.
  • Parker, K. R. (2001). Techniques tenhance online lecture materials. Proceedings of the 2001 Mountain Plains Management Conference, Pocatello, ID: October 17-19.
  • Aytes, K., & Parker, K. R. (2001). Using the web tcreate a dynamic, interactive learning environment. Proceedings of the 2001 Mountain Plains Management Conference, Pocatello, ID: October 17-19.
  • LeBlanc, R., & Parker, K. R. (2001). A customer-based framework for understanding e-commerce relationships. Proceedings of the International Business & Economics Research Conference 2001, Reno, NV: October 8-12. Received Best Paper Award.
  • Parker, K., & Nitse, P. S. (2001). Improving competitive intelligence gathering for knowledge management systems. Proceedings of the 2001 International Symposium on Information Systems and Engineering (ISE'2001-Workshop: Knowledge Management Systems: Concepts, Technologies and Applications), Las Vegas, NV: June 25-28 (pp. 122-128).
  • Parker, K. R., & Nitse, P. S. (2000). A multi-class interest profile (M-CLIP) for online competitive intelligence systems. Proceedings of the Society of Competitive Intelligence Professionals (SCIP) Academic Conference on Competitive Intelligence: Curriculum and Research, Philadelphia, PA: December 8.

Sean K. Anderson, PhD

  • Professor
  • Political Science

Academic Degrees:

  • Ph.D.--Political Science--University of Oklahoma, 1993
  • M.A.--Political Science--University of Oklahoma, 1992
  • M.B.A.--Business Economics--University of Washington, 1978
  • B.A.--Philosophy and Classical Languages--Western Washington University, 1975

Doctoral Fields:

  • Comparative Politics
  • International Relations
  • American Politics
  • The Impact of Internal Islamic Fundamentalism on Iranian Support for Transnational Terrorism

Professional Experience:

  • Professor--Department of Political Science, Idaho State University, 2003--
  • Associate Professor--Department of Political Science, Idaho State University, 1998--2003
  • Assistant Professor--Department of Political Science, Idaho State University, 1993-1998
  • Graduate Teaching Assistant--Department of Political Science, University of Oklahoma, 1989-1993
  • Research Assistant--Bureau of Government Research, University of Oklahoma, 1988-89
  • Research Analyst--Dalton and Associates, Inc., 1983-88
  • Chief Editor--International Department, Pars News Agency (Tehran), 1980-82

Courses Taught:

  • Introduction to Administrative Process--Idaho State University
  • Introduction to Comparative Politics--Idaho State University
  • Introduction to Politics--Idaho State University
  • Terrorism and Political Violence--Idaho State University
  • Senior Seminar on Religion, Culture and Politics--Idaho State University
  • Resurgence Movements Doctoral Seminar--Idaho State University
  • Political Order and Change--Idaho State University
  • Politics of Developing Nations--Idaho State University
  • Government of the United States--University of Oklahoma and Idaho State University
  • The Middle East: Contemporary Politics and Problems--Oklahoma Center for Continuing Education and Idaho State University

Memberships in Professional Associations:

  • American Political Science Association, Comparative Politics and American Politics sections 1991--
  • Pacific Northwest Political Science Association 1995--
  • Academy of Criminal Justice Sciences 1995--
  • American Society for Industrial Security 1996--
  • International Association for Counterterrorism and Security Professionals 2001--

Professional Writing:

  1. "U.S. Counter-Insurgency vs. Iranian-Sponsored Terrorism," submitted for publication to Low Intensity Conflict & Law Enforcement (Frank Cass publishers) special issue on "Networks, Terrorism, and Global Insurgency," February 2004.
  2. Entry on "Al-Qaeda" accepted for publication in Encyclopedia of International Relations and Global Politics, ed. Martin Griffiths, Routledge: London, 2004.
  3. Book Review of Inside Al-Qaeda: Global Network of Terror by Rohan Gunaratna, Governance: An International Journal of Policy and Administration, Volume 16, Number 4, October 2003 (pp. 625-635).
  4. (with Stephen Sloan), Terrorism: Assassins to Zealots, (Blue Summit Ridge, PA: Rowman & Littlefield/University Press of America, Feb 2003).
  5. (with Stephen Sloan), Historical Dictionary of Terrorism, Second Edition, (Blue Summit Ridge, PA: Rowman & Littlefield/University Press of America, March 2002).
  6. "Warnings versus Alarms: Terrorist Threat Analysis Applied to the Iranian State-Run Media," in Richard Harvey W. Kushner, ed., Essential Readings On Political Terrorism (Lincoln: University of Nebraska Press, May 2002).
  7. Book Review of The Constitution of Iran: Politics and the State in the Islamic Republic by Asghar Schirazi, accepted for publication by Governance: An International Journal of Policy and Administration, Volume 13, Number 3, July 2000 (pp. 409-438).
  8. Book Review of Comparing Asian Politics: India, China, and Japan by Sue Ellen M. Charlton, Social Science Journal, 37 (Winter(1): 2000), 145-160.
  9. "Warnings versus Alarms: Terrorist Threat Analysis Applied to the Iranian State-Run Media," Studies in Conflict and Terrorism, 21 (Fall 1998): 277-303.
  10. (with Stephen Sloan), "Patterns of State-Sponsored Terrorism: A Comparative Study of the 1980s and Changes in the 1990s", in FOA Report on Terrorism, edited by Dr. Gunnar Jervas, (Stockholm, Sweden: Defence Research Establishment, June 1998)
  11. Book Review of Islamic Fundamentalist Terrorism, 1979-95: The Iranian Connection by Edgar O'Ballance, Journal of Conflict Studies, 18 (spring 1998): 161-163.
  12. (with Stephen Sloan), Historical Dictionary of Terrorism, (Metuchen, NJ: Scarecrow Press/University Press of America, 1995).
  13. "Iran: Terrorism and Islamic Fundamentalism," in Edwin G. Corr and Stephen Sloan, eds., Low-Intensity Conflict: Old Threats in a New World (Boulder: Westview Press, 1992), pp. 173-95.
  14. (with David R. Morgan), "Assessing the Effects of Political Culture: Religious Affiliation and County Political Behavior," The Social Science Journal, 28 (Spring 1991): 163-74--presented at the 1989 Southwest Political Science Association Meeting, Little Rock, Arkansas.
  15. "Iranian State Sponsorship of Terrorism," Conflict Quarterly, 11 (Fall 1991): 19-34--presented at the 1990 Conference of the University of Manitoba Counter-Terror Study Centre, Winnipeg, Manitoba.

Other Professional Activities:

  • "Understanding Terrorism and Counter-Terrorism," presented for the Casper College Continuing Education Program Series, Casper, Wyoming, April 25, 2003.
  • "Forum on Iraq" presented on February 11, 2003 at the United Methodist Church of Pocatello, presenting the history and political culture of Iraq, the background of the Ba`thist Party and Saddam Hussein, and the controversy over the purported weapons of mass destruction
  • "The Political Culture of the Middle East," presented for the College of Southern Idaho, Symposium on International Relations Twin Falls, Idaho, November 28, 2002.
  • "Psychology of Terrorists and Terrorist Groups," presented at the McMahon Symposium on International Affairs held in Norman, Oklahoma on February 25, 2002, a public forum at the University of Oklahoma sponsored by the OU School of Journalism.
  • "Iran: Present and Future Prospects", presented for the Casper Committee on Foreign Relations, Casper, Wyoming, December 13, 2001.
  • "Terrorism in the New Millennium," presented for the Student Program Board of Boise State University, Boise, Idaho, October 4, 2001.
  • "Pro-Active U.S. Intervention Overseas and Anti-U.S. State- Sponsored Terrorism: Evidence from the Iranian Case 1980-1990," presented at the the International Relations panel of the Pacific Northwest Political Science Association annual conference held October 19, 2001 in Coeur d'Alene, Idaho.
  • "Understanding What Terrorism Means to Rural Idaho," co-presented with Stephen Sloan Conferences held from August 14 through August 17, 2000, in Twin Falls, Pocatello, and Idaho Falls in conjunction with Idaho Bureau of Disaster Services.
  • "Profiles of Terrorist Groups and Individuals," workshop presented at Idaho At Risk: Domestic Preparedness and Emergency Response to Terrorism Conference" co-hosted by ISU Continuing Education and Special Programs Office and the Federal Emergency Management Agency on July 28, 2000.
  • "Pro-Active U.S. Intervention Overseas and Anti-U.S. State- Sponsored Terrorism: Evidence from the Iranian Case 1980-1990," presented at the conference "Terrorism and Beyond: The 21st Century,"co-sponsored by the Oklahoma City National Memorial Institute for the Prevention of Terrorism and Rand Corporation on March 17, 2000 in Oklahoma City.
  • "International Terrorism in the 21st Century", presented for the Casper Committee on Foreign Relations, Casper, Wyoming, October 28, 1999.
  • Co-Author, Active Learning Guide for American Government, (NewYork: Addison-Wesley, 2000)
  • Participant, joint American Society for Industrial Security and Webster University Education Symposium held June 6-8, 1997 at Webster University, St. Louis, Missouri.
  • "Idaho Elections 1994-1996: The Role of Political Culture in the Making of the Most Republican State," presented at the annual meeting of the Southwestern Social Sciences Association held at New Orleans, March 26 - 29, 1997.
  • "Islamic Fundamentalism, Middle Eastern Terrorism and Future Threats to U.S. Interests," address presented on September 20 at the 1994 annual convention of the American Society for Industrial Security, Las Vegas, Nevada.
  • "Warnings versus Alarms: Terrorist Threat Analysis Applied to the Iranian State-Run Media," paper presented on March 10 at the 1995 annual convention of the Academy of Criminal Justice Sciences, Boston, Massachusetts.
  • "The Abkhazian Secession: Regional and International Ramifications," paper (co-authored with Dennis P. Wilkinson) presented on March 16 before the panel on "Foreign Policy and Regional Relations of the Former Soviet Union" of the 1995 Western Political Science Association Meeting, Portland, Oregon.
  • "Amal and Hizballah: Diversity Within The Shi`a Islamic Resurgence Movements," paper (co-authored with Justin K. Elledge) presented on March 17 before the panel on "Politics of Diversity in Emerging Nations," of the 1995 Western Political Science Association Meeting, Portland, Oregon.

Special Interests and Skills:

  • Policy Interests:
    • Middle Eastern Politics
    • Islamic resurgence
    • transnational terrorism
    • national security policy
    • religion and politics in contemporary American society
  • Languages:
    • Persian
    • Arabic
    • French
    • German
  • Quantitative Methods:
    • econometrics
    • regression and times-series analysis
    • factor analysis
    • discriminant and cluster analysis
  • Honors and Awards:
    • John Leek Scholarship--University of Oklahoma, 1989-1992
    • United States Department of Defense Foreign Languages and Area Studies Fellowship--University of Utah, Summer 1989
    • Distinguished Graduate Awards in Honors Program and Philosophy-- Western Washington University, 1975
  • Personal Interests:
    • Powerlifting
    • Mountaineering and Hiking
    • Old and New Testament Biblical Studies
    • Non-Human Primates

References:

  • Ambassador Edwin G. Corr, University of Oklahoma, Director of Energy Institute of the Americas, Associate Director of the International Program Center
  • Admiral William J. Crowe, Jr. (USN, Ret.), University of Oklahoma, University Professor of Geopolitics emeritus, Senior Fellow, Center for Strategic and International Studies
  • Dr. James A. Aho, Professor of Sociology, Idaho State University
  • Dr. Stephen Sloan, Professor of Political Science, University of Oklahoma
  • Dr. Brent L. Smith, Professor and Chair, Department of Justice Sciences, University of Alabama at Birmingham

Curriculum Vitae

Professor Jill Slay AM PhD




Nationality British and Australian

 

Academic Qualifications

YearQualificationUniversity
2000 PhD Curtin University of Technology, Australia
1994 Graduate Diploma in Further Education University of Southern Queensland, Australia
1990 Graduate Diploma in Applied Computing Central Queensland University, Australia
1975 B.Sc. Hons Engineering (Mechanical) Hatfield Polytechnic (University of Herts) UK.

 

Other Qualifications

YearQualificationUniversity
2012 Strategic Leadership and Culture Mount Eliza Business School, Melbourne.
2005 Leadership Development Program Mount Eliza Business School, Melbourne
1992-94 Mandarin Language: BA Honours Intensive USQ/ Monash / Nanjing Normal University

 

Honours, Professional Memberships and Distinctions

2013
International Information Systems Security Certification Consortium (ISC2) Certified Cyber Forensics Professional
2012
Director and Member of Board of International Information Systems Security Certification Consortium.
2011
Member of the Order of Australia (AM) for service to the information technology industry through contributions in the areas of forensic computer science, security, protection of infrastructure and cyber-terrorism.
2010
Fellow International Information Systems Security Certification Consortium for service to information security industry.
2008
Fellow Australian Computer Society for service to Australian IT research and education.
2004
International Information Systems Security Certification Consortium (ISC2) Certified Information Systems Security Professional.
2002
Member Institute of Electrical and Electronic Engineers.
2002
Adjunct Professor at Idaho State University , National Information Assurance Training and Education Center, designated National Center of Academic Excellence in Information Assurance Education by the National Security Agency.

 

Employment History

2014 ongoing

Director, Australian Centre for Cyber Security Centre, University of New South Wales, Canberra, Australia.

I lead and direct The Australian Centre for Cyber Security (ACCS) is a unique, interdisciplinary cyber security research and teaching centre located at UNSW Canberra. ACCS provides cutting-edge, long-term, international thought-leadership in cyber security through research, education and external engagement, at a time when cyber security is moving to the top of global political, scholarly and commercial agendas.

The center enhances UNSW's existing and emerging research strengths in five broad research areas:

  1. computer and network security
  2. risk management
  3. international politics and ethics
  4. law, regulation and justice and
  5. big data analytics for security

ACCS combines expertise from a range of relevant communities; political, cyber industry, defence, academic, individual and organisational users, and the media. The centre builds on close working relationships with both domestic and international industry and government, including UNSW's unique half-century relationship with Defence.

2012 - 2013

Executive Dean of IT: Polytechnic of Namibia (Namibia University of Science and Technology) / Professor of Forensic Computing, University of South Australia

On an extended sabbatical, I led the School of IT at the Polytechnic of Namibia and managed 50 staff who teach 1000 students at Bachelor, Honours and Masters/PhD level in Networking, Software Engineering and Business Computing. I have redeveloped curriculum in line with IEEE/ ACM/ AIS and am preparing for the transition of the Polytechnic to the Namibia University of Science and Technology at the end of 2013.

I also led a Forensic Computing Research group with 8 members and supervise 2 Masters in the area. I am advising the Namibian President's Department and other Namibian Government Ministries on Cybersecurity issues for both military and civilian applications with a view to developing National Information Security Management policies and supporting the urgent development of Cybercrime legislation in Namibia.

In Australia, I also led the UnISA Information Assurance Research Group and its Forensic Computing lab. I graduated 5 PhDs in 2012 and in 2013 had 4 more students complete their PhD studies. In 2012, I also won another Australian Category 1 NDLERF grant ($300k) and have ongoing grant funded research in Cloud and Mobile forensics at the University of South Australia.

2009 - 2012

Dean: Research/ Professor of Forensic Computing

Division of IT, Engineering and the Environment

University of South Australia, Mawson Lakes, South Australia

In this role I:

  1. Ensured my Division of the University of South Australia made strategic research submissions to the Australian government.
  2. Built University research quality by:
    • Collaborating in development of fellowship and grant application policy;
    • Writing large grants, leading bids and tenders for national collaborative research centres;
    • Reviewing and mediating in complex research ethics disputes;
    • Membership of Research Degrees Committee, Research Policy Committee and 4 other strategic research committees;
    • Leading Excellence in Research Australia Internal Reference groups.
  3. Implemented strategies for focusing and growing Divisional research.
  4. Grew PhD student load by supporting scholarships, developing international relationships and promoting research strength in local and overseas markets (including setting up new international research collaborations in India, Malaysia and China).
  5. Chaired Divisional research management and research degrees committees and managed the research lifecycle of 380 PhD students via a network of 9 Research degree co-ordinators and 10 administrative staff.
  6. Directed the Division's Senior Business Manager and accountants to ensure that key research and research education financial targets from fees, grants, contracting, consulting and commercialisation were being met and that forecasting and budgeting were effectively carried out.

2007 - 2008

Director: Forensic Computing Research

Center Defense and Systems Institute

University of South Australia, Mawson Lakes

During this period (and in my previous position) I established an international research reputation in forensic computer science, IT security, critical infrastructure protection and cyber terrorism. I set up the Information Assurance Research Group and its Foresic Computing lab and led 20 plus researchers and graduate students in a range of research projects in Forensic Computing and set up and developed curriculum and taught a Masters Degree in Forensic Computing and Security which has developed successfully and is about to be offered through OUA.

With a variety of collaborators, I instigated cross-disciplinary research that draws on social science, anthropology, law, drugs and crime, police and justice studies, as well as systems and communications engineering and IT, to achieve its aims.

In this time, I developed trusted relationships with government and industry within an Australian security research agenda and led up to 5 major research projects with law enforcement and industry, and approximately 20 industry based researchers in these tasks. Twenty of my Honours, Masters and PhD graduates produced in this time were employed in developing computer forensic and IT security software and networking solutions for industry and Federal government agencies and in advising industry and government on strategy and policy in this research domain.

I advised both federal and state police and government and was responsible for setting up the National Standards for Forensic Computing software validation and verification in Australia, in conjunction with all state and federal law enforcement and the Australian National Institute of Forensic Science. This involved a team of up to forty researchers and practitioners.

2005 - 2006

Director of International Program

School of Computer & Information Science

University of South Australia, Mawson Lakes

From January 2000 until December 2004, I was Director of International Programs in the School of Computer and Information Science (CIS). This involved:

  • acting as Program Director for all onshore Masters degrees and relationship manager for all CIS transnational programs (more than 1000 students at our peak in HK, Singapore and Malaysia)
  • the oversight of pastoral care and student support for all CIS onshore fee paying international students (approximately 300 students)
  • the development of articulation and credit transfer relationships with transnational partners; • the recruitment and induction of offshore academic staff with trans-national partners

During the period 2000-2006, I also developed and acted as Course Coordinator for a new stream of four courses in the previously untaught University of South Australia specialization of Information Assurance (Holistic Information Security).

  1. Secure and High Integrity Systems: 3rd Year core Computer Science course and taught annually to approximately 400 students in Adelaide, Hong Kong and Malaysia from 2001 to 2006.
  2. Wireless Networking and Security: 4th Year elective course for honours and Masters coursework courses and taught annually to approximately 100 students in Computer Science and Telecommunications Engineering in 2005 and 2006.
  3. Secure and High Integrity Systems M: This course is similar in structure and content to Secure and High Integrity Systems, and was developed for Masters of ICT Management students and is cross-disciplinary with no IT prerequisite.
  4. Forensic Computing: Tools and Techniques: 4th Year elective course for honours and Masters coursework in Engineering and ICT developed in collaboration with South Australian and New South Wales Police.

Research Income

  • 2013: Evidence-based Digital Forensic Framework for Cloud Computing and Solid State Drives - ZAR 400,000 Chief Investigator withProfessor Hein Venter (University of Pretoria) on a South African NRF Grant.
  • 2013: Cloud Forensics - Australian National Drug Law Enforcement Research Fund (Cat 1) - $265,000. Development of forensic tools for the investigation into cloud forensics. Commencing.
  • 2011: Fulbright Grant - Securing Our Cyber Future - $30,000. Chief Investigator with Dr Raymond Choo.
  • 2011: Detecting Hidden Groups in High Dimensional Network Structures - Defence Science and Technology Organisation - $360,000.
  • Chief Investigator with Dr Belinda Chiera and Professor Lang White
  • 2010: Mobile Phone Forensics - Australian National Drug Law Enforcement Research Fund (Cat 1) - $300,000 Chief Investigator: Development of forensic tools for the investigation into mobile phone forensics. Still ongoing with several State Police agencies
  • 2009: Relationship between the usage of Information and Communication Technologies (ICT) by Muslim, migrant and second generation Australian youth and social and political Participation in Australian Society and access to Services. - Department of Immigration and Citizenship $88,000. Lead Chief Investigator with Professor Pal Ahluwalia: a cross-disciplinary report on best practice for Government.
  • 2009: Data Exploitation for Critical Infrastructure Protection: Gathering Intelligence from Digital Evidence Collected from IT Networks and Process Control Systems. Australian Research Council $560,000. Chief Investigator: Future Fellowship.
  • 2008: Extraction of Electronic Evidence from Voice over Internet Protocol - Australian Research Council Linkage Grant $78,000. Chief Investigator :A methodology, and proof-of-concept application, to collect electronic evidence dynamically from networks where VoIP conversations play an important role in suspected criminal activity or communications. Led team of 20 plus scattered across Australia.
  • 2008: Australian Department of Prime Minister and Cabinet National Security Science and Technology (PMC-NSST- Cat 1) Grant $60,000. Sole Chief Investigator: SCADA Security and Forensic Architectures.
  • 2007: VoIP Privacy and Forensics - Australian Research Council Discovery Grant $80,000. Sole Chief Investigator: Extension of the investigation into the effect of VoIP on user privacy and the ability of law enforcement to carry out forensic analysis.
  • 2007: Validation and Verification of Electronic Evidence: Developing a Testing Regime for Digital Forensic Software Reliability - Australian Research Council Linkage Grant $132,000. Chief Investigator: A functional analysis of the Electronic Evidence preservation and analysis processes currently used to provide national specifications for forensic software development, tool testing and validation. Led team of 20 plus scattered across Australia.
  • 2006: VoIP Privacy and Forensics - Federal Department of Communications, IT and the Arts (DCITA) Telecommunication Research Grant (Cat 1) $68,000. Chief Investigator: The effect of VoIP on user privacy and the ability of law enforcement to carry out forensic analysis
  • 2006: Forensic Tools for Internet-mediated drug crime - funded by Australian National Drug Law Enforcement Research Fund (NDLERF - Cat 1) - $195,000. Chief Investigator: Development of forensic tools for the investigation of internet mediated drug crime and a comprehensive review of the nature of the major types of drug crime in Australia. The use of the Internet within such drug crimes was also being determined and suitable software solutions were developed. Worked with several Australian Government departments and multiple team members.

Selected Editorial Boards, Conference Organisation, Reviews, Thesis Examination.

  • Editor-in-Chief Information Security Journal: A Global Perspective. Taylor and Francis
  • Associate Editor of the International Journal of Digital Crime and Forensics
  • Member of the Editorial Boards of:
    • Journal of Digital Forensics, Security and Law (USA)
    • Journal of Small Device Forensics
  • Joint Chair of the First National Forensic Practitioners Conference in Adelaide 2008
  • Joint Program Chair of ARES 2008; Workshop Chair 2008, 2009, 2010, 2011
  • Member of the Conference Committees of:
    • Australian Computer Science week - AISC 2012, 2013, 2014
    • DFIS-2013
    • ICCSM 2013
    • ICDFI 2012, 2103
    • ISSA 2013
    • E-Forensics 2008, 2009
    • Colloquium on Information Systems Security Education (CISSE) 2005, 2006
    • SEC 2004- IFIP 11.1 Workshop and WISE 4 IFIP 11.8 Workshop
    • 5th , 6th , 7th Australian IW Conference
    • 2nd and 3rd Australian Computer Forensics Conference
    • InfoSec 2004
    • 2nd , 3rd , 4th and 5th European Information Warfare Conferences
    • 1st and 2nd Australian InfoSec Conferences, 2003 and 2004
    • EICAR 2004, 2005, 2006
  • Examined 17 PhD theses and 2 research Masters theses in IT Security and Forensic Computing, and 2 PhDs in online learning environments
  • Research Assessor for Australian Research Council 2009, 2010, 2011, 2012
  • Evaluator for South African National Research Foundation rating scheme 2009, 2010
  • Expert Evaluator in Security for EU Framework 7, 2011

PhD Completions

  1. Dr Benjamin Turnbull 2007- Wi-Fi as Electronic Evidence: Policy, Process and Tools- now DSTO Senior Scientist.
  2. Dr Jason Beckett 2008- Forensic Computing: A Deterministic Model For Validation And Verification Through An Ontological Examination Of Forensic Functions And Processes- now Research Leader at an Australian Federal Government Lab.
  3. Dr Yi Chi Lin 2008 - A Study of Computer Forensics from A Cross-Cultural Perspective: Australia and Taiwan - now at SAPOL Forensic Computing Lab.
  4. Associate Professor Ray Hunt 2009 - Development of Internet Technology, Infrastructure and Security- now at University of Canterbury, NZ
  5. Dr Sameera Mubarak 2009 - Awareness of Computer Crime and its impact on Information Security Management among law practices in relation to trust accounts: Guidelines for best practice - Lecturer at University of South Australia
  6. Dr Matt Simon 2012 - Physical Memory Forensics for Investgating Internet-based communication Technologies-now at SAPOL Forensic Computing Lab
  7. Dr Grant Osborne 2012 - The ExPlore, Investigate and Correlate Process for Information Visualisation in Digital Forensics - now DSTO Scientist.
  8. Associate Professor Dhenesh Virallikattur 2012 - Integrated Tool-support for small Team meetings within Organisations- VIT India
  9. Dr Sally Legg 2012 - Environmental Law- University of South Australia
  10. Dr Allan Watt 2013 - Development of a Framework for the Investigation into the Methods Used for the Electronic Trafficking and Concealment of Child Abuse Material - now at NSW Police / Macquarie University.
  11. Dr Angela Irwin - Money laundering and terrorism financing in virtual environments: a feasibility study - UniSA
  12. Dr David Irwin - The Extraction of Electronic Evidence form the Voice over IP Protocol - UniSA
  13. Aswami Arrifin - A General Model of Forensic Data Recovery Framework for Digital CCTV Systems - now, and previously, CTO Cybersecurity Malaysia

PhD Ongiong

  1. Ben Martini- Cloud forensics - UniSA
  2. Suhailia - SCADA System Security Measures for Critical Infrastructures - UniSA
  3. John Shimaneni - A Forensic Framework for Namibia - NUST and Pretoria.

Research Reports

  • Slay, J., Gordon, S., & Zhao, WQ., 2005. Mobile Communications and Customer Confidence: Closing the Security Gap. Prepared for Department of Communications, Information Technology and the Arts
  • Slay, J.,& Simon, M., 2007. Voice over IP: Privacy and Electronic Evidence Implications. Prepared for Department of Communications, Information Technology and the Arts. Defence and Systems Institute. University of South Australia.
  • Turnbull, B., & Slay, J., 2009. Tools to Police Internet-Based Drug Crime. Developed for the National Drug Law Enforcement Research Fund and summary to be published as a Research Monograph.

Invited Plenary Addresses at Conferencs

  1. Plenary Address SecureAsia@Beijing, 7-8 August 2014
  2. Plenary Address SecureAsia@Manila, 7-8 August 2013, 'Mobile Phone forensics'
  3. Keynote Address Secure Johannesburg, November 2012, 'Cloud forensics'
  4. Plenary Address SecureAsia@Jakarta 26-27 July 2011, 'Cloud forensics'
  5. Plenary Address Secure Sydney, July 2011, 'Cloud forensics'
  6. Plenary Address Cyber security Malaysia , July 8th 2009. 'Developing a Forensics Plan for SCADA Networks
  7. Plenary Address SCADA Security and Controls. Singapore 2009. 'Developing a Forensics Plan for SCADA Networks
  8. Keynote speaker 10th Cyberspace, Cyber-security, Cybercrime and Cyber-law Conference 2009, Fu Jen University , Taiwan. 'SCADA and process control system security and forensics'
  9. Keynote Speaker ITARC Singapore 2008, 'A Systems Approach to SCADA Security Architecture'
  10. Invited Speaker Australasian Areva Users Conference 2008. 'Cyber- Security and Forensics for SCADA'
  11. Keynote Speaker Secure HK Conference 2008. 'SCADA Security and Forensics'
  12. Keynote Speaker Bridgepoint Australia IT Security Forum 2008. 'SCADA Security and Forensics'
  13. Keynote Speaker E-Forensics 2008, Adelaide University. Voice over IP and forensics'
  14. Keynote Speaker Central Police University, Taiwan, 2007. 'Advances in Forensic Computing research'

Selected Publications 2007 - 2014

Book Chapters

  1. S Ismail, E Sitnikova, J Slay 2014.Towards Developing SCADA Systems Security Measures for Critical Infrastructures against Cyber-Terrorist Attacks'. ICT Systems Security and Privacy 'Protection, 242-249.
  2. Arrifin, A., Slay, J & Choo, R. 2013. 'Digital CCTV forensics: Recovery of data stored in proprietary-formatted files on a CCTV hard disk' . Advances in Digital Forensics IX, Springer
  3. Irwin, D & Slay, J. 2011.' A Digital Forensic Tool For The Extraction Of Electronic Evidence From The Voice Over Internet Protocol'. Advances in Digital Forensics V7. Volume 338 of Advances in Information and Communication Technology; Springer-Verlag GmbH, Boston (accepted 20/1/2011)
  4. Guo, YH., & Slay, J., 2010. 'Data Recovery Function Testing for Digital Forensic Tools' in Advances in Digital Forensics VI. Volume 337 of Advances in Information and Communication Technology; Springer-Verlag GmbH, Boston. pp. 297-311
  5. Slay, J., Lin, Y.C., Turnbull, B., Beckett, J.J., Lin, P.I.L 2009. 'Towards a Formalization of Digital Forensics', in Advances in Digital Forensics V. Springer, Boston. pp. 37-47
  6. Slay, J. & Sitnikova, E, 2009. 'The Development of a Generic Framework for the Forensic Analysis of SCADA and Process Control Systems.' In Forensics in Telecommunications, Information and Multimedia. Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, Springer , Boston, USA, Vol. 8, pp.76-81
  7. Turnbull, B, Slay, J & Pavlic, T 2008, 'Evidence Collection Using Google Desktop Search' in Advances in Digital Forensics. Springer, Boston, USA. pp. 43-50
  8. Simon, M & Slay, J 2007, 'Forensic Computing Training, Certification, and Accreditation: An Australian Overview, in Fulcher, L., Dodge, R., (Eds) IFIP International Federation for Information Processing, Volume 237, Fifth World Conference on Information Security Education, Springer, Boston, pp. 1-8
  9. Slay, J & Miller 2007, 'The Maroochy Water SCADA Breach: Implications of Lessons Learned for Research', in Advances in Critical Infrastructure Protection. Springer, Boston, USA, pp. 73-82
  10. Slay, J 2007, 'Naturalistic Inquiry in Cross-Cultural research: a Narrative Turn' in Taylor, P.C.& Wallace, J. (Eds.) . Contemporary qualitative research: Exemplars for science and mathematics educators. Springer, Boston, pp. 90-101
  11. Taylor, J, Slay, J & Kurzel, F 2007, 'Learning Object Applications & Future Directions' in A. Koohang & K. Harman (Eds.) Learning Objects: Applications, Implications, & Future Directions ISBN 83-922337-8-6, Informing Science Press, pp. 35-61

Peer - Refereed Journal Articles

  1. Irwin ASM, Slay J, Choo K-K R and Liu L. 2014. 'Money laundering and terrorism financing in virtual environments: A feasibility study'. Journal of Money Laundering Control. 7 (1), 50-75
  2. Tassone C, Martini C, Choo K-K R and Slay J. 2013. ' Mobile device forensics: A snapshot'. Trends & Issues in Crime and Criminal Justice
  3. ASM Irwin, J Slay, KKR Choo, L Liu. 2013 'Are the financial transactions conducted inside virtual environments truly anonymous?: An experimental research from an Australian perspective?'. Journal of Money Laundering Control. 16 (1), 6-40
  4. Virallikattur S Dhenesh, Elena Sitnikova and Jill Slay. 2012. ' An Integrated Tool-Support for Small Team Meetings: Lessons from Observations of Team Meetings in Organisations'. International Journal of Computer Applications 45(7):1-7, May 2012
  5. Arrifin, A., Jazri, H, Slay, J. and Lee, I. 2012. 'Digital Forensics Institute in Malaysia: The Way Forward'. Digital Evidence and Electronic Signature Law Review. Digital Evidence & Elec. Signature L. Rev. 9, 51
  6. Irwin, D & Slay, J, Dadej, A and Shore, M. 2011. 'Extraction of Electronic Evidence From VoIP: Forensic Analysis Of A Virtual Hard Disk Vs Ram", Journal of Digital Forensics Security & Law. 6(1), 6 (1), 8-12
  7. Slay, Jill 2011, 'Being, becoming and belonging: Some thoughts on academic disciplinary effects'. Cultural Studies of Science Education. http://www.springerlink.com/content/vx2l374x7x8t1k05/fulltext.html.
  8. Beckett, J & Slay, J. 2011. ' Scientific Underpinnings And Background To Standards And Accreditation In Digital Forensics'. Digital Investigation. 8(2), 114-121
  9. Simon, M & Slay, J. 2011. ' Investigating Modern Communication Technologies: The effect of Internet-based Communication Technologies on the Investigation Process. Journal of Digital Forensics Security & Law. Vol6n4
  10. Mubarak, S., & Slay, J. 2010. 'Protecting clients from insider attacks on trust accounts'. Information Security Technical Report (Elsevier). 202-209
  11. Guo, Y., Slay, J., & Beckett, J., 2010 'Testing Forensic Copy Function of Computer Forensics Investigation Tools'. Journal of Digital Forensic Practice, 1556-7346, Volume 3, Issue 1, 46 - 61
  12. Guo, Y. & Slay,J. 2010 'Computer Forensic Functions Testing: Media Preparation, Write protection and Verification", Journal of Digital Forensics Security & Law, v5n2, pp. 5-20
  13. Guo, Y., Slay, J., & Beckett, J., 2009, 'Validation and verification of computer forensic software tools-searching function,' Digital Investigation, 6(1), pp. S12 - S22. (A - Impact factor 0.96).
  14. Zhang, LR, Cook, S, & Slay, J., 'Multi-layer security architecture for military communications over Internet', Accepted for publication in ACM Trans. on Information and System Security, Sep. 2008. (A* -Impact factor 4.529)
  15. Slay, J., & Simon, M., 2009. Voice over IP: Privacy and Forensic Implications. International Journal of Digital Crime and Forensics. 1(1)
  16. Pavlic, T., Slay, J. & Turnbull, B. 2008, 'Developing a Process Model for the Forensic Extraction of Information from Desktop Search Applications', Journal of Digital Forensics, Security and Law, 3(1), pp. 33-55
  17. Budimir, N., & Slay, J. 2007. 'Identifying Non-Volatile Data Storage Areas: Unique Notebook Identification Information as Digital Evidence. Journal of Digital Forensics, Security and Law, 2(1), pp.75-91

Peer - refereed Conference Papers

  1. S Ismail, E Sitnikova, J Slay. 2014. Using integrated system theory approach to assess security for SCADA systems cyber security for critical infrastructures: A pilot study. 11th International Conference on Fuzzy Systems and Knowledge Discovery (FSKD)
  2. Arrifin A, D'Orazio C, Choo K-K R and Slay J. 2013. 'iOS Forensics: How can we recover deleted image files with timestamp in a forensically sound manner?' In International Conference on Availability, Reliability and Security, Prague (ARES 2013), University of Regensburg, Germany, 2 - 6 September 2013
  3. Ariffin A, Choo K-K R and Slay J. 2013. 'Digital Camcorder Forensics'. In Australasian Information Security Conference (ACSW-AISC 2013), Adelaide, South Australia, Volume 138 of the ACS Conferences in Research and Practice in Information Technology (CRPIT) series (pp. 39-47), Australian Computer Society, 29 January - 1 February
  4. Slay, J. 2012. 'Forensic Computing: A Review of Research and Operational Challenges'. Secure Sydney, August 2912
  5. Slay, J., Machanja, A., Martini, B., & Choo, R.K.K. 2012. 'Towards a holistic service-oriented framework for digital forensic investigation in the cloud'. SATN 2012, PON
  6. Grant Osborne, Benjamin Turnbull, Jill Slay. Development of InfoVis Software for Digital Forensics. In Proceedings of COMPSAC Workshops 2012: 213-217
  7. Sitnikova E., Slay J. 2012. 'Pathway into a Security Professional: A new Cyber Security and Forensic Computing Curriculum', ADFSL Conference on Digital Forensics, Security and Law Richmond, Virginia, USA ,May 30-31, 2012
  8. Hunt, R., and Slay, J., A New Approach to Developing Attack Taxonomies for Network Security - Including Case Studies, Proceedings of the 17th IEEE International Conference on Networks, Dec. 14-16, 2011, Singapore
  9. Simon, M & Slay, J. 2011. ' Recovery of Pidgin Chat Communication Artefacts from Physical Memory: A Pilot Test to Determine Feasibility'. ARES 2011
  10. Osborne, G & Slay, J. 2011. 'Digital Forensics Infovis: An implementation of a process for visualisation of digital evidence' ARES 2011
  11. Hunt, R. & Slay, J., 2010, 'The Design of Real-time Adaptive Forensically Sound Secure Critical Infrastructure'. NSS2010, Melbourne, September 1-3 2010
  12. Simon, M., & Slay, J., 2010. What Are You Looking For: Identification of Remnant Communication Artefacts in Physical Memory! International Cyber Resilience Conference, ECU, Perth August 2010
  13. Irwin, A & Slay J., 2010 "Is money laundering and terrorism financing in virtual environments fantasy or reality", International Cyber Resilience Conference, ECU, Perth August 2010
  14. Hunt, R. & Slay, J., 2010. 'Design of Forensic-based Security Architectures for Critical Infrastructure Protection'. PST2010, Ottawa, Canada. August 2010
  15. Simon, M., & Slay, J., 2010 'Recovery of Skype Application Activity Data from Physical Memory'. ARES 2010 - 5th International Conference on Availability, Reliability, and Security 2010, , pp.283-288. (CORE B)
  16. Osborne, G, Slay, J., & Turnbull, B, 2010 'Explore, Investigate and Correlate' (EIC) conceptual framework for digital forensics Information Visualisation. ARES 2010 - 5th International Conference on Availability, Reliability, and Security 2010, pp.629-634. (CORE B)
  17. Guo, Y & Slay, J., 2010 "A Function Oriented Methodology to Validate and Verify Forensic Copy Function of Digital Forensic Tools", in Proceedings of Fifth International Conference on Availability, Reliability and Security (ARES 2010), February, Krakow, Poland
  18. Guo, D and Slay, J. 2009.'Validation and verification of computer forensic software tools-Searching Function'. DFRWS 2009 9th Digital Forensic Research Conference, Montreal, Canada, August 17
  19. Slay, J., Sitnikova, E., Campbell, P. and Daniels, B. 2009. 'Process Control System Security and Forensics: A Risk Management Simulation', SIMTECT 2009, Adelaide, June 15-19
  20. Simon, M., & Slay, J., 2009. 'Enhancement of Forensic Computing Investigations through Memory Forensic Techniques'. WSDF 2009, Fukuoka, Japan. March. (CORE B).
  21. Slay, J., Lin, Y.C., Turnbull, B., Beckett, J.J., Lin, P.I.L 2009. 'Towards a Formalization of Digital Forensics'. IFIP 11.9 Orlando, January 2009
  22. Slay, J. & Sitnikova, E, 2009. 'The Development of a Generic Framework for the Forensic Analysis of SCADA and Process Control Systems.' E-Forensics, Adelaide Uni, Jan 2009
  23. Lin, YC, Slay, J & Lin, YL, 2008, 'Computer forensics and Culture, Pacific Asia Workshop on Cybercrime and Computer Forensics at ISI 2008, Taipei, Taiwan June 20 2008
  24. Slay, J & Sitnikova, E 2008, 'Developing SCADA Systems Security Course within a Systems Engineering Program, Proceedings of the 12th Colloquium for Information Systems Security Education University of Texas, June 2 -4, 2008 International Workshop on Digital Forensics (WSDF'08) at ARES-2008, Barcelona, Mar 4-7 2008
  25. Turnbull, B & Slay, J 2008, 'Wi-Fi Network Signals as a Source of Digital Evidence: Wireless Network Forensics'
  26. Slay, J, Turnbull, B & Broadway, J 2008, 'Improving the Analysis of Lawfully Intercepted Network Packet Data Captured For Forensic Analysis', International Workshop on Digital Forensics (WSDF'08) at ARES2008, Barcelona, Mar 4-7 2008
  27. Simon, M & Slay, J 2008, 'Voice over IP Forensics', E-Forensics, Adelaide University, January 21, 2008
  28. Sitnikova, E. and Slay, J., 2009, 'Enhancing Industrial Control Systems Cyber-Security Capabilities: Strategic Plans, Prevention and Response', Proceedings of the Automation & Communications Technologies in Power Conference, 1-3 September 2009, Sydney Australia
  29. Lin, V., Slay, J. and Lin, P., 2007, 'A Study on the Necessity of Integration Non-Repudiation into MANET: From Computer Forensic Perspective', Proceedings of Cyber Security, Cyber Crime and Cyber Law Cyberspace 2007 Conference, Taiwan, pp 437 to 443
  30. Morrison, J & Slay, J 2007, 'Does Knowledge Management Theory Support the Achievement of Knowledge Superiority in Defence?' Simtect 2007, June 4th 2007
  31. Turnbull, B & Slay, J 2007, Wireless Forensic Analysis Tools for use in the Electronic Evidence Collection Process, HICSS-40, January 3rd 2007 Hawaii
  32. Slay, J & Przibilla, A 2007, 'Ipod Forensics: Forensically Sound Examination of an Apple Ipod', HICSS40, January 3rd 2007 Hawaii
  33. Beckett, J.J & Slay, J 2007, 'Digital Forensics: Validation and Verification in a Dynamic Work Environment', HICSS-40, January 3rd 2007 Hawaii
  34. Radenovich, V & Slay J, 2007, 'Role of Multidirectional Network Bridges in Ecommerce' Proceedings of ECIW 2007, Cranfield, July 2nd 2007

David Volk Beard

Education

1985
Computer Science, University of Michigan at Ann Arbor.
Thesis: Automatically Generated Form Screens as a Database Interface Language.
Advisors: Teorey(Computer Engineering) & Mantei(Graduate School of Business).
1983
M.S. - Computer Science, University of Michigan at Ann Arbor.
1978
B.A. - Dual Majors: Math and Philosophy. Hope College, Holland, Michigan.

Work Experience

2009-
Professor, and Program Director, Computer Science, Idaho State University
1995-2011
Professor of Computer Information Systems, College of Business,
Associate Professor, Computer Information Systems, Idaho State University
2003
Government Funding Strategist, Siemens Corporate Research (Sabbatical)
1988-1995
Research Associate Professor of Radiology, UNC at Chapel Hill, NC.
Adjunct Associate Professor and Adjunct Assistant Professor of Computer Science.
Research Assistant Professor of Radiology
Member of the faculty, UNC Medical Informatics Program.
1985-1988
Assistant Professor of Computer Science, UNC at Chapel Hill, NC.
1985-1988
Assistant Professor of Computer Science, UNC at Chapel Hill, NC.
1985-1996
Occasional Consultant, GTE Government Systems. GTE Direct Marketing.
Technology Marketing Group (Medical Image Display), Aurora Technology.
1979-1985
Graduate School, University of Michigan, Ann Arbor, MI.
TA for Data Structures and Programming, RA for Friedman and Teorey
1978-1979
Programmer Analyst, Ford Motor Co. Engineering Div., Dearborn, MI.
Designed and implemented applications for a 900-relation decision-support system.
Multics, GCOS, PL-1, Fortran, Assembly.

Grants and Gifts

2000-2002
PI, Structure Chart Tools, Idaho State Technical Award, $34,375
1994-1995
PI, "Mammography Database," $429,149 Army ( sub project from U. Chicago)
1994-1995
Co-PI, "Digital Mammography Display," $747,891 Army.
1991-1995
PI, "New Visualizations for Medical Image Workstations," $1,144,024 NIH/NCI R01 Grant.
1993-1995
Co-PI, "Digital Mammography Greyscale," $715,000 NIH/NCI R01.
1991-1995
PI, "Medical Image Presentation" $6,523,426 NIH/NCI P01 Project
1991-1994
PI, Equipment Grants, Fujitsu Switching Systems & Sun Microsystems.
1988-1989
PI, "Cost Analysis of an ATM PACS," Bell Northern Research. $50,000.
1988-1991
CO-PI "Medical Image Processing" $6,315,723 NIH/NCI P01 subproject.
1986-1988
Co-PI, "Radiology Workstations," NIH/NCI $730,712 RO1 Grant.
1986
"3D Interactive Graphics", NSF and ACM conference grants.

Professional Service Activities

  • Faculty Senate, 2005-2011
  • Institutional Governance Advisory Committee, Chair 2011
  • University Special Budget Committee and Budget Committee 2009-2012
  • Academic Affairs Advisory Board 2009-2010
  • University Grievance Committee 2008-2010
  • University Registrar Search Committee 2007
  • Beta Alpha Phi Co-Faculty and Honorary member Advisor, 2002-2006
  • Chair, ISU Faculty Professional Policy Council, 1999-2002
  • PhD Committee, University of Utrich, Netherlands, 2000
  • National Institutes of Health Diagnostic Imaging Study Section, 1998, 1999
  • Member: Army Breast Cancer Research Study Section, Nov, 1995.
  • Session Chair & Program Comm., SPIE Medical Imaging1991 1994.
  • Chair, Treasurer, Board Member, Society for Computer Applications in Radiology, Guest Faculty, 2nd PACS-RIS School, Bowman Gray, Winston-Salem, NC 1992.
  • UNC Chapel Hill Computer Science MS, PhD Admissions committee, 1985-1988
  • Treasurer: 1986 workshop on 3D interactive graphics.
  • Demonstration Chair, 1986 ACM SIGCHI.
  • Reviewer:
    • HICSS, J. Investigative Radiology
    • J. Digital Imaging
    • J. Behaviour & Information Technology
    • International Journal of Man-Machine Studies
    • National Science Foundation
    • Symposium for Computer Assisted Radiology
    • IEEE Transactions on Medical Imaging
    • Numerous textbooks

Professional Organizations

  • Radiological Society of North America-Elected Member
  • Human Factors Society-Elected Member
  • Society for Computer Applications in Radiology
  • ACM
  • SIGCHI
  • Beta Alpha Phi

Refereed Journal Publications and Patents

  • Masticola SP, Beard DV, Comaniciu D, Justinian R, Video and Audio Monitoring for Syndromic Surveillance for Infectious Diseases, 20080279420. 2009.
  • Beard DV Beard DV Beginning Programming for Accounting Students, J. Ethics and Critical Thinking January 2008(1),18.
  • Beard DV A Rigorous Programming Course To Improve Performance in 2nd Intermediate Accounting J. Ethics and Critical Thinking, 2006(1) 1
  • Beachboard, JC, Beard DV Innovations in Information Systems Education II Enterprise IS Management: A Capstone Course for Undergraduate IS Majors, Communications of the Association of Information Systems, vol. 15 315, 2005
  • Beard DV, Trimmer KJ, Peterson, T Three CIS courses for enhancing critical thinking and improving technical skills of accounting students, (reprint) Global Education Journal 2004(2), 82.
  • Beard DV Conjunctive grading for assessing and motivating beginning programming students in the context of plagiarism, J. Ethics and Critical Thinking, 2004(1) 34-56.
  • Beard DV, Trimmer KJ, Peterson, T Three CIS courses for enhancing critical thinking and improving technical skills of accounting students, J. Ethics and Critical Thinking, J 2003(2), 1-21.
  • Beard DV Interactive Interim Techniques for Reduced Costs and a Better Mammography Workstation, J. Digital Imaging, Nov 2000, 13(4).
  • Beard DV Hemminger BM Managing Remote Ultrasound with Cooperative Video: A Field Study. J. Behaviour & Information Technology, Jan1998, 17(1), 10-17
  • Beard DV, et al Quick GOMS: A Visual Software Engineering Tool for Simple Rapid Time-Motion Modeling, ACM Interactions, May/June 1997, volume 4, number 3, 31-36.
  • Beard DV, et al Pilot Study of Eye Movement During Mammography Interpretation: Eyetracker Results and Workstation Design Implications. J. Digital Imaging, Feb 1996.
  • Beard DV, et al, Quick and Dirty GOMS: A Case Study of Computed Tomography Interpretation, J. Human Computer Interaction 11:157-180, 1996.
  • Beard DV, et al Interpretation Time of Serial Chest CT Examinations with Stacked-Metaphor Workstation versus Film Alternator, J. Radiology, 197:753-758, 1995.
  • Beard DV, et al Eye-Movement During CT Interpretation: Eyetracker Results & Image-Display-Time Implications J. Digital Imaging, Nov.1994; 7(2):189.
  • Beard DV, et al Computed Tomography Interpretations with a Low Cost Workstation: A Timing Study. J. Digital Imaging, Aug 1994; 7(3):133-139.
  • Hemminger BM Beard DV Review of 3D Imaging in Medicine, J. Academic Radiology 1994.
  • Beard DV, Hemminger BM, Denelsbeck KM, Johnston RE How many screens does a CT workstation need? J. Digital Imaging, May1994; 7(2):69-76.
  • Beard DV, et al, J. Investigative Radiology, 1993; 28(8):732-734.
  • Beard DV Review of Computed Digital Radiography in Clinical Practice, J. Investigative Radiology 1993;28(1):90.
  • Beard DV, et al. Single-Screen Workstation vs. Film Alternator for fast CT Interpretation, J. Radiology, 1993; 187(2):1-6.
  • Beard DV Computer Human Interaction for Image Information Systems, J. American Society for Information Science, 1991; 42(8):600-608.
  • Beard DV, Johnston RE, Toki O, & Wilcox C A Study of Radiologists Viewing Multiple Computed Tomography Studies Using an Eyetracking Device, J. Digital Imaging, Nov. 1990;3(4):230-237.
  • Beard DV Designing a Radiology Workstation: A Focus on Navigation During the Interpretation Task, J. Digital Imaging, Aug. 1990;3(3):152-163.
  • Beard DV, Palaniappan M, Humm A, et al. A Visual Calendar for Scheduling Group Meetings, ACM - CSCW 1990 134.
  • Beard DV, Parrish D, Stevenson D A Cost Analysis of Film Image Management & Four PACS systems based on Four Network Protocols, J. Digital Imaging, 1990;3(2):108-118.
  • Beard DV Walker JQ Navigation Techniques to Improve the Display of Large Two Dimensional Spaces, J. Behaviour & Information Technology, 1990;9(6):451-466.
  • Pizer SM Beard DV Medical Image Workstations: State of Science & Technology. J. Digital Imaging, Nov.1989;2(4):185-193.
  • Beard DV, Mantei MM, Teorey TJ Metaform: Updatable Form Screens and Their Application to the Use of Office Metaphors in Query Language Instruction, J. Behavior and Information Technology, 1987;6(2):135-157.
  • Pizer SM, Johnston RE, Rogers DC, Beard DV Effective Presentation of Medical Images on an Electronic Display Station, J. RadioGraphics, 1987;7(6):1267-1274.
  • Beard DV Automatically Generated Form Screens as a Database Interface Language, Ph.D. Dissertation, University of Michigan, Ann Arbor, MI, 1985.

Other Refereed Publications

  • Beard DV, Parker KR, Ottaway TA, Davey WF, Schou CD, Requiring a Systems Analysis and Design Course for a Computer Science Major, FECS’13, Las Vegas NV, July 2013.
  • Mamykina L, Goose S, Hedqvist D, Beard DV Deconstructing Nursing narratives for trend analysis, ACM CHI 2004.
  • Beard DV, Trimmer KJ, Smith, KA A Rigorous Programming Course for Improved Problem solving Skills and a Better CPA, ASBBS, Las Vegas NV Feb 2003.
  • Beard DV Trimmer KJ Systems Analysis and Design and the Improved Accountant, SAIS Savannah, GA – March, 2003.
  • Beard DV Beginning Programming for Accounting Students using Object-Oriented Visual Basic.NET: Avoiding a Disaster, ASBBS Las Vegas NV Feb 2003.
  • Beard DV, Trimmer KJ, Bezik MA, Peterson T, Smith, KA A CIS Database Management and Design Course: Better for Accounting Majors than Traditional AIS, ASBBS, Las Vegas NV Feb 2002.
  • Beard DV, Bezik MA, Trimmer KJ, Smith KA, Systems Analysis and Design: Better for Accounting Majors than traditional AIS? Third Annual AIS Educator Conference, Estes Park Colorado, August, 2001.
  • Beard DV, Smith, KA Beginning Programming Course for Accounting: Relative Performance of Declared CIS and Accounting Majors, ASBBS, Las Vegas NV Feb 2001.
  • Beard DV, et al QGOMS: A Direct-Manipulation Tool for Simple GOMS Models, ACM - CHI 1996 Vol 2 25
  • Beard DV, Molina P, Denelsbeck KM, Hemminger BM, et. al. Stacked-Metaphor Workstation Faster than Film for Serial Staging CT, CAR, Berlin 1995.
  • Soltys M, Beard DV, et. al Experimentally Evaluating Manual Registration of Multiple Modality 3D Medical Imaging Data, SPIE Medical Imaging, 1995.
  • Hemminger BM, Molina PL, Braeuning PM, Detterbeck FC, Egan TM, Pisano ED, & Beard DV Clinical Applications of Realtime Volume Rendering, SPIE Medical Imaging , 1995.
  • Beard DV, Hemminger KM, Denelsbeck KM, Johnston RE Cognitive Load during CT Interpretation, SPIE Medical Imaging: Image Perception, 1994.
  • Beard DV, Eberly DH, et al. Interacting with image hierarchies for fast and accurate object segmentation, SPIE Medical Imaging: Image Processing, 1994.
  • Beard DV, Faith RE, Eberly D, Pizer SM, Kurak C, Johnston RE The Magic Crayon: An Object Definition & Volume Calculation Testbed, SPIE Medical Imaging, 1993.
  • Beard DV, Hemminger BM, Denelsbeck KM, Brown PH A Time-motion Comparison of Several Radiology Workstation Designs and Film, SCAR,1992.
  • Beard DV, Hemminger BM, Brown P, Perry R, Thompson R Remote consultation with a multiple screen FilmPlane radiology workstation, SPIE Medical Imaging, 1992.
  • Beard DV, Brown P, Misra R Scrolling Radiologic Images: Requirements, Designs, & Analyses, CAR, Berlin 1991.
  • Beard DV, Perry R, Muller K, et al. Evaluation of Total Workstation Interpretation Quality with CT: A Pilot Study, SPIE Medical Imaging 1991.
  • Beard DV, Johnson RE, Pisano E, et al A Radiology Workstation for Mammography: Preliminary Observations, Eyetracker Studies, & Design, SPIE Medical Imaging 1991.
  • Beard DV Critical Characteristics of Radiology Workstation Navigation, SCAR 1990.
  • Walker J & Beard DV FilmPlane2: Design & Implementation, SPIE Medical Imaging 1990.
  • Beard DV, Parrish DM, Stevenson D A Cost Analysis of Film Image Management & Four PACS systems, SPIE, Medical Imaging, 1990.
  • Ouh-young M, Beard DV, Brooks FP Force Display Performs Better than Visual Display in a Simple 6-D Docking Task, IEEE Int. Conf. on Robotics and Automation, 1989.
  • Stevenson D, Beard DV, Parrish DM Medical Image Communications as an Application for Broadband ISDN, SPIE Vol 1179 Fiber Networking & Telecommunications, 1989.
  • Beard DV, Walker J, Bell I, Cromartie R Evolving Design of a Radiology Workstation Using Time-Motion Analysis & the Keystroke Model, SPIE Med. Imaging 1989.
  • Parrish, D, Beard DV, Kilpatrick KE, Scatliff JH, Thompson BG Operational Modeling for PACS: How do we decide if it is Cost Effective? SPIE Medical Imaging 1989.
  • Beard DV, Creasy J, Symon J, Cromartie R Experiment Comparing Image-Locating on Film & the FILM-PLANE Radiology Workstation, SPIE Med. Imaging, 1988.
  • Smith JB, Weiss SF, Ferguson GJ, Bolter JD, Lansman M Beard DV WE: A writing environment for professionals, Proc. of the National Computer Conference '87. Reston, VA: AFIPS Press, 1987
  • Johnston RE, Rogers DC, Creasy J, Beard DV, Hemminger BM, Perry J, Pizer SM How to Evaluate a Medical Imaging Workstation, SPIE Medical Imaging,1987.
  • Beard DV, Pizer SM, Rogers DC, Cromartie R A Prototype Single-Screen PACs Console Development Using Human Computer Interaction Techniques, SPIE Med. Imaging, 1987.
  • Kochan H, Banish F, & Beard DV The Display of Manufacturing & Assembly Information, Conference on Intelligent Systems and Machines, 1984.

Other Publications, Presentations, and Abstracts

  • Beard DV A Computer Human Interaction Approach for Evolving Complex Tools, Advances in Nuclear Science and Engineering Working Conference, 2012.
  • Beard DV Comparison of an accounting department’s CPA pass rates and national pass rates normalized for ACT scores Conference on Ethics and Critical Thinking, Kings College PA Dec 2008.
  • Beard DV Beginning Programming for Accounting Students, Conference on Ethics and Critical Thinking Dallas Tx, Dec 2007.
  • Beard DV Negotiating Software Project Cost Estimates, Conflict Resolution and Negotiation Conference, Minnesota State University, Oct 2007.
  • Beard DV Critical Thinking and Intellectual Rigor, Conference on Ethics and Critical Thinking, Dallas TX, Dec 2006
  • Beachboard, JC, Beard DV Enterprise IS Management: A Capstone Course for Undergraduate IS Majors, Proceedings of the 46th Annual Fall Conference Mountain Plains Management Assoc., 200.
  • Beard DV A Rigorous Programming Course To Improve Performance in 2nd Intermediate Accounting Conference on Ethics and Critical Thinking, Dallas TX, Dec 2005.
  • Beard DV International Software Development and Extreme Programming, Business Entrepreneurs Conference, Southwest Missouri State University Business School, 25Feb05
  • Beard DV On choosing employees in an age of rampant college cheating, Business Entrepreneurs, Missouri State University School of Business 2004
  • Beard DV How to write an Fundable NIH Proposal, Workshop, Siemens Corporate Research, Princeton, NJ, Nov 2003.
  • Beard DV Frischmann P, Introduction of critical and analytical thinking in an accounting program through advanced CIS courses, American Accounting Association Western Regional Meeting, Breckenridge CO, 2003.
  • Beard DV Smith KA A Beginning Programming Course for the CPA Fourth Annual AIS Educator Conference, 2002.
  • Beard DV Trimmer KJ, Bezik MA, Smith KA Accommodating Accounting Majors in a Required CIS Beginning Programming Course: Approach and Results IAIM Dec 2001.
  • Beard DV & Smith KA Designing a Beginning Programming Course for Both Accounting and CIS Majors: Approach and Results MPMC, 2001
  • Schou, C, Frost, J, Beard DV Applications of Group Process Support Systems (GPSS) National INFORMS 96, 1996.
  • Schou, C, Frost, J, Beard DV Structure of an Undergraduate MMT Curriculum, National INFORMS 96, 1996.
  • Beard DV Cost-effective Teleradiology, invited workshop at the 1996 Idaho Conference on Health Care, Oct 1996.
  • Beard DV Interpretation of Multiple Chest CT Examinations: Stacked Workstation versus Film, Presented at the AIMA Summer Conference, Medical Imaging Group, Boston, 1995.
  • Rosenman J, Beard DV, Soltys M A new method to simultaneously view multiple medical images, ASTRO 1995.
  • Hemminger BM, Beard DV, et al Realtime 3D visualizations for Surgical Procedure Planning, Demonstration at RSNA InfoRad, Nov. 1994.
  • Perry JR, Rosenman J, Soltys M, Reavis R, Chen J, Liu A, Beard DV, Pizer SM 3D Image Fusion of Lung Perfusion SPECT & Chest CT Data in Radiation Treatment Planning for Lung Cancer Patients, World Federation of Nuclear Med. & Biology, 1994.
  • Robinson EN & Beard DV Relational Database Design: Evaluation of Recognition, Isolation & Treatment of Hospitalized Patients with Tuberculosis, AIMA Sym. on Computer Applications in Medical Care, 1994.
  • Beard DV Fast & accurate medical image interpretation using electronic lightboxes, invited pres: RSNA InfoRad, 1992.
  • Beard DV Hemminger BM, Medical Imaging Workstations, RSNA InfoRad 1992.
  • Beard DV, Hemminger BM, Keefe B, Mittelstaedt CA Remote Ultrasound: A Pilot Study, Pres. at AUR 1992.
  • Beard DV, Hemminger BM, Mauro MA, Perry JR A Speed and Accuracy Comparison of Film vs. Electronic Display, AUR 1992.
  • Horii SC, Stabb EV, Beard DV, Gatsonis C, Kundel HL Panel Discussion on Radiology Workstation Evaluation, published in SPIE, Medical Imaging, 1990.
  • Beard DV, Walker JGF, & Toki O Fingerpointing and Eyetrackers for Task Analysis of Medical Image Information Systems, SIGCHI 90, 1990
  • Beard DV Medical Image Display at UNC, Invited presentation at the University of Maryland Computer Science Department, February 1990.
  • Stevenson D, Beard DV, Parrish DP Medical Imaging as an Application for Broadband Communications, Third Triangle Conference on Computer Comm. Raleigh, NC, 1990.
  • Beard DV, Johnston RE, Toki O, Wilcox C A Study of Radiologists Viewing Multiple CT Studies Using an Eyetracking Device, RSNA, Nov. 1989.
  • Beard DV et al The Visual Scheduler for Scheduling Small Group Meetings, ACM SIGCHI 1988.
  • Johnston RE, Beard DV, Creasy J, Perry J UNC PACS II: Consoles, 9Th Conference on Computer Applications in Radiology, Hilton Head, SC., 1988
  • Parrish D, Beard DV, Creasy J, Thompson R UNC PACS I: Modeling The Radiology Operation, 9Th Conf. on Computer Applications in Radiology, Hilton Head, SC, 1988.
  • Beard DV Design & Telecommunication Requirements for PACS consoles, 1988 Triangle Telecommunications Symposium, 1988.
NIATEC National Science Foundation Information Assurance Directorate Department of Homeland Security CISSE Scholarship For Service