Follow
Maurice Dawson
Maurice Dawson
Center for Cyber Security and Forensics Education, Illinois Institute of Technology
Verified email at iit.edu - Homepage
Title
Cited by
Cited by
Year
Integrating Software Assurance into the Software Development Life Cycle (SDLC)
M Dawson, D Burrell, E Rahim, S Brewster
Journal of Information Systems Technology and Planning 3 (6), 49-53, 2010
972010
An Examination of the Prior Use of E-Learning Within an Extended Technology Acceptance Model and the Factors That Influence the Behavioral Intention of Users to Use M-Learning
J Abramson, M Dawson, J Stevens
SAGE Open 5 (4), 1-9, 2015
732015
A Brief Review of New Threats and Countermeasures in Digital Crime and Cyber Terrorism
M Dawson
Cyber Security and Threats: Concepts, Methodologies, Tools, and Applications …, 2018
572018
A Brief Review of New Threats and Countermeasures in Digital Crime and Cyber Terrorism
M Dawson
New Threats and Countermeasures in Digital Crime and Cyber Terrorism, 1-7, 2015
552015
Fostering entrepreneurship and building entrepreneurial self-efficacy in primary and secondary education
NL Studdard, M Dawson, NL Jackson
Creative and Knowledge Society 3 (2), 1, 2013
512013
Cyber Security and Mobile Threats: The Need for Antivirus Applications for Smart Phones
J Wright, M Dawson, M Omar
Journal of Information Systems Technology and Planning 5 (14), 40-60, 2012
392012
Cyber Security in Industry 4.0: The Pitfalls of Having Hyperconnected Systems
M Dawson
Journal of Strategic Management Studies 10 (1), 19-28, 2018
372018
Understanding the Challenge of Cybersecurity in Critical Infrastructure Sectors
M Dawson, R Bacius, LB Gouveia, A Vassilakos
Land Forces Academy Review 26 (1), 69 - 75, 2021
362021
Applying a Holistic Cyber Security Framework for Global IT Organizations
M Dawson
Business Information Review, 2018
352018
Security Solutions for Hyperconnectivity and the Internet of Things
M Dawson, M Eltayeb, M Omar
IGI Global, 2016
322016
Understanding user’s acceptance of personal cloud computing: Using the Technology Acceptance Model
M Eltayeb, M Dawson
Information Technology: New generations 448, 3-12, 2016
312016
Understanding the Methods behind Cyber Terrorism
M Dawson, M Omar, J Abramson
Encyclopedia of Information Science and Technology - 3rd ed., 1539-1549, 2015
292015
DoD cyber technology policies to secure automated information systems
ME Dawson Jr, M Crespo, S Brewster
International Journal of Business Continuity and Risk Management 4 (1), 1-22, 2013
272013
Use of open source software and virtualization in academia to enhance higher education everywhere
M Eugene Dawson, I Al Saeed
Increasing Student Engagement and Retention Using Immersive Interfaces …, 2012
262012
Microblogging in Higher Education: Digital Natives, Knowledge Creation, Social Engineering, and Intelligence Analysis of Educational Tweets
S Cleveland, BC Jackson, M Dawson
E-Learning and Digital Media 13 (1-2), 1-19, 2016
212016
Changing The Cultures of Colleges and Universities to Make Them More Adaptive
A Finch, DN Burrell, R Walker, E Rahim, M Dawson
REVIEW OF HIGHER EDUCATION AND SELF-LEARNING 3 (7), 40-53, 2010
202010
Improving Cyber Defense Education Through National Standard Alignment: Case Studies
P Wang, M Dawson, K Williams
National Security: Breakthroughs in Research and Practice, 78-91, 2019
192019
Improving Cyber Defense Education through National Standard Alignment: Case Studies
P Wang, M Dawson, K Williams
International Journal of Hyperconnectivity and the Internet of Things 2 (1 …, 2018
192018
Research in progress-defending android smartphones from malware attacks
M Omar, M Dawson
2013 third international conference on advanced computing and communication …, 2013
192013
Understanding the Need and Importance of the Cloud Computing Environment within the National Institute of Food and Agriculture, an Agency of the United States Department of …
F Onyegbula, M Dawson, J Stevens
Journal of Information Systems Technology and Planning 4 (8), 17-42, 2011
192011
The system can't perform the operation now. Try again later.
Articles 1–20