College of Engineering and Computing, Department of Information Technology

Professor Katz's Scholarly Activities


Go to my main page Go to my biography Go to courses taught

My area of interest is Information and Cyber Security.

Presentations at Conferences:

  1. "The Effect of a University Information Security Survey on Instruction Methods in Information Security," presented at the 2005 Information Security Curriculum Development Conference (InfoSecCD 2005), September 23-24, 2005, Kennesaw State University, Kennesaw, GA.
  2. "The Correlation Between Success in Pre-Calculus and Java Programming Among CS and IT Majors in the School of Computing at AASU," presented at the 11th Annual Math-Technology Conference, February 24, 2006, Valdosta State University, Valdosta, GA.
  3. "The Effect of a University Information Security Survey on the Pedagogy of Information Security," presented at the Sixth Annual Symposium on Teaching and Learning, March 31, 2006, Armstrong Atlantic State University.
  4. "Campus-wide Spyware and Virus Removal as Method of Teaching Information Security," presented at the 2006 Information Security Curriculum Development Conference (InfoSecCD 2006), September 22-23, 2006, Kennesaw State University, Kennesaw, GA.
  5. "Integrating a Security Awareness Program Into an Information Secuity Course," presented at the 2007 21st Annual Consortium for Computing Sciences in Colleges Southeastern Conference (CCSC:SE 2007), November 9-10, 2007, Coastal Carolina University, Myrtle Beach, SC.
  6. "Avian Flu: The Use of IT to Mitigate a Pandemic and its Effects on Information Security," presented at the 2008 2nd Annual Computer Security Conference (CSC 2008), April 16-18, 2008, Coastal Carolina University, Myrtle Beach, SC.
  7. "Acceptable Use Policies as a Defense Against Threats Posed by the Use of Social Networking Sites in Organizations"presented at the 2009 3nd Annual Computer Security Conference (CSC 2009), March 25-27, 2009, Coastal Carolina University, Myrtle Beach, SC.
  8. " WPA vs. WPA2: Is WPA2 Really an Improvement on WPA?" presented at the 2010 4th Annual Computer Security Conference (CSC 2010), April 15-16, 2010, Coastal Carolina University, Myrtle Beach, SC.
  9. "Curriculum and Pedagogical Effects of Creation of a Minor in Cyber Security," presented at the 2010 Information Security Curriculum Development Conference (InfoSecCD 2010), October 1-2, 2010, Kennesaw State University, Kennesaw, GA.
  10. "The Creation of a Minor in Cyber Security - the Sequel" presented at the 2012 Information Security Curriculum Development Conference (InfoSecCD 2012), October 5-6, 2012, Kennesaw State University, Kennesaw, GA.
  11. "Measuring the Effectiveness of Instruction Based on a Hands-On Workshop in Information Assurance," presented at the 2013 Information Security Curriculum Development Conference (InfoSecCD 2013), October 11-12, 2013, Kennesaw State University, Kennesaw, GA.
  12. "BYOD Policies in Practice", from a WebBSIT Grant, presented at the CS/IT Research Symposium on October 25, 2013, at Armstrong Atlantic State University.
  13. "A Comparison of Different Methods of Instruction in Cryptography" presented at the 2014 Information Security Curriculum Development Conference (InfoSecCD 2014), October 11, 2014, Kennesaw State University, Kennesaw, GA.
  14. "A Comparison of Different Methods of Instruction in Cryptography", from a WebBSIT Grant, presented at the CS/IT Research Symposium on November 7, 2014
  15. "Teaching Cryptography Using Calculative, Client-Based, and Virtual Methods, a Nifty Assignment", presented at the 30th Annual Consortium for Computing Sciences in Colleges Southeastern Conference (CCSC:SE 2016), November 4-5, 2016, UNC-Asheville, Asheville, NC

Published Papers:

  1. "The Effect of a University Information Security Survey on Instruction Methods in Information Security," published in The Digital Library of the ACM, Proceedings of the 2nd annual conference on Information Security Curriculum Development, InfoSecCD '05, Kennesaw State University, September 23, 2005.
  2. "Campus-wide Spyware and Virus Removal as a Method of Teaching Information Security," published in The Digital Library of the ACM, Proceedings of the 3rd annual conference on Information Security Curriculum Development, InfoSecCD '06, Kennesaw State University, September 22, 2006.
  3. "Integrating a Security Awareness Program Into an Information Security Course," published in The Journal of Computing Sciences in Colleges, Papers of the Twenty-First Annual CCSC Southeastern Conference (a refereed paper). This paper was also published in the Digital Library of the ACM.
  4. "Avian Flu: The Use of IT to Mitigate a Pandemic and its Effects on Information Security," presented at the 2008 2nd Annual Computer Security Conference (CSC 2008), April 16-18, 2008, Coastal Carolina University, Myrtle Beach, SC.
  5. "Acceptable Use Policies as a Defense Against Threats Posed by the Use of Social Networking Sites in Organizations"presented at the 2009 3nd Annual Computer Security Conference (CSC 2009), March 25-27, 2009, Coastal Carolina University, Myrtle Beach, SC.
  6. "WPA vs. WPA2: Is WPA2 Really an Improvement on WPA?" presented at the 2010 4th Annual Computer Security Conference (CSC 2010), April 15-16, 2010, Coastal Carolina University, Myrtle Beach, SC.
  7. "Curriculum and Pedagogical Effects of Creation of a Minor in Cyber Security," published in the Digital Library of the ACM, Proceedings of the 7th annual conference on Information Security Curriculum Development, InfoSecCD '10, Kennesaw State University, October 2, 2010.
  8. "A Comparison of Tablet Computers for Use as a Class Presentation Platform," with Dr. Thomas Murphy and Mr. Chris Williams, both of Armstrong Atlantic State University, published in the preceedings of the 2012 ASEE Southeast Section Conference
  9. "The Creation of a Minor in Cyber Security - the Sequel," published in the Digital Library of the ACM, Proceedings of the 9th annual conference on Information Security Curriculum Development, InfoSecCD '12, Kennesaw State University, October 6, 2012.
  10. "Measuring the Effectiveness of Instruction Based on Material From a Hands-On Workshop in Information Assurance," published in The Digital Libarary of the ACM, Proceedings of the 10th Annual Conference on Information Security Curriculum Development, InfoSecCD 13, Kennesaw State University, October 11-12, 2013
  11. "A Comparison of Different Methods of Instruction in Cryptography," published in The Digital Libarary of the ACM, Proceedings of the 11th Annual Conference on Information Security Curriculum Development, InfoSecCD 14, Kennesaw State University, October 11, 2014

Grants:

  1. "Campus-Wide Spyware and Virus Removal as a Method of Teaching Information Security." AASU Teaching and Learning Grant, Grant Period January 1, 2006 to June 30, 2006. Approved November 14, 2005.
  2. NSF-SFS Summer Workshop on Information Assurance at the University of Chattanooga, $2000 grant from the National Science Foundation to attend this workshop. See below for more information.
  3. WebBSIT Grant for Research, Summer 2013. Topic: BYOD Policies in Practice
  4. WebBSIT Grant for Research, Summer 2014. Topic: Different Methods of Instruction in Cryptography

Lectures and Interviews:

  1. "Keeping Kids Safe on the Internet," presented to the PTO of the Rambam Day School, Savannah, GA, May, 2006
  2. "Bird Flu's Potential Effects on Business and Information Technology," as part of the Robert Ingram Strozier Faculty Lecture Series faculty lecture "Are We Prepared for Pandemic Bird Flu?", Armstrong Atlantic State University, October 20, 2006
  3. "Staying Safe on the Internet," presented to the weekly Senior Citizens Luncheon of the Jewish Educational Alliance (JEA), Savannah, GA, April 25, 2013.
  4. Interviewed by WSAV's JoAnn Merrigan on Cyber Security, May 21, 2013. The link to the article and video follow:
    Article - Cyber Crime is growing, are you protected?
  5. Interviewed by WSAV's Greg Gullberg on protecting children and teens online, in Social Media, on March 11, 2014. The link to the video follows:
    Protect your children and teens on social media
  6. Interview by WSAV's JoAnn Merrigan on Target's use of Chip-and-PIN technology for their RED Card, how secure it is, and how it will affect overall consumer security. The link to the clip below is a "teaser" for the longer interview that was aired at 6pm on May 6. The interview was conducted at ASU on May 6, 2014, and shown that evening. Another segment of the same interview, regarding the security of BitCoins, was aired on May 7, 2014. The link to the teaser is below:
    How secure is chip-and-PIN technology and is it the wave of the future?
  7. "Staying Safe on the Internet," presented to the Kiwanis Club of The Landings, The Landings at Skidaway Island, Savannah, GA, May 22, 2014
  8. Interviewed by WSAV's JoAnn Merrigan on President Obama's Cyber Security proposal on January 14, 2015. The link to the video follows:
    Interview on President Obama's Cyber Security Proposal
  9. Interviewed by WSAV's JoAnn Merrigan on Net Neutrality on February 10, 2015. The link to the "teaser" for the longer segment follows:
    Interview on Net Neutrality. Here is the link to the actual article on WSAV's site that includes the "teaser" for the longer segment - the text contains my responses in the interview: Article including responses and "teaser" segment
  10. Interviewed by WSAV's JoAnn Merrigan on Anthem Insurance security breach on March 2, 2015. The link to the article and video follows:
    Interview on Anthem Security Breach
  11. "Happy Tax Day: Is Your Data Still Secure?" presented as part of the College of Science and Technology's Science on Tap Lecture Series at the Savannah Coffee Roasters, April 15, 2015.
  12. Interviewed by WTOC's Elizabeth Rawlins on Chrysler/Jeep cars being vulnerable to Cyber Hacking on August 6, 2015. The link to the article an video follows:
    Interview on cars being vulnerable to Cyber Attack
  13. Interviewed by WTOC's Elizabeth Rawlins (continuation of 8/6/15 interview) on Cyber Security curriculum at ASU, broadcast on Sunday, August 9, 2015, follows:
    Second part of 8/6/15 interview, this on ASU's Cyber Security Curriculum
  14. Participated in TAG-sponsored Panel Discussion at DIRTT on Privacy vs Secuirty: Local Experts Weigh in on Apple vs. FBI, panel discussion on Tuesday, April 26, 2016, and broadcast on WSAV on Wednesday, April 27, 2016. Panel Discusson: Privacy vs Security, telecast by WSAV
  15. Interviewed by WSAV's JoAnn Merrigan on Privacy vs Security, the FBI vs Apple. Interview on Wednesday, April 27, 2016, broadcast on Tuesday, May 3, 2016. Interview on Privacy vs Security

Workshops and Other Symposia attended:

  1. Faculty Development Workshop on Teaching Information Security, Center for Information Security Education, Kennesaw State University, December 16 18, 2006, This workshop concentrated on various successful methods of teaching an introductory course in Information Security.
  2. NSF-SFS Summer Workshop on Information Assurance at the University of Chattanooga, sponosored and funded by the National Science Foundation from May 21 - 25, 2012. This five-day workshop concentrated on various hands-on labs and methods of teaching Information Assurance. Included in the curriculum were: Cryptography, Access Control, Security Management, Wireless Security, Firewall exercises, Guided Web Hacking, Secure Web Development, Forensics, and Ethics.
  3. Desire-2-Learn Regional Workshop on Best Practices, at Valdosta State University, February 20 and 21, 2013.
  4. 51st ACM Southeast Regional Conference, Coastal Georgia Center, Savannah, hosted by AASU, April 4 6, 2013: member of the Program Committee
  5. New Models, MOOCs and Beyond, at the Georgia Institute of Technology, November 6, 2013.
  6. American Council on Education (ACE) Workshop on ACE credit for Workforce Training and ACE Military Training, at the Georgia Institute of Technology, April 11, 2014
  7. Cyber Education Summit, at Georgia Regents University, October 23, 2014
  8. Technology Association of Georgia (TAG) 2015 Cybersecurity Attack Simulation, at Southern Polytechnic State University (of Kennesaw State University), May 5, 2015.
  9. 2nd Annual Cyber Education Summit, at Georgia Regents University, October 15, 2015
  10. 2015 NSA-CAE (Center of Academic Excellence) Community Meeting Conference, at San Diego, CA, November 2, 2015
  11. 2015 NIST-NICE (National Institute of Standards & Technology - National Initiative for Cybersecurity Education Conference, at San Diego, CA, November 3-4, 2015
  12. Spring 2016 Army Cyber Talks, sponsored by the US Army Cyber Institute (ACI) of the United States Military Academy at West Point, at Georgia Tech, Atlanta, March 29, 2016
  13. 2016 National Cyber Summit and NSA-CAE Community Meeting, at Huntsville, AL, June 7-9, 2016. It is at this meeting that Armstrong was presented with its Certificate of NSA-CAE/CD designation.
  14. 2017 National Cyber Summit and NSA-CAE Community Meeting, at Huntsville, AL, June 5-7, 2017.