Integrating Software Assurance into the Software Development Life Cycle (SDLC) M Dawson, D Burrell, E Rahim, S Brewster Journal of Information Systems Technology and Planning 3 (6), 49-53, 2010 | 102 | 2010 |
An Examination of the Prior Use of E-Learning Within an Extended Technology Acceptance Model and the Factors That Influence the Behavioral Intention of Users to Use M-Learning J Abramson, M Dawson, J Stevens SAGE Open 5 (4), 1-9, 2015 | 77 | 2015 |
A Brief Review of New Threats and Countermeasures in Digital Crime and Cyber Terrorism M Dawson Cyber Security and Threats: Concepts, Methodologies, Tools, and Applications …, 2018 | 62 | 2018 |
A Brief Review of New Threats and Countermeasures in Digital Crime and Cyber Terrorism M Dawson New Threats and Countermeasures in Digital Crime and Cyber Terrorism, 1-7, 2015 | 60 | 2015 |
Fostering entrepreneurship and building entrepreneurial self-efficacy in primary and secondary education NL Studdard, M Dawson, NL Jackson Creative and Knowledge Society 3 (2), 1, 2013 | 54 | 2013 |
Understanding the Challenge of Cybersecurity in Critical Infrastructure Sectors M Dawson, R Bacius, LB Gouveia, A Vassilakos Land Forces Academy Review 26 (1), 69 - 75, 2021 | 50 | 2021 |
Cyber Security in Industry 4.0: The Pitfalls of Having Hyperconnected Systems M Dawson Journal of Strategic Management Studies 10 (1), 19-28, 2018 | 42 | 2018 |
Cyber Security and Mobile Threats: The Need for Antivirus Applications for Smart Phones J Wright, M Dawson, M Omar Journal of Information Systems Technology and Planning 5 (14), 40-60, 2012 | 42 | 2012 |
Applying a Holistic Cyber Security Framework for Global IT Organizations M Dawson Business Information Review, 2018 | 39 | 2018 |
Security Solutions for Hyperconnectivity and the Internet of Things M Dawson, M Eltayeb, M Omar IGI Global, 2016 | 33 | 2016 |
Understanding user’s acceptance of personal cloud computing: Using the Technology Acceptance Model M Eltayeb, M Dawson Information Technology: New generations 448, 3-12, 2016 | 32 | 2016 |
Understanding the Methods behind Cyber Terrorism M Dawson, M Omar, J Abramson Encyclopedia of Information Science and Technology - 3rd ed., 1539-1549, 2015 | 32 | 2015 |
DoD cyber technology policies to secure automated information systems ME Dawson Jr, M Crespo, S Brewster International Journal of Business Continuity and Risk Management 4 (1), 1-22, 2013 | 27 | 2013 |
Use of open source software and virtualization in academia to enhance higher education everywhere M Eugene Dawson, I Al Saeed Increasing Student Engagement and Retention Using Immersive Interfaces …, 2012 | 26 | 2012 |
Microblogging in Higher Education: Digital Natives, Knowledge Creation, Social Engineering, and Intelligence Analysis of Educational Tweets S Cleveland, BC Jackson, M Dawson E-Learning and Digital Media 13 (1-2), 1-19, 2016 | 25 | 2016 |
Changing The Cultures of Colleges and Universities to Make Them More Adaptive A Finch, DN Burrell, R Walker, E Rahim, M Dawson REVIEW OF HIGHER EDUCATION AND SELF-LEARNING 3 (7), 40-53, 2010 | 22 | 2010 |
A review of enhancing intrusion detection systems for cybersecurity using artificial intelligence (AI) M Markevych, M Dawson International Conference Knowledge-Based Organization 29 (3), 30-37, 2023 | 21 | 2023 |
Improving Cyber Defense Education Through National Standard Alignment: Case Studies P Wang, M Dawson, K Williams National Security: Breakthroughs in Research and Practice, 78-91, 2019 | 20 | 2019 |
Improving Cyber Defense Education through National Standard Alignment: Case Studies P Wang, M Dawson, K Williams International Journal of Hyperconnectivity and the Internet of Things 2 (1 …, 2018 | 20 | 2018 |
Research in progress-defending android smartphones from malware attacks M Omar, M Dawson 2013 third international conference on advanced computing and communication …, 2013 | 19 | 2013 |