Housed in the B. Thomas Golisano College of Computing and Information Sciences, the department offers bachelor's and master's degrees in information technology, networking and systems administration, medical informatics, and a master’s degree in human computer interaction.

History

Formerly known as:
Information Sciences and Technologies Department
Dept. of Information Technology.

Follow

Documents from 2025

PDF

Understanding the Experiences of People With and Without Vision Impairments When Using Mobile User Interface Alternative Color Modes, Sarah Andrew and Garreth W. Tigwell

PDF

SoundHapticsVR: Head-Based Spatial Haptic Feedback for Accessible Sounds in Virtual Reality for Deaf and Hard of Hearing Users, Pratheep Kumar Chelladurai

PDF

A Decision Support System for Global Vaccine Funding: Data-Driven Proposal Scoring, Epidemiological Risk Modeling, and Portfolio Optimization, Ashutosh Kumar

PDF

Enhancing in-car interaction: Analyzing Deaf and Hard-of-Hearing Drivers’ Usage, and Interaction with Voice-controlled In-car Infotainment System, Sanskriti Kumar

PDF

Exploring Deaf And Hard of Hearing Peoples' Perspectives On Tasks In Augmented Reality: Interacting With 3D Objects And Instructional Comprehension, Sanzida Mojib Luna, Jiangnan Xu, Garreth W. Tigwell, Nicolas LaLone, Michael Saker, Alan Chamberlain, David I. Schwartz, and Konstantinos Papangelis

PDF

Exploring the Perception of Dynamic Electrotactile Patterns on the Fingertips, Vedika Nimbalkar

PDF

Investigating the Intersection of Cultural Design Preferences and Web Accessibility Guidelines with Designers from the Global South, Laleh Nourian, Vinaya Hanumant Naikar, Kristen Shinohara, and Garreth W. Tigwell

PDF

Visualizing the Dynamics of Neuroevolution with Genetic Distance Projections, Evan Patterson

PDF

Understanding the Interplay Between the Digital and the Physical in Shared Augmented Reality Gaming: Probing through Urban Legends, Jiangnan Xu, Sanzida Mojib Luna, Garreth W. Tigwell, Nicolas Lalone, Michael Saker, Samuli Laato, John Dunham, Yihong Wang, Alan Chamberlain, and Konstantinos Papangelis

Documents from 2024

PDF

Light and Dark Mode: A Comparison Between Android and iOS App UI Modes and Interviews with App Designers and Developers, Sarah Andrew, Chelsea Bishop, and Garreth W. Tigwell

PDF

Making Social Interactions Accessible for the Blind and Low-Vision People by Detecting Emotions through Vocal Tone, Facial Expressions, and Body Language, Gautham Krishna

Documents from 2023

PDF

Haptic2FA: A haptic-based 2-factor authentication method for blind and low-vision users, Palavi Vinod Bhole

Documents from 2022

PDF

Evaluation of the Accessibility of Touchscreens for Individuals who are Blind or have Low Vision: Where to go from here, Elizabeth Codick

Documents from 2021

PDF

GuavaNet: A deep neural network architecture for automatic sensory evaluation to predict degree of acceptability for Guava by a consumer, Vipul Mehra

Documents from 2020

PDF

Data Warehouse performance comparing Relational Database Management Systems and the Hadoop-based NoSQL Database system, Nazar Al-Wattar

PDF

Implementing and Testing VLANs in Meshed Tree Protocol, Ankush Kaul

PDF

Human-in-the-Loop Learning From Crowdsourcing and Social Media, Tong Liu

Documents from 2019

PDF

Making Tricks More Accessible: Empowering Adults with Intellectual Disabilities to Create E-textiles, Taylor Gotfrid

PDF

e-NABLE: DIY-AT Production in a Multi-Stakeholder System, Jeremiah L. Parry-Hill

Documents from 2018

PDF

Design for Curiosity: A Study of Visual Design Elements, Interaction, and Motivation, Elaine Carole Montambeau

Documents from 2017

PDF

Evolution of the Museum Experience: Mobile Augmented Reality’s Impact on the Visitor Experience at an Outdoor Living Museum, Rita Locke Pettine

PDF

Information-Based Neighborhood Modeling, Marcelo Matus Nicodemos

Documents from 2016

PDF

E-Government in Amarah: Challenges and Recommendations for Future Implementation, Reem Jabbar Abdulbaqi

PDF

Effects of using iPad on First Grade Students' Achievements in Arabic Language Classes In Saudi Arabia, Jawaher Alsulami

PDF

Producing and Evaluating Crowdsourced Computer Security Attack Trees, Dan Bogaard, Sanjay Goel, Shreshth Kandari, Daryl Johnson, George Markowsky, and Bill Stackpole

PDF

DevOps and the Future of SysAdmin Education, Charles Border

PDF

An investigation of learning outcomes for MSc programs in Network and System Administration, Charles Border, Kyrre Begnum, and Niels Sijm

PDF

Factors Influencing Long-Term Adoption of Wearable Activity Trackers, Alessandra Regina David Brandao

PDF

The Importance of 3D Motion Trajectories for Computer-based Sign Recognition, Mark Dilsizian, Zhiqiang Tang, Dimitris Metaxas, Matt Huenerfauth, and Carol Neidle

PDF

Video QoS/QoE over IEEE802.11n/ac: A Contemporary Survey, Rebeen R. Hama Amin

PDF

Eyetracking Metrics Related to Subjective Assessments of ASL Animations, Matt Huenerfauth and Hernisa Kacorri

PDF

Covert Channel using Man-In-The-Middle over HTTPS, Matthew Johnson, Peter Lutz, and Daryl Johnson

PDF

Selecting Exemplar Recordings of American Sign Language Non-Manual Expressions for Animation Synthesis Based on Manual Sign Timing, Hernisa Kacorri and Matt Huenerfauth

PDF

Centroid-Based Exemplar Selection of ASL Non-Manual Expressions using Multidimensional Dynamic Time Warping and MPEG4 Features, Hernisa Kacorri, Ali Raza Syed, Matt Huenerfauth, and Carol Neidle

PDF

Effect of Speech Recognition Errors on Text Understandability for People who are Deaf or Hard of Hearing, Sushant Kafle and Matt Huenerfauth

PDF

Development of a Graduate Course on the Transition to Internet Protocol Version 6, Venu Gopal Kakarla

PDF

Mining Knowledge Bases for Question & Answers Websites, Eduardo Coelho de Lima

PDF

Ethical Inclusion of People with Disabilities through Undergraduate Computing Education, Stephanie Ludi, Vicki Hanson, and Matt Huenerfauth

PDF

Challenges and Opportunities in DFO-AT: A Study of e-NABLE, Jeremiah L. Parry-Hill and Daniel L. Ashbrook

PDF

Implementation of the meshed tree algorithm on a switched network, Kuhu Sharma

PDF

Learning for Cross-layer Resource Allocation in the Framework of Cognitive Wireless Networks, Wenbo Wang

PDF

Multi-Modality American Sign Language Recognition, Chenyang Zhang, Yingli Tian, and Matt Huenerfauth

Documents from 2015

PDF

Information Security Policy for E-government in Saudi Arabia: Effectiveness, Vulnerabilities and Threats, Khaled AlGarni

PDF

Mining News Content for Popularity Prediction, Moayad Alshangiti

PDF

Use Of Experts' Gaze By Novice Usability Practitioners To Perform A Better Heuristic Evaluation, Sree Anirudh J. Bhandaram

PDF

Inference from Structred and Unstructured Electronic Medical Data for Early Dementia Detection, Joseph Bullard, Rohan Murde, Qi Yu, and Cecilia Ovesdotter Alm

PDF

Best practices for conducting evaluations of sign language animation, Matt Huenerfauth and Hernisa Kacorri

PDF

Comparing Uncivil Discourse with a Conversational Intelligent Agent in Public and Private Online Settings, Mark Marcello

PDF

The Benefits of Hosting the NECCDC at Your Institution, George Markowsky, Peter Lutz, Daryl Johnson, and Bill Stackpole

PDF

TCP – Random Early Detection (RED) mechanism for Congestion Control, Asli Sungur

Documents from 2014

PDF

Development of a virtualization systems architecture course for the information sciences and technologies department at the Rochester Institute of Technology (RIT), Pooriya Aghaalitari

PDF

A Comparison Between International and US Graduate Students’ Attitudes and Experiences Using Massive Open Online Courses (MOOCs), Omar Ibrahim Asiri

PDF

Wisdom of Crowds or Mob Mentality, Catherine Beaton and Ronald P. Vullo

PDF

A Layer 2 Protocol to Protect the IP Communication in a Wired Ethernet Network, Reiner Augusto Campillo Terrero

PDF

An Analysis of Storage Virtualization, Nicholas Costa

PDF

Server-Based Desktop Virtualization, Anas Raqi Shabaitah

PDF

Social Networks as Command & Control Channels for Botnets, Adam St. Onge

PDF

Parasitic Databases, Svetlin Tzolov

Documents from 2013

PDF

How online learning can benefit deaf and heard of hearing people, Matthew Bilowus

PDF

User-Defined Key Pair Protocol, Omar Hassan

PDF

Real-Time Package Monitoring System using RFID And GPS Technologies, Vivek Ashwin Raman

PDF

Facebook policy and user knowledge: Self-inflicted totalitarianism, Richard Rockelmann Jr

PDF

Understanding Effects of Presentation on Concept Learning in Technology Supported Learning, Nivedita Singh

PDF

Discovering real-world usage scenarios for a multimodal math search interface, Keita Del Valle Wangari

Documents from 2012

PDF

Video game HUDs: Information presentation and spatial immersion, James Babu

PDF

Browser Web Storage Vulnerability Investigation: HTML5 localStorage Object, Dan Bogaard, Daryl Johnson, and Robert Parody

PDF

Covert Channel in the BitTorrent Tracker Protocol, Joseph Desimone, Daryl Johnson, Bo Yuan, and Peter Lutz

PDF

A Historical evaluation of C&C complexity, Conzetti Finocchiaro

PDF

A Covert Channel Over Transport Layer Source Ports, James Gimbi, Daryl Johnson, Peter Lutz, and Bo Yuan

PDF

A Comparison of two concurrent think-aloud protocols: Categories and relevancy of utterances, Katie Greiner

PDF

Forensic Acquisition and Analysis of VMware Virtual Hard Disks, Manish Hirwani, Yin Pan, Bill Stackpole, and Daryl Johnson

PDF

A Covert Channel in TTL Field of DNS Packets, Christopher Hoffman, Daryl Johnson, Bo Yuan, and Peter Lutz

PDF

Community Knowledge Sharing Wiki for Higher Education Information Technology Professionals, Joseph M. Karam

PDF

Developing Small Team-Based Cyber Security Exercises, Brandon Mauer, Bill Stackpole, and Daryl Johnson

PDF

Think aloud: Can eye tracking add value in detecting usability problems?, Alekhya Paruchuri

PDF

Employing Entropy in the Detection and Monitoring of Network Covert Channels, Chaim Sanders, Jacob Valletta, Bo Yuan, Daryl Johnson, and Peter Lutz

PDF

What is good enough for mobile system evaluation: A Comparison of laboratory and field setting, Yao Wang

PDF

Audio Steganography Using High Frequency Noise Introduction, David Wheeler, Daryl Johnson, Bo Yuan, and Peter Lutz

Documents from 2011

PDF

An Analysis of flow-based routing, Jennifer Casella

PDF

Correlating IPv6 addresses for network situational awareness, Jason Froehlich

PDF

An Analysis of the implementation-potential of the threaded engram database model, Sourabh Mehta

PDF

Mitigating the risk of social engineering attacks, Matthew Spinapolice

PDF

Addressing the gender gap in federal law enforcement professions: The motivational attraction of women in computing, Maegan Stanek

PDF

An Experiential comparative analysis of two remote usability testing methods, Erika Varga

Documents from 2010

PDF

Developing a taxonomy for office email: A Case study, Larry Conrow

PDF

Performance evaluation of multicast routing on IPv4 and IPv6 networks, Suneetha Hari

PDF

Investigating attributes - From technologist to business leader, Christopher Kronenthal

PDF

Addressing the gender gap: Teaching preadolescent girls computer networking concepts, Cynthia Strong

Documents from 2009

PDF

Designing a cell phone application to alert and report drinking water quality to South Africans, Deana Brown

PDF

Mobile web resource tracking during a disaster or crisis situation, Phavanhna Douangboupha

PDF

Analysis of virtual environments through a web based visualization tool, Ronald Valente

Documents from 2008

PDF

The Impact of internet social networking websites on the gay community: Behavior and identity, Michael Cinquanti

PDF

English language & third generation programming language pedagogical practice analysis, Vincent Falbo

PDF

Email overload in academia, Jeffrey D. Hole

Documents from 2007

PDF

The Manta Project: Conception, Implementation, and Reflections on a Cable Array Robot and its Interfaces, Brian Ballsun-Stanton

PDF

Using eye tracking to understand banner blindness and improve website design, Chad Lapa

Documents from 2006

PDF

Recommendations for a comprehensive identity theft victimization survey framework and information technology prevention strategies, Sara Berg

PDF

Assessing the State of Web Accessibility, Laura Cook

PDF

Multi Protocol Label Switching: Quality of Service, Traffic Engineering application, and Virtual Private Network application, Akshay Joshi

PDF

Public Policy and Technology: Advancing Civilization at the Expense of Individual Privacy, Aaron D. Sanders