Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Management Information Systems (20)
- Engineering (13)
- Computer Engineering (9)
- Technology and Innovation (9)
- Education (6)
-
- Physical Sciences and Mathematics (6)
- Computer Sciences (5)
- Computer and Systems Architecture (5)
- Digital Communications and Networking (4)
- OS and Networks (4)
- Educational Methods (3)
- Engineering Education (3)
- Entrepreneurial and Small Business Operations (3)
- Graphics and Human Computer Interfaces (2)
- Human Resources Management (2)
- Information Security (2)
- Software Engineering (2)
- Architectural Engineering (1)
- Architectural Technology (1)
- Architecture (1)
- Business Administration, Management, and Operations (1)
- Education Economics (1)
- Environmental Sciences (1)
- Higher Education (1)
- Law (1)
- Leadership Studies (1)
- Military and Veterans Studies (1)
- Nonprofit Administration and Management (1)
- Nuclear Engineering (1)
- Keyword
-
- Computer science (9)
- Information systems (9)
- Open Source Software and Virtualization (9)
- Cyber Security (8)
- Cyber security (6)
-
- Education (6)
- Linux (6)
- Open source software (5)
- Technology (5)
- Virtual machines (4)
- Higher Education and Learning (3)
- Hypervisor (3)
- Information Systems (3)
- Open Source Software (3)
- Project Management (3)
- Virtualization (3)
- Android (2)
- Cyber terrorism (2)
- Department of Defense (2)
- Information Technology (2)
- Information assurance (2)
- Information security (2)
- Leadership and Management (2)
- Mobile devices (2)
- STEM (2)
- Terrorism (2)
- USA (2)
- United States (2)
- Virtual Reality and Virtual Worlds (2)
- A (1)
Articles 1 - 26 of 26
Full-Text Articles in Business
Massive Open Online Courses: Integrating Open Source Technology And Open Access Literature Into Technology Based Degrees, Maurice Dawson, Sharon Burton, Dustin Bessette, Jorja Wright
Massive Open Online Courses: Integrating Open Source Technology And Open Access Literature Into Technology Based Degrees, Maurice Dawson, Sharon Burton, Dustin Bessette, Jorja Wright
Maurice Dawson
Mobile Devices: The Case For Cyber Security Hardened Systems, Maurice Dawson, Jorja Wright, Marwan Omar
Mobile Devices: The Case For Cyber Security Hardened Systems, Maurice Dawson, Jorja Wright, Marwan Omar
Maurice Dawson
Mobile devices are becoming a method to provide an efficient and convenient way to access, find and share information; however, the availability of this information has caused an increase in cyber attacks. Currently, cyber threats range from Trojans and viruses to botnets and toolkits. Presently, 96% of mobile devices do not have pre-installed security software while approximately 65% of the vulnerabilities are found within the application layer. This lack in security and policy driven systems is an opportunity for malicious cyber attackers to hack into the various popular devices. Traditional security software found in desktop computing platforms, such as firewalls, …
Nurturing Social Entrepreneurship And Building Social Entrepreneurial Self-Efficacy: Focusing On Primary And Secondary Schooling To Develop Future Social Entrepreneurs, Nareatha Studdard, Maurice Dawson, Sharon Burton, Naporshia Jackson, Brian Leonard, Williams Quisenberry, Emad Bellevue
Nurturing Social Entrepreneurship And Building Social Entrepreneurial Self-Efficacy: Focusing On Primary And Secondary Schooling To Develop Future Social Entrepreneurs, Nareatha Studdard, Maurice Dawson, Sharon Burton, Naporshia Jackson, Brian Leonard, Williams Quisenberry, Emad Bellevue
Maurice Dawson
For the development of social entrepreneurs it is imperative that educators embrace the concepts and process of social entrepreneurship (Dees, 1998). Exploration of these concepts in education could prove beneficial to the community (Haugh, 2005). This chapter focuses on the positives of introducing social entrepreneurship education at the primary and secondary levels of education. Specifically, its central focus deals with building children's entrepreneurial self-efficacy at a young age. Several benefits, of increasing self-efficacy at a young age, are outlined. Benefits, such as entrepreneurship training, not only training students, but it helps to prepare them for the new knowledge-based economy. Further, …
Mobile Devices: The Case For Cyber Security Hardened Systems, Maurice Dawson, Jorja Wright, Marwan Omar
Mobile Devices: The Case For Cyber Security Hardened Systems, Maurice Dawson, Jorja Wright, Marwan Omar
Maurice Dawson
Mobile devices are becoming a method to provide an efficient and convenient way to access, find and share information; however, the availability of this information has caused an increase in cyber attacks. Currently, cyber threats range from Trojans and viruses to botnets and toolkits. Presently, 96% of mobile devices do not have pre-installed security software while approximately 65% of the vulnerabilities are found within the application layer. This lack in security and policy driven systems is an opportunity for malicious cyber attackers to hack into the various popular devices. Traditional security software found in desktop computing platforms, such as firewalls, …
Advances In Technology Project Management: Review Of Open Source Software Integration, Maurice Dawson, Brian Leonard, Emad Rahim
Advances In Technology Project Management: Review Of Open Source Software Integration, Maurice Dawson, Brian Leonard, Emad Rahim
Maurice Dawson
As organizations must continually drive down costs of software-driven projects, they need to evaluate the Systems Development Life Cycle (SDLC) and other software-based design methodologies. These methodologies include looking at software-based alternatives that could save a significant amount of money by reducing the amount of proprietary software. This chapter explores the use and integration of Open Source Software (OSS) in software-driven projects to include in enterprise organizations. Additionally, the legalities of the GNU General Public License (GPL), Lesser General Public License (LGPL), Berkeley Software Distribution (BSD), and Creative Commons are explored with the integration of these OSS solutions into organizations. …
A Brief Review Of New Threats And Countermeasures In Digital Crime And Cyber Terrorism, Maurice Dawson
A Brief Review Of New Threats And Countermeasures In Digital Crime And Cyber Terrorism, Maurice Dawson
Maurice Dawson
Cyber security is becoming the cornerstone of national security policies in many countries around the world as it is an interest to many stakeholders, including utilities, regulators, energy markets, government entities, and even those that wish to exploit the cyber infrastructure. Cyber warfare is quickly becoming the method of warfare and the tool of military strategists. Additionally, it is has become a tool for governments to aid or exploit for their own personal benefits. For cyber terrorists there has been an overwhelmingly abundance of new tools and technologies available that have allowed criminal acts to occur virtually anywhere in the …
Understanding The Methods Behind Cyber Terrorism, Maurice E. Dawson Jr., Marwan Omar, Jonathan Abramson
Understanding The Methods Behind Cyber Terrorism, Maurice E. Dawson Jr., Marwan Omar, Jonathan Abramson
Maurice Dawson
Cyber security has become a matter of national, international, economic, and societal importance that affects multiple nations (Walker, 2012). Since the 1990s users have exploited vulnerabilities to gain access to networks for malicious purposes. In recent years the number of attacks on U.S. networks has continued to grow at an exponential rate. This includes malicious embedded code, exploitation of backdoors, and more. These attacks can be initiated from anywhere in the world from behind a computer with a masked Internet Protocol (IP) address. This type of warfare, cyber warfare, changes the landscape of war itself (Beidleman, 2009). This type of …
Open Source Software To Enhance The Stem Learning Environment, Maurice Dawson, Imad Al Saeed, Jorja Wright, Festus Onyegbula
Open Source Software To Enhance The Stem Learning Environment, Maurice Dawson, Imad Al Saeed, Jorja Wright, Festus Onyegbula
Maurice Dawson
This chapter examines the use of Open Source Software (OSS) technologies that can be used to improve the learning of Science, Technology, Engineering, and Mathematics (STEM). Explored are the various methods that can be utilized to improve the percentage of STEM majors in the American educational system with resources such as: Open Source as Alternative (OSALT), virtualization, cloud computing, Linux distributions, open source programming, and open source hardware platforms. Increasing the amount of students that pursue STEM majors is important because the projected job growth in the STEM field compared to non-STEM jobs is 33%. OSALT provides cost-effective alternatives to …
Advances In Technology Project Management: Review Of Open Source Software Integration, Maurice Dawson, Brian Leonard, Emad Rahim
Advances In Technology Project Management: Review Of Open Source Software Integration, Maurice Dawson, Brian Leonard, Emad Rahim
Maurice Dawson
As organizations must continually drive down costs of software-driven projects, they need to evaluate the Systems Development Life Cycle (SDLC) and other software-based design methodologies. These methodologies include looking at software-based alternatives that could save a significant amount of money by reducing the amount of proprietary software. This chapter explores the use and integration of Open Source Software (OSS) in software-driven projects to include in enterprise organizations. Additionally, the legalities of the GNU General Public License (GPL), Lesser General Public License (LGPL), Berkeley Software Distribution (BSD), and Creative Commons are explored with the integration of these OSS solutions into organizations. …
Flipped Technological Training And Development Using Quality Systems Management In The Public Services Field, Dustin Bessette, Sharon Burton, Maurice Dawson
Flipped Technological Training And Development Using Quality Systems Management In The Public Services Field, Dustin Bessette, Sharon Burton, Maurice Dawson
Maurice Dawson
Training and development is ideal for businesses process improvements in many public service fields. Education, development, and training tools are not new concepts, but are ideal, crucial, and responsive in the central utilization of employee training systems for public service fields. The need for public workforce has increased and demanded accelerated technological training and development process that have positive value and achievable gains. One method to surge this problem is to flip the technological training and development tools that have been issued and over used in the past. These tools not only hold back vicious potential from employees, but employees …
Open Source Software To Enhance The Stem Learning Environment, Maurice E. Dawson Jr., Imad Al Saeed, Jorja Wright, Festus Onyegbula
Open Source Software To Enhance The Stem Learning Environment, Maurice E. Dawson Jr., Imad Al Saeed, Jorja Wright, Festus Onyegbula
Maurice Dawson
This chapter examines the use of Open Source Software (OSS) technologies that can be used to improve the learning of Science, Technology, Engineering, and Mathematics (STEM). Explored are the various methods that can be utilized to improve the percentage of STEM majors in the American educational system with resources such as: Open Source as Alternative (OSALT), virtualization, cloud computing, Linux distributions, open source programming, and open source hardware platforms. Increasing the amount of students that pursue STEM majors is important because the projected job growth in the STEM field compared to non-STEM jobs is 33%. OSALT provides cost-effective alternatives to …
The Future Of National And International Security On The Internet, Maurice Dawson, Marwan Omar, Jonathan Abramson, Dustin Bessette
The Future Of National And International Security On The Internet, Maurice Dawson, Marwan Omar, Jonathan Abramson, Dustin Bessette
Maurice Dawson
Hyperconnectivity is a growing trend that is driving cyber security experts to develop new security architectures for multiple platforms such as mobile devices, laptops, and even wearable displays. The futures of national and international security rely on complex countermeasures to ensure that a proper security posture is maintained during this state of hyperconnectivity. To protect these systems from exploitation of vulnerabilities it is essential to understand current and future threats to include the laws that drive their need to be secured. Examined within this chapter are the potential security-related threats with the use of social media, mobile devices, virtual worlds, …
Fostering Entrepreneurship And Building Entrepreneurial Self-Efficacy In Primary And Secondary Education, Nareatha Studdard, Maurice Dawson, Naporshia Jackson
Fostering Entrepreneurship And Building Entrepreneurial Self-Efficacy In Primary And Secondary Education, Nareatha Studdard, Maurice Dawson, Naporshia Jackson
Maurice Dawson
This paper focuses on the positives of introducing entrepreneurship education at the primary and secondary levels of education. Specifically, its central focus deals with building children’s entrepreneurial self-efficacy at a young age. Several benefits, of increasing self-efficacy at a young age, are outlined. Benefits, such as entrepreneurship training, not only train students but, it helps to prepare them for the new knowledge based economy. Further, entrepreneurship education should help increase the success and survival rates of women and minority entrepreneurs. Essential to this process, a new curriculum needs to be devised including its means of assessment. Lastly barriers to an …
Transforming Information Systems And Computer Science Education With Virtualization, Maurice E. Dawson Jr., Jorja Wright, Jonathan Abramson
Transforming Information Systems And Computer Science Education With Virtualization, Maurice E. Dawson Jr., Jorja Wright, Jonathan Abramson
Maurice Dawson
This paper will propose an innovative method to transform information systems (IS) and computer science education on a global scale. This method will introduce the use of virtualization and cloud computing combined with open source software (OSS) in higher education. This will allow for those studying IS and computer science to work independently on projects anywhere in the world from a baseline image that has been developed with information assurance (IA) controls. Additionally, this will allow professors and course developers to deploy their own customized virtual machines (VMs) to be used with the course. These VMs will host their own …
Research In Progress-Defending Android Smartphones From Malware Attacks, Marwan Omar, Maurice E. Dawson Jr.
Research In Progress-Defending Android Smartphones From Malware Attacks, Marwan Omar, Maurice E. Dawson Jr.
Maurice Dawson
Smart phones are becoming enriched with confidential information due to their powerful computational capabilities and attractive communications features. The Android smart phone is one of the most widely used platforms by businesses and users alike. This is partially because Android smart phones use the free, open-source Linux as the underlying operating system, which allows development of applications by any software developer. This research study aims to explore security risks associated with the use of Android smart phones and the sensitive information they contain, the researcher devised a survey questionnaire to investigate and further understand security threats targeting Android smart phones. …
Importance Of Integrating Information Technology Related Curriculum In American Inner City Schools, Jorja Wright, Maurice E. Dawson Jr.
Importance Of Integrating Information Technology Related Curriculum In American Inner City Schools, Jorja Wright, Maurice E. Dawson Jr.
Maurice Dawson
This paper examines the significance of integrating Information Technology (IT) into the inner city K - 12 educational curriculum. Educational curriculum reform is eminent due to the major breakthroughs in technology, including mobile internet, digital textbooks, and cloud computation. Currently, some educational systems are starting to utilize IT. Examples of this are seen with: Technology- based educational reform efforts such as Huntsville City Schools Laptop Initiative and Geospatial Information Technology (GIT); Software-focused initiatives such as Apple Textbook Initiative and Barnes and Noble e-book editions for Nook; finally, structured/standardized professional development workshops or courses such as the Library of Congress Teaching …
Open Source Software To Teach Technology Entrepreneurship Concepts And Practices, Maurice E. Dawson Jr., Jorja Wright, Jonathan Abramson
Open Source Software To Teach Technology Entrepreneurship Concepts And Practices, Maurice E. Dawson Jr., Jorja Wright, Jonathan Abramson
Maurice Dawson
Open source software (OSS) in academia can have multiple types of implementations and positive returns. This paper explores the use of OSS as a method to teach entrepreneurship concepts and practices to Science, Technology, Engineering, and Mathematics (STEM) majors. OSS allows for individuals to contribute and provide support services for applications. This will allow students to gain expertise in low level design, software project management, and software consulting services in order to successfully deploy their own spin off company. Covered in this submission will be examples of how the Linux software project development groups, mobile application development, video game design, …
Dod Cyber Technology Policies To Secure Automated Information Systems, Maurice E. Dawson Jr., Miguel Crespo, Stephen Brewster
Dod Cyber Technology Policies To Secure Automated Information Systems, Maurice E. Dawson Jr., Miguel Crespo, Stephen Brewster
Maurice Dawson
Availability, integrity, and confidentiality (AIC) is a key theme everywhere as cyber security has become more than an emerging topic. The Department of Defense (DoD) has implemented multiple processes such as the Department of Defense information assurance certification and accreditation process (DIACAP), common criteria (CC), and created proven baselines to include information assurance (IA) controls to protect information system (IS) resources. The aim of this research study shall provide insight to the applicable processes, IA controls, and standards to include providing a method for selecting necessary government models and for system development.
Innovative Approach To Teaching Architecture & Design With The Utilization Of Virtual Simulation Tools, Maurice Dawson, Raul Valdez
Innovative Approach To Teaching Architecture & Design With The Utilization Of Virtual Simulation Tools, Maurice Dawson, Raul Valdez
Maurice Dawson
Today’s society is growing, moving, pushing and pulling in so many different directions. Society has moved from the invention of electricity in the 1800’s to the invention of the iPhone, which has changed the way we use, and perceive technology today. The survival of an architectural student depends on being able to communicate multiple drawings, graphics, images, diagrams and more in the most productive method. Each phase in design requires a clear and concise conversation between the designer and the observer. Schematic Designs generate some of the most creative ideas during a projects progression. With this understood, this section of …
Cyber Security And Mobile Threats: The Need For Antivirus Applications For Smart Phones, Jorja Wright, Maurice E. Dawson Jr., Marwan Omar
Cyber Security And Mobile Threats: The Need For Antivirus Applications For Smart Phones, Jorja Wright, Maurice E. Dawson Jr., Marwan Omar
Maurice Dawson
Smartphones are becoming a vehicle to provide an efficient and convenient way toaccess, find and share information; however, the availability of this information hascaused an increase in cyber attacks. Currently, cyber threats range from Trojans andviruses to botnets and toolkits. Presently, 96% of smartphones do not have pre-installedsecurity software. This lack in security is an opportunity for malicious cyber attackers to hackinto the various devices that are popular (i.e. Android, iPhone and Blackberry). Traditionalsecurity software found in personal computers (PCs), such as firewalls, antivirus, andencryption, is not currently available in smartphones. Moreover, smartphones are even morevulnerable than personal computers because …
Developing The Next Generation Of Women And Minority Scientists For The Nuclear Energy Industry, Darrell Burrell, Andrea Todd, Aikyna Finch, Maurice Dawson
Developing The Next Generation Of Women And Minority Scientists For The Nuclear Energy Industry, Darrell Burrell, Andrea Todd, Aikyna Finch, Maurice Dawson
Maurice Dawson
The largest source of carbon dioxide emissions globally is the combustion of fossil fuels (coal, oil and natural gas) in power plants, automobiles, industrial facilities and other sources. Generating electricity is the single largest source of carbon dioxide emissions, representing 41% of all emissions. Since 2007 the United States has been more actively considering nuclear power as an option for developing energy. Three decades after the Three Mile Island accident seemed to doom the nuclear power industry, the idea of a nuclear renaissance has been gaining public acceptance as a way to generate energy without greenhouse gas emissions and meet …
Use Of Open Source Software And Virtualization In Academia To Enhance Higher Education Everywhere, Maurice E. Dawson Jr., Imad Al Saeed
Use Of Open Source Software And Virtualization In Academia To Enhance Higher Education Everywhere, Maurice E. Dawson Jr., Imad Al Saeed
Maurice Dawson
As costs around the world continue to rise for education, institutions must become innovative in the ways they teach and grow students. To do this effectively, professors and administrative staff should push toward the utilization of Open Source Software (OSS) and virtual tools to enhance or supplement currently available tools. In developing countries, OSS applications would allow students the ability to learn critical technological skills for success at small fraction of the cost. OSS also provides faculty members the ability to dissect source code and prepare students for low-level software development. It is critical that all institutions look at alternatives …
Utilization Of E-Learning Tools, Virtual Machines, & Open Source Software To Enhance Graduate Systems Engineering Programs, Maurice Dawson, Darrell Burrell, William Emanuel
Utilization Of E-Learning Tools, Virtual Machines, & Open Source Software To Enhance Graduate Systems Engineering Programs, Maurice Dawson, Darrell Burrell, William Emanuel
Maurice Dawson
This paper is a report on the findings of a study conducted on a graduate systems engineering course at an urban university in a group learning environment. The course, IEGR 501 Introduction to Advanced Systems Engineering, was a sixteen week course which took students with backgrounds in Industrial Engineering, Electrical Engineering, and Mechanical Engineering and prepared them to understand the systems engineering subject matter more. As the future of education becomes more and more virtual it becomes essential that universities take full advantage of the available tools at their disposal.
Transitional Leadership In The Defence And Aerospace Industry: A Critical Analysis For Recruiting And Developing Talent, Maurice Dawson, Emad Rahim
Transitional Leadership In The Defence And Aerospace Industry: A Critical Analysis For Recruiting And Developing Talent, Maurice Dawson, Emad Rahim
Maurice Dawson
This article proposes a framework to create effective transitional leadership in the defence and aerospace industry. The proposed framework identifies and maps traits and skills of military personnel in a manner that can be tested and validated in accordance with principles of human resource management. Applying this framework would assist hiring managers in their selection of program or project managers from the military in transition to a defence contractor support organisation. Employing a research approach embracing a mix of both qualitative and quantitative strategies, the study examined more than 50 respondents to a 34-question survey, focusing on 14 respondents who …
Applicability Of Web 2.0: Training For Tactical Military Applications, Maurice Dawson
Applicability Of Web 2.0: Training For Tactical Military Applications, Maurice Dawson
Maurice Dawson
This paper is a report on the findings of a study conducted on a doctoral level virtual course utilizing Second Life for usability and interaction. The project from this course allowed for further exploration of training servicemen from other nations in decision making techniques to include a level of familiarization with various technologies. As Second Life is a low cost tool this could prove invaluable to offset training costs to involve getting servicemen to understand technologies through simulation. Currently the available tools are costly and as government looks for ways to save costs Second Life can prove to be a …
Deep Dive Into Understanding The Theory Of Military Organization, Military Leadership, Skill Transfer, Aspects Of Program Management, And Decision Support Systems, Maurice Dawson, Darrell N. Burrell, Emad Rahim
Deep Dive Into Understanding The Theory Of Military Organization, Military Leadership, Skill Transfer, Aspects Of Program Management, And Decision Support Systems, Maurice Dawson, Darrell N. Burrell, Emad Rahim
Maurice Dawson
The focus of this paper is to understand the theory of military organizations and leadership, skill transfer, aspects of program management, and decision support systems. This will further aid in revealing how the decision-making theories are applied to organizations within the Department of Defense (DoD) to include the changing environment within the leadership style. Through the research, major points found in articles highlight decision making, learning leadership execution through educational means, and leadership in the military to include large corporate organizations.