Faculty/Staff Directory

Dr. Jonathan Jenkins

Jonathan Jenkins

Associate Professor
Department of Computer Science

Phone: 478.471.2028

Locations:
  • Macon - Professional Sciences and Conference Center - 322
    Phone: 478.471.2028
    Fax: 478.757.2622
Office Hours: Fall 2024:

Tuesday 10am-11am,1230pm-130pm
Wednesday 1130am-1230pm,1230pm-3pm
Thursday 2pm-430pm

Please use email as the primary method of contact


Biography: At MGA, I collaborate with students, colleagues and partners in central Georgia to advance the communities of Computer Science, Information Technology, and Software Security
Courses: Fall 2024

ITEC6400 Advanced Programming & Data Structures
ITEC4264 Data Structures & Algorithm Analysis
ITEC3250 Software Engineering

Summer 2024

ITEC4270 Robot Programming

Spring 2024

ITEC4264 Data Structures & Algorithm Analysis
ITEC4361 Software Security

Fall 2023

ITEC6400 Advanced Programming & Data Structures
ITEC4264 Data Structures & Algorithm Analysis
ITEC3250 Software Engineering

Summer 2023

ITEC4270 Robot Programming

Spring 2023

ITEC6430 Software Testing & Quality Assurance
ITEC2270 Application Development
ITEC4361 Software Security

Fall 2022

ITEC6400 Advanced Programming & Data Structures
ITEC4264 Data Structures & Algorithm Analysis
ITEC3250 Software Engineering

Summer 2022

ITEC4270 Robot Programming

Spring 2022

ITEC4264 Data Structures & Algorithm Analysis
ITEC4361 Software Security

Fall 2021

ITEC6400 Advanced Programming & Data Structures
ITEC4264 Data Structures & Algorithm Analysis
ITEC3250 Software Engineering

Summer 2021

ITEC4261 Java Programming
ITEC4270 Robot Programming

Spring 2021

ITEC2270 Application Development
ITEC4361 Software Security
ITEC4261 Java Programming

Fall 2020

ITEC6400 Advanced Programming & Data Structures
ITEC4264 Data Structures & Algorithm Analysis
ITEC3250 Software Engineering
ITEC2270 Application Development

Summer 2020

ITEC4261 Java Programming
ITEC4270 Robot Programming

Spring 2020

ITEC4361 Software Security
ITEC2270 Application Development

Fall 2019

ITEC6400 Advanced Programming & Data Structures
ITEC4264 Data Structures & Algorithm Analysis
ITEC3250 Software Engineering
ITEC2270 Application Development

Summer 2019

ITEC2270 Application Development
ITEC4270 Robot Programming

Spring 2019

ITEC2270 Application Development
ITEC4361 Software Security

Fall 2018

ITEC2270 Application Development
ITEC4264 Data Structures & Algorithm Analysis

Summer 2018

ITEC2270 Application Development
ITEC4270 Robot Programming

Spring 2018

ITEC2270 Application Development
ITEC3250 Software Engineering
ITEC4361 Software Security

Fall 2017

ITEC2270 Application Development
ITEC4261 Java Programming

Education: Doctor of Philosophy, Florida State University, Computer Science
Specialization: Computer Software Integrity

Master of Science, Florida State University, Computer Science
Information Systems Security Professionals Certificate
Publications: Peer-Reviewed Journal Articles

Jenkins, J., Kim, J., Kwak, M., & Seol, J. (2024). Wireless Technologies for Environmental Monitoring: A Network Perspective. Journal of Computer Information Systems, 1–16. https://doi.org/10.1080/08874417.2024.2399099

Jenkins, J. (2022). Toward Remaking Software Development to Secure It. The Journal of the Southern Association for Information Systems, 9(1), 15-37. https://doi.org/doi:10.17705/3JSIS.00020

Refereed Book Chapters

Jenkins, J., & Burmester, M. (2015). Run-Time Integrity for Cyber-Physical Infrastructures. Mason Rice, & Sujeet Shenoi (Eds.), Critical Infrastructure Protection IX, 9th IFIP WG11.10 (pp. pp.153-167). Springer.

Jenkins, J., & Burmester, M. (2013). Chapter 6, Protecting infrastructure assets from real-time
and run-time threats. In Butts, Jonathan, & Shenoi, Sujeet (Eds.), Critical Infrastructure Protection VII (pp. 97-110). Springer.

Refereed Proceedings (Selected)

Kim, J., Jenkins, J., Seol, J., and Kwak, M. (2022). Extending Data Transmission in the Multi-Hop
LoRa Network, 62nd Annual IACIS Conference

Jenkins, J. (2020) An Access Abstraction Model for Mitigating the Insider Threat. In Proceedings of the 2020 ACM Southeast Conference (ACM SE '20), 320–321.https://doi.org/10.1145/3374135.3385325

Jenkins, J. and Beasley, S. (2020). The Formation of Information Security Practitioner Ethics. In Proceedings of the Southern Association for Information Systems Conference (SAIS 2020), 27.

Jenkins, J., Easton, S., Guidry, D., Burmester, M., Liu, X., Yuan, S., Laurence, J., & Ty, S. (2013). Trusted Group Key Management For Real-Time Critical Infrastructure Protection. In 32nd annual Military Communications Conference, MILCOM 2013 (pp. 6). IEEE Communication Society.

Jenkins, J., & Burmester, M. (2013). Trusted Computing for Critical Infrastructure Protection Against Real-time and Run-time Threats. Jonathan Butts, & Sujeet Shenoi (Eds.), Seventh Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection (pp. 12). Washington, DC, IFIP. Retrieved from http://www.ifip1110.org/Conferences/WG11-10CallForPapers2013.pdf

Burmester, M., Laurence, J., Guidry, D., Easton, S., Ty, S., Liu, X., Yan, X., & Jenkins, J. (2013). Towards a Secure Electricity Grid. In IEEE International Conference on Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP) (pp. 6). Melbourne, Australia. Retrieved from http://www.issnip.org/2013/


If a person's information is incorrect, they will need to update their individual profile.

If a person is in the wrong department, or a new employee has not been added or a former employee is still listed email Human Resources

To suggest updates to a department's contact information (main department phone # or tollfree number, main department email, or department location) email Web Admin

Please note that some changes to the directory can take up to 12 hours to appear in all directory listings.