Dakota State University students walking around campus

Preparation + opportunity = success

That's the DSU equation. We're a four-year university with nationally recognized programs, cutting-edge facilities, and the brightest thinkers. But we're also a tight-knit, inclusive community. Small class sizes mean hands-on training and individualized attention. All this with an affordable, public school price that's among the best values in the region.

Majors & Degrees

Faculty Research

Andrew Kramer


  • Reverse engineering
  • Vulnerability discovery
  • Exploit development
  • Fuzzing

Ashley Podhradsky


  • Digital forensics
  • Data privacy
  • Women in cybersecurity

Research Areas

  • Digital forensics
  • Data privacy
  • Women in cybersecurity

Active research projects

Digital Forensics of Emerging Devices - Investigation new devices to understand how to identify, extract and analyze data


Rowland, Podhrasky (2017). “CybHER: A Method for Empowering, Motivating, Educating and Anchoring Girls to a Cybersecurity Career Path. Hawaii International Conference on System Science. Kona, Hawaii. January, 2018.

Casey, Podhradsky (2016). “Steganography and the Xbox: How Terrorist May Be Hiding in Plain Sight.” Conference on Digital Forensics, Security and Law. Daytona, FL. May, 2016

Miller, Stroschein, Podhradsky (2016). “Reverse Engineering a NIT That Unmasks TOR Users.” Conference on Digital Forensics, Security and Law. Daytona, FL. May, 2016

Podhradsky, LeBlanc, Bartolacci (2014). “Personal Denial of Service Attacks (PDOS) and Online Misbehavior: The Need for Cyber Ethics and Information Security Education on University Campuses." Journal of Cyber Security Vol 3 No 3. Page 1-18.

Bartolacci, Leblanc, Podhradsky (2014). “Personal Denial of Service (PDOS) Attacks: A Discussion and Exploration of a New Category of Cyber Crime." Journal of Digital Forensics, Security and Law. Vol 9. No 1. Page 19-36.

Podhradsky, Higgens (2014). “The Current State of Modern Mobile Media and its Impact on the Digital Forensics Community: An Analysis of Smart Phones and Tablets.” Hawaii International Conference on Business. Honolulu, HI.

Engebretson, Podhradsky (2013). “Security Analysis of Xbox 360 Vulnerabilities" 17th World Multiconference on Systemics, Cybernetics and Informatics (WMSCI 2013), Orlando, USA.

Podhradsky, D’Ovidio, Engebretson, Casey (2013). “Xbox 360 Hoaxes, Social Engineering, and Gamertag Exploits.” Hawaii International Conference on System Science. Maui, HI.

Podhradsky, Casey, Ceretti (2012). “The Bluetooth Honeypot Project: Measuring and Managing Bluetooth Risks in the Workplace.” The International Journal of Mobile Network Design and Innovation.

Podhradsky, D’Ovidio, Casey (2012). “The Xbox 360 and Steganography: How Criminals and Terrorists could be “Going Dark.” The Conference on Digital Forensics, Security and Law. May 2012. Richmond, VA.

Podhradsky, Kelley (2012). “Analyzing the Impact that Idle Garbage Collection has on Solid State Drives in Windows and UNIX Platforms.” The Security Conference.  May 2012, Las Vegas, NV.

Podhradsky, Casey, Ceretti (2012). "Managing Bluetooth Risks in the Workplace.” Wireless Telecommunications Symposium (WTS). April, 2012.London, UK. In Press. IEEE.

Podhradsky, Casey, Ceretti (2012). "The Bluetooth Honeypot Project.” Wireless Telecommunications Symposium(WTS). April, 2012.London, UK. In Press. IEEE.

Podhradsky, Streff.  (2011): “Testing Data Sanitization Practices of Retired Drives with the Digital Forensics Data Recovery Project." Journal of Information Privacy and Security.  Ivy League Publication. ISSN 1553-6548, 09/2011, Volume 7, Issue 3, p. 46

Podhradsky, D’Ovidio, Casey. (2011): “Identity Theft and Used Gaming Consoles- Recovering Personal Information from Xbox 360 Hard Drives.” Proceedings of the America’s Conference on Information Systems.  Paper 54. August, 2011, Detroit, MI, ISBN 978-0-615-50707-1 http://aisel.aisnet.org/amcis2011_submissions/54/

Podhradsky, D’Ovidio, Casey (2011). “The Practitioners Guide to the Forensic Investigation of Xbox 360 Gaming Consoles.”  The Conference on Digital Forensics, Security, and Law (ADFSL). May, 2011, VA. ISSN 1931-7379 pp 173-191

Podhradsky (2011). “Data Sanitization: The Forgotten Aspect of Information Security.” The Security Conference. May 2011, Las Vegas, NV.

Podhradsky, Streff, Pauli, and Engebretson. (2011). “A Restructured Information Technology Risk Assessment Model for Small and Medium-Sized Financial Institutions.” Hawaii International Conference on Business (HICB 2011). May 2011, Honolulu, Hawaii, USApp 206-219

Podhradsky, Engebretson, Streff, Lovaas.(2009). “An Innovative Information Technology Risk Assessment Model for Small and Medium-Sized Financial Institutions.” Hawaii International Conference on Business (HICB 2009). June 2009, Honolulu, Hawaii, USA pp  993-1003

Streff, Podhradsky, Lovaas. (2009). “A Progressive Information Security Program Model for Small and Medium-Size Financial Institutions.” Hawaii International Conference on Business (HICB 2009). June 2009, Honolulu, HI.

Lovaas, Streff, Podhradsky(2009). “A Comprehensive Information Technology Audit Framework for Small- and Medium-Sized Financial Institutions.” Hawaii International Conference on Business (HICB 2009). June 2009, Honolulu, HI.pp898-906

Pam Rowland


  • Outreach to recruit women for cybersecurity

Research Areas

  • Cyber Sciences gender gap

Active research projects

  • Understanding middle school girls perceptions about cybersecurity
  • Agile software development – Project Manager perceptions


Rowland, P., Podhradsky, A., & Plucker, S., “CybHER: A Method for Empowering, Motivating, Educating and Anchoring Girls to a Cybersecurity Career Path”, 2018 51st Hawaii International Conference on System Sciences, IEEE Computer Society Press, 2018.

Bishop, D., Rowland, Pam, & Noteboom, C., “Antecedents of Preference for Agile Methods: A Project Manager Perspective”, The Fifty First Annual Hawaii International Conference on System Sciences, IEEE Computer Society Press, 2018.

Bishop, Noteboom, & Rowland, “Antecedents to Managerial Preference for Agile Software Development Methods - A Research Plan”, Midwest Association for Information Systems (MWAIS) Conference in Springfield, Illinois, May 18 -19, 2017.

Noteboom, C. & Rowland, Pam, “An Exploration of Anchoring Female Millennial Students to an IT Career Path: The CLASS Model”, In (eds) R. Sprague and J. Nunamaker, The Forty-Seventh Annual Hawaii International Conference on System Sciences, IEEE Computer Society Press, 2017.

Joshua Stroschein


  • Reverse engineering
  • Malware analysis
  • Software exploitation

Research Areas

  • Reverse engineering
  • Malware analysis
  • Software exploitation

Yong Wang


  • Internet of Things
  • Mobile security
  • Cloud security
  • Big data

Research Areas

  • Communication networks
  • Network security
  • Privacy

Active research projects

IoT security: This project aims to develop essential components to support identity and access management towards a scalable identity relationship management framework for the Internet of Things. Two challenges will be addressed in the project: (1) develop a scalable architecture and naming convention to uniquely identify a device. (2) develop novel techniques to define and characterize relationships in IoT.

Cloud and cloud security: This project focuses on cybersecurity issues in the public cloud, for example, visualization, intrusion detection, and cloud compliance issues. We are looking for practical, effective, and automated tools/techniques to secure cloud services in the public cloud environment.


Jason Nikolai and Yong Wang, A System for Detecting Malicious Insider Data Theft in IaaS Cloud Environments, IEEE Globecom, Washington, DC, USA, December 4-8, 2016.

Jason Nikolai and Yong Wang, A Streaming Intrusion Monitoring and Classification System for IaaS Cloud, IEEE Cloud, San Francisco, CA, USA, June 27-July 2, 2016.

Yong Wang, Christen Hahn, and Kruttika Sutrave, Mobile Payment Security, Threats, and Challenges, Second Conference On Mobile And Secure Services, Gainesville, Florida, February 26-27, 2016.

Yong Wang and Yazan Alshboul, Mobile Security Testing Approaches and Challenges, First Conference On Mobile And Secure Services, Gainesville, Florida, February 19-21, 2015.

Nicholas Penning, Michael Hoffman, Jason Nikolai, and Yong Wang, Mobile Malware Security Challenges and Cloud-Based Detection, 2014 International Conference on Collaboration Technologies and Systems (CTS 2014), Minneapolis, Minnesota, USA, May 19-23, 2014.

Jason Nikola and Yong Wang, Hypervisor-based Cloud Intrusion Detection System, 2014 International Conference on Computing, Networking and Communication (ICNC), CNC Workshop, Honolulu, Hawaii, USA, Feb 3-6, 2014.

Yong Wang, Jinpeng Wei, and Karthik Vangury, Bring Your Own Device Security Issues and Challenges, 11th Annual IEEE Consumer Communications & Networking Conference, Las Vegas, Nevada USA, Jan 10-13 2014.

Yong Wang, Kevin Streff, Sonell Raman, Smartphone Security Challenges, IEEE Computer, December, 2012.

Yong Wang, Byrav Ramamurthy, and Xukai Zou, KeyRev: An Efficient Key Revocation Scheme for Wireless Sensor Networks, in ICC’07: Proceedings of IEEE International Conference on Communications, Glasgow, Scotland, June 2007.

Yong Wang, Garhan Attebury, and Byrav Ramamurthy, A Survey of Security Issues in Wireless Sensor Networks, IEEE Communications Surveys, and Tutorials, vol. 8, no. 2, pp. 2-23, 2006.

David Kenley


  • US-China relations
  • Chinese migration
  • Twentieth-century Chinese history
  • China and cyber security

Active research projects

Dr. Kenley is currently involved in three active research projects, though he remains open to additional collaboration opportunities. His first project is studying US-China relations in the area of cyber security, most notably as seen in the tensions regarding 5G infrastructure and such popular apps as TikTok.

His second line of active research centers on public memory and Chinese nationalism in the twentieth century, in particular the 2019 centennial celebrations of the seminal May Fourth Movement.

Finally, Dr. Kenley is studying the role of peacemakers in China during World War II and the Chinese Communist Revolution.


Teaching about Asia in a Time of Pandemic by Kenley, Wasserstrom et al., edited by David Kenley (New York:  Columbia University Press, 2020).

New Culture in a New World:  The May Fourth Movement and the Chinese Diaspora, 1919-1932 (New York:  Routledge Press, 2003 in hardback, 2007 in Kindle, and 2013 in paperback).

Modern China, (Association for Asian Studies, 2012; Columbia University Press, 2020).

Contested Communities: Identities, Spaces, and Hierarchies of the Chinese in Havana, 1902-1968, by Miriam Herrera Jerez and Mario Castillo Santana, edited by David Kenley (Leiden:  Brill Press, 2017).

“May Fourth at 100 in Singapore and Hong Kong,” by Els Van Dongen and David Kenley, International Institute for Asian Studies, June 2020.

“Advertising Community:  The Union Times and Singapore’s Public Sphere, 1906-1939,” Journal of World History 25.4 (December 2014): 583-609.

“Looking beyond the Umbrellas:  Understanding the 2014 Political Protests in Hong Kong,” WACH Journal of International Thought, April 2015

“Understanding and Teaching Migration in China,” Education about Asia 19.3 (Winter 2014).

“Bridging 1949:  Brethren Missionaries and the Communist Revolution,” co-authored with Cesar Vera (an undergraduate student) and Jeffrey Bach, American Journal for Chinese Studies (Fall 2013).

“The Sword of the Spirit: A Silent Relic from China’s Christian Past,” co-authored with Peter DePuydt, Journal of Asian History, 44.1 (2010) 

“History and Memory,” featured cover article for Education About Asia 14.1 (Spring 2009).

“The Not So Black and White World of Brothers: Morality and Filialty in the Works of Lu Xun and Lao She,” in volume 36, Morality and the Literary Imagination, Religion and Public Life, edited by and with an introduction by Gabriel R. Ricci, (Transaction Publishers, January 2009).

“Singapore’s May Fourth Movement and Overseas Print Capitalism,” Asia Research Institute Working Papers Series, 70 (May 2006).

“Three Gorges be Damned: The Philosophical Roots of Environmentalism in China,” in volume 35, Cultural Landscapes, Religion and Public Life, edited by and with an introduction by Gabriel R. Ricci, (Transaction Publishers, September, 2006).

“Singapore’s Middle Realm:  The Nanyang Shang Bao and the Jinan Incident of 1928,” American Journal of Chinese Studies, 10, no. 1 (April 2003): 65-84.

“Publishing the New Culture: Singapore’s Newspapers and Diaspora Literature, 1919-1933,” Explorations in Southeast Asian Studies, 2, no.2 (Spring 1998): 2-26.

“Esferas públicas de La Habana e identidad china en ultramar,” Huellas de china en este lado del atlántico (Habana: José Martí, 2017).

“Construyendo una comunidad imaginada en América Latina:
Fraternidad/Lianhe de La Habana, 1938-1944,” Susan Chen Mio, Ricardo Martínez Esquivel, and Jorge Bartels Villanueva (eds.), Edwin Quesada Montiel, trans., Estudios sobre China desde Latinoamérica:  Modernidad, geopolítica, religion e inmigracíon (San Jose:  University of Costa Rica Press, 2013).

“Overseas Print Capitalism and Chinese Nationalism in the Early Twentieth Century,” Rohit Chopra (ed.), Global Media, Cultures, and Identities (New York:  Routledge Press, 2011).

Andrew Sathoff


  • Alfalfa Crop Improvement
  • Extension Plant Pathology
  • Plant Defensins
  • Mycology

Research Areas

Dr. Sathoff is a broadly trained plant pathologist having graduated from one of the best programs in the world (University of Minnesota) and can work with a large variety of plant diseases. He specializes in alfalfa pathology, where he is known as a regional expert on alfalfa diseases and their management.

A common thread with Dr. Sathoff’s research is that his projects are all very applied. He has a strong grower network and industry collaborators, such as Mustang Seeds.

Active Research Projects

Current student research opportunities involve projects characterizing fungal and oomycete pathogen isolates collected from fields under commercial production of alfalfa.

Dr. Sathoff is becoming more involved with educational research. He is creating novel educational resources, such as case studies and laboratory activities, and preparing to publish these resources in peer-review educational journals with the goal of having his activities being used in plant pathology classrooms across the country.


Giles, J.M.*, Tordsen, C.L.*, Rebstock, T.R.*, Bucciarelli, B., Samac, D.A., and Sathoff, A.E. 2022. Management strategies and distribution of Aphanomyces root rot of alfalfa (Medicago sativa), a continuing threat to forage production in the United States. Plant Pathology.

Tordsen, C.L.*, Giles, J.M.*, and Sathoff, A.E. 2022. First report of Aphanomyces euteiches race 1 and race 2 causing Aphanomyces root rot on alfalfa (Medicago sativa) in South Dakota. Plant Disease 106:771.

Sathoff, A.E., Dornbusch, M.R., Miller, S.S., and Samac, D.A. 2020. Functional analysis of Medicago-derived pathogen-induced gene promoters for usage in transgenic alfalfa. Molecular Breeding 40:60. 

Sathoff, A.E., Lewenza, S., and Samac, D.A. 2020. Plant defensin antibacterial mode of action against Pseudomonas species. BMC Microbiology 20:173. 

Sathoff, A.E. and Samac, D.A. 2019. Antibacterial activity of plant defensins. Molecular Plant-Microbe Interactions 32: 507-514.

Sathoff, A.E., Velivelli, S., Shah, D.M., and Samac, D.A. 2019. Plant defensin peptides have antifungal and antibacterial activity against human and plant pathogens. Phytopathology 109: 402-408.

Schmitt, A.J., Sathoff, A.E., Holl, C., Bauer, B., Samac, D.A., and Carter, C.J. 2018. The major nectar protein of Brassica rapa is a non-specific lipid transfer protein with strong antifungal activity. Journal of Experimental Botany 69: 5587-5597.

* = DSU undergraduate student


David Bishop


  • Agile software development
  • Software requirements
  • Secure software development
  • Databases

Research Areas

  • Agile software development

Active research projects

Antecedents of Preference for Agile Development: A Customer Perspective – A grounded theory study on the factors that contribute and inhibit preference for agile software development from a customer’s perspective.  This study will complete a series of studies, the first looked at preference for agile from a software developer’s perspective. The second study looked at preference for agile from a manager’s perspective.

Comparing preference for agile between management and developers – This research is based on the data gathered from two previous efforts and will highlight the similarities and the differences in preference factors between these two groups.

A Systematic Literature Review of Scrum and Secure Software Development – This study will synthesize the relevant literature related to the most popular agile framework, Scrum, and secure software development. The goal is to identify research gaps and opportunities to extend the body of knowledge in relation to these two topics.


Bishop, D., Rowland, P., & Noteboom, C., "Antecedents of Preference for Agile Methods: A Project Manager Perspective" (2018) 51st Hawaii International Conference on System Sciences.

Bishop, D., Rowland, P., & Noteboom, C., "Antecedents to Managerial Preference for Agile Software Development Methods – A Research Plan" (2017). MWAIS 2017 Proceedings. http://aisel.aisnet.org/mwais2017/33

Bishop, D., Deokar, A., & Sarnikar, S., "On Understanding Preference for Agile Methods Among Software Developers" (2016). Information Resources Management Journal, 29(3), 15-38.

Bishop, D., and Deokar, A., "Toward an Understanding of Preference for Agile Software Development Methods from a Personality Theory Perspective." (2014) 47th Hawaii International Conference on System Sciences (HICSS) IEEE, 2014.

Ni, G., Bishop, D., & Donaldson, A., "Use of Online Tools in Teaching C++ Programming to Freshmen in All Engineering Majors" (2013). 5th Annual First Year Engineering Experience Conference.

Bishop, David, "Personality Theory as a Predictor for Agile Preference" (2013). MWAIS 2013 Proceedings. Paper 17.

Jun Liu


  • Analytics and big data
  • Research areas
  • Databases, data analytics, big data analytics, social network analysis, and health care data analytics

Active research projects

Collaboration with Sanford Data Collaborative: MyChart Utilization (2016-present) Developing a model for predicting user utilization of MyChart.

Developing a model for patient risk stratification/segmentation

Publications-Journal papers

Jun Liu  and Sudha Ram (2017): “Improving the Domain Independence of Data Provenance Ontologies: A Demonstration Using Conceptual Graphs and the W7 Model," Journal of Database Management 28 (1), 43-62

Mohammad Abdel-Rahman, Jun Liu, Omar El-Gayar (2017): “Discovering Design Principles for Health Behavioral Change Support Systems: A Text Mining Approach," ACM Transactions on Management Information Systems, Volume 8 Issue 2-3, August 2017

Jun Liu, Prem Timsina, Omar El-Gayar (2016): “A comparative analysis of semi-supervised learning: The case of article selection for medical systematic reviews," Information Systems Frontiers, pp 1-13, November 2016

Prem Timsina, Jun Liu, Omar El-Gayar (2015): “Advanced analytics for the automation of medical systematic reviews," Information Systems Frontiers, Volume 18, Issue 2, pp 237–252

Sudha Ram and Jun Liu (2012): “A Semantic Foundation for Provenance Management," Journal of Data Semantics, Volume 1, Issue 1, pp. 11-17.

 Jun Liu and Sudha Ram (2011): “Who Does What: Collaboration Patterns in the Wikipedia and Their Impact on Article Quality," ACM Transactions on Management Information Systems, Volume 2, Issue 2, pp. 11-23. (Second most cited paper of the journal)

 Sudha Ram and Jun Liu (2008): “A Semiotics Framework for Analyzing Data Provenance Research," Journal of Computing Science and Engineering, Vol. 2, No. 3, September 2008, pp. 221-248.

 Sudha Ram and Jun Liu (2005): “An Agent Based Approach for Sourcing Business Rules in Supply Chain Management," International Journal of Intelligent Information Technologies, Vol. 1, January 2005, pp. 1-16.

Publications - Book Chapters

Sudha Ram and Jun Liu (2010): “Provenance Management in BioSciences," Advances in Conceptual Modeling – Applications and Challenges. Lecture Notes in Computer Science 6413, pp 54-64

Sudha Ram and Jun Liu (2007): “OABIS: An Ontology-based Approach for Business Rules Management," in Application of Agent and Intelligent Information Technologies, 2007, Vijay Sugumaran (eds.), Idea Group Inc, Hershey, PA, pp.1-21.

 Sudha Ram and Jun Liu (2007): “Understanding the Semantics of Data Provenance to Support Active Conceptual Modeling," Lecture Notes in Computer Science 4512, Leah Wang and Peter Chen (eds), pp. 1-12.

Dan Talley


  • Teaching economics using computer technology, international transmission of business cycles
  • Social Security and the U.S. national debt
  • The Great Recession and the slow growth recovery (2010-2016)

Research Areas

  • Technology-augmented economic instruction
  • Macroeconometrics/statistics
  • Money and banking
  • Macroeconomic research

Active research projects

Bank Efficiency After 2010 Dodd-Frank Using an X-Inefficiency Model with co-author Dr. Yenling Chang. Dr. Chang and I are in the early stages of research examining the cost efficiency of the banking system before and after the 2010 Dodd-Frank banking reform legislation. We presented our work at a conference in Houston, TX, on Feb. 15, 2018 for peer review and feedback. I am also on the dissertation committee for a student in the DSc. of Information Systems. And I am currently working with Dr. Jun Liu to draft a grant proposal to assess the cost efficiency and quality of care outcomes of a South Dakota health program under the auspices of the MadLabs® Center for Business Analytics Research.   


“Bank Risk in a Decade of Low Interest Rates” by Yenling Chang and Daniel A. Talley, Journal of Economics and Finance, Volume 41, Issue 3, July 2017, pgs. 505-528.  DOI:  10.1007/s12197-016-9367-5. 

“Solving The Educational Technology Puzzle:  Why Does Student Satisfaction Improve Even Though Learning Does Not?” by Daniel A. Talley, International Journal of Education Research, Volume 9, Number 1, Fall 2009, pgs. 107-124.  

“An Empirical Evaluation of the Educational Technology Puzzle” by Daniel A. Talley, Review of Business Research, Volume 4, Number 1, Winter 2009, pgs. 31-42.

Deb Tech


  • E-commerce
  • E-marketing
  • Technology
  • Innovation

Research Areas

  • Technology
  • Innovation
  • Marketing

Active research projects

Social media based trust for organizational knowledge-based sharing: this research evaluates the impact of connectivity, proximity, and privilege in a social media network within an organizational context. By understanding the impact of these variables, improvements in organizational knowledge sharing may be affected.

Google Scholar Algorithms and Broad Topic Search: This research intends to improve on the current Google Scholar Search System by allowing a broad topic search algorithm to diversify and allow synonymous search terms to be included and ranked with other results.

Marketing Technology: This research evaluates the emerging technologies of Artificial Intelligence, the Internet of Things, Virtual and Augmented Reality, and Blockchain technology within the realm of Marketing strategy.


  1. Lakkaraju, D. Tech, and S. Deng (2017, July). "A Framework for Profiling Prospective Students in Higher Education: Prospect profiling in higher education marketing." Encyclopedia of Information Science and Technology, Fourth Edition. IGI Global.
  2. Kearl, C. Noteboom and D. Tech (2017, May and July). "A Novel Improvement to Google Scholar Ranking Algorithms Through Broad Topic Search." Poster presentation at Midwest Association for Information Systems (MWAIS) Conference in Springfield, Illinois on May. Paper presentation at 23rd Americas Conference on Information Systems (AMCIS), July 2017.
  3. Nelson and D. Tech (2014, October). "Lead the parade: a case study depicting the use of traditional and online marketing strategies to expand into the hyper-growth market in the Bakken region of North Dakota." Paper presented at the South Dakota International Business Conference (SDIB), Rapid City, SD.
  4. Tech (2014, December). "Positioning and LinkedIn - Marketing Technology." Marketing lesson for publication on Merlot.org
  5. El-Bendary, B. Naik,  & D. Tech (2012, October). "Does Culture Influence Learning Styles? A Comparative Study of Two Cultures." Paper presented at the South Dakota International Business Conference (SDIB), Deadwood, SD.
  6. El-Bendary, B. Naik,  & D. Tech (2011, October). "Learning Styles of Egyptian Business Students." Paper presented at the South Dakota International Business Conference (SDIB), Rapid City, SD.
  7. Franco, B. Naik, & D. Tech (2010, October). "A Comparative Study of Learning Styles of Business Students in The United States and the Dominican Republic." Paper presented at South Dakota International Business Conference (SDIB), Rapid City, SD.

Tech Coffey, D. & Walters, J. (2010, October). "Digital Television Broadcast Adoption in Latin America." Paper presented at the SDIB, Rapid City, SD.

Tech Coffey, D. (2009, October). "Examining Networking Effects and Digital Television Adoption in Latin America: A Focus on Argentina." Paper presented at SDIB, Rapid City, SD.

Jack Walters


  • Human resource strategy
  • Professional ethics

Research Areas

  • Human resource strategy
  • Professional ethics

Active research projects

Writing a book about U.S. trade policy and its effect on middle-class wages and wealth.


"Positive Management" - 2010

Recent articles/presentations

Walters, J. (2014) “Using Video Vignettes to Teach Ethical Concepts”. Presented at NSU Annual Conference on International Business and Contemporary Issues in Business, Rapid City, SD.

Al-Omari, A., Deokar, A., El-Gayar, O., & Walters, J. (2013) “Information Security Policy Compliance: An Empirical Study of .Ethical Ideology in Jordanian Banks.” Hawaii International Conference on System Sciences, January.

Daniel Klumper


  • Producing better teachers from the DSU College of Education

Research Areas

  • Using virtual reality in preparing pre-service teachers

Active research projects

VALE: Virtual Avatar Learning Experience: Does using virtual reality increase pre-service teacher's ability to manage student behavior and engage students? Level 3 education students teach 2 lessons in the Mixed-Reality Virtual Classroom to practice classroom management strategies and teaching techniques. This gives students the opportunity to practice teaching in a realistic environment, reflect on their teaching and receive authentic feedback from peers and faculty.

Jennifer Nash


  • Science
  • STEM education

Research Areas

  • Strategies and technologies to improve science learning and teaching

Active research projects

NSF/EPSCoR Award No. IIA-1355423; The project's goal is to promote educational opportunities and workforce development in areas related to science, engineering, and mathematics by providing professional development to K-12 preservice and teachers.


J.M. Nash. "Using Universal Design for Learning in Online Instruction." Online Classroom. in revision;

J.M. Gross (Nash). "Pre-service Teachers Learn to Teach Science Using Picture Books." South Dakota Reading Council Journal IV(1): 8-11, 2009.

Kevin Smith


  • Educational technology
  • Mathematics education
  • Professional development for teachers
  • STEM in grades K-12

Research Areas

  • Adaptive learning programs in K-8 mathematics classrooms
  • Gamification in mathematics education
  • Preparing preservice teachers to teach STEM

Active research projects

Preparing preservice teachers to implement gamification in the mathematics classroom. I'm currently researching how a gamification activity that is implemented in a K-8 Math Methods course engages colleges students and prepares them to implement gamification concepts in their future classrooms. This is a qualitative study that will utilize survey data, interviews, and observations.

Assessing Perceptions of Elementary Preservice Teachers in STEM: Implications for Teacher Education Programs: I am working collaboratively with Dr. Nash on this research project. We conducted a survey with all current DSU Teacher Education students to determine what experiences have impacted their perceptions of teaching STEM in grades K-12. Our goal is to learn about what experiences have the most impact on our students.


(Accepted with minor revisions) Smith, K. D. (2018). "Perceptions of Preservice Teachers About Adaptive Learning Programs in K-8 Mathematics Education." Contemporary Educational Technology.

(Currently in review) Smith, K. D., and Klumper, D. (2018). "Using Virtual Reality to Prepare the Next Generation of Teachers. Educational Leadership."

Smith, K. D. (2017). "Using Seesaw to Open the Window to Your Classroom. ASCD Express," 13(2).

Krahenbuhl, K. S., and Smith, K. D. (2015). "Nearpod: A Technology Tool to Engage Students in Inquiry. ASCD Express," 10(9).