|Office Phone||(765) 494-4545|
|Education||M.A. Psychology from the University of Manitoba, B.A. Psychology/Criminology from the University of Manitoba, Ph.D. Forensic/Experimental Psychology from the University of Manitoba.|
|Research Areas||Psychological Profiling, Applied Cyber-forensics, Cyber-terrorism|
|Key Areas||Risk Management, Policies, Laws Security Awareness, Education, Training Incident Detection, Response, Investigation|
|Notable Experience||Principal Researcher, Information Assurance & Security. Internet Innovation Centre, Faculty of Engineering, University of Manitoba. SANS, Development and authoring of the Social Engineering component of the SANS Core Essentials Information Security training certification course. Ph.D. Thesis: A Social Learning Theory and Moral Disengagement Analysis of Criminal Computer Behavior: An Exploratory Study. ISC2, Development and authoring of the Forensics-Incident Response component of the Certified Information Systems Security Professional review course. Consultant, several international banks (confidentiality and non-disclosure agreements in effect) E-commerce and Network Security. Consultant, BC Justice Institute and BC Institute of Technology Forensic Sciences Program. M.A. Thesis: Understanding Police Burnout: A Salutogenic Approach. Board Member, AGASSIZ Institute for Conflict Studies, University of Manitoba. Honors Thesis: Accuracy of Eyewitness Testimony.|
|Notable Awards||Industry and Technology Canada, Education and Internet Innovators Award-Manitoba 2002, 2003; Best Presenter-West Coast Security Conference 2001, Winnipeg Police Association Scholarship 1995, 1996, 1997.|
|Notable Affiliations||American Psychological Association, Scientific Working Group on Digital Evidence, High Tech Crime Network, Canadian Criminal Justice Association, Canadian Psychological Association, American Psychology-Law Society, Information Systems Audit and Control Association-Board Member, Certified Information Systems Security Professional.|
•Rogers, M. Carrier, B. (2004). Incident response and evidence management. In Tipton Krause (Eds). Handbook of Information Security Management. New York: Auerbach
•Rogers, M., Sherizan, S. (2004). Law investigation and ethics. In Berti Hansche (Eds). CISSP Study Guide (pp. 700-764). New York: Auerbach.
•Rogers, M. (2003). Law investigation and ethics. In Tipton Berti (Eds). 2003 CBK review course. Dunedin: SMT.
•Rogers, M. (2003). Computer forensics: Science or fad. Security Wire Digest, Vol 5. No. 55, July 24.
•Rogers, M. (2003). Understanding deviant computer behavior: A moral development and personality trait approach. Canadian Psychological Association Abstracts, Summer 2003.
•Rogers, M. (2003). The role of criminal profiling in computer forensic investigations. Computers & Security, 22, 4
•Rogers, M (2003). The nature of computer crime: A social-psychology examination. In Turrini (Ed.). Understanding Computer Crime, New York: Auerbach.
•Rogers, M. (2003). The psychology of cyber-terrorism. In Silke Merari (Eds.). Terrorists, Victims and Society: Psychological. Perspectives on Terrorism and Its Consequences (pp. 75-92). London: Wiley and Sons.
•Rogers, M., Berti, J. (2001). Social engineering: The forgotten risk. In Tipton Krause. (Eds.). Information Security Management. Handbook, 4th Edition, Volume 3 (pp. 51-63). New York: Auerbach.
•Rogers, M. (2001). The psychology of computer crime: The usefulness of traditional theories. Submitted for publication. NSA
•Rogers, M. (2000). The need for a balanced approach to security. CIPS Newsletter, Winnipeg Manitoba, December.
•Rogers, M. (2000). Fight back against electronic attackers. Retail Advisor, Summer Edition. Deloitte and Touche.
•Rogers, M. (2000). The need for information security in todays wired world. CIPS Newsletter, Edmonton Alberta, March.
•Rogers, M. (2000). The need for information security in todays wired world (re-print). CIPS Newsletter, Winnipeg Manitoba, June.
•Rogers, M. (2000). Modern day robin hood or moral disengagement: Understanding the justification for illegal computer activity. Available: http://www.infowar.com
•Rogers, M. (1999). The psychology of hackers: The need for a new taxonomy. Available: http://www.infowar.com
•Rogers, M. (1999). Organized computer crime and more sophisticated security controls: Which came first the chicken or the egg? Available: http://www.infowar.com
•Rogers, M. (2002). A social learning theory and moral disengagement analysis of criminal computer behavior: An exploratory study. Poster Presented at the Canadian Psychological Association Annual Conference. Vancouver, BC, May 2002.
•Rogers, M. (2002). Profiling computer criminals & malicious code writers? Paper Presented at the ASIS Cybercrime 2002 Summit, Arlington, VA, February 2000.
•Rogers, M. (2001). Social engineering; The forgotten risk. Paper Presented at the West Coast Security Conference 2001, Vancouver, BC, November 2001.
•Rogers, M. (2000). The psychology of hacker: The criminal insider. Paper Presented at the SANS Institute, Monterey, California, June 2000.
•Rogers, M. (2000). The future of information security/assurance. Paper Presented at the ISACA Conference, Winnipeg, May 2000.
•Rogers, M. (1999). Psychological profiling of hackers. Paper Presented at the Computer Security Institute (CSI) NetSec 99 Conference, St. Louis, Missouri, June 1999.
•Rogers, M. (1999). The psychology of hackers: A new taxonomy. Paper Presented at the RSA World Security Conference, San Jose, California, Feb 1999.
•Rogers, M. (1998) The psychology of hackers. Paper Presented ISSA Conference, Sacramento, California, October 1998.