Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Jeffrey P. Landry is active.

Publication


Featured researches published by Jeffrey P. Landry.


2009 First International Workshop on Requirements Engineering for e-Voting Systems | 2009

A Risk Assessment Model for Voting Systems using Threat Trees and Monte Carlo Simulation

J. Harold Pardue; Jeffrey P. Landry; Alec Yasinsac

There continues to be a requirement for better models, tools, and techniques for conducting risk assessment of voting systems. We propose a model of risk and a technique for risk assessment, which builds on threat trees and Monte Carlo simulation. The goal is to provide a means of facilitating informed decisions regarding voting system security standards through a rational and parsimonious quantification of intuition or estimation of risk. Such a means should support an evaluation of trade-offs, sensitivity analysis, cost-benefit analysis, and estimation of residual risk of current and proposed voting systems, technologies and controls.


Communications of The ACM | 2003

A common theme for IT degree programs

Jeffrey P. Landry; J. Harold Pardue; Herbert E. Longenecker; David F. Feinstein

Effective IT curricula balances tradition with innovation. One way to enhance that balance is to examine the common threads in the various knowledge areas.


conference on risks and security of internet and systems | 2010

Towards Internet voting security: A threat tree for risk assessment

J. Harold Pardue; Alec Yasinsac; Jeffrey P. Landry

The Internet is a dangerous place for any critical application and is particularly risky for binding government elections where every vote must count. The complex interplay of people, processes, equipment, software, policies, and legislation in a networked environment that spans national boundaries makes, for example, determining the precise likelihood of a threat nearly impossible. This does not mean, however, that the risk analyst cannot model, understand, and assess the risks to Internet voting systems. To that end, this paper presents a threat tree for risks to Internet voting systems. The Internet voting threat tree was successfully vetted by a panel of elections officials, security experts, academics, election law attorneys, representation from governmental agencies, voting equipment vendors, and voting equipment testing labs. We submit that this threat tree is sufficiently abstract to be useful in a wide range of risk assessment techniques.


International Journal of Information Security and Privacy | 2011

E-Voting Risk Assessment: A Threat Tree for Direct Recording Electronic Systems

Jeffrey P. Landry; Harold Pardue; Alec Yasinsac

Approximately 25% according to http://verifiedvoting.com/ of voting jurisdictions use direct recording electronic systems to record votes. Accurate tabulation of voter intent is critical to safeguard this fundamental act of democracy: voting. Electronic voting systems are known to be vulnerable to attack. Assessing risk to these systems requires a systematic treatment and cataloging of threats, vulnerabilities, technologies, controls, and operational environments. This paper presents a threat tree for direct recording electronic DRE voting systems. The threat tree is organized as a hierarchy of threat actions, the goal of which is to exploit a system vulnerability in the context of specific technologies, controls, and operational environment. As an abstraction, the threat tree allows the analyst to reason comparatively about threats. A panel of elections officials, security experts, academics, election law attorneys, representatives from governmental agencies, voting equipment vendors, and voting equipment testing labs vetted the DRE threat tree. The authors submit that the DRE threat tree supports both individual and group risk assessment processes and techniques.


winter simulation conference | 1995

A soft systems approach to input distribution estimation for a non-stationary demand process

J. Harold Pardue; Jeffrey P. Landry; Thomas D. Clark

A soft systems methodology is undertaken to develop a design for a communications system to support a political campaign. The focus is on the methodology to estimate an input distribution for a SLAM-based simulation model. Two problems-the lack of referent system data and the expectation of non-stationary system demand-indicate a need for a soft systems approach. The results of this study suggest that the approach is effective for estimating an input distribution for simulation analysis. The case provides an example of the contrast between the soft systems and hard systems approaches.


information security curriculum development | 2010

Risk assessment of voting systems for teaching the art of information security

Jeffrey P. Landry

This paper describes case study assignment in risk assessment for a course in information security management. The instructors approach in the course was to integrate various readings through discussion and assignments. The assignment described in this paper was based on an actual project and used in an information security management course taught in Summer 2010. Readers will benefit from the instructors description of this assignment, which teaches the art of information security management by creating a hybrid risk assessment process that provides a practical, reusable, scholarly, and realistic exercise. The assignment proved to be a useful, hands-on practice that students were able to satisfactorily complete.


The Journal of information and systems in education | 2008

From Teaching to Learning: Learner-Centered Teaching and Assessment in Information Systems Education

Bruce M. Saulnier; Jeffrey P. Landry; Herbert E. Longenecker; Teresa A. Wagner


Archive | 2000

Comparing Entry-Level Skill Depths Across Information Systems Job Types: Perceptions of IS Faculty

Jeffrey P. Landry; Herbert E. Longnecker; Brandon Haigood; David L. Feinstein


Information Systems Education Journal | 2013

A Database Management Assessment Instrument.

Jeffrey P. Landry; J. Harold Pardue; Roy J. Daigle; Herbert E. Longenecker


americas conference on information systems | 2003

Assessing Readiness of IS Majors to Enter the Job Market: An IS Competency Exam Based on the Model Curriculum.

Jeffrey P. Landry; John H. Reynolds; Herbert E. Longenecker

Collaboration


Dive into the Jeffrey P. Landry's collaboration.

Top Co-Authors

Avatar

J. Harold Pardue

University of South Alabama

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Roy J. Daigle

University of South Alabama

View shared research outputs
Top Co-Authors

Avatar

John H. Reynolds

Grand Valley State University

View shared research outputs
Top Co-Authors

Avatar

Harold Pardue

University of South Alabama

View shared research outputs
Top Co-Authors

Avatar

Lynn J. McKell

Brigham Young University

View shared research outputs
Top Co-Authors

Avatar

Alec Yasinsac

University of South Alabama

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Matt Campbell

University of South Alabama

View shared research outputs
Researchain Logo
Decentralizing Knowledge