SPECIFIC RESEARCH INTERESTS Data Mining and Knowledge Discovery Information Assurance Education Learning Sciences SPECIFIC TEACHING INTERESTS Core Programming Courses Web and Mobile Development Databases EDUCATION Siddharth Kaza Department of Computer and Information Sciences 7800 York Rd., Towson, MD 21252 Email: skaza@towson.edu Website: http://www.towson.edu/~skaza Phone: (410) 704-6310 Ph.D. in Management Information Systems Eller College of Management, University of Arizona, Tucson, AZ, 2008 Minor: Management and Organizations Dissertation topic: Instance, Evolution, and Predictive Modeling of Social Networks Committee members: Dr. Hsinchun Chen, Dr. Jay F. Nunamaker, Dr. J. Leon Zhao, Dr. Zhu Zhang Major courses: Telecommunications, Database Management, Data Structures and Algorithms, Web Computing and Mining, System Analysis and Design, Design Science Research Methodology, Readings in MIS, Research Methodologies in MIS, Models for Quantitative Analysis Minor courses: Theory and Management of Organizations, Public Sector Organizations, Organizational Privacy and Security, Multivariate Statistical Analysis M.S. in Computer Science Central Michigan University, Mt. Pleasant, MI, 2001-03 Thesis: Identifying Deliberately Doctored Text Documents using the Frequent Keyword Chain (FKC) Model B.Sc. in Mathematical Sciences University of Delhi, New Delhi, India, 1997-00 Major fields of study: Operations Research, Computer Science RESEARCH AND PROFESSIONAL EXPERIENCE Associate Professor Department of Computer and Information Systems, 2014-present Assistant Professor, Tenure Track Department of Computer and Information Systems, 2008-2014 Research Associate (funded by NSF, NLM, and DHS) Department of MIS, University of Arizona, 2003-2008 Page 1 of 11
System Administrator Department of University Recreation, Central Michigan University, 2001-03 Research Assistant Software Engineering Information Technology Institute, Central Michigan University, 2002 TEACHING EXPERIENCE Associate Professor, Information Systems Department of Computer and Information Sciences, Towson University, Fall 2008 - present Courses regularly taught: Advanced Web Development - COSC 617, COSC 490 Android Development using Agile Engineering - COSC 490 Business Data Networks and Telecommunications CIS 350 Introduction to Computer Science COSC 236, COSC 237 Lecturer Networking for Business Managers Department of MIS, University of Arizona, Summer 2006 Lecturer Computers and the Internetworked Society Department of MIS, University of Arizona, Summer 2004 Lecturer Programming Languages: Java (CPS 280J) Department of Computer Science, Central Michigan University, Spring 2003, Fall 2002 Teaching assistant for courses at University of Arizona (MIS111-Introduction to Computing) and Central Michigan University (CPS 482-Advanced Multimedia Design). JOURNAL PUBLICATIONS 1. Siraj, A., B. Taylor, S. Kaza, S. Ghafoor (2015), Integrating security in the computer science curriculum, ACM Inroads, 6(2), pp 77-81 2. Abbasi, A., F. Zahedi, S. Kaza (2012), Detecting Fake Online Pharmacy Websites using Recursive Trust Labeling, ACM Transactions on Information Systems (TOIS), 30 (4), Thompson ISI Impact factor: 1.667, Rank 3/116 in Computer Science/Information Systems (as of 2009) 3. Kaza, S., P. Hu, H. Hu, H. Chen (2011), Designing, Implementing, and Evaluating Information Systems for Law Enforcement A Long-term Design-science Research Project, Communications of the Association of Information Systems (CAIS), 29 4. Liu, X., S. Kaza, P. Zhang, and H. Chen (2011), Effect of Inventor Status on Innovation Diffusion within Institutions: A Study on SCI Literature from China, Russia, and India, Journal of the American Society for Information Science and Technology (JASIST), 62 (6), Page 2 of 11
pp 1166-1176 Thompson ISI Impact factor: 2.178, Rank 11/61 in Information Science 5. Kaza, S., & Chen, H. (2010), Identifying High-status Nodes in Knowledge Networks, Annals of Information Systems, 12. pp. 91-108. 6. Hu, D., S. Kaza and H. Chen (2009), Identifying Significant Social-network Link Formation Facilitators: A Study of Dark Networks, Journal of the American Society for Information Science and Technology (JASIST), 60(4). pp. 655-665. Thompson ISI Impact factor: 2.178, Rank 11/61 in Information Science 7. Kaza, S., J. Xu, B. Marshall and H. Chen (2009), Topological Analysis of Criminal Activity Networks: Enhancing Transportation Security, IEEE Transactions on Intelligent Transportation Systems, 10(1). pp. 83-91. Thompson ISI Impact factor: 3.302, Rank 1/23 in Transportation Science and Technology 8. Marshall, B., H. Chen, S. Kaza (2008), Using Importance Flooding to Identify Interesting Networks of Criminal Activity, Journal of the American Society for Information Science and Technology (JASIST), 59(13). pp. 2099-2114. Thompson ISI Impact factor: 2.178, Rank 11/61 in Information Science 9. Kaza, S. and H. Chen (2008), Evaluating ontology mapping techniques: An experiment in public safety information sharing: An Experiment in Public Safety Information Sharing, Decision Support Systems, 45(4), pp. 714-728 Thompson ISI Impact factor: 2.622, Rank 4/73 in OR/MS 10. Kaza, S., Y. Wang and H. Chen (2007), Enhancing Border Security: Mutual Information Analysis to Identify Suspect Vehicles, Decision Support Systems, 43(1), pp. 199-210. Thompson ISI Impact factor: 2.622, Rank 4/73 in OR/MS REFEREED CONFERENCE PUBLICATIONS Papers 1. Raina, S., Kaza, S., and Taylor, B. (2016), Security Injections 2.0: Increasing Ability to Apply Secure Coding Knowledge using Segmented and Interactive Modules in CS0, Proceedings of the 47th SIGCSE technical symposium on Computer science education, Memphis, TN 2. Raina, S., Kaza, S., Taylor, B. (2014), Segmented and Interactive Modules for Teaching Secure Coding: A Pilot Study, International Conference on e-learning e-education and Online Training, Bethesda, MD 3. Becker, A. B., Kaza, S., Goldberg A. (2014), Interplay between Traditional Media, Social Media, and the Law-making Process: A Study on the Marriage Equality Issue in Maryland, Proceedings of the International Conference for E-Democracy and Open Government, Krems, Germany 4. McFarlane, J. and Kaza, S. (2013), Analysis of Research Collaboration Network at CISSE: Structure and Prominent Researchers, The 17th Colloquium for Information Systems Security Education (CISSE), Mobile, AL Page 3 of 11
5. McFarlane, J. and Kaza, S. (2012), State Governors on Social Media Reciprocity and Homophily in Twitter Networks, Conference for e-democracy and Social Media, Singapore, Edition Danau-Universitat Krems 6. Kaza, S., H. Lu, D. Zeng, H. Chen (2012), Using Burst Detection Techniques to Identify Suspicious Vehicular Traffic at Border Crossings, IEEE International Conference on Intelligence and Security Informatics (ISI), Washington, DC, IEEE Press 7. Koepke, J., Kaza, S., & Abbasi, A. (2012), Exploratory Experiments to Identify Fake Websites by using Features from the Network Stack, IEEE International Conference on Intelligence and Security Informatics (ISI), Washington, DC, IEEE Press 8. Taylor, B., & Kaza, S. (2011), Security Injections: Modules to Help Students Remember, Understand, and Apply Secure Coding Techniques, The 16th Annual ACM Conference on Innovation and Technology in Computer Science (ITICSE 2011), Darmstadt, Germany. 9. Turner, C. F., Taylor, B., & Kaza, S. (2011), Security in Computer Literacy- A Model for Design, Dissemination, and Assessment, The 42nd ACM Technical Symposium on Computer Science Education (SIGCSE), Dallas, TX. 10. Dierbach, C., Hochheiser, H.H., Collins, S., Jerome, G., Ariza, C., Kelleher, T., Kleinsasser, W., Dehlinger, J., and Kaza, S. (2011), "A Model for Incorporating Computational Thinking in a General Education Curriculum," The 42nd ACM Technical Symposium on Computer Science Education (SIGCSE), ACM, Dallas, TX. 11. Kaza, S., B. Taylor, H. H. Hochheiser, S. Azadegan, M. O'Leary and C. H. Turner (2010), "Injecting Security in the Curriculum Experiences in Effective Dissemination and Assessment Design," The 14th Colloquium for Information Systems Security Education (CISSE), Baltimore, MD. 12. Abbasi, A., S. Kaza, F. Zahedi (2009), Evaluating Link-Based Techniques for Detecting Fake Pharmacy Websites, Workshop on Information Technologies and Systems (WITS-2009), Phoenix, AZ 13. Kaza, S. and H. Chen (2009), Effect of Inventor Status on Intra-organizational Innovation Evolution, Hawaii International Conference on System Sciences (HICSS 42), IEEE Press, Big Island, HI 14. Kaza, S., D. Hu and H. Chen (2007), Dynamic Social Network Analysis of a Dark Network: Identifying Significant Facilitators, IEEE International Conference on Intelligence and Security Informatics (ISI), New Brunswick, NJ, IEEE Press. 15. Wang, A., S. Kaza, S. Joshi, K. Chang, H. Atabakhsh and H. Chen (2007), The Arizona IDMatcher: A Probabilistic Identity Matching System, IEEE International Conference on Intelligence and Security Informatics (ISI), New Brunswick, NJ, IEEE Press. 16. Kaza, S., Y. Wang and H. Chen (2006), Target Vehicle Identification for Border Safety with Modified Mutual Information, IEEE International Conference on Intelligence and Security Informatics (ISI), San Diego, CA, Springer. 17. Chen, H., H. Atabakhsh, C. Tseng, B. Marshall, S. Kaza, S. Eggers, H. Gowda, A. Shah, T. Petersen and C. Violette (2005), Visualization in Law Enforcement, CHI '05 Extended Abstracts on Human factors in Computing Systems, Portland, OR, USA, ACM Press. 18. Kaza, S., T. Wang, H. Gowda and H. Chen (2005), Target Vehicle Identification for Border Safety using Mutual Information, 8th International IEEE Conference on Intelligent Transportation Systems, Vienna, Austria. 19. Kaza, S. and H. Chen (2005), Evaluating Ontology Mapping Techniques: An Experiment in Public Safety Information Sharing, Workshop in Information Technology (WITS), Las Vegas. Page 4 of 11
20. Marshall, B., S. Kaza, J. Xu, H. Atabakhsh, T. Petersen, C. Violette and H. Chen (2004), Cross-Jurisdictional Criminal Activity Networks to Support Border and Transportation Security, 7th International IEEE Conference on Intelligent Transportation Systems, Washington DC. 21. Xu, J., B. Marshall, S. Kaza and H. Chen (2004), Analyzing and Visualizing Criminal Network Dynamics: A Case Study, IEEE Symposium on Intelligence and Security Informatics (ISI), Tucson, AZ, Springer. 22. Kaza, S., S. N. J. Murthy and G. Hu (2003), Identification of Deliberately Doctored Text Documents using Frequent Keyword Chain (FKC) model, IEEE International Conference on Information Reuse and Integration (IRI), Las Vegas, NV. Extended Abstracts/Abstracts/Posters 23. McFarlane, J., Bernard, L., Kaza, S. (2015), Social Identity of the Information Assurance Education Community: An Analysis of Publication and Collaboration from 1999-2013, The 19th Colloquium for Information Systems Security Education (CISSE), Las Vegas, NV, Poster 24. Kaza, S., Taylor, B., Hawthorne, E. K. (2015), Introducing Secure Coding in CS0, CS1, and CS2, The Twentieth Annual CCSC North East Conference, Worcester, MA, Journal of Computing Sciences in Colleges, Volume 30 (6) 25. Raina, S., Taylor, B., Kaza, S. (2015), Cyber4All: Increasing Cybersecurity Awareness, Knowledge Retention and Engagement using Enhanced Security Injection Modules in Computer Literacy Courses, The 19th Colloquium for Information Systems Security Education (CISSE), Las Vegas, NV 26. Taylor, B., Kaza, S., Siraj, A., Ghafoor, S. (2015), CReST Workshop: Teaching Add-On Security Modules in Computing Curriculum, Women in Cybersecurity Conference, Atlanta, GA 27. Kaza, S. and Taylor, B. (2015), Security Injections@Towson: Introducing Secure Coding in CS0, CS1, and CS2, The 19th Colloquium for Information Systems Security Education (CISSE), Las Vegas, NV 28. Raina, S., Taylor, B., Kaza, S. (2015), Security Injections 2.0: Using Segmentation, Instantfeedback, and Auto-grading to Enhance Secure Coding Modules for Lower-level Programming Courses, ACM Technical Symposium on Computer Science Education (SIGCSE 2015), Kansas City, MO, ACM Press 29. Taylor, B., Kaza, S., Hawthorne, E. K. (2015), Introducing Secure Coding in CS0, CS1, and CS2, ACM Technical Symposium on Computer Science Education (SIGCSE 2015), Kansas City, MO, ACM Press 30. Siraj, A., Taylor, B., Kaza, S. (2014), Let s Work Together to Empower CS Education Community to Teach Cybersecurity across the Curriculum, National Initiative for Cybersecurity Education Conference and Expo (NICE), Columbia, MD, Birds-of-a-feather 31. Taylor, B. and Kaza, S. (2014), Security Injections 2.0: Cool Cybersecurity Modules No Grading Required!, National Initiative for Cybersecurity Education and Expo Conference (NICE), Columbia, MD 32. Kaza, S., Taylor, B., Hawthorne, E.K. (2015), Introducing Secure Coding in CS0, CS1, and CS2, ACM Technical Symposium on Computer Science Education (SIGCSE 2015), Kansas Page 5 of 11
City, MO, ACM Press 33. Taylor, B. and Kaza, S. (2014), Teaching Secure Coding in Introductory Programming Courses, The 18th Colloquium for Information Systems Security Education (CISSE), San Diego, CA 34. Kaza, S. and Hawthorne, E.K. (2014), Introducing Secure Coding in CS0, CS1, and CS2, The Twentieth Annual CCSC Central Plains Conference, Fulton, MO, Journal of Computing Sciences in Colleges, Volume 29 (5) 35. Azadegan, S., Dehlinger, J. and Kaza, S. (2014), Incorporating Mobile Computing into the CS Curriculum, ACM Technical Symposium on Computer Science Education (SIGCSE 2014), Atlanta, GA, ACM Press 36. Taylor, B., Kaza, S., Hawthorne, E., (2014), Introducing Secure Coding in CS0, CS1, and CS2, ACM Technical Symposium on Computer Science Education (SIGCSE 2014), Atlanta, GA, ACM Press 37. Raina, S., Taylor, B., Kaza, S. (2014), Interactive E-Learning Modules for Teaching Secure Coding: A Pilot Study, The ACM Technical Symposium on Computer Science Education (SIGCSE 2014), Atlanta, GA, ACM Press 38. Azadegan, S., Dehlinger, J., Kaza, S. (2014), Revitalizing the Computer Science Undergraduate Curriculum Inside and Outside of the Classroom Using Mobile Computing Platforms, The ACM Technical Symposium on Computer Science Education (SIGCSE 2014), Atlanta, GA, ACM Press 39. Becker, A. B., Kaza, S., Goldberg A. (2013), Big Data, Big Issues: Applying Public Opinion Theory, Machine Learning, and Large-Scale Text Analysis to Explore Issue Opinions and Information Flow Across Traditional and Social Media, The American Political Science Association (APSA) Annual Meeting, Chicago, IL, ASPA Proceedings on SSRN 40. Tang, C., Taylor B., Hawthorne E. and Kaza, S. (2013), Introducing Security and Responsible Coding in Introductory Computer Science Courses, The 15 th Annual Consortium for Computing Sciences in Colleges (Northwestern) Conference, Journal of Computing Sciences in Colleges, ACM Press 41. Bishop M., Taylor B., Hawthorne E., Burley, D. and Kaza, S. (2013), Introducing Secure Coding in CS0 and CS1, ACM Special Interest Group on Computer Science Education (SIGCSE 2013), Denver, CO, ACM Press 42. McFarlane, J. & Kaza, S. (2012), Social Networking in Government: An Exploration of the use of the Twitter Micro-blogging service by U.S. State Governors, The 13th Annual International Conference on Digital Government Research (dg.o 2012), College Park, MD, ACM Press 43. Koepke, J., Kaza, S., & Abbasi, A. (2012) Cyber-security in the Health 2.0 Era: Identifying Fake Medical Websites Using the Network Stack Institute for Operational Research and Management Sciences (INFORMS) Annual Meeting, Charlotte, NC. 44. Taylor, B., Chu, B., Cooper, S., Dodge, R., Gregory, T., & Kaza, S. (2011). Teaching Secure Programming (Birds of a Feather), The 42nd ACM Technical Symposium on Computer Science Education (SIGCSE), Dallas, TX 45. Taylor, B., B. Chu, M. Doyle, K. Du, S. Kaza, and Taylor, C. (2010), Security in the CS Curriculum (Birds of a feather), The 41st ACM Technical Symposium on Computer Science Education (SIGCSE), Milwaukee, WI 46. Chakraborty, S., S. Kaza, B. Taylor (2009), Preparing Industry-Ready Analysts in Classrooms: A Module-Injection Based Approach, SIGED:IAIM pre-icis International Conference on Informatics Education Research, Phoenix, AZ 47. Kaza, S. (2008), Identifying Significant Facilitators of Social-network Evolution, INFORMS Page 6 of 11
Annual Meeting, October 12-15, 2008, Washington, D.C. 48. Wang, A., S. Kaza, S. Joshi, K. Chang, C. Tseng, H. Atabakhsh and H. Chen (2007), The Arizona IDMatcher: Developing an Identity Matching Tool for Law Enforcement (poster), 8th International Conference on Digital Government Research (dg.o), Philadelphia, PA, ACM Press. 49. Kaza, S., D. Hu, H. Atabakhsh and H. Chen (2007), Predicting Criminal Relationships using Multivariate Survival Analysis (poster), 8th International Conference on Digital Government Research (dg.o), Philadelphia, PA, ACM Press. 50. Kaza, S., J. Xu and H. Chen (2005), Topological Analysis of Criminal Activity Networks in Multiple Jurisdictions (poster), The National Conference on Digital Government Research (dg.o.), Atlanta, GA. 51. Chen, H., H. Atabakhsh, S. Kaza, B. Marshall, J. Xu, A. Wang, H. Gowda, T. Petersen and C. Violette (2005), BorderSafe: Cross-Jurisdictional Information Sharing, Analysis, and Visualization (poster), The National Conference on Digital Government Research (dg.o.), Atlanta, GA. 52. Chen, H., H. Atabakhsh, J. Xu, A. Wang, B. Marshall, S. Kaza, C. Tseng, S. Eggers, H. Gowda, T. Petersen and C. Violette (2005), Coplink Center: Social Network Analysis and Identity Deception Detection for Law Enforcement and Homeland Security Intelligence and Security Informatics: A Crime Data Mining Approach to Developing Border Safe Research (poster), The National Conference of Digital Government Research (dg.o). INVITED PRESENTATIONS AT PROFESSIONAL MEETINGS, WORKSHOPS AND PANELS 1. Azadegan, S., Dehlinger, J., Kaza, S., Revitalizing the Computer Science Undergraduate Curriculum Inside and Outside the Classroom Using Mobile Computing Platforms, NSF Showcase, ACM Technical Symposium on Computer Science Education (SIGCSE 2015), Kansas City, MO 2. Kaza, S. and Taylor, B. (2015), Security Injections@Towson: Introducing Secure Coding in CS0, CS1, and CS2, SEED Workshop 2015, Syracuse, NY 3. Beauchamp, V., Kaza, S., and Dehlinger J. (2014), Wavyleaf Project, Towson University Showcase, April 16th, 2014, Towson, MD 4. Azadegan, S., Dehlinger, J., Taylor, B., and Kaza, S. (2014), Cybersecurity Education, Towson University Showcase, April 16th, 2014, Towson, MD 5. Kaza, S. (2013) Panel on Holistic Cyber Security Education: Balancing Breadth and Depth, The National Initiative for Cybersecurity Education (NICE) Workshop at NIST, Gaithersburg, MD. 6. Kaza, S. (2013) Teaching Secure Coding in Introductory Programming Classes, The National Initiative for Cybersecurity Education (NICE) Workshop at NIST, Gaithersburg, MD. 7. Taylor, B. and Kaza, S. (2013), Introducing Secure Coding in Introductory Programming Courses, Faculty Workshop on Secure Software Engineering & Computer Science Retention, North Carolina A&T State University, July 15, 2013, Greensboro, NC 8. Taylor, B., Kaza, S. and Hawthorne, E., (2013) Secure Coding Workshop for Introductory Programming in CS0 and CS1, March 1, 2013, Union County College, Cranford, NJ. 9. Kaza, S. and Taylor, B. (2013), SecurityInjections@Towson: Injecting Security throughout the Undergraduate Computing Curriculum, TUES PI Conference, Washington, D.C. 10. C. Dierbach, S. Kaza, J. Dehlinger (2011), Piloting Pathways for Computational Thinking, Page 7 of 11
Towson Spark, Towson, MD 11. B. Taylor and S. Kaza (2010), Building Security In: Injecting Security throughout the Undergraduate Computing Curriculum (NSF Showcase), The 41st ACM Technical Symposium on Computer Science Education (SIGCSE), Milwaukee, WI BOOK CHAPTERS 1. Kaza, S. and H. Chen (2008), Suspect Vehicle Identification for Border Safety, in H. Chen and C. Yang (Eds.), Intelligent and Security Informatics: Techniques and Applications, Berlin, Springer. 2. Kaza, S. and H. Chen (2007), Public Safety Information Sharing: An Ontological Perspective, in H. Chen, L. Brandt, V. Gregg, R. Traunmueller, S. Dawas, E. Hovy, C. Larson, and A. Macintosh (Eds.), Digital Government: Advanced Research and Case Studies, Berlin, Springer. FUNDED EXTERNAL GRANTS 1. PI, Cyber4All: An Interdisciplinary Cybersecurity Minor for all Undergraduates, Funded by: National Science Foundation (NSF), 2015, $280,706, 2015-2017. 2. Co-PI, CyberWorkshops: Resources and, Strategies, and Support for Teaching Cybersecurity in Computer Science Courses (CReST), Funded by: National Science Foundation (NSF), 2014, $549,942 ($127,025 at TU), 2014-2016. 3. PI, Security Injections for CSO, CS1, and CS2: Promoting Responsible Coding and Building a Community of Security Ambassadors, Funded by: National Science Foundation (NSF), 2012, $451,879, 2012-2015 4. Co-PI, Revitalizing the Computer Science Undergraduate Curriculum Inside and Outside of the Classroom Using Mobile Computing Platforms, Funded by: National Science Foundation (NSF), 2012, $199,971, 2012-2014 5. Co-PI, Scholarship for Service at Towson University, Funded by: National Science Foundation (NSF), 2012, $2,093,834, 2012-2016 6. Co-PI, Basic Recruitment and Capacity Building, Funded by: Department of Defense (DOD) Information Assurance Scholarship Program, 2010, $95,815, 2010-2011 7. Co-PI, Building Security In: Injecting Security throughout the Undergraduate Computing Curriculum, Funded by: National Science Foundation (NSF), 2008, $399,511, 2008-2011 8. Co-PI, Piloting Pathways for Computational Thinking in a General Education Curriculum, Funded by: National Science Foundation (NSF), 2008, $164,981, 2008-2011 9. Co-PI, Expanding an Applied Information Technology Masters Program, Funded by: Maryland Higher Education Commission (MHEC), 2008, $90,990, 2009-10 FUNDED INTERNAL GRANTS 1. Co-PI, Mapping the distribution of Oplismenus hirtellus subsp. undulatifolius (wavyleaf basketgrass) a recent invader in Maryland forests: A citizen-science initiative, Funded by School of Emerging Technology, 2013, $17,754, 2013-2015 2. PI, Collection and Analysis of Social Network Data, Funded by: Faculty Development and Research Committee Towson University, 2008, $2000, 2009 2010 3. co-pi, Big Data, Big Issues: Using Public Opinion Theory, Machine Learning, and Social Network Analysis to Explore Opinions and Information Flow Across Traditional and Social Media, Funded by: The School of Emerging Technologies, Towson University, 2012, Page 8 of 11
$10,000, 2012 2013 EXTERNAL GRANTS SUBMITTED (UNFUNDED) 1. Co-PI, Project Wavyleaf @ Patapsco: A citizen-science initiative, Submitted to: Washington Biologists Field Club, 2015, $3500, 2015-16 2. PI, IA4All: An Interdisciplinary Information Assurance Educational Model, submitted to National Science Foundation, 2013, $297,798 3. Co-PI, Reimagining Citizenship and Recalibrating Political Tolerance: The Influence of Values, Controversy, and Context on Democratic Expression, submitted to Templeton Foundation, 2013, $225,836 4. Co-PI, CER: Computational Collaboratory: Modeling Argumentation for 21st Century Learners, submitted to National Science Foundation, 2012, $598,484 5. Co-PI, Everyday Computational Thinking: How can we teach what everyone needs to know, submitted to National Science Foundation, 2011, $133,359 6. Co-PI, Preparing Industry-Ready Analysts In Classrooms: A Behavioral Module Injection Based Approach, submitted to National Science Foundation, 2011, $988,750 7. PI, A Multi-layered Framework for Detecting Cyber Deviance, submitted to National Science Foundation, 2010, $117,641 8. PI, Determination of Influence in Computer-mediated Social Networks, submitted to National Science Foundation, 2010, $448,031 9. Faculty associate, Predictive Policing Analytic and Evaluation Research Support, Submitted to: National Institute of Justice (NIJ), 2009, $75,000 10. Co-PI, Basic Recruitment and Capacity Building, Submitted to: Department of Defense (DOD) Information Assurance Scholarship Program, 2009, $192,894 11. PI, A Multi-layered Framework for Detecting Cyber Deviance, submitted to National Science Foundation, 2008, $205,566 12. PI, Collaboration with Exis, Inc., submitted to Maryland Technology Development Corporation (TEDCO), 2008, $15,000 PROFESSIONAL DEVELOPMENT AND SERVICE ACTIVITIES Member ACM Joint Task Force on Cybersecurity Education (co-chairs Matt Bishop, Diana Burley) Journal Editorial Board - Social Network Analysis and Mining, Springer, ISSN 1869-5450 - Security Informatics, Springer, ISSN 2190-8532 Program co-chair - IEEE International Conference on Intelligence and Security Informatics 2016 Conference Program Committee - IEEE International Conference on Intelligence and Security Informatics- 2015 - Pacific Asia Workshop on Intelligence and Security Informatics (2010-2015) - European Intelligence and Security Conference (2011-2015) - ACM SIGKDD Workshop on Social Network Mining and Analysis (2009) Page 9 of 11
- Colloquium for Information Systems Security Education 2011, 2012 - International Symposium on Foundation of Open Source Intelligence and Security Informatics 2012-15 - IEEE International Conference on Systems, Man, and Cybernetics (2006) Journal reviewer (15+) ACM Transactions on Management Information Systems, Management Information Systems Quarterly, IEEE Systems, Man, and Cybernetics - Part A, Decision Support Systems, ACM Transactions on Information Systems, IEEE Intelligent Systems, Communications of the ACM, IEEE Transactions on Intelligent Transportation Systems, IEEE Systems, Man, and Cybernetics - Part A, IEEE Systems, Man, and Cybernetics - Part C, IEEE Transactions on Services Computing, Knowledge Based Systems, BMC Developmental Biology, Information Systems Frontiers, The Colloquium of Information Systems Security Education Journal Conference reviewer (14+) Hawaii International Conference on System Sciences (HICSS 2008-2013), International Symposium on Foundations of Open Source Intelligence and Security Informatics (2013), Pacific Asia Workshop on Intelligence and Security Informatics (2010-2013), European Conference on Intelligence and Security Informatics (2013), Colloquium for Information Systems Security Education (2011,2012), International Conference on Information Systems (ICIS 2006, 2013), Americas Conference on Information Systems (AMCIS 2006-07), IEEE Intelligence and Security Informatics (ISI 2005,2006,2013), International Conference on Digital Government Research (dg.o. 2007), Pacific-Asia Conference on Knowledge Discovery and Data Mining (PAKDD 2006), European Conference on Digital Libraries (ECDL 2006,2007), International Conference on Asian Digital Libraries (ICADL 2006), IEEE Systems, Man, & Cybernetics (SMC 2006), IEEE/ACM Joint Conference on Digital Libraries (JCDL 2005) Professional Development Workshops - Audacious Android Programming (2011), SIGCSE, Dallas, TX - Developing an Android Mobile Application for the Google App Engine Cloud (2011), SIGCSE, Dallas, TX Professional Memberships - Association of Information Systems (AIS) - Association of Computing Machinery (ACM) ICIS Poster Judging Panel Member 2009 ICIS Volunteer 2005, IEEE JCDL, ISI Volunteer 2004 HONORS AND ACHIEVEMENTS Innovation in Teaching Award, Office of Academic Innovation, Towson University, 2015 Excellence in Scholarship Award, Fisher College of Science and Mathematics, Towson University, 2014 Deans Research Award, Eller College of Management, University of Arizona, 2008 James F. LaSalle Award for Teaching Excellence as a graduate student instructor, University of Arizona, 2007 Graduate Resident Tuition Scholarship (GRS), University of Arizona, Fall 2005-present Graduate and Professional Students Council Nominee, Eller College of Management, 2007 Tom R. Jones Student Leadership Award, Central Michigan University, 2003 Awarded for demonstrated leadership and commitment to the department and position. President, Indian Students Organization, Central Michigan University, 2002-03 Best Student Award, Maharaja Agrasen College, University of Delhi, 2000 Awarded on Page 10 of 11
commencement for excellence in academics and extra-curricular activities. TECHNICAL SKILLS Programming Languages: Java, C/C++, Ruby, Visual Basic, Perl, COBOL Internet Technologies: Ruby on Rails, HTML, XML, OWL, Java Servlets/Struts Databases: SQL/T-SQL/PL-SQL, MS SQL Server, Oracle, MySQL Operating Systems and Environments: OSx, MS Windows, Linux, UNIX, Rational Rose (UML), IDEs Page 11 of 11