|
Cybernetics and Cybersecurity: bringing Order to Chaos
Scott D. Foote, National Security Engineering Center,The Lead for MITRE's "Cyber Operations Center", MITRE Corporation, USA
|
|
|
Cybersecurity: Year in Review and Future Trends
Sri Sridharan, Florida Center for Cybersecurity, University of South Florida, USA
|
|
|
Securing Information Systems in an Uncertain World: Enterprise Level Security
Dr. William Simpson, Institute for Defense Analyses, USA
|
|
|
Towards a Common Approach for Cyber Security of Critical Infrastructures
Dr. Mario Lamanna, Evoelectronics, Italy / Selex-SI, USA
|
|
|
Teaching Security at the UAS Technikum Wien: an Interdisciplinary Approach in Higher Education
Professor Harald Wahl and Professor Christian H. W. Kaufmann, University of Applied Sciences (UAS) Technikum Wien, Austria
|
|
|
Strategy Implementation in Technical University using Smart Information System: Lessons Learned in Riga Technical University
Professor Rector Leonids Ribikis, Faculty of Power and Electrical Engineering, Riga Technical University, Latvia
|
|
|
Information in Health Care:
Why, How, What, When, by and For Whose Interest?
Professor Martin Gellerstedt, Department of Business and IT Division of Law, Economics, Statistics and Politics, University West, Sweden
|
|
|
Situating Subjectivity Within the Science of Performance: Toward Building a Method-Constituting Self for a Self-Constituting World
Professor David J. Waters, PhD, DVM, Purdue Center on Aging and the Life Course, Purdue University, USA / Gerald P. Murphy Cancer Foundation, West Lafayette, Indiana, USA
|
|
|
Hypertextuality in Digital Libraries: Alexander Von Humboldt's Visions
Professor Detlev Doherr, University of Applied Sciences, Offenburg, Germany
|
|
|
Managing the Interoperability and Privacy of eHealth Systems as an Interdisciplinary Challenge
Professor Ing. Alexandru Soceanu, Department of Computer Science and Mathematics, Munich University of Applied Sciences, Germany
|
|
|
Educational Innovation: Bridging Academic Research and Practice via Interdisciplinary Business Doctorate for Executives
Professor T. Grandon Gill, Director of the Doctorate in Business Administration, College of Business, University of South Florida, USA
|
|
|
Integrating Academy with Industry: The Industry Perspective
Dr. Matthew Mullarkey, Director of the DBA Program, College of Business, University of South Florida, USA
|
|
|
Spanning the Practice: Research Gap - Consulting and Research Complementaries in the Management Academy
Professor Jan Klakurka, School of Management, University of Toronto, Canada; Professor Bill Irwin, Department of Economics and Business, Huron University College affiliated with the University of Western Ontario, Canada
|
|
|
Complexity, Beautiful, and Meaning
Dr. Leonid Perlovsky, CEI of LP Information Technology, Northeastern University, USA / Previously Visiting Scholar at Harvard University Harvard University, Principal Research Physicist at The Air Force Research Laboratory.
|
|
|
Connecting Educators with Inter-Disciplinary Inquiry-Based Science and Students with STEM Careers with Real-World Experiences
Dr. Suzanne Lunsford, Department of Chemistry, Wright State University, USA
|
|
|
Humans: Disturbing Factors or Critical Resources in Sociotechnical Systems?
Dr. Toni Wäfler, School of Applied Psychology, Applied Sciences and Arts Northwestern Switzerland, Switzerland
|
|
|
Online Learning as a Catalyst for More Deliberate Pedagogies
Dr. Lorayne Robertson, Faculty of Education, University of Ontario Institute of Technology (UOIT), Canada
|
|
|
Credibility, Logic, and Emotion: Rhetoric in STEM Fields
Dr. Flurije Salihu, College of Letters and Sciences, Arizona State University, USA
|
|
|
Case Studies in Cyber Security (Plenary Participatory Workshop) (Part 1 of 5)
Professor T. Grandon Gill, Director of the Doctorate in Business Administration, College of Business, University of South Florida, USA / Editor-in-Chief of Informing Science / Editor of the Journal of IT Education / Founding Editor of Journal of Information Technology Education; Dr Manish Agrawal, College of Business, University of South Florida, USA / USF General Education Council / USF Research Council / Former College of Business representative / USF Faculty Senate; Mr. Shane Collier, Founder of Consolidated Reality, USA / Antarctic Scientific Research.
|
|
|
Case Studies in Cyber Security (Plenary Participatory Workshop) (Part 2 of 5)
Professor T. Grandon Gill, Director of the Doctorate in Business Administration, College of Business, University of South Florida, USA / Editor-in-Chief of Informing Science / Editor of the Journal of IT Education / Founding Editor of Journal of Information Technology Education; Dr Manish Agrawal, College of Business, University of South Florida, USA / USF General Education Council / USF Research Council / Former College of Business representative / USF Faculty Senate; Mr. Shane Collier, Founder of Consolidated Reality, USA / Antarctic Scientific Research.
|
|
|
Case Studies in Cyber Security (Plenary Participatory Workshop) (Part 3 of 5)
Professor T. Grandon Gill, Director of the Doctorate in Business Administration, College of Business, University of South Florida, USA / Editor-in-Chief of Informing Science / Editor of the Journal of IT Education / Founding Editor of Journal of Information Technology Education; Dr Manish Agrawal, College of Business, University of South Florida, USA / USF General Education Council / USF Research Council / Former College of Business representative / USF Faculty Senate; Mr. Shane Collier, Founder of Consolidated Reality, USA / Antarctic Scientific Research.
|
|
|
Case Studies in Cyber Security (Plenary Participatory Workshop) (Part 4 of 5)
Professor T. Grandon Gill, Director of the Doctorate in Business Administration, College of Business, University of South Florida, USA / Editor-in-Chief of Informing Science / Editor of the Journal of IT Education / Founding Editor of Journal of Information Technology Education; Dr Manish Agrawal, College of Business, University of South Florida, USA / USF General Education Council / USF Research Council / Former College of Business representative / USF Faculty Senate; Mr. Shane Collier, Founder of Consolidated Reality, USA / Antarctic Scientific Research.
|
|
|
Case Studies in Cyber Security (Plenary Participatory Workshop) (Part 5 of 5)
Professor T. Grandon Gill, Director of the Doctorate in Business Administration, College of Business, University of South Florida, USA / Editor-in-Chief of Informing Science / Editor of the Journal of IT Education / Founding Editor of Journal of Information Technology Education; Dr Manish Agrawal, College of Business, University of South Florida, USA / USF General Education Council / USF Research Council / Former College of Business representative / USF Faculty Senate; Mr. Shane Collier, Founder of Consolidated Reality, USA / Antarctic Scientific Research.
|
|
|
Case Studies on Integrating Research, Education, and Real Life Problem Solving (Conversational Participatory Panel) (Part 1 of 2)
Professor T. Grandon Gill, Director of the Doctorate in Business Administration, College of Business, University of South Florida, USA / Editor-in-Chief of Informing Science / Editor of the Journal of IT Education / Founding Editor of Journal of Information Technology Education; Dr Manish Agrawal, College of Business, University of South Florida, USA / USF General Education Council / USF Research Council / Former College of Business representative / USF Faculty Senate; Mr. Shane Collier, Founder of Consolidated Reality, USA / Antarctic Scientific Research.
|
|
|
Case Studies on Integrating Research, Education, and Real Life Problem Solving (Conversational Participatory Panel) (Part 2 of 2)
Co-Chairs and Facilitators: Professor T. Grandon Gill, Director of the Doctorate in Business Administration, College of Business, University of South Florida, USA / Editor-in-Chief of Informing Science / Editor of the Journal of IT Education / Founding Editor of Journal of Information Technology Education; Dr. Suzanne Lunsford, Wright State University, USA; Dr. Nagib Callaos, President of the International Institute of Informatics and Systemic, USA / Former Dean of Research and Development of the University Simon Bolivar, Venezuela / Founding Editor in Chief of the Journal of Systemics, Cybernetics and Informatics.
|
|
Problem: The impact and visibility of cybersecurity breaches continues to rise. Fortune.com estimates that more than 140 countries have some level of cyber weapon development program. Mandiant (now FireEye) estimates that successful attackers are staying resident for >200 days on average, and that these attacks and breaches may already be costing the global economy $Trillions (2014 Mandiant Report). Today’s attackers are professionals, targeting the enterprise’s growing vulnerability. Vulnerability inherent in the expanding complexity, accessibility and dependencies that the enterprise has on information and supporting technology. In response, the Cybersecurity solution marketplace continues to grow, yet remains highly fragmented with 100s of companies providing point solutions in a wide range of categories: network security; intrusion detection/prevention; unified threat management; endpoint security; mobile and IoT security; “cloud” security; application security; data-at-rest and message security; threat intelligence and analytics; security operations & incident response; risk & compliance; etc. This is essentially a cyber “arms race”; and there is no “silver bullet”. CISOs and cybersecurity professionals are faced with a daunting challenge of unprecedented complexity and scale – effectively reducing the Risk to their business.
Engineering Approach: This session will discuss the application of contemporary Systems Engineering discipline to bring some Order to this Chaos – specifically Needs Analysis and Solution Concept Evolution. Conventional Needs Analysis in this domain suffers from the significant complexity of today’s enterprise, its unprecedented dependencies on highly-vulnerable information technology (cyberspace), and urgent demands for immediate solutions that mitigate the risk. “Decomposition” is discussed as a technique for iteratively reducing Abstract Needs into Concrete Requirements. Then, “Re-composition” (iterative System Design, Development, Deployment and continuous integration) is presented as a technique for rapidly evolving effective Solution Concepts.
Solution Concept: Finally, the session will briefly introduce a new system concept for “Cyber Situation Awareness”, informing enterprise-scale Cybersecurity – a federation of people, processes, and enabling technologies – that fuses multi-dimensional intelligence (of information systems and networks, the mission/business dependencies on them, and the emerging cyber threat targeting them) into a complex knowledgebase that provides "signal filtering" for more effective cybersecurity and risk management decisions supporting the "Complex System" that is the enterprise.