Author of fifteen professional books and over two hundred articles and refereed papers. Distinguished Visitor (lecturer) of the IEEE and Member of the Editorial Board, Computers and Security. Former Chair of Workforce Training and Education, DHS National Software Assurance initiative. Professor and Graduate Program Director Cybersecurity Program University of Detroit Mercy.
This chapter presents a comprehensive quantitative management model for information technology (I... more This chapter presents a comprehensive quantitative management model for information technology (IT). It is assessment based and can be easily implemented without imposing an unacceptable organizational-change solution. It supplies detailed information about the functioning of processes, which will allow managers to both effectively oversee operations, as well as assess their prospective and ongoing risks of execution.
Acquisition is the most common method for introducing new technology into organizations, but secu... more Acquisition is the most common method for introducing new technology into organizations, but security and integrity are difficult to guarantee using conventional acquisition techniques. Best practices for secure acquisition are an essential part of the general education process in cybersecurity.
This chapter presents a comprehensive quantitative management model for information technology (I... more This chapter presents a comprehensive quantitative management model for information technology (IT). It is assessment based and can be easily implemented without imposing an unacceptable organizational-change solution. It supplies detailed information about the functioning of processes, which will allow managers to both effectively oversee operations, as well as assess their prospective and ongoing risks of execution.
Acquisition is the most common method for introducing new technology into organizations, but secu... more Acquisition is the most common method for introducing new technology into organizations, but security and integrity are difficult to guarantee using conventional acquisition techniques. Best practices for secure acquisition are an essential part of the general education process in cybersecurity.
Uploads
Papers by Dan Shoemaker