Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Maurice Dawson is active.

Publication


Featured researches published by Maurice Dawson.


Archive | 2012

Use of Open Source Software and Virtualization in Academia to Enhance Higher Education Everywhere

Maurice Dawson; Imad Al Saeed

As costs around the world continue to rise for education, institutions must become innovative in the ways they teach and grow students. To do this effectively, professors and administrative staff should push toward the utilization of Open Source Software (OSS) and virtual tools to enhance or supplement currently available tools. In developing countries, OSS applications would allow students the ability to learn critical technological skills for success at small fraction of the cost. OSS also provides faculty members the ability to dissect source code and prepare students for low-level software development. It is critical that all institutions look at alternatives in providing training and delivering educational material regardless of limitations going forward as the world continues to be more global due to the increased use of technologies everywhere. Doing this could provide a means of shortening the education gap in many countries. Through reviewing the available technology, possible implementations of these technologies, and the application of these items in graduate coursework could provide a starting point in integrating these tools into academia. When administrators or faculty debate the possibilities of OSS, gaming, and simulation tools, this applied research provides a guide for changing the ability to develop students that will be competitive on a global level.


International Journal of Business Continuity and Risk Management | 2013

DoD cyber technology policies to secure automated information systems

Maurice Dawson; Miguel Crespo; Stephen Brewster

Availability, integrity, and confidentiality (AIC) is a key theme everywhere as cyber security has become more than an emerging topic. The Department of Defense (DoD) has implemented multiple processes such as the Department of Defense information assurance certification and accreditation process (DIACAP), common criteria (CC), and created proven baselines to include information assurance (IA) controls to protect information system (IS) resources. The aim of this research study shall provide insight to the applicable processes, IA controls, and standards to include providing a method for selecting necessary government models and for system development.


international conference on advanced computing | 2013

Research in Progress - Defending Android Smartphones from Malware Attacks

Marwan Omar; Maurice Dawson

Smart phones are becoming enriched with confidential information due to their powerful computational capabilities and attractive communications features. The Android smart phone is one of the most widely used platforms by businesses and users alike. This is partially because Android smart phones use the free, open-source Linux as the underlying operating system, which allows development of applications by any software developer. This research study aims to explore security risks associated with the use of Android smart phones and the sensitive information they contain, the researcher devised a survey questionnaire to investigate and further understand security threats targeting Android smart phones. The survey also intended to study the scope of malware attacks targeting Android phones and the effectiveness of existing defense measures. The study surveyed the average Android users as the target population to understand how they perceive security and what security controls they use to protect their smart phones.


Archive | 2015

New Threats and Countermeasures in Digital Crime and Cyber Terrorism

Maurice Dawson; Marwan Omar

Technological advances, although beneficial and progressive, can lead to vulnerabilities in system networks and security. While researchers attempt to find solutions, negative uses of technology continue to create new security threats to users. New Threats and Countermeasures in Digital Crime and Cyber Terrorism brings together research-based chapters and case studies on security techniques and current methods being used to identify and overcome technological vulnerabilities with an emphasis on security issues in mobile computing and online activities. This book is an essential reference source for researchers, university academics, computing professionals, and upper-level students interested in the techniques, laws, and training initiatives currently being implemented and adapted for secure computing.


international conference on information technology | 2016

Understanding User’s Acceptance of Personal Cloud Computing: Using the Technology Acceptance Model

Mohamed Eltayeb; Maurice Dawson

Personal Cloud Computing (PCC) is a rapidly growing technology, addressing the market demand of individual users for access to available and reliable resources. But like other new technologies, concerns and issues have surfaced with the adoption of PCC. Users deciding whether to adopt PCC may be concerned about the ease of use, usefulness, or security risks in the cloud. Negative attitudes toward using a technology have been found to negatively impact the success of that technology. The purpose of this study was to understand users’ acceptance of PCC. The population sample consisted of individual users within the United States between 18 and 80 years of age. The theoretical framework utilized in this study was based on the technology acceptance model (TAM). A web survey was conducted to assess the measurement and understanding of patterns demonstrated by participants. Our results shows that in spite of the potential benefits of PCC, security and privacy risks are deterring many users from moving towards PCC.


SAGE Open | 2015

An Examination of the Prior Use of E-Learning Within an Extended Technology Acceptance Model and the Factors That Influence the Behavioral Intention of Users to Use M-Learning

Jonathan Abramson; Maurice Dawson; Jeffery Stevens

The purpose of this empirical study was to test specific factors of behavioral intention to use m-learning in a community college setting using a modified technology acceptance model and antecedent factors suggested by the researcher’s review of the literature. In addition, the study’s purpose was to expand understanding of behavioral intention to use m-learning and to contribute to the growing body of research. This research model was based on relevant technology acceptance literature. The study examines the significance of “prior use of e-learning” and correlation with the behavioral intention to use m-learning. Existing models have looked at prior use of e-learning in other domains, but not specifically m-learning. Other models and studies have primarily looked at the prior use of e-learning variable as a moderating variable and not one that is directly related to attitude and behavioral intention. The study found that there is a relationship between prior use of e-learning and behavioral intention to use m-learning. This research direction was proposed by Lu and Viehland.


Creative and Knowledge Society | 2013

Fostering Entrepreneurship and Building Entrepreneurial Self-Efficacy in Primary and Secondary Education

Nareatha Studdard; Maurice Dawson; Naporshia L. Jackson

Abstract This paper focuses on the positives of introducing entrepreneurship education at the primary and secondary levels of education. Specifically, its central focus deals with building children’s entrepreneurial self-efficacy at a young age. Several benefits, of increasing self-efficacy at a young age, are outlined. Benefits, such as entrepreneurship training, not only train students but, it helps to prepare them for the new knowledge based economy. Further, entrepreneurship education should help increase the success and survival rates of women and minority entrepreneurs. Essential to this process, a new curriculum needs to be devised including its means of assessment. Lastly barriers to an entrepreneurship program are discussed; this includes financial, political and negative perceptions of entrepreneurship education.


International Journal of Project Organisation and Management | 2011

Transitional leadership in the defence and aerospace industry: a critical analysis for recruiting and developing talent

Maurice Dawson; Emad Rahim

This article proposes a framework to create effective transitional leadership in the defence and aerospace industry. The proposed framework identifies and maps traits and skills of military personnel in a manner that can be tested and validated in accordance with principles of human resource management. Applying this framework would assist hiring managers in their selection of program or project managers from the military in transition to a defence contractor support organisation. Employing a research approach embracing a mix of both qualitative and quantitative strategies, the study examined more than 50 respondents to a 34-question survey, focusing on 14 respondents who submitted fully completed surveys. The conceptual framework for this study is derived from investigations conducted by project management practitioners and scholars who have built upon the research of previous research, which studied project development models within various industries.


Archive | 2016

Security Solutions for Hyperconnectivity and the Internet of Things

Maurice Dawson; Mohamed Eltayeb; Marwan Omar

The Internet of Things describes a world in which smart technologies enable objects with a network to communicate with each other and interface with humans effortlessly. This connected world of convenience and technology does not come without its drawbacks, as interconnectivity implies hackability. Security Solutions for Hyperconnectivity and the Internet of Things offers insights from cutting-edge research about the strategies and techniques that can be implemented to protect against cyber-attacks. Calling for revolutionary protection strategies to reassess security, this book is an essential resource for programmers, engineers, business professionals, researchers, and advanced students in relevant fields.


Archive | 2018

The Role of CAE-CDE in Cybersecurity Education for Workforce Development

Maurice Dawson; Ping Wang; Kenneth Williams

With a fast-growing demand for properly trained cybersecurity professionals to defend our cyber space and information systems, effective cybersecurity education programs and courses with consistent and reliable quality control and evaluation are necessary to prepare qualified workforce for the cybersecurity industry. The national Centers of Academic Excellence in Cyber Defense Education (CAE-CDE) designation program jointly sponsored by the US National Security Agency (NSA) and Department of Homeland Security (DHS) is a rigorous certification and national standard for maintaining quality of cybersecurity education. This paper explains the CAE-CDE program criteria and requirements and discusses the important role of the designation in cybersecurity education and workforce development. This paper illustrates the educational value and impact of the CAE-CDE program with case studies of three different institutions: (1) University of Missouri—St. Louis, which has obtained the CAE-CDE and Security Policy Development and Compliance Focus Area designations; (2) American Public University System, which has just completed the application for CAE-CDE; and (3) Robert Morris University, which is in the process of applying for the CAE-CDE designation.

Collaboration


Dive into the Maurice Dawson's collaboration.

Top Co-Authors

Avatar

Jorja Wright

Florida Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Darrell Norman Burrell

Virginia International University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Imad Al Saeed

Colorado Technical University

View shared research outputs
Top Co-Authors

Avatar

Sharon L. Burton

Florida Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Simon Cleveland

Nova Southeastern University

View shared research outputs
Top Co-Authors

Avatar

Festus Onyegbula

University of Maryland University College

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Kenneth Williams

American Public University System

View shared research outputs
Researchain Logo
Decentralizing Knowledge