Enviar pesquisa
Carregar
Integrating business intelligence and visualization tools into graduate technology programs
•
0 gostou
•
239 visualizações
Maurice Dawson
Seguir
Denunciar
Compartilhar
Denunciar
Compartilhar
1 de 15
Baixar agora
Baixar para ler offline
Recomendados
Preparing for Success
Preparing for Success
Maurice Dawson
SOFT POWER AND DIPLOMACY IN COUNTER
SOFT POWER AND DIPLOMACY IN COUNTER
Ilkim Ilayda Kiraz
Cyber security has become a matter of national, international, economic, and societal importance that affects multiple nations (Walker, 2012). Since the 1990s users have exploited vulnerabilities to gain access to networks for malicious purposes. In recent years the number of attacks on U.S. networks has continued to grow at an exponential rate. This includes malicious embedded code, exploitation of backdoors, and more. These attacks can be initiated from anywhere in the world from behind a computer with a masked Internet Protocol (IP) address. This type of warfare, cyber warfare, changes the landscape of war itself (Beidleman, 2009). This type of warfare removes the need to have a physically capable military and requires the demand for a force that has a strong technical capacity e.g. computer science skills. The U.S. and other countries have come to understand that this is an issue and has developed policies to handle this in an effort to mitigate the threats. In Estonia and Georgia there were direct attacks on government cyber infrastructure (Beildleman, 2009). The attacks in Estonia rendered the government’s infrastructure useless. The government and other associated entities heavily relied upon this e-government infrastructure. These attacks help lead to the development of cyber defense organizations within Europe.
Understanding the Methods behind Cyber Terrorism
Understanding the Methods behind Cyber Terrorism
Maurice Dawson
Accurately Attributing the Sony Hack is More Important than Retaliating
Accurately Attributing the Sony Hack is More Important than Retaliating
Michael Sexton
Proposals Submission Deadline: July 15, 2013 Full Chapters Due: October 15, 2013 Submission Date: February 28, 2014 Introduction Technology and Innovation is impacting every aspect of our lives. All the businesses are impacted in one way or the other through the implementation of Technology. We touch upon various topics in this book that deal with the interdisciplinary field of Business and Information Technology. Businesses are actively implementing IT and there is lot of research going on that is studying their impact on each other. This book covers fundamentals and advanced topics that relate to technology, innovation and their impact on enterprise transformation within the scope of latest technical advancements and innovations, financial enterprise transformation and business operations enterprise transformation. Objective of the Book This book will aim to provide relevant theoretical frameworks, foundational literature survey and the latest empirical research findings in the area. It will be written for academicians, researchers, professionals, and scholars who want to improve their understanding of various technologies and innovations. It will introduce technologies and innovations that are already making significant changes and also discuss the upcoming innovations that will transform the world at large and enterprises. Target Audience The target audience of this book will be composed of academicians, professionals, scholars and researchers working in the field of technology, innovation and business e.g. professionals in information technology, computer science, business, finance, and operations. This book will provide depths of technology to non-technical people, and also business insights to those in technical fields. It will act as an interdisciplinary resource and a helpful guide for people in technology and business alike
Call for chapter_proposals for Technology, Innovation and Enterprise Transfor...
Call for chapter_proposals for Technology, Innovation and Enterprise Transfor...
Maurice Dawson
As many areas in America are rapidly losing funding for technological advances in education, we as educators have to be innovative. The Republic of Macedonia is utilizing Edubuntu in all primary and secondary schools for a program titled Computer for Every Child which started in 2008. Open Source Software (OSS) could be the answer in providing lower socio economic schools a competitive edge to continue to compete for a technological standpoint. OSS is software developed in a collaborative and public environment. OSS is freely available software that is generally under the GNU General Public License (GNU GPL). With this license there is never a charge however any modifications must follow the associated license with the software. This research is to provide an alternative solution to resource limited schools and ensure the competitiveness of American children as our society becomes more global.
Open source software to assist lower socio economic
Open source software to assist lower socio economic
Maurice Dawson
Presentation by Katarzyna Cuadrat-Grzybowska on the occasion of the Hearing on EU Counter-Terrorism policy held at the EESC premises on 9 February 2011.
Data Protection / EU Counter-Terrorism policy
Data Protection / EU Counter-Terrorism policy
European Economic and Social Committee - SOC Section
Presentation from a NATO Advanced Training Seminar in Kiev, Ukraine back in 2010. The seminar was titled CYBER TERRORISM PREVENTION & COUNTERACTION.
Capabilities of Cyber-Trerrorists - POTENTIAL ATTACKS - Possibility, Likelyho...
Capabilities of Cyber-Trerrorists - POTENTIAL ATTACKS - Possibility, Likelyho...
Cristian Driga
Recomendados
Preparing for Success
Preparing for Success
Maurice Dawson
SOFT POWER AND DIPLOMACY IN COUNTER
SOFT POWER AND DIPLOMACY IN COUNTER
Ilkim Ilayda Kiraz
Cyber security has become a matter of national, international, economic, and societal importance that affects multiple nations (Walker, 2012). Since the 1990s users have exploited vulnerabilities to gain access to networks for malicious purposes. In recent years the number of attacks on U.S. networks has continued to grow at an exponential rate. This includes malicious embedded code, exploitation of backdoors, and more. These attacks can be initiated from anywhere in the world from behind a computer with a masked Internet Protocol (IP) address. This type of warfare, cyber warfare, changes the landscape of war itself (Beidleman, 2009). This type of warfare removes the need to have a physically capable military and requires the demand for a force that has a strong technical capacity e.g. computer science skills. The U.S. and other countries have come to understand that this is an issue and has developed policies to handle this in an effort to mitigate the threats. In Estonia and Georgia there were direct attacks on government cyber infrastructure (Beildleman, 2009). The attacks in Estonia rendered the government’s infrastructure useless. The government and other associated entities heavily relied upon this e-government infrastructure. These attacks help lead to the development of cyber defense organizations within Europe.
Understanding the Methods behind Cyber Terrorism
Understanding the Methods behind Cyber Terrorism
Maurice Dawson
Accurately Attributing the Sony Hack is More Important than Retaliating
Accurately Attributing the Sony Hack is More Important than Retaliating
Michael Sexton
Proposals Submission Deadline: July 15, 2013 Full Chapters Due: October 15, 2013 Submission Date: February 28, 2014 Introduction Technology and Innovation is impacting every aspect of our lives. All the businesses are impacted in one way or the other through the implementation of Technology. We touch upon various topics in this book that deal with the interdisciplinary field of Business and Information Technology. Businesses are actively implementing IT and there is lot of research going on that is studying their impact on each other. This book covers fundamentals and advanced topics that relate to technology, innovation and their impact on enterprise transformation within the scope of latest technical advancements and innovations, financial enterprise transformation and business operations enterprise transformation. Objective of the Book This book will aim to provide relevant theoretical frameworks, foundational literature survey and the latest empirical research findings in the area. It will be written for academicians, researchers, professionals, and scholars who want to improve their understanding of various technologies and innovations. It will introduce technologies and innovations that are already making significant changes and also discuss the upcoming innovations that will transform the world at large and enterprises. Target Audience The target audience of this book will be composed of academicians, professionals, scholars and researchers working in the field of technology, innovation and business e.g. professionals in information technology, computer science, business, finance, and operations. This book will provide depths of technology to non-technical people, and also business insights to those in technical fields. It will act as an interdisciplinary resource and a helpful guide for people in technology and business alike
Call for chapter_proposals for Technology, Innovation and Enterprise Transfor...
Call for chapter_proposals for Technology, Innovation and Enterprise Transfor...
Maurice Dawson
As many areas in America are rapidly losing funding for technological advances in education, we as educators have to be innovative. The Republic of Macedonia is utilizing Edubuntu in all primary and secondary schools for a program titled Computer for Every Child which started in 2008. Open Source Software (OSS) could be the answer in providing lower socio economic schools a competitive edge to continue to compete for a technological standpoint. OSS is software developed in a collaborative and public environment. OSS is freely available software that is generally under the GNU General Public License (GNU GPL). With this license there is never a charge however any modifications must follow the associated license with the software. This research is to provide an alternative solution to resource limited schools and ensure the competitiveness of American children as our society becomes more global.
Open source software to assist lower socio economic
Open source software to assist lower socio economic
Maurice Dawson
Presentation by Katarzyna Cuadrat-Grzybowska on the occasion of the Hearing on EU Counter-Terrorism policy held at the EESC premises on 9 February 2011.
Data Protection / EU Counter-Terrorism policy
Data Protection / EU Counter-Terrorism policy
European Economic and Social Committee - SOC Section
Presentation from a NATO Advanced Training Seminar in Kiev, Ukraine back in 2010. The seminar was titled CYBER TERRORISM PREVENTION & COUNTERACTION.
Capabilities of Cyber-Trerrorists - POTENTIAL ATTACKS - Possibility, Likelyho...
Capabilities of Cyber-Trerrorists - POTENTIAL ATTACKS - Possibility, Likelyho...
Cristian Driga
Counter Terrorism Measures in Southeast Asia: How Effective Are They? by Romm...
Counter Terrorism Measures in Southeast Asia: How Effective Are They? by Romm...
Rommel Banlaoi
Combating Terrorism
Combating Terrorism
shainks023
Tristan SIMONART1, Peter AMBS2, David ALEXANDER3, Heiko WERNER4, Hans-Christian GRAN5, Delilah ALKHUDHAIRY6, Chaim RAFALOWSKI7 1European Commission, ENTR; 2Interpol; 3GRF Davos; 4THW; 5FFI, Norway; 6JRC; 7Magen David Adom
Recent and future developments in EU security research. From a counter-terror...
Recent and future developments in EU security research. From a counter-terror...
Global Risk Forum GRFDavos
Professor Afsheen John Radsan reviews, in the context of various memoranda from the Justice Department’s Office of Legal Counsel, the differences between a lawyer’s duty of zealous advocacy (ABA Model Rule 3.1) and the duty of candor in legal advice (ABA Model Rule 2.1).
Ethics in the Justice Department’s Advice on Counter Terrorism
Ethics in the Justice Department’s Advice on Counter Terrorism
William Mitchell College of Law
Cyber crime
Cyber crime
Алена Литягина
This presentation was presented in December 2012 at John Jay College of Criminal Justice in the course "Capstone in International Crime and Justice". The course is the culminating course of the MA program in International Crime and Justice program that seeks to train its students to tackle current issues in international criminal justice. The presentation is based upon the paper written by the presenter for the same course. Statement of policy problem: Current Counter-Terrorism (CT) policy has been very heavily focused on crime prevention techniques that deal with the formal sectors. However, the anti-money laundering/counter financing of terrorism (AML/CFT) regime has had a negative impact on the work of humanitarian organizations, charities and the larger NPO sector. These organizations provide another key piece to CT policy and prevention as well as critical services during crises. CT policy needs to be adjusted to prevent further abuses and marginalization of this key sector.
Redefining "Material Support": Rethinking Counter-Terrorism Policies that Pre...
Redefining "Material Support": Rethinking Counter-Terrorism Policies that Pre...
Lydia Boyer
ppt
Ppt rejitha
Ppt rejitha
rejitharnair
Cyber terrorism is on the rise and is constantly affecting millions every day. These malicious attacks can affect one single person to government entities. These attacks can be done with a few lines of code or large complex programs that have the ability to target specific hardware. The authors investigate the attacks on individuals, corporations, and government infrastructures throughout the world. Provided will be specific examples of what a cyber-terrorist attack is and why this method of attack is the preferred method of engagement today. The authors will also identify software applications which track system weaknesses and vulnerabilities. As the United States (U.S.) government has stated an act of cyber terrorism is an act of war it is imperative that we explore this new method of terrorism and how it can be mitigated to an acceptable risk. Learning Outcomes: • Define Cyber Terrorism • Understand Associated Risks with Cyber Terrorism • Gain Awareness in Emerging Cyber Threats • Understand Applicability to Doctoral Research
Future of Cyber Terrorism
Future of Cyber Terrorism
Maurice Dawson
11 December 2015
Tbilisi International Forum on Counter-Terrorism, Geopolitics, and State Secu...
Tbilisi International Forum on Counter-Terrorism, Geopolitics, and State Secu...
Oneworld Multimedia
Lesson for National 5 Modern Studies.
Week 3: Responses to terrorism
Week 3: Responses to terrorism
kamila_fraser
UK Counter Terrorism Case Study
UK Counter Terrorism Case Study
Dr Paul Norman
The cybersecurity of critical infrastructures is an essential topic within national and international security as 16 critical infrastructure sectors touch various aspects of American society. Because the failure to provide adequate cybersecurity controls within the critical infrastructure sectors renders the country open to an attack that could have a debilitating effect on security, national public health, safety, and economic security, this matter is so vital that there is the Presidential Policy Directive (PPD) 21 Critical Infrastructure Security and Resilience advances a national policy to strengthen and maintain secure, functioning and resilient critical infrastructure. An organization identified as the Cybersecurity and Infrastructure Security Agency (CISA) at the Department of Homeland Security (DHS) has the mission to be the risk advisor for the United States (US). Other organizations, such as the National Security Agency (NSA), have approved a specific Knowledge Unit (KU) to address cybersecurity for critical infrastructures associated with doctoral-level granting programs. To address this challenge, it is necessary to identify threats better and defend against them while mitigating risks to an acceptable level. Only then can a nation build a more secure and resilient infrastructure for the future while defending against present-day bad actors as cyberwarfare, cyber espionage, and cybersecurity attacks are the modern-day threats that need to be addressed in planning, designing, implementation, and maintenance. Therefore, the researchers developed a case study reviewing threats against different sectors defined in the PPD.
Understanding the Challenge of Cybersecurity in Critical Infrastructure Sectors
Understanding the Challenge of Cybersecurity in Critical Infrastructure Sectors
Maurice Dawson
Since the last elections in the United States, France, and other nations, fake news has become a tool to manipulate voters. This creation of fake news creates a problem that ripples through an entire society creating division. However, the media has not scrutinized enough on data misuse. Daily it appears that there are breaches causing millions of users to have their personal information taken, exposed, and sold on the Dark Web in exchange of encrypted currencies. Recently, news has surfaced of major social media sites allowing emails to be read without user consent.
Unprotected Data: Your Risk of Internet-Enabled Psychological and Information...
Unprotected Data: Your Risk of Internet-Enabled Psychological and Information...
Maurice Dawson
The Internet of Things describes a world in which smart technologies enable objects with a network to communicate with each other and interface with humans effortlessly. This connected world of convenience and technology does not come without its drawbacks, as interconnectivity implies hackability. This talk will discuss technical, human, societal, and policy issues concerning hyperconnectivity and IoT. Additionally, this talk will offer insights from cutting-edge research about the strategies and techniques that can be implemented to protect against cyber-attacks.
Security Solutions for Hyperconnectivity in the Internet of Things
Security Solutions for Hyperconnectivity in the Internet of Things
Maurice Dawson
The purpose of this paper is to provide a framework that allows for the development of a virtual lab that incorporates emerging technologies such as the Industrial Internet of Things and embedded systems while incorporating open source components. The global shortage of talent is a significant concern as organizations continue to embrace and roll out new technologies such as 5G, and Artificial Intelligence. Several countries such as those in developing countries face issues regarding technology use in the classroom. Thus, to provide a learning environment where cybersecurity and information systems concepts can be taught in an exploratory environment.
Framework for the Development of Virtual Labs for Industrial Internet of Thin...
Framework for the Development of Virtual Labs for Industrial Internet of Thin...
Maurice Dawson
In this paper, the researcher briefly discusses the attacks that have occurred recently within Saudi Arabia to entities such as Saudi Aramco to the Ministry of Health. These attacks are aggressions against government institutions that can render a sector vulnerable. Observing the ongoing attacks on critical infrastructure in Ukraine one can see a replication of similar attacks that could occur and spread over the Middle East. As this nation is a politically turbulent region, there is no small number of external threats. To combat these evolving threat, a shift towards cyber readiness must occur. This includes new laws, security hardened technologies, and education for people living in the kingdom.
Unprepared for Cybersecurity in Saudi Arabia: Argument for a Shift Towards Cy...
Unprepared for Cybersecurity in Saudi Arabia: Argument for a Shift Towards Cy...
Maurice Dawson
An ever-evolving technological landscape also means a rapidly changing digital battlefield. The integration of intelligence, psychological operations, information warfare, data science, and cybersecurity has allowed for unparalleled events to be possible. This session is to explore the landscape and sample some of the applications to perform this exploration.
CTRL, Search, Exploit, and Destroy
CTRL, Search, Exploit, and Destroy
Maurice Dawson
View the contents of the Fall 2017 newsletter here.
MWAIS Fall 2017 Newsletter
MWAIS Fall 2017 Newsletter
Maurice Dawson
Newsletter editor's note p3 president's newsletter p4-6 MWAIS Recognizes Outstanding Officers p7 Highlights from MWAIS 2018 p8-11 Using Information Systems to aid the Agriculture Sector in West Africa p12-13 Establishing an Enterprise Security Architecture p14-16 MWAIS 2019 p17 Call for MWAIS Annual Conference Organizer p18 JMWAIS Call for Papers p19-20 2017-2018 MWAIS Executive Board p21 MWAIS New Members p22
MWAIS Fall 2018 Newsletter
MWAIS Fall 2018 Newsletter
Maurice Dawson
Many countries in the Economic Community of West African States (ECOWAS) are using Information Communications Technology (ICT) to enhance agriculture development and production. To do this efficiently the John Ogonowski and Doug Bereuter Farmer-to-Farmer Program managed for West Africa by Winrock International has been tasked with providing volunteer assignments to ministries of agriculture. The University of Missouri - Saint Louis (UMSL) has entered a partnership with Winrock International to offer upper-level undergraduate and graduate students the opportunity to provide technical assistance to international government entities. In this panel; we discuss findings and opportunities for improvement in Guinea and Senegal as they relate to ICT discovered through the onsite support provided.
Information Technology Use in West African Agriculture – challenges and oppor...
Information Technology Use in West African Agriculture – challenges and oppor...
Maurice Dawson
This article critically analyzes a project executed for the The John Ogonowski and Doug Bereuter Farmer-to-Farmer Program which provides technical assistance with volunteers from the United States to farmers, agricultural institutions, and government organizations involved in agriculture such as the Ministry of Agriculture. In Guinea, the focus is on computer literacy as more sectors of agriculture rely on computing technology. These skills needs range from basic computing tasks such as creating databases to more advanced items such as programming Global Positional Systems. This study looks at findings, based on the analysis of the System Usability Scale results from a sample of 16 participants. The findings demonstrated that the training proved to be effective for the participants and continued training is necessary. As a result of training 62.5% of the participants ranked above average, as opposed to 43.6% prior to training.
The Case for IT Training within Guinea’s Ministry of Agriculture: Evaluating ...
The Case for IT Training within Guinea’s Ministry of Agriculture: Evaluating ...
Maurice Dawson
The 13th Annual Conference of the Midwest AIS will be held in St. Louis, Missouri, and is sponsored by the College of Business Administration at the University of Missouri – St. Louis (UMSL). MWAIS 2018 will provide an intimate environment to facilitate the sharing of ideas, and close interaction among participants. About 100 participants are expected from throughout the Midwest US, the neighboring states and Canadian provinces, and beyond. With nearly 17,000 students, UMSL is the largest public research university in eastern Missouri. It provides excellent learning experiences and leadership opportunities to a diverse student body whose influence on the region upon graduation is immense. UMSL is spread across 470 acres in suburban St. Louis County. UMSL’s College of Business Administration is accredited by Association to Advance Collegiate Schools of Business (AACSB) International. UMSL is the region’s first and only NSA/DHS designated ‘Center of Academic Excellence in Cyber Defense Education’. The conference will be held at the the Anheuser-Busch Hall at UMSL.
Schedule for the 13th Annual Conference of the Midwest AIS
Schedule for the 13th Annual Conference of the Midwest AIS
Maurice Dawson
Mais conteúdo relacionado
Destaque
Counter Terrorism Measures in Southeast Asia: How Effective Are They? by Romm...
Counter Terrorism Measures in Southeast Asia: How Effective Are They? by Romm...
Rommel Banlaoi
Combating Terrorism
Combating Terrorism
shainks023
Tristan SIMONART1, Peter AMBS2, David ALEXANDER3, Heiko WERNER4, Hans-Christian GRAN5, Delilah ALKHUDHAIRY6, Chaim RAFALOWSKI7 1European Commission, ENTR; 2Interpol; 3GRF Davos; 4THW; 5FFI, Norway; 6JRC; 7Magen David Adom
Recent and future developments in EU security research. From a counter-terror...
Recent and future developments in EU security research. From a counter-terror...
Global Risk Forum GRFDavos
Professor Afsheen John Radsan reviews, in the context of various memoranda from the Justice Department’s Office of Legal Counsel, the differences between a lawyer’s duty of zealous advocacy (ABA Model Rule 3.1) and the duty of candor in legal advice (ABA Model Rule 2.1).
Ethics in the Justice Department’s Advice on Counter Terrorism
Ethics in the Justice Department’s Advice on Counter Terrorism
William Mitchell College of Law
Cyber crime
Cyber crime
Алена Литягина
This presentation was presented in December 2012 at John Jay College of Criminal Justice in the course "Capstone in International Crime and Justice". The course is the culminating course of the MA program in International Crime and Justice program that seeks to train its students to tackle current issues in international criminal justice. The presentation is based upon the paper written by the presenter for the same course. Statement of policy problem: Current Counter-Terrorism (CT) policy has been very heavily focused on crime prevention techniques that deal with the formal sectors. However, the anti-money laundering/counter financing of terrorism (AML/CFT) regime has had a negative impact on the work of humanitarian organizations, charities and the larger NPO sector. These organizations provide another key piece to CT policy and prevention as well as critical services during crises. CT policy needs to be adjusted to prevent further abuses and marginalization of this key sector.
Redefining "Material Support": Rethinking Counter-Terrorism Policies that Pre...
Redefining "Material Support": Rethinking Counter-Terrorism Policies that Pre...
Lydia Boyer
ppt
Ppt rejitha
Ppt rejitha
rejitharnair
Cyber terrorism is on the rise and is constantly affecting millions every day. These malicious attacks can affect one single person to government entities. These attacks can be done with a few lines of code or large complex programs that have the ability to target specific hardware. The authors investigate the attacks on individuals, corporations, and government infrastructures throughout the world. Provided will be specific examples of what a cyber-terrorist attack is and why this method of attack is the preferred method of engagement today. The authors will also identify software applications which track system weaknesses and vulnerabilities. As the United States (U.S.) government has stated an act of cyber terrorism is an act of war it is imperative that we explore this new method of terrorism and how it can be mitigated to an acceptable risk. Learning Outcomes: • Define Cyber Terrorism • Understand Associated Risks with Cyber Terrorism • Gain Awareness in Emerging Cyber Threats • Understand Applicability to Doctoral Research
Future of Cyber Terrorism
Future of Cyber Terrorism
Maurice Dawson
11 December 2015
Tbilisi International Forum on Counter-Terrorism, Geopolitics, and State Secu...
Tbilisi International Forum on Counter-Terrorism, Geopolitics, and State Secu...
Oneworld Multimedia
Lesson for National 5 Modern Studies.
Week 3: Responses to terrorism
Week 3: Responses to terrorism
kamila_fraser
UK Counter Terrorism Case Study
UK Counter Terrorism Case Study
Dr Paul Norman
Destaque
(11)
Counter Terrorism Measures in Southeast Asia: How Effective Are They? by Romm...
Counter Terrorism Measures in Southeast Asia: How Effective Are They? by Romm...
Combating Terrorism
Combating Terrorism
Recent and future developments in EU security research. From a counter-terror...
Recent and future developments in EU security research. From a counter-terror...
Ethics in the Justice Department’s Advice on Counter Terrorism
Ethics in the Justice Department’s Advice on Counter Terrorism
Cyber crime
Cyber crime
Redefining "Material Support": Rethinking Counter-Terrorism Policies that Pre...
Redefining "Material Support": Rethinking Counter-Terrorism Policies that Pre...
Ppt rejitha
Ppt rejitha
Future of Cyber Terrorism
Future of Cyber Terrorism
Tbilisi International Forum on Counter-Terrorism, Geopolitics, and State Secu...
Tbilisi International Forum on Counter-Terrorism, Geopolitics, and State Secu...
Week 3: Responses to terrorism
Week 3: Responses to terrorism
UK Counter Terrorism Case Study
UK Counter Terrorism Case Study
Mais de Maurice Dawson
The cybersecurity of critical infrastructures is an essential topic within national and international security as 16 critical infrastructure sectors touch various aspects of American society. Because the failure to provide adequate cybersecurity controls within the critical infrastructure sectors renders the country open to an attack that could have a debilitating effect on security, national public health, safety, and economic security, this matter is so vital that there is the Presidential Policy Directive (PPD) 21 Critical Infrastructure Security and Resilience advances a national policy to strengthen and maintain secure, functioning and resilient critical infrastructure. An organization identified as the Cybersecurity and Infrastructure Security Agency (CISA) at the Department of Homeland Security (DHS) has the mission to be the risk advisor for the United States (US). Other organizations, such as the National Security Agency (NSA), have approved a specific Knowledge Unit (KU) to address cybersecurity for critical infrastructures associated with doctoral-level granting programs. To address this challenge, it is necessary to identify threats better and defend against them while mitigating risks to an acceptable level. Only then can a nation build a more secure and resilient infrastructure for the future while defending against present-day bad actors as cyberwarfare, cyber espionage, and cybersecurity attacks are the modern-day threats that need to be addressed in planning, designing, implementation, and maintenance. Therefore, the researchers developed a case study reviewing threats against different sectors defined in the PPD.
Understanding the Challenge of Cybersecurity in Critical Infrastructure Sectors
Understanding the Challenge of Cybersecurity in Critical Infrastructure Sectors
Maurice Dawson
Since the last elections in the United States, France, and other nations, fake news has become a tool to manipulate voters. This creation of fake news creates a problem that ripples through an entire society creating division. However, the media has not scrutinized enough on data misuse. Daily it appears that there are breaches causing millions of users to have their personal information taken, exposed, and sold on the Dark Web in exchange of encrypted currencies. Recently, news has surfaced of major social media sites allowing emails to be read without user consent.
Unprotected Data: Your Risk of Internet-Enabled Psychological and Information...
Unprotected Data: Your Risk of Internet-Enabled Psychological and Information...
Maurice Dawson
The Internet of Things describes a world in which smart technologies enable objects with a network to communicate with each other and interface with humans effortlessly. This connected world of convenience and technology does not come without its drawbacks, as interconnectivity implies hackability. This talk will discuss technical, human, societal, and policy issues concerning hyperconnectivity and IoT. Additionally, this talk will offer insights from cutting-edge research about the strategies and techniques that can be implemented to protect against cyber-attacks.
Security Solutions for Hyperconnectivity in the Internet of Things
Security Solutions for Hyperconnectivity in the Internet of Things
Maurice Dawson
The purpose of this paper is to provide a framework that allows for the development of a virtual lab that incorporates emerging technologies such as the Industrial Internet of Things and embedded systems while incorporating open source components. The global shortage of talent is a significant concern as organizations continue to embrace and roll out new technologies such as 5G, and Artificial Intelligence. Several countries such as those in developing countries face issues regarding technology use in the classroom. Thus, to provide a learning environment where cybersecurity and information systems concepts can be taught in an exploratory environment.
Framework for the Development of Virtual Labs for Industrial Internet of Thin...
Framework for the Development of Virtual Labs for Industrial Internet of Thin...
Maurice Dawson
In this paper, the researcher briefly discusses the attacks that have occurred recently within Saudi Arabia to entities such as Saudi Aramco to the Ministry of Health. These attacks are aggressions against government institutions that can render a sector vulnerable. Observing the ongoing attacks on critical infrastructure in Ukraine one can see a replication of similar attacks that could occur and spread over the Middle East. As this nation is a politically turbulent region, there is no small number of external threats. To combat these evolving threat, a shift towards cyber readiness must occur. This includes new laws, security hardened technologies, and education for people living in the kingdom.
Unprepared for Cybersecurity in Saudi Arabia: Argument for a Shift Towards Cy...
Unprepared for Cybersecurity in Saudi Arabia: Argument for a Shift Towards Cy...
Maurice Dawson
An ever-evolving technological landscape also means a rapidly changing digital battlefield. The integration of intelligence, psychological operations, information warfare, data science, and cybersecurity has allowed for unparalleled events to be possible. This session is to explore the landscape and sample some of the applications to perform this exploration.
CTRL, Search, Exploit, and Destroy
CTRL, Search, Exploit, and Destroy
Maurice Dawson
View the contents of the Fall 2017 newsletter here.
MWAIS Fall 2017 Newsletter
MWAIS Fall 2017 Newsletter
Maurice Dawson
Newsletter editor's note p3 president's newsletter p4-6 MWAIS Recognizes Outstanding Officers p7 Highlights from MWAIS 2018 p8-11 Using Information Systems to aid the Agriculture Sector in West Africa p12-13 Establishing an Enterprise Security Architecture p14-16 MWAIS 2019 p17 Call for MWAIS Annual Conference Organizer p18 JMWAIS Call for Papers p19-20 2017-2018 MWAIS Executive Board p21 MWAIS New Members p22
MWAIS Fall 2018 Newsletter
MWAIS Fall 2018 Newsletter
Maurice Dawson
Many countries in the Economic Community of West African States (ECOWAS) are using Information Communications Technology (ICT) to enhance agriculture development and production. To do this efficiently the John Ogonowski and Doug Bereuter Farmer-to-Farmer Program managed for West Africa by Winrock International has been tasked with providing volunteer assignments to ministries of agriculture. The University of Missouri - Saint Louis (UMSL) has entered a partnership with Winrock International to offer upper-level undergraduate and graduate students the opportunity to provide technical assistance to international government entities. In this panel; we discuss findings and opportunities for improvement in Guinea and Senegal as they relate to ICT discovered through the onsite support provided.
Information Technology Use in West African Agriculture – challenges and oppor...
Information Technology Use in West African Agriculture – challenges and oppor...
Maurice Dawson
This article critically analyzes a project executed for the The John Ogonowski and Doug Bereuter Farmer-to-Farmer Program which provides technical assistance with volunteers from the United States to farmers, agricultural institutions, and government organizations involved in agriculture such as the Ministry of Agriculture. In Guinea, the focus is on computer literacy as more sectors of agriculture rely on computing technology. These skills needs range from basic computing tasks such as creating databases to more advanced items such as programming Global Positional Systems. This study looks at findings, based on the analysis of the System Usability Scale results from a sample of 16 participants. The findings demonstrated that the training proved to be effective for the participants and continued training is necessary. As a result of training 62.5% of the participants ranked above average, as opposed to 43.6% prior to training.
The Case for IT Training within Guinea’s Ministry of Agriculture: Evaluating ...
The Case for IT Training within Guinea’s Ministry of Agriculture: Evaluating ...
Maurice Dawson
The 13th Annual Conference of the Midwest AIS will be held in St. Louis, Missouri, and is sponsored by the College of Business Administration at the University of Missouri – St. Louis (UMSL). MWAIS 2018 will provide an intimate environment to facilitate the sharing of ideas, and close interaction among participants. About 100 participants are expected from throughout the Midwest US, the neighboring states and Canadian provinces, and beyond. With nearly 17,000 students, UMSL is the largest public research university in eastern Missouri. It provides excellent learning experiences and leadership opportunities to a diverse student body whose influence on the region upon graduation is immense. UMSL is spread across 470 acres in suburban St. Louis County. UMSL’s College of Business Administration is accredited by Association to Advance Collegiate Schools of Business (AACSB) International. UMSL is the region’s first and only NSA/DHS designated ‘Center of Academic Excellence in Cyber Defense Education’. The conference will be held at the the Anheuser-Busch Hall at UMSL.
Schedule for the 13th Annual Conference of the Midwest AIS
Schedule for the 13th Annual Conference of the Midwest AIS
Maurice Dawson
This brochure is the Farmer to 2 Farmer (F2F) program at the University of Missouri - Saint Louis (UMSL).
UMSL IS | Farmer 2 Farmer Program
UMSL IS | Farmer 2 Farmer Program
Maurice Dawson
The 13th Annual Conference of the Midwest AIS will be held in St. Louis, Missouri, and is sponsored by the College of Business Administration at the University of Missouri – St. Louis (UMSL). MWAIS 2018 will provide an intimate environment to facilitate the sharing of ideas, and close interaction among participants. About 100 participants are expected from throughout the Midwest US, the neighboring states and Canadian provinces, and beyond.
Midwest Association for Information Systems - MWAIS2018
Midwest Association for Information Systems - MWAIS2018
Maurice Dawson
The 13th Annual Conference of the Midwest AIS will be held in St. Louis, Missouri, and is sponsored by the College of Business Administration at the University of Missouri – St. Louis (UMSL). MWAIS 2018 will provide an intimate environment to facilitate the sharing of ideas, and close interaction among participants. About 100 participants are expected from throughout the Midwest US, the neighboring states and Canadian provinces, and beyond.
MWAIS 2018 - 13th Annual Conference
MWAIS 2018 - 13th Annual Conference
Maurice Dawson
Midwest Association for Information Systems 13th Annual Conference May 24 – 25, 2018 College of Business Administration University of Missouri – Saint Louis Saint Louis, Missouri We invite submissions of completed manuscripts, research-in-progress papers, panel proposals, and workshop proposals addressing behavioral, organizational, and technical aspects of information systems. Two to three parallel sessions are planned. A computer lab will be available if needed. Submitted papers and proposals will undergo a double blind review process by at least two reviewers. To facilitate the blind review, include the title of the paper, names, affiliations, mailing addresses, e-mail addresses, and phone numbers of all authors on a cover page submitted as a separate document from the body of the manuscript. If one or more of the co-authors are students, please clearly indicate so. Include only the title of the paper at the beginning of the manuscript. In the case of multiple-authorship, designate the corresponding author with a footnote on the cover page. Please do not include any author or affiliation identification on any page (except the separate cover page), in headings/footers, or in the properties of the submitted file. Previously published work or work under review elsewhere is not eligible for submission. All submissions should be posted electronically in either MS Word or PDF.
MWAIS 2018 : 13th Annual Conference of the Midwest Association for Informatio...
MWAIS 2018 : 13th Annual Conference of the Midwest Association for Informatio...
Maurice Dawson
Recently some countries have fell victim to attacks from nation-states, cyber criminals, and bad actors resulting in loss of critical data or damage to critical infrastructure. Thus there is an urgent need to design, implement, and deliver innovative solutions that meet the challenges through advancements in intellection collection, analysis. This submission will explore multiple aspects of the solutions side of cyber security and present cutting-edge research from researchers and practitioner around the world concerning multiple sources of intelligence. This submission will provide insights into technological advancement for all cyber intelligence. Additionally, technological advancements for subjects such as open source intelligence, human intelligence, geospatial intelligence, social media intelligence, and data science will be explored. Researchers, practitioners, and professionals will benefit from this publication’s broad perspective.
Technological Advancements for Intelligence Collection, Analysis, and Dissemi...
Technological Advancements for Intelligence Collection, Analysis, and Dissemi...
Maurice Dawson
Data and technological advances are abounding at lightening speed. It is hard to stay on top of everything that is happening in these digitally disruptive times. But there has never been more important for companies and individuals to do so. Hacking, privacy, and security are on the minds of every corporation and private citizen. In this keynote, you will hear the latest trends in combating contrast threats to one’s security, how much more data can we possibly handle. The unknowing consumer of everyday products needs to be aware of what it means to have sensors, Radio Frequency IDentification (RFID), Bluetooth, and WiFi enabled products allowing Internet connectivity.
Hacking, Privacy and Security in a Hyperconnected Society
Hacking, Privacy and Security in a Hyperconnected Society
Maurice Dawson
This presentation discusses UMSL's cyber security program which is currently the only and first NSA & DHS CAE in cyber security education in the St. Louis Metropolitan Region.
University of Missouri - Saint Louis Cyber Security
University of Missouri - Saint Louis Cyber Security
Maurice Dawson
This is the most essential programme of the year around the dangers of cybercrime and how to manage safety within the most indispensable digital sphere & technology system. The reason is that, “Looking beyond Internet of Things (IoT) to Internet of Everything there is a potential market that is approximately $14.4 trillion and over 99% of physical devices are still unconnected.” ~Mo Dawson. Your participation give you golden access to a transcending Cyberspace picture, enhanced solution oriented capabilities as an ICT expert or practitioner, Telecommunications Corporates & Companies Personnel, Aviation ICT Officials, Other Transportation controls network hubs, Business dealer in Cyberspace services provider or supplier, Academicians and researchers, Government Departments & Public service ICT systems Officials & staff, Students, general ICT security involvement and on top of that your enhanced multidimensional scope & prosperity out of this untapped gold mine is guaranteed.
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
Maurice Dawson
The Internet of Things describes a world in which smart technologies enable objects with a network to communicate with each other and interface with humans effortlessly. This connected world of convenience and technology does not come without its drawbacks, as interconnectivity implies hackability. Security Solutions for Hyperconnectivity and the Internet of Things offers insights from cutting-edge research about the strategies and techniques that can be implemented to protect against cyber-attacks.
Security Solutions for Hyperconnectivity and the Internet of Things
Security Solutions for Hyperconnectivity and the Internet of Things
Maurice Dawson
Mais de Maurice Dawson
(20)
Understanding the Challenge of Cybersecurity in Critical Infrastructure Sectors
Understanding the Challenge of Cybersecurity in Critical Infrastructure Sectors
Unprotected Data: Your Risk of Internet-Enabled Psychological and Information...
Unprotected Data: Your Risk of Internet-Enabled Psychological and Information...
Security Solutions for Hyperconnectivity in the Internet of Things
Security Solutions for Hyperconnectivity in the Internet of Things
Framework for the Development of Virtual Labs for Industrial Internet of Thin...
Framework for the Development of Virtual Labs for Industrial Internet of Thin...
Unprepared for Cybersecurity in Saudi Arabia: Argument for a Shift Towards Cy...
Unprepared for Cybersecurity in Saudi Arabia: Argument for a Shift Towards Cy...
CTRL, Search, Exploit, and Destroy
CTRL, Search, Exploit, and Destroy
MWAIS Fall 2017 Newsletter
MWAIS Fall 2017 Newsletter
MWAIS Fall 2018 Newsletter
MWAIS Fall 2018 Newsletter
Information Technology Use in West African Agriculture – challenges and oppor...
Information Technology Use in West African Agriculture – challenges and oppor...
The Case for IT Training within Guinea’s Ministry of Agriculture: Evaluating ...
The Case for IT Training within Guinea’s Ministry of Agriculture: Evaluating ...
Schedule for the 13th Annual Conference of the Midwest AIS
Schedule for the 13th Annual Conference of the Midwest AIS
UMSL IS | Farmer 2 Farmer Program
UMSL IS | Farmer 2 Farmer Program
Midwest Association for Information Systems - MWAIS2018
Midwest Association for Information Systems - MWAIS2018
MWAIS 2018 - 13th Annual Conference
MWAIS 2018 - 13th Annual Conference
MWAIS 2018 : 13th Annual Conference of the Midwest Association for Informatio...
MWAIS 2018 : 13th Annual Conference of the Midwest Association for Informatio...
Technological Advancements for Intelligence Collection, Analysis, and Dissemi...
Technological Advancements for Intelligence Collection, Analysis, and Dissemi...
Hacking, Privacy and Security in a Hyperconnected Society
Hacking, Privacy and Security in a Hyperconnected Society
University of Missouri - Saint Louis Cyber Security
University of Missouri - Saint Louis Cyber Security
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
Security Solutions for Hyperconnectivity and the Internet of Things
Security Solutions for Hyperconnectivity and the Internet of Things
Baixar agora