Faculty/Staff Directory
Dr. Jonathan Jenkins
Locations: |
|
Office Hours: | Fall 2024: Tuesday 10am-11am,1230pm-130pm Wednesday 1130am-1230pm,1230pm-3pm Thursday 2pm-430pm Please use email as the primary method of contact |
Biography: | At MGA, I collaborate with students, colleagues and partners in central Georgia to advance the communities of Computer Science, Information Technology, and Software Security |
Courses: | Fall 2024 ITEC6400 Advanced Programming & Data Structures ITEC4264 Data Structures & Algorithm Analysis ITEC3250 Software Engineering Summer 2024 ITEC4270 Robot Programming Spring 2024 ITEC4264 Data Structures & Algorithm Analysis ITEC4361 Software Security Fall 2023 ITEC6400 Advanced Programming & Data Structures ITEC4264 Data Structures & Algorithm Analysis ITEC3250 Software Engineering Summer 2023 ITEC4270 Robot Programming Spring 2023 ITEC6430 Software Testing & Quality Assurance ITEC2270 Application Development ITEC4361 Software Security Fall 2022 ITEC6400 Advanced Programming & Data Structures ITEC4264 Data Structures & Algorithm Analysis ITEC3250 Software Engineering Summer 2022 ITEC4270 Robot Programming Spring 2022 ITEC4264 Data Structures & Algorithm Analysis ITEC4361 Software Security Fall 2021 ITEC6400 Advanced Programming & Data Structures ITEC4264 Data Structures & Algorithm Analysis ITEC3250 Software Engineering Summer 2021 ITEC4261 Java Programming ITEC4270 Robot Programming Spring 2021 ITEC2270 Application Development ITEC4361 Software Security ITEC4261 Java Programming Fall 2020 ITEC6400 Advanced Programming & Data Structures ITEC4264 Data Structures & Algorithm Analysis ITEC3250 Software Engineering ITEC2270 Application Development Summer 2020 ITEC4261 Java Programming ITEC4270 Robot Programming Spring 2020 ITEC4361 Software Security ITEC2270 Application Development Fall 2019 ITEC6400 Advanced Programming & Data Structures ITEC4264 Data Structures & Algorithm Analysis ITEC3250 Software Engineering ITEC2270 Application Development Summer 2019 ITEC2270 Application Development ITEC4270 Robot Programming Spring 2019 ITEC2270 Application Development ITEC4361 Software Security Fall 2018 ITEC2270 Application Development ITEC4264 Data Structures & Algorithm Analysis Summer 2018 ITEC2270 Application Development ITEC4270 Robot Programming Spring 2018 ITEC2270 Application Development ITEC3250 Software Engineering ITEC4361 Software Security Fall 2017 ITEC2270 Application Development ITEC4261 Java Programming |
Education: | Doctor of Philosophy, Florida State University, Computer Science Specialization: Computer Software Integrity Master of Science, Florida State University, Computer Science Information Systems Security Professionals Certificate |
Publications: | Peer-Reviewed Journal Articles Jenkins, J., Kim, J., Kwak, M., & Seol, J. (2024). Wireless Technologies for Environmental Monitoring: A Network Perspective. Journal of Computer Information Systems, 1–16. https://doi.org/10.1080/08874417.2024.2399099 Jenkins, J. (2022). Toward Remaking Software Development to Secure It. The Journal of the Southern Association for Information Systems, 9(1), 15-37. https://doi.org/doi:10.17705/3JSIS.00020 Refereed Book Chapters Jenkins, J., & Burmester, M. (2015). Run-Time Integrity for Cyber-Physical Infrastructures. Mason Rice, & Sujeet Shenoi (Eds.), Critical Infrastructure Protection IX, 9th IFIP WG11.10 (pp. pp.153-167). Springer. Jenkins, J., & Burmester, M. (2013). Chapter 6, Protecting infrastructure assets from real-time and run-time threats. In Butts, Jonathan, & Shenoi, Sujeet (Eds.), Critical Infrastructure Protection VII (pp. 97-110). Springer. Refereed Proceedings (Selected) Kim, J., Jenkins, J., Seol, J., and Kwak, M. (2022). Extending Data Transmission in the Multi-Hop LoRa Network, 62nd Annual IACIS Conference Jenkins, J. (2020) An Access Abstraction Model for Mitigating the Insider Threat. In Proceedings of the 2020 ACM Southeast Conference (ACM SE '20), 320–321.https://doi.org/10.1145/3374135.3385325 Jenkins, J. and Beasley, S. (2020). The Formation of Information Security Practitioner Ethics. In Proceedings of the Southern Association for Information Systems Conference (SAIS 2020), 27. Jenkins, J., Easton, S., Guidry, D., Burmester, M., Liu, X., Yuan, S., Laurence, J., & Ty, S. (2013). Trusted Group Key Management For Real-Time Critical Infrastructure Protection. In 32nd annual Military Communications Conference, MILCOM 2013 (pp. 6). IEEE Communication Society. Jenkins, J., & Burmester, M. (2013). Trusted Computing for Critical Infrastructure Protection Against Real-time and Run-time Threats. Jonathan Butts, & Sujeet Shenoi (Eds.), Seventh Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection (pp. 12). Washington, DC, IFIP. Retrieved from http://www.ifip1110.org/Conferences/WG11-10CallForPapers2013.pdf Burmester, M., Laurence, J., Guidry, D., Easton, S., Ty, S., Liu, X., Yan, X., & Jenkins, J. (2013). Towards a Secure Electricity Grid. In IEEE International Conference on Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP) (pp. 6). Melbourne, Australia. Retrieved from http://www.issnip.org/2013/ |
If a person's information is incorrect, they will need to update their individual profile.
If a person is in the wrong department, or a new employee has not been added or a former employee is still listed email Human Resources
To suggest updates to a department's contact information (main department phone # or tollfree number, main department email, or department location) email Web Admin
Please note that some changes to the directory can take up to 12 hours to appear in all directory listings.