Professional Bio

Degrees

  • Ph.D. in Computer Science with emphasis in Information Security, Arizona State University, Phoenix, AZ
  • MS in Computer Science with emphasis in Distributed Computing and Database, University of Southern Mississippi, Hattiesburg, MS
  • BE in Software Engineering, Beijing Polytechnic University/University of Technology, Beijing, CHINA

Academic & Professional Experience

  • Coordinator, Graduate Information Assurance Program, Regis University. (July 2014 – Present)
  • Professor, Regis University. (May 2014 - Present)
  • Tenured, Fort Hays State University. (August 2011 - June 2014)
  • Director, Information Assurance Programs, FHSU. (September 2009 - June 2014)
  • Associate Professor, Fort Hays State University. (August 2009 - June 2014)
  • Director, National Center of Academic Excellence in Information Assurance Education, FHSU. (August 2009 - June 2014)
  • Assistant Professor, Fort Hays State University. (August 2007 - August 2009)
  • Adjunct Professor, Argosy University. (September 2005 - December 2005)
  • Visiting Professor, Beijing University of Technology. (January 2003 - June 2005)
  • Assistant Professor (Tenure-Track), California State Polytechnic University, Pomona. (January 112002 - September 2003)
  • Visiting Professor, Nanjing University. (July 2003 - August 2003)
  • Visiting Professor, Southeast University. (July 2003 - August 2003)
  • Visiting Professor, Eastern China Normal University. (April 2003 - June 2003)
  • Visiting Professor, Beijing University of Aeronautics and Astronautics. (January 2003 - June 2003)
  • Visiting Professor, Tongji University. (January 2003 - June 2003)
  • Research Assistant, Arizona State University. (January 1998 - December 2001)
  • Research Assistant, NASA (John C. Stennis Space Center), Mississippi. (January 1997 - December 1997)
  • System Administrator, Maharish University of Management. (January 1996 - July 1996)

Professional Credentials & Memberships

  • CEO, HL Technology Inc.. (May 2003 - July 2007)
  • General Manager, Xiaoma New Tech Co.. (January 1992 - December 1995)

Research & Scholarship

Dissertation

  • Jiang, K. (2001). Dynamic Coalition Management System. Tempe, AZ: Arizona State University
  • Jiang, K. (1997). Next Generation Search Engine - Ecoseargine a Case Study. Hattiesburg, MS: University of Southern Mississippi

Reviewed Publications

  • Xie, H., Jiang*, K., Yuan, X., Zeng, H. (2012). Forensic Analysis of Windows Registry Against Intrusion. International Journal of Network Security & Its Application, 4(2).
  • Boyer, B., Jiang*, K., Meier, R. J., Zeng, H. (2012). Real Risks in a Virtualized World: How Virtualization is changing the Way We Manage, Assess, and Mitigate Risk. Journal of Business and Leadership.
  • Jiang, K. (2012). Developing Leadership Knowledge on the Fly. International Journal of Business and Social Science, 3(1).
  • Xuan, R., Jiang*, K., Jordan, W. G., Ruan, X. (2012). The Up-Hill Battle to Protect Privacy- An Analysis of Human Flesh Search and Lessons from China. Journal of Academy of Business Research.
  • Yuan, X., Jiang, K., Murthy, S., Jones, J., Yu, H. (2010). Teaching Security Management with Case Studies: Experiences and Evaluation. Journal on Education, Informatics and Cybernetics, 2(2), P. 25-30.
  • Zeng, H., Jiang, K. (2010). Teaching Mathematical Proofs to CS Major Students in the Class of Discrete Mathematics. Journal of Computer Science in Colleges, 25(5), P. 326-332.
  • Jiang, K. (2009). An Assessment Method for Tacit Knowledge Learning. CSA Academic Perspective, 5(2), P. 47-53.
  • Jiang, K., Yuan, X., Zeng, H. (2009). Using Elluminate Live to Assistant Distance Learning of Information Assurance Capstone Seminar. Journal of Computing Sciences in Colleges, 24(4), P. 68-73.
  • Jiang, K., Bannister, M. C. (2008). Using a Cutting the Cake Peer Assessment Method in a Leadership in Information Networking and Telecommunications Course. Journal of Business and Leadership, 4(1), P. 81-86.

Technical Publications

  • Jiang, K., Chi, X. (2005). White paper: pioneer gas saving ball.
  • Jiang, K, Ma, L. (2004). Digital signature system design.
  • Jiang, K. (2003). Distributed storage system.
  • Jiang, K., MA, L. (2004). Testing report for digital signature system.
  • Jiang, K., Zhang, J. (2004). Business plan for one stamp card.

Awards & Recognition

  • Best Paper Award, the 2012 International Conference on Computing Measurement Control and Sensor Network. (July 2012).
  • Outstanding Faculty Research Award, FHSU. (2010).
  • Outstanding Advisor Award, FHSU. (2010).
  • Jiang, K., Huo, J. (1997). Method for manufacturing putrefaction fiber ore with waste, used plastic polyblend. China Patent No. 97107590. 5 Jul. 1997.
  • Huo, J., Jiang, K. (1997). Method for manufacturing wood fiber with waste, used plastic polyblend. China Patent No. 97107589.1 July 1997.
  • Chen, X., Jiao, J., and Jiang, K. (1993). Cold stator for internal combustion engine. China Patent No. 93213632. 1 May 1993.
  • Jiao, J., Chen, X., Cao, Z., Jiang, K., and Huang Z. (1993). Engine oil preheater. China Patent No. 93213631. 1 May 1993.
  • Jiang, K. (1992). Xiao code gloves. China Patent No. 92221164.7 Sep. 1992.

Community Involvement & Service

Regis University Service
  • Chair, International Recruiting Committee, CC&IS. (July 2014 - Present)

Professional Service

  • Committee Chair/Member, Central Area Networking and Security Workshop (CANSec) Steering Committee. (April 2013 - Present)
  • Editor, Associate Editor, Journal of International & Interdisciplinary Business Research. (August 2013 - May 2014)
  • Session Chair, the 4th Greater Kansas Area Security Workshop (4th KanSec), Kansas City, MO. (November 2, 2013)
  • Session Chair, the 3rd Greater Kansas Area Security Workshop (3rd KanSec), Lawrence, KS. (April 6, 2013)
  • Coach/School Representative, 2013' Rocky Mountain Collegiate Cyber Defense Competition, Denver, CO. (February 28, 2013 - March 2, 2013)
  • Committee Chair, The 2nd Greater Kansas Area Security Workshop (KanSec). (October 27, 2012)
  • Judger, School Representative, CANVAS (Computer and Network Visualization and Simulation) Competition, Colorado Spring, CO. (March 2012)
  • Workshop Organizer, The 1st Greater Kansas Area Security Workshop (KanSec). (March 30, 2012)
  • Coach/School Representative, 2012' Rocky Mountain Collegiate Cyber Defense Competition, Denver, CO. (March 1, 2012 - March 3, 2012)
  • Judger, CANVAS (Computer and Network Visualization and Simulation) Competition, Colorado Spring, CO. (October 27, 2011)
  • Reviewer, Conference Paper, Proceedings of the 15th Colloquium for Information Systems Security Education. (December 2010 - March 2011)
  • Attendee, Meeting, CAE Principal Meeting. (November 14, 2010 - November 17, 2010)
  • Reviewer, Journal Article, Journal of Business and Leadership. (July 2010 - August 2010)

Public Service

  • Adviser & Founder, Chinese Academy. (2008 - 2014)
  • Member, Rotary Club, Hays, KS. (February 2008 - February 2011)