skip to main content
RIIT '15: Proceedings of the 4th Annual ACM Conference on Research in Information Technology
ACM2015 Proceeding
Publisher:
  • Association for Computing Machinery
  • New York
  • NY
  • United States
Conference:
SIGITE/RIIT '15: The 16th Annual Conference on Information Technology Education and the 4th Annual Conference on Research in Information Technology Chicago Illinois USA 30 September 2015- 3 October 2015
ISBN:
978-1-4503-3836-3
Published:
29 September 2015
Sponsors:

Reflects downloads up to 24 Oct 2024Bibliometrics
Skip Abstract Section
Abstract

Welcome to the 16th Annual Conference on Information Technology Education (SIGITE 2015) and the 4th Annual Conference on Research in Information Technology (RIIT 2015)! The theme this year is "Creating the Future", with a focus on the innovative approaches in information technology that continue to define and strengthen our field. What better place to convene than at DePaul University, where this occurs every day! In addition, Chicago offers waterfront parks, amazing architecture, a vibrant cultural scene and incredible cuisine, all within steps of the DePaul campus.

SIGITE/RIIT 2015 features a very insightful and inspiring program. As in past years, the synergies between research and education in information technology are prevalent, and several themes emerged from the accepted submissions. The technical areas of networking, mobile devices, security, and development continue to be popular with researchers; as does innovation in content, pedagogy and assessment.

This strong program would not have been possible without a pool of quality papers, panels, posters and lightning talks. The call for participation attracted 98 submissions, 72 of which were submitted to SIGITE and 26 to RIIT. Eighty of the submissions were papers, with 58 papers submitted to SIGITE and 22 papers submitted to RIIT. SIGITE has 24 papers in its program for an acceptance rate of 41% and RIIT has 10 papers for an acceptance rate of 45%. All of the authors presenting should be congratulated on their excellent work!

A conference relies on the assistance and expertise from a multitude of peer reviewers, and this year was no exception. Forty-five reviewers and two meta-reviewers worked diligently to ensure that every paper had at least three independent reviews and that, where divergences occurred, consensus was reached. Over 300 reviews were ultimately conducted which hopefully resulted in constructive feedback that has benefitted the authors regardless of the decision.

SIGITE/RIIT 2015 runs from Thursday to Saturday and is preceded by a Chicago Highlights Tour on Wednesday night and a Chairs Meeting and Oracle workshop on Thursday morning. The formal program begins on Thursday at noon with a keynote by Mike Shannon, a 2012 graduate of Illinois State University and co-founder of the Chicago-based Packback. This startup provides college students a variety of affordable eTextbook offerings and a platform for student-faculty engagement, and its founders appeared on ABC's "Shark Tank" in March 2014 where they reached an agreement with Mark Cuban. The program continues with a combination of papers and lightning talks on research in progress and concludes with a reception, which we know will be useful for networking with colleagues old and new. Friday features additional paper sessions and lightning talks for SIGITE and RIIT, a poster session in the afternoon, concluding with a reception for Community College educators. The conference closes on Saturday with more presentations and a final session where we will share plans for SIGITE/RIIT 2016 in picturesque New England!

I hope you find the conference compelling and motivating with opportunities to reconnect with colleagues you know, identify new collaborators, and leave with a commitment to research and innovation that will result in new submissions to SIGITE or RIIT next year. The excellence you see at SIGITE/RIIT 2015 depends on your participation and engagement and, on behalf of all that collaborated to make this happen, we thank you!

Skip Table Of Content Section
SESSION: RIIT Paper 1
research-article
Framework for Autonomous Delivery Drones

Traditional delivery services are a ubiquitous and key piece to our current commerce model, though the underlying technology is antiquated 20th century machinery, wasteful, and expensive. As an answer to these problems many companies have begun to ...

research-article
Information Technology Research in the Academy: Insights from Theses and Dissertations

The term "information technology" (IT) became an official classification keyword for ProQuest/UMI's Dissertations & Theses Global database in 2009. To better understand the place of IT research within academia, we analyze the network of keywords used in ...

SESSION: RIIT Lightning Talk 1
abstract
Evolution of Cybersecurity Issues In Small Businesses

Cybercrime is not only relevant to large corporations, but to the millions of small businesses in the United States. According to the US Small Business Administration and the Small Business Act, a small business is an independently owned entity and not ...

SESSION: RIIT Paper 2
research-article
Certification with Multiple Signatures

Certificate Authority (CA) is a single point of failure in the design of Public Key Infrastructure (PKI). A single compromised CA breaks the entire infrastructure. The disclosed CA key can be used by adversaries to issue rogue certificates for any ...

research-article
An Open-Source Honeynet System to Study System Banner Message Effects on Hackers

A honeynet system deploys a series of honeypots to answer vital questions about the activities of hackers on a network and can be used as a platform for direct experimentation to test criminological theory in an online environment. Often however, such ...

research-article
A Study on Botnets Utilizing DNS

Botnets represent a major and formidable threat in modern computing, and security researchers are engaged in constant and escalating battle with the writers of such malware to detect and mitigate it. Current advanced malware behaviors include encryption ...

SESSION: RIIT Paper 3
research-article
Defending Your Android App

In recent years, applications in the Google Play Store have been targets for attackers. Hackers have used a slew of techniques to analyze and modify Android developers' apps. Attackers are modifying app content so they can take advantage of unknowing ...

research-article
Secure and Smart Media Sharing Based on a Novel Mobile Device-to-Device Communication Framework with Security and Procedures

Cellular network service providers are trying to expand their capacity to accommodate the increasing mobile traffic demand by adopting new mobile technologies like user proximity based Device-to-Device (D2D) communication underlying existing Long Term ...

SESSION: RIIT Lightning Talk 2
abstract
Validating the Assessment Metrics for Mobile Health Apps: Preliminary Outcomes from a Pilot Study

In this paper, we validate six assessment metrics (usefulness, effectiveness, veracity, interactivity, customization, and user acceptability) for mobile health apps with 10 healthcare apps and 11 student evaluators. The preliminary results show that all ...

abstract
Developing Automated Input Generator for Android Mobile Device to Evaluate Malware Behavior

According to International Data Corporation (IDC), Android accounted for 81% of all smartphone shipments in the third quarter of 2013. With the increase in smartphones, mobile application installs from Google Play have reached more than 48 billion app ...

SESSION: RIIT Paper 4
research-article
A Man-in-the-Middle attack against OpenDayLight SDN controller

In this paper, we investigated the vulnerabilities surrounding software-defined networking (SDN). Specifically, we examined the vulnerabilities of OpenDayLight SDN controller. Among all the possible attack vectors, a man-in-the-middle attack using ARP ...

research-article
MP3 Steganography Techniques

The MP3 audio encoding format is currently one of the most popular encoding formats in use. On average, it takes significantly less space to store than, for example, a PCM-encoded WAV file, even though it retains most of the original, uncompressed audio ...

research-article
Studying the Effect of Multi-Query Functionality on a Correlation-Aware SQL-To-MapReduce Translator

The advent of Big Data has prompted numerous solutions that aim to meet the needs pertaining to data with high volume, veracity, velocity and variety properties. The exponential growth in data has dictated a simpler and more scalable environment with ...

Contributors
  • DePaul University
  • DePaul University

Index Terms

  1. Proceedings of the 4th Annual ACM Conference on Research in Information Technology
    Index terms have been assigned to the content through auto-classification.

    Recommendations

    Acceptance Rates

    RIIT '15 Paper Acceptance Rate 10 of 22 submissions, 45%;
    Overall Acceptance Rate 51 of 116 submissions, 44%
    YearSubmittedAcceptedRate
    RIIT '1711655%
    RIIT '1620945%
    RIIT '15221045%
    RIIT '14391436%
    RIIT '13241250%
    Overall1165144%