Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Computer Sciences (10)
- OS and Networks (8)
- Business (6)
- Information Security (6)
- Management Information Systems (5)
-
- Software Engineering (3)
- Graphics and Human Computer Interfaces (2)
- Systems Architecture (2)
- Engineering (1)
- Environmental Sciences (1)
- Health Information Technology (1)
- Human Resources Management (1)
- Legal Studies (1)
- Medicine and Health Sciences (1)
- Nuclear Engineering (1)
- Programming Languages and Compilers (1)
- Social and Behavioral Sciences (1)
- Sustainability (1)
- Keyword
-
- Information systems (5)
- Cyber Security (4)
- Computer science (3)
- Open Source Software and Virtualization (3)
- Cyber security (2)
-
- Linux (2)
- Networking (2)
- Open source software (2)
- Technology (2)
- Virtual machines (2)
- A (1)
- Architecture (1)
- Botnets (1)
- C& (1)
- Case study (1)
- Certification and accreditation (1)
- Climate change (1)
- Cloud Computing and Service Oriented Architecture (1)
- Cloud computing (1)
- Common criteria (1)
- Corporate governance (1)
- Department of Defense (1)
- Digital methodologies (1)
- DoD (1)
- Education (1)
- Education technology (1)
- Energy (1)
- Energy and Sustainability (1)
- Greenhouse effect (1)
- Health Information Technology (1)
Articles 1 - 11 of 11
Full-Text Articles in Physical Sciences and Mathematics
Legal Issues: Security And Privacy With Mobile Devices, Brian Leonard, Maurice Dawson
Legal Issues: Security And Privacy With Mobile Devices, Brian Leonard, Maurice Dawson
Maurice Dawson
Privacy and security are two items being woven into the fabric of American law concerning mobile devices. This chapter will review and analyze the associated laws and policies that are currently in place or have been proposed to ensure proper execution of security measures for mobile and other devices while still protecting individual privacy. This chapter will address the fact that as the American society significantly uses mobile devices, it is imperative to understand the legal actions surrounding these technologies to include their associated uses. This chapter will also address the fact that with 9/11 in the not so distant …
Technology Enhanced Learning With Open Source Software For Scientists And Engineers, Maurice Dawson, Imad Al Saeed, Jorja Wright, Mrwan Omar
Technology Enhanced Learning With Open Source Software For Scientists And Engineers, Maurice Dawson, Imad Al Saeed, Jorja Wright, Mrwan Omar
Maurice Dawson
This paper represents the evaluation and integration of Open Source Software (OSS) technologies to enhance the learning of engineers and scientists within the university. The utilization of OSS is essential as costs around the world continue to rise for education, institutions must become innovative in the ways they teach and grow Science, Technology, Engineering, & Mathematics (STEM) majors. To do this effectively professors and administrative staff should push toward the utilization of OSS and other available tools to enhance or supplement currently available tools with minimal integration costs. The OSS applications would allow students the ability to learn critical technological …
Importance Of Integrating Information Technology Related Curriculum In American Inner City Schools, Jorja Wright, Maurice E. Dawson Jr.
Importance Of Integrating Information Technology Related Curriculum In American Inner City Schools, Jorja Wright, Maurice E. Dawson Jr.
Maurice Dawson
This paper examines the significance of integrating Information Technology (IT) into the inner city K - 12 educational curriculum. Educational curriculum reform is eminent due to the major breakthroughs in technology, including mobile internet, digital textbooks, and cloud computation. Currently, some educational systems are starting to utilize IT. Examples of this are seen with: Technology- based educational reform efforts such as Huntsville City Schools Laptop Initiative and Geospatial Information Technology (GIT); Software-focused initiatives such as Apple Textbook Initiative and Barnes and Noble e-book editions for Nook; finally, structured/standardized professional development workshops or courses such as the Library of Congress Teaching …
Dod Cyber Technology Policies To Secure Automated Information Systems, Maurice E. Dawson Jr., Miguel Crespo, Stephen Brewster
Dod Cyber Technology Policies To Secure Automated Information Systems, Maurice E. Dawson Jr., Miguel Crespo, Stephen Brewster
Maurice Dawson
Availability, integrity, and confidentiality (AIC) is a key theme everywhere as cyber security has become more than an emerging topic. The Department of Defense (DoD) has implemented multiple processes such as the Department of Defense information assurance certification and accreditation process (DIACAP), common criteria (CC), and created proven baselines to include information assurance (IA) controls to protect information system (IS) resources. The aim of this research study shall provide insight to the applicable processes, IA controls, and standards to include providing a method for selecting necessary government models and for system development.
Cyber Security And Mobile Threats: The Need For Antivirus Applications For Smart Phones, Jorja Wright, Maurice E. Dawson Jr., Marwan Omar
Cyber Security And Mobile Threats: The Need For Antivirus Applications For Smart Phones, Jorja Wright, Maurice E. Dawson Jr., Marwan Omar
Maurice Dawson
Smartphones are becoming a vehicle to provide an efficient and convenient way toaccess, find and share information; however, the availability of this information hascaused an increase in cyber attacks. Currently, cyber threats range from Trojans andviruses to botnets and toolkits. Presently, 96% of smartphones do not have pre-installedsecurity software. This lack in security is an opportunity for malicious cyber attackers to hackinto the various devices that are popular (i.e. Android, iPhone and Blackberry). Traditionalsecurity software found in personal computers (PCs), such as firewalls, antivirus, andencryption, is not currently available in smartphones. Moreover, smartphones are even morevulnerable than personal computers because …
Developing The Next Generation Of Women And Minority Scientists For The Nuclear Energy Industry, Darrell Burrell, Andrea Todd, Aikyna Finch, Maurice Dawson
Developing The Next Generation Of Women And Minority Scientists For The Nuclear Energy Industry, Darrell Burrell, Andrea Todd, Aikyna Finch, Maurice Dawson
Maurice Dawson
The largest source of carbon dioxide emissions globally is the combustion of fossil fuels (coal, oil and natural gas) in power plants, automobiles, industrial facilities and other sources. Generating electricity is the single largest source of carbon dioxide emissions, representing 41% of all emissions. Since 2007 the United States has been more actively considering nuclear power as an option for developing energy. Three decades after the Three Mile Island accident seemed to doom the nuclear power industry, the idea of a nuclear renaissance has been gaining public acceptance as a way to generate energy without greenhouse gas emissions and meet …
Review Of The Health Information Technology Initiatives In Maryland And Georgia, Maurice Dawson, James Truesdale, Joshua Robinson
Review Of The Health Information Technology Initiatives In Maryland And Georgia, Maurice Dawson, James Truesdale, Joshua Robinson
Maurice Dawson
Health Information Technology (IT) is an important topic within the health community currently. Many states must update their status in relation to the Strategic and Operation Plan under the State Cooperative Agreement. In this literature review the findings have been summarized in reference to what is proposed in three states. Key items reviewed are the following; governance, policy/legal, technical infrastructure, business and technical operations,communications/marketing, and relationships to Medicaid/Medicare. With regards to the States of Maryland and Georgia, the State Health Information Exchange (HIE) Cooperative Agreement Program will allow both states to enhance its existing strategic plan and to build an …
Utilization Of E-Learning Tools, Virtual Machines, & Open Source Software To Enhance Graduate Systems Engineering Programs, Maurice Dawson, Darrell Burrell, William Emanuel
Utilization Of E-Learning Tools, Virtual Machines, & Open Source Software To Enhance Graduate Systems Engineering Programs, Maurice Dawson, Darrell Burrell, William Emanuel
Maurice Dawson
This paper is a report on the findings of a study conducted on a graduate systems engineering course at an urban university in a group learning environment. The course, IEGR 501 Introduction to Advanced Systems Engineering, was a sixteen week course which took students with backgrounds in Industrial Engineering, Electrical Engineering, and Mechanical Engineering and prepared them to understand the systems engineering subject matter more. As the future of education becomes more and more virtual it becomes essential that universities take full advantage of the available tools at their disposal.
Understanding The Need And Importance Of The Cloud Computing Environment Within The National Institute Of Food And Agriculture, An Agency Of The United States Department Of Agriculture, Festus Onyegbula, Maurice Dawson, Jeffrey Stevens
Understanding The Need And Importance Of The Cloud Computing Environment Within The National Institute Of Food And Agriculture, An Agency Of The United States Department Of Agriculture, Festus Onyegbula, Maurice Dawson, Jeffrey Stevens
Maurice Dawson
Aligning information systems to corporate goals has emerged as a leading concern over the last couple of decades. It is essential that we understand the need for cloud computing and how this technology can be implemented. Through this literature review we review theories of cloud computing and further elaborate on the theoretical framework for the implementation of cloud computing technology across organizations. We also detail cloud computing implementations across various governmental organizations and also across the industry. This review is expected to provide the current study with a more practical perspective on the issues and complexities of using cloud computing …
Applicability Of Web 2.0: Training For Tactical Military Applications, Maurice Dawson
Applicability Of Web 2.0: Training For Tactical Military Applications, Maurice Dawson
Maurice Dawson
This paper is a report on the findings of a study conducted on a doctoral level virtual course utilizing Second Life for usability and interaction. The project from this course allowed for further exploration of training servicemen from other nations in decision making techniques to include a level of familiarization with various technologies. As Second Life is a low cost tool this could prove invaluable to offset training costs to involve getting servicemen to understand technologies through simulation. Currently the available tools are costly and as government looks for ways to save costs Second Life can prove to be a …
Integrating Software Assurance Into The Software Development Life Cycle (Sdlc), Maurice Dawson, Darrell N. Burrell, Emad Rahim, Stephen Brewster
Integrating Software Assurance Into The Software Development Life Cycle (Sdlc), Maurice Dawson, Darrell N. Burrell, Emad Rahim, Stephen Brewster
Maurice Dawson
This article examines the integration of secure coding practices into the overall Software Development Life Cycle (SDLC). Also detailed is a proposed methodology for integrating software assurance into the Department of Defense Information Assurance Certification & Accreditation Process (DIACAP). This method for integrating software assurance helps in properly securing the application layer as that is where more than half of the vulnerabilities lie in a system.