Alan Rea
Western Michigan University
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Alan Rea.
Communications of The ACM | 2006
Pairin Katerattanakul; Bernard T. Han; Alan Rea
The frequent citations to IS research suggest its role in advancing science.
Computers and Composition | 1999
Alan Rea; Doug White
Abstract With the increased use of powerful word-processing programs and with the ease of writing Web pages with hypertext markup language (HTML) and “what you see is what you get” (WYSIWYG) editors, students want to experiment with fonts, colors, images, and sounds. Most of the information students receive outside of the classroom is a multimedia experience (many are from the so-called MTV Generation). Asking them to use print solely for expression goes against how most communication takes place in the world outside academia. Not allowing students to experiment with these new forms of writing hampers their ability to learn effective communication skills. Our discussion, then, focuses on how instructors can effectively teach and evaluate this “new” writing style. Focusing on teaching HTML scripting and/or Web-page writing, as well as evaluating Web pages according to basic criteria, this discussion maps a pedagogy for hypertext writing. When writing and evaluating in this medium, issues such as audience and purpose, design, and function all remain important. New issues, however, come to the forefront: contextualized hyperlinks, navigability, color schemes, and image, audio, and video integration become a part of the writing task as well. Balancing between effective presentation and sensory overload becomes a daunting task for many students, as well as instructors.
International Journal of Electronic Healthcare | 2010
Muhammad A. Razi; Kuriakose Athappilly; Alan Rea
The Community Health Information System (CHIS) is an integrated, patient-centric, web-based application that assists all stakeholders in healthcare management. CHIS is a single sign-on portal that allows users to query an immense interconnected database of medical research, healthcare providers, regulations, nurses and physicians. A three member faculty team at Western Michigan University has developed a system prototype using a collection of technologies to deliver the content via a variety of interfaces such as the web, mobile devices, voice and kiosks. The focus of this paper is on the technical building blocks such as decision-making process, system models and functional components.
The Journal of Digital Forensics, Security and Law | 2015
Carla J. Utter; Alan Rea
With the expansion of technology and the desire to downsize costs within the corporate culture, the technology trend has steered towards the integration of personally owned mobile devices (smartphones) within the corporate and enterprise environment. The movement, known as “Bring Your Own Device” (hereinafter referred to as “BYOD”), seeks to eliminate the need for two separate mobile devices for one employee. While taken at face value this trend seems favorable, the corporate policy and legal implications of the implementation of BYOD are complicated by significant investigatory issues that overshadow the benefits of utilizing BYOD. In this paper, we set a context for the BYOD conundrum, then examine associated corporate policies, highlight the limitations to the digital investigator’s reach regarding digital evidence and review the investigatory challenges presented by BYOD. We conclude by offering recommendations such as implementing proper policies/procedures, utilizing Mobile Device Management, corporate owned devices, and enforcing agreements.
The Journal of Digital Forensics, Security and Law | 2011
Thomas Lonardo; Tricia Martland; Doug White; Alan Rea
This paper focuses on Federal law as it relates to consent to search relating to Fourth Amendment privacy in the practice of Digital Forensics. In particular, Digital Examiners should be aware of how decisions in Federal Court may impact their ability to acquire evidence in both civil and criminal settings. Digital Forensics, being a relatively new field, is particularly subject to change as cases and appeals are decided. This paper provides an overview of relevant case law relating to issues in Digital Forensics. More importantly, our research provides Digital Forensic Examiners (DFE), as defined by Lonardo, White, and Rea ( Lonardo, 2008 , 2009 ), with scenarios that illustrate the various nuances when dealing with the consent to search. From issues of common authority, conflicting consent, apparent authority, and voluntary consent, our research explores court findings and applies them to practical advice and policy formation for DFEs.
Journal of Information Privacy and Security | 2007
Doug White; Alan Rea
Abstract Information systems are only as strong as their weakest elements. A truly secure environment requires effective network security, secure application development guidelines, well written policies and procedures, and a strong user educational component to account for the many potential attacks that can occur on a given day. In this case, the authors cover failed aspects of networking security, Web development, policies and procedures, as well as inadequate user education to illustrate how easily an attacker can glean critical business data from an organization via simple techniques known to the hacking community. This case demonstrates that even with basic physical security in place, social engineering practices, combined with well-known hacking techniques, can thwart an organization’s security procedures and practices. In our discussion, we analyze threats to Web servers and Web services using a sample business: MrLuv’s Online Dating Service. We also provide a scenario analysis to forensically explain the break-in and discuss possible techniques used to acquire customer identity information. Ultimately, we find that although secure technical solutions must be implemented, organizations must also educate system users about potential threats. Throughout the case we provide an explanation of common attacks on Web servers and Web services, as well as include a detailed glossary of relevant security terms to explain the technical vocabulary businesses must understand in order to effectively protect their digital assets.
The Journal of Digital Forensics, Security and Law | 2015
Thomas Lonardo; Alan Rea; Doug White
In this update to the 2012 years study, the authors examine statutes that regulate, license, and enforce investigative functions in each US state. As before, the authors find that very few state statutes explicitly differentiate between Private Investigators and Digital Examiners. However, there is a small trend in which some states are changing definitions or moving to exempt DE from PI licensing requirements. We examine this trend as well as look at some additional information in terms of practicing attorney exemptions that may cloud the licensing waters.
American Journal of Business | 2001
Pam Rooney; Alan Rea
This article describes the origin, design, and implementation of the Haworth College of Business Electronic Portfolio Project, a curricular innovation that is one of the key components of the college’s newly revised and reaccredited undergraduate business program. Included in the article is a description of the portfolio process, its creation, and initial implementation, including implementation challenges and issues. Throughout the discussion, goals and the challenge of meeting them are examined, and suggestions for continuous improvement are explored. The article offers key issues to consider before adopting a portfolio process on a large scale.
Web-based learning and teaching technologies | 2000
Alan Rea; Doug White; Roger McHaney; Carol M. Sánchez
Business Communication Quarterly | 1999
Alan Rea; Beth Hoger; Pam Rooney