Annual Symposium on Information Assurance >> ASIA
Navigation Menu
ASIA Main Page
Call for Papers
Organizing Committee
Symposium Proceedings
Best Paper Awards
Keynote Speakers
Author/Presenter Info.
Reviewers
NYS Cyber Security Conf.
Directions & Parking
Accomodations
EISO Website
UAlbany Business Website
Pictures
Contact Us
Want to Sponsor?
End of Menu Facebook Twitter
Years for Selection: 2006 - 2007 - 2008 - 2009 - 2010 - 2011 - 2012 - 2013 - 2014

ORGANIZING COMMITTEE ASIA '14

GENERAL CHAIR

Sanjay Goel
Director of Research
NYS Center for Information Forensics and Assurance (CIFA)
Chair & Associate Professor, School of Business University at Albany, State University of New York
(518) 442-4925
goel (AT) albany (DOT) edu

PROGRAM CHAIR

Ali Alper Yayla
Assistant Professor
Management Information Systems
School of Management
Binghamton University - SUNY
ayayla (AT) binghamton.edu

ORGANIZATION CHAIR

Karen Sorady, CISSP, CRISC
Deputy Director, Enterprise Information Security Office
NYS Office of Information Technology Services
Karen.Sorady (AT) its.ny.gov

PROCEEDINGS CHAIR

Damira Pon
Senior Research Analyst
NYS Center for Information Forensics and Assurance
University at Albany, SUNY
damira (AT) gmail (DOT) com

REVIEW CHAIR

Yuan Hong
Assistant Professor
Information Technology Management
School of Business, University at Albany, SUNY
hong (AT) albany.edu

ADVISORY COMMITTEE

H. Raghav Rao, University at Buffalo, SUNY
Gurpreet Dhillon, Virginia Commonwealth University
Ingrid Fisher, University at Albany, SUNY
Merrill Warkentin, Mississippi State University
Nasir Memon, NYU Polytechnic
Raj Sharman, Univ. at Buffalo, SUNY

ADMINISTRATION SUPPORT

Ersin Dincelli
Research Analyst, CIFA
University at Albany, SUNY
edincelli (AT) albany.edu

2014 TECHNICAL PROGRAM COMMITTEE

Anil B. Somayaji, Carleton University, Canada
Arunabha Mukhopadhyay, IIM Lucknow
Ben Shao, Arizona State University
Bill Oblitey, Indiana University of Pennsylvania
Bill Stackpole, RIT
Bradley Malin, Vanderbilt University
Corey Schou, Idaho State University
Daniel Rice, Tech. Solutions Experts, Inc.
Daryl Johnson, RIT
Dipankar Dasgupta, University of Memphis
Douglas Maughan, Dept. of Homeland Security
Ernst Bekkering, Northeastern State University
Fabio R. Auffant, II, University at Albany, SUNY
Farookh Salam, UNC at Greensboro
Feng Chen, University at Albany, SUNY
Gaurav Bansal, University of Wisconsin
George Markowsky, University of Maine
Harris Weisman, RIT
Hoang Pham, Rutgers University
Hong C. Li, Intel Corporation
Jim Hoag, Champlain University
Jingguo Wang, UT at Arlington
Junjie Wu, Beihang University
Leon Reznik, RIT
Liyun Li, Linkedin
M.P. Gupta, Indian Institute of Technology, Delhi
Manish Gupta, UBuffalo, SUNY / M&T Bank
Mark Scanlon, University College Dublin
Martin Loeb, University of Maryland
Michael Oehler, l4311 Government Mitigations
Mohan Kankanhalli, National Univ. of Singapore
Murtuza Jadliwala, Wichita State University
Nan Zhang, George Washington University
Peter Stephenson, Norwich University
Petter Lovaas, Niagara University
Raghu Santanam, Arizona State University
Rick Mislan, RIT
Sanjay Misra, Federal Univ. of Technology, Minna
Shiu-Kai Chin, Syracuse University
Sylvia Perez-Hardy, RIT
Tae Oh, RIT
Tejaswani Herath, Brock University
Thu D. Nguyen, Rutgers University
W. Art Chaovalitwongse, Univ. of Washington
Wade Trappe, Rutgers University
Important Dates

If computers get too powerful, we can organize them into a committee - that will do them in.

- Bradley's Bromide

Quis custodiet ipsos custodes? (Latin for Who watches the watchers?)

- Juvenal, Roman poet

A hAx0r is a k3wl d00d, has l33t sKillZ with a r00t k1t and 0wNz y00. You too can be a hacker if you a.) read the "Buqtraq" mailing list but have no idea what any of it is about, b.) show your "mad skillz" by eventually figuring out how to download SNES ROMs and c.) have the requisite number of pimples.

- Jeffrey Carl