here - Acsu Buffalo - University at Buffalo by huangyinggok


									                                           Rajarshi Chakraborty
                             302 Jacobs Management Center, University at Buffalo
                               Phone: 716-226-8473(cell), 716-645-5254(office)
                           Email:; Website:

University at Buffalo (SUNY at Buffalo)
PhD Candidate, Management Science and Systems, School of Management
Fall 2008 to Present
(Expected Graduation: Spring 2014)
Research: Online Privacy for Senior Citizens

University at Buffalo (SUNY at Buffalo)
MS, Computer Science and Engineering
Graduation: June 2008
Project: Designing Fault-tolerant Optical Wireless Communication Networks

Indian Institute of Technology (IIT), Kharagpur, India
Bachelor of Science / Master of Science, Mathematics and Computing
Graduation: June 2004



•   Chakraborty, R., Vishik, C. and Rao, H.R., “Privacy Preserving Actions of Older Adults on Social Media:
    Exploring the Behavior of Opting out of Information Sharing”, Decision Support Systems, Available Jan 9,

•   Chakraborty, R., Ramireddy, S., Raghu, T. S., and Rao, H.R., “The information assurance practices of cloud
    computing vendors.” IEEE IT professional, 12(4), 29-37, 2010.

Conference Proceedings

•   Chakraborty, R., Rao, H.R., Upadhyaya S. and Bagchi-Sen, S., “A Conceptual Examination of Distrusting
    Beliefs in Older Adults about the Internet”, Proceedings of the Nineteenth Americas Conference on
    Information Systems, Chicago, Illinois, August 15-17, 2013.

•   Chakraborty, R., Bagchi-Sen, S., Rao, H.R. and Upadhyaya, S., “An Exploration of Security and Privacy
    Behavior of Elders on the Internet and comparison with Younger Adults”, Proceedings of the Seventh Pre-ICIS
    Workshop on Information Security and Privacy, Orlando, December 15, 2012.

•   Chakraborty, R., Bagchi-Sen, S., Rao, H.R. and Upadhyaya, S., “Why do some older adults distrust the
    Web?”, Proceedings of the Fourth Dewald Roode Workshop on Information Systems Security Research, IFIP
    WG8.11/WG11.13, Provo, UT, September 22, 2012

•   Chakraborty, R., Agrawal, M. and Rao, H.R., “Adaptive Behavior and Information Processing In Law
    Enforcement During Extreme Events– A Study Of The 2008 Mumbai Terrorist Response”, Proceedings of the
    2011 IFIP Dewald Roode Information Security Workshop, Virginia Tech, Blacksburg, Virginia, US, 2011.

•   Chakraborty, R., Rao, H.R. and Upadhyaya, S. “BANDES: An Adaptive Decision Support System for
    Protecting Online Privacy for Senior Citizen Centers”, Proceedings of the Fourth Pre-ICIS Workshop on
    Information Security & Privacy (WISP), December 14, 2009
•   Chakraborty, R., Rao, H.R., Sankaranarayanan, V. and Upadhyaya, S., “Mediated Internet Experience for
    Senior Citizens”, Proceedings of the Fourteenth Americas Conference on Information Systems, 2008

•   Chakraborty, R., Ramireddy, S., Raghu, T.S. and Rao, H.R., “A Comparative Study of Cloud Computing
    Vendors & their Information Assurance Practices.” in Proceedings of 3rd International Conference on the
    Virtual Computing Initiative. 2009: IBM University Days

•   Oh, O., Chakraborty, R., Rao, H.R. and Upadhyaya, S., “An Exploration of Unintended Online Private
    Information Disclosure in Educational Institutions across Four Countries”, Proceedings of the APWG eCrime
    Researchers Summit, 2009.

•   “Digital Forensics Initiative at UB” – Rajarshi Chakraborty, Venkatasairam Yanamandram, Dr. H. R. Rao, Dr.
    Shambhu Upadhyaya, Joint Workshop on Cyber Security 2008, Buffalo, NY (Poster)

Book Chapters / Magazines

•   Chakraborty, R., Rengamani, H., Kumaraguru, P., and Rao, H.R., “The UID project: Lessons learned from the
    West and Challenges Identified for India”. Cyber Security, Cyber Crime and Cyber Forensics: Applications and
    Perspectives, 2011.

•   “A Linux implementation of mobility using Session Initiation Protocol” – Rajarshi Chakraborty, Kishore
    Mundra, Prof. S. Ghose, Prof. A. Gupta, Linux Journal (2004) – and

Research in Progress

•   Oh, O., Chakraborty, R., Rao, H.R. and Upadhyaya S., “Online Personally Identifiable Information: A Case
    Study of Exposure in Educational Institutions across Four Countries”, under revision for second submission,
    Information Systems Journal.

•   Chakraborty, R., Rao, H.R., Upadhyaya, S. and Bagchi-Sen, S., “An Exploration of Online Banking Customer
    Behavior Regarding Adoption of Monitoring Mechanisms For Security”, under review for the Thirty Fourth
    International Conference on Information Systems.

•   Kisekka, V., Chakraborty, R., Bagchi-Sen, S., Rao, H.R., and Upadhyaya, S., “Older Adults and their
    Perceived Safety of Websites”, manuscript preparation for Computer and Security.

•   Chakraborty, R., Rao, H.R., Upadhyaya, S. and Bagchi-Sen, S., “Adoption of Financial Monitoring Services
    for Online Banking Customers above 55”, Data Collection.

•   Gupta, S., Chakraborty, R., Rao, H.R. and Kumaraguru, P., “Social Influence on the Online Privacy of Older
    Adults in India”, Data Collection.

•   Chakraborty, R., Upadhyaya, S. and Rao, H.R., “Anomaly Detection in the Online Privacy-related Behavior of
    Older Adults”, System Development.

•   Chakraborty, R., Rao, H.R., Upadhyaya, S. and Bagchi-Sen, S., “Effect of Distrust Cues on Online Shopping
    Experience – a comparison of Older and Younger adults”, Experiment Design.

Past Research Projects
1. Cloud Computing and Information Assurance: Empirical study of information assurance (security, privacy
and business integrity) practices of Cloud Computing vendors. (with Dr. H. R. Rao and Srilakshmi Ramireddy, UB
and Dr. T. S. Raghu, ASU, 2008)

2. Information Processing in Manmade Disaster Situations: Behavioral study of decisions take and information
processed by the Mumbai Police department on the day of the 26/11 terrorist attacks in Mumbai in 2008. The
theory proposed about efficiency of information-processing based decisions is based on protection motivation
theory. (with Dr. H. R. Rao, UB and Dr. Manish Agrawal, USF, 2009)

3. Digital Forensics: Creating case scenarios of simulating cybercrimes and digital media forensic investigation
using tools like EnCase and FTK Imager. (with Dr. Shambhu Upadhyaya and Dr. H. R. Rao, 2008).

4. Bandwidth Allocation in Heterogeneous Optical/Wireless network: An ILP formulation, simulation and
exhaustive data analysis was done for a bandwidth allocation problem whose objective was maximizing throughput
and fairness in a network with a backbone similar to an FDDI ring and wireless access points equipped with
distributed-MIMO. This formulation was implemented using C and iLOG CPLEX and solved using real-life data
from 802.11a mesh networks. At present, the topology is being implemented using NS-2 to get an alternate set of
results. (Summer’06 Internship Research under Dr. Rauf Izmailov and Dr. Zigmund Haas, NEC Labs America,

5. Optical Wireless Communication (OWC) networks: Designing a survivable topology for OWC/FSO based
access network with the objective of minimizing cost. Possible approaches for survivability investigated:
Survivable Routing, Non-Blocking Networks, Network Coding and Shared Path/link Protection. ILP formulation
for survivable dynamic routing has been completed and implemented on CPLEX. (MS research under Dr.
Chunming Qiao. CSE, 2005).

Teaching Experience
• Distributed Computing (Instructor, 600-level MBA/MS/PhD class): Principles of distributed computing were
   taught at a graduate level from an MIS perspective. The purpose of this course was to teach high-level
   architecture about distributed systems that are often used in the enterprise world and in the consumer sector.
   Students learned how to deploy and use Hadoop, Casandra and MongoDB as part of their projects. . (School of
   Management, UB, Fall 2012)

•   Global Information Technology Infrastructure Management (Instructor, 600-level MBA/MS/PhD class):
    Introduce computer networking and telecommunications technologies followed by lectures and hands-on
    exercises in Linux network administration (Ubuntu), virtualization technologies (VirtualBox) and Cloud
    Computing (Amazon EC2/S3/VPC). Students need to complete a Technology Plan at the end of the semester to
    address the Cloud-based IT infrastructure needs of small and medium businesses or implement a real system
    that utilized Amazon Web Services. (School of Management, UB, Fall 2010,2011,2012)

•   Systems Analysis and Design (Instructor, 400-level MIS Undergraduate class): Introduced Software
    Development life Cycle and Object-Oriented Systems Design using UML on Microsoft Visio and ArgoUML.
    Students were also taught storyboard method of GUI design of applications. (School of Management, UB,
    Spring 2011, 2013)

•   Telecommunications Technology (Instructor, 400-level MIS Undergraduate class): Taught basic computer
    networking and telecommunication technologies with a focus on TCP/IP. Students were asked to prepare a
    technology budget for any small organization. (School of Management, UB, Fall 2009)

•   Statistical Decisions in Management (Instructor, 300-level Business Undergraduate class): Introductory
    statistical methods were taught that included Confidence Intervals, Hypothesis Testing of two or more
    populations using ANOVA and Linear Regression. (School of Management, UB, Summer 2009)

•   Introduction to Computer Science for Non-Majors (Teaching Assistant, 100-level CSE Undergraduate
    class): Lab instructor for introductory Object-Oriented Programming in Java and JavaScript. Also helped with
    learning the Unix environment for the programming tasks. (Computer Science and Engineering, UB, Fall 2007)

•   Wireless Network Security (Teaching Assistant, 500-level CSE MS class): Helped prepare and grade
    assignments and projects using different Linux-based Wireless Network Security tools that ranged from
    breaking WEP passwords to packet sniffing. Also assisted in building multi-device wireless networks.
    (Computer Science and Engineering, UB, Spring 2007)

•   Modern Networking Concepts (Instructor, 500-level CSE MS class): Helped teaching network simulation
    using NS-2 and Perl Script to diagnose TCP/IP traffic. (Computer Science and Engineering, UB, Fall 2006)
Work Experience
• Research Assistant for NSF Grant in “Online Privacy and Senior Citizens”, School of Management, UB (Fall
   2009-Spring 2013)
•   Intern as Software Engineer in the Platform Delivery Team at Xerox Corp. (Webster, NY – Summer 2008).
•   Intern as Programmer in Algonquin Studios (Buffalo, Spring 2008).
•   Intern as Software Tester and QA engineer at Buffalo Computer Graphics (
    (Buffalo, Summer 2007).
•   Intern at NEC-Labs America (Princeton, Summer 2006)
•   Intern at Kent Ridge Digital Labs, Singapore (now I2R) (Singapore, Summer’02)


Programming: Objective-C/Cocoa, C, Python, Java, HTML, SQL

Statistics: SmartPLS, SPSS, R, Matlab, Weka, Data Mining

Systems / Software Engineering: Amazon Web Services (EC2/S3/VPC), Google App Engine, , EnCase Forensics,
UML Designing, Software Development Life Cycle

Teaching: Advanced Calculus, Statistics, Data Mining, Computer Networking, Computer Programming, Systems
and Analysis Design (UML), Virtualization, Cloud Computing

Software Projects / Programming Experience

1. Amazon Web Services: Designed and implemented several AWS-based infrastructure scenarios for assigning
homework and projects in a course called Global IT Infrastructure Management at University at Buffalo. The Web
application scenario used the Wordpress engine on EC2 instances inside Amazon VPC with an Elastic IP address
and separated the MySQL database into private subnets. Fake HTTP traffic was created using Apache JMeter
which was used to teach AWS CloudWatch, Elastic Load Balancing and Auto Scaling. Cost-effective designing of
a real-world version of this architecture was demonstrated using AWS TCO and Simply Monthly Calculators. Also
mentored student groups for term projects that used Amazon SQS and Amazon CloudFront. (Fall 2011, 2012,
School of Management, UB).

2. Facebook Profile Extraction: Developing a Mac app for fetching HTML pages of the facebook profiles of
friends from a given user’s profile page. After fetching, this app will extract key pieces of information from each
HTML page to create a dataset for analyzing the similarities in information sharing on Facebook. The app will be
using OAuth to authenticate with Facebook. (Summer 2011 – present, PhD Research, UB)

3. Cloud-based Word-Count: Implemented a wordcount program using Java Servlets in Google App Engine and
BigTable. This program would present a list of all possible words and their respective counts from a collection of
pages scrawled using an integrated crawler that was based on Apache Lucene. (Fall 2010, CSE 587, UB)

4. MapReduce with Machine Learning: Implemented MapReduce version of the K-Means clustering algorithm
and deployed it on Amazon’s infrastructure using Elastic MapReduce and S3. Performance was benchmarked
against the same on a local Ubuntu-based Hadoop cluster that was created by multiple VirtualBox VMs on a
Macbook Pro. (Fall 2010, CSE 587, UB)

5. Software Platform for Printers: Implemented in C++ and also documented the diagnostics tests for a
compression board used with Xerox’s FreeFlow DocUSP and their iGen Printers. The software development
approach adopted here was Scrum. (Summer 2008)

6. Content Management Systems: Developed text parsing scripts in Visual Basic and used their .NET based web
development platform called NETGAIN along with their proprietary Content Manager – QuantumCMS to help in
developing websites. Also helped in representing and optimizing E-R Diagrams using Microsoft Visio. (Spring

7. Social Networking Portal Design: Designed the structure of a web portal for Social Networking Site to be used
for Socially Relevant Computing topics and projects. Used Microsoft Visio for database design. (Independent Study
with Mike Buckley under Microsoft Grant – Spring 2008).

8. Digital Forensics: Building digital fraud investigation scenarios using EnCase and Linux-based open source
Forensic tools to showcase expertise in Digital Forensics at the Departments of Management Science and Systems
and Department of Computer Science and Engineering. (Project with Dr. H. R. Rao, Dr. Shambhu Upadhyaya and
Venkatasairam Yanamandram – Spring 2008 to Spring 2009).

9. Wireless Security: Implementation of Ping Flood attacks, TCP SYN Flood attacks, WEP cracking and
Wormhole attack using OPNET, Packet Statistics Collection using SNMP, and exploits of 802.11b Access Control

10. Quality Assurance: Prepared Software Test Plans according to IEEE standards for a disaster management
software called DisasterLAN. (Summer 2007).

11. Web Services: Team-leader for the development of an IT Internship Management System with PHP-MySQL.
(Software Engineering term project, UCF, Summer 2005)

12. Wireless mobility and VoIP: Designed and implemented mobility in VOCAL, an open source VoIP suite
based on Session Initiation Protocol (SIP), on a wireless (802.11b) LAN. VOCAL was a product of, an
online open-source collaboration. This involved working on Linux wireless PCMCIA card drivers to allow call
hand-off. The mobility implementation in this software has been added back to Vovida. The entire project is coded
in C++. (under Prof. S. Ghose and Prof. A. Gupta, CSE Dept and Prof. S. Kumar, Mathematics Dept. at IIT
Kharagpur – Summer’03).

13. RTP and MGCP applications: Developed a streaming media application called the Ethernet Phone based on
Real-time Transport Protocol (RTP) followed by a call-agent based on Media Gateway Control Protocol (MGCP)
that was used for managing calls between the Ethernet phone and analog phones through media gateway (Cisco
2600). This call-agent could also manipulate the various states of an analog phone (busy state, listening to a media
file being played, etc.). (Kent Ridge Digital Labs, Singapore, 2002).

• Advanced Graduate Certificate in Information Assurance (July 2013)
•   Invited to Doctoral Consortium at the Americas Conference on Information Systems (AMCIS), 2012, Seattle
•   Professional Development Grant for “Architecting with Amazon Web Services” workshop, School of
    Management, University at Buffalo (Spring 2013)
•   Amazon Web Services Education Grant, University at Buffalo (Fall 2012)
•   Nominated for Excellence in Teaching Award, University at Buffalo (Spring 2011, 2012)
•   Alutto Fellowship, School of Management, University at Buffalo (2008-2012)
•   Graduate Assistantship, School of Management, University at Buffalo (2008-2012)
•   Teaching Assistantship, Computer Science and Engineering, University at Buffalo (2005-2007)

Positions and Responsibilities
• Reviewer: Information Systems Frontier, Decision Support Systems, INFORMS, AMCIS, ICIS, WISP, Mark
    Diamond Research Funds (GSA - UB)
•   Treasurer, School of Management, Graduate Students Association (SOMGSA) (UB,2011-2012)
•   Senator, School of Management, Graduate Students Association (SOMGSA) (UB, 2009 - 2010)
•   Senator, Computer Science and Engineering Graduate Students Association (CSEGSA) (UB, 2007 - 2008)
•   Interim President, Computer Science and Engineering Graduate Students Association (CSEGSA) (UB, 2006 -
•   Chair, 20th CSEGSA Grad Conference, Department of Computer Science and Engineering, UB (April 13, 2007)
•   Member of Funds Misappropriation Inquiry Committee, Graduate Students Association (UB, 2006-2007)
•   Member of the Technical Committee of (IIT Kharagpur, 2003-2004)
1. H. Raghav Rao (Professor, Management Science and Systems)
    325 Jacobs Management Center, SUNY Buffalo; 716-645-3425
2.   Shambhu J. Upadhyaya (Professor, Computer Science and Engineering)
     329 Davis Hall, SUNY Buffalo; 716-645-3183
3.   Sharmistha Bagchi-Sen (Professor and Chair, Department of Geography)
     Wilkeson Quad, SUNY Buffalo; 716-645-2722
4.   Raj Sharman (Associate Professor, Management Science and Systems)
     325 Jacobs Management Center, SUNY Buffalo; 716-645-2081
5.   Ram Ramesh (Department Chair & Professor, Management Science and Systems)
     325 Jacobs Management Center, SUNY Buffalo; 716-645-3258

To top