Please Note: All Cahn Litigation expert witness searches are customized to attorneys' precise specifications and preferences. Attorneys are encouraged to discuss search parameters with a Cahn search specialist.
The below expert witness bios represent a small fraction of those Data Privacy experts known by Cahn Litigation Services. These bios are provided to give attorneys a sense of the Data Privacy landscape.
This expert received a Ph.D. in Computer Science. This expert joined a prestigious University and is Associate Director of its Applied Research Institute where this expert is working with projects related to national security. Specializing in network protocols, telemedicine, electronic commerce, medical data privacy and security, this expert was a National Lecturer, gave keynote addresses at several leading conferences, and is a Fellow of the IEEE. This expert has supervised over 130 funded research projects, advised 68 PhD and master's students, and co-authored two books, 14 book chapters, and 170 refereed journal and conference publications. This expert and colleagues developed a Transport Protocol (supporting multicast and knowledge of the multicast group members) for the US Navy, and then turned it into a commercial product. This expert's current research focuses on medical data privacy and security, implemented by supporting authentication, authorization, and federation across trust domains. This expert is also developing delta compression algorithms for diverse environments. This expert was a Founding Director of an Internet Technology Innovation Center, which provided technical and business strategy for e-business, and developed e-commerce software for corporate and government clients. Other projects include improving security for mobile devices, evaluating relational keyword search techniques, and writing software that can perform a scientometric analysis of scientific literature.
This expert received a Ph.D. degree in electrical engineering. This expert's research is in the broad area of wireless communications and networking, with particular emphasis on resource management, distributed protocols, and security. This expert has worked extensively on secure verification of location and timing information, including privacy preserving audit mechanisms. This expert's research in this area focused on third-part privacy preserving audits of encrypted control messages (e.g., secure sensing measurements that must be accompanied by time and GPS coordinates) in various contexts, including wireless sensor networks, storage systems (verifiability of stored data in cloud storage), location-based message verification in packet relaying, and others.
This expert has been involved in NSF and DoD funded projects related to cognitive radio networks; shared and dynamic spectrum access; coexistence of heterogeneous wireless systems (e.g., LTE-U/WiFi); wireless security (e.g., obfuscation of transmission signatures, MIMO-based friendly jamming; insider attacks, selective-reactive jamming/dropping, game-theoretic countermeasures); 802.11 WLANs; power control protocols; multi-channel MIMO systems (including virtual/cooperative MIMO); mmWave systems; secure satellite communications; energy management in solar-powered WSNs; full-duplex communications and self-interference suppression; and media streaming over wireless links. This expert worked on packet scheduling and buffer management in switches and routers, QoS provisioning, fault monitoring/detection in optical networks, effective-bandwidth theory, traffic characterization, voice-over-IP, and video-on-demand systems. This expert has published more than 250 journal articles and peer-reviewed conference papers, and is a co-inventor of 5 granted/pending US patents. This expert's grants include 20 competitive NSF awards, 16 of which this expert served as the sole or lead PI. This expert was a keynote speaker at various conferences, including IEEE ICCSP, IEEE CRESS, IEEE CCW, IFIP Wireless Days, and the IEEE Workshop on Wireless Mesh Networks. This expert was an invited panelist at various international conferences. This expert gave tutorials at premier wireless networking conferences and frequently consults for companies in the telecommunications sector.
This expert holds a PhD in Computer Science, serves as an Associate Professor for a College of Information Systems as well as director of a Human-Computer Interaction Lab. Specializing in web, privacy and social media, this expert's work began professionally as a web designer. This expert started a web design company that built commercial websites. Since moving to academia, this expert has taught web design and web programming and written a textbook on web design.
This expert's work spans many areas, but core research interests are in understanding how people use social media to improve the way they interact with information. This expert approaches this from a computer science perspective and this expert's general research hits social networks, trust, web science, artificial intelligence, and human-computer interaction. This expert has done a lot of work looking at how to infer information about people (like personality and political preferences) and their relationships (like trust) from social media. This expert also works on usable security, bringing HCI to the design of security and privacy systems.
Areas of Expertise include:
This expert has extensive experience as an expert witness analyzing intellectual property issues, including patent validity and infringement and prior art. This expert has work as a technical expert, both pre-trial and in trial, on the workings of most major social media systems and recommender systems as well as the history and development of the web, web science, social networks, and social media.
This expert is an internationally recognized Information and Communications Technology (ICT) architect with expertise in designing and deploying enterprise-class solutions in a wide range of technologies and business sectors. This expert's extensive experience spans industry, U.S. Government, and academia environments. This expert is also a practicing security and privacy professional, who has specialized in data protection and storage security, where this expert is recognized as one of the top experts in the world.
This expert is an Associate Member of the American Bar Association (ABA) and been active with the Section of Science and Technology Law (SciTech). In addition to speaking and publishing on behalf of the ABA, this expert has served in several SciTech leadership roles. This expert is also actively involved in the ABA's Internet of Things (IoT) National Institute and the Artificial Intelligence National Institute.
Additionally, this expert has actively contributed to the efforts and projects of key ICT-based standards development organizations and industry associations as part of a focus on advancing the state of various technologies. This expert's passion for technology has been recognized in the form of awards and leadership positions in organization such as ISO/IEC, the InterNational Committee for Information Technology Standards (INCITS), the IEEE Computer Society, the Cloud Security Alliance (CSA), and the Storage Networking Industry Association (SNIA). This expert is or has served in an editorship role on the following international standards projects: ISO/IEC 22123 (Cloud computing -- Concepts and terminology), ISO/IEC 27031 (ICT readiness for business continuity), ISO/IEC 27050 (Electronic discovery), ISO/IEC 27040 (Storage security), ISO/IEC PAS 16248 (TLS for Storage Systems), Rec. ITU-T 3500 | ISO/IEC 17788 (Cloud computing -- Overview and vocabulary), and IEEE 1619-2018 (XTS-AES).
This expert possesses a unique set of professional credentials that include the (ISC)2 CISSP-ISSAP, ISSMP, and ISSEP certifications as well as the ISACA CISA, IAPP CIPT, and CSA CCSK certifications.
This expert is a Professor and also serves as Director, Information & Technology Management academic programs. This expert publishes extensively, speaks at conferences globally, and teaches. This expert is involved in both academic and practitioner organizations relating to information systems, IT services management, and organization management. This expert serves on several editorial boards, and is on program and planning committees for conferences. This expert's research interests are innovative uses of IT in organizations, IT service management, IT for developing countries, IT-related privacy, and emerging technologies.
This expert worked in industry for many years before getting a PhD. Positions included:
This expert has served as an expert for litigation.
This expert is a Computer Scientist and Technology Consultant specializing in Telecommunications, Mobile Network communications, Point of Sale, and Secure financial transactions. This expert brings many years of experience in a diverse set of technologies including Credit Card transaction processing, eWallet validation, Payment Gateways, Point of Sale devices including NFC/RFID, Magnetic Stripe, MST, and Chip readers, and Wireless communications (WiFi, Bluetooth, GSM, and Broadband). This expert also implemented methods for privacy and fraud protection, encrypted wireless communications, tokenization, authentication and authorization.
This expert has been a testifying expert for over 60 cases including patent litigation, ITC, IPRs, and CBMs for secure financial transactions, Point of Sale, Mobile and Wireless payment authentication, providing expert reports, deposition, and trial testimony.
Summary of Related Professional Experience
Developed multiple credit card payment methods and payment gateway solutions for eCommerce clients.
Developed patent claims to cover secure mobile payment transactions and account access using user id authentication. Development of high-speed wireless communications using wifi mesh networks and Bluetooth communications.
Implemented applications for wireless data communications using 802.11 and Bluetooth on wireless, local secure networks. Audio data encryption for VoIP, fax and modem application. Developed Data Transaction Authentication and verification (to identify tampering, or modification).
System Architect and developer of financial systems for:
Online Trading – Developed 1st version of Securities trading system
PDA Trader Access - Wireless retrieval of financial transactions information
Secure online systems for payment transactions and policyholder claims processing
This expert has many years of experience in healthcare and in implementing information systems and technologies for process change and value creation. This expert provides consulting on healthcare software development, healthcare product positioning, Healthcare Transformation and Strategic Planning, and Process/Technology Improvement. Through a highly successful consultancy, this expert has provided consulting for many healthcare organizations. This expert has consulted with many companies, leading to many award winning software, technology and product development projects. This expert was the Executive Vice President of a core administration systems software provider to the Health Plan Market where this expert directed new product development. This expert also has served as Associate Professor of Medical Informatics and Director of eHealth Initiatives at a University's School of Health Systems. This expert was the co-founder and Executive Director for an EMR services company. This expert was Vice President of an international healthcare consulting company; and a founding member and CEO of an eHealth Application Solution Provider (ASP). This expert co- founded and was the Chief Technology Officer of an enterprise managed care solutions provider for healthcare networks. This expert was involved with the Department of Health and Human Services in the formulation of the HIPAA Rules. This expert has been intimately involved with the security, privacy, transaction and code set rules. This expert is a past member of the HL7, ANSI X.12, and ActiveX for Healthcare standards groups.