Welcome to the RMU Center for Cybersecurity Education
Robert Morris University (RMU) is a candidate for the designation of a National Center of Academic Excellence in Cyber Defense Education (CAE-CDE) from the U.S. National Security Agency and Department of Homeland Security (NSA/DHS). The Center for Cybersecurity Education (CCE) has been established to serve as the focal point for cybersecurity curriculum and practice at RMU.
The Center for Cybersecurity Education is organized and hosted by the Department of Computer and Information Systems in the School of Communications and Information Systems and supported by faculty across multiple disciplines at RMU. The mission of the CCE center is to provide cybersecurity education program guidance and oversight, general cyber defense information, and opportunities of cybersecurity research, collaboration, and outreach for students, faculty, and other organizations.
- Multi-disciplinary Faculty Involved in Cybersecurity Areas
Ping Wang, Ph.D., CISSP, CAE Committee Chair and Point of Contact, Professor of Computer and Information Systems
Sushil Acharya, Dr. Eng., Professor of Software Engineering
Donna Cellante, Ed.D., Professor of Computer and Information Systems
Gary Davis, D.Sc., Professor of Computer and Information Systems
Anteneh Girma, Ph.D., Associate Professor of Computer and Information Systems
Holly Hampe, D.Sc., Assistant Professor of Health Services Administration
Francis Hartle, D.Sc., Assistant Professor of Criminal Justice
Fred Kohun, Ph.D., University Professor of Computer and Information Systems
Paul Kovacs, Ph.D., University Professor of Computer and Information Systems
Karen Paullet, D.Sc., Associate Professor of Computer and Information Systems
Jacob Peng, Ph.D., CISA, Associate Professor of Accounting
Jamie Pinchot, D.Sc., Associate Professor of Computer and Information Systems
John Stewart, Ph.D., Associate Professor of Computer and Information Systems
Yanbin Tu, Ph.D., Professor of Marketing
Wenli Wang, Ph.D., Professor of Computer and Information Systems
David Wood, Ph.D., Professor of Computer and Information Systems
Peter Wu, Ph.D., Professor of Computer and Information Systems
Yao Zhang, Ph.D., Assistant Professor of Accounting
- Cyber Defense Faculty Publications
Wang P., Rosenberg M., D’Cruze H. (2018). Integration of mobile forensic tool capabilities. In S. Latifi (Eds.), Information Technology - New Generations. Advances in Intelligent Systems and Computing, vol 738 (pp.81-87). Springer, Cham.
Scully, C., & Wang, P. (2018). Router security penetration testing in a virtual environment. In S. Latifi (Eds.), Information Technology - New Generations. Advances in Intelligent Systems and Computing, vol 558 (pp.119-124). Springer, Cham.
Acharya, S., & Schilling, W. (2017). Infusing software security in software engineering. 2017 ASEE Annual Conference & Exposition. DOI: 10.18260/1-2--28530.
Acharya, S., Manohar, P., Wu, P., & Schilling, W.W. (2017). Using academia-industry partnerships to enhance software verification and validation education via active learning tools. Journal of Education and Learning 6(2), 69-84.
Chawdhry, A., Paullet, K. Douglas, D., & Compomizzi, J. (2017). Downloading Mobile Apps: Are Students Protecting Themselves? Journal of Information Systems Applied Research, 10(2), 35-42.
Girma, A., Garuba, M., & Goel, R. (2017). Advanced machine language approach to detect DDoS
attack using DBSCAN clustering technology with entropy. In: Latifi S. (Ed). Information Technology - New Generations. Advances in Intelligent Systems and Computing, vol 558 (pp.125-131). Springer, Cham.
Paullet, K., Pinchot, J., & Mishra, S. (2017). Implementing a Successful Train-the-Trainer Program in Mobile Forensics and Security, Issues in Information Systems, 18(1), 173-179.
Wang, P., & Park, S. (2017). Communication in Cybersecurity: A public communication model for business data breach incident handling. Issues in Information Systems, 18(2), 136-147.
Wang, P., & Sbeit, R. (2017). A constructive team project model for online cybersecurity education. Issues in Information Systems, 18(3), 19-28.
Goreva, N., Mishra, S., Draus, P., Bromall, G., Caputo, D. (3rd Quarter, 2016). A study of security of Electronic Healthcare records utilizing six knowledge categories and subjects’ demographics. IJMIS, 20(3), 51-57.
Pinchot, J., Mishra, S., Paullet, K., & Kohun, F. (2016). Exploring barriers to adoption of mobile payments for university students: Lack of awareness, lack of availability, and perceived security risks, Issues in Information Systems, 17(3), 20-30.
Scarpino, J.J., Hodder, M., Davis, G.A., Kovacs, P. J., Owusu, T.D., & Kisow, M.R., (2016). Teaching the cloud: Security remains a concern for information technology students. Issues in Information Systems, 17(2).
Wang, W. (2016). A learning module for advanced cryptology. Issues in Information Systems, 17(4), 98-108.
Mishra, S., Draus, P., Goreva, N., Leone, G. and Caputo, D. (2015). A Multifactor Research Model of Antecedents of Security and Privacy in Healthcare Settings. Issues in Information Systems, 16(2), 168-175.
Wang, P. (2015, December). Project-based curricular service learning for cybersecurity education. National Cybersecurity Institute Journal, 2(3), 5-12.
Wang, W. (2015). Improving learning outcomes of textbook content with a supplementary learning module: A case for basic cryptology. Issues in Information Systems, 16(3), 172-182.
Acharya, S., Manohar, P.A., Wu, P.Y., Schilling, W.W., Ansari, A. (2014). Collaborative education: Building a skilled software verification and validation user community. Journal of Computers in Education, 5(4), 26-35.
Hartle, F., Parker, M., & Wydra, C. (2014). The digital case file: The future of fighting crime with big data. Issues in Information Systems, 15(I), 257-266.
Paullet, K., Davis, G. A., Wang, W. (2013). Cyber forensics and information security: A new and innovative bachelor’s degree program. Issues in Information Systems, 14(1), 244-250.
Monaco, J., Stewart, J., Cha, S-H, & Tappert, C. (2013). Behavioral biometric verification of student identity in online course assessment and authentication of authors of literary works. Proceedings of the Sixth Annual Conference on Biometrics Theory, Application, and Systems 2013, IEEE, Washington, DC, October 2013.
Laverty, J., Wood, D., Kohun, F., & Turchek, J. (2011). Comparative analysis of mobile application development and security models. Issues in Information Systems, XII(1), 301-312.
Laverty, J., Kohun, F., Wood, D., & Turchek, J. (2011). Vulnerabilities and threats to mobile device security from a practitioner’s point of view. Issues in Information Systems, XII(2), 181-193.
Wood, D., Kohun, F., Ali, A., Paullet, K., & Davis, G. (2010). Cyber Forensics and Security as an ABET CAC accreditable program. Information Systems Education Journal, 8(60), 1-12.
- Advisory Board Members
Dr. Jeff Daniels, Lockheed Martin Corporation
Dr. Maurice Dawson, Illinois Institute of Technology
Chris Johnson, PNC Bank
Dr. James Joshi, University of Pittsburgh
Dr. Johnson Kinyua, Penn State University Park
Matt Rosenberg, Allegheny County Police Mobile Forensic Unit
Dr. Raed Sbeit, Verizon Wireless
Dr. Steve Stone, The MITRE Corporation
Dr. Robert Young, The MITRE Corporation
- Outreach and Partnerships
RMU has established articulation agreements for student transfers with the following community colleges and other schools:
- Butler County Community College
- Community College of Allegheny County
- Community College of Beaver County
- Pittsburgh Technical Institute
- Westmoreland County Community College
RMU is a member of the National CyberWatch Center.
RMU also has a working partnership with CyberWatch West (CWW).