Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content
Maurice Dawson
  • University of Missouri- St. Louis
    Department of Information Systems
    College of Business Administration
    228 Express Scripts Hall
    One University Blvd
    St. Louis, MO 63121-4400 USA
  • 314-516-6288
In the wake of a pandemic, it has been essential that programs move online quickly while remaining the same academic rigor as being on the ground. Therefore the cybersecurity coursework and labs were taught entirely online while... more
In the wake of a pandemic, it has been essential that programs move online quickly while remaining the same academic rigor as being on the ground. Therefore the cybersecurity coursework and labs were taught entirely online while representing real-world scenarios. The College of Computing at Illinois Institute of Technology has recently been actively creating new partnerships, strengthening their cybersecurity, Information Technology, and other computing programs to meet national security needs. These activities have allowed partnerships with the United States Armed Services, Department of Defense, and numerous industry partners. The newly found focus on national security has provided a different perspective on cybersecurity-related to global events and how it can shape those currently, such as political events.
In today's modern digitizing manufacturing landscape, new and emerging technologies can shape how an organization can compete, while others will view this as a necessity to survive as manufacturing has been identified as a critical... more
In today's modern digitizing manufacturing landscape, new and emerging technologies can shape how an organization can compete, while others will view this as a necessity to survive as manufacturing has been identified as a critical infrastructure. Universities struggle to hire university professors that are adequately trained or willing to enter academia due to competitive salary offers in the industry. Meanwhile, the demand for fields such as Artificial Intelligence, data science, and cybersecurity continuously rises with no foreseeable drop in demand in the next several years. This results in organizations deploying technologies with an inadequate staff that understands what new cybersecurity risks they are introducing into the company. Examined are how organizations can potentially mitigate some of the risk associated with integrating these new technologies and developing their workforce to be better prepared for looming changes in technological skill need. With the over a 10 % growth in organizations deploying Artificial Intelligence, the current cybersecurity workforce needs are over half a million. A struggle to find a viable workforce this research paper aims to serve as a guide for Information Technology managers and senior management to foresee the cybersecurity risks that will result from the incorporation of these new technological advances into the organization.
Cybersecurity has gone through several changes that have presented new challenges in recent years, complicated by the rise of cybercrime and digital warfare. With the introduction of militarizing the space domain, it has become apparent... more
Cybersecurity has gone through several changes that have presented new challenges in recent years, complicated by the rise of cybercrime and digital warfare. With the introduction of militarizing the space domain, it has become apparent that we must consider multidomain concepts. Thus, the threat landscape has again shifted, and defenders must become knowledgeable about how the cyber domain crosses into maritime, land, air, and space. The traditional thinking of protecting enterprise systems locked away in a building is no longer. Thus, we have the emergence of cyber warfare and cyber as a fifth domain that brings together maritime, land, space, and air. These domains are not just for the military but the civilian sector as well. Understanding the role of cyber and how it can be used to take advantage or secure the remaining domains will give entities the upper hand in strategy. The technological advancements that pave the way to the mass implementation of the Internet of Things (IoT) and Internet connectivity to everyday devices have led to an explosion in cyberattacks such as breaches resulting in millions of accounts being compromised. (Dawson, Eltayeb, & Omar, 2016). Bad actors such as those focused on criminal activities regarding human trafficking and espionage navigate these domains to circumvent law enforcement agencies globally. We must understand how exploitation, circumvention, and defense needs to occur in a multidomain concept. However, knowing that the cyber domain is a domain that goes through land, maritime, space, and air can be an area that serves as a central point for realizing assured security. Executive Orders (EO), laws, policies, doctrine, and other directives have shaped the landscape of cybersecurity. New EOs have been released that allow a cyber-attack with responsive measures such as one that involves military force. Laws created that impose rights for Personal Identifiable Information (PII) being breached, leaving millions of individuals unprotected. One of these most well-known items is General Data Protection Regulation (GDPR) as it relates to the European Union (EU) and the evolving threats with hyperconnectivity (Martínez, 2019a; Martínez, 2019b). Understanding the role of cybercrime and digital warfare and how they continue to play in shaping the technological landscape is critical. These various actions change the spectrum regarding combating nefarious actors or design errors that leave the system susceptible. As attacks continue to rise from bad actors such as nation-states, terrorists, and other entities, it is essential to understand the threat landscape and select cybersecurity methodologies that can be put in place to provide adequate measures. This document presents the work form a post-doctoral project that provides a perspective of cybersecurity under a information science perspective. This six-month project allows to stress the broadly importance that information and its management (not just within the information security context), and the urgent need to deal with cybersecurity as a societal challenge. The document is organized in four main chapters presenting different but complementary issues, going from high level to a more operational level: National Cybersecurity Education: Bridging Defense to Offense, stressing the importance of societal awareness and education. Emerging Technologies in the Fourth Industrial Revolution, stressing the importance to consider cybersecurity issues as core ones, even to economic and production areas. Nefarious Activities within the Deep Layers of the Internet, stressing the need to be part of digital places where information is traded, shared and, even sometimes, created. The fourth chapter provide a few hints and issues related with software development and test: Software Security Considerations. A final session presents several remarks as Final Thoughts, closing the work pointing out some of the current challenges that we are facing of.
This new era brings new promises of technology that will bring economic and societal benefits. Artificial Intelligence is to be the disruptor for work and even military technological applications. However, developers and end-users will... more
This new era brings new promises of technology that will bring economic and societal benefits. Artificial Intelligence is to be the disruptor for work and even military technological applications. However, developers and end-users will play keys roles in how this technology is developed and ultimately used. Among these two groups, there are cybersecurity concerns that need to be considered. In this paper, the researchers address the process of secure development and testing. Also, for the end-user appropriate methods, procedures, and recommendations are defined that can mitigate the overall use of this technology within an enterprise.
In this paper, the researchers provide a background of human trafficking, review the use and implications of digital currency, and apply machine learning techniques to analyze publicly available trafficking datasets. The study also... more
In this paper, the researchers provide a background of human trafficking, review the use and implications of digital currency, and apply machine learning techniques to analyze publicly available trafficking datasets. The study also provides recommendations related to data collection, management, and analysis to aid the vital fight against individuals' exploitation. The researchers conducted an exploratory data analysis using Python, RapidMiner, and Microsoft Excel towards an iterative review and interpretation of the dataset from the Counter Trafficking Data Collaborative (CTDC). The researchers found that there are more female victims of human trafficking in most age groups than male victims. However, for the age group between 39-47, there was a higher male victim count. Additionally, researchers found that the top five countries affected by human trafficking were the Philippines, Ukraine, Republic of Moldova, USA, and Cambodia. However, it must be noted that there are limitations to the overall data because they are provided voluntarily by organizations, and therefore, there is no equitable distribution of actual results from all countries and players. After mapping the country of origin and country of exploitation, it was made clear that there is a movement of victims from the country of origin to the country of exploitation. Lastly, researchers found that a complex combination of different variables is needed to provide accurate predictions for law enforcement and anti-trafficking organizations to aid them in fighting human trafficking, including country
The Saint Louis Metropolitan Area has been one of the top American cities for tech startups while hosting a substantial number of fortune 500 companies. Usually, this translates into job opportunities for those living and working within... more
The Saint Louis Metropolitan Area has been one of the top American cities for tech startups while hosting a substantial number of fortune 500 companies. Usually, this translates into job opportunities for those living and working within the area. However, the immediate challenge is the lack of women within the workforce that is currently there. While one of the top 50 largest metropolitan areas, Saint Louis has a deficit of women in computer engineering related fields. This paper aims to address those issues while displaying what this city has done to increase the workforce in the metropolitan area. The authors review current initiatives while providing recommendations for enhancing those already present.
In the wake of recent acts of domestic terrorism in Texas, New Zealand, and California authorities have begun investigating social media presence that premeditated harmful acts. In all three instances, the shooters posted their manifesto... more
In the wake of recent acts of domestic terrorism in Texas, New Zealand, and California authorities have begun investigating social media presence that premeditated harmful acts. In all three instances, the shooters posted their manifesto on the Internet and had an online presence on 8chan. The common thread among all shooters is their identification as a white nationalist and their social media site affiliation with Infinitechan. Similarities in the profiles of the shooters include their perceived viewpoints of population groups in regards to their political, ethnic, and social identities. The extreme ideas of the domestic terrorists were hidden behind the anonymity of web forums like 8chan. This paper will provide insight into the forums where domestic terrorists spread their agendas. Also, it will set the foundation for further research on developing a strategic algorithm that compiles and analyzes profiles of relevant users by using OSINT and data analytics techniques.
At the beginning of 2021, the Internet was used to spread words to incite insurrection and violence through social media, incited a pro-Trump mob riot into a U.S. Capitol building. Furthermore, due to recent acts of domestic terrorism in... more
At the beginning of 2021, the Internet was used to spread words to incite insurrection and violence through social media, incited a pro-Trump mob riot into a U.S. Capitol building. Furthermore, due to recent acts of domestic terrorism in Texas, New Zealand, and California, police authorities have begun investigating social media presence that premeditated harmful acts. In all three instances, the shooters posted their manifesto online and had a presence on 8chan. The common thread among all shooters is their identification as a white nationalist and their social media site affiliation with Infinitechan, where they hid their radical ideas. Similarities in the shooters' profiles include their perceived viewpoints of population groups regarding their political, ethnic, and social identities. This paper will provide insight into the forums where domestic terrorists spread their agendas. It will also set the foundation for further research towards a strategic algorithm that compiles and analyses relevant users' profiles by using OSINT and data analytics techniques.
The explosion of the internet has given rise to cybercrimes, online identity theft, and fraud. With the internet, these crimes are able to occur anywhere in the world and limitless to whatever selected target. The anonymity of the... more
The explosion of the internet has given rise to cybercrimes, online identity theft, and fraud. With the internet, these crimes are able to occur anywhere in the world and limitless to whatever selected target. The anonymity of the internet allows criminal activity to flourish, and the number of unsuspecting victims is growing. From script kiddies to nation-states, this new method of internet-enabled crimes has strained governments. This chapter provides insight into how crimes related to online identity theft and fraud are carried out. Examined within this chapter are the evolution of cybercrime, history of identity theft, applications for internet anonymity, and discussion on effects caused by romance scams and data breaches. Finally, recommendations are provided on what organizations and individuals can do to protect themselves against these vicious crimes.
The cybersecurity of critical infrastructures is an essential topic within national and international security as 16 critical infrastructure sectors touch various aspects of American society. Because the failure to provide adequate... more
The cybersecurity of critical infrastructures is an essential topic within national and international security as 16 critical infrastructure sectors touch various aspects of American society. Because the failure to provide adequate cybersecurity controls within the critical infrastructure sectors renders the country open to an attack that could have a debilitating effect on security, national public health, safety, and economic security, this matter is so vital that there is the Presidential Policy Directive (PPD) 21 Critical Infrastructure Security and Resilience advances a national policy to strengthen and maintain secure, functioning and resilient critical infrastructure. An organization identified as the Cybersecurity and Infrastructure Security Agency (CISA) at the Department of Homeland Security (DHS) has the mission to be the risk advisor for the United States (US). Other organizations, such as the National Security Agency (NSA), have approved a specific Knowledge Unit (KU) to address cybersecurity for critical infrastructures associated with doctoral-level granting programs. To address this challenge, it is necessary to identify threats better and defend against them while mitigating risks to an acceptable level. Only then can a nation build a more secure and resilient infrastructure for the future while defending against present-day bad actors as cyberwarfare, cyber espionage, and cybersecurity attacks are the modern-day threats that need to be addressed in planning, designing, implementation, and maintenance. Therefore, the researchers developed a case study reviewing threats against different sectors defined in the PPD.
The growth and development of cybersecurity jobs and careers have created a need for new skilled faculty that can effectively teach the appropriate content to students at all levels. Often instructors are hired based on their academic... more
The growth and development of cybersecurity jobs and careers have created a need for new skilled faculty that can effectively teach the appropriate content to students at all levels. Often instructors are hired based on their academic credentials and professional experience without the use of assessment and faculty development methods to discover if these instructors can teach effectively or even improve the way they teach. Effective instructors have the ability constructively adjust teaching approaches when students are excelling or struggling based on skillful observation and constant assessment. If a student learns something with great ease, perhaps that approach would be of benefit to others. Part of what helps novices develop expertise here is their explicit attempt to understand how and why something works for students. The implementation and use of microteaching can provide a quality improvement approach to help cybersecurity instructors on all levels improve their ability to teach effectively.
African Americans and Hispanic Americans historically have been underrepresented in U.S. jobs in the fields of STEM in large part because of the usability of technology. In this research, the goal was to discover the usability factors... more
African Americans and Hispanic Americans historically have been underrepresented in U.S. jobs in the fields of STEM in large part because of the usability of technology. In this research, the goal was to discover the usability factors relative to operating systems that may limit African Americans and Hispanic Americans from pursuit of computer science higher education. For the purpose of this study, "usability" refers to the "appropriateness of purpose." Categorized by three factors, appropriateness of purpose can be defined as (i) the effectiveness of the users' ability to complete tasks while using technology and the quality or output of those tasks, (ii) the efficiency and the level of resources used in performing tasks, and (iii) the satisfaction or users' reaction to the use of technology (Brooke, 2014). This research examined quantitative analysis based on students' routine computer task knowledge using a survey questionnaire and the SUS. The population included high school students responding to questions on common tasks and usability. A web survey was conducted to assess the measurement and understanding pattern demonstrated by the participants. The quantitative analysis of the computer usability included ANOVA, independent t-tests and orthogonal contrasts. The analysis of the SUS measured usability and learnability. The results of the data analysis showed that the combined African American and Hispanic group has a mean computer usability score that is significantly lower when compared with the other ethnicities and the SUS findings included the highest gap among this most underrepresented group in the STEM field.
With a fast-growing demand for properly trained cy-bersecurity professionals to defend our cyber space and information systems, effective cybersecurity education programs and courses with consistent and reliable quality control and... more
With a fast-growing demand for properly trained cy-bersecurity professionals to defend our cyber space and information systems, effective cybersecurity education programs and courses with consistent and reliable quality control and evaluation are necessary to prepare qualified workforce for the cybersecurity industry. The national Centers of Academic Excellence in Cyber Defense Education (CAE-CDE) designation program jointly sponsored by the US National Security Agency (NSA) and Department of Homeland Security (DHS) is a rigorous certification and national standard for maintaining quality of cybersecurity education. This paper explains the CAE-CDE program criteria and requirements and discusses the important role of the designation in cybersecurity education and workforce development. This paper illustrates the educational value and impact of the CAE-CDE program with case studies of three different institutions: (1) University of Missouri—St. Louis, which has obtained the CAE-CDE and Security Policy Development and Compliance Focus Area designations; (2) American Public University System, which has just completed the application for CAE-CDE; and (3) Robert Morris University, which is in the process of applying for the CAE-CDE designation.
Research Interests:
The threat of cyber terrorism has become a reality with recent attacks such as Stuxtnet, Flame, Sony Pictures, and North Korea's websites. As the Internet of Things (IoT) continues to become more hypercon-nected it will be imperative that... more
The threat of cyber terrorism has become a reality with recent attacks such as Stuxtnet, Flame, Sony Pictures, and North Korea's websites. As the Internet of Things (IoT) continues to become more hypercon-nected it will be imperative that cyber security experts to develop new security architectures for multiple platforms such as mobile devices, laptops, embedded systems, and even wearable displays. The futures of national and international security rely on complex countermeasures to ensure that a proper security posture is maintained during this state of hyperconnectivity. To protect these systems from exploitation of vulnerabilities it is essential to understand current and future threats to include the laws that drive their need to be secured. Examined within this chapter are the potential security related threats with the use of social media, mobile devices, virtual worlds, augmented reality, and mixed reality.
Technology is changing the landscape of learning and teaching in American higher education. The use of virtual worlds enables engineering and technology programs to implement software programs such as Second Life, Open Simulator, or... more
Technology is changing the landscape of learning and teaching in American higher education. The use of virtual worlds enables engineering and technology programs to implement software programs such as Second Life, Open Simulator, or Lumiya to enhance what they may currently already have. Additionally, virtual worlds can add a more dynamic environment in the online classroom for multiple platforms such as the Personal Computer (PC), wearables, and mobile devices. The purpose of this paper is to provide a review of these programs to include how to implement these items into an engineering course. Further detailed in this article is how to incorporate Institute of Electrical and Electronics Engineers (IEEE) documentation and other design guidelines for the projects. Included in this document is a detailed layout of a simulated environment as well as various approaches to structuring and organization for classroom activities.
The Internet of Things describes a world in which smart technologies enable objects with a network to communicate with each other and interface with humans effortlessly. This connected world of convenience and technology does not come... more
The Internet of Things describes a world in which smart technologies enable objects with a network to communicate with each other and interface with humans effortlessly. This connected world of convenience and technology does not come without its drawbacks, as interconnectivity implies hackability. This new world of convenience calls for revolutionary protection strategies to reassess security. Risk management concepts and Information Assurance architecture similar to those practiced in the United States Department of Defense should be used as guidelines for cyber security implementation. This new emerging market that is facilitating the exchange of services and goods requires understanding the associated laws for the implementation of an IoT architecture (Weber, 2010).
Research Interests:
The increasing rates of terrorism in Africa is a growing concern globally, and the realization of such dreadful circumstances demonstrates the need to disclose who is behind such terrible acts. Terrorists and extremist organizations have... more
The increasing rates of terrorism in Africa is a growing concern globally, and the realization of such dreadful circumstances demonstrates the need to disclose who is behind such terrible acts. Terrorists and extremist organizations have been known to use social media, and other forms of Internet-enabled technologies to spread idealism. Analyzing this data could provide valuable information regarding terrorist activity with the use of Open Source Intelligence (OSINT) tools. This study attempts to review the applications and methods that could be used to expose extremist Internet behavior.
Research Interests:
Hyperconnectivity and Internet of Things are changing the landscape of Information Technology (IT). Architectures are becoming more sophisticated while cyber security is slowing adapting to this shift of Internet-enabled technologies in... more
Hyperconnectivity and Internet of Things are changing the landscape of Information Technology (IT). Architectures are becoming more sophisticated while cyber security is slowing adapting to this shift of Internet-enabled technologies in automotive, industrial, consumer, and networking. This slow adoption of proper security controls, defenses, and aggressive measures is leaving individuals vulnerable. This submission explores how policies can be created that automate the process of device connectivity, and how current frameworks can be used to minimize system risks.
Research Interests:
Massive Open Online Courses (MOOCs) are a new phenomenon of course delivery for students, faculty, and administrators to use. As this technology continues to grow in the short term it is essential to develop a method in which Open Source... more
Massive Open Online Courses (MOOCs) are a new phenomenon of course delivery for students, faculty, and administrators to use. As this technology continues to grow in the short term it is essential to develop a method in which Open Source Software (OSS), open source technologies, and open access literature can be incorporated to strengthen the MOOC environment. Strengthening the MOOC environment can be used as a method to increase retention as well as increase enrollment in higher education. As Science, Technology, Engineering, and Mathematics (STEM) programs are going online it is imperative that the tools meet the demands of today's marketplace. This chapter provides insights on these open technology solutions so that current and future MOOCs can be enhanced with little to no cost added.
Research Interests:
Mobile devices are becoming a method to provide an efficient and convenient way to access, find and share information; however, the availability of this information has caused an increase in cyber attacks. Currently, cyber threats range... more
Mobile devices are becoming a method to provide an efficient and convenient way to access, find and share information; however, the availability of this information has caused an increase in cyber attacks. Currently, cyber threats range from Trojans and viruses to botnets and toolkits. Presently, 96% of mobile devices do not have pre-installed security software while approximately 65% of the vulnerabilities are found within the application layer. This lack in security and policy driven systems is an opportunity for malicious cyber attackers to hack into the various popular devices. Traditional security software found in desktop computing platforms, such as firewalls, antivirus, and encryption, is widely used by the general public in mobile devices. Moreover, mobile devices are even more vulnerable than personal desktop computers because more people are using mobile devices to do personal tasks. This review attempts to display the importance of developing a national security policy created for mobile devices in order to protect sensitive and confidential data.
Research Interests:
In the eyes of many private sector organizations, there are a number of current problems with public sector organization's efforts related nontraditional education as well as workforce development. It is also thought that current... more
In the eyes of many private sector organizations, there are a number of current problems with public sector organization's efforts related nontraditional education as well as workforce development. It is also thought that current public sector effort lack an innovative approach to addressing current issues in society as well as emerging educational opportunities. This paper will explore a new model for workforceeducation from both a traditional and nontraditional educational offering to students. The presentation will first address the key role of the private educational entity as well as public educational entity. The private partner will be a key player in addressing the needs assessment and task analysis perspective of creating this partnership. They will also be the drivers of value-based education to meet community needs and industry opportunities. Thus, the private partner will also be able to provide financial support in a more expedient and flexible manner so long as the...
Health Information Technology (IT) has become an important topic within the health community in the last several years. Technology has become intertwined in all facets of our lives from smart phones to simple robotics but the health care... more
Health Information Technology (IT) has become an important topic within the health community in the last several years. Technology has become intertwined in all facets of our lives from smart phones to simple robotics but the health care industry has not fully incorporated all these new technologies in every day practices. However the health care industry is actively working toward a systems concept that allows interoperability as the ones currently in fielded act as independent closed systems. The health care community aims to integrate tools such as tablets, laptops, and Open Source Software (OSS) applications that allow for paperless records to include increasing accuracy in the hospital room with the capture of patient data. Many states must update their status in relation to the Strategic and Operation Plan under the State Cooperative Agreement. Key items of importance are the following; governance, policy/legal, technical infrastructure, business and technical operations, comm...
The mission of the America’s Military Science Department is to commission the future officer leadership of the United States Army and motivate young people to become career servicemen. Reserve Officer Training Corps (ROTC) provides cadets... more
The mission of the America’s Military Science Department is to commission the future officer leadership of the United States Army and motivate young people to become career servicemen. Reserve Officer Training Corps (ROTC) provides cadets a valuable opportunity to build for the future by helping them earn both a college degree and earn a commission as a military officer at the same time. ROTC graduates are leaders, thinkers and decision-makers. They know how to adapt to situations and take charge. According to the changing technological environments to include the ever growing Global War on Terror (GWOT) Intelligence, Surveillance, and Reconnaissance (ISR) has been a key factor in many wars and combat scenarios. To meet the needs at one institution an applied practicum has been applied in the project management graduate program which includes the development and deployment of an Unmanned Air System (UAS). This paper will provide a view of the project as it served two key functions. ...
Colleges and universities have encountered vigorous change in recent years. These changes have created a need for colleges and universities to evolve, change, and adapt. Responding to change often requires changes in organizational... more
Colleges and universities have encountered vigorous change in recent years. These changes have created a need for colleges and universities to evolve, change, and adapt. Responding to change often requires changes in organizational cultures. This applied research study explores the value and benefits of making cultures more adaptive in an unprecedented time of organizational environmental instability
Research Interests:
The invention and active use of PowerPoint in university classroom has transitioned academic teaching from transparencies and overhead projectors into new ages of teaching and learning. The next challenge for professionals has been the... more
The invention and active use of PowerPoint in university classroom has transitioned academic teaching from transparencies and overhead projectors into new ages of teaching and learning. The next challenge for professionals has been the appropriate and effective use of PowerPoint and lectures as it relates to working adults where a differing school of thought exist when lecturing through 50 to 100 PowerPoint slides as an effective way to engage graduate students. Progressive professors are using new tools that offer stories that provide context, relevance, and handles, for knowledge retention for graduate students through the use of case studies, simulations, and videos, including Donald Trump’s The Apprentice. This paper provides contextual examples regarding how to use real world stories with student-centered teaching and learning as a means of engaging graduate students, connecting with them, and providing opportunities for the practical application of course content.
Research Interests:
Defense & Aerospace companies such as Boeing, Raytheon, Rockwell Collins, Harris, COLSA, and many other defense related companies continuously seek well-educated, high energy, and dynamic soldiers to lead in their organizations as... more
Defense & Aerospace companies such as Boeing, Raytheon, Rockwell Collins, Harris, COLSA, and many other defense related companies continuously seek well-educated, high energy, and dynamic soldiers to lead in their organizations as indicated through Dice.com, ClearenceJobs.com, and Careerbuilder.com. Hiring an educated soldier is a good investment since soldiers are knowledgeable about the United States (US) government’s structure, laws, regulations, and terminology. A defense company contractor would generally prefer to hire an officer or senior non commissioned officer from the armed forces, rather than teach a civilian how to appropriately work with and effectively communicate with their US government customers. Not only does it mean that companies fight amongst each others to gain these highly skilled individuals as the number of qualified candidates in engineering and program management are not increasing at the rate needed for employment within the Defense & Aerospace Industry ...
In the modern world, natural disasters are becoming more commonplace, unmanned systems are becoming the norm, and terrorism and espionage are increasingly taking place online. All of these threats have made it necessary for governments... more
In the modern world, natural disasters are becoming more commonplace, unmanned systems are becoming the norm, and terrorism and espionage are increasingly taking place online. All of these threats have made it necessary for governments and organizations to steel themselves against these threats in innovative ways.

Developing Next-Generation Countermeasures for Homeland Security Threat Prevention provides relevant theoretical frameworks and empirical research outlining potential threats while exploring their appropriate countermeasures. This relevant publication takes a broad perspective, from network security, surveillance, reconnaissance, and physical security, all topics are considered with equal weight. Ideal for policy makers, IT professionals, engineers, NGO operators, and graduate students, this book provides an in-depth look into the threats facing modern society and the methods to avoid them.
Research Interests:
After the information released by Edward Snowden, the world realized about the security risks of high surveillance from governments to citizens or among governments, and how it can affect the freedom, democracy, and peace. And... more
After the information released by Edward Snowden, the world realized about the security risks of high surveillance from governments to citizens or among governments, and how it can affect the freedom, democracy, and peace. And organizations such as WikiLeaks has shown just how much data is collected to include the poor security controls in place to protect that information. Research has been carried out for the creation of the necessary tools for the countermeasures to all these surveillance. One of the most potent tools is the Tails system as a complement of The Onion Router (TOR). Even though there are limitations and flaws, the progress has been significant, and we are moving in the right direction. As more individuals and organizations fall under a watchful eye on their Internet activities then maintaining anonymity it not only essential for getting out information but one's safety.
For the development of social entrepreneurs it is imperative that educators embrace the concepts and process of social entrepreneurship (Dees, 1998). Exploration of these concepts in education could prove beneficial to the community... more
For the development of social entrepreneurs it is imperative that educators embrace the concepts and process of social entrepreneurship (Dees, 1998). Exploration of these concepts in education could prove beneficial to the community (Haugh, 2005). This chapter focuses on the positives of introducing social entrepreneurship education at the primary and secondary levels of education. Specifically, its central focus deals with building children's entrepreneurial self-efficacy at a young age. Several benefits, of increasing self-efficacy at a young age, are outlined. Benefits, such as entrepreneurship training, not
Research Interests:
With the rise of Web 2.0, microblogging has become a widely accepted phenomenon for sharing information. Moreover, the Twitter platform has become the tool of choice for universities looking to increase their digital footprint. However,... more
With the rise of Web 2.0, microblogging has become a widely accepted phenomenon for sharing information. Moreover, the Twitter platform has become the tool of choice for universities looking to increase their digital footprint. However, scant research addresses the viability of microblogging as a tool to facilitate knowledge creation practices among higher education students. This paper proposes a model to explain how students, as digital natives, leverage the features of the Twitter microblogging for the transfer of knowledge. Finally, the paper examines the dark side of Twitter as a privacy-leaking platform and issues a call to higher institutions for specific security policies to prevent nefarious use.
Research Interests:
After the information released by Edward Snowden, the world realized about the security risks of high surveillance from governments to citizens or among governments , and how it can affect the freedom, democracy and/or peace. Research has... more
After the information released by Edward Snowden, the world realized about the security risks of high surveillance from governments to citizens or among governments , and how it can affect the freedom, democracy and/or peace. Research has been carried out for the creation of the necessary tools for the countermeasures to all this surveillance. One of the more powerful tools is the Tails system as a complement of The Onion Router (TOR). Even though there are limitations and flaws, the progress has been significant and we are moving in the right direction.
Research Interests:
The threat of cyber terrorism has become a reality with recent attacks such as Stuxtnet, Flame, Sony Pictures, and North Korea's websites. As the Internet of Things (IoT) continues to become more hyperconnected it will be imperative that... more
The threat of cyber terrorism has become a reality with recent attacks such as Stuxtnet, Flame, Sony Pictures, and North Korea's websites. As the Internet of Things (IoT) continues to become more hyperconnected it will be imperative that cyber security experts to develop new security architectures for multiple platforms such as mobile devices, laptops, embedded systems, and even wearable displays. The futures of national and international security rely on complex countermeasures to ensure that a proper security posture is maintained during this state of hyperconnectivity. To protect these systems from exploitation of vulnerabilities it is essential to understand current and future threats to include the laws that drive their need to be secured. Examined within this chapter are the potential security related threats with the use of social media, mobile devices, virtual worlds, augmented reality, and mixed reality.
Research Interests:
Security is a growing concern on the African continent as the Regional Economic Communities (REC) move toward economic integration. Furthermore, these regions collectively make up the African Union (AU) which has an objective to promote... more
Security is a growing concern on the African continent as the Regional Economic Communities (REC) move toward economic integration. Furthermore, these regions collectively make up the African Union (AU) which has an objective to promote peace, security, and stability on the African continent. In recent years, Africa has been plagued with political uprisings, civil wars, extremists, corrupt politicians, and the battle for natural resources. In particular, Kenya and Nigeria are facing Islamic extremists that threaten the foundation of multiple nations. In both countries, they are using military force to combat these threats. This chapter provides insight into these West and East African nations and their means to provide security assurances to their citizens.
Research Interests:
Secure computing is essential as environments continue to become intertwined and hyperconnected. As the Internet of Things (IoT), Web of Things (WoT), and the Internet of Everything (IoE) dominate the landscape of technological platforms,... more
Secure computing is essential as environments continue to become intertwined and hyperconnected. As the Internet of Things (IoT), Web of Things (WoT), and the Internet of Everything (IoE) dominate the landscape of technological platforms, protection these complicated networks is important. The everyday person who wishes to have more devices that allow the ability to be connected needs to be aware of what threats they could be potentially exposing themselves to. Additionally, for the unknowing consumer of everyday products needs to be aware of what it means to have sensors, Radio Frequency IDentification (RFID), Bluetooth, and WiFi enabled products. This submission explores how Availability, Integrity, and Confidentiality (AIC) can be applied to IoT, WoT, and IoE with consideration for the application of these architectures in the defense sector.
Research Interests:
Owing to the increasing demand for reliable products built globally, and through the evolution of machine design, the need for improved and a common communications protocol in different geographical regions has intensified. In this paper,... more
Owing to the increasing demand for reliable products built globally, and through the evolution of machine design, the need for improved and a common communications protocol in different geographical regions has intensified. In this paper, the goal is to reveal that the current protocols used to support disparate communication types in manufacturing have caused complexity in configurations and an increase in monetary overhead for industrial system designers and the end users. Through the simulation of an industrial network, the packet timing, and packet loss between peer-to-peer systems, similar protocol systems will be compared with two dissimilar protocols systems to establish the thesis. The internal validation research method used in this study will reveal the need for an all-inclusive protocol to eliminate the timing and packet loss issues, the systems' configuration complexities, and the need to reduce the monetary overhead currently associated with the machine communications.
Research Interests:
The Internet of Things describes a world in which smart technologies enable objects with a network to communicate with each other and interface with humans effortlessly. This connected world of convenience and technology does not come... more
The Internet of Things describes a world in which smart technologies enable objects with a network to communicate with each other and interface with humans effortlessly. This connected world of convenience and technology does not come without its drawbacks, as interconnectivity implies hackability.

Security Solutions for Hyperconnectivity and the Internet of Things offers insights from cutting-edge research about the strategies and techniques that can be implemented to protect against cyber-attacks. Calling for revolutionary protection strategies to reassess security, this book is an essential resource for programmers, engineers, business professionals, researchers, and advanced students in relevant fields.
Research Interests:
Technology is changing the landscape of learning and teaching in America. The use of virtual worlds enable engineering and technology programs to implement software programs such as Second Life and Open Simulator to enhance what they may... more
Technology is changing the landscape of learning and teaching in America. The use of virtual worlds enable engineering and technology programs to implement software programs such as Second Life and Open Simulator to enhance what they may currently already have. Additionally, virtual worlds can add a more dynamic environment in the online classroom for multiple platforms such as the Personal Computer (PC), wearables, and mobile devices. The purpose of this chapter is to provide a review of these programs to include how to implement these items into an engineering course. Further detailed in this submission is how to incorporate Institute of Electrical and Electronics Engineers (IEEE) documentation and other engineering guidelines into the projects. Included in this chapter is a detailed layout of a simulated environment as well as various approaches of structuring and organization for classroom activities.
Research Interests:
Follow this and additional works at: http://aisel.aisnet.org/sais2016 This material is brought to you by the Southern (SAIS) at AIS Electronic Library (AISeL). It has been accepted for inclusion in SAIS 2016 Proceedings by an authorized... more
Follow this and additional works at: http://aisel.aisnet.org/sais2016 This material is brought to you by the Southern (SAIS) at AIS Electronic Library (AISeL). It has been accepted for inclusion in SAIS 2016 Proceedings by an authorized administrator of AIS Electronic Library (AISeL). For more information, please contact elibrary@aisnet.org.
Research Interests:
Personal Cloud Computing (PCC) is a rapidly growing technology, addressing the market demand of individual users for access to available and reliable resources. But like other new technologies, concerns and issues have surfaced with the... more
Personal Cloud Computing (PCC) is a rapidly growing technology, addressing the market demand of individual users for access to available and reliable resources. But like other new technologies, concerns and issues have surfaced with the adoption of PCC. Users deciding whether to adopt PCC may be concerned about the ease of use, usefulness, or security risks in the cloud. Negative attitudes toward using a technology have been found to negatively impact the success of that technology. The purpose of this study was to understand users' acceptance of PCC. The population sample consisted of individual users within the United States between 18 and 80 years of age. The theoretical framework utilized in this study was based on the technology acceptance model (TAM). A web survey was conducted to assess the measurement and understanding of patterns demonstrated by participants. Our results shows that in spite of the potential benefits of PCC, security and privacy risks are deterring many users from moving towards PCC.*
Research Interests:
The purpose of this empirical study was to test specific factors of behavioral intention to use m-learning in a community college setting using a modified technology acceptance model and antecedent factors suggested by the researcher’s... more
The purpose of this empirical study was to test specific factors of behavioral intention to use m-learning in a community college setting using a modified technology acceptance model and antecedent factors suggested by the researcher’s review of the literature. In addition, the study’s purpose was to expand understanding of behavioral intention to use m-learning and to contribute to the growing body of research. This research model was based on relevant technology acceptance literature. The study examines the significance of “prior use of e-learning” and correlation with the behavioral intention to use m-learning. Existing models have looked at prior use of e-learning in other domains, but not specifically m-learning. Other models and studies have primarily looked at the prior use of e-learning variable as a moderating variable and not one that is directly related to attitude and behavioral intention. The study found that there is a relationship between prior use of e-learning and behavioral intention to use m-learning. This research direction was proposed by Lu and Viehland.
Research Interests:
For the development of social entrepreneurs it is imperative that educators embrace the concepts and process of social entrepreneurship (Dees, 1998). Exploration of these concepts in education could prove beneficial to the community... more
For the development of social entrepreneurs it is imperative that educators embrace the concepts and process of social entrepreneurship (Dees, 1998). Exploration of these concepts in education could prove beneficial to the community (Haugh, 2005). This chapter focuses on the positives of introducing social entrepreneurship education at the primary and secondary levels of education. Specifically, its central focus deals with building children's entrepreneurial self-efficacy at a young age. Several benefits, of increasing self-efficacy at a young age, are outlined. Benefits, such as entrepreneurship training, not only training students, but it helps to prepare them for the new knowledge-based economy. Further, entrepreneurship education should help increase the success and survival rates of women and minority entrepreneurs. Essential to this process, a new curriculum needs to be devised including its means of assessment. Lastly barriers to an entrepreneurship program are discussed; this includes financial, legal, political and negative perceptions of entrepreneurship education.
Research Interests:
Technological advances, although beneficial and progressive, can lead to vulnerabilities in system networks and security. While researchers attempt to find solutions, negative uses of technology continue to create new security threats to... more
Technological advances, although beneficial and progressive, can lead to vulnerabilities in system networks and security. While researchers attempt to find solutions, negative uses of technology continue to create new security threats to users.

New Threats and Countermeasures in Digital Crime and Cyber Terrorism brings together research-based chapters and case studies on security techniques and current methods being used to identify and overcome technological vulnerabilities with an emphasis on security issues in mobile computing and online activities. This book is an essential reference source for researchers, university academics, computing professionals, and upper-level students interested in the techniques, laws, and training initiatives currently being implemented and adapted for secure computing.
Research Interests:

And 40 more

Друзья, мы продолжаем знакомить вас с гостями, посетившими белометаллургическое производство группы ЧТПЗ. В новом выпуске: «Very nice!», «Приятно побывать на лучшем производстве в мире!», «Высота» внушает надежду на будущее!» и другие... more
Друзья, мы продолжаем знакомить вас с гостями, посетившими белометаллургическое производство группы ЧТПЗ.
В новом выпуске: «Very nice!», «Приятно побывать на лучшем производстве в мире!», «Высота» внушает надежду на будущее!» и другие впечатления гостей из США, Татарстана и Москвы.
Не пропустите новые выпуски проекта «Белая металлургия глазами гостей» каждые две недели, ищите в видеороликах себя и своих близких!

Friends , we continue to acquaint you with the guests attending belometallurgicheskoe production team CTRP . In the new issue : "Very nice!", " It's nice to visit the best production in the world !", " Height " inspires hope for the future ! " And other impressions of visitors from the United States, Tatarstan and Moscow. Do not miss new episodes of" White metallurgy eyes guests " every two weeks , look for the videos yourself and your loved ones!
Research Interests:
UMSL INFSYS 6805: Risk Management & Threat Modeling Session [Live Course Chat]
Research Interests:
UMSL INFSYS 6805: Testing Requirements
Research Interests:
UMSL INFSYS 6891: Physical and Environmental Security
Research Interests:
Discussion to walk through Linux commands and basic scripting.
Research Interests:
Rough translation: Announcer: "Professor Maurice Dawson works on the subject of analysis of intellectual data for the past four years. During the lecture he talked about the different business analytics tools that allow companies to be... more
Rough translation:

Announcer: "Professor Maurice Dawson works on the subject of analysis of intellectual data for the past four years. During the lecture he talked about the different business analytics tools that allow companies to be more competitive"

Dr Mo: "This is a very important subject for any company that strives to succeed in a field with a lot of competition. Any business decision can carry a lot of consequences and if you an a tool that allows for fast and accurate decision making, then your business will grow. This tool is business analytics.

Announcer: "To the lecture were invited a number of representatives from different universities as well as local companies. As well as students from the department of mathematics and informatics."

Student: "For me, the subject is important because I'm in the field of IT management, meaning that I need to analyze data. He showed me what I need to read and learn to be able to grow. How can I apply this information in the real world. Because in reality, business analytics doesn't end just with management or basic investigations."

Announcer: "Besides conducting the lecture, Maurice Dawson also plans to conduct academic studies with representatives from the school from the departments of mathematics and informatics. This event will mark the beginning of a partnership between the State University of Ural and the University of Missouri."
Research Interests:
Let's Talk Agriculture Live Radio Show Synopsis [1] Ability to develop and maintain small automated irrigation systems using scale-able computers. [2] Cyber terrorism threats to crops, intellectual property, and to direct systems... more
Let's Talk Agriculture Live Radio Show Synopsis
[1] Ability to develop and maintain small automated irrigation systems using scale-able computers.
[2] Cyber terrorism threats to crops, intellectual property, and to direct systems controlling critical infrastructures.
[3] Change management is important to assist farmers moving into the digital age.  This can be achieved with using University of The Gambia (UTG) students to work directly with the farmers each semester.
[4] Using remote controlled aircraft to survey land.
[5] Using remote controlled ground vehicles to test soil.
[6] Mobile devices can be used to provide farmers with up to date information regarding changes in agriculture.
[7] Mobile devices being used as a method of communication between farmers.
[8] Mobile banking to increase trade.
[9] Mobile devices to be used in logistics and supply chain management to increase efficiency.  This could be used as a gateway to becoming a world provider in cash crops especially to neighboring countries with large populations such as Nigeria, and Senegal.
[10] Use of human computer interaction (HCI) for illiterate farmers to use technology.
As costs around the world continue to rise for education, institutions must become innovative in the ways they teach and grow students. To do this effectively professors and administrative staff should push toward the utilization of Open... more
As costs around the world continue to rise for education, institutions must become innovative in the ways they teach and grow students. To do this effectively professors and administrative staff should push toward the utilization of Open Software (OSS) and virtual tools to enhance or supplement currently available tools. In developing countries OSS applications would allow students the ability to learn critical technological skills for success at small fraction of the cost. OSS also provides faculty members the ability to dissect source code and prepare students for low level software development. It is critical that all institutions look at alternatives in providing training and delivering educational material regardless of limitations going forward as the world continues to be more global due to the increased use of technologies everywhere. Doing this could provide a means of shortening the education gap in many countries. Through reviewing the available technology, possible implementations of these technologies, and the application of these items in graduate coursework could provide a starting point in integrating these tools into academia. When administrators or faculty debate the possibilities of OSS, gaming, and simulation tools this applied research provides a guide for changing the ability to develop students that will be competitive on a global level.
As more urban schools continue to lose critical funding to stay alive it is essential that the students continue to remain competitive in the global market. The graduation rates of urban schools in many areas are lower than the national... more
As more urban schools continue to lose critical funding to stay alive it is essential that the students continue to remain competitive in the global market. The graduation rates of urban schools in many areas are lower than the national average. And the overall rankings globally are not in. As part of the lower graduation rates in urban schools can be attributed to issues in the household other issues are prevalent. When students of these urban schools graduate it can be assumed that their technology competitiveness in the national and global market is not completive. It is essential to get these students able to compete in needed fields of engineering and computer science as our nation is actively working hard to increase Science, Technology, Engineering, and Mathematics (STEM) fields. As the United States of America (USA) is continually seeking to maintain a strong hold in technology innovation and an effective cyber infrastructure it is clear that without the appropriate personnel to fill slots we will not achieve our goals. Our plan is to use innovative methods to prepare a generation that has been under represented with the appropriate skillets to meet an ever growing demand. With technology costs also continuously rising Open Source Software (OSS) is a solution that allows these students to maximize their technology learning experience.
As costs around the world continue to rise for education, institutions must become innovative in the ways they teach and grow students. To do this effectively professors and administrative staff should push toward the utilization of Open... more
As costs around the world continue to rise for education, institutions must become innovative in the ways they teach and grow students. To do this effectively professors and administrative staff should push toward the utilization of Open Software (OSS) and virtual tools to enhance or supplement currently available tools.  In developing countries OSS applications would allow students the ability to learn critical technological skills for success at small fraction of the cost.  OSS also provides faculty members the ability to dissect source code and prepare students for low level software development.  It is critical that all institutions look at alternatives in providing training and delivering educational material regardless of limitations going forward as the world continues to be more global due to the increased use of technologies everywhere.  Doing this could provide a means of shortening the education gap in many countries.  Through reviewing the available technology, possible implementations of these technologies, and the application of these items in graduate coursework could provide a starting point in integrating these tools into academia.  When administrators or faculty debate the possibilities of OSS, gaming, and simulation tools this applied research provides a guide for changing the ability to develop students that will be competitive on a global level.
Research Interests:
Research Interests:
Research Interests:
As costs globally continue to rise for education, institutions must become innovative in the ways they deliver the educational labs and other instructional materials.[1] This delivery can be done effectively if professors and... more
As costs globally continue to rise for education, institutions must become innovative in the ways they deliver the educational labs and other instructional materials.[1] This delivery can be done effectively if professors and administrative staff push toward the insertion of Open Source Software (OSS) and virtual tools to enhance or supplement currently available tools. In developing countries, OSS applications could allow students the ability to learn critical technological skills for success at small fraction of the cost.[2]
"Cyber-based attacks are a particular threat to infrastructure simply because they are relatively difficult to detect and trace. Maurice Dawson, Assistant Professor of Management Information Systems at Alabama A&M University, says: “For... more
"Cyber-based attacks are a particular threat to infrastructure simply because  they are relatively difficult to detect and trace. Maurice Dawson, Assistant Professor of Management Information Systems at Alabama A&M University, says: “For criminals, the cyber approach is low risk. You don’t need a bomb, just a couple of laptops on the other side of the world – and you can hide your IP address.”
This research study conducted was of the graduate emerging information technology course. Approximately 18 students were given instructions on how to build virtual machines (VMs). These VMs contained the open source equivalent to... more
This research study conducted was of the graduate emerging information technology course. Approximately 18 students were given instructions on how to build virtual machines (VMs). These VMs contained the open source equivalent to commercially available software applications that charge license fees. The students were required to locate, install, and integrate these open source software (OSS) applications. The primary objective of this study for the MBA students was to measure the OSS and calculate the cost savings to the business enterprise. Once the MBA students concluded their research, they had to generate a presentation and demonstrate their knowledge of the application to their peers. LibreOffice was one of the applications used and discussed during the presentations. LibreOffice contains a word processor program, spreadsheet program, presentation program, graphics editor program and Base. Base is a database management program similar and compatible to Microsoft Office in some versions that have been recently released. What the students found in their data is many companies are also switching to LibreOffice from Microsoft Office to help in cost savings with licensing fees. This study provides a guide as to how OSS helps them strategically management information technology (IT) license costs and maintenance fees.
Call for Chapters Proposals Submission Deadline: June 30, 2015 Full Chapters Due: August 30, 2015 Introduction This handbook of research will explore multiple aspects of homeland security and countermeasures in today's society. This book... more
Call for Chapters
Proposals Submission Deadline: June 30, 2015
Full Chapters Due: August 30, 2015

Introduction
This handbook of research will explore multiple aspects of homeland security and countermeasures in today's society. This book provides insights on the current issues surrounding homeland security threats such as cyber terrorism, natural disasters, border control, civil liberties, unmanned systems and more. Additionally, countermeasures such as network security, law enforcement, intelligence, surveillance, reconnaissance, cyber security, and physical security will be explored. Researchers, practitioners, and professionals will benefit from this publication’s broad perspective.

Objective
This book will aim to provide relevant theoretical frameworks and the latest empirical research findings in the area. It will be written for professionals and researchers who want to improve their understanding of the strategic role of trust at different levels of homeland security and associated countermeasures.

Target Audience
The target audience of this book will be composed of professionals and researchers working in the field of homeland security, cyber security, and intelligence analysis, e.g. military studies, computer science, security engineering, disaster recovery, business continuity, and information technology. Moreover, the book will provide insights and support from practitioners and academia in order to highlight the most debateful aspects in the field.

Recommended Topics
Recommended topics include, but are not limited to, the following:
Military intelligence
Cyber security
Military defense
Business continuity
Disaster recover planning
Unmanned systems
Network security
Physical security
Economic security
Immigration enforcement
Law enforcement
Terrorism
Cyber terrorism
Transportation security
Human trafficking
International engagement
Border security
Civil rights and civil liberties
Disasters
Technology transfer and commercialization
Technology management
Information security
Research Interests:
"Call for Chapters Proposals Submission Deadline: February 15, 2014 Full Chapters Due: June 15, 2014 Submission Date: October 15, 2014 Introduction This handbook of research will explore multiple aspects of cyber terrorism and... more
"Call for Chapters
Proposals Submission Deadline: February 15, 2014
Full Chapters Due: June 15, 2014
Submission Date: October 15, 2014

Introduction
This handbook of research will explore multiple aspects of cyber terrorism and cyber crime in today's society. This book provides insights on the negatives uses of technology with comprehensive review of the associated vulnerabilities and mitigations. Researchers, practitioners, and professionals will benefits from this publication’s broad perspective.

Objective
This proposed publication takes an entirely different route in describing digital crime and cyber terrorism. This publication has the potential to aid organizations everywhere to effectively defend their systems.

Target Audience
The handbook of research is expected to get a large amount of attention in the cyber security realm. This will cover all emerging negative uses of technologies which will allow individuals to gain insight so they can better defend these new attacks. This can be used by training organization, intelligence community, and others responsible for network defense.

Recommended Topics
Network and Mobile Security
Virtual Words for Terrorism Training Grounds
Attacking Health Care Devices
Automobiles Access Points
Cyber Terrorism
Cyber Crime
Software Assurance
Exploiting Code Vulnerabilities
Future Predictions of Cyber Crime
Department of Defense Information Assurance Controls
Reverse Engineering
Vulnerabilities in Mixed & Augmented Reality
Vulnerabilities in Google Glass
Systems of Systems Attacks
Unmanned Systems Exploitations
Certification and Accreditation
Cryptosystems

We strongly welcome other topics suggestions, dealing with other negative uses of technology and science such as attacking national infrastructure, cloud computing security, offensive security practices, and other unknown exploits.

Submission Procedure
Researchers are invited to submit on or before February 15, 2014, a 2-3 page chapter proposal clearly explaining the mission and concerns of his or her proposed chapter. Authors of accepted proposals will be notified March 31, 2014 about the status of their proposals and sent chapter guidelines. Authors of accepted proposals will be sent guidelines to prepare the full chapter (7,000 – 11,000 words length). Full chapters are expected to be submitted by June 15, 2014. All submitted chapter will be reviewed on a double-blind review basis. Contributors may also be requested to serve as a reviewer for this project.

Publisher
This handbook of research is scheduled to be published by IGI Global (formerly Idea Group Inc.), publisher of the “Information Science Reference” (formerly Idea Group Reference), “Medical Information Science Reference”, “Business Science Reference”, and “Engineering Science Reference” imprints. For additional information regarding the publisher, please visit www.igi-global.com.. This publication is anticipated to be released early 2015.

Important Dates
1st Proposal Submission Deadline: February 15, 2014
2nd Proposal Submission Deadline: March 15, 2014
Last Call for Proposals: April 15, 2014
Full chapter Submission: June 15, 2014
Review Process: June 15, 2014 –July 30, 2014
Review Results to Authors: August 15, 2014
Revised Chapter Submission: September 15, 2014
Final Acceptance Notifications: September 30, 2014
Submission of Final Chapters: October 15, 2014
Final Deadline: November 30, 2014"
Note: I am not the owner of this document.  Located this online from Lewis-Burke Associates LLC.
Research Interests:
Research Interests:
Medical labs, hospitals, doctor's offices, and medical devices face significant cyber risks. The insecurity of medical devices, including imaging hardware, threatens patient safety. Health organizations are rich with valuable data as... more
Medical labs, hospitals, doctor's offices, and medical devices face significant cyber risks. The insecurity of medical devices, including imaging hardware, threatens patient safety. Health organizations are rich with valuable data as well as weak with information security expertise, protocols, and infrastructure. It is critical for more health organizations to focus creating organizational cultures with processes that offer all employees to fully understand the nature of information security risks and have the ability to be active participants in the minimization and reporting of observable risks. This article will lay a foundation to establish techniques and practices for open door policies.
Defense Secretary Robert Gates approved the creation of a unified cyber command under the Obama Administration that was focused on cyber operations. This organization was to oversee the protection of government networks against cyber... more
Defense Secretary Robert Gates approved the creation of a unified cyber command under the Obama Administration that was focused on cyber operations. This organization was to oversee the protection of government networks against cyber threats known and unknown. Coupled with growing attacks on national infrastructure, digital theft of intellectual property, and election meddling has the United States government actively working to develop cybersecurity talent. Some of the changes that have come as a result are more specialized degree program accreditation, technical frameworks, and policies to help usher this realization of the need to address the shortage of talent for today's mission.
Many universities require end of course evaluations for all courses taught as tool for academic accreditation purposes. The reality is that often many academic departments either do not do anything or have no idea what to do when... more
Many universities require end of course evaluations for all courses taught as tool for academic accreditation purposes. The reality is that often many academic departments either do not do anything or have no idea what to do when evaluations continue to be poor. As a result, students have fought back against this process to create their own on-line rating program, Rate My Professor.com, which allows students to give other students insights into who is a quality professor and who is not. Thispaper explores this use of mock teaching simulations, which are also called Micro-teaching approaches,as a quality management tool to improve the way students are taught in Technology Management,Cybersecurity, and Computer Science degree and certificate programs.
Since the last elections in the United States, France, and other nations, fake news has become a tool to manipulate voters. This creation of fake news creates a problem that ripples through an entire society creating division. However,... more
Since the last elections in the United States, France, and other nations, fake news has become a tool to manipulate voters. This creation of fake news creates a problem that ripples through an entire society creating division. However, the media has not scrutinized enough on data misuse. Daily it appears that there are breaches causing millions of users to have their personal information taken, exposed, and sold on the Dark Web in exchange of encrypted currencies. Recently, news has surfaced of major social media sites allowing emails to be read without user consent. These issues bring upon concern for the misuse of data and more importantly, how can this be used for information warfare and the exploitation of targeted groups through the use of the Internet. It is essential that organizations continuously review current data policies to ensure that they do not become victims of information warfare.
Many developed countries are placing resources to combat the growing threats in cyberspace, and emerging nations are no different. Since 2016, the Dominican Republic is undergoing massive changes within the current government to... more
Many developed countries are placing resources to combat the growing threats in cyberspace, and emerging nations are no different. Since 2016, the Dominican Republic is undergoing massive changes within the current government to prioritize cybersecurity through laws, policies, and doctrine. This initiative is causing politicians, industry, and even government entities such as the national police to start the journey to begin to fully understand what are the issues in cybersecurity as they apply to the nation. It is essential that the security challenges and problems identified are addressed through a process of discovery while mitigating risks. This paper is to present those challenges and offer solutions that can be used to achieve an acceptable level of cyber risk.
Communication and information technology (IT) has developed rapidly within the last decade. As a result, project managers must be prepared to manage the current and future challenges within the project management field, as well as within... more
Communication and information technology (IT) has developed rapidly within the last decade. As a result, project managers must be prepared to manage the current and future challenges within the project management field, as well as within the IT industry. Rapid globalization of business means organizations must significantly increase its capacity to accurately manage information and data. In response to this growing capacity demand, more discussion is needed to develop effective IT project management processes and approaches.