Skip to Main Content

Pittman, Dr. Jason

Jason Pittman

Professor

jmpittman@captechu.edu

I’m an academic and technologist that enjoys research, teaching, and sharing what I learn about the world. I am fascinated by all things human and tech. My interests include cybersecurity, pedagogy and cognitive science issues related to cybersecurity education, as well as the evolution of computing systems in trans-humanistic scenarios. I see the stars as our inevitable destination and work to do my part is helping our species get there.

Areas of Expertise:

  • Research design
  • Cybersecurity
  • Computer science
  • Pedagogy
  • Cognitive science
  • Transhumanism

Biography:

Education

  • B.A. English Literature, Malone College
  • M.S. Network Security, Capitol College
  • Sc.D., Information Assurance, Capitol College                                                     

Honors & Awards 

  • Best Research of the Year, Capitol Technology University Faculty Awards, 2017
  • Best Research of the Year, Capitol Technology University Faculty Awards, 2016
  • Faculty of the Year, Computer Information Systems, Cal Poly Pomona, 2015
  • Best Research of the Year, Capitol Technology University Faculty Awards, 2015
  • Best Paper, Colloquium for Information Systems Security Education, CISSE, 2014
  • Best Research of the Year, Capitol College Faculty Awards, 2014
  • Innovative Excellence in Teaching, Learning, and Technology (nominated), ICCTL, 2013

Research & Publications

Referred Publications 

  • Pittman, J. (2017). Trust and Transhumanism: An Analysis of the Boundaries of Zero-Knowledge Proof and Technologically Mediated Authentication. Social Epistemology Review and Reply Collective, 6(3). 21-29. 
  • Pike, R., Pittman, J., & Hwang, D. (2016). Cloud-based versus local-based web development
    education: An experimental study in learning. Information Systems Education Journal. Publication pending.
  • Pike, R., Pittman, J., & Hwang, D. (2016). Cloud-based versus local-based web development
    education. Association of Information Technology Professionals (AITP) Education Special Interest Group (EDSIG) Conference on Information Systems and Computing Education.
  • Pittman, J., & Sprengel, M. (2016). An Enhanced Visualization Tool for Teaching Monoalphabetic Substitution Cipher Frequency Analysis. SIGMIS-CPR '16
  • Pittman, J., & Pike, R. (2015). An observational study of peer learning for high school students at a cybersecurity camp. Information Systems Education Journal, 14(3). 4-13. http://isedj.org/2016-14/n3/ISEDJv14n3p4.html
  • Pittman, J., & Pike, R. (2015). An observational study of peer learning for high school students at a cybersecurity camp. 2015 Proceedings of the EDSIG Conference on Information Systems and Computing Education. Retrieved from http://proc.iscap.info/2015/pdf/3410.pdf
  • Pittman, J. (2015). Does competitor grade level influence perception of cybersecurity competition design gender inclusiveness? In Proceedings of the 2015 ACM SIGMIS Conference on Computers and People Research (SIGMIS-CPR '15) (pp. 49-54). New York, NY: ACM doi:10.1145/2751957.2751974
  • Manson, D., Pusey, P., Hufe, M. J., Jones, J., Likarish, D., Pittman, J., & Tobey, D. (2015). The cybersecurity competition federation. In Proceedings of the 2015 ACM SIGMIS Conference on Computers and People Research (SIGMIS-CPR '15) (pp. 109-112). New York, NY: ACM. doi:10.1145/2751957.2751980
  • Pittman, J. (2014). Factors of success- The potential correlation between CLI commands and winning cybersecurity competitions. In D. Shoemaker & S. Wetzel (Eds.), Proceeding of the 18th Colloquium for Information Systems Security Education.
  • Pittman J., & Barker, H. G. (2014). Are cybersecurity laboratory exercises constructivist in use? In D. Shoemaker & S. Wetzel (Eds.), Proceeding of the 18th Colloquium for Information Systems Security Education.
  • Pittman, J. (2013). Reducing virtualization host system utilization in cybersecurity network probing laboratory scenarios using honeypots. The Online Journal of STEM Inquiry, 1(1). Retrieved from: http://stemjournalonline.org/wp-content/uploads/2013/06/Reducing-Virutalization-Host-System-Utilization-in-Cybersecurity-Laboratory-Scenarios.pdf
  • Pittman, J. (2013). Understanding system utilization as a limitation associated with cybersecurity laboratories –  A literature analysis. Journal of Information Technology Education: Research, 12, 363-378. Retrieved from http://www.jite.org/documents/Vol12/JITEv12ResearchP363-378Pittman0440.pdf
  • Barker, H.G., & Pittman, J. (2012). A qualitative analysis of best practices in Information Assurance online synchronous instruction, Proceedings of the 16th Colloquium for Information Systems Security Education. Retrieved from: http://cisse.info/archives/category/29-papers

Non-refereed Publications

  • Barker, H.G., & Pittman, J. (2012). Astronautical engineering and cyber security: An educational partnership. Mercury, 41(3).

Refereed Presentations

  • Pittman, J., Craft., M. (2017). To what extent do academic degrees influence CISSP attempt rates?. CISSE 2017, Las Vegas, NV.
  • Maroney, J., Pittman, J. (2017). A gender inclusive model design for cybersecurity competitions. CISSE 2017, Las Vegas, NV.
  • Pike, R., Pittman, J., Hwang, D. (2016) Comparing cloud-based web development versus local-based web development education. EDSIG 2016, Las Vegas, NV.
  • Pittman, J., Pike, R. (2015). Peer learning for high school students at a cybersecurity camp. EDSIG Conference on Information Systems and Computing Education, EDSIG 2016, Wilmington, North Carolina
  • Pittman, J. (2015). Do more upperclassmen than underclassmen perceive cyber competitions as non-gender inclusive? ACM Conference on Computers and People Research, ACM SIGMIS 2015, Long Beach, CA
  • Pittman, J. (2014). The correlation between CLI commands and success in cybersecurity competitions, CISSE 2014. San Diego, CA
  • Pittman, J., & Barker, H.G. (2014). Are cybersecurity laboratory exercises constructivist in use?, CISSE 2014. San Diego, CA.
  • Pittman, J. (2013). Attitudes on the gender equal design of collegiate cybersecurity competitions. NIST NICE Workshop 2013. Gaithersburg, MD. Retrieved from: http://csrc.nist.gov/nice/2013workshop/
  • Barker, H. G., & Pittman, J. (2012). Best practices in IA online synchronous instruction, CISSE 2012. Orlando, Fl

Volunteer/Service Experience

  • Office of Undergraduate Research (Cal Poly) – Faculty Mentor
  • Cal Poly MISSA – Faculty Co-Advisor
  • Cal Poly E-sports – Faculty Co-Advisor
  • CyberFed.org – Web Developer & YouTube show co-host
  • Cybersecurity Competition Federation – Pathways Working Group Lead
  • Capitol College Cybersecurity Competition Team, Mentor & Team Coach
  • President's Committee on Innovative Technology for Distance Education
  • Director of Information Technology, Hiring Committee Chair
  • Academic Honesty & Performance Review Board, Committee
  • DHS/NSA CAE-IA, ABET, IACBE, MHEC Academic Accreditation, Committee

Portfolio/Personal Website 

http://www.jasonmpittman.com/