Department of Information Systems

Mark B. Schmidt

Mark SchmidtDr. Mark B. Schmidt is involved with both the CySP & SFS scholarship programs. These programs have brought millions of dollars to St. Cloud State for student scholarships and capacity building. He has expertise in digital forensics, steganography and general security, he has over 100 research publications & presentations in these areas.

Education

Ph.D. in Business Information Systems, Mississippi State University, 2006

Master of Science in Business Information Systems, Mississippi State University, 2004

Master of Business Administration, Saint Cloud State University, 1995

Bachelor of Science in Agribusiness and Business Administration, Southwest State University, 1993

Area of Teaching

  • IS 242 Business Statistics
  • IS 340 Management Information Systems
  • IA 681 Digital Forensics and Ethics
  • MBA 616 Information Systems Strategy and Management
  • HBS 410 / 510 Educational Tours: Australia
  • HBS 479 / 579 Special Topics in Global Business

Research Interests

Information security, End-user computing, Innovative information technologies

Recent Publications

Refereed Journal Articles

  • Stalboerger, Katelyn R., Mark B. Schmidt, and Perian N. Stavrum. “Shifts in Poverty and Education Due to Covid-19 Pandemic: Documented Evidence.” International Journal of Business Research and Information Technology (IJBRIT). Volume 19, Issue 1, 2022, pp 22-40.
  • Erickson, Andrew; Dennis C. Guster; Leena Radeke; and Mark B. Schmidt. “Quantum Information Systems and Encryption: Quantum Algorithms on Classical Computers Performance and Scaling Limitations.” International Journal of Business Research. Volume 17, Issue 4, 2017, pp 101-110.
  • Guster, Dennis C.; Mark B. Schmidt; and Paidi Karthik. "Identifying and Remediating Rogue Services Within A Cloud Based Virtual Machine." International Journal of Distributed and Cloud Computing. Volume 4, Issue 1, 2016, pp 23-33.
  • Benusa, Allen; Shajive Jeganathan; and Mark B. Schmidt. “Forensic Analysis Challenges: Shifting from HDD To SSD Storage.” Journal of Information Systems Security. Volume 12, Issue 3, 2016.
  • Guster, Dennis C.; Mark B. Schmidt; and Erich P. Rice. “An Empirical Assessment of Performance and Scalability of Decentralized Disk Storage for Real-Time Business Applications.” Journal of International Business Disciplines. Volume 9 Issue 1 2014, pp. 49-60.
  • Phan, Dien D.; Mark B. Schmidt; and Larry Roth. “Natural Intelligence Applications for Business Intelligence in Online and Catalog Retailing Firms: A Case study.” International Journal of Information Systems and Change Management. Volume 6 Issue 1 2012, pp. 68-83.
  • Pope, Michael Brian, Merrill Warkentin, Ernst Bekkering, and Mark B. Schmidt.  “Digital Steganography: An Introduction to Techniques and Tools,” Communications of the AIS. Volume 30, Issue 1, Article 22, June 2012, pp. 347-366.
  • Schmidt, Mark B. and Michael J. Condon. “Computer Forensics: Examining the Effectiveness of File Deletion.” Journal of Information Systems Security. Volume 7, Issue 3, 2011.
  • Phan, Dien D.; Mark B. Schmidt; and Jim Q. Chen. “Organizational Ecology Success Factors in the Business: A Case Study at Fingerhut Inc.” Information Systems Management. Volume 27, Issue 1, 2010.
  • Ma, Qingxiong; Mark B. Schmidt; and J. Michael Pearson. “An Integrated Framework for Information Security Management.” Review of Business. Volume 30, Issue 1, 2009, pp 58-69.
  • Lee, Olivia F.; Dennis C. Guster; Mark B. Schmidt; and Brandon McCann. “Applying the Scale-Free Degree Distribution Algorithm to Assess Communication Complexity and Failure Points in Disaster Recovery Models.” Journal of Information Technology Management Volume XX, Number 2, 2009.
  • Guster, Dennis C.; Mark B. Schmidt; Charles Hall; and Chris Brown. “Evaluating Performance and Scalability Issues in Distributed Data Mining: A First Level Analysis” International Journal of Business, Marketing, and Decision Sciences. Volume 2, Issue 1, 2009.
  • Bekkering, Ernst; Allen C. Johnston; Merrill Warkentin; and Mark B. Schmidt. “An Empirical Assessment of Technology Adoption as a Choice Between Alternatives,” Information Resources Management Journal. Volume 22, Number 4, October – December 2009, pp. 23-44.
  • Schmidt, Mark B.; Jim Q. Chen; Dien D. Phan; and Kirk P. Arnett. “Security Perceptions of E-Commerce Users,” Journal of Internet Commerce. Volume 8, Issue 1-2, January - June 2009, pp. 44-57.
  • Guster, Dennis C.; Mark B. Schmidt; and Erich B. Bergiel. “Distributed Clusters and the Effects of Switch Configuration and Line Speed” Business Research Yearbook. Volume 16, No. 1, 2009, pp. 139 – 144.
  • Lee, Olivia F.; Dennis C. Guster; and Mark B. Schmidt. “WAN Line Speed and its Implications for the Support of Globally Remote Replicas in a Disaster Recovery Model,” Business Research Yearbook. Volume 16, No. 1, 2009, pp. 349 – 354.
  • Templeton, Gary F.; Mark B. Schmidt; and G.S. Taylor.  “Managing the Diffusion of Organizational Learning Behavior.”  Information Systems Frontiers.  Volume 11, No. 2, 2009, pp. 189-200.
  • Chen, Jim Q.; Mark B. Schmidt; Dien D. Phan; and Kirk P. Arnett. “E-Commerce Security Threats: Awareness, Trust, and Practice.” International Journal of Information Systems and Change Management. Volume 3, No. 1, 2008, pp. 16 – 32.
  • Schmidt, Mark B.; Allen C. Johnston; Kirk P. Arnett; Jim Q. Chen, and Li Suicheng. “Cross-Cultural Comparison of U.S. and Chinese Computer Security Awareness,” Journal of Global Information Management. Volume 16, No 2, April – June, 2008, pp. 91-103.
  • Warkentin, Merrill, Ernst Bekkering, and Mark B. Schmidt. "Steganography: Forensic, Security, and Legal Issues," Journal of Digital Forensics, Security and Law, Vol. 3, No. 2 2008 pp. 17-34.
  • Weber, James E; Dennis Guster; Paul Safonov; and Mark B. Schmidt. “Weak Password Security: An Empirical Study.” Information Systems Security: A Global Perspective. Volume 17, Issue 1, January 2008.
  • Arnett, Kirk P.; Mark B. Schmidt; Allen C. Johnston; Jongki Kim; and HaJin Hwang. “Rootkits and What we Know: Assessing US and Korean Knowledge and Perceptions.” International Journal of Information Security and Privacy. Volume 1, Issue 4, October – December 2007. P. 75-86.
  • Schmidt, Mark B.; Allen C. Johnston; and Kirk P. Arnett. “US and Korean Perspectives on Malware: A Closer Look.”  Business Research Yearbook. Volume 14, 2007, pp. 506-512.
  • Johnston, Allen C.; Mark B. Schmidt; Kirk P. Arnett; and Jeff Thomas. “Getting to the Root of the Problem.” Journal of Internet Commerce. Volume 6, Issue 1, Spring 2007 pp 1-12.
  • Schmidt, Mark B.; Allen C. Johnston; and Kirk P. Arnett. “An Empirical Investigation of Rootkit Awareness.”  Business Research Yearbook. Volume 13, 2006, pp. 153-158.
  • Schmidt, Mark B.; Mark D. Nordby; and Dennis C. Guster. “Managing the Enterprise Network: Performance of Routing Versus Switching on a State of the Art Switch.” Business Research Yearbook. Volume 13, 2006, pp. 147-152.
  • Arnett, Kirk P. and Mark B. Schmidt. “Busting the Ghost in the Machine.” Communications of the ACM. vol. 48 no. 8. August, 2005. pp. 92-95.
  • Schmidt Mark B. and Kirk P. Arnett. “Spyware: A Little Knowledge is a Wonderful Thing.” Communications of the ACM. vol. 48 no. 8. August, 2005. pp. 67-70.
  • Templeton, Gary F. and Mark B. Schmidt “A Critical Time for Ultra-Wide Band.” Journal of International Technology and Information Management. Vol. 14, No. 3, 2005 pp. 67-72.
  • Arnett, Kirk P.; Mark B. Schmidt; and Allen C. Johnston. "Wireless Networks in Small Town Mississippi." Mississippi Business Journal. May, 2004.
  • Weber, James E.; Vicky J. McIntyre; and Mark Schmidt. “Explaining IS Student and IS Industry Differences in Perceptions of Skill Importance.” Journal of Computer Information Systems, Volume XXXXI, Number 4, Summer 2001, pp. 79-83.

Journal Articles

  • Schmidt, M., & Condon, M. J. (in press). Computer Forensics: Examining the Effectiveness of File Deletion. Journal of Information Systems Security, 7(2).
  • Arnett, K. P., Schmidt, M., & Johnston, A. C. (2004). Wireless Networks in Small Town Mississippi. Mississippi Business Journal.

Book Chapters

  • Guster, D. C., Schmidt, M., Sultanov, R., & Hall, C. (in press). Analyzing bandwidth usage in a distributed processing environment. In Handbook of Communication Networks and Distributed Systems (World Scientific).
  • Arnett, K. P., Schmidt, M., Johnston, A. C., Kim, J., & Hwang, H. (2009). Rootkits and What we Know: Assessing US and Korean Knowledge and Perceptions. In Techniques and Applications for Advanced Information Privacy and Security: Emerging Organizational, Ethical and Human Issues. Hershey, PA: IGI Global.
  • Merrill, W., Schmidt, M., & Bekkering, E. (2008). Steganography. In Cyber Warfare and Cyber Terrorism (pp. 50-56). Hershey, PA: Information Science Reference.
  • Warkentin, M., Schmidt, M., & Bekkering, E. (2007). Steganography and Stegananalysis. In Intellectual Property Protection for Multimedia Information Technology (pp. 374-380). Hershey, PA: IGI Global.
  • Becker, R. G., Schmidt, M., & Johnston, A. C. (2007). Mitigation of Identity Theft in the Information Age. In Encyclopedia of Information Ethics and Security. Hershey, PA: Information Science Reference.
  • Hanson, J. M., & Schmidt, M. (2007). Secure Automated Clearing House Transactions. In Encyclopedia of Information Ethics and Security. Hershey, PA: Information Science Reference.
  • Warkentin, M., Schmidt, M., & Bekkering, E. (2006). Steganography and Stegananalysis. In Enterprise Information Systems Assurance and System Security: Managerial and Technical Issues (pp. 287-294). Hershey PA: Idea Group Publishers.

Other

  • Schmidt, Mark B. “Sustaining Successful Interventions for Underrepresented Students in STEM: Institutional Challenges: Beneficial Spinoffs to the Institutions and its Students Computer Security Summer Camps for High School Students.” This was part of Robert Johnson’s session at the 52nd Annual International Society for Educational Planning (ISEP) Conference, Online, October, 2022.
  • Schmidt, Mark B. “Biometrics as a Part of a Multifactor Authentication Strategy.” The 21st Annual Security Conference, Las Vegas, Nevada. May, 2022.
  • Sorensen, Michael J. and Mark B. Schmidt. “Cybersecurity Strategy: Comparing Iceland and the USA.” The 21st Annual Security Conference, Las Vegas, Nevada. May, 2022.
  • Schmidt, Mark B. Invited Talk: “Making the Most of Your Doctoral Program.” Mississippi State University, Starkville, MS. March, 2022. 
  • Schmidt, Mark B. “Hashcat Software for Advanced Password Recovery.” (presentation) Leech Lake Tribal College. February 2022, Cass Lake, MN.
  • Schmidt, Mark B. and Erich Rice. “Hashcat Password Recovery Demo.”(presentation) Leech Lake Tribal College. March 2022, Cass Lake, MN.
  • Schmidt, Mark B. “Biometric Authentication.” (presentation) Leech Lake Tribal College. April 2022, Cass Lake, MN.
  • Schmidt, Mark B. “Forensics Lab Development through the DoD Cyber Scholarship Program (CySP.)” (abstract) International Academy of Business and Public Administration Disciplines (IABPAD) Conference. January 2022, Orlando, FL.
  • Stalboerger, Katelyn, Mark B. Schmidt, and Perian Stavrum. “Overcoming Challenges: Poverty Level Channel Changes In Higher Education.” International Academy of Business and Public Administration Disciplines (IABPAD) Conference. January 2022, Orlando, FL.
  • Schmidt, Mark B. “Introduction to Digital Forensics using the Forensic Air-Lite VII.” (presentation) Leech Lake Tribal College. December 2021, Cass Lake, MN.
  • Schmidt, Mark B. and Erich Rice. “Section 230: A Good Samaritan or an Impediment to Free Speech.” (abstract) International Academy of Business and Public Administration Disciplines (IABPAD) Conference. October 2021, Las Vegas, NV.
  • Schmidt, Mark B. “Exploring the Frontiers of Steganography.” The 20th Annual Security Conference, Scheduled for Las Vegas, Nevada. March, 2021 – was moved to an online conference due to COVID 19.
  • Kuznia, Jodi L. and Mark B. Schmidt. “Where is the Money? A Beginners’ Guide to Grant Applications.” The 19th Annual Security Conference, Scheduled for Las Vegas, Nevada. March, 2020 – was moved to an online conference due to
  • Volkmuth, Brian G. and Mark B. Schmidt. “ATM Ethernet Traffic Identification to Target Forensics Detection if IP Packets.” The 19th Annual Security Conference, Scheduled for Las Vegas, Nevada. March, 2020 – was moved to an online conference due to COVID 19.
  • Schmidt, Mark B. “The Development of a Digital Forensics Lab and Projects for Graduate Students.” National Business and Economics Society Conference, Puerto Vallarta, Mexico. Accepted & scheduled for March, 2020. Travel cancelled per SCSU due to COVID 19.
  • Schmidt, Mark B. Invited Talk: “Leveraging Doctoral Student Experiences for Success in Academia.” Mississippi State University, Starkville, MS. September, 2019. 
  • Krzenski Kira, Andrew Erickson, Leena Radeke, Dennis C. Guster, and Mark B. Schmidt. “Quantum Algorithms on Classical Parallel Computing Systems Performance and Scaling Limitations.” (abstract) International Academy of Business and Public Administration Disciplines (IABPAD) Conference. October 2018, Las Vegas, NV.
  • Weber, Adam and Mark B. Schmidt. “Data Analysis Of Agriculture Equipment Value Using Multiple-Regression.” (abstract) International Academy of Business and Public Administration Disciplines Conference, Las Vegas, Nevada. October, 2017.
  • Schmidt, Mark B. Invited Talk: “Workshop: Basic Steganography.” The 16th Annual Security Conference, Las Vegas, Nevada. April, 2017.
  • Smith, William; Mark B. Schmidt, and Ernest Foo. “Geographic Correlation to Password Complexities and Cyber Security Awareness.” The 16th Annual Security Conference, Las Vegas, Nevada. April, 2017.
  • Ghosh, Tirthankar; Mark B. Schmidt; Shanna Simmons, and Chris Lannen. "SCSU GenCyber Lessons Learned (poster session)" GenCyber Meeting. Boston, MA. September, 2016
  • Ghosh, Tirthankar and Mark B. Schmidt. “GenCyber Planning and Risk Management @ St. Cloud State University.” (presentation) Fall GenCyber Meeting. September, 2016. Boston, MA.
  • Guster, Dennis C.; Mark B. Schmidt; and Paidi Karthik. “Identifying and Remediating Rogue Services within a Cloud Based Virtual Machine.” International Academy of Business Disciplines (IABD) Conference. April 2016, Las Vegas, NV.
  • Benusa, Allen D.; Shajive S. Jeganathan; and Mark B. Schmidt. “Forensic Analysis Challenges: Shift from HDD to SSD Storage.” Proceedings of the 2016 Security Conference, March 2016, Las Vegas, NV.
  • Virnig, Michael and Mark B. Schmidt. “Improving Cyber Awareness through Community Outreach.” Proceedings of the 2016 Security Conference, March 2016, Las Vegas, NV.
  • Guster, Dennis C.; Mark B. Schmidt, and Paidi Karthik. “Auditing Complex Cloud Based Services With Inodes to Trace the Origins of Potentially Rogue Processes Within a Linux Host (Virtual Machine).” International Academy of Business and Public Administration Disciplines (IABPAD) Conference. October 2015, Las Vegas, NV.
  • French, Aaron, Mark B. Schmidt, John Guo, and J.P. Shim. “An Exploratory Study on BYOD in Class: Opportunities and Concerns.” Proceedings of the 2015 Americas Conference on Information Systems (AMCIS). August 2015, Fajardo,
  • Phan, Dien D.; Mark B. Schmidt; and Kim Phan. “Information Security Management Policies and Processes: A Total Security Model.” (research abstract),” Proceedings of the National Decision Sciences Institute (DSI) Conference. November 2014, Tampa, FL.
  • Guster, Dennis C.; Mark B. Schmidt, and Erich Rice. “Decentralized Disk Storage: An Evaluation of Performance and Scalability to Ascertain their Appropriateness for Real-Time Business Applications.” International Academy of Business Disciplines (IABD) Conference. April 2014, San Diego, CA.
  • Schmidt, M., & Mooney, K. K. (in press). Discovering and Investigating Corporate Fraud at the MBA level: A Team Teaching Approach: Proceedings of the International Academy of Business and Public Administration Disciplines (IABPAD) Conference.
  • Guster, D. C., Schmidt, M., Smith, M., & Gillespie, N. (in press). Implementing Cloud Computing in a Departmental University Instructional and Research Computing Domain: Challenges and Benefits: Proceedings of the International Academy of Business and Public Administration Disciplines (IABPAD) Conference.
  • McCann, B., Schmidt, M., & Guster, D. C. (2011). Reverse TCP Attacks: Analysis and Prevention: Proceedings of the International Academy of Business and Public Administration Disciplines.
  • Condon, M. J., & Schmidt, M. (2010). Is that File Really Gone? Computer Forensics to Recover the Unrecoverable: Proceedings of the 2010 Security Conference.
  • Phan, D. D., & Schmidt, M. (2010). Swarm Theory and Business Intelligence for Decision Making in Online and Catalog Retailing Firms. New Orleans, LA: Proceedings of the National Decision Sciences Institute (DSI) Conference.
  • Phan, D. D., & Schmidt, M. (2009). Business Intelligence for Decision Making in Online and Catalog Retailing Firms (research abstract). New Orleans, LA: Proceedings of the National Decision Sciences Institute (DSI) Conference.
  • Schmidt, M., Guster, D. C., Lee, O. F., & McCann, B. (2009). Disaster Recovery Planning, Analyzing the Dilemma: In-house vs. Outsourced with Special Consideration to the WAN Resources Required. New Orleans, LA: Proceedings of the National Decision Sciences Institute (DSI) Conference.
  • Guster, D. C., Schmidt, M., & Hemminger, C. (2009). Host Virtualization as the Key to Enhanced Sustainability and Reliability for Companies that have Data Center Infrastructure with an International Footprint. Rapid City, SD: Proceedings of the Annual International Business Conference.
  • Lee, O. F., Guster, D. C., & Schmidt, M. (2009). A First Approach in the Assessment of the Complexity of Disaster Recovery Models for SMEs. San Francisco, CA: Proceedings of the 2009 Americas Conference on Information Systems (AMCIS).
  • Schmidt, M., Weber, J. E., Van Erp, N., & Mumm, M. M. (2009). Assessing Student Interest in Hybrid Course Delivery at the MBA Level. San Francisco, CA: Proceedings of the 2009 Americas Conference on Information Systems (AMCIS).
  • Schmidt, M., & Mumm, M. M. (2009). A Hands-on Approach to Service Learning Projects in Systems Analysis and Design. Las Vegas, NV: Proceedings of the 2009 ISOneWorld Conference.
  • Schmidt, M., Dampier, D. A., & Guster, D. C. (2009). A Multi-University Resource Allocation Approach to Provide Computer Forensics Education for Law Enforcement Agents. Las Vegas, NV: Proceedings of the 2009 Security Conference.
  • Jacobson-Schulte, P., Schmidt, M., & Yoshimoto, G. (2009). The Use and Security of Data in the Higher Education Environment. Las Vegas, NV: Proceedings of the American Society of Business and Behavioral Sciences.
  • Schmidt, M., Weber, J. E., Guster, D. C., & Safonov, P. I. (2009). Training Users to Develop Stronger Passwords. Orlando, FL: Proceedings of the International Academy of Business and Public Administration Disciplines (IABPAD) Conference.
  • Schmidt, M., Das, D., Kumar, V., & Bekkering, E. (2008). A Proposed Study and Analysis of User Perceptions of Biometric Acceptance. Baltimore, MD: Proceedings of the National Decision Sciences Institute (DSI) Conference.
  • Guster, D. C., Schmidt, M., Hall, C., & Brown, C. (2008). A Preliminary Analysis of Web Accessible Distributed Data Mining: Performance and Scalability. Orlando, Fl.: Proceedings of the International Academy of Business and Public Administration Disciplines (IABPAD) Conference.
  • Chen, J. Q., Schmidt, M., Phan, D. D., & Arnett, K. P. (2007). E-commerce Security Threats, Awareness, Trust, and Security Practices: An Assessment of Perceptions. Phoenix, AZ.: Proceedings of the National Decision Sciences Institute (DSI) Conference.
  • Schmidt, M., Chen, Q. J., Phan, D. D., & Arnett, K. P. (2007). Comparing Security Perceptions of E-Commerce Users. Keystone, CO: Proceedings of the 2007 Americas Conference on Information Systems (AMCIS).
  • Schmidt, M., & Arnett., K. P. (2007). Synthesis and Analysis of Moore and Benbasat’s PCI and Witte’s Susceptibility and Severity of Threat Scales. Keystone, CO: Proceedings of the 2007 Americas Conference on Information Systems (AMCIS).
  • Schmidt, M., Johnston, A. C., & Arnett, K. P. (2007). US and Korean Perspective on Malware: A Closer Look. Orlando, FL: Proceedings of the International Academy of Business Disciplines (IABD).
  • McDermott, S., Schmidt, M., & Yoshimoto, G. (2007). NSA Electronic Surveillance Database. Las Vegas, NV: American Society of Business and Behavioral Sciences.
  • Schmidt, M., & Halverson, M. S. (2006). DSS for Global Competitive Advantage. Bangkok, Thailand: Academy of International Business Southeast Asia Regional Conference.
  • Schmidt, M., Chen, Q. J., & Weber, J. E. (2006). An Analysis of Data Warehousing to Promote National Security. San Antonio, TX: Proceedings of the National Decision Sciences Institute Conference.
  • Schmidt, M., Guster, D. C., & Sundheim, R. A. (2006). An Empirical Analysis of Network Packet Traffic Protocols. San Antonio, TX: Proceedings of the National Decision Sciences Institute Conference.
  • Warkentin, M., Shropshire, J., Johnston, A. C., & Schmidt, M. (2006). Personality and IT Security: An Application of the five-factor model. Acapulco, Mexico: Proceedings of the 2006 Americas Conference on Information Systems.
  • Schmidt, M., Johnston, A. C., & Arnett, K. P. (2006). An Empirical Investigation of Rootkit Awareness. San Diego, CA: International Academy of Business Disciplines (IABD).
  • Schmidt, M., Nordby, M. D., & Guster, D. C. (2006). Managing the Enterprise Network: Performance of Routing Versus Switching on a State of the Art Switch.. San Diego, CA: Proceedings of the International Academy of Business Disciplines (IABD).
  • Arnett, K. P., Schmidt, M., & Shim, J. P. (2005). Tablet PCs to Teach Information Systems Courses. Omaha, NE: Proceedings of the 2005 Americas Conference on Information Systems.
  • Bekkering, E., Schmidt, M., Johnston, A. C., Warkentin, M., & Nelson, P. (2004). Empirical Investigation of Attractiveness of Tablet PCs to Mobile Professionals. Boston, MA: Proceedings of the National Decision Sciences Institute Conference.
  • Schmidt, M., & Vance, D. A. (2004). IT Does Matter (At Least When it is Properly Managed). New York, NY: Proceedings of the 2004 Americas Conference on Information Systems.
  • Shim, J. P., Arnett, K. P., & Schmidt, M. (2004). Videostreaming, Horizon Live, and Tablet PCs ...Teaching IS: Revisited. New York, NY: Proceedings of the 2004 Americas Conference on Information Systems.
  • Schmidt, M., Johnston, A. C., & Arnett, K. P. (2004). Wireless Network Security in Hospitality SME's. New York, NY: Proceedings of the 2004 Americas Conference on Information Systems.
  • Warkentin, M., Schmidt, M., Johnson, A. C., & Boren, M. (2004). IS Security Management Framework: A Comprehensive Life Cycle Perspective. New Orleans, LA: Proceedings of the 2004 Information Resources Management Association (IRMA).
  • Warkentin, M., Bekkering, E., Schmidt, M., & Johnston, A. C. (2004). Proposed Study of End-User Perceptions Regarding Tablet PCs. New Orleans, LA: Proceedings of the 2004 Information Resources Management Association (IRMA).
  • Johnston, A. C., Schmidt, M., & Bekkering, E. (2004). IT Security Management Practices: Success and Failures in Coping with Blaster and Sobig.F. Las Vegas, NV: Proceedings for the 2004 ISOneWorld International Conference.
  • Schmidt, M., Bekkering, E., & Warkentin, M. (2004). On the Illicit use of Steganography and its Detection. Las Vegas, NV: Proceedings of the 2004 ISOneWorld International Conference.
  • Schmidt, M. (2004). Steganography: New Techniques for an Ancient Practice. Las Vegas, NV: Proceedings of the 2004 Security Conference.
  • Schmidt, M. (2003). The Common Core of Data: An Overview. Mississippi State, MS: Mississippi State University Libraries' Corporate and Statistical Research Center and the Department of Sociology.
  • Shim, J. P., Arnett, K. P., & Schmidt, M. (2003). Using Streaming Technology and Tablet PCs for Teaching Information Systems. Tampa, FL: Proceedings of the 2003 Americas Conference on Information Systems (AMCIS).
  • Schmidt, M. (2003). Byte Wars: The Impact of September 11 on Information Technology by Edward Yourdon (3rd ed., vol. 15): Journal of End User Computing.
  • Bekkering, E., & Schmidt, M. (2003). A Discussion of Biometric Security Trade-offs. Las Vegas, NV: Proceedings of the 2003 ISOneWorld International Conference.
  • Schmidt, M., & Johnston, A. C. (2003). Biometric Controls Used to Secure Access at Mississippi State University. Las Vegas, NV: Proceedings of the 2003 ISOneWorld International Conference.
  • Warkentin, M., & Schmidt, M. (2003). Evaluating Executive Perceptions of IS Security Threats and Responses: A Post 9/11 Critique. Las Vegas, NV: Proceedings of the 2003 ISOneWorld International Conference.

Connect with SCSU