Information Security and Intelligence

Research and Grants

Publications

Books

  • Gogolin, G.E. (2013). Digital Forensics Explained. Auerbach Publications – Taylor & Francis.
  • Gogolin, G. E. (2012). The Use of Embedded Mobile, RFID, and Augmented Reality in Mobile Devices. In Ciaramitaro, B. Mobile Technology Consumption: Opportunities and Challenges. IGI Global. Contributing Author.
  • Gogolin, G. E. (2011). The Chasm Between Law Enforcement and Digital Crime. In Crime Rates, Types, and Hot Spots. Nova Science Publishers, Inc. Contributing Author.
  • Gogolin, G. E. (2010). Security and Privacy Concerns of Virtual Worlds. In Ciaramitaro, B., Virtual Worlds and E-Commerce: Technologies and Applications for Building Customer Relationships. IGI Global. Contributing Author.

Journals

  • Gogolin, G., & Jones, J. (2014). “Digital Forensic Issues in Civil Proceedings.” Journal of Civil & Legal Sciences.
  • Gogolin, G., Gogolin, E., & Kam, H. (2014). “Virtual Worlds and Social Media: Security and Privacy Concerns, Implications, and Practice.” International Journal of Artificial Life Research. (Jan/March issue)
  • Kam, H.J. and Katerattanakul, P., “Structural Model of Team-Based Learning using Web 2.0 Collaborative Software”, Computers & Education Journal (76), 2014, pp. 1-12.
  • Kam, H.J. and Katerattanakul, P., “Information Security in Higher Education: A Neo- Institutional Perspective”, Journal of Information Privacy and Security (10:1), 2014, pp.28-43.
  • Gogolin, G. & Jones, J. (2010). “Law Enforcement’s Ability to Deal with Digital Crime and the Implications for Business”. Journal of Digital Forensic Practice. Taylor & Francis.
  • Gogolin, G. (2010). “The Digital Crime Tsunami”. Digital Investigation. Elsevier.
  • Gogolin, G. & Jones, J. (2010). “Law Enforcement’s Ability to Deal with Digital Crime and the Implications for Business”. Information Security Journal: A Global Perspective. Taylor & Francis. Volume 19, Issue 3.

United State Supreme Court Citations

  • Riley v. California – Landmark case ruling that law enforcement can not search a cell phone during an arrest without a search warrant. Gogolin, G.E. (2013). Digital Forensics Explained. Auerbach Publications – Taylor & Francis.

Contracts, Grants, and Sponsored Research

  • Gogolin, Greg E (Principal), "Digital Laser Microscopy Analysis of Active, Altered, and Damaged Storage Media for Security and Digital Forensic Recovery," National Science Foundation, US Government, $21,158.00. (funded: 2014).
  • Gogolin, Greg E (Principal), "Digital Laser Microscopy Analysis of Active, Altered, and Damaged Storage Media for Security and Digital Forensic Recovery," National Science Foundation, US Government, $330,860.00. (funded: 2011 - 2014).
  • Gogolin, Greg E (Principal), "Enhance Digital Forensics Capabilities in Information Security & Intelligence and Information Systems Management Programs," Ferris Foundation, Private, $4,820.00. (2010).
  • Gogolin, Greg E (Principal), "Software grant/gift in kind – RAM (physical) memory forensics," Sponsored by HBGary, Private, $64,000.00. (2010).
  • Gogolin, Greg E (Principal), "Software grant/gift in kind," Sponsored by Choicepoint, Private, $977,296.00. (2007).
  • Gogolin, Greg E, "Tech-Literacy Grant," Sponsored by Newaygo County RESA, State Government, $250,000.00. (2007).
  • Gogolin, Greg E (Principal), "Software grant/gift in kind," Sponsored by Choicepoint, Private, $679,780.00. (2006).
  • Gogolin, Greg E (Principal), "Software/hardware grant," Sponsored by Paraben Corporation, Private, $9,664.40. (2005).
  • Gogolin, Greg E (Principal), "Software in kind gift," Sponsored by Quest Software, Private, $400,000.00. (2004).

Conferences and Proceedings

  • Kam, H. J. and Katerattanakul, P., “The Three Musketeers: Impacts of National Culture, Organizational Norms and Institutional Environment on Information Security Policy Compliance”, 2014 Organizations and Society and Information Systems (OASIS) pre-ICIS workshop, Auckland, New Zealand, December 11 -12, 2014.
  • Kam, H. J. and Katerattanakul, P., “Authentic Learning in Cybersecurity: Learning Opportunities and Pedagogical Challenges”, 43th IEEE Frontiers in Education Conference (FIE), Madrid, Spain, October 22 – 25, 2014.
  • Kam, H. J. and Katerattanakul, P., “Diversifying Cybersecurity Education: A Non-Technical Approach to Technical Studies”, 43th IEEE Frontiers in Education Conference (FIE), Madrid, Spain, October 22 – 25, 2014.
  • Kam, H. J. and Katerattanakul, P., “Out-of-Class Learning: A Pedagogical Approach of Promoting Information Security Education”, Proceedings of 2014 Americas Conference on Information Systems (AMCIS), Savannah, Georgia, August 7 – 10, 2014.
  • Kam, H. J. and Katerattanakul, P., “Cyber Jihad: Terrorists as Knowledge Workers and Cyber Learners”. IFIP Working Group 8.11/11.13 of Dewald Roode Workshop on Information Systems Security Research, New Castle, England, June 16-17, 2014.
  • Kam, H.J., Katerattanakul, P., and Gogolin, G. “A Cross Industry Study: Differences in Information Security Policy Compliance between the Banking Industry and Higher Education”, International Conference on Information Systems (ICIS), Milan, Italy, December 15-18, 2013.
  • Gogolin, G.E. (2013). Digital Forensics in Practice. Universidad de Chile, Santiago, Chile.
  • Gogolin, G.E. (2013). Information Security Implications and Practice – Fulbright Commission. Universidad Católica, Santiago, Chile.
  • Kam, H. J., Gogolin, G., Blakemore, D., Emerick, G. E., “Playing Online Games on Facebook: Conscious and Unconscious Learning of Database Design”, Proceedings of 43th IEEE Frontiers in Education Conference (FIE), Oklahoma City, Oklahoma, October 23 – 25, 2013.
  • Gogolin, G. (2013). Living Dangerously – Malware Analysis. CEIC 2013 Proceedings
  • Kam, H. J., Katerattanakul, P., Gogolin, G., and Hong, S. G., “Information Security Policy Compliance in Higher Education: A Neo-Institutional Perspective”, Proceedings of Pacific Asia Conference on Information Systems (PACIS), Jeju Island, South Korea, June 18 – 22, 2013.
  • Kam, H. J., Katerattanakul, P, Emerick, G. E., “Impact of External Pressures on Information Security Policy Compliance in the Banking Industry”, Proceedings of 2013 International Conference on Information Resources Management (Conf-IRM), Natal, Brazil, May 22 – 24, 2013.
  • Kam, H. J. and Gogolin, G. “Out-of-Class Learning: Shaping Perception of Learning and Building Knowledge of IT Professions”, Proceedings of 42th IEEE Frontiers in Education Conference (FIE), Seattle, Washington, October 3 – 6, 2012.
  • Kam, H. J. and Katerattanakul, P., “Structural Model of Team-Based Learning using Web 2.0 Collaborative Software", Proceedings of 2012 International Conference on Information Resources Management (Conf-IRM), Vienna, Austria, May 21 – 23, 2012.
  • Kam, H. J. and Pauli, J., “Web Penetration Testing: Effectiveness Of Student Learning In Web Application Security”, Proceedings of 41th IEEE Frontiers in Education Conference (FIE), Rapid City, South Dakota, October 12 – 15, 2011.Gogolin, G.E. (2011) . Commencement Speaker, Ferris State University Graduation. December.
  • Gogolin, G. E. (Presenter), Secure World, "Digital Crime: Can We Survive the Tsunami?" Detroit, MI. (October 6, 2010).
  • Gogolin, G. E. (Presenter), Lilly Conference North, "Educating Students and Faculty on the Emerging Use of Virtual Worlds in E-Commerce," Traverse City, MI. (September 25, 2010). (With S. Jones, B.Ciaramitaro, J.Jones)
  • Gogolin, G. E. (Presenter & Conference Organizer), Ferris State University Digital Forensics Conference for Law Enforcement, “Using Visual Analysis in Computer Crime Cases,” Big Rapids, MI. (2010).
  • Gogolin, G. E. (Presenter & Conference Organizer), Ferris State University Digital Forensics Conference for Law Enforcement, “Cell Phone Digital Forensics,” Big Rapids, MI. (2010).
  • Gogolin, G. E. (Presenter), Lilly Conference North, "Integrating Podcasts, WebEx, Twitter and other interactive technologies into an e-learning environment," Traverse City, MI. (2009).
  • Gogolin, G.E. (Presenter), Midwest Tribal Security Conference, “Using Visual Analysis and Digital Forensics in Corporate Security,” Traverse City, MI. (2009).