College of Engineering and Computing, Department of Information Technology

Professor Katz's Scholarly Activities


Home My Bio Current Courses

My area of interest is Information and Cyber Security.

Presentations at Conferences:

  1. "The Effect of a University Information Security Survey on Instruction Methods in Information Security," presented at the 2005 Information Security Curriculum Development Conference (InfoSecCD 2005), September 23-24, 2005, Kennesaw State University, Kennesaw, GA.
  2. "The Correlation Between Success in Pre-Calculus and Java Programming Among CS and IT Majors in the School of Computing at AASU," presented at the 11th Annual Math-Technology Conference, February 24, 2006, Valdosta State University, Valdosta, GA.
  3. "The Effect of a University Information Security Survey on the Pedagogy of Information Security," presented at the Sixth Annual Symposium on Teaching and Learning, March 31, 2006, Armstrong Atlantic State University.
  4. "Campus-wide Spyware and Virus Removal as Method of Teaching Information Security," presented at the 2006 Information Security Curriculum Development Conference (InfoSecCD 2006), September 22-23, 2006, Kennesaw State University, Kennesaw, GA.
  5. "Integrating a Security Awareness Program Into an Information Secuity Course," presented at the 2007 21st Annual Consortium for Computing Sciences in Colleges Southeastern Conference (CCSC:SE 2007), November 9-10, 2007, Coastal Carolina University, Myrtle Beach, SC.
  6. "Avian Flu: The Use of IT to Mitigate a Pandemic and its Effects on Information Security," presented at the 2008 2nd Annual Computer Security Conference (CSC 2008), April 16-18, 2008, Coastal Carolina University, Myrtle Beach, SC.
  7. "Acceptable Use Policies as a Defense Against Threats Posed by the Use of Social Networking Sites in Organizations"presented at the 2009 3nd Annual Computer Security Conference (CSC 2009), March 25-27, 2009, Coastal Carolina University, Myrtle Beach, SC.
  8. " WPA vs. WPA2: Is WPA2 Really an Improvement on WPA?" presented at the 2010 4th Annual Computer Security Conference (CSC 2010), April 15-16, 2010, Coastal Carolina University, Myrtle Beach, SC.
  9. "Curriculum and Pedagogical Effects of Creation of a Minor in Cyber Security," presented at the 2010 Information Security Curriculum Development Conference (InfoSecCD 2010), October 1-2, 2010, Kennesaw State University, Kennesaw, GA.
  10. "The Creation of a Minor in Cyber Security - the Sequel" presented at the 2012 Information Security Curriculum Development Conference (InfoSecCD 2012), October 5-6, 2012, Kennesaw State University, Kennesaw, GA.
  11. "Measuring the Effectiveness of Instruction Based on a Hands-On Workshop in Information Assurance," presented at the 2013 Information Security Curriculum Development Conference (InfoSecCD 2013), October 11-12, 2013, Kennesaw State University, Kennesaw, GA.
  12. "BYOD Policies in Practice", from a WebBSIT Grant, presented at the CS/IT Research Symposium on October 25, 2013, at Armstrong Atlantic State University.
  13. "A Comparison of Different Methods of Instruction in Cryptography" presented at the 2014 Information Security Curriculum Development Conference (InfoSecCD 2014), October 11, 2014, Kennesaw State University, Kennesaw, GA.
  14. "A Comparison of Different Methods of Instruction in Cryptography", from a WebBSIT Grant, presented at the CS/IT Research Symposium on November 7, 2014
  15. "Teaching Cryptography Using Calculative, Client-Based, and Virtual Methods, a Nifty Assignment", presented at the 30th Annual Consortium for Computing Sciences in Colleges Southeastern Conference (CCSC:SE 2016), November 4-5, 2016, UNC-Asheville, Asheville, NC
  16. "Cyber Course Curriculum Development", presented at the Southeast Cybersecurity Conference (SECC), July 26-27, 2018, Orlando, FL
  17. "Adversarial Thinking: Teaching Students to Think Like a Hacker" published in the Proceedings of the 3rd Annual Conference on Cybersecurity Education, Research, and Practice, Kennesaw State University, October 12, 2019
  18. "Resilience vs Prevention, which is the Better Cybersecurity Practice?" published in the Proceedings of the 5th Annual Conference on Cyberesecurity Education, Research, and Practice Kennesaw State University, October 30, 2021

Published Papers:

  1. "The Effect of a University Information Security Survey on Instruction Methods in Information Security," published in The Digital Library of the ACM, Proceedings of the 2nd annual conference on Information Security Curriculum Development, InfoSecCD 05, Kennesaw State University, September 23, 2005.
  2. "Campus-wide Spyware and Virus Removal as a Method of Teaching Information Security," published in The Digital Library of the ACM, Proceedings of the 3rd annual conference on Information Security Curriculum Development, InfoSecCD 06, Kennesaw State University, September 22, 2006.
  3. "Integrating a Security Awareness Program Into an Information Security Course," published in The Journal of Computing Sciences in Colleges, Papers of the Twenty-First Annual CCSC Southeastern Conference (a refereed paper). This paper was also published in the Digital Library of the ACM.
  4. "Avian Flu: The Use of IT to Mitigate a Pandemic and its Effects on Information Security," presented at the 2008 2nd Annual Computer Security Conference (CSC 2008), April 16-18, 2008, Coastal Carolina University, Myrtle Beach, SC.
  5. "Acceptable Use Policies as a Defense Against Threats Posed by the Use of Social Networking Sites in Organizations"presented at the 2009 3nd Annual Computer Security Conference (CSC 2009), March 25-27, 2009, Coastal Carolina University, Myrtle Beach, SC.
  6. "WPA vs. WPA2: Is WPA2 Really an Improvement on WPA?" presented at the 2010 4th Annual Computer Security Conference (CSC 2010), April 15-16, 2010, Coastal Carolina University, Myrtle Beach, SC.
  7. "Curriculum and Pedagogical Effects of Creation of a Minor in Cyber Security," published in the Digital Library of the ACM, Proceedings of the 7th annual conference on Information Security Curriculum Development, InfoSecCD 10, Kennesaw State University, October 2, 2010.
  8. "A Comparison of Tablet Computers for Use as a Class Presentation Platform," with Dr. Thomas Murphy and Mr. Chris Williams, both of Armstrong Atlantic State University, published in the preceedings of the 2012 ASEE Southeast Section Conference
  9. "The Creation of a Minor in Cyber Security - the Sequel," published in the Digital Library of the ACM, Proceedings of the 9th annual conference on Information Security Curriculum Development, InfoSecCD 12, Kennesaw State University, October 6, 2012.
  10. "Measuring the Effectiveness of Instruction Based on Material From a Hands-On Workshop in Information Assurance," published in The Digital Libarary of the ACM, Proceedings of the 10th Annual Conference on Information Security Curriculum Development, InfoSecCD 13, Kennesaw State University, October 11-12, 2013
  11. "A Comparison of Different Methods of Instruction in Cryptography," published in The Digital Libarary of the ACM, Proceedings of the 11th Annual Conference on Information Security Curriculum Development, InfoSecCD 14, Kennesaw State University, October 11, 2014
  12. "Breadth vs. Depth: Best Practices Teaching Cybersecurity in a Small Public University Sharing Models" published in the Summer 2018 edition of the Cyber Defense Review of the Army Cyber Institute at West Point
  13. "Adversarial Thinking: Teaching Students to Think Like a Hacker" published in the Proceedings of the 3rd Annual Conference on Cybersecurity Education, Research, and Practice, Kennesaw State University, October 12, 2019
  14. "Resilience vs. Prevention, which is the Better Cybersecurity Practice" published in the Proceedings of the 5th Annual Confrerence on Cybersecurity Education, Research, and Practice, Kennesaw State University, October 30, 2021

Grants:

  1. "Campus-Wide Spyware and Virus Removal as a Method of Teaching Information Security." AASU Teaching and Learning Grant, Grant Period January 1, 2006 to June 30, 2006. Approved November 14, 2005.
  2. NSF-SFS Summer Workshop on Information Assurance at the University of Chattanooga, $2000 grant from the National Science Foundation to attend this workshop. See below for more information.
  3. WebBSIT Grant for Research, Summer 2013. Topic: BYOD Policies in Practice
  4. WebBSIT Grant for Research, Summer 2014. Topic: Different Methods of Instruction in Cryptography
  5. DoD CySP Grant (Scholarship, Pay, Travel, etc), 2020-2021 Awarding Agency: NSA on behalf of DoD, as Primary Investigator. $148,346.00, October 02, 2020
  6. DoD CySP Grant (Scholarship, Pay, Travel, etc), 2021-2022 Awarding Agency: NSA on behalf of DoD, as Primary Investigator. $53,988.00, September 09, 2021

Lectures and Interviews:

  1. "Keeping Kids Safe on the Internet," presented to the PTO of the Rambam Day School, Savannah, GA, May, 2006
  2. "Bird Flu's Potential Effects on Business and Information Technology," as part of the Robert Ingram Strozier Faculty Lecture Series faculty lecture "Are We Prepared for Pandemic Bird Flu?", Armstrong Atlantic State University, October 20, 2006
  3. "Staying Safe on the Internet," presented to the weekly Senior Citizens Luncheon of the Jewish Educational Alliance (JEA), Savannah, GA, April 25, 2013.
  4. Interviewed by WSAV's JoAnn Merrigan on Cyber Security, May 21, 2013. The link to the article and video follow:
    Article - Cyber Crime is growing, are you protected?
  5. Interviewed by WSAV's Greg Gullberg on protecting children and teens online, in Social Media, on March 11, 2014. The link to the video follows:
    Protect your children and teens on social media
  6. Interview by WSAV's JoAnn Merrigan on Target's use of Chip-and-PIN technology for their RED Card, how secure it is, and how it will affect overall consumer security. The link to the clip below is a "teaser" for the longer interview that was aired at 6pm on May 6. The interview was conducted at ASU on May 6, 2014, and shown that evening. Another segment of the same interview, regarding the security of BitCoins, was aired on May 7, 2014. The link to the teaser is below:
    How secure is chip-and-PIN technology and is it the wave of the future?
  7. "Staying Safe on the Internet," presented to the Kiwanis Club of The Landings, The Landings at Skidaway Island, Savannah, GA, May 22, 2014
  8. Interviewed by WSAV's JoAnn Merrigan on President Obama's Cyber Security proposal on January 14, 2015. The link to the video follows:
    Interview on President Obama's Cyber Security Proposal
  9. Interviewed by WSAV's JoAnn Merrigan on Net Neutrality on February 10, 2015. The link to the "teaser" for the longer segment follows:
    Interview on Net Neutrality. Here is the link to the actual article on WSAV's site that includes the "teaser" for the longer segment - the text contains my responses in the interview: Article including responses and "teaser" segment
  10. Interviewed by WSAV's JoAnn Merrigan on Anthem Insurance security breach on March 2, 2015. The link to the article and video follows:
    Interview on Anthem Security Breach
  11. "Happy Tax Day: Is Your Data Still Secure?" presented as part of the College of Science and Technology's Science on Tap Lecture Series at the Savannah Coffee Roasters, April 15, 2015.
  12. Interviewed by WTOC's Elizabeth Rawlins on Chrysler/Jeep cars being vulnerable to Cyber Hacking on August 6, 2015. The link to the article an video follows:
    Interview on cars being vulnerable to Cyber Attack
  13. Interviewed by WTOC's Elizabeth Rawlins (continuation of 8/6/15 interview) on Cyber Security curriculum at ASU, broadcast on Sunday, August 9, 2015, follows:
    Second part of 8/6/15 interview, this on ASU's Cyber Security Curriculum
  14. Participated in TAG-sponsored Panel Discussion at DIRTT on Privacy vs Secuirty: Local Experts Weigh in on Apple vs. FBI, panel discussion on Tuesday, April 26, 2016, and broadcast on WSAV on Wednesday, April 27, 2016. Panel Discusson: Privacy vs Security, telecast by WSAV
  15. Interviewed by WSAV's JoAnn Merrigan on Privacy vs Security, the FBI vs Apple. Interview on Wednesday, April 27, 2016, broadcast on Tuesday, May 3, 2016. Interview on Privacy vs Security
  16. Interviewed by WSAV on Privacy and Security of Covid-19 apps. Interview on Friday, August 28, 2020, broadcast on the same day Interview on Covid-19 apps
  17. Interviewed by WTOC on the Army Cyber Institute's Jack Voltaic 3.0 Cyber Exercise. Interview on Thursday, September 24, broadcast on the same day Interview on Jack Voltaic 3.0, WTOC
  18. Interviewed by WSAV on the Army Cyber Institute's Jack Voltaic 3.0 Cyber Exercise. Interview on Thursday, September 24, broadcast on the same day - video Interview on Jack Voltaic 3.0 - WSAV, video
  19. Interviewed by WSAV on the Army Cyber Institute's Jack Voltaic 3.0 Cyber Exercise. Interview on Thursday, September 23, broadcast on the same day - no video, just story Interview on Jack Voltaic 3.0 - WSAV, just story
  20. Interviewed by WSAV on the Colonial Pipeline Hack. Interview on Friday, June 18, 2021 WSAV Interview on Colonial Pipeline Hack
  21. Associated Press Story on Colonial Pipeline Hack, dated June 21, 2021 AP story including my interview on WSAV no video
  22. Local Fox28 News Story on Colonial Pipeline Hack, dated June 22, 2021 Fox 28 interview no video
  23. Interviewed by WSAV on the effect of Russian hackers on US Cybersecurity resulting from the war in Ukraine, dated February 28 (aired March 3), 2022 Interview on Cybersecurity effects of Ukrainian war
  24. Interviewed by Georgia Southern University's "Eagle Eye View Podcast" on Cybersecurity during Cybersecurity Month, October 12, 2022, Eagle Eye View Podcast

Conferences, Workshops and Other Symposia attended:

  1. Faculty Development Workshop on Teaching Information Security, Center for Information Security Education, Kennesaw State University, December 16 – 18, 2006, This workshop concentrated on various successful methods of teaching an introductory course in Information Security.
  2. NSF-SFS Summer Workshop on Information Assurance at the University of Chattanooga, sponosored and funded by the National Science Foundation from May 21 - 25, 2012. This five-day workshop concentrated on various hands-on labs and methods of teaching Information Assurance. Included in the curriculum were: Cryptography, Access Control, Security Management, Wireless Security, Firewall exercises, Guided Web Hacking, Secure Web Development, Forensics, and Ethics.
  3. Desire-2-Learn Regional Workshop on Best Practices, at Valdosta State University, February 20 and 21, 2013.
  4. 51st ACM Southeast Regional Conference, Coastal Georgia Center, Savannah, hosted by AASU, April 4 – 6, 2013: member of the Program Committee
  5. New Models, MOOCs and Beyond, at the Georgia Institute of Technology, November 6, 2013.
  6. American Council on Education (ACE) Workshop on ACE credit for Workforce Training and ACE Military Training, at the Georgia Institute of Technology, April 11, 2014
  7. Cyber Education Summit, at Georgia Regents University, October 23, 2014
  8. Technology Association of Georgia (TAG) 2015 Cybersecurity Attack Simulation, at Southern Polytechnic State University (of Kennesaw State University), May 5, 2015.
  9. 2nd Annual Cyber Education Summit, at Georgia Regents University, October 15, 2015
  10. 2015 NSA-CAE (Center of Academic Excellence) Community Meeting Conference, at San Diego, CA, November 2, 2015
  11. 2015 NIST-NICE (National Institute of Standards & Technology - National Initiative for Cybersecurity Education Conference, at San Diego, CA, November 3-4, 2015
  12. Spring 2016 Army Cyber Talks, sponsored by the US Army Cyber Institute (ACI) of the United States Military Academy at West Point, at Georgia Tech, Atlanta, March 29, 2016
  13. 2016 National Cyber Summit and NSA-CAE Community Meeting, at Huntsville, AL, June 7-9, 2016. It is at this meeting that Armstrong was presented with its Certificate of NSA-CAE/CD designation.
  14. 2017 National Cyber Summit and NSA-CAE Community Meeting, at Huntsville, AL, June 5-7, 2017.
  15. 2017 Conference on Cybersecurity Education, Research, and Practice (CCERP), at Kennesaw State University, October 20-21
  16. 2018 National Cyber Summit and NSA-CAE Community Meeting, at Huntsville, AL, June 5-7, 2018.
  17. 2018 Southeast Cybersecurity Conference (SECC), sponsored by the University of West Florida - NSA-CAE SE Regional Center, at Orlando, FL, July 26-27, 2018.
  18. 2018 Conference on Cybersecurity Education, Research, and Practice (CCERP), at Kennesaw State University, October 19-20
  19. 2018 Fall NSA-CAE Symposium and CAE Meeting, at Miami, FL, November 8-9
  20. 2019 SEED (Security Education) Workshop, at Syracuse University, Syracuse, NY, June 3 - 6
  21. 2019 SE Region of NSA-CAE Conference and Workshop, at the University of West Florida, Pensacola, FL, Sept 10 - 13
  22. 2019 NICE Conference and Expo, Phoenix, AZ, November 19-20
  23. 2019 NSA-CAE Symposium and CAE Meeting, Phoenix, AZ, November 21-22
  24. 2020 AFCEA CERTS Conference, Augusta, GA, January 14-16
  25. "Securing Research at Georgia Southern University" presented as a member of a panel at the 2022 Securing Higher Education Research in Georgia Conference, Georgia Cyber Center, Augusta, GA, March 10, 2022
  26. 2022 AFCEA CERTS Conference, Augusta, GA, May 9 - 11, 2022
  27. 2022 NICE Conference and Expo Atlanta, GA, June 6 - 8, 2022
  28. 2022 NSA-CAE Symposium and CAE Meeting, Atlanta, GA, June 7 - 9, 2022. Attended as Georgia Southern's Point of Contact for the NSA-CAE program
  29. 2022 NSA-CAE Southeast Regional Meeting, University of North Carolina, Charlotte, Charlotte, NC, September 28 - 29, 2022. Attended as Georgia Southern's Point of Contact for the NSA-CAE program