COL Edward J. Sobiesk
Associate Professor Contact: Office: Phone:
COL Sobiesk is an Armor Officer and Academy Professor. His previous military assignments include tank platoon leader and scout platoon leader, 2nd Armored Division; cavalry troop commander and squadron supply officer, 11th Armored Cavalry Regiment; a previous tour teaching at USMA; and deputy director of systems support, Joint Forces Intelligence Command. He deployed with the 2nd Armored Division to Saudi Arabia and Kuwait during Operations Desert Shield and Desert Storm. He is a graduate of Joint Professional Military Education Phase II, Command and General Staff Officer Course, Combined Arms and Services Staff School, Cavalry School Course, Armor Officer Advanced Course, Scout Platoon Leader Course, Armor Officer Basic Course, and Airborne School. COL Sobiesk’s research interests include electronic privacy, computer science & information technology education, and artificial intelligence.
Affiliations & Memberships
American Society for Engineering Education
Association for Computing Machinery (ACM)
ACM Special Interest Group on Computer Science Education
ACM Special Interest Group for Information Technology Education
Institute of Electrical and Electronics Engineers (IEEE)
IEEE Computer Society
Phi Kappa Phi
Upsilon Pi Epsilon
Ph.D. Computer and Information Sciences, University of Minnesota, 2000
M.S. Computer and Information Sciences, University of Minnesota, 1996
B.S. Computer Science, Winona State University, 1987
Certified Information Systems Security Professional (CISSP) -- Since 2005
SANS Security Essentials Certification (GSEC) -- 2003 & 2005
Gregory Conti, Dominic Larkin, David Raymond, and Edward Sobiesk, "The Military’s Cultural Disregard for Personal Information," Small Wars Journal, December 2010.
Gregory Conti and Edward Sobiesk, "Malicious Interface Design: Exploiting the User," in Proceedings of the 2010 World Wide Web Conference, April 2010.
Gregory Conti and Edward Sobiesk, "Malicious Interfaces and Personalization’s Uninviting Future," IEEE Security and Privacy, vol. 7, no. 3, pp. 64-67, May/Jun 2009.
William Suchan, Susan Schwartz, and Edward Sobiesk, "Information Technology Literacy for Non-Engineers," in Proceedings of the 2008 American Society for Engineering Education Annual Conference, June 2008.
Kulsoom Abdullah, Gregory Conti and Edward Sobiesk, "Self-monitoring of Web-based Information Disclosure," in Proceedings of the ACM Workshop on Privacy in the Electronic Society, October 2007.
Gregory Conti and Edward Sobiesk, "An Honest Man Has Nothing to Fear: User Perceptions on Web-Based Information Disclosure," in Proceedings of the Symposium on Usable Privacy and Security, July 2007.
Edward J. Sobiesk, William K. Suchan, and Roland L. Trope, "Overcoming the Ethical Dangers of Academic Fair Use in the High Technology Classroom," in Proceedings of the 2007 American Society for Engineering Education Annual Conference, June 2007.
Edward Sobiesk and Gregory Conti, "The Cost of Free Web Tools," IEEE Security and Privacy, vol. 5, no. 3, pp. 66-68, May/Jun 2007.
William Suchan and Edward Sobiesk, "Strengthening the Weakest Link in Digital Protection," IEEE Security & Privacy, vol. 4, no. 6, pp. 78-80, Nov/Dec 2006.
Edward J. Sobiesk, Jean R.S. Blair, James D. Cook, John C. Giordano, Bryan S. Goda, and Charles W. Reynolds, "Designing an Interdisciplinary Information Technology Program," in Proceedings of the ACM Special Interest Group for Information Technology Education (SIGITE) Conference, October 2006.
Edward Sobiesk, "Lessons Learned from Teaching," Teaching at USMA (Vol. 11, No.10, May 2006). Updated Education Philosophy.
Edward Sobiesk and William K. Suchan, "Starting in the Middle: Design and Implementation in the Information Age," in Proceedings of the American Society for Engineering Education New England Section Conference, March 2006.
Krasen Georgiev, Laura Proffit, and Marian Teodorescu with Faculty Advisor: Dr. Edward Sobiesk, "Autonomous Vehicle Navigation Using Imagery Sensing Systems, Lane Following and Collision Avoidance," in Proceedings of the National Conference on Undergraduate Research 2005, April 2005.
Edward Sobiesk, Maria Gini, and John A. Marin, "Using Group Knowledge for Multitarget Terrain-Based State Estimation," in Proceedings of the 7th International Symposium on Distributed Autonomous Robotic Systems, June 2004.
Edward Sobiesk, "Redefining the Role of Information Warfare in Chinese Strategy," selected for publication in the SANS Reading Room, http://www.sans.org/rr/whitepapers/warfare/896.php, April 2003.
Edward J. Sobiesk, "Using Group Knowledge to Track Multiple Vehicles Moving Across Terrain," Technical Report 00-040, University of Minnesota, June 2000.
Edward Sobiesk, John A. Marin, and Maria Gini, "Tracking Multiple Military Vehicles Moving Across Terrain," in Proceedings of the SCI World Multiconference on Systemics, Cybernetics and Informatics / ISAS International Conference on Information Systems Analysis and Synthesis, July 1999.
Todd Smith and Edward Sobiesk, "A Taxonomy of Computer Usage in Training and Education," in Proceedings of the Computers and Advanced Technology in Education Conference, May 1999.
Edward Sobiesk, John A. Hamilton, Jr., John A. Marin, Donald E. Brown, and Maria Gini, "Tracking Multiple Objects in Terrain," in Proceedings of the 1998 IEEE International Conference on Systems, Man, and Cybernetics, October 1998.
Edward Sobiesk, "A Non-Grad's Perspective on Teaching at USMA," published in the Dean's Teaching at USMA guide that is sent to all newly assigned faculty, 1998.
Jeanne Murtagh and Edward Sobiesk, "Exploring the Ethical, Legal, and Social Aspects of the Computing Discipline," in Proceedings of the Frontiers in Education Conference, November 1997.
J. A. Hamilton, Edward Sobiesk, and John C. Deal, "Multilevel Simulation of Force XXI Fire Support Organizations," in Proceedings of the 1997 IEEE International Conference on Systems, Man, and Cybernetics, October 1997.
Edward Sobiesk, Kurt Krebsbach, and Maria Gini, "Over-Constrained Scheduling using Dynamic Programming," in Proceedings of the Artificial Intelligence and Manufacturing Research Workshop, AAAI, June 1996.
Electronic Privacy and Security
Computer Science and Information Technology Education