Li-Chiou Chen
Associate Professor
Department Chairperson

E-mail: lchen@pace.edu

Personal Website:
Click Here

School/College:
  • Seidenberg School of Computer Science and Information Systems

Department(s):
  • Information Technology West

Primary Location:

Office Hours: (Spring 2014)
Tuesday
10:00AM-3:00PM

Office Phone:
+1 (914) 773-3907

Secondary Location: Goldstein Academic Center

CV: DOWNLOAD

Biography

I am an assistant professor in the Department of Information Systems, School of Computer Science and Information Systems, Pace University. Prior to Pace, I worked with Professor Kathleen Carley in CASOS, School of Computer Science, Carnegie Mellon University (CMU), in Pittsburgh, PA. I obtained my Ph.D. in Engineering and Public Policy in 2003 from CMU and received an M.B.A. and a B.B.A. in Management Information Systems from National Chengchi University in Taipei, Taiwan.

Education

PhD, Carnegie Mellon University, Engineering and Public Policy, Pittsburgh, PA, US, 2003
Engineering and Public Policy

MS, Carnegie Mellon University, Engineering and Public Policy, Pittsburgh, PA, US, 2000
Engineering and Public Policy

MBA, National Chengchi University, Management Information Systems, Taipei, TA, Taiwan, 1994
Management Information Systems

BBA, National Chengchi University, Management Information Systems, Taipei, TA, Taiwan, 1992
Management Information Systems

Scheduled Courses

Spring 2014:
  • DCS 991: Dssrttn for DPS in Cmptg II

View All Courses Taught
  • CIS 101: Computers and Security
  • CIT 251: Computer Security Overview
  • CIT 352: Network and Internet Security
  • CIT 354: Computer Forensics
  • CIT 471: Information Tchnlgy Internship
  • CIT 490: Independent Study in Infor Tec
  • DCS 860: Topics in Data Security
  • DCS 891: Research Seminar VI
  • DCS 990: Dissertation for DPS in Cmptng
  • DCS 991: Dssrttn for DPS in Cmptg II
  • IS 495: Information Systems Internship
  • IS 632: Business Telecommunications
  • IS 641: Information Security/Controls
  • IS 650: Telecommunications Management
  • IT 300: Computer Security Overview
  • IT 304: Network & Internet Security
  • IT 600: Overrview:Computer Network/IT
  • IT 600: Overview:Computer Network/IT
  • IT 600: Ovrvw -Cmptr Network / IT Tech
  • IT 666: Information Security Managemnt
  • IT 691: IT for E-Commerce Project I
  • Research Interests

    Management Information Systems (Investigate and solve management and security problems raised by information technology, such as computer viruses, denial of service attacks, focusing on network theory and computational modeling); Artificial Intelligence (Combine artificial intelligence and social network techniques to conduct technological and policy analysis in the area of information security.); Information Policy (Study service models, economic incentives and public policies needed to facilitate the provision of defenses against distributed denial of service attacks on computer networks);

    Awards and Honors

    • Pace University, 2010 - Pace Sponsored Research Release-Time Award
    • Pace University, 2009 - Pace Scholarly Research Award
    • Pace University, 2008 - Pace Scholarly Research Award
    • Pace University, 2006 - Pace Seidenberg School Summer Research Grant
    • Pace University, 2005 - Pace Sponsored Research Release-Time Award
    • NULL, January 1, 1999 - Liang Ji-Dian Fellowship for Engineering and Science Students

    MEDIA CONTRIBUTIONS

    • WABC, TV [TV], January 18 2012
      News interview regarding English Wikipedia anti-SOPA (Stop Online Piracy Act) blackout
    • AT&T Internet Security News Network [Internet], 2006
      Regarding opinions on computer security issues
    • Westchester County Business Journal [Magazine], November 14 2005
      Regarding Seidenberg funding

    PROFESSIONAL MEMBERSHIPS

    • Academy of Information Management (AIM) [Member]
    • Association for Computing Machinery (ACM) [Member]
    • Association for Information Systems (AIS) [Member]
    • Institute of Electrical and Electronics Engineers (IEEE) [Member]
    • North American Association for Computational Social and Organizational Science (NAACSOS) [Member]

    Contract, Grants, and Sponsored Research

    • Enhancing Information Assurance Education through Interdisciplinary Education, Facility Enhancement, and Community Activities [Grant]
      Federal Cyber Service: Scholarship for Service (SFS), the Capacity Building Track Program Soliciation NSF 06-507 , Other , $0.00
      Funded,Under Review
    • Enhancing the Interdisciplinary Curriculum in Information Assurance by Engaging High-impact Educational Practices [Grant]
      Thinkfinity, Verizon Foundation , Pace University , $10,000.00
      Funded,Grant 2012
    • A Web Application for Financial Trading Simulation [Grant]
      Thinkfinity, Verizon Foundation , Pace University , $10,000.00
      Funded, 2011
    • National Science Foundation, Federal Cyber Service Scholarship for Service Program [Grant]
      Pace University , $435,174.00
      Funded, 2010
    • Security @ Web: Teaching Security with Alignment in Trust on the Web [Grant]
      Thinkfinity, Verizon Foundation , Pace University , $15,000.00
      Funded, 2010
    • Thinkfinity in support of Development of IT Auditing Teaching Modules: An Interdisciplinary Endeavor between Seidenberg and Lubin Faculty [Grant]
      Pace University , $15,000.00
      Funded, 2009
    • Information Assurance Grant [Grant]
      National Security Agency , Pace University , $179,905.00
      Funded, 2006
    • National Science Foundation, CISE Division (Co-PI), Project Title: "ADON: An Adaptive Tool for Early Detection of Anomalies in Temporal Network Data" [Grant]
      National Science Foundation , Other , $0.00
      Funded,Project Title: "ADON: An Adaptive Tool for Early Detection of Anomalies in Temporal Network Data" - 2003
    • A Web Application for Financial Trading Simulation [Grant]
      Thinkfinity Cornerstone 3: Interdisciplinary Informatics - Grant Application , Pace University , $10,000.00
      Funded,This project has three objectives. First, we will develop Web Application for Financial Trading Simulation (WAFTS) for trading simulation exercises. Second, we will train students in computer security classes to secure a web based financial application and WAFTS will serve as a platform for computer security testing exercises. Third, we will use WAFTS in financial trading classes. We will investigate how students behave during the financial trading simulation exercises in the events when computer security risk occurs. 2011
    • Collaborative Project: Secure Web Development Teaching Modules Collaborated with City University of New York - City College [Grant]
      National Science Foundation , Pace University , $99,956.00
      Funded, 2009
    • US Department of Defense Information Assurance Scholarship Program [Grant]
      Pace University , $109,602.95
      Funded,Curriculum Development Grant 2009
    • National Science Foundation ITR Grant, Senior Researcher, Project title: "Modeling Distributed Denial of Service Attacks and Defenses" [Grant]
      National Science Foundation , Other , $223,032.00
      Funded,Project title: Modeling Distributed Denial of Service Attacks and Defenses - National Science Foundation ITR Grant, Senior Researcher 2002

    Publications

    • Book, Chapter in Scholarly Book-New [Published]
      Effective Web and Java Security Education with the SWEET Course Modules/Resources
      Advanced Information Technology in Education, Series: Advances in Intelligent and Soft Computing , 2012
    • Conference Proceeding [Published]
      Open-Source IT Support for Effective Social Entrepreneurship
      Global Information and Management Symposium , August 2012
    • Journal Article, Academic Journal [Published]
      Teaching Web Security using Portable Virtual Labs
      July (3rd Quarter/Summer) 1 2012
    • Book, Scholarly-New
      A Model of Biological Attacks on a Realistic Population
      Unifying Themes in Complex Systems,Proceedings of the Fifth International Conference on Complex Systems , 2011
    • Conference Proceeding [Published]
      Teaching Web Application Security Using Virtualized Laboratory Exercises
      Proceedings of the 15th Colloquium for Information Systems Security Education , June 13 2011
    • Conference Proceeding [Published]
      Improving Web Security Education with Virtual Labs and Shared Course Modules
      Proceedings of the 40th ASEE/IEEE Frontiers in Education Conference – FIE , October (4th Quarter/Autumn) 27 2010
    • Conference Proceeding [Published]
      Virtual Open-Source Labs for Web Security Education
      Proceedings of the World Congress on Engineering and Computer Science – WCECS 2010 , October (4th Quarter/Autumn) 20 2010
    • Conference Proceeding [Published]
      An Integrated Model of Individual Web Security Behavior
      Proceedings of the 16th Americas Conference on Information Systems – AMCIS 2010 , August 1 2010
    • Conference Proceeding [Published]
      Perceived Online Security and Trust from a Student Perspective: An Exploratory Study
      Proceedings of the Global Business and Technology Association's 12th Annual International Conference , July (3rd Quarter/Summer) 1 2010
    • Conference Proceeding [Published]
      A Tool for Teaching Web Application Security
      Proceedings of the 14th Colloquium for Information Systems Security Education , June 9 2010
    • Conference Proceeding [Published]
      A Hands-on Overview Course for Computer Science and Modern Information Technologies
      Proceedings of The Michael L. Gargano 8th Annual Student/Faculty Research Day , May 1 2010
    • Conference Proceeding [Published]
      Improving Web Security Education with Virtual Labs and Shared Course Modules
      Proceedings of The Michael L. Gargano 8th Annual Student/Faculty Research Day , May 1 2010
    • Conference Proceeding [Published]
      Individual Risk Perception and Attitude Towards Computer Security Risk
      Third International Conference on Internet Technologies and Applications (ITA 09) , September 7 2009
    • Conference Proceeding [Published]
      An Investigation of Decision-making and the Tradeoffs Involving Computer Security Risk
      15th Americas Conference on Information Systems (AMCIS 2009) , August 5 2009
    • Conference Proceeding [Published]
      Individual Risk Perception and Attitude Towards Computer Security Risk
      15th Americas Conference on Information Systems (AMCIS 2009) , August 5 2009
    • Conference Proceeding [Published]
      A Hands-on Overview Course for Computer Science and Modern Information Technologies
      IEEE Frontiers in Education (FIE) , October (4th Quarter/Autumn) 22 2008
    • Conference Proceeding [Published]
      Combining Theory with Practice in Information Security Education
      Proceedings of the 11th Colloquium for Information Systems Security Education – CISSE , June 1 2007
    • Journal Article, Academic Journal [Published]
      BioWar: Scalable Agent-based Model of Bioattacks
      IEEE Transactions on Systems, Man and Cybernetics - Part A , March 1 2006
    • Journal Article, Academic Journal [Published]
      Model Alignment of Anthrax Attack Simulations
      Intelligence and Security Informatics - Special Issue: Decision Support Systems , March 1 2006
    • Cited Research [Published]
      A Note on the Spread of Worms in Scale-Free Networks, by C. Griffin and R. Brooks
      IEEE Transactions on Systems, Man and Cybernetics - Part B: Cybernetics , February 1 2006
    • Book Review [Published]

      IEEE Security and Privacy , January (1st Quarter/Winter) 1 2006
    • Cited Research [Published]
      Application and Analyses of Cumulative Sum to Detect Highly Distributed Denial of Service Attacks using Different Attack Traffic Patterns, by Hellinton H. Takada and Ulrich Hofman
      Information Society Technologies , December 31 2005
    • Book Review [Published]

      European Journal of Operational Research , December 31 2005
    • Book Review [Published]

      IEEE Transactions on Systems, Man and Cybernetics , December 31 2005
    • Cited Research [Published]
      Heterogeneity and Network Structure in the Dynamics of Diffusion: Comparing Agent-Based and Differential Equation Models, by Hazhir Rahmandad and John Sterman
      MIT Sloan School of Management, Paper Series ESD-WP-2004-05 , December 31 2005
    • Cited Research [Published]
      M-CI2: Modelling Cyber Interdependence between Critical Infrastructures, by Henry M. Kim, Markus Biehl and John A. Buzacott
      Proceedings of the IEEE Conference on Industrial Informatics (INDIN) 2005 , December 31 2005
    • Cited Research [Published]
      Model of Computer Virus Propagation in the Network, by Xiaoli Li and Lina Wang
      IEEE Transactions on Systems, Man and Cybernetics - Part B: Cybernetics , December 31 2005
    • Book, Textbook-New [Published]
      The Provision of Defenses Against Internet-based Attacks
      Readings and Cases in the Management of Information Security , 2005
    • Conference Proceeding [Published]
      Decentralizing Advanced Laboratory Diagnostics Could Reduce Anthrax Attack Mortality
      Society for Risk Analysis Annual Meeting , December 4 2005
    • Cited Research [Published]
      Distributive Immunization of Networks Against Viruses Using the 'Honey-Pot' Architecture, by Jacob Goldenberg, Yuval Shavitt, Eran Shir and Sorin Solomon
      Nature Physics , December 1 2005
    • Cited Research [Published]
      Monitoring the Macroscopic Effect of DDoS Flooding Attacks, by Jian Yuan and Kevin Mills
      IEEE Transactions on Dependable and Secure Computing , October (4th Quarter/Autumn) 1 2005
    • Conference Proceeding [Published]
      Identifying Malicious Web Requests through Changes in Locality and Temporal Sequence
      DIMACS Workshop on Security of Web Services and E-Commerce , May 5 2005
    • Book, Chapter in Scholarly Book-New [Published]
      The Provision of Defenses Against Internet-based Attacks
      Readings and Cases in the Management of Information Security, M. Whitman and H. Mattord, eds., Course Technology/Thomson Learning , March 1 2005
    • Book Review [Published]

      Decision Support Systems , January (1st Quarter/Winter) 1 2005
    • Journal Article, Academic Journal [Published]
      Characterization of Defense Mechanisms Against Distributed Denial of Service Attacks
      Computers & Security , December 31 2004
    • Book Review [Published]

      Americas Conference on Information Systems 2004 , December 31 2004
    • Book Review [Published]

      IEEE Transactions on Systems, Man and Cybernetics , December 31 2004
    • Book Review [Published]

      Decision Support Systems , December 31 2004
    • Book Review [Published]

      The 2nd Symposium on Intelligence and Security Informatics , December 31 2004
    • Technical Report
      Estimating the Windows of Opportunity for Biological Attack Detection using BioWar
      ISRI Technical Report,Carnegie Mellon University , 2004
    • Journal Article, Academic Journal [Published]
      The Economic Incentives of Providing Network Security Defenses on the Internet Infrastructure
      December 1 2004
    • Conference Proceeding [Published]
      The Economic Incentives of Providing Network Security Defenses on the Internet Infrastructure
      Proceedings of the American Conference on Information Systems , August 5 2004
    • Conference Proceeding [Published]
      Aligning Simulation Models of Biological Attacks
      Proceedings of the North American Association for Computational Social and Organizational Science Conference (NAACSOS) , June 1 2004
    • Journal Article, Academic Journal [Published]
      The Impact of Countermeasure Spreading on the Prevalence of Computer Viruses
      IEEE Transactions on Systems, Man and Cybernetics-Part B: Cybernetics , April (2nd Quarter/Spring) 1 2004
    • Book Review [Published]

      IEEE Transactions on Systems, Man and Cybernetics , January (1st Quarter/Winter) 1 2003
    • Conference Proceeding [Published]
      Identifying Critical Points of a Computer Network
      Proceedings of the Conferences in Computational Social and Organizational Science , June 1 2002
    • Newsletter [Published]
      Modeling Distributed Denial of Service Attacks and Defenses
      Pennsylvania Infrastructure Technology Alliance Symposium , January (1st Quarter/Winter) 1 2002
    • Journal Article, Academic Journal [Published]
      A Computational Model of Computer Virus Propagation
      Proceedings of the Conferences in Computational Social and Organizational Science , July (3rd Quarter/Summer) 1 2001
    • Journal Article, Academic Journal [Published]
      The Impact of Countermeasure Spreading on the Propagation of Computer Viruses
      IEEE Transactions on Systems, Man and Cybernetics - Part B , January (1st Quarter/Winter) 1 2001
    • Book, Scholarly-New [Published]

      Learning Windows NT Server 4, official Chinese translation , December 1 1997

    PRESENTATIONS

    • Teaching web application security using virtualized laboratory exercises [Other]
      Title: Participant
      The Proceedings of the 15th Colloquium for Information Systems Security Informat, Fairborn, Ohio
    • Seidenberg Institute of Computing Innovation [Other]
      Title: Co-chair
    • SWEET: Secure Web Development Teaching Moodules [Other]
      Title: Participant
      CCLI-TUES Conference, Washington, D.C.,
    • Savvy or Naïve?: Factors that Students Consider when Evaluating the Trustworthiness and Security of Websites [Keynote/Plenary Address]
      Title: Presenter
      Direct/Interactive Marketing Research Summit, San Francisco, CA
    • Pace Computer Club [Lecture]
      Title: "Fun and Opportunity with Cyber Security"
    • DIMACS Workshop on Security of Web Services and E-Commerce [Other]
      Title: "Identifying Malicious Web Requests through Changes in Locality and Temporal Sequence"
      Piscataway, NJ
    • Workshop on Link Analysis, Counterterrorism and Security [Other]
      Title: April 2005
      Newport Beach, CA
    • Workshop on Link Analysis, Counterterrorism and Security [Other]
      Title: April 2005
      Newport Beach, CA
    • CSIS Information Systems Research Seminar [Other]
      Title: "The Provision of Defenses against Internet-Based Attacks"
      Pace University - CSIS
    • Americas Conference on Information Systems - AMCIS 2004 [Other]
      Title: 2004 Conference
      New York, NY
    • The 2004 American Conference on Information Systems [Other]
      Title:
      New York, NY
    • The Second Symposium on Intelligence and Security Informatics [Keynote/Plenary Address]
      Title:
    • Proceedings of Conferences in Computational Social and Organizational Science [Other]
      Title: "Identifying Critical Points of a Computer Network"
      Proceedings of Conferences in Computational Social and Organizational Science
    • Carnegie Mellon University - Information Systems Program, Undergraduates [Lecture]
      Title: "Cyber Attacks and Their Countermeasures"
      Information Systems Program, Undergraduates
    • CERT/CC, Software Engineering Institute [Lecture]
      Title: "Comparative Analysis of DDOS defenses"
      CERT/CC, Software Engineering Institute
    • Proceedings of Conferences in Computational Social and Organizational Science [Other]
      Title: "A Computational Model of Computer Virus Propagation"
      Conferences in Computational Social and Organizational Science, Pittsburgh, PA
    • Pennsylvania Infrastructure Technology Alliance Symposium [Other]
      Title: "Modeling Distributed Denical of Service Attacks and Defenses"
      Pennsylvania Infrastructure Technology Alliance Symposium, Harrisburg, PA

    Department Service

    • Pace University, Computer Science & Information Systems [Faculty Advisor]
      Desc: Advisor to Alex Tsekhansky
    • Pace University, Computer Science & Information Systems [Service Contributions - CSIS Westchester]
      Desc: Various contributions including set-0up of Pleasantville Security Lab, recommendation letters for Joseph Acampora, Andreea Cotoranu; DoD Scholarship candidates review and recommendations, and DoD scholarship applications for Franklin Philips, among others.

    College Service

    • Pace University, Computer Science & Information Systems [Committee Member]
      Desc: Master's Thesis Advisor to Kjetil
    • Pace University, Computer Science & Information Systems [Committee Member]

    University Service

    • Pace University, Computer Science & Information Systems [Attendee, Meeting]
      Desc: Attended Open Houses, Commencement Ceremonies, Awards Ceremonies, and New Student Welcome Event(s)
    • Pace University, Computer Science & Information Systems [Attendee, Meeting]
      Desc: Attended Open Houses, Commencement Ceremonies, Awards Ceremonies, and New Student Welcome Event(s)
    • Westchester campus, ABET accreditation for the BS/IT program [Lead faculty member]
      Desc: ABET accreditation for course syllabi
    • Seidenberg School Faculty Committee [Vice Chair]
      Desc: Facilitate discussions/communications of faculty related issues and host meetings
    • National Science Foundation’s Scholarship for Service Program (SFS) at Pace [Program Director]
      Desc: - Advise SFS scholarship students regarding academics and placement search. - Participate in NSF activities related to the program - Manage the grant and write proposals to the NSF to secure the funding - Initiate cyber security activities to promote the program
    • Pace University Benefits Advisory Committee [Committee Member]
      Desc: Review and suggest for Health Plan Options and evaluated Flexible Spending Account management companies
    • Department of Defense’s Information Assurance Scholarship Program (IASP) at Pace [2004-2012 as faculty advisor and 2012-Current as program director]
      Desc: - Advise scholarship applicants and recipients - Establish a computer security laboratory for student research and projects - Manage the grant and write proposals to the DoD to secure the funding
    • Seidenberg School TAP Committee [Committee Member]
      Desc: Review faculty tenure and promotion candidates
    • Technology Sub-Committee, Seidenberg School Faculty Committee [Co-Chair]
      Desc: Advise school issues related to computing facility/technology
    • Seidenberg School Information Systems Curriculum Committee [Committee Member]
      Desc: Develop new curriculum in the MS in Information Systems program and the BS in Information Technology program

    PROFESSIONAL Service

    • American Conference on Information Systems, 2009 & 2010 ,Colloquium for Information Systems Security Education, 2010 & 2011 [Session Chair]
    • Colloquium for Information Systems Security Education 2006-2013 ,American Conference on Information Systems 2004, 2008-2013 ,Workshop on Link Analysis, Counter Terrorism and Security 2005 ,The Second Symposium on Intelligence and Security Informatics , 2004 [Conference-Related]
      Desc: Conference reviews
    • IEEE Services Workshop on Security and Privacy Engineering, 2012 & 2013 -,7th Annual Midwest Association of Information Systems Conference, May, 2012 , Workshop on Link Analysis, Counter Terrorism and Security 2005 [Program committee]
    • Management Science ,IEEE Security and Privacy ,IEEE Transactions on Systems : Man and Cybernetics ,Decision Support Systems ,European Journal of Operational Research ,Journal of Electronic Commerce Research ,Communications of ACM [Reviewer, Journal Article]
      Desc: Review journals
    • National Science Foundation [Panel Reviewer ]
    • Information Assurance Curriculum Advisory Board [Member]
      Desc: State University of New York - Rockland Community College curriculum advisory

    PUBLIC SERVICE

    • Having Fun With Cyber Security” in the “Exploring Your Opportunities Workshop,” Science and Technology Workshops for Young Girls, College of Mount Saint Vincent, Riverdale [Workshop Leader]
      Desc: Cyber Security and Science and Technology Workshops