Faculty Research

Faculty are active in IA practice and research and contribute to IA literature.
Below are sample publications. Click here for the complete Seidenberg bibliography.

  • Books

    Bel G. Raggad
    "Information Security Management: Concepts and Practice, " CRC Press (Jan 2010).

  • Book Chapters

    John Molluzzo, James Lawler and Pascale Vandepeutte
    “Perceptions of Students on Location-based Privacy and Security with Mobile Computing Technology,” Handbook of Research on Data Mining in Public and Private Sectors: Organizational and Government Applications, eds., A. Syvajarvi and J. Stenvall, Chapter 6 (2010).

    Charles Tappert, Mary Villani and Sung-Hyuk Cha
    “Keystroke Biometric Identification and Authentication on Long-Text Input,” Behavioral Biometrics for Human Identification: Intelligent Applications, eds., L. Wang and Xin Geng (2010).

    Paul Rubel, Partha Pal, Michael Atighetchi, D. Paul Benjamin, Franklin Webber
    "Anomaly and Specification Based Cognitive Approach for Mission-Level Detection and Response: Extended Abstract, " Recent Advances in Intrusion Detection: Lecture Notes in Computer Science (Sep 2008).

    Charles Tappert, Sung-Hyuk Cha
    “Handwriting Recognition Interfaces,” Text Entry Systems: Mobility, Accessibility, Universality, eds., S. MacKenzie and K. Tanaka-Ishii, Ch 6 (Mar 2007).

  • Journals

    Catherine Dwyer
    “Privacy in the Age of Google and Facebook,” IEEE Technology and Society Magazine, 30:3 (Fall 2011).

    Thomas Virgona
    “September 11, 2001 in Retrospect: A Decade on, What Business Continuity and Information Security Lessons Have Been Learned?” The Business Continuity Journal, 4:3 (April 2011).

    James Lawler and John Molluzzo
    “A Survey of First-year College Student Perceptions of Privacy in Social Networking,” Journal of Computing Sciences in Colleges, 26:3 (January 2011).

    Thomas Virgona
    “A Historical Study of the Human Aspects of Disaster Recovery, “The Business Continuity Journal, 4:1 (2010).

    Charles Tappert, Sung-Hyuk Cha, Mary Villani and Robert Zack
    "A Keystroke Biometric System for Long-Text Input,” International Journal of Information Security and Privacy – IJISP, 4:1 (2010).

    James Lawler and John Molluzzo
    “A Study of the Perceptions of Students on Privacy and Security on Social Networking Sites (SNS) on the Internet, “Journal of Information Systems Applied Research –JISAR, 3:12 (Jun 2010).

    James Lawler, John Molluzzo and Pascale Vandepeutte
    “Integrating Issues of Consumer Privacy with Mobile Computing into Computer Science Curricula,” Journal of Computing Sciences in Colleges, 23:3 (Jan 2008).

    James Lawler, John Molluzzo and Pascale Vandepeutte
    "An Expanded Study of Integrating Issues of Location-based Privacy with Mobile Computing into General Curriculum of Universities, " Information Systems Education Journal , 6:47 (Dec 2008).

    Sung-Hyuk Cha, Sung Soo Yoon and Charles Tappert
    “Handwriting Copybook Style Identification for Questioned Document Examination,” Journal of Forensic Document Examiners, 17 (Spring 2007).

  • Conference Proceedings

    Li-Chiou Chen and Lixin Tao
    “Teaching Web Security using Portable Virtual Labs,” Proceedings of the 2011 IEEE 11th International Conference on Advanced Learning Technologies – ICALT (July 2011).

    Narayan Murthy
    “Teaching Computer Security with a Hands-on Component,” Proceedings of the 7th World Conference on Information Security Education (June 2011).

    Li-Chiou Chen and Lixin Tao
    “Teaching Web Application Security Using Virtualized Laboratory Exercises,” Proceedings of the 15th Colloquium for Information Systems Security Education (June 2011).

    Lixin Tao, Li-Chiou Chen and Chienting Lin
    “Work in Progress – Improving Web Security Education with Virtual Labs and Shared Course Modules,” Proceedings of the 40th ASEE/IEEE Frontiers in Education Conference – FIE (Oct 2010).

    Lixin Tao, Li-Chiou Chen and Chienting Lin
    “Virtual Open-Source Labs for Web Security Education,” Proceedings of the World Congress on Engineering and Computer Science – WCECS 2010 (Oct 2010).

    Lixin Tao, Li-Chiou Chen, Chienting Lin
    “Improving Web Security Education with Virtual Labs and Shared Course Modules,” Proceedings of The Michael L. Gargano 8th Annual Student/Faculty Research Day (May 2010).

    Bel G. Raggad
    “CRM Information Assurance,” Proceedings of the International Conference on Computing, Telecom, Business and Information Systems – TIGERA ’10 (May 2010).

    Darren Hayes and Vijay Reddy
    “The Impact of Microsoft's Windows 7 on Computer Forensics Examinations,” Institute of Electrical and Electronics Engineers (IEEE) (May 1, 2010).

    Catherine Dwyer, Starr Roxanne Hiltz, Marshall Scott Poole, Julia Gussner, Felicitas Hennig, Sebastian Osswald, Sandra Schliesslberger, Birgit Warth
    "Developing Reliable Measures of Privacy Management within Social Networking Sites, " Proceedings of the 43rd Hawaii International Conference on System Sciences – HICSS 2010 (Jan 2010).

    Li-Chiou Chen and Gaurav Bansal
    "An Integrated Model of Individual Web Security Behavior,” Proceedings of the16th Conference on Information Systems – AMCIS 2010 (Aug 2010).

    Li-Chiou Chen, Lixin Tao, Xiangdong Li and Chienting Lin
    "A Tool for Teaching Web Application Security,” Proceedings of the 14th Colloquium for Information Systems Security Education (Jun 2010).

    Li-Chiou Chen and Mary Long
    "Perceived Online Security and Trust from a Student Perspective: An Exploratory Study, " Proceedings of the Global Business and Technology Association’s 12th Annual International Conference (Jul 2010).

    James Lawler and John Molluzzo
    “A Study of the Perceptions of Students on Privacy and Security on Social Networking Sites (SNS) on the Internet,” Proceedings of the Conference on Information Systems Applied Research 2009 (Nov 2009).

    Daniel Farkas and Li-Chiou Chen
    “An Investigation of Decision-making and the Tradeoffs Involving Computer Security Risk,” 15th Americas Conference on Information Systems (AMCIS 2009) (Aug 5-9, 2009).

    Daniel Farkas and Li-Chiou Chen
    “Individual Risk Perception and Attitude Towards Computer Security Risk,” 15th Americas Conference on Information Systems (AMCIS 2009) (Aug 5-9, 2009).

    Daniel Farkas and Li-Chiou Chen
    “Individual Risk Perception and Attitude Towards Computer Security Risk,” Third International Conference on Internet Technologies and Applications (ITA 09) (Sep 7-13, 2009).

    Catherine Dwyer
    "Behavioral Targeting: A Case Study of Consumer Tracking on Levis.com, " Proceedings of the 15th Americas Conference on Information Systems – AMCIS 2009 (Aug 2009).

    Paul Rubel, Partha Pal, Michael Atighetchi, D. Paul Benjamin and Franklin Webber
    "Anomaly and Specification Based Cognitive Approach for Mission-Level Detection and Response: Extended Abstract, " Proceedings of the 11th International Symposium on Recent Advances in Intrusion Detection – RAID 2008 (Sep 2008).

    Partha Pal, Franklin Webber, Michael Atighetchi, Paul Rubel and D. Paul Benjamin
    "Automating Cyber Defense Management,” Proceedings of the 2nd International Workshop on Recent Advances in Intrusion Tolerant Systems at EuroSys 2008 (Apr 2008).

    James Lawler, John Molluzzo and Pascale Vandepeutte
    "An Expanded Study of Integrating Issues of Location-based Privacy with Mobile Computing into General Curriculum of Universities,” Proceedings of the Information Systems Educators Conference – ISECON 2008 (Nov 2008).

    Darren Hayes and Shareq Qureshi
    "A Framework for Computer Forensics Investigations Involving Microsoft Vista, " Proceedings of the 2008 Institute of Electrical and Electronics Engineers – IEEE Long Island Systems Applications and Technology Conference (May 2008).

    Catherine Dwyer and Starr Roxanne Hiltz
    “Designing Privacy into Online Communities,” Proceedings of the Internet Research 9.0: Rethinking Community, Rethinking Place (Oct 2008).

    D. Paul Benjamin, Partha Pal, Franklin Webber, Paul Rubel, Michael Atighetchi
    "Using a Cognitive Architecture to Automate Cyberdefense Reasoning, " Proceedings of the 2008 European Centre for Secure Information and Systems – ECSIS Symposium on Bio-inspired, Learning, and Intelligent Systems for Security – BLISS 2008 (Aug 2008).

    D. Paul Benjamin
    “A Cognitive Approach to Intrusion Detection,” Proceedings of the Institute of Electrical and Electronics Engineers (IEEE) Conference on Computational Intelligence for Security and Defense Applications -- CISDA 2007 (Apr 2007).

    Li-Chiou Chen and Chienting Lin
    “Combining Theory with Practice in Information Security Education,” Proceedings of the 11th Colloquium for Information Systems Security Education – CISSE (Jun 2007).

    Catherine Dwyer, Starr Roxanne Hiltz and Katia Passerini
    "Trust and Privacy Concern within Social Networking Sites: A Comparison of Facebook and MySpace, " Proceedings of the 13th Americas Conference on Information Systems – AMCIS 2007 (Aug 2007).

    Anthony Joseph and Claude Turner
    “A Method to Secure More Reliable Online Business Transactions, “Proceedings of the International Conference on Computing and e-Systems (Mar 2007).

    Charles McClain
    “Can identity theft defense be practically effective? A TAM-derived survey of of software-based deterrence of phishing. “Information Resource Management Association (May 3, 2007).

    John Molluzzo and James Lawler
    “Integrating Issues of Consumer Privacy with Mobile Computing into International Computer Science Curricula, " Proceedings of the Annual Consortium for Computing Sciences in Colleges – Eastern Region 2007 (Oct 2007).

    John Molluzzo and James Lawler
    “Integrating Issues of Location-based Privacy with Mobile Computing into International Information Systems Curricula, " Proceedings of the Annual Consortium for Computing Sciences in Colleges – Eastern Region (Nov 2007).

    Kai Qian and Lixin Tao
    "An Active Role-based Open Source Digital Labware for Information Forensics Education,” Proceedings of the 7th Institute of Electrical and Electronics Engineers – IEEE – International Conference on Advanced Learning Technologies (Jul 2007).

    Namchul Shin and Robert Yanus
    “Critical Success Factors for Managing an Information Security Awareness Program,” Proceedings of the 6th ISOneWorld Conference (Apr 2007).

    B. Son, Sung-Hyuk Cha and Yillbyung Lee
    "DLDA-based Iris Recognition from Image Sequences with Various Focus Information, " Proceedings of the 7th World Scientific and Engineering Academy and Society (WSEAS) International Conference on Multimedia Systems and Signal Processing – MUSP ’07 (Apr 2007).

    Lixin Tao, Xiang Fu, Xin Lu, Boris Peltsverger, Shijun Chen and Kai Qian
    "A Static Analysis Framework for Detecting SQL Injection Vulnerabilities,” Proceedings of the 31st Annual International Computer Software and Applications Conference – COMPSAC 2007 (Jul 2007).

    Charles Tappert and Jean R. Ward
    "Pen-Centric Shorthand Handwriting Recognition Interfaces, " Proceedings of the 1st International Workshop on Pen-Based Learning Technologies - PLT '07 (May 2007).

  • Electronic Publications

    Charles Tappert
    “New Pace University Study Shows Vulnerabilities in Face, Fingerprint Biometrics Products Increasingly Used in Border Control, Criminal Investigations, Passport Issuance, Voter Registration,” BioSpace.com,
    http://www.biospace.com/news_story.aspx?NewsEntityId=220528, May 12, 2011.

    “Pace U. Researchers Work on New Way to Stop Online Cheating,” The Chronicle of Higher Education,
    http://chronicle.com/blogs/wiredcampus/pace-u-researchers-work-on-new-way-to-stop-online-cheating/31421, May 20, 2011.

    “New Research Shows Keystroke Biometric is an Inexpensive, Effective Method to Identify, Authenticate Online Test Takers, Monitor Email Transactions Over Company Servers, Pace University Reveals,” BioSpace.com,
    http://www.biospace.com/news_story.aspx?NewsEntityId=221517, May 20, 2011.

    “Gagging on Tagging: Facebook Facial Recognition Creeps Out Privacy Partisans,” TechNewsWorld,
    http://www.technewsworld.com/story/72613.html, June 8, 2011

    Darren Hayes
    “EU May Mandate the ‘Right to be Forgotten’,” Internet Evolution,
    http://www.internetevolution.com/author.asp?section_id=852&doc_id=204940, March 21, 2011.

    “America’s Perilous Patchwork of Privacy Laws,” TechNewsWorld,
    http://www.technewsworld.com/story/72092.html, March 22, 2011.

    “Lawyers Smack Sony’s Hand as It Reaches for Hotz’s Hard Drive,” TechNewsWorld,
    http://www.technewsworld.com/story/72106.html, March 21, 2011.

    “The Chinese Government’s Gremlins in Google’s Works,” TechNewsWorld,
    http://www.technewsworld.com/story/The-Chinese-Governments-Gremlins-in-Googles-Works-72111.html, March 22, 2011.

    “Cellphone May Have Signaled Bin Laden’s Location,” nextgov,
    http://www.nextgov.com/nextgov/ng_20110502_4813.php, May 2, 2011.

    “Hack of International Monetary Fund Data Raises Global Worries,” nextgov,
    http://www.nextgov.com/nextgov/ng_20110613_8064.php, June 13, 2011.

    “Protecting Data and Risk Management: Lessons Learned from WikiLeaks and ‘Anonymous’,” Corporate Compliance Insights,
    http://www.corporatecomplianceinsights.com/2011/protecting-data-and-risk-management-lessons-learned-from-wikileaks-and-anonymous/, February 1, 2011.

    “8 Questions about Online Privacy,” NiemanWatchdog: Questions the Press Should Ask,
    http://www.niemanwatchdog.org/index.cfm?fuseaction=ask_this.view&askthisid=499, March 15, 2011.

    Catherine Dwyer and Starr Roxanne Hiltz
    “Designing Privacy into Online Communities,” Social Science Research Network (Oct 2008).

  • Technical Reports

    Robert Zack, Charles Tappert and Sung-Hyuk Cha
    “Performance of a Long-Text-Input Keystroke Biometric Authentication System Using an Improved k-Nearest-Neighbor Classification Method,” CSIS Technical Report, 276 (Sep 2010).

    Sung-Hyuk Cha and Charles Tappert
    “ROC Curves for Multivariate Biometric Matching Models,” CSIS Technical Report, 267 (Oct 2009).