- University of Missouri- St. Louis
Department of Information Systems
College of Business Administration
228 Express Scripts Hall
One University Blvd
St. Louis, MO 63121-4400 USA - 314-516-6288
Maurice Dawson
Illinois Institute of Technology, College of Computing, Faculty Member
- Illinois Institute of Technology, School of Applied Technology, Faculty MemberTechnische Universität München, Information Systems, Faculty Memberadd
- Cyber Security, Information Security, Computer Science, Engineering, Business, Management, and 34 moreInformation Systems, Entrepreneurship, Innovation statistics, Technological change, Marketing Research, Transition Economies, Africa, Communication, Business & Ethics, Market Research, International & Intercultural Communication/Marketing, Social Networking, Web 2.0, Military History, Virtual Worlds, Open Source Software, Software Development, Government, Systems Thinking, Management Science, Military Intelligence, Decision Support Systems, Virtual Environments, Strategy (Military Science), Consumer Behavior, Globalization, Information Technology, Public Policy, Homeland Security, Network Security, International Security, Computer Security, Computer Networks, and Wireless Sensor Networksedit
- Serving as an Assistant Professor of Information Technology and Management within the School of Applied Technology at... moreServing as an Assistant Professor of Information Technology and Management within the School of Applied Technology at Illinois Institute of Technology. Additionally, serving as Director of the National Center for Academic Excellence in Cyber Security Education and responsible for working with the faculty who are members of this center.edit
- Professor Hassan Kazemianedit
In the wake of a pandemic, it has been essential that programs move online quickly while remaining the same academic rigor as being on the ground. Therefore the cybersecurity coursework and labs were taught entirely online while... more
In the wake of a pandemic, it has been essential that programs move online quickly while remaining the same academic rigor as being on the ground. Therefore the cybersecurity coursework and labs were taught entirely online while representing real-world scenarios. The College of Computing at Illinois Institute of Technology has recently been actively creating new partnerships, strengthening their cybersecurity, Information Technology, and other computing programs to meet national security needs. These activities have allowed partnerships with the United States Armed Services, Department of Defense, and numerous industry partners. The newly found focus on national security has provided a different perspective on cybersecurity-related to global events and how it can shape those currently, such as political events.
Research Interests:
In today's modern digitizing manufacturing landscape, new and emerging technologies can shape how an organization can compete, while others will view this as a necessity to survive as manufacturing has been identified as a critical... more
In today's modern digitizing manufacturing landscape, new and emerging technologies can shape how an organization can compete, while others will view this as a necessity to survive as manufacturing has been identified as a critical infrastructure. Universities struggle to hire university professors that are adequately trained or willing to enter academia due to competitive salary offers in the industry. Meanwhile, the demand for fields such as Artificial Intelligence, data science, and cybersecurity continuously rises with no foreseeable drop in demand in the next several years. This results in organizations deploying technologies with an inadequate staff that understands what new cybersecurity risks they are introducing into the company. Examined are how organizations can potentially mitigate some of the risk associated with integrating these new technologies and developing their workforce to be better prepared for looming changes in technological skill need. With the over a 10 % growth in organizations deploying Artificial Intelligence, the current cybersecurity workforce needs are over half a million. A struggle to find a viable workforce this research paper aims to serve as a guide for Information Technology managers and senior management to foresee the cybersecurity risks that will result from the incorporation of these new technological advances into the organization.
Research Interests:
Cybersecurity has gone through several changes that have presented new challenges in recent years, complicated by the rise of cybercrime and digital warfare. With the introduction of militarizing the space domain, it has become apparent... more
Cybersecurity has gone through several changes that have presented new challenges in recent years, complicated by the rise of cybercrime and digital warfare. With the introduction of militarizing the space domain, it has become apparent that we must consider multidomain concepts. Thus, the threat landscape has again shifted, and defenders must become knowledgeable about how the cyber domain crosses into maritime, land, air, and space. The traditional thinking of protecting enterprise systems locked away in a building is no longer. Thus, we have the emergence of cyber warfare and cyber as a fifth domain that brings together maritime, land, space, and air. These domains are not just for the military but the civilian sector as well. Understanding the role of cyber and how it can be used to take advantage or secure the remaining domains will give entities the upper hand in strategy. The technological advancements that pave the way to the mass implementation of the Internet of Things (IoT) and Internet connectivity to everyday devices have led to an explosion in cyberattacks such as breaches resulting in millions of accounts being compromised. (Dawson, Eltayeb, & Omar, 2016). Bad actors such as those focused on criminal activities regarding human trafficking and espionage navigate these domains to circumvent law enforcement agencies globally. We must understand how exploitation, circumvention, and defense needs to occur in a multidomain concept. However, knowing that the cyber domain is a domain that goes through land, maritime, space, and air can be an area that serves as a central point for realizing assured security. Executive Orders (EO), laws, policies, doctrine, and other directives have shaped the landscape of cybersecurity. New EOs have been released that allow a cyber-attack with responsive measures such as one that involves military force. Laws created that impose rights for Personal Identifiable Information (PII) being breached, leaving millions of individuals unprotected. One of these most well-known items is General Data Protection Regulation (GDPR) as it relates to the European Union (EU) and the evolving threats with hyperconnectivity (Martínez, 2019a; Martínez, 2019b). Understanding the role of cybercrime and digital warfare and how they continue to play in shaping the technological landscape is critical. These various actions change the spectrum regarding combating nefarious actors or design errors that leave the system susceptible. As attacks continue to rise from bad actors such as nation-states, terrorists, and other entities, it is essential to understand the threat landscape and select cybersecurity methodologies that can be put in place to provide adequate measures. This document presents the work form a post-doctoral project that provides a perspective of cybersecurity under a information science perspective. This six-month project allows to stress the broadly importance that information and its management (not just within the information security context), and the urgent need to deal with cybersecurity as a societal challenge. The document is organized in four main chapters presenting different but complementary issues, going from high level to a more operational level: National Cybersecurity Education: Bridging Defense to Offense, stressing the importance of societal awareness and education. Emerging Technologies in the Fourth Industrial Revolution, stressing the importance to consider cybersecurity issues as core ones, even to economic and production areas. Nefarious Activities within the Deep Layers of the Internet, stressing the need to be part of digital places where information is traded, shared and, even sometimes, created. The fourth chapter provide a few hints and issues related with software development and test: Software Security Considerations. A final session presents several remarks as Final Thoughts, closing the work pointing out some of the current challenges that we are facing of.
Research Interests:
This new era brings new promises of technology that will bring economic and societal benefits. Artificial Intelligence is to be the disruptor for work and even military technological applications. However, developers and end-users will... more
This new era brings new promises of technology that will bring economic and societal benefits. Artificial Intelligence is to be the disruptor for work and even military technological applications. However, developers and end-users will play keys roles in how this technology is developed and ultimately used. Among these two groups, there are cybersecurity concerns that need to be considered. In this paper, the researchers address the process of secure development and testing. Also, for the end-user appropriate methods, procedures, and recommendations are defined that can mitigate the overall use of this technology within an enterprise.
Research Interests:
The explosion of the internet has given rise to cybercrimes, online identity theft, and fraud. With the internet, these crimes are able to occur anywhere in the world and limitless to whatever selected target. The anonymity of the... more
The explosion of the internet has given rise to cybercrimes, online identity theft, and fraud. With the internet, these crimes are able to occur anywhere in the world and limitless to whatever selected target. The anonymity of the internet allows criminal activity to flourish, and the number of unsuspecting victims is growing. From script kiddies to nation-states, this new method of internet-enabled crimes has strained governments. This chapter provides insight into how crimes related to online identity theft and fraud are carried out. Examined within this chapter are the evolution of cybercrime, history of identity theft, applications for internet anonymity, and discussion on effects caused by romance scams and data breaches. Finally, recommendations are provided on what organizations and individuals can do to protect themselves against these vicious crimes.
Research Interests: Computer Science, Computer Engineering, Computer Security, Financial Crisis, Internet and web security, and 10 moreDark Web, Digital Forensic, Cyber Crime, Cyber Security, Financial Crimes, Bitcoin, Digital Forensics, Cyber crimes, Cryptocurrency, Digital Crime, Computer Science and Engineering, Digital Crimes Classification, and Dark Web Forensics
African Americans and Hispanic Americans historically have been underrepresented in U.S. jobs in the fields of STEM in large part because of the usability of technology. In this research, the goal was to discover the usability factors... more
African Americans and Hispanic Americans historically have been underrepresented in U.S. jobs in the fields of STEM in large part because of the usability of technology. In this research, the goal was to discover the usability factors relative to operating systems that may limit African Americans and Hispanic Americans from pursuit of computer science higher education. For the purpose of this study, "usability" refers to the "appropriateness of purpose." Categorized by three factors, appropriateness of purpose can be defined as (i) the effectiveness of the users' ability to complete tasks while using technology and the quality or output of those tasks, (ii) the efficiency and the level of resources used in performing tasks, and (iii) the satisfaction or users' reaction to the use of technology (Brooke, 2014). This research examined quantitative analysis based on students' routine computer task knowledge using a survey questionnaire and the SUS. The population included high school students responding to questions on common tasks and usability. A web survey was conducted to assess the measurement and understanding pattern demonstrated by the participants. The quantitative analysis of the computer usability included ANOVA, independent t-tests and orthogonal contrasts. The analysis of the SUS measured usability and learnability. The results of the data analysis showed that the combined African American and Hispanic group has a mean computer usability score that is significantly lower when compared with the other ethnicities and the SUS findings included the highest gap among this most underrepresented group in the STEM field.
Research Interests:
With a fast-growing demand for properly trained cy-bersecurity professionals to defend our cyber space and information systems, effective cybersecurity education programs and courses with consistent and reliable quality control and... more
With a fast-growing demand for properly trained cy-bersecurity professionals to defend our cyber space and information systems, effective cybersecurity education programs and courses with consistent and reliable quality control and evaluation are necessary to prepare qualified workforce for the cybersecurity industry. The national Centers of Academic Excellence in Cyber Defense Education (CAE-CDE) designation program jointly sponsored by the US National Security Agency (NSA) and Department of Homeland Security (DHS) is a rigorous certification and national standard for maintaining quality of cybersecurity education. This paper explains the CAE-CDE program criteria and requirements and discusses the important role of the designation in cybersecurity education and workforce development. This paper illustrates the educational value and impact of the CAE-CDE program with case studies of three different institutions: (1) University of Missouri—St. Louis, which has obtained the CAE-CDE and Security Policy Development and Compliance Focus Area designations; (2) American Public University System, which has just completed the application for CAE-CDE; and (3) Robert Morris University, which is in the process of applying for the CAE-CDE designation.
Research Interests:
The threat of cyber terrorism has become a reality with recent attacks such as Stuxtnet, Flame, Sony Pictures, and North Korea's websites. As the Internet of Things (IoT) continues to become more hypercon-nected it will be imperative that... more
The threat of cyber terrorism has become a reality with recent attacks such as Stuxtnet, Flame, Sony Pictures, and North Korea's websites. As the Internet of Things (IoT) continues to become more hypercon-nected it will be imperative that cyber security experts to develop new security architectures for multiple platforms such as mobile devices, laptops, embedded systems, and even wearable displays. The futures of national and international security rely on complex countermeasures to ensure that a proper security posture is maintained during this state of hyperconnectivity. To protect these systems from exploitation of vulnerabilities it is essential to understand current and future threats to include the laws that drive their need to be secured. Examined within this chapter are the potential security related threats with the use of social media, mobile devices, virtual worlds, augmented reality, and mixed reality.
Research Interests:
The Internet of Things describes a world in which smart technologies enable objects with a network to communicate with each other and interface with humans effortlessly. This connected world of convenience and technology does not come... more
The Internet of Things describes a world in which smart technologies enable objects with a network to communicate with each other and interface with humans effortlessly. This connected world of convenience and technology does not come without its drawbacks, as interconnectivity implies hackability. This new world of convenience calls for revolutionary protection strategies to reassess security. Risk management concepts and Information Assurance architecture similar to those practiced in the United States Department of Defense should be used as guidelines for cyber security implementation. This new emerging market that is facilitating the exchange of services and goods requires understanding the associated laws for the implementation of an IoT architecture (Weber, 2010).
Research Interests:
Hyperconnectivity and Internet of Things are changing the landscape of Information Technology (IT). Architectures are becoming more sophisticated while cyber security is slowing adapting to this shift of Internet-enabled technologies in... more
Hyperconnectivity and Internet of Things are changing the landscape of Information Technology (IT). Architectures are becoming more sophisticated while cyber security is slowing adapting to this shift of Internet-enabled technologies in automotive, industrial, consumer, and networking. This slow adoption of proper security controls, defenses, and aggressive measures is leaving individuals vulnerable. This submission explores how policies can be created that automate the process of device connectivity, and how current frameworks can be used to minimize system risks.
Research Interests:
Massive Open Online Courses (MOOCs) are a new phenomenon of course delivery for students, faculty, and administrators to use. As this technology continues to grow in the short term it is essential to develop a method in which Open Source... more
Massive Open Online Courses (MOOCs) are a new phenomenon of course delivery for students, faculty, and administrators to use. As this technology continues to grow in the short term it is essential to develop a method in which Open Source Software (OSS), open source technologies, and open access literature can be incorporated to strengthen the MOOC environment. Strengthening the MOOC environment can be used as a method to increase retention as well as increase enrollment in higher education. As Science, Technology, Engineering, and Mathematics (STEM) programs are going online it is imperative that the tools meet the demands of today's marketplace. This chapter provides insights on these open technology solutions so that current and future MOOCs can be enhanced with little to no cost added.
Research Interests:
Mobile devices are becoming a method to provide an efficient and convenient way to access, find and share information; however, the availability of this information has caused an increase in cyber attacks. Currently, cyber threats range... more
Mobile devices are becoming a method to provide an efficient and convenient way to access, find and share information; however, the availability of this information has caused an increase in cyber attacks. Currently, cyber threats range from Trojans and viruses to botnets and toolkits. Presently, 96% of mobile devices do not have pre-installed security software while approximately 65% of the vulnerabilities are found within the application layer. This lack in security and policy driven systems is an opportunity for malicious cyber attackers to hack into the various popular devices. Traditional security software found in desktop computing platforms, such as firewalls, antivirus, and encryption, is widely used by the general public in mobile devices. Moreover, mobile devices are even more vulnerable than personal desktop computers because more people are using mobile devices to do personal tasks. This review attempts to display the importance of developing a national security policy created for mobile devices in order to protect sensitive and confidential data.
Research Interests: Information Systems, Engineering, Electrical Engineering, Computer Science, Software Engineering, and 11 moreInformation Technology, Social Sciences, Mobile Learning, Data Mining, Social Networking, Network Security, Mobile Technology, Computer Networks, Political Science, Homeland Security, and Mobile Computing
Research Interests:
In the eyes of many private sector organizations, there are a number of current problems with public sector organization's efforts related nontraditional education as well as workforce development. It is also thought that current... more
In the eyes of many private sector organizations, there are a number of current problems with public sector organization's efforts related nontraditional education as well as workforce development. It is also thought that current public sector effort lack an innovative approach to addressing current issues in society as well as emerging educational opportunities. This paper will explore a new model for workforceeducation from both a traditional and nontraditional educational offering to students. The presentation will first address the key role of the private educational entity as well as public educational entity. The private partner will be a key player in addressing the needs assessment and task analysis perspective of creating this partnership. They will also be the drivers of value-based education to meet community needs and industry opportunities. Thus, the private partner will also be able to provide financial support in a more expedient and flexible manner so long as the...
Health Information Technology (IT) has become an important topic within the health community in the last several years. Technology has become intertwined in all facets of our lives from smart phones to simple robotics but the health care... more
Health Information Technology (IT) has become an important topic within the health community in the last several years. Technology has become intertwined in all facets of our lives from smart phones to simple robotics but the health care industry has not fully incorporated all these new technologies in every day practices. However the health care industry is actively working toward a systems concept that allows interoperability as the ones currently in fielded act as independent closed systems. The health care community aims to integrate tools such as tablets, laptops, and Open Source Software (OSS) applications that allow for paperless records to include increasing accuracy in the hospital room with the capture of patient data. Many states must update their status in relation to the Strategic and Operation Plan under the State Cooperative Agreement. Key items of importance are the following; governance, policy/legal, technical infrastructure, business and technical operations, comm...
The mission of the America’s Military Science Department is to commission the future officer leadership of the United States Army and motivate young people to become career servicemen. Reserve Officer Training Corps (ROTC) provides cadets... more
The mission of the America’s Military Science Department is to commission the future officer leadership of the United States Army and motivate young people to become career servicemen. Reserve Officer Training Corps (ROTC) provides cadets a valuable opportunity to build for the future by helping them earn both a college degree and earn a commission as a military officer at the same time. ROTC graduates are leaders, thinkers and decision-makers. They know how to adapt to situations and take charge. According to the changing technological environments to include the ever growing Global War on Terror (GWOT) Intelligence, Surveillance, and Reconnaissance (ISR) has been a key factor in many wars and combat scenarios. To meet the needs at one institution an applied practicum has been applied in the project management graduate program which includes the development and deployment of an Unmanned Air System (UAS). This paper will provide a view of the project as it served two key functions. ...
Colleges and universities have encountered vigorous change in recent years. These changes have created a need for colleges and universities to evolve, change, and adapt. Responding to change often requires changes in organizational... more
Colleges and universities have encountered vigorous change in recent years. These changes have created a need for colleges and universities to evolve, change, and adapt. Responding to change often requires changes in organizational cultures. This applied research study explores the value and benefits of making cultures more adaptive in an unprecedented time of organizational environmental instability
Research Interests:
The invention and active use of PowerPoint in university classroom has transitioned academic teaching from transparencies and overhead projectors into new ages of teaching and learning. The next challenge for professionals has been the... more
The invention and active use of PowerPoint in university classroom has transitioned academic teaching from transparencies and overhead projectors into new ages of teaching and learning. The next challenge for professionals has been the appropriate and effective use of PowerPoint and lectures as it relates to working adults where a differing school of thought exist when lecturing through 50 to 100 PowerPoint slides as an effective way to engage graduate students. Progressive professors are using new tools that offer stories that provide context, relevance, and handles, for knowledge retention for graduate students through the use of case studies, simulations, and videos, including Donald Trump’s The Apprentice. This paper provides contextual examples regarding how to use real world stories with student-centered teaching and learning as a means of engaging graduate students, connecting with them, and providing opportunities for the practical application of course content.
Research Interests:
Research Interests:
Defense & Aerospace companies such as Boeing, Raytheon, Rockwell Collins, Harris, COLSA, and many other defense related companies continuously seek well-educated, high energy, and dynamic soldiers to lead in their organizations as... more
Defense & Aerospace companies such as Boeing, Raytheon, Rockwell Collins, Harris, COLSA, and many other defense related companies continuously seek well-educated, high energy, and dynamic soldiers to lead in their organizations as indicated through Dice.com, ClearenceJobs.com, and Careerbuilder.com. Hiring an educated soldier is a good investment since soldiers are knowledgeable about the United States (US) government’s structure, laws, regulations, and terminology. A defense company contractor would generally prefer to hire an officer or senior non commissioned officer from the armed forces, rather than teach a civilian how to appropriately work with and effectively communicate with their US government customers. Not only does it mean that companies fight amongst each others to gain these highly skilled individuals as the number of qualified candidates in engineering and program management are not increasing at the rate needed for employment within the Defense & Aerospace Industry ...
In the modern world, natural disasters are becoming more commonplace, unmanned systems are becoming the norm, and terrorism and espionage are increasingly taking place online. All of these threats have made it necessary for governments... more
In the modern world, natural disasters are becoming more commonplace, unmanned systems are becoming the norm, and terrorism and espionage are increasingly taking place online. All of these threats have made it necessary for governments and organizations to steel themselves against these threats in innovative ways.
Developing Next-Generation Countermeasures for Homeland Security Threat Prevention provides relevant theoretical frameworks and empirical research outlining potential threats while exploring their appropriate countermeasures. This relevant publication takes a broad perspective, from network security, surveillance, reconnaissance, and physical security, all topics are considered with equal weight. Ideal for policy makers, IT professionals, engineers, NGO operators, and graduate students, this book provides an in-depth look into the threats facing modern society and the methods to avoid them.
Developing Next-Generation Countermeasures for Homeland Security Threat Prevention provides relevant theoretical frameworks and empirical research outlining potential threats while exploring their appropriate countermeasures. This relevant publication takes a broad perspective, from network security, surveillance, reconnaissance, and physical security, all topics are considered with equal weight. Ideal for policy makers, IT professionals, engineers, NGO operators, and graduate students, this book provides an in-depth look into the threats facing modern society and the methods to avoid them.
Research Interests: African Studies, Computer Science, Public Administration, Democracy and Cyber-Democracy Theory and Practice, Cyberpsychology, and 18 moreTerrorism, International Terrorism, Cybercrimes, African History, Africa, Homeland Security, Political Violence and Terrorism, Cyber Terrorism, Counter terrorism, War on Terror, Authentication, Cybersecurity, Homeland Security Policy, Cyber Security, Terrorism and Homeland Security, Homeland Security and Emergency Management, Terrorism and Counterterrorism, and Public Policy
After the information released by Edward Snowden, the world realized about the security risks of high surveillance from governments to citizens or among governments , and how it can affect the freedom, democracy and/or peace. Research has... more
After the information released by Edward Snowden, the world realized about the security risks of high surveillance from governments to citizens or among governments , and how it can affect the freedom, democracy and/or peace. Research has been carried out for the creation of the necessary tools for the countermeasures to all this surveillance. One of the more powerful tools is the Tails system as a complement of The Onion Router (TOR). Even though there are limitations and flaws, the progress has been significant and we are moving in the right direction.
Research Interests:
The threat of cyber terrorism has become a reality with recent attacks such as Stuxtnet, Flame, Sony Pictures, and North Korea's websites. As the Internet of Things (IoT) continues to become more hyperconnected it will be imperative that... more
The threat of cyber terrorism has become a reality with recent attacks such as Stuxtnet, Flame, Sony Pictures, and North Korea's websites. As the Internet of Things (IoT) continues to become more hyperconnected it will be imperative that cyber security experts to develop new security architectures for multiple platforms such as mobile devices, laptops, embedded systems, and even wearable displays. The futures of national and international security rely on complex countermeasures to ensure that a proper security posture is maintained during this state of hyperconnectivity. To protect these systems from exploitation of vulnerabilities it is essential to understand current and future threats to include the laws that drive their need to be secured. Examined within this chapter are the potential security related threats with the use of social media, mobile devices, virtual worlds, augmented reality, and mixed reality.
Research Interests: Computer Science, Computer Engineering, Cyberpsychology, Wireless Communications, Cybercrimes, and 13 moreSocial Networking, Network Security, Cybernetics, Computer Networks, The Internet of Things, Cyber crime, Cybercultures, Cyberspace, The Internet, Cybersecurity, Cyber Security, Computer Forensics for Cyberspace Crimes, and Internet of Things (IoT)
Security is a growing concern on the African continent as the Regional Economic Communities (REC) move toward economic integration. Furthermore, these regions collectively make up the African Union (AU) which has an objective to promote... more
Security is a growing concern on the African continent as the Regional Economic Communities (REC) move toward economic integration. Furthermore, these regions collectively make up the African Union (AU) which has an objective to promote peace, security, and stability on the African continent. In recent years, Africa has been plagued with political uprisings, civil wars, extremists, corrupt politicians, and the battle for natural resources. In particular, Kenya and Nigeria are facing Islamic extremists that threaten the foundation of multiple nations. In both countries, they are using military force to combat these threats. This chapter provides insight into these West and East African nations and their means to provide security assurances to their citizens.
Research Interests:
Secure computing is essential as environments continue to become intertwined and hyperconnected. As the Internet of Things (IoT), Web of Things (WoT), and the Internet of Everything (IoE) dominate the landscape of technological platforms,... more
Secure computing is essential as environments continue to become intertwined and hyperconnected. As the Internet of Things (IoT), Web of Things (WoT), and the Internet of Everything (IoE) dominate the landscape of technological platforms, protection these complicated networks is important. The everyday person who wishes to have more devices that allow the ability to be connected needs to be aware of what threats they could be potentially exposing themselves to. Additionally, for the unknowing consumer of everyday products needs to be aware of what it means to have sensors, Radio Frequency IDentification (RFID), Bluetooth, and WiFi enabled products. This submission explores how Availability, Integrity, and Confidentiality (AIC) can be applied to IoT, WoT, and IoE with consideration for the application of these architectures in the defense sector.
Research Interests: Information Systems, Computer Science, Information Science, Information Technology, Management Information Systems, and 17 moreCyberlaw, Democracy and Cyber-Democracy Theory and Practice, Informatics, Information Security, Cyberpsychology, Cybercrimes, Cybernetics, Computer Networks, Homeland Security, Cyber Terrorism, Cyber Warfare, Cyber crime, Cybercultures, Cyberspace, The Internet, Cybersecurity, and Cyber Security
The Internet of Things describes a world in which smart technologies enable objects with a network to communicate with each other and interface with humans effortlessly. This connected world of convenience and technology does not come... more
The Internet of Things describes a world in which smart technologies enable objects with a network to communicate with each other and interface with humans effortlessly. This connected world of convenience and technology does not come without its drawbacks, as interconnectivity implies hackability.
Security Solutions for Hyperconnectivity and the Internet of Things offers insights from cutting-edge research about the strategies and techniques that can be implemented to protect against cyber-attacks. Calling for revolutionary protection strategies to reassess security, this book is an essential resource for programmers, engineers, business professionals, researchers, and advanced students in relevant fields.
Security Solutions for Hyperconnectivity and the Internet of Things offers insights from cutting-edge research about the strategies and techniques that can be implemented to protect against cyber-attacks. Calling for revolutionary protection strategies to reassess security, this book is an essential resource for programmers, engineers, business professionals, researchers, and advanced students in relevant fields.
Research Interests: Information Systems, Engineering, Electrical Engineering, Computer Science, Information Technology, and 27 moreCommunication, Cyberlaw, Cyborg Theory, Democracy and Cyber-Democracy Theory and Practice, Cyberpsychology, Cybercrimes, Cybernetics, Cyberstudies, The Internet of Things, Cyber Terrorism, Cyber Warfare, Cyberbullying, Cyber crime, Cybercultures, Cyberspace, The Internet, Cyberwarfare, Cybersecurity, Cyber Physical Systems, Cybercrime, Cyber Law, Cyber Bullying, Cyber Security, Cyber Psychology, Cybercrime-Terrorusm, Geographic Information Systems (GIS), and Cyber Crime and Technological Advancements
Technology is changing the landscape of learning and teaching in America. The use of virtual worlds enable engineering and technology programs to implement software programs such as Second Life and Open Simulator to enhance what they may... more
Technology is changing the landscape of learning and teaching in America. The use of virtual worlds enable engineering and technology programs to implement software programs such as Second Life and Open Simulator to enhance what they may currently already have. Additionally, virtual worlds can add a more dynamic environment in the online classroom for multiple platforms such as the Personal Computer (PC), wearables, and mobile devices. The purpose of this chapter is to provide a review of these programs to include how to implement these items into an engineering course. Further detailed in this submission is how to incorporate Institute of Electrical and Electronics Engineers (IEEE) documentation and other engineering guidelines into the projects. Included in this chapter is a detailed layout of a simulated environment as well as various approaches of structuring and organization for classroom activities.
Research Interests: Information Systems, Computer Science, Human Computer Interaction, Communication, Education, and 11 moreEducational Technology, Computer Engineering, Virtual Environments, Higher Education, Systems Engineering, Virtual Communities, Computer Games Technology, Computer-Mediated Communication, Virtual Worlds, Virtual Learning, and Computer Science and Engineering
Personal Cloud Computing (PCC) is a rapidly growing technology, addressing the market demand of individual users for access to available and reliable resources. But like other new technologies, concerns and issues have surfaced with the... more
Personal Cloud Computing (PCC) is a rapidly growing technology, addressing the market demand of individual users for access to available and reliable resources. But like other new technologies, concerns and issues have surfaced with the adoption of PCC. Users deciding whether to adopt PCC may be concerned about the ease of use, usefulness, or security risks in the cloud. Negative attitudes toward using a technology have been found to negatively impact the success of that technology. The purpose of this study was to understand users' acceptance of PCC. The population sample consisted of individual users within the United States between 18 and 80 years of age. The theoretical framework utilized in this study was based on the technology acceptance model (TAM). A web survey was conducted to assess the measurement and understanding of patterns demonstrated by participants. Our results shows that in spite of the potential benefits of PCC, security and privacy risks are deterring many users from moving towards PCC.*
Research Interests: Business, Engineering, Computer Science, Software Engineering, Human Computer Interaction, and 15 moreInformation Technology, Communication, Technology, Computer Engineering, Wireless Communications, User Experience (UX), Computer Networks, Information Communication Technology, User Interface, Usability and user experience, User Experience Design, Strategy (Business), Cloud Computing, The Internet, and Computers
The purpose of this empirical study was to test specific factors of behavioral intention to use m-learning in a community college setting using a modified technology acceptance model and antecedent factors suggested by the researcher’s... more
The purpose of this empirical study was to test specific factors of behavioral intention to use m-learning in a community college setting using a modified technology acceptance model and antecedent factors suggested by the researcher’s review of the literature. In addition, the study’s purpose was to expand understanding of behavioral intention to use m-learning and to contribute to the growing body of research. This research model was based on relevant technology acceptance literature. The study examines the significance of “prior use of e-learning” and correlation with the behavioral intention to use m-learning. Existing models have looked at prior use of e-learning in other domains, but not specifically m-learning. Other models and studies have primarily looked at the prior use of e-learning variable as a moderating variable and not one that is directly related to attitude and behavioral intention. The study found that there is a relationship between prior use of e-learning and behavioral intention to use m-learning. This research direction was proposed by Lu and Viehland.
Research Interests: Information Systems, Computer Science, Human Computer Interaction, Information Technology, Management Information Systems, and 12 moreTeaching and Learning, Education, Behavioral Sciences, E-learning, Learning and Teaching, Mobile Technology, Knowledge sharing, Learning Styles, Digital Media & Learning, Multimedia Learning, Online Learning, and Learning And Teaching In Higher Education
Technological advances, although beneficial and progressive, can lead to vulnerabilities in system networks and security. While researchers attempt to find solutions, negative uses of technology continue to create new security threats to... more
Technological advances, although beneficial and progressive, can lead to vulnerabilities in system networks and security. While researchers attempt to find solutions, negative uses of technology continue to create new security threats to users.
New Threats and Countermeasures in Digital Crime and Cyber Terrorism brings together research-based chapters and case studies on security techniques and current methods being used to identify and overcome technological vulnerabilities with an emphasis on security issues in mobile computing and online activities. This book is an essential reference source for researchers, university academics, computing professionals, and upper-level students interested in the techniques, laws, and training initiatives currently being implemented and adapted for secure computing.
New Threats and Countermeasures in Digital Crime and Cyber Terrorism brings together research-based chapters and case studies on security techniques and current methods being used to identify and overcome technological vulnerabilities with an emphasis on security issues in mobile computing and online activities. This book is an essential reference source for researchers, university academics, computing professionals, and upper-level students interested in the techniques, laws, and training initiatives currently being implemented and adapted for secure computing.
Research Interests: Information Systems, Management, Engineering, Electrical Engineering, Mechanical Engineering, and 27 moreCivil Engineering, Computer Science, Software Engineering, Information Technology, Public Administration, Education, Social Networks, Information Security, Computer Engineering, Project Management, Operations Research, Social Networking, Network Security, International Security, Computer Networks, Security, Open Source Software, Public Relations, Homeland Security, Security Studies, Wireless Sensor Networks, Computer Security, Industrial Engineering, Public Health, Cyber Security, Geographic Information Systems (GIS), and Public Policy
Друзья, мы продолжаем знакомить вас с гостями, посетившими белометаллургическое производство группы ЧТПЗ. В новом выпуске: «Very nice!», «Приятно побывать на лучшем производстве в мире!», «Высота» внушает надежду на будущее!» и другие... more
Друзья, мы продолжаем знакомить вас с гостями, посетившими белометаллургическое производство группы ЧТПЗ.
В новом выпуске: «Very nice!», «Приятно побывать на лучшем производстве в мире!», «Высота» внушает надежду на будущее!» и другие впечатления гостей из США, Татарстана и Москвы.
Не пропустите новые выпуски проекта «Белая металлургия глазами гостей» каждые две недели, ищите в видеороликах себя и своих близких!
Friends , we continue to acquaint you with the guests attending belometallurgicheskoe production team CTRP . In the new issue : "Very nice!", " It's nice to visit the best production in the world !", " Height " inspires hope for the future ! " And other impressions of visitors from the United States, Tatarstan and Moscow. Do not miss new episodes of" White metallurgy eyes guests " every two weeks , look for the videos yourself and your loved ones!
В новом выпуске: «Very nice!», «Приятно побывать на лучшем производстве в мире!», «Высота» внушает надежду на будущее!» и другие впечатления гостей из США, Татарстана и Москвы.
Не пропустите новые выпуски проекта «Белая металлургия глазами гостей» каждые две недели, ищите в видеороликах себя и своих близких!
Friends , we continue to acquaint you with the guests attending belometallurgicheskoe production team CTRP . In the new issue : "Very nice!", " It's nice to visit the best production in the world !", " Height " inspires hope for the future ! " And other impressions of visitors from the United States, Tatarstan and Moscow. Do not miss new episodes of" White metallurgy eyes guests " every two weeks , look for the videos yourself and your loved ones!
Research Interests:
UMSL INFSYS 6805: Risk Management & Threat Modeling Session [Live Course Chat]
Research Interests: Information Systems, Computer Science, Information Science, Human Computer Interaction, Information Technology, and 15 moreManagement Information Systems, Informatics, Information Security, Computer Engineering, Database Systems, Disaster risk management, Computer Networks, Project Risk Management, Risk and Vulnerability, Risk Management, Risk Assessment & Risk Management, Advanced Persistent Threats, Disaster risk reduction, Security Threat Groups, and Geographic Information Systems (GIS)
UMSL INFSYS 6805: Testing Requirements
Research Interests: Computer Science, Software Engineering, Human Computer Interaction, Computer Engineering, Requirements Engineering, and 12 moreComputer Networks, Open Source Software, Software Testing, Software Development, Software Architecture, Databases, Software Quality Engineering, Software, Software Requirement Engineering, Agile software development, IEEE PAPERS, and Science and Technology Studies
UMSL INFSYS 6891: Physical and Environmental Security
Research Interests:
Discussion to walk through Linux commands and basic scripting.
Research Interests: Information Systems, Engineering, Electrical Engineering, Computer Science, Information Technology, and 16 moreTechnology, Open Access, Open Source Software, Linux Kernel, Linux, Open Innovation, GNU/Linux Distribution, Linux Based Systems, Linux Open Source System, Linux (Ubuntu), Debian (Linux), Linux system adminstration, Linux Servers & VPS Servers, Embedded Linux, Kali Linux, and Belajar Linux
Rough translation: Announcer: "Professor Maurice Dawson works on the subject of analysis of intellectual data for the past four years. During the lecture he talked about the different business analytics tools that allow companies to be... more
Rough translation:
Announcer: "Professor Maurice Dawson works on the subject of analysis of intellectual data for the past four years. During the lecture he talked about the different business analytics tools that allow companies to be more competitive"
Dr Mo: "This is a very important subject for any company that strives to succeed in a field with a lot of competition. Any business decision can carry a lot of consequences and if you an a tool that allows for fast and accurate decision making, then your business will grow. This tool is business analytics.
Announcer: "To the lecture were invited a number of representatives from different universities as well as local companies. As well as students from the department of mathematics and informatics."
Student: "For me, the subject is important because I'm in the field of IT management, meaning that I need to analyze data. He showed me what I need to read and learn to be able to grow. How can I apply this information in the real world. Because in reality, business analytics doesn't end just with management or basic investigations."
Announcer: "Besides conducting the lecture, Maurice Dawson also plans to conduct academic studies with representatives from the school from the departments of mathematics and informatics. This event will mark the beginning of a partnership between the State University of Ural and the University of Missouri."
Announcer: "Professor Maurice Dawson works on the subject of analysis of intellectual data for the past four years. During the lecture he talked about the different business analytics tools that allow companies to be more competitive"
Dr Mo: "This is a very important subject for any company that strives to succeed in a field with a lot of competition. Any business decision can carry a lot of consequences and if you an a tool that allows for fast and accurate decision making, then your business will grow. This tool is business analytics.
Announcer: "To the lecture were invited a number of representatives from different universities as well as local companies. As well as students from the department of mathematics and informatics."
Student: "For me, the subject is important because I'm in the field of IT management, meaning that I need to analyze data. He showed me what I need to read and learn to be able to grow. How can I apply this information in the real world. Because in reality, business analytics doesn't end just with management or basic investigations."
Announcer: "Besides conducting the lecture, Maurice Dawson also plans to conduct academic studies with representatives from the school from the departments of mathematics and informatics. This event will mark the beginning of a partnership between the State University of Ural and the University of Missouri."
Research Interests:
Let's Talk Agriculture Live Radio Show Synopsis [1] Ability to develop and maintain small automated irrigation systems using scale-able computers. [2] Cyber terrorism threats to crops, intellectual property, and to direct systems... more
Let's Talk Agriculture Live Radio Show Synopsis
[1] Ability to develop and maintain small automated irrigation systems using scale-able computers.
[2] Cyber terrorism threats to crops, intellectual property, and to direct systems controlling critical infrastructures.
[3] Change management is important to assist farmers moving into the digital age. This can be achieved with using University of The Gambia (UTG) students to work directly with the farmers each semester.
[4] Using remote controlled aircraft to survey land.
[5] Using remote controlled ground vehicles to test soil.
[6] Mobile devices can be used to provide farmers with up to date information regarding changes in agriculture.
[7] Mobile devices being used as a method of communication between farmers.
[8] Mobile banking to increase trade.
[9] Mobile devices to be used in logistics and supply chain management to increase efficiency. This could be used as a gateway to becoming a world provider in cash crops especially to neighboring countries with large populations such as Nigeria, and Senegal.
[10] Use of human computer interaction (HCI) for illiterate farmers to use technology.
[1] Ability to develop and maintain small automated irrigation systems using scale-able computers.
[2] Cyber terrorism threats to crops, intellectual property, and to direct systems controlling critical infrastructures.
[3] Change management is important to assist farmers moving into the digital age. This can be achieved with using University of The Gambia (UTG) students to work directly with the farmers each semester.
[4] Using remote controlled aircraft to survey land.
[5] Using remote controlled ground vehicles to test soil.
[6] Mobile devices can be used to provide farmers with up to date information regarding changes in agriculture.
[7] Mobile devices being used as a method of communication between farmers.
[8] Mobile banking to increase trade.
[9] Mobile devices to be used in logistics and supply chain management to increase efficiency. This could be used as a gateway to becoming a world provider in cash crops especially to neighboring countries with large populations such as Nigeria, and Senegal.
[10] Use of human computer interaction (HCI) for illiterate farmers to use technology.
Research Interests:
As costs around the world continue to rise for education, institutions must become innovative in the ways they teach and grow students. To do this effectively professors and administrative staff should push toward the utilization of Open... more
As costs around the world continue to rise for education, institutions must become innovative in the ways they teach and grow students. To do this effectively professors and administrative staff should push toward the utilization of Open Software (OSS) and virtual tools to enhance or supplement currently available tools. In developing countries OSS applications would allow students the ability to learn critical technological skills for success at small fraction of the cost. OSS also provides faculty members the ability to dissect source code and prepare students for low level software development. It is critical that all institutions look at alternatives in providing training and delivering educational material regardless of limitations going forward as the world continues to be more global due to the increased use of technologies everywhere. Doing this could provide a means of shortening the education gap in many countries. Through reviewing the available technology, possible implementations of these technologies, and the application of these items in graduate coursework could provide a starting point in integrating these tools into academia. When administrators or faculty debate the possibilities of OSS, gaming, and simulation tools this applied research provides a guide for changing the ability to develop students that will be competitive on a global level.
Research Interests:
As more urban schools continue to lose critical funding to stay alive it is essential that the students continue to remain competitive in the global market. The graduation rates of urban schools in many areas are lower than the national... more
As more urban schools continue to lose critical funding to stay alive it is essential that the students continue to remain competitive in the global market. The graduation rates of urban schools in many areas are lower than the national average. And the overall rankings globally are not in. As part of the lower graduation rates in urban schools can be attributed to issues in the household other issues are prevalent. When students of these urban schools graduate it can be assumed that their technology competitiveness in the national and global market is not completive. It is essential to get these students able to compete in needed fields of engineering and computer science as our nation is actively working hard to increase Science, Technology, Engineering, and Mathematics (STEM) fields. As the United States of America (USA) is continually seeking to maintain a strong hold in technology innovation and an effective cyber infrastructure it is clear that without the appropriate personnel to fill slots we will not achieve our goals. Our plan is to use innovative methods to prepare a generation that has been under represented with the appropriate skillets to meet an ever growing demand. With technology costs also continuously rising Open Source Software (OSS) is a solution that allows these students to maximize their technology learning experience.
Research Interests:
As costs around the world continue to rise for education, institutions must become innovative in the ways they teach and grow students. To do this effectively professors and administrative staff should push toward the utilization of Open... more
As costs around the world continue to rise for education, institutions must become innovative in the ways they teach and grow students. To do this effectively professors and administrative staff should push toward the utilization of Open Software (OSS) and virtual tools to enhance or supplement currently available tools. In developing countries OSS applications would allow students the ability to learn critical technological skills for success at small fraction of the cost. OSS also provides faculty members the ability to dissect source code and prepare students for low level software development. It is critical that all institutions look at alternatives in providing training and delivering educational material regardless of limitations going forward as the world continues to be more global due to the increased use of technologies everywhere. Doing this could provide a means of shortening the education gap in many countries. Through reviewing the available technology, possible implementations of these technologies, and the application of these items in graduate coursework could provide a starting point in integrating these tools into academia. When administrators or faculty debate the possibilities of OSS, gaming, and simulation tools this applied research provides a guide for changing the ability to develop students that will be competitive on a global level.
Research Interests: Entrepreneurship, Computer Science, Information Technology, Communication, Globalization, and 11 moreResearch Methodology, Innovation statistics, Africa, Linux, Consumer Behavior, Market Research, Marketing Research, Technological change, Transition Economies, Business & Ethics, and International & Intercultural Communication/Marketing
Research Interests:
Research Interests:
Research Interests:
Research Interests:
"Cyber-based attacks are a particular threat to infrastructure simply because they are relatively difficult to detect and trace. Maurice Dawson, Assistant Professor of Management Information Systems at Alabama A&M University, says: “For... more
"Cyber-based attacks are a particular threat to infrastructure simply because they are relatively difficult to detect and trace. Maurice Dawson, Assistant Professor of Management Information Systems at Alabama A&M University, says: “For criminals, the cyber approach is low risk. You don’t need a bomb, just a couple of laptops on the other side of the world – and you can hide your IP address.”
This research study conducted was of the graduate emerging information technology course. Approximately 18 students were given instructions on how to build virtual machines (VMs). These VMs contained the open source equivalent to... more
This research study conducted was of the graduate emerging information technology course. Approximately 18 students were given instructions on how to build virtual machines (VMs). These VMs contained the open source equivalent to commercially available software applications that charge license fees. The students were required to locate, install, and integrate these open source software (OSS) applications. The primary objective of this study for the MBA students was to measure the OSS and calculate the cost savings to the business enterprise. Once the MBA students concluded their research, they had to generate a presentation and demonstrate their knowledge of the application to their peers. LibreOffice was one of the applications used and discussed during the presentations. LibreOffice contains a word processor program, spreadsheet program, presentation program, graphics editor program and Base. Base is a database management program similar and compatible to Microsoft Office in some versions that have been recently released. What the students found in their data is many companies are also switching to LibreOffice from Microsoft Office to help in cost savings with licensing fees. This study provides a guide as to how OSS helps them strategically management information technology (IT) license costs and maintenance fees.
Call for Chapters Proposals Submission Deadline: June 30, 2015 Full Chapters Due: August 30, 2015 Introduction This handbook of research will explore multiple aspects of homeland security and countermeasures in today's society. This book... more
Call for Chapters
Proposals Submission Deadline: June 30, 2015
Full Chapters Due: August 30, 2015
Introduction
This handbook of research will explore multiple aspects of homeland security and countermeasures in today's society. This book provides insights on the current issues surrounding homeland security threats such as cyber terrorism, natural disasters, border control, civil liberties, unmanned systems and more. Additionally, countermeasures such as network security, law enforcement, intelligence, surveillance, reconnaissance, cyber security, and physical security will be explored. Researchers, practitioners, and professionals will benefit from this publication’s broad perspective.
Objective
This book will aim to provide relevant theoretical frameworks and the latest empirical research findings in the area. It will be written for professionals and researchers who want to improve their understanding of the strategic role of trust at different levels of homeland security and associated countermeasures.
Target Audience
The target audience of this book will be composed of professionals and researchers working in the field of homeland security, cyber security, and intelligence analysis, e.g. military studies, computer science, security engineering, disaster recovery, business continuity, and information technology. Moreover, the book will provide insights and support from practitioners and academia in order to highlight the most debateful aspects in the field.
Recommended Topics
Recommended topics include, but are not limited to, the following:
Military intelligence
Cyber security
Military defense
Business continuity
Disaster recover planning
Unmanned systems
Network security
Physical security
Economic security
Immigration enforcement
Law enforcement
Terrorism
Cyber terrorism
Transportation security
Human trafficking
International engagement
Border security
Civil rights and civil liberties
Disasters
Technology transfer and commercialization
Technology management
Information security
Proposals Submission Deadline: June 30, 2015
Full Chapters Due: August 30, 2015
Introduction
This handbook of research will explore multiple aspects of homeland security and countermeasures in today's society. This book provides insights on the current issues surrounding homeland security threats such as cyber terrorism, natural disasters, border control, civil liberties, unmanned systems and more. Additionally, countermeasures such as network security, law enforcement, intelligence, surveillance, reconnaissance, cyber security, and physical security will be explored. Researchers, practitioners, and professionals will benefit from this publication’s broad perspective.
Objective
This book will aim to provide relevant theoretical frameworks and the latest empirical research findings in the area. It will be written for professionals and researchers who want to improve their understanding of the strategic role of trust at different levels of homeland security and associated countermeasures.
Target Audience
The target audience of this book will be composed of professionals and researchers working in the field of homeland security, cyber security, and intelligence analysis, e.g. military studies, computer science, security engineering, disaster recovery, business continuity, and information technology. Moreover, the book will provide insights and support from practitioners and academia in order to highlight the most debateful aspects in the field.
Recommended Topics
Recommended topics include, but are not limited to, the following:
Military intelligence
Cyber security
Military defense
Business continuity
Disaster recover planning
Unmanned systems
Network security
Physical security
Economic security
Immigration enforcement
Law enforcement
Terrorism
Cyber terrorism
Transportation security
Human trafficking
International engagement
Border security
Civil rights and civil liberties
Disasters
Technology transfer and commercialization
Technology management
Information security
Research Interests: Information Systems, Engineering, Computer Science, Artificial Intelligence, Information Technology, and 22 moreInternational Relations, Political Philosophy, Communication, Information Security, Computer Engineering, Wireless Communications, Database Systems, Intelligence, Network Security, International Security, Computer Networks, Security, Political Science, Homeland Security, Embedded Systems, Security Studies, Wireless Sensor Networks, Intelligent Transportation Systems, Computer Security, Cyber Security, Geographic Information Systems (GIS), and Public Policy
"Call for Chapters Proposals Submission Deadline: February 15, 2014 Full Chapters Due: June 15, 2014 Submission Date: October 15, 2014 Introduction This handbook of research will explore multiple aspects of cyber terrorism and... more
"Call for Chapters
Proposals Submission Deadline: February 15, 2014
Full Chapters Due: June 15, 2014
Submission Date: October 15, 2014
Introduction
This handbook of research will explore multiple aspects of cyber terrorism and cyber crime in today's society. This book provides insights on the negatives uses of technology with comprehensive review of the associated vulnerabilities and mitigations. Researchers, practitioners, and professionals will benefits from this publication’s broad perspective.
Objective
This proposed publication takes an entirely different route in describing digital crime and cyber terrorism. This publication has the potential to aid organizations everywhere to effectively defend their systems.
Target Audience
The handbook of research is expected to get a large amount of attention in the cyber security realm. This will cover all emerging negative uses of technologies which will allow individuals to gain insight so they can better defend these new attacks. This can be used by training organization, intelligence community, and others responsible for network defense.
Recommended Topics
Network and Mobile Security
Virtual Words for Terrorism Training Grounds
Attacking Health Care Devices
Automobiles Access Points
Cyber Terrorism
Cyber Crime
Software Assurance
Exploiting Code Vulnerabilities
Future Predictions of Cyber Crime
Department of Defense Information Assurance Controls
Reverse Engineering
Vulnerabilities in Mixed & Augmented Reality
Vulnerabilities in Google Glass
Systems of Systems Attacks
Unmanned Systems Exploitations
Certification and Accreditation
Cryptosystems
We strongly welcome other topics suggestions, dealing with other negative uses of technology and science such as attacking national infrastructure, cloud computing security, offensive security practices, and other unknown exploits.
Submission Procedure
Researchers are invited to submit on or before February 15, 2014, a 2-3 page chapter proposal clearly explaining the mission and concerns of his or her proposed chapter. Authors of accepted proposals will be notified March 31, 2014 about the status of their proposals and sent chapter guidelines. Authors of accepted proposals will be sent guidelines to prepare the full chapter (7,000 – 11,000 words length). Full chapters are expected to be submitted by June 15, 2014. All submitted chapter will be reviewed on a double-blind review basis. Contributors may also be requested to serve as a reviewer for this project.
Publisher
This handbook of research is scheduled to be published by IGI Global (formerly Idea Group Inc.), publisher of the “Information Science Reference” (formerly Idea Group Reference), “Medical Information Science Reference”, “Business Science Reference”, and “Engineering Science Reference” imprints. For additional information regarding the publisher, please visit www.igi-global.com.. This publication is anticipated to be released early 2015.
Important Dates
1st Proposal Submission Deadline: February 15, 2014
2nd Proposal Submission Deadline: March 15, 2014
Last Call for Proposals: April 15, 2014
Full chapter Submission: June 15, 2014
Review Process: June 15, 2014 –July 30, 2014
Review Results to Authors: August 15, 2014
Revised Chapter Submission: September 15, 2014
Final Acceptance Notifications: September 30, 2014
Submission of Final Chapters: October 15, 2014
Final Deadline: November 30, 2014"
Proposals Submission Deadline: February 15, 2014
Full Chapters Due: June 15, 2014
Submission Date: October 15, 2014
Introduction
This handbook of research will explore multiple aspects of cyber terrorism and cyber crime in today's society. This book provides insights on the negatives uses of technology with comprehensive review of the associated vulnerabilities and mitigations. Researchers, practitioners, and professionals will benefits from this publication’s broad perspective.
Objective
This proposed publication takes an entirely different route in describing digital crime and cyber terrorism. This publication has the potential to aid organizations everywhere to effectively defend their systems.
Target Audience
The handbook of research is expected to get a large amount of attention in the cyber security realm. This will cover all emerging negative uses of technologies which will allow individuals to gain insight so they can better defend these new attacks. This can be used by training organization, intelligence community, and others responsible for network defense.
Recommended Topics
Network and Mobile Security
Virtual Words for Terrorism Training Grounds
Attacking Health Care Devices
Automobiles Access Points
Cyber Terrorism
Cyber Crime
Software Assurance
Exploiting Code Vulnerabilities
Future Predictions of Cyber Crime
Department of Defense Information Assurance Controls
Reverse Engineering
Vulnerabilities in Mixed & Augmented Reality
Vulnerabilities in Google Glass
Systems of Systems Attacks
Unmanned Systems Exploitations
Certification and Accreditation
Cryptosystems
We strongly welcome other topics suggestions, dealing with other negative uses of technology and science such as attacking national infrastructure, cloud computing security, offensive security practices, and other unknown exploits.
Submission Procedure
Researchers are invited to submit on or before February 15, 2014, a 2-3 page chapter proposal clearly explaining the mission and concerns of his or her proposed chapter. Authors of accepted proposals will be notified March 31, 2014 about the status of their proposals and sent chapter guidelines. Authors of accepted proposals will be sent guidelines to prepare the full chapter (7,000 – 11,000 words length). Full chapters are expected to be submitted by June 15, 2014. All submitted chapter will be reviewed on a double-blind review basis. Contributors may also be requested to serve as a reviewer for this project.
Publisher
This handbook of research is scheduled to be published by IGI Global (formerly Idea Group Inc.), publisher of the “Information Science Reference” (formerly Idea Group Reference), “Medical Information Science Reference”, “Business Science Reference”, and “Engineering Science Reference” imprints. For additional information regarding the publisher, please visit www.igi-global.com.. This publication is anticipated to be released early 2015.
Important Dates
1st Proposal Submission Deadline: February 15, 2014
2nd Proposal Submission Deadline: March 15, 2014
Last Call for Proposals: April 15, 2014
Full chapter Submission: June 15, 2014
Review Process: June 15, 2014 –July 30, 2014
Review Results to Authors: August 15, 2014
Revised Chapter Submission: September 15, 2014
Final Acceptance Notifications: September 30, 2014
Submission of Final Chapters: October 15, 2014
Final Deadline: November 30, 2014"
Research Interests: Information Systems, Engineering, Criminology, Computer Science, Software Engineering, and 11 moreCriminal Justice, Computer Vision, Computer Engineering, Science Policy, Network Security, International Security, Computer Networks, Security, Homeland Security, Software Development, and Cyber Security
Note: I am not the owner of this document. Located this online from Lewis-Burke Associates LLC.
Research Interests:
Research Interests:
Medical labs, hospitals, doctor's offices, and medical devices face significant cyber risks. The insecurity of medical devices, including imaging hardware, threatens patient safety. Health organizations are rich with valuable data as... more
Medical labs, hospitals, doctor's offices, and medical devices face significant cyber risks. The insecurity of medical devices, including imaging hardware, threatens patient safety. Health organizations are rich with valuable data as well as weak with information security expertise, protocols, and infrastructure. It is critical for more health organizations to focus creating organizational cultures with processes that offer all employees to fully understand the nature of information security risks and have the ability to be active participants in the minimization and reporting of observable risks. This article will lay a foundation to establish techniques and practices for open door policies.
Research Interests:
Defense Secretary Robert Gates approved the creation of a unified cyber command under the Obama Administration that was focused on cyber operations. This organization was to oversee the protection of government networks against cyber... more
Defense Secretary Robert Gates approved the creation of a unified cyber command under the Obama Administration that was focused on cyber operations. This organization was to oversee the protection of government networks against cyber threats known and unknown. Coupled with growing attacks on national infrastructure, digital theft of intellectual property, and election meddling has the United States government actively working to develop cybersecurity talent. Some of the changes that have come as a result are more specialized degree program accreditation, technical frameworks, and policies to help usher this realization of the need to address the shortage of talent for today's mission.
Research Interests:
Many universities require end of course evaluations for all courses taught as tool for academic accreditation purposes. The reality is that often many academic departments either do not do anything or have no idea what to do when... more
Many universities require end of course evaluations for all courses taught as tool for academic accreditation purposes. The reality is that often many academic departments either do not do anything or have no idea what to do when evaluations continue to be poor. As a result, students have fought back against this process to create their own on-line rating program, Rate My Professor.com, which allows students to give other students insights into who is a quality professor and who is not. Thispaper explores this use of mock teaching simulations, which are also called Micro-teaching approaches,as a quality management tool to improve the way students are taught in Technology Management,Cybersecurity, and Computer Science degree and certificate programs.
Research Interests:
Since the last elections in the United States, France, and other nations, fake news has become a tool to manipulate voters. This creation of fake news creates a problem that ripples through an entire society creating division. However,... more
Since the last elections in the United States, France, and other nations, fake news has become a tool to manipulate voters. This creation of fake news creates a problem that ripples through an entire society creating division. However, the media has not scrutinized enough on data misuse. Daily it appears that there are breaches causing millions of users to have their personal information taken, exposed, and sold on the Dark Web in exchange of encrypted currencies. Recently, news has surfaced of major social media sites allowing emails to be read without user consent. These issues bring upon concern for the misuse of data and more importantly, how can this be used for information warfare and the exploitation of targeted groups through the use of the Internet. It is essential that organizations continuously review current data policies to ensure that they do not become victims of information warfare.
Many developed countries are placing resources to combat the growing threats in cyberspace, and emerging nations are no different. Since 2016, the Dominican Republic is undergoing massive changes within the current government to... more
Many developed countries are placing resources to combat the growing threats in cyberspace, and emerging nations are no different. Since 2016, the Dominican Republic is undergoing massive changes within the current government to prioritize cybersecurity through laws, policies, and doctrine. This initiative is causing politicians, industry, and even government entities such as the national police to start the journey to begin to fully understand what are the issues in cybersecurity as they apply to the nation. It is essential that the security challenges and problems identified are addressed through a process of discovery while mitigating risks. This paper is to present those challenges and offer solutions that can be used to achieve an acceptable level of cyber risk.
Communication and information technology (IT) has developed rapidly within the last decade. As a result, project managers must be prepared to manage the current and future challenges within the project management field, as well as within... more
Communication and information technology (IT) has developed rapidly within the last decade. As a result, project managers must be prepared to manage the current and future challenges within the project management field, as well as within the IT industry. Rapid globalization of business means organizations must significantly increase its capacity to accurately manage information and data. In response to this growing capacity demand, more discussion is needed to develop effective IT project management processes and approaches.