skip to main content
10.1145/2978178acmconferencesBook PagePublication PagesiteConference Proceedingsconference-collections
RIIT '16: Proceedings of the 5th Annual Conference on Research in Information Technology
ACM2016 Proceeding
Publisher:
  • Association for Computing Machinery
  • New York
  • NY
  • United States
Conference:
SIGITE/RIIT 2016: The 17th Annual Conference on Information Technology Education and the 5th Annual Conference on Research in Information Technology Boston Massachusetts USA 28 September 2016- 1 October 2016
ISBN:
978-1-4503-4453-1
Published:
28 September 2016
Sponsors:

Bibliometrics
Skip Abstract Section
Abstract

Welcome to the 17th Annual Conference on Information Technology Education (SIGITE 2016) and the 5th Annual Conference on Research in Information Technology (RIIT 2016)! The theme this year is "Securing the Future", with a focus on the need for employing secure practices in every aspect of information technology. It seems quite fitting that the conference be held in Boston where one of the first intelligence gathering networks (the "Mechanics" who spied on British soldiers) existed more than 200 years ago during the Revolutionary War. While certainly not digital in nature, that network demonstrated the value of social engineering and information gathering. That focus continues today as evidenced by several of the conference papers.

This year, 106 reviewers conducted a total of 422 reviews of 114 submissions of papers, panels, posters, lightning talks, and workshops. For RIIT, 9 of 20 papers were accepted for a 45% acceptance rate; for SIGITE, 26 of 67 papers were accepted for a 39% acceptance rate. A great deal of thanks goes to both the reviewers and, of course, the authors for their excellent work. Not surprisingly, the RIIT papers are overwhelmingly dominated by security topics ranging from users' perceptions to intrusion detection to attack vector analysis. While there are several security-related papers among the SIGITE offerings as well, you will also find papers on curriculum development, capstone ideas, and novel lab and classroom approaches among a variety of other IT education topics.

SIGITE/RIIT 2016 runs from Thursday to Saturday and is preceded by a world-famous Duck Tour of the Boston vicinity on Wednesday evening, as well as the annual Chairs and Program Directors Meeting and vendor workshops on Thursday morning. The formal program begins on Thursday at noon with a keynote by Nigel Jacob of the Boston Mayor's Office of New Urban Mechanics. The Office of Urban Mechanics was formed in 2010 to focus on improving city services. In particular, the Office is piloting efforts to create a "digital district", incorporating the latest information technology capabilities and bringing information technology awareness to young school children. Thursday afternoon, the program continues with a combination of papers and lightning talks on research in progress and concludes with a dinner reception for networking with colleagues old and new. Friday features additional paper sessions and lightning talks for SIGITE and RIIT, a poster session in the afternoon, and concludes with a reception for Community College educators. Those not attending the community college reception can find dinner at one of the many nearby restaurants. On Saturday morning the conference continues with additional papers and panels. Also this year, we will have two author-submitted workshops, one on Friday morning and the other one on Saturday morning. The conference concludes Saturday at noon.

Boston, friends, and lots of opportunities to share---all the necessary ingredients for a great experience. I hope to see you at SIGITE/RIIT 2016 where we can not only discuss "Securing Our Future", but we can also build new alliances for the future. Thank you!

Skip Table Of Content Section
SESSION: Keynote Address
invited-talk
Using Technology to Build Compassion

Technology is an incredible enabler for change. However, when we consider the uses of technology in an urban or community context, we need to take a human-centered approach that puts the needs of people ahead of the dependence on business models, ...

SESSION: C1: RIIT Paper Session
research-article
MP4 Steganography: Analyzing and Detecting TCSteg

The MP4 files has become to most used video media file available, and will mostly likely remain at the top for some time to come. This makes MP4 files an interesting candidate for steganography. With its size and structure, it offers a challenge to ...

research-article
Analysis of Parallel Architectures for Network Intrusion Detection

Intrusion detection systems need to be both accurate and fast. Speed is important especially when operating at the network level. Additionally, many intrusion detection systems rely on signature based detection approaches. However, machine learning can ...

research-article
Architecture-Driven Penetration Testing against an Identity Access Management (IAM) System

The purpose of this research is to propose architecture-driven, penetration testing equipped with a software reverse and forward engineering process. Although the importance of architectural risk analysis has been emphasized in software security, no ...

SESSION: C2: RIIT Paper Session
research-article
Measuring Stylus and Tablet Performance for Usability in Sketching

Touch-sensitive displays have become very popular with the advent of smartphones and tablets. Most smartphones and tablets are designed for multi-touch finger control. Displays with stylus or light pen input predate the modern multi-touch displays but ...

research-article
Effects of using iPads on First Grade Students' Achievements in Arabic Language Classes In Saudi Arabia

Although the iPad device has become a new trend as a teaching and learning tool in schools, using it in Saudi schools is still relatively new. The purpose of the study was to investigate whether teaching and learning with the iPad enhances Arabic ...

research-article
The Paradox of Social Media Security: Users' Perceptions versus Behaviors

Social networking sites have become major targets for cyber-security attacks due to their massive user base. Many studies investigated the security vulnerabilities and privacy issues of social networking sites and made recommendations on how to mitigate ...

SESSION: C3: RIIT Paper Session
research-article
Curiosity Killed the Organization: A Psychological Comparison between Malicious and Non-Malicious Insiders and the Insider Threat

Insider threats remain a significant problem within organizations, especially as industries that rely on technology continue to grow. Traditionally, research has been focused on the malicious insider; someone that intentionally seeks to perform a ...

research-article
In Search of Effective Honeypot and Honeynet Systems for Real-Time Intrusion Detection and Prevention

A honeypot is a deception tool for enticing attackers to make efforts to compromise the electronic information systems of an organization. A honeypot can serve as an advanced security surveillance tool for use in minimizing the risks of attacks on ...

research-article
Investigating the Security of Nexus 1000V Virtual Switches in VMware ESXi Hypervisors

In this paper, the security posture of two versions of the Cisco Nexus 1000V virtual switch is tested against a set of exploits known to be valid on physical switching infrastructure. Specifically, the Nexus 1000V as implemented with VMware's ESXi ...

SESSION: C4: RIIT Lightning Talk Session
abstract
Public Access
Impact of the Physical Web and BLE Beacons

The Physical Web is a project announced by Google's Chrome team that essentially provides a framework to discover "smart" physical objects (e.g. vending machines, classroom, conference room, cafeteria etc.) and interact with specific, contextual content ...

POSTER SESSION: C5: RIIT Posters
poster
Public Access
Active Snort Rules and the Needs for Computing Resources: Computing Resources Needed to Activate Different Numbers of Snort Rules

This project was designed to discover the relationship between the number of enabled rules maintained by Snort and the amount of computing resources necessary to operate this intrusion detection system (IDS) as a sensor. A physical environment was set ...

poster
"Wait, Do I Know You?": A Look at Personality and Preventing One's Personal Information from being Compromised

We examine the role personality may play in individuals taking the measures necessary to help keep their personal information from being compromised. This is done by using a previously developed and validated survey instrument and combining it with ...

Contributors
  • Rochester Institute of Technology
Index terms have been assigned to the content through auto-classification.

Recommendations

Acceptance Rates

RIIT '16 Paper Acceptance Rate9of20submissions,45%Overall Acceptance Rate51of116submissions,44%
YearSubmittedAcceptedRate
RIIT '1711655%
RIIT '1620945%
RIIT '15221045%
RIIT '14391436%
RIIT '13241250%
Overall1165144%