Takip et
Maurice Dawson, PhD, SMIEEE
Maurice Dawson, PhD, SMIEEE
iit.edu üzerinde doğrulanmış e-posta adresine sahip - Ana Sayfa
Başlık
Alıntı yapanlar
Alıntı yapanlar
Yıl
Integrating Software Assurance into the Software Development Life Cycle (SDLC)
M Dawson, D Burrell, E Rahim, S Brewster
Journal of Information Systems Technology and Planning 3 (6), 49-53, 2010
1132010
An Examination of the Prior Use of E-Learning Within an Extended Technology Acceptance Model and the Factors That Influence the Behavioral Intention of Users to Use M-Learning
J Abramson, M Dawson, J Stevens
SAGE Open 5 (4), 1-9, 2015
842015
A Brief Review of New Threats and Countermeasures in Digital Crime and Cyber Terrorism
M Dawson
Cyber Security and Threats: Concepts, Methodologies, Tools, and Applications …, 2018
772018
A Brief Review of New Threats and Countermeasures in Digital Crime and Cyber Terrorism
M Dawson
New Threats and Countermeasures in Digital Crime and Cyber Terrorism, 1-7, 2015
722015
Understanding the Challenge of Cybersecurity in Critical Infrastructure Sectors
M Dawson, R Bacius, LB Gouveia, A Vassilakos
Land Forces Academy Review 26 (1), 69 - 75, 2021
652021
Fostering entrepreneurship and building entrepreneurial self-efficacy in primary and secondary education
NL Studdard, M Dawson, NL Jackson
Creative and Knowledge Society 3 (2), 1, 2013
542013
A review of enhancing intrusion detection systems for cybersecurity using artificial intelligence (AI)
M Markevych, M Dawson
International Conference Knowledge-Based Organization 29 (3), 30-37, 2023
532023
Cyber Security and Mobile Threats: The Need for Antivirus Applications for Smart Phones
J Wright, M Dawson, M Omar
Journal of Information Systems Technology and Planning 5 (14), 40-60, 2012
522012
Cyber Security in Industry 4.0: The Pitfalls of Having Hyperconnected Systems
M Dawson
Journal of Strategic Management Studies 10 (1), 19-28, 2018
492018
Applying a Holistic Cyber Security Framework for Global IT Organizations
M Dawson
Business Information Review, 2018
402018
Security Solutions for Hyperconnectivity and the Internet of Things
M Dawson, M Eltayeb, M Omar
IGI Global, 2016
392016
Understanding the Methods behind Cyber Terrorism
M Dawson, M Omar, J Abramson
Encyclopedia of Information Science and Technology - 3rd ed., 1539-1549, 2015
372015
Understanding user’s acceptance of personal cloud computing: Using the Technology Acceptance Model
M Eltayeb, M Dawson
Information Technology: New generations 448, 3-12, 2016
342016
DoD cyber technology policies to secure automated information systems
ME Dawson Jr, M Crespo, S Brewster
International Journal of Business Continuity and Risk Management 4 (1), 1-22, 2013
272013
Research in progress-defending android smartphones from malware attacks
M Omar, M Dawson
2013 third international conference on advanced computing and communication …, 2013
262013
Use of open source software and virtualization in academia to enhance higher education everywhere
M Eugene Dawson, I Al Saeed
Increasing Student Engagement and Retention Using Immersive Interfaces …, 2012
262012
Microblogging in Higher Education: Digital Natives, Knowledge Creation, Social Engineering, and Intelligence Analysis of Educational Tweets
S Cleveland, BC Jackson, M Dawson
E-Learning and Digital Media 13 (1-2), 1-19, 2016
232016
The Future of National and International Security on the Internet
M Dawson, M Omar, J Abramson, D Bessette
Cyber Law, Privacy, and Security: Concepts, Methodologies, Tools, and …, 2019
22*2019
Developing Learning Objects for Engineering and Science Fields: Using Technology to Test System Usability and Interface Design
M Dawson, L Davis, M Omar
International Journal of Smart Technology and Learning 1 (2), 140-161, 2019
222019
The Future of National and International Security on the Internet
M Dawson, M Omar, J Abramson, D Bessette
Information Security in Diverse Computing Environments, 149-178, 2014
222014
Sistem, işlemi şu anda gerçekleştiremiyor. Daha sonra yeniden deneyin.
Makaleler 1–20