Our Faculty

Darren Hayes

Associate Professor

Seidenberg School of CSIS

Information Technology NY

Location
  • @New York City
    163 William Street 204
Office Hours
New York City

Spring 2021

Wed 9:00am-2:00pm(by appointment)

Office Hours

Spring 2021

Office Hours

Spring 2021

Education


PhD, Sapienza Università di Roma, Rome, Italy, 2019
Industrial Engineering

DPS, Pace University, Seidenberg School of Computer Science and Information Systems, White Plains, NY, US, 2008

MS, Pace University, New York, NY, US, 2001
Information Systems

H.D.B.S, Michael Smurfit Graduate School of Business, University College Dublin, Dublin, Ireland, 1993
Banking & Finance

BA, University College Dublin, Dublin, Ireland, 1992
History

Awards and Honors


Homeland Security Investigations (HSI), February 13, 2020 - HSI New York Private Sector Partnership Award
Association of Information Technology Professionals, November 7, 2017 - Best Paper of CONISAR Conference
HTCIA, Northeast Chapter, December 15, 2013 - Outstanding Contribution Award
Forensics Colleges, January 1, 2013 - Top 10 Computer Forensics Professors
HTCIA, Northeast Chapter, December 15, 2010 - Outstanding Contribution Award


LICENSURES & CERTIFICATES


  • AccessData, January 17 AccessData Mobile Examiner
  • BlackBag Technologies, May 16 Certified BlackLight Examiner
    The CBE designation is reserved for forensic examiners who demonstrate a high level of competency in the use of BlackLight, BlackBag's forensic analysis platform. This distinction is achieved through the successful completion of an online certification exam. CBE candidates must attend the BlackLight Tool Training course before sitting for the exam.

Publications


A comparative study of support vector machine and neural networks for file type identification using n-gram analysis
Sester, J., Hayes, D., Scanlon, M. & Nhien-An Le-Khac, N. (2018, December). Journal is not in list - being petitioned. Vol 36 http://www.elsevier.com/locate/fsidi
DOWNLOAD

A Comparative Study of Support Vector Machine and Neural Networks for File Type Identification Using n-gram Analysis
Sester, J., Hayes, D., Scanlon, M. & Le-Khac, N. (2021, April (2nd Quarter/Spring) 1). http://dfrws.org/presentation/a-comparative-study-of-support-vector-machine-and-neural-networks-for-file-type-identification-using-n-gram-analysis/

An Effective Approach to Mobile Device Management: Security and Privacy Issues Associated with Mobile Applications
Hayes, D. & Cappa, F. (2021, March 27). Digital Business. Vol 1 (Issue 1) , pages 1. http://www.sciencedirect.com/science/article/pii/S2666954420300016
DOWNLOAD

A Practical Guide to Digital Forensics
Hayes, D. (2020, November 20). (Issue 2)

Forensic Investigation of PayPal Accounts
Standare, L., Hayes, D., Le-Khac, N. & Choo, K. (2020, October (4th Quarter/Autumn) 7). Nhien-An Le-Khac & Kim-Kwang Raymond Choo (Eds.), Cham , Switzerland:Springer. http://link.springer.com/book/10.1007/978-3-030-47131-6

Is the neuromuscular organization of throwing task unchanged in Virtual Reality? Implications for upper limb rehabilitation
Scalona, E., Taborri, J., Hayes, D., Del Prete, Z., Rossi, S. & Palermo, E. (2020, July (3rd Quarter/Summer) 26). Electronics. Vol 8 (Issue 12) , pages 1495. http://www.mdpi.com/2079-9292/8/12/1495
DOWNLOAD

Monetary and Social Rewards for Crowdsourcing
Cappa, F., Rosso, F. & Hayes, D. (2019, December 6). Sustainability. Vol 11 (Issue 10) , pages 13. http://www.mdpi.com/2071-1050/11/10/2834
DOWNLOAD

Vehicle Communication within Networks – Investigation and Analysis approach: A Case Study
Steiner, D., Chen, L., Hayes, D. & Le-Khac, N. (2019, May 17). http://www.digitalforensics-conference.org

Perturbed Point-to-Point Reaching Tasks in a 3D Environment Using a Portable Haptic Device
Scalona, E., Hayes, D., Del Prete, Z., Palermo, E. & Rossi, S. (2019, May 15). Electronics. Vol 8 (Issue 1) , pages 1-14. http://www.mdpi.com/2079-9292/8/1/32
DOWNLOAD

Privacy and Security Issues Associated with Mobile Dating Applications
Hayes, D. & Snow, C. (2019, January (1st Quarter/Winter) 1). Vol 11 (Issue 4823) , pages 13. http://proc.conisar.org/2018/pdf/4823.pdf
DOWNLOAD

Open-source intelligence for risk assessment
Hayes, D. & Cappa, F. (2018, October (4th Quarter/Autumn) 31). Business Horizons. Vol 61 (Issue 5) , pages 689-697. http://www.journals.elsevier.com/business-horizons

Translational effects of robot-mediated therapy in subacute stroke patients: an experimental evaluation of upper limb motor recovery
Palermo, E., Hayes, D., Francesco, E., Calabro, R. S., Pacilli, A. & Filoni, S. (2018, October (4th Quarter/Autumn)). PeerJ. http://peerj.com
DOWNLOAD

A Framework for More Effective Dark Web Marketplace Investigations
Hayes, D., Cappa, F. & Cardon, J. (2018, September 4). Information. Vol 9 (Issue 8) , pages 186. http://mdpi.org
DOWNLOAD

Privacy Issues Associated with Popular Mobile Applications
Hayes, D. & Cappa, F. (2018, July (3rd Quarter/Summer) 26). http://www.radma.net

Rewards and crowdsourcing participation
Cappa, F., Rosso, F. & Hayes, D. (2018, July (3rd Quarter/Summer) 4). http://www.radma.net

The Value of Big Data from Mobile Devices
Cappa, F., Oriani, R. & , . (2018, July (3rd Quarter/Summer) 4). http://www.radma.net

A Dynamic and Static Analysis of the Uber Mobile Application from a Privacy Perspective
Hayes, D., Snow, C. & Altuwayjiri, S. (2018, July (3rd Quarter/Summer) 4). Journal of Information Systems Applied Research. Vol 11 (Issue 1) , pages 11-22. http://jisar.org
DOWNLOAD

Geolocation Tracking and Privacy Issues Associated with the Uber Mobile Application
Hayes, D., Snow, C. & Altuwayjiri, S. (2018, March 14).
DOWNLOAD

Performance evaluation of 3D reaching tasks using a low-cost haptic device and Virtual Reality
Scalona, E., Hayes, D., Palermo, E., Del Prete, Z. & Rossi, S. (2017, November 5).

Using Open Source Intelligence for Risk Assessment to the U.S. Power Grid
Hayes, D. R. , pages 121-128. http://esociety-conf.org/

How to Deliver Open Sustainable Innovation: An Integrated Approach for a Sustainable Marketable Product
Cappa, F., Del Sette, F., Hayes, D. R. & Rosso, F. (2017, April (2nd Quarter/Spring) 10). Sustainability. Vol 8 (Issue 12) , pages 14. http://www.mdpi.com/journal/sustainability
DOWNLOAD

Leakage of Geolocation Data by Mobile Ad Networks
Snow, C., Hayes, D. & Dwyer, C. (2016, December 20). Journal of Information Systems Applied Research. Vol 9 (Issue 2) , pages 24-33. http://jisar.org/2016-9/n2/JISARv9n2p24.html
DOWNLOAD

Leakage of Geolocation Data by Mobile Ad Networks
Snow, C., Hayes, D. & Dwyer, C. (2016, November).

PRESENTATIONS


Hayes, D. Dow Jones Newswire. Interview. Dow Jones Newswire, New York, NY.

Hayes, D. Impact of Corporate Governance and Institutional Investor Targeting. Invited Speaker. National Investor Relations Institute, American Stock Exchange, Amer. Bar Assoc., New York, NY.

Hayes, D. The Annual Meeting Process. Invited Speaker. National Investor Relations Institute, American Stock Exchange, Amer. Bar Assoc., New York, NY.

Hayes, D. Understanding Your Shareholder Profile. Invited Speaker. National Investor Relations Institute, American Stock Exchange, Amer. Bar Assoc, New York, NY.

Hayes, D. (2019, April 5). Student Veterans Association Cybersecurity Training. Mobile Dating Apps: Privacy Concerns. Seidenberg School & Pace SVA, Pace University.

Hayes, D. (2018, July 4). R&D Management Conference. Privacy Issues Associated with Popular Mobile Applications. R&D Management, Milan, Italy.

Hayes, D. (2018, June 26). Cybersecurity Training. Introduction to the Dark Web. Citibank, New York, NY.

Hayes, D. (2018, April 12). Mobile Malware. Lewis Brisbois, Webinar.

Hayes, D. (2018, March 13). International Communications Data and Digital Forensics (ICDDF) . Think Outside the App. National Policing Data Communications Group, London, UK.

Grants, Sponsored Research and Contracts


DoD Cybersecurity Scholarship Program: Scholarship and Capacity Building
Chen, L., Cotoranu, A. & Hayes, D. September 2018 - August 2019.Department of Defense,Federal,$221,805.00.Funded.

MEDIA CONTRIBUTIONS


eCommerce Times [Internet], October192016
Europe Duns Apple for $14.5B in Illegal Tax Breaks

NPR [Radio], September302016
The dangerous world of the Internet of Things

CNBC [TV], September212016
Nightly Business Report interview on the Wireless Emergency Alert System

SC Magazine [Magazine], July262016
Trump's Russian interests and Guccifer 2.0

SC Magazine [Magazine], July252016
Russian hackers take the stage at DNC convention

Epoch Times [Internet], May182016
Intelligence: Hackers Are Spying on Presidential Candidates, Expect More Cyber Threats,

U.S. News [Internet], April292016
A Big iPhone Slump Bites Into Apple (AAPL)

Law360 [Internet], April292016
Banks Between A Rock And A Hard Place On Chat Records

Wall Street Journal [Newspaper], April92016
The Accidental Accomplice in Central-Bank Cyberheist: Bankers' Hours

Corporate Counsel [Internet], March312016
Experts: GCs Are Aghast Over Hacks at Top Law Firms

SC Magazine [Magazine], March302016
FBI investigating attack against computer networks at U.S. law firms

Entrepreneur [Internet], March282016
Meet the Middlemen Who Connect Hackers for Hire With Corporate America

Cape Cod Times [Newspaper], March222016
Apple's objections a recent development

Trinidad Newsday [Newspaper], March122016
US expert: Use cyber security to fight crime

Trinidad Newsday [Newspaper], March102016
US expert: Beware social media pitfalls

Caribbean New Media Group [TV], March82016
The growth of cyber crime in Trinidad and internationally.

Islam Channel (UK) [TV], March42016
The FBI case against Apple

tbs eFM (S. Korea) [Radio], March32016
Appeared on the radio show called News Focus to discuss the government's case against Apple in the San Bernardino case.

New York News 1 [TV], February252016
Potential Effects of Phone Security Fight Between Apple and FBI

MSNBC [TV], 2015
Hillary Clinton email server investigation

Homeland Security Today [Internet], December32015
ANALYSIS - New Legislation Needed to Address Terrorists' Use of Phone Encryption

CNBC [TV], November202015
Data encryption a 'matter of national security': Expert

SC Magazine [Magazine], November42015
2nd Update: Surveillance bill; judicial oversight, no encryption ban, archiving browsing data

Trinidad Guardian [Newspaper], October242015
Real and imminent cyber security threat

Epoch Times [Newspaper], September292015
US–China Cyberpact: A Deal Built on Distrust

Washington Post [Newspaper], August182015
Probe of Clinton's server could find more than just emails

PROFESSIONAL MEMBERSHIPS


New York Council, Navy League[Member]

Open Web Application Security Project[Member & Academic Supporter]

Armed Forces Communications and Electronics Association[Member]

FBI - Academic Alliance Program[FBI - Academic Alliance Program Coordinator]

InfraGard[Member]

High Technology Crime Investigation Association[First Vice President & Former President]

COLLEGE SERVICE


  • CyberCorps Interviews[Committee Member]
    Desc: Interview students who apply for grant scholarships related to CyberCorps

UNIVERSITY SERVICE


  • New York Faculty Council[Committee Member]
    Desc: Second Vice Chair, New York Faculty Council. Assist with meeting preparation and provide assistance during meetings.
  • Student Veterans Association[Student Org Advisor (Non-Professional Org)]
    Desc: Mentor our military veterans and host trainings in cybersecurity and digital forensics.
  • Fulbright Campus Committee[Committee Member]
  • Advising 360 Presidential Taskforce[Committee Member]
    Committee's Key Accomplishments: Created a series of recommendations for reorganizing student advisement at Pace University.
  • Middle States Accreditation: Working Group 1[Committee Member]
    Desc: Assisting with fact-finding and writing Middle States report on one of the working group committees.
  • Research Day Judge
    Desc: Judge Research Day poster sessions. Faculty and students present their research findings.
  • Research Day[Research Day Judge]
    Desc: Judge Research Day poster sessions. Faculty and students present their research findings.
More Faculty Members