Housed in the B. Thomas Golisano College of Computing and Information Sciences, the department offers bachelor's and master's degrees in information technology, networking and systems administration, medical informatics, and a master’s degree in human computer interaction.

History

Formerly known as the Dept. of Information Technology.

Follow

Documents from 2016

PDF

E-Government in Amarah: Challenges and Recommendations for Future Implementation, Reem Jabbar Abdulbaqi

PDF

Effects of using iPad on First Grade Students' Achievements in Arabic Language Classes In Saudi Arabia, Jawaher Alsulami

PDF

An investigation of learning outcomes for MSc programs in Network and System Administration, Charles Border, Kyrre Begnum, and Niels Sijm

PDF

Factors Influencing Long-Term Adoption of Wearable Activity Trackers, Alessandra Regina David Brandao

PDF

Video QoS/QoE over IEEE802.11n/ac: A Contemporary Survey, Rebeen R. Hama Amin

PDF

Development of a Graduate Course on the Transition to Internet Protocol Version 6, Venu Gopal Kakarla

PDF

Mining Knowledge Bases for Question & Answers Websites, Eduardo Coelho de Lima

PDF

Challenges and Opportunities in DFO-AT: A Study of e-NABLE, Jeremiah L. Parry-Hill and Daniel L. Ashbrook

PDF

Implementation of the meshed tree algorithm on a switched network, Kuhu Sharma

PDF

Learning for Cross-layer Resource Allocation in the Framework of Cognitive Wireless Networks, Wenbo Wang

Documents from 2015

PDF

Information Security Policy for E-government in Saudi Arabia: Effectiveness, Vulnerabilities and Threats, Khaled AlGarni

PDF

Mining News Content for Popularity Prediction, Moayad Alshangiti

PDF

Use Of Experts' Gaze By Novice Usability Practitioners To Perform A Better Heuristic Evaluation, Sree Anirudh J. Bhandaram

PDF

Inference from Structred and Unstructured Electronic Medical Data for Early Dementia Detection, Joseph Bullard, Rohan Murde, Qi Yu, and Cecilia Ovesdotter Alm

PDF

Best practices for conducting evaluations of sign language animation, Matt Huenerfauth and Hernisa Kacorri

PDF

Comparing Uncivil Discourse with a Conversational Intelligent Agent in Public and Private Online Settings, Mark Marcello

PDF

The Benefits of Hosting the NECCDC at Your Institution, George Markowsky, Peter Lutz, Daryl Johnson, and Bill Stackpole

PDF

TCP – Random Early Detection (RED) mechanism for Congestion Control, Asli Sungur

Documents from 2014

PDF

Development of a virtualization systems architecture course for the information sciences and technologies department at the Rochester Institute of Technology (RIT), Pooriya Aghaalitari

PDF

A Comparison Between International and US Graduate Students’ Attitudes and Experiences Using Massive Open Online Courses (MOOCs), Omar Ibrahim Asiri

PDF

Wisdom of Crowds or Mob Mentality, Catherine Beaton and Ronald P. Vullo

PDF

A Layer 2 Protocol to Protect the IP Communication in a Wired Ethernet Network, Reiner Augusto Campillo Terrero

PDF

An Analysis of Storage Virtualization, Nicholas Costa

PDF

Server-Based Desktop Virtualization, Anas Raqi Shabaitah

PDF

Social Networks as Command & Control Channels for Botnets, Adam St. Onge

PDF

Parasitic Databases, Svetlin Tzolov

Documents from 2013

PDF

How online learning can benefit deaf and heard of hearing people, Matthew Bilowus

PDF

User-Defined Key Pair Protocol, Omar Hassan

PDF

Real-Time Package Monitoring System using RFID And GPS Technologies, Vivek Ashwin Raman

PDF

Facebook policy and user knowledge: Self-inflicted totalitarianism, Richard Rockelmann Jr

PDF

Understanding Effects of Presentation on Concept Learning in Technology Supported Learning, Nivedita Singh

PDF

Discovering real-world usage scenarios for a multimodal math search interface, Keita Del Valle Wangari

Documents from 2012

PDF

Video game HUDs: Information presentation and spatial immersion, James Babu

PDF

Browser Web Storage Vulnerability Investigation: HTML5 localStorage Object, Daniel Bogaard, Daryl Johnson, and Robert Parody

PDF

Covert Channel in the BitTorrent Tracker Protocol, Joseph Desimone, Daryl Johnson, Bo Yuan, and Peter Lutz

PDF

A Historical evaluation of C&C complexity, Conzetti Finocchiaro

PDF

A Covert Channel Over Transport Layer Source Ports, James Gimbi, Daryl Johnson, Peter Lutz, and Bo Yuan

PDF

A Comparison of two concurrent think-aloud protocols: Categories and relevancy of utterances, Katie Greiner

PDF

Forensic Acquisition and Analysis of VMware Virtual Hard Disks, Manish Hirwani, Yin Pan, Bill Stackpole, and Daryl Johnson

PDF

A Covert Channel in TTL Field of DNS Packets, Christopher Hoffman, Daryl Johnson, Bo Yuan, and Peter Lutz

PDF

Community Knowledge Sharing Wiki for Higher Education Information Technology Professionals, Joseph M. Karam

PDF

Developing Small Team-based Cyber Security Exercises, Brandon Mauer, William Stackpole, and Daryl Johnson

PDF

Think aloud: Can eye tracking add value in detecting usability problems?, Alekhya Paruchuri

PDF

Employing Entropy in the Detection and Monitoring of Network Covert Channels, Chaim Sanders, Jacob Valletta, Bo Yuan, and Daryl Johnson

PDF

What is good enough for mobile system evaluation: A Comparison of laboratory and field setting, Yao Wang

PDF

Audio Steganography Using High Frequency Noise Introduction, David Wheeler, Daryl Johnson, Bo Yuan, and Peter Lutz

Documents from 2011

PDF

An Analysis of flow-based routing, Jennifer Casella

PDF

Correlating IPv6 addresses for network situational awareness, Jason Froehlich

PDF

An Analysis of the implementation-potential of the threaded engram database model, Sourabh Mehta

PDF

Mitigating the risk of social engineering attacks, Matthew Spinapolice

PDF

Addressing the gender gap in federal law enforcement professions: The motivational attraction of women in computing, Maegan Stanek

PDF

An Experiential comparative analysis of two remote usability testing methods, Erika Varga

Documents from 2010

PDF

Developing a taxonomy for office email: A Case study, Larry Conrow

PDF

Performance evaluation of multicast routing on IPv4 and IPv6 networks, Suneetha Hari

PDF

Investigating attributes - From technologist to business leader, Christopher Kronenthal

PDF

Addressing the gender gap: Teaching preadolescent girls computer networking concepts, Cynthia Strong

Documents from 2009

PDF

Designing a cell phone application to alert and report drinking water quality to South Africans, Deana Brown

PDF

Mobile web resource tracking during a disaster or crisis situation, Phavanhna Douangboupha

PDF

Analysis of virtual environments through a web based visualization tool, Ronald Valente

Documents from 2008

PDF

The Impact of internet social networking websites on the gay community: Behavior and identity, Michael Cinquanti

PDF

English language & third generation programming language pedagogical practice analysis, Vincent Falbo

PDF

Email overload in academia, Jeffrey D. Hole

Documents from 2007

PDF

The Manta Project: Conception, Implementation, and Reflections on a Cable Array Robot and its Interfaces, Brian Ballsun-Stanton

PDF

Using eye tracking to understand banner blindness and improve website design, Chad Lapa

Documents from 2006

PDF

Recommendations for a comprehensive identity theft victimization survey framework and information technology prevention strategies, Sara Berg

PDF

Assessing the State of Web Accessibility, Laura Cook

PDF

Multi Protocol Label Switching: Quality of Service, Traffic Engineering application, and Virtual Private Network application, Akshay Joshi

PDF

Public Policy and Technology: Advancing Civilization at the Expense of Individual Privacy, Aaron D. Sanders

Documents from 2005

PDF

A formal process for the testing of servers, Scott Hancock

PDF

Effective Knowledge Management (KM) strategy within a business organization, Brian L. Roeder

PDF

Offshore Outsourcing: Is This Change in Corporate American Business as Smooth as What You Have Read?, Mary F. Tochelli

PDF

An Asymptotic secrecy model and its applications in sensor networks, Bo Yuan

Documents from 2004

PDF

Delivering video services over IP networks, Huda Al-Habsi

PDF

Standards, policies and cultural pluralism promoting strategies for achieving competitive advantage supporting the future of Information Technology, Gary D. Clarke

PDF

Evaluating the Usability and Security of Wireless Networks, George E. Danilovics III

PDF

Knowledge management in a research & development environment - The Integration of company culture and technology, Duncan Y. Kemp

PDF

Network Disruption by Spoofing Service Attacks, Yadasiri Lertlit

PDF

Remote support technology for small business, Michael Luciano

PDF

Embedded Security Improvements to IPv6, Mark Merlino

PDF

Use of electric money in Japan, Tomoaki Miura

PDF

Web Radio Blueprint, Michael P. Moran

PDF

The Evolution, current status, and future direction of XML, Christina Ann Oak

PDF

The Design of interface and function of cellular phones for old people, Yusuke Oda

PDF

Performance analysis of self-organized Ad-Hoc sensor networks, Venkateswararao Oruganti

PDF

The Determinants and implications of customer satisfaction and loyalty in web-based commerce: An Empirical analysis, Samuel Otim

PDF

The Usability of online payroll marketing websites., Maria Stella Plutino

PDF

The Semantic Web … Sounds Logical!, Anthony J. Radogna Jr

PDF

Data limitations can be overcome to move toward effective business system integration, Paul G. Ruganis

PDF

Rationale for user oriented design technique selection, Susan M. Saeger

PDF

Use of system dynamics and Easel for simulation of the software development process, Alicia Strupp

PDF

Migration from Windows to Linux for a small engineering firm "A&G Associates", Trimbak Vohra

Documents from 2003

PDF

Mobile commerce business models and technologies towards success, Pinar Acar

PDF

The U.S. M-Business Market: Fad or the future, Gary Brennan

PDF

A Framework to assess the value of web services, Robert Campbell

PDF

When traditional advocacy goes high-tech, Teresa Carroll

PDF

The Direction of mobile evolution examined through the NTT DoCoMo strategy, "Mobile Frontier", Akihiro Kakimoto

PDF

The Impact of Information Technology on Mass Customization, Josephice M. Lim

Secure Wireless Networking Implemented at a Manufacturing Facility, Paul T. Scully

PDF

The Broadband Impact: Asymmetric Regulations Restrict Growth, Brent P. Thurn

PDF

IP Telephony: The Total solution guide, Todd Wilson