Maurice Dawson

Maurice DawsonMaurice Dawson serves as an Assistant Professor of Information Systems at University of Missouri-St. Louis, Visiting Assistant Professor (Honorary) of Industrial and Systems Engineering at The University of Tennessee Space Institute, and Fulbright. Dawson is recognized as an Information Assurance System Architect and Engineer by the U.S. Department of Defense. Research focus area is cyber security, systems security engineering, open source software (OSS), mobile security, and engineering management.

Publications

Emerging Perspectives in Systems Security Engineering, Data Science, and Artificial Intelligence
Maurice Dawson. © 2024. 315 pages.
The global society has continued down a path of more connected devices, resulting in an explosion of data and endless possibilities, such as the rise of artificial intelligence...
Cybersecurity Capabilities in Developing Nations and Its Impact on Global Security
Maurice Dawson, Oteng Tabona, Thabiso Maupong. © 2022. 282 pages.
Developing nations have seen many technological advances in the last decade. Although beneficial and progressive, they can lead to unsafe mobile devices, system networks, and...
Exploring Holistic Managerial Thinking to Better Manage Healthcare Cybersecurity
Darrell Norman Burrell, Amalisha S. Sabie-Aridi, Anton Shufutinsky, Jorja B. Wright, Calvin Nobles, Maurice Dawson. © 2022. 13 pages.
Healthcare systems in the United States have discovered the massive potential for digital technology to enhance clinical outcomes and change care delivery (Coventry & Branley...
Argument for Improved Security in Local Governments Within the Economic Community of West African States
Maurice Dawson, Damon Walker. © 2022. 11 pages.
The Economic Community of West African States is an economic region located in West Africa. This region has a population of over 349 million and representation for approximately...
Exploring System Thinking Leadership Approaches to the Healthcare Cybersecurity Environment
Darrell Norman Burrell, Amalisha Sabie Aridi, Quatavia McLester, Anton Shufutinsky, Calvin Nobles, Maurice Dawson, S. Raschid Muller. © 2022. 14 pages.
A Florida-based obstetrics and gynecology facility reported in February 2019 that they lost data because of a ransomware attack. In November 2017, 107,000 healthcare records were...
Adopting Organizational Cultural Changes Concerning Whistle-Blowing in Healthcare Around Information Security in the “Internet of Things” World
Darrell Norman Burrell, Nimisha Bhargava, Delores Springs, Maurice Dawson, Sharon L. Burton, Damon P. Anderson, Jorja B. Wright. © 2022. 11 pages.
Medical labs, hospitals, doctor's offices, and medical devices face significant cyber risks. The insecurity of medical devices, including imaging hardware, threatens patient...
Innovative Legitimate Non-Traditional Doctorate Programs in Cybersecurity, Engineering, and Technology
Darrell Norman Burrell, Calvin Nobles, Maurice Dawson, Eugene J. M. Lewis, S. Raschid Muller, Kevin Richardson, Amalisha S. Aridi. © 2022. 14 pages.
According to the US Federal Bureau of Investigations (FBI) the number of complaints about cyberattacks to their cyber division is up to as many as 4,000 a day. Every year in the...
Islamic Extremists in Africa: Security Spotlight on Kenya and Nigeria
Maurice Dawson, Wale Adeboje. © 2021. 11 pages.
Security is a growing concern on the African continent as the Regional Economic Communities (REC) move toward economic integration. Furthermore, these regions collectively make...
Systems Engineering Concepts with Aid of Virtual Worlds and Open Source Software: Using Technology to Develop Learning Objects and Simulation Environments
Latina Davis, Maurice Dawson, Marwan Omar. © 2021. 27 pages.
Technology is changing the landscape of learning and teaching in America. The use of virtual worlds enable engineering and technology programs to implement software programs such...
Creating Inclusive Workplaces for Women in Health Organizations Engaging in Digital Economy-Driven Innovations
Darrell Norman Burrell, Stephanie Johanna Barrett, Eugene J. M. Lewis, Maurice Dawson, Karen Bovell, Margie Crowe. © 2021. 14 pages.
The digital economy is creating significant innovations in healthcare. Thriving in this new digital era requires all kinds of healthcare organizations to shift their cultural and...
How Sustainable Marketing Strategies Apply Digital Economy Innovations in Cyber Marketing and Digital Communications for Colleges
Darrell Norman Burrell, Aikyna Finch, Eugene J. M. Lewis, Maurice Dawson, Karen D. Bovell. © 2021. 16 pages.
Cyber marketing, digital communications, and social media practices for branding and marketing purposes have allowed colleges and universities to engage in sustainable/green...
Dark Web: A Breeding Ground for ID Theft and Financial Crimes
Annamaria Szakonyi, Brian Leonard, Maurice Dawson. © 2021. 19 pages.
The explosion of the internet has given rise to cybercrimes, online identity theft, and fraud. With the internet, these crimes are able to occur anywhere in the world and...
Android Application Security
Marwan Omar, Derek Mohammed, Van Nguyen, Maurice Dawson, Mubarak Banisakher. © 2021. 16 pages.
Android is a free, open source platform that allows any developer to submit apps to the Android Market with no restrictions. This enables hackers to pass their malicious apps to...
Exploring System Thinking Leadership Approaches to the Healthcare Cybersecurity Environment
Darrell Norman Burrell, Amalisha Sabie Aridi, Quatavia McLester, Anton Shufutinsky, Calvin Nobles, Maurice Dawson, S. Raschid Muller. © 2021. 13 pages.
A Florida-based obstetrics and gynecology facility reported in February 2019 that they lost data because of a ransomware attack. In November 2017, 107,000 healthcare records were...
Exploring Secure Computing for the Internet of Things, Internet of Everything, Web of Things, and Hyperconnectivity
Maurice Dawson. © 2020. 10 pages.
Secure computing is essential as environments continue to become intertwined and hyperconnected. As the Internet of Things (IoT), Web of Things (WoT), and the Internet of...
Adopting Organizational Cultural Changes Concerning Whistle-Blowing in Healthcare Around Information Security in the “Internet of Things” World
Darrell Norman Burrell, Nimisha Bhargava, Delores Springs, Maurice Dawson, Sharon L. Burton, Damon P. Anderson, Jorja B. Wright. © 2020. 16 pages.
Medical labs, hospitals, doctor's offices, and medical devices face significant cyber risks. The insecurity of medical devices, including imaging hardware, threatens patient...
Islamic Extremists in Africa: Security Spotlight on Kenya and Nigeria
Maurice Dawson, Wale Adeboje. © 2020. 12 pages.
Security is a growing concern on the African continent as the Regional Economic Communities (REC) move toward economic integration. Furthermore, these regions collectively make...
Perspectives in Talent Management Strategies for Cybersecurity Job Roles in Public Safety and Health in Government Organizations
Darrell Norman Burrell, Delores Springs, Sharon L. Burton, Maurice Dawson, Jorja B. Wright, Rajanique Modeste. © 2020. 17 pages.
US government organizations struggle to broaden an entire of government approach to recruit and keep younger cybersecurity talent at a time when national security and...
Cybersecurity Workforce Development in Minority, Low Income, and Native American Reservation Communities
Aikyna Finch, Darrell Norman Burrell, Shanel Lu, Maurice Dawson, Delores Springs, Kevin Bilberry, Damon P. Anderson, Rajanique Modeste. © 2020. 18 pages.
This study will explore an innovative approach to cybersecurity workforce development in low income, minority, and Native American reservation communities in a way that could...
Systems Usability in Developing Countries: Case of Computing Use in Guinea
Maurice Dawson, Damon Walker, Simon Cleveland. © 2019. 10 pages.
This article critically analyzes a project executed for the John Ogonowski and Doug Bereuter Farmer-to-Farmer Program which provides technical assistance with volunteers from the...
Improving Cyber Defense Education Through National Standard Alignment: Case Studies
Ping Wang, Maurice Dawson, Kenneth L Williams. © 2019. 14 pages.
There has been a fast-growing demand for cybersecurity professionals to defend cyber space and information systems. With more and more programs and course offerings in...
Android Application Security
Marwan Omar, Derek Mohammed, Van Nguyen, Maurice Dawson, Mubarak Banisakher. © 2019. 22 pages.
Android is a free, open source platform that allows any developer to submit apps to the Android Market with no restrictions. This enables hackers to pass their malicious apps to...
The Future of National and International Security on the Internet
Maurice Dawson, Marwan Omar, Jonathan Abramson, Dustin Bessette. © 2019. 31 pages.
Hyperconnectivity is a growing trend that is driving cyber security experts to develop new security architectures for multiple platforms such as mobile devices, laptops, and even...
Massive Open Online Courses and Integrating Open Source Technology and Open Access Literature Into Technology-Based Degrees
Maurice Dawson, Sharon L. Burton, Dustin Bessette, Jorja Wright. © 2018. 14 pages.
Massive Open Online Courses (MOOCs) are a new phenomenon of course delivery for students, faculty, and administrators to use. As this technology continues to grow in the short...
Battlefield Cyberspace: Exploitation of Hyperconnectivity and Internet of Things
Maurice Dawson, Marwan Omar, Jonathan Abramson, Brian Leonard, Dustin Bessette. © 2018. 32 pages.
The threat of cyber terrorism has become a reality with recent attacks such as Stuxtnet, Flame, Sony Pictures, and North Korea's websites. As the Internet of Things (IoT)...
A Brief Review of New Threats and Countermeasures in Digital Crime and Cyber Terrorism
Maurice Dawson. © 2018. 8 pages.
Cyber security is becoming the cornerstone of national security policies in many countries around the world as it is an interest to many stakeholders, including utilities...
Legal Issues: Security and Privacy with Mobile Devices
Brian Leonard, Maurice Dawson. © 2018. 10 pages.
Privacy and security are two items being woven into the fabric of American law concerning mobile devices. This chapter will review and analyze the associated laws and policies...
Improving Cyber Defense Education through National Standard Alignment: Case Studies
Ping Wang, Maurice Dawson, Kenneth L Williams. © 2018. 17 pages.
There has been a fast-growing demand for cybersecurity professionals to defend cyber space and information systems. With more and more programs and course offerings in...
Developing Next-Generation Countermeasures for Homeland Security Threat Prevention
Maurice Dawson, Dakshina Ranjan Kisku, Phalguni Gupta, Jamuna Kanta Sing, Weifeng Li. © 2017. 428 pages.
In the modern world, natural disasters are becoming more commonplace, unmanned systems are becoming the norm, and terrorism and espionage are increasingly taking place online....
Security Solutions for Hyperconnectivity and the Internet of Things
Maurice Dawson, Mohamed Eltayeb, Marwan Omar. © 2017. 347 pages.
The Internet of Things describes a world in which smart technologies enable objects with a network to communicate with each other and interface with humans effortlessly. This...
International Journal of Hyperconnectivity and the Internet of Things (IJHIoT)
Vijender Kr. Solanki. Est. 2017.
The International Journal of Hyperconnectivity and the Internet of Things (IJHIoT) promotes innovative, interesting and rigorously developed conceptual and empirical...
Exploring Secure Computing for the Internet of Things, Internet of Everything, Web of Things, and Hyperconnectivity
Maurice Dawson. © 2017. 12 pages.
Secure computing is essential as environments continue to become intertwined and hyperconnected. As the Internet of Things (IoT), Web of Things (WoT), and the Internet of...
Tails Linux Operating System: The Amnesiac Incognito System in Times of High Surveillance, Its Security Flaws, Limitations, and Strengths in the Fight for Democracy
Jose Antonio Cardenas-Haro, Maurice Dawson. © 2017. 12 pages.
After the information released by Edward Snowden, the world realized about the security risks of high surveillance from governments to citizens or among governments, and how it...
Islamic Extremists in Africa: Security Spotlight on Kenya and Nigeria
Maurice Dawson, Wale Adeboje. © 2017. 11 pages.
Security is a growing concern on the African continent as the Regional Economic Communities (REC) move toward economic integration. Furthermore, these regions collectively make...
Battlefield Cyberspace: Exploitation of Hyperconnectivity and Internet of Things
Maurice Dawson, Marwan Omar, Jonathan Abramson, Brian Leonard, Dustin Bessette. © 2017. 32 pages.
The threat of cyber terrorism has become a reality with recent attacks such as Stuxtnet, Flame, Sony Pictures, and North Korea's websites. As the Internet of Things (IoT)...
Nurturing Social Entrepreneurship and Building Social Entrepreneurial Self-Efficacy: Focusing on Primary and Secondary Schooling to Develop Future Social Entrepreneurs
Nareatha Studdard, Maurice Dawson, Sharon L. Burton, Naporshia Jackson, Brian Leonard, William Quisenberry, Emad Rahim. © 2017. 23 pages.
For the development of social entrepreneurs it is imperative that educators embrace the concepts and process of social entrepreneurship (Dees, 1998). Exploration of these...
Nurturing Social Entrepreneurship and Building Social Entrepreneurial Self-Efficacy: Focusing on Primary and Secondary Schooling to Develop Future Social Entrepreneurs
Nareatha Studdard, Maurice Dawson, Sharon L. Burton, Naporshia Jackson, Brian Leonard, William Quisenberry, Emad Rahim. © 2016. 22 pages.
For the development of social entrepreneurs it is imperative that educators embrace the concepts and process of social entrepreneurship (Dees, 1998). Exploration of these...
Mobile Devices: The Case for Cyber Security Hardened Systems
Maurice Dawson, Jorja Wright, Marwan Omar. © 2016. 21 pages.
Mobile devices are becoming a method to provide an efficient and convenient way to access, find and share information; however, the availability of this information has caused an...
Systems Engineering Concepts with Aid of Virtual Worlds and Open Source Software: Using Technology to Develop Learning Objects and Simulation Environments
Latina Davis, Maurice Dawson, Marwan Omar. © 2016. 27 pages.
Technology is changing the landscape of learning and teaching in America. The use of virtual worlds enable engineering and technology programs to implement software programs such...
Understanding the Methods behind Cyber Terrorism
Maurice Dawson, Marwan Omar, Jonathan Abramson. © 2015. 11 pages.
Advances in Technology Project Management: Review of Open Source Software Integration
Maurice Dawson, Brian Leonard, Emad Rahim. © 2015. 12 pages.
As organizations must continually drive down costs of software-driven projects, they need to evaluate the Systems Development Life Cycle (SDLC) and other software-based design...
Open Source Software to Enhance the STEM Learning Environment
Maurice Dawson, Imad Al Saeed, Jorja Wright, Festus Onyegbula. © 2015. 11 pages.
This chapter examines the use of Open Source Software (OSS) technologies that can be used to improve the learning of Science, Technology, Engineering, and Mathematics (STEM)....
Advances in Technology Project Management: Review of Open Source Software Integration
Maurice Dawson, Brian Leonard, Emad Rahim. © 2015. 12 pages.
As organizations must continually drive down costs of software-driven projects, they need to evaluate the Systems Development Life Cycle (SDLC) and other software-based design...
New Threats and Countermeasures in Digital Crime and Cyber Terrorism
Maurice Dawson, Marwan Omar. © 2015. 368 pages.
Technological advances, although beneficial and progressive, can lead to vulnerabilities in system networks and security. While researchers attempt to find solutions, negative...
A Brief Review of New Threats and Countermeasures in Digital Crime and Cyber Terrorism
Maurice Dawson. © 2015. 7 pages.
Cyber security is becoming the cornerstone of national security policies in many countries around the world as it is an interest to many stakeholders, including utilities...
Mobile Devices: The Case for Cyber Security Hardened Systems
Maurice Dawson, Jorja Wright, Marwan Omar. © 2015. 22 pages.
Mobile devices are becoming a method to provide an efficient and convenient way to access, find and share information; however, the availability of this information has caused an...
Legal Issues: Security and Privacy with Mobile Devices
Brian Leonard, Maurice Dawson. © 2015. 10 pages.
Privacy and security are two items being woven into the fabric of American law concerning mobile devices. This chapter will review and analyze the associated laws and policies...
Open Source Software to Enhance the STEM Learning Environment
Maurice Dawson, Imad Al Saeed, Jorja Wright, Festus Onyegbula. © 2014. 12 pages.
This chapter examines the use of Open Source Software (OSS) technologies that can be used to improve the learning of Science, Technology, Engineering, and Mathematics (STEM)....
The Future of National and International Security on the Internet
Maurice Dawson, Marwan Omar, Jonathan Abramson, Dustin Bessette. © 2014. 30 pages.
Hyperconnectivity is a growing trend that is driving cyber security experts to develop new security architectures for multiple platforms such as mobile devices, laptops, and even...