SlideShare ist ein Scribd-Unternehmen logo
1 von 22
Maurice Eugene Dawson Jr.,  M.S., B.S. Master of Science in Management concentration Information Systems Security June 2006 Bachelor of Science in Applied Technology concentration Information Systems May 2004 Presentation About The Research Proposal Submitted to The Graduate Council in Partial Fulfillment of The Requirement for the Degree of Doctor of Computer Science with a concentration  in Enterprise Information Systems
Doctoral Committee ,[object Object],[object Object],[object Object],[object Object],[object Object]
Dissertation Topic ,[object Object]
Dissertation Outline ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Table of Contents ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Abstract ,[object Object]
Introduction ,[object Object]
Model for Transitional Leadership ,[object Object],[object Object],[object Object]
Acquisition & Technology ,[object Object]
Leadership & Management ,[object Object],[object Object],[object Object],Diagram created by Maurice E. Dawson Jr., MS, CPD
Business Development ,[object Object],Diagram created by Maurice E. Dawson Jr., MS, CPD
Strategies of Inquiry ,[object Object],[object Object],[object Object],Taken from Creswell, J. W. (2003). Research  Design: Qualitative, Quantitative, and Mixed Methods Approaches . Thousand Oaks, CA: Sage Publications. Alternatives Strategies of Inquiry Quantitative Qualitative Mixed Methods Experimental designs Non-experimental designs, such as surveys or polls Narratives  Phenomenology Ethnographies  Ground theory Case studies Sequential  Concurrent Transformative
Mixed Methods Approach ,[object Object],[object Object],Diagram created by Maurice E. Dawson Jr., MS, CPD
Mixed Methods Approach ,[object Object],[object Object],[object Object],[object Object],Table created by Maurice E. Dawson Jr., MS, CPD Name Current/Role Position Participant 1 Missile Defense & Ground Midcourse Defense Test Support Participant 2 Military Program Analyst Participant 3 Principle Business Analyst/ Business Development Participant 4 Manager, Contracts Participant 5 Special Operations Aviation Flight Test Director Participant 6 Ch-47F Flight Test Lead, SOA Flight Test Director Participant 7 Manager, Central Region Security Participant 8 Retired Sergeants Major/Military Instructor  Participant 9 Mechanical Engineer Co-op Participant 10 Senior Director of International Marketing  Participant 11 Software Engineer/ 2 nd  Lieutenant in Army National Guard (Intelligence PM Support) Participant 12 Senior Program Manager Participant 13 Retired Ltc [Director Equivalent] ./ Self Employed Business Owner Participant 14 Manager, Strategic Analysis Advanced Logistics Support Systems
Mixed Methods Approach ,[object Object],[object Object]
Mixed Methods Approach ,[object Object],[object Object]
Mixed Methods Approach ,[object Object],[object Object]
Method Choice for Research & Reflections ,[object Object],D iagram created by Maurice E. Dawson Jr., MS, CPD
Validity Issues ,[object Object],[object Object]
Ethical Issues ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Preliminary Results ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Action Items (AI) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]

Weitere ähnliche Inhalte

Was ist angesagt?

Proposal defense slideshow
Proposal defense slideshowProposal defense slideshow
Proposal defense slideshowCoby Long
 
Dissertation defense power point
Dissertation defense power pointDissertation defense power point
Dissertation defense power pointKelly Dodson
 
Dissertation Defense Presentation
Dissertation Defense PresentationDissertation Defense Presentation
Dissertation Defense PresentationDr. Timothy Kelly
 
Oral defense presentation_Ennis Brinson
Oral defense presentation_Ennis BrinsonOral defense presentation_Ennis Brinson
Oral defense presentation_Ennis BrinsonEnnis Brinson
 
Mc Kirkley Oral Defense 11122009 V2
Mc Kirkley Oral Defense 11122009 V2Mc Kirkley Oral Defense 11122009 V2
Mc Kirkley Oral Defense 11122009 V2mckirkley
 
Oral proposaldefense
Oral proposaldefenseOral proposaldefense
Oral proposaldefensemfinkenberg
 
DOCTORAL STUDY ORAL DEFENSE - MEDICAL IDENTITY THEFT AND PALM VEIN AUTHENTICA...
DOCTORAL STUDY ORAL DEFENSE - MEDICAL IDENTITY THEFT AND PALM VEIN AUTHENTICA...DOCTORAL STUDY ORAL DEFENSE - MEDICAL IDENTITY THEFT AND PALM VEIN AUTHENTICA...
DOCTORAL STUDY ORAL DEFENSE - MEDICAL IDENTITY THEFT AND PALM VEIN AUTHENTICA...CRUZ CERDA
 
Thesis PROPOSAL Defense Presentation - March 26
Thesis PROPOSAL Defense Presentation - March 26 Thesis PROPOSAL Defense Presentation - March 26
Thesis PROPOSAL Defense Presentation - March 26 Hermes Huang
 
Ashbaugh dissertation defense presentation
Ashbaugh dissertation defense presentationAshbaugh dissertation defense presentation
Ashbaugh dissertation defense presentationDRMLAID
 
Li Yingying-- Master Thesis Defense
Li Yingying-- Master Thesis DefenseLi Yingying-- Master Thesis Defense
Li Yingying-- Master Thesis DefenseYingying Li
 
Gary Broils, D.B.A. - Dissertation Defense: Virtual Teaming and Collaboration...
Gary Broils, D.B.A. - Dissertation Defense: Virtual Teaming and Collaboration...Gary Broils, D.B.A. - Dissertation Defense: Virtual Teaming and Collaboration...
Gary Broils, D.B.A. - Dissertation Defense: Virtual Teaming and Collaboration...Gary Broils, DBA, PMP
 
Dissertation oral defense presentation
Dissertation   oral defense presentationDissertation   oral defense presentation
Dissertation oral defense presentationDr. Naomi Mangatu
 
Najmul Hoda PhD Thesis Defence Presentation
Najmul Hoda PhD Thesis Defence PresentationNajmul Hoda PhD Thesis Defence Presentation
Najmul Hoda PhD Thesis Defence PresentationNajmul Hoda
 
PhD proposal presentation
PhD proposal presentationPhD proposal presentation
PhD proposal presentationMichael Rowe
 
research proposal defense
research proposal defenseresearch proposal defense
research proposal defenseAin Malik
 
PhD research proposal presentation Sonia Saddiqui 28 Nov 2013
PhD research proposal presentation Sonia Saddiqui 28 Nov 2013PhD research proposal presentation Sonia Saddiqui 28 Nov 2013
PhD research proposal presentation Sonia Saddiqui 28 Nov 2013Sonia Saddiqui
 
Presentation on Research Proposal (Qualitative); Digitalisation & Top Managem...
Presentation on Research Proposal (Qualitative); Digitalisation & Top Managem...Presentation on Research Proposal (Qualitative); Digitalisation & Top Managem...
Presentation on Research Proposal (Qualitative); Digitalisation & Top Managem...Himanish Kar Purkayastha
 

Was ist angesagt? (20)

Proposal defense slideshow
Proposal defense slideshowProposal defense slideshow
Proposal defense slideshow
 
Dissertation defense power point
Dissertation defense power pointDissertation defense power point
Dissertation defense power point
 
Dissertation Defense Presentation
Dissertation Defense PresentationDissertation Defense Presentation
Dissertation Defense Presentation
 
Oral defense presentation_Ennis Brinson
Oral defense presentation_Ennis BrinsonOral defense presentation_Ennis Brinson
Oral defense presentation_Ennis Brinson
 
Mc Kirkley Oral Defense 11122009 V2
Mc Kirkley Oral Defense 11122009 V2Mc Kirkley Oral Defense 11122009 V2
Mc Kirkley Oral Defense 11122009 V2
 
Oral proposaldefense
Oral proposaldefenseOral proposaldefense
Oral proposaldefense
 
DOCTORAL STUDY ORAL DEFENSE - MEDICAL IDENTITY THEFT AND PALM VEIN AUTHENTICA...
DOCTORAL STUDY ORAL DEFENSE - MEDICAL IDENTITY THEFT AND PALM VEIN AUTHENTICA...DOCTORAL STUDY ORAL DEFENSE - MEDICAL IDENTITY THEFT AND PALM VEIN AUTHENTICA...
DOCTORAL STUDY ORAL DEFENSE - MEDICAL IDENTITY THEFT AND PALM VEIN AUTHENTICA...
 
Thesis PROPOSAL Defense Presentation - March 26
Thesis PROPOSAL Defense Presentation - March 26 Thesis PROPOSAL Defense Presentation - March 26
Thesis PROPOSAL Defense Presentation - March 26
 
Ashbaugh dissertation defense presentation
Ashbaugh dissertation defense presentationAshbaugh dissertation defense presentation
Ashbaugh dissertation defense presentation
 
Li Yingying-- Master Thesis Defense
Li Yingying-- Master Thesis DefenseLi Yingying-- Master Thesis Defense
Li Yingying-- Master Thesis Defense
 
Gary Broils, D.B.A. - Dissertation Defense: Virtual Teaming and Collaboration...
Gary Broils, D.B.A. - Dissertation Defense: Virtual Teaming and Collaboration...Gary Broils, D.B.A. - Dissertation Defense: Virtual Teaming and Collaboration...
Gary Broils, D.B.A. - Dissertation Defense: Virtual Teaming and Collaboration...
 
Dissertation oral defense presentation
Dissertation   oral defense presentationDissertation   oral defense presentation
Dissertation oral defense presentation
 
Najmul Hoda PhD Thesis Defence Presentation
Najmul Hoda PhD Thesis Defence PresentationNajmul Hoda PhD Thesis Defence Presentation
Najmul Hoda PhD Thesis Defence Presentation
 
Thesis proposal presentation
Thesis proposal presentationThesis proposal presentation
Thesis proposal presentation
 
Thesis Defense
Thesis Defense Thesis Defense
Thesis Defense
 
PhD proposal presentation
PhD proposal presentationPhD proposal presentation
PhD proposal presentation
 
research proposal defense
research proposal defenseresearch proposal defense
research proposal defense
 
Dissertation Presentation
Dissertation PresentationDissertation Presentation
Dissertation Presentation
 
PhD research proposal presentation Sonia Saddiqui 28 Nov 2013
PhD research proposal presentation Sonia Saddiqui 28 Nov 2013PhD research proposal presentation Sonia Saddiqui 28 Nov 2013
PhD research proposal presentation Sonia Saddiqui 28 Nov 2013
 
Presentation on Research Proposal (Qualitative); Digitalisation & Top Managem...
Presentation on Research Proposal (Qualitative); Digitalisation & Top Managem...Presentation on Research Proposal (Qualitative); Digitalisation & Top Managem...
Presentation on Research Proposal (Qualitative); Digitalisation & Top Managem...
 

Ähnlich wie Doctorate Dissertation Proposal

Framework For Effective Transitional Leadership In Defense & Aerospace.Pptx
Framework For Effective Transitional Leadership In Defense & Aerospace.PptxFramework For Effective Transitional Leadership In Defense & Aerospace.Pptx
Framework For Effective Transitional Leadership In Defense & Aerospace.PptxMaurice Dawson
 
Where to Look for KM Success - Murray Jennex
Where to Look for KM Success - Murray JennexWhere to Look for KM Success - Murray Jennex
Where to Look for KM Success - Murray JennexSIKM
 
Modeling Framework to Support Evidence-Based Decisions
Modeling Framework to Support Evidence-Based DecisionsModeling Framework to Support Evidence-Based Decisions
Modeling Framework to Support Evidence-Based DecisionsAlbert Simard
 
Chapter III Methodology As observed in recent years, large organi
Chapter III Methodology As observed in recent years, large organiChapter III Methodology As observed in recent years, large organi
Chapter III Methodology As observed in recent years, large organiJinElias52
 
This research proposal will cover 10
This research proposal will cover 10This research proposal will cover 10
This research proposal will cover 10samaralamoudi
 
Running head DATA GATHERING PLAN .docx
Running head DATA GATHERING PLAN                                 .docxRunning head DATA GATHERING PLAN                                 .docx
Running head DATA GATHERING PLAN .docxhealdkathaleen
 
The Physical Positioning Of Supermarket Products And How...
The Physical Positioning Of Supermarket Products And How...The Physical Positioning Of Supermarket Products And How...
The Physical Positioning Of Supermarket Products And How...Monique Jones
 
Qualitative Research Is Good At Simplifying And Managing...
Qualitative Research Is Good At Simplifying And Managing...Qualitative Research Is Good At Simplifying And Managing...
Qualitative Research Is Good At Simplifying And Managing...Patricia Viljoen
 
Research Process and Methodology FA10 class 1v15
Research Process and Methodology FA10 class 1v15Research Process and Methodology FA10 class 1v15
Research Process and Methodology FA10 class 1v15Jeffrey Keefer
 
Dissertation Defense: Critical Success Factors for Knowledge Management
Dissertation Defense: Critical Success Factors for Knowledge ManagementDissertation Defense: Critical Success Factors for Knowledge Management
Dissertation Defense: Critical Success Factors for Knowledge ManagementCurtis Conley
 
Research methods - qual or quant
Research methods - qual or quantResearch methods - qual or quant
Research methods - qual or quantTracy Harwood
 
Topic 5 DQ 2Nov 3-7, 2022Imagine once again that you are an au.docx
Topic 5 DQ 2Nov 3-7, 2022Imagine once again that you are an au.docxTopic 5 DQ 2Nov 3-7, 2022Imagine once again that you are an au.docx
Topic 5 DQ 2Nov 3-7, 2022Imagine once again that you are an au.docxjolleybendicty
 
Chapter 4Conducting a Needs AssessmentKnowing what is
Chapter 4Conducting a Needs AssessmentKnowing what is Chapter 4Conducting a Needs AssessmentKnowing what is
Chapter 4Conducting a Needs AssessmentKnowing what is WilheminaRossi174
 
Clinical Systems Mentorship and Adherence: The ICAP Approach
Clinical Systems Mentorship and Adherence: The ICAP ApproachClinical Systems Mentorship and Adherence: The ICAP Approach
Clinical Systems Mentorship and Adherence: The ICAP Approachicapclinical
 
Needs Assessment and Program Planning
Needs Assessment and Program PlanningNeeds Assessment and Program Planning
Needs Assessment and Program PlanningLynda Milne
 
Research Writing Methodology
Research Writing MethodologyResearch Writing Methodology
Research Writing MethodologyAiden Yeh
 

Ähnlich wie Doctorate Dissertation Proposal (20)

Framework For Effective Transitional Leadership In Defense & Aerospace.Pptx
Framework For Effective Transitional Leadership In Defense & Aerospace.PptxFramework For Effective Transitional Leadership In Defense & Aerospace.Pptx
Framework For Effective Transitional Leadership In Defense & Aerospace.Pptx
 
Where to Look for KM Success - Murray Jennex
Where to Look for KM Success - Murray JennexWhere to Look for KM Success - Murray Jennex
Where to Look for KM Success - Murray Jennex
 
Qualitative Research
Qualitative ResearchQualitative Research
Qualitative Research
 
Modeling Framework to Support Evidence-Based Decisions
Modeling Framework to Support Evidence-Based DecisionsModeling Framework to Support Evidence-Based Decisions
Modeling Framework to Support Evidence-Based Decisions
 
Chapter III Methodology As observed in recent years, large organi
Chapter III Methodology As observed in recent years, large organiChapter III Methodology As observed in recent years, large organi
Chapter III Methodology As observed in recent years, large organi
 
This research proposal will cover 10
This research proposal will cover 10This research proposal will cover 10
This research proposal will cover 10
 
Running head DATA GATHERING PLAN .docx
Running head DATA GATHERING PLAN                                 .docxRunning head DATA GATHERING PLAN                                 .docx
Running head DATA GATHERING PLAN .docx
 
Situational Leadership - Major General Temple
Situational Leadership - Major General TempleSituational Leadership - Major General Temple
Situational Leadership - Major General Temple
 
The Physical Positioning Of Supermarket Products And How...
The Physical Positioning Of Supermarket Products And How...The Physical Positioning Of Supermarket Products And How...
The Physical Positioning Of Supermarket Products And How...
 
Qualitative Research Is Good At Simplifying And Managing...
Qualitative Research Is Good At Simplifying And Managing...Qualitative Research Is Good At Simplifying And Managing...
Qualitative Research Is Good At Simplifying And Managing...
 
Research Process and Methodology FA10 class 1v15
Research Process and Methodology FA10 class 1v15Research Process and Methodology FA10 class 1v15
Research Process and Methodology FA10 class 1v15
 
Dissertation Defense: Critical Success Factors for Knowledge Management
Dissertation Defense: Critical Success Factors for Knowledge ManagementDissertation Defense: Critical Success Factors for Knowledge Management
Dissertation Defense: Critical Success Factors for Knowledge Management
 
Hrd 17
Hrd 17Hrd 17
Hrd 17
 
Research methods - qual or quant
Research methods - qual or quantResearch methods - qual or quant
Research methods - qual or quant
 
Topic 5 DQ 2Nov 3-7, 2022Imagine once again that you are an au.docx
Topic 5 DQ 2Nov 3-7, 2022Imagine once again that you are an au.docxTopic 5 DQ 2Nov 3-7, 2022Imagine once again that you are an au.docx
Topic 5 DQ 2Nov 3-7, 2022Imagine once again that you are an au.docx
 
Chapter 4Conducting a Needs AssessmentKnowing what is
Chapter 4Conducting a Needs AssessmentKnowing what is Chapter 4Conducting a Needs AssessmentKnowing what is
Chapter 4Conducting a Needs AssessmentKnowing what is
 
Clinical Systems Mentorship and Adherence: The ICAP Approach
Clinical Systems Mentorship and Adherence: The ICAP ApproachClinical Systems Mentorship and Adherence: The ICAP Approach
Clinical Systems Mentorship and Adherence: The ICAP Approach
 
Needs Assessment and Program Planning
Needs Assessment and Program PlanningNeeds Assessment and Program Planning
Needs Assessment and Program Planning
 
Research Writing Methodology
Research Writing MethodologyResearch Writing Methodology
Research Writing Methodology
 
Lo3 Other Elements of Research
Lo3  Other Elements of ResearchLo3  Other Elements of Research
Lo3 Other Elements of Research
 

Mehr von Maurice Dawson

Understanding the Challenge of Cybersecurity in Critical Infrastructure Sectors
Understanding the Challenge of Cybersecurity in Critical Infrastructure SectorsUnderstanding the Challenge of Cybersecurity in Critical Infrastructure Sectors
Understanding the Challenge of Cybersecurity in Critical Infrastructure SectorsMaurice Dawson
 
Unprotected Data: Your Risk of Internet-Enabled Psychological and Information...
Unprotected Data: Your Risk of Internet-Enabled Psychological and Information...Unprotected Data: Your Risk of Internet-Enabled Psychological and Information...
Unprotected Data: Your Risk of Internet-Enabled Psychological and Information...Maurice Dawson
 
Security Solutions for Hyperconnectivity in the Internet of Things
Security Solutions for Hyperconnectivity in the Internet of ThingsSecurity Solutions for Hyperconnectivity in the Internet of Things
Security Solutions for Hyperconnectivity in the Internet of ThingsMaurice Dawson
 
Framework for the Development of Virtual Labs for Industrial Internet of Thin...
Framework for the Development of Virtual Labs for Industrial Internet of Thin...Framework for the Development of Virtual Labs for Industrial Internet of Thin...
Framework for the Development of Virtual Labs for Industrial Internet of Thin...Maurice Dawson
 
Unprepared for Cybersecurity in Saudi Arabia: Argument for a Shift Towards Cy...
Unprepared for Cybersecurity in Saudi Arabia: Argument for a Shift Towards Cy...Unprepared for Cybersecurity in Saudi Arabia: Argument for a Shift Towards Cy...
Unprepared for Cybersecurity in Saudi Arabia: Argument for a Shift Towards Cy...Maurice Dawson
 
CTRL, Search, Exploit, and Destroy
CTRL, Search, Exploit, and DestroyCTRL, Search, Exploit, and Destroy
CTRL, Search, Exploit, and DestroyMaurice Dawson
 
MWAIS Fall 2017 Newsletter
MWAIS Fall 2017 NewsletterMWAIS Fall 2017 Newsletter
MWAIS Fall 2017 NewsletterMaurice Dawson
 
MWAIS Fall 2018 Newsletter
MWAIS Fall 2018 NewsletterMWAIS Fall 2018 Newsletter
MWAIS Fall 2018 NewsletterMaurice Dawson
 
Information Technology Use in West African Agriculture – challenges and oppor...
Information Technology Use in West African Agriculture – challenges and oppor...Information Technology Use in West African Agriculture – challenges and oppor...
Information Technology Use in West African Agriculture – challenges and oppor...Maurice Dawson
 
The Case for IT Training within Guinea’s Ministry of Agriculture: Evaluating ...
The Case for IT Training within Guinea’s Ministry of Agriculture: Evaluating ...The Case for IT Training within Guinea’s Ministry of Agriculture: Evaluating ...
The Case for IT Training within Guinea’s Ministry of Agriculture: Evaluating ...Maurice Dawson
 
Schedule for the 13th Annual Conference of the Midwest AIS
Schedule for the 13th Annual Conference of the Midwest AIS Schedule for the 13th Annual Conference of the Midwest AIS
Schedule for the 13th Annual Conference of the Midwest AIS Maurice Dawson
 
UMSL IS | Farmer 2 Farmer Program
UMSL IS | Farmer 2 Farmer ProgramUMSL IS | Farmer 2 Farmer Program
UMSL IS | Farmer 2 Farmer ProgramMaurice Dawson
 
Midwest Association for Information Systems - MWAIS2018
Midwest Association for Information Systems - MWAIS2018Midwest Association for Information Systems - MWAIS2018
Midwest Association for Information Systems - MWAIS2018Maurice Dawson
 
MWAIS 2018 - 13th Annual Conference
MWAIS 2018 - 13th Annual ConferenceMWAIS 2018 - 13th Annual Conference
MWAIS 2018 - 13th Annual ConferenceMaurice Dawson
 
MWAIS 2018 : 13th Annual Conference of the Midwest Association for Informatio...
MWAIS 2018 : 13th Annual Conference of the Midwest Association for Informatio...MWAIS 2018 : 13th Annual Conference of the Midwest Association for Informatio...
MWAIS 2018 : 13th Annual Conference of the Midwest Association for Informatio...Maurice Dawson
 
Technological Advancements for Intelligence Collection, Analysis, and Dissemi...
Technological Advancements for Intelligence Collection, Analysis, and Dissemi...Technological Advancements for Intelligence Collection, Analysis, and Dissemi...
Technological Advancements for Intelligence Collection, Analysis, and Dissemi...Maurice Dawson
 
Hacking, Privacy and Security in a Hyperconnected Society
Hacking, Privacy and Security in a Hyperconnected SocietyHacking, Privacy and Security in a Hyperconnected Society
Hacking, Privacy and Security in a Hyperconnected SocietyMaurice Dawson
 
University of Missouri - Saint Louis Cyber Security
University of Missouri - Saint Louis Cyber SecurityUniversity of Missouri - Saint Louis Cyber Security
University of Missouri - Saint Louis Cyber SecurityMaurice Dawson
 
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017Maurice Dawson
 
Security Solutions for Hyperconnectivity and the Internet of Things
Security Solutions for Hyperconnectivity and the Internet of ThingsSecurity Solutions for Hyperconnectivity and the Internet of Things
Security Solutions for Hyperconnectivity and the Internet of ThingsMaurice Dawson
 

Mehr von Maurice Dawson (20)

Understanding the Challenge of Cybersecurity in Critical Infrastructure Sectors
Understanding the Challenge of Cybersecurity in Critical Infrastructure SectorsUnderstanding the Challenge of Cybersecurity in Critical Infrastructure Sectors
Understanding the Challenge of Cybersecurity in Critical Infrastructure Sectors
 
Unprotected Data: Your Risk of Internet-Enabled Psychological and Information...
Unprotected Data: Your Risk of Internet-Enabled Psychological and Information...Unprotected Data: Your Risk of Internet-Enabled Psychological and Information...
Unprotected Data: Your Risk of Internet-Enabled Psychological and Information...
 
Security Solutions for Hyperconnectivity in the Internet of Things
Security Solutions for Hyperconnectivity in the Internet of ThingsSecurity Solutions for Hyperconnectivity in the Internet of Things
Security Solutions for Hyperconnectivity in the Internet of Things
 
Framework for the Development of Virtual Labs for Industrial Internet of Thin...
Framework for the Development of Virtual Labs for Industrial Internet of Thin...Framework for the Development of Virtual Labs for Industrial Internet of Thin...
Framework for the Development of Virtual Labs for Industrial Internet of Thin...
 
Unprepared for Cybersecurity in Saudi Arabia: Argument for a Shift Towards Cy...
Unprepared for Cybersecurity in Saudi Arabia: Argument for a Shift Towards Cy...Unprepared for Cybersecurity in Saudi Arabia: Argument for a Shift Towards Cy...
Unprepared for Cybersecurity in Saudi Arabia: Argument for a Shift Towards Cy...
 
CTRL, Search, Exploit, and Destroy
CTRL, Search, Exploit, and DestroyCTRL, Search, Exploit, and Destroy
CTRL, Search, Exploit, and Destroy
 
MWAIS Fall 2017 Newsletter
MWAIS Fall 2017 NewsletterMWAIS Fall 2017 Newsletter
MWAIS Fall 2017 Newsletter
 
MWAIS Fall 2018 Newsletter
MWAIS Fall 2018 NewsletterMWAIS Fall 2018 Newsletter
MWAIS Fall 2018 Newsletter
 
Information Technology Use in West African Agriculture – challenges and oppor...
Information Technology Use in West African Agriculture – challenges and oppor...Information Technology Use in West African Agriculture – challenges and oppor...
Information Technology Use in West African Agriculture – challenges and oppor...
 
The Case for IT Training within Guinea’s Ministry of Agriculture: Evaluating ...
The Case for IT Training within Guinea’s Ministry of Agriculture: Evaluating ...The Case for IT Training within Guinea’s Ministry of Agriculture: Evaluating ...
The Case for IT Training within Guinea’s Ministry of Agriculture: Evaluating ...
 
Schedule for the 13th Annual Conference of the Midwest AIS
Schedule for the 13th Annual Conference of the Midwest AIS Schedule for the 13th Annual Conference of the Midwest AIS
Schedule for the 13th Annual Conference of the Midwest AIS
 
UMSL IS | Farmer 2 Farmer Program
UMSL IS | Farmer 2 Farmer ProgramUMSL IS | Farmer 2 Farmer Program
UMSL IS | Farmer 2 Farmer Program
 
Midwest Association for Information Systems - MWAIS2018
Midwest Association for Information Systems - MWAIS2018Midwest Association for Information Systems - MWAIS2018
Midwest Association for Information Systems - MWAIS2018
 
MWAIS 2018 - 13th Annual Conference
MWAIS 2018 - 13th Annual ConferenceMWAIS 2018 - 13th Annual Conference
MWAIS 2018 - 13th Annual Conference
 
MWAIS 2018 : 13th Annual Conference of the Midwest Association for Informatio...
MWAIS 2018 : 13th Annual Conference of the Midwest Association for Informatio...MWAIS 2018 : 13th Annual Conference of the Midwest Association for Informatio...
MWAIS 2018 : 13th Annual Conference of the Midwest Association for Informatio...
 
Technological Advancements for Intelligence Collection, Analysis, and Dissemi...
Technological Advancements for Intelligence Collection, Analysis, and Dissemi...Technological Advancements for Intelligence Collection, Analysis, and Dissemi...
Technological Advancements for Intelligence Collection, Analysis, and Dissemi...
 
Hacking, Privacy and Security in a Hyperconnected Society
Hacking, Privacy and Security in a Hyperconnected SocietyHacking, Privacy and Security in a Hyperconnected Society
Hacking, Privacy and Security in a Hyperconnected Society
 
University of Missouri - Saint Louis Cyber Security
University of Missouri - Saint Louis Cyber SecurityUniversity of Missouri - Saint Louis Cyber Security
University of Missouri - Saint Louis Cyber Security
 
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
 
Security Solutions for Hyperconnectivity and the Internet of Things
Security Solutions for Hyperconnectivity and the Internet of ThingsSecurity Solutions for Hyperconnectivity and the Internet of Things
Security Solutions for Hyperconnectivity and the Internet of Things
 

Kürzlich hochgeladen

8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCRashishs7044
 
Market Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 EditionMarket Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 EditionMintel Group
 
Guide Complete Set of Residential Architectural Drawings PDF
Guide Complete Set of Residential Architectural Drawings PDFGuide Complete Set of Residential Architectural Drawings PDF
Guide Complete Set of Residential Architectural Drawings PDFChandresh Chudasama
 
Annual General Meeting Presentation Slides
Annual General Meeting Presentation SlidesAnnual General Meeting Presentation Slides
Annual General Meeting Presentation SlidesKeppelCorporation
 
8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCRashishs7044
 
Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Kirill Klimov
 
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCRashishs7044
 
Investment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy CheruiyotInvestment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy Cheruiyotictsugar
 
Financial-Statement-Analysis-of-Coca-cola-Company.pptx
Financial-Statement-Analysis-of-Coca-cola-Company.pptxFinancial-Statement-Analysis-of-Coca-cola-Company.pptx
Financial-Statement-Analysis-of-Coca-cola-Company.pptxsaniyaimamuddin
 
Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03DallasHaselhorst
 
The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...
The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...
The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...Operational Excellence Consulting
 
Darshan Hiranandani [News About Next CEO].pdf
Darshan Hiranandani [News About Next CEO].pdfDarshan Hiranandani [News About Next CEO].pdf
Darshan Hiranandani [News About Next CEO].pdfShashank Mehta
 
Horngren’s Financial & Managerial Accounting, 7th edition by Miller-Nobles so...
Horngren’s Financial & Managerial Accounting, 7th edition by Miller-Nobles so...Horngren’s Financial & Managerial Accounting, 7th edition by Miller-Nobles so...
Horngren’s Financial & Managerial Accounting, 7th edition by Miller-Nobles so...ssuserf63bd7
 
Buy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail AccountsBuy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail AccountsBuy Verified Accounts
 
business environment micro environment macro environment.pptx
business environment micro environment macro environment.pptxbusiness environment micro environment macro environment.pptx
business environment micro environment macro environment.pptxShruti Mittal
 
Organizational Structure Running A Successful Business
Organizational Structure Running A Successful BusinessOrganizational Structure Running A Successful Business
Organizational Structure Running A Successful BusinessSeta Wicaksana
 
Appkodes Tinder Clone Script with Customisable Solutions.pptx
Appkodes Tinder Clone Script with Customisable Solutions.pptxAppkodes Tinder Clone Script with Customisable Solutions.pptx
Appkodes Tinder Clone Script with Customisable Solutions.pptxappkodes
 
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCRashishs7044
 

Kürzlich hochgeladen (20)

8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
 
Market Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 EditionMarket Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 Edition
 
Guide Complete Set of Residential Architectural Drawings PDF
Guide Complete Set of Residential Architectural Drawings PDFGuide Complete Set of Residential Architectural Drawings PDF
Guide Complete Set of Residential Architectural Drawings PDF
 
Annual General Meeting Presentation Slides
Annual General Meeting Presentation SlidesAnnual General Meeting Presentation Slides
Annual General Meeting Presentation Slides
 
8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR
 
Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024
 
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
 
Investment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy CheruiyotInvestment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy Cheruiyot
 
Financial-Statement-Analysis-of-Coca-cola-Company.pptx
Financial-Statement-Analysis-of-Coca-cola-Company.pptxFinancial-Statement-Analysis-of-Coca-cola-Company.pptx
Financial-Statement-Analysis-of-Coca-cola-Company.pptx
 
Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03
 
The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...
The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...
The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...
 
Darshan Hiranandani [News About Next CEO].pdf
Darshan Hiranandani [News About Next CEO].pdfDarshan Hiranandani [News About Next CEO].pdf
Darshan Hiranandani [News About Next CEO].pdf
 
Horngren’s Financial & Managerial Accounting, 7th edition by Miller-Nobles so...
Horngren’s Financial & Managerial Accounting, 7th edition by Miller-Nobles so...Horngren’s Financial & Managerial Accounting, 7th edition by Miller-Nobles so...
Horngren’s Financial & Managerial Accounting, 7th edition by Miller-Nobles so...
 
Corporate Profile 47Billion Information Technology
Corporate Profile 47Billion Information TechnologyCorporate Profile 47Billion Information Technology
Corporate Profile 47Billion Information Technology
 
Buy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail AccountsBuy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail Accounts
 
Call Us ➥9319373153▻Call Girls In North Goa
Call Us ➥9319373153▻Call Girls In North GoaCall Us ➥9319373153▻Call Girls In North Goa
Call Us ➥9319373153▻Call Girls In North Goa
 
business environment micro environment macro environment.pptx
business environment micro environment macro environment.pptxbusiness environment micro environment macro environment.pptx
business environment micro environment macro environment.pptx
 
Organizational Structure Running A Successful Business
Organizational Structure Running A Successful BusinessOrganizational Structure Running A Successful Business
Organizational Structure Running A Successful Business
 
Appkodes Tinder Clone Script with Customisable Solutions.pptx
Appkodes Tinder Clone Script with Customisable Solutions.pptxAppkodes Tinder Clone Script with Customisable Solutions.pptx
Appkodes Tinder Clone Script with Customisable Solutions.pptx
 
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
 

Doctorate Dissertation Proposal

  • 1. Maurice Eugene Dawson Jr., M.S., B.S. Master of Science in Management concentration Information Systems Security June 2006 Bachelor of Science in Applied Technology concentration Information Systems May 2004 Presentation About The Research Proposal Submitted to The Graduate Council in Partial Fulfillment of The Requirement for the Degree of Doctor of Computer Science with a concentration in Enterprise Information Systems
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.