Belgacem Raggad

Belgacem Raggad

Professor
Seidenberg School of CSIS
Information Technology
NYC
320
Goldstein Academic Center
| Office Hours: Mon 1:00pm-6:00pm

Biography

Awards and Honors

  • The Country of Tunisia, 2001, Gold Medal for Great Contributions in IS Security
  • Pace University, School of Computer Science and Information System, 1998, CSIS Excellence in Research Award
  • NULL, 1998, Award in Excellence in Research & Scholarship, Pace University
  • Data Processing Management Association, 1989, Data Processing Management Award
  • NULL, 1982, Fulbright Scholarship
  • CII-Honeywell Bull of Paris, 1979, Scholarship

Education

PhD, Pennsylvania State University at University Park, 1989
Information Management

MS, University of Tunis, 1979
Computer Information Systems

A.D., University of Tunis, 1975
Mathematics and Physics

Research and Creative Works

Research Interest

Management Information Systems (Decision Support Systems); Software Engineering (Information Systems Development); Artificial Intelligence (Approximate Reasoning);

Grants, Sponsored Research and Contracts

Fulbright Grant
January 2002. Pace University, $60,000.00. Funded. Fulbright Grant in Tunisia

Deep Data: Invisible Analytics
January 2017 - December 2019. Scholarly Research Papers, Pace University, $3,045.00. Funded. On Internet we only access about 1% of existing Internet data. The rest is called deep data. We need what we call Invisible Analytics to get to some of it. If we are successful in doing this, it is just unbelievable the gains we get. For example, a university can use Invisible Analytics to understand student retention problems and can make corrections to maintain and improve its retention rate. A company can understand the reasons behind its customer attrition and what is behind its business value retention deficiencies. Invisible analytics will be the tool set needed to maintain its customers and enhance their loyalty which will secure its business value generation capabilities. Another example would be to use Invisible Analytics to understand our healthcare deficiencies and act to correct it. Unfortunately, we still spending billions of dollars on data capture from the Internet or from business operational systems to create boundless big data depots that we cannot dig it to produce valuable decision support information. We still have no clear approach to design the platform needed to start designing the analytical tools to generate decision support information to enhance business value in our educational systems, our healthcare systems, and our economy. This research project intends to design a computing platform for the development of Invisible Analytics tools to get into deep data and to explore our big data depots to produce valuable decision support information. We have completed the quantitative analysis and we were successful in building the belief structures needed to construct the needed probabilistic framework for the purpose of building the analytical tools for expanded data analytics. We also have tested our models in telemedicine to detect e-patient attrition and mitigate its impacts. We are currently working to extend the testing to other areas including student retention.

Fulbright Grant
January 2003 - August 2004. Pace University, $62,000.00. Funded. From the State Department

HVCET Grant
January 2001 - December 2001. Pace University, School of Computer Science and Information Systems, Pace University, $10,500.00. Funded. New Journal Grant

HVCET Grant
January 2001 - May 2001. Pace University, School of Computer Science and Information Systems, Pace University, $10,000.00. Funded. Data Mining Lab

Courses Taught

Past Courses

CIT 481: Cpstn in Infrmtn Tchnlgy
CS 704: Independent Research
IS 397: Tpc: Artificial Intelligence
IS 495: Information Systems Internship
IS 600: Grad Independent Study in IS
IS 614: Applied Artfcl Intelligence
IS 617: Information Systems Principles
IS 620: IS and Organizational Strategy
IS 632: Business Telecommunications
IS 637: Info Systems Project Mgt
IS 637: IS Project & Change Mngmnt
IS 639: Info Systems Planning & Policy
IS 641: Information Security/Controls
IS 642: Info Security Planning & Pol
IS 650: Telecommunications Management
IS 660: Data Warehsng & the Orgnztn
IS 692: Research Project Seminar
IT 607: System Dvlpmnt & Prjct Mgmnt
IT 662: Web and Internet Security
IT 666: Information Security Managemnt

Publications and Presentations

Publications

Owners’ collaboration in running an IoT: An evidential model
(2023, September). Vol Volume 18 (Issue Issue 4) , pages 37-40. https://www.iosrjournals.org/iosr-jece/pages/current-issue.html
DOWNLOAD

Enhancing Big Data Marketing Analytics by Learning from Rivalry
(2022, November). International Scientific Survey Journal. Vol Vol 48 (Issue 1) , pages 12.
DOWNLOAD

The State of Big Data


Sound Big Data Decision Support Despite its V’s Article:Sound Big Data Decision Support Despite its V’s


Security Risk Learning in Cybersecurity: Evidential Reasoning Model
(2018, February). https://www.sedsi.org/
DOWNLOAD

Evidential Modeling for Telemedicine Continual Security
(2017, October (4th Quarter/Autumn)). International Journal of Computer Science and Network Security. Vol 6 (Issue 5) , pages 559-564. https://ijcsn.org/publications.html

Risk of Telemedicine Infeasibility: An Evidential Reasoning Approach
(2017, October (4th Quarter/Autumn)). International Journal of Medical Research & Health Sciences. Vol 6 (Issue 10) https://ijmrhs.com/abstract/risk-of-telemedicine-infeasibility-an-evidential-reasoning-approach-13146.html

Intelligent Decision Support Capabilities for a Law Enforcement GIS
https://aisel.aisnet.org/siggis2016/2/

Enforcing Patient Privacy Assurance Policy: A Privacy Violation Detection and Response System
(2016, October (4th Quarter/Autumn)). Vol 2016 https://journals.indexcopernicus.com/

Telemedicine: Distributed Decision Support with Partial Compatibility Evidence
Vol 2016 https://www.conferencemgt.com/presseinforms/seinforms.htm

Evidential Reasoning in Real-time Monitoring of Computing Systems
Vol 2016 https://cisse.info

Autonomic Computing and Policy Based Systems:
INASE Journal. Vol 2015 (Issue 2015) , pages http://www.inase.org/.
DOWNLOAD

Decision Support Treating Partial Compatibility Evidence in Telemedicine
Vol 2015 , pages http://www.inase.org/.

Risk-Driven Intrusion Response Mechanism Conform To ISO 27005, NIST, and FIPS
(2014, June). International Journal of Computer Network and Security.

Towards a Science of Cyber Security: A Security Self-Security Generator
Vol 2014

Medical Decision Support System: A Belief Structure to Manage Uncertainty
(2014, May). International Journal Of Medical Technology. Vol 22 (Issue 1) https://recentscience.org/

Digital Policy Management Requirements and Architecture
(2014, March). https://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=6811096

CRM Information Assurance by Adding Specificity
(2012, January (1st Quarter/Winter)). International Journal of Computer Science and Network Security. Vol 11 (Issue 5) https://ijcsns.org/
DOWNLOAD

Cyberspace Security: How To Develop a Security Strategy
(2011). Journal of Management and Business Research. Vol 1 (Issue 1) https://tjmbr.org
DOWNLOAD

(2011, December). https://washingtonscene.thehill.com/announcements/13205-pace-university-launches-cyber-security-institute

(2011, December). https://www.hackerjournals.com/?p=22309

Cyberspace Security: How To Develop a Security Strategy
(2011, May). Journal of Management and Business Research. Vol 1 (Issue 1) https://tjmbr.org

CRM Decision Support with Imprecise Data
(2010, October (4th Quarter/Autumn)).

CRM Information Assurance
(2010, May).

(2010, January (1st Quarter/Winter)). .Information Security Management: Concepts and Practice~~. CRC Press.

Methodology for Educating Information systems Students on the New Paradigm of Service-Oriented Architecture (SOA) Technology
(2008, December). Vol 6:25

Methodology for Educating Information Systems students: The New Paradigm of Service-Oriented Architecture (SOA) Technology
(2008, October (4th Quarter/Autumn)). Vol 10

Methodology for Educating Information Systems Students: The New Paradigm of Service-Oriented Architecture (SOA) Technology
(2007, December).

Methodology for Educating Information Systems Students on the New Paradigm of Service-oriented Architecture (SOA) Technology
(2007, November).

A Simple Design of an Intrusion Detection and Response System
(2006, December).

Cyberspace Security: How to Develop a Security Strategy
(2006, November).

Data Mining Life-cycle in e-Business Management
(2006, October (4th Quarter/Autumn)).

A Financial Assurance Program for Incidents Induced by Internet-based Attacks
(2006, June).

The Simple Information Security Audit Process: SISAP
(2006, June). Vol 6:06

Sequential Intrusion Detection and Response Systems
(2006, March).

A Risk-Driven Intrusion Detection and Response System
(2005, December). Vol 12

The Simple Information Security Audit Process: SISAP
(2005, August).

Intrusion Detection and Response System Generator
(2005, April (2nd Quarter/Spring)). Vol 213

Intrusion Detection and Response System Generator: Using Transferred Belief Model
(2005, March).

E-Business Simulation
(2005, February).

E-Business Simulation: Toning Technical and Strategic Requirements to Generate Business Value
(2005, February).

Genetic Fuzzy Rule-Based Learning in IDS
(2004, November).

Risk-driven Fuzzy Expert IDS
(2004, October (4th Quarter/Autumn)).

(2003, December).

Heterogeneous uncertain information fusion in multiagent DSS
(2003, December).

Web content management: DEA approach
(2003, December).

Customer Loyalty and e-Business
(2003, April (2nd Quarter/Spring)).

Personalization Software Agents in Internet Computing
(2003, April (2nd Quarter/Spring)).

Study of e-Business in Small Businesses in the Hudson Valley of New York State
(2003, February).

A Fuzzy Rule Based System-based Intrusion Detection System
(2002, December).

(2002, December).

New Rules of Global Competitiveness in the Twenty-First Century: Exploratory Study
(2002, December).

E-Business Content Self-Enrichment Using Data Wrap Analysis
(2002, May).

Web Content Management Using DEA
(2002, May).

(2001, December).

(2001, December). .The Design of a Security Plan: An Interactive Approach~~. AIMIT.

Faculty Members Launch New Journal
(2001, December).

The Design of a Security Plan: An Interactive Approach
(2001, December).

Affined Reasoning
(2001, December).

HR Performance
(2001, December).

Trends in Global Competitiveness
(2001, March).

Computational Freedom in EISs
(2000, December).

Information Security: An Executive's Easy Reference
(2000, December).

Corporate Information Security: The Vital Defense Strategy
(2000, October (4th Quarter/Autumn)).

Data Mining - A Powerful Information Creating Tool
(1999, December). Vol 15:2, pp. 81-90

Expert Systems: Defection and Perfection
(1999, December). Vol 12:05

Possibilistic Group Support System for Inventory and Pricing Problems
(1999, December). Vol 15:01

Strategic Decision Making in a Global Economical Environment
(1999, July (3rd Quarter/Summer)).

Assessing the Perceptions of Human Resource Managers Toward Nepotism: A Cross-Cultural Study
(1998, December). Vol 9:8, 554-570

Strategic Planning for Information Security: Security Control Balance
(1998, December).

How Can Colleges Recruit Students and Increase Enrollment for Academic Programs' Survival? Empirical Investigation
(1998, April (2nd Quarter/Spring)).

The Impact of Distance Learning on the Future College
(1998, April (2nd Quarter/Spring)).

Feasibility of Information Security Solutions: Policy, Software or Hardware
(1998, March).

Planning Potential Technology Using Organizational Information: A Cross-Cultural Study
(1997, December). Vol 12:06

Simulation-Based Clustering for Emerging Markets
(1997, December).

Viruses and the Internet: A Mix That Can Upset National Security
(1997, December).

How Can The U.S. Government Help U.S. Businesses Improve Their Global Competitiveness with Minimal Regulatory Damages to the U.S. Government
(1997, April (2nd Quarter/Spring)).

A Hybrid Intelligent System for IT Outsourcing Decisions
(1997, April (2nd Quarter/Spring)).

Bayesian Decision Support System
(1997, April (2nd Quarter/Spring)). Vol 97:2, pp. 43-50

Executive's Easy Reference for Information System Concepts
(1997, April (2nd Quarter/Spring)). Vol 10:04

Industrial Competitiveness: Case of Tunisia
(1997, April (2nd Quarter/Spring)).

Multimedia Expert Systems for Information Security on Client Server
(1997, April (2nd Quarter/Spring)).

Faculty Responses to Business School Deans' Leadership Style
(1997, March).

Functional Executive Information Systems
(1996, December).

Neural Network Technology for Knowledge Resource Management
(1996, December). Vol 34:2, pp. 20-24

Data Conflict in Neural Network Training
(1996, July (3rd Quarter/Summer)). Vol 36:04:00

Effects of Information Structure and Problem Solving on DSS Choice
(1996, April (2nd Quarter/Spring)). Vol 7:01

Consultation Quality Control Model of Expert Systems
(1996, March). Vol 32:2, pp. 171-183

Using COCOMO in Evaluating System Design Projects
(1996, January (1st Quarter/Winter)). Vol 36:02:00

Effect of Project Characteristics on Team Structure
(1995, December).

Object Oriented Design for Library Applications
(1995, December). Vol 14:01

Effects of Organizational Information on Potential Technology: An International Perspective
(1995, September).

Managerial Strategic Choice in Planning EDI
(1995, April (2nd Quarter/Spring)). Vol 8:01

Evaluation of an Undergraduate CIS Curriculum
(1995, January (1st Quarter/Winter)). Vol 6:03

Business Curriculum Internationalization: Do Not Leave Out Management Information Systems
(1994, December).

Decision Support Level Indices for Decision Support Systems
(1994, December).

Maintenance Process for DSS
(1994, December).

Review of 'Innovation Matrix' by P. A. Herbig
(1994, December).

The Relationship Between Personal Value Systems and Managerial Success: International Perspective
(1994, December). Vol 4:14, pp. 71-84

Knowledge Resource Management: Knowledge Segmentation
(1993, December). Vol pp. 423-428

Business Decision Expert Systems
(1993, January (1st Quarter/Winter)). Vol 3:1, pp. 55-74

An Inventory Decision Model Under Competition, Price Increase and Limit on Supply
(1991, December). Vol 7:07

Enhanced Knowledge-Based Simulation Systems
(1990, December). Vol pp. 10-19

A Reconfigurable Architecture for a VLSI Implementation of Artificial Neural Networks
(1989, December).

Review of 'Knowledge Systems for Business: Integrating Expert Systems and MIS' by Gallagher
(1989, September).

Review of 'Knowledge-Based Systems for Management Decision' by Mockler
(1989, September).

Managerial Performance Evaluation: A Decision Model for Stockholders
(1988, December). Vol 14:04

A New Computational Method for Pooled Regression Analysis
(1987, December). Vol 87:21:00

Presentations

Predictive Analytics in Big Data
(2018, March 24). International Conference on Technology, Engineering & Mathematics,
DOWNLOAD PRESENTATION

Security Risk Learning in Cybersecurity Model
(2018, February 22). SEDSI. DSI,
DOWNLOAD PRESENTATION

Actioning Big Data
(2017, October 4). Southeast INFORMS. INFORMS,

Risk-driven Corporate Security Defense
(2017, March 9). IIAB 2017. IIAB,

Intelligent Decision Support Capabilities for a Law Enforcement GIS
(2016, December 9). GIS. AIS,

Digital Policy Management Requirements and Architecture
(2014, March). IEEE Conference on Cognitive Decisions. IEEE

"e-Government Evolution: Tunisia"
(2006, July 1). Organization of e-Government Colloquium. .

Developing IT Security Curricula
(2005, December 31). University of Jandouba. University of Jandouba, Tunisia

(2003, June 1). IATF (Information Assurance Technical Framework). .

(2002, March 1). SIM Chapter. .

(2002, February 13). Research Day - 2002. Pace university

(2001, May 23). Northeast Decision Science Institute. .

Trends in Global Competitiveness
(2001, March 13). Federal Information Systems Security Educators' Association (FISSEA) 2001. .

(2000, December 31). FRANCORO Conference 2000. FRANCORO,

(2000, October 13). Information Systems Education Conference - ISECON 2000. .

(2000, September 1). Biometric Consortium 2000. Gaithersburg, MD.

Vital Defense Strategy, A Taxonomy of Security Attacks
(2000, September 1). National Information Systems Security Conference. Baltimore, Maryland.

Planning Global Information Using On-line Business Technologies
(1999, August 1). Eighth Annual World Business Congress. Monterey, CA.

Data Mining
(1999, March 1). Two Crows Conference. Bethesda, MD.

Data Mining and Data Warehousing Opportunities for Knowledge Creation
(1998, October 23). Fourteenth Annual Eastern Small College Computing Conference. Marist College,

The Internet: A Taxonomy of Electronic Commerce Practices
(1998, September 1). Southwestern INFORMS Conference. Myrtle Beach, SC.

"Easing Testability by Investing More in R&D"
(1998, July 14). IBM's T.J. Watson Research Center. Yorktown, NY.

A Taxonomy of Internet Decision Support
(1998, April 25). Information and Operations Research Management Systems Conference (INFORMS '98). Montreal, Canada.

Possibilistic Evaluation of Government Projects
(1998, April 25). Information and Operations Research Management Systems Conference (INFORMS '98). Montreal, Canada.

The Impact of Distance Learning on the Future College
(1998, April 2). Society for Advances in Management (SAM '98). Washington, D.C..

Feasibility of Information Security Solutions on the Internet
(1998, March 25). Northeastern Decision Sciences Institute Conference. Boston, MA.

Professional Contributions and Service

Professional Memberships

  • BIOMETRICS
  • Computational Intelligence for Modelling, Control and Automation
  • CORS: Canadian Society of Operations Research
  • Decision Science Institute
  • E-commerce Security Society
  • Federal Information Systems Security Educators' Association (FISSEA)
  • FRANCORO - Francophones de Recherche Opérationnelle
  • FRANCORO II Conference [Member, Program Committee - 2000 Conference]
  • IATF: Information Assurance Technical Framework (National Security Agency)
  • INFORMS (TIMS/ORSA)
  • International Association of Business Disciplines
  • International Association of Computer Information Systems
  • JOPT - Des Journées de l'Optimisation (Optimization Days of Canada)
  • Literati Club, Great Britain
  • NE-DSI: Northeastern Decision Science Institute
  • SAM - Society for Advances in Management
  • Int Academy of Bus and Pub Adm Deciplines [Editor of Journal]
  • The National Colloquium for Information Systems Security Education [Reviewer]
  • Association of Information Systems [Member]
  • Information Systems Audit And Control Association [Member]

Public Service

  • Pace University, Computer Science & Information Systems [Other]