Maurice Dawson
Title
Cited by
Cited by
Year
New Threats and Countermeasures in Digital Crime and Cyber Terrorism
M Dawson, M Omar
IGI Global, 2015
302015
Fostering entrepreneurship and building entrepreneurial self-efficacy in primary and secondary education
NL Studdard, M Dawson, NL Jackson
Creative and Knowledge Society 3 (2), 1-14, 2013
292013
Integrating Software Assurance into the Software Development Life Cycle (SDLC)
M Dawson, D Burrell, E Rahim, S Brewster
Journal of Information Systems Technology and Planning 3 (6), 49-53, 2010
292010
Cyber Security and Mobile Threats: The Need for Antivirus Applications for Smart Phones
J Wright, M Dawson, M Omar
Journal of Information Systems Technology and Planning 5 (14), 40-60, 2012
262012
An Examination of the Prior Use of E-Learning Within an Extended Technology Acceptance Model and the Factors That Influence the Behavioral Intention of Users to Use M-Learning
J Abramson, M Dawson, J Stevens
SAGE Open 5 (4), 1-9, 2015
242015
DoD cyber technology policies to secure automated information systems
ME Dawson Jr, M Crespo, S Brewster
International Journal of Business Continuity and Risk Management 4 (1), 1-22, 2013
202013
Use of open source software and virtualization in academia to enhance higher education everywhere
ME Dawson, I Al Saeed
Increasing Student Engagement and Retention Using Immersive Interfaces …, 2012
202012
Understanding user’s acceptance of personal cloud computing: Using the Technology Acceptance Model
M Eltayeb, M Dawson
Information Technology: New generations 448, 3-12, 2016
182016
Security Solutions for Hyperconnectivity and the Internet of Things
M Dawson, M Eltayeb, M Omar
IGI Global, 2016
172016
Understanding the Methods behind Cyber Terrorism
M Dawson, M Omar, J Abramson
Encyclopedia of Information Science and Technology - 3rd ed., 1539-1549, 2015
172015
Changing The Cultures of Colleges and Universities to Make Them More Adaptive
A Finch, DN Burrell, R Walker, E Rahim, M Dawson
REVIEW OF HIGHER EDUCATION AND SELF-LEARNING 3 (7), 40-53, 2010
172010
Understanding the Need and Importance of the Cloud Computing Environment within the National Institute of Food and Agriculture, an Agency of the United States Department of …
F Onyegbula, M Dawson, J Stevens
Journal of Information Systems Technology and Planning 4 (8), 17-42, 2011
152011
Research in progress-defending android smartphones from malware attacks
M Omar, M Dawson
2013 third international conference on advanced computing and communication …, 2013
142013
Deep Dive into Understanding the Theory of Military Organization, Military Leadership, Skill Transfer, Aspects of Program Management, and Decision Support System
M Dawson, D Burrell, E Rahim
Journal of Global Intelligence and Policy 3 (3), 5-17, 2010
13*2010
Improving Cyber Defense Education Through National Standard Alignment: Case Studies
P Wang, M Dawson, K Williams
National Security: Breakthroughs in Research and Practice, 78-91, 2019
122019
Improving Cyber Defense Education through National Standard Alignment: Case Studies
P Wang, M Dawson, K Williams
International Journal of Hyperconnectivity and the Internet of Things 2 (1 …, 2018
122018
Microblogging in Higher Education: Digital Natives, Knowledge Creation, Social Engineering, and Intelligence Analysis of Educational Tweets
S Cleveland, BC Jackson, M Dawson
E-Learning and Digital Media 13 (1-2), 1-19, 2016
122016
Applying a Holistic Cyber Security Framework for Global IT Organizations
M Dawson
Business Information Review, 2018
112018
Open Source Software to Enhance the STEM Learning Environment
M Dawson, I Al Saeed, J Wright, F Onyegbula
Handbook of Research on Education and Technology in a Changing Society, 569-580, 2014
112014
A contemporary evaluation of universities and sustainability strategic planning
DN Burrell, M Anderson, D Bessette, M Dawson
Review of Management Innovation & Creativity 4 (11), 65-80, 2011
112011
The system can't perform the operation now. Try again later.
Articles 1–20