Our Faculty

Belgacem Raggad

Professor

Seidenberg School of CSIS

Information Technology West

Location
  • @Pleasantville
    Goldstein Academic Center 320
Office Hours
Westchester

Education


PhD , Pennsylvania State University at University Park , 1989
Information Management

MS , University of Tunis , 1979
Computer Information Systems

A.D. , University of Tunis , 1975
Mathematics and Physics

Awards and Honors

  • The Country of Tunisia, November 1, 2001 - Gold Medal for Great Contributions in IS Security
  • Pace University, School of Computer Science and Information System, December 31, 1998 - CSIS Excellence in Research Award
  • NULL, June 6, 1998 - Award in Excellence in Research & Scholarship, Pace University
  • Data Processing Management Association, December 31, 1989 - Data Processing Management Award
  • NULL, December 31, 1982 - Fulbright Scholarship
  • CII-Honeywell Bull of Paris, December 31, 1979 - Scholarship

Publications


Raggad, B. G. A Security-policy Driven Distributed Incident Response Generator. Int J of Business Information Systems.

Raggad, B. & Tappert, C. (2018, February). Security Risk Learning in Cybersecurity: Evidential Reasoning Model. http://www.sedsi.org/

Mansouri, S., , . & , . (2017, October (4th Quarter/Autumn) 1). Evidential Modeling for Telemedicine Continual Security. International Journal of Computer Science and Network Security. Vol 6 (Issue 5) , pages 559-564. http://ijcsn.org/publications.html

Mansouri, S. (2017, October (4th Quarter/Autumn) 1). Risk of Telemedicine Infeasibility: An Evidential Reasoning Approach. International Journal of Medical Research & Health Sciences. Vol 6 (Issue 10) http://ijmrhs.com/abstract/risk-of-telemedicine-infeasibility-an-evidential-reasoning-approach-13146.html

Raggad, B. Actioning Big Data: Evidential Reasoning Model.

Raggad, B. Intelligent Decision Support Capabilities for a Law Enforcement GIS. http://siggis.wikispaces.com/

Mansouri, S. (2016, October (4th Quarter/Autumn) 30). Enforcing Patient Privacy Assurance Policy: A Privacy Violation Detection and Response System. Vol 2016 http://journals.indexcopernicus.com/

Mansouri, S. Telemedicine: Distributed Decision Support with Partial Compatibility Evidence. Vol 2016 http://seinforms.org

, . & Akermi, A. Evidential Reasoning in Real-time Monitoring of Computing Systems. Vol 2016 http://cisse.info

Raggad, B. A Distributed DSS Assuring Information Privacy over Remote Databases. http://www.amity.edu/spin2016/index.html

Raggad, B. Autonomic Computing and Policy Based Systems:. INASE Journal. Vol 2015 (Issue 2015) http://www.inase.org

Raggad, B. Telemedicine: Distributed Decision Support with Partial Compatibility Evidence. Journal of Computer Networks and Communications . Vol Not yet (Issue Not yet) , pages 12.

Raggad, B. Decision Support Treating Partial Compatibility Evidence in Telemedicine. Vol 2015 http://inase.org

Raggad, B. Telemedicine: Distributed Decision Support with Partial Compatibility Evidence. Journal of Computer Networks and Communications . http://journals.hindawi.com>

Raggad, B., Katar, C. & El Aroui, M. A. (2014, June 1). Risk-Driven Intrusion Response Mechanism Conform To ISO 27005, NIST, and FIPS. International Journal of Computer Network and Security.

Raggad, B. Towards a Science of Cyber Security: A Security Self-Security Generator. Vol 2014

Raggad, B., Katar, C. & Mansouri, S. (2014, May 1). Medical Decision Support System: A Belief Structure to Manage Uncertainty. International Journal Of Medical Technology . Vol 22 (Issue 1) http://recentscience.org/

Raggad, B. & Choudhry, R. (2014, March 24). Digital Policy Management Requirements and Architecture. http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=6811096

PRESENTATIONS


Raggad, B. (2018, March 24). Predictive Analytics in Big Data. International Conference on Technology, Engineering & Mathematics, Kenitra, Morocco

Tappert, C. (2018, February 22). SEDSI. Security Risk Learning in Cybersecurity Model. DSI, Wilmington NC

Raggad, B. (2017, October 4). Southeast INFORMS. Actioning Big Data. INFORMS, Myrtle Beach, SC

Raggad, B. (2017, March 9). IIAB 2017. Risk-driven Corporate Security Defense. IIAB, Miami

Raggad, B. (2016, December 9). GIS. Intelligent Decision Support Capabilities for a Law Enforcement GIS. AIS, Dublin, Ireland

Raggad, B. & , . (2014, March). IEEE Conference on Cognitive Decisions. Digital Policy Management Requirements and Architecture. IEEE

RESEARCH INTEREST


Management Information Systems (Decision Support Systems); Software Engineering (Information Systems Development); Artificial Intelligence (Approximate Reasoning);

Grants, Sponsored Research and Contracts

Raggad, B. (2017, January 22). Deep Data: Invisible Analytics.
Scholarly Research Papers , Pace University , $3,045.00 . Funded,On Internet we only access about 1% of existing Internet data. The rest is called deep data. We need what we call Invisible Analytics to get to some of it. If we are successful in doing this, it is just unbelievable the gains we get. For example, a university can use Invisible Analytics to understand student retention problems and can make corrections to maintain and improve its retention rate. A company can understand the reasons behind its customer attrition and what is behind its business value retention deficiencies. Invisible analytics will be the tool set needed to maintain its customers and enhance their loyalty which will secure its business value generation capabilities. Another example would be to use Invisible Analytics to understand our healthcare deficiencies and act to correct it. Unfortunately, we still spending billions of dollars on data capture from the Internet or from business operational systems to create boundless big data depots that we cannot dig it to produce valuable decision support information. We still have no clear approach to design the platform needed to start designing the analytical tools to generate decision support information to enhance business value in our educational systems, our healthcare systems, and our economy. This research project intends to design a computing platform for the development of Invisible Analytics tools to get into deep data and to explore our big data depots to produce valuable decision support information. We have completed the quantitative analysis and we were successful in building the belief structures needed to construct the needed probabilistic framework for the purpose of building the analytical tools for expanded data analytics. We also have tested our models in telemedicine to detect e-patient attrition and mitigate its impacts. We are currently working to extend the testing to other areas including student retention.

PROFESSIONAL MEMBERSHIPS


  • BIOMETRICS
  • Computational Intelligence for Modelling, Control and Automation
  • CORS: Canadian Society of Operations Research
  • Decision Science Institute
  • E-commerce Security Society
  • Federal Information Systems Security Educators' Association (FISSEA)
  • FRANCORO - Francophones de Recherche Opérationnelle
  • FRANCORO II Conference [Member, Program Committee - 2000 Conference]
  • IATF: Information Assurance Technical Framework (National Security Agency)
  • INFORMS (TIMS/ORSA)
  • International Association of Business Disciplines
  • International Association of Computer Information Systems
  • JOPT - Des Journées de l'Optimisation (Optimization Days of Canada)
  • Literati Club, Great Britain
  • NE-DSI: Northeastern Decision Science Institute
  • SAM - Society for Advances in Management
  • Int Academy of Bus and Pub Adm Deciplines [Editor of Journal] , September 7 , 2015
    Advancing the disciplines of Business, Public Administration, and IT.
  • The National Colloquium for Information Systems Security Education [Reviewer] , March 2 , 2014
    The National Colloquium for Information Systems Security Education (NCISSE) was created in 1996 to provide a forum for dialogue among leading figures in government, industry, and academia. In June 2002, NCISSE expanded its mission to include greater international participation. To reflect this the organization formally changed its name to The Colloquium for Information Systems Security Education or more simply -- The Colloquium.
  • Association of Information Systems [Member] , September 1 , 2016
    Also member of the GIS Special Interest Group
  • Information Systems Audit And Control Association [Member] , September 1 , 2016
    ISACA is an international professional association focused on IT governance.

COLLEGE SERVICE

  • Pakistani students recruiting [Committee Member]
    Desc: Feasibility study of the Pakistani student recruiting effort; Writing of the proposal;
    Committee's Key Accomplishments: Final proposal submitted and a decision is not made yet.
  • London project [Other]
    Desc: Visit and inspection of London campus, study the feasibility of the project; commercialization of the project.
    Committee's Key Accomplishments: Conducted a feasibility study; Made a decision to postpone the project.

UNIVERSITY SERVICE

  • Seidenberg Dean Performance Evaluation Committee [Committee Member]
    Desc: Reconfirm the dean
    Committee's Key Accomplishments: Evaluate the performance of the dean. Collect evidence from surveying and interviewing student, faculty, and staff.

PUBLIC SERVICE

  • Pace University, Computer Science & Information Systems [Other]
    Desc: Travel to provide assistance to developing countries reviewing their Technology Management programs and develop effective strategies to protect against cyber terrorism: about 22 days of lectures, advising, and interventions.
  • Volunteering
    Desc: Travel to provide assistance to developing countries reviewing their Technology Management programs and develop effective strategies to protect against cyber terrorism: about 22 days of lectures, advising, and interventions, mainly in breaks and in summer.
More Faculty Members