Burnett, S. & Burchell, J. (2017). Social Media at a Postsecondary Campus: A Needs Analysis. Paper presented at the International Conference on Learning and Administration in Higher Education. Nashville, TN.
Burchell, J. (March 2017). Demystifying the Proposal. Presentation at the 2017 International Conference on Interdisciplinary Studies. Washington, DC.
Burnett, S., Justice, J., & Burchell, J. (2016). A needs analysis of social media in a post-secondary institution in Southern Tennessee. Paper presented at the International Conference on Interdisciplinary Studies. Washington, DC.
Carpenter, D.A., & Cunningham, M. (2017, forthcoming) Effectiveness of automation tools on commercial greenhouse operations: A computer-based simulation study. Accepted December 12, 2016 for presentation at MBAA International Conference in March 2017.
Casas, A. (2018) Information Technology Update for the Financial Planning Profession. Journal of Financial Planning. 31(3)
Casas, A. (2016) Why Financial Planning Informatics? Proceedings of the 2016 Annual Meeting of the Academy for Financial Services. Las Vegas, NV, October 20-22, 2016.
Cheng, P., Dimopoulos, C., & Case, S. (2018) “Remote Robotic Experimentation: An Evaluation of Intention to Use by High School Teachers in Cyprus”, Proceedings of the 10th International Conference on Computer Supported Education, March 15-17, 2018, Funchal, Madeira, Portugal
Dover-Harris, S. & Burchell, J. (2017). Performance Evaluation: An Analysis of Performance Review Measures Using the European Foundation for Quality Management Model. Management, 7(3).p.118-125. doi: 10.5923/j.mm.20170703.03
Duhainy, R (2017). Mobile Security, A US intelligence dilemma, The Colloquium for Information System Security Education (CISSE) Proceedings of the 21th Annual Conference, Las Vegas, NV - June 2016
Duhainy, R(2016). Internet Traffic Analysis, implications to Homeland Security, The Colloquium for Information System Security Education (CISSE) Proceedings of the 20th Annual Conference, Philadelphia, PA - June 2015
Nader Jafari, Abeer Alsadoon, Chandana Prasad Withana, Azam Beg and Amr Elchouemi, (2016). Designing a Comprehensive Security Framework for Smartphones and Mobile Devices. American Journal of Engineering and Applied Sciences, Volume 9, Issue 3, pp. 724-734.
Pabst, B; Casas, A; Ravi, C. (2016) Empirical Lessons from Failure of ERP Systems in Small and Medium Businesses. Southern Business and Economic Journal. 39 (1)
Pavari, A., Strider, S., Burchell, J., & Ready, J. (2017). Selection and Promotion of Nursing Leaders Based on Multiple Intelligences. Human Resource Management Research, 7(1). doi: 10.5923/j.hrmr.20170701.01
Perez, T. (2016, June). Municipal E‐Government Security: An Analysis of the Current Research Landscape. Paper presented at the 20th Colloquium for Information Systems Security Education, Philadelphia, Pennsylvania.
Pumphrey, D., & Carpenter, D. (2017). Benefits plan implementation: An IT ethical dilemma. Journal of Critical Incidents, 10. 16, 56-58
Pumphrey, D. & Carpenter, D. A. (2016). Benefits plan implementation: An ethical dilemma. Society for Case Research Annual Conference. [Chicago, March 2016].
Zayed, K., & Harkiolakis, N. ‘Information Security Awareness: Managing Web, Mobile & Endpoint Security; Overcoming the Challenges of Bring Your Own Device (BYOD)’, IJTCS (2016)
Cyber Defense Triad for Where Security Matters.
Schell, Roger R.1,2 email@example.com
Communications of the ACM. Nov2016, Vol. 59 Issue 11, p20-23. 4p. 1 Color Photograph, 2 Diagrams.
Biometrics in Cyber Security.
Ansari, A. Q.3 firstname.lastname@example.org
Defence Science Journal. Nov2016, Vol. 66 Issue 6, p600-604. 5p.
The role and security of firewalls in cyber-physical cloud computing.
Ullrich, Johanna1 email@example.com
Cropper, Jordan1 firstname.lastname@example.org
Frühwirt, Peter1 email@example.com
Weippl, Edgar1 firstname.lastname@example.org
EURASIP Journal on Information Security. 8/12/2016, Vol. 2016 Issue 1, p1-20. 20p.
LIKE A BAD NEIGHBOR, HACKERS ARE THERE: THE NEED FOR DATA SECURITY LEGISLATION AND CYBER INSURANCE IN LIGHT OF INCREASING FTC ENFORCEMENT ACTIONS.
Brooklyn Journal of Corporate, Financial & Commercial Law. Fall2016, Vol. 11 Issue 1, p183-208. 26p.
A problem shared is a problem halved: A survey on the dimensions of collective cyber defense through security information sharing.
Skopik, Florian1 email@example.com
Computers & Security. Jul2016, Vol. 60, p154-176. 23p.
Registered Walden students have further access to cybersecurity related news and RSS feeds through the Walden University library.