IEEE ISI 2016 Table of Contents

Total Page:16

File Type:pdf, Size:1020Kb

IEEE ISI 2016 Table of Contents IEEE ISI 2016 Table of Contents Welcome Message from the Conference Co-Chairs ................................ 2 Message from the Program Co-Chairs ..................................................... 3 Keynote Speakers .................................................................................... 4 Conference Schedule at a Glance ............................................................ 5 Detailed Program and Schedule ............................................................... 6 Wednesday, September 28, 2016 ....................................................... 6 Thursday, September 29, 2016 ........................................................... 9 Friday, September 30, 2016 .............................................................. 11 Invited Speakers and Panelists .............................................................. 12 ISI 2016 Conference Organizers ............................................................ 19 ISI 2016 Program Committee Members ................................................. 20 Conference and Local Information .......................................................... 22 Wireless Network Access Instructions .................................................... 23 Map of Student Union ............................................................................. 24 Map of Campus and Hotels .................................................................... 26 Conference Hosts and Sponsors .............................................. Back cover 1 IEEE ISI 2016 Welcome Message from the Conference Co-Chairs We are extremely pleased to welcome you to the 2016 IEEE International Conference on Intelligence and Security Informatics (IEEE ISI 2016), and to our beautiful campus here at The University of Arizona. Thank you very much for choosing to participate in IEEE ISI 2016. We hope that all of you will enjoy both the conference and your stay in Tucson, Arizona, USA. IEEE ISI 2016 is the 14th event in the annual IEEE International ISI Conference series (http://www.isi-conf.org) started in 2003. The first two meetings were held in Tucson, Arizona; followed by meetings in Atlanta, Georgia; San Diego, California; New Brunswick, New Jersey; Taipei, Taiwan; Dallas, Texas; Vancouver, Canada; Beijing, China; Washington, DC; Seattle, Washington; the Hague, Netherlands; and Baltimore, Maryland. This event continues to be a unique venue, bringing together academic researchers, law enforcement and intelligence experts, and information technology consultants and practitioners to present their work and discuss critical issues and views on cutting-edge ISI research and practice. ISI topics include information technologies, computer science, computational criminology, public policy, bioinformatics, medical informatics, and social and behavior studies, as well as counterterrorism studies. Over the past 13 years, the IEEE International ISI Conference has evolved from its traditional orientation of intelligence and security domain towards a more integrated alignment of multiple domains, including technology, humans, organization, and security. This year's conference theme is Cybersecurity and Big Data. Cybersecurity has become a major priority for businesses and organizations in all sectors. Big data analytics is offering new opportunities for an increased understanding of cybersecurity and ISI concerns. The conference could not be a success without help from many people. Special thanks to all the authors and keynote and invited speakers and panelists for contributing to IEEE ISI 2016. We also express our sincere appreciation to the program chairs and the program committee members, our publication chair Dr. Alan Wang, our finance and local arrangements co-chairs Catherine A. Larson and Anji Siegel, our sponsorship co-chairs Drs. Paulo Goes and Matthew Hashim, and our student supporters from the University of Arizona for their active role in conference organization and logistical support. We would like to thank the host of the event, the University of Arizona, for their sponsorship and support. We are especially grateful to the IEEE Intelligent Transportation Systems Society, the National Science Foundation, the Office of the University of Arizona Vice President for Research, Eller College and Department of Management Information Systems at the University of Arizona, the Artificial Intelligence Lab at the University of Arizona, and Datalink for their financial support. Hsinchun Chen, University of Arizona, USA Salim Hariri, University of Arizona, USA Bhavani Thuraisingham, University of Texas at Dallas, USA Daniel Zeng, University of Arizona, USA Conference Co-Chairs 2 IEEE ISI 2016 Message from the Program Co-Chairs Intelligence and Security Informatics (ISI) research is an interdisciplinary research field involving academic researchers in information technologies, computer science, public policy, bioinformatics, medical informatics, and social and behavior studies; local, state, and federal law enforcement and intelligence experts; and information technology industry consultants and practitioners. ISI supports counterterrorism and homeland security’s missions of anticipation, prevention, preparedness and response to terrorist acts and other security events, in physical, cyber, enterprise, and societal spaces. The theme of the IEEE ISI 2016 is Cybersecurity and Big Data. In the past and present, the IEEE ISI conferences have provided an international forum for academic researchers, law enforcement and intelligence experts, and information technology consultants and practitioners to showcase their research and practices, and discuss their relevant ideas, experiences, and results on various topics about ISI. The ISI Conference series (http://www.isi-conf..org) was first started in Tucson, Arizona in 2003 and 2004. Sponsorship by the IEEE Intelligent Transportation Systems Society began with ISI 2005 and continues through the present. The ISI conference has also held many international events including the Pacific-Asian International Workshop on Intelligence and Security Informatics (PAISI) and the European Conference in Intelligence Security Informatics (EISIC), among others. ISI 2016 is hosted by the University of Arizona. The three-day conference program includes paper presentation sessions, keynote and invited speakers, panel discussions, a doctoral consortium, a poster session, workshops and special thematic sessions, and receptions and networking events. The conference proceedings of the ISI conference includes 33 long papers, 10 short papers, and 3 poster papers. These papers focus on four main areas: 1) cybersecurity analytics and threat intelligence, 2) data science and analytics in security informatics, 3) human behavior and factors in security applications, and 4) organizational, national, and international issues in counter-terrorism and other security applications. The proceedings also include 6 papers accepted by the Workshop on Big Data Analytics for Cybersecurity Computing, 8 papers accepted by the Workshop on Cybersecurity Education & Workforce, 3 papers accepted by the Workshop on Women in Cybersecurity, and 7 papers accepted by the Doctoral Consortium. We are grateful to the Program Committee members who provided high-quality and constructive review comments to help maintain the quality of the program. These members came from 27 different countries. We would like to express our gratitude to all authors for contributing their high-quality work to the program, and to session chairs and panel moderators for coordinating the exciting and interesting sessions. Our special thanks go to the publication chair, Dr. Alan Wang, who put forth much time and effort in preparing the proceedings. Our sincere gratitude goes to Drs. Hsinchun Chen, Salim Hariri, Bhavani Thuraisingham, and Daniel Zeng for their advice and leadership in the ISI Conference series. Marielle den Hengst-Bruggeling Latifur Kahn Sidd Kaza Mark Patton ISI 2016 Program Co-Chairs 3 IEEE ISI 2016 Keynote Speakers Plenary Keynote, Wednesday Ann Cox “DHS’s Internet Measurement and Attack Modeling Program” Dr. Ann Cox is Program Manager in the Cyber Security Division of the Homeland Security Advanced Research Projects Agency within the Science and Technology Directorate of the Department of Homeland Security (DHS). Dr. Cox manages the Internet Measurement and Attack Modeling project (IMAM), which seeks to solve national security threats related to cyberspace. Dr. Cox’s research focuses on Resilient Systems and Networks; Modeling of Internet Attacks; and Network Mapping and Measurement. Her research interests and related programs are in these areas. Prior to her work at DHS, Dr. Cox spent sixteen years at the National Security Agency (NSA) where she worked in the office of Weapons and Space before returning to research, focusing on network measurement projects. She provided leadership and technical direction for projects involving coordination with domestic and international technical experts from multiple government agencies, academic institutions, and private companies. Before coming to NSA, Dr. Cox taught full-time at Brigham Young University (BYU) for several years and was the owner and purchasing agent for a small business. She earned her Bachelor’s degree in Mathematics from BYU, Master’s degree in Mathematics from Idaho State University, Master’s degree in Computer Science from James Madison University, and her Ph.D. in Mathematics from Auburn University. Dr. Cox is the mother of six and grandmother of eleven. Dr.
Recommended publications
  • Joey F. George Professor of MIS & Thomas L
    June 16, 2009 Joey F. George Professor of MIS & Thomas L. Williams Jr. Eminent Scholar in MIS MIS Department College of Business Florida State University Tallahassee, FL 32306-1110 EDUCATION A.B. Stanford University, Stanford, California, 1979 English language and literature. M.Ed. Converse College, Spartanburg, South Carolina, 1980 Emphasis on English language and literature. Ph.D. University of California, Irvine, California, 1986. Thesis title: Computers and the centralization of decision-making in U.S. city governments. RELEVANT EXPERIENCE Professor and Thomas L. Williams Jr. Eminent Scholar in Information Systems, MIS Department, College of Business, Florida State University, August 1999 – present. University of Canterbury Visiting Erskine Fellowship, Christchurch, New Zealand, May-June, 2008 Visiting Professor, Helsinki School of Economics and Business Administration, International MBA Program, Mikkeli, Finland, July 1999. Associate Professor and Edward G. Schlieder Chair in Information Systems, E.J. Ourso College of Business Administration, Louisiana State University, August 1998-August 1999. Sprint Professor of Business Administration, College of Business, Florida State University, May 1997- August 1998. Associate Professor, IMS Dept., College of Business, Florida State University, Aug. 1993-Aug. 1998. Chair, IMS Department, College of Business, Florida State University, Dec. 1995 – Aug.1998. Assistant Professor, Department of MIS, College of Business and Public Administration, University of Arizona, August 1986-August 1993. Research Assistant, URBIS Project, Public Policy Research Organization, University of California, Irvine, Jan. 1984-March 1986. Teaching Assistant, Department of Information and Computer Science, Graduate School of Management, University of California, Irvine, Sept. 1981-Dec. 1983. Secondary English Teacher, Spartanburg Day School, Spartanburg, South Carolina, 1979-1981.
    [Show full text]
  • Sagar Samtani, Ph.D. 1275 E
    Sagar Samtani, Ph.D. 1275 E. 10th St, HH 4111, Bloomington, IN 47405 E-mail: [email protected] Phone Number: +1 (520)-971-4274 Website: www.sagarsamtani.com Last CV Update: July 30, 2020 __________________________________________________________________________________________________ ACADEMIC EMPLOYMENT AND POSITIONS Assistant Professor and Grant Operations and Decision Technologies, Kelley School Indiana July 2020 – Thornton Scholar of Business University Present Fellow Center for Applied Cybersecurity Research (CACR) Indiana June 2020 - University Present Assistant Professor Department of Information Systems and Decision University of August 2018 – Sciences, Muma College of Business South Florida May 2020 Adjunct Lecturer (Limited Term) Department of Management Information Systems, University of May – July Eller College of Management Arizona 2018 Research Associate, Project Lead, Artificial Intelligence Lab, Department of University of August 2014 – Scholarship-for-Service Fellow Management Information Systems Arizona May 2018 Graduate Assistant MicroAge Lab, Department of Management University of October 2013 – Information Systems, Eller College of Management Arizona May 2014 EDUCATION Doctor of Philosophy (Ph.D.) Major: Management Information Systems University of 2014-2018 Minor: Cognitive Science Arizona Masters of Science (M.S.) Management Information Systems University of 2013-2014 Arizona Bachelors of Science in Business Management Information Systems University of 2009-2013 Administration (B.S.B.A) Arizona RESEARCH INTERESTS 1. Applications: (1) Cybersecurity – cyber threat intelligence (key hacker ID, emerging threat detection, visualizations) and smart vulnerability assessment (socio-technical; automated scanning); scientific cyberinfrastructure cybersecurity (GitHub, Docker, VM images) (2) social media analytics – automated Social Intelligence (SOCINT) Open Source Intelligence (OSINT) collection/mining; (3) health analytics – motion sensor-based fall detection/prediction, activity of daily living detection; mental health 2.
    [Show full text]
  • Reviewer Acknowledgments
    Reviewer Acknowledgments Margunn Aanestad Sameh Al-Natour Bijan Azad University of Oslo American University of Sharjah American University of Beirut Oslo, Norway Sharjah, United Arab Emirates Beirut, Lebanon Ahmed Abbasi Shoshana Altschuller Hillol Bala University of Virginia, McIntire School of Commerce Iona College Indiana University Charlottesville, Virginia New Rochelle, New York Bloomington, Indiana Alan Abrahams Catherine Anderson Sule Balkan Virginia Polytechnic Institute and State University University of Virginia Arizona State University Blacksburg, Virginia Falls Church, Virginia Tempe, Arizona Alessandro Acquisti Corey Angst Ravi Bapna Carnegie Mellon University University of Notre Dame University of Minnesota Pittsburgh, Pennsylvania Notre Dame, Indiana Minneapolis, Minnesota Ashish Agarwal Animesh Animesh Karen Barad The University of Texas at Austin McGill University University of Santa Cruz Austin, Texas Montreal, Canada Santa Cruz, California Julia Adler-Milstein Chadi Aoun Eric Barrette University of Michigan University of Technology Sydney University of Minnesota Ann Arbor, Michigan Sydney, Australia Minneapolis, Minnesota Monica Adya Sinan Aral Anitesh Barua Marquette University New York University University of Texas at Austin Milwaukee, Wisconsin New York City, New York Austin, Texas Walid Afifi Ofer Arazy Richard Baskerville University of California-Santa Barbara University of Alberta Georgia State University Santa Barbara, California Edmonton, Canada Atlanta, Georgia Ritu Agarwal Priscilla Arling Genevieve Bassellier University of Maryland Butler University McGill University College Park, Maryland Indianapolis, Indiana Montreal, Canada Leila Agha Deborah Armstrong Patrick Bateman Boston University School of Management The Florida State University Youngstown State University Boston, Massachusetts, Tallahassee, Florida Youngstown, Ohio Brad Agle Terrence August Anne Beaudry Brigham Young University University of California, San Diego Concordia University Provo, Utah San Diego, California Montreal, Canada William Agresti Robert D.
    [Show full text]
  • The NIJ CONFERENCE 2011
    U.S. Department of Justice Office of Justice Programs National Institute of Justice The NIJ CONFERENCE 2011 TRANSLATIONAL CRIMINOLOGY: SHAPING POLICY AND PRACTICE WITH RESEARCH U.S. Department of Justice Office of Justice Programs 810 Seventh St. N.W. Washington, DC 20531 Eric H. Holder, Jr. Attorney General Laurie O. Robinson Assistant Attorney General John H. Laub, Ph.D. Director, National Institute of Justice This and other publications and products of the National Institute of Justice can be found at: National Institute of Justice http://www.nij.gov Office of Justice Programs Innovation • Partnerships • Safer Neighborhoods http://www.ojp.usdoj.gov The NIJ CONFERENCE 2011 TRANSLATIONAL CRIMINOLOGY: SHAPING POLICY AND PRACTICE WITH RESEARCH CONFERENCE PROGRAM June 20–22, 2011 ■ Arlington, VA Watch NIJ.gov for future conference dates! The Eleventh RESCHEDULED! New Workshops Added The Crime Mapping Research Conference October 17–21, 2011 Hilton Miami Downtown The Crime Mapping Research Conference is about understanding crime, criminal justice, and public safety and their effect on, and by, places. Explore tMBUFTU SFTFBSDI mOEJOHT tQSBDUJDBM BQQMJDBUJPOT tUFDIOPMPHZ EFNPOTUSBUJPOT tQPMJDZ SFTVMUT For more information, visit http://www.nij.gov/nij/events/maps/welcome.htm Crime, Social Ills, and Place-Based Solutions Science, Significance, and Impact AUGUST 8–11, 2011, KANSAS CITY, MO A Symposium designed to bring together practitioners and researchers to enhance information-sharing and promote collaboration among the trace evidence, law enforcement, and legal communities. Featuring unique educational opportunities for trace evidence examiners. For more information, visit http://projects.nfstc.org/trace/2011/ LIST OF Ex hibits Exhibits of List National Institute of Justice Forensic Technology Center of Excellence 810 Seventh St.
    [Show full text]
  • Joey F. George Professor of MIS & Thomas L
    October 13, 2010 Joey F. George Professor of MIS & Thomas L. Williams Jr. Eminent Scholar in MIS Department of Management College of Business Florida State University Tallahassee, FL 32306-1110 EDUCATION A.B. Stanford University, Stanford, California, 1979 English language and literature. M.Ed. Converse College, Spartanburg, South Carolina, 1980 Emphasis on English language and literature. Ph.D. University of California, Irvine, California, 1986. Thesis title: Computers and the centralization of decision-making in U.S. city governments. RELEVANT EXPERIENCE Professor and Thomas L. Williams Jr. Eminent Scholar in Management Information Systems, College of Business, Florida State University, August 1999 – present. Senior Research Associate, Information Use Management & Policy Institute, Florida State University, 2009 – University of Canterbury Visiting Erskine Fellowship, Christchurch, New Zealand, May-June, 2008 Visiting Professor, Helsinki School of Economics and Business Administration, International MBA Program, Mikkeli, Finland, July 1999. Associate Professor and Edward G. Schlieder Chair in Information Systems, E.J. Ourso College of Business Administration, Louisiana State University, August 1998-August 1999. Sprint Professor of Business Administration, College of Business, Florida State University, May 1997- August 1998. Associate Professor, IMS Dept., College of Business, Florida State University, Aug. 1993-Aug. 1998. Chair, IMS Department, College of Business, Florida State University, Dec. 1995 – Aug.1998. Assistant Professor, Department of MIS, College of Business and Public Administration, University of Arizona, August 1986-August 1993. Research Assistant, URBIS Project, Public Policy Research Organization, University of California, Irvine, Jan. 1984-March 1986. Teaching Assistant, Department of Information and Computer Science, Graduate School of Management, University of California, Irvine, Sept. 1981-Dec.
    [Show full text]
  • Critical Success Factors in M-Learning: a Socio- Technical Perspective Vlad Krotov Abu Dhabi University, [email protected]
    Communications of the Association for Information Systems Volume 36 Article 6 2-2015 Critical Success Factors in M-Learning: A Socio- Technical Perspective Vlad Krotov Abu Dhabi University, [email protected] Follow this and additional works at: https://aisel.aisnet.org/cais Recommended Citation Krotov, Vlad (2015) "Critical Success Factors in M-Learning: A Socio-Technical Perspective," Communications of the Association for Information Systems: Vol. 36 , Article 6. DOI: 10.17705/1CAIS.03606 Available at: https://aisel.aisnet.org/cais/vol36/iss1/6 This material is brought to you by the AIS Journals at AIS Electronic Library (AISeL). It has been accepted for inclusion in Communications of the Association for Information Systems by an authorized administrator of AIS Electronic Library (AISeL). For more information, please contact [email protected]. Critical Success Factors in M-Learning: A Socio-Technical Perspective Vlad Krotov College of Business, Abu Dhabi University, UAE [email protected] Educational institutions around the world increasingly view mobile technology as an effective platform for educating a new generation of students. Unfortunately, educational institutions often fail to achieve substantial results with their mobile-learning initiatives. Studies on m-learning have produced several recommendations about how to improve of its success. These recommendations cover a set of factors limited to people, technology, and pedagogy. This qualitative case study adopts a broader socio-technical perspective on m-learning and produces an extended list of critical success factors in m-learning. These factors fall into organization, people, pedagogy, and technology domains. I used the Abilene Christian University as the site for this study.
    [Show full text]
  • Curriculum Guidelines for Undergraduate Degree Programs in Information Systems
    Communications of the Association for Information Systems Volume 26 2010 Article 18 IS 2010: Curriculum Guidelines for Undergraduate Degree Programs in Information Systems Heikki Topi∗ Joseph S. Valacichy Ryan T. Wrightz Kate Kaiser∗∗ Jay F. Nunamaker, Jr.yy Janice C. Sipiorzz Gert-Jan de Vreedex ∗Bentley University, [email protected] yWashington State University zUniversity of San Francisco ∗∗Marquette University yyUniversity of Arizona zzVillanova University xUniversity of Nebraska at Omaha Copyright c 2010 by the authors. Communications of the Association for Information Systems is produced by The Berkeley Electronic Press (bepress). http://aisel.aisnet.org/cais IS 2010: Curriculum Guidelines for Undergraduate Degree Programs in Information Systems Heikki Topi; Joseph S. Valacich; Ryan T. Wright; Kate Kaiser; Jay F. Nunamaker, Jr.; Janice C. Sipior; and Gert-Jan de Vreede Abstract IS 2010 is the latest in a series of model curricula for undergraduate degrees in Information Systems. It builds on the foundation formed by this earlier work, but it is a major revision of the curriculum and incorporates several significant new characteristics. IS 2010 is the third collabo- rative effort by ACM and AIS. Both organizations have worldwide membership, and, therefore, IS 2010 includes elements that make it more universally adaptable than its predecessors. IS 2010 is not directly linked to a degree structure in any specific environment but it provides guidance regarding the core content of the curriculum that should be present everywhere and suggestions regarding possible electives and career tracks based on those. KEYWORDS: undergraduate IS curriculum, curriculum development process, computing educa- tion, model curriculum IS 2010: Curriculum Guidelines for Undergraduate Degree Programs in Information Systems Heikki Topi Bentley University [email protected] Joseph S.
    [Show full text]
  • Stuart Elliot Madnick V37
    STUART ELLIOT MADNICK V37 John Norris Maguire Professor of Information Technology Sloan School of Management and Professor of Engineering Systems Sloan School of Engineering Massachusetts Institute of Technology TABLE OF CONTENTS EDUCATION ............................................................................................. 1 PRINCIPAL FIELD OF INTEREST ........................................................ 1 NAME AND RANK OF OTHER FACULTY IN SAME FIELD ......... 1 1. SUMMARY OF NON-MIT EXPERIENCE ....................................... 2 2. SUMMARY OF MIT APPOINTMENTS ........................................... 4 3. COMMITTEES ...................................................................................... 5 4. CONSULTING ACTIVITIES .............................................................. 8 5. PROFESSIONAL ACTIVITIES ............................................................ 11 6. PROFESSIONAL SOCIETIES ............................................................. 14 7. SUBJECTS TAUGHT ............................................................................ 15 8. THESIS SUPERVISION ....................................................................... 19 9. RESEARCH PROJECT SUPERVISION (Principal Investigator or co-PI) .... 28 10. PUBLICATIONS ................................................................................ 32 10.1 BOOKS AND MONOGRAPHS ........................................................................................................ 32 10.2 BOOK CHAPTERS ...........................................................................................................................
    [Show full text]
  • Conference Administration Chairman Conference Administrator Ralph H
    Conference Administration Chairman Conference Administrator Ralph H. Sprague, Jr. Sandra Laney University of Hawai’i and Manoa University of Hawai’i at Manoa Track Administrator Rajib Subba University of Hawai’i at Manoa Track Chairs Collaboration Systems and Technologies Track Jay F. Nunamaker Jr., University of Arizona Robert O. Briggs, University of Nebraska at Omaha and Delft University of Technology Decision Technologies and Service Sciences Daniel R. Dolk, Naval Postgraduate School Digital Media: Content and Communication Michael Shepherd, Dalhousie University, Canada Electronic Government Hans J. (Jochen) Scholl, University of Washington Future Electric Power Systems: Smart Grids, Engineering, Economics, Security Robert J. Thomas, Cornell University Thomas J. Overbye, University of Illinois at Urbana-Champaign Information Technology in Health Care William G. Chismar, University of Hawai’i at Manoa Internet and the Digital Economy David J. King, JDA Software Group, Inc., Scottsdale AZ Alan R. Dennis, Indiana University Knowledge Management Systems Murray E. Jennex, San Diego State University David T. Croasdell, University of Nevada-Reno Organizational Systems and Technology Hugh J. Watson, University of Georgia Software Technology Gul Agha, University of Illinois Urbana-Champaign Rick Kazman, University of Hawaii at Manoa 1 Tracks and Minitracks Collaboration Systems and Technologies Track Jay Nunamaker Jr., University of Arizona Robert O. Briggs, University of Nebraska at Omaha and Delft University of Technology Advances in Teaching
    [Show full text]
  • Joey F. George Distinguished Professor in Business & the John D
    February 10, 2020 Joey F. George Distinguished Professor in Business & The John D. DeVries Endowed Chair in Business Associate Dean for Research Ivy College of Business Iowa State University Ames, Iowa 50011-1350 EDUCATION A.B. Stanford University, Stanford, California, 1979 English language and literature. M.Ed. Converse College, Spartanburg, South Carolina, 1980 Emphasis on English language and literature. Ph.D. University of California, Irvine, California, 1986. Thesis title: Computers and the centralization of decision-making in U.S. city governments. RELEVANT EXPERIENCE Professor of Information Systems & John D. DeVries Endowed Chair in Business, Ivy College of Business, Iowa State University, August 2011 – Iowa State University Distinguished Professor in Business, April 2019 – Associate Dean for Research, Ivy College of Business, Iowa State University, Jan 2019 – Director, Ph.D. Program, Ivy College of Business, Iowa State University, Sept 2013 – Interim Academic Administrator, Ivy College of Business NeuroLab, Iowa State University, Sept 2015 - Visiting Researcher, University of Queensland, Brisbane, QLD, Australia, Feb – May 2016 Professor and Thomas L. Williams Jr. Eminent Scholar in Management Information Systems, College of Business, Florida State University, August 1999 – August 2011. University of Canterbury Visiting Erskine Fellowship, Christchurch, New Zealand, May-June, 2008 & July-August 2012. Visiting Professor, Helsinki School of Economics and Business Administration, International MBA Program, Mikkeli, Finland, July 1999. Associate Professor and Edward G. Schlieder Chair in Information Systems, E.J. Ourso College of Business Administration, Louisiana State University, August 1998-August 1999. Sprint Professor of Business Administration, College of Business, Florida State University, May 1997- August 1998. Associate Professor, IMS Dept., College of Business, Florida State University, Aug.
    [Show full text]
  • History of the Computer Sciences Department at Purdue University
    Purdue University Purdue e-Pubs Department of Computer Science Technical Reports Department of Computer Science 1990 History of the Computer Sciences Department at Purdue University John R. Rice Purdue University, [email protected] Saul Rosen Report Number: 90-1003 Rice, John R. and Rosen, Saul, "History of the Computer Sciences Department at Purdue University" (1990). Department of Computer Science Technical Reports. Paper 6. https://docs.lib.purdue.edu/cstech/6 This document has been made available through Purdue e-Pubs, a service of the Purdue University Libraries. Please contact [email protected] for additional information. HISTORY OF THE COMPUlliR SCIENCES DEPARTMENT AT PURDUE UNIVERSITY John R. Rice Saul Rosen CSD·TR·lO03 August 1990 HISTORY OF THE COMPUTER SCIENCES DEPARTMENT AT PURDUE UNIVERSITY John R. Rice and Sanl Rosen Computer Science Department Purdue University 1. INTRODUCTION The article by Rosen and Rice [1990] relates how the first department of computer sciences in the United States was established at Purdue University in October 1962. The present article describes how the department found its identity and matured into one of the strong departments at Purdue and in the nation. There are three natural phases to this development In the 1960's the effort was to define the courses, the degree programs. and, indirectly, the field itself. The 1970's saw the department's maturation and growth into a typical university department. The 1980's started with a series of crises, some nationwide and some internal to Purdue. which eventually gave the department a considerably different character than it had in the 1970's.
    [Show full text]
  • How In-Memory Technology Can Create Business Value: Insights from the Hilti Case Jan Vom Brocke University of Liechtenstein, [email protected]
    Communications of the Association for Information Systems Volume 34 Article 7 1-2014 How In-memory Technology Can Create Business Value: Insights from the Hilti Case Jan vom Brocke University of Liechtenstein, [email protected] Stefan Debortoli University of Liechtenstein Oliver Müller University of Liechtenstein Nadine Reuter University of Liechtenstein Follow this and additional works at: https://aisel.aisnet.org/cais Recommended Citation vom Brocke, Jan; Debortoli, Stefan; Müller, Oliver; and Reuter, Nadine (2014) "How In-memory Technology Can Create Business Value: Insights from the Hilti Case," Communications of the Association for Information Systems: Vol. 34 , Article 7. DOI: 10.17705/1CAIS.03407 Available at: https://aisel.aisnet.org/cais/vol34/iss1/7 This material is brought to you by the AIS Journals at AIS Electronic Library (AISeL). It has been accepted for inclusion in Communications of the Association for Information Systems by an authorized administrator of AIS Electronic Library (AISeL). For more information, please contact [email protected]. How In-memory Technology Can Create Business Value: Insights from the Hilti Case Jan vom Brocke University of Liechtenstein [email protected] Stefan Debortoli University of Liechtenstein Oliver Müller University of Liechtenstein Nadine Reuter University of Liechtenstein With in-memory technology, all data and applications are kept in the computer’s main memory to avoid expensive mechanical hard-drive I/O access, reduce latency times, and increase the ability to process large volumes of data or complex data. In this “innovation and novel concepts” article, we discuss how in-memory technology may create business value. Based on our experiences in collaborating with the Hilti Corporation, one of the first adopters of SAP’s in-memory technology appliance (SAP HANA), we describe and discuss illustrative application scenarios that are made possible through the increased computing power offered by in-memory technology.
    [Show full text]