Housed in the B. Thomas Golisano College of Computing and Information Sciences, the department offers bachelor's and master's degrees in information technology, networking and systems administration, medical informatics, and a master’s degree in human computer interaction.
HistoryFormerly known as:
Information Sciences and Technologies Department
Dept. of Information Technology.
Documents from 2022
Evaluation of the Accessibility of Touchscreens for Individuals who are Blind or have Low Vision: Where to go from here, Elizabeth Codick
Documents from 2021
Documents from 2020
Data Warehouse performance comparing Relational Database Management Systems and the Hadoop-based NoSQL Database system, Nazar Al-Wattar
Implementing and Testing VLANs in Meshed Tree Protocol, Ankush Kaul
Human-in-the-Loop Learning From Crowdsourcing and Social Media, Tong Liu
Documents from 2019
Making Tricks More Accessible: Empowering Adults with Intellectual Disabilities to Create E-textiles, Taylor Gotfrid
e-NABLE: DIY-AT Production in a Multi-Stakeholder System, Jeremiah L. Parry-Hill
Documents from 2018
Design for Curiosity: A Study of Visual Design Elements, Interaction, and Motivation, Elaine Carole Montambeau
Documents from 2017
Evolution of the Museum Experience: Mobile Augmented Reality’s Impact on the Visitor Experience at an Outdoor Living Museum, Rita Locke Pettine
Information-Based Neighborhood Modeling, Marcelo Matus Nicodemos
Documents from 2016
E-Government in Amarah: Challenges and Recommendations for Future Implementation, Reem Jabbar Abdulbaqi
Effects of using iPad on First Grade Students' Achievements in Arabic Language Classes In Saudi Arabia, Jawaher Alsulami
Producing and Evaluating Crowdsourced Computer Security Attack Trees, Dan Bogaard, Sanjay Goel, Shreshth Kandari, Daryl Johnson, George Markowsky, and Bill Stackpole
DevOps and the Future of SysAdmin Education, Charles Border
An investigation of learning outcomes for MSc programs in Network and System Administration, Charles Border, Kyrre Begnum, and Niels Sijm
Factors Influencing Long-Term Adoption of Wearable Activity Trackers, Alessandra Regina David Brandao
The Importance of 3D Motion Trajectories for Computer-based Sign Recognition, Mark Dilsizian, Zhiqiang Tang, Dimitris Metaxas, Matt Huenerfauth, and Carol Neidle
Video QoS/QoE over IEEE802.11n/ac: A Contemporary Survey, Rebeen R. Hama Amin
Eyetracking Metrics Related to Subjective Assessments of ASL Animations, Matt Huenerfauth and Hernisa Kacorri
Covert Channel using Man-In-The-Middle over HTTPS, Matthew Johnson, Peter Lutz, and Daryl Johnson
Selecting Exemplar Recordings of American Sign Language Non-Manual Expressions for Animation Synthesis Based on Manual Sign Timing, Hernisa Kacorri and Matt Huenerfauth
Centroid-Based Exemplar Selection of ASL Non-Manual Expressions using Multidimensional Dynamic Time Warping and MPEG4 Features, Hernisa Kacorri, Ali Raza Syed, Matt Huenerfauth, and Carol Neidle
Effect of Speech Recognition Errors on Text Understandability for People who are Deaf or Hard of Hearing, Sushant Kafle and Matt Huenerfauth
Development of a Graduate Course on the Transition to Internet Protocol Version 6, Venu Gopal Kakarla
Mining Knowledge Bases for Question & Answers Websites, Eduardo Coelho de Lima
Ethical Inclusion of People with Disabilities through Undergraduate Computing Education, Stephanie Ludi, Vicki Hanson, and Matt Huenerfauth
Challenges and Opportunities in DFO-AT: A Study of e-NABLE, Jeremiah L. Parry-Hill and Daniel L. Ashbrook
Implementation of the meshed tree algorithm on a switched network, Kuhu Sharma
Learning for Cross-layer Resource Allocation in the Framework of Cognitive Wireless Networks, Wenbo Wang
Multi-Modality American Sign Language Recognition, Chenyang Zhang, Yingli Tian, and Matt Huenerfauth
Documents from 2015
Information Security Policy for E-government in Saudi Arabia: Effectiveness, Vulnerabilities and Threats, Khaled AlGarni
Mining News Content for Popularity Prediction, Moayad Alshangiti
Use Of Experts' Gaze By Novice Usability Practitioners To Perform A Better Heuristic Evaluation, Sree Anirudh J. Bhandaram
Inference from Structred and Unstructured Electronic Medical Data for Early Dementia Detection, Joseph Bullard, Rohan Murde, Qi Yu, and Cecilia Ovesdotter Alm
Best practices for conducting evaluations of sign language animation, Matt Huenerfauth and Hernisa Kacorri
Comparing Uncivil Discourse with a Conversational Intelligent Agent in Public and Private Online Settings, Mark Marcello
The Benefits of Hosting the NECCDC at Your Institution, George Markowsky, Peter Lutz, Daryl Johnson, and Bill Stackpole
TCP – Random Early Detection (RED) mechanism for Congestion Control, Asli Sungur
Documents from 2014
Development of a virtualization systems architecture course for the information sciences and technologies department at the Rochester Institute of Technology (RIT), Pooriya Aghaalitari
A Comparison Between International and US Graduate Students’ Attitudes and Experiences Using Massive Open Online Courses (MOOCs), Omar Ibrahim Asiri
Wisdom of Crowds or Mob Mentality, Catherine Beaton and Ronald P. Vullo
A Layer 2 Protocol to Protect the IP Communication in a Wired Ethernet Network, Reiner Augusto Campillo Terrero
An Analysis of Storage Virtualization, Nicholas Costa
Server-Based Desktop Virtualization, Anas Raqi Shabaitah
Social Networks as Command & Control Channels for Botnets, Adam St. Onge
Parasitic Databases, Svetlin Tzolov
Documents from 2013
How online learning can benefit deaf and heard of hearing people, Matthew Bilowus
User-Defined Key Pair Protocol, Omar Hassan
Real-Time Package Monitoring System using RFID And GPS Technologies, Vivek Ashwin Raman
Facebook policy and user knowledge: Self-inflicted totalitarianism, Richard Rockelmann Jr
Understanding Effects of Presentation on Concept Learning in Technology Supported Learning, Nivedita Singh
Discovering real-world usage scenarios for a multimodal math search interface, Keita Del Valle Wangari
Documents from 2012
Video game HUDs: Information presentation and spatial immersion, James Babu
Browser Web Storage Vulnerability Investigation: HTML5 localStorage Object, Dan Bogaard, Daryl Johnson, and Robert Parody
Covert Channel in the BitTorrent Tracker Protocol, Joseph Desimone, Daryl Johnson, Bo Yuan, and Peter Lutz
A Historical evaluation of C&C complexity, Conzetti Finocchiaro
A Covert Channel Over Transport Layer Source Ports, James Gimbi, Daryl Johnson, Peter Lutz, and Bo Yuan
A Comparison of two concurrent think-aloud protocols: Categories and relevancy of utterances, Katie Greiner
Forensic Acquisition and Analysis of VMware Virtual Hard Disks, Manish Hirwani, Yin Pan, Bill Stackpole, and Daryl Johnson
A Covert Channel in TTL Field of DNS Packets, Christopher Hoffman, Daryl Johnson, Bo Yuan, and Peter Lutz
Community Knowledge Sharing Wiki for Higher Education Information Technology Professionals, Joseph M. Karam
Developing Small Team-Based Cyber Security Exercises, Brandon Mauer, Bill Stackpole, and Daryl Johnson
Think aloud: Can eye tracking add value in detecting usability problems?, Alekhya Paruchuri
Employing Entropy in the Detection and Monitoring of Network Covert Channels, Chaim Sanders, Jacob Valletta, Bo Yuan, Daryl Johnson, and Peter Lutz
What is good enough for mobile system evaluation: A Comparison of laboratory and field setting, Yao Wang
Audio Steganography Using High Frequency Noise Introduction, David Wheeler, Daryl Johnson, Bo Yuan, and Peter Lutz
Documents from 2011
An Analysis of flow-based routing, Jennifer Casella
Correlating IPv6 addresses for network situational awareness, Jason Froehlich
An Analysis of the implementation-potential of the threaded engram database model, Sourabh Mehta
Mitigating the risk of social engineering attacks, Matthew Spinapolice
Addressing the gender gap in federal law enforcement professions: The motivational attraction of women in computing, Maegan Stanek
An Experiential comparative analysis of two remote usability testing methods, Erika Varga
Documents from 2010
Developing a taxonomy for office email: A Case study, Larry Conrow
Performance evaluation of multicast routing on IPv4 and IPv6 networks, Suneetha Hari
Investigating attributes - From technologist to business leader, Christopher Kronenthal
Addressing the gender gap: Teaching preadolescent girls computer networking concepts, Cynthia Strong
Documents from 2009
Designing a cell phone application to alert and report drinking water quality to South Africans, Deana Brown
Mobile web resource tracking during a disaster or crisis situation, Phavanhna Douangboupha
Analysis of virtual environments through a web based visualization tool, Ronald Valente
Documents from 2008
The Impact of internet social networking websites on the gay community: Behavior and identity, Michael Cinquanti
English language & third generation programming language pedagogical practice analysis, Vincent Falbo
Email overload in academia, Jeffrey D. Hole
Documents from 2007
The Manta Project: Conception, Implementation, and Reflections on a Cable Array Robot and its Interfaces, Brian Ballsun-Stanton
Using eye tracking to understand banner blindness and improve website design, Chad Lapa
Documents from 2006
Assessing the State of Web Accessibility, Laura Cook
Multi Protocol Label Switching: Quality of Service, Traffic Engineering application, and Virtual Private Network application, Akshay Joshi
Public Policy and Technology: Advancing Civilization at the Expense of Individual Privacy, Aaron D. Sanders
Documents from 2005
A formal process for the testing of servers, Scott Hancock
Effective Knowledge Management (KM) strategy within a business organization, Brian L. Roeder
Offshore Outsourcing: Is This Change in Corporate American Business as Smooth as What You Have Read?, Mary F. Tochelli
An Asymptotic Secrecy Model and its Applications in Sensor Networks, Bo Yuan
Documents from 2004
Delivering video services over IP networks, Huda Al-Habsi
Evaluating the Usability and Security of Wireless Networks, George E. Danilovics III
Knowledge management in a research & development environment - The Integration of company culture and technology, Duncan Y. Kemp
Network Disruption by Spoofing Service Attacks, Yadasiri Lertlit
Remote support technology for small business, Michael Luciano
Embedded Security Improvements to IPv6, Mark Merlino
Use of electric money in Japan, Tomoaki Miura