Center for Cybersecurity Education

Welcome to the RMU Center for Cybersecurity Education

Robert Morris University (RMU) is a candidate for the designation of a National Center of Academic Excellence in Cyber Defense Education (CAE-CDE) from the U.S. National Security Agency and Department of Homeland Security (NSA/DHS). The Center for Cybersecurity Education (CCE) has been established to serve as the focal point for cybersecurity curriculum and practice at RMU.

The Center for Cybersecurity Education is organized and hosted by the Department of Computer and Information Systems in the School of Communications and Information Systems and supported by faculty across multiple disciplines at RMU. The mission of the CCE center is to provide cybersecurity education program guidance and oversight, general cyber defense information, and opportunities of cybersecurity research, collaboration, and outreach for students, faculty, and other organizations.

Cybersecurity Programs

Multi-disciplinary Faculty Involved in Cybersecurity Areas

Ping Wang, Ph.D., CISSP, CAE Committee Chair and Point of Contact, Professor of Computer and Information Systems

Sushil Acharya, Dr. Eng., Professor of Software Engineering

Natalya Bromall, Ph.D., Associate Professor of Computer and Information Systems

Donna Cellante, Ed.D., Professor of Computer and Information Systems

Gary Davis, D.Sc., Professor of Computer and Information Systems

Anteneh Girma, Ph.D., Associate Professor of Computer and Information Systems

Holly Hampe, D.Sc., Assistant Professor of Health Services Administration

Francis Hartle, D.Sc., Assistant Professor of Criminal Justice

Fred Kohun, Ph.D., University Professor of Computer and Information Systems

Paul Kovacs, Ph.D., University Professor of Computer and Information Systems

Karen Paullet, D.Sc., Associate Professor of Computer and Information Systems

Jacob Peng, Ph.D., CISA, Associate Professor of Accounting

Jamie Pinchot, D.Sc., Associate Professor of Computer and Information Systems

John Stewart, Ph.D., Associate Professor of Computer and Information Systems

Yanbin Tu, Ph.D., Professor of Marketing

Wenli Wang, Ph.D., Professor of Computer and Information Systems

David Wood, Ph.D., Professor of Computer and Information Systems

Peter Wu, Ph.D., Professor of Computer and Information Systems

Yao Zhang, Ph.D., Assistant Professor of Accounting

Cyber Defense Faculty Publications

Wang P., Rosenberg M., D’Cruze H. (2018). Integration of mobile forensic tool capabilities. In S. Latifi (Eds.), Information Technology - New Generations. Advances in Intelligent Systems and Computing, vol 738 (pp.81-87). Springer, Cham.

Scully, C., & Wang, P. (2018). Router security penetration testing in a virtual environment. In S. Latifi (Eds.), Information Technology - New Generations. Advances in Intelligent Systems and Computing, vol 558 (pp.119-124). Springer, Cham.

Acharya, S., & Schilling, W. (2017). Infusing software security in software engineering. 2017 ASEE Annual Conference & Exposition. DOI: 10.18260/1-2--28530.

Acharya, S., Manohar, P., Wu, P., & Schilling, W.W. (2017). Using academia-industry partnerships to enhance software verification and validation education via active learning tools. Journal of Education and Learning 6(2), 69-84.

Chawdhry, A., Paullet, K. Douglas, D., & Compomizzi, J. (2017). Downloading Mobile Apps: Are Students Protecting Themselves? Journal of Information Systems Applied Research, 10(2), 35-42.

Girma, A., Garuba, M., & Goel, R. (2017). Advanced machine language approach to detect DDoS

attack using DBSCAN clustering technology with entropy. In: Latifi S. (Ed). Information Technology - New Generations. Advances in Intelligent Systems and Computing, vol 558 (pp.125-131). Springer, Cham.

Paullet, K., Pinchot, J., & Mishra, S. (2017). Implementing a Successful Train-the-Trainer Program in Mobile Forensics and Security, Issues in Information Systems, 18(1), 173-179.

Wang, P., & Park, S. (2017). Communication in Cybersecurity: A public communication model for business data breach incident handling. Issues in Information Systems, 18(2), 136-147.

Wang, P., & Sbeit, R. (2017). A constructive team project model for online cybersecurity education. Issues in Information Systems, 18(3), 19-28.

Goreva, N., Mishra, S., Draus, P., Bromall, G., Caputo, D. (3rd Quarter, 2016). A study of security of Electronic Healthcare records utilizing six knowledge categories and subjects’ demographics. IJMIS, 20(3), 51-57.

Pinchot, J., Mishra, S., Paullet, K., & Kohun, F. (2016). Exploring barriers to adoption of mobile payments for university students: Lack of awareness, lack of availability, and perceived security risks, Issues in Information Systems, 17(3), 20-30.

Scarpino, J.J., Hodder, M., Davis, G.A., Kovacs, P. J., Owusu, T.D., & Kisow, M.R., (2016). Teaching the cloud: Security remains a concern for information technology students. Issues in Information Systems, 17(2).

Wang, W. (2016). A learning module for advanced cryptology. Issues in Information Systems, 17(4), 98-108.

Mishra, S., Draus, P., Goreva, N., Leone, G. and Caputo, D. (2015). A Multifactor Research Model of Antecedents of Security and Privacy in Healthcare Settings. Issues in Information Systems, 16(2), 168-175.

Wang, P. (2015, December). Project-based curricular service learning for cybersecurity education. National Cybersecurity Institute Journal, 2(3), 5-12.

Wang, W. (2015). Improving learning outcomes of textbook content with a supplementary learning module: A case for basic cryptology. Issues in Information Systems, 16(3), 172-182.

Acharya, S., Manohar, P.A., Wu, P.Y., Schilling, W.W., Ansari, A. (2014). Collaborative education: Building a skilled software verification and validation user community. Journal of Computers in Education, 5(4), 26-35.

Hartle, F., Parker, M., & Wydra, C. (2014). The digital case file: The future of fighting crime with big data. Issues in Information Systems, 15(I), 257-266.

Paullet, K., Davis, G. A., Wang, W. (2013). Cyber forensics and information security: A new and innovative bachelor’s degree program. Issues in Information Systems, 14(1), 244-250.

Monaco, J., Stewart, J., Cha, S-H, & Tappert, C. (2013). Behavioral biometric verification of student identity in online course assessment and authentication of authors of literary works. Proceedings of the Sixth Annual Conference on Biometrics Theory, Application, and Systems 2013, IEEE, Washington, DC, October 2013.

Laverty, J., Wood, D., Kohun, F., & Turchek, J. (2011). Comparative analysis of mobile application development and security models. Issues in Information Systems, XII(1), 301-312.

Laverty, J., Kohun, F., Wood, D., & Turchek, J. (2011). Vulnerabilities and threats to mobile device security from a practitioner’s point of view. Issues in Information Systems, XII(2), 181-193.

Wood, D., Kohun, F., Ali, A., Paullet, K., & Davis, G. (2010). Cyber Forensics and Security as an ABET CAC accreditable program. Information Systems Education Journal, 8(60), 1-12.

Advisory Board Members

Dr. Jeff Daniels, Lockheed Martin Corporation

Dr. Maurice Dawson, Illinois Institute of Technology

Chris Johnson, PNC Bank

Dr. James Joshi, University of Pittsburgh

Dr. Johnson Kinyua, Penn State University Park

Matt Rosenberg, Allegheny County Police Mobile Forensic Unit

Dr. Raed Sbeit, Verizon Wireless

Dr. Steve Stone, The MITRE Corporation

Dr. Robert Young, The MITRE Corporation

RMU Information Security Plan
Outreach and Partnerships

RMU has established articulation agreements for student transfers with the following community colleges and other schools:

  • Butler County Community College
  • Community College of Allegheny County
  • Community College of Beaver County
  • Pittsburgh Technical Institute
  • Westmoreland County Community College

See transfer agreements here.

RMU is a member of the National CyberWatch Center.

RMU also has a working partnership with CyberWatch West (CWW).