Students in Our Lady of the Lake University’s Computer Information Systems and Security degree programs have access to the University’s Center for Information Assurance Management and Leadership. Formed in 2004, the center serves as a central resource on information assurance and security policy for students and the community.

Working with the center, OLLU graduate students helped pioneer voter security research. The students examined the accuracy of three Texas counties electronic voting machines during the November 2006 elections. This research led to policy development for the state of Texas.

Research Articles and Activities:

Kock, N., Chatelain-Jardon, R., & Carmona, J. (2008). An experimental study of simulated web-based threats and their impact on knowledge communication effectiveness. IEEE Transactions on Professional Communication, 51(2), 183-197. doi:10.1109/TPC.2008.2000345

Carmona, J. (2010). Priming users across countries to identify adverse web-based contract clauses: Utilizing the media naturalness theory to detect deception. Unpublished doctoral dissertation, Texas A&M International University, Laredo, TX.

Mohammed, D. (2010). Ecommerce: Ongoing challenges. Journal of Internet Banking and Commerce, 15(2), 15-18.

Mohammed, D. (2011). Security in cloud computing: An analysis of key drivers and constraints. Information Security Journal: A Global Perspective, 20(3), 123-127. doi:10.1080/19393555.2010.544704 [11]

Mohammed, D. (2011). Certification- The Answer to Cybersecurity Woes? ISACA Journal, (5), 1-3. ISSN #1526-7407.

Mohammed, D. (2011). Internet of Things (IoT) - A Case Study. International Journal of Advanced Networking and Applications, (Accepted for publication September 2011).

Mohammed, D. (2009). [Review of the Journal article Automated Obfuscated Class Generation Facility of JDATATRANS Framework for Source Code Obfuscation].

Mohammed, D. (2010). [Review of the Journal article Information security management for Lawyer’s trust accounts: Case studies with trust account regulators]

Mohammed, D. (2010). [Review of the Journal article Tracking the progress of an SDL program – lessons from the Gym]

Mohammed, D. (2010). [Review of the Journal article Security and Control in the Cloud]

Mohammed, D. (2011). [Review of the Journal article An Overview of Browser Vulnerability Attacks, Countermeasures and Detection Tools]

Lee, G. M., & Lind, M. L. (2011). Information technology diffusion: Impact on student achievement. Information Systems Education Journal, 9(3), 35-49.

Barton, K. A., Jeffries-Horner, C., & Duong, H. V. (2011). Database intrusion detection: Defending against the insider threat. Manuscript in progress.

Barton, K. A. (2011). Information system security commitment: An empirical study of external influences on senior management. Manuscript in progress

Barton, K. A. (2011). [Review of the conference paper How much material on BitTorrent is infringing content? A case study].

Barton, K. A. (2011). [Review of the conference paper Unethical use of information technology: A two-country study].