Dr. Mark B. Schmidt

Dr. Mark B. Schmidt

Professor of Information Systems
Interim Director of Center of Academic Excellence
Ph.D. in Business Information Systems
Centennial Hall 311 – (320) 308-4988
mark@stcloudstate.edu
http://web.stcloudstate.edu/mbschmidt

 

Dr. Mark B. Schmidt was involved in teaching Business Security while pursuing his doctoral degree at Mississippi State University.  He also assisted the setup of a 70K lab funded by the Center for Computer Security Research and the National Science Foundation.  He has expertise in spyware, steganography and general security, which include several research publications in these areas. 

Education:

  • Ph.D.  in Business Information Systems, Mississippi State University, 2006
  • Master of Science in Business Information Systems, Mississippi State University, 2004
  • Master of Business Administration, Saint Cloud State University, 1995
  • Bachelor of Science in Agribusiness and Business Administration, Southwest State University, 1993

Area of Teaching:

  • IS 340 Management Information Systems
  • IS 481 Introduction to Computer Forensics
  • IA 681 Digital Forensics and Ethics
  • MBA 605 Investigating Corporate Fraud
  • MBA 632 Management Support System

Research Interests:

  • Information security
  • End-user computing
  • Innovative information technologies

Recent Publications:

Refereed Journal Articles

Phan, D. D., Schmidt, M., & Chen, Q. J. (2010). Organizational Ecology Success Factors in the Business: A Case Study at Fingerhut Inc. Information Systems Management, 27(1), 82-91.

Lee, O. F., Guster, D. C., Schmidt, M., & McCann, B. (2009). Applying the Scale-Free Degree Distribution Algorithm to Assess Communication Complexity and Failure Points in Disaster Recovery Models. Journal of Information Technology Management, 20(2), 35-46.

Guster, D. C., Schmidt, M., & Bergiel, E. B. (2009). Distributed Clusters and the Effects of Switch Configuration and Line Speed. Business Research Yearbook, 16(1), 139-144.

Lee, O. F., Guster, D. C., & Schmidt, M. (2009). WAN Line Speed and its Implications for the Support of Globally Remote Replicas in a Disaster Recovery Model. Business Research Yearbook, 16(1), 349-354.

Guster, D. C., Schmidt, M., Hall, C., & Brown, C. (2009). Evaluating Performance and Scalability Issues in Distributed Data Mining: A First Level Analysis. International Journal of Business, Marketing, and Decision Sciences, 2(1).

Bekkering, E., Johnston, A. C., Warkentin, M., & Schmidt, M. (2009). An Empirical Assessment of Technology Adoption as a Choice Between Alternatives. Information Resources Management Journal, 22(4), 23-44.

Ma, Q., Schmidt, M., & Pearson, J. M. (2009). An Integrated Framework for Information Security Management. Review of Business, 30(1).

Schmidt, M., Chen, Q. J., Phan, D. D., & Arnett, K. P. (2009). Security Perceptions of E-Commerce Users. Journal of Internet Commerce, 8(1-2), 44-57.

Chen, Q. J., Schmidt, M., Phan, D. D., & Arnett, K. P. (2008). E-Commerce Security Threats: Awareness, Trust, and Practice. International Journal of Information Systems and Change Management, 3(1), 16-32.

Warkentin, M., Bekkering, E., & Schmidt, M. (2008). Steganography: Forensic, Security, and Legal Issues. Journal of Digital Forensics, Security and Law, 3(2), 17-34.

Templeton, G. F., Schmidt, M., & Taylor, G. S. (2008). Managing the Diffusion of Organizational Learning Behavior. Information Systems Frontiers, 10.

Schmidt, M., Johnston, A. C., Arnett, K., Chen, Q. J., & Suicheng, L. (2008). Cross-Cultural Comparison of US and Chinese Computer Security Awareness. Journal of Global Information Management, 16(2), 91-103.

Weber, J. E., Guster, D. C., Safonov, P. I., & Schmidt, M. (2008). Weak Password Security: An Empirical Study. Information Security Journal, 17(1), 45-54.

Arnett, K. P., Schmidt, M., Johnston, A. C., Kim, J., & Hwang, H. (2007). Rootkits and What We Know: Assessing US and Korean Knowledge and Perceptions. International Journal of Information Security and Privacy, 1(4), 75-86.

Johnston, A. C., Schmidt, M., Arnett, K. P., & Thomas, J. (2007). Getting to the Root of the Problem. Journal of Internet Commerce, 6(1), 1-12.

Schmidt, M., Johnston, A. C., & Arnett, K. P. (2007). US and Korean Perspectives on Malware: A Closer Look. Business Research Yearbook, 14, 506-512.

Schmidt, M., Johnston, A. C., & Arnett, K. P. (2006). An Empirical Investigation of Rootkit Awareness. Business Research Yearbook, 13, 153-158.

Schmidt, M., Guster, D. C., & Nordby, M. (2006). Managing the Enterprise Network: Performance of Routing Versus Switching on a State of the Art Switch. Business Research Yearbook, 13, 147-152.

Templeton, G. F., & Schmidt, M. (2005). A Critical Time for Ultra-Wide Band. Journal of International Technology and Information Management, 14(3), 67-72.

Arnett, K. P., & Schmidt, M. (2005). Busting the Ghost in the Machine. Communications of the ACM, 48(8), 92-95.

Schmidt, M., & Arnett, K. P. (2005). Spyware: A Little Knowledge is a Wonderful Thing. Communications of the ACM, 48(8), 67-70.

Journal Articles

Schmidt, M., & Condon, M. J. (in press). Computer Forensics: Examining the Effectiveness of File Deletion. Journal of Information Systems Security, 7(2).

Arnett, K. P., Schmidt, M., & Johnston, A. C. (2004). Wireless Networks in Small Town Mississippi. Mississippi Business Journal.

Book Chapters

Guster, D. C., Schmidt, M., Sultanov, R., & Hall, C. (in press). Analyzing bandwidth usage in a distributed processing environment. In Handbook of Communication Networks and Distributed Systems (World Scientific).

Arnett, K. P., Schmidt, M., Johnston, A. C., Kim, J., & Hwang, H. (2009). Rootkits and What we Know: Assessing US and Korean Knowledge and Perceptions. In Techniques and Applications for Advanced Information Privacy and Security: Emerging Organizational, Ethical and Human Issues. Hershey, PA: IGI Global.

Merrill, W., Schmidt, M., & Bekkering, E. (2008). Steganography. In Cyber Warfare and Cyber Terrorism (pp. 50-56). Hershey, PA: Information Science Reference.

Warkentin, M., Schmidt, M., & Bekkering, E. (2007). Steganography and Stegananalysis. In Intellectual Property Protection for Multimedia Information Technology (pp. 374-380). Hershey, PA: IGI Global.

Becker, R. G., Schmidt, M., & Johnston, A. C. (2007). Mitigation of Identity Theft in the Information Age. In Encyclopedia of Information Ethics and Security. Hershey, PA: Information Science Reference.

Hanson, J. M., & Schmidt, M. (2007). Secure Automated Clearing House Transactions. In Encyclopedia of Information Ethics and Security. Hershey, PA: Information Science Reference.

Warkentin, M., Schmidt, M., & Bekkering, E. (2006). Steganography and Stegananalysis. In Enterprise Information Systems Assurance and System Security: Managerial and Technical Issues (pp. 287-294). Hershey PA: Idea Group Publishers.

Other

Schmidt, M., & Mooney, K. K. (in press). Discovering and Investigating Corporate Fraud at the MBA level: A Team Teaching Approach: Proceedings of the International Academy of Business and Public Administration Disciplines (IABPAD) Conference.

Guster, D. C., Schmidt, M., Smith, M., & Gillespie, N. (in press). Implementing Cloud Computing in a Departmental University Instructional and Research Computing Domain: Challenges and Benefits: Proceedings of the International Academy of Business and Public Administration Disciplines (IABPAD) Conference.

McCann, B., Schmidt, M., & Guster, D. C. (2011). Reverse TCP Attacks: Analysis and Prevention: Proceedings of the International Academy of Business and Public Administration Disciplines.

Condon, M. J., & Schmidt, M. (2010). Is that File Really Gone?  Computer Forensics to Recover the Unrecoverable: Proceedings of the 2010 Security Conference.

Phan, D. D., & Schmidt, M. (2010). Swarm Theory and Business Intelligence for Decision Making in Online and Catalog Retailing Firms. New Orleans, LA: Proceedings of the National Decision Sciences Institute (DSI) Conference.

Phan, D. D., & Schmidt, M. (2009). Business Intelligence for Decision Making in Online and Catalog Retailing Firms (research abstract). New Orleans, LA: Proceedings of the National Decision Sciences Institute (DSI) Conference.

Schmidt, M., Guster, D. C., Lee, O. F., & McCann, B. (2009). Disaster Recovery Planning, Analyzing the Dilemma: In-house vs. Outsourced with Special Consideration to the WAN Resources Required. New Orleans, LA: Proceedings of the National Decision Sciences Institute (DSI) Conference.

Guster, D. C., Schmidt, M., & Hemminger, C. (2009). Host Virtualization as the Key to Enhanced Sustainability and Reliability for Companies that have Data Center Infrastructure with an International Footprint. Rapid City, SD: Proceedings of the Annual International Business Conference.

Lee, O. F., Guster, D. C., & Schmidt, M. (2009). A First Approach in the Assessment of the Complexity of Disaster Recovery Models for SMEs. San Francisco, CA: Proceedings of the 2009 Americas Conference on Information Systems (AMCIS).

Schmidt, M., Weber, J. E., Van Erp, N., & Mumm, M. M. (2009). Assessing Student Interest in Hybrid Course Delivery at the MBA Level. San Francisco, CA: Proceedings of the 2009 Americas Conference on Information Systems (AMCIS).

Schmidt, M., & Mumm, M. M. (2009). A Hands-on Approach to Service Learning Projects in Systems Analysis and Design. Las Vegas, NV: Proceedings of the 2009 ISOneWorld Conference.

Schmidt, M., Dampier, D. A., & Guster, D. C. (2009). A Multi-University Resource Allocation Approach to Provide Computer Forensics Education for Law Enforcement Agents. Las Vegas, NV: Proceedings of the 2009 Security Conference.

Jacobson-Schulte, P., Schmidt, M., & Yoshimoto, G. (2009). The Use and Security of Data in the Higher Education Environment. Las Vegas, NV: Proceedings of the American Society of Business and Behavioral Sciences.

Schmidt, M., Weber, J. E., Guster, D. C., & Safonov, P. I. (2009). Training Users to Develop Stronger Passwords. Orlando, FL: Proceedings of the International Academy of Business and Public Administration Disciplines (IABPAD) Conference.

Schmidt, M., Das, D., Kumar, V., & Bekkering, E. (2008). A Proposed Study and Analysis of User Perceptions of Biometric Acceptance. Baltimore, MD: Proceedings of the National Decision Sciences Institute (DSI) Conference.

Guster, D. C., Schmidt, M., Hall, C., & Brown, C. (2008). A Preliminary Analysis of Web Accessible Distributed Data Mining: Performance and Scalability. Orlando, Fl.: Proceedings of the International Academy of Business and Public Administration Disciplines (IABPAD) Conference.

Chen, J. Q., Schmidt, M., Phan, D. D., & Arnett, K. P. (2007). E-commerce Security Threats, Awareness, Trust, and Security Practices: An Assessment of Perceptions. Phoenix, AZ.: Proceedings of the National Decision Sciences Institute (DSI) Conference.

Schmidt, M., Chen, Q. J., Phan, D. D., & Arnett, K. P. (2007). Comparing Security Perceptions of E-Commerce Users. Keystone, CO: Proceedings of the 2007 Americas Conference on Information Systems (AMCIS).

Schmidt, M., & Arnett., K. P. (2007). Synthesis and Analysis of Moore and Benbasat’s PCI and Witte’s Susceptibility and Severity of Threat Scales. Keystone, CO: Proceedings of the 2007 Americas Conference on Information Systems (AMCIS).

Schmidt, M., Johnston, A. C., & Arnett, K. P. (2007). US and Korean Perspective on Malware: A Closer Look. Orlando, FL: Proceedings of the International Academy of Business Disciplines (IABD).

McDermott, S., Schmidt, M., & Yoshimoto, G. (2007). NSA Electronic Surveillance Database. Las Vegas, NV: American Society of Business and Behavioral Sciences.

Schmidt, M., & Halverson, M. S. (2006). DSS for Global Competitive Advantage. Bangkok, Thailand: Academy of International Business Southeast Asia Regional Conference.

Schmidt, M., Chen, Q. J., & Weber, J. E. (2006). An Analysis of Data Warehousing to Promote National Security. San Antonio, TX: Proceedings of the National Decision Sciences Institute Conference.

Schmidt, M., Guster, D. C., & Sundheim, R. A. (2006). An Empirical Analysis of Network Packet Traffic Protocols. San Antonio, TX: Proceedings of the National Decision Sciences Institute Conference.

Warkentin, M., Shropshire, J., Johnston, A. C., & Schmidt, M. (2006). Personality and IT Security: An Application of the five-factor model. Acapulco, Mexico: Proceedings of the 2006 Americas Conference on Information Systems.

Schmidt, M., Johnston, A. C., & Arnett, K. P. (2006). An Empirical Investigation of Rootkit Awareness. San Diego, CA: International Academy of Business Disciplines (IABD).

Schmidt, M., Nordby, M. D., & Guster, D. C. (2006). Managing the Enterprise Network: Performance of Routing Versus Switching on a State of the Art Switch.. San Diego, CA: Proceedings of the International Academy of Business Disciplines (IABD).

Arnett, K. P., Schmidt, M., & Shim, J. P. (2005). Tablet PCs to Teach Information Systems Courses. Omaha, NE: Proceedings of the 2005 Americas Conference on Information Systems.

Bekkering, E., Schmidt, M., Johnston, A. C., Warkentin, M., & Nelson, P. (2004). Empirical Investigation of Attractiveness of Tablet PCs to Mobile Professionals. Boston, MA: Proceedings of the National Decision Sciences Institute Conference.

Schmidt, M., & Vance, D. A. (2004). IT Does Matter (At Least When it is Properly Managed). New York, NY: Proceedings of the 2004 Americas Conference on Information Systems.

Shim, J. P., Arnett, K. P., & Schmidt, M. (2004). Videostreaming, Horizon Live, and Tablet PCs ...Teaching IS: Revisited. New York, NY: Proceedings of the 2004 Americas Conference on Information Systems.

Schmidt, M., Johnston, A. C., & Arnett, K. P. (2004). Wireless Network Security in Hospitality SME's. New York, NY: Proceedings of the 2004 Americas Conference on Information Systems.

Warkentin, M., Schmidt, M., Johnson, A. C., & Boren, M. (2004). IS Security Management Framework: A Comprehensive Life Cycle Perspective. New Orleans, LA: Proceedings of the 2004 Information Resources Management Association (IRMA).

Warkentin, M., Bekkering, E., Schmidt, M., & Johnston, A. C. (2004). Proposed Study of End-User Perceptions Regarding Tablet PCs. New Orleans, LA: Proceedings of the 2004 Information Resources Management Association (IRMA).

Johnston, A. C., Schmidt, M., & Bekkering, E. (2004). IT Security Management Practices: Success and Failures in Coping with Blaster and Sobig.F. Las Vegas, NV: Proceedings for the 2004 ISOneWorld International Conference.

Schmidt, M., Bekkering, E., & Warkentin, M. (2004). On the Illicit use of Steganography and its Detection. Las Vegas, NV: Proceedings of the 2004 ISOneWorld International Conference.

Schmidt, M. (2004). Steganography: New Techniques for an Ancient Practice. Las Vegas, NV: Proceedings of the 2004 Security Conference.

Schmidt, M. (2003). The Common Core of Data: An Overview. Mississippi State, MS: Mississippi State University Libraries' Corporate and Statistical Research Center and the Department of Sociology.

Shim, J. P., Arnett, K. P., & Schmidt, M. (2003). Using Streaming Technology and Tablet PCs for Teaching Information Systems. Tampa, FL: Proceedings of the 2003 Americas Conference on Information Systems (AMCIS).

Schmidt, M. (2003). Byte Wars: The Impact of September 11 on Information Technology by Edward Yourdon (3rd ed., vol. 15): Journal of End User Computing.

Bekkering, E., & Schmidt, M. (2003). A Discussion of Biometric Security Trade-offs. Las Vegas, NV: Proceedings of the 2003 ISOneWorld International Conference.

Schmidt, M., & Johnston, A. C. (2003). Biometric Controls Used to Secure Access at Mississippi State University. Las Vegas, NV: Proceedings of the 2003 ISOneWorld International Conference.

Warkentin, M., & Schmidt, M. (2003). Evaluating Executive Perceptions of IS Security Threats and Responses: A Post 9/11 Critique. Las Vegas, NV: Proceedings of the 2003 ISOneWorld International Conference.

Go back to faculty list

 

Untitled Document