hero image
Mehrdad Sharbaf, Ph.D. - Loyola Marymount University. Los Angeles, CA, US

Mehrdad Sharbaf, Ph.D. Mehrdad Sharbaf, Ph.D.

Senior Lecturer, Information Systems and Business Analytics, College of Business Administration | Loyola Marymount University


Part-time Faculty



Mehrdad Sharbaf, Ph.D. Publication






You can contact Mehrdad Sharbaf at mehrdad.sharbaf@lmu.edu.

Dr. Mehrdad Sharbaf has more than 20 years of experience in industry and academia focusing on system integration, system engineering and information security. Founder of Sharbaf & Associates firm, specializing in network design, total quality information security management, network security, information systems security, and strategy management technology and innovation.

Research interests: network security, total quality information security management, designing information security, performing information security systems-level trade studies, quantum cryptography, wireless security, and forensics, computer communication networking, network design and integration, and business intelligence.

Education (2)

Nova Southeastern University: Ph.D., Information Systems 2010

Northrop University: M.S., Electrical Engineering 1987


Areas of Expertise (10)

Management Information Systems

Information Systems Security

Information Security Technology

Business Intelligence Systems

Quantum Cryptography

Total Quality Information Security Management

Business Intelligence Information Security

Information Security Strategic Planning

Information & Cyber Security Management

System Design, Engineering And Integration

Affiliations (5)

  • Cyber Security Task Force Committee
  • Institute of Electrical and Electronic Engineers (IEEE)
  • IEEE Computer Society
  • IEEE Communications Society
  • ACM Professional Member

Research Focus (2)

Google Scholar: Mehrdad Sharbaf

Professor, Innovative Strategic & Visionary Consultant, Researcher, CSUDH, LMU

view more

Microsoft Academic Research

A collection of publications and citations for Mehrdad Sharbaf.

view more

Articles (1)

Cybersecurity Awareness in IoT Threats

IEEE Computer Society

Mehrdad Sharbaf


Internet of Things (IoT) or Internet of Intelligent Things is one of the most buzzing and discussed topic in business and research field today. The Internet of Things (IoT) refers to systems that involve computation, sensing, communication, and it involves the connection between humans, non-human physical objects, enabling monitoring, automation, and decision making within organization. The Internet of Things (IoT) is a network of ‘smart’ devices that connect and communicate via the Internet. The global environment, and consumer market are entering a new business model era where everything will be communicating with each other by means of IoT. These “things” exemplify such as routers, security cameras, smart TVs, home assistants like Amazon Echo or Google Assistant, doorbells like Google Nest, energy management (e.g. Smart Grid), to healthcare management (e.g. medical devices like heart monitors) and urban life (e.g. Smart City). and smart refrigerator that can send alerts to your mobile phone(Figure 1-NIST). Even cars that send diagnostic information to your email or phone are part of the internet of things. By 2020, at least 50 billion more devices will be-come smart via embedded processors. The impact of such Internet of Things (IoT) on our society will be extraordinary. The only thing certain about that number is growth exponentially. However, more connections appear to generate more vulnerabilities. Cyber criminals are always looking for ways to gain access to the systems from exploiting vulnerabilities. Because of lack of awareness within the public about devices, lack of standardization for devices, and characteristics of IoT are highly dynamic, and continuously change because of mobility , for that reasons IoT alleviates concerns about security. It is imperative that these smart devices in our homes and businesses have cyber security provisions that defend and resist against potential threats and malicious cyber activity.

view more