Dr. Roginski

Download Image

Dr. Jonathan Roginski

Assistant Professor



Jon Roginski is the Program Manager for the West Point Insider Threat Program, which serves as the "research arm" for the Pentagon-administered Army Insider Threat Program. The program considers threat research from a variety of different vectors from the traditional (fraud, espionage, spillage) to the contemporary...a holistic approach of creating an organizational ecosystem that is incompatible with threat. What does that really mean? A couple things. First, we consider many factors that erode our enterprises efficiency and readiness from the inside out to be insider risks or threats. We want to build a better place to live and work so that people feel connected to and invested in their organization and environment so we can build up, rather than tear down. Second, if you have a research topic that you feel doesn't fit anywhere, come talk to me. You may be surprised at the connections that may be made to current projects or the appetite for a new approach! 

LTC(R) Roginski was a class of '96 mathlete and rugby player, basic branch Military Policeman, functional area Operations Research analyst, and (is) an enthusiastic Network Scientist. As him about being a Platoon Leader and Commander in the 10th Mountain Division, Commander and Provost Marshal in Okinawa Japan, member of a think tank reporting directly to the Chief of Naval Operations, ORSA leader at Fort Drum and Kandahar Afghanistan, or invited Network Science Professor at Singapore’s premier defense (they call it defence) institute. Come ask a question about the power and relevance of network science in today’s operating environments...or about how you can support the Army Men's Rugby team in climbing the mountain to their second National Championship!

Ongoing Research Projects

State-related vs. Trait-related risks: Some people are born with traits that cause them to be at greater risk to themselves, to others, and to the organization than the mainstream population. Some people’s risk increases to a critical threshold when faced with stimuli or environmental stressors. Understanding the differences between trait-related and state-related risk helps mitigate both.

Values-based hiring to mitigate threat: Personnel connected to and invested in an organization do not seek to break the organization; rather, to make themselves and the organization stronger. Employees may seek to harm self, others, and the organization because their core values are mis-aligned with organizational vision (trait) or they've experienced a trauma that changes behavior (state). 

Army Data Centers and Capabilities: The Army is awash in data and there are several entities that are in the business of collecting and analyzing this data. Across the enterprise, there is insufficient situational understanding of what adjacent organizations are doing. How do we: Visualize where resources are currently flowing? Identify capabilities and gaps? Quantify associated risk and opportunities?

Insider Threat Stress Study: The Person-Event Data Environment (PDE) is a source of data on which machine learning algorithms may be run to investigate clearances (continuous vetting) and address concerns relating to Insider Threat. How do we use machine learning and artificial intelligence practices to enable organizations to mitigate risk, increase individual wellness, and enhance organizational resiliency?

Women, Peace, and Security: Organizations are higher functioning and environments are more stable in situations which both the feeling of inclusion across demographic and intellectual groups is maximized and the feeling of exclusion is minimized. The Women, Peace, and Security (WPS) effort seeks to include a gendered perspective in DoD planning and operations to ensure half of our population is not marginalized in planning and doing.

Resource Prioritization: The Analytic Hierarchy Process and Analytical Network Process are multi-criteria decision making tools that use pairwise comparison to prioritize assets using a quantitative methodology. Currently used to develop Army Prioritized Protection List (APPL). Potential to use to assist in the prioritization of Army Counter Unmanned Aerial System (CUAS) assets. Software costs $200k+ per year. How do we: Create a user interface to ingest Army data and prioritize assets? Develop a data collection methodology? Determine where else the methodology can be used?

Publications & Presentations

Recent Publications:

Recent Presentations:

  • Gaudrie-Haynie, Jeanette, Jon Roginski, and Harriet Lewis, (2022). WPS and Diversity Equity, Inclusion and Accessibility: Leveraging Efforts to Achieve Mutual Goals, invited panelist at the 8th Annual Women, Peace, and Security Symposium, WPS & Organizational Culture: Creating Lasting Change.
  • Roginski, J.W., (2021). Countering the Insider Threat with Positive Leadership Engagement. Invited presentation at the INFORMS 2021 Annual Meeting and DAMO-ODP’s Annual Insider Threat Seminar.
  • Roginski, J.W., (2021). Using Available Technology to Assess Existing Threats. Invited presentation at the Institute for Defense and Government Advancement Annual Insider Threats Summit.
  • Roginski, J.W., (2018). Educating Through Networks--Teaching by Connecting Knowledge. Invited presentation at the New Jersey Section of MAA.
  • Roginski, J.W. (2017). The Distance Centrality: Measuring Structural Disruption of a Network. Presented at GraphFest.
  • Roginski, J.W. (2017). `Deep Learning' Through Projects. Invited presentation at the 2017 Department of Mathematical Sciences Faculty Development Workshop.