Open Access. Powered by Scholars. Published by Universities.®

Business Commons

Open Access. Powered by Scholars. Published by Universities.®

PDF

Maurice Dawson

Selected Works

Discipline
Keyword
Publication Year

Articles 1 - 26 of 26

Full-Text Articles in Business

Massive Open Online Courses: Integrating Open Source Technology And Open Access Literature Into Technology Based Degrees, Maurice Dawson, Sharon Burton, Dustin Bessette, Jorja Wright Dec 2016

Massive Open Online Courses: Integrating Open Source Technology And Open Access Literature Into Technology Based Degrees, Maurice Dawson, Sharon Burton, Dustin Bessette, Jorja Wright

Maurice Dawson

Massive Open Online Courses (MOOCs) are a new phenomenon of course delivery for students, faculty, and administrators to use.  As this technology continues to grow in the short term it is essential to develop a method in which Open Source Software (OSS), open source technologies, and open access literature can be incorporated to strengthen the MOOC environment. Strengthening the MOOC environment can be used as a method to increase retention as well as increase enrollment in higher education.  As Science, Technology, Engineering, and Mathematics (STEM) programs are going online it is imperative that the tools meet the demands of today’s …


Mobile Devices: The Case For Cyber Security Hardened Systems, Maurice Dawson, Jorja Wright, Marwan Omar Dec 2015

Mobile Devices: The Case For Cyber Security Hardened Systems, Maurice Dawson, Jorja Wright, Marwan Omar

Maurice Dawson

Mobile devices are becoming a method to provide an efficient and convenient way to access, find and share information; however, the availability of this information has caused an increase in cyber attacks. Currently, cyber threats range from Trojans and viruses to botnets and toolkits. Presently, 96% of mobile devices do not have pre-installed security software while approximately 65% of the vulnerabilities are found within the application layer. This lack in security and policy driven systems is an opportunity for malicious cyber attackers to hack into the various popular devices. Traditional security software found in desktop computing platforms, such as firewalls, …


Nurturing Social Entrepreneurship And Building Social Entrepreneurial Self-Efficacy: Focusing On Primary And Secondary Schooling To Develop Future Social Entrepreneurs, Nareatha Studdard, Maurice Dawson, Sharon Burton, Naporshia Jackson, Brian Leonard, Williams Quisenberry, Emad Bellevue Dec 2015

Nurturing Social Entrepreneurship And Building Social Entrepreneurial Self-Efficacy: Focusing On Primary And Secondary Schooling To Develop Future Social Entrepreneurs, Nareatha Studdard, Maurice Dawson, Sharon Burton, Naporshia Jackson, Brian Leonard, Williams Quisenberry, Emad Bellevue

Maurice Dawson

For the development of social entrepreneurs it is imperative that educators embrace the concepts and process of social entrepreneurship (Dees, 1998). Exploration of these concepts in education could prove beneficial to the community (Haugh, 2005). This chapter focuses on the positives of introducing social entrepreneurship education at the primary and secondary levels of education. Specifically, its central focus deals with building children's entrepreneurial self-efficacy at a young age. Several benefits, of increasing self-efficacy at a young age, are outlined. Benefits, such as entrepreneurship training, not only training students, but it helps to prepare them for the new knowledge-based economy. Further, …


Mobile Devices: The Case For Cyber Security Hardened Systems, Maurice Dawson, Jorja Wright, Marwan Omar Dec 2014

Mobile Devices: The Case For Cyber Security Hardened Systems, Maurice Dawson, Jorja Wright, Marwan Omar

Maurice Dawson

Mobile devices are becoming a method to provide an efficient and convenient way to access, find and share information; however, the availability of this information has caused an increase in cyber attacks. Currently, cyber threats range from Trojans and viruses to botnets and toolkits. Presently, 96% of mobile devices do not have pre-installed security software while approximately 65% of the vulnerabilities are found within the application layer. This lack in security and policy driven systems is an opportunity for malicious cyber attackers to hack into the various popular devices. Traditional security software found in desktop computing platforms, such as firewalls, …


Advances In Technology Project Management: Review Of Open Source Software Integration, Maurice Dawson, Brian Leonard, Emad Rahim Dec 2014

Advances In Technology Project Management: Review Of Open Source Software Integration, Maurice Dawson, Brian Leonard, Emad Rahim

Maurice Dawson

As organizations must continually drive down costs of software-driven projects, they need to evaluate the Systems Development Life Cycle (SDLC) and other software-based design methodologies. These methodologies include looking at software-based alternatives that could save a significant amount of money by reducing the amount of proprietary software. This chapter explores the use and integration of Open Source Software (OSS) in software-driven projects to include in enterprise organizations. Additionally, the legalities of the GNU General Public License (GPL), Lesser General Public License (LGPL), Berkeley Software Distribution (BSD), and Creative Commons are explored with the integration of these OSS solutions into organizations. …


A Brief Review Of New Threats And Countermeasures In Digital Crime And Cyber Terrorism, Maurice Dawson Dec 2014

A Brief Review Of New Threats And Countermeasures In Digital Crime And Cyber Terrorism, Maurice Dawson

Maurice Dawson

Cyber security is becoming the cornerstone of national security policies in many countries around the world as it is an interest to many stakeholders, including utilities, regulators, energy markets, government entities, and even those that wish to exploit the cyber infrastructure. Cyber warfare is quickly becoming the method of warfare and the tool of military strategists. Additionally, it is has become a tool for governments to aid or exploit for their own personal benefits. For cyber terrorists there has been an overwhelmingly abundance of new tools and technologies available that have allowed criminal acts to occur virtually anywhere in the …


Understanding The Methods Behind Cyber Terrorism, Maurice E. Dawson Jr., Marwan Omar, Jonathan Abramson Dec 2014

Understanding The Methods Behind Cyber Terrorism, Maurice E. Dawson Jr., Marwan Omar, Jonathan Abramson

Maurice Dawson

Cyber security has become a matter of national, international, economic, and societal importance that affects multiple nations (Walker, 2012). Since the 1990s users have exploited vulnerabilities to gain access to networks for malicious purposes. In recent years the number of attacks on U.S. networks has continued to grow at an exponential rate. This includes malicious embedded code, exploitation of backdoors, and more. These attacks can be initiated from anywhere in the world from behind a computer with a masked Internet Protocol (IP) address. This type of warfare, cyber warfare, changes the landscape of war itself (Beidleman, 2009). This type of …


Open Source Software To Enhance The Stem Learning Environment, Maurice Dawson, Imad Al Saeed, Jorja Wright, Festus Onyegbula Dec 2014

Open Source Software To Enhance The Stem Learning Environment, Maurice Dawson, Imad Al Saeed, Jorja Wright, Festus Onyegbula

Maurice Dawson

This chapter examines the use of Open Source Software (OSS) technologies that can be used to improve the learning of Science, Technology, Engineering, and Mathematics (STEM). Explored are the various methods that can be utilized to improve the percentage of STEM majors in the American educational system with resources such as: Open Source as Alternative (OSALT), virtualization, cloud computing, Linux distributions, open source programming, and open source hardware platforms. Increasing the amount of students that pursue STEM majors is important because the projected job growth in the STEM field compared to non-STEM jobs is 33%. OSALT provides cost-effective alternatives to …


Advances In Technology Project Management: Review Of Open Source Software Integration, Maurice Dawson, Brian Leonard, Emad Rahim Dec 2014

Advances In Technology Project Management: Review Of Open Source Software Integration, Maurice Dawson, Brian Leonard, Emad Rahim

Maurice Dawson

As organizations must continually drive down costs of software-driven projects, they need to evaluate the Systems Development Life Cycle (SDLC) and other software-based design methodologies. These methodologies include looking at software-based alternatives that could save a significant amount of money by reducing the amount of proprietary software. This chapter explores the use and integration of Open Source Software (OSS) in software-driven projects to include in enterprise organizations. Additionally, the legalities of the GNU General Public License (GPL), Lesser General Public License (LGPL), Berkeley Software Distribution (BSD), and Creative Commons are explored with the integration of these OSS solutions into organizations. …


Flipped Technological Training And Development Using Quality Systems Management In The Public Services Field, Dustin Bessette, Sharon Burton, Maurice Dawson Jun 2014

Flipped Technological Training And Development Using Quality Systems Management In The Public Services Field, Dustin Bessette, Sharon Burton, Maurice Dawson

Maurice Dawson

Training and development is ideal for businesses process improvements in many public service fields. Education, development, and training tools are not new concepts, but are ideal, crucial, and responsive in the central utilization of employee training systems for public service fields. The need for public workforce has increased and demanded accelerated technological training and development process that have positive value and achievable gains. One method to surge this problem is to flip the technological training and development tools that have been issued and over used in the past. These tools not only hold back vicious potential from employees, but employees …


Open Source Software To Enhance The Stem Learning Environment, Maurice E. Dawson Jr., Imad Al Saeed, Jorja Wright, Festus Onyegbula Dec 2013

Open Source Software To Enhance The Stem Learning Environment, Maurice E. Dawson Jr., Imad Al Saeed, Jorja Wright, Festus Onyegbula

Maurice Dawson

This chapter examines the use of Open Source Software (OSS) technologies that can be used to improve the learning of Science, Technology, Engineering, and Mathematics (STEM). Explored are the various methods that can be utilized to improve the percentage of STEM majors in the American educational system with resources such as: Open Source as Alternative (OSALT), virtualization, cloud computing, Linux distributions, open source programming, and open source hardware platforms. Increasing the amount of students that pursue STEM majors is important because the projected job growth in the STEM field compared to non-STEM jobs is 33%. OSALT provides cost-effective alternatives to …


The Future Of National And International Security On The Internet, Maurice Dawson, Marwan Omar, Jonathan Abramson, Dustin Bessette Dec 2013

The Future Of National And International Security On The Internet, Maurice Dawson, Marwan Omar, Jonathan Abramson, Dustin Bessette

Maurice Dawson

Hyperconnectivity is a growing trend that is driving cyber security experts to develop new security architectures for multiple platforms such as mobile devices, laptops, and even wearable displays. The futures of national and international security rely on complex countermeasures to ensure that a proper security posture is maintained during this state of hyperconnectivity. To protect these systems from exploitation of vulnerabilities it is essential to understand current and future threats to include the laws that drive their need to be secured. Examined within this chapter are the potential security-related threats with the use of social media, mobile devices, virtual worlds, …


Fostering Entrepreneurship And Building Entrepreneurial Self-Efficacy In Primary And Secondary Education, Nareatha Studdard, Maurice Dawson, Naporshia Jackson Nov 2013

Fostering Entrepreneurship And Building Entrepreneurial Self-Efficacy In Primary And Secondary Education, Nareatha Studdard, Maurice Dawson, Naporshia Jackson

Maurice Dawson

This paper focuses on the positives of introducing entrepreneurship education at the primary and secondary levels of education. Specifically, its central focus deals with building children’s entrepreneurial self-efficacy at a young age. Several benefits, of increasing self-efficacy at a young age, are outlined. Benefits, such as entrepreneurship training, not only train students but, it helps to prepare them for the new knowledge based economy. Further, entrepreneurship education should help increase the success and survival rates of women and minority entrepreneurs. Essential to this process, a new curriculum needs to be devised including its means of assessment. Lastly barriers to an …


Transforming Information Systems And Computer Science Education With Virtualization, Maurice E. Dawson Jr., Jorja Wright, Jonathan Abramson Dec 2012

Transforming Information Systems And Computer Science Education With Virtualization, Maurice E. Dawson Jr., Jorja Wright, Jonathan Abramson

Maurice Dawson

This paper will propose an innovative method to transform information systems (IS) and computer science education on a global scale. This method will introduce the use of virtualization and cloud computing combined with open source software (OSS) in higher education. This will allow for those studying IS and computer science to work independently on projects anywhere in the world from a baseline image that has been developed with information assurance (IA) controls. Additionally, this will allow professors and course developers to deploy their own customized virtual machines (VMs) to be used with the course. These VMs will host their own …


Research In Progress-Defending Android Smartphones From Malware Attacks, Marwan Omar, Maurice E. Dawson Jr. Dec 2012

Research In Progress-Defending Android Smartphones From Malware Attacks, Marwan Omar, Maurice E. Dawson Jr.

Maurice Dawson

Smart phones are becoming enriched with confidential information due to their powerful computational capabilities and attractive communications features. The Android smart phone is one of the most widely used platforms by businesses and users alike. This is partially because Android smart phones use the free, open-source Linux as the underlying operating system, which allows development of applications by any software developer. This research study aims to explore security risks associated with the use of Android smart phones and the sensitive information they contain, the researcher devised a survey questionnaire to investigate and further understand security threats targeting Android smart phones. …


Importance Of Integrating Information Technology Related Curriculum In American Inner City Schools, Jorja Wright, Maurice E. Dawson Jr. Dec 2012

Importance Of Integrating Information Technology Related Curriculum In American Inner City Schools, Jorja Wright, Maurice E. Dawson Jr.

Maurice Dawson

This paper examines the significance of integrating Information Technology (IT) into the inner city K - 12 educational curriculum. Educational curriculum reform is eminent due to the major breakthroughs in technology, including mobile internet, digital textbooks, and cloud computation. Currently, some educational systems are starting to utilize IT. Examples of this are seen with: Technology- based educational reform efforts such as Huntsville City Schools Laptop Initiative and Geospatial Information Technology (GIT); Software-focused initiatives such as Apple Textbook Initiative and Barnes and Noble e-book editions for Nook; finally, structured/standardized professional development workshops or courses such as the Library of Congress Teaching …


Open Source Software To Teach Technology Entrepreneurship Concepts And Practices, Maurice E. Dawson Jr., Jorja Wright, Jonathan Abramson Dec 2012

Open Source Software To Teach Technology Entrepreneurship Concepts And Practices, Maurice E. Dawson Jr., Jorja Wright, Jonathan Abramson

Maurice Dawson

Open source software (OSS) in academia can have multiple types of implementations and positive returns. This paper explores the use of OSS as a method to teach entrepreneurship concepts and practices to Science, Technology, Engineering, and Mathematics (STEM) majors. OSS allows for individuals to contribute and provide support services for applications. This will allow students to gain expertise in low level design, software project management, and software consulting services in order to successfully deploy their own spin off company. Covered in this submission will be examples of how the Linux software project development groups, mobile application development, video game design, …


Dod Cyber Technology Policies To Secure Automated Information Systems, Maurice E. Dawson Jr., Miguel Crespo, Stephen Brewster Dec 2012

Dod Cyber Technology Policies To Secure Automated Information Systems, Maurice E. Dawson Jr., Miguel Crespo, Stephen Brewster

Maurice Dawson

Availability, integrity, and confidentiality (AIC) is a key theme everywhere as cyber security has become more than an emerging topic. The Department of Defense (DoD) has implemented multiple processes such as the Department of Defense information assurance certification and accreditation process (DIACAP), common criteria (CC), and created proven baselines to include information assurance (IA) controls to protect information system (IS) resources. The aim of this research study shall provide insight to the applicable processes, IA controls, and standards to include providing a method for selecting necessary government models and for system development.


Innovative Approach To Teaching Architecture & Design With The Utilization Of Virtual Simulation Tools, Maurice Dawson, Raul Valdez Dec 2011

Innovative Approach To Teaching Architecture & Design With The Utilization Of Virtual Simulation Tools, Maurice Dawson, Raul Valdez

Maurice Dawson

Today’s society is growing, moving, pushing and pulling in so many different directions. Society has moved from the invention of electricity in the 1800’s to the invention of the iPhone, which has changed the way we use, and perceive technology today. The survival of an architectural student depends on being able to communicate multiple drawings, graphics, images, diagrams and more in the most productive method. Each phase in design requires a clear and concise conversation between the designer and the observer. Schematic Designs generate some of the most creative ideas during a projects progression. With this understood, this section of …


Cyber Security And Mobile Threats: The Need For Antivirus Applications For Smart Phones, Jorja Wright, Maurice E. Dawson Jr., Marwan Omar Dec 2011

Cyber Security And Mobile Threats: The Need For Antivirus Applications For Smart Phones, Jorja Wright, Maurice E. Dawson Jr., Marwan Omar

Maurice Dawson

Smartphones are becoming a vehicle to provide an efficient and convenient way toaccess, find and share information; however, the availability of this information hascaused an increase in cyber attacks. Currently, cyber threats range from Trojans andviruses to botnets and toolkits. Presently, 96% of smartphones do not have pre-installedsecurity software. This lack in security is an opportunity for malicious cyber attackers to hackinto the various devices that are popular (i.e. Android, iPhone and Blackberry). Traditionalsecurity software found in personal computers (PCs), such as firewalls, antivirus, andencryption, is not currently available in smartphones. Moreover, smartphones are even morevulnerable than personal computers because …


Developing The Next Generation Of Women And Minority Scientists For The Nuclear Energy Industry, Darrell Burrell, Andrea Todd, Aikyna Finch, Maurice Dawson Dec 2011

Developing The Next Generation Of Women And Minority Scientists For The Nuclear Energy Industry, Darrell Burrell, Andrea Todd, Aikyna Finch, Maurice Dawson

Maurice Dawson

The largest source of carbon dioxide emissions globally is the combustion of fossil fuels (coal, oil and natural gas) in power plants, automobiles, industrial facilities and other sources. Generating electricity is the single largest source of carbon dioxide emissions, representing 41% of all emissions. Since 2007 the United States has been more actively considering nuclear power as an option for developing energy. Three decades after the Three Mile Island accident seemed to doom the nuclear power industry, the idea of a nuclear renaissance has been gaining public acceptance as a way to generate energy without greenhouse gas emissions and meet …


Use Of Open Source Software And Virtualization In Academia To Enhance Higher Education Everywhere, Maurice E. Dawson Jr., Imad Al Saeed Dec 2011

Use Of Open Source Software And Virtualization In Academia To Enhance Higher Education Everywhere, Maurice E. Dawson Jr., Imad Al Saeed

Maurice Dawson

As costs around the world continue to rise for education, institutions must become innovative in the ways they teach and grow students. To do this effectively, professors and administrative staff should push toward the utilization of Open Source Software (OSS) and virtual tools to enhance or supplement currently available tools. In developing countries, OSS applications would allow students the ability to learn critical technological skills for success at small fraction of the cost. OSS also provides faculty members the ability to dissect source code and prepare students for low-level software development. It is critical that all institutions look at alternatives …


Utilization Of E-Learning Tools, Virtual Machines, & Open Source Software To Enhance Graduate Systems Engineering Programs, Maurice Dawson, Darrell Burrell, William Emanuel Dec 2010

Utilization Of E-Learning Tools, Virtual Machines, & Open Source Software To Enhance Graduate Systems Engineering Programs, Maurice Dawson, Darrell Burrell, William Emanuel

Maurice Dawson

This paper is a report on the findings of a study conducted on a graduate systems engineering course at an urban university in a group learning environment. The course, IEGR 501 Introduction to Advanced Systems Engineering, was a sixteen week course which took students with backgrounds in Industrial Engineering, Electrical Engineering, and Mechanical Engineering and prepared them to understand the systems engineering subject matter more. As the future of education becomes more and more virtual it becomes essential that universities take full advantage of the available tools at their disposal.


Transitional Leadership In The Defence And Aerospace Industry: A Critical Analysis For Recruiting And Developing Talent, Maurice Dawson, Emad Rahim Dec 2010

Transitional Leadership In The Defence And Aerospace Industry: A Critical Analysis For Recruiting And Developing Talent, Maurice Dawson, Emad Rahim

Maurice Dawson

This article proposes a framework to create effective transitional leadership in the defence and aerospace industry. The proposed framework identifies and maps traits and skills of military personnel in a manner that can be tested and validated in accordance with principles of human resource management. Applying this framework would assist hiring managers in their selection of program or project managers from the military in transition to a defence contractor support organisation. Employing a research approach embracing a mix of both qualitative and quantitative strategies, the study examined more than 50 respondents to a 34-question survey, focusing on 14 respondents who …


Applicability Of Web 2.0: Training For Tactical Military Applications, Maurice Dawson Dec 2010

Applicability Of Web 2.0: Training For Tactical Military Applications, Maurice Dawson

Maurice Dawson

This paper is a report on the findings of a study conducted on a doctoral level virtual course utilizing Second Life for usability and interaction. The project from this course allowed for further exploration of training servicemen from other nations in decision making techniques to include a level of familiarization with various technologies. As Second Life is a low cost tool this could prove invaluable to offset training costs to involve getting servicemen to understand technologies through simulation. Currently the available tools are costly and as government looks for ways to save costs Second Life can prove to be a …


Deep Dive Into Understanding The Theory Of Military Organization, Military Leadership, Skill Transfer, Aspects Of Program Management, And Decision Support Systems, Maurice Dawson, Darrell N. Burrell, Emad Rahim Dec 2009

Deep Dive Into Understanding The Theory Of Military Organization, Military Leadership, Skill Transfer, Aspects Of Program Management, And Decision Support Systems, Maurice Dawson, Darrell N. Burrell, Emad Rahim

Maurice Dawson

The focus of this paper is to understand the theory of military organizations and leadership, skill transfer, aspects of program management, and decision support systems. This will further aid in revealing how the decision-making theories are applied to organizations within the Department of Defense (DoD) to include the changing environment within the leadership style. Through the research, major points found in articles highlight decision making, learning leadership execution through educational means, and leadership in the military to include large corporate organizations.