JINKYU LEE
Department of Management Science & Information Systems
Aso Prof
TULSA, OK 74106-0700
Phone: 918-594-8254
jinkyu.lee@okstate.edu
Education
- Ph D, University at Buffalo, The State University of New York, Management Information Systems, 2007
- MS, Griffith University, Queensland, Australia, Information Systems, 1999
- BBA, College of Commerce and Law, Yonsei University, Wonju, Korea, 1996
Publications
- Supavich Pengnate, Rathindra Sarathy, and Jin Kyu Lee. (2019). "The Engagement of Website Initial Aesthetic Impressions: An Experimental Investigation". International Journal of Human-Computer Interaction. (35), 16, 1517-1531.
- Jing Yang, Rathindra Sarathy, and Jin Kyu Lee. (2016). "The Effect of Product Review Balance and Volume on Online Shoppers' Risk Perception and Purchase Decision". Decision Support Systems. (89), 66-76. 0167-9236.
- J. P. Li, R. Chen, Jin Kyu Lee, and H.R. Rao. (2013). "A Case Study of Private-Public Collaboration for Humanitarian Free and Open Source Disaster Management Software Deployment". Decision Support Systems. (55), 1, 1-11.
- S. Park, Jin Kyu Lee, and M. Lee. (2013). "Sustaining Web 2.0 Services: A Survival Analysis of a Live Crowd-Casting Service ". Decision Support Systems. (54), 3, 1256-1268.
- N. Bharosa, Jin Kyu Lee, M. Janssen, and H. R. Rao. (2012). "An activity theory analysis of boundary objects in cross-border information systems development for disaster management". Security Informatics. (1), 15, 17.
- Jin Kyu Lee and H.R. Rao. (2012). "Service Source & Channel Choice in G2C Service Environments: A Model Comparison in the Anti/Counter Terrorism Domain". Information Systems Journal (ISJ). (22), 4, 313-341.
- H. Kang, M. Lee, and Jin Kyu Lee. (2012). "Are You Still with Us? A Study of the Post-Adoption Determinants of Sustained Use of Mobile-Banking Services". Journal of Organizational Computing and Electronic Commerce (JOCEC). (22), 2, 132-159.
- M. Lee and Jin Kyu Lee. (2012). "The Impact of Information Security Failure on Customer Behaviors: A Study on a Large-Scale Hacking Incident on the Internet". Information Systems Frontiers (ISF). (14), 2, 375-393.
- Jing Yang, Rathindra Sarathy, Jin Kyu Lee, and Xiang Fang. (2011). "Investigating the Influence of Product Reviews on Perceived Uncertainty in Online Transactions". Detroit, Michigan: 17th Americas Conference on Information Systems .
- Jin Kyu Lee, N. Bharosa, Jing Yang, M. Janssen, and H.R. Rao. (2011). "Group Value and Intention to Use - A Study of Multi-Agency Disaster Management Information Systems for Public Safety". Decision Support Systems. (50), 2, 404-414.
- M. Janssen, Jin Kyu Lee, N. Bharosa, and A. Cresswell. (2010). "Advances in Multi-Agency Disaster Management: Key Elements in Disaster Research". Information Systems Frontiers (ISF). (12), 1, 1-7.
- R. Chen, T. Thiyagarajan, H.R. Rao, and Jin Kyu Lee. (2010). "Design of a FOSS System for Flood Disaster Management". The 7th International Conference on Information Systems for Crisis Response and Management.
- K. Rajan, R. Chen, H.R. Rao, and Jin Kyu Lee. (2010). "Utilizing Web 2.0 for Decision Support in Disaster Mitigation," in E. Asimakopoulou & N. Bessis (eds.),Advanced ICTs for Disaster Management and Threat Detection: Collaborative and Distributed Frameworks". IGI Global.
- N. Bharosa, Jin Kyu Lee, and M. Janssen. (2010). "Challenges and Obstacles in Information Sharing and Coordination During Multi-Agency Disaster Response: Propositions from Field Exercises". Information Systems Frontiers (ISF). (12), 1, 49-65.
- Jin Kyu Lee, S. Bagchi-Sen, H.R. Raghav Rao, and S.J. Upadhyaya. (2010). "The Anatomy of Information Security Workforce". IEEE IT Professional. (12), 1, 14-23.
- Jin Kyu Lee and H.R. Rao. (2009). "Task Complexity and Different Decision Criteria for Online Service Acceptance: A Comparison of Two E-Government Compliance Service Domains". Decision Support Systems. (47), 4, 424-435.
- A. Mills, R. Chen, Jin Kyu Lee, and H.R. Rao. (2009). "Web 2.0 Emergency Applications: How Useful Can Twitter be for Emergency Response". Journal of Information Privacy & Security. (5), 3, 3-26.
- Jing Yang, Jin Kyu Lee, A. Rao, and N. Touqan. (2009). ""Inter-Organizational Communications in Disaster Management," in Weerakkody, Janssen, & Dwivedi (eds.) Handbook of Research on ICT-Enabled Transformational Government: A Global Perspective". IGI Global.
- A. Mills, A. Rao, R. Chen, and Jin Kyu Lee. (2009). "Web 2.0 Emergency Applications: How Useful Can Twitter Be in Emergency Response?". Proc. of the Tenth Annual Global Information Technology Management World Conference. Jun. 14 - 16,
- N. Bharosa, Jin Kyu Lee, M. Janssen, and H.R. Rao. (2009). "A Case Study of Information Flows in Multi-Agency Emergency Response Exercise". Proc. of the 10th Annual International Conference on Digital Government Research. May 17-20,
- R. Chen, J. Coles, Jin Kyu Lee, and H. R. Rao. (2009). "Emergency Communication and System Design: The Case of Indian Ocean Tsunami". Proc. of the IEEE/ACM International Conference on Information and Communication Technologies and Development. Apr 17-19,
- P. Singh, P.K. Singh, I. Park, Jin Kyu Lee, and H.R. Rao. (2009). ""Information Sharing: A Study of Information Attributes and Their Relative Significance during Catastrophic Events," in K.J. Knapp (ed.), Cyber-Security and Global Information Assurance: Threat Analysis and Response Solutions". IGI Global.
- A. Rao, Jin Kyu Lee, and R. Chen. (2009). "Design of Intelligent Systems for Emergency Response through a Content Study of Cyclone Nargis in Burma". The International Conference on Sensors, Security, Software, and Intelligent Systems.
- M. Lee and Jin Kyu Lee. (2008). "We've Lost Your Private Information - What You Gonna Do? A Study of Online Customers’ Responses to a Publicized Hacking Incident". Proceedings of the 3rd Workshop on Secure Knowledge Management.
- M. Gupta, Jin Kyu Lee, and H.R. Rao. (2008). ""Implications of FFIEC Guidance on Authentication in Electronic Banking in Handbook of Research," in J. Gupta & S. Sharma (eds.), Information Security and Assurance". Idea Group Inc..
- N. Bharosa, M. Janssen, H.R. Rao, and Jin Kyu Lee. (2008). "Adaptive Information Orchestration: Architectural Principles Improving Information Quality". The 5th International Conference on Information Systems for Crisis Response and Management.
- Jin Kyu Lee and H.R. Rao. (2008). "Complexity of Compliance Tasks and User Acceptance of G2C Online Compliance Services". The 9th Annual International Conference on Digital Government Research.
- S. Baum, S. Rao, Y. Rodriguez, N. Touqan, Jin Kyu Lee, and I. Park. (2007). "Effective Communications among Disaster Management Organizations and Citizens: A Literature Review". The International Conference on Global Entrepreneurship, Information Technology and Management.
- Jin Kyu Lee and H.R. Rao. (2007). "Perceived Risks, Counter-Beliefs, and Intentions to Use Anti-/Counter-Terrorism Websites: An Exploratory Study of Government-Citizens Online Interactions in a Turbulent Environment". Decision Support Systems. (43), 4, 1431-1449.
- Jin Kyu Lee and H.R. Rao. (2007). "Citizen Centric Analysis of Anti/Counter-Terrorism E-Government Services". The 8th Annual International Conference on Digital Government Research.
- Jin Kyu Lee and H.R. Rao. (2007). "Exploring the Causes and Effects of Inter-Agency Information Sharing Systems Adoption in the Anti/Counter-Terrorism and Disaster Management Domains". The 8th Annual International Conference on Digital Government Research.
- Jin Kyu Lee and H.R. Rao. (2007). "Understanding Socio-Technical Environments for Acceptance of Inter-Agency Anti/Counter-Terrorism Information Sharing Systems". The 40th Hawaii International Conference on System Sciences .
- S. Cha, Jin Kyu Lee, and H.R. Rao. (2006). "Information Privacy on Personal Web Blogs". The 2nd Workshop on Secure Knowledge Management.
- Jin Kyu Lee, J.T. Kirkhope, and H.R. Rao. (2006). "An Examination of Inter-Organizational Information Sharing Practice among Anti- /Counter-Terrorism Organizations". Conference on Information Science, Technology and Management.
- I. Park, Jin Kyu Lee, S. Upadhyaya, and H.R. Rao. (2006). "Emerging Issues for Secure Knowledge Management: Results of a Delphi Study". IEEE Transaction on Systems, Man and Cybernetics, Part A: Systems and Humans. (36), 3, 421-428.
- Jin Kyu Lee, S. Upadhyaya, H.R. Rao, and R. Sharman. (2005). "Secure Knowledge Management and the Semantic Web". Communications of the ACM (CACM). (48), 12, 48-54.
- S. Bagchi-Sen, Jin Kyu Lee, H.R. Rao, and S. Upadhyaya. (2005). "A Framework for Examining Skill Specialization, Gender Inequity, and Career Advancement in the Information Security Field". The 1st International Conference on Information Systems Security.
- Jin Kyu Lee, D.J. Kim, and H.R. Rao. (2005). "An Examination of Trust Effects and Pre-Existing Relational Risks in E-Government Services". The 11th Americas Conference on Information Systems.
- I. Park, Jin Kyu Lee, and H.R. Rao. (2004). "Digital Democracy: The Influence of the Internet on Voting Intention". New York City, NY: The 10th Americas Conference on Information Systems (AMCIS).
- Jin Kyu Lee, H.R. Rao, and S. Braynov. (2003). "Effects of Public Emergency on Citizens' Usage Intention toward e-Government: A Study in The Context of War in Iraq". Seattle, WA: The 24th International Conference on Information Systems (ICIS).
- Jin Kyu Lee and H.R. Rao. (2003). "A Study of Customers' Trust in Government-to-Customer Online Services". Tampa, FL: The 9th Americas Conference on Information Systems (AMCIS).
Presentations
- Investigating the Influence of Product Reviews on Perceived Uncertainty in Online
Transactions
17th Americas Conference on Information Systems
Detroit, MI - 2011 - We've Lost Your Private Information - What You Gonna Do? A Study of Online Customers’
Responses to a Publicized Hacking Incident
The 3rd Workshop on Secure Knowledge Management (SKM 2008)
NSF
Dallas, TX - November 3 2008 - Complexity of Compliance Tasks and User Acceptance of G2C Online Compliance Services
The 9th Annual International Conference on Digital Government Research (dg.o 2008)
Montreal, Canada - May 2008 - “Implications of the Internet for Anti-Terrorism and Individuals’ Privacy,” the Faculty
Research Excellence Series presented by OSU-Tulsa Library
April 17 2007 - Understanding Socio-Technical Environments for Acceptance of Inter-Agency Anti/Counter-Terrorism
Information Sharing Systems
The 40th Hawaii International Conference on System Sciences (HICSS 2007)
Hawaii - January 2007 - An Examination of Trust Effects and Pre-existing Relational Risks in e-Government
Services
The 11th Americas Conference on Information Systems (AMCIS)
Omaha, NE - August 2005 - Study of Customers' Trust in Government-to-Customer Online Services
The 9th Americas Conference on Information Systems (AMCIS)
Tampa, FL - August 2003
Editorial and Review Activities
- Information Systems Research (ISR)
Ad Hoc Reviewer
October 2017 - Journal of Business Research (JBR)
Ad Hoc Reviewer
July 2017 - Information Systems Journal (ISJ)
Ad Hoc Reviewer
December 2015 - Communications of AIS
Ad Hoc Reviewer
2013 - Information Systems Management (ISM)
Ad Hoc Reviewer
2013 - Journal of Homeland Security and Emergency Management (JHSEM)
Ad Hoc Reviewer
2013 - Government Information Quarterly (GIQ)
Ad Hoc Reviewer
2012 - Management Information Systems Quarterly (MISQ)
Ad Hoc Reviewer
2011 - Journal of Information Technology Theory and Application (JITTA)
Ad Hoc Reviewer
2010 - Asia Pacific Journal of Information Systems (APJIS)
Ad Hoc Reviewer
2009 - International Conference on Information Systems (ICIS)
Ad Hoc Reviewer
June 2008 - European Journal of Information Systems (EJIS)
Ad Hoc Reviewer
2008 - Journal of Information System Security (JISSEC)
Ad Hoc Reviewer
2008 - The Journal of Strategic Information Systems (JSIS)
Ad Hoc Reviewer
2008 - Decision Support Systems (DSS)
Ad Hoc Reviewer
2007 - Journal of Association for Information Systems (JAIS)
Ad Hoc Reviewer
2007 - Journal of Organizational Computing and Electronic Commerce (JOCEC)
Ad Hoc Reviewer
2007 - Information Systems Frontiers (ISF)
Editor or Co-Editor
December 2019 - February 2020 - Information Systems Frontiers (ISF)
Editorial Board Member
2009 - 2015 - International Conference on Information Systems (ICIS) 2009
Associate Editor
November 2008 - December 2009 - Information Systems Frontiers (ISF) Special Issue on Advances in Inter-organizational
Disaster Management
Special Issue Editor
February 2008 - 2009 - MIS Quarterly (MISQ) Special Issue on Information Systems Security in a Digital Economy
Associate Editor
January 2008 - 2009 - HANDBOOK OF RESEARCH ON ICT ENABLED TRANSFORMATIONAL GOVERNMENT: A GLOBAL PERSPECTIVE
Invited Manuscript Reviewer
2008 - 2008 - International Journal of Electronic Commerce (IJEC)
Ad Hoc Reviewer
2008 - Journal of Electronic Commerce Research (JECR)
Ad Hoc Reviewer
2008 - Journal of Management Information Systems (JMIS)
Ad Hoc Reviewer
2008 - Journal of Organizational and End User Computing (JOEUC)
Ad Hoc Reviewer
2008
Awards and Honors
- Richard W. Poole Research Excellence Award (2016)
- Outstanding Service Faculty Award (2015)
- Richard W. Poole Research Excellence Award (2013)
- Richard W. Poole Research Excellence Award (2011)
- Richard W. Poole Research Excellence Award (2009)
- 2006 Ph.D. Student Achievement Award (2006)
- Doctoral Student Outstanding Performance Prize (2005)
- Best Paper Award, Americas Conference on Information Systems (AMCIS) (2005)
Contracts, Grants, and Sponsored Research
- NSF IIS-0809186: Information Retrieval and Exchange under Extreme Pressure
National Science Foundation
February 2008 - January 2009 - NSF IIS-0733388: REU Supplement for NSF Grant IIS-0548917 Amendment 002
National Science Foundation
June 2007 - August 2007 - NSF IIS-0548917: Citizen Centric Analysis of Anti/Counter Terrorism e-Government Services
National Science Foundation
September 2005 - August 2007
Academic, Military, and Professional Positions
- MSIS Department, Oklahoma State University, Associate Professor, July 2012
- MSIS Department, Oklahoma State University, Assistant Professor, August 2006 - June 2012
- School of Management, University at Buffalo, SUNY, Teaching Associate, RA, TA, 2003 - May 2006
- Linkware Co., Ltd., Korea, IT Consultant, 1999 - 2000
- Bascom Co., Ltd. & Jin Computer Business Co., Ltd., Korea, System Developer/System & NW Administrator, 1992 - 1996
- ROK Army, January 1993 - July 1994
Courses Taught
- MSIS 4033 (3 Semesters)
- MSIS 4123 (10 Semesters)
- MSIS 5213 (2 Semesters)
- MSIS 4523 (22 Semesters)
- MSIS 5233 (13 Semesters)
- MSIS 4233 (20 Semesters)
- MSIS 5283 (4 Semesters)
- MSIS 5773 (9 Semesters)
- MSIS 5600 (1 Semester)
- TCOM 5213 (5 Semesters)
- TCOM 5233 (24 Semesters)
- TCOM 5123 (22 Semesters)
- MSIS 4020 (2 Semesters)
- TCOM 5012 (4 Semesters)
Semester | Course | Section | Course Title |
---|---|---|---|
Spring 2024 | MSIS 4033 | 21388 | Information Systems Project Management and Communication |
Spring 2024 | MSIS 4123 | 23433 | Information Assurance Management |
Spring 2024 | MSIS 4123 | 31368 | Information Assurance Management |
Spring 2024 | MSIS 5213 | 21147 | Information Assurance Management |
Fall 2023 | MSIS 4123 | 63689 | Information Assurance Management |
Fall 2023 | MSIS 4523 | 62039 | Infrastructure Development |
Fall 2023 | MSIS 5213 | 61344 | Information Assurance Management |
Spring 2023 | MSIS 4033 | 21677 | Information Systems Project Management and Communication |
Spring 2023 | MSIS 4123 | 23968 | Information Assurance Management |
Spring 2023 | MSIS 5233 | 23368 | Applied Information Systems Security |
Fall 2022 | MSIS 4123 | 64243 | Information Assurance Management |
Fall 2022 | MSIS 4523 | 62315 | Infrastructure Development |
Spring 2022 | MSIS 4033 | 21899 | Information Systems Project Management and Communication |
Spring 2022 | MSIS 4123 | 24536 | Information Assurance Management |
Spring 2022 | MSIS 4233 | 21904 | Applied Information Systems Security |
Spring 2022 | MSIS 5233 | 23827 | Applied Information Systems Security |
Fall 2021 | MSIS 4123 | 64718 | Information Assurance Management |
Fall 2021 | MSIS 4523 | 62594 | Infrastructure Development |
Spring 2021 | MSIS 4123 | 25143 | Information Assurance Management |
Spring 2021 | MSIS 4233 | 22135 | Applied Information Systems Security |
Spring 2021 | MSIS 5233 | 24291 | Applied Information Systems Security |
Fall 2020 | MSIS 4123 | 65323 | Information Assurance Management |
Fall 2020 | MSIS 4523 | 62876 | Data Communication Systems |
Spring 2020 | MSIS 4123 | 26554 | Information Assurance Management |
Spring 2020 | MSIS 4233 | 22450 | Applied Information Systems Security |
Spring 2020 | MSIS 5233 | 24948 | Applied Information Systems Security |
Spring 2020 | MSIS 5283 | 28973 | Secure Information Systems Administration |
Fall 2019 | MSIS 4523 | 63360 | Data Communication Systems |
Fall 2019 | MSIS 5773 | 71081 | The Upper Layers of Telecommunications Systems |
Fall 2019 | MSIS 5773 | 71479 | The Upper Layers of Telecommunications Systems |
Spring 2019 | MSIS 4233 | 22799 | Applied Information Systems Security |
Spring 2019 | MSIS 5233 | 25797 | Applied Information Systems Security |
Spring 2019 | MSIS 5283 | 30842 | Secure Information Systems Administration |
Fall 2018 | MSIS 4523 | 63683 | Data Communication Systems |
Fall 2018 | MSIS 5773 | 66283 | The Upper Layers of Telecommunications Systems |
Spring 2018 | MSIS 4233 | 23275 | Applied Information Systems Security |
Spring 2018 | MSIS 4523 | 29202 | Data Communication Systems |
Spring 2018 | MSIS 5233 | 23276 | Applied Information Systems Security |
Spring 2018 | MSIS 5233 | 26828 | Applied Information Systems Security |
Spring 2018 | MSIS 5283 | 26830 | Secure Information Systems Administration |
Fall 2017 | MSIS 4523 | 64324 | Data Communication Systems |
Fall 2017 | MSIS 4523 | 66566 | Data Communication Systems |
Fall 2017 | MSIS 5773 | 67536 | The Upper Layers of Telecommunications Systems |
Fall 2017 | MSIS 5773 | 70513 | The Upper Layers of Telecommunications Systems |
Spring 2017 | MSIS 4233 | 23123 | Applied Information Systems Security |
Spring 2017 | MSIS 4233 | 23752 | Applied Information Systems Security |
Spring 2017 | MSIS 4523 | 23127 | Data Communication Systems |
Spring 2017 | MSIS 5233 | 23131 | Applied Information Systems Security |
Spring 2017 | MSIS 5233 | 23753 | Applied Information Systems Security |
Spring 2017 | MSIS 5233 | 27816 | Applied Information Systems Security |
Spring 2017 | MSIS 5283 | 27818 | Secure Information Systems Administration |
Fall 2016 | MSIS 4523 | 65006 | Data Communication Systems |
Fall 2016 | MSIS 4523 | 67627 | Data Communication Systems |
Fall 2016 | MSIS 5600 | 69322 | Special Projects in Business Information Systems |
Fall 2016 | MSIS 5773 | 68735 | The Upper Layers of Telecommunications Systems |
Spring 2016 | MSIS 4233 | 801 | APPLIED INFO SYS SEC |
Spring 2016 | MSIS 5233 | 1 | APPLIED INFO SYS SECUR |
Spring 2016 | MSIS 5233 | 583 | APPLIED INFO SYS SECUR |
Spring 2016 | MSIS 5233 | 801 | APPLIED INFO SYS SECUR |
Fall 2015 | MSIS 4523 | 801 | DATA COMMUNICATION SYS |
Fall 2015 | MSIS 5773 | 1 | UP LAYERS TELECOM SYS |
Fall 2015 | MSIS 5773 | 583 | UP LAYERS TELECOM SYS |
Fall 2015 | MSIS 5773 | 802 | UP LAYERS TELECOM SYS |
Spring 2015 | MSIS 4233 | 801 | APPLIED INFO SYS SEC |
Spring 2015 | TCOM 5213 | 1 | TELE ANLS PLAN,DES II |
Spring 2015 | TCOM 5213 | 583 | TELE ANLS PLAN,DES II |
Spring 2015 | TCOM 5213 | 801 | TELE ANLS PLAN,DES II |
Spring 2015 | TCOM 5233 | 1 | APPLIED INFO SYS SECUR |
Spring 2015 | TCOM 5233 | 583 | APPLIED INFO SYS SECUR |
Spring 2015 | TCOM 5233 | 801 | APPLIED INFO SYS SECUR |
Fall 2014 | MSIS 4523 | 801 | DATA COMMUNICATION SYS |
Fall 2014 | TCOM 5123 | 2 | UP LAYERS TELECOM SYS |
Fall 2014 | TCOM 5123 | 583 | UP LAYERS TELECOM SYS |
Fall 2014 | TCOM 5123 | 802 | UP LAYERS TELECOM SYS |
Spring 2014 | MSIS 4233 | 801 | APPLIED INFO SYS SEC |
Spring 2014 | TCOM 5213 | 583 | TELE ANLS PLAN,DES II |
Spring 2014 | TCOM 5213 | 801 | TELE ANLS PLAN,DES II |
Spring 2014 | TCOM 5233 | 583 | APPLIED INFO SYS SECUR |
Spring 2014 | TCOM 5233 | 801 | APPLIED INFO SYS SECUR |
Spring 2013 | MSIS 4233 | 801 | APPLIED INFO SYS SEC |
Spring 2013 | MSIS 4523 | 1 | DATA COMMUNICATION SYS |
Spring 2013 | TCOM 5233 | 583 | APPLIED INFO SYS SECUR |
Spring 2013 | TCOM 5233 | 801 | APPLIED INFO SYS SECUR |
Fall 2012 | MSIS 4523 | 801 | DATA COMMUNICATION SYS |
Fall 2012 | TCOM 5123 | 1 | UP LAYERS TELECOM SYS |
Fall 2012 | TCOM 5123 | 583 | UP LAYERS TELECOM SYS |
Fall 2012 | TCOM 5123 | 801 | UP LAYERS TELECOM SYS |
Spring 2012 | MSIS 4020 | 920 | Applied Software Tools and Techniques |
Spring 2012 | MSIS 4233 | 801 | Applied Information Systems Security |
Spring 2012 | TCOM 5012 | 920 | Telecommunications Laboratory |
Spring 2012 | TCOM 5233 | 1 | Applied Information Systems Security |
Spring 2012 | TCOM 5233 | 583 | Applied Information Systems Security |
Spring 2012 | TCOM 5233 | 801 | Applied Information Systems Security |
Fall 2011 | MSIS 4523 | 801 | Data Communication Systems |
Fall 2011 | TCOM 5123 | 1 | The Upper Layers of Telecommunications Systems |
Fall 2011 | TCOM 5123 | 583 | The Upper Layers of Telecommunications Systems |
Fall 2011 | TCOM 5123 | 801 | The Upper Layers of Telecommunications Systems |
Spring 2011 | MSIS 4233 | 801 | Applied Information Systems Security |
Spring 2011 | TCOM 5012 | 920 | Telecommunications Laboratory |
Spring 2011 | TCOM 5233 | 1 | Applied Information Systems Security |
Spring 2011 | TCOM 5233 | 583 | Applied Information Systems Security |
Spring 2011 | TCOM 5233 | 801 | Applied Information Systems Security |
Fall 2010 | MSIS 4523 | 801 | Data Communication Systems |
Fall 2010 | TCOM 5123 | 1 | The Upper Layers of Telecommunications Systems |
Fall 2010 | TCOM 5123 | 503 | The Upper Layers of Telecommunications Systems |
Spring 2010 | MSIS 4020 | 920 | Applied Software Tools and Techniques |
Spring 2010 | MSIS 4233 | 801 | Applied Information Systems Security |
Spring 2010 | TCOM 5012 | 920 | Telecommunications Laboratory |
Spring 2010 | TCOM 5233 | 603 | Applied Information Systems Security |
Fall 2009 | MSIS 4523 | 801 | Data Communication Systems |
Fall 2009 | TCOM 5123 | 1 | The Upper Layers of Telecommunications Systems |
Fall 2009 | TCOM 5123 | 603 | The Upper Layers of Telecommunications Systems |
Fall 2009 | TCOM 5123 | 801 | The Upper Layers of Telecommunications Systems |
Spring 2009 | MSIS 4233 | 1 | Applied Information Systems Security |
Spring 2009 | MSIS 4233 | 801 | Applied Information Systems Security |
Spring 2009 | TCOM 5233 | 1 | Applied Information Systems Security |
Spring 2009 | TCOM 5233 | 603 | Applied Information Systems Security |
Spring 2009 | TCOM 5233 | 604 | Applied Information Systems Security |
Spring 2009 | TCOM 5233 | 801 | Applied Information Systems Security |
Fall 2008 | MSIS 4523 | 801 | Data Communication Systems |
Fall 2008 | TCOM 5123 | 1 | The Upper Layers of Telecommunications Systems |
Fall 2008 | TCOM 5123 | 603 | The Upper Layers of Telecommunications Systems |
Fall 2008 | TCOM 5123 | 604 | The Upper Layers of Telecommunications Systems |
Fall 2008 | TCOM 5123 | 801 | The Upper Layers of Telecommunications Systems |
Spring 2008 | MSIS 4233 | 001 | Applied Information Systems Security |
Spring 2008 | MSIS 4233 | 801 | Applied Information Systems Security |
Spring 2008 | TCOM 5233 | 001 | Applied Information Systems Security |
Spring 2008 | TCOM 5233 | 603 | Applied Information Systems Security |
Spring 2008 | TCOM 5233 | 604 | Applied Information Systems Security |
Spring 2008 | TCOM 5233 | 801 | Applied Information Systems Security |
Fall 2007 | MSIS 4523 | 801 | Data Communications Systems |
Fall 2007 | TCOM 5012 | 920 | Telecommunications Laboratory |
Fall 2007 | TCOM 5123 | 001 | The Upper Layers of Telecommunications Systems |
Fall 2007 | TCOM 5123 | 603 | The Upper Layers of Telecommunications Systems |
Fall 2007 | TCOM 5123 | 604 | The Upper Layers of Telecommunications Systems |
Fall 2007 | TCOM 5123 | 801 | The Upper Layers of Telecommunications Systems |
Spring 2007 | MSIS 4523 | 1 | Data Communications Systems |
Fall 2006 | MSIS 4233 | 1 | Applied Information Systems Security |
Fall 2006 | MSIS 4233 | 801 | Applied Information Systems Security |
Fall 2006 | TCOM 5233 | 1 | Applied Information Systems Security |
Fall 2006 | TCOM 5233 | 801 | Applied Information Systems Security |