Benjamin M. Ampel

Assistant Professor in Computer Information Systems

Georgia State University

Biography

AI-enabled cybersecurity researcher building LLM and threat-intelligence systems that make defense proactive.
Bio Console
Choose a track to explore how the work fits together
    Biography
    Story Mode
    Builds AI-enabled cyber threat intelligence that turns adversary chatter into action, with LLM pipelines for phishing detection and early warning signals from hacker communities.

    Dr. Benjamin M. Ampel is an Assistant Professor in Computer Information Systems at Georgia State University’s J. Mack Robinson School of Business. He earned his Ph.D. from the University of Arizona under Dr. Hsinchun Chen, and his dissertation Securing Cyberspace: AI-Enabled Cyber-Adversary Defense received the ACM SIGMIS Doctoral Dissertation Award at ICIS 2024.Dissertation Award

    His research program builds AI-enabled cyber threat intelligence that turns adversary chatter into actionable defense. He mines hacker communities, analyzes phishing content, and develops Large Language Model applications for cybersecurity. His work appears in MIS Quarterly, Journal of Management Information Systems (JMIS), ACM TMIS, Information Systems Frontiers, and IEEE ISI, receiving Best Paper Awards at IEEE ISI 2020 and IEEE ISI 2023.Best Paper Awards

    From 2018-2021, he served as an NSF CyberCorps Scholarship-for-Service Fellow. He currently serves as Associate Editor for ACM Digital Threats: Research and Practice (DTRAP) and on the Editorial Board of Journal of Information Systems Education (JISE).Editorial Roles He has co-chaired the AI4Cyber Workshop at ACM KDD and the HICSS Junior Faculty Consortium. In 2025, he was recognized as the Robinson College of Business IS Cybersecurity Graduate Program Top Professor.Teaching Honor

    Career timeline
    2024 – Present
    Assistant Professor of Computer Information Systems
    Georgia State University, J. Mack Robinson School of Business
    2021 – 2024
    Adjunct Lecturer
    University of Arizona
    2018 – 2024
    Research Associate, AI Lab
    University of Arizona
    2018 – 2021
    NSF CyberCorps Scholarship-for-Service Fellow
    University of Arizona
    2019 – 2024
    Ph.D. in Management Information Systems
    University of Arizona • ACM SIGMIS Doctoral Dissertation Award
    2017 – 2019
    M.S. in Management Information Systems
    University of Arizona
    2013 – 2017
    B.S.B.A. in Management Information Systems
    University of Arizona • Outstanding Senior Award
    Research toolkit
    🤖 Large Language Models95%
    🔐 Cybersecurity & CTI95%
    🧠 Deep Learning / NLP90%
    📊 Data Science & Analytics90%
    🐍 Python / PyTorch / TensorFlow90%
    📝 Academic Writing95%
    🎤 Presentations & Teaching90%
    🔬 Design Science Research85%
    Signature threads
    • Threat intelligence pipelines that translate adversary text into operational alerts.
    • LLM-driven phishing detection and social engineering analysis.
    • Measurement of hacker communities for early warning signals.
    Education
    2009–2013
    High School
    Tucson High School
    2013–2015
    Undergraduate studies (no degree received)
    University of Pittsburgh
    2015–2017
    B.S.B.A., Management Information Systems
    University of Arizona
    2018–2019
    M.S., Management Information Systems
    University of Arizona
    2019–2024
    Ph.D., Management Information Systems
    University of Arizona

    Research Impact

    Impact Snapshot
    Updated --
    Journal Articles
    --
    Conference Papers
    --
    Workshop Papers
    --
    Best Paper Awards
    --
    Q1 Journal Publications
    --
    FT50 Publications
    --
    UTD24 Publications
    --

    Selected Venues: MISQ • JMIS • ACM TMIS • ISF • IEEE ISI • HICSS • AMCIS • ICIS • ACM KDD

    📄 Download Research Summary (PDF) →

    📖 View Google Scholar Profile →


    📊 Research Dashboard

    Research Profile Topics

    Topic model inferred from academic outputs in the CV.
    Primary Focus
    ...
    Emerging Focus
    ...
    Total Citations
    0
    h-index
    0

    Citation Velocity

    Impact Map

    Connections by Topic, Venue & Co-authors

    Focus lens
    Click a node to reveal context, then pin highlights you want to keep.

    Network Centrality Analysis

    Density--
    Avg Path--
    Clustering--
    Calculating...
    Cohesion Radar
    Hover a paper to see how it connects across topic, venue, and co-author links.

    Collaboration Network

    Co-authorship Connections

    Collaborator spotlight
    Select a node to see their co-authorship footprint, top venues, and key connections.

    Research Footprint

    Conference Collaboration Institution
    Up to —
    Conference
    Collaboration
    Institution

    Traffic Overview

    --
    Total Visitors
    0
    Last 30 Days
    0

    Audience & Reach

    Top Locations
    Top Region: —
    Loading...
    🧭 Research Storylines

    Research Storylines

    Choose a track and step through the arc like a mini documentary.

    1 / 1
    Threat Intel → Communities → LLMs
    From exploit labeling to community disruption and LLM-driven analytics.

    Labeling Hacker Exploits for Proactive Cyber Threat Intelligence: A Deep Transfer Learning Approach

    2020 · IEEE ISI
    Read paper →

    With the rapid development of new technologies, vulnerabilities are at an all-time high. Companies are investing in developing Cyber Threat Intelligence (CTI) to counteract these new vulnerabilities. However, this CTI is generally reactive based on internal data. Hacker forums can provide proactive CTI value through automated analysis of new trends and exploits. One way to identify exploits is by analyzing the source code that is posted on these forums. These source code snippets are often noisy and unlabeled, making standard data labeling techniques ineffective. This study aims to design a novel framework for the automated collection and categorization of hacker forum exploit source code. We propose a deep transfer learning framework, the Deep Transfer Learning for Exploit Labeling (DTL-EL). DTL-EL leverages the learned representation from professional labeled exploits to better generalize to hacker forum exploits. This model classifies the collected hacker forum exploits into eight predefined categories for proactive and timely CTI. The results of this study indicate that DTL-EL outperforms other prominent models in hacker forum literature.

    Creating Proactive Cyber Threat Intelligence with Hacker Exploit Labels: A Deep Transfer Learning Approach

    2024 · MIS Quarterly
    Read paper →

    The rapid proliferation of complex information systems has been met by an ever-increasing quantity of exploits that can cause irreparable cyber breaches. To mitigate these cyber threats, academia and industry have placed a significant focus on proactively identifying and labeling exploits developed by the international hacker community. However, prevailing approaches for labeling exploits in hacker forums do not leverage metadata from exploit DarkNet Markets, or public exploit repositories to enhance labeling performance. In this study, we adopted the computational design science paradigm to develop a novel information technology artifact, the Deep Transfer Learning Exploit Labeler (DTL-EL). DTL-EL incorporates a pre-initialization design, multi-layer deep transfer learning (DTL), and a self-attention mechanism to automatically label exploits in hacker forums. We rigorously evaluated the proposed DTL-EL against state-of-the-art non-DTL benchmark methods based in classical machine learning and deep learning. Results suggest that the proposed DTL-EL significantly outperforms benchmark methods based on accuracy, precision, recall, and F1-score. Our proposed DTL-EL framework provides important practical implications for key stakeholders such as cybersecurity managers, analysts, and educators.

    Exploring the Evolution of Exploit-Sharing Hackers: An Unsupervised Graph Embedding Approach

    2021 · IEEE ISI
    Read paper →

    Cybercrime was estimated to cost the global economy $945 billion in 2020. Increasingly, law enforcement agencies are using social network analysis (SNA) to identify key hackers from Dark Web hacker forums for targeted investigations. However, past approaches have primarily focused on analyzing key hackers at a single point in time and use a hacker’s structural features only. In this study, we propose a novel Hacker Evolution Identification Framework to identify how hackers evolve within hacker forums. The proposed framework has two novelties in its design. First, the framework captures features such as user statistics, node-level metrics, lexical measures, and post style, when representing each hacker with unsupervised graph embedding methods. Second, the framework incorporates mechanisms to align embedding spaces across multiple time-spells of data to facilitate analysis of how hackers evolve over time. Two experiments were conducted to assess the performance of prevailing graph embedding algorithms and nodal feature variations in the task of graph reconstruction in five time-spells. Results of our experiments indicate that Text-Associated Deep-Walk (TADW) with all of the proposed nodal features outperforms methods without nodal features in terms of Mean Average Precision in each time-spell. We illustrate the potential practical utility of the proposed framework with a case study on an English forum with 51,612 posts. The results produced by the framework in this case study identified key hackers posting piracy assets.

    A Computational Design Framework for Targeted Disruption of Hacker Communities

    2026 · Information Systems Frontiers
    Read paper →

    This paper presents a computational design framework for the targeted disruption of hacker communities. By leveraging advanced analytics and design science principles, the framework provides actionable intelligence for cybersecurity practitioners to proactively combat cyber threats emanating from underground hacker ecosystems.

    Automatic Extraction of Protected Health Information from Multilingual Hacker Communities

    2026 · HICSS
    Read paper →

    Protected Health Information (PHI, e.g., electronic health records, insurance information) is increasingly stolen in data breaches by malicious actors with the intent to sell to others in hacker communities. These actors often protect themselves by describing the content and availability of PHI data using encrypted messaging platforms (e.g., Telegram & Discord). In this research, we propose a Named Entity Recognition Framework for PHI (NERF-PHI) to systematically analyze PHI-related hacker conversations. We collected more than three million multilingual hacker posts from Discord servers and Telegram groups. Utilizing open-source machine translation tools, we translated conversations to English and extracted information related to vulnerable individuals and medical entities. Results suggest that encoder-based Large Language Models show significant promise for extracting PHI-related information from hacker communities.

    Large Language Models for Conducting Advanced Text Analytics Information Systems Research

    2025 · ACM Transactions on Management Information Systems
    Read paper →

    The exponential growth of digital content has generated massive textual datasets, necessitating the use of advanced analytical approaches. Large Language Models (LLMs) have emerged as tools that are capable of processing and extracting insights from massive unstructured textual datasets. However, how to leverage LLMs for text analytics Information Systems (IS) research is currently unclear. To assist the IS community in understanding how to operationalize LLMs, we propose a Text Analytics for Information Systems Research (TAISR) framework. Our proposed framework provides detailed recommendations grounded in IS and LLM literature on how to conduct meaningful text analytics IS research for design science, behavioral, and econometric streams. We conducted three business intelligence case studies using our TAISR framework to demonstrate its application in several IS research contexts. We also outline the potential challenges and limitations of adopting LLMs for IS. By offering a systematic approach and evidence of its utility, our TAISR framework contributes to future IS research streams looking to incorporate powerful LLMs for text analytics.

    📈 Publication Quality Trajectory

    Publication Quality Trajectory

    Each dot is a paper — hover for details. The upward migration toward premier venues marks growing research maturity.

    Loading…
    🔬 Research Topic Evolution

    Research Topic Evolution

    How the focus of each paper shifted across three career phases — derived from title & abstract analysis.

    Loading…
    Growing focus Past focus Steady presence
    🤝 Authorship & Collaboration Evolution

    Authorship & Collaboration Evolution

    From mentee to PI — how authorship position and collaboration structure shifted across career stages.

    First-Authorship Rate
    % of papers where you are first or sole author
    Loading…
    Collaboration Network Growth
    New co-authors per year · colors indicate relationship
    Loading…
    Mentor Peer / Collaborator Student / Mentee

    Research Intelligence

    🔭 arXiv Research Radar

    arXiv Research Radar

    Recent preprints matching your research domains — scored by relevance to your publication portfolio.

    Loading papers…
    💼 Grant Experience
    YearFunding SourceGrant TitleAmountRoleDuration
    2026Robinson College of BusinessAI-Powered Prosody Training for Vishing Defense$12,500PI2026-2027
    2024TSMCAI4BI Academic Program$27,000Co-PI2024-2025
    💰 NSF Grant Opportunities

    NSF Grant Opportunities

    Recent NSF awards aligned with your research domains — AI security, threat intelligence, and cybersecurity.

    Loading grant data…
    🔗 Semantic Scholar: Citations & Recommendations

    Semantic Scholar

    Papers recently citing your work and recommended reads based on your publication portfolio.

    Loading Semantic Scholar data…
    📚 OpenAlex: High-Impact Papers in Your Field

    OpenAlex: High-Impact Papers in Your Field

    Recent high-citation works in cybersecurity, threat intelligence, and AI security from 250M+ scholarly works.

    Loading papers…
    🗞️ Hacker News: Research Community Pulse

    Hacker News: Research Community Pulse

    Top tech community discussions on cybersecurity, AI security, and related topics — live from Hacker News.

    Loading stories…
    🏛️ Grants.gov: Open Funding Opportunities

    Grants.gov: Open Funding Opportunities

    Active federal grant opportunities aligned with AI security, cybersecurity, and threat intelligence research.

    Loading opportunities…
    🔍 OpenCitations: Who Is Citing Your Work

    OpenCitations: Who Is Citing Your Work

    Papers citing Dr. Ampel's publications, sourced from the open OpenCitations index + CrossRef metadata.

    Loading citation data…
    💻 GitHub: Research Tools & Code

    GitHub: Research Tools & Code

    Trending open-source repositories in cybersecurity, threat intelligence, and AI security — tools your research community builds.

    Loading repositories…

    Publications

    📚 Publications (Search & Filter)
    Filter Publications
    Type
    Year
    Venue
    Co-author
    🧪 Paper Diff View

    Paper Diff View

    Pick two papers to see how they diverge across topics, coauthors, venues, and centrality role.

    Teaching

    Teaching Outcomes
    Aggregate metrics from course evaluations
    Average Eval
    -
    Courses Taught
    0
    Institutions
    0
    Top Eval
    -
    Institution Mix
    🎓 Georgia State University (7 courses)
    CourseTitleSemesterEvaluation
    CIS 8684Cyber Threat IntelligenceSpring 2026-
    CIS 4730Deep Learning for BusinessSpring 2026-
    CIS 8080IS Security and PrivacyFall 20254.9/5
    CIS 3620Career PathwaysSummer 20255.0/5
    CIS 8684Cyber Threat IntelligenceSpring 20254.9/5
    CIS 4680Intro to SecuritySpring 20254.7/5
    CIS 8080IS Security and PrivacyFall 20244.9/5

    Notable: Co-developed CIS 4730: Deep Learning for Business (2025); Proposed and developed CIS 8684: Cyber Threat Intelligence (2024)

    📚 University of Arizona - Adjunct/GTA (7 courses)
    CourseTitleSemesterEvaluation
    MIS 562Cyber Threat IntelligenceFall 20234.6/5
    MIS 611DTopics in Data Mining (GTA)Spring 2023-
    MIS 464Data Analytics (GTA)Spring 2023-
    MIS 562Cyber Threat IntelligenceFall 20224.7/5
    MIS 561Data Visualization (GTA)Summer 2022-
    MIS 562Cyber Threat IntelligenceFall 20214.5/5
    MIS 562Cyber Threat IntelligenceSummer 20214.0/5

    Invited Talks & Presentations

    🎤 Invited Talks (7)
    Talks Timeline
    Invited talks, workshops, and conference presentations

    Honors & Awards

    🏆 Awards & Honors (12)
    Awards Timeline
    Scroll or click a year

    Professional Service

    Service Impact
    Editorial, leadership, and community contributions
    Total Roles
    0
    Active Commitments
    0
    Editorial Appointments
    0
    Community Service
    0
    Committees + reviewing

    Public Engagement & Media Coverage

    Media Spotlight
    Coverage, interviews, and public engagement

    Contact

    • bampel@gsu.edu
    • 55 Park Place NW, Atlanta, GA 30303
    • J. Mack Robinson School of Business, Department of Computer Information Systems