One can contribute to their field of study and practice in a variety of ways, each with pros and cons, and varying degrees of quality/applicability. I break up my research based contributions into the following categories: peer reviewed, white papers, professional projects, educational projects, and other.
Peer Reviewed
Peer reviewed articles are considered to be the highest quality of research, as they have been vetted by other experts in the field (in other words, you don't just take my word that it is good, you also have a peer reviewers word that it is good too).
- (link)Kreider, Christopher and El-Gayar, Omar, "Reconceptualizing Knowledge Based Authentication for Augmented and Virtual Reality Contexts" (2022). AMCIS 2022 Proceedings. 22.
https://aisel.aisnet.org/amcis2022/sig_sec/sig_sec/22
- (link)Kreider, Christopher and El-Gayar, Omar, "A Decade in Review: Aligning Information Systems Security (ISS) with the NICE framework" (2022). AMCIS 2022 Proceedings. 6.
https://aisel.aisnet.org/amcis2022/sig_meta/sig_meta/6
- (link)Holt, M., Kreider, T., Kreider, S., Kreider, J., & Kreider, C. (2022). An Exploration of Wikipedia Contributions in the Era of COVID-19. The Journal of the Southern Association for Information Systems, 9(2), 72-84.
- (link)Kaufman, Jonathan and Kreider, Christopher, "ACCOUNTS THAT NEVER EXPIRE: AN EXPLORATION INTO PRIVILEGED ACCOUNTS ON WIKIPEDIA" (2022). SAIS 2022 Proceedings. 39.
- (link)Souders, A. A., Almalag, M. S., & Kreider, C. (2021, December). Personalized Route Navigation System: Utilizing Available Static and Live Data for Preference-Based Recommendation. In 2021 IEEE Global Conference on Artificial Intelligence and Internet of Things (GCAIoT) (pp. 62-68). IEEE.
- (link)Kreider, Christopher (2021) "A Decade in Review: An Exploration of the Level of Analysis and the Subjects for Information Systems Security (ISS) Research," The Journal of the Southern Association for Information Systems: Vol. 8 : Iss. 1 , Article 4.
- (link)Suscello, Nicole; Kreider, Christopher; Phelps, William; and Almalag, Mohammad, "Reducing Risk of Password Reuse through Random Character Requirements and Image Prompting" (2021). MWAIS 2021 Proceedings. 21.
- (link)Reed, Eric; Kreider, Christopher; Almalag, Mohammad; and Perkins, Keith, "A Framework for Describing Alternative Keyboard Structures in Augmented Reality", 23rd Annual Conference of the Southern Association for Information Systems 2020
- (link)Kreider, Christopher and Almalag, Mohammad, "Quantifying Program Offerings with a Cybersecurity Education Maturity Model", SAIS 2020
- (link)Kreider, Christopher and Almalag, Mohammad. "A Framework for Cybersecurity Gap Analysis in Higher Education", SAIS 2019
- (link)Kreider, Christopher. "An Exploration of Countermeasures for Augmented Reality Shoulder Surfing Attacks", SAIS 2019
- (linkl)Kreider, Christopher. "Revisiting Request for Adminship (RFA) Ten Years Later: How Do User Contributions Relate To Longevity In Wikipedia", SAIS 2019
- (link)Kreider, Christopher. "The Discoverability of Password Entry Using Virtual Keyboards in an Augmented Reality wearable: An Initial Proof of Concept, SAIS 2018
- (link)Kreider, Christopher. "Applying the Technology Acceptance Model (TAM) To Automatic Grading Technology for Large Projects" SAIS. 2017
- (link)Kordzadah, Nima and Kreider, Christopher. “Revisiting Request for Adminship (RFA) within Wikipedia: How Do User Contributions Instill Community Trust?”, Journal of the Southern Association for Information Systems (4:1), 2016
- (link)Kreider, Christopher, and Nima Kordzadeh. "Request for Adminship (RFA) within Wikipedia: How Do User Contributions Instill Community Trust?." SAIS. 2015
- (link)Rahman, Mohammed, and Christopher Kreider. "Information Security Principles for Electronic Medical Record (EMR) Systems." AMCIS. 2012.
- (link)Kreider, Christopher, and V. S. Rao. "User Acceptance of Multiple Password Systems: A Proposed Study." AMCIS. 2010.
Thesis Committees
I have the great honor (and responsibility) to work with students in CNU's 5 years masters program. I primarily focus on security related work, and projects that have a security related component
- (Committee Member) Daniel Sims - END-TO-END MODULAR BIOMEDICAL ENQUIRY RESPONDER (EMBER) & EVALUATION FRAMEWORK - Defended 2022
- (Committee Member) Alec Souders - PERSONALIZED ROUTE NAVIGATION SYSTEM: UTILIZING AVAILABLE STATIC AND LIVE DATA FOR PREFERENCE-BASED RECOMMENDATION - Defended 2021
- (Committee Member) Anne Haley - USER-CENTERED ANALYSIS AND DEVELOPMENT OF AN APPLICATION PROGRAMMING INTERFACE AND USER INTERFACE FOR NASA LANGLEY’S SMARTLAB - Defended 2021
- (Committee Chair) Nicole Suscello - "Reducing Risk of Password Reuse Through Random Character Requirements and Image Prompting" - Defended 2021
- (Committee Chair) Eric Reed - "The Use of Alternative Keyboard Structures to Prevent Shoulder Surfing Attacks in Augmented Reality" - Defended 2020
Awards
Research and other educational endeavors that have received an award.
- SAIS 2020: Best in Track Paper: for "A Framework for Describing Alternative Keyboard Structures in Augmented Reality
- 2nd Annual Virginia Cybersecurity Education Conference, 2019:3rd Place Capture the Flag Competition
- 1st Annual Virginia Cybersecurity Education Conference, 2018:1st Place Capture the Flag Competition
- SAIS 2015: Best Paper: for "Request for Adminship (RFA) within Wikipedia: How Do User Contributions Instill Community Trust?."
Professional Presentations/Poster Sessions
Individual Presentations
Professional presentations are work that has been created and presented to either academic or prpofessional groups, that has not undergone peer review.
- Kreider, Christopher, "Election Security: A Brief History, and a Summary of the Current Election Related Activity", Presented at CNU PCSE699 Research Seminar, November 2020
- Kreider, Christopher, "Designing Capture the Flag (CTF) Uasing the Virginia Cyberrange to Provide Contestants Individual Environments", 2nd Annual Virginia Cybersecurity Education Conference, 2019
- Kreider, Christopher, "Shoulder Surfing Attacks in Augmented Reality", Poster Presented at Commonwealth Cyber Initiave Workgroup Meeting, 2019
- Kreider, Christopher, "BGP Hijacking Demo - A Hands on live demonstration of a BGP Hijacking Attack", Virginia ISC2/ITSPA Peninsula Chapter, 2019
- Kreider, Christopher, "Something Old + Something New - Security Considerations When Applying Old Technologies to New Technologies", Virginia ISC2/ITSPA Peninsula Chapter, 2018
Supervised Presentations
Whenever possible, I encourage my students to present their research at a conference or professional organization. Below are some of the presentations I have worked with students to present
- Kaufman, Jonathan. "Networking and Network Security 101". Presented at the Peninsula ISC2 Chapter Meeting, June 2021
- Suscello, Nicole. Presenting Results of "Reducing Risk of Password Reuse through Random Character Requirements and Image Prompting" presented at the Peninsula ISC2 Chapter Meeting, May 2021
- Kreider, Joel. "An Overview of Ransomware and the Colonial Pipeline Attack". Presented at the Peninsula ISC2 Chapter Meeting, May 2021
Professional Projects
Professional projects that fall into this category represent new and novel uses of technology in professional environments that go above and beyond the existing and or expected use of technologies, and required significant amount of intellectal contribution on my behalf (e.g. there was not an ehow article that I followed, but I actually engineered and designed a majority of the system)
- AWS Hosting Unification and Migration
- Statistical Process Control - Anomolous Package Contents Detection
- RaspberryPi Mobile Auditing Scale
- RaspberryPi WiFi Textual Pager (Demo presented at talk at STEM academy in Savannah)
- RaspberryPi WiFi Enabled Scale Stabalization Game (Demo presented at STEM academy in Savannah)
Educational Projects
Eductional projects that fall into this category represent a significant application of an educational concept in a way such that its use is origina/novel, or of large enough scope to be considered an unique application. These types of projects include capstone projects, special topics projects, or unpublished application related to doctoral seminars
- Housing Management System - CNU Capstone Project
- Password Entropy Calculator utilizing spacial keyboard character locations
- Wikipedia Edit counter and admin statistics gathering
- Android App for mobile micro retailer
Other
There are many ways to contribute to a field of study, and they may not always be neatly categorized into the above categories (maybe I could research some new categories?) Either way, this category is designed to house other things that I felt represented a unique contribution to the discipine/field but did not fit neatly in any of the above categories.