Maurice E. Dawson

  • Assistant Professor
  • Director, Center for Cyber Security and Forensics Education

Education

Postdoc, Information Science, Universidade Fernando Pessoa, 2021

Ph.D., Hyper-connectivity: Intricacies of national and international cyber securities, London Metropolitan University, 2017

D.C.Sc., Enterprise Information Systems, Colorado Technical University, 2009

M.B.A., Colorado Technical University, 2010

M.S., Management in Information Systems Security, Colorado Technical University, 2006

B.S., Applied Technology Athens State University, 2004

Research Interests

Software assurance, advanced cyber security principles, Internet of Things (IoT)

Professional Affiliations & Memberships

2017-present Member, Association for the Study of the Middle East and Africa

2016-present Member, Association of Information Systems

2016-present Member - President, Midwest Association of Information Systems

2015-present Member, Fulbright Specialist Program Alumni

2015-present Senior Member,Institute of Electrical and Electronics Engineers

2011-2015 Member, Intellectbase International Consortium

2008-present Member, International Information System Security Certification Consortium

2013-present Member, Sigma Xi

2011-present Member, International Association of Engineers

2011-present Member, IAENG Society of Computer Science

2011-present Member, IAENG Society of Data Mining

2011-present Member, IAENG Society of Information System Engineering

2011-present Member, IAENG Society of Wireless Networks

2008-2011 Member, Canada’s Association of Information Technology (IT) Professionals | Association canadienne des professionals en technologies de l’information

2006-present Member,Colorado Technical University Alumni

2001-present Member, US Army Signal Corps

Awards

  • Teaching Award from the College of Computing at Illinois Tech in Spring 2021
  • Fulbright Scholar Core Project 10500-BC, Botswana, 2020-2021
  • Education Excellence Award from the School of Applied Technology at Illinois Tech in Spring 2019
  • Fulbright Scholar Specialist Project ID: FSP-P000654/Saudi Arabia, 2017-2018
  • Silver President's Volunteer Service Award, 2018
  • Bronze President's Volunteer Service Award, 2016
  • UMSL International Studies Program Fellow , 2016-2017
  • Fulbright Specialist Project #6286/Bangladesh (canceled) 2016
  • UMSL International Studies & Program Fellow , 2014-2015
  • Fulbright Specialist Project #5824/Russia, 2014
  • Fulbright Specialist List, 2013-2018 , 2013
  • Excellence in Presentation at ABWIC (1 Awards Received), 2013
  • Excellence in Presentation at ABWIC (3 Awards Received), 2011

Publications

Journal Articles

  1. Dawson, M., Bacius, R., Gouveia, L. B., & Vassilakos, A. (2021). Understanding the Challenge of Cybersecurity in Critical Infrastructure Sectors. Land Forces Academy Review, 26(1), 69-75.
  2. Dawson, M., Vassilakos, A., & Remy, J. L. C. Illicit Activities Beneath theSurface Web: Investigating Domestic Extremism on Anonymous Social Media Platforms. HOLISTICA–Journal of Business and Public Administration 12 (1), 27-40
  3. Burrell, D. N., Barrett, S. J., Lewis, E. J., Dawson, M., Bovell, K., & Crowe, M. (2021). Creating Inclusive Workplaces for Women in Health Organizations Engaging in Digital Economy-Driven Innovations. International Journal of Innovation in the Digital Economy (IJIDE), 12(2), 18-31.
  4. Dawson, M. (2020). Cybercrime: Internet Driven Illicit Activities and Behavior. Land Forces Academy Review, 25(4), 356-362.
  5. Dawson, M., & Szakonyi, A. (2020). Cybersecurity Education to Create Awareness in Artificial Intelligence Applications for Developers and End Users. Scientific Bulletin, 25(2), 85-92.
  6. Burrell, D. N., Dawson, M. E., & Nobles, C. (2020). Innovative doctorate programs in cybersecurity, engineering, and technology in the USA and UK that can be completed by professionals around the world without relocation. Proceedings of the International Conference on Research, 1-3.
  7. Burrell, D. N., Burton, S. L., Nobles, C., Dawson, M. E., & McDowell, T. (2020). Exploring technological management innovations that include artificial intelligence and other innovations in global food production. International Journal of Society Systems Science, 12(4), 267-285.
  8. Dawson, M., Taveras, P., & Detel, C. (2020). Assessment of National Crime Reporting System: Detailed Analysis of the Mobile Application. In 17th International Conference on Information Technology–New Generations (ITNG 2020), (pp. 65-71). Springer, Cham.
  9. Zarour, M., Alenezi, M., Dawson, M., & Alsmadi, I. (2020). Toward Effective Cybersecurity Education in Saudi Arabia. In 17th International Conference on Information Technology–New Generations (ITNG 2020), (pp. 79-85). Springer, Cham.
  10. Martinez, F. G., Dawson, M., & Taveras, P. (2020). Assessment of National Crime Reporting System: Detailed Analysis of the Desktop Application. In 17th International Conference on Information Technology–New Generations (ITNG 2020), (pp. 73-78). Springer, Cham.
  11. Vassilakos, A., Walker, D., & Dawson, M. (2020). Affordable Mobile Data Collection Platform and IT Training in Benin: Analysis of Performance and Usability. In 17th International Conference on Information Technology–New Generations (ITNG 2020), (pp. 635-639). Springer, Cham.
  12. Dawson, M., Taveras, P., & Berasaluce, D. G. (2020). Assessment of National Crime Reporting System: Detailed Analysis of Communication. In 17th International Conference on Information Technology–New Generations (ITNG 2020), (pp. 51-58). Springer, Cham.
  13. Dawson, M. (2020). National Cybersecurity Education: Bridging Defense to Offense. Land Forces Academy Review, 25(1), 68-75.
  14. Burrell, D. N., Courtney-Dattola, A., Burton, S. L., Nobles, C., Springs, D., & Dawson, M. E. (2020). Improving the Quality of “The Internet of Things” Instruction in Technology Management, Cybersecurity, and Computer Science. International Journal of Information and Communication Technology Education (IJICTE), 16(2), 59-70.
  15. Burrell, D. N., Bhargava, N., Springs, D., Dawson, M., Burton, S. L., Anderson, D. P., & Wright, J. B. (2020). Adopting Organizational Cultural Changes Concerning Whistle-Blowing in Healthcare Around Information Security in the “Internet of Things” World. International Journal of Hyperconnectivity and the Internet of Things (IJHIoT), 4(1), 13-28.
  16. Norman, D., Bhargava, N., Harmon, M., Wright, J., Springs, D., & Dawson, M. (2020). Supply Chain and Logistics Management and an Open Door Policy Concerning Cyber Security Introduction. International Journal of Management, 9(1), 1-10.
  17. Garcia Martinex, F. & Dawson, M. (2019). Unprotected Data: Review of Internet Enabled Psychological and Information Warfare. Land Forces Academy Review, 24(3), 187-198.
  18. Dawson, M., Davis, L., & Omar, M. (2019) Developing Learning Objects for Engineering and Science Fields: Using Technology to Test System Usability and Interface Design. International Journal of Smart Technology and Learning – forthcoming
  19. Dawson, M., Walker, D., & Cleveland, S. (2019) Systems Usability in Developing Countries: Case of Computing Use in Guinea. International Journal of ICT Research in Africa and the Middle East-- forthcoming
  20. Dawson, M. (2018) Cyber Security in Industry 4.0: The Pitfalls of Having Hyperconnected Systems. Journal of Strategic Management Studies – forthcoming
  21. Dawson, M., (2018) Applying a Holistic Cyber Security Framework for Global IT Organizations. Business Information Review, 35(2), 60-67.
  22. Stewart, J., & Dawson, M. (2018) How the Modification of Personality Traits Leave One Vulnerable to Manipulation in Social Engineering. International Journal of Information Privacy, Security and Integrity, 3(3), 187-208.
  23. Wang, P., Dawson, M., & Williams, K. L. (2018). Improving Cyber Defense Education through National Standard Alignment: Case Studies. International Journal of Hyperconnectivity and the Internet of Things (IJHIoT), 2(1), 12-28.
  24. Dawson, M., & Cárdenas-Haro, J. A. (2017). Tails Linux Operating System: Remaining Anonymous with the Assistance of an Incognito System in Times of High Surveillance. International Journal of Hyperconnectivity and the Internet of Things (IJHIoT), 1(1), 47-55.
  25. Cleveland, S., Jackson, B. & Dawson, M. (2016). Twitter in higher education: Digital natives, knowledge creation, social engineering, and intelligence analysis of educational tweets. E-Learning and Digital Media, 13(1-2), p. 1-19.
  26. MacPherson, J., & Dawson, M. (2016). Common protocol to support disparate communication types within industrial Ethernet environments. International Journal of Network Science, 1(2), 134-154.
  27. Abramson, J. , Dawson, M. , & Stevens, J. (2015) An examination of the prior use of e-learning within an extended Technology Acceptance Model and the factors that influence the behavioral intention of users to use m-learning, SAGE Open, 5 (4), 1-9.
  28. Studdard, N. L., Dawson, M., & Jackson, N. L. (2013). Fostering Entrepreneurship and Building Entrepreneurial Self-Efficacy in Primary and Secondary Education. Creative and Knowledge Society, 3(2), 1-14.
  29. Dawson, M., Crespo, M., & Brewster, S. (2013) DoD Cyber Technology Policies to Secure Automated Information Systems, International Journal of Business Continuity and Risk Management, 4 (1), 1-22.
  30. Wright, J., Dawson, M., & Omar, M. (2012) Cyber Security and Mobile Threats: The Need for Antivirus Applications for Smart Phones, Journal of Information Systems Technology & Planning, 5(12), 40-60.
  31. Burrell, D., Todd, A., Finch, A., & Dawson, M. (2012) Developing the Next Generation of Women and Minority Scientists for the Nuclear Energy Industry, International Journal of Science in Society,3(2)53-64.
  32. Dawson, M., & Robinson, J. (2012) Innovative Ways to Teach and Incorporate Intelligence, Surveillance, Reconnaissance (ISR) Program Management Concepts in the University Setting , Review of Management Innovation & Creativity, 5(14), 119-126.
  33. Marwan, O., Dawson, M., & Al Saeed, I. (2012) Securing the Mobile Device: Proposed Research Study to Bring Awareness to Mobile Phone Attacks, Journal of Information Systems Technology & Planning, 5(11).
  34. Dawson, M., Truesdale, J., & Robinson, J. (2011) Review of the Health Information Technology Initiatives in Maryland and Georgia, International Journal of Social Health Information Management4(9), 46-61.
  35. Burrell, D., Todd, A., Finch, A., & Dawson, M. (2011) Developing the Next Generation of Women and Minority Scientists for the Nuclear Energy Industry, The International Journal of Science in Society, 3(2), 53-64.
  36. Emanuel, E., Dickens, C., Hunter, J. & Dawson, M. (2011) Clarifying Societies’ Need for Understanding Sustainable Systems , Journal of Applied Global Research, 4(9).
  37. Onyegbula, F., Dawson, M., & Stevens, J. (2011) Dissecting the Cloud Computing Environment: A Case Study for Deploying Cloud Computing Solutions for the National Institute of Food and Agriculture, an Agency of the United States Department of Agriculture, Journal of Information Systems Technology and Planning, 4(8), 17-42.
  38. Dawson, M., & Rahim, E. (2011) Transitional Leadership in the Defense and Aerospace Industry: A Critical Analysis for Recruiting and Developing Talent, International Journal of Project Organisation and Management, 2(3). 164-183.
  39. Brewster, S., & Dawson, M. (2010) Software Assurance Management Best Practices, Journal of Information Systems Technology and Planning, 3(6), 73-80.
  40. Dawson, M., Burrell, D., Rahim, E., & Brewster, S. (2010) Examining the Role of the Chief Information Security Officer, Journal of Information Systems Technology and Planning, 3(6), 1-5.
  41. Dawson, M., Burrell, D., Rahim, E., & Brewster, S. (2010) Integrating Software Assurance into the Software Development Life Cycle (SDLC), Journal of Information Systems Technology and Planning, 3(6), 49-53.

Conference Proceedings

  1. Szakonyi, A., Dawson, M., Chellasamy, H., & Vassilakos, A. (2021) EDUCON - IEEE Global Engineering Education Conference, 2 (1), 1098-1102
  2. Dawson, M., Taveras, P., & Taylor, D. (2019). Applying Software Assurance and Cybersecurity NICE Job Tasks through Secure Software Engineering Labs. Procedia Computer Science, 1-12.
  3. Dawson, M., Martinez, F. G., & Taveras, P. (2019, October). Framework for the Development of Virtual Labs for Industrial Internet of Things and Hyperconnected Systems. In 2019 IEEE Learning With MOOCS (LWMOOCS) (pp. 196-198). IEEE.
  4. Vassilakos, A., Gottlieb, Castanon Remy, J. L. , & Dawson, M. (2019).  Investigating American Extremists and Terrorists Activities on Anonymous Internet Social Media Platforms, 2019 International Criminology Conference, 1-4 .
  5. Vassilakos, A., Gottlieb, M., & Dawson, M. (2019). Towards Crime Prevention Using Big Data Analytics: A Literature Review with an Explorative Case Study.  Fourteenth Annual Conference of the Midwest Association for Information System, 1-2.
  6. Dawson, M., Walker, D., & Moss, A. Information Technology Use in West African Agriculture–challenges and opportunities: a panel. Thirteenth Annual Conference of the Midwest Association for Information System, 1-2.
  7. Dawson, M., Walker, D., & Cleveland, S. (2018). The Case for IT Training within Guinea’s Ministry of Agriculture: Evaluating Performance and Usability. Thirteenth Annual Conference of the Midwest Association for Information System, 1-5.

Postdoc Report

Cyber Warfare Threats and Opportunities by Dawson, Maurice, Postdoctoral Diploma., Universidade Fernando Pessoa (Portugal), 2021, 63.

Chairperson: Dr. Luis Borges Gouveia, Universidade Fernando Pessoa

Books

  1. Dawson, M., Tabona, O., & Maupong, T. (2022). Cybersecurity Capabilities in Developing Nations and Its Impact on Global Security. IGI Global. http://doi:10.4018/978-1-7998-8693-8
  2. Dawson, M., Eltayeb, M., & Omar, M. (2016). Security Solutions for Hyperconnectivity and the Internet of Things (pp. 1-347). Hershey, PA: IGI Global. doi:10.4018/978-1-5225-0741-3 
  3. Dawson, M., Kisku, D. R., Gupta, P., Sing, J. K., & Li, W. (2016). Developing Next-Generation Countermeasures for Homeland Security Threat Prevention (pp. 1-428). Hershey, PA: IGI Global. doi:10.4018/978-1-5225-0703-1
  4. Dawson, M., & Omar, M. (2015). New Threats and Countermeasures in Digital Crime and Cyber Terrorism (pp. 1-368). Hershey, PA: IGI Global. doi:10.4018/978-1-4666-8345-7

Book Chapters

  1. Szakonyi, A., Leonard, B., & Dawson, M. (2021). Dark Web: A Breeding Ground for ID Theft and Financial Crimes. In Rafay, A. (Ed.), Handbook of Research on Theory and Practice of Financial Crimes (pp. 506-524). IGI Global.
  2. Zarour, M., Alenezi, M., Dawson, M., & Alsmadi, I. (2020). Toward Effective Cybersecurity Education in Saudi Arabia. In 17th International Conference on Information Technology–New Generations (ITNG 2020) (pp. 79-85).
  3. Vassilakos, A., Walker, D., & Dawson, M. (2020). Affordable Mobile Data Collection Platform and IT Training in Benin: Analysis of Performance and Usability. In 17th International Conference on Information Technology–New Generations (ITNG 2020) (pp. 635-639). Springer, Cham.
  4. Dawson, M., Taveras, P., & Detel, C. (2020). Assessment of National Crime Reporting System: Detailed Analysis of the Mobile Application. In 17th International Conference on Information Technology–New Generations (ITNG 2020) (pp. 65-71). Springer, Cham.
  5. Dawson, M., Taveras, P., & Berasaluce, D. G. (2020). Assessment of National Crime Reporting System: Detailed Analysis of Communication. In 17th International Conference on Information Technology–New Generations (ITNG 2020) (pp. 51-58). Springer, Cham.
  6. Martinez, F. G., Dawson, M., & Taveras, P. (2020). Assessment of National Crime Reporting System: Detailed Analysis of the Desktop Application. In 17th International Conference on Information Technology–New Generations (ITNG 2020) (pp. 73-78). Springer, Cham.
  7. Dawson, M. (2020). Exploring Secure Computing for the Internet of Things, Internet of Everything, Web of Things, and Hyperconnectivity. In I. Management Association (Ed.), Securing the Internet of Things: Concepts, Methodologies, Tools, and Applications (pp. 1186-1195). Hershey, PA: IGI Global. doi:10.4018/978-1-5225-9866-4.ch053
  8. Dawson, M., & Adeboje, W. (2020). Islamic Extremists in Africa: Security Spotlight on Kenya and Nigeria. In I. Management Association (Ed.), Cyber Warfare and Terrorism: Concepts, Methodologies, Tools, and Applications (pp. 1506-1517). Hershey, PA: IGI Global. doi:10.4018/978-1-7998-2466- 4.ch089
  9. Cárdenas-Haro, J. A., & Dawson Jr, M. (2019). Detecting and Preventing File Alterations in the Cloud Using a Distributed Collaborative Approach. In 16th International Conference on Information Technology-New Generations (ITNG 2019) (pp. 15-18). Springer, Cham.
  10. Omar, M., Mohammed, D., Nguyen, V., Dawson, M., & Banisakher, M. (2019). Android Application Security. In Applying Methods of Scientific Inquiry Into Intelligence, Security, and Counterterrorism(pp. 46-67). IGI Global.
  11. Dawson, M., Omar, M., Abramson, J., & Bessette, D. (2019). The Future of National and International Security on the Internet. In I. Management Association (Ed.), Cyber Law, Privacy, and Security: Concepts, Methodologies, Tools, and Applications (pp. 1666-1696). Hershey, PA: IGI Global. doi:10.4018/978-1-5225-8897-9.ch081
  12. Wang, P., Dawson, M., & Williams, K. L. (2019). Improving Cyber Defense Education Through National Standard Alignment: Case Studies. In I. Management Association (Ed.), National Security: Breakthroughs in Research and Practice (pp. 78-91). Hershey, PA: IGI Global.doi:10.4018/978-1-5225-7912-0.ch005
  13. Dawson M., Wang P., Williams K. (2018) The Role of CAE-CDE in Cybersecurity Education for Workforce Development. In: Latifi S. (eds) Information Technology - New Generations. Advances in Intelligent Systems and Computing, vol 738. Springer, Cham
  14. Dawson, M., Omar, M., Abramson, J., Leonard, B., & Bessette, D. (2018). Battlefield Cyberspace: Exploitation of Hyperconnectivity and Internet of Things. In I. Management Association (Ed.), Virtual and Augmented Reality: Concepts, Methodologies, Tools, and Applications (pp. 1553-1584). Hershey, PA: IGI Global. doi:10.4018/978-1-5225-5469-1.ch073
  15. Dawson, M. (2018). A Brief Review of New Threats and Countermeasures in Digital Crime and Cyber Terrorism. In I. Management Association (Ed.), Cyber Security and Threats: Concepts, Methodologies, Tools, and  (pp. 173-180). Hershey, PA: IGI Global. doi:10.4018/978-1-5225-5634-3.ch010
  16. Leonard, B., & Dawson, M. (2018). Legal Issues: Security and Privacy with Mobile Devices. In I. Management Association (Ed.), Cyber Security and Threats: Concepts, Methodologies, Tools, and Applications (pp. 1352-1361). Hershey, PA: IGI Global. doi:10.4018/978-1-5225-5634-3.ch067 Dawson, M. (2017). Cyber Security Policies for Hyperconnectivity and Internet of Things: A Process for Managing Connectivity. In Information Technology-New Generations (pp. 911-914). Springer, Cham.
  17. Dawson, M., Lieble, M., & Adeboje, A. (2017). Open Source Intelligence: Performing Data Mining and Link Analysis to Track Terrorist Activities. In Information Technology-New Generations (pp. 159-163). Springer, Cham.
  18. Dawson, M., Burton, S. L., Bessette, D., & Wright, J. (2017). Massive Open Online Courses and Integrating Open Source Technology and Open Access Literature Into Technology-Based Degrees. In M. Khosrow-Pour, D.B.A. (Ed.), Encyclopedia of Information Science and Technology, Fourth Edition (pp. 7898-7911). Hershey, PA: IGI Global. doi:10.4018/978-1-5225- 2255-3.ch687
  19. Dawson, M. (2016). Exploring Secure Computing for the Internet of Things, Internet of Everything, Web of Things, and Hyperconnectivity. In M. Dawson, M. Eltayeb, & M. Omar (Eds.) Security Solutions for Hyperconnectivity and the Internet of Things (pp. 1-12). Hershey, PA: Information Science Reference. doi:10.4018/978-1-5225-0741-3.ch001
  20. Cardenas-Haro, J. A., & Dawson, M. (2016). Tails Linux Operating System: The Amnesiac Incognito System in Times of High Surveillance, Its Security Flaws, Limitations, and Strengths in the Fight for Democracy. In M. Dawson, M. Eltayeb, & M. Omar (Eds.) Security Solutions for Hyperconnectivity and the Internet of Things (pp. 260-271). Hershey, PA: Information Science Reference. doi:10.4018/978-1-5225-0741-3.ch010
  21. Dawson, M., & Adeboje, W. (2016). Islamic Extremists in Africa: Security Spotlight on Kenya and Nigeria. In M. Dawson, D. Kisku, P. Gupta, J. Sing, & W. Li (Eds.) Developing Next-Generation Countermeasures for Homeland Security Threat Prevention (pp. 93-103). Hershey, PA: Information Science Reference. doi:10.4018/978-1-5225-0703-1.ch005
  22. Dawson, M., Omar, M., Abramson, J., Leonard, B., & Bessette, D. (2016). Battlefield Cyberspace: Exploitation of Hyperconnectivity and Internet of Things. In M. Dawson, D. Kisku, P. Gupta, J. Sing, & W. Li (Eds.) Developing Next-Generation Countermeasures for Homeland Security Threat Prevention (pp. 204-235). Hershey, PA: Information Science Reference. doi:10.4018/978-1-5225-0703-1.ch0
  23. Davis, L., Dawson, M., & Omar, M. (2016). Systems Engineering Concepts with Aid of Virtual Worlds and Open Source Software: Using Technology to Develop Learning Objects and Simulation Environments. In F. Neto, R. de Souza, & A. Gomes (Eds.) Handbook of Research on 3-D Virtual Environments and Hypermedia for Ubiquitous Learning (pp. 483-509). Hershey, PA: Information Science Reference. doi:10.4018/978-1-5225-0125-1.ch020
  24. Dawson, M., Wright, J., & Omar, M. (2016). Mobile Devices: The Case for Cyber Security Hardened Systems. In Mobile Computing and Wireless Networks: Concepts, Methodologies, Tools, and Applications (pp. 1103-1123). Hershey, PA: Information Science Reference. doi:10.4018/978-1- 4666-8751-6.ch047
  25. Eltayeb, M., & Dawson, M. (2016). Understanding User’s Acceptance of Personal Cloud Computing: Using the Technology Acceptance Model. In Information Technology: New Generations (pp. 3-12). Springer International Publishing.
  26. Studdard, N., Dawson, M., Burton, S. L., Jackson, N., Leonard, B., Page 16 Maurice Dawson, PhD, DCS, MBA, MS, SMIEEE Maurice E. Dawson Jr. Tenure Dossier Quisenberry, W., & Rahim, E. (2016). Nurturing Social Entrepreneurship and Building Social Entrepreneurial Self-Efficacy: Focusing on Primary and Secondary Schooling to Develop Future Social Entrepreneurs. In Z. Fields (Ed.), Incorporating Business Models and Strategies into Social Entrepreneurship (pp. 154-175). Hershey, PA: Business Science Reference. doi:10.4018/978-1-4666-8748-6.ch010
  27. Dawson, M. (2015). A Brief Review of New Threats and Countermeasures in Digital Crime and Cyber Terrorism. In M. Dawson, & M. Omar (Eds.) New Threats and Countermeasures in Digital Crime and Cyber Terrorism (pp. 1-7). Hershey, PA: Information Science Reference. doi:10.4018/978- 1-4666-8345-7.ch001
  28. Dawson, M., Wright, J., & Omar, M. (2015). Mobile Devices: The Case for Cyber Security Hardened Systems. In M. Dawson, & M. Omar (Eds.) New Threats and Countermeasures in Digital Crime and Cyber Terrorism (pp. 8-29). Hershey, PA: Information Science Reference. doi:10.4018/978-1- 4666-8345-7.ch002
  29. Leonard, B., & Dawson, M. (2015). Legal Issues: Security and Privacy with Mobile Devices. In M. Dawson, & M. Omar (Eds.) New Threats and Countermeasures in Digital Crime and Cyber Terrorism (pp. 95-104). Hershey, PA: Information Science Reference. doi:10.4018/978-1-4666- 8345-7.ch006
  30. Dawson, M., Leonard, B., & Rahim, E. (2015). Advances in Technology Project Management: Review of Open Source Software Integration. In Open Source Technology: Concepts, Methodologies, Tools, and Applications (pp. 1574-1585). Hershey, PA: Information Science Reference. doi:10.4018/978-1-4666-7230-7.ch080 [chapter was an IGI imprint]
  31. Dawson, M., Al Saeed, I., Wright, J., & Onyegbula, F. (2015). Open Source Software to Enhance the STEM Learning Environment. In Open Source Technology: Concepts, Methodologies, Tools, and Applications (pp. 1493-1503). Hershey, PA: Information Science Reference. doi:10.4018/978-1- 4666-7230-7.ch075 [chapter was an IGI imprint]
  32. Dawson, M., Leonard, B., & Rahim, E. (2015). Advances in Technology Project Management: Review of Open Source Software Integration. In M. Wadhwa, & A. Harper (Eds.) Technology, Innovation, and Enterprise Transformation (pp. 313-324). Hershey, PA: Business Science Reference. doi:10.4018/978-1-4666-6473- 9.ch016
  33. Dawson, M., Omar, M., & Abramson, J. (2015). Understanding the Methods behind Cyber Terrorism. In M. Khosrow-Pour (Ed.), Encyclopedia of Information Science and Technology, Third Edition (pp. 1539-1549). Hershey, PA: Information Science Reference. doi:10.4018/978-1-4666- 5888-2.ch147
  34. Dawson, M., Omar, M., Abramson, J., & Bessette, D. (2014). The Future of National and International Security on the Internet. In A. Kayem, & C. Meinel (Eds.) Information Security in Diverse Computing Environments (pp. 149-178). Hershey, PA: Information Science Reference. doi:10.4018/978-1-4666-6158-5.ch009
  35. Dawson, M., Al Saeed, I., Wright, J., & Onyegbula, F. (2014). Open Source Software to Enhance the STEM Learning Environment. In V. Wang (Ed.), Handbook of Research on Education and Technology in a Changing Society (pp. 569-580). Hershey, PA: Information Science Reference. doi:10.4018/978-1-4666-6046-5.ch042
  36. Dawson, M. E., & Al Saeed, I. (2012). Use of Open Source Software and Virtualization in Academia to Enhance Higher Education Everywhere. Cutting-edge Technologies in Higher Education, 6, 283-313.

Dissertation

Hyper-connectivity: Intricacies of national and international cyber securities by Dawson, Maurice, Ph.D., London Metropolitan University (United Kingdom), 2017, pp 1-530; 10800987. Available at https://www.proquest.com/dissertations-theses/hyper-connectivity-intricacies-national/docview/2013953161/se-2?accountid=201395

Postdoc Report

Cyber Warfare Threats and Opportunities by Dawson, Maurice, Postdoctoral Diploma., Universidade Fernando Pessoa (Portugal), 2021, 63. Available at https://bdigital.ufp.pt/handle/10284/9678

Grants

  1. January - June 2021, $42,200.00, Fulbright Scholar Core Project 10500-BC Host: Botswana International University of Science and Technology, Palapye, Botswana, Grant Length: 5 months, Principle Investigator [U.S. Department of State's Bureau of Educational and Cultural Affairs]
  2. December 2017 - January 2018. $5,000.00, Title: Mobile Banking System, Assignment Number: ET103, Location: Addis Ababa, Ethiopia: Volunteer Assignment with Catholic Relief Services/USAID – awarded [Catholic Relief Services/USAID]
  3. March - April 2018 & December 2017. $19,980.00, Fulbright Scholar Specialist Project ID: FSP-P000654, Host: Prince Sultan University, Riyadh, Saudi Arabia, Grant Length: 28 days, Principle Investigator – awarded [U.S. Department of State's Bureau of Educational and Cultural Affairs]
  4. January 2017. $5,000.00, Title: Training-of-Trainers in Management Accounting Tools for the Horticulture Initiation Center of Saint Louis (CIH SL), Assignment Number: SEN187, Location: Saint-Louis, Senegal: Volunteer Assignment with Winrock Int./USAID – awarded [Winrock Int./USAID]
  5. August 2016. $2,000.00, International Studies & Programs (ISP) Fellowship, Pontificia Universidad Católica Madre y Maestra (PUCMM), Santo Domingo, Dominican Republic – awarded [University of Missouri - Saint Louis]
  6. July 2016. $5,000.00, Title: Assistance to the Office of Vocational Agriculture Education for the Establishment of a Functional Website for the Ministre de l'Agriculture et de l'Equipement Rural, Assignment Number: SEN121, Location: Dakar, Senegal: Volunteer Assignment with Winrock Int./USAID – awarded [Winrock Int./USAID]
  7. February-March 2016. $3,500.00, Fulbright Scholar Specialist Project #6296, Host: University of Rajshashi, Dhaka, Bangladesh, Grant Length: 16 days, Principle Investigator (Canceled due to security reasons identified by security adviser to the State Department) [U.S. Department of State's Bureau of Educational and Cultural Affairs]
  8. September 2014. $7,280.60, Fulbright Scholar Specialist Project #5824, Host: South Ural State University, Chelyabinsk, Russia, Grant Length: 14 days, Principle Investigator [U.S. Department of State's Bureau of Educational and Cultural Affairs]
  9. September 2014. $2,000.00, International Studies & Programs (ISP) Fellowship, University of The Gambia, Serrekunda, Gambia [University of Missouri - Saint Louis]

SUPERVISED USAID ICT ASSIGNMENTS

  1. May - June 2018, $5,000.00, Title: TOT on Website & Database Development and Management, Kaffrine Region, Assignment Number: SEN240, Location: Birkilane and Kaffrine, Senegal: Volunteer Assignment with Winrock Int./USAID. Undergraduate Student: Damon Walker
  2. July - August 2017, $5,000.00, Title: Agriculture Technical High School Emile Badiane of Bignona (LTAEB), Assignment Number: SEN207, Location: Bignona, Senegal: Volunteer Assignment with Winrock Int./USAID. Undergraduate Student: Ashley Moss
  3. June 2017, $5,000.00, Title: Training of Trainers in Computer Information Systems for Extension Agents, Assignment Number: GUI164, Location: Conakry, Guinea: Volunteer Assignment with Winrock Int./USAID. Graduate Student: Damon Walker
  4. June 2017, $5,000.00, Title: Training of Trainers in Computer Information Systems & Information Technology in Agriculture Schools, Assignment Number: GUI165, Location: Dabola, Guinea: Volunteer Assignment with Winrock Int./USAID. Undergraduate Student: Omar Salif
  5. November - December 2016, $5,000.00, Title: Agriculture Programs Software Training for the Institut Supérieur Agronomic et Vétérinaire de Faranah (ISAV/F) and Students, Assignment Number: AEMIP063-AET, Location: Faranah, Guinea: Volunteer Assignment with Winrock Int./USAID. Graduate Student: Dan Redden

PROFESSIONAL CERTIFICATIONS

  1. Certified Chief Information Security Officer from International Council of Electronic Commerce Consultants, Credential ID CC-MD-1109
  2. Certified Data Privacy Solutions Engineer from the Information Systems Audit and Control Association, Credential ID 2004121
  3. Certified Secure Software Lifecycle Professional from the  International Information System Security Certification Consortium, Credential ID 330764
  4. Certified in the Governance of Enterprise IT from the Information Systems Audit and Control Association, Credential ID 801297

MEDIA

  1. Associated Press. (2020, December 15). US agencies, Companies secure networks after huge hack. Retrieved March 18, 2021, from https://news.wttw.com/2020/12/15/us-agencies-companies-secure-networks-after-huge-hack
  2. Miller, K. (2020, September 18). TikTok ban – why it's happening and what it means for you. Retrieved March 18, 2021, from https://wgntv.com/news/tiktok-ban-why-its-happening-and-what-it-means-for-you/  
  3. Moore, R. (2019, July 19). National Society of Black Engineers Press Release. Retrieved July 25, 2020, from https://www.stltoday.com/pr/news/national-society-of-black-engineers-press-release/article_97aa9ba8-aa5c-11e9-91a7-5cb9017befd0.html
  4. Goudie, C., & Weidner, R.. (2019, May 21). 5G network security risks could accompany innovation when Chicago devices upgrade, experts say. Retrieved March 20, 2020, from https://abc7chicago.com/5g-phones-network-security/5309683/ 
  5. Natario, N. (2019, May 21). The future of 5G Wireless Technology: Speed & Security. Retrieved March 20, 2020, from https://abc13.com/530913 
  6. Unruh, J. (2019, August 7). What is 8chan? A look at the website that was shut down after El Paso mass shooting. Retrieved March 20, 2020, from https://wgntv.com/news/what-is-8chan-a-look-at-the-website-that-was-shut-down-after-el-paso-mass-shooting/ 
  7. Ahmed, N. (2019, February 5). Cyberattacks on manufacturers could bring UK to its knees. Retrieved March 20, 2020, from https://www.raconteur.net/manufacturing/manufacturing-cyberattacks 
  8. Bradley, D. (2018, June 5). Personalised social engineering. Retrieved August 24, 2018, from https://phys.org/news/2018-06-personalised-social.html 
  9. The St. Louis American. (2018, March 28). Maurice Dawson awarded Fulbright Scholar Special Grant. Retrieved August 24, 2018, from http://www.stlamerican.com/business/people_on_the_move/maurice-dawson-awarded-fulbright-scholar-special-grant/article_c7c4eb36-320d-11e8-be42-2b3c3102aefe.html 
  10. Morris, D. (2018, March 19). Cove alum overcomes health setbacks to earn second doctorate degree. Retrieved August 24, 2018, from https://www.coveleaderpress.com/news/cove-alum-overcomes-health-setbacks-earn-second-doctorate-degree.
  11. Dawson, M., & Khan, S. (Writers). (2017, October 9). What you need to know about cybersecurity in light of the Equifax hack [Television broadcast]. In What you need to know about cybersecurity in light of the Equifax hack. Saint Louis, MO: St. Louis Public Radio. Retrieved August 24, 2018, from http://news.stlpublicradio.org/post/what-you-need-know-about-cybersecurity-light-equifax-hack#stream/0 
  12. UMSL Business. (2017, June 17). Cybersecurity Concerns Facing Businesses. Retrieved July 25, 2020, from https://umsldigital.podbean.com/e/cybersecurity-with-dr-shaji-khan-dr-maurice-dawson-dr-dinesh-mirchandani/ 
  13. Lowry, A. (2017, October 11). Over 70 Youth Participate in Cyber Competition. Retrieved July 25, 2020, from https://wecyberup.org/over-70-youth-participate-in-cyber-competition/ 
  14. St. Louis Business Journal. (2016, November 4). Table of Experts: Protecting your tech. Retrieved August 24, 2018, from https://www.bizjournals.com/stlouis/news/2016/11/04/table-of-experts-protecting-your-tech.html 
  15. Rollins, A. (2017, October 06). Foreign network tried to hack Wright City. Retrieved August 24, 2018, from http://www.warrencountyrecord.
  16. Jallow, F. (2015, March 25). Gambia: UTG Hosts W/A Symposium On Technology. Retrieved July 26, 2020, from https://allafrica.com/stories/201503241226.html 
  17. West, E. J. (2018, August 27). Career Notes, November 2013. Retrieved July 25, 2020, from https://businessalabama.com/career-notes-november-2013/

 

Community Service

Advisory Boards

  • April 2012-Present. Master of Business Administration (MBA) Advisory Board Member at Colorado Technical University (CTU), Colorado Springs, CO.
  • February 2011-January 2012. Doctor of Business Administration (DBA) Advisory Board Member at Virginia International University (VIU), Fairfax, VA.
  • Editorial Review Board & International Advisory Board
  • June 2015-Present. International Journal of Productivity Management and Assessment Technologies
  • July 2015-Present. International Journal of ICT Research in Africa and the Middle East
  • March 2010-April 2014. Intellectbase International Consortium

Editor

  • 2016-Present. International Journal of Hyperconnectivity and Internet of Things - Editor-in-Chief
  • 2014 - 2016. Journal of Information Systems Technology & Planning – Associate Editor
  • 2013-2014. The International Journal of Technology, Knowledge & Society, Volume 9 – Associate Editor
  • 2013-2014. The International Journal of Science in Society, Volume 5 – Associate Editor
  • January 2013-Present. International Journal of Science in Society – Associate Editor
  • January 2011-December 2013. Journal of Information Systems Technology & Planning - Editor

Academic Journal Reviewer

  • April 2012 – Present. International Journal of Systems of Systems Engineering
  • April 2012 – Present. International Journal of Critical Infrastructure
  • April 2012 – Present. International Journal of Cyberspace Sciences and Emergency Management
  • December 2012-Present. The International Journal of Science in Society
  • December 2012-Present. The International Journal of an Emerging Transdiscipline
  • December 2011-Present. Journal of Technology Management & Innovation
  • December 2011-Present. KCA Journal of Business Management
  • December 2011-July 2012. Journal of International Students
  • July 2011-Present. Indian Journal of Commerce and Management Studies

Community Service

  • July 2010. National Urban League, Washington D.C. Centinental: 100@100 Event

WHITE PAPER AND NON-REFEREED ARTICLES

  • Dawson, M. (2017) Creating Intelligence Analysis Profiles from IoT Data, Applied Wireless Technology, 1 (4), 51-53
  • Dawson, M., Al Saeed, I., & Leonard, B. K. (2015) Open Source Software for Learning Technologies in Higher Education
  • Rahim, E., & Dawson, M. (2013) Information Technology and Project management: How To Avoid Failure and Achieve Project Success

Talks & Keynotes

  • February 2021.GEA College. Is cybersecurity the future of business?
  • February 2021. Botswana Virtual Cybersecurity Symposium. Cyber Crime Case Studies.
  • November 2019.Route Fifty Roadshow. Security Solutions for Hyperconnectivity in the Internet of Things, Chicago, IL
  • August 2019. Maurice Dawson, Association of Former Intelligence Officers (AFIO), State of Cybersecurity: New Age of Warfare, Oak Lawn, IL
  • July 2019. Maurice Dawson, St. Louis Gateway Chapter of the National Society of Black Engineers’s 2019 Scholars Reception, Cybersecurity: What It Is, What It Isn’t, and Why It Is Critical for African Americans to Enter This Field, St. Louis, MO
  • November 2018. Maurice Dawson, STLCYBERCON2018. University of Missouri-St. Louis. CTRL, Search, Exploit, and Destroy, St. Louis, MO
  • October 2018. Higher Institute for Technology Studies in Communications of Tunis, Applying Software Assurance and Cybersecurity NICE Job Tasks through Secure Software Engineering Labs, Tunis, Tunisia
  • November 2017. Maurice Dawson, STLCYBERCON2017. University of Missouri-St. Louis. Hacking, Privacy and Security in a Hyperconnected Society, St. Louis, MO
  • September 2017. Maurice Dawson, Cyber Security Architectural Needs in the Era of Internet of Things and Hyperconnected Systems, 10th Annual International Academy of Strategic Management Conference, Tokyo, Japan
  • March 2017. Maurice Dawson, Midwest Digital Marketing Conference. Hacking, Privacy and Security in a Hyperconnected Society, St. Louis, MO
  • December 2016. Maurice Dawson, St. Louis Unix Users Group, Security Solutions for Hyperconnectivity and the Internet of Things, St. Louis, MO
  • November 2016. Maurice Dawson, STLCYBERCON2016. University of Missouri-St. Louis. Speaker. Technological Advancements for Intelligence Collection, Analysis, and Dissemination, St. Louis, MO
  • October 2016. Maurice Dawson, Secure World 2016, Security Solutions for Hyperconnectivity and the Internet of Things, St. Louis, MO
  • September 2016. Maurice Dawson Saint Louis Association of IT Professionals. St. Louis, MO
  • September 2016. Maurice Dawson. Panelist at IS Mentoring Club Meeting. St. Louis, MO
  • May2016. Maurice Dawson, Polytechnic University of Puerto Rico, Security Solutions for Hyperconnectivity and the Internet of Things, San Juan, Puerto Rico
  • March 2016. Maurice Dawson, Africa Hackon, Security Solutions for Hyperconnectivity and the Internet of Things, PwC Building, Nairobi, Kenya
  • November 2015. Maurice Dawson, STLCYBERCON2015. University of Missouri-St. Louis.  New Threats and Countermeasures in Digital Crime and Cyber Terrorism, St. Louis, MO
  • April 2015. Maurice Dawson, Information Systems Career Conference. University of Missouri-St Louis. Panel Speaker, St. Louis, MO
  • April 2015 Maurice Dawson. Privacy in the Digital Age: April 2016, 2015. The World Affairs Council of St. Louis – Great Decisions Inspiring Learning About The World, St. Louis, MO

INTERNATIONAL SYMPOSIUMS AND CONFERENCES CHAIRED

Professional Activities

Refereed Conference Presentations
[a] denotes abstract

  1. October 2011. Maurice Dawson, Darrell Burrell, & Daniel Sampson. Using Virtual Worlds to Teach Event Planning. Intellectbase International Consortium (IIC). Academic Conference, Atlanta, GA [a]
  2. October 2011. Darrell Burrell, Emad Rahim, Khuram Hussain, Maurice Dawson, & Aikyna Finch. The Future of Doctoral Education for Educational Administrators in Leadership and Critical Thinking. Intellectbase International Consortium (IIC). Academic Conference, Atlanta, GA
  3. October 2011. Augustine Dike, & Maurice Dawson. Emerging Need for Cyber Security in Sub-Saharan Africa. Intellectbase International Consortium (IIC). Academic Conference, Atlanta, GA [a]
  4. October 2011. Daniel Sampson, & Maurice Dawson. Leveraging Virtual Worlds for Event Planning. Intellectbase International Consortium (IIC). Academic Conference, Atlanta, GA [a]
  5. October 2011. Maurice Dawson. Virtual Worlds for Limited Prototyping, Testing, and Training of Health Information Technology Systems. Intellectbase International Consortium (IIC). Academic Conference, Atlanta, GA [a]
  6. October 2011. Maurice Dawson, James Truesdale, & Joshua Robinson. Importance of the Strategic & Operation Plans Under the State Cooperative Agreement. Intellectbase International Consortium (IIC). Academic Conference, Atlanta, GA [a]
  7. October 2011. Jeffrey Stevens, Festus Onyegbula, & Maurice Dawson. Competency Cluster Validation: An Empirical Study. Intellectbase International Consortium (IIC). Academic Conference, Atlanta, GA
  8. August 2011. Darrell Burrell, Maurice Dawson, Andrea Todd. Developing the Next Generation of Women and Minority Scientists for the Nuclear Energy Industry. The Science in Society Conference 2011, Washington D.C.
  9. August 2011. Aikyna Finch, Maurice Dawson, Darrell Burrell, & Emad Rahim. Assessment Learning Considerations for Online Programs in Environmental Science and Sustainability. The Science in Society Conference 2011, Washington D.C.
  10. July 2011. Darell Burrell, Aikyna Finch, Blanche Lune, Emad Rahim, & Maurice Dawson. A Theoretical Evaluation of Charter Schools in the Development of Student Change Agents that are Knowledgeable about Sustainability, Environmental Education, and Environmental Public Health that can be Effective in Green STEM Opportunities. Intellectbase International Consortium (IIC). Academic Conference, San Juan, PR
  11. July 2011. Maurice Dawson, & Larry McDaniel. Increasing Involvement in the Systems Development Group. Allied Academies 2011 Summer International Internet Conference.
  12. July 2011. Maurice Dawson, Emad Rahim, Larry McDaniel, & Darrell Burrell. Increasing Numbers Amongst Faculty in the Business School. Allied Academies 2011 Summer International Internet Conference. [a]
  13. July 2011. Maurice Dawson, & Aikyna Finch. Social Networking as a Tool to Recruit Employees. Allied Academies 2011 Summer International Internet Conference. [a]
  14. May 2011. Maurice Dawson, Laura Richeerzhagen, Larry McDaniel, and Barcus Jackson. Open Source Software to Assist Lower Scio Economic K-12 Schools. Academic Business World International Conference and International Conference on Learning and Administration in Higher Education – ABWIC & ICLAHE, Nashville, TN [a] – Excellence in Presentation Award out of 171 Presentations
  15. May 2011. Maurice Dawson, Barcus Jackson, and Darrell Burrell. Creating the Management Information System Degree of the Future. Academic Business World International Conference and International Conference on Learning and Administration in Higher Education – ABWIC & ICLAHE, Nashville, TN [a] – Excellence in Presentation Award out of 171 Presentations
  16. May 2011. Darrell Burrell, and Maurice Dawson. Emerging Entrepreneurial Options Doctoral Degree Graduates: An Applied Research Exploration of Six Figure Incomes Made From Teaching Online. Academic Business World International Conference and International Conference on Learning and Administration in Higher Education – ABWIC & ICLAHE, Nashville, TN [a] – Excellence in Presentation Award out of 171 Presentations
  17. May 2011. Darrell Burrell, and Maurice Dawson. An Exploration of Creative Teaching Approaches Required to Energize Working Adult Undergraduate and All Graduate Students. Academic Business World International Conference and International Conference on Learning and Administration in Higher Education – ABWIC & ICLAHE, Nashville, TN [a]
  18. May 2011. Darrell Burrell, and Maurice Dawson. An Applied Assessment of the Critical Value of Developing Publishing Strategies. Academic Business World International Conference and International Conference on Learning and Administration in Higher Education – ABWIC & ICLAHE, Nashville, TN [a]
  19. May 2011. Darell Burrell, Aikyna Finch, Maurice Dawson, & Joann Fisher. The Use of Case Studies, Videos, New Teaching Approaches, and Storytelling in Classroom Teaching to Improve the Learning Experiences for Millennial Graduate Students. Intellectbase International Consortium (IIC). Academic Conference, Nashville, TN [a]
  20. May 2011. Brittny Thompson, Maurice Dawson, & Darrell Burrell. Addressing the Lack of Minority Women in Senior Leadership Position in the Federal Government. International Handbook of Academic Research and Teaching. Intellectbase International Consortium (IIC). Academic Conference, Nashville, TN [a]
  21. May 2011. Joshua Robinson, & Maurice Dawson. Utilization of Open Source Software (OSS) Tools to Alleviate a Project’s Cost. International Handbook of Academic Research and Teaching. Intellectbase International Consortium (IIC). Academic Conference, Nashville, TN [a]
  22. May 2011. Festus Onyegbula, Maurice Dawson, & Jeffrey Stevens. Factors Affecting Cloud Computing Acceptance in Organizations: From Management to the End-Users’ Perspectives. International Handbook of Academic Research and Teaching. Intellectbase International Consortium (IIC). Academic Conference, Nashville, TN [a]
  23. May 2011. William Emanuel, Corey Dickens, & Maurice Dawson. Applying Object Orientated Analysis Design to the Greater Philadelphia Innovation Cluster (GPIC) for Energy Efficient Buildings. International Handbook of Academic Research and Teaching. Intellectbase International Consortium (IIC). Academic Conference, Nashville, TN [a]
  24. May 2011. Maurice Dawson, Miguel Crespo, & Darrell Burrell. Developing the Next Generation of Cyber Warriors and Intelligence Analysts. International Handbook of Academic Research and Teaching. Intellectbase International Consortium (IIC). Academic Conference, Nashville, TN [a]
  25. March-April 2011. Maurice Dawson, Darrell Burrell, & William Emanuel. Utilization of e-Learning Tools, Virtual Machines, & Open Source Software to Enhance Graduate Systems Engineering Programs. Global Learn: Asia Pacific 2011: Global Conference on Learning and Technology, Melbourne, Australia
  26. March-2011. Maurice Dawson, Miguel Crespo, Shana Worley, & Darrell Burrell. Understanding the DoD 8570 Mandate And Its Impact on Employees & Curriculum Development. International Handbook of Academic Research and Teaching. Intellectbase International Consortium (IIC). Academic Conference, San Antonio, TX [a]
  27. March-2011. Raul Valdez, & Maurice Dawson. Teaching & Learning Systems Engineering Concepts through Second Life (SL). International Handbook of Academic Research and Teaching. Intellectbase International Consortium (IIC). Academic Conference, San Antonio, TX [a]
  28. March-2011. Joshuwa Robinson, & Maurice Dawson. Using the Graduate Project Management Program to Develop & Deploy Intelligence, Surveillance, Reconnaissance, (ISR) for the Reserve Officer Training Corps (ROTC). International Handbook of Academic Research and Teaching. Intellectbase International Consortium (IIC). Academic Conference, San Antonio, TX [a]
  29. March-2011. Marwan Omar, Maurice Dawson, & Jeffrey Stevens. Securing the Mobile Device: Defending Android Based Smart Phones Against Emerging Malware Attacks. International Handbook of Academic Research and Teaching. Intellectbase International Consortium (IIC). Academic Conference, San Antonio, TX
  30. March-2011. Festus Onyegbula, Maurice Dawson, & Jeffrey Stevens. Dissecting the Cloud Computing Environment: A Case Study for Deploying Cloud Computing Solutions for the National Institute of Food and Agriculture, an Agency of the United States Department of Agricultures. International Handbook of Academic Research and Teaching. Intellectbase International Consortium (IIC). Academic Conference, San Antonio, TX
  31. February 2011. Maurice Dawson. Applicability of Web 2.0 for Tactical Military Applications. Global Conference on Technology, Innovation, Media, & Education – Global TIME, Academic Conference, Virtual
  32. October 2010. Maurice Dawson, Darrell Burrell, Emad Rahim, and Stephen Brewster. Secure Software Development Lifecycle. International Handbook of Academic Research and Teaching. Intellectbase International Consortium (IIC). Academic Conference, Atlanta, GA
  33. October 2010. Maurice Dawson, Darrell Burrell, and Emad Rahim. The Relationship between Organizational Theory & Behavioral Theory. International Handbook of Academic Research and Teaching. Intellectbase International Consortium (IIC). Academic Conference, Atlanta, GA
  34. October 2010. Maurice Dawson, Darrell Burrell, Emad Rahim, and Stephen Brewster. Emerging Need of a Chief Information Security Officer (CISO). International Handbook of Academic Research and Teaching. Intellectbase International Consortium (IIC). Academic Conference, Atlanta, GA
  35. October 2010. Stephen Brewster and Maurice Dawson. The Role of the Program Manager within Software Assurance. International Handbook of Academic Research and Teaching. Intellectbase International Consortium (IIC). Academic Conference, Atlanta, GA
  36. October 2010. Emad Rahim, Darrell Burrell, and Maurice Dawson. Nonprofit Employee Professional Development Strategy: An Application for Action Research. International Handbook of Academic Research and Teaching. Intellectbase International Consortium (IIC). Academic Conference, Atlanta, GA
  37. October 2010. Emad Rahim, Darrell Burrell, and Maurice Dawson. Emerging Trends in Organizational Behavioral Perspectives: A Programmatic Framework for Further Exploration. International Handbook of Academic Research and Teaching. Intellectbase International Consortium (IIC). Academic Conference, Atlanta, GA
  38. October 2010. Darrell Burrell, Emad Rahim, Maurice Dawson, and Brian Grizzell. An Applied Research Analysis of the Value of Servant Leadership in Modern Government. International Handbook of Academic Research and Teaching. Intellectbase International Consortium (IIC). Academic Conference, Atlanta, GA
  39. October 2010. Darrell Burrell, Maurice Dawson, and Emad Rahim. Addressing the Growing Shortage of Business School Faculty and Instructor Diversity through Non-Traditional University and Non- Traditional Doctoral Programs. International Handbook of Academic Research and Teaching. Intellectbase International Consortium (IIC). Academic Conference, Atlanta, GA
  40. October 2010. Aikyna Finch, Darrell Burrell, Walker, Emad Rahim, and Maurice Dawson. The Contextual Impact of How the Worldwide Economic Crisis Creates a Need for Organizational Learning and Innovative Cultures at Colleges and Universities in the U.S.. International Handbook of Academic Research and Teaching. Intellectbase International Consortium (IIC). Academic Conference, Atlanta, GA
  41. October 2010. Darrell Burrell, Brian Grizzell, Maurice Dawson, and Emad Rahim. An Evolved Context of What MBA Program Curriculum Should Include to Develop Relevant Managerial Competencies in the Generation Y Manager. International Handbook of Academic Research and Teaching. Intellectbase International Consortium (IIC). Academic Conference, Atlanta, GA
  42. May 2010. Maurice Dawson, Darrell Burrell, and Emad Rahim. Deeper Look into Poor Alignment Between IT and Business Alignment. Intellectbase International Consortium (IIC). Academic Conference, Atlanta, GA
  43. May 2010. Maurice Dawson, Darrell Burrell, and Emad Rahim. Deep Dive into Understanding the Theory of Military Organization, Military Leadership, Skill Transfer, Aspects of Program Management, and Decision Support Systems. Intellectbase International Consortium (IIC). Academic Conference, Atlanta, GA
  44. May 2010. Maurice Dawson, Darrell Burrell, and Emad Rahim. Framework for Effective Transitional Leadership in Defense & Aerospace. Intellectbase International Consortium (IIC). Academic Conference, Nashville, TN
  45. May 2010. Darrell Burrell, Maurice Dawson, and Emahd Rahim. Using Telework Programs to Assist with Generation Y Employee Retention. Academic Business World International Conference and International Conference on Learning and Administration in Higher Education – ABWIC & ICLAHE, Nashville, TN [a]
  46. May 2010. Darrell Burrell, Brian Grizzell, Emad Rahim, and Maurice Dawson. An Applied Analysis of the MBA of the Future in the Post Enron and AIG World. Academic Business World International Conference and International Conference on Learning and Administration in Higher Education – ABWIC & ICLAHE, Nashville, TN [a]
  47. May 2010. Darrell Burrell, Maurice Dawson, and Emad Rahim. An Organizational Practice Oriented Case Study of the Ethical Managerial Communications and Organizational Change Issues of Technology Integration in a US Government Agency. Academic Business World International Conference and International Conference on Learning and Administration in Higher Education – ABWIC & ICLAHE, Nashville, TN [a]
  48. March 2010. Emad Rahim and Maurice Dawson. IT Project Management Best Practices in an Expending Market. Intellectbase International Consortium (IIC). Academic Conference, Houston, TX

WHITE PAPER AND NON-REFEREED ARTICLES

  1. Dawson, M. (2017) Creating Intelligence Analysis Profiles from IoT Data, Applied Wireless Technology, 1 (4), 51-53
  2. Dawson, M., Al Saeed, I., & Leonard, B. K. (2015) Open Source Software for Learning Technologies in Higher Education
  3. Rahim, E., & Dawson, M. (2013) Information Technology and Project management: How To Avoid Failure and Achieve Project Success

Talks & Keynotes

  1. November 2017. Maurice Dawson, STLCYBERCON2016. University of Missouri-St. Louis. Hacking, Privacy and Security in a Hyperconnected Society, St. Louis, MO
  2. September 2017. Maurice Dawson, Cyber Security Architectural Needs in the Era of Internet of Things and Hyperconnected Systems, 10th Annual International Academy of Strategic Management Conference, Tokyo, Japan
  3. March 2017. Maurice Dawson, Midwest Digital Marketing Conference. Hacking, Privacy and Security in a Hyperconnected Society, St. Louis, MO
  4. December 2016. Maurice Dawson, St. Louis Unix Users Group, Security Solutions for Hyperconnectivity and the Internet of Things, St. Louis, MO
  5. November 2016. Maurice Dawson, STLCYBERCON2016. University of Missouri-St. Louis. Speaker. Technological Advancements for Intelligence Collection, Analysis, and Dissemination, St. Louis, MO
  6. October 2016. Maurice Dawson, Secure World 2016, Security Solutions for Hyperconnectivity and the Internet of Things, St. Louis, MO
  7. September 2016. Maurice Dawson Saint Louis Association of IT Professionals. St. Louis, MO
  8. September 2016. Maurice Dawson. Panelist at IS Mentoring Club Meeting. St. Louis, MO
  9. May2016. Maurice Dawson, Polytechnic University of Puerto Rico, Security Solutions for Hyperconnectivity and the Internet of Things, San Juan, Puerto Rico
  10. March 2016. Maurice Dawson, Africa Hackon, Security Solutions for Hyperconnectivity and the Internet of Things, PwC Building, Nairobi, Kenya
  11. November 2015. Maurice Dawson, STLCYBERCON2015. University of Missouri-St. Louis. New Threats and Countermeasures in Digital Crime and Cyber Terrorism, St. Louis, MO
  12. April 2015. Maurice Dawson, Information Systems Career Conference. University of Missouri-St Louis. Panel Speaker, St. Louis, MO
  13. April 2015 Maurice Dawson. Privacy in the Digital Age: April 2016, 2015. The World Affairs Council of St. Louis – Great Decisions Inspiring Learning About The World, St. Louis, MO
  14. October 2012. Maurice Dawson. Utilization of Open Source Software. Colorado Technical University, Keynote Speaker for Computer Science Doctoral Symposium, Colorado Springs, CO
  15. July 2012. Maurice Dawson. Utilization of Open Source Software. Colorado Technical University, Keynote Speaker for Computer Science Doctoral Symposium, Colorado Springs, CO
  16. February 2011. Maurice Dawson. Systems of Systems Engineering. Morgan State University, Baltimore, MD
  17. September 2010. Maurice Dawson and Miguel Crespo. Software Assurance. Program Management Office (PMO) Unmanned Air Systems (UAS) Information Assurance (IA) Summit, Huntsville, AL
  18. June 2010. Maurice Dawson. Cyber Security. Executive Leadership Forum-Technology Transfer Project (ELF-TTP), Ft. Lauder, FL
  19. June 2010. Maurice Dawson and Ian Redzic. Information Assurance (IA). University of Maryland University College (UMUC), Adelphi, MD

 

INTERNATIONAL SYMPOSIUMS AND CONFERENCES CHAIRED

  1. May 2018. 13th Annual Conference for the Midwest Association of Information Systems. Saint Louis, Missouri. Media at https://mwais2018.org/
  2. March 2015. West Africa Symposium on Technology, Science, Sustainability, and Computing. Banjul, Gambia. Media at http://allafrica.com/stories/201504030905.html , and http://observer.gm/ict-continues-to-attract-young-mindssays-utg-vc/
  3. March 2014. Positive Use of Technology and Science (PUTS). Banjul, Gambia

Additional Info

Experience

Assistant Professor, University of Missouri-Saint Louis, 2014-2018

Visiting Assistant Professor (Honorary), University of Tennessee Space Institute, 2013-2014

Assistant Professor, Alabama A&M University, 2011-2014

Engineering Manager, Textron Systems, 2010-2011

Information Assurance Lead, Future Research Corporation, 2008-2010

Cryptographic Technician, US Navy Reserves, 2005-2008

Systems Analyst, Iowa National Guard, 2000-2005

Senior Program Manager, Rockwell Collins, 2006-2008

Senior Systems Engineer, Rockwell Collins, 2004-2006

Information Assurance Engineer, BAE Systems, 2004-2004