Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Alan Rea is active.

Publication


Featured researches published by Alan Rea.


Communications of The ACM | 2006

Is information systems a reference discipline

Pairin Katerattanakul; Bernard T. Han; Alan Rea

The frequent citations to IS research suggest its role in advancing science.


Computers and Composition | 1999

The changing nature of writing: prose or code in the classroom

Alan Rea; Doug White

Abstract With the increased use of powerful word-processing programs and with the ease of writing Web pages with hypertext markup language (HTML) and “what you see is what you get” (WYSIWYG) editors, students want to experiment with fonts, colors, images, and sounds. Most of the information students receive outside of the classroom is a multimedia experience (many are from the so-called MTV Generation). Asking them to use print solely for expression goes against how most communication takes place in the world outside academia. Not allowing students to experiment with these new forms of writing hampers their ability to learn effective communication skills. Our discussion, then, focuses on how instructors can effectively teach and evaluate this “new” writing style. Focusing on teaching HTML scripting and/or Web-page writing, as well as evaluating Web pages according to basic criteria, this discussion maps a pedagogy for hypertext writing. When writing and evaluating in this medium, issues such as audience and purpose, design, and function all remain important. New issues, however, come to the forefront: contextualized hyperlinks, navigability, color schemes, and image, audio, and video integration become a part of the writing task as well. Balancing between effective presentation and sensory overload becomes a daunting task for many students, as well as instructors.


International Journal of Electronic Healthcare | 2010

The Community Health Information System (CHIS): delivering web-based customised healthcare using an AI-infused expert system

Muhammad A. Razi; Kuriakose Athappilly; Alan Rea

The Community Health Information System (CHIS) is an integrated, patient-centric, web-based application that assists all stakeholders in healthcare management. CHIS is a single sign-on portal that allows users to query an immense interconnected database of medical research, healthcare providers, regulations, nurses and physicians. A three member faculty team at Western Michigan University has developed a system prototype using a collection of technologies to deliver the content via a variety of interfaces such as the web, mobile devices, voice and kiosks. The focus of this paper is on the technical building blocks such as decision-making process, system models and functional components.


The Journal of Digital Forensics, Security and Law | 2015

The "Bring your own device" conundrum for organizations and investigators: An examination of the policy and legal concerns in light of investigatory challenges

Carla J. Utter; Alan Rea

With the expansion of technology and the desire to downsize costs within the corporate culture, the technology trend has steered towards the integration of personally owned mobile devices (smartphones) within the corporate and enterprise environment. The movement, known as “Bring Your Own Device” (hereinafter referred to as “BYOD”), seeks to eliminate the need for two separate mobile devices for one employee. While taken at face value this trend seems favorable, the corporate policy and legal implications of the implementation of BYOD are complicated by significant investigatory issues that overshadow the benefits of utilizing BYOD. In this paper, we set a context for the BYOD conundrum, then examine associated corporate policies, highlight the limitations to the digital investigator’s reach regarding digital evidence and review the investigatory challenges presented by BYOD. We conclude by offering recommendations such as implementing proper policies/procedures, utilizing Mobile Device Management, corporate owned devices, and enforcing agreements.


The Journal of Digital Forensics, Security and Law | 2011

Legal Issues Regarding Digital Forensic Examiners Third Party Consent to Search

Thomas Lonardo; Tricia Martland; Doug White; Alan Rea

This paper focuses on Federal law as it relates to consent to search relating to Fourth Amendment privacy in the practice of Digital Forensics. In particular, Digital Examiners should be aware of how decisions in Federal Court may impact their ability to acquire evidence in both civil and criminal settings. Digital Forensics, being a relatively new field, is particularly subject to change as cases and appeals are decided. This paper provides an overview of relevant case law relating to issues in Digital Forensics. More importantly, our research provides Digital Forensic Examiners (DFE), as defined by Lonardo, White, and Rea ( Lonardo, 2008 , 2009 ), with scenarios that illustrate the various nuances when dealing with the consent to search. From issues of common authority, conflicting consent, apparent authority, and voluntary consent, our research explores court findings and applies them to practical advice and policy formation for DFEs.


Journal of Information Privacy and Security | 2007

Looking for Love in All the Wrong Places: A Security Case Study on Online Identity Theft

Doug White; Alan Rea

Abstract Information systems are only as strong as their weakest elements. A truly secure environment requires effective network security, secure application development guidelines, well written policies and procedures, and a strong user educational component to account for the many potential attacks that can occur on a given day. In this case, the authors cover failed aspects of networking security, Web development, policies and procedures, as well as inadequate user education to illustrate how easily an attacker can glean critical business data from an organization via simple techniques known to the hacking community. This case demonstrates that even with basic physical security in place, social engineering practices, combined with well-known hacking techniques, can thwart an organization’s security procedures and practices. In our discussion, we analyze threats to Web servers and Web services using a sample business: MrLuv’s Online Dating Service. We also provide a scenario analysis to forensically explain the break-in and discuss possible techniques used to acquire customer identity information. Ultimately, we find that although secure technical solutions must be implemented, organizations must also educate system users about potential threats. Throughout the case we provide an explanation of common attacks on Web servers and Web services, as well as include a detailed glossary of relevant security terms to explain the technical vocabulary businesses must understand in order to effectively protect their digital assets.


The Journal of Digital Forensics, Security and Law | 2015

To License or Not to License Reexamined: An Updated Report on State Statutes Regarding Private Investigators and Digital Examiners

Thomas Lonardo; Alan Rea; Doug White

In this update to the 2012 years study, the authors examine statutes that regulate, license, and enforce investigative functions in each US state. As before, the authors find that very few state statutes explicitly differentiate between Private Investigators and Digital Examiners. However, there is a small trend in which some states are changing definitions or moving to exempt DE from PI licensing requirements. We examine this trend as well as look at some additional information in terms of practicing attorney exemptions that may cloud the licensing waters.


American Journal of Business | 2001

People, Prose, and Processors: The Haworth College of Business Electronic Portfolio Project

Pam Rooney; Alan Rea

This article describes the origin, design, and implementation of the Haworth College of Business Electronic Portfolio Project, a curricular innovation that is one of the key components of the college’s newly revised and reaccredited undergraduate business program. Included in the article is a description of the portfolio process, its creation, and initial implementation, including implementation challenges and issues. Throughout the discussion, goals and the challenge of meeting them are examined, and suggestions for continuous improvement are explored. The article offers key issues to consider before adopting a portfolio process on a large scale.


Web-based learning and teaching technologies | 2000

Pedagogical methodology in virtual courses

Alan Rea; Doug White; Roger McHaney; Carol M. Sánchez


Business Communication Quarterly | 1999

Communication and Technology: Building Bridges across the Chasm

Alan Rea; Beth Hoger; Pam Rooney

Collaboration


Dive into the Alan Rea's collaboration.

Top Co-Authors

Avatar

Doug White

University of Arkansas

View shared research outputs
Top Co-Authors

Avatar

Bernard T. Han

Western Michigan University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Thomas Lonardo

Roger Williams University

View shared research outputs
Top Co-Authors

Avatar

Bidyut Hazarika

University of Colorado Denver

View shared research outputs
Top Co-Authors

Avatar

Carol M. Sánchez

Grand Valley State University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Pam Rooney

Western Michigan University

View shared research outputs
Researchain Logo
Decentralizing Knowledge