Geoff Stoker, Asst Professor
Education
Academic Interests
- Cybersecurity
- CYBR, MIS, IT, & CS Education
- Performance Analysis
Courses
- CYBR 201 - Fundamentals of Cybersecurity (F24 Sec. 800 online)
- CYBR 365 - Ethical Hacking (F24 Sec. 001)
- CYBR 495 (307) - Essential Technical Cybersecurity for Business (F24 Sec. 001)
- HON 120 - Cybersecurity - an Exploration of Fundamental & Select Topics (F24 Sec. 302)
- MIS 213 - Introduction to Management Information Systems (F24 Sec. 008)
-
Spring 2024
- CYBR 201 - Fundamentals of Cybersecurity (S24 Sec. 001)
- CYBR 201 - Fundamentals of Cybersecurity (S24 Sec. 800 online)
- MIS 324 - Network Security (S24 Sec. 002)
- MIS 365 - Ethical Hacking (S24 Sec. 001)
-
Fall 2017 - Fall 2023
-
Fall 2023
- CYBR 201 - Fundamentals of Cybersecurity (F23 Sec. 003)
- CYBR 201 - Fundamentals of Cybersecurity (F23 Sec. 800 online)
- MIS 213 - Introduction to Management Information Systems (F23 Sec. 013)
- MIS 365 - Ethical Hacking (F23 Sec. 001)
-
Spring 2023
- CYBR 201 - Fundamentals of Cybersecurity (S23 Sec. 004)
- CYBR 201 - Fundamentals of Cybersecurity (S23 Sec. 801 online)
- CYBR 495 - Seminar in Cybersecurity (S23 Sec. 001)
- MIS 365 - Ethical Hacking (S23 Sec. 001)
-
Summer 2021
- MIS 491 - Vulnerability Risk Management (Su21 Sec. 800)
-
Summer 2020
- CSC 131 - Introduction to Computer Science (Su20 Sec. 800)
-
Spring 2020
- CIT 204 - Digital Media (S20 Sec. 001 [old])
- CIT 225 - Platform Technologies (S20 Sec. 001 [old])
- CIT 410 - Web Application Development (S20 Sec. 001 [old])
- CSC 131 - Introduction to Computer Science (S20 Sec. 006 [old])
- MIS 310 - Web Page Development Languages (S20 Sec. 001 [old])
- MIS 310 - Web Page Development Languages (S20 Sec. 002 [old])
-
Fall 2017
- CSC 131 - Introduction to Computer Science (F17 Sec. 004)
-
Publications
- Wood, Z., Stoker, G., An Action Research Approach to Building an Enterprise-Specific Chatbot (ESCB). Journal of Information Systems Applied Research (JISAR) 2024
- Clark, U., Greer, J., Rufus, R., Stoker, G. A Descriptive Enterprise System Model (DESM) Optimized for Cybersecurity Student and Practitioner Use. HCI for Cybersecurity, Privacy and Trust. HCII 2023. Lecture Notes in Computer Science, vol 14045.
- Stoker, G., Greer, J., Clark, U., Chiego, C., Considering Maritime Cybersecurity at a Non-Maritime Education and Training Institution. Cybersecurity Pedagogy and Practice Journal (CPPJ) 2023
- Greer, J., Stoker, G., Clark, U. (2022). IVLE4C: A Conceptual Learning Environment for Teaching Enterprise Cybersecurity. AMCIS 2022 TREOs. 69.
- McCarthy, S., Stoker, G., Deepening Intrusion Detection Understanding via a Simple IDS Assignment. 8th Annual Conference on Information Systems and Computing Education (EDSIGCON) 2022
- Treadwell, B., Stoker, G., Maximizing the Educational Benefits of the Palmetto Cyber Defense Competition (PCDC) Experience. 8th Annual Conference on Information Systems and Computing Education (EDSIGCON) 2022
- Greer, J., Stoker, G., Clark, U., Proposing the Integrated Virtual Learning Environment for Cybersecurity Education (IVLE4C). Cybersecurity Pedagogy and Practice Journal (CPPJ) 2022
- Strohmier, H., Stoker, G., Vanajakumari, M., Clark, U., Cummings, J., Modaresnezhad, M., Cybersecurity Maturity Model Certification Initial Impact on the Defense Industrial Base. Journal of Information Systems Applied Research (JISAR) 2022
- Lancelot, J., Stoker, G., Smith, G., Nichols, C., Clark, U., Vetter, R., Wetherill, W., Preparation for a Cybersecurity Apprenticeship Program (PCAP). Cybersecurity Pedagogy and Practice Journal (CPPJ) 2022
- Glyder, J., Threatt, A.K., Franks, R., Adams, L., Stoker, G., Some Analysis of Common Vulnerabilities and Exposures (CVE) Data from the National Vulnerability Database (NVD). 14th Annual Conference on Information Systems Applied Research (CONISAR) 2021
- Nichols, C., Stoker, G., Clark, U., Heuristic Evaluation of Vulnerability Risk Management Leaders' Presentations of Cyber Threat and Cyber Risk (Invited). 23rd International Conference on Human-Computer Interaction (HCII) 2021
- Vanajakumari, M., Mittal, S., Stoker, G., Clark, U., Miller, K., Towards a Leader-Driven Supply Chain Cybersecurity Framework. Journal of Information Systems Applied Research (JISAR) 2021
- Stoker, G., Clark, U., Vanajakumari, M., Wetherill, W., Building a Cybersecurity Apprenticeship Program: Early-Stage Success and Some Lessons Learned. Information Systems Education Journal (ISEDJ) 2021
- Frost, N., Stoker, G., Novice Cybersecurity Students Encounter TracerFIRE: An Experience Report. 6th Annual Conference on Information Systems and Computing Education (EDSIGCON) 2020
- Clark, U., Stoker, G., Vetter, R., Looking Ahead to CAE-CDE Program Changes. Information Systems Education Journal (ISEDJ) 2020
- Clark, U., Stoker, G., Reflections on Applying for CAE-CDE Designation. 4th Annual Conference on Information Systems and Computing Education (EDSIGCON) 2018
- Stoker, G., Blair, J., and Sobiesk, E., Meaningful Assessment of Course Outcomes. 15th Annual Conference on Information Technology Education (SIGITE) 2014
- Stoker, G., Arnold, T., and Maxwell, P., Using Virtual Machines to Improve Learning and Save Resources in an Introductory IT Course. 14th Annual Conference on Information Technology Education (SIGITE) 2013
- Stoker, G. and Hollingsworth, J.K., Towards a Methodology for Deliberate Sample-Based Statistical Performance Analysis. 16th International Workshop on High-Level Parallel Programming Models and Supportive Environments (HIPS) 2011
- Stoker, G., White, B.S., Stackpole, E., Highley, T.J., and Humphrey M., Toward Realizable Restricted Delegation in Computational Grids. 9th International Conference on European High Performance Computing and Networking (HPCN) 2001
Older publications
"Always remember that it is impossible to speak in such a way that you cannot be misunderstood: there will always be some who misunderstand you." - Karl Popper