Dale C. Rowe

Learn More
The launch of the Microsoft Kinect for Xbox (a real-time 3D imaging device) and supporting libraries spurred the development of various applications including those with natural user interfaces. We propose that using Kinect offers opportunities for novel approaches to classroom instruction on natural user interaction. A number of development frameworks has(More)
30,000 qualified cyber-security specialists in the US Public Sector alone despite being one of the best financially compensated technology-related domains. Against ever evolving cyber-threats the need to graduate students skilled in the concepts and technologies of cyber-security is becoming a critical responsibility of academic institutions in order to(More)
What is an IT Bachelor program and how can one be identified? In recent years, specific IT programs have arisen in the US to fill an industry need not directly provided for by other computing disciplines. IT programs are growing in number and influence yet can be hard to identify for several reasons: They are not always titled "Information Technology." They(More)
In this paper we discuss how a research-orientated student red-team provides free security assessments to organizations within the community. Such activities provide students with valuable skills and knowledge in dealing with real-world security issues. We present our approach to implementing such a team as a permanent fixture within our IT program's Cyber(More)
Using face and head movements to control a computer can be especially helpful for users who, for various reasons, cannot effectively use common input devices with their hands. Using vision-based consumer devices makes such a user interface readily available and allows its use to be non-intrusive. However, a characteristic problem with this system is(More)
What is an IT Bachelor program and how can one be identified? In recent years, specific IT programs have arisen in the US to fill an industry need not directly provided for by other computing disciplines. IT programs are growing in number and influence yet can be hard to identify for several reasons: They are not always titled “Information Technology.” They(More)
In this paper, we discuss the creation of a student Blue Team to assist campus organizations with security incident response. We also explore approaches for establishing a relationship with university information technology staff, informing blue team members of professional and ethical responsibilities, and aiding system administrators with incident(More)