Burnett, S. & Burchell, J. (2017). Social Media at a Postsecondary Campus: A Needs Analysis. Paper presented at the International Conference on Learning and Administration in Higher Education. Nashville, TN.

Burchell, J. (March 2017). Demystifying the Proposal. Presentation at the 2017 International Conference on Interdisciplinary Studies. Washington, DC.

Burnett, S., Justice, J., & Burchell, J. (2016). A needs analysis of social media in a post-secondary institution in Southern Tennessee. Paper presented at the International Conference on Interdisciplinary Studies. Washington, DC.

Carpenter, D.A., & Cunningham, M. (2017, forthcoming) Effectiveness of automation tools on commercial greenhouse operations: A computer-based simulation study. Accepted December 12, 2016 for presentation at MBAA International Conference in March 2017.

Casas, A. (2018) Information Technology Update for the Financial Planning Profession. Journal of Financial Planning. 31(3)

Casas, A. (2016) Why Financial Planning Informatics? Proceedings of the 2016 Annual Meeting of the Academy for Financial Services. Las Vegas, NV, October 20-22, 2016.

Cheng, P., Dimopoulos, C., & Case, S. (2018) “Remote Robotic Experimentation: An Evaluation of Intention to Use by High School Teachers in Cyprus”, Proceedings of the 10th International Conference on Computer Supported Education, March 15-17, 2018, Funchal, Madeira, Portugal

Dover-Harris, S. & Burchell, J. (2017). Performance Evaluation: An Analysis of Performance Review Measures Using the European Foundation for Quality Management Model. Management, 7(3).p.118-125. doi: 10.5923/j.mm.20170703.03

Duhainy, R (2017). Mobile Security, A US intelligence dilemma, The Colloquium for Information System Security Education (CISSE) Proceedings of the 21th Annual Conference, Las Vegas, NV - June 2016

Duhainy, R(2016). Internet Traffic Analysis, implications to Homeland Security, The Colloquium for Information System Security Education (CISSE) Proceedings of the 20th Annual Conference, Philadelphia, PA - June 2015

Nader Jafari, Abeer Alsadoon, Chandana Prasad Withana, Azam Beg and Amr Elchouemi, (2016). Designing a Comprehensive Security Framework for Smartphones and Mobile Devices. American Journal of Engineering and Applied Sciences, Volume 9, Issue 3, pp. 724-734.

Pabst, B; Casas, A; Ravi, C. (2016) Empirical Lessons from Failure of ERP Systems in Small and Medium Businesses. Southern Business and Economic Journal. 39 (1)

Pavari, A., Strider, S., Burchell, J., & Ready, J. (2017). Selection and Promotion of Nursing Leaders Based on Multiple Intelligences. Human Resource Management Research, 7(1). doi: 10.5923/j.hrmr.20170701.01

Perez, T. (2016, June). Municipal E‐Government Security: An Analysis of the Current Research Landscape. Paper presented at the 20th Colloquium for Information Systems Security Education, Philadelphia, Pennsylvania.

Pumphrey, D., & Carpenter, D. (2017). Benefits plan implementation: An IT ethical dilemma. Journal of Critical Incidents, 10. 16, 56-58

Pumphrey, D. & Carpenter, D. A. (2016). Benefits plan implementation: An ethical dilemma. Society for Case Research Annual Conference. [Chicago, March 2016].

Zayed, K., & Harkiolakis, N. ‘Information Security Awareness: Managing Web, Mobile & Endpoint Security; Overcoming the Challenges of Bring Your Own Device (BYOD)’, IJTCS (2016)

Cyber Defense Triad for Where Security Matters.

Authors: Schell, Roger R.1,2 schellr@ieee.org

Source: Communications of the ACM. Nov2016, Vol. 59 Issue 11, p20-23. 4p. 1 Color Photograph, 2 Diagrams.

http://dl.acm.org.ezp.waldenulibrary.org/citation.cfm?doid=3013530.3000606

Biometrics in Cyber Security.

Authors: Kour, Jaspreet1 Hanmandlu, M.2 Ansari, A. Q.3 aqansari62@gmail.com

Source: Defence Science Journal. Nov2016, Vol. 66 Issue 6, p600-604. 5p.

http://ezp.waldenulibrary.org/login?url=http://search.ebscohost.com/login.aspx?direct=true&db=tsh&AN=119747054&site=eds-live&scope=site

The role and security of firewalls in cyber-physical cloud computing.

Authors: Ullrich, Johanna1 jullrich@sba-research.org Cropper, Jordan1 jcropper@sba-research.org Frühwirt, Peter1 efruewirt@sba-research.org Weippl, Edgar1 eweippl@sba-research.org

Source: EURASIP Journal on Information Security. 8/12/2016, Vol. 2016 Issue 1, p1-20. 20p.

http://ezp.waldenulibrary.org/login?url=http://search.ebscohost.com/login.aspx?direct=true&db=iih&AN=117380061&site=eds-live&scope=site

LIKE A BAD NEIGHBOR, HACKERS ARE THERE: THE NEED FOR DATA SECURITY LEGISLATION AND CYBER INSURANCE IN LIGHT OF INCREASING FTC ENFORCEMENT ACTIONS.

Authors: Gordon, Jennifer1,2

Source: Brooklyn Journal of Corporate, Financial & Commercial Law. Fall2016, Vol. 11 Issue 1, p183-208. 26p.

http://ezp.waldenulibrary.org/login?url=http://search.ebscohost.com/login.aspx?direct=true&db=bth&AN=120963931&site=eds-live&scope=site

A problem shared is a problem halved: A survey on the dimensions of collective cyber defense through security information sharing.

Authors: Skopik, Florian1 florian.skopik@ait.ac.at Settanni, Giuseppe1 Fiedler, Roman1

Source: Computers & Security. Jul2016, Vol. 60, p154-176. 23p.

http://www.sciencedirect.com.ezp.waldenulibrary.org/science/article/pii/S0167404816300347


Registered Walden students have further access to cybersecurity related news and RSS feeds through the Walden University library.

Man researching online education on laptop
Request Free Information
Request Free Information

Fill out this form to get free information on courses, admissions and financial aid from your personal advisor.


Please use our International Form if you live outside of the U.S.

Fill out this form to get free information on courses, admissions and financial aid from your personal advisor.


Please use our Domestic Form if you live in the U.S.
*Required Field
Academic Interests
Required
Required
Contact Information
Required
Required
Invalid email address
Please provide a valid phone number
Required
Please provide a valid zipcode
Required
Additional Information
Required
Submit

By submitting this form, I understand and agree that Walden University may contact me via email, text, telephone, and prerecorded message regarding furthering my education and that calls may be generated using automated technology. You may opt out at any time. Please view our privacy policy or contact us for more details.

Required