Skip to Content - Skip to Navigation

Grants

Dighton Fiddner, “Decision Making Implications of Defining and Understanding Cyberspace.” Funded by the IBM Center for the Business of Government, June 16, 2013: Awarded a $20,000 grant.

  • This grant was awarded in order to find some answers to the practical implications of accurately defining cyberspace and the consequences of such definition on how decision makers can manage risks and respond to Threats in Today’s Security Environment.

William Oblitey, Rose Shumba, and Jennifer Gossett received funding in the amount of $231,000 (during academic year 2012–13) from the National Science Foundation CyberCorps: Scholarship for Service (SFS) award for their project, “The Cyber Catch Scholarship Program.”  The total funding for this project over a five-year period is anticipated to be $1,148,531.

  • This program provides qualified students with a scholarship to become a federal information assurance professional and address the growing need for protecting the government’s critical information infrastructures. The scholarship program supports one or two years of stipends, tuition, and allowances for undergraduate Information Assurance majors or minors at Indiana University of Pennsylvania.

Publications

J. Rodger, G. Bhatt, P. Chaudhary, G. Kline, and W. McCloy, “The Impact of Business Expertise on Information System Data and Analytics Resilience (ISDAR) for Disaster Recovery and Business Continuity: An Exploratory Study,” Journal of Intelligent Information Management, July, 2015.

D. Fiddner, “Cyberspace’s Strategic Domain’s Implications for National Security,” Jagiellonian University Conference 2015 Interdisciplinary Approaches To Security in the Changing World, Krakow, Poland, June 18-20, 2015.     

T. Fries, “Fuzzy Evolutionary Classification of TCP Packets for Network Intrusion Detection,” Industrial Conference on Data Mining, New York, NY, July 2013.

D. Fiddner, “Managing Cyberspace National Security,” Peace Studies Society (PSS)-International Studies Association (ISA) Joint Conference, Budapest, Hungary, June 27-29, 2013.

S. Ali and W. Farag, “How is Quantum Cryptography Used to Secure Financial Transactions?” in Proceedings of the Second International Conference on E-Technologies and Networks for Development (ICeND 2013), Kuala Lumpur, Malaysia, March 4-6, 2013.

J. Gossett, “Cyberstalking” and “Cyberterrorism” in the Encyclopedia of Criminal Justice Ethics. Thousand Oaks: Sage Publications, 2013.  

D. Fiddner, “Strategy in the [Missile] Cyber Age,” British International Studies Association (BISA) and the International Studies (ISA) Joint International Conference in 2012, Edinburgh, UK, June 20-22, 2012.

J. Rodger, “Toward Reducing Failure Risk in an Integrated Vehicle Health Maintenance System: A Fuzzy Multi-Sensor Data Fusion Kalman Filter Approach for IVHMS” Expert Systems with Applications,” Elsevier Vol. 39 (10), 9821-9836, 2012.

P. Pankaj, M. Hyde and J. A. Rodger, "P2P Business Applications: Future and Directions," Communications and Network, Vol. 4 No. 3, pp. 248-260, July, 2012. 

Terrence P. Fries, “Network Intrusion Detection Using an Evolutionary Fuzzy Rule-Based System,” Conference on Systematics, Cybernetics and Informatics, Orlando, FL, July 2011.

Dominic Asamoah and William Oblitey, “The Use of Compression Methods for Data Security Assurance,” Proceedings of the 10th European Conference on Information Warfare and Security, pp. 6-11, Tallinn, Estonia, July 7-8, 2011.

Terrence P. Fries, “Evolutionary Optimization of a Fuzzy Rule-Based Network Intrusion Detection Systems,” North American Fuzzy Information Processing Society Annual Conference, Toronto, Canada, July 2010.

Azad Ali and Waleed Farag, “Introducing a Concentration in Information Assurance into a Computer Science Program,” in Journal of Issues in Information Systems, Volume X, No. 2, pp. 185-193, 2009.

Waleed Farag, “A Novel Design of Robust Video Steganographic System,” Proceedings of the International Workshop on Telecommunications, Sao Paulo, Brazil, pp. 98-102, Feb. 16-19, 2009.

David T. Smith, “Extracting, Streamlining, and Completing a Threat Assessment Methodology from Octave‑S®,” 5th Symposium on Risk Management and Cyber-Informatics (RMCI 2008) included as a Focus Symposium in the 12th World Multi-conference on Systemics, Cybernetics and Informatics (WMSCI 2008), Orlando FL, 2008.

Presentations

J. Gossett, M. Pollis, J. Coyne, S. Moser and K. Stinedurf presented “Let’s Talk to Hackers: A Qualitative Study,” at ACJS Annual Meeting - Academy of Criminal Justice Sciences in Orlando, FL, March 2015.

Waleed Farag presented “Lessons Learned from the Long-term Offering of a Multidisciplinary IA Program” at the 2014 Centers of Academic Excellence Community Meeting Sponsored by California State University San Bernardino, Cyber Security Center and held in Columbia, Maryland on Monday – November 4, 2014.

Kustim Wibowo presented “How to Protect Your Data Effectively from Mobile Access,” at the 37th NABET (Northeastern Association of Business, Economics and Technology) Conference, State College, PA, October 23-24, 2014.

Sanwar Ali presented “How is Quantum Cryptography Used to Secure Financial Transactions?” at the Second International Conference on E-Technologies and Networks for Development (ICeND 2013), Kuala Lumpur, Malaysia, March 4-6, 2013.

Kustim Wibowo presented “Security Issues in Private Use Cloud Computing,” with Rasben Dantes, Ganesha Universty of Education, 36th NABET (Northeastern Association of Business, Economics and Technology) Conference, State College, PA, 17-18 October 2013.

Terrence Fries presented “Fuzzy Evolutionary Classification of TCP Packets for Network Intrusion Detection,” Industrial Conference on Data Mining, New York, NY, July 2013.

Kustim Wibowo presented “Cybersecurity Laws and Online Freedom Beyon SOPA and PIPA,” 35th NABET (Northeastern Association of Business, Economics and Technology) Conference, State College, PA, 25-26 October 2012.

Terrence Fries presented “Network Intrusion Detection Using an Evolutionary Fuzzy Rule-Based System,”  at the Conference on Systematics, Cybernetics and Informatics, Orlando, FL, July 2011.

Dighton Fiddner presented “National Cyber Security Strategy against Malevolent Use of the Global Cyberspace,” at the 3rd World International Studies Committee (WISC) Conference: World Crisis? Revolution or Evolution in the International Community?, Porto, Portugal, August 2011.

Books and Book Chapters

Fiddner, D., Defining a Framework for Decision Making in Cyberspace, IBM Center for the Business of Government, 2015.

  • This research report presents a new contemporary characterization of Cyberspace that takes into account security and risk management with the purpose of enabling prompt and intelligent decision making. This research is one outcome of a multi-year research project which involves several researchers from IUP, Carnegie Mellon University, University of Pittsburgh, Naval War College, RAND Corporation, and other security-based institutions.

J. Glenn Brookshear and Dennis Brylow, with contributions by David T. Smith, Computer Science: An Overview, 12th Edition, Pearson, 2015.

  • This book provides a broad first introduction to Computer Science. Included are chapters on Networking, Database Systems, and Operating Systems. Security, Encryption, and Social Impact are specifically discussed on pages 148-150, 191-198, 436-438, and 553-557. Ethical, privacy, and security concerns are raised where applicable in the Social Issues section concluding each chapter.

Rodger, J. A. & George, J., “Mobile Speech and the Armed Services: Making a Case for Adding Siri-like features to VAMTA (Voice-Activated Medical Tracking Application).” In Amy Neuinstein and Judith Markowitz (Eds.), Mobile Speech and Natural Language Solutions. pp. 319-332, Springer, 2013.

  • This chapter addresses techniques to ensure the security of Military communication systems.

J. Glenn Brookshear, with contributions by David T. Smith and Dennis Brylow, Computer Science: An Overview, 11th Edition, Addison Wesley, 2012.

  • This book provides a broad first introduction to Computer Science. Included are chapters on Networking, Database Systems, and Operating Systems. Security, Encryption, and Social Impact are specifically discussed on pages 130-132, 173-181, 416-418 and 536-538. Ethical, privacy, and security concerns are raised where applicable in the Social Issues section concluding each chapter.

George, James, Hall, Donald, and Rodger, James, Smart Data: Enterprise Performance Optimization Strategy, John Wiley & Sons, 2010.

  • Throughout this book the importance of the data security, interoperability, and the correct use of metrics and algorithms is emphasized. The book also discusses how information operations can protect and defend information and information systems by ensuring confidentiality, integrity, availability, authentication, and nonrepudiation. On pages 252-254, the book specifically discusses how a smart data paradigm would not be complete without consideration of security and information assurance. Topics such as the DoD Information Assurance Certification and Accreditation Process (DIACAP), and the DoD Information Technology Security Certification and Accreditation Process (DITSCAP) are discussed.

Rodger, J. A. & George, J., “Hands Free: Adapting the Task-Technology-Fit Model and Smart Data to Validate End-User Acceptance of the Voice Activated Medical Tracking Application (VAMTA) in the United States Military.” In Amy Neustein, Ph.D. (Ed.),  Advances in Speech Recognition: Mobile Environments, Call Centers and Clinics. 101 Philip Drive, Norwell, MA 02061, pp. 275-303: Springer, 2010.

  • This chapter evaluates the perceived usefulness of the proposed VAMTA given the stringent security requirements for deployment in a military environment.

Dissertations

Phil Wagner, Surrounded by Crime: This I Know for the Internet Told Me So, Indiana University of Pennsylvania, May 2015.

Joshua Smallridge, Social Learning and Digital Piracy: Do Online Peers Matter?, Indiana University of Pennsylvania, May 2012.

  • Institute for Information Assurance
  • Stright Hall, Room 319
    210 South Tenth Street
    Indiana, PA 15705
  • Phone: 724-357-2524
  • Fax: 724-357-2724
  • Office Hours
  • Monday through Friday
  • 8:00 a.m. – 12:00 p.m.
  • 1:00 p.m. – 4:30 p.m.