Dr. Shawon Rahman
Dr. Shawon Rahman
Dr.
Courses
Professor Rahman's current semester's course offerings include:
- CS 150 Intro To Computer Science I (3)
- CS 435 Ethical Hacking (3)
- CS 450 Org Of Programming Lang (3)
Education
- Ph.D, Software Engineering, North Dakota State University
- M.S., Computer Science, North Dakota State University
- B.S., Chemical Engineering, Bangladesh University of Engineering & Technology
Research Focus
- Cybersecurity
- Information Security and Assurance
- Cyber-Physical Systems Security
- STEM Outreach and Career Pathway
- Mobile Application Development
- Digital Forensics
- Software Engineering Education
- Web Accessibility and Usability
- Software Testing and Quality Assurance
- Robotics
Teaching Focus
- Cybersecurity
- Software Engineering
- Information Security and Assurance
- Digital Forensics and Investigations
- Mobile Application Development
- Management Information Systems
- Computer Networking
- Animation Programming
- Web Application Development
- Robotics Computation
- Business Computation
- Game Development
Services
- Program Director: Cybersecurity and Digital Forensics
- Chair: Chancellor Committee of Access (COA)
- Chair: IEEE and ACM Conferences
- Member: UH Hilo Faculty Congress
- Member: Hawaii State Assessment Program (HSAP)
- Faculty Advisor: UH Hilo Robotics club
- Editor- in-Chief: International Journal on Cryptography and Information Security (IJCIS) .
- Guest Editor: International Journal of Computer Networks and Communications (IJCNC)
- Associate Editor: International Journal of Network Security & Its Applications (IJNSA)
- Academic Advocate: Information Systems Audit and Control Association (ISACA)
Publications
Recent Publications-Selected Journals and Book Chapters
- Bhardwaj, Akashdeep; Kumar, Naresh and Rahman, Shawon S. M., “Unveiling Advanced Persistence Techniques Through Application Shimming and Countermeasures”, International Journal of Computer Networks & Communications (IJCNC), Vol.15, No.6, November 2023, DOI: https://doi.org/10.5121/ijcnc.2023.15604
- Porche, Joshua and Rahman, Shawon S. M., “Security Culture, Top Management, and Training on Security Effectiveness: A Correlational Study with CISSP Participants”, International Journal of Computer Networks & Communications (IJCNC), Vol.15, No.2, March 2023, DOI: 10.5121/ijcnc.2023.15205
- Phibbs, Christina L., and Rahman, Shawon S. M. 2022. "A Synopsis of “The Impact of Motivation, Price, and Habit on Intention to Use IoT-Enabled Technology: A Correlational Study”, Journal of Cybersecurity and Privacy, Special Issue Cyber-Physical Security for Critical Infrastructures, 2, no. 3: 662-699.
- Loukaka, Alain and Rahman, Shawon; “Security Vulnerability in Medical IoT Devices”; Dakota Digital Review, Published by the North Dakota University System, September 20, 2022. Link: https://dda.ndus.edu/ddreview/security-vulnerability-in-medical-iot-devices/
- Roberts, Gerrianne and Rahman, Shawon S. M., "Does Digital Native Status Impact End-User Antivirus Usage?" (May 19, 2021). International Journal of Computer Networks & Communications (IJCNC), Vol.13, No.2, March 2021, DOI: 10.5121/ijcnc.2021.13207
- Jackson, George and Rahman, Shawon “Applying the Health Belief Model to Cardiac Implanted Medical Device Patients”, International Journal of Network Security & Its Applications (IJNSA), Vol.13, No.2, March 2021, DOI: 10.5121/ijnsa.2021.13203
- Schneider, Marvin and Rahman, Shawon “Protection Motivation Theory Factors that Influence Undergraduates to Adopt Smartphone Security Measures ”; International Journal of Information Technology in Industry (ITII), Web of Science (Thomson Reuters) Indexed Journal, Vol 9, No 1 (2021)
- Vaishnavi D., Mahalakshmi D., Shawon Rahman M.S. “Digital Image Forgery Detection Using Ternary Pattern and ELM”; In: Jeena Jacob I., Kolandapalayam Shanmugam S., Piramuthu S., Falkowski-Gilski P. (eds) Data Intelligence and Cognitive Informatics. Algorithms for Intelligent Systems. Springer, Singapore. pp 77-86, 2021
- Loukaka, Alain and Rahman, Shawon; “Security Professionals Must Reinforce Detect Attacks to Avoid Unauthorized Data Exposure”; International Journal of Information Technology in Industry (ITII), Web of Science (Thomson Reuters) Indexed Journal, vol. 8, no.1, 2020
- Rahman, Shawon S. M.; Hossain, Nazmul; Hossain, Md; Hossain, Md and Hassan Imam Sohag, Md. "OAuth 2.0: A Framework to Secure the OAuth-Based Service for Packaged Web Application." In Innovative Perspectives on Interactive Communication Systems and Technologies. 92-139. Hershey, PA: IGI Global, 2020.
- Faizi, Salman and Rahman, Shawon; "Securing Cloud Computing Through IT Governance”; International Journal of Information Technology in Industry (ITII), Web of Science (Thomson Reuters) Indexed Journal, vol. 7, no.1, 2019, Pages: 1-14
- Adekanye, Michael and Rahman, Shawon “The Effect of Information Technology using Enterprise Security Risk Management”; International Journal of Network Security & Its Applications (IJNSA), Vol. 10, No.5, September 2018
- Hossain, Md; Sheikh, Nowsin; Rahman, Shawon; Biswas, Sujan and Islam, Md “Enhancing and Measuring the Performance in Software Defined Networking”; International Journal of Computer Networks & Communications (IJCNC), SCOPUS Indexed Journal, Vol.10, No.5, September 2018
- Loukaka, Alain and Rahman, Shawon; “Discovering New Cyber Protection Approaches From a Security Professional Prospective”; International Journal of Computer Networks & Communications (IJCNC) Vol.9, No.4, July 2017, SCOPUS Indexed Journal
- Hossain, Shamim, Rahman, Shawon and et al.; “Advances in Multimedia Sensor Networks for Health-Care and Related Applications”, International Journal of Distributed Sensor Networks, Hindawi Publishing Corporation, ISI Indexed journal (Editorial Article), Volume 2015 (2015)
Selected and Recent Conference Papers
- Kaushik, S; A. Bhardwaj and Rahman, Shawon, "MICORD-IDS: A Hybrid Learning System for Intrusion Detection System for the Internet of Vehicles," IEEE 2024 7th International Conference on Information and Computer Technologies (ICICT), Honolulu, HI, USA, 2024, pp. 485-492, doi: 10.1109/ICICT62343.2024.00085.
- Bhardwaj, A. and Rahman, Shawon, "Review of Security Threats and Attacks on IoT-based New Age Ecosystems," IEEE 2024 7th International Conference on Information and Computer Technologies (ICICT), Honolulu, HI, USA, 2024, pp. 413-420, doi: 10.1109/ICICT62343.2024.00073.
- Bhardwaj, Akashdeep; Mangal, Aarohi, and Rahman, Shawon; “Critical Security Assessment of Insecure Vulnerable iOS Application”, 12th International Conference on Advanced Engineering and ICT-Convergence (ICAEIC-2024), January 16-19, 2024, Honolulu, Hawaii, USA
- Schneider, Marvin and Rahman, Shawon; “Identifying Protection Motivation Theory Factors that Influence Smartphone Security Measures”; IEEE BigData 2021, Workshop on Big Data for CyberSecurity (BigCyber-2021), December 15-18 2021, DOI: 10.1109/BigData52589.2021.9671882
- Faizi, Salman and Rahman, Shawon; “Effect of Fear on Behavioral Intention to Comply”; ACM the 4th International Conference on Information System and Data Mining (ICISDM2020), May 15-17, 2020, Hilo, Hawaii, USA
- Faizi, Salman; Rahman, Shawon; and Hopkins, Kevin “Implementing Large Enterprise Resource Planning Systems with Agile Methods”; IEEE International Conference on Innovation in Engineering and Technology(ICIET) 2019, December 23-24, 2019, Dhaka, Bangladesh.
- Faizi, Salman and Rahman, Shawon; “Secured Cloud for Enterprise Computing”; 34th International Conference on Computers and Their Applications (CATA-2019), March 18-20, 2019, Waikiki Beach Marriott Resort & Spa, Honolulu, Hawaii, USA (INSPEC and Scopus Indexed).
- Okonofua, Henry and Rahman, Shawon; “Evaluating the Risk Management Plan and Addressing Factors for Successes in Government Agencies”; 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications (IEEE TrustCom-18), August 1-3, 2018, New York, USA
- Lidster, William and Rahman, Shawon; “Obstacles to Implementation of Information Security Governance”; 2nd IEEE International Symposium on Security, Privacy and Trust in Internet of Things (SPTIoT 2018), August 1-3, 2018, New York, USA
- Okonofua, Henry and Rahman, Shawon; “Cybersecurity: An Analysis of the Protection Mechanisms in a Cloud-centered Environment”; 2nd IEEE International Symposium on Security, Privacy and Trust in Internet of Things (SPTIoT 2018), August 1-3, 2018, New York, USA
- Hossain, Nazmul; Hossain, Md Alam; Hossain, Md Zobayer; Sohag, Md; and Rahman, Shawon; “OAuth-SSO: A Framework to Secure the OAuth-based SSO Service for Packaged Web Applications”; 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications (IEEE TrustCom-18), August 1-3, 2018, New York, USA
- Ahamed, Syed; Rahman, Shawon, and Peoples, John; “Doctor-Patient Interaction: Procedural Methodology for Computer Based Medical Assistant (CBMA)”, IEEE International Conference on Electrical, Electronics, Computers, Communication, Mechanical and Computing (EECCMC), Vellore District, Tamil Nadu, India, January 28-29, 2018
- Hossain, Md; Hossain, Nazmul; Shahid, Afridi and Rahman, Shawon; “Security Solution of RFID Card Through Cryptography”; The Third International Symposium on Dependability in Sensor, Cloud, and Big Data Systems and Applications (DependSys 2017), Guangzhou, China, December 12-15, 2017
- Jackson, George and Rahman, Shawon ; “Security Governance, Management, and Strategic Alignment via Capabilities”; IEEE 4th Annual Conference on Computation Science and Computational Intelligence (CSCI), The 2017 International Symposium on Cyber Warfare, Cyber Defense and Security (ISCW), Dec 14-16, 2017, Las Vegas, Nevada, USA
- Rahman, Shawon and Jackson, George; “Autonomic Methods for Mitigating Threats to the Internet of Things (IoT) ”; IEEE 4th Annual Conference on Computation Science and Computational Intelligence (CSCI), The 2017 International Symposium on Internet of Things & Internet of Everything (CSCI-ISOT), Dec 14-16, 2017, Las Vegas, Nevada, USA
Please contact