CINXE.COM

Maurice Dawson | Illinois Institute of Technology - Academia.edu

<!DOCTYPE html> <html lang="en" xmlns:fb="http://www.facebook.com/2008/fbml" class="wf-loading"> <head prefix="og: https://ogp.me/ns# fb: https://ogp.me/ns/fb# academia: https://ogp.me/ns/fb/academia#"> <meta charset="utf-8"> <meta name=viewport content="width=device-width, initial-scale=1"> <meta rel="search" type="application/opensearchdescription+xml" href="/open_search.xml" title="Academia.edu"> <title>Maurice Dawson | Illinois Institute of Technology - Academia.edu</title> <!-- _ _ _ | | (_) | | __ _ ___ __ _ __| | ___ _ __ ___ _ __ _ ___ __| |_ _ / _` |/ __/ _` |/ _` |/ _ \ '_ ` _ \| |/ _` | / _ \/ _` | | | | | (_| | (_| (_| | (_| | __/ | | | | | | (_| || __/ (_| | |_| | \__,_|\___\__,_|\__,_|\___|_| |_| |_|_|\__,_(_)___|\__,_|\__,_| We're hiring! See https://www.academia.edu/hiring --> <link href="//a.academia-assets.com/images/favicons/favicon-production.ico" rel="shortcut icon" type="image/vnd.microsoft.icon"> <link rel="apple-touch-icon" sizes="57x57" href="//a.academia-assets.com/images/favicons/apple-touch-icon-57x57.png"> <link rel="apple-touch-icon" sizes="60x60" href="//a.academia-assets.com/images/favicons/apple-touch-icon-60x60.png"> <link rel="apple-touch-icon" sizes="72x72" href="//a.academia-assets.com/images/favicons/apple-touch-icon-72x72.png"> <link rel="apple-touch-icon" sizes="76x76" href="//a.academia-assets.com/images/favicons/apple-touch-icon-76x76.png"> <link rel="apple-touch-icon" sizes="114x114" href="//a.academia-assets.com/images/favicons/apple-touch-icon-114x114.png"> <link rel="apple-touch-icon" sizes="120x120" href="//a.academia-assets.com/images/favicons/apple-touch-icon-120x120.png"> <link rel="apple-touch-icon" sizes="144x144" href="//a.academia-assets.com/images/favicons/apple-touch-icon-144x144.png"> <link rel="apple-touch-icon" sizes="152x152" href="//a.academia-assets.com/images/favicons/apple-touch-icon-152x152.png"> <link rel="apple-touch-icon" sizes="180x180" href="//a.academia-assets.com/images/favicons/apple-touch-icon-180x180.png"> <link rel="icon" type="image/png" href="//a.academia-assets.com/images/favicons/favicon-32x32.png" sizes="32x32"> <link rel="icon" type="image/png" href="//a.academia-assets.com/images/favicons/favicon-194x194.png" sizes="194x194"> <link rel="icon" type="image/png" href="//a.academia-assets.com/images/favicons/favicon-96x96.png" sizes="96x96"> <link rel="icon" type="image/png" href="//a.academia-assets.com/images/favicons/android-chrome-192x192.png" sizes="192x192"> <link rel="icon" type="image/png" href="//a.academia-assets.com/images/favicons/favicon-16x16.png" sizes="16x16"> <link rel="manifest" href="//a.academia-assets.com/images/favicons/manifest.json"> <meta name="msapplication-TileColor" content="#2b5797"> <meta name="msapplication-TileImage" content="//a.academia-assets.com/images/favicons/mstile-144x144.png"> <meta name="theme-color" content="#ffffff"> <script> window.performance && window.performance.measure && window.performance.measure("Time To First Byte", "requestStart", "responseStart"); </script> <script> (function() { if (!window.URLSearchParams || !window.history || !window.history.replaceState) { return; } var searchParams = new URLSearchParams(window.location.search); var paramsToDelete = [ 'fs', 'sm', 'swp', 'iid', 'nbs', 'rcc', // related content category 'rcpos', // related content carousel position 'rcpg', // related carousel page 'rchid', // related content hit id 'f_ri', // research interest id, for SEO tracking 'f_fri', // featured research interest, for SEO tracking (param key without value) 'f_rid', // from research interest directory for SEO tracking 'f_loswp', // from research interest pills on LOSWP sidebar for SEO tracking 'rhid', // referrring hit id ]; if (paramsToDelete.every((key) => searchParams.get(key) === null)) { return; } paramsToDelete.forEach((key) => { searchParams.delete(key); }); var cleanUrl = new URL(window.location.href); cleanUrl.search = searchParams.toString(); history.replaceState({}, document.title, cleanUrl); })(); </script> <script async src="https://www.googletagmanager.com/gtag/js?id=G-5VKX33P2DS"></script> <script> window.dataLayer = window.dataLayer || []; function gtag(){dataLayer.push(arguments);} gtag('js', new Date()); gtag('config', 'G-5VKX33P2DS', { cookie_domain: 'academia.edu', send_page_view: false, }); gtag('event', 'page_view', { 'controller': "profiles/works", 'action': "summary", 'controller_action': 'profiles/works#summary', 'logged_in': 'false', 'edge': 'unknown', // Send nil if there is no A/B test bucket, in case some records get logged // with missing data - that way we can distinguish between the two cases. // ab_test_bucket should be of the form <ab_test_name>:<bucket> 'ab_test_bucket': null, }) </script> <script type="text/javascript"> window.sendUserTiming = function(timingName) { if (!(window.performance && window.performance.measure)) return; var entries = window.performance.getEntriesByName(timingName, "measure"); if (entries.length !== 1) return; var timingValue = Math.round(entries[0].duration); gtag('event', 'timing_complete', { name: timingName, value: timingValue, event_category: 'User-centric', }); }; window.sendUserTiming("Time To First Byte"); </script> <meta name="csrf-param" content="authenticity_token" /> <meta name="csrf-token" content="MlDaZX3A7h8mRtsw4lJwix5cD8YMKwVgnM3BKuF-s0Wk-IUjLMA1fFS72os5p14IX6VAdJ3H32hIxVfv28sZ0g" /> <link rel="stylesheet" media="all" href="//a.academia-assets.com/assets/wow-3d36c19b4875b226bfed0fcba1dcea3f2fe61148383d97c0465c016b8c969290.css" /><link rel="stylesheet" media="all" href="//a.academia-assets.com/assets/social/home-79e78ce59bef0a338eb6540ec3d93b4a7952115b56c57f1760943128f4544d42.css" /><link rel="stylesheet" media="all" href="//a.academia-assets.com/assets/single_work_page/figure_carousel-2004283e0948681916eefa74772df54f56cb5c7413d82b160212231c2f474bb3.css" /><script type="application/ld+json">{"@context":"https://schema.org","@type":"ProfilePage","mainEntity":{"@context":"https://schema.org","@type":"Person","name":"Maurice Dawson","url":"https://iit.academia.edu/MauriceDawson","image":"https://gravatar.com/avatar/a6dd47fc155390a925162801ad79dd11?s=200","sameAs":[]},"dateCreated":"2018-06-06T13:08:54-07:00","dateModified":"2023-05-21T19:23:04-07:00","name":"Maurice Dawson","description":"","image":"https://gravatar.com/avatar/a6dd47fc155390a925162801ad79dd11?s=200","thumbnailUrl":"https://gravatar.com/avatar/a6dd47fc155390a925162801ad79dd11?s=65","primaryImageOfPage":{"@type":"ImageObject","url":"https://gravatar.com/avatar/a6dd47fc155390a925162801ad79dd11?s=200","width":200},"sameAs":[],"relatedLink":"https://www.academia.edu/104772306/A_REVIEW_OF_ENHANCING_INTRUSION_DETECTION_SYSTEMS_FOR_CYBERSECURITY_USING_ARTIFICIAL_INTELLIGENCE_AI"}</script><link rel="stylesheet" media="all" href="//a.academia-assets.com/assets/design_system/heading-95367dc03b794f6737f30123738a886cf53b7a65cdef98a922a98591d60063e3.css" /><link rel="stylesheet" media="all" href="//a.academia-assets.com/assets/design_system/button-8c9ae4b5c8a2531640c354d92a1f3579c8ff103277ef74913e34c8a76d4e6c00.css" /><link rel="stylesheet" media="all" href="//a.academia-assets.com/assets/design_system/body-170d1319f0e354621e81ca17054bb147da2856ec0702fe440a99af314a6338c5.css" /><link rel="stylesheet" media="all" href="//a.academia-assets.com/assets/single_work_page/figure_carousel-2004283e0948681916eefa74772df54f56cb5c7413d82b160212231c2f474bb3.css" /><style type="text/css">@media(max-width: 567px){:root{--token-mode: Parity;--dropshadow: 0 2px 4px 0 #22223340;--primary-brand: #0645b1;--error-dark: #b60000;--success-dark: #05b01c;--inactive-fill: #ebebee;--hover: #0c3b8d;--pressed: #082f75;--button-primary-fill-inactive: #ebebee;--button-primary-fill: #0645b1;--button-primary-text: #ffffff;--button-primary-fill-hover: #0c3b8d;--button-primary-fill-press: #082f75;--button-primary-icon: #ffffff;--button-primary-fill-inverse: #ffffff;--button-primary-text-inverse: #082f75;--button-primary-icon-inverse: #0645b1;--button-primary-fill-inverse-hover: #cddaef;--button-primary-stroke-inverse-pressed: #0645b1;--button-secondary-stroke-inactive: #b1b1ba;--button-secondary-fill: #eef2f9;--button-secondary-text: #082f75;--button-secondary-fill-press: #cddaef;--button-secondary-fill-inactive: #ebebee;--button-secondary-stroke: #cddaef;--button-secondary-stroke-hover: #386ac1;--button-secondary-stroke-press: #0645b1;--button-secondary-text-inactive: #b1b1ba;--button-secondary-icon: #082f75;--button-secondary-fill-hover: #e6ecf7;--button-secondary-stroke-inverse: #ffffff;--button-secondary-fill-inverse: rgba(255, 255, 255, 0);--button-secondary-icon-inverse: #ffffff;--button-secondary-icon-hover: #082f75;--button-secondary-icon-press: #082f75;--button-secondary-text-inverse: #ffffff;--button-secondary-text-hover: #082f75;--button-secondary-text-press: #082f75;--button-secondary-fill-inverse-hover: #043059;--button-xs-stroke: #141413;--button-xs-stroke-hover: #0c3b8d;--button-xs-stroke-press: #082f75;--button-xs-stroke-inactive: #ebebee;--button-xs-text: #141413;--button-xs-text-hover: #0c3b8d;--button-xs-text-press: #082f75;--button-xs-text-inactive: #91919e;--button-xs-icon: #141413;--button-xs-icon-hover: #0c3b8d;--button-xs-icon-press: #082f75;--button-xs-icon-inactive: #91919e;--button-xs-fill: #ffffff;--button-xs-fill-hover: #f4f7fc;--button-xs-fill-press: #eef2f9;--buttons-button-text-inactive: #91919e;--buttons-button-focus: #0645b1;--buttons-button-icon-inactive: #91919e;--buttons-small-buttons-corner-radius: 8px;--buttons-small-buttons-l-r-padding: 12px;--buttons-small-buttons-height: 44px;--buttons-small-buttons-gap: 8px;--buttons-small-buttons-icon-only-width: 44px;--buttons-small-buttons-icon-size: 20px;--buttons-small-buttons-stroke-default: 1px;--buttons-small-buttons-stroke-thick: 2px;--buttons-large-buttons-l-r-padding: 20px;--buttons-large-buttons-height: 54px;--buttons-large-buttons-icon-only-width: 54px;--buttons-large-buttons-icon-size: 20px;--buttons-large-buttons-gap: 8px;--buttons-large-buttons-corner-radius: 8px;--buttons-large-buttons-stroke-default: 1px;--buttons-large-buttons-stroke-thick: 2px;--buttons-extra-small-buttons-l-r-padding: 8px;--buttons-extra-small-buttons-height: 32px;--buttons-extra-small-buttons-icon-size: 16px;--buttons-extra-small-buttons-gap: 4px;--buttons-extra-small-buttons-corner-radius: 8px;--buttons-stroke-default: 1px;--buttons-stroke-thick: 2px;--background-beige: #f9f7f4;--error-light: #fff2f2;--text-placeholder: #6d6d7d;--stroke-dark: #141413;--stroke-light: #dddde2;--stroke-medium: #535366;--accent-green: #ccffd4;--accent-turquoise: #ccf7ff;--accent-yellow: #f7ffcc;--accent-peach: #ffd4cc;--accent-violet: #f7ccff;--accent-purple: #f4f7fc;--text-primary: #141413;--secondary-brand: #141413;--text-hover: #0c3b8d;--text-white: #ffffff;--text-link: #0645b1;--text-press: #082f75;--success-light: #f0f8f1;--background-light-blue: #eef2f9;--background-white: #ffffff;--premium-dark: #877440;--premium-light: #f9f6ed;--stroke-white: #ffffff;--inactive-content: #b1b1ba;--annotate-light: #a35dff;--annotate-dark: #824acc;--grid: #eef2f9;--inactive-stroke: #ebebee;--shadow: rgba(34, 34, 51, 0.25);--text-inactive: #6d6d7d;--text-error: #b60000;--stroke-error: #b60000;--background-error: #fff2f2;--background-black: #141413;--icon-default: #141413;--icon-blue: #0645b1;--background-grey: #dddde2;--icon-grey: #b1b1ba;--text-focus: #082f75;--brand-colors-neutral-black: #141413;--brand-colors-neutral-900: #535366;--brand-colors-neutral-800: #6d6d7d;--brand-colors-neutral-700: #91919e;--brand-colors-neutral-600: #b1b1ba;--brand-colors-neutral-500: #c8c8cf;--brand-colors-neutral-400: #dddde2;--brand-colors-neutral-300: #ebebee;--brand-colors-neutral-200: #f8f8fb;--brand-colors-neutral-100: #fafafa;--brand-colors-neutral-white: #ffffff;--brand-colors-blue-900: #043059;--brand-colors-blue-800: #082f75;--brand-colors-blue-700: #0c3b8d;--brand-colors-blue-600: #0645b1;--brand-colors-blue-500: #386ac1;--brand-colors-blue-400: #cddaef;--brand-colors-blue-300: #e6ecf7;--brand-colors-blue-200: #eef2f9;--brand-colors-blue-100: #f4f7fc;--brand-colors-gold-500: #877440;--brand-colors-gold-400: #e9e3d4;--brand-colors-gold-300: #f2efe8;--brand-colors-gold-200: #f9f6ed;--brand-colors-gold-100: #f9f7f4;--brand-colors-error-900: #920000;--brand-colors-error-500: #b60000;--brand-colors-success-900: #035c0f;--brand-colors-green: #ccffd4;--brand-colors-turquoise: #ccf7ff;--brand-colors-yellow: #f7ffcc;--brand-colors-peach: #ffd4cc;--brand-colors-violet: #f7ccff;--brand-colors-error-100: #fff2f2;--brand-colors-success-500: #05b01c;--brand-colors-success-100: #f0f8f1;--text-secondary: #535366;--icon-white: #ffffff;--background-beige-darker: #f2efe8;--icon-dark-grey: #535366;--type-font-family-sans-serif: Roboto;--type-font-family-serif: Georgia;--type-font-family-mono: IBM Plex Mono;--type-weights-300: 300;--type-weights-400: 400;--type-weights-500: 500;--type-weights-700: 700;--type-sizes-12: 12px;--type-sizes-14: 14px;--type-sizes-16: 16px;--type-sizes-18: 18px;--type-sizes-20: 20px;--type-sizes-22: 22px;--type-sizes-24: 24px;--type-sizes-28: 28px;--type-sizes-30: 30px;--type-sizes-32: 32px;--type-sizes-40: 40px;--type-sizes-42: 42px;--type-sizes-48-2: 48px;--type-line-heights-16: 16px;--type-line-heights-20: 20px;--type-line-heights-23: 23px;--type-line-heights-24: 24px;--type-line-heights-25: 25px;--type-line-heights-26: 26px;--type-line-heights-29: 29px;--type-line-heights-30: 30px;--type-line-heights-32: 32px;--type-line-heights-34: 34px;--type-line-heights-35: 35px;--type-line-heights-36: 36px;--type-line-heights-38: 38px;--type-line-heights-40: 40px;--type-line-heights-46: 46px;--type-line-heights-48: 48px;--type-line-heights-52: 52px;--type-line-heights-58: 58px;--type-line-heights-68: 68px;--type-line-heights-74: 74px;--type-line-heights-82: 82px;--type-paragraph-spacings-0: 0px;--type-paragraph-spacings-4: 4px;--type-paragraph-spacings-8: 8px;--type-paragraph-spacings-16: 16px;--type-sans-serif-xl-font-weight: 400;--type-sans-serif-xl-size: 32px;--type-sans-serif-xl-line-height: 46px;--type-sans-serif-xl-paragraph-spacing: 16px;--type-sans-serif-lg-font-weight: 400;--type-sans-serif-lg-size: 30px;--type-sans-serif-lg-line-height: 36px;--type-sans-serif-lg-paragraph-spacing: 16px;--type-sans-serif-md-font-weight: 400;--type-sans-serif-md-line-height: 30px;--type-sans-serif-md-paragraph-spacing: 16px;--type-sans-serif-md-size: 24px;--type-sans-serif-xs-font-weight: 700;--type-sans-serif-xs-line-height: 24px;--type-sans-serif-xs-paragraph-spacing: 0px;--type-sans-serif-xs-size: 18px;--type-sans-serif-sm-font-weight: 400;--type-sans-serif-sm-line-height: 32px;--type-sans-serif-sm-paragraph-spacing: 16px;--type-sans-serif-sm-size: 20px;--type-body-xl-font-weight: 400;--type-body-xl-size: 24px;--type-body-xl-line-height: 36px;--type-body-xl-paragraph-spacing: 0px;--type-body-sm-font-weight: 400;--type-body-sm-size: 14px;--type-body-sm-line-height: 20px;--type-body-sm-paragraph-spacing: 8px;--type-body-xs-font-weight: 400;--type-body-xs-size: 12px;--type-body-xs-line-height: 16px;--type-body-xs-paragraph-spacing: 0px;--type-body-md-font-weight: 400;--type-body-md-size: 16px;--type-body-md-line-height: 20px;--type-body-md-paragraph-spacing: 4px;--type-body-lg-font-weight: 400;--type-body-lg-size: 20px;--type-body-lg-line-height: 26px;--type-body-lg-paragraph-spacing: 16px;--type-body-lg-medium-font-weight: 500;--type-body-lg-medium-size: 20px;--type-body-lg-medium-line-height: 32px;--type-body-lg-medium-paragraph-spacing: 16px;--type-body-md-medium-font-weight: 500;--type-body-md-medium-size: 16px;--type-body-md-medium-line-height: 20px;--type-body-md-medium-paragraph-spacing: 4px;--type-body-sm-bold-font-weight: 700;--type-body-sm-bold-size: 14px;--type-body-sm-bold-line-height: 20px;--type-body-sm-bold-paragraph-spacing: 8px;--type-body-sm-medium-font-weight: 500;--type-body-sm-medium-size: 14px;--type-body-sm-medium-line-height: 20px;--type-body-sm-medium-paragraph-spacing: 8px;--type-serif-md-font-weight: 400;--type-serif-md-size: 32px;--type-serif-md-paragraph-spacing: 0px;--type-serif-md-line-height: 40px;--type-serif-sm-font-weight: 400;--type-serif-sm-size: 24px;--type-serif-sm-paragraph-spacing: 0px;--type-serif-sm-line-height: 26px;--type-serif-lg-font-weight: 400;--type-serif-lg-size: 48px;--type-serif-lg-paragraph-spacing: 0px;--type-serif-lg-line-height: 52px;--type-serif-xs-font-weight: 400;--type-serif-xs-size: 18px;--type-serif-xs-line-height: 24px;--type-serif-xs-paragraph-spacing: 0px;--type-serif-xl-font-weight: 400;--type-serif-xl-size: 48px;--type-serif-xl-paragraph-spacing: 0px;--type-serif-xl-line-height: 58px;--type-mono-md-font-weight: 400;--type-mono-md-size: 22px;--type-mono-md-line-height: 24px;--type-mono-md-paragraph-spacing: 0px;--type-mono-lg-font-weight: 400;--type-mono-lg-size: 40px;--type-mono-lg-line-height: 40px;--type-mono-lg-paragraph-spacing: 0px;--type-mono-sm-font-weight: 400;--type-mono-sm-size: 14px;--type-mono-sm-line-height: 24px;--type-mono-sm-paragraph-spacing: 0px;--spacing-xs-4: 4px;--spacing-xs-8: 8px;--spacing-xs-16: 16px;--spacing-sm-24: 24px;--spacing-sm-32: 32px;--spacing-md-40: 40px;--spacing-md-48: 48px;--spacing-lg-64: 64px;--spacing-lg-80: 80px;--spacing-xlg-104: 104px;--spacing-xlg-152: 152px;--spacing-xs-12: 12px;--spacing-page-section: 80px;--spacing-card-list-spacing: 48px;--spacing-text-section-spacing: 64px;--spacing-md-xs-headings: 40px;--corner-radius-radius-lg: 16px;--corner-radius-radius-sm: 4px;--corner-radius-radius-md: 8px;--corner-radius-radius-round: 104px}}@media(min-width: 568px)and (max-width: 1279px){:root{--token-mode: Parity;--dropshadow: 0 2px 4px 0 #22223340;--primary-brand: #0645b1;--error-dark: #b60000;--success-dark: #05b01c;--inactive-fill: #ebebee;--hover: #0c3b8d;--pressed: #082f75;--button-primary-fill-inactive: #ebebee;--button-primary-fill: #0645b1;--button-primary-text: #ffffff;--button-primary-fill-hover: #0c3b8d;--button-primary-fill-press: #082f75;--button-primary-icon: #ffffff;--button-primary-fill-inverse: #ffffff;--button-primary-text-inverse: #082f75;--button-primary-icon-inverse: #0645b1;--button-primary-fill-inverse-hover: #cddaef;--button-primary-stroke-inverse-pressed: #0645b1;--button-secondary-stroke-inactive: #b1b1ba;--button-secondary-fill: #eef2f9;--button-secondary-text: #082f75;--button-secondary-fill-press: #cddaef;--button-secondary-fill-inactive: #ebebee;--button-secondary-stroke: #cddaef;--button-secondary-stroke-hover: #386ac1;--button-secondary-stroke-press: #0645b1;--button-secondary-text-inactive: #b1b1ba;--button-secondary-icon: #082f75;--button-secondary-fill-hover: #e6ecf7;--button-secondary-stroke-inverse: #ffffff;--button-secondary-fill-inverse: rgba(255, 255, 255, 0);--button-secondary-icon-inverse: #ffffff;--button-secondary-icon-hover: #082f75;--button-secondary-icon-press: #082f75;--button-secondary-text-inverse: #ffffff;--button-secondary-text-hover: #082f75;--button-secondary-text-press: #082f75;--button-secondary-fill-inverse-hover: #043059;--button-xs-stroke: #141413;--button-xs-stroke-hover: #0c3b8d;--button-xs-stroke-press: #082f75;--button-xs-stroke-inactive: #ebebee;--button-xs-text: #141413;--button-xs-text-hover: #0c3b8d;--button-xs-text-press: #082f75;--button-xs-text-inactive: #91919e;--button-xs-icon: #141413;--button-xs-icon-hover: #0c3b8d;--button-xs-icon-press: #082f75;--button-xs-icon-inactive: #91919e;--button-xs-fill: #ffffff;--button-xs-fill-hover: #f4f7fc;--button-xs-fill-press: #eef2f9;--buttons-button-text-inactive: #91919e;--buttons-button-focus: #0645b1;--buttons-button-icon-inactive: #91919e;--buttons-small-buttons-corner-radius: 8px;--buttons-small-buttons-l-r-padding: 12px;--buttons-small-buttons-height: 44px;--buttons-small-buttons-gap: 8px;--buttons-small-buttons-icon-only-width: 44px;--buttons-small-buttons-icon-size: 20px;--buttons-small-buttons-stroke-default: 1px;--buttons-small-buttons-stroke-thick: 2px;--buttons-large-buttons-l-r-padding: 20px;--buttons-large-buttons-height: 54px;--buttons-large-buttons-icon-only-width: 54px;--buttons-large-buttons-icon-size: 20px;--buttons-large-buttons-gap: 8px;--buttons-large-buttons-corner-radius: 8px;--buttons-large-buttons-stroke-default: 1px;--buttons-large-buttons-stroke-thick: 2px;--buttons-extra-small-buttons-l-r-padding: 8px;--buttons-extra-small-buttons-height: 32px;--buttons-extra-small-buttons-icon-size: 16px;--buttons-extra-small-buttons-gap: 4px;--buttons-extra-small-buttons-corner-radius: 8px;--buttons-stroke-default: 1px;--buttons-stroke-thick: 2px;--background-beige: #f9f7f4;--error-light: #fff2f2;--text-placeholder: #6d6d7d;--stroke-dark: #141413;--stroke-light: #dddde2;--stroke-medium: #535366;--accent-green: #ccffd4;--accent-turquoise: #ccf7ff;--accent-yellow: #f7ffcc;--accent-peach: #ffd4cc;--accent-violet: #f7ccff;--accent-purple: #f4f7fc;--text-primary: #141413;--secondary-brand: #141413;--text-hover: #0c3b8d;--text-white: #ffffff;--text-link: #0645b1;--text-press: #082f75;--success-light: #f0f8f1;--background-light-blue: #eef2f9;--background-white: #ffffff;--premium-dark: #877440;--premium-light: #f9f6ed;--stroke-white: #ffffff;--inactive-content: #b1b1ba;--annotate-light: #a35dff;--annotate-dark: #824acc;--grid: #eef2f9;--inactive-stroke: #ebebee;--shadow: rgba(34, 34, 51, 0.25);--text-inactive: #6d6d7d;--text-error: #b60000;--stroke-error: #b60000;--background-error: #fff2f2;--background-black: #141413;--icon-default: #141413;--icon-blue: #0645b1;--background-grey: #dddde2;--icon-grey: #b1b1ba;--text-focus: #082f75;--brand-colors-neutral-black: #141413;--brand-colors-neutral-900: #535366;--brand-colors-neutral-800: #6d6d7d;--brand-colors-neutral-700: #91919e;--brand-colors-neutral-600: #b1b1ba;--brand-colors-neutral-500: #c8c8cf;--brand-colors-neutral-400: #dddde2;--brand-colors-neutral-300: #ebebee;--brand-colors-neutral-200: #f8f8fb;--brand-colors-neutral-100: #fafafa;--brand-colors-neutral-white: #ffffff;--brand-colors-blue-900: #043059;--brand-colors-blue-800: #082f75;--brand-colors-blue-700: #0c3b8d;--brand-colors-blue-600: #0645b1;--brand-colors-blue-500: #386ac1;--brand-colors-blue-400: #cddaef;--brand-colors-blue-300: #e6ecf7;--brand-colors-blue-200: #eef2f9;--brand-colors-blue-100: #f4f7fc;--brand-colors-gold-500: #877440;--brand-colors-gold-400: #e9e3d4;--brand-colors-gold-300: #f2efe8;--brand-colors-gold-200: #f9f6ed;--brand-colors-gold-100: #f9f7f4;--brand-colors-error-900: #920000;--brand-colors-error-500: #b60000;--brand-colors-success-900: #035c0f;--brand-colors-green: #ccffd4;--brand-colors-turquoise: #ccf7ff;--brand-colors-yellow: #f7ffcc;--brand-colors-peach: #ffd4cc;--brand-colors-violet: #f7ccff;--brand-colors-error-100: #fff2f2;--brand-colors-success-500: #05b01c;--brand-colors-success-100: #f0f8f1;--text-secondary: #535366;--icon-white: #ffffff;--background-beige-darker: #f2efe8;--icon-dark-grey: #535366;--type-font-family-sans-serif: Roboto;--type-font-family-serif: Georgia;--type-font-family-mono: IBM Plex Mono;--type-weights-300: 300;--type-weights-400: 400;--type-weights-500: 500;--type-weights-700: 700;--type-sizes-12: 12px;--type-sizes-14: 14px;--type-sizes-16: 16px;--type-sizes-18: 18px;--type-sizes-20: 20px;--type-sizes-22: 22px;--type-sizes-24: 24px;--type-sizes-28: 28px;--type-sizes-30: 30px;--type-sizes-32: 32px;--type-sizes-40: 40px;--type-sizes-42: 42px;--type-sizes-48-2: 48px;--type-line-heights-16: 16px;--type-line-heights-20: 20px;--type-line-heights-23: 23px;--type-line-heights-24: 24px;--type-line-heights-25: 25px;--type-line-heights-26: 26px;--type-line-heights-29: 29px;--type-line-heights-30: 30px;--type-line-heights-32: 32px;--type-line-heights-34: 34px;--type-line-heights-35: 35px;--type-line-heights-36: 36px;--type-line-heights-38: 38px;--type-line-heights-40: 40px;--type-line-heights-46: 46px;--type-line-heights-48: 48px;--type-line-heights-52: 52px;--type-line-heights-58: 58px;--type-line-heights-68: 68px;--type-line-heights-74: 74px;--type-line-heights-82: 82px;--type-paragraph-spacings-0: 0px;--type-paragraph-spacings-4: 4px;--type-paragraph-spacings-8: 8px;--type-paragraph-spacings-16: 16px;--type-sans-serif-xl-font-weight: 400;--type-sans-serif-xl-size: 42px;--type-sans-serif-xl-line-height: 46px;--type-sans-serif-xl-paragraph-spacing: 16px;--type-sans-serif-lg-font-weight: 400;--type-sans-serif-lg-size: 32px;--type-sans-serif-lg-line-height: 36px;--type-sans-serif-lg-paragraph-spacing: 16px;--type-sans-serif-md-font-weight: 400;--type-sans-serif-md-line-height: 34px;--type-sans-serif-md-paragraph-spacing: 16px;--type-sans-serif-md-size: 28px;--type-sans-serif-xs-font-weight: 700;--type-sans-serif-xs-line-height: 25px;--type-sans-serif-xs-paragraph-spacing: 0px;--type-sans-serif-xs-size: 20px;--type-sans-serif-sm-font-weight: 400;--type-sans-serif-sm-line-height: 30px;--type-sans-serif-sm-paragraph-spacing: 16px;--type-sans-serif-sm-size: 24px;--type-body-xl-font-weight: 400;--type-body-xl-size: 24px;--type-body-xl-line-height: 36px;--type-body-xl-paragraph-spacing: 0px;--type-body-sm-font-weight: 400;--type-body-sm-size: 14px;--type-body-sm-line-height: 20px;--type-body-sm-paragraph-spacing: 8px;--type-body-xs-font-weight: 400;--type-body-xs-size: 12px;--type-body-xs-line-height: 16px;--type-body-xs-paragraph-spacing: 0px;--type-body-md-font-weight: 400;--type-body-md-size: 16px;--type-body-md-line-height: 20px;--type-body-md-paragraph-spacing: 4px;--type-body-lg-font-weight: 400;--type-body-lg-size: 20px;--type-body-lg-line-height: 26px;--type-body-lg-paragraph-spacing: 16px;--type-body-lg-medium-font-weight: 500;--type-body-lg-medium-size: 20px;--type-body-lg-medium-line-height: 32px;--type-body-lg-medium-paragraph-spacing: 16px;--type-body-md-medium-font-weight: 500;--type-body-md-medium-size: 16px;--type-body-md-medium-line-height: 20px;--type-body-md-medium-paragraph-spacing: 4px;--type-body-sm-bold-font-weight: 700;--type-body-sm-bold-size: 14px;--type-body-sm-bold-line-height: 20px;--type-body-sm-bold-paragraph-spacing: 8px;--type-body-sm-medium-font-weight: 500;--type-body-sm-medium-size: 14px;--type-body-sm-medium-line-height: 20px;--type-body-sm-medium-paragraph-spacing: 8px;--type-serif-md-font-weight: 400;--type-serif-md-size: 40px;--type-serif-md-paragraph-spacing: 0px;--type-serif-md-line-height: 48px;--type-serif-sm-font-weight: 400;--type-serif-sm-size: 28px;--type-serif-sm-paragraph-spacing: 0px;--type-serif-sm-line-height: 32px;--type-serif-lg-font-weight: 400;--type-serif-lg-size: 58px;--type-serif-lg-paragraph-spacing: 0px;--type-serif-lg-line-height: 68px;--type-serif-xs-font-weight: 400;--type-serif-xs-size: 18px;--type-serif-xs-line-height: 24px;--type-serif-xs-paragraph-spacing: 0px;--type-serif-xl-font-weight: 400;--type-serif-xl-size: 74px;--type-serif-xl-paragraph-spacing: 0px;--type-serif-xl-line-height: 82px;--type-mono-md-font-weight: 400;--type-mono-md-size: 22px;--type-mono-md-line-height: 24px;--type-mono-md-paragraph-spacing: 0px;--type-mono-lg-font-weight: 400;--type-mono-lg-size: 40px;--type-mono-lg-line-height: 40px;--type-mono-lg-paragraph-spacing: 0px;--type-mono-sm-font-weight: 400;--type-mono-sm-size: 14px;--type-mono-sm-line-height: 24px;--type-mono-sm-paragraph-spacing: 0px;--spacing-xs-4: 4px;--spacing-xs-8: 8px;--spacing-xs-16: 16px;--spacing-sm-24: 24px;--spacing-sm-32: 32px;--spacing-md-40: 40px;--spacing-md-48: 48px;--spacing-lg-64: 64px;--spacing-lg-80: 80px;--spacing-xlg-104: 104px;--spacing-xlg-152: 152px;--spacing-xs-12: 12px;--spacing-page-section: 104px;--spacing-card-list-spacing: 48px;--spacing-text-section-spacing: 80px;--spacing-md-xs-headings: 40px;--corner-radius-radius-lg: 16px;--corner-radius-radius-sm: 4px;--corner-radius-radius-md: 8px;--corner-radius-radius-round: 104px}}@media(min-width: 1280px){:root{--token-mode: Parity;--dropshadow: 0 2px 4px 0 #22223340;--primary-brand: #0645b1;--error-dark: #b60000;--success-dark: #05b01c;--inactive-fill: #ebebee;--hover: #0c3b8d;--pressed: #082f75;--button-primary-fill-inactive: #ebebee;--button-primary-fill: #0645b1;--button-primary-text: #ffffff;--button-primary-fill-hover: #0c3b8d;--button-primary-fill-press: #082f75;--button-primary-icon: #ffffff;--button-primary-fill-inverse: #ffffff;--button-primary-text-inverse: #082f75;--button-primary-icon-inverse: #0645b1;--button-primary-fill-inverse-hover: #cddaef;--button-primary-stroke-inverse-pressed: #0645b1;--button-secondary-stroke-inactive: #b1b1ba;--button-secondary-fill: #eef2f9;--button-secondary-text: #082f75;--button-secondary-fill-press: #cddaef;--button-secondary-fill-inactive: #ebebee;--button-secondary-stroke: #cddaef;--button-secondary-stroke-hover: #386ac1;--button-secondary-stroke-press: #0645b1;--button-secondary-text-inactive: #b1b1ba;--button-secondary-icon: #082f75;--button-secondary-fill-hover: #e6ecf7;--button-secondary-stroke-inverse: #ffffff;--button-secondary-fill-inverse: rgba(255, 255, 255, 0);--button-secondary-icon-inverse: #ffffff;--button-secondary-icon-hover: #082f75;--button-secondary-icon-press: #082f75;--button-secondary-text-inverse: #ffffff;--button-secondary-text-hover: #082f75;--button-secondary-text-press: #082f75;--button-secondary-fill-inverse-hover: #043059;--button-xs-stroke: #141413;--button-xs-stroke-hover: #0c3b8d;--button-xs-stroke-press: #082f75;--button-xs-stroke-inactive: #ebebee;--button-xs-text: #141413;--button-xs-text-hover: #0c3b8d;--button-xs-text-press: #082f75;--button-xs-text-inactive: #91919e;--button-xs-icon: #141413;--button-xs-icon-hover: #0c3b8d;--button-xs-icon-press: #082f75;--button-xs-icon-inactive: #91919e;--button-xs-fill: #ffffff;--button-xs-fill-hover: #f4f7fc;--button-xs-fill-press: #eef2f9;--buttons-button-text-inactive: #91919e;--buttons-button-focus: #0645b1;--buttons-button-icon-inactive: #91919e;--buttons-small-buttons-corner-radius: 8px;--buttons-small-buttons-l-r-padding: 12px;--buttons-small-buttons-height: 44px;--buttons-small-buttons-gap: 8px;--buttons-small-buttons-icon-only-width: 44px;--buttons-small-buttons-icon-size: 20px;--buttons-small-buttons-stroke-default: 1px;--buttons-small-buttons-stroke-thick: 2px;--buttons-large-buttons-l-r-padding: 20px;--buttons-large-buttons-height: 54px;--buttons-large-buttons-icon-only-width: 54px;--buttons-large-buttons-icon-size: 20px;--buttons-large-buttons-gap: 8px;--buttons-large-buttons-corner-radius: 8px;--buttons-large-buttons-stroke-default: 1px;--buttons-large-buttons-stroke-thick: 2px;--buttons-extra-small-buttons-l-r-padding: 8px;--buttons-extra-small-buttons-height: 32px;--buttons-extra-small-buttons-icon-size: 16px;--buttons-extra-small-buttons-gap: 4px;--buttons-extra-small-buttons-corner-radius: 8px;--buttons-stroke-default: 1px;--buttons-stroke-thick: 2px;--background-beige: #f9f7f4;--error-light: #fff2f2;--text-placeholder: #6d6d7d;--stroke-dark: #141413;--stroke-light: #dddde2;--stroke-medium: #535366;--accent-green: #ccffd4;--accent-turquoise: #ccf7ff;--accent-yellow: #f7ffcc;--accent-peach: #ffd4cc;--accent-violet: #f7ccff;--accent-purple: #f4f7fc;--text-primary: #141413;--secondary-brand: #141413;--text-hover: #0c3b8d;--text-white: #ffffff;--text-link: #0645b1;--text-press: #082f75;--success-light: #f0f8f1;--background-light-blue: #eef2f9;--background-white: #ffffff;--premium-dark: #877440;--premium-light: #f9f6ed;--stroke-white: #ffffff;--inactive-content: #b1b1ba;--annotate-light: #a35dff;--annotate-dark: #824acc;--grid: #eef2f9;--inactive-stroke: #ebebee;--shadow: rgba(34, 34, 51, 0.25);--text-inactive: #6d6d7d;--text-error: #b60000;--stroke-error: #b60000;--background-error: #fff2f2;--background-black: #141413;--icon-default: #141413;--icon-blue: #0645b1;--background-grey: #dddde2;--icon-grey: #b1b1ba;--text-focus: #082f75;--brand-colors-neutral-black: #141413;--brand-colors-neutral-900: #535366;--brand-colors-neutral-800: #6d6d7d;--brand-colors-neutral-700: #91919e;--brand-colors-neutral-600: #b1b1ba;--brand-colors-neutral-500: #c8c8cf;--brand-colors-neutral-400: #dddde2;--brand-colors-neutral-300: #ebebee;--brand-colors-neutral-200: #f8f8fb;--brand-colors-neutral-100: #fafafa;--brand-colors-neutral-white: #ffffff;--brand-colors-blue-900: #043059;--brand-colors-blue-800: #082f75;--brand-colors-blue-700: #0c3b8d;--brand-colors-blue-600: #0645b1;--brand-colors-blue-500: #386ac1;--brand-colors-blue-400: #cddaef;--brand-colors-blue-300: #e6ecf7;--brand-colors-blue-200: #eef2f9;--brand-colors-blue-100: #f4f7fc;--brand-colors-gold-500: #877440;--brand-colors-gold-400: #e9e3d4;--brand-colors-gold-300: #f2efe8;--brand-colors-gold-200: #f9f6ed;--brand-colors-gold-100: #f9f7f4;--brand-colors-error-900: #920000;--brand-colors-error-500: #b60000;--brand-colors-success-900: #035c0f;--brand-colors-green: #ccffd4;--brand-colors-turquoise: #ccf7ff;--brand-colors-yellow: #f7ffcc;--brand-colors-peach: #ffd4cc;--brand-colors-violet: #f7ccff;--brand-colors-error-100: #fff2f2;--brand-colors-success-500: #05b01c;--brand-colors-success-100: #f0f8f1;--text-secondary: #535366;--icon-white: #ffffff;--background-beige-darker: #f2efe8;--icon-dark-grey: #535366;--type-font-family-sans-serif: Roboto;--type-font-family-serif: Georgia;--type-font-family-mono: IBM Plex Mono;--type-weights-300: 300;--type-weights-400: 400;--type-weights-500: 500;--type-weights-700: 700;--type-sizes-12: 12px;--type-sizes-14: 14px;--type-sizes-16: 16px;--type-sizes-18: 18px;--type-sizes-20: 20px;--type-sizes-22: 22px;--type-sizes-24: 24px;--type-sizes-28: 28px;--type-sizes-30: 30px;--type-sizes-32: 32px;--type-sizes-40: 40px;--type-sizes-42: 42px;--type-sizes-48-2: 48px;--type-line-heights-16: 16px;--type-line-heights-20: 20px;--type-line-heights-23: 23px;--type-line-heights-24: 24px;--type-line-heights-25: 25px;--type-line-heights-26: 26px;--type-line-heights-29: 29px;--type-line-heights-30: 30px;--type-line-heights-32: 32px;--type-line-heights-34: 34px;--type-line-heights-35: 35px;--type-line-heights-36: 36px;--type-line-heights-38: 38px;--type-line-heights-40: 40px;--type-line-heights-46: 46px;--type-line-heights-48: 48px;--type-line-heights-52: 52px;--type-line-heights-58: 58px;--type-line-heights-68: 68px;--type-line-heights-74: 74px;--type-line-heights-82: 82px;--type-paragraph-spacings-0: 0px;--type-paragraph-spacings-4: 4px;--type-paragraph-spacings-8: 8px;--type-paragraph-spacings-16: 16px;--type-sans-serif-xl-font-weight: 400;--type-sans-serif-xl-size: 42px;--type-sans-serif-xl-line-height: 46px;--type-sans-serif-xl-paragraph-spacing: 16px;--type-sans-serif-lg-font-weight: 400;--type-sans-serif-lg-size: 32px;--type-sans-serif-lg-line-height: 38px;--type-sans-serif-lg-paragraph-spacing: 16px;--type-sans-serif-md-font-weight: 400;--type-sans-serif-md-line-height: 34px;--type-sans-serif-md-paragraph-spacing: 16px;--type-sans-serif-md-size: 28px;--type-sans-serif-xs-font-weight: 700;--type-sans-serif-xs-line-height: 25px;--type-sans-serif-xs-paragraph-spacing: 0px;--type-sans-serif-xs-size: 20px;--type-sans-serif-sm-font-weight: 400;--type-sans-serif-sm-line-height: 30px;--type-sans-serif-sm-paragraph-spacing: 16px;--type-sans-serif-sm-size: 24px;--type-body-xl-font-weight: 400;--type-body-xl-size: 24px;--type-body-xl-line-height: 36px;--type-body-xl-paragraph-spacing: 0px;--type-body-sm-font-weight: 400;--type-body-sm-size: 14px;--type-body-sm-line-height: 20px;--type-body-sm-paragraph-spacing: 8px;--type-body-xs-font-weight: 400;--type-body-xs-size: 12px;--type-body-xs-line-height: 16px;--type-body-xs-paragraph-spacing: 0px;--type-body-md-font-weight: 400;--type-body-md-size: 16px;--type-body-md-line-height: 20px;--type-body-md-paragraph-spacing: 4px;--type-body-lg-font-weight: 400;--type-body-lg-size: 20px;--type-body-lg-line-height: 26px;--type-body-lg-paragraph-spacing: 16px;--type-body-lg-medium-font-weight: 500;--type-body-lg-medium-size: 20px;--type-body-lg-medium-line-height: 32px;--type-body-lg-medium-paragraph-spacing: 16px;--type-body-md-medium-font-weight: 500;--type-body-md-medium-size: 16px;--type-body-md-medium-line-height: 20px;--type-body-md-medium-paragraph-spacing: 4px;--type-body-sm-bold-font-weight: 700;--type-body-sm-bold-size: 14px;--type-body-sm-bold-line-height: 20px;--type-body-sm-bold-paragraph-spacing: 8px;--type-body-sm-medium-font-weight: 500;--type-body-sm-medium-size: 14px;--type-body-sm-medium-line-height: 20px;--type-body-sm-medium-paragraph-spacing: 8px;--type-serif-md-font-weight: 400;--type-serif-md-size: 40px;--type-serif-md-paragraph-spacing: 0px;--type-serif-md-line-height: 48px;--type-serif-sm-font-weight: 400;--type-serif-sm-size: 28px;--type-serif-sm-paragraph-spacing: 0px;--type-serif-sm-line-height: 32px;--type-serif-lg-font-weight: 400;--type-serif-lg-size: 58px;--type-serif-lg-paragraph-spacing: 0px;--type-serif-lg-line-height: 68px;--type-serif-xs-font-weight: 400;--type-serif-xs-size: 18px;--type-serif-xs-line-height: 24px;--type-serif-xs-paragraph-spacing: 0px;--type-serif-xl-font-weight: 400;--type-serif-xl-size: 74px;--type-serif-xl-paragraph-spacing: 0px;--type-serif-xl-line-height: 82px;--type-mono-md-font-weight: 400;--type-mono-md-size: 22px;--type-mono-md-line-height: 24px;--type-mono-md-paragraph-spacing: 0px;--type-mono-lg-font-weight: 400;--type-mono-lg-size: 40px;--type-mono-lg-line-height: 40px;--type-mono-lg-paragraph-spacing: 0px;--type-mono-sm-font-weight: 400;--type-mono-sm-size: 14px;--type-mono-sm-line-height: 24px;--type-mono-sm-paragraph-spacing: 0px;--spacing-xs-4: 4px;--spacing-xs-8: 8px;--spacing-xs-16: 16px;--spacing-sm-24: 24px;--spacing-sm-32: 32px;--spacing-md-40: 40px;--spacing-md-48: 48px;--spacing-lg-64: 64px;--spacing-lg-80: 80px;--spacing-xlg-104: 104px;--spacing-xlg-152: 152px;--spacing-xs-12: 12px;--spacing-page-section: 152px;--spacing-card-list-spacing: 48px;--spacing-text-section-spacing: 80px;--spacing-md-xs-headings: 40px;--corner-radius-radius-lg: 16px;--corner-radius-radius-sm: 4px;--corner-radius-radius-md: 8px;--corner-radius-radius-round: 104px}}</style><link crossorigin="" href="https://fonts.gstatic.com/" rel="preconnect" /><link href="https://fonts.googleapis.com/css2?family=DM+Sans:ital,opsz,wght@0,9..40,100..1000;1,9..40,100..1000&amp;family=Gupter:wght@400;500;700&amp;family=IBM+Plex+Mono:wght@300;400&amp;family=Material+Symbols+Outlined:opsz,wght,FILL,GRAD@20,400,0,0&amp;display=swap" rel="stylesheet" /><link rel="stylesheet" media="all" href="//a.academia-assets.com/assets/design_system/common-57f9da13cef3fd4e2a8b655342c6488eded3e557e823fe67571f2ac77acd7b6f.css" /> <meta name="author" content="maurice dawson" /> <meta name="description" content="Maurice Dawson, Illinois Institute of Technology: 67 Followers, 3 Following, 141 Research papers. Research interests: Homeland Security, Virtual Environments,…" /> <meta name="google-site-verification" content="bKJMBZA7E43xhDOopFZkssMMkBRjvYERV-NaN4R6mrs" /> <script> var $controller_name = 'works'; var $action_name = "summary"; var $rails_env = 'production'; var $app_rev = '9744e839ffe2d813ef8b7eb988ae0a3341a6052d'; var $domain = 'academia.edu'; var $app_host = "academia.edu"; var $asset_host = "academia-assets.com"; var $start_time = new Date().getTime(); var $recaptcha_key = "6LdxlRMTAAAAADnu_zyLhLg0YF9uACwz78shpjJB"; var $recaptcha_invisible_key = "6Lf3KHUUAAAAACggoMpmGJdQDtiyrjVlvGJ6BbAj"; var $disableClientRecordHit = false; </script> <script> window.Aedu = { hit_data: null }; window.Aedu.SiteStats = {"premium_universities_count":13933,"monthly_visitors":"143 million","monthly_visitor_count":143701084,"monthly_visitor_count_in_millions":143,"user_count":285956197,"paper_count":55203019,"paper_count_in_millions":55,"page_count":432000000,"page_count_in_millions":432,"pdf_count":16500000,"pdf_count_in_millions":16}; window.Aedu.serverRenderTime = new Date(1743219901000); window.Aedu.timeDifference = new Date().getTime() - 1743219901000; window.Aedu.isUsingCssV1 = false; window.Aedu.enableLocalization = true; window.Aedu.activateFullstory = false; window.Aedu.serviceAvailability = { status: {"attention_db":"on","bibliography_db":"on","contacts_db":"on","email_db":"on","indexability_db":"on","mentions_db":"on","news_db":"on","notifications_db":"on","offsite_mentions_db":"on","redshift":"on","redshift_exports_db":"on","related_works_db":"on","ring_db":"on","user_tests_db":"on"}, serviceEnabled: function(service) { return this.status[service] === "on"; }, readEnabled: function(service) { return this.serviceEnabled(service) || this.status[service] === "read_only"; }, }; window.Aedu.viewApmTrace = function() { // Check if x-apm-trace-id meta tag is set, and open the trace in APM // in a new window if it is. var apmTraceId = document.head.querySelector('meta[name="x-apm-trace-id"]'); if (apmTraceId) { var traceId = apmTraceId.content; // Use trace ID to construct URL, an example URL looks like: // https://app.datadoghq.com/apm/traces?query=trace_id%31298410148923562634 var apmUrl = 'https://app.datadoghq.com/apm/traces?query=trace_id%3A' + traceId; window.open(apmUrl, '_blank'); } }; </script> <!--[if lt IE 9]> <script src="//cdnjs.cloudflare.com/ajax/libs/html5shiv/3.7.2/html5shiv.min.js"></script> <![endif]--> <link href="https://fonts.googleapis.com/css?family=Roboto:100,100i,300,300i,400,400i,500,500i,700,700i,900,900i" rel="stylesheet"> <link rel="preload" href="//maxcdn.bootstrapcdn.com/font-awesome/4.3.0/css/font-awesome.min.css" as="style" onload="this.rel='stylesheet'"> <link rel="stylesheet" media="all" href="//a.academia-assets.com/assets/libraries-a9675dcb01ec4ef6aa807ba772c7a5a00c1820d3ff661c1038a20f80d06bb4e4.css" /> <link rel="stylesheet" media="all" href="//a.academia-assets.com/assets/academia-9982828ed1de4777566441c35ccf7157c55ca779141fce69380d727ebdbbb926.css" /> <link rel="stylesheet" media="all" href="//a.academia-assets.com/assets/design_system_legacy-056a9113b9a0f5343d013b29ee1929d5a18be35fdcdceb616600b4db8bd20054.css" /> <script src="//a.academia-assets.com/assets/webpack_bundles/runtime-bundle-005434038af4252ca37c527588411a3d6a0eabb5f727fac83f8bbe7fd88d93bb.js"></script> <script src="//a.academia-assets.com/assets/webpack_bundles/webpack_libraries_and_infrequently_changed.wjs-bundle-cf157bca4ef673abcac8051ac68ed1136134beba22a884388e7ed6391572eef4.js"></script> <script src="//a.academia-assets.com/assets/webpack_bundles/core_webpack.wjs-bundle-f96ab8a6334d161855249975a57d3f3d57f65c2e7553c6d20ab43c63efb79575.js"></script> <script src="//a.academia-assets.com/assets/webpack_bundles/sentry.wjs-bundle-5fe03fddca915c8ba0f7edbe64c194308e8ce5abaed7bffe1255ff37549c4808.js"></script> <script> jade = window.jade || {}; jade.helpers = window.$h; jade._ = window._; </script> <!-- Google Tag Manager --> <script id="tag-manager-head-root">(function(w,d,s,l,i){w[l]=w[l]||[];w[l].push({'gtm.start': new Date().getTime(),event:'gtm.js'});var f=d.getElementsByTagName(s)[0], j=d.createElement(s),dl=l!='dataLayer'?'&l='+l:'';j.async=true;j.src= 'https://www.googletagmanager.com/gtm.js?id='+i+dl;f.parentNode.insertBefore(j,f); })(window,document,'script','dataLayer_old','GTM-5G9JF7Z');</script> <!-- End Google Tag Manager --> <script> window.gptadslots = []; window.googletag = window.googletag || {}; window.googletag.cmd = window.googletag.cmd || []; </script> <script type="text/javascript"> // TODO(jacob): This should be defined, may be rare load order problem. // Checking if null is just a quick fix, will default to en if unset. // Better fix is to run this immedietely after I18n is set. if (window.I18n != null) { I18n.defaultLocale = "en"; I18n.locale = "en"; I18n.fallbacks = true; } </script> <link rel="canonical" href="https://iit.academia.edu/MauriceDawson" /> </head> <!--[if gte IE 9 ]> <body class='ie ie9 c-profiles/works a-summary logged_out'> <![endif]--> <!--[if !(IE) ]><!--> <body class='c-profiles/works a-summary logged_out'> <!--<![endif]--> <div id="fb-root"></div><script>window.fbAsyncInit = function() { FB.init({ appId: "2369844204", version: "v8.0", status: true, cookie: true, xfbml: true }); // Additional initialization code. if (window.InitFacebook) { // facebook.ts already loaded, set it up. window.InitFacebook(); } else { // Set a flag for facebook.ts to find when it loads. window.academiaAuthReadyFacebook = true; } };</script><script>window.fbAsyncLoad = function() { // Protection against double calling of this function if (window.FB) { return; } (function(d, s, id){ var js, fjs = d.getElementsByTagName(s)[0]; if (d.getElementById(id)) {return;} js = d.createElement(s); js.id = id; js.src = "//connect.facebook.net/en_US/sdk.js"; fjs.parentNode.insertBefore(js, fjs); }(document, 'script', 'facebook-jssdk')); } if (!window.defer_facebook) { // Autoload if not deferred window.fbAsyncLoad(); } else { // Defer loading by 5 seconds setTimeout(function() { window.fbAsyncLoad(); }, 5000); }</script> <div id="google-root"></div><script>window.loadGoogle = function() { if (window.InitGoogle) { // google.ts already loaded, set it up. window.InitGoogle("331998490334-rsn3chp12mbkiqhl6e7lu2q0mlbu0f1b"); } else { // Set a flag for google.ts to use when it loads. window.GoogleClientID = "331998490334-rsn3chp12mbkiqhl6e7lu2q0mlbu0f1b"; } };</script><script>window.googleAsyncLoad = function() { // Protection against double calling of this function (function(d) { var js; var id = 'google-jssdk'; var ref = d.getElementsByTagName('script')[0]; if (d.getElementById(id)) { return; } js = d.createElement('script'); js.id = id; js.async = true; js.onload = loadGoogle; js.src = "https://accounts.google.com/gsi/client" ref.parentNode.insertBefore(js, ref); }(document)); } if (!window.defer_google) { // Autoload if not deferred window.googleAsyncLoad(); } else { // Defer loading by 5 seconds setTimeout(function() { window.googleAsyncLoad(); }, 5000); }</script> <div id="tag-manager-body-root"> <!-- Google Tag Manager (noscript) --> <noscript><iframe src="https://www.googletagmanager.com/ns.html?id=GTM-5G9JF7Z" height="0" width="0" style="display:none;visibility:hidden"></iframe></noscript> <!-- End Google Tag Manager (noscript) --> <!-- Event listeners for analytics --> <script> window.addEventListener('load', function() { if (document.querySelector('input[name="commit"]')) { document.querySelector('input[name="commit"]').addEventListener('click', function() { gtag('event', 'click', { event_category: 'button', event_label: 'Log In' }) }) } }); </script> </div> <script>var _comscore = _comscore || []; _comscore.push({ c1: "2", c2: "26766707" }); (function() { var s = document.createElement("script"), el = document.getElementsByTagName("script")[0]; s.async = true; s.src = (document.location.protocol == "https:" ? "https://sb" : "http://b") + ".scorecardresearch.com/beacon.js"; el.parentNode.insertBefore(s, el); })();</script><img src="https://sb.scorecardresearch.com/p?c1=2&amp;c2=26766707&amp;cv=2.0&amp;cj=1" style="position: absolute; visibility: hidden" /> <div id='react-modal'></div> <div class='DesignSystem'> <a class='u-showOnFocus' href='#site'> Skip to main content </a> </div> <div id="upgrade_ie_banner" style="display: none;"><p>Academia.edu no longer supports Internet Explorer.</p><p>To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to&nbsp;<a href="https://www.academia.edu/upgrade-browser">upgrade your browser</a>.</p></div><script>// Show this banner for all versions of IE if (!!window.MSInputMethodContext || /(MSIE)/.test(navigator.userAgent)) { document.getElementById('upgrade_ie_banner').style.display = 'block'; }</script> <div class="DesignSystem bootstrap ShrinkableNav"><div class="navbar navbar-default main-header"><div class="container-wrapper" id="main-header-container"><div class="container"><div class="navbar-header"><div class="nav-left-wrapper u-mt0x"><div class="nav-logo"><a data-main-header-link-target="logo_home" href="https://www.academia.edu/"><img class="visible-xs-inline-block" style="height: 24px;" alt="Academia.edu" src="//a.academia-assets.com/images/academia-logo-redesign-2015-A.svg" width="24" height="24" /><img width="145.2" height="18" class="hidden-xs" style="height: 24px;" alt="Academia.edu" src="//a.academia-assets.com/images/academia-logo-redesign-2015.svg" /></a></div><div class="nav-search"><div class="SiteSearch-wrapper select2-no-default-pills"><form class="js-SiteSearch-form DesignSystem" action="https://www.academia.edu/search" accept-charset="UTF-8" method="get"><i class="SiteSearch-icon fa fa-search u-fw700 u-positionAbsolute u-tcGrayDark"></i><input class="js-SiteSearch-form-input SiteSearch-form-input form-control" data-main-header-click-target="search_input" name="q" placeholder="Search" type="text" value="" /></form></div></div></div><div class="nav-right-wrapper pull-right"><ul class="NavLinks js-main-nav list-unstyled"><li class="NavLinks-link"><a class="js-header-login-url Button Button--inverseGray Button--sm u-mb4x" id="nav_log_in" rel="nofollow" href="https://www.academia.edu/login">Log In</a></li><li class="NavLinks-link u-p0x"><a class="Button Button--inverseGray Button--sm u-mb4x" rel="nofollow" href="https://www.academia.edu/signup">Sign Up</a></li></ul><button class="hidden-lg hidden-md hidden-sm u-ml4x navbar-toggle collapsed" data-target=".js-mobile-header-links" data-toggle="collapse" type="button"><span class="icon-bar"></span><span class="icon-bar"></span><span class="icon-bar"></span></button></div></div><div class="collapse navbar-collapse js-mobile-header-links"><ul class="nav navbar-nav"><li class="u-borderColorGrayLight u-borderBottom1"><a rel="nofollow" href="https://www.academia.edu/login">Log In</a></li><li class="u-borderColorGrayLight u-borderBottom1"><a rel="nofollow" href="https://www.academia.edu/signup">Sign Up</a></li><li class="u-borderColorGrayLight u-borderBottom1 js-mobile-nav-expand-trigger"><a href="#">more&nbsp<span class="caret"></span></a></li><li><ul class="js-mobile-nav-expand-section nav navbar-nav u-m0x collapse"><li class="u-borderColorGrayLight u-borderBottom1"><a rel="false" href="https://www.academia.edu/about">About</a></li><li class="u-borderColorGrayLight u-borderBottom1"><a rel="nofollow" href="https://www.academia.edu/press">Press</a></li><li class="u-borderColorGrayLight u-borderBottom1"><a rel="false" href="https://www.academia.edu/documents">Papers</a></li><li class="u-borderColorGrayLight u-borderBottom1"><a rel="nofollow" href="https://www.academia.edu/terms">Terms</a></li><li class="u-borderColorGrayLight u-borderBottom1"><a rel="nofollow" href="https://www.academia.edu/privacy">Privacy</a></li><li class="u-borderColorGrayLight u-borderBottom1"><a rel="nofollow" href="https://www.academia.edu/copyright">Copyright</a></li><li class="u-borderColorGrayLight u-borderBottom1"><a rel="nofollow" href="https://www.academia.edu/hiring"><i class="fa fa-briefcase"></i>&nbsp;We're Hiring!</a></li><li class="u-borderColorGrayLight u-borderBottom1"><a rel="nofollow" href="https://support.academia.edu/hc/en-us"><i class="fa fa-question-circle"></i>&nbsp;Help Center</a></li><li class="js-mobile-nav-collapse-trigger u-borderColorGrayLight u-borderBottom1 dropup" style="display:none"><a href="#">less&nbsp<span class="caret"></span></a></li></ul></li></ul></div></div></div><script>(function(){ var $moreLink = $(".js-mobile-nav-expand-trigger"); var $lessLink = $(".js-mobile-nav-collapse-trigger"); var $section = $('.js-mobile-nav-expand-section'); $moreLink.click(function(ev){ ev.preventDefault(); $moreLink.hide(); $lessLink.show(); $section.collapse('show'); }); $lessLink.click(function(ev){ ev.preventDefault(); $moreLink.show(); $lessLink.hide(); $section.collapse('hide'); }); })() if ($a.is_logged_in() || false) { new Aedu.NavigationController({ el: '.js-main-nav', showHighlightedNotification: false }); } else { $(".js-header-login-url").attr("href", $a.loginUrlWithRedirect()); } Aedu.autocompleteSearch = new AutocompleteSearch({el: '.js-SiteSearch-form'});</script></div></div> <div id='site' class='fixed'> <div id="content" class="clearfix"> <script>document.addEventListener('DOMContentLoaded', function(){ var $dismissible = $(".dismissible_banner"); $dismissible.click(function(ev) { $dismissible.hide(); }); });</script> <script src="//a.academia-assets.com/assets/webpack_bundles/profile.wjs-bundle-091a194a2533e53e1630c5cfd78813a4445aff73d16c70cdba1eafe8c0939f4a.js" defer="defer"></script><script>$viewedUser = Aedu.User.set_viewed( {"id":82613518,"first_name":"Maurice","middle_initials":null,"last_name":"Dawson","page_name":"MauriceDawson","domain_name":"iit","created_at":"2018-06-06T13:08:54.103-07:00","display_name":"Maurice Dawson","url":"https://iit.academia.edu/MauriceDawson","photo":"https://gravatar.com/avatar/a6dd47fc155390a925162801ad79dd11?s=65","has_photo":true,"department":{"id":1973167,"name":"Information Technology and Management","url":"https://iit.academia.edu/Departments/Information_Technology_and_Management/Documents","university":{"id":1505,"name":"Illinois Institute of Technology","url":"https://iit.academia.edu/"}},"position":"Faculty Member","position_id":1,"is_analytics_public":false,"interests":[{"id":5380,"name":"Homeland Security","url":"https://www.academia.edu/Documents/in/Homeland_Security"},{"id":2152,"name":"Virtual Environments","url":"https://www.academia.edu/Documents/in/Virtual_Environments"},{"id":570,"name":"Military Intelligence","url":"https://www.academia.edu/Documents/in/Military_Intelligence"},{"id":8001,"name":"Management Science","url":"https://www.academia.edu/Documents/in/Management_Science"},{"id":4728,"name":"Systems Thinking","url":"https://www.academia.edu/Documents/in/Systems_Thinking"}]} ); if ($a.is_logged_in() && $viewedUser.is_current_user()) { $('body').addClass('profile-viewed-by-owner'); } $socialProfiles = []</script><div id="js-react-on-rails-context" style="display:none" data-rails-context="{&quot;inMailer&quot;:false,&quot;i18nLocale&quot;:&quot;en&quot;,&quot;i18nDefaultLocale&quot;:&quot;en&quot;,&quot;href&quot;:&quot;https://iit.academia.edu/MauriceDawson&quot;,&quot;location&quot;:&quot;/MauriceDawson&quot;,&quot;scheme&quot;:&quot;https&quot;,&quot;host&quot;:&quot;iit.academia.edu&quot;,&quot;port&quot;:null,&quot;pathname&quot;:&quot;/MauriceDawson&quot;,&quot;search&quot;:null,&quot;httpAcceptLanguage&quot;:null,&quot;serverSide&quot;:false}"></div> <div class="js-react-on-rails-component" style="display:none" data-component-name="ProfileCheckPaperUpdate" data-props="{}" data-trace="false" data-dom-id="ProfileCheckPaperUpdate-react-component-44568f97-5505-4874-a129-448197c65b77"></div> <div id="ProfileCheckPaperUpdate-react-component-44568f97-5505-4874-a129-448197c65b77"></div> <div class="DesignSystem"><div class="onsite-ping" id="onsite-ping"></div></div><div class="profile-user-info DesignSystem"><div class="social-profile-container"><div class="left-panel-container"><div class="user-info-component-wrapper"><div class="user-summary-cta-container"><div class="user-summary-container"><div class="social-profile-avatar-container"><img class="profile-avatar u-positionAbsolute" alt="Maurice Dawson" border="0" onerror="if (this.src != &#39;//a.academia-assets.com/images/s200_no_pic.png&#39;) this.src = &#39;//a.academia-assets.com/images/s200_no_pic.png&#39;;" src="https://gravatar.com/avatar/a6dd47fc155390a925162801ad79dd11?s=200" /></div><div class="title-container"><h1 class="ds2-5-heading-sans-serif-sm">Maurice Dawson</h1><div class="affiliations-container fake-truncate js-profile-affiliations"><div><a class="u-tcGrayDarker" href="https://iit.academia.edu/">Illinois Institute of Technology</a>, <a class="u-tcGrayDarker" href="https://iit.academia.edu/Departments/Information_Technology_and_Management/Documents">Information Technology and Management</a>, <span class="u-tcGrayDarker">Faculty Member</span></div></div></div></div><div class="sidebar-cta-container"><button class="ds2-5-button hidden profile-cta-button grow js-profile-follow-button" data-broccoli-component="user-info.follow-button" data-click-track="profile-user-info-follow-button" data-follow-user-fname="Maurice" data-follow-user-id="82613518" data-follow-user-source="profile_button" data-has-google="false"><span class="material-symbols-outlined" style="font-size: 20px" translate="no">add</span>Follow</button><button class="ds2-5-button hidden profile-cta-button grow js-profile-unfollow-button" data-broccoli-component="user-info.unfollow-button" data-click-track="profile-user-info-unfollow-button" data-unfollow-user-id="82613518"><span class="material-symbols-outlined" style="font-size: 20px" translate="no">done</span>Following</button></div></div><div class="user-stats-container"><a><div class="stat-container js-profile-followers"><p class="label">Followers</p><p class="data">67</p></div></a><a><div class="stat-container js-profile-followees" data-broccoli-component="user-info.followees-count" data-click-track="profile-expand-user-info-following"><p class="label">Following</p><p class="data">3</p></div></a><a><div class="stat-container js-profile-coauthors" data-broccoli-component="user-info.coauthors-count" data-click-track="profile-expand-user-info-coauthors"><p class="label">Co-authors</p><p class="data">2</p></div></a><span><div class="stat-container"><p class="label"><span class="js-profile-total-view-text">Public Views</span></p><p class="data"><span class="js-profile-view-count"></span></p></div></span></div><div class="suggested-academics-container"><div class="suggested-academics--header"><h3 class="ds2-5-heading-sans-serif-xs">Related Authors</h3></div><ul class="suggested-user-card-list" data-nosnippet="true"><div class="suggested-user-card"><div class="suggested-user-card__avatar social-profile-avatar-container"><a data-nosnippet="" href="https://independent.academia.edu/shamshairali_"><img class="profile-avatar u-positionAbsolute" alt="Shamshair Ali related author profile picture" border="0" onerror="if (this.src != &#39;//a.academia-assets.com/images/s200_no_pic.png&#39;) this.src = &#39;//a.academia-assets.com/images/s200_no_pic.png&#39;;" width="200" height="200" src="https://0.academia-photos.com/105600979/26124358/93126487/s200_shamshair.ali.png" /></a></div><div class="suggested-user-card__user-info"><a class="suggested-user-card__user-info__header ds2-5-body-sm-bold ds2-5-body-link" href="https://independent.academia.edu/shamshairali_">Shamshair Ali</a></div></div><div class="suggested-user-card"><div class="suggested-user-card__avatar social-profile-avatar-container"><a data-nosnippet="" href="https://independent.academia.edu/RachidAitMoulay"><img class="profile-avatar u-positionAbsolute" alt="Rachid Ait Moulay related author profile picture" border="0" src="//a.academia-assets.com/images/s200_no_pic.png" /></a></div><div class="suggested-user-card__user-info"><a class="suggested-user-card__user-info__header ds2-5-body-sm-bold ds2-5-body-link" href="https://independent.academia.edu/RachidAitMoulay">Rachid Ait Moulay</a></div></div><div class="suggested-user-card"><div class="suggested-user-card__avatar social-profile-avatar-container"><a data-nosnippet="" href="https://independent.academia.edu/EmrahTufan"><img class="profile-avatar u-positionAbsolute" alt="Emrah Tufan related author profile picture" border="0" onerror="if (this.src != &#39;//a.academia-assets.com/images/s200_no_pic.png&#39;) this.src = &#39;//a.academia-assets.com/images/s200_no_pic.png&#39;;" width="200" height="200" src="https://0.academia-photos.com/62761941/18601053/18566378/s200_emrah.tufan.jpg" /></a></div><div class="suggested-user-card__user-info"><a class="suggested-user-card__user-info__header ds2-5-body-sm-bold ds2-5-body-link" href="https://independent.academia.edu/EmrahTufan">Emrah Tufan</a></div></div><div class="suggested-user-card"><div class="suggested-user-card__avatar social-profile-avatar-container"><a data-nosnippet="" href="https://independent.academia.edu/FerdinandKAHENGA"><img class="profile-avatar u-positionAbsolute" alt="Ferdinand KAHENGA related author profile picture" border="0" src="//a.academia-assets.com/images/s200_no_pic.png" /></a></div><div class="suggested-user-card__user-info"><a class="suggested-user-card__user-info__header ds2-5-body-sm-bold ds2-5-body-link" href="https://independent.academia.edu/FerdinandKAHENGA">Ferdinand KAHENGA</a></div></div><div class="suggested-user-card"><div class="suggested-user-card__avatar social-profile-avatar-container"><a data-nosnippet="" href="https://independent.academia.edu/LuisCarlosHerrera6"><img class="profile-avatar u-positionAbsolute" alt="Luis Carlos Herrera related author profile picture" border="0" src="//a.academia-assets.com/images/s200_no_pic.png" /></a></div><div class="suggested-user-card__user-info"><a class="suggested-user-card__user-info__header ds2-5-body-sm-bold ds2-5-body-link" href="https://independent.academia.edu/LuisCarlosHerrera6">Luis Carlos Herrera</a></div></div><div class="suggested-user-card"><div class="suggested-user-card__avatar social-profile-avatar-container"><a data-nosnippet="" href="https://independent.academia.edu/NafizRifat1"><img class="profile-avatar u-positionAbsolute" alt="Nafiz Rifat related author profile picture" border="0" onerror="if (this.src != &#39;//a.academia-assets.com/images/s200_no_pic.png&#39;) this.src = &#39;//a.academia-assets.com/images/s200_no_pic.png&#39;;" width="200" height="200" src="https://0.academia-photos.com/264172722/115622083/104910081/s200_nafiz.rifat.jpg" /></a></div><div class="suggested-user-card__user-info"><a class="suggested-user-card__user-info__header ds2-5-body-sm-bold ds2-5-body-link" href="https://independent.academia.edu/NafizRifat1">Nafiz Rifat</a></div></div><div class="suggested-user-card"><div class="suggested-user-card__avatar social-profile-avatar-container"><a data-nosnippet="" href="https://tees.academia.edu/LeMinhThaoDoan"><img class="profile-avatar u-positionAbsolute" alt="Le Minh Thao Doan related author profile picture" border="0" onerror="if (this.src != &#39;//a.academia-assets.com/images/s200_no_pic.png&#39;) this.src = &#39;//a.academia-assets.com/images/s200_no_pic.png&#39;;" width="200" height="200" src="https://0.academia-photos.com/241651644/96599714/85642792/s200_le_minh_thao.doan.png" /></a></div><div class="suggested-user-card__user-info"><a class="suggested-user-card__user-info__header ds2-5-body-sm-bold ds2-5-body-link" href="https://tees.academia.edu/LeMinhThaoDoan">Le Minh Thao Doan</a><p class="suggested-user-card__user-info__subheader ds2-5-body-xs">Teesside University</p></div></div><div class="suggested-user-card"><div class="suggested-user-card__avatar social-profile-avatar-container"><a data-nosnippet="" href="https://independent.academia.edu/YounesBalboul"><img class="profile-avatar u-positionAbsolute" alt="Younes Balboul related author profile picture" border="0" onerror="if (this.src != &#39;//a.academia-assets.com/images/s200_no_pic.png&#39;) this.src = &#39;//a.academia-assets.com/images/s200_no_pic.png&#39;;" width="200" height="200" src="https://0.academia-photos.com/55637477/24407022/51645993/s200_younes.balboul.jpg" /></a></div><div class="suggested-user-card__user-info"><a class="suggested-user-card__user-info__header ds2-5-body-sm-bold ds2-5-body-link" href="https://independent.academia.edu/YounesBalboul">Younes Balboul</a></div></div><div class="suggested-user-card"><div class="suggested-user-card__avatar social-profile-avatar-container"><a data-nosnippet="" href="https://up-za.academia.edu/NkongoloMike"><img class="profile-avatar u-positionAbsolute" alt="Dr. Mike Wa Nkongolo related author profile picture" border="0" onerror="if (this.src != &#39;//a.academia-assets.com/images/s200_no_pic.png&#39;) this.src = &#39;//a.academia-assets.com/images/s200_no_pic.png&#39;;" width="200" height="200" src="https://0.academia-photos.com/186770238/77927282/147011495/s200_mike.nkongolo.jpg" /></a></div><div class="suggested-user-card__user-info"><a class="suggested-user-card__user-info__header ds2-5-body-sm-bold ds2-5-body-link" href="https://up-za.academia.edu/NkongoloMike">Dr. Mike Wa Nkongolo</a><p class="suggested-user-card__user-info__subheader ds2-5-body-xs">University of Pretoria</p></div></div><div class="suggested-user-card"><div class="suggested-user-card__avatar social-profile-avatar-container"><a data-nosnippet="" href="https://independent.academia.edu/MohammadKazim12"><img class="profile-avatar u-positionAbsolute" alt="Mohammad Kazim related author profile picture" border="0" onerror="if (this.src != &#39;//a.academia-assets.com/images/s200_no_pic.png&#39;) this.src = &#39;//a.academia-assets.com/images/s200_no_pic.png&#39;;" width="200" height="200" src="https://0.academia-photos.com/202125925/63318934/51623237/s200_mohammad.kazim.png" /></a></div><div class="suggested-user-card__user-info"><a class="suggested-user-card__user-info__header ds2-5-body-sm-bold ds2-5-body-link" href="https://independent.academia.edu/MohammadKazim12">Mohammad Kazim</a></div></div></ul></div><style type="text/css">.suggested-academics--header h3{font-size:16px;font-weight:500;line-height:20px}</style><div class="ri-section"><div class="ri-section-header"><span>Interests</span></div><div class="ri-tags-container"><a data-click-track="profile-user-info-expand-research-interests" data-has-card-for-ri-list="82613518" href="https://www.academia.edu/Documents/in/Military_Intelligence"><div id="js-react-on-rails-context" style="display:none" data-rails-context="{&quot;inMailer&quot;:false,&quot;i18nLocale&quot;:&quot;en&quot;,&quot;i18nDefaultLocale&quot;:&quot;en&quot;,&quot;href&quot;:&quot;https://iit.academia.edu/MauriceDawson&quot;,&quot;location&quot;:&quot;/MauriceDawson&quot;,&quot;scheme&quot;:&quot;https&quot;,&quot;host&quot;:&quot;iit.academia.edu&quot;,&quot;port&quot;:null,&quot;pathname&quot;:&quot;/MauriceDawson&quot;,&quot;search&quot;:null,&quot;httpAcceptLanguage&quot;:null,&quot;serverSide&quot;:false}"></div> <div class="js-react-on-rails-component" style="display:none" data-component-name="Pill" data-props="{&quot;color&quot;:&quot;gray&quot;,&quot;children&quot;:[&quot;Military Intelligence&quot;]}" data-trace="false" data-dom-id="Pill-react-component-e3d9980e-5637-46ce-ac55-8482212a5a62"></div> <div id="Pill-react-component-e3d9980e-5637-46ce-ac55-8482212a5a62"></div> </a></div></div></div></div><div class="right-panel-container"><div class="user-content-wrapper"><div class="uploads-container" id="social-redesign-work-container"><div class="upload-header"><h2 class="ds2-5-heading-sans-serif-xs">Uploads</h2></div><div class="nav-container backbone-profile-documents-nav hidden-xs"><ul class="nav-tablist" role="tablist"><li class="nav-chip active" role="presentation"><a data-section-name="" data-toggle="tab" href="#all" role="tab">all</a></li><li class="nav-chip" role="presentation"><a class="js-profile-docs-nav-section u-textTruncate" data-click-track="profile-works-tab" data-section-name="Books" data-toggle="tab" href="#books" role="tab" title="Books"><span>1</span>&nbsp;<span class="ds2-5-body-sm-bold">Books</span></a></li><li class="nav-chip" role="presentation"><a class="js-profile-docs-nav-section u-textTruncate" data-click-track="profile-works-tab" data-section-name="Papers" data-toggle="tab" href="#papers" role="tab" title="Papers"><span>137</span>&nbsp;<span class="ds2-5-body-sm-bold">Papers</span></a></li></ul></div><div class="divider ds-divider-16" style="margin: 0px;"></div><div class="documents-container backbone-social-profile-documents" style="width: 100%;"><div class="u-taCenter"></div><div class="profile--tab_content_container js-tab-pane tab-pane active" id="all"><div class="profile--tab_heading_container js-section-heading" data-section="Books" id="Books"><h3 class="profile--tab_heading_container">Books by Maurice Dawson</h3></div><div class="js-work-strip profile--work_container" data-work-id="69384214"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/69384214/East_African_Cybersecurity_Improving_Microfinance_Database_in_Ethiopia"><img alt="Research paper thumbnail of East African Cybersecurity: Improving Microfinance Database in Ethiopia" class="work-thumbnail" src="https://attachments.academia-assets.com/79502805/thumbnails/1.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/69384214/East_African_Cybersecurity_Improving_Microfinance_Database_in_Ethiopia">East African Cybersecurity: Improving Microfinance Database in Ethiopia</a></div><div class="wp-workCard_item wp-workCard--coauthors"><span>by </span><span><a class="" data-click-track="profile-work-strip-authors" href="https://iit.academia.edu/MauriceDawson">Maurice Dawson</a> and <a class="" data-click-track="profile-work-strip-authors" href="https://captechu.academia.edu/AndreasVassilakos">Andreas Vassilakos</a></span></div><div class="wp-workCard_item"><span>Cybersecurity Capabilities in Developing Nations and Its Impact on Global Security</span><span>, 2022</span></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">ICT has become an essential factor in Ethiopia and other East African countries to transform thei...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">ICT has become an essential factor in Ethiopia and other East African countries to transform their economies. Meanwhile, the agriculture sector is still the primary driver of economic development. The difference between the past and present years is the injection of technology to further drive this business. For Ethiopia, this means using a database to support countrywide micro-financing to farmers in seeking capital for leasing land, purchasing needed materials, and hiring workers. The objectives of this chapter were to redesign and harden the database architecture of the researched micro-financing organization. The researchers performed an assessment of the organization&#39;s information systems. After identifying weaknesses, they followed controls identified in the NIST SP 800-53. This chapter describes the security faults within the database, showing the lack of baseline cybersecurity controls to ensure a hardened system. The authors proposed a security-centered database architecture after auditing the researched organization&#39;s IT infrastructure and information systems.</span></div><div class="wp-workCard_item"><div class="carousel-container carousel-container--sm" id="profile-work-69384214-figures"><div class="prev-slide-container js-prev-button-container"><button aria-label="Previous" class="carousel-navigation-button js-profile-work-69384214-figures-prev"><span class="material-symbols-outlined" style="font-size: 24px" translate="no">arrow_back_ios</span></button></div><div class="slides-container js-slides-container"><figure class="figure-slide-container"><a href="https://www.academia.edu/figures/30289241/figure-1-current-enterprise-database-architecture-source"><img alt="Figure I. Current enterprise database architecture Source: Author’s illustration " class="figure-slide-image" src="https://figures.academia-assets.com/79502805/figure_001.jpg" /></a></figure><figure class="figure-slide-container"><a href="https://www.academia.edu/figures/30289251/figure-2-proposed-low-level-database-architecture-source"><img alt="Figure 2. Proposed low level database architecture Source: Author’s illustration is an open-source solution for data encryption. It provides the users with different options, including creating a virtual encrypted disk within a file and encrypta partition or the entire storage device with pre-boot authentication. The solution proposed for USB data encryption was cryptsetup. This solution was deemed appropriate due to being a rigid encryption tool that is open-source and would not create further financial burdens for the organization. " class="figure-slide-image" src="https://figures.academia-assets.com/79502805/figure_002.jpg" /></a></figure></div><div class="next-slide-container js-next-button-container"><button aria-label="Next" class="carousel-navigation-button js-profile-work-69384214-figures-next"><span class="material-symbols-outlined" style="font-size: 24px" translate="no">arrow_forward_ios</span></button></div></div></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><a id="fb5681372a0c51375ee42274463f7d8e" class="wp-workCard--action" rel="nofollow" data-click-track="profile-work-strip-download" data-download="{&quot;attachment_id&quot;:79502805,&quot;asset_id&quot;:69384214,&quot;asset_type&quot;:&quot;Work&quot;,&quot;button_location&quot;:&quot;profile&quot;}" href="https://www.academia.edu/attachments/79502805/download_file?s=profile"><span><i class="fa fa-arrow-down"></i></span><span>Download</span></a><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="69384214"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="69384214"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 69384214; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=69384214]").text(description); $(".js-view-count[data-work-id=69384214]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 69384214; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='69384214']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-a9bf3a2bc8c89fa2a77156577594264ee8a0f214d74241bc0fcd3f69f8d107ac.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (true){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "fb5681372a0c51375ee42274463f7d8e" } } $('.js-work-strip[data-work-id=69384214]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":69384214,"title":"East African Cybersecurity: Improving Microfinance Database in Ethiopia","translated_title":"","metadata":{"doi":"10.4018/978-1-7998-8693-8","abstract":"ICT has become an essential factor in Ethiopia and other East African countries to transform their economies. Meanwhile, the agriculture sector is still the primary driver of economic development. The difference between the past and present years is the injection of technology to further drive this business. For Ethiopia, this means using a database to support countrywide micro-financing to farmers in seeking capital for leasing land, purchasing needed materials, and hiring workers. The objectives of this chapter were to redesign and harden the database architecture of the researched micro-financing organization. The researchers performed an assessment of the organization's information systems. After identifying weaknesses, they followed controls identified in the NIST SP 800-53. This chapter describes the security faults within the database, showing the lack of baseline cybersecurity controls to ensure a hardened system. The authors proposed a security-centered database architecture after auditing the researched organization's IT infrastructure and information systems.","ai_title_tag":"Enhancing Cybersecurity for Ethiopia's Microfinance Database","publication_date":{"day":null,"month":null,"year":2022,"errors":{}},"publication_name":"Cybersecurity Capabilities in Developing Nations and Its Impact on Global Security"},"translated_abstract":"ICT has become an essential factor in Ethiopia and other East African countries to transform their economies. Meanwhile, the agriculture sector is still the primary driver of economic development. The difference between the past and present years is the injection of technology to further drive this business. For Ethiopia, this means using a database to support countrywide micro-financing to farmers in seeking capital for leasing land, purchasing needed materials, and hiring workers. The objectives of this chapter were to redesign and harden the database architecture of the researched micro-financing organization. The researchers performed an assessment of the organization's information systems. After identifying weaknesses, they followed controls identified in the NIST SP 800-53. This chapter describes the security faults within the database, showing the lack of baseline cybersecurity controls to ensure a hardened system. The authors proposed a security-centered database architecture after auditing the researched organization's IT infrastructure and information systems.","internal_url":"https://www.academia.edu/69384214/East_African_Cybersecurity_Improving_Microfinance_Database_in_Ethiopia","translated_internal_url":"","created_at":"2022-01-24T15:34:19.042-08:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":82613518,"coauthors_can_edit":true,"document_type":"book","co_author_tags":[{"id":37542292,"work_id":69384214,"tagging_user_id":82613518,"tagged_user_id":412630,"co_author_invite_id":null,"email":"4***9@ufp.edu.pt","affiliation":"Illinois Institute of Technology","display_order":1,"name":"Maurice Dawson","title":"East African Cybersecurity: Improving Microfinance Database in Ethiopia"},{"id":37542293,"work_id":69384214,"tagging_user_id":82613518,"tagged_user_id":156316374,"co_author_invite_id":null,"email":"d***g@gmail.com","display_order":2,"name":"Damon Walker","title":"East African Cybersecurity: Improving Microfinance Database in Ethiopia"},{"id":37542294,"work_id":69384214,"tagging_user_id":82613518,"tagged_user_id":157067885,"co_author_invite_id":null,"email":"a***s@gmail.com","affiliation":"Capitol Technology University","display_order":3,"name":"Andreas Vassilakos","title":"East African Cybersecurity: Improving Microfinance Database in Ethiopia"},{"id":37542295,"work_id":69384214,"tagging_user_id":82613518,"tagged_user_id":193688822,"co_author_invite_id":null,"email":"h***y@hawk.iit.edu","display_order":4,"name":"Harshini Chellasamy","title":"East African Cybersecurity: Improving Microfinance Database in Ethiopia"},{"id":37542296,"work_id":69384214,"tagging_user_id":82613518,"tagged_user_id":null,"co_author_invite_id":7428564,"email":"t***r@gmail.com","display_order":5,"name":"Tenance Setor","title":"East African Cybersecurity: Improving Microfinance Database in Ethiopia"}],"downloadable_attachments":[{"id":79502805,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/79502805/thumbnails/1.jpg","file_name":"East_African_Cybersecurity_Improving_Microfinance_Database_in_Ethiopia.pdf","download_url":"https://www.academia.edu/attachments/79502805/download_file","bulk_download_file_name":"East_African_Cybersecurity_Improving_Mic.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/79502805/East_African_Cybersecurity_Improving_Microfinance_Database_in_Ethiopia-libre.pdf?1643070675=\u0026response-content-disposition=attachment%3B+filename%3DEast_African_Cybersecurity_Improving_Mic.pdf\u0026Expires=1743223499\u0026Signature=Pr8CwfMtR0mhgmB6Ztctozfz6IwqLEi5qODfxm91n58vIAPdq-oEIJiqU0YqdqXmiPKrcT3F143O3TNOOkHh8JEtdyBjaNWm0C6r1B~rSe9RysNF7rmxfdlTLVx-LlTCDJSMqpumYxa-QAXxqWTlyYKVAmGQp9B1ShFP80JOj7BSvemV0gpE3Sbpu4TYlEKn1FjjROqMMMdlDgtyy0jMeL2MOJXhVHc819EO5U2CccgfV40gSHGWNdt291c5SIHFthDTMlskBhlq9YMYCaLgec93kIwe7eFSIt3xAZgzhhUjKb9cBBGxapK1QB~hpWOvvnpSfnv3wsPU-k4PbIFwoA__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"slug":"East_African_Cybersecurity_Improving_Microfinance_Database_in_Ethiopia","translated_slug":"","page_count":14,"language":"en","content_type":"Work","summary":"ICT has become an essential factor in Ethiopia and other East African countries to transform their economies. Meanwhile, the agriculture sector is still the primary driver of economic development. The difference between the past and present years is the injection of technology to further drive this business. For Ethiopia, this means using a database to support countrywide micro-financing to farmers in seeking capital for leasing land, purchasing needed materials, and hiring workers. The objectives of this chapter were to redesign and harden the database architecture of the researched micro-financing organization. The researchers performed an assessment of the organization's information systems. After identifying weaknesses, they followed controls identified in the NIST SP 800-53. This chapter describes the security faults within the database, showing the lack of baseline cybersecurity controls to ensure a hardened system. The authors proposed a security-centered database architecture after auditing the researched organization's IT infrastructure and information systems.","owner":{"id":82613518,"first_name":"Maurice","middle_initials":null,"last_name":"Dawson","page_name":"MauriceDawson","domain_name":"iit","created_at":"2018-06-06T13:08:54.103-07:00","display_name":"Maurice Dawson","url":"https://iit.academia.edu/MauriceDawson"},"attachments":[{"id":79502805,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/79502805/thumbnails/1.jpg","file_name":"East_African_Cybersecurity_Improving_Microfinance_Database_in_Ethiopia.pdf","download_url":"https://www.academia.edu/attachments/79502805/download_file","bulk_download_file_name":"East_African_Cybersecurity_Improving_Mic.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/79502805/East_African_Cybersecurity_Improving_Microfinance_Database_in_Ethiopia-libre.pdf?1643070675=\u0026response-content-disposition=attachment%3B+filename%3DEast_African_Cybersecurity_Improving_Mic.pdf\u0026Expires=1743223499\u0026Signature=Pr8CwfMtR0mhgmB6Ztctozfz6IwqLEi5qODfxm91n58vIAPdq-oEIJiqU0YqdqXmiPKrcT3F143O3TNOOkHh8JEtdyBjaNWm0C6r1B~rSe9RysNF7rmxfdlTLVx-LlTCDJSMqpumYxa-QAXxqWTlyYKVAmGQp9B1ShFP80JOj7BSvemV0gpE3Sbpu4TYlEKn1FjjROqMMMdlDgtyy0jMeL2MOJXhVHc819EO5U2CccgfV40gSHGWNdt291c5SIHFthDTMlskBhlq9YMYCaLgec93kIwe7eFSIt3xAZgzhhUjKb9cBBGxapK1QB~hpWOvvnpSfnv3wsPU-k4PbIFwoA__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"research_interests":[{"id":379,"name":"African Studies","url":"https://www.academia.edu/Documents/in/African_Studies"},{"id":422,"name":"Computer Science","url":"https://www.academia.edu/Documents/in/Computer_Science"},{"id":491,"name":"Information Technology","url":"https://www.academia.edu/Documents/in/Information_Technology"},{"id":2015,"name":"Middle East Studies","url":"https://www.academia.edu/Documents/in/Middle_East_Studies"},{"id":9569,"name":"Saudi Arabia","url":"https://www.academia.edu/Documents/in/Saudi_Arabia"},{"id":21318,"name":"Nigeria","url":"https://www.academia.edu/Documents/in/Nigeria"},{"id":21361,"name":"Ethiopia","url":"https://www.academia.edu/Documents/in/Ethiopia"},{"id":61866,"name":"South Africa","url":"https://www.academia.edu/Documents/in/South_Africa"},{"id":115676,"name":"Cyber Security","url":"https://www.academia.edu/Documents/in/Cyber_Security"},{"id":126131,"name":"Egyptian Politics","url":"https://www.academia.edu/Documents/in/Egyptian_Politics"}],"urls":[]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") if (true) { Aedu.setUpFigureCarousel('profile-work-69384214-figures'); } }); </script> <div class="profile--tab_heading_container js-section-heading" data-section="Papers" id="Papers"><h3 class="profile--tab_heading_container">Papers by Maurice Dawson</h3></div><div class="js-work-strip profile--work_container" data-work-id="104772306"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/104772306/A_REVIEW_OF_ENHANCING_INTRUSION_DETECTION_SYSTEMS_FOR_CYBERSECURITY_USING_ARTIFICIAL_INTELLIGENCE_AI"><img alt="Research paper thumbnail of A REVIEW OF ENHANCING INTRUSION DETECTION SYSTEMS FOR CYBERSECURITY USING ARTIFICIAL INTELLIGENCE (AI" class="work-thumbnail" src="https://attachments.academia-assets.com/104411841/thumbnails/1.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/104772306/A_REVIEW_OF_ENHANCING_INTRUSION_DETECTION_SYSTEMS_FOR_CYBERSECURITY_USING_ARTIFICIAL_INTELLIGENCE_AI">A REVIEW OF ENHANCING INTRUSION DETECTION SYSTEMS FOR CYBERSECURITY USING ARTIFICIAL INTELLIGENCE (AI</a></div><div class="wp-workCard_item wp-workCard--coauthors"><span>by </span><span><a class="" data-click-track="profile-work-strip-authors" href="https://iit.academia.edu/MichalMarkevych">Michal Markevych</a> and <a class="" data-click-track="profile-work-strip-authors" href="https://iit.academia.edu/MauriceDawson">Maurice Dawson</a></span></div><div class="wp-workCard_item"><span>International conference KNOWLEDGE-BASED ORGANIZATION</span><span>, 2023</span></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">The escalating complexity of cyber attacks demands innovative intrusion detection systems (IDS) t...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">The escalating complexity of cyber attacks demands innovative intrusion detection systems (IDS) to safeguard critical assets and data. The study aims to explore the potential of Artificial Intelligence (AI) in enhancing the IDS&#39;s ability to identify and classify network traffic and detect anomalous behavior. The paper offers a concise overview of IDS and AI and examines the existing literature on the subject, highlighting the significance of integrating advanced language models for cybersecurity enhancement. The research outlines the methodology employed to assess the efficacy of AI within IDS. Furthermore, the study considers key performance metrics such as detection accuracy, false positive rate, and response time to ensure a comprehensive evaluation. Findings indicate that AI is a valuable asset in enhancing the accuracy of AI for detecting and responding to cyber attacks. Nonetheless, the study also brings to light certain limitations and challenges associated with incorporating AI into IDS, such as computational complexity and potential biases in training data. This research emphasizes the potential of advanced language models like ChatGPT in augmenting cybersecurity solutions and offers insights into overcoming associated challenges for a more robust and effective defense against sophisticated cyber attacks.</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><a id="0682e6ea6601df197b6ac8466234fff4" class="wp-workCard--action" rel="nofollow" data-click-track="profile-work-strip-download" data-download="{&quot;attachment_id&quot;:104411841,&quot;asset_id&quot;:104772306,&quot;asset_type&quot;:&quot;Work&quot;,&quot;button_location&quot;:&quot;profile&quot;}" href="https://www.academia.edu/attachments/104411841/download_file?s=profile"><span><i class="fa fa-arrow-down"></i></span><span>Download</span></a><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="104772306"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="104772306"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 104772306; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=104772306]").text(description); $(".js-view-count[data-work-id=104772306]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 104772306; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='104772306']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-a9bf3a2bc8c89fa2a77156577594264ee8a0f214d74241bc0fcd3f69f8d107ac.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (true){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "0682e6ea6601df197b6ac8466234fff4" } } $('.js-work-strip[data-work-id=104772306]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":104772306,"title":"A REVIEW OF ENHANCING INTRUSION DETECTION SYSTEMS FOR CYBERSECURITY USING ARTIFICIAL INTELLIGENCE (AI","translated_title":"","metadata":{"doi":"10.2478/kbo-2023-0072","abstract":"The escalating complexity of cyber attacks demands innovative intrusion detection systems (IDS) to safeguard critical assets and data. The study aims to explore the potential of Artificial Intelligence (AI) in enhancing the IDS's ability to identify and classify network traffic and detect anomalous behavior. The paper offers a concise overview of IDS and AI and examines the existing literature on the subject, highlighting the significance of integrating advanced language models for cybersecurity enhancement. The research outlines the methodology employed to assess the efficacy of AI within IDS. Furthermore, the study considers key performance metrics such as detection accuracy, false positive rate, and response time to ensure a comprehensive evaluation. Findings indicate that AI is a valuable asset in enhancing the accuracy of AI for detecting and responding to cyber attacks. Nonetheless, the study also brings to light certain limitations and challenges associated with incorporating AI into IDS, such as computational complexity and potential biases in training data. This research emphasizes the potential of advanced language models like ChatGPT in augmenting cybersecurity solutions and offers insights into overcoming associated challenges for a more robust and effective defense against sophisticated cyber attacks.","ai_title_tag":"Enhancing Cybersecurity Intrusion Detection with AI Techniques","publication_date":{"day":null,"month":null,"year":2023,"errors":{}},"publication_name":"International conference KNOWLEDGE-BASED ORGANIZATION"},"translated_abstract":"The escalating complexity of cyber attacks demands innovative intrusion detection systems (IDS) to safeguard critical assets and data. The study aims to explore the potential of Artificial Intelligence (AI) in enhancing the IDS's ability to identify and classify network traffic and detect anomalous behavior. The paper offers a concise overview of IDS and AI and examines the existing literature on the subject, highlighting the significance of integrating advanced language models for cybersecurity enhancement. The research outlines the methodology employed to assess the efficacy of AI within IDS. Furthermore, the study considers key performance metrics such as detection accuracy, false positive rate, and response time to ensure a comprehensive evaluation. Findings indicate that AI is a valuable asset in enhancing the accuracy of AI for detecting and responding to cyber attacks. Nonetheless, the study also brings to light certain limitations and challenges associated with incorporating AI into IDS, such as computational complexity and potential biases in training data. This research emphasizes the potential of advanced language models like ChatGPT in augmenting cybersecurity solutions and offers insights into overcoming associated challenges for a more robust and effective defense against sophisticated cyber attacks.","internal_url":"https://www.academia.edu/104772306/A_REVIEW_OF_ENHANCING_INTRUSION_DETECTION_SYSTEMS_FOR_CYBERSECURITY_USING_ARTIFICIAL_INTELLIGENCE_AI","translated_internal_url":"","created_at":"2023-07-20T15:10:02.296-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":82613518,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[{"id":40131222,"work_id":104772306,"tagging_user_id":82613518,"tagged_user_id":143913923,"co_author_invite_id":null,"email":"m***h@hawk.iit.edu","affiliation":"Illinois Institute of Technology","display_order":-2,"name":"Michal Markevych","title":"A REVIEW OF ENHANCING INTRUSION DETECTION SYSTEMS FOR CYBERSECURITY USING ARTIFICIAL INTELLIGENCE (AI"},{"id":40131223,"work_id":104772306,"tagging_user_id":82613518,"tagged_user_id":412630,"co_author_invite_id":null,"email":"4***9@ufp.edu.pt","affiliation":"Illinois Institute of Technology","display_order":-1,"name":"Maurice Dawson","title":"A REVIEW OF ENHANCING INTRUSION DETECTION SYSTEMS FOR CYBERSECURITY USING ARTIFICIAL INTELLIGENCE (AI"}],"downloadable_attachments":[{"id":104411841,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/104411841/thumbnails/1.jpg","file_name":"10.2478_kbo_2023_0072.pdf","download_url":"https://www.academia.edu/attachments/104411841/download_file","bulk_download_file_name":"A_REVIEW_OF_ENHANCING_INTRUSION_DETECTIO.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/104411841/10.2478_kbo_2023_0072-libre.pdf?1689891625=\u0026response-content-disposition=attachment%3B+filename%3DA_REVIEW_OF_ENHANCING_INTRUSION_DETECTIO.pdf\u0026Expires=1743223499\u0026Signature=QuncTUlSLt1AKk7rvn~VU-UIpxLO5yf5u3x1~514juyNNVhgfB1~SFWK-uN9uISuzzyQCihO3CbF-XIXtPRQfWTFDhuvzZu6rZc~TyX6ARsXFurREha0v7KQJCZeCzmILb~c06VO9LvGJBAGqdychmAVPfq124NJagZiCcfIO7lr~-RLTBFE9RNfTrWAux7Rw9KF~-eM9plQ2ADC26xbEDr6tnQfY~Ixg58~bNdp8mNfj1H~x5QGpA68~0VGUp7a3uewxhtmV2O3HH2mtkQSzZ5B69IOOne8MQiM0YNysKiDL7~7DE5bD7JpfLAGxgX77WxiRmaJcAdx8nyUzxkdlQ__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"slug":"A_REVIEW_OF_ENHANCING_INTRUSION_DETECTION_SYSTEMS_FOR_CYBERSECURITY_USING_ARTIFICIAL_INTELLIGENCE_AI","translated_slug":"","page_count":8,"language":"en","content_type":"Work","summary":"The escalating complexity of cyber attacks demands innovative intrusion detection systems (IDS) to safeguard critical assets and data. The study aims to explore the potential of Artificial Intelligence (AI) in enhancing the IDS's ability to identify and classify network traffic and detect anomalous behavior. The paper offers a concise overview of IDS and AI and examines the existing literature on the subject, highlighting the significance of integrating advanced language models for cybersecurity enhancement. The research outlines the methodology employed to assess the efficacy of AI within IDS. Furthermore, the study considers key performance metrics such as detection accuracy, false positive rate, and response time to ensure a comprehensive evaluation. Findings indicate that AI is a valuable asset in enhancing the accuracy of AI for detecting and responding to cyber attacks. Nonetheless, the study also brings to light certain limitations and challenges associated with incorporating AI into IDS, such as computational complexity and potential biases in training data. This research emphasizes the potential of advanced language models like ChatGPT in augmenting cybersecurity solutions and offers insights into overcoming associated challenges for a more robust and effective defense against sophisticated cyber attacks.","owner":{"id":82613518,"first_name":"Maurice","middle_initials":null,"last_name":"Dawson","page_name":"MauriceDawson","domain_name":"iit","created_at":"2018-06-06T13:08:54.103-07:00","display_name":"Maurice Dawson","url":"https://iit.academia.edu/MauriceDawson"},"attachments":[{"id":104411841,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/104411841/thumbnails/1.jpg","file_name":"10.2478_kbo_2023_0072.pdf","download_url":"https://www.academia.edu/attachments/104411841/download_file","bulk_download_file_name":"A_REVIEW_OF_ENHANCING_INTRUSION_DETECTIO.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/104411841/10.2478_kbo_2023_0072-libre.pdf?1689891625=\u0026response-content-disposition=attachment%3B+filename%3DA_REVIEW_OF_ENHANCING_INTRUSION_DETECTIO.pdf\u0026Expires=1743223499\u0026Signature=QuncTUlSLt1AKk7rvn~VU-UIpxLO5yf5u3x1~514juyNNVhgfB1~SFWK-uN9uISuzzyQCihO3CbF-XIXtPRQfWTFDhuvzZu6rZc~TyX6ARsXFurREha0v7KQJCZeCzmILb~c06VO9LvGJBAGqdychmAVPfq124NJagZiCcfIO7lr~-RLTBFE9RNfTrWAux7Rw9KF~-eM9plQ2ADC26xbEDr6tnQfY~Ixg58~bNdp8mNfj1H~x5QGpA68~0VGUp7a3uewxhtmV2O3HH2mtkQSzZ5B69IOOne8MQiM0YNysKiDL7~7DE5bD7JpfLAGxgX77WxiRmaJcAdx8nyUzxkdlQ__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"research_interests":[{"id":465,"name":"Artificial Intelligence","url":"https://www.academia.edu/Documents/in/Artificial_Intelligence"},{"id":2511,"name":"Cybercrimes","url":"https://www.academia.edu/Documents/in/Cybercrimes"},{"id":4252,"name":"Computer Networks","url":"https://www.academia.edu/Documents/in/Computer_Networks"},{"id":11336,"name":"Cyber Terrorism","url":"https://www.academia.edu/Documents/in/Cyber_Terrorism"},{"id":20594,"name":"Cyber crime","url":"https://www.academia.edu/Documents/in/Cyber_crime"},{"id":20641,"name":"Future of artificial intelligence","url":"https://www.academia.edu/Documents/in/Future_of_artificial_intelligence"},{"id":74262,"name":"Philosophy of Artificial Intelligence","url":"https://www.academia.edu/Documents/in/Philosophy_of_Artificial_Intelligence"},{"id":78800,"name":"IDS","url":"https://www.academia.edu/Documents/in/IDS"},{"id":115676,"name":"Cyber Security","url":"https://www.academia.edu/Documents/in/Cyber_Security"},{"id":119822,"name":"Intrusion Detection Systems (IDSs)","url":"https://www.academia.edu/Documents/in/Intrusion_Detection_Systems_IDSs_"},{"id":428536,"name":"Intrusion detection system (IDS)","url":"https://www.academia.edu/Documents/in/Intrusion_detection_system_IDS_"},{"id":685702,"name":"Intrusion Detection System in public Clouds - IDSaaS","url":"https://www.academia.edu/Documents/in/Intrusion_Detection_System_in_public_Clouds_-_IDSaaS"}],"urls":[]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") if (false) { Aedu.setUpFigureCarousel('profile-work-104772306-figures'); } }); </script> <div class="js-work-strip profile--work_container" data-work-id="104772302"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" rel="nofollow" href="https://www.academia.edu/104772302/Exploring_Holistic_Managerial_Thinking_to_Better_Manage_Healthcare_Cybersecurity"><img alt="Research paper thumbnail of Exploring Holistic Managerial Thinking to Better Manage Healthcare Cybersecurity" class="work-thumbnail" src="https://a.academia-assets.com/images/blank-paper.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title">Exploring Holistic Managerial Thinking to Better Manage Healthcare Cybersecurity</div><div class="wp-workCard_item"><span>International Journal of Health Systems and Translational Medicine</span></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">Healthcare systems in the United States have discovered the massive potential for digital technol...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">Healthcare systems in the United States have discovered the massive potential for digital technology to enhance clinical outcomes and change care delivery (Coventry &amp; Branley, 2018). Technologies range from telemedicine technology providing care remotely, storing electronic health records (EHRs), and devices that deliver medication or monitor health (Coventry &amp; Branley, 2018). There has been a 300% increase in cyberattacks in the healthcare industry (Janofsky, 2019). The increasing cost and threat to cybersecurity, especially amid a global pandemic, highlights organizations&amp;#39; immediate need to utilize system thinking to prevent continuous loss. This research discussion aims to use the literature&amp;#39;s contextual review to examine healthcare cybersecurity organizational behavior through systems thinking lens to explore a holistic managerial thinking to better manage healthcare cybersecurity.</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="104772302"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="104772302"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 104772302; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=104772302]").text(description); $(".js-view-count[data-work-id=104772302]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 104772302; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='104772302']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-a9bf3a2bc8c89fa2a77156577594264ee8a0f214d74241bc0fcd3f69f8d107ac.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (false){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "-1" } } $('.js-work-strip[data-work-id=104772302]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":104772302,"title":"Exploring Holistic Managerial Thinking to Better Manage Healthcare Cybersecurity","translated_title":"","metadata":{"abstract":"Healthcare systems in the United States have discovered the massive potential for digital technology to enhance clinical outcomes and change care delivery (Coventry \u0026 Branley, 2018). Technologies range from telemedicine technology providing care remotely, storing electronic health records (EHRs), and devices that deliver medication or monitor health (Coventry \u0026 Branley, 2018). There has been a 300% increase in cyberattacks in the healthcare industry (Janofsky, 2019). The increasing cost and threat to cybersecurity, especially amid a global pandemic, highlights organizations\u0026#39; immediate need to utilize system thinking to prevent continuous loss. This research discussion aims to use the literature\u0026#39;s contextual review to examine healthcare cybersecurity organizational behavior through systems thinking lens to explore a holistic managerial thinking to better manage healthcare cybersecurity.","publisher":"IGI Global","publication_name":"International Journal of Health Systems and Translational Medicine"},"translated_abstract":"Healthcare systems in the United States have discovered the massive potential for digital technology to enhance clinical outcomes and change care delivery (Coventry \u0026 Branley, 2018). Technologies range from telemedicine technology providing care remotely, storing electronic health records (EHRs), and devices that deliver medication or monitor health (Coventry \u0026 Branley, 2018). There has been a 300% increase in cyberattacks in the healthcare industry (Janofsky, 2019). The increasing cost and threat to cybersecurity, especially amid a global pandemic, highlights organizations\u0026#39; immediate need to utilize system thinking to prevent continuous loss. This research discussion aims to use the literature\u0026#39;s contextual review to examine healthcare cybersecurity organizational behavior through systems thinking lens to explore a holistic managerial thinking to better manage healthcare cybersecurity.","internal_url":"https://www.academia.edu/104772302/Exploring_Holistic_Managerial_Thinking_to_Better_Manage_Healthcare_Cybersecurity","translated_internal_url":"","created_at":"2023-07-20T15:09:36.607-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":82613518,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[],"slug":"Exploring_Holistic_Managerial_Thinking_to_Better_Manage_Healthcare_Cybersecurity","translated_slug":"","page_count":null,"language":"en","content_type":"Work","summary":"Healthcare systems in the United States have discovered the massive potential for digital technology to enhance clinical outcomes and change care delivery (Coventry \u0026 Branley, 2018). Technologies range from telemedicine technology providing care remotely, storing electronic health records (EHRs), and devices that deliver medication or monitor health (Coventry \u0026 Branley, 2018). There has been a 300% increase in cyberattacks in the healthcare industry (Janofsky, 2019). The increasing cost and threat to cybersecurity, especially amid a global pandemic, highlights organizations\u0026#39; immediate need to utilize system thinking to prevent continuous loss. This research discussion aims to use the literature\u0026#39;s contextual review to examine healthcare cybersecurity organizational behavior through systems thinking lens to explore a holistic managerial thinking to better manage healthcare cybersecurity.","owner":{"id":82613518,"first_name":"Maurice","middle_initials":null,"last_name":"Dawson","page_name":"MauriceDawson","domain_name":"iit","created_at":"2018-06-06T13:08:54.103-07:00","display_name":"Maurice Dawson","url":"https://iit.academia.edu/MauriceDawson"},"attachments":[],"research_interests":[{"id":26,"name":"Business","url":"https://www.academia.edu/Documents/in/Business"},{"id":4441,"name":"Health Care","url":"https://www.academia.edu/Documents/in/Health_Care"}],"urls":[{"id":32994822,"url":"https://www.igi-global.com/viewtitle.aspx?TitleId=300337"}]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") if (false) { Aedu.setUpFigureCarousel('profile-work-104772302-figures'); } }); </script> <div class="js-work-strip profile--work_container" data-work-id="104772301"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" rel="nofollow" href="https://www.academia.edu/104772301/Battlefield_Cyberspace"><img alt="Research paper thumbnail of Battlefield Cyberspace" class="work-thumbnail" src="https://a.academia-assets.com/images/blank-paper.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title">Battlefield Cyberspace</div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="104772301"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="104772301"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 104772301; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=104772301]").text(description); $(".js-view-count[data-work-id=104772301]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 104772301; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='104772301']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-a9bf3a2bc8c89fa2a77156577594264ee8a0f214d74241bc0fcd3f69f8d107ac.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (false){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "-1" } } $('.js-work-strip[data-work-id=104772301]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":104772301,"title":"Battlefield Cyberspace","translated_title":"","metadata":{"publisher":"IGI Global"},"translated_abstract":null,"internal_url":"https://www.academia.edu/104772301/Battlefield_Cyberspace","translated_internal_url":"","created_at":"2023-07-20T15:09:36.480-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":82613518,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[],"slug":"Battlefield_Cyberspace","translated_slug":"","page_count":null,"language":"fr","content_type":"Work","summary":null,"owner":{"id":82613518,"first_name":"Maurice","middle_initials":null,"last_name":"Dawson","page_name":"MauriceDawson","domain_name":"iit","created_at":"2018-06-06T13:08:54.103-07:00","display_name":"Maurice Dawson","url":"https://iit.academia.edu/MauriceDawson"},"attachments":[],"research_interests":[{"id":13923,"name":"Computer Security","url":"https://www.academia.edu/Documents/in/Computer_Security"},{"id":30945,"name":"Cyberspace","url":"https://www.academia.edu/Documents/in/Cyberspace"},{"id":406126,"name":"Internet privacy","url":"https://www.academia.edu/Documents/in/Internet_privacy"}],"urls":[]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") if (false) { Aedu.setUpFigureCarousel('profile-work-104772301-figures'); } }); </script> <div class="js-work-strip profile--work_container" data-work-id="104772300"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" rel="nofollow" href="https://www.academia.edu/104772300/Unprepared_for_Cybersecurity_in_Saudi_Arabia_Argument_for_a_Shift_Towards_Cyber_Readiness"><img alt="Research paper thumbnail of Unprepared for Cybersecurity in Saudi Arabia: Argument for a Shift Towards Cyber Readiness" class="work-thumbnail" src="https://a.academia-assets.com/images/blank-paper.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title">Unprepared for Cybersecurity in Saudi Arabia: Argument for a Shift Towards Cyber Readiness</div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="104772300"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="104772300"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 104772300; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=104772300]").text(description); $(".js-view-count[data-work-id=104772300]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 104772300; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='104772300']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-a9bf3a2bc8c89fa2a77156577594264ee8a0f214d74241bc0fcd3f69f8d107ac.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (false){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "-1" } } $('.js-work-strip[data-work-id=104772300]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":104772300,"title":"Unprepared for Cybersecurity in Saudi Arabia: Argument for a Shift Towards Cyber Readiness","translated_title":"","metadata":{"publication_date":{"day":null,"month":null,"year":2019,"errors":{}}},"translated_abstract":null,"internal_url":"https://www.academia.edu/104772300/Unprepared_for_Cybersecurity_in_Saudi_Arabia_Argument_for_a_Shift_Towards_Cyber_Readiness","translated_internal_url":"","created_at":"2023-07-20T15:09:36.373-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":82613518,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[],"slug":"Unprepared_for_Cybersecurity_in_Saudi_Arabia_Argument_for_a_Shift_Towards_Cyber_Readiness","translated_slug":"","page_count":null,"language":"en","content_type":"Work","summary":null,"owner":{"id":82613518,"first_name":"Maurice","middle_initials":null,"last_name":"Dawson","page_name":"MauriceDawson","domain_name":"iit","created_at":"2018-06-06T13:08:54.103-07:00","display_name":"Maurice Dawson","url":"https://iit.academia.edu/MauriceDawson"},"attachments":[],"research_interests":[{"id":4486,"name":"Political Science","url":"https://www.academia.edu/Documents/in/Political_Science"},{"id":13923,"name":"Computer Security","url":"https://www.academia.edu/Documents/in/Computer_Security"}],"urls":[]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") if (false) { Aedu.setUpFigureCarousel('profile-work-104772300-figures'); } }); </script> <div class="js-work-strip profile--work_container" data-work-id="87348859"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/87348859/Framework_for_the_Development_of_Virtual_Labs_for_Industrial_Internet_of_Things_and_Hyperconnected_Systems"><img alt="Research paper thumbnail of Framework for the Development of Virtual Labs for Industrial Internet of Things and Hyperconnected Systems" class="work-thumbnail" src="https://attachments.academia-assets.com/91583139/thumbnails/1.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/87348859/Framework_for_the_Development_of_Virtual_Labs_for_Industrial_Internet_of_Things_and_Hyperconnected_Systems">Framework for the Development of Virtual Labs for Industrial Internet of Things and Hyperconnected Systems</a></div><div class="wp-workCard_item"><span>2019 IEEE Learning With MOOCS (LWMOOCS)</span></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">The purpose of this paper is to provide a framework that allows for the development of a virtual ...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">The purpose of this paper is to provide a framework that allows for the development of a virtual lab that incorporates emerging technologies such as the Industrial Internet of Things and embedded systems while incorporating open source components. The global shortage of talent is a significant concern as organizations continue to embrace and roll out new technologies such as 5G, and Artificial Intelligence. Several countries such as those in developing countries face issues regarding technology use in the classroom. Thus, to provide a learning environment where cybersecurity and information systems concepts can be taught in an exploratory environment.</span></div><div class="wp-workCard_item"><div class="carousel-container carousel-container--sm" id="profile-work-87348859-figures"><div class="prev-slide-container js-prev-button-container"><button aria-label="Previous" class="carousel-navigation-button js-profile-work-87348859-figures-prev"><span class="material-symbols-outlined" style="font-size: 24px" translate="no">arrow_back_ios</span></button></div><div class="slides-container js-slides-container"><figure class="figure-slide-container"><a href="https://www.academia.edu/figures/53562196/figure-1-damage-the-virtual-lab-uses-significant-amount-of"><img alt="damage. The virtual lab uses a significant amount of Open Source Software (OSS) to alleviate costs and allow students to grasps concepts such as review engineering the source code to harden or break. " class="figure-slide-image" src="https://figures.academia-assets.com/91583139/figure_001.jpg" /></a></figure><figure class="figure-slide-container"><a href="https://www.academia.edu/figures/53562205/figure-2-school-of-applied-technology-cybersecurity-lab-the"><img alt="Fig. 2 School of Applied Technology Cybersecurity Lab The system diagram of the School of Applied Technology Cybersecurity Lab (SAT-CL) is shown in Figure 2. Students can access the virtual lab from several computing devices using a remote desktop client. Once students have been authenticated, they are provided a Kali Linux Virtual Machine (VM) from where they can gain access to many systems beyond a router/Domain Name System (DNS) server. The system is scalable, in which it allows for additional components such as servers or images of IoT devices to be added or removed. " class="figure-slide-image" src="https://figures.academia-assets.com/91583139/figure_002.jpg" /></a></figure><figure class="figure-slide-container"><a href="https://www.academia.edu/figures/53562212/figure-3-oracle-virtualbox-networked-environment-in-the"><img alt="Fig. 3Oracle VirtualBox Networked Environment In Fig. 3, the current implementation is shown that runs on any desktop or laptop. The issue with this former implementation is that it depends solely on the end user’s computing environment, such as the Central Processing Unit (CPU), memory, and hard disk space. However, the applications such as the Kali VM and vulnerable web server in Fig. 3 are all found in Fig. 2, which is an expansion of the virtual environment with an ability to manage the complexity of the network. This provides flexibility in what concepts can be taught according to specific laws and guidelines for a particular mission. " class="figure-slide-image" src="https://figures.academia-assets.com/91583139/figure_003.jpg" /></a></figure></div><div class="next-slide-container js-next-button-container"><button aria-label="Next" class="carousel-navigation-button js-profile-work-87348859-figures-next"><span class="material-symbols-outlined" style="font-size: 24px" translate="no">arrow_forward_ios</span></button></div></div></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><a id="511560fd65b3ec9f4714cf965aa14b5d" class="wp-workCard--action" rel="nofollow" data-click-track="profile-work-strip-download" data-download="{&quot;attachment_id&quot;:91583139,&quot;asset_id&quot;:87348859,&quot;asset_type&quot;:&quot;Work&quot;,&quot;button_location&quot;:&quot;profile&quot;}" href="https://www.academia.edu/attachments/91583139/download_file?s=profile"><span><i class="fa fa-arrow-down"></i></span><span>Download</span></a><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="87348859"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="87348859"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 87348859; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=87348859]").text(description); $(".js-view-count[data-work-id=87348859]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 87348859; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='87348859']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-a9bf3a2bc8c89fa2a77156577594264ee8a0f214d74241bc0fcd3f69f8d107ac.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (true){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "511560fd65b3ec9f4714cf965aa14b5d" } } $('.js-work-strip[data-work-id=87348859]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":87348859,"title":"Framework for the Development of Virtual Labs for Industrial Internet of Things and Hyperconnected Systems","translated_title":"","metadata":{"publisher":"IEEE","grobid_abstract":"The purpose of this paper is to provide a framework that allows for the development of a virtual lab that incorporates emerging technologies such as the Industrial Internet of Things and embedded systems while incorporating open source components. The global shortage of talent is a significant concern as organizations continue to embrace and roll out new technologies such as 5G, and Artificial Intelligence. Several countries such as those in developing countries face issues regarding technology use in the classroom. Thus, to provide a learning environment where cybersecurity and information systems concepts can be taught in an exploratory environment.","publication_name":"2019 IEEE Learning With MOOCS (LWMOOCS)","grobid_abstract_attachment_id":91583139},"translated_abstract":null,"internal_url":"https://www.academia.edu/87348859/Framework_for_the_Development_of_Virtual_Labs_for_Industrial_Internet_of_Things_and_Hyperconnected_Systems","translated_internal_url":"","created_at":"2022-09-26T07:42:09.898-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":82613518,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[{"id":91583139,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/91583139/thumbnails/1.jpg","file_name":"download.pdf","download_url":"https://www.academia.edu/attachments/91583139/download_file","bulk_download_file_name":"Framework_for_the_Development_of_Virtual.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/91583139/download-libre.pdf?1664203567=\u0026response-content-disposition=attachment%3B+filename%3DFramework_for_the_Development_of_Virtual.pdf\u0026Expires=1743223499\u0026Signature=g8YnQT45gbsmjCFlqCMg~95x2Oi9znZx6CYIYXe8MynI5AJtwLzSFxTBwTmGs7G6vsQ2-Ye0PNu14yX9cjHc5XPD0iu0yPeKbfVJhbEsOqaAyF6auSuCPHPy44x~UpyM4P6VhCR4Y0mXseMCX02vRvypVNfH6kD5E~m1KEw4ziQXUdKeHszoI5SFtssNLKse3GvzWbzBXSh30YccjuJlFqbIhL-wFN4OXcdtUQurZwYhqapyd9fiwgcgNtvxdm3jUUzCxzwvYysJJMv4fOzpYlrin2Nrob-77NZvVgZVIJVg0Nv8~b6BvH0owyv~1pQkebhOQqOkE0E0bSlBJjU7DQ__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"slug":"Framework_for_the_Development_of_Virtual_Labs_for_Industrial_Internet_of_Things_and_Hyperconnected_Systems","translated_slug":"","page_count":4,"language":"en","content_type":"Work","summary":"The purpose of this paper is to provide a framework that allows for the development of a virtual lab that incorporates emerging technologies such as the Industrial Internet of Things and embedded systems while incorporating open source components. The global shortage of talent is a significant concern as organizations continue to embrace and roll out new technologies such as 5G, and Artificial Intelligence. Several countries such as those in developing countries face issues regarding technology use in the classroom. Thus, to provide a learning environment where cybersecurity and information systems concepts can be taught in an exploratory environment.","owner":{"id":82613518,"first_name":"Maurice","middle_initials":null,"last_name":"Dawson","page_name":"MauriceDawson","domain_name":"iit","created_at":"2018-06-06T13:08:54.103-07:00","display_name":"Maurice Dawson","url":"https://iit.academia.edu/MauriceDawson"},"attachments":[{"id":91583139,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/91583139/thumbnails/1.jpg","file_name":"download.pdf","download_url":"https://www.academia.edu/attachments/91583139/download_file","bulk_download_file_name":"Framework_for_the_Development_of_Virtual.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/91583139/download-libre.pdf?1664203567=\u0026response-content-disposition=attachment%3B+filename%3DFramework_for_the_Development_of_Virtual.pdf\u0026Expires=1743223499\u0026Signature=g8YnQT45gbsmjCFlqCMg~95x2Oi9znZx6CYIYXe8MynI5AJtwLzSFxTBwTmGs7G6vsQ2-Ye0PNu14yX9cjHc5XPD0iu0yPeKbfVJhbEsOqaAyF6auSuCPHPy44x~UpyM4P6VhCR4Y0mXseMCX02vRvypVNfH6kD5E~m1KEw4ziQXUdKeHszoI5SFtssNLKse3GvzWbzBXSh30YccjuJlFqbIhL-wFN4OXcdtUQurZwYhqapyd9fiwgcgNtvxdm3jUUzCxzwvYysJJMv4fOzpYlrin2Nrob-77NZvVgZVIJVg0Nv8~b6BvH0owyv~1pQkebhOQqOkE0E0bSlBJjU7DQ__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"research_interests":[{"id":422,"name":"Computer Science","url":"https://www.academia.edu/Documents/in/Computer_Science"}],"urls":[{"id":24197620,"url":"http://xplorestaging.ieee.org/ielx7/8932638/8939567/08939660.pdf?arnumber=8939660"}]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") if (true) { Aedu.setUpFigureCarousel('profile-work-87348859-figures'); } }); </script> <div class="js-work-strip profile--work_container" data-work-id="87348855"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" rel="nofollow" href="https://www.academia.edu/87348855/Cyber_warfare_threats_and_opportunities"><img alt="Research paper thumbnail of Cyber warfare: threats and opportunities" class="work-thumbnail" src="https://a.academia-assets.com/images/blank-paper.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title">Cyber warfare: threats and opportunities</div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">Relatório apresentado à Universidade Fernando Pessoa como parte dos requisitos para obtenção do t...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">Relatório apresentado à Universidade Fernando Pessoa como parte dos requisitos para obtenção do título de pós-doutoramento em Ciências da InformaçãoCybersecurity has gone through several changes that have presented new challenges in recent years, complicated by the rise of cybercrime and digital warfare. With the introduction of militarizing the space domain, it has become apparent that we must consider multidomain concepts. Thus, the threat landscape has again shifted, and defenders must become knowledgeable about how the cyber domain crosses into maritime, land, air, and space. The traditional thinking of protecting enterprise systems locked away in a building is no longer. Thus, we have the emergence of cyber warfare and cyber as a fifth domain that brings together maritime, land, space, and air. These domains are not just for the military but the civilian sector as well. Understanding the role of cyber and how it can be used to take advantage or secure the remaining domains will...</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="87348855"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="87348855"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 87348855; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=87348855]").text(description); $(".js-view-count[data-work-id=87348855]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 87348855; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='87348855']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-a9bf3a2bc8c89fa2a77156577594264ee8a0f214d74241bc0fcd3f69f8d107ac.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (false){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "-1" } } $('.js-work-strip[data-work-id=87348855]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":87348855,"title":"Cyber warfare: threats and opportunities","translated_title":"","metadata":{"abstract":"Relatório apresentado à Universidade Fernando Pessoa como parte dos requisitos para obtenção do título de pós-doutoramento em Ciências da InformaçãoCybersecurity has gone through several changes that have presented new challenges in recent years, complicated by the rise of cybercrime and digital warfare. With the introduction of militarizing the space domain, it has become apparent that we must consider multidomain concepts. Thus, the threat landscape has again shifted, and defenders must become knowledgeable about how the cyber domain crosses into maritime, land, air, and space. The traditional thinking of protecting enterprise systems locked away in a building is no longer. Thus, we have the emergence of cyber warfare and cyber as a fifth domain that brings together maritime, land, space, and air. These domains are not just for the military but the civilian sector as well. Understanding the role of cyber and how it can be used to take advantage or secure the remaining domains will...","publisher":"[s.n.]","publication_date":{"day":null,"month":null,"year":2021,"errors":{}}},"translated_abstract":"Relatório apresentado à Universidade Fernando Pessoa como parte dos requisitos para obtenção do título de pós-doutoramento em Ciências da InformaçãoCybersecurity has gone through several changes that have presented new challenges in recent years, complicated by the rise of cybercrime and digital warfare. With the introduction of militarizing the space domain, it has become apparent that we must consider multidomain concepts. Thus, the threat landscape has again shifted, and defenders must become knowledgeable about how the cyber domain crosses into maritime, land, air, and space. The traditional thinking of protecting enterprise systems locked away in a building is no longer. Thus, we have the emergence of cyber warfare and cyber as a fifth domain that brings together maritime, land, space, and air. These domains are not just for the military but the civilian sector as well. Understanding the role of cyber and how it can be used to take advantage or secure the remaining domains will...","internal_url":"https://www.academia.edu/87348855/Cyber_warfare_threats_and_opportunities","translated_internal_url":"","created_at":"2022-09-26T07:42:03.969-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":82613518,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[],"slug":"Cyber_warfare_threats_and_opportunities","translated_slug":"","page_count":null,"language":"en","content_type":"Work","summary":"Relatório apresentado à Universidade Fernando Pessoa como parte dos requisitos para obtenção do título de pós-doutoramento em Ciências da InformaçãoCybersecurity has gone through several changes that have presented new challenges in recent years, complicated by the rise of cybercrime and digital warfare. With the introduction of militarizing the space domain, it has become apparent that we must consider multidomain concepts. Thus, the threat landscape has again shifted, and defenders must become knowledgeable about how the cyber domain crosses into maritime, land, air, and space. The traditional thinking of protecting enterprise systems locked away in a building is no longer. Thus, we have the emergence of cyber warfare and cyber as a fifth domain that brings together maritime, land, space, and air. These domains are not just for the military but the civilian sector as well. Understanding the role of cyber and how it can be used to take advantage or secure the remaining domains will...","owner":{"id":82613518,"first_name":"Maurice","middle_initials":null,"last_name":"Dawson","page_name":"MauriceDawson","domain_name":"iit","created_at":"2018-06-06T13:08:54.103-07:00","display_name":"Maurice Dawson","url":"https://iit.academia.edu/MauriceDawson"},"attachments":[],"research_interests":[{"id":422,"name":"Computer Science","url":"https://www.academia.edu/Documents/in/Computer_Science"},{"id":465,"name":"Artificial Intelligence","url":"https://www.academia.edu/Documents/in/Artificial_Intelligence"},{"id":6369,"name":"Human Trafficking","url":"https://www.academia.edu/Documents/in/Human_Trafficking"},{"id":11337,"name":"Cyber Warfare","url":"https://www.academia.edu/Documents/in/Cyber_Warfare"},{"id":12061,"name":"Risk Management","url":"https://www.academia.edu/Documents/in/Risk_Management"},{"id":46738,"name":"Cybersecurity","url":"https://www.academia.edu/Documents/in/Cybersecurity"},{"id":89751,"name":"Cybercrime","url":"https://www.academia.edu/Documents/in/Cybercrime"},{"id":115676,"name":"Cyber Security","url":"https://www.academia.edu/Documents/in/Cyber_Security"},{"id":134575,"name":"Dark Web","url":"https://www.academia.edu/Documents/in/Dark_Web"},{"id":159919,"name":"Disinformation","url":"https://www.academia.edu/Documents/in/Disinformation"},{"id":161403,"name":"Workforce","url":"https://www.academia.edu/Documents/in/Workforce"},{"id":740091,"name":"Cryptocurrency","url":"https://www.academia.edu/Documents/in/Cryptocurrency"},{"id":1572643,"name":"Strategy military science","url":"https://www.academia.edu/Documents/in/Strategy_military_science"}],"urls":[{"id":24197617,"url":"http://hdl.handle.net/10284/9678"}]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") if (false) { Aedu.setUpFigureCarousel('profile-work-87348855-figures'); } }); </script> <div class="js-work-strip profile--work_container" data-work-id="87348848"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" rel="nofollow" href="https://www.academia.edu/87348848/Strengthening_University_Computing_Programs_to_Meet_National_Security_Needs"><img alt="Research paper thumbnail of Strengthening University Computing Programs to Meet National Security Needs" class="work-thumbnail" src="https://a.academia-assets.com/images/blank-paper.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title">Strengthening University Computing Programs to Meet National Security Needs</div><div class="wp-workCard_item"><span>2021 World Engineering Education Forum/Global Engineering Deans Council (WEEF/GEDC)</span><span>, 2021</span></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">In the wake of a pandemic, it has been essential that programs move online quickly while remainin...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">In the wake of a pandemic, it has been essential that programs move online quickly while remaining the same academic rigor as being on the ground. Therefore the cybersecurity coursework and labs were taught entirely online while representing real-world scenarios. The College of Computing at Illinois Institute of Technology has recently been actively creating new partnerships, strengthening their cybersecurity, Information Technology, and other computing programs to meet national security needs. These activities have allowed partnerships with the United States Armed Services, Department of Defense, and numerous industry partners. The newly found focus on national security has provided a different perspective on cybersecurity-related to global events and how it can shape those currently, such as political events.</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="87348848"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="87348848"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 87348848; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=87348848]").text(description); $(".js-view-count[data-work-id=87348848]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 87348848; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='87348848']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-a9bf3a2bc8c89fa2a77156577594264ee8a0f214d74241bc0fcd3f69f8d107ac.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (false){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "-1" } } $('.js-work-strip[data-work-id=87348848]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":87348848,"title":"Strengthening University Computing Programs to Meet National Security Needs","translated_title":"","metadata":{"abstract":"In the wake of a pandemic, it has been essential that programs move online quickly while remaining the same academic rigor as being on the ground. Therefore the cybersecurity coursework and labs were taught entirely online while representing real-world scenarios. The College of Computing at Illinois Institute of Technology has recently been actively creating new partnerships, strengthening their cybersecurity, Information Technology, and other computing programs to meet national security needs. These activities have allowed partnerships with the United States Armed Services, Department of Defense, and numerous industry partners. The newly found focus on national security has provided a different perspective on cybersecurity-related to global events and how it can shape those currently, such as political events.","publisher":"IEEE","publication_date":{"day":null,"month":null,"year":2021,"errors":{}},"publication_name":"2021 World Engineering Education Forum/Global Engineering Deans Council (WEEF/GEDC)"},"translated_abstract":"In the wake of a pandemic, it has been essential that programs move online quickly while remaining the same academic rigor as being on the ground. Therefore the cybersecurity coursework and labs were taught entirely online while representing real-world scenarios. The College of Computing at Illinois Institute of Technology has recently been actively creating new partnerships, strengthening their cybersecurity, Information Technology, and other computing programs to meet national security needs. These activities have allowed partnerships with the United States Armed Services, Department of Defense, and numerous industry partners. The newly found focus on national security has provided a different perspective on cybersecurity-related to global events and how it can shape those currently, such as political events.","internal_url":"https://www.academia.edu/87348848/Strengthening_University_Computing_Programs_to_Meet_National_Security_Needs","translated_internal_url":"","created_at":"2022-09-26T07:41:59.454-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":82613518,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[],"slug":"Strengthening_University_Computing_Programs_to_Meet_National_Security_Needs","translated_slug":"","page_count":null,"language":"en","content_type":"Work","summary":"In the wake of a pandemic, it has been essential that programs move online quickly while remaining the same academic rigor as being on the ground. Therefore the cybersecurity coursework and labs were taught entirely online while representing real-world scenarios. The College of Computing at Illinois Institute of Technology has recently been actively creating new partnerships, strengthening their cybersecurity, Information Technology, and other computing programs to meet national security needs. These activities have allowed partnerships with the United States Armed Services, Department of Defense, and numerous industry partners. The newly found focus on national security has provided a different perspective on cybersecurity-related to global events and how it can shape those currently, such as political events.","owner":{"id":82613518,"first_name":"Maurice","middle_initials":null,"last_name":"Dawson","page_name":"MauriceDawson","domain_name":"iit","created_at":"2018-06-06T13:08:54.103-07:00","display_name":"Maurice Dawson","url":"https://iit.academia.edu/MauriceDawson"},"attachments":[],"research_interests":[{"id":37,"name":"Information Systems","url":"https://www.academia.edu/Documents/in/Information_Systems"},{"id":48,"name":"Engineering","url":"https://www.academia.edu/Documents/in/Engineering"},{"id":422,"name":"Computer Science","url":"https://www.academia.edu/Documents/in/Computer_Science"},{"id":491,"name":"Information Technology","url":"https://www.academia.edu/Documents/in/Information_Technology"},{"id":887,"name":"Teaching and Learning","url":"https://www.academia.edu/Documents/in/Teaching_and_Learning"},{"id":115676,"name":"Cyber Security","url":"https://www.academia.edu/Documents/in/Cyber_Security"},{"id":1198660,"name":"E Learning","url":"https://www.academia.edu/Documents/in/E_Learning-14"}],"urls":[{"id":24197613,"url":"http://xplorestaging.ieee.org/ielx7/9657196/9657159/09657325.pdf?arnumber=9657325"}]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") if (false) { Aedu.setUpFigureCarousel('profile-work-87348848-figures'); } }); </script> <div class="js-work-strip profile--work_container" data-work-id="87348840"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/87348840/Cybercrime_Internet_Driven_Illicit_Activities_and_Behavior"><img alt="Research paper thumbnail of Cybercrime: Internet Driven Illicit Activities and Behavior" class="work-thumbnail" src="https://attachments.academia-assets.com/91583130/thumbnails/1.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/87348840/Cybercrime_Internet_Driven_Illicit_Activities_and_Behavior">Cybercrime: Internet Driven Illicit Activities and Behavior</a></div><div class="wp-workCard_item"><span>Land Forces Academy Review</span><span>, 2020</span></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">Cybercrime affects multiple areas of society with nefarious activities ranging from human traffic...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">Cybercrime affects multiple areas of society with nefarious activities ranging from human trafficking to illegal arms sale. The Internet has allowed some nefarious activities to be revived as others have emerged in this new age. In turn, this has become a national security issue for countries as this requires resources to combat this evolving threat. These activities include undermining legitimate services that provide government services to its citizens, such as passport, national identification, tax services, and more. This paper introduces some of these activities, enabling readers to understand this digital criminal world further.</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><a id="2c7b844961a7b423c2bf0477695e7bda" class="wp-workCard--action" rel="nofollow" data-click-track="profile-work-strip-download" data-download="{&quot;attachment_id&quot;:91583130,&quot;asset_id&quot;:87348840,&quot;asset_type&quot;:&quot;Work&quot;,&quot;button_location&quot;:&quot;profile&quot;}" href="https://www.academia.edu/attachments/91583130/download_file?s=profile"><span><i class="fa fa-arrow-down"></i></span><span>Download</span></a><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="87348840"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="87348840"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 87348840; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=87348840]").text(description); $(".js-view-count[data-work-id=87348840]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 87348840; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='87348840']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-a9bf3a2bc8c89fa2a77156577594264ee8a0f214d74241bc0fcd3f69f8d107ac.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (true){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "2c7b844961a7b423c2bf0477695e7bda" } } $('.js-work-strip[data-work-id=87348840]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":87348840,"title":"Cybercrime: Internet Driven Illicit Activities and Behavior","translated_title":"","metadata":{"abstract":"Cybercrime affects multiple areas of society with nefarious activities ranging from human trafficking to illegal arms sale. The Internet has allowed some nefarious activities to be revived as others have emerged in this new age. In turn, this has become a national security issue for countries as this requires resources to combat this evolving threat. These activities include undermining legitimate services that provide government services to its citizens, such as passport, national identification, tax services, and more. This paper introduces some of these activities, enabling readers to understand this digital criminal world further.","publisher":"Walter de Gruyter GmbH","ai_title_tag":"Cybercrime: New Threats in the Digital Age","publication_date":{"day":null,"month":null,"year":2020,"errors":{}},"publication_name":"Land Forces Academy Review"},"translated_abstract":"Cybercrime affects multiple areas of society with nefarious activities ranging from human trafficking to illegal arms sale. The Internet has allowed some nefarious activities to be revived as others have emerged in this new age. In turn, this has become a national security issue for countries as this requires resources to combat this evolving threat. These activities include undermining legitimate services that provide government services to its citizens, such as passport, national identification, tax services, and more. This paper introduces some of these activities, enabling readers to understand this digital criminal world further.","internal_url":"https://www.academia.edu/87348840/Cybercrime_Internet_Driven_Illicit_Activities_and_Behavior","translated_internal_url":"","created_at":"2022-09-26T07:41:54.902-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":82613518,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[{"id":91583130,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/91583130/thumbnails/1.jpg","file_name":"raft-2020-0043.pdf","download_url":"https://www.academia.edu/attachments/91583130/download_file","bulk_download_file_name":"Cybercrime_Internet_Driven_Illicit_Activ.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/91583130/raft-2020-0043-libre.pdf?1664203446=\u0026response-content-disposition=attachment%3B+filename%3DCybercrime_Internet_Driven_Illicit_Activ.pdf\u0026Expires=1743223500\u0026Signature=S1~iYMMfzVzAPRI8-e6gHlBQDN5ss-AyqRXrCEYDOpfQcL91aVshdi69M7JBO3IXfaNhKJZ4G6Oc91j-X4OKMWdGVeYhPVGicLrcbJSdtaelR95AEcu1-Po0ggxXa7P~YYzuU-V2OcryPGL-eXh6~bdeGHdfuhrXRVFR8Tae1slO4VaIqwspIw3ys-ij6h-YOM~HqOXTq4zEo9ti-ys3sxRI0o2Hyr5kt3UhJQ3k8wzJV7Tjzo7PbR8OUbJydDYLtiLeRwajkMSivmWCiKw1OcRiEnU7XrCINsQ74PC~RW0Hfu3hVUDgygiBfvWmg94qmWJJ9NQVd~Vm4qPhQrH~7w__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"slug":"Cybercrime_Internet_Driven_Illicit_Activities_and_Behavior","translated_slug":"","page_count":7,"language":"en","content_type":"Work","summary":"Cybercrime affects multiple areas of society with nefarious activities ranging from human trafficking to illegal arms sale. The Internet has allowed some nefarious activities to be revived as others have emerged in this new age. In turn, this has become a national security issue for countries as this requires resources to combat this evolving threat. These activities include undermining legitimate services that provide government services to its citizens, such as passport, national identification, tax services, and more. This paper introduces some of these activities, enabling readers to understand this digital criminal world further.","owner":{"id":82613518,"first_name":"Maurice","middle_initials":null,"last_name":"Dawson","page_name":"MauriceDawson","domain_name":"iit","created_at":"2018-06-06T13:08:54.103-07:00","display_name":"Maurice Dawson","url":"https://iit.academia.edu/MauriceDawson"},"attachments":[{"id":91583130,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/91583130/thumbnails/1.jpg","file_name":"raft-2020-0043.pdf","download_url":"https://www.academia.edu/attachments/91583130/download_file","bulk_download_file_name":"Cybercrime_Internet_Driven_Illicit_Activ.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/91583130/raft-2020-0043-libre.pdf?1664203446=\u0026response-content-disposition=attachment%3B+filename%3DCybercrime_Internet_Driven_Illicit_Activ.pdf\u0026Expires=1743223500\u0026Signature=S1~iYMMfzVzAPRI8-e6gHlBQDN5ss-AyqRXrCEYDOpfQcL91aVshdi69M7JBO3IXfaNhKJZ4G6Oc91j-X4OKMWdGVeYhPVGicLrcbJSdtaelR95AEcu1-Po0ggxXa7P~YYzuU-V2OcryPGL-eXh6~bdeGHdfuhrXRVFR8Tae1slO4VaIqwspIw3ys-ij6h-YOM~HqOXTq4zEo9ti-ys3sxRI0o2Hyr5kt3UhJQ3k8wzJV7Tjzo7PbR8OUbJydDYLtiLeRwajkMSivmWCiKw1OcRiEnU7XrCINsQ74PC~RW0Hfu3hVUDgygiBfvWmg94qmWJJ9NQVd~Vm4qPhQrH~7w__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"research_interests":[],"urls":[{"id":24197608,"url":"https://content.sciendo.com/view/journals/raft/25/4/article-p356.xml"}]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") if (false) { Aedu.setUpFigureCarousel('profile-work-87348840-figures'); } }); </script> <div class="js-work-strip profile--work_container" data-work-id="87348830"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/87348830/Information_Technology_Use_in_West_African_Agriculture_challenges_and_opportunities_a_panel_discussion"><img alt="Research paper thumbnail of Information Technology Use in West African Agriculture – challenges and opportunities: a panel discussion" class="work-thumbnail" src="https://attachments.academia-assets.com/91583122/thumbnails/1.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/87348830/Information_Technology_Use_in_West_African_Agriculture_challenges_and_opportunities_a_panel_discussion">Information Technology Use in West African Agriculture – challenges and opportunities: a panel discussion</a></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">Many countries in the Economic Community of West African States (ECOWAS) are using Information Co...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">Many countries in the Economic Community of West African States (ECOWAS) are using Information Communications Technology (ICT) to enhance agriculture development and production. To do this efficiently the John Ogonowski and Doug Bereuter Farmer-to-Farmer Program managed for West Africa by Winrock International has been tasked with providing volunteer assignments to ministries of agriculture. The University of Missouri Saint Louis (UMSL) has entered a partnership with Winrock International to offer upper-level undergraduate and graduate students the opportunity to provide technical assistance to international government entities. In this panel; we discuss findings and opportunities for improvement in Guinea and Senegal as they relate to ICT discovered through the onsite support provided.</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><a id="23120ababe4a3931d807a87ce3d9aab7" class="wp-workCard--action" rel="nofollow" data-click-track="profile-work-strip-download" data-download="{&quot;attachment_id&quot;:91583122,&quot;asset_id&quot;:87348830,&quot;asset_type&quot;:&quot;Work&quot;,&quot;button_location&quot;:&quot;profile&quot;}" href="https://www.academia.edu/attachments/91583122/download_file?s=profile"><span><i class="fa fa-arrow-down"></i></span><span>Download</span></a><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="87348830"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="87348830"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 87348830; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=87348830]").text(description); $(".js-view-count[data-work-id=87348830]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 87348830; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='87348830']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-a9bf3a2bc8c89fa2a77156577594264ee8a0f214d74241bc0fcd3f69f8d107ac.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (true){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "23120ababe4a3931d807a87ce3d9aab7" } } $('.js-work-strip[data-work-id=87348830]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":87348830,"title":"Information Technology Use in West African Agriculture – challenges and opportunities: a panel discussion","translated_title":"","metadata":{"abstract":"Many countries in the Economic Community of West African States (ECOWAS) are using Information Communications Technology (ICT) to enhance agriculture development and production. To do this efficiently the John Ogonowski and Doug Bereuter Farmer-to-Farmer Program managed for West Africa by Winrock International has been tasked with providing volunteer assignments to ministries of agriculture. The University of Missouri Saint Louis (UMSL) has entered a partnership with Winrock International to offer upper-level undergraduate and graduate students the opportunity to provide technical assistance to international government entities. In this panel; we discuss findings and opportunities for improvement in Guinea and Senegal as they relate to ICT discovered through the onsite support provided.","publication_date":{"day":null,"month":null,"year":2018,"errors":{}}},"translated_abstract":"Many countries in the Economic Community of West African States (ECOWAS) are using Information Communications Technology (ICT) to enhance agriculture development and production. To do this efficiently the John Ogonowski and Doug Bereuter Farmer-to-Farmer Program managed for West Africa by Winrock International has been tasked with providing volunteer assignments to ministries of agriculture. The University of Missouri Saint Louis (UMSL) has entered a partnership with Winrock International to offer upper-level undergraduate and graduate students the opportunity to provide technical assistance to international government entities. In this panel; we discuss findings and opportunities for improvement in Guinea and Senegal as they relate to ICT discovered through the onsite support provided.","internal_url":"https://www.academia.edu/87348830/Information_Technology_Use_in_West_African_Agriculture_challenges_and_opportunities_a_panel_discussion","translated_internal_url":"","created_at":"2022-09-26T07:41:49.515-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":82613518,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[{"id":91583122,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/91583122/thumbnails/1.jpg","file_name":"301374966.pdf","download_url":"https://www.academia.edu/attachments/91583122/download_file","bulk_download_file_name":"Information_Technology_Use_in_West_Afric.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/91583122/301374966-libre.pdf?1664203439=\u0026response-content-disposition=attachment%3B+filename%3DInformation_Technology_Use_in_West_Afric.pdf\u0026Expires=1743223500\u0026Signature=VwtqguUBg2IVdDtRQyoh9ibNO06Aby1Hm3-Ai7RlkhZYUArD4dvojR23bBDO-XGe3QkI0wYRY~4k77EiZ~ME1R248BUUkFAwIN5luSAgV0hNBRHGoP5KdFtRL6akMf9p1bnRQfJtgAg5c4z7jBDkoKyf-NjvsW3xGyXhlZ2oM062K6kTwETMsZ8T0HT9XpIUINGk4a~glxwhsTeHdXTmNl5kUS8Tu7IvyMN4x3KbYFRnuMmlnyG5r6O7G63ri~nwfvE-TQA7N0KxuoixRxbJMECcdU~fHucpLGyNzjw3Ls7ojCAmhXWNt6iDonNehAkGsIbuJA0RInB1~GJb76ApHw__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"slug":"Information_Technology_Use_in_West_African_Agriculture_challenges_and_opportunities_a_panel_discussion","translated_slug":"","page_count":3,"language":"en","content_type":"Work","summary":"Many countries in the Economic Community of West African States (ECOWAS) are using Information Communications Technology (ICT) to enhance agriculture development and production. To do this efficiently the John Ogonowski and Doug Bereuter Farmer-to-Farmer Program managed for West Africa by Winrock International has been tasked with providing volunteer assignments to ministries of agriculture. The University of Missouri Saint Louis (UMSL) has entered a partnership with Winrock International to offer upper-level undergraduate and graduate students the opportunity to provide technical assistance to international government entities. In this panel; we discuss findings and opportunities for improvement in Guinea and Senegal as they relate to ICT discovered through the onsite support provided.","owner":{"id":82613518,"first_name":"Maurice","middle_initials":null,"last_name":"Dawson","page_name":"MauriceDawson","domain_name":"iit","created_at":"2018-06-06T13:08:54.103-07:00","display_name":"Maurice Dawson","url":"https://iit.academia.edu/MauriceDawson"},"attachments":[{"id":91583122,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/91583122/thumbnails/1.jpg","file_name":"301374966.pdf","download_url":"https://www.academia.edu/attachments/91583122/download_file","bulk_download_file_name":"Information_Technology_Use_in_West_Afric.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/91583122/301374966-libre.pdf?1664203439=\u0026response-content-disposition=attachment%3B+filename%3DInformation_Technology_Use_in_West_Afric.pdf\u0026Expires=1743223500\u0026Signature=VwtqguUBg2IVdDtRQyoh9ibNO06Aby1Hm3-Ai7RlkhZYUArD4dvojR23bBDO-XGe3QkI0wYRY~4k77EiZ~ME1R248BUUkFAwIN5luSAgV0hNBRHGoP5KdFtRL6akMf9p1bnRQfJtgAg5c4z7jBDkoKyf-NjvsW3xGyXhlZ2oM062K6kTwETMsZ8T0HT9XpIUINGk4a~glxwhsTeHdXTmNl5kUS8Tu7IvyMN4x3KbYFRnuMmlnyG5r6O7G63ri~nwfvE-TQA7N0KxuoixRxbJMECcdU~fHucpLGyNzjw3Ls7ojCAmhXWNt6iDonNehAkGsIbuJA0RInB1~GJb76ApHw__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"research_interests":[{"id":10225,"name":"Agriculture","url":"https://www.academia.edu/Documents/in/Agriculture"},{"id":255627,"name":"Information Communications Technology","url":"https://www.academia.edu/Documents/in/Information_Communications_Technology"}],"urls":[{"id":24197602,"url":"https://aisel.aisnet.org/cgi/viewcontent.cgi?article=1056\u0026context=mwais2018"}]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") if (false) { Aedu.setUpFigureCarousel('profile-work-87348830-figures'); } }); </script> <div class="js-work-strip profile--work_container" data-work-id="87348825"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" rel="nofollow" href="https://www.academia.edu/87348825/Affordable_Mobile_Data_Collection_Platform_and_IT_Training_in_Benin_Analysis_of_Performance_and_Usability"><img alt="Research paper thumbnail of Affordable Mobile Data Collection Platform and IT Training in Benin: Analysis of Performance and Usability" class="work-thumbnail" src="https://a.academia-assets.com/images/blank-paper.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title">Affordable Mobile Data Collection Platform and IT Training in Benin: Analysis of Performance and Usability</div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">This paper provides insights on performance and usability from an assignment funded by the Cathol...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">This paper provides insights on performance and usability from an assignment funded by the Catholic Relief Service Farmer-to-Farmer Program, which provides technical assistance with volunteers from the United States to farmers, agricultural institutions, and government organizations involved in the agricultural sector. The assignment required an affordable mobile data collection solution and IT training in Benin. The researchers developed a platform and provided technical training on-site. This investigation looks at conclusions based on the interpretation of the system usability scale (SUS) results from a representation of 13 cooperators. The research demonstrated the efficiency of the mobile data collection platform, and the training proved to be helpful for the participants. Before the contributions of the researchers, 46.2% of the participants scored at the D level or below. Once training was complete, 76.9% of the participants scored in the range of the B or higher.</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="87348825"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="87348825"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 87348825; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=87348825]").text(description); $(".js-view-count[data-work-id=87348825]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 87348825; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='87348825']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-a9bf3a2bc8c89fa2a77156577594264ee8a0f214d74241bc0fcd3f69f8d107ac.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (false){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "-1" } } $('.js-work-strip[data-work-id=87348825]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":87348825,"title":"Affordable Mobile Data Collection Platform and IT Training in Benin: Analysis of Performance and Usability","translated_title":"","metadata":{"abstract":"This paper provides insights on performance and usability from an assignment funded by the Catholic Relief Service Farmer-to-Farmer Program, which provides technical assistance with volunteers from the United States to farmers, agricultural institutions, and government organizations involved in the agricultural sector. The assignment required an affordable mobile data collection solution and IT training in Benin. The researchers developed a platform and provided technical training on-site. This investigation looks at conclusions based on the interpretation of the system usability scale (SUS) results from a representation of 13 cooperators. The research demonstrated the efficiency of the mobile data collection platform, and the training proved to be helpful for the participants. Before the contributions of the researchers, 46.2% of the participants scored at the D level or below. Once training was complete, 76.9% of the participants scored in the range of the B or higher.","publication_date":{"day":null,"month":null,"year":2020,"errors":{}}},"translated_abstract":"This paper provides insights on performance and usability from an assignment funded by the Catholic Relief Service Farmer-to-Farmer Program, which provides technical assistance with volunteers from the United States to farmers, agricultural institutions, and government organizations involved in the agricultural sector. The assignment required an affordable mobile data collection solution and IT training in Benin. The researchers developed a platform and provided technical training on-site. This investigation looks at conclusions based on the interpretation of the system usability scale (SUS) results from a representation of 13 cooperators. The research demonstrated the efficiency of the mobile data collection platform, and the training proved to be helpful for the participants. Before the contributions of the researchers, 46.2% of the participants scored at the D level or below. Once training was complete, 76.9% of the participants scored in the range of the B or higher.","internal_url":"https://www.academia.edu/87348825/Affordable_Mobile_Data_Collection_Platform_and_IT_Training_in_Benin_Analysis_of_Performance_and_Usability","translated_internal_url":"","created_at":"2022-09-26T07:41:46.091-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":82613518,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[],"slug":"Affordable_Mobile_Data_Collection_Platform_and_IT_Training_in_Benin_Analysis_of_Performance_and_Usability","translated_slug":"","page_count":null,"language":"en","content_type":"Work","summary":"This paper provides insights on performance and usability from an assignment funded by the Catholic Relief Service Farmer-to-Farmer Program, which provides technical assistance with volunteers from the United States to farmers, agricultural institutions, and government organizations involved in the agricultural sector. The assignment required an affordable mobile data collection solution and IT training in Benin. The researchers developed a platform and provided technical training on-site. This investigation looks at conclusions based on the interpretation of the system usability scale (SUS) results from a representation of 13 cooperators. The research demonstrated the efficiency of the mobile data collection platform, and the training proved to be helpful for the participants. Before the contributions of the researchers, 46.2% of the participants scored at the D level or below. Once training was complete, 76.9% of the participants scored in the range of the B or higher.","owner":{"id":82613518,"first_name":"Maurice","middle_initials":null,"last_name":"Dawson","page_name":"MauriceDawson","domain_name":"iit","created_at":"2018-06-06T13:08:54.103-07:00","display_name":"Maurice Dawson","url":"https://iit.academia.edu/MauriceDawson"},"attachments":[],"research_interests":[{"id":422,"name":"Computer Science","url":"https://www.academia.edu/Documents/in/Computer_Science"},{"id":1615,"name":"Usability","url":"https://www.academia.edu/Documents/in/Usability"}],"urls":[]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") if (false) { Aedu.setUpFigureCarousel('profile-work-87348825-figures'); } }); </script> <div class="js-work-strip profile--work_container" data-work-id="87348816"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" rel="nofollow" href="https://www.academia.edu/87348816/Cyber_Security_Architectural_Needs_in_the_Era_of_Internet_of_Things_and_Hyperconnected_Systems"><img alt="Research paper thumbnail of Cyber Security Architectural Needs in the Era of Internet of Things and Hyperconnected Systems" class="work-thumbnail" src="https://a.academia-assets.com/images/blank-paper.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title">Cyber Security Architectural Needs in the Era of Internet of Things and Hyperconnected Systems</div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">The Internet of Things describes a world in which smart technologies enable objects with a networ...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">The Internet of Things describes a world in which smart technologies enable objects with a network to communicate with each other and interface with humans effortlessly. This connected world of convenience and technology does not come without its drawbacks, as interconnectivity implies hackability. This new world of convenience calls for revolutionary protection strategies to reassess security. Risk management concepts and Information Assurance architecture similar to those practiced in the United States Department of Defense should be used as guidelines for cyber security implementation. This new emerging market that is facilitating the exchange of services and goods requires understanding the associated laws for the implementation of an IoT architecture (Weber, 2010).</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="87348816"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="87348816"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 87348816; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=87348816]").text(description); $(".js-view-count[data-work-id=87348816]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 87348816; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='87348816']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-a9bf3a2bc8c89fa2a77156577594264ee8a0f214d74241bc0fcd3f69f8d107ac.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (false){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "-1" } } $('.js-work-strip[data-work-id=87348816]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":87348816,"title":"Cyber Security Architectural Needs in the Era of Internet of Things and Hyperconnected Systems","translated_title":"","metadata":{"abstract":"The Internet of Things describes a world in which smart technologies enable objects with a network to communicate with each other and interface with humans effortlessly. This connected world of convenience and technology does not come without its drawbacks, as interconnectivity implies hackability. This new world of convenience calls for revolutionary protection strategies to reassess security. Risk management concepts and Information Assurance architecture similar to those practiced in the United States Department of Defense should be used as guidelines for cyber security implementation. This new emerging market that is facilitating the exchange of services and goods requires understanding the associated laws for the implementation of an IoT architecture (Weber, 2010).","publication_date":{"day":null,"month":null,"year":2017,"errors":{}}},"translated_abstract":"The Internet of Things describes a world in which smart technologies enable objects with a network to communicate with each other and interface with humans effortlessly. This connected world of convenience and technology does not come without its drawbacks, as interconnectivity implies hackability. This new world of convenience calls for revolutionary protection strategies to reassess security. Risk management concepts and Information Assurance architecture similar to those practiced in the United States Department of Defense should be used as guidelines for cyber security implementation. This new emerging market that is facilitating the exchange of services and goods requires understanding the associated laws for the implementation of an IoT architecture (Weber, 2010).","internal_url":"https://www.academia.edu/87348816/Cyber_Security_Architectural_Needs_in_the_Era_of_Internet_of_Things_and_Hyperconnected_Systems","translated_internal_url":"","created_at":"2022-09-26T07:41:40.550-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":82613518,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[],"slug":"Cyber_Security_Architectural_Needs_in_the_Era_of_Internet_of_Things_and_Hyperconnected_Systems","translated_slug":"","page_count":null,"language":"en","content_type":"Work","summary":"The Internet of Things describes a world in which smart technologies enable objects with a network to communicate with each other and interface with humans effortlessly. This connected world of convenience and technology does not come without its drawbacks, as interconnectivity implies hackability. This new world of convenience calls for revolutionary protection strategies to reassess security. Risk management concepts and Information Assurance architecture similar to those practiced in the United States Department of Defense should be used as guidelines for cyber security implementation. This new emerging market that is facilitating the exchange of services and goods requires understanding the associated laws for the implementation of an IoT architecture (Weber, 2010).","owner":{"id":82613518,"first_name":"Maurice","middle_initials":null,"last_name":"Dawson","page_name":"MauriceDawson","domain_name":"iit","created_at":"2018-06-06T13:08:54.103-07:00","display_name":"Maurice Dawson","url":"https://iit.academia.edu/MauriceDawson"},"attachments":[],"research_interests":[{"id":37,"name":"Information Systems","url":"https://www.academia.edu/Documents/in/Information_Systems"},{"id":422,"name":"Computer Science","url":"https://www.academia.edu/Documents/in/Computer_Science"},{"id":491,"name":"Information Technology","url":"https://www.academia.edu/Documents/in/Information_Technology"},{"id":923,"name":"Technology","url":"https://www.academia.edu/Documents/in/Technology"},{"id":1380,"name":"Computer Engineering","url":"https://www.academia.edu/Documents/in/Computer_Engineering"},{"id":3703,"name":"Network Security","url":"https://www.academia.edu/Documents/in/Network_Security"},{"id":4252,"name":"Computer Networks","url":"https://www.academia.edu/Documents/in/Computer_Networks"},{"id":9135,"name":"The Internet of Things","url":"https://www.academia.edu/Documents/in/The_Internet_of_Things"},{"id":14725,"name":"Internet of Things","url":"https://www.academia.edu/Documents/in/Internet_of_Things"},{"id":30947,"name":"The Internet","url":"https://www.academia.edu/Documents/in/The_Internet"},{"id":115676,"name":"Cyber Security","url":"https://www.academia.edu/Documents/in/Cyber_Security"},{"id":4071813,"name":"Internet Society","url":"https://www.academia.edu/Documents/in/Internet_Society"}],"urls":[{"id":24197593,"url":"https://works.bepress.com/maurice_dawson/53/download/"}]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") if (false) { Aedu.setUpFigureCarousel('profile-work-87348816-figures'); } }); </script> <div class="js-work-strip profile--work_container" data-work-id="87348813"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/87348813/Towards_Crime_Prevention_Using_Big_Data_Analytics_A_Literature_Review_with_an_Explorative_Case_Study"><img alt="Research paper thumbnail of Towards Crime Prevention Using Big Data Analytics: A Literature Review with an Explorative Case Study" class="work-thumbnail" src="https://attachments.academia-assets.com/91583112/thumbnails/1.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/87348813/Towards_Crime_Prevention_Using_Big_Data_Analytics_A_Literature_Review_with_an_Explorative_Case_Study">Towards Crime Prevention Using Big Data Analytics: A Literature Review with an Explorative Case Study</a></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">Since the popularization of the big data concept, it has been implemented in various areas. Conte...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">Since the popularization of the big data concept, it has been implemented in various areas. Contemporary literature has proved the potential of using big data in crime prevention. In this research paper, we examine research on big data being used in Crime Prevention while implementing an author-centric to a concept-centric research approach. We also present the foundation for future research by analyzing data derived from the City of Chicago. We identified the neighborhoods in Chicago that are statistically more prone to crimes and used data of the last 10 years to make our observations. We additionally provide further discussion points for future research purpose.</span></div><div class="wp-workCard_item"><div class="carousel-container carousel-container--sm" id="profile-work-87348813-figures"><div class="prev-slide-container js-prev-button-container"><button aria-label="Previous" class="carousel-navigation-button js-profile-work-87348813-figures-prev"><span class="material-symbols-outlined" style="font-size: 24px" translate="no">arrow_back_ios</span></button></div><div class="slides-container js-slides-container"><figure class="figure-slide-container"><a href="https://www.academia.edu/figures/53108294/figure-1-crime-rate-density-in-chicago-il"><img alt="Figure 1. Crime Rate Density in Chicago, IL " class="figure-slide-image" src="https://figures.academia-assets.com/91583112/figure_001.jpg" /></a></figure><figure class="figure-slide-container"><a href="https://www.academia.edu/figures/53108299/figure-2-primary-crime-type-from-to-in-chicago-il-the-crime"><img alt="Figure 2. Primary Crime Type from 2008 to 2018 in Chicago, IL The crime rate in Chicago from 2008 to 2018 decrease significantly. In 2008 the total number of crime observations we 427,053. The number went down to 264,028 in 2015. Since 2015 it is almost stable ending up by 265,650 in 2018. Figure presents the number of observations per primary crime type by year from 2008 to 2018. " class="figure-slide-image" src="https://figures.academia-assets.com/91583112/figure_002.jpg" /></a></figure><figure class="figure-slide-container"><a href="https://www.academia.edu/figures/53108309/table-1-concept-matrix-of-the-literature-review"><img alt="Table 1. Concept Matrix of the Literature Review " class="figure-slide-image" src="https://figures.academia-assets.com/91583112/table_001.jpg" /></a></figure></div><div class="next-slide-container js-next-button-container"><button aria-label="Next" class="carousel-navigation-button js-profile-work-87348813-figures-next"><span class="material-symbols-outlined" style="font-size: 24px" translate="no">arrow_forward_ios</span></button></div></div></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><a id="fce184aa5f61ec99fb2666ec05a68bd6" class="wp-workCard--action" rel="nofollow" data-click-track="profile-work-strip-download" data-download="{&quot;attachment_id&quot;:91583112,&quot;asset_id&quot;:87348813,&quot;asset_type&quot;:&quot;Work&quot;,&quot;button_location&quot;:&quot;profile&quot;}" href="https://www.academia.edu/attachments/91583112/download_file?s=profile"><span><i class="fa fa-arrow-down"></i></span><span>Download</span></a><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="87348813"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="87348813"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 87348813; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=87348813]").text(description); $(".js-view-count[data-work-id=87348813]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 87348813; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='87348813']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-a9bf3a2bc8c89fa2a77156577594264ee8a0f214d74241bc0fcd3f69f8d107ac.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (true){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "fce184aa5f61ec99fb2666ec05a68bd6" } } $('.js-work-strip[data-work-id=87348813]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":87348813,"title":"Towards Crime Prevention Using Big Data Analytics: A Literature Review with an Explorative Case Study","translated_title":"","metadata":{"abstract":"Since the popularization of the big data concept, it has been implemented in various areas. Contemporary literature has proved the potential of using big data in crime prevention. In this research paper, we examine research on big data being used in Crime Prevention while implementing an author-centric to a concept-centric research approach. We also present the foundation for future research by analyzing data derived from the City of Chicago. We identified the neighborhoods in Chicago that are statistically more prone to crimes and used data of the last 10 years to make our observations. We additionally provide further discussion points for future research purpose.","publication_date":{"day":null,"month":null,"year":2019,"errors":{}}},"translated_abstract":"Since the popularization of the big data concept, it has been implemented in various areas. Contemporary literature has proved the potential of using big data in crime prevention. In this research paper, we examine research on big data being used in Crime Prevention while implementing an author-centric to a concept-centric research approach. We also present the foundation for future research by analyzing data derived from the City of Chicago. We identified the neighborhoods in Chicago that are statistically more prone to crimes and used data of the last 10 years to make our observations. We additionally provide further discussion points for future research purpose.","internal_url":"https://www.academia.edu/87348813/Towards_Crime_Prevention_Using_Big_Data_Analytics_A_Literature_Review_with_an_Explorative_Case_Study","translated_internal_url":"","created_at":"2022-09-26T07:41:35.003-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":82613518,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[{"id":91583112,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/91583112/thumbnails/1.jpg","file_name":"301379711.pdf","download_url":"https://www.academia.edu/attachments/91583112/download_file","bulk_download_file_name":"Towards_Crime_Prevention_Using_Big_Data.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/91583112/301379711-libre.pdf?1664203458=\u0026response-content-disposition=attachment%3B+filename%3DTowards_Crime_Prevention_Using_Big_Data.pdf\u0026Expires=1743223500\u0026Signature=IgIQGEDfz8QuIJ1FOueofmpGjxhmXzjmMUbtPutYhV78EwoqJw4O1bAX03YldU6NpmNu3JeE4uabgHP2B1IEdwcNMgZLpBG82ea2idgAIzDvX3ffWzj6-f4~ZlmySOkcegyjD~NdRjNHUOAYUVlB-2FRDNyTMNEyRqV0mJ9MCdlnKK1mbkFFwdgMkD53RIbj8EiVQ0WRO5BiP2Ucj8QuMRlekU3G-7lIHZ9OvuBdBtHojBKdWZnY7nFxtbdt53NeLTC93DiikxbT4k8RQ6asl-s7IOYXMaA5IMAEhDj9FZ2hstSzKDarj4hQg47PQv2yaaG-UGGwEgeveqWros3n9A__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"slug":"Towards_Crime_Prevention_Using_Big_Data_Analytics_A_Literature_Review_with_an_Explorative_Case_Study","translated_slug":"","page_count":7,"language":"en","content_type":"Work","summary":"Since the popularization of the big data concept, it has been implemented in various areas. Contemporary literature has proved the potential of using big data in crime prevention. In this research paper, we examine research on big data being used in Crime Prevention while implementing an author-centric to a concept-centric research approach. We also present the foundation for future research by analyzing data derived from the City of Chicago. We identified the neighborhoods in Chicago that are statistically more prone to crimes and used data of the last 10 years to make our observations. We additionally provide further discussion points for future research purpose.","owner":{"id":82613518,"first_name":"Maurice","middle_initials":null,"last_name":"Dawson","page_name":"MauriceDawson","domain_name":"iit","created_at":"2018-06-06T13:08:54.103-07:00","display_name":"Maurice Dawson","url":"https://iit.academia.edu/MauriceDawson"},"attachments":[{"id":91583112,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/91583112/thumbnails/1.jpg","file_name":"301379711.pdf","download_url":"https://www.academia.edu/attachments/91583112/download_file","bulk_download_file_name":"Towards_Crime_Prevention_Using_Big_Data.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/91583112/301379711-libre.pdf?1664203458=\u0026response-content-disposition=attachment%3B+filename%3DTowards_Crime_Prevention_Using_Big_Data.pdf\u0026Expires=1743223500\u0026Signature=IgIQGEDfz8QuIJ1FOueofmpGjxhmXzjmMUbtPutYhV78EwoqJw4O1bAX03YldU6NpmNu3JeE4uabgHP2B1IEdwcNMgZLpBG82ea2idgAIzDvX3ffWzj6-f4~ZlmySOkcegyjD~NdRjNHUOAYUVlB-2FRDNyTMNEyRqV0mJ9MCdlnKK1mbkFFwdgMkD53RIbj8EiVQ0WRO5BiP2Ucj8QuMRlekU3G-7lIHZ9OvuBdBtHojBKdWZnY7nFxtbdt53NeLTC93DiikxbT4k8RQ6asl-s7IOYXMaA5IMAEhDj9FZ2hstSzKDarj4hQg47PQv2yaaG-UGGwEgeveqWros3n9A__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"research_interests":[{"id":184,"name":"Sociology","url":"https://www.academia.edu/Documents/in/Sociology"},{"id":492,"name":"Management Information Systems","url":"https://www.academia.edu/Documents/in/Management_Information_Systems"},{"id":27240,"name":"Prevention","url":"https://www.academia.edu/Documents/in/Prevention"},{"id":44293,"name":"Literature Review","url":"https://www.academia.edu/Documents/in/Literature_Review"},{"id":44687,"name":"Analytics","url":"https://www.academia.edu/Documents/in/Analytics"},{"id":67360,"name":"Crime","url":"https://www.academia.edu/Documents/in/Crime"},{"id":69100,"name":"Data Science","url":"https://www.academia.edu/Documents/in/Data_Science"},{"id":96047,"name":"Case Study","url":"https://www.academia.edu/Documents/in/Case_Study"},{"id":126300,"name":"Big Data","url":"https://www.academia.edu/Documents/in/Big_Data"},{"id":289278,"name":"Big Data Analytics","url":"https://www.academia.edu/Documents/in/Big_Data_Analytics"}],"urls":[{"id":24197589,"url":"https://aisel.aisnet.org/cgi/viewcontent.cgi?article=1023\u0026context=mwais2019"}]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") if (true) { Aedu.setUpFigureCarousel('profile-work-87348813-figures'); } }); </script> <div class="js-work-strip profile--work_container" data-work-id="87348807"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/87348807/Understanding_the_Challenge_of_Cybersecurity_in_Critical_Infrastructure_Sectors"><img alt="Research paper thumbnail of Understanding the Challenge of Cybersecurity in Critical Infrastructure Sectors" class="work-thumbnail" src="https://attachments.academia-assets.com/91583107/thumbnails/1.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/87348807/Understanding_the_Challenge_of_Cybersecurity_in_Critical_Infrastructure_Sectors">Understanding the Challenge of Cybersecurity in Critical Infrastructure Sectors</a></div><div class="wp-workCard_item"><span>Land Forces Academy Review</span><span>, 2021</span></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">The cybersecurity of critical infrastructures is an essential topic within national and internati...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">The cybersecurity of critical infrastructures is an essential topic within national and international security as 16 critical infrastructure sectors touch various aspects of American society. Because the failure to provide adequate cybersecurity controls within the critical infrastructure sectors renders the country open to an attack that could have a debilitating effect on security, national public health, safety, and economic security, this matter is so vital that there is the Presidential Policy Directive (PPD) 21 Critical Infrastructure Security and Resilience advances a national policy to strengthen and maintain secure, functioning and resilient critical infrastructure. An organization identified as the Cybersecurity and Infrastructure Security Agency (CISA) at the Department of Homeland Security (DHS) has the mission to be the risk advisor for the United States (US). Other organizations, such as the National Security Agency (NSA), have approved a specific Knowledge Unit (KU) t...</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><a id="44d9d0a491aa5610cdf0b30481bd7e23" class="wp-workCard--action" rel="nofollow" data-click-track="profile-work-strip-download" data-download="{&quot;attachment_id&quot;:91583107,&quot;asset_id&quot;:87348807,&quot;asset_type&quot;:&quot;Work&quot;,&quot;button_location&quot;:&quot;profile&quot;}" href="https://www.academia.edu/attachments/91583107/download_file?s=profile"><span><i class="fa fa-arrow-down"></i></span><span>Download</span></a><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="87348807"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="87348807"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 87348807; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=87348807]").text(description); $(".js-view-count[data-work-id=87348807]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 87348807; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='87348807']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-a9bf3a2bc8c89fa2a77156577594264ee8a0f214d74241bc0fcd3f69f8d107ac.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (true){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "44d9d0a491aa5610cdf0b30481bd7e23" } } $('.js-work-strip[data-work-id=87348807]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":87348807,"title":"Understanding the Challenge of Cybersecurity in Critical Infrastructure Sectors","translated_title":"","metadata":{"abstract":"The cybersecurity of critical infrastructures is an essential topic within national and international security as 16 critical infrastructure sectors touch various aspects of American society. Because the failure to provide adequate cybersecurity controls within the critical infrastructure sectors renders the country open to an attack that could have a debilitating effect on security, national public health, safety, and economic security, this matter is so vital that there is the Presidential Policy Directive (PPD) 21 Critical Infrastructure Security and Resilience advances a national policy to strengthen and maintain secure, functioning and resilient critical infrastructure. An organization identified as the Cybersecurity and Infrastructure Security Agency (CISA) at the Department of Homeland Security (DHS) has the mission to be the risk advisor for the United States (US). Other organizations, such as the National Security Agency (NSA), have approved a specific Knowledge Unit (KU) t...","publisher":"Walter de Gruyter GmbH","publication_date":{"day":null,"month":null,"year":2021,"errors":{}},"publication_name":"Land Forces Academy Review"},"translated_abstract":"The cybersecurity of critical infrastructures is an essential topic within national and international security as 16 critical infrastructure sectors touch various aspects of American society. Because the failure to provide adequate cybersecurity controls within the critical infrastructure sectors renders the country open to an attack that could have a debilitating effect on security, national public health, safety, and economic security, this matter is so vital that there is the Presidential Policy Directive (PPD) 21 Critical Infrastructure Security and Resilience advances a national policy to strengthen and maintain secure, functioning and resilient critical infrastructure. An organization identified as the Cybersecurity and Infrastructure Security Agency (CISA) at the Department of Homeland Security (DHS) has the mission to be the risk advisor for the United States (US). Other organizations, such as the National Security Agency (NSA), have approved a specific Knowledge Unit (KU) t...","internal_url":"https://www.academia.edu/87348807/Understanding_the_Challenge_of_Cybersecurity_in_Critical_Infrastructure_Sectors","translated_internal_url":"","created_at":"2022-09-26T07:41:29.950-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":82613518,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[{"id":91583107,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/91583107/thumbnails/1.jpg","file_name":"raft-2021-0011.pdf","download_url":"https://www.academia.edu/attachments/91583107/download_file","bulk_download_file_name":"Understanding_the_Challenge_of_Cybersecu.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/91583107/raft-2021-0011-libre.pdf?1664203449=\u0026response-content-disposition=attachment%3B+filename%3DUnderstanding_the_Challenge_of_Cybersecu.pdf\u0026Expires=1743223500\u0026Signature=A3E~HQ-8T2UpvkpKYqGYsnElavVptj~jvQF63pWExllQXuuSDcL7fs5e-ax7nEq8qkHQ8TQg0ms2ctY-6dvjTtGd47aMelP~CqcK99pbY5aPjthHiSu68K6Is6dOvzaAWKbfzSiRao1V0105MHTicwqhfXS85NZ4HOPakRN7sKlu91AB0nzH5BJwWrxo2BhJ-4uVcP7KWMXb5mEciQdB9-G~Dh-97m9i96fD-765aJAfx432MWtj5TE85ZMesqn3LzPBJsQ1~4WiIEx8D1ncHizhhA2x~Ci-E1xWhMbD8Wi0uHJ1hK6sqYAUnM7gMFkcmJJcdjC43ATKXNV9UxXRhg__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"slug":"Understanding_the_Challenge_of_Cybersecurity_in_Critical_Infrastructure_Sectors","translated_slug":"","page_count":7,"language":"en","content_type":"Work","summary":"The cybersecurity of critical infrastructures is an essential topic within national and international security as 16 critical infrastructure sectors touch various aspects of American society. Because the failure to provide adequate cybersecurity controls within the critical infrastructure sectors renders the country open to an attack that could have a debilitating effect on security, national public health, safety, and economic security, this matter is so vital that there is the Presidential Policy Directive (PPD) 21 Critical Infrastructure Security and Resilience advances a national policy to strengthen and maintain secure, functioning and resilient critical infrastructure. An organization identified as the Cybersecurity and Infrastructure Security Agency (CISA) at the Department of Homeland Security (DHS) has the mission to be the risk advisor for the United States (US). Other organizations, such as the National Security Agency (NSA), have approved a specific Knowledge Unit (KU) t...","owner":{"id":82613518,"first_name":"Maurice","middle_initials":null,"last_name":"Dawson","page_name":"MauriceDawson","domain_name":"iit","created_at":"2018-06-06T13:08:54.103-07:00","display_name":"Maurice Dawson","url":"https://iit.academia.edu/MauriceDawson"},"attachments":[{"id":91583107,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/91583107/thumbnails/1.jpg","file_name":"raft-2021-0011.pdf","download_url":"https://www.academia.edu/attachments/91583107/download_file","bulk_download_file_name":"Understanding_the_Challenge_of_Cybersecu.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/91583107/raft-2021-0011-libre.pdf?1664203449=\u0026response-content-disposition=attachment%3B+filename%3DUnderstanding_the_Challenge_of_Cybersecu.pdf\u0026Expires=1743223500\u0026Signature=A3E~HQ-8T2UpvkpKYqGYsnElavVptj~jvQF63pWExllQXuuSDcL7fs5e-ax7nEq8qkHQ8TQg0ms2ctY-6dvjTtGd47aMelP~CqcK99pbY5aPjthHiSu68K6Is6dOvzaAWKbfzSiRao1V0105MHTicwqhfXS85NZ4HOPakRN7sKlu91AB0nzH5BJwWrxo2BhJ-4uVcP7KWMXb5mEciQdB9-G~Dh-97m9i96fD-765aJAfx432MWtj5TE85ZMesqn3LzPBJsQ1~4WiIEx8D1ncHizhhA2x~Ci-E1xWhMbD8Wi0uHJ1hK6sqYAUnM7gMFkcmJJcdjC43ATKXNV9UxXRhg__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"research_interests":[{"id":422,"name":"Computer Science","url":"https://www.academia.edu/Documents/in/Computer_Science"},{"id":1283,"name":"Information Security","url":"https://www.academia.edu/Documents/in/Information_Security"},{"id":4252,"name":"Computer Networks","url":"https://www.academia.edu/Documents/in/Computer_Networks"},{"id":13923,"name":"Computer Security","url":"https://www.academia.edu/Documents/in/Computer_Security"}],"urls":[{"id":24197585,"url":"https://content.sciendo.com/view/journals/raft/26/1/article-p69.xml"}]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") if (false) { Aedu.setUpFigureCarousel('profile-work-87348807-figures'); } }); </script> <div class="js-work-strip profile--work_container" data-work-id="87348803"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" rel="nofollow" href="https://www.academia.edu/87348803/Dark_Web"><img alt="Research paper thumbnail of Dark Web" class="work-thumbnail" src="https://a.academia-assets.com/images/blank-paper.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title">Dark Web</div><div class="wp-workCard_item"><span>Handbook of Research on Theory and Practice of Financial Crimes</span><span>, 2021</span></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">The explosion of the internet has given rise to cybercrimes, online identity theft, and fraud. Wi...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">The explosion of the internet has given rise to cybercrimes, online identity theft, and fraud. With the internet, these crimes are able to occur anywhere in the world and limitless to whatever selected target. The anonymity of the internet allows criminal activity to flourish, and the number of unsuspecting victims is growing. From script kiddies to nation-states, this new method of internet-enabled crimes has strained governments. This chapter provides insight into how crimes related to online identity theft and fraud are carried out. Examined within this chapter are the evolution of cybercrime, history of identity theft, applications for internet anonymity, and discussion on effects caused by romance scams and data breaches. Finally, recommendations are provided on what organizations and individuals can do to protect themselves against these vicious crimes.</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="87348803"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="87348803"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 87348803; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=87348803]").text(description); $(".js-view-count[data-work-id=87348803]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 87348803; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='87348803']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-a9bf3a2bc8c89fa2a77156577594264ee8a0f214d74241bc0fcd3f69f8d107ac.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (false){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "-1" } } $('.js-work-strip[data-work-id=87348803]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":87348803,"title":"Dark Web","translated_title":"","metadata":{"abstract":"The explosion of the internet has given rise to cybercrimes, online identity theft, and fraud. With the internet, these crimes are able to occur anywhere in the world and limitless to whatever selected target. The anonymity of the internet allows criminal activity to flourish, and the number of unsuspecting victims is growing. From script kiddies to nation-states, this new method of internet-enabled crimes has strained governments. This chapter provides insight into how crimes related to online identity theft and fraud are carried out. Examined within this chapter are the evolution of cybercrime, history of identity theft, applications for internet anonymity, and discussion on effects caused by romance scams and data breaches. Finally, recommendations are provided on what organizations and individuals can do to protect themselves against these vicious crimes.","publisher":"IGI Global","publication_date":{"day":null,"month":null,"year":2021,"errors":{}},"publication_name":"Handbook of Research on Theory and Practice of Financial Crimes"},"translated_abstract":"The explosion of the internet has given rise to cybercrimes, online identity theft, and fraud. With the internet, these crimes are able to occur anywhere in the world and limitless to whatever selected target. The anonymity of the internet allows criminal activity to flourish, and the number of unsuspecting victims is growing. From script kiddies to nation-states, this new method of internet-enabled crimes has strained governments. This chapter provides insight into how crimes related to online identity theft and fraud are carried out. Examined within this chapter are the evolution of cybercrime, history of identity theft, applications for internet anonymity, and discussion on effects caused by romance scams and data breaches. Finally, recommendations are provided on what organizations and individuals can do to protect themselves against these vicious crimes.","internal_url":"https://www.academia.edu/87348803/Dark_Web","translated_internal_url":"","created_at":"2022-09-26T07:41:24.271-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":82613518,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[],"slug":"Dark_Web","translated_slug":"","page_count":null,"language":"en","content_type":"Work","summary":"The explosion of the internet has given rise to cybercrimes, online identity theft, and fraud. With the internet, these crimes are able to occur anywhere in the world and limitless to whatever selected target. The anonymity of the internet allows criminal activity to flourish, and the number of unsuspecting victims is growing. From script kiddies to nation-states, this new method of internet-enabled crimes has strained governments. This chapter provides insight into how crimes related to online identity theft and fraud are carried out. Examined within this chapter are the evolution of cybercrime, history of identity theft, applications for internet anonymity, and discussion on effects caused by romance scams and data breaches. Finally, recommendations are provided on what organizations and individuals can do to protect themselves against these vicious crimes.","owner":{"id":82613518,"first_name":"Maurice","middle_initials":null,"last_name":"Dawson","page_name":"MauriceDawson","domain_name":"iit","created_at":"2018-06-06T13:08:54.103-07:00","display_name":"Maurice Dawson","url":"https://iit.academia.edu/MauriceDawson"},"attachments":[],"research_interests":[],"urls":[{"id":24197582,"url":"https://www.igi-global.com/viewtitle.aspx?TitleId=275477"}]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") if (false) { Aedu.setUpFigureCarousel('profile-work-87348803-figures'); } }); </script> <div class="js-work-strip profile--work_container" data-work-id="87348799"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/87348799/Supply_Chain_and_Logistics_Management_and_an_Open_Door_Policy_Concerning_Cyber_Security_Introduction"><img alt="Research paper thumbnail of Supply Chain and Logistics Management and an Open Door Policy Concerning Cyber Security Introduction" class="work-thumbnail" src="https://attachments.academia-assets.com/91583105/thumbnails/1.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/87348799/Supply_Chain_and_Logistics_Management_and_an_Open_Door_Policy_Concerning_Cyber_Security_Introduction">Supply Chain and Logistics Management and an Open Door Policy Concerning Cyber Security Introduction</a></div><div class="wp-workCard_item"><span>International Journal of Management and Sustainability</span><span>, 2020</span></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">Contribution/Originality: This study contributes to the existing literature by exploring innovati...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">Contribution/Originality: This study contributes to the existing literature by exploring innovative approaches around open-door systems as a proactive risk reduction approach. 1. INTRODUCTION In the U.S. alone, cybercrimes have had a detrimental impact on the country&#39;s economy; costing approximately 445 billion annually (Simon and Omar, 2020). Supply chain managers&#39; heavy reliance on information technology (IT) to improve organizational systems, infrastructure, competitive advantage, and growth have inadvertently</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><a id="46f834f4d4d66901761403686614c2fc" class="wp-workCard--action" rel="nofollow" data-click-track="profile-work-strip-download" data-download="{&quot;attachment_id&quot;:91583105,&quot;asset_id&quot;:87348799,&quot;asset_type&quot;:&quot;Work&quot;,&quot;button_location&quot;:&quot;profile&quot;}" href="https://www.academia.edu/attachments/91583105/download_file?s=profile"><span><i class="fa fa-arrow-down"></i></span><span>Download</span></a><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="87348799"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="87348799"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 87348799; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=87348799]").text(description); $(".js-view-count[data-work-id=87348799]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 87348799; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='87348799']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-a9bf3a2bc8c89fa2a77156577594264ee8a0f214d74241bc0fcd3f69f8d107ac.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (true){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "46f834f4d4d66901761403686614c2fc" } } $('.js-work-strip[data-work-id=87348799]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":87348799,"title":"Supply Chain and Logistics Management and an Open Door Policy Concerning Cyber Security Introduction","translated_title":"","metadata":{"publisher":"Conscientia Beam","ai_title_tag":"Innovative Open-Door Policies in Cyber Security for Supply Chains","grobid_abstract":"Contribution/Originality: This study contributes to the existing literature by exploring innovative approaches around open-door systems as a proactive risk reduction approach. 1. INTRODUCTION In the U.S. alone, cybercrimes have had a detrimental impact on the country's economy; costing approximately 445 billion annually (Simon and Omar, 2020). Supply chain managers' heavy reliance on information technology (IT) to improve organizational systems, infrastructure, competitive advantage, and growth have inadvertently","publication_date":{"day":null,"month":null,"year":2020,"errors":{}},"publication_name":"International Journal of Management and Sustainability","grobid_abstract_attachment_id":91583105},"translated_abstract":null,"internal_url":"https://www.academia.edu/87348799/Supply_Chain_and_Logistics_Management_and_an_Open_Door_Policy_Concerning_Cyber_Security_Introduction","translated_internal_url":"","created_at":"2022-09-26T07:41:20.128-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":82613518,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[{"id":91583105,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/91583105/thumbnails/1.jpg","file_name":"IJMS-2020-91-1-10.pdf","download_url":"https://www.academia.edu/attachments/91583105/download_file","bulk_download_file_name":"Supply_Chain_and_Logistics_Management_an.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/91583105/IJMS-2020-91-1-10-libre.pdf?1664203451=\u0026response-content-disposition=attachment%3B+filename%3DSupply_Chain_and_Logistics_Management_an.pdf\u0026Expires=1743223500\u0026Signature=VyCw6-JYziYJa4G3gAF~gedSPgW6eDZhlPxvv9fR6y0KqYXx7bgO0uT6SE3a49trQQKQ~58UFfIvaDHnYCQ2gzEPW2YRalcrYYNtgidE0YgUgy1fLCk2KmP7L06y7rxltKhQ4O3yp7UZ75kl34wX-ge395PhZvweV6U7y17EiaYpObMI1FvEa4O77X6zCOlEEXec1zVIho6PUWc~ohSrB8RQ9KMmc0ZEYjrsYJa10JZaxZeDpc11-lyBLmwhCImn8tkAlXz8WHldL4Ju9Ew8ujS6u8zwTqWUMfjOt5HbbrvkO3dhVN7ThGlOobqw8TQAQrb7~Cid8o9yq1gmaSEBsw__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"slug":"Supply_Chain_and_Logistics_Management_and_an_Open_Door_Policy_Concerning_Cyber_Security_Introduction","translated_slug":"","page_count":10,"language":"en","content_type":"Work","summary":"Contribution/Originality: This study contributes to the existing literature by exploring innovative approaches around open-door systems as a proactive risk reduction approach. 1. INTRODUCTION In the U.S. alone, cybercrimes have had a detrimental impact on the country's economy; costing approximately 445 billion annually (Simon and Omar, 2020). Supply chain managers' heavy reliance on information technology (IT) to improve organizational systems, infrastructure, competitive advantage, and growth have inadvertently","owner":{"id":82613518,"first_name":"Maurice","middle_initials":null,"last_name":"Dawson","page_name":"MauriceDawson","domain_name":"iit","created_at":"2018-06-06T13:08:54.103-07:00","display_name":"Maurice Dawson","url":"https://iit.academia.edu/MauriceDawson"},"attachments":[{"id":91583105,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/91583105/thumbnails/1.jpg","file_name":"IJMS-2020-91-1-10.pdf","download_url":"https://www.academia.edu/attachments/91583105/download_file","bulk_download_file_name":"Supply_Chain_and_Logistics_Management_an.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/91583105/IJMS-2020-91-1-10-libre.pdf?1664203451=\u0026response-content-disposition=attachment%3B+filename%3DSupply_Chain_and_Logistics_Management_an.pdf\u0026Expires=1743223500\u0026Signature=VyCw6-JYziYJa4G3gAF~gedSPgW6eDZhlPxvv9fR6y0KqYXx7bgO0uT6SE3a49trQQKQ~58UFfIvaDHnYCQ2gzEPW2YRalcrYYNtgidE0YgUgy1fLCk2KmP7L06y7rxltKhQ4O3yp7UZ75kl34wX-ge395PhZvweV6U7y17EiaYpObMI1FvEa4O77X6zCOlEEXec1zVIho6PUWc~ohSrB8RQ9KMmc0ZEYjrsYJa10JZaxZeDpc11-lyBLmwhCImn8tkAlXz8WHldL4Ju9Ew8ujS6u8zwTqWUMfjOt5HbbrvkO3dhVN7ThGlOobqw8TQAQrb7~Cid8o9yq1gmaSEBsw__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"research_interests":[{"id":26,"name":"Business","url":"https://www.academia.edu/Documents/in/Business"},{"id":32,"name":"Organizational Behavior","url":"https://www.academia.edu/Documents/in/Organizational_Behavior"},{"id":491,"name":"Information Technology","url":"https://www.academia.edu/Documents/in/Information_Technology"},{"id":1324,"name":"Organizational Change","url":"https://www.academia.edu/Documents/in/Organizational_Change"},{"id":3267,"name":"Whistleblowing","url":"https://www.academia.edu/Documents/in/Whistleblowing"},{"id":3762,"name":"Human Factors","url":"https://www.academia.edu/Documents/in/Human_Factors"},{"id":7055,"name":"Technology Management","url":"https://www.academia.edu/Documents/in/Technology_Management"},{"id":8333,"name":"Organizational Citizenship Behavior","url":"https://www.academia.edu/Documents/in/Organizational_Citizenship_Behavior"},{"id":31064,"name":"Sustainability Management","url":"https://www.academia.edu/Documents/in/Sustainability_Management"},{"id":115676,"name":"Cyber Security","url":"https://www.academia.edu/Documents/in/Cyber_Security"},{"id":540336,"name":"Environmental Management and Sustainability","url":"https://www.academia.edu/Documents/in/Environmental_Management_and_Sustainability"},{"id":987706,"name":"Media Management and Sustainability","url":"https://www.academia.edu/Documents/in/Media_Management_and_Sustainability"}],"urls":[]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") if (false) { Aedu.setUpFigureCarousel('profile-work-87348799-figures'); } }); </script> <div class="js-work-strip profile--work_container" data-work-id="87348792"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/87348792/Systems_Usability_in_Developing_Countries"><img alt="Research paper thumbnail of Systems Usability in Developing Countries" class="work-thumbnail" src="https://attachments.academia-assets.com/91583096/thumbnails/1.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/87348792/Systems_Usability_in_Developing_Countries">Systems Usability in Developing Countries</a></div><div class="wp-workCard_item"><span>International Journal of ICT Research in Africa and the Middle East</span><span>, 2019</span></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">This article critically analyzes a project executed for the John Ogonowski and Doug Bereuter Farm...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">This article critically analyzes a project executed for the John Ogonowski and Doug Bereuter Farmer-to-Farmer Program which provides technical assistance with volunteers from the United States to farmers, agricultural institutions, and government organizations involved in agriculture such as the Ministry of Agriculture. In Guinea, the focus is on computer literacy as more sectors of agriculture rely on computing technology. These skills range from basic computing tasks such as creating databases to more advanced items such as programming global positional systems. This study looks at findings, based on the analysis of the system usability scale results from a sample of 16 participants. The findings demonstrated that the training proved to be effective for the participants and continued training is necessary. As a result of training, 62.5% of the participants ranked above average, as opposed to 43.6% prior to training.</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><a id="106daa1fe64a93c8a8f736492a3bb5d8" class="wp-workCard--action" rel="nofollow" data-click-track="profile-work-strip-download" data-download="{&quot;attachment_id&quot;:91583096,&quot;asset_id&quot;:87348792,&quot;asset_type&quot;:&quot;Work&quot;,&quot;button_location&quot;:&quot;profile&quot;}" href="https://www.academia.edu/attachments/91583096/download_file?s=profile"><span><i class="fa fa-arrow-down"></i></span><span>Download</span></a><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="87348792"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="87348792"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 87348792; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=87348792]").text(description); $(".js-view-count[data-work-id=87348792]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 87348792; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='87348792']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-a9bf3a2bc8c89fa2a77156577594264ee8a0f214d74241bc0fcd3f69f8d107ac.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (true){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "106daa1fe64a93c8a8f736492a3bb5d8" } } $('.js-work-strip[data-work-id=87348792]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":87348792,"title":"Systems Usability in Developing Countries","translated_title":"","metadata":{"abstract":"This article critically analyzes a project executed for the John Ogonowski and Doug Bereuter Farmer-to-Farmer Program which provides technical assistance with volunteers from the United States to farmers, agricultural institutions, and government organizations involved in agriculture such as the Ministry of Agriculture. In Guinea, the focus is on computer literacy as more sectors of agriculture rely on computing technology. These skills range from basic computing tasks such as creating databases to more advanced items such as programming global positional systems. This study looks at findings, based on the analysis of the system usability scale results from a sample of 16 participants. The findings demonstrated that the training proved to be effective for the participants and continued training is necessary. As a result of training, 62.5% of the participants ranked above average, as opposed to 43.6% prior to training.","publisher":"IGI Global","publication_date":{"day":null,"month":null,"year":2019,"errors":{}},"publication_name":"International Journal of ICT Research in Africa and the Middle East"},"translated_abstract":"This article critically analyzes a project executed for the John Ogonowski and Doug Bereuter Farmer-to-Farmer Program which provides technical assistance with volunteers from the United States to farmers, agricultural institutions, and government organizations involved in agriculture such as the Ministry of Agriculture. In Guinea, the focus is on computer literacy as more sectors of agriculture rely on computing technology. These skills range from basic computing tasks such as creating databases to more advanced items such as programming global positional systems. This study looks at findings, based on the analysis of the system usability scale results from a sample of 16 participants. The findings demonstrated that the training proved to be effective for the participants and continued training is necessary. As a result of training, 62.5% of the participants ranked above average, as opposed to 43.6% prior to training.","internal_url":"https://www.academia.edu/87348792/Systems_Usability_in_Developing_Countries","translated_internal_url":"","created_at":"2022-09-26T07:41:13.461-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":82613518,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[{"id":91583096,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/91583096/thumbnails/1.jpg","file_name":"Systems-Usability-in-Developing-Countries_-Case-of-Computing-Use-in-Guinea_stamped.pdf","download_url":"https://www.academia.edu/attachments/91583096/download_file","bulk_download_file_name":"Systems_Usability_in_Developing_Countrie.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/91583096/Systems-Usability-in-Developing-Countries_-Case-of-Computing-Use-in-Guinea_stamped-libre.pdf?1664203480=\u0026response-content-disposition=attachment%3B+filename%3DSystems_Usability_in_Developing_Countrie.pdf\u0026Expires=1743223500\u0026Signature=D3yX6fAqigy3l8MTYDEqHlaAx2XErC2wRCjugvArpJkSoIm4GAhC2lK1-mEH4hV9G6HFcAgSj3CDotDO61iR~INE7rubV2Uz9AO1CB~tcBBPH1rIlTIsb2G6r5NIdW6lrZ1mbVvIrQtAPUaslVQU1WWoLZZLLUZLCXiDSmdhJQ1RzVq16CGBmf6~Bqn~VDViTwECqZOU1h~LzSTTLPcFsAJeVOi5v1eb8LP~x-Bx7pVaOY2VH5RDV~5AF2mc8ts1MkjxI2lYFYlO~8Mt~1JhrTPUqKr2yR0GFutRYpmEPil8tgmMq8v5qAE63Mk~8v4pExCpr~XPCM4c6SVXyoM~1g__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"slug":"Systems_Usability_in_Developing_Countries","translated_slug":"","page_count":11,"language":"en","content_type":"Work","summary":"This article critically analyzes a project executed for the John Ogonowski and Doug Bereuter Farmer-to-Farmer Program which provides technical assistance with volunteers from the United States to farmers, agricultural institutions, and government organizations involved in agriculture such as the Ministry of Agriculture. In Guinea, the focus is on computer literacy as more sectors of agriculture rely on computing technology. These skills range from basic computing tasks such as creating databases to more advanced items such as programming global positional systems. This study looks at findings, based on the analysis of the system usability scale results from a sample of 16 participants. The findings demonstrated that the training proved to be effective for the participants and continued training is necessary. As a result of training, 62.5% of the participants ranked above average, as opposed to 43.6% prior to training.","owner":{"id":82613518,"first_name":"Maurice","middle_initials":null,"last_name":"Dawson","page_name":"MauriceDawson","domain_name":"iit","created_at":"2018-06-06T13:08:54.103-07:00","display_name":"Maurice Dawson","url":"https://iit.academia.edu/MauriceDawson"},"attachments":[{"id":91583096,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/91583096/thumbnails/1.jpg","file_name":"Systems-Usability-in-Developing-Countries_-Case-of-Computing-Use-in-Guinea_stamped.pdf","download_url":"https://www.academia.edu/attachments/91583096/download_file","bulk_download_file_name":"Systems_Usability_in_Developing_Countrie.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/91583096/Systems-Usability-in-Developing-Countries_-Case-of-Computing-Use-in-Guinea_stamped-libre.pdf?1664203480=\u0026response-content-disposition=attachment%3B+filename%3DSystems_Usability_in_Developing_Countrie.pdf\u0026Expires=1743223500\u0026Signature=D3yX6fAqigy3l8MTYDEqHlaAx2XErC2wRCjugvArpJkSoIm4GAhC2lK1-mEH4hV9G6HFcAgSj3CDotDO61iR~INE7rubV2Uz9AO1CB~tcBBPH1rIlTIsb2G6r5NIdW6lrZ1mbVvIrQtAPUaslVQU1WWoLZZLLUZLCXiDSmdhJQ1RzVq16CGBmf6~Bqn~VDViTwECqZOU1h~LzSTTLPcFsAJeVOi5v1eb8LP~x-Bx7pVaOY2VH5RDV~5AF2mc8ts1MkjxI2lYFYlO~8Mt~1JhrTPUqKr2yR0GFutRYpmEPil8tgmMq8v5qAE63Mk~8v4pExCpr~XPCM4c6SVXyoM~1g__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"research_interests":[{"id":26,"name":"Business","url":"https://www.academia.edu/Documents/in/Business"},{"id":422,"name":"Computer Science","url":"https://www.academia.edu/Documents/in/Computer_Science"},{"id":1615,"name":"Usability","url":"https://www.academia.edu/Documents/in/Usability"},{"id":392226,"name":"New Guinea","url":"https://www.academia.edu/Documents/in/New_Guinea"}],"urls":[{"id":24197576,"url":"https://www.igi-global.com/viewtitle.aspx?TitleId=218584"}]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") if (false) { Aedu.setUpFigureCarousel('profile-work-87348792-figures'); } }); </script> <div class="js-work-strip profile--work_container" data-work-id="87348786"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/87348786/Improving_Cyber_Defense_Education_through_National_Standard_Alignment"><img alt="Research paper thumbnail of Improving Cyber Defense Education through National Standard Alignment" class="work-thumbnail" src="https://attachments.academia-assets.com/91583090/thumbnails/1.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/87348786/Improving_Cyber_Defense_Education_through_National_Standard_Alignment">Improving Cyber Defense Education through National Standard Alignment</a></div><div class="wp-workCard_item"><span>International Journal of Hyperconnectivity and the Internet of Things</span><span>, 2018</span></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">There has been a fast-growing demand for cybersecurity professionals to defend cyber space and in...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">There has been a fast-growing demand for cybersecurity professionals to defend cyber space and information systems. With more and more programs and course offerings in cybersecurity popping up in higher education, it is important to have a consistent and reliable quality standard to guide and evaluate the training and preparation of qualified cyber defense workforce. The national Centers of Academic Excellence in Cyber Defense Education (CAE-CDE) designation program jointly sponsored by the US National Security Agency (NSA) and Department of Homeland Security (DHS) is a rigorous national standard with specific criteria for maintaining the quality of cybersecurity education. This article explains the CAE-CDE program criteria and requirements and discusses the important role of the special designation in improving cyber defense education and workforce development. This article illustrates the educational value and quality impact of the CAE-CDE program with three case studies: (1) Univ...</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><a id="d52462b0edee456880b338ed3c981f46" class="wp-workCard--action" rel="nofollow" data-click-track="profile-work-strip-download" data-download="{&quot;attachment_id&quot;:91583090,&quot;asset_id&quot;:87348786,&quot;asset_type&quot;:&quot;Work&quot;,&quot;button_location&quot;:&quot;profile&quot;}" href="https://www.academia.edu/attachments/91583090/download_file?s=profile"><span><i class="fa fa-arrow-down"></i></span><span>Download</span></a><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="87348786"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="87348786"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 87348786; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=87348786]").text(description); $(".js-view-count[data-work-id=87348786]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 87348786; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='87348786']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-a9bf3a2bc8c89fa2a77156577594264ee8a0f214d74241bc0fcd3f69f8d107ac.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (true){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "d52462b0edee456880b338ed3c981f46" } } $('.js-work-strip[data-work-id=87348786]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":87348786,"title":"Improving Cyber Defense Education through National Standard Alignment","translated_title":"","metadata":{"abstract":"There has been a fast-growing demand for cybersecurity professionals to defend cyber space and information systems. With more and more programs and course offerings in cybersecurity popping up in higher education, it is important to have a consistent and reliable quality standard to guide and evaluate the training and preparation of qualified cyber defense workforce. The national Centers of Academic Excellence in Cyber Defense Education (CAE-CDE) designation program jointly sponsored by the US National Security Agency (NSA) and Department of Homeland Security (DHS) is a rigorous national standard with specific criteria for maintaining the quality of cybersecurity education. This article explains the CAE-CDE program criteria and requirements and discusses the important role of the special designation in improving cyber defense education and workforce development. This article illustrates the educational value and quality impact of the CAE-CDE program with three case studies: (1) Univ...","publisher":"IGI Global","publication_date":{"day":null,"month":null,"year":2018,"errors":{}},"publication_name":"International Journal of Hyperconnectivity and the Internet of Things"},"translated_abstract":"There has been a fast-growing demand for cybersecurity professionals to defend cyber space and information systems. With more and more programs and course offerings in cybersecurity popping up in higher education, it is important to have a consistent and reliable quality standard to guide and evaluate the training and preparation of qualified cyber defense workforce. The national Centers of Academic Excellence in Cyber Defense Education (CAE-CDE) designation program jointly sponsored by the US National Security Agency (NSA) and Department of Homeland Security (DHS) is a rigorous national standard with specific criteria for maintaining the quality of cybersecurity education. This article explains the CAE-CDE program criteria and requirements and discusses the important role of the special designation in improving cyber defense education and workforce development. This article illustrates the educational value and quality impact of the CAE-CDE program with three case studies: (1) Univ...","internal_url":"https://www.academia.edu/87348786/Improving_Cyber_Defense_Education_through_National_Standard_Alignment","translated_internal_url":"","created_at":"2022-09-26T07:41:05.840-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":82613518,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[{"id":91583090,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/91583090/thumbnails/1.jpg","file_name":"viewtitlesample.pdf","download_url":"https://www.academia.edu/attachments/91583090/download_file","bulk_download_file_name":"Improving_Cyber_Defense_Education_throug.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/91583090/viewtitlesample-libre.pdf?1664203450=\u0026response-content-disposition=attachment%3B+filename%3DImproving_Cyber_Defense_Education_throug.pdf\u0026Expires=1743223500\u0026Signature=dMItWg3zlYkS2zUyrA12-PsErjAaMFHoqHn6vEXbtakJUHy846VE7HwM1hDeNXckNL9L6WZOCB8eN3AYScwIZAUN7nQ0K8ccao2LWnoIIeRMoGN7aZeSz2LmEtMXtSBMFSGCtJUc7Keufhbe99xcmAaWMYgKimygN5eo~b5BPTrYZe8~CA6yoSBATRwRGwBXsjhtMZG7gbWpyCsTZP7UTRIpirBQ~62wKgpGzIlLLI5z2MPw1tUiuPwt~XmSF~CyR3QL0hXarEJbXrL32wwIFYBaxjWK4nwuI57BWGAXrveDKHfx-d5y~I5NkerWE5RaZRn1TCOX19wkYUBgtyPZ-A__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"slug":"Improving_Cyber_Defense_Education_through_National_Standard_Alignment","translated_slug":"","page_count":4,"language":"en","content_type":"Work","summary":"There has been a fast-growing demand for cybersecurity professionals to defend cyber space and information systems. With more and more programs and course offerings in cybersecurity popping up in higher education, it is important to have a consistent and reliable quality standard to guide and evaluate the training and preparation of qualified cyber defense workforce. The national Centers of Academic Excellence in Cyber Defense Education (CAE-CDE) designation program jointly sponsored by the US National Security Agency (NSA) and Department of Homeland Security (DHS) is a rigorous national standard with specific criteria for maintaining the quality of cybersecurity education. This article explains the CAE-CDE program criteria and requirements and discusses the important role of the special designation in improving cyber defense education and workforce development. This article illustrates the educational value and quality impact of the CAE-CDE program with three case studies: (1) Univ...","owner":{"id":82613518,"first_name":"Maurice","middle_initials":null,"last_name":"Dawson","page_name":"MauriceDawson","domain_name":"iit","created_at":"2018-06-06T13:08:54.103-07:00","display_name":"Maurice Dawson","url":"https://iit.academia.edu/MauriceDawson"},"attachments":[{"id":91583090,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/91583090/thumbnails/1.jpg","file_name":"viewtitlesample.pdf","download_url":"https://www.academia.edu/attachments/91583090/download_file","bulk_download_file_name":"Improving_Cyber_Defense_Education_throug.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/91583090/viewtitlesample-libre.pdf?1664203450=\u0026response-content-disposition=attachment%3B+filename%3DImproving_Cyber_Defense_Education_throug.pdf\u0026Expires=1743223500\u0026Signature=dMItWg3zlYkS2zUyrA12-PsErjAaMFHoqHn6vEXbtakJUHy846VE7HwM1hDeNXckNL9L6WZOCB8eN3AYScwIZAUN7nQ0K8ccao2LWnoIIeRMoGN7aZeSz2LmEtMXtSBMFSGCtJUc7Keufhbe99xcmAaWMYgKimygN5eo~b5BPTrYZe8~CA6yoSBATRwRGwBXsjhtMZG7gbWpyCsTZP7UTRIpirBQ~62wKgpGzIlLLI5z2MPw1tUiuPwt~XmSF~CyR3QL0hXarEJbXrL32wwIFYBaxjWK4nwuI57BWGAXrveDKHfx-d5y~I5NkerWE5RaZRn1TCOX19wkYUBgtyPZ-A__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"research_interests":[{"id":422,"name":"Computer Science","url":"https://www.academia.edu/Documents/in/Computer_Science"}],"urls":[{"id":24197574,"url":"https://www.igi-global.com/viewtitle.aspx?TitleId=210625"}]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") if (false) { Aedu.setUpFigureCarousel('profile-work-87348786-figures'); } }); </script> <div class="js-work-strip profile--work_container" data-work-id="87348783"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/87348783/Battlefield_Cyberspace"><img alt="Research paper thumbnail of Battlefield Cyberspace" class="work-thumbnail" src="https://attachments.academia-assets.com/91583080/thumbnails/1.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/87348783/Battlefield_Cyberspace">Battlefield Cyberspace</a></div><div class="wp-workCard_item"><span>Developing Next-Generation Countermeasures for Homeland Security Threat Prevention</span></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">The threat of cyber terrorism has become a reality with recent attacks such as Stuxtnet, Flame, S...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">The threat of cyber terrorism has become a reality with recent attacks such as Stuxtnet, Flame, Sony Pictures, and North Korea&#39;s websites. As the Internet of Things (IoT) continues to become more hyperconnected it will be imperative that cyber security experts to develop new security architectures for multiple platforms such as mobile devices, laptops, embedded systems, and even wearable displays. The futures of national and international security rely on complex countermeasures to ensure that a proper security posture is maintained during this state of hyperconnectivity. To protect these systems from exploitation of vulnerabilities it is essential to understand current and future threats to include the laws that drive their need to be secured. Examined within this chapter are the potential security related threats with the use of social media, mobile devices, virtual worlds, augmented reality, and mixed reality.</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><a id="6afc2af5fe50881b01519700a06243fc" class="wp-workCard--action" rel="nofollow" data-click-track="profile-work-strip-download" data-download="{&quot;attachment_id&quot;:91583080,&quot;asset_id&quot;:87348783,&quot;asset_type&quot;:&quot;Work&quot;,&quot;button_location&quot;:&quot;profile&quot;}" href="https://www.academia.edu/attachments/91583080/download_file?s=profile"><span><i class="fa fa-arrow-down"></i></span><span>Download</span></a><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="87348783"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="87348783"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 87348783; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=87348783]").text(description); $(".js-view-count[data-work-id=87348783]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 87348783; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='87348783']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-a9bf3a2bc8c89fa2a77156577594264ee8a0f214d74241bc0fcd3f69f8d107ac.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (true){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "6afc2af5fe50881b01519700a06243fc" } } $('.js-work-strip[data-work-id=87348783]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":87348783,"title":"Battlefield Cyberspace","translated_title":"","metadata":{"ai_title_tag":"Cybersecurity Challenges in an IoT-Connected Battlefield","grobid_abstract":"The threat of cyber terrorism has become a reality with recent attacks such as Stuxtnet, Flame, Sony Pictures, and North Korea's websites. As the Internet of Things (IoT) continues to become more hyperconnected it will be imperative that cyber security experts to develop new security architectures for multiple platforms such as mobile devices, laptops, embedded systems, and even wearable displays. The futures of national and international security rely on complex countermeasures to ensure that a proper security posture is maintained during this state of hyperconnectivity. To protect these systems from exploitation of vulnerabilities it is essential to understand current and future threats to include the laws that drive their need to be secured. Examined within this chapter are the potential security related threats with the use of social media, mobile devices, virtual worlds, augmented reality, and mixed reality.","publication_name":"Developing Next-Generation Countermeasures for Homeland Security Threat Prevention","grobid_abstract_attachment_id":91583080},"translated_abstract":null,"internal_url":"https://www.academia.edu/87348783/Battlefield_Cyberspace","translated_internal_url":"","created_at":"2022-09-26T07:41:01.927-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":82613518,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[{"id":91583080,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/91583080/thumbnails/1.jpg","file_name":"viewtitlesample.pdf","download_url":"https://www.academia.edu/attachments/91583080/download_file","bulk_download_file_name":"Battlefield_Cyberspace.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/91583080/viewtitlesample-libre.pdf?1664203484=\u0026response-content-disposition=attachment%3B+filename%3DBattlefield_Cyberspace.pdf\u0026Expires=1743223500\u0026Signature=SloewOfxWgVkiaRUQj1jYFDmyMSX3t1AP6ohNsL8PPSt1chDjdT0a1Idrist3PED5zouMRJI~ZzrCVJx-vVYtO9gS0UNeb2ZY9ZwPW7qJoiyd65iGqmM9fwMZKxKTApM6AfFJrzFRp~6rSjJgzGoL38k2SwoHrP9iEtngQR4ez6TW5vYQ5CltBbGt1~GtCFtI-b~-XcdTvC3Zc8gcaIKuV4eX~hWLq1pz4L1bj0X9Xueyma-RGuyWiwiXOUY9DqJbSehXtqSY5lJ72lfrba9oQZN1bvpxuE9LAW~BVjOP5OP-nzqJSad~cWzeTgOxNQhFJFgz83IVWnFh3HgW5Ec-Q__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"slug":"Battlefield_Cyberspace","translated_slug":"","page_count":3,"language":"en","content_type":"Work","summary":"The threat of cyber terrorism has become a reality with recent attacks such as Stuxtnet, Flame, Sony Pictures, and North Korea's websites. As the Internet of Things (IoT) continues to become more hyperconnected it will be imperative that cyber security experts to develop new security architectures for multiple platforms such as mobile devices, laptops, embedded systems, and even wearable displays. The futures of national and international security rely on complex countermeasures to ensure that a proper security posture is maintained during this state of hyperconnectivity. To protect these systems from exploitation of vulnerabilities it is essential to understand current and future threats to include the laws that drive their need to be secured. Examined within this chapter are the potential security related threats with the use of social media, mobile devices, virtual worlds, augmented reality, and mixed reality.","owner":{"id":82613518,"first_name":"Maurice","middle_initials":null,"last_name":"Dawson","page_name":"MauriceDawson","domain_name":"iit","created_at":"2018-06-06T13:08:54.103-07:00","display_name":"Maurice Dawson","url":"https://iit.academia.edu/MauriceDawson"},"attachments":[{"id":91583080,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/91583080/thumbnails/1.jpg","file_name":"viewtitlesample.pdf","download_url":"https://www.academia.edu/attachments/91583080/download_file","bulk_download_file_name":"Battlefield_Cyberspace.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/91583080/viewtitlesample-libre.pdf?1664203484=\u0026response-content-disposition=attachment%3B+filename%3DBattlefield_Cyberspace.pdf\u0026Expires=1743223500\u0026Signature=SloewOfxWgVkiaRUQj1jYFDmyMSX3t1AP6ohNsL8PPSt1chDjdT0a1Idrist3PED5zouMRJI~ZzrCVJx-vVYtO9gS0UNeb2ZY9ZwPW7qJoiyd65iGqmM9fwMZKxKTApM6AfFJrzFRp~6rSjJgzGoL38k2SwoHrP9iEtngQR4ez6TW5vYQ5CltBbGt1~GtCFtI-b~-XcdTvC3Zc8gcaIKuV4eX~hWLq1pz4L1bj0X9Xueyma-RGuyWiwiXOUY9DqJbSehXtqSY5lJ72lfrba9oQZN1bvpxuE9LAW~BVjOP5OP-nzqJSad~cWzeTgOxNQhFJFgz83IVWnFh3HgW5Ec-Q__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"research_interests":[{"id":4486,"name":"Political Science","url":"https://www.academia.edu/Documents/in/Political_Science"}],"urls":[]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") if (false) { Aedu.setUpFigureCarousel('profile-work-87348783-figures'); } }); </script> <div class="js-work-strip profile--work_container" data-work-id="87348779"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/87348779/Islamic_Extremists_in_Africa"><img alt="Research paper thumbnail of Islamic Extremists in Africa" class="work-thumbnail" src="https://attachments.academia-assets.com/91583067/thumbnails/1.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/87348779/Islamic_Extremists_in_Africa">Islamic Extremists in Africa</a></div><div class="wp-workCard_item"><span>Developing Next-Generation Countermeasures for Homeland Security Threat Prevention</span></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">Security is a growing concern on the African continent as the Regional Economic Communities (REC)...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">Security is a growing concern on the African continent as the Regional Economic Communities (REC) move toward economic integration. Furthermore, these regions collectively make up the African Union (AU) which has an objective to promote peace, security, and stability on the African continent. In recent years, Africa has been plagued with political uprisings, civil wars, extremists, corrupt politicians, and the battle for natural resources. In particular, Kenya and Nigeria are facing Islamic extremists that threaten the foundation of multiple nations. In both countries, they are using military force to combat these threats. This chapter provides insight into these West and East African nations and their means to provide security assurances to their citizens.</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><a id="aa69b4267701806ff6fc6b2f8aadf7e4" class="wp-workCard--action" rel="nofollow" data-click-track="profile-work-strip-download" data-download="{&quot;attachment_id&quot;:91583067,&quot;asset_id&quot;:87348779,&quot;asset_type&quot;:&quot;Work&quot;,&quot;button_location&quot;:&quot;profile&quot;}" href="https://www.academia.edu/attachments/91583067/download_file?s=profile"><span><i class="fa fa-arrow-down"></i></span><span>Download</span></a><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="87348779"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="87348779"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 87348779; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=87348779]").text(description); $(".js-view-count[data-work-id=87348779]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 87348779; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='87348779']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-a9bf3a2bc8c89fa2a77156577594264ee8a0f214d74241bc0fcd3f69f8d107ac.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (true){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "aa69b4267701806ff6fc6b2f8aadf7e4" } } $('.js-work-strip[data-work-id=87348779]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":87348779,"title":"Islamic Extremists in Africa","translated_title":"","metadata":{"grobid_abstract":"Security is a growing concern on the African continent as the Regional Economic Communities (REC) move toward economic integration. Furthermore, these regions collectively make up the African Union (AU) which has an objective to promote peace, security, and stability on the African continent. In recent years, Africa has been plagued with political uprisings, civil wars, extremists, corrupt politicians, and the battle for natural resources. In particular, Kenya and Nigeria are facing Islamic extremists that threaten the foundation of multiple nations. In both countries, they are using military force to combat these threats. This chapter provides insight into these West and East African nations and their means to provide security assurances to their citizens.","publication_name":"Developing Next-Generation Countermeasures for Homeland Security Threat Prevention","grobid_abstract_attachment_id":91583067},"translated_abstract":null,"internal_url":"https://www.academia.edu/87348779/Islamic_Extremists_in_Africa","translated_internal_url":"","created_at":"2022-09-26T07:40:55.446-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":82613518,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[{"id":91583067,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/91583067/thumbnails/1.jpg","file_name":"3f6abce43e5a24638f29e4ce15ab1bc97f22.pdf","download_url":"https://www.academia.edu/attachments/91583067/download_file","bulk_download_file_name":"Islamic_Extremists_in_Africa.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/91583067/3f6abce43e5a24638f29e4ce15ab1bc97f22-libre.pdf?1664203458=\u0026response-content-disposition=attachment%3B+filename%3DIslamic_Extremists_in_Africa.pdf\u0026Expires=1743223500\u0026Signature=QhA7dFe4hc3wgZkgbMdkPCqeJHWihR18X0gsZpz4dc~33d6rAX6hdiO9o45tvUR936LtDmMmCMolLC7od~mhnYdCayNqYgmKBqhA2dXCEuVWhvwW8eEw0ADbkSCRrsbgehCum-qhfWosHDdwIQnB4izi-Afimo75G4vpBHQ4RK2-W3Rpw0UHLi7H5VKPwJDLFrqYkUicQF2vfKDr07TUMegpChTmgOPA2CHF7PAKMEaUDgKPtphfy2qvwZtTA~mwMZHfINGgYME243yvUbgXDIYJ5qddfxeOygQDlCmvS9mOyvUP5~0D9xpmCe~ZuYxbqnm2HRWTPp7Q1acAnoQTdA__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"slug":"Islamic_Extremists_in_Africa","translated_slug":"","page_count":3,"language":"en","content_type":"Work","summary":"Security is a growing concern on the African continent as the Regional Economic Communities (REC) move toward economic integration. Furthermore, these regions collectively make up the African Union (AU) which has an objective to promote peace, security, and stability on the African continent. In recent years, Africa has been plagued with political uprisings, civil wars, extremists, corrupt politicians, and the battle for natural resources. In particular, Kenya and Nigeria are facing Islamic extremists that threaten the foundation of multiple nations. In both countries, they are using military force to combat these threats. This chapter provides insight into these West and East African nations and their means to provide security assurances to their citizens.","owner":{"id":82613518,"first_name":"Maurice","middle_initials":null,"last_name":"Dawson","page_name":"MauriceDawson","domain_name":"iit","created_at":"2018-06-06T13:08:54.103-07:00","display_name":"Maurice Dawson","url":"https://iit.academia.edu/MauriceDawson"},"attachments":[{"id":91583067,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/91583067/thumbnails/1.jpg","file_name":"3f6abce43e5a24638f29e4ce15ab1bc97f22.pdf","download_url":"https://www.academia.edu/attachments/91583067/download_file","bulk_download_file_name":"Islamic_Extremists_in_Africa.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/91583067/3f6abce43e5a24638f29e4ce15ab1bc97f22-libre.pdf?1664203458=\u0026response-content-disposition=attachment%3B+filename%3DIslamic_Extremists_in_Africa.pdf\u0026Expires=1743223500\u0026Signature=QhA7dFe4hc3wgZkgbMdkPCqeJHWihR18X0gsZpz4dc~33d6rAX6hdiO9o45tvUR936LtDmMmCMolLC7od~mhnYdCayNqYgmKBqhA2dXCEuVWhvwW8eEw0ADbkSCRrsbgehCum-qhfWosHDdwIQnB4izi-Afimo75G4vpBHQ4RK2-W3Rpw0UHLi7H5VKPwJDLFrqYkUicQF2vfKDr07TUMegpChTmgOPA2CHF7PAKMEaUDgKPtphfy2qvwZtTA~mwMZHfINGgYME243yvUbgXDIYJ5qddfxeOygQDlCmvS9mOyvUP5~0D9xpmCe~ZuYxbqnm2HRWTPp7Q1acAnoQTdA__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"research_interests":[{"id":261,"name":"Geography","url":"https://www.academia.edu/Documents/in/Geography"}],"urls":[]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") if (false) { Aedu.setUpFigureCarousel('profile-work-87348779-figures'); } }); </script> </div><div class="profile--tab_content_container js-tab-pane tab-pane" data-section-id="13822504" id="books"><div class="js-work-strip profile--work_container" data-work-id="69384214"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/69384214/East_African_Cybersecurity_Improving_Microfinance_Database_in_Ethiopia"><img alt="Research paper thumbnail of East African Cybersecurity: Improving Microfinance Database in Ethiopia" class="work-thumbnail" src="https://attachments.academia-assets.com/79502805/thumbnails/1.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/69384214/East_African_Cybersecurity_Improving_Microfinance_Database_in_Ethiopia">East African Cybersecurity: Improving Microfinance Database in Ethiopia</a></div><div class="wp-workCard_item wp-workCard--coauthors"><span>by </span><span><a class="" data-click-track="profile-work-strip-authors" href="https://iit.academia.edu/MauriceDawson">Maurice Dawson</a> and <a class="" data-click-track="profile-work-strip-authors" href="https://captechu.academia.edu/AndreasVassilakos">Andreas Vassilakos</a></span></div><div class="wp-workCard_item"><span>Cybersecurity Capabilities in Developing Nations and Its Impact on Global Security</span><span>, 2022</span></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">ICT has become an essential factor in Ethiopia and other East African countries to transform thei...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">ICT has become an essential factor in Ethiopia and other East African countries to transform their economies. Meanwhile, the agriculture sector is still the primary driver of economic development. The difference between the past and present years is the injection of technology to further drive this business. For Ethiopia, this means using a database to support countrywide micro-financing to farmers in seeking capital for leasing land, purchasing needed materials, and hiring workers. The objectives of this chapter were to redesign and harden the database architecture of the researched micro-financing organization. The researchers performed an assessment of the organization&#39;s information systems. After identifying weaknesses, they followed controls identified in the NIST SP 800-53. This chapter describes the security faults within the database, showing the lack of baseline cybersecurity controls to ensure a hardened system. The authors proposed a security-centered database architecture after auditing the researched organization&#39;s IT infrastructure and information systems.</span></div><div class="wp-workCard_item"><div class="carousel-container carousel-container--sm" id="profile-work-69384214-figures"><div class="prev-slide-container js-prev-button-container"><button aria-label="Previous" class="carousel-navigation-button js-profile-work-69384214-figures-prev"><span class="material-symbols-outlined" style="font-size: 24px" translate="no">arrow_back_ios</span></button></div><div class="slides-container js-slides-container"><figure class="figure-slide-container"><a href="https://www.academia.edu/figures/30289241/figure-1-current-enterprise-database-architecture-source"><img alt="Figure I. Current enterprise database architecture Source: Author’s illustration " class="figure-slide-image" src="https://figures.academia-assets.com/79502805/figure_001.jpg" /></a></figure><figure class="figure-slide-container"><a href="https://www.academia.edu/figures/30289251/figure-2-proposed-low-level-database-architecture-source"><img alt="Figure 2. Proposed low level database architecture Source: Author’s illustration is an open-source solution for data encryption. It provides the users with different options, including creating a virtual encrypted disk within a file and encrypta partition or the entire storage device with pre-boot authentication. The solution proposed for USB data encryption was cryptsetup. This solution was deemed appropriate due to being a rigid encryption tool that is open-source and would not create further financial burdens for the organization. " class="figure-slide-image" src="https://figures.academia-assets.com/79502805/figure_002.jpg" /></a></figure></div><div class="next-slide-container js-next-button-container"><button aria-label="Next" class="carousel-navigation-button js-profile-work-69384214-figures-next"><span class="material-symbols-outlined" style="font-size: 24px" translate="no">arrow_forward_ios</span></button></div></div></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><a id="fb5681372a0c51375ee42274463f7d8e" class="wp-workCard--action" rel="nofollow" data-click-track="profile-work-strip-download" data-download="{&quot;attachment_id&quot;:79502805,&quot;asset_id&quot;:69384214,&quot;asset_type&quot;:&quot;Work&quot;,&quot;button_location&quot;:&quot;profile&quot;}" href="https://www.academia.edu/attachments/79502805/download_file?s=profile"><span><i class="fa fa-arrow-down"></i></span><span>Download</span></a><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="69384214"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="69384214"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 69384214; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=69384214]").text(description); $(".js-view-count[data-work-id=69384214]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 69384214; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='69384214']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-a9bf3a2bc8c89fa2a77156577594264ee8a0f214d74241bc0fcd3f69f8d107ac.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (true){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "fb5681372a0c51375ee42274463f7d8e" } } $('.js-work-strip[data-work-id=69384214]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":69384214,"title":"East African Cybersecurity: Improving Microfinance Database in Ethiopia","translated_title":"","metadata":{"doi":"10.4018/978-1-7998-8693-8","abstract":"ICT has become an essential factor in Ethiopia and other East African countries to transform their economies. Meanwhile, the agriculture sector is still the primary driver of economic development. The difference between the past and present years is the injection of technology to further drive this business. For Ethiopia, this means using a database to support countrywide micro-financing to farmers in seeking capital for leasing land, purchasing needed materials, and hiring workers. The objectives of this chapter were to redesign and harden the database architecture of the researched micro-financing organization. The researchers performed an assessment of the organization's information systems. After identifying weaknesses, they followed controls identified in the NIST SP 800-53. This chapter describes the security faults within the database, showing the lack of baseline cybersecurity controls to ensure a hardened system. The authors proposed a security-centered database architecture after auditing the researched organization's IT infrastructure and information systems.","ai_title_tag":"Enhancing Cybersecurity for Ethiopia's Microfinance Database","publication_date":{"day":null,"month":null,"year":2022,"errors":{}},"publication_name":"Cybersecurity Capabilities in Developing Nations and Its Impact on Global Security"},"translated_abstract":"ICT has become an essential factor in Ethiopia and other East African countries to transform their economies. Meanwhile, the agriculture sector is still the primary driver of economic development. The difference between the past and present years is the injection of technology to further drive this business. For Ethiopia, this means using a database to support countrywide micro-financing to farmers in seeking capital for leasing land, purchasing needed materials, and hiring workers. The objectives of this chapter were to redesign and harden the database architecture of the researched micro-financing organization. The researchers performed an assessment of the organization's information systems. After identifying weaknesses, they followed controls identified in the NIST SP 800-53. This chapter describes the security faults within the database, showing the lack of baseline cybersecurity controls to ensure a hardened system. The authors proposed a security-centered database architecture after auditing the researched organization's IT infrastructure and information systems.","internal_url":"https://www.academia.edu/69384214/East_African_Cybersecurity_Improving_Microfinance_Database_in_Ethiopia","translated_internal_url":"","created_at":"2022-01-24T15:34:19.042-08:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":82613518,"coauthors_can_edit":true,"document_type":"book","co_author_tags":[{"id":37542292,"work_id":69384214,"tagging_user_id":82613518,"tagged_user_id":412630,"co_author_invite_id":null,"email":"4***9@ufp.edu.pt","affiliation":"Illinois Institute of Technology","display_order":1,"name":"Maurice Dawson","title":"East African Cybersecurity: Improving Microfinance Database in Ethiopia"},{"id":37542293,"work_id":69384214,"tagging_user_id":82613518,"tagged_user_id":156316374,"co_author_invite_id":null,"email":"d***g@gmail.com","display_order":2,"name":"Damon Walker","title":"East African Cybersecurity: Improving Microfinance Database in Ethiopia"},{"id":37542294,"work_id":69384214,"tagging_user_id":82613518,"tagged_user_id":157067885,"co_author_invite_id":null,"email":"a***s@gmail.com","affiliation":"Capitol Technology University","display_order":3,"name":"Andreas Vassilakos","title":"East African Cybersecurity: Improving Microfinance Database in Ethiopia"},{"id":37542295,"work_id":69384214,"tagging_user_id":82613518,"tagged_user_id":193688822,"co_author_invite_id":null,"email":"h***y@hawk.iit.edu","display_order":4,"name":"Harshini Chellasamy","title":"East African Cybersecurity: Improving Microfinance Database in Ethiopia"},{"id":37542296,"work_id":69384214,"tagging_user_id":82613518,"tagged_user_id":null,"co_author_invite_id":7428564,"email":"t***r@gmail.com","display_order":5,"name":"Tenance Setor","title":"East African Cybersecurity: Improving Microfinance Database in Ethiopia"}],"downloadable_attachments":[{"id":79502805,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/79502805/thumbnails/1.jpg","file_name":"East_African_Cybersecurity_Improving_Microfinance_Database_in_Ethiopia.pdf","download_url":"https://www.academia.edu/attachments/79502805/download_file","bulk_download_file_name":"East_African_Cybersecurity_Improving_Mic.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/79502805/East_African_Cybersecurity_Improving_Microfinance_Database_in_Ethiopia-libre.pdf?1643070675=\u0026response-content-disposition=attachment%3B+filename%3DEast_African_Cybersecurity_Improving_Mic.pdf\u0026Expires=1743223499\u0026Signature=Pr8CwfMtR0mhgmB6Ztctozfz6IwqLEi5qODfxm91n58vIAPdq-oEIJiqU0YqdqXmiPKrcT3F143O3TNOOkHh8JEtdyBjaNWm0C6r1B~rSe9RysNF7rmxfdlTLVx-LlTCDJSMqpumYxa-QAXxqWTlyYKVAmGQp9B1ShFP80JOj7BSvemV0gpE3Sbpu4TYlEKn1FjjROqMMMdlDgtyy0jMeL2MOJXhVHc819EO5U2CccgfV40gSHGWNdt291c5SIHFthDTMlskBhlq9YMYCaLgec93kIwe7eFSIt3xAZgzhhUjKb9cBBGxapK1QB~hpWOvvnpSfnv3wsPU-k4PbIFwoA__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"slug":"East_African_Cybersecurity_Improving_Microfinance_Database_in_Ethiopia","translated_slug":"","page_count":14,"language":"en","content_type":"Work","summary":"ICT has become an essential factor in Ethiopia and other East African countries to transform their economies. Meanwhile, the agriculture sector is still the primary driver of economic development. The difference between the past and present years is the injection of technology to further drive this business. For Ethiopia, this means using a database to support countrywide micro-financing to farmers in seeking capital for leasing land, purchasing needed materials, and hiring workers. The objectives of this chapter were to redesign and harden the database architecture of the researched micro-financing organization. The researchers performed an assessment of the organization's information systems. After identifying weaknesses, they followed controls identified in the NIST SP 800-53. This chapter describes the security faults within the database, showing the lack of baseline cybersecurity controls to ensure a hardened system. The authors proposed a security-centered database architecture after auditing the researched organization's IT infrastructure and information systems.","owner":{"id":82613518,"first_name":"Maurice","middle_initials":null,"last_name":"Dawson","page_name":"MauriceDawson","domain_name":"iit","created_at":"2018-06-06T13:08:54.103-07:00","display_name":"Maurice Dawson","url":"https://iit.academia.edu/MauriceDawson"},"attachments":[{"id":79502805,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/79502805/thumbnails/1.jpg","file_name":"East_African_Cybersecurity_Improving_Microfinance_Database_in_Ethiopia.pdf","download_url":"https://www.academia.edu/attachments/79502805/download_file","bulk_download_file_name":"East_African_Cybersecurity_Improving_Mic.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/79502805/East_African_Cybersecurity_Improving_Microfinance_Database_in_Ethiopia-libre.pdf?1643070675=\u0026response-content-disposition=attachment%3B+filename%3DEast_African_Cybersecurity_Improving_Mic.pdf\u0026Expires=1743223499\u0026Signature=Pr8CwfMtR0mhgmB6Ztctozfz6IwqLEi5qODfxm91n58vIAPdq-oEIJiqU0YqdqXmiPKrcT3F143O3TNOOkHh8JEtdyBjaNWm0C6r1B~rSe9RysNF7rmxfdlTLVx-LlTCDJSMqpumYxa-QAXxqWTlyYKVAmGQp9B1ShFP80JOj7BSvemV0gpE3Sbpu4TYlEKn1FjjROqMMMdlDgtyy0jMeL2MOJXhVHc819EO5U2CccgfV40gSHGWNdt291c5SIHFthDTMlskBhlq9YMYCaLgec93kIwe7eFSIt3xAZgzhhUjKb9cBBGxapK1QB~hpWOvvnpSfnv3wsPU-k4PbIFwoA__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"research_interests":[{"id":379,"name":"African Studies","url":"https://www.academia.edu/Documents/in/African_Studies"},{"id":422,"name":"Computer Science","url":"https://www.academia.edu/Documents/in/Computer_Science"},{"id":491,"name":"Information Technology","url":"https://www.academia.edu/Documents/in/Information_Technology"},{"id":2015,"name":"Middle East Studies","url":"https://www.academia.edu/Documents/in/Middle_East_Studies"},{"id":9569,"name":"Saudi Arabia","url":"https://www.academia.edu/Documents/in/Saudi_Arabia"},{"id":21318,"name":"Nigeria","url":"https://www.academia.edu/Documents/in/Nigeria"},{"id":21361,"name":"Ethiopia","url":"https://www.academia.edu/Documents/in/Ethiopia"},{"id":61866,"name":"South Africa","url":"https://www.academia.edu/Documents/in/South_Africa"},{"id":115676,"name":"Cyber Security","url":"https://www.academia.edu/Documents/in/Cyber_Security"},{"id":126131,"name":"Egyptian Politics","url":"https://www.academia.edu/Documents/in/Egyptian_Politics"}],"urls":[]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") if (true) { Aedu.setUpFigureCarousel('profile-work-69384214-figures'); } }); </script> </div><div class="profile--tab_content_container js-tab-pane tab-pane" data-section-id="13953208" id="papers"><div class="js-work-strip profile--work_container" data-work-id="104772306"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/104772306/A_REVIEW_OF_ENHANCING_INTRUSION_DETECTION_SYSTEMS_FOR_CYBERSECURITY_USING_ARTIFICIAL_INTELLIGENCE_AI"><img alt="Research paper thumbnail of A REVIEW OF ENHANCING INTRUSION DETECTION SYSTEMS FOR CYBERSECURITY USING ARTIFICIAL INTELLIGENCE (AI" class="work-thumbnail" src="https://attachments.academia-assets.com/104411841/thumbnails/1.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/104772306/A_REVIEW_OF_ENHANCING_INTRUSION_DETECTION_SYSTEMS_FOR_CYBERSECURITY_USING_ARTIFICIAL_INTELLIGENCE_AI">A REVIEW OF ENHANCING INTRUSION DETECTION SYSTEMS FOR CYBERSECURITY USING ARTIFICIAL INTELLIGENCE (AI</a></div><div class="wp-workCard_item wp-workCard--coauthors"><span>by </span><span><a class="" data-click-track="profile-work-strip-authors" href="https://iit.academia.edu/MichalMarkevych">Michal Markevych</a> and <a class="" data-click-track="profile-work-strip-authors" href="https://iit.academia.edu/MauriceDawson">Maurice Dawson</a></span></div><div class="wp-workCard_item"><span>International conference KNOWLEDGE-BASED ORGANIZATION</span><span>, 2023</span></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">The escalating complexity of cyber attacks demands innovative intrusion detection systems (IDS) t...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">The escalating complexity of cyber attacks demands innovative intrusion detection systems (IDS) to safeguard critical assets and data. The study aims to explore the potential of Artificial Intelligence (AI) in enhancing the IDS&#39;s ability to identify and classify network traffic and detect anomalous behavior. The paper offers a concise overview of IDS and AI and examines the existing literature on the subject, highlighting the significance of integrating advanced language models for cybersecurity enhancement. The research outlines the methodology employed to assess the efficacy of AI within IDS. Furthermore, the study considers key performance metrics such as detection accuracy, false positive rate, and response time to ensure a comprehensive evaluation. Findings indicate that AI is a valuable asset in enhancing the accuracy of AI for detecting and responding to cyber attacks. Nonetheless, the study also brings to light certain limitations and challenges associated with incorporating AI into IDS, such as computational complexity and potential biases in training data. This research emphasizes the potential of advanced language models like ChatGPT in augmenting cybersecurity solutions and offers insights into overcoming associated challenges for a more robust and effective defense against sophisticated cyber attacks.</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><a id="0682e6ea6601df197b6ac8466234fff4" class="wp-workCard--action" rel="nofollow" data-click-track="profile-work-strip-download" data-download="{&quot;attachment_id&quot;:104411841,&quot;asset_id&quot;:104772306,&quot;asset_type&quot;:&quot;Work&quot;,&quot;button_location&quot;:&quot;profile&quot;}" href="https://www.academia.edu/attachments/104411841/download_file?s=profile"><span><i class="fa fa-arrow-down"></i></span><span>Download</span></a><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="104772306"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="104772306"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 104772306; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=104772306]").text(description); $(".js-view-count[data-work-id=104772306]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 104772306; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='104772306']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-a9bf3a2bc8c89fa2a77156577594264ee8a0f214d74241bc0fcd3f69f8d107ac.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (true){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "0682e6ea6601df197b6ac8466234fff4" } } $('.js-work-strip[data-work-id=104772306]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":104772306,"title":"A REVIEW OF ENHANCING INTRUSION DETECTION SYSTEMS FOR CYBERSECURITY USING ARTIFICIAL INTELLIGENCE (AI","translated_title":"","metadata":{"doi":"10.2478/kbo-2023-0072","abstract":"The escalating complexity of cyber attacks demands innovative intrusion detection systems (IDS) to safeguard critical assets and data. The study aims to explore the potential of Artificial Intelligence (AI) in enhancing the IDS's ability to identify and classify network traffic and detect anomalous behavior. The paper offers a concise overview of IDS and AI and examines the existing literature on the subject, highlighting the significance of integrating advanced language models for cybersecurity enhancement. The research outlines the methodology employed to assess the efficacy of AI within IDS. Furthermore, the study considers key performance metrics such as detection accuracy, false positive rate, and response time to ensure a comprehensive evaluation. Findings indicate that AI is a valuable asset in enhancing the accuracy of AI for detecting and responding to cyber attacks. Nonetheless, the study also brings to light certain limitations and challenges associated with incorporating AI into IDS, such as computational complexity and potential biases in training data. This research emphasizes the potential of advanced language models like ChatGPT in augmenting cybersecurity solutions and offers insights into overcoming associated challenges for a more robust and effective defense against sophisticated cyber attacks.","ai_title_tag":"Enhancing Cybersecurity Intrusion Detection with AI Techniques","publication_date":{"day":null,"month":null,"year":2023,"errors":{}},"publication_name":"International conference KNOWLEDGE-BASED ORGANIZATION"},"translated_abstract":"The escalating complexity of cyber attacks demands innovative intrusion detection systems (IDS) to safeguard critical assets and data. The study aims to explore the potential of Artificial Intelligence (AI) in enhancing the IDS's ability to identify and classify network traffic and detect anomalous behavior. The paper offers a concise overview of IDS and AI and examines the existing literature on the subject, highlighting the significance of integrating advanced language models for cybersecurity enhancement. The research outlines the methodology employed to assess the efficacy of AI within IDS. Furthermore, the study considers key performance metrics such as detection accuracy, false positive rate, and response time to ensure a comprehensive evaluation. Findings indicate that AI is a valuable asset in enhancing the accuracy of AI for detecting and responding to cyber attacks. Nonetheless, the study also brings to light certain limitations and challenges associated with incorporating AI into IDS, such as computational complexity and potential biases in training data. This research emphasizes the potential of advanced language models like ChatGPT in augmenting cybersecurity solutions and offers insights into overcoming associated challenges for a more robust and effective defense against sophisticated cyber attacks.","internal_url":"https://www.academia.edu/104772306/A_REVIEW_OF_ENHANCING_INTRUSION_DETECTION_SYSTEMS_FOR_CYBERSECURITY_USING_ARTIFICIAL_INTELLIGENCE_AI","translated_internal_url":"","created_at":"2023-07-20T15:10:02.296-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":82613518,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[{"id":40131222,"work_id":104772306,"tagging_user_id":82613518,"tagged_user_id":143913923,"co_author_invite_id":null,"email":"m***h@hawk.iit.edu","affiliation":"Illinois Institute of Technology","display_order":-2,"name":"Michal Markevych","title":"A REVIEW OF ENHANCING INTRUSION DETECTION SYSTEMS FOR CYBERSECURITY USING ARTIFICIAL INTELLIGENCE (AI"},{"id":40131223,"work_id":104772306,"tagging_user_id":82613518,"tagged_user_id":412630,"co_author_invite_id":null,"email":"4***9@ufp.edu.pt","affiliation":"Illinois Institute of Technology","display_order":-1,"name":"Maurice Dawson","title":"A REVIEW OF ENHANCING INTRUSION DETECTION SYSTEMS FOR CYBERSECURITY USING ARTIFICIAL INTELLIGENCE (AI"}],"downloadable_attachments":[{"id":104411841,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/104411841/thumbnails/1.jpg","file_name":"10.2478_kbo_2023_0072.pdf","download_url":"https://www.academia.edu/attachments/104411841/download_file","bulk_download_file_name":"A_REVIEW_OF_ENHANCING_INTRUSION_DETECTIO.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/104411841/10.2478_kbo_2023_0072-libre.pdf?1689891625=\u0026response-content-disposition=attachment%3B+filename%3DA_REVIEW_OF_ENHANCING_INTRUSION_DETECTIO.pdf\u0026Expires=1743223499\u0026Signature=QuncTUlSLt1AKk7rvn~VU-UIpxLO5yf5u3x1~514juyNNVhgfB1~SFWK-uN9uISuzzyQCihO3CbF-XIXtPRQfWTFDhuvzZu6rZc~TyX6ARsXFurREha0v7KQJCZeCzmILb~c06VO9LvGJBAGqdychmAVPfq124NJagZiCcfIO7lr~-RLTBFE9RNfTrWAux7Rw9KF~-eM9plQ2ADC26xbEDr6tnQfY~Ixg58~bNdp8mNfj1H~x5QGpA68~0VGUp7a3uewxhtmV2O3HH2mtkQSzZ5B69IOOne8MQiM0YNysKiDL7~7DE5bD7JpfLAGxgX77WxiRmaJcAdx8nyUzxkdlQ__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"slug":"A_REVIEW_OF_ENHANCING_INTRUSION_DETECTION_SYSTEMS_FOR_CYBERSECURITY_USING_ARTIFICIAL_INTELLIGENCE_AI","translated_slug":"","page_count":8,"language":"en","content_type":"Work","summary":"The escalating complexity of cyber attacks demands innovative intrusion detection systems (IDS) to safeguard critical assets and data. The study aims to explore the potential of Artificial Intelligence (AI) in enhancing the IDS's ability to identify and classify network traffic and detect anomalous behavior. The paper offers a concise overview of IDS and AI and examines the existing literature on the subject, highlighting the significance of integrating advanced language models for cybersecurity enhancement. The research outlines the methodology employed to assess the efficacy of AI within IDS. Furthermore, the study considers key performance metrics such as detection accuracy, false positive rate, and response time to ensure a comprehensive evaluation. Findings indicate that AI is a valuable asset in enhancing the accuracy of AI for detecting and responding to cyber attacks. Nonetheless, the study also brings to light certain limitations and challenges associated with incorporating AI into IDS, such as computational complexity and potential biases in training data. This research emphasizes the potential of advanced language models like ChatGPT in augmenting cybersecurity solutions and offers insights into overcoming associated challenges for a more robust and effective defense against sophisticated cyber attacks.","owner":{"id":82613518,"first_name":"Maurice","middle_initials":null,"last_name":"Dawson","page_name":"MauriceDawson","domain_name":"iit","created_at":"2018-06-06T13:08:54.103-07:00","display_name":"Maurice Dawson","url":"https://iit.academia.edu/MauriceDawson"},"attachments":[{"id":104411841,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/104411841/thumbnails/1.jpg","file_name":"10.2478_kbo_2023_0072.pdf","download_url":"https://www.academia.edu/attachments/104411841/download_file","bulk_download_file_name":"A_REVIEW_OF_ENHANCING_INTRUSION_DETECTIO.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/104411841/10.2478_kbo_2023_0072-libre.pdf?1689891625=\u0026response-content-disposition=attachment%3B+filename%3DA_REVIEW_OF_ENHANCING_INTRUSION_DETECTIO.pdf\u0026Expires=1743223499\u0026Signature=QuncTUlSLt1AKk7rvn~VU-UIpxLO5yf5u3x1~514juyNNVhgfB1~SFWK-uN9uISuzzyQCihO3CbF-XIXtPRQfWTFDhuvzZu6rZc~TyX6ARsXFurREha0v7KQJCZeCzmILb~c06VO9LvGJBAGqdychmAVPfq124NJagZiCcfIO7lr~-RLTBFE9RNfTrWAux7Rw9KF~-eM9plQ2ADC26xbEDr6tnQfY~Ixg58~bNdp8mNfj1H~x5QGpA68~0VGUp7a3uewxhtmV2O3HH2mtkQSzZ5B69IOOne8MQiM0YNysKiDL7~7DE5bD7JpfLAGxgX77WxiRmaJcAdx8nyUzxkdlQ__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"research_interests":[{"id":465,"name":"Artificial Intelligence","url":"https://www.academia.edu/Documents/in/Artificial_Intelligence"},{"id":2511,"name":"Cybercrimes","url":"https://www.academia.edu/Documents/in/Cybercrimes"},{"id":4252,"name":"Computer Networks","url":"https://www.academia.edu/Documents/in/Computer_Networks"},{"id":11336,"name":"Cyber Terrorism","url":"https://www.academia.edu/Documents/in/Cyber_Terrorism"},{"id":20594,"name":"Cyber crime","url":"https://www.academia.edu/Documents/in/Cyber_crime"},{"id":20641,"name":"Future of artificial intelligence","url":"https://www.academia.edu/Documents/in/Future_of_artificial_intelligence"},{"id":74262,"name":"Philosophy of Artificial Intelligence","url":"https://www.academia.edu/Documents/in/Philosophy_of_Artificial_Intelligence"},{"id":78800,"name":"IDS","url":"https://www.academia.edu/Documents/in/IDS"},{"id":115676,"name":"Cyber Security","url":"https://www.academia.edu/Documents/in/Cyber_Security"},{"id":119822,"name":"Intrusion Detection Systems (IDSs)","url":"https://www.academia.edu/Documents/in/Intrusion_Detection_Systems_IDSs_"},{"id":428536,"name":"Intrusion detection system (IDS)","url":"https://www.academia.edu/Documents/in/Intrusion_detection_system_IDS_"},{"id":685702,"name":"Intrusion Detection System in public Clouds - IDSaaS","url":"https://www.academia.edu/Documents/in/Intrusion_Detection_System_in_public_Clouds_-_IDSaaS"}],"urls":[]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") if (false) { Aedu.setUpFigureCarousel('profile-work-104772306-figures'); } }); </script> <div class="js-work-strip profile--work_container" data-work-id="104772302"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" rel="nofollow" href="https://www.academia.edu/104772302/Exploring_Holistic_Managerial_Thinking_to_Better_Manage_Healthcare_Cybersecurity"><img alt="Research paper thumbnail of Exploring Holistic Managerial Thinking to Better Manage Healthcare Cybersecurity" class="work-thumbnail" src="https://a.academia-assets.com/images/blank-paper.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title">Exploring Holistic Managerial Thinking to Better Manage Healthcare Cybersecurity</div><div class="wp-workCard_item"><span>International Journal of Health Systems and Translational Medicine</span></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">Healthcare systems in the United States have discovered the massive potential for digital technol...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">Healthcare systems in the United States have discovered the massive potential for digital technology to enhance clinical outcomes and change care delivery (Coventry &amp; Branley, 2018). Technologies range from telemedicine technology providing care remotely, storing electronic health records (EHRs), and devices that deliver medication or monitor health (Coventry &amp; Branley, 2018). There has been a 300% increase in cyberattacks in the healthcare industry (Janofsky, 2019). The increasing cost and threat to cybersecurity, especially amid a global pandemic, highlights organizations&amp;#39; immediate need to utilize system thinking to prevent continuous loss. This research discussion aims to use the literature&amp;#39;s contextual review to examine healthcare cybersecurity organizational behavior through systems thinking lens to explore a holistic managerial thinking to better manage healthcare cybersecurity.</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="104772302"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="104772302"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 104772302; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=104772302]").text(description); $(".js-view-count[data-work-id=104772302]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 104772302; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='104772302']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-a9bf3a2bc8c89fa2a77156577594264ee8a0f214d74241bc0fcd3f69f8d107ac.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (false){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "-1" } } $('.js-work-strip[data-work-id=104772302]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":104772302,"title":"Exploring Holistic Managerial Thinking to Better Manage Healthcare Cybersecurity","translated_title":"","metadata":{"abstract":"Healthcare systems in the United States have discovered the massive potential for digital technology to enhance clinical outcomes and change care delivery (Coventry \u0026 Branley, 2018). Technologies range from telemedicine technology providing care remotely, storing electronic health records (EHRs), and devices that deliver medication or monitor health (Coventry \u0026 Branley, 2018). There has been a 300% increase in cyberattacks in the healthcare industry (Janofsky, 2019). The increasing cost and threat to cybersecurity, especially amid a global pandemic, highlights organizations\u0026#39; immediate need to utilize system thinking to prevent continuous loss. This research discussion aims to use the literature\u0026#39;s contextual review to examine healthcare cybersecurity organizational behavior through systems thinking lens to explore a holistic managerial thinking to better manage healthcare cybersecurity.","publisher":"IGI Global","publication_name":"International Journal of Health Systems and Translational Medicine"},"translated_abstract":"Healthcare systems in the United States have discovered the massive potential for digital technology to enhance clinical outcomes and change care delivery (Coventry \u0026 Branley, 2018). Technologies range from telemedicine technology providing care remotely, storing electronic health records (EHRs), and devices that deliver medication or monitor health (Coventry \u0026 Branley, 2018). There has been a 300% increase in cyberattacks in the healthcare industry (Janofsky, 2019). The increasing cost and threat to cybersecurity, especially amid a global pandemic, highlights organizations\u0026#39; immediate need to utilize system thinking to prevent continuous loss. This research discussion aims to use the literature\u0026#39;s contextual review to examine healthcare cybersecurity organizational behavior through systems thinking lens to explore a holistic managerial thinking to better manage healthcare cybersecurity.","internal_url":"https://www.academia.edu/104772302/Exploring_Holistic_Managerial_Thinking_to_Better_Manage_Healthcare_Cybersecurity","translated_internal_url":"","created_at":"2023-07-20T15:09:36.607-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":82613518,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[],"slug":"Exploring_Holistic_Managerial_Thinking_to_Better_Manage_Healthcare_Cybersecurity","translated_slug":"","page_count":null,"language":"en","content_type":"Work","summary":"Healthcare systems in the United States have discovered the massive potential for digital technology to enhance clinical outcomes and change care delivery (Coventry \u0026 Branley, 2018). Technologies range from telemedicine technology providing care remotely, storing electronic health records (EHRs), and devices that deliver medication or monitor health (Coventry \u0026 Branley, 2018). There has been a 300% increase in cyberattacks in the healthcare industry (Janofsky, 2019). The increasing cost and threat to cybersecurity, especially amid a global pandemic, highlights organizations\u0026#39; immediate need to utilize system thinking to prevent continuous loss. This research discussion aims to use the literature\u0026#39;s contextual review to examine healthcare cybersecurity organizational behavior through systems thinking lens to explore a holistic managerial thinking to better manage healthcare cybersecurity.","owner":{"id":82613518,"first_name":"Maurice","middle_initials":null,"last_name":"Dawson","page_name":"MauriceDawson","domain_name":"iit","created_at":"2018-06-06T13:08:54.103-07:00","display_name":"Maurice Dawson","url":"https://iit.academia.edu/MauriceDawson"},"attachments":[],"research_interests":[{"id":26,"name":"Business","url":"https://www.academia.edu/Documents/in/Business"},{"id":4441,"name":"Health Care","url":"https://www.academia.edu/Documents/in/Health_Care"}],"urls":[{"id":32994822,"url":"https://www.igi-global.com/viewtitle.aspx?TitleId=300337"}]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") if (false) { Aedu.setUpFigureCarousel('profile-work-104772302-figures'); } }); </script> <div class="js-work-strip profile--work_container" data-work-id="104772301"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" rel="nofollow" href="https://www.academia.edu/104772301/Battlefield_Cyberspace"><img alt="Research paper thumbnail of Battlefield Cyberspace" class="work-thumbnail" src="https://a.academia-assets.com/images/blank-paper.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title">Battlefield Cyberspace</div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="104772301"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="104772301"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 104772301; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=104772301]").text(description); $(".js-view-count[data-work-id=104772301]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 104772301; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='104772301']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-a9bf3a2bc8c89fa2a77156577594264ee8a0f214d74241bc0fcd3f69f8d107ac.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (false){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "-1" } } $('.js-work-strip[data-work-id=104772301]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":104772301,"title":"Battlefield Cyberspace","translated_title":"","metadata":{"publisher":"IGI Global"},"translated_abstract":null,"internal_url":"https://www.academia.edu/104772301/Battlefield_Cyberspace","translated_internal_url":"","created_at":"2023-07-20T15:09:36.480-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":82613518,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[],"slug":"Battlefield_Cyberspace","translated_slug":"","page_count":null,"language":"fr","content_type":"Work","summary":null,"owner":{"id":82613518,"first_name":"Maurice","middle_initials":null,"last_name":"Dawson","page_name":"MauriceDawson","domain_name":"iit","created_at":"2018-06-06T13:08:54.103-07:00","display_name":"Maurice Dawson","url":"https://iit.academia.edu/MauriceDawson"},"attachments":[],"research_interests":[{"id":13923,"name":"Computer Security","url":"https://www.academia.edu/Documents/in/Computer_Security"},{"id":30945,"name":"Cyberspace","url":"https://www.academia.edu/Documents/in/Cyberspace"},{"id":406126,"name":"Internet privacy","url":"https://www.academia.edu/Documents/in/Internet_privacy"}],"urls":[]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") if (false) { Aedu.setUpFigureCarousel('profile-work-104772301-figures'); } }); </script> <div class="js-work-strip profile--work_container" data-work-id="104772300"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" rel="nofollow" href="https://www.academia.edu/104772300/Unprepared_for_Cybersecurity_in_Saudi_Arabia_Argument_for_a_Shift_Towards_Cyber_Readiness"><img alt="Research paper thumbnail of Unprepared for Cybersecurity in Saudi Arabia: Argument for a Shift Towards Cyber Readiness" class="work-thumbnail" src="https://a.academia-assets.com/images/blank-paper.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title">Unprepared for Cybersecurity in Saudi Arabia: Argument for a Shift Towards Cyber Readiness</div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="104772300"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="104772300"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 104772300; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=104772300]").text(description); $(".js-view-count[data-work-id=104772300]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 104772300; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='104772300']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-a9bf3a2bc8c89fa2a77156577594264ee8a0f214d74241bc0fcd3f69f8d107ac.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (false){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "-1" } } $('.js-work-strip[data-work-id=104772300]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":104772300,"title":"Unprepared for Cybersecurity in Saudi Arabia: Argument for a Shift Towards Cyber Readiness","translated_title":"","metadata":{"publication_date":{"day":null,"month":null,"year":2019,"errors":{}}},"translated_abstract":null,"internal_url":"https://www.academia.edu/104772300/Unprepared_for_Cybersecurity_in_Saudi_Arabia_Argument_for_a_Shift_Towards_Cyber_Readiness","translated_internal_url":"","created_at":"2023-07-20T15:09:36.373-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":82613518,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[],"slug":"Unprepared_for_Cybersecurity_in_Saudi_Arabia_Argument_for_a_Shift_Towards_Cyber_Readiness","translated_slug":"","page_count":null,"language":"en","content_type":"Work","summary":null,"owner":{"id":82613518,"first_name":"Maurice","middle_initials":null,"last_name":"Dawson","page_name":"MauriceDawson","domain_name":"iit","created_at":"2018-06-06T13:08:54.103-07:00","display_name":"Maurice Dawson","url":"https://iit.academia.edu/MauriceDawson"},"attachments":[],"research_interests":[{"id":4486,"name":"Political Science","url":"https://www.academia.edu/Documents/in/Political_Science"},{"id":13923,"name":"Computer Security","url":"https://www.academia.edu/Documents/in/Computer_Security"}],"urls":[]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") if (false) { Aedu.setUpFigureCarousel('profile-work-104772300-figures'); } }); </script> <div class="js-work-strip profile--work_container" data-work-id="87348859"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/87348859/Framework_for_the_Development_of_Virtual_Labs_for_Industrial_Internet_of_Things_and_Hyperconnected_Systems"><img alt="Research paper thumbnail of Framework for the Development of Virtual Labs for Industrial Internet of Things and Hyperconnected Systems" class="work-thumbnail" src="https://attachments.academia-assets.com/91583139/thumbnails/1.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/87348859/Framework_for_the_Development_of_Virtual_Labs_for_Industrial_Internet_of_Things_and_Hyperconnected_Systems">Framework for the Development of Virtual Labs for Industrial Internet of Things and Hyperconnected Systems</a></div><div class="wp-workCard_item"><span>2019 IEEE Learning With MOOCS (LWMOOCS)</span></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">The purpose of this paper is to provide a framework that allows for the development of a virtual ...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">The purpose of this paper is to provide a framework that allows for the development of a virtual lab that incorporates emerging technologies such as the Industrial Internet of Things and embedded systems while incorporating open source components. The global shortage of talent is a significant concern as organizations continue to embrace and roll out new technologies such as 5G, and Artificial Intelligence. Several countries such as those in developing countries face issues regarding technology use in the classroom. Thus, to provide a learning environment where cybersecurity and information systems concepts can be taught in an exploratory environment.</span></div><div class="wp-workCard_item"><div class="carousel-container carousel-container--sm" id="profile-work-87348859-figures"><div class="prev-slide-container js-prev-button-container"><button aria-label="Previous" class="carousel-navigation-button js-profile-work-87348859-figures-prev"><span class="material-symbols-outlined" style="font-size: 24px" translate="no">arrow_back_ios</span></button></div><div class="slides-container js-slides-container"><figure class="figure-slide-container"><a href="https://www.academia.edu/figures/53562196/figure-1-damage-the-virtual-lab-uses-significant-amount-of"><img alt="damage. The virtual lab uses a significant amount of Open Source Software (OSS) to alleviate costs and allow students to grasps concepts such as review engineering the source code to harden or break. " class="figure-slide-image" src="https://figures.academia-assets.com/91583139/figure_001.jpg" /></a></figure><figure class="figure-slide-container"><a href="https://www.academia.edu/figures/53562205/figure-2-school-of-applied-technology-cybersecurity-lab-the"><img alt="Fig. 2 School of Applied Technology Cybersecurity Lab The system diagram of the School of Applied Technology Cybersecurity Lab (SAT-CL) is shown in Figure 2. Students can access the virtual lab from several computing devices using a remote desktop client. Once students have been authenticated, they are provided a Kali Linux Virtual Machine (VM) from where they can gain access to many systems beyond a router/Domain Name System (DNS) server. The system is scalable, in which it allows for additional components such as servers or images of IoT devices to be added or removed. " class="figure-slide-image" src="https://figures.academia-assets.com/91583139/figure_002.jpg" /></a></figure><figure class="figure-slide-container"><a href="https://www.academia.edu/figures/53562212/figure-3-oracle-virtualbox-networked-environment-in-the"><img alt="Fig. 3Oracle VirtualBox Networked Environment In Fig. 3, the current implementation is shown that runs on any desktop or laptop. The issue with this former implementation is that it depends solely on the end user’s computing environment, such as the Central Processing Unit (CPU), memory, and hard disk space. However, the applications such as the Kali VM and vulnerable web server in Fig. 3 are all found in Fig. 2, which is an expansion of the virtual environment with an ability to manage the complexity of the network. This provides flexibility in what concepts can be taught according to specific laws and guidelines for a particular mission. " class="figure-slide-image" src="https://figures.academia-assets.com/91583139/figure_003.jpg" /></a></figure></div><div class="next-slide-container js-next-button-container"><button aria-label="Next" class="carousel-navigation-button js-profile-work-87348859-figures-next"><span class="material-symbols-outlined" style="font-size: 24px" translate="no">arrow_forward_ios</span></button></div></div></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><a id="511560fd65b3ec9f4714cf965aa14b5d" class="wp-workCard--action" rel="nofollow" data-click-track="profile-work-strip-download" data-download="{&quot;attachment_id&quot;:91583139,&quot;asset_id&quot;:87348859,&quot;asset_type&quot;:&quot;Work&quot;,&quot;button_location&quot;:&quot;profile&quot;}" href="https://www.academia.edu/attachments/91583139/download_file?s=profile"><span><i class="fa fa-arrow-down"></i></span><span>Download</span></a><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="87348859"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="87348859"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 87348859; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=87348859]").text(description); $(".js-view-count[data-work-id=87348859]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 87348859; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='87348859']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-a9bf3a2bc8c89fa2a77156577594264ee8a0f214d74241bc0fcd3f69f8d107ac.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (true){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "511560fd65b3ec9f4714cf965aa14b5d" } } $('.js-work-strip[data-work-id=87348859]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":87348859,"title":"Framework for the Development of Virtual Labs for Industrial Internet of Things and Hyperconnected Systems","translated_title":"","metadata":{"publisher":"IEEE","grobid_abstract":"The purpose of this paper is to provide a framework that allows for the development of a virtual lab that incorporates emerging technologies such as the Industrial Internet of Things and embedded systems while incorporating open source components. The global shortage of talent is a significant concern as organizations continue to embrace and roll out new technologies such as 5G, and Artificial Intelligence. Several countries such as those in developing countries face issues regarding technology use in the classroom. Thus, to provide a learning environment where cybersecurity and information systems concepts can be taught in an exploratory environment.","publication_name":"2019 IEEE Learning With MOOCS (LWMOOCS)","grobid_abstract_attachment_id":91583139},"translated_abstract":null,"internal_url":"https://www.academia.edu/87348859/Framework_for_the_Development_of_Virtual_Labs_for_Industrial_Internet_of_Things_and_Hyperconnected_Systems","translated_internal_url":"","created_at":"2022-09-26T07:42:09.898-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":82613518,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[{"id":91583139,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/91583139/thumbnails/1.jpg","file_name":"download.pdf","download_url":"https://www.academia.edu/attachments/91583139/download_file","bulk_download_file_name":"Framework_for_the_Development_of_Virtual.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/91583139/download-libre.pdf?1664203567=\u0026response-content-disposition=attachment%3B+filename%3DFramework_for_the_Development_of_Virtual.pdf\u0026Expires=1743223499\u0026Signature=g8YnQT45gbsmjCFlqCMg~95x2Oi9znZx6CYIYXe8MynI5AJtwLzSFxTBwTmGs7G6vsQ2-Ye0PNu14yX9cjHc5XPD0iu0yPeKbfVJhbEsOqaAyF6auSuCPHPy44x~UpyM4P6VhCR4Y0mXseMCX02vRvypVNfH6kD5E~m1KEw4ziQXUdKeHszoI5SFtssNLKse3GvzWbzBXSh30YccjuJlFqbIhL-wFN4OXcdtUQurZwYhqapyd9fiwgcgNtvxdm3jUUzCxzwvYysJJMv4fOzpYlrin2Nrob-77NZvVgZVIJVg0Nv8~b6BvH0owyv~1pQkebhOQqOkE0E0bSlBJjU7DQ__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"slug":"Framework_for_the_Development_of_Virtual_Labs_for_Industrial_Internet_of_Things_and_Hyperconnected_Systems","translated_slug":"","page_count":4,"language":"en","content_type":"Work","summary":"The purpose of this paper is to provide a framework that allows for the development of a virtual lab that incorporates emerging technologies such as the Industrial Internet of Things and embedded systems while incorporating open source components. The global shortage of talent is a significant concern as organizations continue to embrace and roll out new technologies such as 5G, and Artificial Intelligence. Several countries such as those in developing countries face issues regarding technology use in the classroom. Thus, to provide a learning environment where cybersecurity and information systems concepts can be taught in an exploratory environment.","owner":{"id":82613518,"first_name":"Maurice","middle_initials":null,"last_name":"Dawson","page_name":"MauriceDawson","domain_name":"iit","created_at":"2018-06-06T13:08:54.103-07:00","display_name":"Maurice Dawson","url":"https://iit.academia.edu/MauriceDawson"},"attachments":[{"id":91583139,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/91583139/thumbnails/1.jpg","file_name":"download.pdf","download_url":"https://www.academia.edu/attachments/91583139/download_file","bulk_download_file_name":"Framework_for_the_Development_of_Virtual.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/91583139/download-libre.pdf?1664203567=\u0026response-content-disposition=attachment%3B+filename%3DFramework_for_the_Development_of_Virtual.pdf\u0026Expires=1743223499\u0026Signature=g8YnQT45gbsmjCFlqCMg~95x2Oi9znZx6CYIYXe8MynI5AJtwLzSFxTBwTmGs7G6vsQ2-Ye0PNu14yX9cjHc5XPD0iu0yPeKbfVJhbEsOqaAyF6auSuCPHPy44x~UpyM4P6VhCR4Y0mXseMCX02vRvypVNfH6kD5E~m1KEw4ziQXUdKeHszoI5SFtssNLKse3GvzWbzBXSh30YccjuJlFqbIhL-wFN4OXcdtUQurZwYhqapyd9fiwgcgNtvxdm3jUUzCxzwvYysJJMv4fOzpYlrin2Nrob-77NZvVgZVIJVg0Nv8~b6BvH0owyv~1pQkebhOQqOkE0E0bSlBJjU7DQ__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"research_interests":[{"id":422,"name":"Computer Science","url":"https://www.academia.edu/Documents/in/Computer_Science"}],"urls":[{"id":24197620,"url":"http://xplorestaging.ieee.org/ielx7/8932638/8939567/08939660.pdf?arnumber=8939660"}]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") if (true) { Aedu.setUpFigureCarousel('profile-work-87348859-figures'); } }); </script> <div class="js-work-strip profile--work_container" data-work-id="87348855"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" rel="nofollow" href="https://www.academia.edu/87348855/Cyber_warfare_threats_and_opportunities"><img alt="Research paper thumbnail of Cyber warfare: threats and opportunities" class="work-thumbnail" src="https://a.academia-assets.com/images/blank-paper.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title">Cyber warfare: threats and opportunities</div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">Relatório apresentado à Universidade Fernando Pessoa como parte dos requisitos para obtenção do t...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">Relatório apresentado à Universidade Fernando Pessoa como parte dos requisitos para obtenção do título de pós-doutoramento em Ciências da InformaçãoCybersecurity has gone through several changes that have presented new challenges in recent years, complicated by the rise of cybercrime and digital warfare. With the introduction of militarizing the space domain, it has become apparent that we must consider multidomain concepts. Thus, the threat landscape has again shifted, and defenders must become knowledgeable about how the cyber domain crosses into maritime, land, air, and space. The traditional thinking of protecting enterprise systems locked away in a building is no longer. Thus, we have the emergence of cyber warfare and cyber as a fifth domain that brings together maritime, land, space, and air. These domains are not just for the military but the civilian sector as well. Understanding the role of cyber and how it can be used to take advantage or secure the remaining domains will...</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="87348855"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="87348855"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 87348855; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=87348855]").text(description); $(".js-view-count[data-work-id=87348855]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 87348855; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='87348855']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-a9bf3a2bc8c89fa2a77156577594264ee8a0f214d74241bc0fcd3f69f8d107ac.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (false){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "-1" } } $('.js-work-strip[data-work-id=87348855]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":87348855,"title":"Cyber warfare: threats and opportunities","translated_title":"","metadata":{"abstract":"Relatório apresentado à Universidade Fernando Pessoa como parte dos requisitos para obtenção do título de pós-doutoramento em Ciências da InformaçãoCybersecurity has gone through several changes that have presented new challenges in recent years, complicated by the rise of cybercrime and digital warfare. With the introduction of militarizing the space domain, it has become apparent that we must consider multidomain concepts. Thus, the threat landscape has again shifted, and defenders must become knowledgeable about how the cyber domain crosses into maritime, land, air, and space. The traditional thinking of protecting enterprise systems locked away in a building is no longer. Thus, we have the emergence of cyber warfare and cyber as a fifth domain that brings together maritime, land, space, and air. These domains are not just for the military but the civilian sector as well. Understanding the role of cyber and how it can be used to take advantage or secure the remaining domains will...","publisher":"[s.n.]","publication_date":{"day":null,"month":null,"year":2021,"errors":{}}},"translated_abstract":"Relatório apresentado à Universidade Fernando Pessoa como parte dos requisitos para obtenção do título de pós-doutoramento em Ciências da InformaçãoCybersecurity has gone through several changes that have presented new challenges in recent years, complicated by the rise of cybercrime and digital warfare. With the introduction of militarizing the space domain, it has become apparent that we must consider multidomain concepts. Thus, the threat landscape has again shifted, and defenders must become knowledgeable about how the cyber domain crosses into maritime, land, air, and space. The traditional thinking of protecting enterprise systems locked away in a building is no longer. Thus, we have the emergence of cyber warfare and cyber as a fifth domain that brings together maritime, land, space, and air. These domains are not just for the military but the civilian sector as well. Understanding the role of cyber and how it can be used to take advantage or secure the remaining domains will...","internal_url":"https://www.academia.edu/87348855/Cyber_warfare_threats_and_opportunities","translated_internal_url":"","created_at":"2022-09-26T07:42:03.969-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":82613518,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[],"slug":"Cyber_warfare_threats_and_opportunities","translated_slug":"","page_count":null,"language":"en","content_type":"Work","summary":"Relatório apresentado à Universidade Fernando Pessoa como parte dos requisitos para obtenção do título de pós-doutoramento em Ciências da InformaçãoCybersecurity has gone through several changes that have presented new challenges in recent years, complicated by the rise of cybercrime and digital warfare. With the introduction of militarizing the space domain, it has become apparent that we must consider multidomain concepts. Thus, the threat landscape has again shifted, and defenders must become knowledgeable about how the cyber domain crosses into maritime, land, air, and space. The traditional thinking of protecting enterprise systems locked away in a building is no longer. Thus, we have the emergence of cyber warfare and cyber as a fifth domain that brings together maritime, land, space, and air. These domains are not just for the military but the civilian sector as well. Understanding the role of cyber and how it can be used to take advantage or secure the remaining domains will...","owner":{"id":82613518,"first_name":"Maurice","middle_initials":null,"last_name":"Dawson","page_name":"MauriceDawson","domain_name":"iit","created_at":"2018-06-06T13:08:54.103-07:00","display_name":"Maurice Dawson","url":"https://iit.academia.edu/MauriceDawson"},"attachments":[],"research_interests":[{"id":422,"name":"Computer Science","url":"https://www.academia.edu/Documents/in/Computer_Science"},{"id":465,"name":"Artificial Intelligence","url":"https://www.academia.edu/Documents/in/Artificial_Intelligence"},{"id":6369,"name":"Human Trafficking","url":"https://www.academia.edu/Documents/in/Human_Trafficking"},{"id":11337,"name":"Cyber Warfare","url":"https://www.academia.edu/Documents/in/Cyber_Warfare"},{"id":12061,"name":"Risk Management","url":"https://www.academia.edu/Documents/in/Risk_Management"},{"id":46738,"name":"Cybersecurity","url":"https://www.academia.edu/Documents/in/Cybersecurity"},{"id":89751,"name":"Cybercrime","url":"https://www.academia.edu/Documents/in/Cybercrime"},{"id":115676,"name":"Cyber Security","url":"https://www.academia.edu/Documents/in/Cyber_Security"},{"id":134575,"name":"Dark Web","url":"https://www.academia.edu/Documents/in/Dark_Web"},{"id":159919,"name":"Disinformation","url":"https://www.academia.edu/Documents/in/Disinformation"},{"id":161403,"name":"Workforce","url":"https://www.academia.edu/Documents/in/Workforce"},{"id":740091,"name":"Cryptocurrency","url":"https://www.academia.edu/Documents/in/Cryptocurrency"},{"id":1572643,"name":"Strategy military science","url":"https://www.academia.edu/Documents/in/Strategy_military_science"}],"urls":[{"id":24197617,"url":"http://hdl.handle.net/10284/9678"}]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") if (false) { Aedu.setUpFigureCarousel('profile-work-87348855-figures'); } }); </script> <div class="js-work-strip profile--work_container" data-work-id="87348848"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" rel="nofollow" href="https://www.academia.edu/87348848/Strengthening_University_Computing_Programs_to_Meet_National_Security_Needs"><img alt="Research paper thumbnail of Strengthening University Computing Programs to Meet National Security Needs" class="work-thumbnail" src="https://a.academia-assets.com/images/blank-paper.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title">Strengthening University Computing Programs to Meet National Security Needs</div><div class="wp-workCard_item"><span>2021 World Engineering Education Forum/Global Engineering Deans Council (WEEF/GEDC)</span><span>, 2021</span></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">In the wake of a pandemic, it has been essential that programs move online quickly while remainin...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">In the wake of a pandemic, it has been essential that programs move online quickly while remaining the same academic rigor as being on the ground. Therefore the cybersecurity coursework and labs were taught entirely online while representing real-world scenarios. The College of Computing at Illinois Institute of Technology has recently been actively creating new partnerships, strengthening their cybersecurity, Information Technology, and other computing programs to meet national security needs. These activities have allowed partnerships with the United States Armed Services, Department of Defense, and numerous industry partners. The newly found focus on national security has provided a different perspective on cybersecurity-related to global events and how it can shape those currently, such as political events.</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="87348848"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="87348848"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 87348848; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=87348848]").text(description); $(".js-view-count[data-work-id=87348848]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 87348848; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='87348848']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-a9bf3a2bc8c89fa2a77156577594264ee8a0f214d74241bc0fcd3f69f8d107ac.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (false){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "-1" } } $('.js-work-strip[data-work-id=87348848]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":87348848,"title":"Strengthening University Computing Programs to Meet National Security Needs","translated_title":"","metadata":{"abstract":"In the wake of a pandemic, it has been essential that programs move online quickly while remaining the same academic rigor as being on the ground. Therefore the cybersecurity coursework and labs were taught entirely online while representing real-world scenarios. The College of Computing at Illinois Institute of Technology has recently been actively creating new partnerships, strengthening their cybersecurity, Information Technology, and other computing programs to meet national security needs. These activities have allowed partnerships with the United States Armed Services, Department of Defense, and numerous industry partners. The newly found focus on national security has provided a different perspective on cybersecurity-related to global events and how it can shape those currently, such as political events.","publisher":"IEEE","publication_date":{"day":null,"month":null,"year":2021,"errors":{}},"publication_name":"2021 World Engineering Education Forum/Global Engineering Deans Council (WEEF/GEDC)"},"translated_abstract":"In the wake of a pandemic, it has been essential that programs move online quickly while remaining the same academic rigor as being on the ground. Therefore the cybersecurity coursework and labs were taught entirely online while representing real-world scenarios. The College of Computing at Illinois Institute of Technology has recently been actively creating new partnerships, strengthening their cybersecurity, Information Technology, and other computing programs to meet national security needs. These activities have allowed partnerships with the United States Armed Services, Department of Defense, and numerous industry partners. The newly found focus on national security has provided a different perspective on cybersecurity-related to global events and how it can shape those currently, such as political events.","internal_url":"https://www.academia.edu/87348848/Strengthening_University_Computing_Programs_to_Meet_National_Security_Needs","translated_internal_url":"","created_at":"2022-09-26T07:41:59.454-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":82613518,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[],"slug":"Strengthening_University_Computing_Programs_to_Meet_National_Security_Needs","translated_slug":"","page_count":null,"language":"en","content_type":"Work","summary":"In the wake of a pandemic, it has been essential that programs move online quickly while remaining the same academic rigor as being on the ground. Therefore the cybersecurity coursework and labs were taught entirely online while representing real-world scenarios. The College of Computing at Illinois Institute of Technology has recently been actively creating new partnerships, strengthening their cybersecurity, Information Technology, and other computing programs to meet national security needs. These activities have allowed partnerships with the United States Armed Services, Department of Defense, and numerous industry partners. The newly found focus on national security has provided a different perspective on cybersecurity-related to global events and how it can shape those currently, such as political events.","owner":{"id":82613518,"first_name":"Maurice","middle_initials":null,"last_name":"Dawson","page_name":"MauriceDawson","domain_name":"iit","created_at":"2018-06-06T13:08:54.103-07:00","display_name":"Maurice Dawson","url":"https://iit.academia.edu/MauriceDawson"},"attachments":[],"research_interests":[{"id":37,"name":"Information Systems","url":"https://www.academia.edu/Documents/in/Information_Systems"},{"id":48,"name":"Engineering","url":"https://www.academia.edu/Documents/in/Engineering"},{"id":422,"name":"Computer Science","url":"https://www.academia.edu/Documents/in/Computer_Science"},{"id":491,"name":"Information Technology","url":"https://www.academia.edu/Documents/in/Information_Technology"},{"id":887,"name":"Teaching and Learning","url":"https://www.academia.edu/Documents/in/Teaching_and_Learning"},{"id":115676,"name":"Cyber Security","url":"https://www.academia.edu/Documents/in/Cyber_Security"},{"id":1198660,"name":"E Learning","url":"https://www.academia.edu/Documents/in/E_Learning-14"}],"urls":[{"id":24197613,"url":"http://xplorestaging.ieee.org/ielx7/9657196/9657159/09657325.pdf?arnumber=9657325"}]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") if (false) { Aedu.setUpFigureCarousel('profile-work-87348848-figures'); } }); </script> <div class="js-work-strip profile--work_container" data-work-id="87348840"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/87348840/Cybercrime_Internet_Driven_Illicit_Activities_and_Behavior"><img alt="Research paper thumbnail of Cybercrime: Internet Driven Illicit Activities and Behavior" class="work-thumbnail" src="https://attachments.academia-assets.com/91583130/thumbnails/1.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/87348840/Cybercrime_Internet_Driven_Illicit_Activities_and_Behavior">Cybercrime: Internet Driven Illicit Activities and Behavior</a></div><div class="wp-workCard_item"><span>Land Forces Academy Review</span><span>, 2020</span></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">Cybercrime affects multiple areas of society with nefarious activities ranging from human traffic...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">Cybercrime affects multiple areas of society with nefarious activities ranging from human trafficking to illegal arms sale. The Internet has allowed some nefarious activities to be revived as others have emerged in this new age. In turn, this has become a national security issue for countries as this requires resources to combat this evolving threat. These activities include undermining legitimate services that provide government services to its citizens, such as passport, national identification, tax services, and more. This paper introduces some of these activities, enabling readers to understand this digital criminal world further.</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><a id="2c7b844961a7b423c2bf0477695e7bda" class="wp-workCard--action" rel="nofollow" data-click-track="profile-work-strip-download" data-download="{&quot;attachment_id&quot;:91583130,&quot;asset_id&quot;:87348840,&quot;asset_type&quot;:&quot;Work&quot;,&quot;button_location&quot;:&quot;profile&quot;}" href="https://www.academia.edu/attachments/91583130/download_file?s=profile"><span><i class="fa fa-arrow-down"></i></span><span>Download</span></a><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="87348840"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="87348840"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 87348840; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=87348840]").text(description); $(".js-view-count[data-work-id=87348840]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 87348840; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='87348840']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-a9bf3a2bc8c89fa2a77156577594264ee8a0f214d74241bc0fcd3f69f8d107ac.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (true){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "2c7b844961a7b423c2bf0477695e7bda" } } $('.js-work-strip[data-work-id=87348840]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":87348840,"title":"Cybercrime: Internet Driven Illicit Activities and Behavior","translated_title":"","metadata":{"abstract":"Cybercrime affects multiple areas of society with nefarious activities ranging from human trafficking to illegal arms sale. The Internet has allowed some nefarious activities to be revived as others have emerged in this new age. In turn, this has become a national security issue for countries as this requires resources to combat this evolving threat. These activities include undermining legitimate services that provide government services to its citizens, such as passport, national identification, tax services, and more. This paper introduces some of these activities, enabling readers to understand this digital criminal world further.","publisher":"Walter de Gruyter GmbH","ai_title_tag":"Cybercrime: New Threats in the Digital Age","publication_date":{"day":null,"month":null,"year":2020,"errors":{}},"publication_name":"Land Forces Academy Review"},"translated_abstract":"Cybercrime affects multiple areas of society with nefarious activities ranging from human trafficking to illegal arms sale. The Internet has allowed some nefarious activities to be revived as others have emerged in this new age. In turn, this has become a national security issue for countries as this requires resources to combat this evolving threat. These activities include undermining legitimate services that provide government services to its citizens, such as passport, national identification, tax services, and more. This paper introduces some of these activities, enabling readers to understand this digital criminal world further.","internal_url":"https://www.academia.edu/87348840/Cybercrime_Internet_Driven_Illicit_Activities_and_Behavior","translated_internal_url":"","created_at":"2022-09-26T07:41:54.902-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":82613518,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[{"id":91583130,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/91583130/thumbnails/1.jpg","file_name":"raft-2020-0043.pdf","download_url":"https://www.academia.edu/attachments/91583130/download_file","bulk_download_file_name":"Cybercrime_Internet_Driven_Illicit_Activ.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/91583130/raft-2020-0043-libre.pdf?1664203446=\u0026response-content-disposition=attachment%3B+filename%3DCybercrime_Internet_Driven_Illicit_Activ.pdf\u0026Expires=1743223500\u0026Signature=S1~iYMMfzVzAPRI8-e6gHlBQDN5ss-AyqRXrCEYDOpfQcL91aVshdi69M7JBO3IXfaNhKJZ4G6Oc91j-X4OKMWdGVeYhPVGicLrcbJSdtaelR95AEcu1-Po0ggxXa7P~YYzuU-V2OcryPGL-eXh6~bdeGHdfuhrXRVFR8Tae1slO4VaIqwspIw3ys-ij6h-YOM~HqOXTq4zEo9ti-ys3sxRI0o2Hyr5kt3UhJQ3k8wzJV7Tjzo7PbR8OUbJydDYLtiLeRwajkMSivmWCiKw1OcRiEnU7XrCINsQ74PC~RW0Hfu3hVUDgygiBfvWmg94qmWJJ9NQVd~Vm4qPhQrH~7w__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"slug":"Cybercrime_Internet_Driven_Illicit_Activities_and_Behavior","translated_slug":"","page_count":7,"language":"en","content_type":"Work","summary":"Cybercrime affects multiple areas of society with nefarious activities ranging from human trafficking to illegal arms sale. The Internet has allowed some nefarious activities to be revived as others have emerged in this new age. In turn, this has become a national security issue for countries as this requires resources to combat this evolving threat. These activities include undermining legitimate services that provide government services to its citizens, such as passport, national identification, tax services, and more. This paper introduces some of these activities, enabling readers to understand this digital criminal world further.","owner":{"id":82613518,"first_name":"Maurice","middle_initials":null,"last_name":"Dawson","page_name":"MauriceDawson","domain_name":"iit","created_at":"2018-06-06T13:08:54.103-07:00","display_name":"Maurice Dawson","url":"https://iit.academia.edu/MauriceDawson"},"attachments":[{"id":91583130,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/91583130/thumbnails/1.jpg","file_name":"raft-2020-0043.pdf","download_url":"https://www.academia.edu/attachments/91583130/download_file","bulk_download_file_name":"Cybercrime_Internet_Driven_Illicit_Activ.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/91583130/raft-2020-0043-libre.pdf?1664203446=\u0026response-content-disposition=attachment%3B+filename%3DCybercrime_Internet_Driven_Illicit_Activ.pdf\u0026Expires=1743223500\u0026Signature=S1~iYMMfzVzAPRI8-e6gHlBQDN5ss-AyqRXrCEYDOpfQcL91aVshdi69M7JBO3IXfaNhKJZ4G6Oc91j-X4OKMWdGVeYhPVGicLrcbJSdtaelR95AEcu1-Po0ggxXa7P~YYzuU-V2OcryPGL-eXh6~bdeGHdfuhrXRVFR8Tae1slO4VaIqwspIw3ys-ij6h-YOM~HqOXTq4zEo9ti-ys3sxRI0o2Hyr5kt3UhJQ3k8wzJV7Tjzo7PbR8OUbJydDYLtiLeRwajkMSivmWCiKw1OcRiEnU7XrCINsQ74PC~RW0Hfu3hVUDgygiBfvWmg94qmWJJ9NQVd~Vm4qPhQrH~7w__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"research_interests":[],"urls":[{"id":24197608,"url":"https://content.sciendo.com/view/journals/raft/25/4/article-p356.xml"}]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") if (false) { Aedu.setUpFigureCarousel('profile-work-87348840-figures'); } }); </script> <div class="js-work-strip profile--work_container" data-work-id="87348830"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/87348830/Information_Technology_Use_in_West_African_Agriculture_challenges_and_opportunities_a_panel_discussion"><img alt="Research paper thumbnail of Information Technology Use in West African Agriculture – challenges and opportunities: a panel discussion" class="work-thumbnail" src="https://attachments.academia-assets.com/91583122/thumbnails/1.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/87348830/Information_Technology_Use_in_West_African_Agriculture_challenges_and_opportunities_a_panel_discussion">Information Technology Use in West African Agriculture – challenges and opportunities: a panel discussion</a></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">Many countries in the Economic Community of West African States (ECOWAS) are using Information Co...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">Many countries in the Economic Community of West African States (ECOWAS) are using Information Communications Technology (ICT) to enhance agriculture development and production. To do this efficiently the John Ogonowski and Doug Bereuter Farmer-to-Farmer Program managed for West Africa by Winrock International has been tasked with providing volunteer assignments to ministries of agriculture. The University of Missouri Saint Louis (UMSL) has entered a partnership with Winrock International to offer upper-level undergraduate and graduate students the opportunity to provide technical assistance to international government entities. In this panel; we discuss findings and opportunities for improvement in Guinea and Senegal as they relate to ICT discovered through the onsite support provided.</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><a id="23120ababe4a3931d807a87ce3d9aab7" class="wp-workCard--action" rel="nofollow" data-click-track="profile-work-strip-download" data-download="{&quot;attachment_id&quot;:91583122,&quot;asset_id&quot;:87348830,&quot;asset_type&quot;:&quot;Work&quot;,&quot;button_location&quot;:&quot;profile&quot;}" href="https://www.academia.edu/attachments/91583122/download_file?s=profile"><span><i class="fa fa-arrow-down"></i></span><span>Download</span></a><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="87348830"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="87348830"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 87348830; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=87348830]").text(description); $(".js-view-count[data-work-id=87348830]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 87348830; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='87348830']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-a9bf3a2bc8c89fa2a77156577594264ee8a0f214d74241bc0fcd3f69f8d107ac.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (true){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "23120ababe4a3931d807a87ce3d9aab7" } } $('.js-work-strip[data-work-id=87348830]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":87348830,"title":"Information Technology Use in West African Agriculture – challenges and opportunities: a panel discussion","translated_title":"","metadata":{"abstract":"Many countries in the Economic Community of West African States (ECOWAS) are using Information Communications Technology (ICT) to enhance agriculture development and production. To do this efficiently the John Ogonowski and Doug Bereuter Farmer-to-Farmer Program managed for West Africa by Winrock International has been tasked with providing volunteer assignments to ministries of agriculture. The University of Missouri Saint Louis (UMSL) has entered a partnership with Winrock International to offer upper-level undergraduate and graduate students the opportunity to provide technical assistance to international government entities. In this panel; we discuss findings and opportunities for improvement in Guinea and Senegal as they relate to ICT discovered through the onsite support provided.","publication_date":{"day":null,"month":null,"year":2018,"errors":{}}},"translated_abstract":"Many countries in the Economic Community of West African States (ECOWAS) are using Information Communications Technology (ICT) to enhance agriculture development and production. To do this efficiently the John Ogonowski and Doug Bereuter Farmer-to-Farmer Program managed for West Africa by Winrock International has been tasked with providing volunteer assignments to ministries of agriculture. The University of Missouri Saint Louis (UMSL) has entered a partnership with Winrock International to offer upper-level undergraduate and graduate students the opportunity to provide technical assistance to international government entities. In this panel; we discuss findings and opportunities for improvement in Guinea and Senegal as they relate to ICT discovered through the onsite support provided.","internal_url":"https://www.academia.edu/87348830/Information_Technology_Use_in_West_African_Agriculture_challenges_and_opportunities_a_panel_discussion","translated_internal_url":"","created_at":"2022-09-26T07:41:49.515-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":82613518,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[{"id":91583122,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/91583122/thumbnails/1.jpg","file_name":"301374966.pdf","download_url":"https://www.academia.edu/attachments/91583122/download_file","bulk_download_file_name":"Information_Technology_Use_in_West_Afric.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/91583122/301374966-libre.pdf?1664203439=\u0026response-content-disposition=attachment%3B+filename%3DInformation_Technology_Use_in_West_Afric.pdf\u0026Expires=1743223500\u0026Signature=VwtqguUBg2IVdDtRQyoh9ibNO06Aby1Hm3-Ai7RlkhZYUArD4dvojR23bBDO-XGe3QkI0wYRY~4k77EiZ~ME1R248BUUkFAwIN5luSAgV0hNBRHGoP5KdFtRL6akMf9p1bnRQfJtgAg5c4z7jBDkoKyf-NjvsW3xGyXhlZ2oM062K6kTwETMsZ8T0HT9XpIUINGk4a~glxwhsTeHdXTmNl5kUS8Tu7IvyMN4x3KbYFRnuMmlnyG5r6O7G63ri~nwfvE-TQA7N0KxuoixRxbJMECcdU~fHucpLGyNzjw3Ls7ojCAmhXWNt6iDonNehAkGsIbuJA0RInB1~GJb76ApHw__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"slug":"Information_Technology_Use_in_West_African_Agriculture_challenges_and_opportunities_a_panel_discussion","translated_slug":"","page_count":3,"language":"en","content_type":"Work","summary":"Many countries in the Economic Community of West African States (ECOWAS) are using Information Communications Technology (ICT) to enhance agriculture development and production. To do this efficiently the John Ogonowski and Doug Bereuter Farmer-to-Farmer Program managed for West Africa by Winrock International has been tasked with providing volunteer assignments to ministries of agriculture. The University of Missouri Saint Louis (UMSL) has entered a partnership with Winrock International to offer upper-level undergraduate and graduate students the opportunity to provide technical assistance to international government entities. In this panel; we discuss findings and opportunities for improvement in Guinea and Senegal as they relate to ICT discovered through the onsite support provided.","owner":{"id":82613518,"first_name":"Maurice","middle_initials":null,"last_name":"Dawson","page_name":"MauriceDawson","domain_name":"iit","created_at":"2018-06-06T13:08:54.103-07:00","display_name":"Maurice Dawson","url":"https://iit.academia.edu/MauriceDawson"},"attachments":[{"id":91583122,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/91583122/thumbnails/1.jpg","file_name":"301374966.pdf","download_url":"https://www.academia.edu/attachments/91583122/download_file","bulk_download_file_name":"Information_Technology_Use_in_West_Afric.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/91583122/301374966-libre.pdf?1664203439=\u0026response-content-disposition=attachment%3B+filename%3DInformation_Technology_Use_in_West_Afric.pdf\u0026Expires=1743223500\u0026Signature=VwtqguUBg2IVdDtRQyoh9ibNO06Aby1Hm3-Ai7RlkhZYUArD4dvojR23bBDO-XGe3QkI0wYRY~4k77EiZ~ME1R248BUUkFAwIN5luSAgV0hNBRHGoP5KdFtRL6akMf9p1bnRQfJtgAg5c4z7jBDkoKyf-NjvsW3xGyXhlZ2oM062K6kTwETMsZ8T0HT9XpIUINGk4a~glxwhsTeHdXTmNl5kUS8Tu7IvyMN4x3KbYFRnuMmlnyG5r6O7G63ri~nwfvE-TQA7N0KxuoixRxbJMECcdU~fHucpLGyNzjw3Ls7ojCAmhXWNt6iDonNehAkGsIbuJA0RInB1~GJb76ApHw__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"research_interests":[{"id":10225,"name":"Agriculture","url":"https://www.academia.edu/Documents/in/Agriculture"},{"id":255627,"name":"Information Communications Technology","url":"https://www.academia.edu/Documents/in/Information_Communications_Technology"}],"urls":[{"id":24197602,"url":"https://aisel.aisnet.org/cgi/viewcontent.cgi?article=1056\u0026context=mwais2018"}]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") if (false) { Aedu.setUpFigureCarousel('profile-work-87348830-figures'); } }); </script> <div class="js-work-strip profile--work_container" data-work-id="87348825"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" rel="nofollow" href="https://www.academia.edu/87348825/Affordable_Mobile_Data_Collection_Platform_and_IT_Training_in_Benin_Analysis_of_Performance_and_Usability"><img alt="Research paper thumbnail of Affordable Mobile Data Collection Platform and IT Training in Benin: Analysis of Performance and Usability" class="work-thumbnail" src="https://a.academia-assets.com/images/blank-paper.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title">Affordable Mobile Data Collection Platform and IT Training in Benin: Analysis of Performance and Usability</div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">This paper provides insights on performance and usability from an assignment funded by the Cathol...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">This paper provides insights on performance and usability from an assignment funded by the Catholic Relief Service Farmer-to-Farmer Program, which provides technical assistance with volunteers from the United States to farmers, agricultural institutions, and government organizations involved in the agricultural sector. The assignment required an affordable mobile data collection solution and IT training in Benin. The researchers developed a platform and provided technical training on-site. This investigation looks at conclusions based on the interpretation of the system usability scale (SUS) results from a representation of 13 cooperators. The research demonstrated the efficiency of the mobile data collection platform, and the training proved to be helpful for the participants. Before the contributions of the researchers, 46.2% of the participants scored at the D level or below. Once training was complete, 76.9% of the participants scored in the range of the B or higher.</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="87348825"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="87348825"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 87348825; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=87348825]").text(description); $(".js-view-count[data-work-id=87348825]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 87348825; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='87348825']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-a9bf3a2bc8c89fa2a77156577594264ee8a0f214d74241bc0fcd3f69f8d107ac.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (false){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "-1" } } $('.js-work-strip[data-work-id=87348825]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":87348825,"title":"Affordable Mobile Data Collection Platform and IT Training in Benin: Analysis of Performance and Usability","translated_title":"","metadata":{"abstract":"This paper provides insights on performance and usability from an assignment funded by the Catholic Relief Service Farmer-to-Farmer Program, which provides technical assistance with volunteers from the United States to farmers, agricultural institutions, and government organizations involved in the agricultural sector. The assignment required an affordable mobile data collection solution and IT training in Benin. The researchers developed a platform and provided technical training on-site. This investigation looks at conclusions based on the interpretation of the system usability scale (SUS) results from a representation of 13 cooperators. The research demonstrated the efficiency of the mobile data collection platform, and the training proved to be helpful for the participants. Before the contributions of the researchers, 46.2% of the participants scored at the D level or below. Once training was complete, 76.9% of the participants scored in the range of the B or higher.","publication_date":{"day":null,"month":null,"year":2020,"errors":{}}},"translated_abstract":"This paper provides insights on performance and usability from an assignment funded by the Catholic Relief Service Farmer-to-Farmer Program, which provides technical assistance with volunteers from the United States to farmers, agricultural institutions, and government organizations involved in the agricultural sector. The assignment required an affordable mobile data collection solution and IT training in Benin. The researchers developed a platform and provided technical training on-site. This investigation looks at conclusions based on the interpretation of the system usability scale (SUS) results from a representation of 13 cooperators. The research demonstrated the efficiency of the mobile data collection platform, and the training proved to be helpful for the participants. Before the contributions of the researchers, 46.2% of the participants scored at the D level or below. Once training was complete, 76.9% of the participants scored in the range of the B or higher.","internal_url":"https://www.academia.edu/87348825/Affordable_Mobile_Data_Collection_Platform_and_IT_Training_in_Benin_Analysis_of_Performance_and_Usability","translated_internal_url":"","created_at":"2022-09-26T07:41:46.091-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":82613518,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[],"slug":"Affordable_Mobile_Data_Collection_Platform_and_IT_Training_in_Benin_Analysis_of_Performance_and_Usability","translated_slug":"","page_count":null,"language":"en","content_type":"Work","summary":"This paper provides insights on performance and usability from an assignment funded by the Catholic Relief Service Farmer-to-Farmer Program, which provides technical assistance with volunteers from the United States to farmers, agricultural institutions, and government organizations involved in the agricultural sector. The assignment required an affordable mobile data collection solution and IT training in Benin. The researchers developed a platform and provided technical training on-site. This investigation looks at conclusions based on the interpretation of the system usability scale (SUS) results from a representation of 13 cooperators. The research demonstrated the efficiency of the mobile data collection platform, and the training proved to be helpful for the participants. Before the contributions of the researchers, 46.2% of the participants scored at the D level or below. Once training was complete, 76.9% of the participants scored in the range of the B or higher.","owner":{"id":82613518,"first_name":"Maurice","middle_initials":null,"last_name":"Dawson","page_name":"MauriceDawson","domain_name":"iit","created_at":"2018-06-06T13:08:54.103-07:00","display_name":"Maurice Dawson","url":"https://iit.academia.edu/MauriceDawson"},"attachments":[],"research_interests":[{"id":422,"name":"Computer Science","url":"https://www.academia.edu/Documents/in/Computer_Science"},{"id":1615,"name":"Usability","url":"https://www.academia.edu/Documents/in/Usability"}],"urls":[]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") if (false) { Aedu.setUpFigureCarousel('profile-work-87348825-figures'); } }); </script> <div class="js-work-strip profile--work_container" data-work-id="87348816"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" rel="nofollow" href="https://www.academia.edu/87348816/Cyber_Security_Architectural_Needs_in_the_Era_of_Internet_of_Things_and_Hyperconnected_Systems"><img alt="Research paper thumbnail of Cyber Security Architectural Needs in the Era of Internet of Things and Hyperconnected Systems" class="work-thumbnail" src="https://a.academia-assets.com/images/blank-paper.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title">Cyber Security Architectural Needs in the Era of Internet of Things and Hyperconnected Systems</div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">The Internet of Things describes a world in which smart technologies enable objects with a networ...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">The Internet of Things describes a world in which smart technologies enable objects with a network to communicate with each other and interface with humans effortlessly. This connected world of convenience and technology does not come without its drawbacks, as interconnectivity implies hackability. This new world of convenience calls for revolutionary protection strategies to reassess security. Risk management concepts and Information Assurance architecture similar to those practiced in the United States Department of Defense should be used as guidelines for cyber security implementation. This new emerging market that is facilitating the exchange of services and goods requires understanding the associated laws for the implementation of an IoT architecture (Weber, 2010).</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="87348816"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="87348816"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 87348816; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=87348816]").text(description); $(".js-view-count[data-work-id=87348816]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 87348816; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='87348816']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-a9bf3a2bc8c89fa2a77156577594264ee8a0f214d74241bc0fcd3f69f8d107ac.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (false){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "-1" } } $('.js-work-strip[data-work-id=87348816]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":87348816,"title":"Cyber Security Architectural Needs in the Era of Internet of Things and Hyperconnected Systems","translated_title":"","metadata":{"abstract":"The Internet of Things describes a world in which smart technologies enable objects with a network to communicate with each other and interface with humans effortlessly. This connected world of convenience and technology does not come without its drawbacks, as interconnectivity implies hackability. This new world of convenience calls for revolutionary protection strategies to reassess security. Risk management concepts and Information Assurance architecture similar to those practiced in the United States Department of Defense should be used as guidelines for cyber security implementation. This new emerging market that is facilitating the exchange of services and goods requires understanding the associated laws for the implementation of an IoT architecture (Weber, 2010).","publication_date":{"day":null,"month":null,"year":2017,"errors":{}}},"translated_abstract":"The Internet of Things describes a world in which smart technologies enable objects with a network to communicate with each other and interface with humans effortlessly. This connected world of convenience and technology does not come without its drawbacks, as interconnectivity implies hackability. This new world of convenience calls for revolutionary protection strategies to reassess security. Risk management concepts and Information Assurance architecture similar to those practiced in the United States Department of Defense should be used as guidelines for cyber security implementation. This new emerging market that is facilitating the exchange of services and goods requires understanding the associated laws for the implementation of an IoT architecture (Weber, 2010).","internal_url":"https://www.academia.edu/87348816/Cyber_Security_Architectural_Needs_in_the_Era_of_Internet_of_Things_and_Hyperconnected_Systems","translated_internal_url":"","created_at":"2022-09-26T07:41:40.550-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":82613518,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[],"slug":"Cyber_Security_Architectural_Needs_in_the_Era_of_Internet_of_Things_and_Hyperconnected_Systems","translated_slug":"","page_count":null,"language":"en","content_type":"Work","summary":"The Internet of Things describes a world in which smart technologies enable objects with a network to communicate with each other and interface with humans effortlessly. This connected world of convenience and technology does not come without its drawbacks, as interconnectivity implies hackability. This new world of convenience calls for revolutionary protection strategies to reassess security. Risk management concepts and Information Assurance architecture similar to those practiced in the United States Department of Defense should be used as guidelines for cyber security implementation. This new emerging market that is facilitating the exchange of services and goods requires understanding the associated laws for the implementation of an IoT architecture (Weber, 2010).","owner":{"id":82613518,"first_name":"Maurice","middle_initials":null,"last_name":"Dawson","page_name":"MauriceDawson","domain_name":"iit","created_at":"2018-06-06T13:08:54.103-07:00","display_name":"Maurice Dawson","url":"https://iit.academia.edu/MauriceDawson"},"attachments":[],"research_interests":[{"id":37,"name":"Information Systems","url":"https://www.academia.edu/Documents/in/Information_Systems"},{"id":422,"name":"Computer Science","url":"https://www.academia.edu/Documents/in/Computer_Science"},{"id":491,"name":"Information Technology","url":"https://www.academia.edu/Documents/in/Information_Technology"},{"id":923,"name":"Technology","url":"https://www.academia.edu/Documents/in/Technology"},{"id":1380,"name":"Computer Engineering","url":"https://www.academia.edu/Documents/in/Computer_Engineering"},{"id":3703,"name":"Network Security","url":"https://www.academia.edu/Documents/in/Network_Security"},{"id":4252,"name":"Computer Networks","url":"https://www.academia.edu/Documents/in/Computer_Networks"},{"id":9135,"name":"The Internet of Things","url":"https://www.academia.edu/Documents/in/The_Internet_of_Things"},{"id":14725,"name":"Internet of Things","url":"https://www.academia.edu/Documents/in/Internet_of_Things"},{"id":30947,"name":"The Internet","url":"https://www.academia.edu/Documents/in/The_Internet"},{"id":115676,"name":"Cyber Security","url":"https://www.academia.edu/Documents/in/Cyber_Security"},{"id":4071813,"name":"Internet Society","url":"https://www.academia.edu/Documents/in/Internet_Society"}],"urls":[{"id":24197593,"url":"https://works.bepress.com/maurice_dawson/53/download/"}]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") if (false) { Aedu.setUpFigureCarousel('profile-work-87348816-figures'); } }); </script> <div class="js-work-strip profile--work_container" data-work-id="87348813"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/87348813/Towards_Crime_Prevention_Using_Big_Data_Analytics_A_Literature_Review_with_an_Explorative_Case_Study"><img alt="Research paper thumbnail of Towards Crime Prevention Using Big Data Analytics: A Literature Review with an Explorative Case Study" class="work-thumbnail" src="https://attachments.academia-assets.com/91583112/thumbnails/1.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/87348813/Towards_Crime_Prevention_Using_Big_Data_Analytics_A_Literature_Review_with_an_Explorative_Case_Study">Towards Crime Prevention Using Big Data Analytics: A Literature Review with an Explorative Case Study</a></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">Since the popularization of the big data concept, it has been implemented in various areas. Conte...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">Since the popularization of the big data concept, it has been implemented in various areas. Contemporary literature has proved the potential of using big data in crime prevention. In this research paper, we examine research on big data being used in Crime Prevention while implementing an author-centric to a concept-centric research approach. We also present the foundation for future research by analyzing data derived from the City of Chicago. We identified the neighborhoods in Chicago that are statistically more prone to crimes and used data of the last 10 years to make our observations. We additionally provide further discussion points for future research purpose.</span></div><div class="wp-workCard_item"><div class="carousel-container carousel-container--sm" id="profile-work-87348813-figures"><div class="prev-slide-container js-prev-button-container"><button aria-label="Previous" class="carousel-navigation-button js-profile-work-87348813-figures-prev"><span class="material-symbols-outlined" style="font-size: 24px" translate="no">arrow_back_ios</span></button></div><div class="slides-container js-slides-container"><figure class="figure-slide-container"><a href="https://www.academia.edu/figures/53108294/figure-1-crime-rate-density-in-chicago-il"><img alt="Figure 1. Crime Rate Density in Chicago, IL " class="figure-slide-image" src="https://figures.academia-assets.com/91583112/figure_001.jpg" /></a></figure><figure class="figure-slide-container"><a href="https://www.academia.edu/figures/53108299/figure-2-primary-crime-type-from-to-in-chicago-il-the-crime"><img alt="Figure 2. Primary Crime Type from 2008 to 2018 in Chicago, IL The crime rate in Chicago from 2008 to 2018 decrease significantly. In 2008 the total number of crime observations we 427,053. The number went down to 264,028 in 2015. Since 2015 it is almost stable ending up by 265,650 in 2018. Figure presents the number of observations per primary crime type by year from 2008 to 2018. " class="figure-slide-image" src="https://figures.academia-assets.com/91583112/figure_002.jpg" /></a></figure><figure class="figure-slide-container"><a href="https://www.academia.edu/figures/53108309/table-1-concept-matrix-of-the-literature-review"><img alt="Table 1. Concept Matrix of the Literature Review " class="figure-slide-image" src="https://figures.academia-assets.com/91583112/table_001.jpg" /></a></figure></div><div class="next-slide-container js-next-button-container"><button aria-label="Next" class="carousel-navigation-button js-profile-work-87348813-figures-next"><span class="material-symbols-outlined" style="font-size: 24px" translate="no">arrow_forward_ios</span></button></div></div></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><a id="fce184aa5f61ec99fb2666ec05a68bd6" class="wp-workCard--action" rel="nofollow" data-click-track="profile-work-strip-download" data-download="{&quot;attachment_id&quot;:91583112,&quot;asset_id&quot;:87348813,&quot;asset_type&quot;:&quot;Work&quot;,&quot;button_location&quot;:&quot;profile&quot;}" href="https://www.academia.edu/attachments/91583112/download_file?s=profile"><span><i class="fa fa-arrow-down"></i></span><span>Download</span></a><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="87348813"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="87348813"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 87348813; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=87348813]").text(description); $(".js-view-count[data-work-id=87348813]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 87348813; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='87348813']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-a9bf3a2bc8c89fa2a77156577594264ee8a0f214d74241bc0fcd3f69f8d107ac.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (true){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "fce184aa5f61ec99fb2666ec05a68bd6" } } $('.js-work-strip[data-work-id=87348813]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":87348813,"title":"Towards Crime Prevention Using Big Data Analytics: A Literature Review with an Explorative Case Study","translated_title":"","metadata":{"abstract":"Since the popularization of the big data concept, it has been implemented in various areas. Contemporary literature has proved the potential of using big data in crime prevention. In this research paper, we examine research on big data being used in Crime Prevention while implementing an author-centric to a concept-centric research approach. We also present the foundation for future research by analyzing data derived from the City of Chicago. We identified the neighborhoods in Chicago that are statistically more prone to crimes and used data of the last 10 years to make our observations. We additionally provide further discussion points for future research purpose.","publication_date":{"day":null,"month":null,"year":2019,"errors":{}}},"translated_abstract":"Since the popularization of the big data concept, it has been implemented in various areas. Contemporary literature has proved the potential of using big data in crime prevention. In this research paper, we examine research on big data being used in Crime Prevention while implementing an author-centric to a concept-centric research approach. We also present the foundation for future research by analyzing data derived from the City of Chicago. We identified the neighborhoods in Chicago that are statistically more prone to crimes and used data of the last 10 years to make our observations. We additionally provide further discussion points for future research purpose.","internal_url":"https://www.academia.edu/87348813/Towards_Crime_Prevention_Using_Big_Data_Analytics_A_Literature_Review_with_an_Explorative_Case_Study","translated_internal_url":"","created_at":"2022-09-26T07:41:35.003-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":82613518,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[{"id":91583112,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/91583112/thumbnails/1.jpg","file_name":"301379711.pdf","download_url":"https://www.academia.edu/attachments/91583112/download_file","bulk_download_file_name":"Towards_Crime_Prevention_Using_Big_Data.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/91583112/301379711-libre.pdf?1664203458=\u0026response-content-disposition=attachment%3B+filename%3DTowards_Crime_Prevention_Using_Big_Data.pdf\u0026Expires=1743223500\u0026Signature=IgIQGEDfz8QuIJ1FOueofmpGjxhmXzjmMUbtPutYhV78EwoqJw4O1bAX03YldU6NpmNu3JeE4uabgHP2B1IEdwcNMgZLpBG82ea2idgAIzDvX3ffWzj6-f4~ZlmySOkcegyjD~NdRjNHUOAYUVlB-2FRDNyTMNEyRqV0mJ9MCdlnKK1mbkFFwdgMkD53RIbj8EiVQ0WRO5BiP2Ucj8QuMRlekU3G-7lIHZ9OvuBdBtHojBKdWZnY7nFxtbdt53NeLTC93DiikxbT4k8RQ6asl-s7IOYXMaA5IMAEhDj9FZ2hstSzKDarj4hQg47PQv2yaaG-UGGwEgeveqWros3n9A__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"slug":"Towards_Crime_Prevention_Using_Big_Data_Analytics_A_Literature_Review_with_an_Explorative_Case_Study","translated_slug":"","page_count":7,"language":"en","content_type":"Work","summary":"Since the popularization of the big data concept, it has been implemented in various areas. Contemporary literature has proved the potential of using big data in crime prevention. In this research paper, we examine research on big data being used in Crime Prevention while implementing an author-centric to a concept-centric research approach. We also present the foundation for future research by analyzing data derived from the City of Chicago. We identified the neighborhoods in Chicago that are statistically more prone to crimes and used data of the last 10 years to make our observations. We additionally provide further discussion points for future research purpose.","owner":{"id":82613518,"first_name":"Maurice","middle_initials":null,"last_name":"Dawson","page_name":"MauriceDawson","domain_name":"iit","created_at":"2018-06-06T13:08:54.103-07:00","display_name":"Maurice Dawson","url":"https://iit.academia.edu/MauriceDawson"},"attachments":[{"id":91583112,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/91583112/thumbnails/1.jpg","file_name":"301379711.pdf","download_url":"https://www.academia.edu/attachments/91583112/download_file","bulk_download_file_name":"Towards_Crime_Prevention_Using_Big_Data.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/91583112/301379711-libre.pdf?1664203458=\u0026response-content-disposition=attachment%3B+filename%3DTowards_Crime_Prevention_Using_Big_Data.pdf\u0026Expires=1743223500\u0026Signature=IgIQGEDfz8QuIJ1FOueofmpGjxhmXzjmMUbtPutYhV78EwoqJw4O1bAX03YldU6NpmNu3JeE4uabgHP2B1IEdwcNMgZLpBG82ea2idgAIzDvX3ffWzj6-f4~ZlmySOkcegyjD~NdRjNHUOAYUVlB-2FRDNyTMNEyRqV0mJ9MCdlnKK1mbkFFwdgMkD53RIbj8EiVQ0WRO5BiP2Ucj8QuMRlekU3G-7lIHZ9OvuBdBtHojBKdWZnY7nFxtbdt53NeLTC93DiikxbT4k8RQ6asl-s7IOYXMaA5IMAEhDj9FZ2hstSzKDarj4hQg47PQv2yaaG-UGGwEgeveqWros3n9A__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"research_interests":[{"id":184,"name":"Sociology","url":"https://www.academia.edu/Documents/in/Sociology"},{"id":492,"name":"Management Information Systems","url":"https://www.academia.edu/Documents/in/Management_Information_Systems"},{"id":27240,"name":"Prevention","url":"https://www.academia.edu/Documents/in/Prevention"},{"id":44293,"name":"Literature Review","url":"https://www.academia.edu/Documents/in/Literature_Review"},{"id":44687,"name":"Analytics","url":"https://www.academia.edu/Documents/in/Analytics"},{"id":67360,"name":"Crime","url":"https://www.academia.edu/Documents/in/Crime"},{"id":69100,"name":"Data Science","url":"https://www.academia.edu/Documents/in/Data_Science"},{"id":96047,"name":"Case Study","url":"https://www.academia.edu/Documents/in/Case_Study"},{"id":126300,"name":"Big Data","url":"https://www.academia.edu/Documents/in/Big_Data"},{"id":289278,"name":"Big Data Analytics","url":"https://www.academia.edu/Documents/in/Big_Data_Analytics"}],"urls":[{"id":24197589,"url":"https://aisel.aisnet.org/cgi/viewcontent.cgi?article=1023\u0026context=mwais2019"}]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") if (true) { Aedu.setUpFigureCarousel('profile-work-87348813-figures'); } }); </script> <div class="js-work-strip profile--work_container" data-work-id="87348807"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/87348807/Understanding_the_Challenge_of_Cybersecurity_in_Critical_Infrastructure_Sectors"><img alt="Research paper thumbnail of Understanding the Challenge of Cybersecurity in Critical Infrastructure Sectors" class="work-thumbnail" src="https://attachments.academia-assets.com/91583107/thumbnails/1.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/87348807/Understanding_the_Challenge_of_Cybersecurity_in_Critical_Infrastructure_Sectors">Understanding the Challenge of Cybersecurity in Critical Infrastructure Sectors</a></div><div class="wp-workCard_item"><span>Land Forces Academy Review</span><span>, 2021</span></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">The cybersecurity of critical infrastructures is an essential topic within national and internati...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">The cybersecurity of critical infrastructures is an essential topic within national and international security as 16 critical infrastructure sectors touch various aspects of American society. Because the failure to provide adequate cybersecurity controls within the critical infrastructure sectors renders the country open to an attack that could have a debilitating effect on security, national public health, safety, and economic security, this matter is so vital that there is the Presidential Policy Directive (PPD) 21 Critical Infrastructure Security and Resilience advances a national policy to strengthen and maintain secure, functioning and resilient critical infrastructure. An organization identified as the Cybersecurity and Infrastructure Security Agency (CISA) at the Department of Homeland Security (DHS) has the mission to be the risk advisor for the United States (US). Other organizations, such as the National Security Agency (NSA), have approved a specific Knowledge Unit (KU) t...</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><a id="44d9d0a491aa5610cdf0b30481bd7e23" class="wp-workCard--action" rel="nofollow" data-click-track="profile-work-strip-download" data-download="{&quot;attachment_id&quot;:91583107,&quot;asset_id&quot;:87348807,&quot;asset_type&quot;:&quot;Work&quot;,&quot;button_location&quot;:&quot;profile&quot;}" href="https://www.academia.edu/attachments/91583107/download_file?s=profile"><span><i class="fa fa-arrow-down"></i></span><span>Download</span></a><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="87348807"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="87348807"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 87348807; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=87348807]").text(description); $(".js-view-count[data-work-id=87348807]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 87348807; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='87348807']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-a9bf3a2bc8c89fa2a77156577594264ee8a0f214d74241bc0fcd3f69f8d107ac.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (true){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "44d9d0a491aa5610cdf0b30481bd7e23" } } $('.js-work-strip[data-work-id=87348807]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":87348807,"title":"Understanding the Challenge of Cybersecurity in Critical Infrastructure Sectors","translated_title":"","metadata":{"abstract":"The cybersecurity of critical infrastructures is an essential topic within national and international security as 16 critical infrastructure sectors touch various aspects of American society. Because the failure to provide adequate cybersecurity controls within the critical infrastructure sectors renders the country open to an attack that could have a debilitating effect on security, national public health, safety, and economic security, this matter is so vital that there is the Presidential Policy Directive (PPD) 21 Critical Infrastructure Security and Resilience advances a national policy to strengthen and maintain secure, functioning and resilient critical infrastructure. An organization identified as the Cybersecurity and Infrastructure Security Agency (CISA) at the Department of Homeland Security (DHS) has the mission to be the risk advisor for the United States (US). Other organizations, such as the National Security Agency (NSA), have approved a specific Knowledge Unit (KU) t...","publisher":"Walter de Gruyter GmbH","publication_date":{"day":null,"month":null,"year":2021,"errors":{}},"publication_name":"Land Forces Academy Review"},"translated_abstract":"The cybersecurity of critical infrastructures is an essential topic within national and international security as 16 critical infrastructure sectors touch various aspects of American society. Because the failure to provide adequate cybersecurity controls within the critical infrastructure sectors renders the country open to an attack that could have a debilitating effect on security, national public health, safety, and economic security, this matter is so vital that there is the Presidential Policy Directive (PPD) 21 Critical Infrastructure Security and Resilience advances a national policy to strengthen and maintain secure, functioning and resilient critical infrastructure. An organization identified as the Cybersecurity and Infrastructure Security Agency (CISA) at the Department of Homeland Security (DHS) has the mission to be the risk advisor for the United States (US). Other organizations, such as the National Security Agency (NSA), have approved a specific Knowledge Unit (KU) t...","internal_url":"https://www.academia.edu/87348807/Understanding_the_Challenge_of_Cybersecurity_in_Critical_Infrastructure_Sectors","translated_internal_url":"","created_at":"2022-09-26T07:41:29.950-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":82613518,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[{"id":91583107,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/91583107/thumbnails/1.jpg","file_name":"raft-2021-0011.pdf","download_url":"https://www.academia.edu/attachments/91583107/download_file","bulk_download_file_name":"Understanding_the_Challenge_of_Cybersecu.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/91583107/raft-2021-0011-libre.pdf?1664203449=\u0026response-content-disposition=attachment%3B+filename%3DUnderstanding_the_Challenge_of_Cybersecu.pdf\u0026Expires=1743223500\u0026Signature=A3E~HQ-8T2UpvkpKYqGYsnElavVptj~jvQF63pWExllQXuuSDcL7fs5e-ax7nEq8qkHQ8TQg0ms2ctY-6dvjTtGd47aMelP~CqcK99pbY5aPjthHiSu68K6Is6dOvzaAWKbfzSiRao1V0105MHTicwqhfXS85NZ4HOPakRN7sKlu91AB0nzH5BJwWrxo2BhJ-4uVcP7KWMXb5mEciQdB9-G~Dh-97m9i96fD-765aJAfx432MWtj5TE85ZMesqn3LzPBJsQ1~4WiIEx8D1ncHizhhA2x~Ci-E1xWhMbD8Wi0uHJ1hK6sqYAUnM7gMFkcmJJcdjC43ATKXNV9UxXRhg__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"slug":"Understanding_the_Challenge_of_Cybersecurity_in_Critical_Infrastructure_Sectors","translated_slug":"","page_count":7,"language":"en","content_type":"Work","summary":"The cybersecurity of critical infrastructures is an essential topic within national and international security as 16 critical infrastructure sectors touch various aspects of American society. Because the failure to provide adequate cybersecurity controls within the critical infrastructure sectors renders the country open to an attack that could have a debilitating effect on security, national public health, safety, and economic security, this matter is so vital that there is the Presidential Policy Directive (PPD) 21 Critical Infrastructure Security and Resilience advances a national policy to strengthen and maintain secure, functioning and resilient critical infrastructure. An organization identified as the Cybersecurity and Infrastructure Security Agency (CISA) at the Department of Homeland Security (DHS) has the mission to be the risk advisor for the United States (US). Other organizations, such as the National Security Agency (NSA), have approved a specific Knowledge Unit (KU) t...","owner":{"id":82613518,"first_name":"Maurice","middle_initials":null,"last_name":"Dawson","page_name":"MauriceDawson","domain_name":"iit","created_at":"2018-06-06T13:08:54.103-07:00","display_name":"Maurice Dawson","url":"https://iit.academia.edu/MauriceDawson"},"attachments":[{"id":91583107,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/91583107/thumbnails/1.jpg","file_name":"raft-2021-0011.pdf","download_url":"https://www.academia.edu/attachments/91583107/download_file","bulk_download_file_name":"Understanding_the_Challenge_of_Cybersecu.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/91583107/raft-2021-0011-libre.pdf?1664203449=\u0026response-content-disposition=attachment%3B+filename%3DUnderstanding_the_Challenge_of_Cybersecu.pdf\u0026Expires=1743223500\u0026Signature=A3E~HQ-8T2UpvkpKYqGYsnElavVptj~jvQF63pWExllQXuuSDcL7fs5e-ax7nEq8qkHQ8TQg0ms2ctY-6dvjTtGd47aMelP~CqcK99pbY5aPjthHiSu68K6Is6dOvzaAWKbfzSiRao1V0105MHTicwqhfXS85NZ4HOPakRN7sKlu91AB0nzH5BJwWrxo2BhJ-4uVcP7KWMXb5mEciQdB9-G~Dh-97m9i96fD-765aJAfx432MWtj5TE85ZMesqn3LzPBJsQ1~4WiIEx8D1ncHizhhA2x~Ci-E1xWhMbD8Wi0uHJ1hK6sqYAUnM7gMFkcmJJcdjC43ATKXNV9UxXRhg__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"research_interests":[{"id":422,"name":"Computer Science","url":"https://www.academia.edu/Documents/in/Computer_Science"},{"id":1283,"name":"Information Security","url":"https://www.academia.edu/Documents/in/Information_Security"},{"id":4252,"name":"Computer Networks","url":"https://www.academia.edu/Documents/in/Computer_Networks"},{"id":13923,"name":"Computer Security","url":"https://www.academia.edu/Documents/in/Computer_Security"}],"urls":[{"id":24197585,"url":"https://content.sciendo.com/view/journals/raft/26/1/article-p69.xml"}]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") if (false) { Aedu.setUpFigureCarousel('profile-work-87348807-figures'); } }); </script> <div class="js-work-strip profile--work_container" data-work-id="87348803"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" rel="nofollow" href="https://www.academia.edu/87348803/Dark_Web"><img alt="Research paper thumbnail of Dark Web" class="work-thumbnail" src="https://a.academia-assets.com/images/blank-paper.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title">Dark Web</div><div class="wp-workCard_item"><span>Handbook of Research on Theory and Practice of Financial Crimes</span><span>, 2021</span></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">The explosion of the internet has given rise to cybercrimes, online identity theft, and fraud. Wi...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">The explosion of the internet has given rise to cybercrimes, online identity theft, and fraud. With the internet, these crimes are able to occur anywhere in the world and limitless to whatever selected target. The anonymity of the internet allows criminal activity to flourish, and the number of unsuspecting victims is growing. From script kiddies to nation-states, this new method of internet-enabled crimes has strained governments. This chapter provides insight into how crimes related to online identity theft and fraud are carried out. Examined within this chapter are the evolution of cybercrime, history of identity theft, applications for internet anonymity, and discussion on effects caused by romance scams and data breaches. Finally, recommendations are provided on what organizations and individuals can do to protect themselves against these vicious crimes.</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="87348803"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="87348803"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 87348803; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=87348803]").text(description); $(".js-view-count[data-work-id=87348803]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 87348803; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='87348803']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-a9bf3a2bc8c89fa2a77156577594264ee8a0f214d74241bc0fcd3f69f8d107ac.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (false){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "-1" } } $('.js-work-strip[data-work-id=87348803]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":87348803,"title":"Dark Web","translated_title":"","metadata":{"abstract":"The explosion of the internet has given rise to cybercrimes, online identity theft, and fraud. With the internet, these crimes are able to occur anywhere in the world and limitless to whatever selected target. The anonymity of the internet allows criminal activity to flourish, and the number of unsuspecting victims is growing. From script kiddies to nation-states, this new method of internet-enabled crimes has strained governments. This chapter provides insight into how crimes related to online identity theft and fraud are carried out. Examined within this chapter are the evolution of cybercrime, history of identity theft, applications for internet anonymity, and discussion on effects caused by romance scams and data breaches. Finally, recommendations are provided on what organizations and individuals can do to protect themselves against these vicious crimes.","publisher":"IGI Global","publication_date":{"day":null,"month":null,"year":2021,"errors":{}},"publication_name":"Handbook of Research on Theory and Practice of Financial Crimes"},"translated_abstract":"The explosion of the internet has given rise to cybercrimes, online identity theft, and fraud. With the internet, these crimes are able to occur anywhere in the world and limitless to whatever selected target. The anonymity of the internet allows criminal activity to flourish, and the number of unsuspecting victims is growing. From script kiddies to nation-states, this new method of internet-enabled crimes has strained governments. This chapter provides insight into how crimes related to online identity theft and fraud are carried out. Examined within this chapter are the evolution of cybercrime, history of identity theft, applications for internet anonymity, and discussion on effects caused by romance scams and data breaches. Finally, recommendations are provided on what organizations and individuals can do to protect themselves against these vicious crimes.","internal_url":"https://www.academia.edu/87348803/Dark_Web","translated_internal_url":"","created_at":"2022-09-26T07:41:24.271-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":82613518,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[],"slug":"Dark_Web","translated_slug":"","page_count":null,"language":"en","content_type":"Work","summary":"The explosion of the internet has given rise to cybercrimes, online identity theft, and fraud. With the internet, these crimes are able to occur anywhere in the world and limitless to whatever selected target. The anonymity of the internet allows criminal activity to flourish, and the number of unsuspecting victims is growing. From script kiddies to nation-states, this new method of internet-enabled crimes has strained governments. This chapter provides insight into how crimes related to online identity theft and fraud are carried out. Examined within this chapter are the evolution of cybercrime, history of identity theft, applications for internet anonymity, and discussion on effects caused by romance scams and data breaches. Finally, recommendations are provided on what organizations and individuals can do to protect themselves against these vicious crimes.","owner":{"id":82613518,"first_name":"Maurice","middle_initials":null,"last_name":"Dawson","page_name":"MauriceDawson","domain_name":"iit","created_at":"2018-06-06T13:08:54.103-07:00","display_name":"Maurice Dawson","url":"https://iit.academia.edu/MauriceDawson"},"attachments":[],"research_interests":[],"urls":[{"id":24197582,"url":"https://www.igi-global.com/viewtitle.aspx?TitleId=275477"}]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") if (false) { Aedu.setUpFigureCarousel('profile-work-87348803-figures'); } }); </script> <div class="js-work-strip profile--work_container" data-work-id="87348799"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/87348799/Supply_Chain_and_Logistics_Management_and_an_Open_Door_Policy_Concerning_Cyber_Security_Introduction"><img alt="Research paper thumbnail of Supply Chain and Logistics Management and an Open Door Policy Concerning Cyber Security Introduction" class="work-thumbnail" src="https://attachments.academia-assets.com/91583105/thumbnails/1.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/87348799/Supply_Chain_and_Logistics_Management_and_an_Open_Door_Policy_Concerning_Cyber_Security_Introduction">Supply Chain and Logistics Management and an Open Door Policy Concerning Cyber Security Introduction</a></div><div class="wp-workCard_item"><span>International Journal of Management and Sustainability</span><span>, 2020</span></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">Contribution/Originality: This study contributes to the existing literature by exploring innovati...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">Contribution/Originality: This study contributes to the existing literature by exploring innovative approaches around open-door systems as a proactive risk reduction approach. 1. INTRODUCTION In the U.S. alone, cybercrimes have had a detrimental impact on the country&#39;s economy; costing approximately 445 billion annually (Simon and Omar, 2020). Supply chain managers&#39; heavy reliance on information technology (IT) to improve organizational systems, infrastructure, competitive advantage, and growth have inadvertently</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><a id="46f834f4d4d66901761403686614c2fc" class="wp-workCard--action" rel="nofollow" data-click-track="profile-work-strip-download" data-download="{&quot;attachment_id&quot;:91583105,&quot;asset_id&quot;:87348799,&quot;asset_type&quot;:&quot;Work&quot;,&quot;button_location&quot;:&quot;profile&quot;}" href="https://www.academia.edu/attachments/91583105/download_file?s=profile"><span><i class="fa fa-arrow-down"></i></span><span>Download</span></a><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="87348799"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="87348799"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 87348799; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=87348799]").text(description); $(".js-view-count[data-work-id=87348799]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 87348799; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='87348799']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-a9bf3a2bc8c89fa2a77156577594264ee8a0f214d74241bc0fcd3f69f8d107ac.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (true){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "46f834f4d4d66901761403686614c2fc" } } $('.js-work-strip[data-work-id=87348799]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":87348799,"title":"Supply Chain and Logistics Management and an Open Door Policy Concerning Cyber Security Introduction","translated_title":"","metadata":{"publisher":"Conscientia Beam","ai_title_tag":"Innovative Open-Door Policies in Cyber Security for Supply Chains","grobid_abstract":"Contribution/Originality: This study contributes to the existing literature by exploring innovative approaches around open-door systems as a proactive risk reduction approach. 1. INTRODUCTION In the U.S. alone, cybercrimes have had a detrimental impact on the country's economy; costing approximately 445 billion annually (Simon and Omar, 2020). Supply chain managers' heavy reliance on information technology (IT) to improve organizational systems, infrastructure, competitive advantage, and growth have inadvertently","publication_date":{"day":null,"month":null,"year":2020,"errors":{}},"publication_name":"International Journal of Management and Sustainability","grobid_abstract_attachment_id":91583105},"translated_abstract":null,"internal_url":"https://www.academia.edu/87348799/Supply_Chain_and_Logistics_Management_and_an_Open_Door_Policy_Concerning_Cyber_Security_Introduction","translated_internal_url":"","created_at":"2022-09-26T07:41:20.128-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":82613518,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[{"id":91583105,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/91583105/thumbnails/1.jpg","file_name":"IJMS-2020-91-1-10.pdf","download_url":"https://www.academia.edu/attachments/91583105/download_file","bulk_download_file_name":"Supply_Chain_and_Logistics_Management_an.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/91583105/IJMS-2020-91-1-10-libre.pdf?1664203451=\u0026response-content-disposition=attachment%3B+filename%3DSupply_Chain_and_Logistics_Management_an.pdf\u0026Expires=1743223500\u0026Signature=VyCw6-JYziYJa4G3gAF~gedSPgW6eDZhlPxvv9fR6y0KqYXx7bgO0uT6SE3a49trQQKQ~58UFfIvaDHnYCQ2gzEPW2YRalcrYYNtgidE0YgUgy1fLCk2KmP7L06y7rxltKhQ4O3yp7UZ75kl34wX-ge395PhZvweV6U7y17EiaYpObMI1FvEa4O77X6zCOlEEXec1zVIho6PUWc~ohSrB8RQ9KMmc0ZEYjrsYJa10JZaxZeDpc11-lyBLmwhCImn8tkAlXz8WHldL4Ju9Ew8ujS6u8zwTqWUMfjOt5HbbrvkO3dhVN7ThGlOobqw8TQAQrb7~Cid8o9yq1gmaSEBsw__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"slug":"Supply_Chain_and_Logistics_Management_and_an_Open_Door_Policy_Concerning_Cyber_Security_Introduction","translated_slug":"","page_count":10,"language":"en","content_type":"Work","summary":"Contribution/Originality: This study contributes to the existing literature by exploring innovative approaches around open-door systems as a proactive risk reduction approach. 1. INTRODUCTION In the U.S. alone, cybercrimes have had a detrimental impact on the country's economy; costing approximately 445 billion annually (Simon and Omar, 2020). Supply chain managers' heavy reliance on information technology (IT) to improve organizational systems, infrastructure, competitive advantage, and growth have inadvertently","owner":{"id":82613518,"first_name":"Maurice","middle_initials":null,"last_name":"Dawson","page_name":"MauriceDawson","domain_name":"iit","created_at":"2018-06-06T13:08:54.103-07:00","display_name":"Maurice Dawson","url":"https://iit.academia.edu/MauriceDawson"},"attachments":[{"id":91583105,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/91583105/thumbnails/1.jpg","file_name":"IJMS-2020-91-1-10.pdf","download_url":"https://www.academia.edu/attachments/91583105/download_file","bulk_download_file_name":"Supply_Chain_and_Logistics_Management_an.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/91583105/IJMS-2020-91-1-10-libre.pdf?1664203451=\u0026response-content-disposition=attachment%3B+filename%3DSupply_Chain_and_Logistics_Management_an.pdf\u0026Expires=1743223500\u0026Signature=VyCw6-JYziYJa4G3gAF~gedSPgW6eDZhlPxvv9fR6y0KqYXx7bgO0uT6SE3a49trQQKQ~58UFfIvaDHnYCQ2gzEPW2YRalcrYYNtgidE0YgUgy1fLCk2KmP7L06y7rxltKhQ4O3yp7UZ75kl34wX-ge395PhZvweV6U7y17EiaYpObMI1FvEa4O77X6zCOlEEXec1zVIho6PUWc~ohSrB8RQ9KMmc0ZEYjrsYJa10JZaxZeDpc11-lyBLmwhCImn8tkAlXz8WHldL4Ju9Ew8ujS6u8zwTqWUMfjOt5HbbrvkO3dhVN7ThGlOobqw8TQAQrb7~Cid8o9yq1gmaSEBsw__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"research_interests":[{"id":26,"name":"Business","url":"https://www.academia.edu/Documents/in/Business"},{"id":32,"name":"Organizational Behavior","url":"https://www.academia.edu/Documents/in/Organizational_Behavior"},{"id":491,"name":"Information Technology","url":"https://www.academia.edu/Documents/in/Information_Technology"},{"id":1324,"name":"Organizational Change","url":"https://www.academia.edu/Documents/in/Organizational_Change"},{"id":3267,"name":"Whistleblowing","url":"https://www.academia.edu/Documents/in/Whistleblowing"},{"id":3762,"name":"Human Factors","url":"https://www.academia.edu/Documents/in/Human_Factors"},{"id":7055,"name":"Technology Management","url":"https://www.academia.edu/Documents/in/Technology_Management"},{"id":8333,"name":"Organizational Citizenship Behavior","url":"https://www.academia.edu/Documents/in/Organizational_Citizenship_Behavior"},{"id":31064,"name":"Sustainability Management","url":"https://www.academia.edu/Documents/in/Sustainability_Management"},{"id":115676,"name":"Cyber Security","url":"https://www.academia.edu/Documents/in/Cyber_Security"},{"id":540336,"name":"Environmental Management and Sustainability","url":"https://www.academia.edu/Documents/in/Environmental_Management_and_Sustainability"},{"id":987706,"name":"Media Management and Sustainability","url":"https://www.academia.edu/Documents/in/Media_Management_and_Sustainability"}],"urls":[]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") if (false) { Aedu.setUpFigureCarousel('profile-work-87348799-figures'); } }); </script> <div class="js-work-strip profile--work_container" data-work-id="87348792"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/87348792/Systems_Usability_in_Developing_Countries"><img alt="Research paper thumbnail of Systems Usability in Developing Countries" class="work-thumbnail" src="https://attachments.academia-assets.com/91583096/thumbnails/1.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/87348792/Systems_Usability_in_Developing_Countries">Systems Usability in Developing Countries</a></div><div class="wp-workCard_item"><span>International Journal of ICT Research in Africa and the Middle East</span><span>, 2019</span></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">This article critically analyzes a project executed for the John Ogonowski and Doug Bereuter Farm...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">This article critically analyzes a project executed for the John Ogonowski and Doug Bereuter Farmer-to-Farmer Program which provides technical assistance with volunteers from the United States to farmers, agricultural institutions, and government organizations involved in agriculture such as the Ministry of Agriculture. In Guinea, the focus is on computer literacy as more sectors of agriculture rely on computing technology. These skills range from basic computing tasks such as creating databases to more advanced items such as programming global positional systems. This study looks at findings, based on the analysis of the system usability scale results from a sample of 16 participants. The findings demonstrated that the training proved to be effective for the participants and continued training is necessary. As a result of training, 62.5% of the participants ranked above average, as opposed to 43.6% prior to training.</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><a id="106daa1fe64a93c8a8f736492a3bb5d8" class="wp-workCard--action" rel="nofollow" data-click-track="profile-work-strip-download" data-download="{&quot;attachment_id&quot;:91583096,&quot;asset_id&quot;:87348792,&quot;asset_type&quot;:&quot;Work&quot;,&quot;button_location&quot;:&quot;profile&quot;}" href="https://www.academia.edu/attachments/91583096/download_file?s=profile"><span><i class="fa fa-arrow-down"></i></span><span>Download</span></a><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="87348792"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="87348792"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 87348792; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=87348792]").text(description); $(".js-view-count[data-work-id=87348792]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 87348792; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='87348792']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-a9bf3a2bc8c89fa2a77156577594264ee8a0f214d74241bc0fcd3f69f8d107ac.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (true){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "106daa1fe64a93c8a8f736492a3bb5d8" } } $('.js-work-strip[data-work-id=87348792]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":87348792,"title":"Systems Usability in Developing Countries","translated_title":"","metadata":{"abstract":"This article critically analyzes a project executed for the John Ogonowski and Doug Bereuter Farmer-to-Farmer Program which provides technical assistance with volunteers from the United States to farmers, agricultural institutions, and government organizations involved in agriculture such as the Ministry of Agriculture. In Guinea, the focus is on computer literacy as more sectors of agriculture rely on computing technology. These skills range from basic computing tasks such as creating databases to more advanced items such as programming global positional systems. This study looks at findings, based on the analysis of the system usability scale results from a sample of 16 participants. The findings demonstrated that the training proved to be effective for the participants and continued training is necessary. As a result of training, 62.5% of the participants ranked above average, as opposed to 43.6% prior to training.","publisher":"IGI Global","publication_date":{"day":null,"month":null,"year":2019,"errors":{}},"publication_name":"International Journal of ICT Research in Africa and the Middle East"},"translated_abstract":"This article critically analyzes a project executed for the John Ogonowski and Doug Bereuter Farmer-to-Farmer Program which provides technical assistance with volunteers from the United States to farmers, agricultural institutions, and government organizations involved in agriculture such as the Ministry of Agriculture. In Guinea, the focus is on computer literacy as more sectors of agriculture rely on computing technology. These skills range from basic computing tasks such as creating databases to more advanced items such as programming global positional systems. This study looks at findings, based on the analysis of the system usability scale results from a sample of 16 participants. The findings demonstrated that the training proved to be effective for the participants and continued training is necessary. As a result of training, 62.5% of the participants ranked above average, as opposed to 43.6% prior to training.","internal_url":"https://www.academia.edu/87348792/Systems_Usability_in_Developing_Countries","translated_internal_url":"","created_at":"2022-09-26T07:41:13.461-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":82613518,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[{"id":91583096,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/91583096/thumbnails/1.jpg","file_name":"Systems-Usability-in-Developing-Countries_-Case-of-Computing-Use-in-Guinea_stamped.pdf","download_url":"https://www.academia.edu/attachments/91583096/download_file","bulk_download_file_name":"Systems_Usability_in_Developing_Countrie.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/91583096/Systems-Usability-in-Developing-Countries_-Case-of-Computing-Use-in-Guinea_stamped-libre.pdf?1664203480=\u0026response-content-disposition=attachment%3B+filename%3DSystems_Usability_in_Developing_Countrie.pdf\u0026Expires=1743223500\u0026Signature=D3yX6fAqigy3l8MTYDEqHlaAx2XErC2wRCjugvArpJkSoIm4GAhC2lK1-mEH4hV9G6HFcAgSj3CDotDO61iR~INE7rubV2Uz9AO1CB~tcBBPH1rIlTIsb2G6r5NIdW6lrZ1mbVvIrQtAPUaslVQU1WWoLZZLLUZLCXiDSmdhJQ1RzVq16CGBmf6~Bqn~VDViTwECqZOU1h~LzSTTLPcFsAJeVOi5v1eb8LP~x-Bx7pVaOY2VH5RDV~5AF2mc8ts1MkjxI2lYFYlO~8Mt~1JhrTPUqKr2yR0GFutRYpmEPil8tgmMq8v5qAE63Mk~8v4pExCpr~XPCM4c6SVXyoM~1g__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"slug":"Systems_Usability_in_Developing_Countries","translated_slug":"","page_count":11,"language":"en","content_type":"Work","summary":"This article critically analyzes a project executed for the John Ogonowski and Doug Bereuter Farmer-to-Farmer Program which provides technical assistance with volunteers from the United States to farmers, agricultural institutions, and government organizations involved in agriculture such as the Ministry of Agriculture. In Guinea, the focus is on computer literacy as more sectors of agriculture rely on computing technology. These skills range from basic computing tasks such as creating databases to more advanced items such as programming global positional systems. This study looks at findings, based on the analysis of the system usability scale results from a sample of 16 participants. The findings demonstrated that the training proved to be effective for the participants and continued training is necessary. As a result of training, 62.5% of the participants ranked above average, as opposed to 43.6% prior to training.","owner":{"id":82613518,"first_name":"Maurice","middle_initials":null,"last_name":"Dawson","page_name":"MauriceDawson","domain_name":"iit","created_at":"2018-06-06T13:08:54.103-07:00","display_name":"Maurice Dawson","url":"https://iit.academia.edu/MauriceDawson"},"attachments":[{"id":91583096,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/91583096/thumbnails/1.jpg","file_name":"Systems-Usability-in-Developing-Countries_-Case-of-Computing-Use-in-Guinea_stamped.pdf","download_url":"https://www.academia.edu/attachments/91583096/download_file","bulk_download_file_name":"Systems_Usability_in_Developing_Countrie.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/91583096/Systems-Usability-in-Developing-Countries_-Case-of-Computing-Use-in-Guinea_stamped-libre.pdf?1664203480=\u0026response-content-disposition=attachment%3B+filename%3DSystems_Usability_in_Developing_Countrie.pdf\u0026Expires=1743223500\u0026Signature=D3yX6fAqigy3l8MTYDEqHlaAx2XErC2wRCjugvArpJkSoIm4GAhC2lK1-mEH4hV9G6HFcAgSj3CDotDO61iR~INE7rubV2Uz9AO1CB~tcBBPH1rIlTIsb2G6r5NIdW6lrZ1mbVvIrQtAPUaslVQU1WWoLZZLLUZLCXiDSmdhJQ1RzVq16CGBmf6~Bqn~VDViTwECqZOU1h~LzSTTLPcFsAJeVOi5v1eb8LP~x-Bx7pVaOY2VH5RDV~5AF2mc8ts1MkjxI2lYFYlO~8Mt~1JhrTPUqKr2yR0GFutRYpmEPil8tgmMq8v5qAE63Mk~8v4pExCpr~XPCM4c6SVXyoM~1g__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"research_interests":[{"id":26,"name":"Business","url":"https://www.academia.edu/Documents/in/Business"},{"id":422,"name":"Computer Science","url":"https://www.academia.edu/Documents/in/Computer_Science"},{"id":1615,"name":"Usability","url":"https://www.academia.edu/Documents/in/Usability"},{"id":392226,"name":"New Guinea","url":"https://www.academia.edu/Documents/in/New_Guinea"}],"urls":[{"id":24197576,"url":"https://www.igi-global.com/viewtitle.aspx?TitleId=218584"}]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") if (false) { Aedu.setUpFigureCarousel('profile-work-87348792-figures'); } }); </script> <div class="js-work-strip profile--work_container" data-work-id="87348786"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/87348786/Improving_Cyber_Defense_Education_through_National_Standard_Alignment"><img alt="Research paper thumbnail of Improving Cyber Defense Education through National Standard Alignment" class="work-thumbnail" src="https://attachments.academia-assets.com/91583090/thumbnails/1.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/87348786/Improving_Cyber_Defense_Education_through_National_Standard_Alignment">Improving Cyber Defense Education through National Standard Alignment</a></div><div class="wp-workCard_item"><span>International Journal of Hyperconnectivity and the Internet of Things</span><span>, 2018</span></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">There has been a fast-growing demand for cybersecurity professionals to defend cyber space and in...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">There has been a fast-growing demand for cybersecurity professionals to defend cyber space and information systems. With more and more programs and course offerings in cybersecurity popping up in higher education, it is important to have a consistent and reliable quality standard to guide and evaluate the training and preparation of qualified cyber defense workforce. The national Centers of Academic Excellence in Cyber Defense Education (CAE-CDE) designation program jointly sponsored by the US National Security Agency (NSA) and Department of Homeland Security (DHS) is a rigorous national standard with specific criteria for maintaining the quality of cybersecurity education. This article explains the CAE-CDE program criteria and requirements and discusses the important role of the special designation in improving cyber defense education and workforce development. This article illustrates the educational value and quality impact of the CAE-CDE program with three case studies: (1) Univ...</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><a id="d52462b0edee456880b338ed3c981f46" class="wp-workCard--action" rel="nofollow" data-click-track="profile-work-strip-download" data-download="{&quot;attachment_id&quot;:91583090,&quot;asset_id&quot;:87348786,&quot;asset_type&quot;:&quot;Work&quot;,&quot;button_location&quot;:&quot;profile&quot;}" href="https://www.academia.edu/attachments/91583090/download_file?s=profile"><span><i class="fa fa-arrow-down"></i></span><span>Download</span></a><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="87348786"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="87348786"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 87348786; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=87348786]").text(description); $(".js-view-count[data-work-id=87348786]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 87348786; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='87348786']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-a9bf3a2bc8c89fa2a77156577594264ee8a0f214d74241bc0fcd3f69f8d107ac.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (true){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "d52462b0edee456880b338ed3c981f46" } } $('.js-work-strip[data-work-id=87348786]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":87348786,"title":"Improving Cyber Defense Education through National Standard Alignment","translated_title":"","metadata":{"abstract":"There has been a fast-growing demand for cybersecurity professionals to defend cyber space and information systems. With more and more programs and course offerings in cybersecurity popping up in higher education, it is important to have a consistent and reliable quality standard to guide and evaluate the training and preparation of qualified cyber defense workforce. The national Centers of Academic Excellence in Cyber Defense Education (CAE-CDE) designation program jointly sponsored by the US National Security Agency (NSA) and Department of Homeland Security (DHS) is a rigorous national standard with specific criteria for maintaining the quality of cybersecurity education. This article explains the CAE-CDE program criteria and requirements and discusses the important role of the special designation in improving cyber defense education and workforce development. This article illustrates the educational value and quality impact of the CAE-CDE program with three case studies: (1) Univ...","publisher":"IGI Global","publication_date":{"day":null,"month":null,"year":2018,"errors":{}},"publication_name":"International Journal of Hyperconnectivity and the Internet of Things"},"translated_abstract":"There has been a fast-growing demand for cybersecurity professionals to defend cyber space and information systems. With more and more programs and course offerings in cybersecurity popping up in higher education, it is important to have a consistent and reliable quality standard to guide and evaluate the training and preparation of qualified cyber defense workforce. The national Centers of Academic Excellence in Cyber Defense Education (CAE-CDE) designation program jointly sponsored by the US National Security Agency (NSA) and Department of Homeland Security (DHS) is a rigorous national standard with specific criteria for maintaining the quality of cybersecurity education. This article explains the CAE-CDE program criteria and requirements and discusses the important role of the special designation in improving cyber defense education and workforce development. This article illustrates the educational value and quality impact of the CAE-CDE program with three case studies: (1) Univ...","internal_url":"https://www.academia.edu/87348786/Improving_Cyber_Defense_Education_through_National_Standard_Alignment","translated_internal_url":"","created_at":"2022-09-26T07:41:05.840-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":82613518,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[{"id":91583090,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/91583090/thumbnails/1.jpg","file_name":"viewtitlesample.pdf","download_url":"https://www.academia.edu/attachments/91583090/download_file","bulk_download_file_name":"Improving_Cyber_Defense_Education_throug.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/91583090/viewtitlesample-libre.pdf?1664203450=\u0026response-content-disposition=attachment%3B+filename%3DImproving_Cyber_Defense_Education_throug.pdf\u0026Expires=1743223500\u0026Signature=dMItWg3zlYkS2zUyrA12-PsErjAaMFHoqHn6vEXbtakJUHy846VE7HwM1hDeNXckNL9L6WZOCB8eN3AYScwIZAUN7nQ0K8ccao2LWnoIIeRMoGN7aZeSz2LmEtMXtSBMFSGCtJUc7Keufhbe99xcmAaWMYgKimygN5eo~b5BPTrYZe8~CA6yoSBATRwRGwBXsjhtMZG7gbWpyCsTZP7UTRIpirBQ~62wKgpGzIlLLI5z2MPw1tUiuPwt~XmSF~CyR3QL0hXarEJbXrL32wwIFYBaxjWK4nwuI57BWGAXrveDKHfx-d5y~I5NkerWE5RaZRn1TCOX19wkYUBgtyPZ-A__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"slug":"Improving_Cyber_Defense_Education_through_National_Standard_Alignment","translated_slug":"","page_count":4,"language":"en","content_type":"Work","summary":"There has been a fast-growing demand for cybersecurity professionals to defend cyber space and information systems. With more and more programs and course offerings in cybersecurity popping up in higher education, it is important to have a consistent and reliable quality standard to guide and evaluate the training and preparation of qualified cyber defense workforce. The national Centers of Academic Excellence in Cyber Defense Education (CAE-CDE) designation program jointly sponsored by the US National Security Agency (NSA) and Department of Homeland Security (DHS) is a rigorous national standard with specific criteria for maintaining the quality of cybersecurity education. This article explains the CAE-CDE program criteria and requirements and discusses the important role of the special designation in improving cyber defense education and workforce development. This article illustrates the educational value and quality impact of the CAE-CDE program with three case studies: (1) Univ...","owner":{"id":82613518,"first_name":"Maurice","middle_initials":null,"last_name":"Dawson","page_name":"MauriceDawson","domain_name":"iit","created_at":"2018-06-06T13:08:54.103-07:00","display_name":"Maurice Dawson","url":"https://iit.academia.edu/MauriceDawson"},"attachments":[{"id":91583090,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/91583090/thumbnails/1.jpg","file_name":"viewtitlesample.pdf","download_url":"https://www.academia.edu/attachments/91583090/download_file","bulk_download_file_name":"Improving_Cyber_Defense_Education_throug.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/91583090/viewtitlesample-libre.pdf?1664203450=\u0026response-content-disposition=attachment%3B+filename%3DImproving_Cyber_Defense_Education_throug.pdf\u0026Expires=1743223500\u0026Signature=dMItWg3zlYkS2zUyrA12-PsErjAaMFHoqHn6vEXbtakJUHy846VE7HwM1hDeNXckNL9L6WZOCB8eN3AYScwIZAUN7nQ0K8ccao2LWnoIIeRMoGN7aZeSz2LmEtMXtSBMFSGCtJUc7Keufhbe99xcmAaWMYgKimygN5eo~b5BPTrYZe8~CA6yoSBATRwRGwBXsjhtMZG7gbWpyCsTZP7UTRIpirBQ~62wKgpGzIlLLI5z2MPw1tUiuPwt~XmSF~CyR3QL0hXarEJbXrL32wwIFYBaxjWK4nwuI57BWGAXrveDKHfx-d5y~I5NkerWE5RaZRn1TCOX19wkYUBgtyPZ-A__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"research_interests":[{"id":422,"name":"Computer Science","url":"https://www.academia.edu/Documents/in/Computer_Science"}],"urls":[{"id":24197574,"url":"https://www.igi-global.com/viewtitle.aspx?TitleId=210625"}]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") if (false) { Aedu.setUpFigureCarousel('profile-work-87348786-figures'); } }); </script> <div class="js-work-strip profile--work_container" data-work-id="87348783"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/87348783/Battlefield_Cyberspace"><img alt="Research paper thumbnail of Battlefield Cyberspace" class="work-thumbnail" src="https://attachments.academia-assets.com/91583080/thumbnails/1.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/87348783/Battlefield_Cyberspace">Battlefield Cyberspace</a></div><div class="wp-workCard_item"><span>Developing Next-Generation Countermeasures for Homeland Security Threat Prevention</span></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">The threat of cyber terrorism has become a reality with recent attacks such as Stuxtnet, Flame, S...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">The threat of cyber terrorism has become a reality with recent attacks such as Stuxtnet, Flame, Sony Pictures, and North Korea&#39;s websites. As the Internet of Things (IoT) continues to become more hyperconnected it will be imperative that cyber security experts to develop new security architectures for multiple platforms such as mobile devices, laptops, embedded systems, and even wearable displays. The futures of national and international security rely on complex countermeasures to ensure that a proper security posture is maintained during this state of hyperconnectivity. To protect these systems from exploitation of vulnerabilities it is essential to understand current and future threats to include the laws that drive their need to be secured. Examined within this chapter are the potential security related threats with the use of social media, mobile devices, virtual worlds, augmented reality, and mixed reality.</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><a id="6afc2af5fe50881b01519700a06243fc" class="wp-workCard--action" rel="nofollow" data-click-track="profile-work-strip-download" data-download="{&quot;attachment_id&quot;:91583080,&quot;asset_id&quot;:87348783,&quot;asset_type&quot;:&quot;Work&quot;,&quot;button_location&quot;:&quot;profile&quot;}" href="https://www.academia.edu/attachments/91583080/download_file?s=profile"><span><i class="fa fa-arrow-down"></i></span><span>Download</span></a><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="87348783"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="87348783"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 87348783; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=87348783]").text(description); $(".js-view-count[data-work-id=87348783]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 87348783; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='87348783']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-a9bf3a2bc8c89fa2a77156577594264ee8a0f214d74241bc0fcd3f69f8d107ac.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (true){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "6afc2af5fe50881b01519700a06243fc" } } $('.js-work-strip[data-work-id=87348783]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":87348783,"title":"Battlefield Cyberspace","translated_title":"","metadata":{"ai_title_tag":"Cybersecurity Challenges in an IoT-Connected Battlefield","grobid_abstract":"The threat of cyber terrorism has become a reality with recent attacks such as Stuxtnet, Flame, Sony Pictures, and North Korea's websites. As the Internet of Things (IoT) continues to become more hyperconnected it will be imperative that cyber security experts to develop new security architectures for multiple platforms such as mobile devices, laptops, embedded systems, and even wearable displays. The futures of national and international security rely on complex countermeasures to ensure that a proper security posture is maintained during this state of hyperconnectivity. To protect these systems from exploitation of vulnerabilities it is essential to understand current and future threats to include the laws that drive their need to be secured. Examined within this chapter are the potential security related threats with the use of social media, mobile devices, virtual worlds, augmented reality, and mixed reality.","publication_name":"Developing Next-Generation Countermeasures for Homeland Security Threat Prevention","grobid_abstract_attachment_id":91583080},"translated_abstract":null,"internal_url":"https://www.academia.edu/87348783/Battlefield_Cyberspace","translated_internal_url":"","created_at":"2022-09-26T07:41:01.927-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":82613518,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[{"id":91583080,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/91583080/thumbnails/1.jpg","file_name":"viewtitlesample.pdf","download_url":"https://www.academia.edu/attachments/91583080/download_file","bulk_download_file_name":"Battlefield_Cyberspace.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/91583080/viewtitlesample-libre.pdf?1664203484=\u0026response-content-disposition=attachment%3B+filename%3DBattlefield_Cyberspace.pdf\u0026Expires=1743223500\u0026Signature=SloewOfxWgVkiaRUQj1jYFDmyMSX3t1AP6ohNsL8PPSt1chDjdT0a1Idrist3PED5zouMRJI~ZzrCVJx-vVYtO9gS0UNeb2ZY9ZwPW7qJoiyd65iGqmM9fwMZKxKTApM6AfFJrzFRp~6rSjJgzGoL38k2SwoHrP9iEtngQR4ez6TW5vYQ5CltBbGt1~GtCFtI-b~-XcdTvC3Zc8gcaIKuV4eX~hWLq1pz4L1bj0X9Xueyma-RGuyWiwiXOUY9DqJbSehXtqSY5lJ72lfrba9oQZN1bvpxuE9LAW~BVjOP5OP-nzqJSad~cWzeTgOxNQhFJFgz83IVWnFh3HgW5Ec-Q__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"slug":"Battlefield_Cyberspace","translated_slug":"","page_count":3,"language":"en","content_type":"Work","summary":"The threat of cyber terrorism has become a reality with recent attacks such as Stuxtnet, Flame, Sony Pictures, and North Korea's websites. As the Internet of Things (IoT) continues to become more hyperconnected it will be imperative that cyber security experts to develop new security architectures for multiple platforms such as mobile devices, laptops, embedded systems, and even wearable displays. The futures of national and international security rely on complex countermeasures to ensure that a proper security posture is maintained during this state of hyperconnectivity. To protect these systems from exploitation of vulnerabilities it is essential to understand current and future threats to include the laws that drive their need to be secured. Examined within this chapter are the potential security related threats with the use of social media, mobile devices, virtual worlds, augmented reality, and mixed reality.","owner":{"id":82613518,"first_name":"Maurice","middle_initials":null,"last_name":"Dawson","page_name":"MauriceDawson","domain_name":"iit","created_at":"2018-06-06T13:08:54.103-07:00","display_name":"Maurice Dawson","url":"https://iit.academia.edu/MauriceDawson"},"attachments":[{"id":91583080,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/91583080/thumbnails/1.jpg","file_name":"viewtitlesample.pdf","download_url":"https://www.academia.edu/attachments/91583080/download_file","bulk_download_file_name":"Battlefield_Cyberspace.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/91583080/viewtitlesample-libre.pdf?1664203484=\u0026response-content-disposition=attachment%3B+filename%3DBattlefield_Cyberspace.pdf\u0026Expires=1743223500\u0026Signature=SloewOfxWgVkiaRUQj1jYFDmyMSX3t1AP6ohNsL8PPSt1chDjdT0a1Idrist3PED5zouMRJI~ZzrCVJx-vVYtO9gS0UNeb2ZY9ZwPW7qJoiyd65iGqmM9fwMZKxKTApM6AfFJrzFRp~6rSjJgzGoL38k2SwoHrP9iEtngQR4ez6TW5vYQ5CltBbGt1~GtCFtI-b~-XcdTvC3Zc8gcaIKuV4eX~hWLq1pz4L1bj0X9Xueyma-RGuyWiwiXOUY9DqJbSehXtqSY5lJ72lfrba9oQZN1bvpxuE9LAW~BVjOP5OP-nzqJSad~cWzeTgOxNQhFJFgz83IVWnFh3HgW5Ec-Q__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"research_interests":[{"id":4486,"name":"Political Science","url":"https://www.academia.edu/Documents/in/Political_Science"}],"urls":[]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") if (false) { Aedu.setUpFigureCarousel('profile-work-87348783-figures'); } }); </script> <div class="js-work-strip profile--work_container" data-work-id="87348779"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/87348779/Islamic_Extremists_in_Africa"><img alt="Research paper thumbnail of Islamic Extremists in Africa" class="work-thumbnail" src="https://attachments.academia-assets.com/91583067/thumbnails/1.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/87348779/Islamic_Extremists_in_Africa">Islamic Extremists in Africa</a></div><div class="wp-workCard_item"><span>Developing Next-Generation Countermeasures for Homeland Security Threat Prevention</span></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">Security is a growing concern on the African continent as the Regional Economic Communities (REC)...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">Security is a growing concern on the African continent as the Regional Economic Communities (REC) move toward economic integration. Furthermore, these regions collectively make up the African Union (AU) which has an objective to promote peace, security, and stability on the African continent. In recent years, Africa has been plagued with political uprisings, civil wars, extremists, corrupt politicians, and the battle for natural resources. In particular, Kenya and Nigeria are facing Islamic extremists that threaten the foundation of multiple nations. In both countries, they are using military force to combat these threats. This chapter provides insight into these West and East African nations and their means to provide security assurances to their citizens.</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><a id="aa69b4267701806ff6fc6b2f8aadf7e4" class="wp-workCard--action" rel="nofollow" data-click-track="profile-work-strip-download" data-download="{&quot;attachment_id&quot;:91583067,&quot;asset_id&quot;:87348779,&quot;asset_type&quot;:&quot;Work&quot;,&quot;button_location&quot;:&quot;profile&quot;}" href="https://www.academia.edu/attachments/91583067/download_file?s=profile"><span><i class="fa fa-arrow-down"></i></span><span>Download</span></a><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="87348779"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="87348779"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 87348779; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=87348779]").text(description); $(".js-view-count[data-work-id=87348779]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 87348779; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='87348779']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-a9bf3a2bc8c89fa2a77156577594264ee8a0f214d74241bc0fcd3f69f8d107ac.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (true){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "aa69b4267701806ff6fc6b2f8aadf7e4" } } $('.js-work-strip[data-work-id=87348779]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":87348779,"title":"Islamic Extremists in Africa","translated_title":"","metadata":{"grobid_abstract":"Security is a growing concern on the African continent as the Regional Economic Communities (REC) move toward economic integration. Furthermore, these regions collectively make up the African Union (AU) which has an objective to promote peace, security, and stability on the African continent. In recent years, Africa has been plagued with political uprisings, civil wars, extremists, corrupt politicians, and the battle for natural resources. In particular, Kenya and Nigeria are facing Islamic extremists that threaten the foundation of multiple nations. In both countries, they are using military force to combat these threats. This chapter provides insight into these West and East African nations and their means to provide security assurances to their citizens.","publication_name":"Developing Next-Generation Countermeasures for Homeland Security Threat Prevention","grobid_abstract_attachment_id":91583067},"translated_abstract":null,"internal_url":"https://www.academia.edu/87348779/Islamic_Extremists_in_Africa","translated_internal_url":"","created_at":"2022-09-26T07:40:55.446-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":82613518,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[{"id":91583067,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/91583067/thumbnails/1.jpg","file_name":"3f6abce43e5a24638f29e4ce15ab1bc97f22.pdf","download_url":"https://www.academia.edu/attachments/91583067/download_file","bulk_download_file_name":"Islamic_Extremists_in_Africa.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/91583067/3f6abce43e5a24638f29e4ce15ab1bc97f22-libre.pdf?1664203458=\u0026response-content-disposition=attachment%3B+filename%3DIslamic_Extremists_in_Africa.pdf\u0026Expires=1743223500\u0026Signature=QhA7dFe4hc3wgZkgbMdkPCqeJHWihR18X0gsZpz4dc~33d6rAX6hdiO9o45tvUR936LtDmMmCMolLC7od~mhnYdCayNqYgmKBqhA2dXCEuVWhvwW8eEw0ADbkSCRrsbgehCum-qhfWosHDdwIQnB4izi-Afimo75G4vpBHQ4RK2-W3Rpw0UHLi7H5VKPwJDLFrqYkUicQF2vfKDr07TUMegpChTmgOPA2CHF7PAKMEaUDgKPtphfy2qvwZtTA~mwMZHfINGgYME243yvUbgXDIYJ5qddfxeOygQDlCmvS9mOyvUP5~0D9xpmCe~ZuYxbqnm2HRWTPp7Q1acAnoQTdA__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"slug":"Islamic_Extremists_in_Africa","translated_slug":"","page_count":3,"language":"en","content_type":"Work","summary":"Security is a growing concern on the African continent as the Regional Economic Communities (REC) move toward economic integration. Furthermore, these regions collectively make up the African Union (AU) which has an objective to promote peace, security, and stability on the African continent. In recent years, Africa has been plagued with political uprisings, civil wars, extremists, corrupt politicians, and the battle for natural resources. In particular, Kenya and Nigeria are facing Islamic extremists that threaten the foundation of multiple nations. In both countries, they are using military force to combat these threats. This chapter provides insight into these West and East African nations and their means to provide security assurances to their citizens.","owner":{"id":82613518,"first_name":"Maurice","middle_initials":null,"last_name":"Dawson","page_name":"MauriceDawson","domain_name":"iit","created_at":"2018-06-06T13:08:54.103-07:00","display_name":"Maurice Dawson","url":"https://iit.academia.edu/MauriceDawson"},"attachments":[{"id":91583067,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/91583067/thumbnails/1.jpg","file_name":"3f6abce43e5a24638f29e4ce15ab1bc97f22.pdf","download_url":"https://www.academia.edu/attachments/91583067/download_file","bulk_download_file_name":"Islamic_Extremists_in_Africa.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/91583067/3f6abce43e5a24638f29e4ce15ab1bc97f22-libre.pdf?1664203458=\u0026response-content-disposition=attachment%3B+filename%3DIslamic_Extremists_in_Africa.pdf\u0026Expires=1743223500\u0026Signature=QhA7dFe4hc3wgZkgbMdkPCqeJHWihR18X0gsZpz4dc~33d6rAX6hdiO9o45tvUR936LtDmMmCMolLC7od~mhnYdCayNqYgmKBqhA2dXCEuVWhvwW8eEw0ADbkSCRrsbgehCum-qhfWosHDdwIQnB4izi-Afimo75G4vpBHQ4RK2-W3Rpw0UHLi7H5VKPwJDLFrqYkUicQF2vfKDr07TUMegpChTmgOPA2CHF7PAKMEaUDgKPtphfy2qvwZtTA~mwMZHfINGgYME243yvUbgXDIYJ5qddfxeOygQDlCmvS9mOyvUP5~0D9xpmCe~ZuYxbqnm2HRWTPp7Q1acAnoQTdA__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"research_interests":[{"id":261,"name":"Geography","url":"https://www.academia.edu/Documents/in/Geography"}],"urls":[]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") if (false) { Aedu.setUpFigureCarousel('profile-work-87348779-figures'); } }); </script> <div class="js-work-strip profile--work_container" data-work-id="87348774"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/87348774/Systems_Engineering_Concepts_with_Aid_of_Virtual_Worlds_and_Open_Source_Software"><img alt="Research paper thumbnail of Systems Engineering Concepts with Aid of Virtual Worlds and Open Source Software" class="work-thumbnail" src="https://attachments.academia-assets.com/91583082/thumbnails/1.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/87348774/Systems_Engineering_Concepts_with_Aid_of_Virtual_Worlds_and_Open_Source_Software">Systems Engineering Concepts with Aid of Virtual Worlds and Open Source Software</a></div><div class="wp-workCard_item"><span>Advances in Game-Based Learning</span></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">Technology is changing the landscape of learning and teaching in America. The use of virtual worl...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">Technology is changing the landscape of learning and teaching in America. The use of virtual worlds enable engineering and technology programs to implement software programs such as Second Life and Open Simulator to enhance what they may currently already have. Additionally, virtual worlds can add a more dynamic environment in the online classroom for multiple platforms such as the Personal Computer (PC), wearables, and mobile devices. The purpose of this chapter is to provide a review of these programs to include how to implement these items into an engineering course. Further detailed in this submission is how to incorporate Institute of Electrical and Electronics Engineers (IEEE) documentation and other engineering guidelines into the projects. Included in this chapter is a detailed layout of a simulated environment as well as various approaches of structuring and organization for classroom activities.</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><a id="7879d8662e7786454753d05af8aa1235" class="wp-workCard--action" rel="nofollow" data-click-track="profile-work-strip-download" data-download="{&quot;attachment_id&quot;:91583082,&quot;asset_id&quot;:87348774,&quot;asset_type&quot;:&quot;Work&quot;,&quot;button_location&quot;:&quot;profile&quot;}" href="https://www.academia.edu/attachments/91583082/download_file?s=profile"><span><i class="fa fa-arrow-down"></i></span><span>Download</span></a><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="87348774"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="87348774"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 87348774; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=87348774]").text(description); $(".js-view-count[data-work-id=87348774]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 87348774; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='87348774']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-a9bf3a2bc8c89fa2a77156577594264ee8a0f214d74241bc0fcd3f69f8d107ac.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (true){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "7879d8662e7786454753d05af8aa1235" } } $('.js-work-strip[data-work-id=87348774]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":87348774,"title":"Systems Engineering Concepts with Aid of Virtual Worlds and Open Source Software","translated_title":"","metadata":{"abstract":"Technology is changing the landscape of learning and teaching in America. The use of virtual worlds enable engineering and technology programs to implement software programs such as Second Life and Open Simulator to enhance what they may currently already have. Additionally, virtual worlds can add a more dynamic environment in the online classroom for multiple platforms such as the Personal Computer (PC), wearables, and mobile devices. The purpose of this chapter is to provide a review of these programs to include how to implement these items into an engineering course. Further detailed in this submission is how to incorporate Institute of Electrical and Electronics Engineers (IEEE) documentation and other engineering guidelines into the projects. Included in this chapter is a detailed layout of a simulated environment as well as various approaches of structuring and organization for classroom activities.","publisher":"IGI Global","ai_title_tag":"Innovative Systems Engineering via Virtual Worlds","publication_name":"Advances in Game-Based Learning"},"translated_abstract":"Technology is changing the landscape of learning and teaching in America. The use of virtual worlds enable engineering and technology programs to implement software programs such as Second Life and Open Simulator to enhance what they may currently already have. Additionally, virtual worlds can add a more dynamic environment in the online classroom for multiple platforms such as the Personal Computer (PC), wearables, and mobile devices. The purpose of this chapter is to provide a review of these programs to include how to implement these items into an engineering course. Further detailed in this submission is how to incorporate Institute of Electrical and Electronics Engineers (IEEE) documentation and other engineering guidelines into the projects. Included in this chapter is a detailed layout of a simulated environment as well as various approaches of structuring and organization for classroom activities.","internal_url":"https://www.academia.edu/87348774/Systems_Engineering_Concepts_with_Aid_of_Virtual_Worlds_and_Open_Source_Software","translated_internal_url":"","created_at":"2022-09-26T07:40:49.365-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":82613518,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[{"id":91583082,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/91583082/thumbnails/1.jpg","file_name":"SystemEng_VirtualWorlds_stamped.pdf","download_url":"https://www.academia.edu/attachments/91583082/download_file","bulk_download_file_name":"Systems_Engineering_Concepts_with_Aid_of.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/91583082/SystemEng_VirtualWorlds_stamped-libre.pdf?1664203454=\u0026response-content-disposition=attachment%3B+filename%3DSystems_Engineering_Concepts_with_Aid_of.pdf\u0026Expires=1743223500\u0026Signature=E8P80i8NKFdGAumLVr~UiOdBcW5WcdH1Q2tk82c~~1wabC4~sQx1JTDY4uD9Uy8hZJGgDpNUokl-GIMJB5pKihkMyCFeFn1Sfaf84wVPIeiLt-BKbIvdgjup3156P~Tuv5SSD73A9aBDLh4NxjGDkgWD9hDxzjINgpSQKw2j3~hJ-bhAI37lgw3M40Khn0hJfiVXD-ae8qCalvQKcjeqy75ryXo3QRo9cbMFcgOkRSMvLlLtLoa9mrqfdtS3HoqEC8RoxD1htgngWfkIyRRGSPpc88dFaNb1dQrWzz4R0wDzLv9a7~yhG2SDG8CgzNH8Nb4qB0wVPCiPR70HLvL1Og__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"slug":"Systems_Engineering_Concepts_with_Aid_of_Virtual_Worlds_and_Open_Source_Software","translated_slug":"","page_count":30,"language":"en","content_type":"Work","summary":"Technology is changing the landscape of learning and teaching in America. The use of virtual worlds enable engineering and technology programs to implement software programs such as Second Life and Open Simulator to enhance what they may currently already have. Additionally, virtual worlds can add a more dynamic environment in the online classroom for multiple platforms such as the Personal Computer (PC), wearables, and mobile devices. The purpose of this chapter is to provide a review of these programs to include how to implement these items into an engineering course. Further detailed in this submission is how to incorporate Institute of Electrical and Electronics Engineers (IEEE) documentation and other engineering guidelines into the projects. Included in this chapter is a detailed layout of a simulated environment as well as various approaches of structuring and organization for classroom activities.","owner":{"id":82613518,"first_name":"Maurice","middle_initials":null,"last_name":"Dawson","page_name":"MauriceDawson","domain_name":"iit","created_at":"2018-06-06T13:08:54.103-07:00","display_name":"Maurice Dawson","url":"https://iit.academia.edu/MauriceDawson"},"attachments":[{"id":91583082,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/91583082/thumbnails/1.jpg","file_name":"SystemEng_VirtualWorlds_stamped.pdf","download_url":"https://www.academia.edu/attachments/91583082/download_file","bulk_download_file_name":"Systems_Engineering_Concepts_with_Aid_of.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/91583082/SystemEng_VirtualWorlds_stamped-libre.pdf?1664203454=\u0026response-content-disposition=attachment%3B+filename%3DSystems_Engineering_Concepts_with_Aid_of.pdf\u0026Expires=1743223500\u0026Signature=E8P80i8NKFdGAumLVr~UiOdBcW5WcdH1Q2tk82c~~1wabC4~sQx1JTDY4uD9Uy8hZJGgDpNUokl-GIMJB5pKihkMyCFeFn1Sfaf84wVPIeiLt-BKbIvdgjup3156P~Tuv5SSD73A9aBDLh4NxjGDkgWD9hDxzjINgpSQKw2j3~hJ-bhAI37lgw3M40Khn0hJfiVXD-ae8qCalvQKcjeqy75ryXo3QRo9cbMFcgOkRSMvLlLtLoa9mrqfdtS3HoqEC8RoxD1htgngWfkIyRRGSPpc88dFaNb1dQrWzz4R0wDzLv9a7~yhG2SDG8CgzNH8Nb4qB0wVPCiPR70HLvL1Og__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"research_interests":[{"id":37,"name":"Information Systems","url":"https://www.academia.edu/Documents/in/Information_Systems"},{"id":48,"name":"Engineering","url":"https://www.academia.edu/Documents/in/Engineering"},{"id":422,"name":"Computer Science","url":"https://www.academia.edu/Documents/in/Computer_Science"},{"id":472,"name":"Human Computer Interaction","url":"https://www.academia.edu/Documents/in/Human_Computer_Interaction"},{"id":859,"name":"Communication","url":"https://www.academia.edu/Documents/in/Communication"},{"id":922,"name":"Education","url":"https://www.academia.edu/Documents/in/Education"},{"id":1003,"name":"Educational Technology","url":"https://www.academia.edu/Documents/in/Educational_Technology"},{"id":1380,"name":"Computer Engineering","url":"https://www.academia.edu/Documents/in/Computer_Engineering"},{"id":2152,"name":"Virtual Environments","url":"https://www.academia.edu/Documents/in/Virtual_Environments"},{"id":2621,"name":"Higher Education","url":"https://www.academia.edu/Documents/in/Higher_Education"},{"id":3391,"name":"Systems Engineering","url":"https://www.academia.edu/Documents/in/Systems_Engineering"},{"id":3510,"name":"Virtual Communities","url":"https://www.academia.edu/Documents/in/Virtual_Communities"},{"id":5006,"name":"Computer Games Technology","url":"https://www.academia.edu/Documents/in/Computer_Games_Technology"},{"id":10641,"name":"Game Based Learning","url":"https://www.academia.edu/Documents/in/Game_Based_Learning"},{"id":11006,"name":"Computer Mediated Communication","url":"https://www.academia.edu/Documents/in/Computer_Mediated_Communication"},{"id":21842,"name":"Virtual Worlds","url":"https://www.academia.edu/Documents/in/Virtual_Worlds"},{"id":98941,"name":"Virtual Learning","url":"https://www.academia.edu/Documents/in/Virtual_Learning"},{"id":1226904,"name":"Computer Science and Engineering","url":"https://www.academia.edu/Documents/in/Computer_Science_and_Engineering-1"}],"urls":[{"id":24197572,"url":"https://www.igi-global.com/viewtitle.aspx?TitleId=153787"}]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") if (false) { Aedu.setUpFigureCarousel('profile-work-87348774-figures'); } }); </script> </div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-a9bf3a2bc8c89fa2a77156577594264ee8a0f214d74241bc0fcd3f69f8d107ac.js","https://a.academia-assets.com/assets/google_contacts-0dfb882d836b94dbcb4a2d123d6933fc9533eda5be911641f20b4eb428429600.js"], function() { // from javascript_helper.rb $('.js-google-connect-button').click(function(e) { e.preventDefault(); GoogleContacts.authorize_and_show_contacts(); Aedu.Dismissibles.recordClickthrough("WowProfileImportContactsPrompt"); }); $('.js-update-biography-button').click(function(e) { e.preventDefault(); Aedu.Dismissibles.recordClickthrough("UpdateUserBiographyPrompt"); $.ajax({ url: $r.api_v0_profiles_update_about_path({ subdomain_param: 'api', about: "", }), type: 'PUT', success: function(response) { location.reload(); } }); }); $('.js-work-creator-button').click(function (e) { e.preventDefault(); window.location = $r.upload_funnel_document_path({ source: encodeURIComponent(""), }); }); $('.js-video-upload-button').click(function (e) { e.preventDefault(); window.location = $r.upload_funnel_video_path({ source: encodeURIComponent(""), }); }); $('.js-do-this-later-button').click(function() { $(this).closest('.js-profile-nag-panel').remove(); Aedu.Dismissibles.recordDismissal("WowProfileImportContactsPrompt"); }); $('.js-update-biography-do-this-later-button').click(function(){ $(this).closest('.js-profile-nag-panel').remove(); Aedu.Dismissibles.recordDismissal("UpdateUserBiographyPrompt"); }); $('.wow-profile-mentions-upsell--close').click(function(){ $('.wow-profile-mentions-upsell--panel').hide(); Aedu.Dismissibles.recordDismissal("WowProfileMentionsUpsell"); }); $('.wow-profile-mentions-upsell--button').click(function(){ Aedu.Dismissibles.recordClickthrough("WowProfileMentionsUpsell"); }); new WowProfile.SocialRedesignUserWorks({ initialWorksOffset: 20, allWorksOffset: 20, maxSections: 2 }) }); </script> </div></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile_edit-5ea339ee107c863779f560dd7275595239fed73f1a13d279d2b599a28c0ecd33.js","https://a.academia-assets.com/assets/add_coauthor-22174b608f9cb871d03443cafa7feac496fb50d7df2d66a53f5ee3c04ba67f53.js","https://a.academia-assets.com/assets/tab-dcac0130902f0cc2d8cb403714dd47454f11fc6fb0e99ae6a0827b06613abc20.js","https://a.academia-assets.com/assets/wow_profile-a9bf3a2bc8c89fa2a77156577594264ee8a0f214d74241bc0fcd3f69f8d107ac.js"], function() { // from javascript_helper.rb window.ae = window.ae || {}; window.ae.WowProfile = window.ae.WowProfile || {}; if(Aedu.User.current && Aedu.User.current.id === $viewedUser.id) { window.ae.WowProfile.current_user_edit = {}; new WowProfileEdit.EditUploadView({ el: '.js-edit-upload-button-wrapper', model: window.$current_user, }); new AddCoauthor.AddCoauthorsController(); } var userInfoView = new WowProfile.SocialRedesignUserInfo({ recaptcha_key: "6LdxlRMTAAAAADnu_zyLhLg0YF9uACwz78shpjJB" }); WowProfile.router = new WowProfile.Router({ userInfoView: userInfoView }); Backbone.history.start({ pushState: true, root: "/" + $viewedUser.page_name }); new WowProfile.UserWorksNav() }); </script> </div> <div class="bootstrap login"><div class="modal fade login-modal" id="login-modal"><div class="login-modal-dialog modal-dialog"><div class="modal-content"><div class="modal-header"><button class="close close" data-dismiss="modal" type="button"><span aria-hidden="true">&times;</span><span class="sr-only">Close</span></button><h4 class="modal-title text-center"><strong>Log In</strong></h4></div><div class="modal-body"><div class="row"><div class="col-xs-10 col-xs-offset-1"><button class="btn btn-fb btn-lg btn-block btn-v-center-content" id="login-facebook-oauth-button"><svg style="float: left; width: 19px; line-height: 1em; margin-right: .3em;" aria-hidden="true" focusable="false" data-prefix="fab" data-icon="facebook-square" class="svg-inline--fa fa-facebook-square fa-w-14" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 448 512"><path fill="currentColor" d="M400 32H48A48 48 0 0 0 0 80v352a48 48 0 0 0 48 48h137.25V327.69h-63V256h63v-54.64c0-62.15 37-96.48 93.67-96.48 27.14 0 55.52 4.84 55.52 4.84v61h-31.27c-30.81 0-40.42 19.12-40.42 38.73V256h68.78l-11 71.69h-57.78V480H400a48 48 0 0 0 48-48V80a48 48 0 0 0-48-48z"></path></svg><small><strong>Log in</strong> with <strong>Facebook</strong></small></button><br /><button class="btn btn-google btn-lg btn-block btn-v-center-content" id="login-google-oauth-button"><svg style="float: left; width: 22px; line-height: 1em; margin-right: .3em;" aria-hidden="true" focusable="false" data-prefix="fab" data-icon="google-plus" class="svg-inline--fa fa-google-plus fa-w-16" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 512 512"><path fill="currentColor" d="M256,8C119.1,8,8,119.1,8,256S119.1,504,256,504,504,392.9,504,256,392.9,8,256,8ZM185.3,380a124,124,0,0,1,0-248c31.3,0,60.1,11,83,32.3l-33.6,32.6c-13.2-12.9-31.3-19.1-49.4-19.1-42.9,0-77.2,35.5-77.2,78.1S142.3,334,185.3,334c32.6,0,64.9-19.1,70.1-53.3H185.3V238.1H302.2a109.2,109.2,0,0,1,1.9,20.7c0,70.8-47.5,121.2-118.8,121.2ZM415.5,273.8v35.5H380V273.8H344.5V238.3H380V202.8h35.5v35.5h35.2v35.5Z"></path></svg><small><strong>Log in</strong> with <strong>Google</strong></small></button><br /><style type="text/css">.sign-in-with-apple-button { width: 100%; height: 52px; border-radius: 3px; border: 1px solid black; cursor: pointer; } .sign-in-with-apple-button > div { margin: 0 auto; / This centers the Apple-rendered button horizontally }</style><script src="https://appleid.cdn-apple.com/appleauth/static/jsapi/appleid/1/en_US/appleid.auth.js" type="text/javascript"></script><div class="sign-in-with-apple-button" data-border="false" data-color="white" id="appleid-signin"><span &nbsp;&nbsp;="Sign Up with Apple" class="u-fs11"></span></div><script>AppleID.auth.init({ clientId: 'edu.academia.applesignon', scope: 'name email', redirectURI: 'https://www.academia.edu/sessions', state: "889674236d7f0aca06e0a1632646b6a2b91c8167d919b1e2c8b91d33b2910c25", });</script><script>// Hacky way of checking if on fast loswp if (window.loswp == null) { (function() { const Google = window?.Aedu?.Auth?.OauthButton?.Login?.Google; const Facebook = window?.Aedu?.Auth?.OauthButton?.Login?.Facebook; if (Google) { new Google({ el: '#login-google-oauth-button', rememberMeCheckboxId: 'remember_me', track: null }); } if (Facebook) { new Facebook({ el: '#login-facebook-oauth-button', rememberMeCheckboxId: 'remember_me', track: null }); } })(); }</script></div></div></div><div class="modal-body"><div class="row"><div class="col-xs-10 col-xs-offset-1"><div class="hr-heading login-hr-heading"><span class="hr-heading-text">or</span></div></div></div></div><div class="modal-body"><div class="row"><div class="col-xs-10 col-xs-offset-1"><form class="js-login-form" action="https://www.academia.edu/sessions" accept-charset="UTF-8" method="post"><input type="hidden" name="authenticity_token" value="Cyg4I8fIuE5Gk9ifI67O-bEiLzfQXEdUPy5RQKnyhtidgGdllshjLTRu2ST4W-B68NtghUGwnVzrJseFk0csTw" autocomplete="off" /><div class="form-group"><label class="control-label" for="login-modal-email-input" style="font-size: 14px;">Email</label><input class="form-control" id="login-modal-email-input" name="login" type="email" /></div><div class="form-group"><label class="control-label" for="login-modal-password-input" style="font-size: 14px;">Password</label><input class="form-control" id="login-modal-password-input" name="password" type="password" /></div><input type="hidden" name="post_login_redirect_url" id="post_login_redirect_url" value="https://iit.academia.edu/MauriceDawson" autocomplete="off" /><div class="checkbox"><label><input type="checkbox" name="remember_me" id="remember_me" value="1" checked="checked" /><small style="font-size: 12px; margin-top: 2px; display: inline-block;">Remember me on this computer</small></label></div><br><input type="submit" name="commit" value="Log In" class="btn btn-primary btn-block btn-lg js-login-submit" data-disable-with="Log In" /></br></form><script>typeof window?.Aedu?.recaptchaManagedForm === 'function' && window.Aedu.recaptchaManagedForm( document.querySelector('.js-login-form'), document.querySelector('.js-login-submit') );</script><small style="font-size: 12px;"><br />or <a data-target="#login-modal-reset-password-container" data-toggle="collapse" href="javascript:void(0)">reset password</a></small><div class="collapse" id="login-modal-reset-password-container"><br /><div class="well margin-0x"><form class="js-password-reset-form" action="https://www.academia.edu/reset_password" accept-charset="UTF-8" method="post"><input type="hidden" name="authenticity_token" value="cEV8D5O_R0zhLf03RcdUd5hCMZuHmp0oNsSsA4Tr5knm7SNJwr-cL5PQ_IyeMnr02bt-KRZ2RyDizDrGvl5M3g" autocomplete="off" /><p>Enter the email address you signed up with and we&#39;ll email you a reset link.</p><div class="form-group"><input class="form-control" name="email" type="email" /></div><script src="https://recaptcha.net/recaptcha/api.js" async defer></script> <script> var invisibleRecaptchaSubmit = function () { var closestForm = function (ele) { var curEle = ele.parentNode; while (curEle.nodeName !== 'FORM' && curEle.nodeName !== 'BODY'){ curEle = curEle.parentNode; } return curEle.nodeName === 'FORM' ? curEle : null }; var eles = document.getElementsByClassName('g-recaptcha'); if (eles.length > 0) { var form = closestForm(eles[0]); if (form) { form.submit(); } } }; </script> <input type="submit" data-sitekey="6Lf3KHUUAAAAACggoMpmGJdQDtiyrjVlvGJ6BbAj" data-callback="invisibleRecaptchaSubmit" class="g-recaptcha btn btn-primary btn-block" value="Email me a link" value=""/> </form></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/collapse-45805421cf446ca5adf7aaa1935b08a3a8d1d9a6cc5d91a62a2a3a00b20b3e6a.js"], function() { // from javascript_helper.rb $("#login-modal-reset-password-container").on("shown.bs.collapse", function() { $(this).find("input[type=email]").focus(); }); }); </script> </div></div></div><div class="modal-footer"><div class="text-center"><small style="font-size: 12px;">Need an account?&nbsp;<a rel="nofollow" href="https://www.academia.edu/signup">Click here to sign up</a></small></div></div></div></div></div></div><script>// If we are on subdomain or non-bootstrapped page, redirect to login page instead of showing modal (function(){ if (typeof $ === 'undefined') return; var host = window.location.hostname; if ((host === $domain || host === "www."+$domain) && (typeof $().modal === 'function')) { $("#nav_log_in").click(function(e) { // Don't follow the link and open the modal e.preventDefault(); $("#login-modal").on('shown.bs.modal', function() { $(this).find("#login-modal-email-input").focus() }).modal('show'); }); } })()</script> <div class="bootstrap" id="footer"><div class="footer-content clearfix text-center padding-top-7x" style="width:100%;"><ul class="footer-links-secondary footer-links-wide list-inline margin-bottom-1x"><li><a href="https://www.academia.edu/about">About</a></li><li><a href="https://www.academia.edu/press">Press</a></li><li><a href="https://www.academia.edu/documents">Papers</a></li><li><a href="https://www.academia.edu/topics">Topics</a></li><li><a href="https://www.academia.edu/journals">Academia.edu Journals</a></li><li><a rel="nofollow" href="https://www.academia.edu/hiring"><svg style="width: 13px; height: 13px;" aria-hidden="true" focusable="false" data-prefix="fas" data-icon="briefcase" class="svg-inline--fa fa-briefcase fa-w-16" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 512 512"><path fill="currentColor" d="M320 336c0 8.84-7.16 16-16 16h-96c-8.84 0-16-7.16-16-16v-48H0v144c0 25.6 22.4 48 48 48h416c25.6 0 48-22.4 48-48V288H320v48zm144-208h-80V80c0-25.6-22.4-48-48-48H176c-25.6 0-48 22.4-48 48v48H48c-25.6 0-48 22.4-48 48v80h512v-80c0-25.6-22.4-48-48-48zm-144 0H192V96h128v32z"></path></svg>&nbsp;<strong>We're Hiring!</strong></a></li><li><a rel="nofollow" href="https://support.academia.edu/hc/en-us"><svg style="width: 12px; height: 12px;" aria-hidden="true" focusable="false" data-prefix="fas" data-icon="question-circle" class="svg-inline--fa fa-question-circle fa-w-16" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 512 512"><path fill="currentColor" d="M504 256c0 136.997-111.043 248-248 248S8 392.997 8 256C8 119.083 119.043 8 256 8s248 111.083 248 248zM262.655 90c-54.497 0-89.255 22.957-116.549 63.758-3.536 5.286-2.353 12.415 2.715 16.258l34.699 26.31c5.205 3.947 12.621 3.008 16.665-2.122 17.864-22.658 30.113-35.797 57.303-35.797 20.429 0 45.698 13.148 45.698 32.958 0 14.976-12.363 22.667-32.534 33.976C247.128 238.528 216 254.941 216 296v4c0 6.627 5.373 12 12 12h56c6.627 0 12-5.373 12-12v-1.333c0-28.462 83.186-29.647 83.186-106.667 0-58.002-60.165-102-116.531-102zM256 338c-25.365 0-46 20.635-46 46 0 25.364 20.635 46 46 46s46-20.636 46-46c0-25.365-20.635-46-46-46z"></path></svg>&nbsp;<strong>Help Center</strong></a></li></ul><ul class="footer-links-tertiary list-inline margin-bottom-1x"><li class="small">Find new research papers in:</li><li class="small"><a href="https://www.academia.edu/Documents/in/Physics">Physics</a></li><li class="small"><a href="https://www.academia.edu/Documents/in/Chemistry">Chemistry</a></li><li class="small"><a href="https://www.academia.edu/Documents/in/Biology">Biology</a></li><li class="small"><a href="https://www.academia.edu/Documents/in/Health_Sciences">Health Sciences</a></li><li class="small"><a href="https://www.academia.edu/Documents/in/Ecology">Ecology</a></li><li class="small"><a href="https://www.academia.edu/Documents/in/Earth_Sciences">Earth Sciences</a></li><li class="small"><a href="https://www.academia.edu/Documents/in/Cognitive_Science">Cognitive Science</a></li><li class="small"><a href="https://www.academia.edu/Documents/in/Mathematics">Mathematics</a></li><li class="small"><a href="https://www.academia.edu/Documents/in/Computer_Science">Computer Science</a></li></ul></div></div><div class="DesignSystem" id="credit" style="width:100%;"><ul class="u-pl0x footer-links-legal list-inline"><li><a rel="nofollow" href="https://www.academia.edu/terms">Terms</a></li><li><a rel="nofollow" href="https://www.academia.edu/privacy">Privacy</a></li><li><a rel="nofollow" href="https://www.academia.edu/copyright">Copyright</a></li><li>Academia &copy;2025</li></ul></div><script> //<![CDATA[ window.detect_gmtoffset = true; window.Academia && window.Academia.set_gmtoffset && Academia.set_gmtoffset('/gmtoffset'); //]]> </script> <div id='overlay_background'></div> <div id='bootstrap-modal-container' class='bootstrap'></div> <div id='ds-modal-container' class='bootstrap DesignSystem'></div> <div id='full-screen-modal'></div> </div> </body> </html>

Pages: 1 2 3 4 5 6 7 8 9 10