Undergraduate Faculty Research

Beacom College of Computer & Cyber Sciences

Andrew Kramer

Research

Interests

  • Reverse Engineering
  • Vulnerability Discovery
  • Exploit Development
  • Fuzzing

Ashley Podhradsky

Research

Interests

  • Digital Forensics
  • Data Privacy
  • Women in CyberSecurity

Research Areas

  • Digital Forensics
  • Data Privacy
  • Women in CyberSecurity

Active research projects

  • Digital Forensics of Emerging Devices - Investigation new devices to understand how to identify, extract and analyze data

Publications

  • Rowland, Podhrasky (2017). “CybHER: A Method for Empowering, Motivating, Educating and Anchoring Girls to a Cybersecurity Career Path. Hawaii International Conference on System Science. Kona, Hawaii. January, 2018.
  • Casey, Podhradsky (2016). “Steganography and the Xbox: How Terrorist May Be Hiding in Plain Sight.” Conference on Digital Forensics, Security and Law. Daytona, FL. May, 2016
  • Miller, Stroschein, Podhradsky (2016). “Reverse Engineering a NIT That Unmasks TOR Users.” Conference on Digital Forensics, Security and Law. Daytona, FL. May, 2016
  • Podhradsky, LeBlanc, Bartolacci (2014). “Personal Denial of Service Attacks (PDOS) and Online Misbehavior: The Need for Cyber Ethics and Information Security Education on University Campuses." Journal of Cyber Security Vol 3 No 3. Page 1-18.
  • Bartolacci, Leblanc, Podhradsky (2014). “Personal Denial of Service (PDOS) Attacks: A Discussion and Exploration of a New Category of Cyber Crime." Journal of Digital Forensics, Security and Law. Vol 9. No 1. Page 19-36.
  • Podhradsky, Higgens (2014). “The Current State of Modern Mobile Media and its Impact on the Digital Forensics Community: An Analysis of Smart Phones and Tablets.” Hawaii International Conference on Business. Honolulu, HI.
  • Engebretson, Podhradsky (2013). “Security Analysis of Xbox 360 Vulnerabilities" 17th World Multiconference on Systemics, Cybernetics and Informatics (WMSCI 2013), Orlando, USA.
  • Podhradsky, D’Ovidio, Engebretson, Casey (2013). “Xbox 360 Hoaxes, Social Engineering, and Gamertag Exploits.” Hawaii International Conference on System Science. Maui, HI.
  • Podhradsky, Casey, Ceretti (2012). “The Bluetooth Honeypot Project: Measuring and Managing Bluetooth Risks in the Workplace.” The International Journal of Mobile Network Design and Innovation.
  • Podhradsky, D’Ovidio, Casey (2012). “The Xbox 360 and Steganography: How Criminals and Terrorists could be “Going Dark.” The Conference on Digital Forensics, Security and Law. May 2012. Richmond, VA.
  • Podhradsky, Kelley (2012). “Analyzing the Impact that Idle Garbage Collection has on Solid State Drives in Windows and UNIX Platforms.” The Security Conference.  May 2012, Las Vegas, NV.
  • Podhradsky, Casey, Ceretti (2012). "Managing Bluetooth Risks in the Workplace.” Wireless Telecommunications Symposium (WTS). April, 2012.London, UK. In Press. IEEE.
  • Podhradsky, Casey, Ceretti (2012). "The Bluetooth Honeypot Project.” Wireless Telecommunications Symposium (WTS). April, 2012.London, UK. In Press. IEEE.
  • Podhradsky, Streff.  (2011): “Testing Data Sanitization Practices of Retired Drives with the Digital Forensics Data Recovery Project." Journal of Information Privacy and Security.  Ivy League Publication. ISSN 1553-6548, 09/2011, Volume 7, Issue 3, p. 46
  • Podhradsky, D’Ovidio, Casey. (2011): “Identity Theft and Used Gaming Consoles- Recovering Personal Information from Xbox 360 Hard Drives.” Proceedings of the America’s Conference on Information Systems.  Paper 54. August, 2011, Detroit, MI, ISBN 978-0-615-50707-1 http://aisel.aisnet.org/amcis2011_submissions/54/
  • Podhradsky, D’Ovidio, Casey (2011). “The Practitioners Guide to the Forensic Investigation of Xbox 360 Gaming Consoles.”  The Conference on Digital Forensics, Security, and Law (ADFSL). May, 2011, VA. ISSN 1931-7379 pp 173-191
  • Podhradsky (2011). “Data Sanitization: The Forgotten Aspect of Information Security.” The Security Conference. May 2011, Las Vegas, NV.
  • Podhradsky, Streff, Pauli, and Engebretson. (2011). “A Restructured Information Technology Risk Assessment Model for Small and Medium-Sized Financial Institutions.” Hawaii International Conference on Business (HICB 2011). May 2011, Honolulu, Hawaii, USApp 206-219
  • Podhradsky, Engebretson, Streff, Lovaas.(2009). “An Innovative Information Technology Risk Assessment Model for Small and Medium-Sized Financial Institutions.” Hawaii International Conference on Business (HICB 2009). June 2009, Honolulu, Hawaii, USA pp  993-1003
  • Streff, Podhradsky, Lovaas. (2009). “A Progressive Information Security Program Model for Small and Medium-Size Financial Institutions.” Hawaii International Conference on Business (HICB 2009). June 2009, Honolulu, HI.
  • Lovaas, Streff, Podhradsky(2009). “A Comprehensive Information Technology Audit Framework for Small- and Medium-Sized Financial Institutions.” Hawaii International Conference on Business (HICB 2009). June 2009, Honolulu, HI.pp898-906

Pam Rowland

Research

Interests

  • Outreach to recruit women for cybersecurity

Research Areas

  • Cyber Sciences Gender Gap

Active research projects

  • Understanding middle school girls perceptions about cybersecurity
  • Agile software development – Project Manager perceptions

Publications

  • Rowland, P., Podhradsky, A., & Plucker, S., “CybHER: A Method for Empowering, Motivating, Educating and Anchoring Girls to a Cybersecurity Career Path”, 2018 51st Hawaii International Conference on System Sciences, IEEE Computer Society Press, 2018.
  • Bishop, D., Rowland, Pam, & Noteboom, C., “Antecedents of Preference for Agile Methods: A Project Manager Perspective”, The Fifty First Annual Hawaii International Conference on System Sciences, IEEE Computer Society Press, 2018.
  • Bishop, Noteboom, & Rowland, “Antecedents to Managerial Preference for Agile Software Development Methods - A Research Plan”, Midwest Association for Information Systems (MWAIS) Conference in Springfield, Illinois, May 18 -19, 2017.
  • Noteboom, C. & Rowland, Pam, “An Exploration of Anchoring Female Millennial Students to an IT Career Path: The CLASS Model”, In (eds) R. Sprague and J. Nunamaker, The Forty Seventh Annual Hawaii International Conference on System Sciences, IEEE Computer Society Press, 2017.

Joshua Stroschein

Research

Interests

  • Reverse engineering
  • Malware analysis
  • Software exploitation

Research Areas

  • Reverse engineering
  • Malware analysis
  • Software exploitation

Yong Wang

Research

Interests

  • Internet of Things
  • Mobile security
  • Cloud security
  • Big data

Research Areas

  • Communication networks
  • Network security
  • Privacy

Active research projects

  • IoT security: This project aims to develop essential components to support identity and access management towards a scalable identity relationship management framework for the Internet of Things. Two challenges will be addressed in the project: (1) develop a scalable architecture and naming convention to uniquely identify a device. (2) develop novel techniques to define and characterize relationships in IoT.
  • Cloud and cloud security: This project focuses on cyber security issues in public cloud, for example, visualization, intrusion detection, and cloud compliance issues. We are looking for practical, effective, and automated tools/techniques to secure cloud services in public cloud environment.

Publications

  • Jason Nikolai and Yong Wang, A System for Detecting Malicious Insider Data Theft in IaaS Cloud Environments, IEEE Globecom, Washington, DC, USA, December 4-8, 2016.
  • Jason Nikolai and Yong Wang, A Streaming Intrusion Monitoring and Classification System for IaaS Cloud, IEEE Cloud, San Francisco, CA, USA, June 27-July 2, 2016.
  • Yong Wang, Christen Hahn, and Kruttika Sutrave, Mobile Payment Security, Threats, and Challenges, Second Conference On Mobile And Secure Services, Gainesville, Florida, February 26-27, 2016.
  • Yong Wang and Yazan Alshboul, Mobile Security Testing Approaches and Challenges, First Conference On Mobile And Secure Services, Gainesville, Florida, February 19-21, 2015.
  • Nicholas Penning, Michael Hoffman, Jason Nikolai, and Yong Wang, Mobile Malware Security Challenges and Cloud-Based Detection, 2014 International Conference on Collaboration Technologies and Systems (CTS 2014), Minneapolis, Minnesota, USA, May 19-23, 2014.
  • Jason Nikola and Yong Wang, Hypervisor-based Cloud Intrusion Detection System, 2014 International Conference on Computing, Networking and Communication (ICNC), CNC Workshop, Honolulu, Hawaii, USA, Feb 3-6, 2014.
  • Yong Wang, Jinpeng Wei, and Karthik Vangury, Bring Your Own Device Security Issues and Challenges, 11th Annual IEEE Consumer Communications & Networking Conference, Las Vegas, Nevada USA, Jan 10-13 2014.
  • Yong Wang, Kevin Streff, Sonell Raman, Smartphone Security Challenges, IEEE Computer, December, 2012.
  • Yong Wang, Byrav Ramamurthy, and Xukai Zou, KeyRev: An Efficient Key Revocation Scheme for Wireless Sensor Networks, in ICC’07: Proceedings of IEEE International Conference on Communications, Glasgow, Scotland, June 2007.
  • Yong Wang, Garhan Attebury, and Byrav Ramamurthy, A Survey of Security Issues in Wireless Sensor Networks, IEEE Communications Surveys and Tutorials, vol. 8, no. 2, pp. 2-23, 2006.

College of Arts & Sciences

James Maloney

Research

Interests

  • Accelerator and Beam Physics
  • Nonlinear Charged Particle Optics
  • Astronomy
  • Rocketry

Research Areas

  • Improving simulation models for electromagnetic elements and charged particle interactions, designing particle beam elements and layouts, and studying nonlinear effects in electromagnetic fields. 
  • Dr. Maloney also serves as DSU’s representative to the Deep Underground Neutrino Experiment (DUNE) collaboration working at the forefront of particle physics research. With the support of student and faculty researchers, this international project seeks to understand the nature of elusive fundamental particles known as neutrinos by studying a beam of particles sent from the Fermi National Accelerator Laboratory (Fermilab) in Batavia, Illinois, to a detector nearly a mile underground at the Sanford Underground Research Facility (SURF) in Lead, South Dakota.
  • Dr. Maloney is also involved in basic astronomy, astrophotography, and development of STEM curriculum focused on astronomy and rocketry science.

Active research projects

  • Dr. Maloney has research opportunities for DSU students wanting to assist in the ongoing design and eventual operation of the DUNE experiment.  This work includes modelling beam line components, tolerance studies related to the beam line manufacturing and installation, and optimizing performance of the detectors.
  • Current student research opportunities with Dr. Maloney also involve developing computer models to improve simulations of variations in energy loss by charged particles traveling through various materials. This work is important as there exists pressing need to model and understand data like the type that will be produced by the DUNE experiment as neutrinos and other particles pass through the detector.
  • Finally, student research opportunities are also available on topics in astronomy, where students will utilize data from ground and space-based observatories to look for undiscovered planets and study stellar phenomena.

Publications

  • Columns in the ARIEL HRS, TRIUMF Beam Physics Note (2016)
  • CANREB High Resolution Separator Diagnostics and Commissioning Strategy, TRIUMF Document-133688 (2016)
  • CANREB HRS Multipole Corrector, TRIUMF Design Note, TRI-DN-15-09 (2016)
  • Electrostatic Potential Map Modelling with COSY Infinity, EMIS 2015, Nucl. Instr. & Method - B, http://dx.doi.org/10.1016/jnimb.2015.12.005
  • New Design Studies for TRIUMF’s ARIEL High Resolution Separator, EMIS 2015, Nucl. Instr. & Method - B, http://dx.doi.org/10.1016/jnimb.2015.11.023
  • OptimM to COSY Conversion Notes, TRIUMF Beam Physics Note, TRI-BN-15-09 (2015)
  • ARIEL High Resolution Separator, TRIUMF Design Note TRI-DN-14-06 (2014)
  • Studies of Magnetic Dipole Edge Shaping, TRIUMF Beam Physics Note, TRI-BN-14-04 (2014)
  • New Electrostatic Element Procedures for COSY Infinity, TRIUMF Beam Physics Note, TRI-BN-14-03 (2014)
  • Numerical Studies of Optimization and Aberration Correction Methods for the Preliminary Demonstration of the Parametric Ionization Cooling (PIC) Principle in the Twin Helix Muon Cooling Channel, arXiv:1401.8256 (2014)
  • Parametric-Resonance Ionization Cooling for Muon Beams in the Twin Helix Channel, Doctoral Dissertation, Northern Illinois University, DeKalb, Illinois (2013)
  • Studies of the Twin Helix Parametric-Resonance Ionization Cooling Channel with COSY Infinity, TUPPD011, IPAC2012, New Orleans, LA, p. 1428 (2012).
  • Parametric-Resonance Ionization Cooling of Muon Beams, AAC, AIP Conf. proceeding 1507, 843-48 (2012)
  • Muon Cooling Techniques for Experiments at the Intensity Frontier, Fundamental Physics at the Intensity Frontier Workshop, Rockville, MD (2011)
  • EPIC Muon Cooling Simulations using COSY INFINITY, MOP050, PAC11, New York, NY (2011)
  • Correcting Aberrations in Complex Magnet Systems for Muon Cooling Channels, WEP074, PAC11, New York, NY (2011)
  • Symmetry-Based Design of Fragment Separator Optics, Ph. Rev. ST-AB 10, 064002 (2007)
  • Application of Symmetry Theories to the Design of Fragment Separators for Exotic Isotope Accelerators, Master’s Thesis, Northern Illinois University, DeKalb, Illinois (2006)

College of Business & Information Systems

David Bishop

Research

Interests

  • Agile Software Development
  • Software Requirements
  • Secure Software Development
  • Databases

Research Areas

  • Agile Software Development

Active research projects

  • Antecedents of Preference for Agile Development: A Customer Perspective – A grounded theory study on the factors that contribute and inhibit preference for agile software development from a customer’s perspective.  This study will complete a series of studies, the first looked at preference for agile from a software developer’s perspective. The second study looked at preference for agile from a manager’s perspective.
  • Comparing preference for agile between management and developers – This research is based on the data gathered from two previous efforts and will highlight the similarities and the differences in preference factors between these two groups.
  • A Systematic Literature Review of Scrum and Secure Software Development – This study will synthesize the relevant literature related to the most popular agile framework, Scrum, and secure software development. The goal is to identify research gaps and opportunities to extend the body of knowledge in relation to these two topics.

Publications

  • Bishop, D., Rowland, P., & Noteboom, C., "Antecedents of Preference for Agile Methods: A Project Manager Perspective" (2018) 51st Hawaii International Conference on System Sciences.
  • Bishop, D., Rowland, P., & Noteboom, C., "Antecedents to Managerial Preference for Agile Software Development Methods – A Research Plan" (2017). MWAIS 2017 Proceedings. http://aisel.aisnet.org/mwais2017/33
  • Bishop, D., Deokar, A., & Sarnikar, S., "On Understanding Preference for Agile Methods Among Software Developers" (2016). Information Resources Management Journal, 29(3), 15-38.
  • Bishop, D., and Deokar, A., "Toward an Understanding of Preference for Agile Software Development Methods from a Personality Theory Perspective." (2014) 47th Hawaii International Conference on System Sciences (HICSS) IEEE, 2014.
  • Ni, G., Bishop, D., & Donaldson, A., "Use of Online Tools in Teaching C++ Programming to Freshmen in All Engineering Majors" (2013). 5th Annual First Year Engineering Experience Conference.
  • Bishop, David, "Personality Theory as a Predictor for Agile Preference" (2013). MWAIS 2013 Proceedings. Paper 17.

Jun Liu

Research

Interests

  • Analytics and Big data

Research Areas

  • Databases, Data analytics, Big Data analytics, social network analysis, and healthcare data analytics

Active research projects

  • Collaboration with Sanford Data Collaborative: MyChart Utilization (2016-present) Developing a model for predicting user utilization of MyChart.
  • Developing a model for patient risk stratification/segmentation

Publications

Journal papers

  • Jun Liu  and Sudha Ram (2017): “Improving the Domain Independence of Data Provenance Ontologies: A Demonstration Using Conceptual Graphs and the W7 Model," Journal of Database Management 28 (1), 43-62
  • Mohammad Abdel-Rahman, Jun Liu, Omar El-Gayar (2017): “Discovering Design Principles for Health Behavioral Change Support Systems: A Text Mining Approach," ACM Transactions on Management Information Systems, Volume 8 Issue 2-3, August 2017
  • Jun Liu, Prem Timsina, Omar El-Gayar (2016): “A comparative analysis of semi-supervised learning: The case of article selection for medical systematic reviews," Information Systems Frontiers, pp 1-13, November 2016
  • Prem Timsina, Jun Liu, Omar El-Gayar (2015): “Advanced analytics for the automation of medical systematic reviews," Information Systems Frontiers, Volume 18, Issue 2, pp 237–252
  • Sudha Ram and Jun Liu (2012): “A Semantic Foundation for Provenance Management," Journal of Data Semantics, Volume 1, Issue 1, pp. 11-17.
  •  Jun Liu and Sudha Ram (2011): “Who Does What: Collaboration Patterns in the Wikipedia and Their Impact on Article Quality," ACM Transactions on Management Information Systems, Volume 2, Issue 2, pp. 11-23. (Second most cited paper of the journal)
  •  Sudha Ram and Jun Liu (2008): “A Semiotics Framework for Analyzing Data Provenance Research," Journal of Computing Science and Engineering, Vol. 2, No. 3, September 2008, pp. 221-248.
  •  Sudha Ram and Jun Liu (2005): “An Agent Based Approach for Sourcing Business Rules in Supply Chain Management," International Journal of Intelligent Information Technologies, Vol. 1, January 2005, pp. 1-16.

Book Chapters

  • Sudha Ram and Jun Liu (2010): “Provenance Management in BioSciences," Advances in Conceptual Modeling – Applications and Challenges. Lecture Notes in Computer Science 6413, pp 54-64
  • Sudha Ram and Jun Liu (2007): “OABIS: An Ontology-based Approach for Business Rules Management," in Application of Agent and Intelligent Information Technologies, 2007, Vijay Sugumaran (eds.), Idea Group Inc, Hershey, PA, pp.1-21.
  •  Sudha Ram and Jun Liu (2007): “Understanding the Semantics of Data Provenance to Support Active Conceptual Modeling," Lecture Notes in Computer Science 4512, Leah Wang and Peter Chen (eds), pp. 1-12.

 


Dan Talley

Research

Interests

  • Teaching Economics Using Computer Technology, International Transmission of Business Cycles
  • Social Security and the U.S. National Debt
  • The Great Recession and the Slow Growth Recovery (2010-2016)

Research Areas

  • Technology-Augmented Economic Instruction
  • Macroeconometrics/Statistics
  • Money and Banking
  • Macroeconomic Research

Active research projects

  • Bank Efficiency After 2010 Dodd-Frank Using an X-Inefficiency Model with co-author Dr. Yenling Chang. Dr. Chang and I are in the early stages of research examining the cost efficiency of the banking system before and after the 2010 Dodd-Frank banking reform legislation. We presented our work at a conference in Houston, TX, on Feb. 15, 2018 for peer review and feedback. I am also on the dissertation committee for a student in the DSc. of Information Systems. And I am currently working with Dr. Jun Liu to draft a grant proposal to assess the cost efficiency and quality of care outcomes of a South Dakota health program under the auspices of the MadLabs Center for Business Analytics Research.   

Publications

  • “Bank Risk in a Decade of Low Interest Rates” by Yenling Chang and Daniel A. Talley, Journal of Economics and Finance, Volume 41, Issue 3, July 2017, pgs. 505-528.  DOI:  10.1007/s12197-016-9367-5. 
  • “Solving The Educational Technology Puzzle:  Why Does Student Satisfaction Improve Even Though Learning Does Not?” by Daniel A. Talley, International Journal of Education Research, Volume 9, Number 1, Fall 2009, pgs. 107-124.  
  • “An Empirical Evaluation of the Educational Technology Puzzle” by Daniel A. Talley, Review of Business Research, Volume 4, Number 1, Winter 2009, pgs. 31-42.

 


Deb Tech

Research

Interests

  • E-commerce
  • E-marketing
  • Technology
  • Innovation

Research Areas

  • Technology
  • Innovation
  • Marketing

Active research projects

  • Social media based trust for organizational knowledge-based sharing: this research evaluates the impact of connectivity, proximity, and privilege in a social media network within an organizational context. By understanding the impact of these variables, improvements in organizational knowledge sharing may be affected.
  • Google Scholar Algorithms and Broad Topic Search: This research intends to improve on the current Google Scholar Search System by allowing a broad topic search algorithm to diversify and allow synonymous search terms to be included and ranked with other results.
  • Marketing Technology: This research evaluates the emerging technologies of Artificial Intelligence, the Internet of Things, Virtual and Augmented Reality, and Blockchain technology within the realm of Marketing strategy.

Publications

  • S. Lakkaraju, D. Tech, and S. Deng (2017, July). "A Framework for Profiling Prospective Students in Higher Education: Prospect profiling in higher education marketing." Encyclopedia of Information Science and Technology, Fourth Edition. IGI Global.
  • M. Kearl, C. Noteboom and D. Tech (2017, May and July). "A Novel Improvement to Google Scholar Ranking Algorithms Through Broad Topic Search." Poster presentation at Midwest Association for Information Systems (MWAIS) Conference in Springfield, Illinois on May. Paper presentation at 23rd Americas Conference on Information Systems (AMCIS), July 2017.
  • D. Nelson and D. Tech (2014, October). "Lead the parade: a case study depicting the use of traditional and online marketing strategies to expand into the hyper-growth market in the Bakken region of North Dakota." Paper presented at the South Dakota International Business Conference (SDIB), Rapid City, SD.
  • D. Tech (2014, December). "Positioning and LinkedIn - Marketing Technology." Marketing lesson for publication on Merlot.org
  • N. El-Bendary, B. Naik,  & D. Tech (2012, October). "Does Culture Influence Learning Styles? A Comparative Study of Two Cultures." Paper presented at the South Dakota International Business Conference (SDIB), Deadwood, SD.
  • N. El-Bendary, B. Naik,  & D. Tech (2011, October). "Learning Styles of Egyptian Business Students." Paper presented at the South Dakota International Business Conference (SDIB), Rapid City, SD.
  • M. Franco, B. Naik, & D. Tech (2010, October). "A Comparative Study of Learning Styles of Business Students in The United States and the Dominican Republic." Paper presented at South Dakota International Business Conference (SDIB), Rapid City, SD.
  • Tech Coffey, D. & Walters, J. (2010, October). "Digital Television Broadcast Adoption in Latin America." Paper presented at the SDIB, Rapid City, SD.
  • Tech Coffey, D. (2009, October). "Examining Networking Effects and Digital Television Adoption in Latin America: A Focus on Argentina." Paper presented at SDIB, Rapid City, SD.

Jack Walters

Research

Interests

  • Human resource strategy
  • Professional ethics

Research Areas

  • Human resource strategy
  • Professional ethics

Active research projects

  • Writing a book about U.S. trade policy and its effect on middle-class wages and wealth.

Publications

  • "Positive Management" - 2010

Recent articles/presentations

  • Walters, J. (2014) “Using Video Vignettes to Teach Ethical Concepts”. Presented at NSU Annual Conference on International Business and Contemporary Issues in Business, Rapid City, SD.
  • Al-Omari, A., Deokar, A., El-Gayar, O., & Walters, J. (2013) “Information Security Policy Compliance: An Empirical Study of .Ethical Ideology in Jordanian Banks.” Hawaii International Conference on System Sciences, January.

College of Education

Daniel Klumper

Research

Interests

  • Producing better teachers from the DSU College of Education

Research Areas

  • Using Virtual Reality in preparing pre-service teachers

Active research projects

  • VALE: Virtual Avatar Learning Experience: Does using virtual reality increase pre-service teacher's ability to manage student behavior and engage students?  Level 3 education students teach 2 lessons in the Mixed-Reality Virtual Classroom to practice classroom management strategies and teaching techniques. This gives students the opportunity to practice teaching in a realistic environment, reflect on their teaching and receive authentic feedback from peers and faculty. 

 


Jennifer Nash

Research

Interests

  • Science
  • STEM education

Research Areas

  • Strategies and technologies to improve science learning and teaching

Active research projects

  • NSF/EPSCoR Award No. IIA-1355423; The project’s goal is to promote educational opportunities and workforce development in areas related to science, engineering, and mathematics by providing professional development to K-12 preservice and teachers.

Publications

  • J.M. Nash. "Using Universal Design for Learning in Online Instruction." Online Classroom. in revision;
  • J.M. Gross (Nash).  "Pre-service Teachers Learn to Teach Science Using Picture Books."  South Dakota Reading Council Journal IV(1):  8-11, 2009.   

Kevin Smith

Research

Interests

  • Educational technology
  • Mathematics education
  • Professional development for teachers
  • STEM in grades K-12

Research Areas

  • Adaptive learning programs in K-8 mathematics classrooms
  • Gamification in mathematics education
  • Preparing preservice teachers to teach STEM

Active research projects

  • Preparing Preservice Teachers to Implement Gamification in the Mathematics Classroom:  I'm currently researching how a gamification activity that is implemented in a K-8 Math Methods course engages colleges students and prepares them to implement gamification concepts in their future classrooms. This is a qualitative study that will utilize survey data, interviews, and observations.
  • Assessing Perceptions of Elementary Preservice Teachers in STEM: Implications for Teacher Education Programs:  I am working collaboratively with Dr. Nash on this research project. We conducted a survey with all current DSU Teacher Education students to determine what experiences have impacted their perceptions of teaching STEM in grades K-12. Our goal is to learn about what experiences have the most impact on our students.

Publications

  • (Accepted with minor revisions) Smith, K. D. (2018). "Perceptions of Preservice Teachers About Adaptive Learning Programs in K-8 Mathematics Education." Contemporary Educational Technology.
  • (Currently in review) Smith, K. D., and Klumper, D. (2018). "Using Virtual Reality to Prepare the Next Generation of Teachers. Educational Leadership."
  • Smith, K. D. (2017). "Using Seesaw to Open the Window to Your Classroom. ASCD Express," 13(2). Retrieved from http://www.ascd.org/ascd-express/vol13/1302-smith.aspx
  • Krahenbuhl, K. S., and Smith, K. D. (2015). "Nearpod: A Technology Tool to Engage Students in Inquiry. ASCD Express," 10(9). Retrieved from http://www.ascd.org/ascd-express/vol10/1009-krahenbuhl.aspx