OpenAIRE is about to release its new face with lots of new content and services.
During September, you may notice downtime in services, while some functionalities (e.g. user registration, login, validation, claiming) will be temporarily disabled.
We apologize for the inconvenience, please stay tuned!
For further information please contact helpdesk[at]openaire.eu

fbtwitterlinkedinvimeoflicker grey 14rssslideshare1
Dawson, Maurice (2017)
Languages: English
Types: Doctoral thesis
Subjects: dewey000
This thesis examined the three core themes: the role of education in cyber security, the role of technology in cyber security, and the role of policy in cyber security, the areas in which the papers are published. The associated works are published in referred journals, peer reviewed book chapters, and conference proceedings. Research can be found in the following outlets: 1. Security Solutions for Hyperconnectivity and the Internet of Things; 2. Developing Next-Generation Countermeasures for Homeland Security Threat Prevention; 3. New Threats and Countermeasures in Digital Crime and Cyber Terrorism; 4. International Journal of Business Continuity and Risk Management; 5. Handbook of Research on 3-D Virtual Environments and Hypermedia for Ubiquitous Learning; 6. Information Security in Diverse Computing Environments; 7. Technology, Innovation, and Enterprise Transformation; 8. Journal of Information Systems Technology and Planning; 9. Encyclopedia of Information Science and Technology. The shortcomings and gaps in cyber security research is the research focus on hyperconnectivity of people and technology to include the policies that provide the standards for security hardened systems. Prior research on cyber and homeland security reviewed the three core themes separately rather than jointly. This study examined the research gaps within cyber security as it relates to core themes in an effort to develop stronger policies, education programs, and hardened technologies for cyber security use. This work illustrates how cyber security can be broken into these three core areas and used together to address issues such as developing training environments for teaching real cyber security events. It will further show the correlations between technologies and policies for system Certification & Accreditation (C&A). Finally, it will offer insights on how cyber security can be used to maintain security for international and national security. The overall results of the study provide guidance on how to create an ubiquitous learning (U-Learning) environment to teach cyber security concepts, craft polices that affect secure computing, and examines the effects on national and international security. The overall research has been improving the role of cyber security in education, technology, and policy.
  • The results below are discovered through our pilot algorithms. Let us know how we are doing!

    • Security Solutions for Hyperconnectivity and the Internet of Things (pp. 260-271). Hershey,
    • PA: IGI Global. doi:10.4018/978-1-5225-0741-3.ch010 25. Eltayeb, M., & Dawson, M. (2016). Understanding user's acceptance of personal cloud
    • generations, 448, 3-12. 26. Omar, M., & Dawson, M. (2013, April). Research in Progress-Defending Android
    • Technologies (ACCT), 2013 Third International Conference on (pp. 288-292). IEEE. A. Abramson, J., Dawson, M., & Stevens, J. (2015). An Examination of the Prior Use of
    • Influence the Behavioral Intention of Users to Use M-Learning. SAGE Open, 5(4),
    • 2158244015621114. B. Burrell, Darrell, Andrea Todd, Aikyna Finch, and Maurice Dawson. "Developing the Next
    • International Journal of Science in Society 3, no. 2 (2012). C. Cleveland, S., Jackson, B. C., & Dawson, M. (2016). Microblogging in higher education:
    • educational tweets. E-Learning and Digital Media, 13(1-2), 62-80. D. Dawson, M., Al Saeed, I., Wright, J., & Omar, M. (2013). Technology Enhanced Learning
    • with Open Source Software for Scientists and Engineers.INTED2013 Proceedings,
    • 5583-5589. E. Dawson Jr, M. E., Wright, J., & Abramson, J. (2013). Transforming Information Systems
    • ICERI2013 Proceedings, 2679-2682.
  • No related research data.
  • No similar publications.

Share - Bookmark

Download from

Cite this article

Cookies make it easier for us to provide you with our services. With the usage of our services you permit us to use cookies.
More information Ok