Griffith, G. L. (July 2017). Colleges and Faculty New to Cyber Security: National Cyberwatch Programs at Walden University. Presented at the Community College Cybersecurity Summit, 3CS, Cyber Security Summit. National Harbor, MD.

Burnett, S. & Burchell, J. (2017). Social Media at a Postsecondary Campus: A Needs Analysis. Paper presented at the International Conference on Learning and Administration in Higher Education. Nashville, TN.

Burchell, J. (March 2017). Demystifying the Proposal. Presentation at the 2017 International Conference on Interdisciplinary Studies. Washington, DC.

Burnett, S., Justice, J., & Burchell, J. (2016). A needs analysis of social media in a post-secondary institution in Southern Tennessee. Paper presented at the International Conference on Interdisciplinary Studies. Washington, DC.

Carpenter, D.A., & Cunningham, M. (2017, forthcoming) Effectiveness of automation tools on commercial greenhouse operations: A computer-based simulation study. Accepted December 12, 2016 for presentation at MBAA International Conference in March 2017.

Casas, A. (2018) Information Technology Update for the Financial Planning Profession. Journal of Financial Planning. 31(3)

Casas, A. (2016) Why Financial Planning Informatics? Proceedings of the 2016 Annual Meeting of the Academy for Financial Services. Las Vegas, NV, October 20-22, 2016.

Cheng, P., Dimopoulos, C., & Case, S. (2018) “Remote Robotic Experimentation: An Evaluation of Intention to Use by High School Teachers in Cyprus”, Proceedings of the 10th International Conference on Computer Supported Education, March 15-17, 2018, Funchal, Madeira, Portugal

Dover-Harris, S. & Burchell, J. (2017). Performance Evaluation: An Analysis of Performance Review Measures Using the European Foundation for Quality Management Model. Management, 7(3).p.118-125. doi: 10.5923/

Duhainy, R (2017). Mobile Security, A US intelligence dilemma, The Colloquium for Information System Security Education (CISSE) Proceedings of the 21th Annual Conference, Las Vegas, NV - June 2016

Duhainy, R(2016). Internet Traffic Analysis, implications to Homeland Security, The Colloquium for Information System Security Education (CISSE) Proceedings of the 20th Annual Conference, Philadelphia, PA - June 2015

Nader Jafari, Abeer Alsadoon, Chandana Prasad Withana, Azam Beg and Amr Elchouemi, (2016). Designing a Comprehensive Security Framework for Smartphones and Mobile Devices. American Journal of Engineering and Applied Sciences, Volume 9, Issue 3, pp. 724-734.

Pabst, B; Casas, A; Ravi, C. (2016) Empirical Lessons from Failure of ERP Systems in Small and Medium Businesses. Southern Business and Economic Journal. 39 (1)

Pavari, A., Strider, S., Burchell, J., & Ready, J. (2017). Selection and Promotion of Nursing Leaders Based on Multiple Intelligences. Human Resource Management Research, 7(1). doi: 10.5923/j.hrmr.20170701.01

Perez, T. (2016, June). Municipal E‐Government Security: An Analysis of the Current Research Landscape. Paper presented at the 20th Colloquium for Information Systems Security Education, Philadelphia, Pennsylvania.

Pumphrey, D., & Carpenter, D. (2017). Benefits plan implementation: An IT ethical dilemma. Journal of Critical Incidents, 10. 16, 56-58

Pumphrey, D. & Carpenter, D. A. (2016). Benefits plan implementation: An ethical dilemma. Society for Case Research Annual Conference. [Chicago, March 2016].

Zayed, K., & Harkiolakis, N. ‘Information Security Awareness: Managing Web, Mobile & Endpoint Security; Overcoming the Challenges of Bring Your Own Device (BYOD)’, IJTCS (2016)

Cyber Defense Triad for Where Security Matters.

Authors: Schell, Roger R.1,2

Source: Communications of the ACM. Nov2016, Vol. 59 Issue 11, p20-23. 4p. 1 Color Photograph, 2 Diagrams.

Biometrics in Cyber Security.

Authors: Kour, Jaspreet1 Hanmandlu, M.2 Ansari, A. Q.3

Source: Defence Science Journal. Nov2016, Vol. 66 Issue 6, p600-604. 5p.

The role and security of firewalls in cyber-physical cloud computing.

Authors: Ullrich, Johanna1 Cropper, Jordan1 Frühwirt, Peter1 Weippl, Edgar1

Source: EURASIP Journal on Information Security. 8/12/2016, Vol. 2016 Issue 1, p1-20. 20p.


Authors: Gordon, Jennifer1,2

Source: Brooklyn Journal of Corporate, Financial & Commercial Law. Fall2016, Vol. 11 Issue 1, p183-208. 26p.

A problem shared is a problem halved: A survey on the dimensions of collective cyber defense through security information sharing.

Authors: Skopik, Florian1 Settanni, Giuseppe1 Fiedler, Roman1

Source: Computers & Security. Jul2016, Vol. 60, p154-176. 23p.

Cybercrime prevention in the Kingdom of Bahrain via IT security audit plans.

Authors: Almadhoob, A., Valverde, R.

Source: Journal of Theoretical and Applied Information Technology, 65(1), 274--292. (2014).

The effectiveness of COBIT 5 information security framework for reducing cyber attacks on supply chain management system.

Authors: Wolden, M., Valverde, R., Talla, M.

Source: IFAC-PapersOnLine, 48(3), 1846--1852. (2015).

Registered Walden students have further access to cybersecurity related news and RSS feeds through the Walden University library.

Man sitting at latop
Whether looking for information on programs, admissions, or financial aid, we're here to help.
Whether looking for information on programs, admissions, or financial aid, we're here to help.
Talk to your personal enrollment advisor for more information today. Please use our International Form if you live outside of the U.S.
Talk to your personal enrollment advisor for more information today. Please use our Domestic Form if you live in the U.S.
*Required Field
Academic Interests
Contact Information
Invalid email address
Please provide a valid phone number
Please provide a valid zipcode
Additional Information
Get Started

By submitting this form, I understand and agree that Walden University may contact me via email, text, telephone, and prerecorded message regarding furthering my education and that calls may be generated using automated technology. You may opt out at any time. Please view our privacy policy or contact us for more details.


By checking this box, I agree that Walden University may contact me by email, text message, autodialed telephone call, and prerecorded message at the contact information provided above regarding opportunities and offers to further my education. I understand that I may withdraw my consent at any time and that my consent is not a condition of any purchase. I have received the Walden University Privacy Policy