University of Maryland University College - Business
CEO & COO, Board Member at Monterey Technologies, Inc.
Defense & Space
Joseph
Homan, DSc, MSc, MBA
Park City, Utah
I have reached the 30K LinkedIn limit, so to connect directly include an explanation or reason to connect in your invitation. Otherwise, feel free to follow me.
My experience is in Government consulting (active TS clearance). With 33+ years of managing projects and overseeing numerous programs for gov’t clients, I have a deep understanding of operating in this environment. I have managed projects in these diverse functional areas:
associative database info systems
electronic commerce / electronic data interchange (EC/EDI)
energetics
energy management systems
enterprise architecture business process re-engineering
geospatial information systems
human factors engineering
industrial base preparedness
industrial security/emergency preparedness
information technology
logistics
manufacturing capacity & industrial capability
medical informatics
research and development (R&D)
simulation/modeling
spare parts procurement
strategic and critical materials
supply chain
virtual reality/autonomous vehicles
My management style is hands-on and collaborative. Sound financial/budgetary analysis, schedule compliance, and quality deliverables are the outcomes of my projects. I believe in and practice situational leadership. I interact equally well with clients, technical staff, and senior management.
I have operational experience in business growth and proposal writing. I consider myself an expert in the development of strong proposals that comply with the often complex and convoluted Gov't RFP requirements. I am a strong Red Team reviewer and compliance checker – and a nitpicky editor.
Specialties:
Internet
Logistics
Energetics
Strategic planning
Technical research
Education/Training
Project management
Schedule compliance
Electronic commerce
Business development
Financial management
Operations management
Application development
Proposal and Grant writing
DB development/management
S/W development/management
Technical program/people management
https://summitintl.org/index.html
Summit International stands at the ready to lead your academic or corporate institution into the twenty-first century! Whether your organization is seeking to incorporate Web 2.0 technologies into its infrastructure or seeks to explore the possibilities of Web 3.0, our consulting professionals are available to help you every step of the way.
From corporate management training programs to creating an online or distance education presence for secular and faith-based academia to publishing your academic or corporate training materials, Summit International has the expertise necessary to help you succeed!
Chief Operating Officer & Board Member
MTI is a Veteran Owned Small Business (VOSB) consulting firm focusing on mission planning, human factors engineering (HFE), human systems integration (HSI), user experience/user interface (UX/UI), software development, systems engineering, modeling & simulation, and government contracting services. I am responsible for all aspects of company operations including HR, accounting/finance, organizational development, business development, IT/cybersecurity, and program management oversight. I am conducting a complete review and update of all policies and procedures. I have successfully transitioned banking, insurance, legal, and other corporate relationships from Monterey, CA to Park City, UT. Primary clients include Navy, Royal Australian Air Force, NASA, DARPA, Army, and various prime contractors. I have increased proposal volume by 65% with a corresponding 72% revenue increase in two years.
CEO & COO, Board Member
Provide strategic direction and manage day-to-day operations.
Adjunct Assistant Professor
Online classes and in hybrid mode. Classes included BMGT 317 Decision Making, and BMGT 335 Small Business Management.
VP & COO
Served as an officer and board member of CornerStone, a woman-owned small business (WOSB). CornerStone helped small- and medium sized-businesses who need to:
* Register to do business with the government
* Research business opportunities
* Review solicitations (RFPs, RFQs, RFIs, Sources Sought, etc.)
* Comply with federal regulations (FAR, DFARS, DODGARS, etc.)
* Develop proposal strategy
* Execute non-disclosure and teaming agreements
* Analyze subcontractor proposals
* Generate technical and cost proposals
* Negotiate awards with contracting officers
* Produce conflict of interest mitigation plans
* Develop Project Management Plans
* Administer contracts and subcontracts
* Address government audit inquiries
CornerStone provided these consulting services to clients in the defense contracting community. I supported three companies in development of competitive DoD proposals - with assistance ranging from RFP review to drafting proposal content to Red Team reviews to final production.
Effective July 2017, CornerStone discontinued operations as a stand-alone company and merged its operations with Monterey Technologies, Inc.
Executive Director Programs & Operations
Managed all internal operations functions including HR, contracts, finance/accounting, proposal development, and program management. Directly managed a program to build a robust energetics technology information management and analysis system using the Relavance Associative Information System. Responsible for supporting and expanding efforts in energetics informatics, information technology, virtual reality, and simulation/ modeling. Other projects included modeling/ simulation efforts for Improvised Explosive Device (IED) neutralization and research into novel energetics technology. Energetics Technology Center is a private, non-profit organization focused on energetics technology and related efforts such as Traumatic Brain Injury (TBI). The company is dedicated to supporting energetics research and growing science and technology in Southern Maryland and continues its work in developing new and next-generation energetic materials. ETC expanded its portfolio to include improving human and unmanned vehicle performance through modeling, simulation and machine learning in Virtual Environments. Served as the Program Manager responsible for all energetics informatics research and development efforts, virtual reality programs, and simulation modeling related to energetics technology. On a six-month assignment, served as the interim Executive Director for the Center for Advanced Logistics Management (CALM) at the client site at Albany State University. Assisted with deliverable preparation, budget analysis, hiring, and establishment of a working relationship with US Marine Corps client.
VP and Chief Operating Officer
Was responsible for overall operations focusing on these five primary management areas:
1) Organizational Development
2) Business Development
. . . supported by
3) Contract Performance
4) Financial Performance
. . . enabled by
5) Human Resources
Zekiah is committed to exceeding the expectations of our clients through innovation and the ingenuity of our technical solutions in the fields of systems engineering, software development and geospatial technologies.
I served as project manager for WinTec Arrowmaker, Inc., on a Marine Corps Business Process Review (BPR) effort. This effort involves an As-Is – To-Be gap analysis of the Global Combat Support System - Marine Corps (GCSS-MC) Logistics Operational Architecture (Log OA).
Doctor of Science
Information Systems and Communications
An intense, cohort style, 3-year doctoral program structured to improve likelihood of graduation. Success rate is ~90% versus 50% or less for traditional doctoral programs. I would highly recommend this program to anyone seeking a doctorate in the IT/IS arena. I successfully used LinkedIn and other sources to reach out to more than 10,000 people for my doctoral dissertation survey - achieving responses from more than 1,300 for a very good sample size.
“If you think education is expensive, try ignorance” Derek Bok
Master of Science
Engineering Management
Obtained degree in 20 months without stepping foot on the RMU campus. RMU professors traveled to Johnstown and conducted class for 20+ students. Quality education made convenient!
Master of Business Administration (M.B.A.)
Logistics Management
Attended night school for 5 years during heavy business travel period. Whew - glad that is over!
2015 Proceedings of the Conference on Information Systems Applied Research
Research on social media continues to play a key role for firms and marketing professionals. Traditional marketing strategy relied on segmenting discrete target markets based on demographic, socio-economic, and geographic sectors. With the proliferation of mobile and social media technologies, those delineations become less clear. Mobile technology allows users to access information wherever they are, and social networking communities allow members to cross over into multiple socio-economic groups. Yet, for most organizations, the traditional methods of marketing and customer engagement remain the same. Review of the literature reveals multiple outcomes and inferences of what motivates social consumers to use mobile technologies and to actively participate on social media sites. A multi-faceted approach is critical for organizations seeking to capitalize on the ever-growing market of mobile and social media users.
2015 Proceedings of the Conference on Information Systems Applied Research
Research on social media continues to play a key role for firms and marketing professionals. Traditional marketing strategy relied on segmenting discrete target markets based on demographic, socio-economic, and geographic sectors. With the proliferation of mobile and social media technologies, those delineations become less clear. Mobile technology allows users to access information wherever they are, and social networking communities allow members to cross over into multiple socio-economic groups. Yet, for most organizations, the traditional methods of marketing and customer engagement remain the same. Review of the literature reveals multiple outcomes and inferences of what motivates social consumers to use mobile technologies and to actively participate on social media sites. A multi-faceted approach is critical for organizations seeking to capitalize on the ever-growing market of mobile and social media users.
2018 Proceedings of the Conference on Information Systems Applied Research
The ubiquity of social media accounts is forcing both employers and employees to take a closer look at the hiring process. Additionally, as business faculty are preparing students to enter into the global marketplace, both instructors and students should be aware of the challenges and opportunities that lie within the social media landscape. Organizations are using these open networks to have access to a wider range of applicants. As such, there needs to be an increase in awareness on how social media accounts can impact the hiring process.
2015 Proceedings of the Conference on Information Systems Applied Research
Research on social media continues to play a key role for firms and marketing professionals. Traditional marketing strategy relied on segmenting discrete target markets based on demographic, socio-economic, and geographic sectors. With the proliferation of mobile and social media technologies, those delineations become less clear. Mobile technology allows users to access information wherever they are, and social networking communities allow members to cross over into multiple socio-economic groups. Yet, for most organizations, the traditional methods of marketing and customer engagement remain the same. Review of the literature reveals multiple outcomes and inferences of what motivates social consumers to use mobile technologies and to actively participate on social media sites. A multi-faceted approach is critical for organizations seeking to capitalize on the ever-growing market of mobile and social media users.
2018 Proceedings of the Conference on Information Systems Applied Research
The ubiquity of social media accounts is forcing both employers and employees to take a closer look at the hiring process. Additionally, as business faculty are preparing students to enter into the global marketplace, both instructors and students should be aware of the challenges and opportunities that lie within the social media landscape. Organizations are using these open networks to have access to a wider range of applicants. As such, there needs to be an increase in awareness on how social media accounts can impact the hiring process.
Issues in Information Systems
Organizations mitigate information security risk by providing relevant and timely training for end users. While training budgets have increased in recent years, few organizations have taken the next step to measure how effective these programs are in changing behavior. An antecedent to behavioral change is increasing knowledge. This study explores the effectiveness of an information security training program by measuring the differences in pre and posttest results to determine levels of knowledge acquisition and knowledge retention. The results of this study showed a statistically significant difference in the increase in pre to post-test scores within the participant groups. The instructor-led group’s level of knowledge acquisition was higher than the computer-based training group. The results of this study may be meaningful for an organization that is in the beginning stages of implementing a corporate information security training program.
2015 Proceedings of the Conference on Information Systems Applied Research
Research on social media continues to play a key role for firms and marketing professionals. Traditional marketing strategy relied on segmenting discrete target markets based on demographic, socio-economic, and geographic sectors. With the proliferation of mobile and social media technologies, those delineations become less clear. Mobile technology allows users to access information wherever they are, and social networking communities allow members to cross over into multiple socio-economic groups. Yet, for most organizations, the traditional methods of marketing and customer engagement remain the same. Review of the literature reveals multiple outcomes and inferences of what motivates social consumers to use mobile technologies and to actively participate on social media sites. A multi-faceted approach is critical for organizations seeking to capitalize on the ever-growing market of mobile and social media users.
2018 Proceedings of the Conference on Information Systems Applied Research
The ubiquity of social media accounts is forcing both employers and employees to take a closer look at the hiring process. Additionally, as business faculty are preparing students to enter into the global marketplace, both instructors and students should be aware of the challenges and opportunities that lie within the social media landscape. Organizations are using these open networks to have access to a wider range of applicants. As such, there needs to be an increase in awareness on how social media accounts can impact the hiring process.
Issues in Information Systems
Organizations mitigate information security risk by providing relevant and timely training for end users. While training budgets have increased in recent years, few organizations have taken the next step to measure how effective these programs are in changing behavior. An antecedent to behavioral change is increasing knowledge. This study explores the effectiveness of an information security training program by measuring the differences in pre and posttest results to determine levels of knowledge acquisition and knowledge retention. The results of this study showed a statistically significant difference in the increase in pre to post-test scores within the participant groups. The instructor-led group’s level of knowledge acquisition was higher than the computer-based training group. The results of this study may be meaningful for an organization that is in the beginning stages of implementing a corporate information security training program.
Issues in Information Systems, X(1), 208-213
This paper compares the relational database model with the associative database model. This paper briefly summarizes the relational and other familiar data models. The remainder of this paper will introduce and describe the associative database model. The associative model is less known because it is relatively new and does not have a large software supplier base. While it seems to offer a number of benefits and advantages over other database structures, it has yet to become a commercial success in the mainstream database market.
2015 Proceedings of the Conference on Information Systems Applied Research
Research on social media continues to play a key role for firms and marketing professionals. Traditional marketing strategy relied on segmenting discrete target markets based on demographic, socio-economic, and geographic sectors. With the proliferation of mobile and social media technologies, those delineations become less clear. Mobile technology allows users to access information wherever they are, and social networking communities allow members to cross over into multiple socio-economic groups. Yet, for most organizations, the traditional methods of marketing and customer engagement remain the same. Review of the literature reveals multiple outcomes and inferences of what motivates social consumers to use mobile technologies and to actively participate on social media sites. A multi-faceted approach is critical for organizations seeking to capitalize on the ever-growing market of mobile and social media users.
2018 Proceedings of the Conference on Information Systems Applied Research
The ubiquity of social media accounts is forcing both employers and employees to take a closer look at the hiring process. Additionally, as business faculty are preparing students to enter into the global marketplace, both instructors and students should be aware of the challenges and opportunities that lie within the social media landscape. Organizations are using these open networks to have access to a wider range of applicants. As such, there needs to be an increase in awareness on how social media accounts can impact the hiring process.
Issues in Information Systems
Organizations mitigate information security risk by providing relevant and timely training for end users. While training budgets have increased in recent years, few organizations have taken the next step to measure how effective these programs are in changing behavior. An antecedent to behavioral change is increasing knowledge. This study explores the effectiveness of an information security training program by measuring the differences in pre and posttest results to determine levels of knowledge acquisition and knowledge retention. The results of this study showed a statistically significant difference in the increase in pre to post-test scores within the participant groups. The instructor-led group’s level of knowledge acquisition was higher than the computer-based training group. The results of this study may be meaningful for an organization that is in the beginning stages of implementing a corporate information security training program.
Issues in Information Systems, X(1), 208-213
This paper compares the relational database model with the associative database model. This paper briefly summarizes the relational and other familiar data models. The remainder of this paper will introduce and describe the associative database model. The associative model is less known because it is relatively new and does not have a large software supplier base. While it seems to offer a number of benefits and advantages over other database structures, it has yet to become a commercial success in the mainstream database market.
Issues in Information Systems, XiII(1), pp. 215-224, 2012
Financial institutions are increasingly finding difficulty defending against information security risks and threats, as they are often the number one target for information thieves. An effective information security training and awareness program can be a critical component of protecting an organization’s information assets. Financial institutions have invested significant resources in implementing information security training and awareness programs, but few have explored deeper to examine the effectiveness of these training programs. The purpose of this study was to examine the effectiveness of an information security training and awareness program within a mid-sized financial services institution. Effectiveness of information security training was determined by levels of knowledge transfer and knowledge retention. Additionally, the study was designed to determine whether the implementation of two different modes of training delivery, Instructor-based Training (IBT) and Computer-based Training (CBT) led to different results of effectiveness. The results indicate that instructor-based trainees had higher levels of knowledge transfer while the computer-based trainees had a higher level of knowledge retention within the 60-day time period. However, there was no statistically significant difference in 90-day knowledge retention rates within either IBT or CBT groups.
2015 Proceedings of the Conference on Information Systems Applied Research
Research on social media continues to play a key role for firms and marketing professionals. Traditional marketing strategy relied on segmenting discrete target markets based on demographic, socio-economic, and geographic sectors. With the proliferation of mobile and social media technologies, those delineations become less clear. Mobile technology allows users to access information wherever they are, and social networking communities allow members to cross over into multiple socio-economic groups. Yet, for most organizations, the traditional methods of marketing and customer engagement remain the same. Review of the literature reveals multiple outcomes and inferences of what motivates social consumers to use mobile technologies and to actively participate on social media sites. A multi-faceted approach is critical for organizations seeking to capitalize on the ever-growing market of mobile and social media users.
2018 Proceedings of the Conference on Information Systems Applied Research
The ubiquity of social media accounts is forcing both employers and employees to take a closer look at the hiring process. Additionally, as business faculty are preparing students to enter into the global marketplace, both instructors and students should be aware of the challenges and opportunities that lie within the social media landscape. Organizations are using these open networks to have access to a wider range of applicants. As such, there needs to be an increase in awareness on how social media accounts can impact the hiring process.
Issues in Information Systems
Organizations mitigate information security risk by providing relevant and timely training for end users. While training budgets have increased in recent years, few organizations have taken the next step to measure how effective these programs are in changing behavior. An antecedent to behavioral change is increasing knowledge. This study explores the effectiveness of an information security training program by measuring the differences in pre and posttest results to determine levels of knowledge acquisition and knowledge retention. The results of this study showed a statistically significant difference in the increase in pre to post-test scores within the participant groups. The instructor-led group’s level of knowledge acquisition was higher than the computer-based training group. The results of this study may be meaningful for an organization that is in the beginning stages of implementing a corporate information security training program.
Issues in Information Systems, X(1), 208-213
This paper compares the relational database model with the associative database model. This paper briefly summarizes the relational and other familiar data models. The remainder of this paper will introduce and describe the associative database model. The associative model is less known because it is relatively new and does not have a large software supplier base. While it seems to offer a number of benefits and advantages over other database structures, it has yet to become a commercial success in the mainstream database market.
Issues in Information Systems, XiII(1), pp. 215-224, 2012
Financial institutions are increasingly finding difficulty defending against information security risks and threats, as they are often the number one target for information thieves. An effective information security training and awareness program can be a critical component of protecting an organization’s information assets. Financial institutions have invested significant resources in implementing information security training and awareness programs, but few have explored deeper to examine the effectiveness of these training programs. The purpose of this study was to examine the effectiveness of an information security training and awareness program within a mid-sized financial services institution. Effectiveness of information security training was determined by levels of knowledge transfer and knowledge retention. Additionally, the study was designed to determine whether the implementation of two different modes of training delivery, Instructor-based Training (IBT) and Computer-based Training (CBT) led to different results of effectiveness. The results indicate that instructor-based trainees had higher levels of knowledge transfer while the computer-based trainees had a higher level of knowledge retention within the 60-day time period. However, there was no statistically significant difference in 90-day knowledge retention rates within either IBT or CBT groups.
The Proceedings of the Information Systems Education Conference
This research will examine the role of Web 2.0 collaborative technologies (e.g., wikis, blogs and micro-blogging platforms) to facilitate knowledge management, and both synchronous and asynchronous communication within a team-based learning environment. Research has shown the benefits of using wikis and blogs in the classroom. Students are familiar with the technology and the learning curve is relatively short. Most studies on Web 2.0 technologies focus on how well the student completed a certain task or whether the students learned. Included in this research will be the pedagogical method of team-based learning (TBL) to determine how students effectively manage and communicate expectations, determine roles and responsibilities, and to successfully complete assigned tasks. This research is designed to explore the usefulness and efficacy of collaborative technology to promote active student engagement and increase students’ interest in and awareness of effectively communicating with classmates within an online environment. Social media provides a platform for formal and informal digital conversations. As social media and networks become increasingly integrated into intra-organizational communications, it is critical for students to gain an understanding of how “real world” team-based projects occur. Specifically, how are roles and responsibilities determined? Without a formal leadership designation, who is responsible for the final product or process, and how does one deal with difficult co-workers or non-performers? One of the learning outcomes for this course is to prepare students to become leaders within a team-based learning environment. Our goal is to determine if utilizing Web 2.0 technologies will impact the students’ ability to effectively communicate with each other and to actively collaborate with other students within a team-based learning environment.
2015 Proceedings of the Conference on Information Systems Applied Research
Research on social media continues to play a key role for firms and marketing professionals. Traditional marketing strategy relied on segmenting discrete target markets based on demographic, socio-economic, and geographic sectors. With the proliferation of mobile and social media technologies, those delineations become less clear. Mobile technology allows users to access information wherever they are, and social networking communities allow members to cross over into multiple socio-economic groups. Yet, for most organizations, the traditional methods of marketing and customer engagement remain the same. Review of the literature reveals multiple outcomes and inferences of what motivates social consumers to use mobile technologies and to actively participate on social media sites. A multi-faceted approach is critical for organizations seeking to capitalize on the ever-growing market of mobile and social media users.
2018 Proceedings of the Conference on Information Systems Applied Research
The ubiquity of social media accounts is forcing both employers and employees to take a closer look at the hiring process. Additionally, as business faculty are preparing students to enter into the global marketplace, both instructors and students should be aware of the challenges and opportunities that lie within the social media landscape. Organizations are using these open networks to have access to a wider range of applicants. As such, there needs to be an increase in awareness on how social media accounts can impact the hiring process.
Issues in Information Systems
Organizations mitigate information security risk by providing relevant and timely training for end users. While training budgets have increased in recent years, few organizations have taken the next step to measure how effective these programs are in changing behavior. An antecedent to behavioral change is increasing knowledge. This study explores the effectiveness of an information security training program by measuring the differences in pre and posttest results to determine levels of knowledge acquisition and knowledge retention. The results of this study showed a statistically significant difference in the increase in pre to post-test scores within the participant groups. The instructor-led group’s level of knowledge acquisition was higher than the computer-based training group. The results of this study may be meaningful for an organization that is in the beginning stages of implementing a corporate information security training program.
Issues in Information Systems, X(1), 208-213
This paper compares the relational database model with the associative database model. This paper briefly summarizes the relational and other familiar data models. The remainder of this paper will introduce and describe the associative database model. The associative model is less known because it is relatively new and does not have a large software supplier base. While it seems to offer a number of benefits and advantages over other database structures, it has yet to become a commercial success in the mainstream database market.
Issues in Information Systems, XiII(1), pp. 215-224, 2012
Financial institutions are increasingly finding difficulty defending against information security risks and threats, as they are often the number one target for information thieves. An effective information security training and awareness program can be a critical component of protecting an organization’s information assets. Financial institutions have invested significant resources in implementing information security training and awareness programs, but few have explored deeper to examine the effectiveness of these training programs. The purpose of this study was to examine the effectiveness of an information security training and awareness program within a mid-sized financial services institution. Effectiveness of information security training was determined by levels of knowledge transfer and knowledge retention. Additionally, the study was designed to determine whether the implementation of two different modes of training delivery, Instructor-based Training (IBT) and Computer-based Training (CBT) led to different results of effectiveness. The results indicate that instructor-based trainees had higher levels of knowledge transfer while the computer-based trainees had a higher level of knowledge retention within the 60-day time period. However, there was no statistically significant difference in 90-day knowledge retention rates within either IBT or CBT groups.
The Proceedings of the Information Systems Education Conference
This research will examine the role of Web 2.0 collaborative technologies (e.g., wikis, blogs and micro-blogging platforms) to facilitate knowledge management, and both synchronous and asynchronous communication within a team-based learning environment. Research has shown the benefits of using wikis and blogs in the classroom. Students are familiar with the technology and the learning curve is relatively short. Most studies on Web 2.0 technologies focus on how well the student completed a certain task or whether the students learned. Included in this research will be the pedagogical method of team-based learning (TBL) to determine how students effectively manage and communicate expectations, determine roles and responsibilities, and to successfully complete assigned tasks. This research is designed to explore the usefulness and efficacy of collaborative technology to promote active student engagement and increase students’ interest in and awareness of effectively communicating with classmates within an online environment. Social media provides a platform for formal and informal digital conversations. As social media and networks become increasingly integrated into intra-organizational communications, it is critical for students to gain an understanding of how “real world” team-based projects occur. Specifically, how are roles and responsibilities determined? Without a formal leadership designation, who is responsible for the final product or process, and how does one deal with difficult co-workers or non-performers? One of the learning outcomes for this course is to prepare students to become leaders within a team-based learning environment. Our goal is to determine if utilizing Web 2.0 technologies will impact the students’ ability to effectively communicate with each other and to actively collaborate with other students within a team-based learning environment.
Proceedings of the Conference on Information Systems and Applied Research
Cloud-based computing continues to make waves in the areas of customer relationship management and enterprise resource planning. And yet, relying on an external vendor to supply mission critical software as a service and warehouse vast amounts of sensitive information is still daunting for many businesses to seriously consider. This paper discusses the advantages and drawbacks of cloud-based enterprise applications software as compared to traditional in-house installed and hosted infrastructure. Topics compared include total cost of ownership, implementation, usability, customization and security. The goal of this paper is to explore further the various issues that businesses must consider when moving to the cloud. Is it really worth it? What key issues should management consider before upgrading or implementing cloud-based enterprise applications?
Advisory Board Member
Advisory Board Member
Board Member
Advisory Board Member
Board Member
Advisory Board Member
Board Member
Advisory Board Member
Board Member
Advisory Board Member
Board Member
Advisory Board Member
Board Member
Advisory Board Member
Board Member
Advisory Board Member
Board Member
Advisory Board Member
Board Member
Advisory Board Member
Board Member
Advisory Board Member
Board Member
Advisory Board Member
Board Member
Advisory Board Member
Board Member