Visiting Assistant Professor
The 2017-2018 Visiting Assistant Professor for Computer Science Department at Jacksonville University. teaching Systems Configuration, Database Development, and Personal Productivity Using Technology for Fall 2017.
More About me
I am a Computer Science instructor who teaches Computer Science, Information Systems, and Information Security. I am pursuing my PH.D. in Business Administration at Northcentral University, specializing in Information Security. I currently hold a Master’s Degree of Science in Information Systems Computer Security from Strayer University. I have worked at multiple universities and colleges, and I also develop websites. I am a real world Instructor and I provide my students with up-to-date movies, lectures, and information about the near future with computers.
My Expectation of graduation year is 2018 with a Ph.D of Business Administration Specialization in Information Security From Northcentral University, This is an Online Courses Degree, I have Graduated from Strayer University on March 24th, 2014. with a Master’s of Science Degree in Information Systems Computer Security, Strayer University is a hybrid education method by Having online, and on Ground courses. My Undergraduate Bachelor Degree was From University Of Baghdad College of Mass Communication 2006 Class, University of Baghdad Also known as Baghdad University is a traditional school.
I have work and still working in website Development and Programming, Created a number of website using free source or special program coding. Also I work in web hosting and domain registration, I’m working in this field sines 2006.
Florida State College at jacksonville
Jacksonville University, Department of Computing Sciences
Ph.D of Business Administration Specialization in Information Security
Masters of Science in Information Systems
Bachelor of Arts in Communication
Baghdad University, IRAQ
My teaching philosophy is founded on a strong desire to share my passion for computer science with those who are already interested in the field, and to inspire an interest in those who are not. The opportunity to do both through teaching was a primary impetus for entering my doctoral studies. My teaching philosophy has three parts: (1) committing to the needs of my students, (2) continuously improving as an educator, and (3) exposing the beauty of computer science to any audience. I strive to be accommodating and open to students because I take seriously the constraints in students’ differing life situations. To be available for all my students required committing to extra office hours, taking phone calls, and clearing out course emails as quickly as possible with some help from teaching assistants. I plan to find a balance of communication media and flexible times that work for my students and me. Being available is only part of the commitment; the rest is providing support unique to individual students to help them recognize and address their learning barriers.
Previous Experience: I had the privilege of being an Adjunct instructor for the past three years in multiple colleges and universities, giving me the opportunity to interact with student from multiple background, situations, that needed special attention. The opportunity of teaching online, give me the understanding of the teaching techniques without face to face interaction. Based on this experience give me the knowledge to add more to the classes I’ve being teaching, like using slideshow, movies and picture as supplement material to the book or lecture, using real examples of the topic cover will help the students on better understanding.
My office hours also allowed me to internet act more with student individually to get their feedback on various issues, or help student to get back or keep of track as the course advanced. Understanding the student limitation will help in delivering the learning message much smother to ensure all student get what the deserve of learning.
Academic Institutions, private schools, or public both share the same importance of delivering knowledge to students, as it is required schools need to hold student information, like social security numbers, legal names, real physical address, etc. Due to this data collection, academic institution becomes a good target for hackers to get access to this information, that can be used in criminal activity such as Identify theft. Academic Intuitions employees need to understand the risk of being employed by academic institution; they can become the next target in line.
Per John Hitt the president of University of Central Florida about the security breach that accrued the begging of January, 2016 to the system of the university where the breach affected per Hitt 63,000 student where the social security numbers has been accessed by the hacker, but not credit card information, and other information (Hitt, 2016).
Academic Institutions need to be incompliance with federal act like the Family Educational Rights and Privacy Act (FERPA) which require that student information need to be confidential, ensuring systems and data security one of the essential of FERPA.
Information confidentiality one of the tents of information systems security, which indicate who had access to the information, like employee and staff, anyone who do not have authorization to access the information will consider a violation to the tenets of information system security, and a violation to the FERPA. Per David Kim and Michael Solomon (2014) Cyberspace add new threats to individuals and organization (Kim & Solomon, 2014, p. 460), information systems face threats from both sources human made and natural threats (Kim & Solomon, 2014). The importance of understanding threats so huge for the organization to prepare for a plan that held to respond to these threats or to overcome on it and secure the system. My research addressing the topic of information confidentiality and cyber security in the academic intuitions, the study targeting the training that the employee gets when being hired in the current position, as well as, the trainings they get around the year, the notification about attacks attempts and warning from the IT security administrator about a potential attempts or attack. The type of information that the user conduct in terms of the information sensitivities.
Hitt, J. C. (2016, February 4). Intrusion into UCF Network Involves Personal Data. Retrieved from University of Central Florida: https://www.ucf.edu/datasecurity/
Kim, D., & Solomon, M. G. (2014). Fundamentals of Information Systems Security. Burlington, MA: Jones & Bartlett Learning .
I would be happy to talk to you if you need my assistance, if you have any issue to discuss with me you can e-mail or contact me by mail.