Follow
Maurice Dawson
Title
Cited by
Cited by
Year
Integrating Software Assurance into the Software Development Life Cycle (SDLC)
M Dawson, D Burrell, E Rahim, S Brewster
Journal of Information Systems Technology and Planning 3 (6), 49-53, 2010
1002010
An Examination of the Prior Use of E-Learning Within an Extended Technology Acceptance Model and the Factors That Influence the Behavioral Intention of Users to Use M-Learning
J Abramson, M Dawson, J Stevens
SAGE Open 5 (4), 1-9, 2015
742015
A Brief Review of New Threats and Countermeasures in Digital Crime and Cyber Terrorism
M Dawson
Cyber Security and Threats: Concepts, Methodologies, Tools, and Applications …, 2018
572018
A Brief Review of New Threats and Countermeasures in Digital Crime and Cyber Terrorism
M Dawson
New Threats and Countermeasures in Digital Crime and Cyber Terrorism, 1-7, 2015
552015
Fostering entrepreneurship and building entrepreneurial self-efficacy in primary and secondary education
NL Studdard, M Dawson, NL Jackson
Creative and Knowledge Society 3 (2), 1, 2013
512013
Understanding the Challenge of Cybersecurity in Critical Infrastructure Sectors
M Dawson, R Bacius, LB Gouveia, A Vassilakos
Land Forces Academy Review 26 (1), 69 - 75, 2021
412021
Cyber Security in Industry 4.0: The Pitfalls of Having Hyperconnected Systems
M Dawson
Journal of Strategic Management Studies 10 (1), 19-28, 2018
412018
Cyber Security and Mobile Threats: The Need for Antivirus Applications for Smart Phones
J Wright, M Dawson, M Omar
Journal of Information Systems Technology and Planning 5 (14), 40-60, 2012
392012
Applying a Holistic Cyber Security Framework for Global IT Organizations
M Dawson
Business Information Review, 2018
362018
Understanding user’s acceptance of personal cloud computing: Using the Technology Acceptance Model
M Eltayeb, M Dawson
Information Technology: New generations 448, 3-12, 2016
322016
Security Solutions for Hyperconnectivity and the Internet of Things
M Dawson, M Eltayeb, M Omar
IGI Global, 2016
322016
Understanding the Methods behind Cyber Terrorism
M Dawson, M Omar, J Abramson
Encyclopedia of Information Science and Technology - 3rd ed., 1539-1549, 2015
292015
DoD cyber technology policies to secure automated information systems
ME Dawson Jr, M Crespo, S Brewster
International Journal of Business Continuity and Risk Management 4 (1), 1-22, 2013
272013
Use of open source software and virtualization in academia to enhance higher education everywhere
M Eugene Dawson, I Al Saeed
Increasing Student Engagement and Retention Using Immersive Interfaces …, 2012
262012
Microblogging in Higher Education: Digital Natives, Knowledge Creation, Social Engineering, and Intelligence Analysis of Educational Tweets
S Cleveland, BC Jackson, M Dawson
E-Learning and Digital Media 13 (1-2), 1-19, 2016
242016
Changing The Cultures of Colleges and Universities to Make Them More Adaptive
A Finch, DN Burrell, R Walker, E Rahim, M Dawson
REVIEW OF HIGHER EDUCATION AND SELF-LEARNING 3 (7), 40-53, 2010
212010
Understanding the Need and Importance of the Cloud Computing Environment within the National Institute of Food and Agriculture, an Agency of the United States Department of …
F Onyegbula, M Dawson, J Stevens
Journal of Information Systems Technology and Planning 4 (8), 17-42, 2011
202011
Improving Cyber Defense Education Through National Standard Alignment: Case Studies
P Wang, M Dawson, K Williams
National Security: Breakthroughs in Research and Practice, 78-91, 2019
192019
Improving Cyber Defense Education through National Standard Alignment: Case Studies
P Wang, M Dawson, K Williams
International Journal of Hyperconnectivity and the Internet of Things 2 (1 …, 2018
192018
Research in progress-defending android smartphones from malware attacks
M Omar, M Dawson
2013 third international conference on advanced computing and communication …, 2013
192013
The system can't perform the operation now. Try again later.
Articles 1–20