IA-Related Publications

Faculty are active in IA practice and research and contribute to IA literature.
Below are sample publications.

  • INFORMATION SECURITY MANAGEMENT

  • INTRUSION DETECTION

  • WEB SECURITY

  • BIOMETRICS and PATTERN RECOGNITION

  • INFORMATION ASSURANCE EDUCATION

  • PRIVACY

  • COMPUTER FORENSICS

  • INFORMATION TECHNOLOGY AUDITING

  • NATIONAL SECURITY AND CRIMINAL INVESTIGATION

  • OTHER

     

    ** These publications involve student authors.

     

  • INFORMATION SECURITY MANAGEMENT

    Clark, Christine Y.
    "A Study on Corporate Security Awareness and Compliance Behavior Intent." Diss. Pace University, 2013.**

    Carlos A. Thomas. "Assessing the Factors that Determine Compliance with the Federal Information Security Management Act (FISMA)." Diss. Pace University, 2011.**

    Nunez, Yonesy F. "Maximizing an organization's information security posture by using a distributed patch management security system." Diss. Pace University, 2011.**

    Raggad, Bel G. (2010). Information Security Management: Concepts and Practice. CRC Press, Inc.

    Bel G. Raggad. "CRM Information Assurance," Proceedings of the International Conference on Computing, Telecom, Business and Information Systems – TIGERA '10 (May 2010).

    Li-Chiou Chen, Daniel Farkas. (2009). "Individual Risk Perception and Attitude towards Computer Security Risks" Third International Conferences on Internet Technologies and Applications, Wrexham, North Wales, UK.

    Li-Chiou Chen, Daniel Farkas. (2009). "An Investigation of Decision-making and the Tradeoffs Involving Computer Security Risk" Proceedings of the Fifteenth Americas Conference on Information Systems, San Francisco, California.
     

  • INTRUSION DETECTION

    Paul Rubel, Partha Pal, Michael Atighetchi, D. Paul Benjamin, Franklin Webber. " Anomaly and Specification Based Cognitive Approach for Mission-Level Detection and Response: Extended Abstract, " Recent Advances in Intrusion Detection: Lecture Notes in Computer Science (Sep 2008)

    D. Paul Benjamin Partha Pal, Franklin Webber, Paul Rubel, Michael Atighetchi. " Using a Cognitive Architecture to Automate Cyberdefense Reasoning, " Proceedings of the 2008 European Centre for Secure Information and Systems – ECSIS Symposium on Bio-inspired, Learning, and Intelligent Systems for Security – BLISS 2008 (Aug 2008)

    D. Paul Benjamin. "A Cognitive Approach to Intrusion Detection," Proceedings of the Institute of Electrical and Electronics Engineers (IEEE) Conference on Computational Intelligence for Security and Defense Applications -- CISDA 2007 (Apr 2007)
     

  • WEB SECURITY

    Li-Chiou Chen and Gaurav Bansal . "An Integrated Model of Individual Web Security Behavior," Proceedings of the16th Conference on Information Systems – AMCIS 2010 (Aug 2010).

    X. Fu, K. Qian, X. L. Tao, Lu, B. Peltsverger and S. Chen."A static analysis framework for detecting SQL injection vulnerabilities," /31st IEEE Computers, Software, and Applications Conference (COMPSAC 2007)/, Beijing, China, July 24-27, 2007, pp87-94.

    Anthony Joseph and Claude Turner
    "A Method to Secure More Reliable Online Business Transactions, "Proceedings of the International Conference on Computing and e-Systems (Mar 2007).

    Lixin Tao, Xiang Fu, Xin Lu, Boris Peltsverger, Shijun Chen and Kai Qian. "A Static Analysis Framework for Detecting SQL Injection Vulnerabilities," Proceedings of the 31st Annual International Computer Software and Applications Conference – COMPSAC 2007 (Jul 2007).
     

  • BIOMETRICS and PATTERN RECOGNITION

    S. Chaand Y. An. "Syntactic and Semantic Taxonomy of Preferential Voting Methods", IAENG Transactions on Engineering Technologies, Lecture Notes in Electrical Engineering Volume 247, 2014, pp 301-315.

    J.V. Monaco, J.C. Stewart, S. Cha, and C.C. Tappert. "Behavioral Biometric Verification of Student Identity in Online Course Assessment and Authentication of Authors in Literary Works", Proc. IEEE 6th Int. Conf. Biometrics (BTAS)., Washington D.C., Sep 2013. **

    N. Bakelman, J.V. Monaco, S. Cha, and C.C. Tappert. "Keystroke Biometric Studies on Password and Numeric Keypad Input", Proc. 2013 European Intelligence and Security Informatics Conf., Upsalla, Sweden, Aug 2013. **

    J.V. Monaco, N. Bakelman, S. Cha, and C.C. Tappert. "Recent Advances in the Development of a Long-Text-Input Keystroke Biometric Authentication System for Arbitrary Text Input", Proc. 2013 European Intelligence and Security Informatics Conf., Upsalla, Sweden, Aug 2013. **

    Stewart, John Cary"An evaluation of the application of stylometry and the keystroke biometric to identity verification of online test-takers." Diss. Pace University, 2013.**

    S. Cha. "On Complete and Size Balanced k-ary Tree Integer Sequences", International Journal of Applied Mathematics and Informatics Vol 6 issue 2, 2012, pp67-75.

    S. Cha. "A Distance between Distributions with Special Topologies of Cost Matrices", Journal of Pattern Recognition Research (JPRR), Vol 7 No 1, 2012, pp 1-25.

    J.V. Monaco, N. Bakelman, S. Cha, and C.C. Tappert. "Developing a Keystroke Biometric System for Continual Authentication of Computer Users", Proc. 2012 European Intelligence and Security Informatics Conf., Odense, Denmark, Aug 2012, pp 210-216. **

    C.C. Tappert, M. Villani, and S.Cha(2010). "Keystroke Biometric Identification and Authentication on Long-Text Input," pp 342-367, Chapter 16 in Behavioral Biometrics for Human Identification: Intelligent Applications, Edited by Liang Wang and Xin Geng, Medical Information Science Reference.

    C. Nwosisi, S-H. ChaY.J. An, C.C. Tappertand E. Lipsitz, "Predicting Deep Venous Thrombosis Using Binary Decision Trees," Int. J. Engineering and Technology, Vol 3, No 5, Oct 2011, pp 467-472.**

    J.V. Monaco, N. Bakelman, S. Cha, and C.C. Tappert. "Developing a Keystroke Biometric System for Continual Authentication of Computer Users", Proc. 2012 European Intelligence and Security Informatics Conf., Odense, Denmark, Aug 2012, pp 210-216. **

    S. Choi, S. Cha, and C. C. Tappert. "A Survey of Binary Similarity and Distance Measures," Journal of Systemics, Cybernetics and Informatics, Vol 8, No 1, 2010, pp 43-48.

    Bartnik, D., Cha, S. H., Govindaraju, V., Kilinskas, P., Kunderman, F., Lee, S., & Zhang, B. "Method and apparatus for analyzing and/or comparing handwritten and/or biometric samples." U.S. Patent No. 7,580,551. 25 Aug. 2009.

    S. Cha and C.C. Tappert. "A Genetic Algorithm for Constructing Compact Binary Decision Trees," J. Pattern Recognition Research (JPRR), Vol 4, No 1, 2009, pp 1-13.

    Mary Villani. "Keystroke Biometric Identification Studies on Long-text Input." Diss. Pace University, 2007. **

    Charles Tappert and Sung-Hyuk Cha. "Handwriting Recognition Interfaces," Text Entry Systems: Mobility, Accessibility, Universality, eds., S. MacKenzie and K. Tanaka-Ishii, Ch 6 (Mar 2007).

    For a complete list of biometrics and pattern recognition related publications visit:
    Charles Tappert and Sung-Hyuk Cha.
     

  • INFORMATION ASSURANCE EDUCATION

    Gabberty, James W., Educating the Next Generation of Information Security Professionals: The Rise & Relevancy of Professional Certifications, Review of Business Information Systems, Volume 17, Number 3, 2013

    Li-Chiou Chen and Lixin Tao. "Teaching Web Security using Portable Virtual Labs," Proceedings of the 2011 IEEE 11th International Conference on Advanced Learning Technologies – ICALT (July 2011).

    Narayan Murthy. "Teaching Web Security using Portable Virtual Labs," Proceedings of the 2011 IEEE 11th International Conference on Advanced Learning Technologies – ICALT (July 2011).

    Lixin Tao and Li-Chiou Chen. "Lab Virtualization for More Effective Computer Science Education", ACM SIGCSE Annual Conference on Innovation and Technology in Computer Science Education, Paris, France (July 2009)
     

  • PRIVACY

    James Lawler and John Molluzzo. "A Survey of First-year College Student Perceptions of Privacy in Social Networking," Journal of Computing Sciences in Colleges, 26:3 (January 2011).

    Boyd, Andrew W. "A Longitudinal Study of Social Media Privacy Behavior." Diss. Pace University, 2011.**

    James Lawler and John Molluzzo. "A Study of the Perceptions of Students on Privacy and Security on Social Networking Sites (SNS) on the Internet, "Journal of Information Systems Applied Research –JISAR, 3:12 (Jun 2010).

    James Lawler, John Molluzzo and Pascale Vandepeutte. (2008) "An Expanded Study of Integrating Issues of Location-based Privacy with Mobile Computing into General Curriculum of Universities," Information Systems Education Journal , 6:47.

    James Lawler and John Molluzzo. (2008) "Integrating Issues of Consumer Privacy with Mobile Computing into Computer Science Curricula," Journal of Computing Sciences in Colleges, 23:3.

    Catherine Dwyer. (2009). "Behavioral Targeting: A Case Study of Consumer Tracking on Levis.com, " Proceedings of the 15th Americas Conference on Information Systems – AMCIS 2009.
     

  • COMPUTER FORENSICS

    Hayes, D. (2014). A Practical Guide to Computer Forensics, Prentice Hall.

    Darren Hayes and Vijay Reddy. (2010). "The Impact of Microsoft's Windows 7 on Computer Forensics Examinations," Institute of Electrical and Electronics Engineers (IEEE)**

    Darren Hayes and Shareq Qureshi. (2008). "A Framework for Computer Forensics Investigations Involving Microsoft Vista," Proceedings of the 2008 Institute of Electrical and Electronics Engineers – IEEE Long Island Systems Applications and Technology. **

    Kai Qian and Lixin Tao. (2007). "An Active Role-based Open Source Digital Labware for Information Forensics Education," Proceedings of the 7th Institute of Electrical and Electronics Engineers – IEEE – International Conference on Advanced Learning Technologies.
     

  • INFORMATION TECHNOLOGY AUDITING

    Chienting Lin and Li-Chiou Chen. (2009). "Development of an Interdisciplinary Information Technology Auditing Program," Proceedings of the 13th Colloquium for Information Systems Security Education, Seattle, WA

    Chan, Kam, Picheng Lee and Gary Kleinman. (2009). "The Impact of S-OX on Internal Control Remediation", International Journal of Accounting and Information Management, Vol. 29 (1): 53-65.

    Chan, Kam, Picheng Lee and Barbara Farrell. (2008). "Earnings Management of Firms Reporting Material Internal Control Weaknesses under Section 404 of the Sarbanes-Oxley Act", Auditing: A Journal of Practice and Theory, Vol. 27(2): 161-180.

    Chan, Kam, Picheng Lee and Gim Seow. (2008). "Why did management and auditors fail to identify material internal control weaknesses in their initial SOX 404 reviews?" Review of Accounting and Finance, Vol. 7 (4): 338-354.

    Ettredge, Michael, Lili. Sun, Picheng Lee and Asokan Anadarajan. (2008). "Is Earnings Fraud Associated with High Deferred Tax and/or Book Minus Tax Levels?" Auditing: A Journal of Practice and Theory,Vol. 27 (1): 1-33.
     

  • NATIONAL SECURITY AND CRIMINAL INVESTIGATION

    Li-Chiou Chen, Kathleen M. Carley, Douglas Fridsma, Boris Kaminsky, and Alex Yahja (2006). "Model Alignment of Anthrax Attack Simulations," Decision Support Systems in the special issue on Intelligence and Security Informatics, Vol 41, Issue 3, March 2006, pp. 654-668.

    Kathleen M. Carley, Douglas Fridsma, Elizabeth Casman, Alex Yahja, Neal Altman, Li-Chiou Chen, Boris Kaminsky, and Demian Nave (2006). "BioWar: Scalable Agent-based Model of Bioattacks," IEEE Transactions on Systems, Man and Cybernetics-Part A, Vol36, Issue 2, March 2006, pp.256-265.

    J.L. Zhao, H.H. Bi, H. Chen, D.D. Zeng, C. Lin, M. Chau (2006), "Process-Driven Collaboration Support for Intra-Agency Crime Analysis," Decision Support Systems, Vol. 41, No. 3, pages 616-633.
     

  • OTHER

    Tsekhansky, Alexander Michael. "Byzantine-reliable domain name service protocol in networks with limited public key infrastructure." Diss. Pace University, 2010.**

    Chiang, Borming. "A feasibility study: Secure public key infrastructure with quantum key distributions in grid computing." Diss. Pace University, 2007.**
     

  • For additional IA faculty/student publications see the PROCEEDINGS of the MICHAEL L. GARGANO RESEARCH DAY:

    2013
    2012
    2011
    2010