Griffith, G. L. (July 2017). Colleges and Faculty New to Cyber Security: National Cyberwatch Programs at Walden University. Presented at the Community College Cybersecurity Summit, 3CS, Cyber Security Summit. National Harbor, MD.
Burnett, S. & Burchell, J. (2017). Social Media at a Postsecondary Campus: A Needs Analysis. Paper presented at the International Conference on Learning and Administration in Higher Education. Nashville, TN.
Burchell, J. (March 2017). Demystifying the Proposal. Presentation at the 2017 International Conference on Interdisciplinary Studies. Washington, DC.
Burnett, S., Justice, J., & Burchell, J. (2016). A needs analysis of social media in a post-secondary institution in Southern Tennessee. Paper presented at the International Conference on Interdisciplinary Studies. Washington, DC.
Carpenter, D.A., & Cunningham, M. (2017, forthcoming) Effectiveness of automation tools on commercial greenhouse operations: A computer-based simulation study. Accepted December 12, 2016 for presentation at MBAA International Conference in March 2017.
Casas, A. (2018) Information Technology Update for the Financial Planning Profession. Journal of Financial Planning. 31(3)
Casas, A. (2016) Why Financial Planning Informatics? Proceedings of the 2016 Annual Meeting of the Academy for Financial Services. Las Vegas, NV, October 20-22, 2016.
Cheng, P., Dimopoulos, C., & Case, S. (2018) “Remote Robotic Experimentation: An Evaluation of Intention to Use by High School Teachers in Cyprus”, Proceedings of the 10th International Conference on Computer Supported Education, March 15-17, 2018, Funchal, Madeira, Portugal
Dover-Harris, S. & Burchell, J. (2017). Performance Evaluation: An Analysis of Performance Review Measures Using the European Foundation for Quality Management Model. Management, 7(3).p.118-125. doi: 10.5923/j.mm.20170703.03
Duhainy, R (2017). Mobile Security, A US intelligence dilemma, The Colloquium for Information System Security Education (CISSE) Proceedings of the 21th Annual Conference, Las Vegas, NV - June 2016
Duhainy, R(2016). Internet Traffic Analysis, implications to Homeland Security, The Colloquium for Information System Security Education (CISSE) Proceedings of the 20th Annual Conference, Philadelphia, PA - June 2015
Nader Jafari, Abeer Alsadoon, Chandana Prasad Withana, Azam Beg and Amr Elchouemi, (2016). Designing a Comprehensive Security Framework for Smartphones and Mobile Devices. American Journal of Engineering and Applied Sciences, Volume 9, Issue 3, pp. 724-734.
Pabst, B; Casas, A; Ravi, C. (2016) Empirical Lessons from Failure of ERP Systems in Small and Medium Businesses. Southern Business and Economic Journal. 39 (1)
Pavari, A., Strider, S., Burchell, J., & Ready, J. (2017). Selection and Promotion of Nursing Leaders Based on Multiple Intelligences. Human Resource Management Research, 7(1). doi: 10.5923/j.hrmr.20170701.01
Perez, T. (2016, June). Municipal E‐Government Security: An Analysis of the Current Research Landscape. Paper presented at the 20th Colloquium for Information Systems Security Education, Philadelphia, Pennsylvania.
Pumphrey, D., & Carpenter, D. (2017). Benefits plan implementation: An IT ethical dilemma. Journal of Critical Incidents, 10. 16, 56-58
Pumphrey, D. & Carpenter, D. A. (2016). Benefits plan implementation: An ethical dilemma. Society for Case Research Annual Conference. [Chicago, March 2016].
Zayed, K., & Harkiolakis, N. ‘Information Security Awareness: Managing Web, Mobile & Endpoint Security; Overcoming the Challenges of Bring Your Own Device (BYOD)’, IJTCS (2016)
Authors: Schell, Roger R.1,2 email@example.com
Source: Communications of the ACM. Nov2016, Vol. 59 Issue 11, p20-23. 4p. 1 Color Photograph, 2 Diagrams.
Authors: Kour, Jaspreet1 Hanmandlu, M.2 Ansari, A. Q.3 firstname.lastname@example.org
Source: Defence Science Journal. Nov2016, Vol. 66 Issue 6, p600-604. 5p.
Authors: Ullrich, Johanna1 email@example.com Cropper, Jordan1 firstname.lastname@example.org Frühwirt, Peter1 email@example.com Weippl, Edgar1 firstname.lastname@example.org
Source: EURASIP Journal on Information Security. 8/12/2016, Vol. 2016 Issue 1, p1-20. 20p.
Authors: Gordon, Jennifer1,2
Source: Brooklyn Journal of Corporate, Financial & Commercial Law. Fall2016, Vol. 11 Issue 1, p183-208. 26p.
Authors: Skopik, Florian1 email@example.com Settanni, Giuseppe1 Fiedler, Roman1
Source: Computers & Security. Jul2016, Vol. 60, p154-176. 23p.
Authors: Almadhoob, A., Valverde, R.
Source: Journal of Theoretical and Applied Information Technology, 65(1), 274--292. (2014).
Authors: Wolden, M., Valverde, R., Talla, M.
Source: IFAC-PapersOnLine, 48(3), 1846--1852. (2015).
Registered Walden students have further access to cybersecurity related news and RSS feeds through the Walden University library.