Maurice Dawson

Maurice DawsonDr. Maurice Dawson serves as an Assistant Professor of Information Systems at the University of Missouri-St. Louis and Visiting Professor with the Polytechnic University of Puerto Rico. Currently a PhD student at London Metropolitan University studying cyber security, and a Doctor of Computer Science earned from Colorado Technical University.

Publications

Massive Open Online Courses and Integrating Open Source Technology and Open Access Literature Into Technology-Based Degrees
Maurice Dawson, Sharon L. Burton, Dustin Bessette, Jorja Wright. © 2018. 14 pages.
Massive Open Online Courses (MOOCs) are a new phenomenon of course delivery for students, faculty, and administrators to use. As this technology continues to grow...
Developing Next-Generation Countermeasures for Homeland Security Threat Prevention
Maurice Dawson, Dakshina Ranjan Kisku, Phalguni Gupta, Jamuna Kanta Sing, Weifeng Li. © 2017. 428 pages.
In the modern world, natural disasters are becoming more commonplace, unmanned systems are becoming the norm, and terrorism and espionage are increasingly taking...
Security Solutions for Hyperconnectivity and the Internet of Things
Maurice Dawson, Mohamed Eltayeb, Marwan Omar. © 2017. 347 pages.
The Internet of Things describes a world in which smart technologies enable objects with a network to communicate with each other and interface with humans...
International Journal of Hyperconnectivity and the Internet of Things (IJHIoT)
Maurice Dawson. Est. 2017.
The International Journal of Hyperconnectivity and the Internet of Things (IJHIoT) promotes innovative, interesting and rigorously developed conceptual and...
Exploring Secure Computing for the Internet of Things, Internet of Everything, Web of Things, and Hyperconnectivity
Maurice Dawson. © 2017. 12 pages.
Secure computing is essential as environments continue to become intertwined and hyperconnected. As the Internet of Things (IoT), Web of Things (WoT), and the...
Tails Linux Operating System: The Amnesiac Incognito System in Times of High Surveillance, Its Security Flaws, Limitations, and Strengths in the Fight for Democracy
Jose Antonio Cardenas-Haro, Maurice Dawson. © 2017. 12 pages.
After the information released by Edward Snowden, the world realized about the security risks of high surveillance from governments to citizens or among...
Islamic Extremists in Africa: Security Spotlight on Kenya and Nigeria
Maurice Dawson, Wale Adeboje. © 2017. 11 pages.
Security is a growing concern on the African continent as the Regional Economic Communities (REC) move toward economic integration. Furthermore, these regions...
Battlefield Cyberspace: Exploitation of Hyperconnectivity and Internet of Things
Maurice Dawson, Marwan Omar, Jonathan Abramson, Brian Leonard, Dustin Bessette. © 2017. 32 pages.
The threat of cyber terrorism has become a reality with recent attacks such as Stuxtnet, Flame, Sony Pictures, and North Korea's websites. As the Internet of...
Nurturing Social Entrepreneurship and Building Social Entrepreneurial Self-Efficacy: Focusing on Primary and Secondary Schooling to Develop Future Social Entrepreneurs
Nareatha Studdard, Maurice Dawson, Sharon L. Burton, Naporshia Jackson, Brian Leonard, William Quisenberry, Emad Rahim. © 2017. 23 pages.
For the development of social entrepreneurs it is imperative that educators embrace the concepts and process of social entrepreneurship (Dees, 1998). Exploration...
Nurturing Social Entrepreneurship and Building Social Entrepreneurial Self-Efficacy: Focusing on Primary and Secondary Schooling to Develop Future Social Entrepreneurs
Nareatha Studdard, Maurice Dawson, Sharon L. Burton, Naporshia Jackson, Brian Leonard, William Quisenberry, Emad Rahim. © 2016. 22 pages.
For the development of social entrepreneurs it is imperative that educators embrace the concepts and process of social entrepreneurship (Dees, 1998). Exploration...
Mobile Devices: The Case for Cyber Security Hardened Systems
Maurice Dawson, Jorja Wright, Marwan Omar. © 2016. 21 pages.
Mobile devices are becoming a method to provide an efficient and convenient way to access, find and share information; however, the availability of this...
Systems Engineering Concepts with Aid of Virtual Worlds and Open Source Software: Using Technology to Develop Learning Objects and Simulation Environments
Latina Davis, Maurice Dawson, Marwan Omar. © 2016. 27 pages.
Technology is changing the landscape of learning and teaching in America. The use of virtual worlds enable engineering and technology programs to implement...
Understanding the Methods behind Cyber Terrorism
Maurice Dawson, Marwan Omar, Jonathan Abramson. © 2015. 11 pages.
Advances in Technology Project Management: Review of Open Source Software Integration
Maurice Dawson, Brian Leonard, Emad Rahim. © 2015. 12 pages.
As organizations must continually drive down costs of software-driven projects, they need to evaluate the Systems Development Life Cycle (SDLC) and other...
Open Source Software to Enhance the STEM Learning Environment
Maurice Dawson, Imad Al Saeed, Jorja Wright, Festus Onyegbula. © 2015. 11 pages.
This chapter examines the use of Open Source Software (OSS) technologies that can be used to improve the learning of Science, Technology, Engineering, and...
Advances in Technology Project Management: Review of Open Source Software Integration
Maurice Dawson, Brian Leonard, Emad Rahim. © 2015. 12 pages.
As organizations must continually drive down costs of software-driven projects, they need to evaluate the Systems Development Life Cycle (SDLC) and other...
New Threats and Countermeasures in Digital Crime and Cyber Terrorism
Maurice Dawson, Marwan Omar. © 2015. 368 pages.
Technological advances, although beneficial and progressive, can lead to vulnerabilities in system networks and security. While researchers attempt to find...
A Brief Review of New Threats and Countermeasures in Digital Crime and Cyber Terrorism
Maurice Dawson. © 2015. 7 pages.
Cyber security is becoming the cornerstone of national security policies in many countries around the world as it is an interest to many stakeholders, including...
Mobile Devices: The Case for Cyber Security Hardened Systems
Maurice Dawson, Jorja Wright, Marwan Omar. © 2015. 22 pages.
Mobile devices are becoming a method to provide an efficient and convenient way to access, find and share information; however, the availability of this...
Legal Issues: Security and Privacy with Mobile Devices
Brian Leonard, Maurice Dawson. © 2015. 10 pages.
Privacy and security are two items being woven into the fabric of American law concerning mobile devices. This chapter will review and analyze the associated laws...
Open Source Software to Enhance the STEM Learning Environment
Maurice Dawson, Imad Al Saeed, Jorja Wright, Festus Onyegbula. © 2014. 12 pages.
This chapter examines the use of Open Source Software (OSS) technologies that can be used to improve the learning of Science, Technology, Engineering, and...
The Future of National and International Security on the Internet
Maurice Dawson, Marwan Omar, Jonathan Abramson, Dustin Bessette. © 2014. 30 pages.
Hyperconnectivity is a growing trend that is driving cyber security experts to develop new security architectures for multiple platforms such as mobile devices...
International Journal of Web-Based Learning and Teaching Technologies (IJWLTT)
Mahesh S. Raisinghani. Est. 2006.
The proliferation of Web-based technologies during the last decade may have given the impression of wide-spread changes in educational practices. In fact, we have...