Information Technology Publications

2014-2015

    1. Li, L., Guo R. (2014) A student-centered guest lecturing: a constructivism approach to promote student engagement, Journal of Instructional Pedagogies, volume 15.
    2. Li, L., Zhang C., Zheng  J. (2014), Promoting Information Systems Major to Undergraduate Students - An Comprehensive Investigation, accepted by Journal of Information Systems Education, 25(3), 211-220.
    3. Zheng, J., Zhang C., Li, L., Bringing Business Intelligence to Health Information Technology Curriculum, accepted by Journal of Information Systems Education Special Issue on HIT, in press.
    4. Li, L., Zheng, J., Shen Yide, Guo, R. (2015), Which Collaboration Technologies Best Support Student Teamwork? An Empirical Investigation, 2015 Americas Conference on Information Systems (AMCIS), Puerto Rico,August 13-15, 2015.

    5.  Li, L., Guo, R., Zheng, G. Discover And Promote Groupware For Effective Team Collaboration – A Comprehensive Study, Southern Association for Information Systems Conference, SAIS 2015, Hilton Head, SC, March 20-22, 2015. 

    6. Zheng, J., Zhang, C., Li, L. (2015). Practicing and Evaluating Soft Skills in IT Capstone Projects, ACM Special Interest Group for Information Technology Education Conference (SIGITE) 2015, Chicago, IL, September 30-October 3.

    7. Zhang, C., Li, L., & Zheng, G. (2015). Developing Business Intelligence Competency in Health IT: Perspectives from Health IT Professionals. Southern Association for Information Systems Conference, SAIS 2015, Hilton Head, SC, March 20-22, 2015.

    8. Fokes, E., Li, L. (2014) A Survey of Security Vulnerabilities in Social Networking Media – The Case of Facebook, SIGITE/RIIT 2014 Conference, Atlanta, GA

    9. Li, L, Zhang C., and Zheng, G., Identifying Important Skill Sets to Support Healthcare Data Processing and Analytics: An Empirical Examination of Perceptions from HIT Practitioners, AMCIS 2014 conference, Savanna GA.

    10.  Zheng, G., Li, L., and Zhang C. (2014), Success Factors and Challenges for IT Capstone Projects, SIGITE/RIIT 2014 Conference, Atlanta, GA

    11. Li, L., Conn, S., Markham, C. (2014), Promoting Active Learning in Online Classes, A Case of Student-centered Guest Lecturing,  in the proceedings of Southern Association of Information Systems(SAIS), Macon GA.

    12. Zheng, J., Zhang C., Li, L (2014), Bringing Business Intelligence to Health Information Technology Curriculum, SIGCSE 2014, Atlanta GA. 

    1. Sabin M., Peltsverger S., Tang C., Updating the ACM/IEEE 2008 Curriculum in Information Technology , Proceeding SIGCSE '15 Proceedings of the 46th ACM Technical Symposium on Computer Science Education, Kansas City, KA, March 4-7.
    2. Peltsverger S. & Zhang, C. Bottleneck Analysis with NetKit: Teaching Information Security with Hands-on Labs, ACM Special Interest Group for Information Technology Education Conference. SIGITE 2014, Atlanta, GA, October 15-18.
    3. Peltsverger, S., Zheng, G. "Bite-sized Learning of Technical Aspects of Privacy", In Proceedings of International Conference on Security and Management (SAM'14). Las Vegas, USA, July 21 - 24, 2014
    4. Peltsverger S., Zhang C. " Interactive Online Learning on Information Privacy with Google's Oppia", In Proceedings of 18th National Colloquium for Information Systems Security Education, June 16 - 18, 2014, San Diego, CA
    5. Zheng G., Peltsverger S., Web Analytics Overview, Encyclopedia of Information Science and Technology, Third Edition (2014), DOI: 10.4018/978-1-4666-5888-2.ch756.
    1. Hossain Shahriar, Hisham M. Haddad, Vamshee Krishna Devendran, "Request and Response Analysis Framework for Mitigating Clickjacking Attacks," International Journal of Secure Software Engineering (IJSSE), IGI Global, Vol. 6, Issue 3. pp. 1-25, September 2015.
    2. Hossain Shahriar, Stelvio Cimato, Jingyu Zhou, and Katsuyoshi Iida, Fast Abstract Editorial, 2015 IEEE 39th Annual International Computers, Software & Applications Conference (COMPSAC), Taichung, Taiwan, July 1-4, 2015. IEEE Computer Society 2012, pp. 635, DOI 10.1109/COMPSAC.2015.301.
    3. Hossain Shahriar, Tulin Klintic, Victor Clincy, "Mobile Phishing Attacks and Mitigation Techniques," Journal of Information Security, Vol.6 No.3, pp. 206-212, July 2015, Scientific Research, doi: 10.4236/jis.2015.63021.
    4. David Lebron and Hossain Shahriar, "Comparing MOOC-Based Platforms: Reflection on Pedagogical Support, Framework and Learning Analytics," Proc. of 2015 International Conference on Collaboration Technologies and Systems (CTS), Atlanta, USA, June 2015, IEEE CS Press, pp. 167-174, ISBN: 978-1-4673-7648-8/15
    5. Pranahita Bulusu, Hossain Shahriar, H. Haddad, "Classification of Lightweight Directory Access Protocol Query Injection Attacks and Mitigation Techniques," Proc. of 2015 International Conference on Collaboration Technologies and Systems (CTS), Atlanta, USA, June 2015, IEEE CS Press, pp. 337-344, ISBN: 978-1-4673-7648-8/15
    6. Hossain Shahriar and Hisham Haddad, "Security assessment of clickjacking risks in web applications: metrics based approach," Proceedings of the 30th Annual ACM Symposium on Applied Computing (SAC), Salamanca, Spain, April 2015, pp. 791-797.
    7. Victor Clincy and Hossain Shahriar, "A Novel Approach to Detect Tampered Wireless Network Applications," Proc. of Information 12th International Conference on Technology-New Generations (ITNG), Las Vegas, NV, April 2015, pp. 197-199.
    8. Vamshee Krishna Devendran, Hossain Shahriar, and Victor Clincy, "A Comparative Study of Email Forensic Tools," Journal of Information Security, Vol. 6, Issue 2, April 2015, pp. 111-117, Scientific Research, doi: 10.4236/jis.2015.63021.
    9. Vanessa N. Cooper, Hossain Shahriar, and Hisham M. Haddad. Development and Mitigation of Android Malware, in the book titledHandbook of Research on Digital Crime, Cyberspace Security, and Information Assurance, Edited by Maria Manuela Cruz-Cunha and Irene Maria Portela, Polytechnic Institute of Cávado and Ave, Portugal, published by IGI Global 
    10. Vanessa N. Cooper, Hossain Shahriar, and Hisham M. Haddad. Development and Mitigation of Android Malware, Handbook of Research on Digital Crime, Cyberspace Security, and Information Assurance, Editors: Maria Manuela Cruz-Cunha and Irene Maria Portela, IGI Global, pp. 51-66, January 2015.
    11. Hossain Shahriar and Vamshee Krishna Devendran. Hijacking of Clicks: Attack and Mitigation Techniques, Handbook of Research on Digital Crime, Cyberspace Security, and Information Assurance, Editors: Maria Manuela Cruz-Cunha and Irene Maria Portela, IGI Global, pp. 135-145, January 2015.
    12. Vanessa N. Cooper, Hisham M. Haddad, Hossain Shahriar, "Android Malware Detection Using Kullback-Leibler Divergence," Vol. 3, Issue 9, pp. 1-9, December 2014.
    13. Hossain Shahriar, Victor Clincy, "Detection of repackaged Android Malware," Proc. of 9th International Conference for Internet Technology and Secured Transactions (ICITST), pp. 349-354, London, UK, December 2014.
    14. Hossain Shahriar, Komminist Weldemariam, Mohammad Zulkernine, Thibaud Lutellier, "Effective detection of vulnerable and malicious browser extensions," Computers & Security, Elsevier Science, Vol. 47, pp. 66-84, November 2014.
    15. Dan Chia-Tien Lo, Kai Qian, Wei Chen, Hossain Shahriar, Victor Clincy, "Authentic learning in network and security with portable labs," Proc. of IEEE Frontiers in Education Conference (FIE), Madrid, Spain, pp. 1-5, October 2014.
    16. Hossain Shahriar, Hisham M Haddad, "Content Provider Leakage Vulnerability Detection in Android Applications," Proceedings of the 7th International Conference on Security of Information and Networks, Glasgow, Scotland, pp. 359-366, September 2014.
    17. Komminist Weldemariam, Hossain Shahriar, VamsheeKrishna Devendran, "Dynamic Analysis of Web Objects," Proceedings of the 7th International Conference on Security of Information and Networks, Glasgow, Scotland, pp. 423-428, September 2014.
    18. Zachary Evans, Hossain Shahriar, Web Session Security: Attack and Defense Techniques, Case Studies in Secure Computing: Achievements and Trends, Editors: Biju Issac, Nauman Israr, CRC Press, pp. 389-403, August 2014.
    19. Hossain Shahriar, Hisham M Haddad, Ishan Vaidya, "Fuzzy Logic–Based Application Security Risk Assessment," Book Chapter, Case Studies in Secure Computing: Achievements and Trends, Editors: Biju Issac, Nauman Israr, CRC Press, pp. 49-65, August 2014.
    20. Hossain Shahriar and Vamshee Krishna Devendran, Classification of Clickjacking Attacks and Detection Techniques, Information Security Journal: A Global Perspective, Taylor & Francis, Vol. 23, Issue 4-6, pp. 137-147.
    21. Hossain Shahriar, Sarah North, Wei-Chuen Chen, Edward Mawangi, "Information Theoretic XSS Attack Detection in Web Applications," International Journal of Secure Software Engineering (IJSSE), IGI Global, Vol. 5, Issue 3, pp. 1-15, July 2014.
    22. Vanessa N Cooper, Hossain Shahriar, Hisham M Haddad, "A Survey of Android Malware Characterisitics and Mitigation Techniques," Proc. of 11th International Conference on Information Technology: New Generations (ITNG), Las Vegas, NV, IEEE CS Press, April 2014, pp. 327-332.
    23. Ying Xie, Hossain Shahriar, Jing He, Sarah North, Ben Setzer, Ken Hoganson, "CS++: expanding CS curriculum via open cybersecurity courseware," Proceedings of the 2014 ACM Southeast Regional Conference, Kennesaw, GA, March 2014, Article No. 24, 6pp.
    24. Dan C Lo, Kai Qian, Victor Clincy, Hossain Shahriar, Wei Chen, "Labware for networking protocols and wireless security using Android-enabled mobile devices," Proceedings of the 2014 ACM Southeast Regional Conference, Kennesaw, GA, Article 13, 6 pp., March 2014.
    25. Hossain Shahriar, Sheetal Batchu, "Towards mutation-based testing of column-oriented database queries," Proceedings of the 2014 ACM Southeast Regional Conference, Kennesaw, GA, Article No. 11, 6 pp., March 2014.
    26. Hossain Shahriar, Hisham Haddad, "Risk assessment of code injection vulnerabilities using fuzzy logic-based system," Proceedings of the 29th Annual ACM Symposium on Applied Computing, Gyeongju, Korea, pp. 1164-1170, March 2014.
    27. Hossain Shahriar, Steve North, Edward Mawangi, "Testing of Memory Leak in Android Applications," Proc. of 15th IEEE International Symposium on High-Assurance Systems Engineering (HASE), Miami, FL, pp. 176-183, January 2014.
    28. Hossain Shahriar, Sarah M North, YoonJi Lee, Roger Hu, "Server-side code injection attack detection based on Kullback-Leibler distance," International Journal of Internet Technology and Secured Transactions, Inderscience Publishers, Vol. 5, Issue 3, pp. 240-261, January 2014.
    1. Y. Liu, A. Sung, M. Yang, L. Chen, "A Method to Detect AAC Audio Forgery", 8th International Conference on Mobile Multimedia Communications, May 25–27, 2015, Chengdu, China;
    2. M. Yang, R. Rutherfoord, and E. Jung, “Learning Cloud Computing and Security through CloudSim Simulation”, International Security Security Journal (accepted);
    3. P. Bhattacharya, L. Yang, M. Guo, K. Qian, M. Yang, “Learning Mobile Security with Labware”, IEEE Security and Privacy Magazine, Volume 12, Issue 1, 2014.
    4. M. Yang, K. Qian, and R. Rutherfoord, “Learning Cloud Computing and Security through CloudSim Simulation”, 2014 Information Security Curriculum Development Forum (InfoSecCD 2014), Kennesaw, GA, October 2014;
    5. R. Rutherfoord, J. Zheng, J. Preston, M. Yang, “The Experiences and Challenges in Setting up a Mobile Computing Track”, Panel, SIGITE 2014, Atlanta, GA, October 2014;
    1. Zhang, C., Reichgelt, H., Rutherfoord, R., & Wang, J. (2015). Developing Health Information Technology (HIT) Programs and HIT Curriculum: The Southern Polytechnic State University Experience. Journal of Information Systems Education Special Edition in Health IT, in press.
    2. Zheng, J., Zhang, C. & Li, L. (2015). Bringing Business Intelligence to Health Information Curriculum. Journal of Information Systems Education Special Edition in Health IT, in press.
    3. Li, L., Zhang, C. & Zheng, J. (2014). Promoting Information Systems Major to Undergraduate Students - A Comprehensive Investigation. Journal of Information Systems Education, 25(3), 211-220.
    4. Zhang, C., Zhang, X., & Halstead-Nussloch, R. (2014). Assessment Metrics, Challenges and Strategies for Mobile Health Apps, Issues in Information Systems, 15(2), 59-66.
    5. Zhang, C. (2015). Thinking from Upper-Management Perspective or Working-level Analyst: Using Case Studies in Teaching a Health Information Security Course. 2015 Association of Information Technology Professionals (AITP) Education Special Interest Group (EDSIG) Conference on Information Systems and Computing Education, Wilmington, NC. November 1-4.
    6. Zhang, C., Zhang, X. & Halstead-Nussloch, R. (2015). Validating the Assessment Metrics for Mobile Health Apps: Preliminary Outcomes from a Pilot Study. ACM Special Interest Group for Information Technology Education Conference (SIGITE) 2015, Chicago, IL, Sept 30-October 3.
    7. Zheng, J., Zhang, C., & Li, L. (2015). Practicing and Evaluating Soft Skills in IT Capstone Projects, ACM Special Interest Group for Information Technology Education Conference (SIGITE) 2015, Chicago, IL, Sept 30-October 3.
    8. Zhang, C., Li, L., & Zheng, G. (2015). Developing Business Intelligence Competency in Health IT: Perspectives from Health IT Professionals. Southern Association for Information Systems Conference, SAIS 2015, Hilton Head, SC, March 20-22, 2015.
    9. Zheng, J., Li, L. & Zhang, C. (2014). Success Factors and Challenges for IT Capstone Projects, ACM Special Interest Group for Information Technology Education Conference. SIGITE 2014, Atlanta, GA, October 15-18.
    10. Peltsverger S. & Zhang, C. (2014). Bottleneck Analysis with NetKit: Teaching Information Security with Hands-on Labs, ACM Special Interest Group for Information Technology Education Conference. SIGITE 2014, Atlanta, GA, October 15-18.
    11. Zhang, C., Zhang, X. & Halstead-Nussloch, R. (2014). Assessment Metrics, Challenges and Strategies for Mobile Health Apps, The 54th International Conference of International Association for Computer Information Systems (IACIS 2014). Las Vegas, NV, October 1-4, 2014.
    12. Li, L., Zhang, C. & Zheng, J. (2014). Identifying Important Skill Sets to Support Healthcare Data Processing and Analytics: An Empirical Examination of Perceptions from HIT Practitioners. Proceedings of Americas Conference on Information Systems, AMCIS 2014, August 7 - 9, 2014, Savannah, GA.
    13. Peltsverger S. & Zhang, C. (2014). Interactive Online Learning on Information Privacy with Google's Oppia, The 18th Colloquium of Information Systems Security Education. June 16-18, 2014. San Diego, CA.
    14. Zhang, C. (2014), Healthcare Mobile App Development with App Inventor in a Health IT Course, Southern Association for Information Systems Conference, SAIS 2014, Macon GA,March 21-22, 2014.
    15. Zheng, J., Zhang C., & Li, L. (2014), Bringing Business Intelligence to Healthcare Informatics Curriculum: A Preliminary Investigation, ACM Special Interest Group for Computer Science Education Conference, SIGCSE 2014, Atlanta, GA, March 5-8.
    1. Zheng, G., Chi Zhang, Lei Li, (2015) “Practicing and Evaluating Soft Skills in IT Capstone Projects,” ACM SIGITE 2015, Sept 30 - Oct 3, Chicago, IL
    2. Bill Diong, G. Zheng, M. Ginn, (2015) “Establishing the Foundation for Energy Management on University Campuses via Data Analytics”, IEEE SoutheastCon 2015, April 9-12, Fort Lauderdale, FL
    3. Zheng G. (2015), “Web Navigation Systems for Information Seeking,” Encyclopedia of Information Science and Technology, 3rd edition, IGI Global, pp. 7693-7701
    4. Zheng, G., Chi Zhang, Lei Li (2014) “Bringing Business Intelligence to Health Information Technology Curriculum”, Journal of Information System Education, in press
    5. Zheng, G., C. Zhang, and L. Li (2014), “Bringing Business Intelligence to Healthcare IT Curriculum: A preliminary investigation,” Association for Computing Machinery Special Interest Group on Computer Science Education (SIGCSE), Atlanta, GA, March 5-8, 2014
    6. David Stone and Guangzhi Zheng (2014), “Learning Management System in a Changing Environment”, Handbook of Research on Education and Technology in a Changing Society, IGI Global
    7. Andy Wang and Jack Zheng (2014), “Service-Oriented Development”, in Computing Handbook, Third Edition: Computer Science and Software Engineering, CRC Press

 

 

 

 

 

©