SlideShare ist ein Scribd-Unternehmen logo
1 von 3
Call for Chapters: Handbook of Research on New Threats and Countermeasures in Digital Crime
and Cyber Terrorism

See http://www.igi-global.com/publish/call-for-papers/calldetails/1205
Editors
Dr. Maurice Dawson, Alabama A&M University, USA
Dr. Marwan Omar, Nawroz University, Iraq

Call for Chapters
Proposals Submission Deadline: February 15, 2014
Full Chapters Due: June 15, 2014
Submission Date: October 15, 2014

Introduction
This handbook of research will explore multiple aspects of cyber terrorism and cyber crime
in today's society. This book provides insights on the negatives uses of technology with
comprehensive review of the associated vulnerabilities and mitigations. Researchers,
practitioners, and professionals will benefits from this publication’s broad perspective.
Objective
This proposed publication takes an entirely different route in describing digital crime and
cyber terrorism. This publication has the potential to aid organizations everywhere to
effectively defend their systems.
Target Audience
The handbook of research is expected to get a large amount of attention in the cyber
security realm. This will cover all emerging negative uses of technologies which will allow
individuals to gain insight so they can better defend these new attacks. This can be used by
training organization, intelligence community, and others responsible for network defense.
Recommended Topics
•
•
•
•
•
•
•
•
•

Network and Mobile Security
Virtual Words for Terrorism Training Grounds
Attacking Health Care Devices
Automobiles Access Points
Cyber Terrorism
Cyber Crime
Software Assurance
Exploiting Code Vulnerabilities
Future Predictions of Cyber Crime
•
•
•
•
•
•
•
•

Department of Defense Information Assurance Controls
Reverse Engineering
Vulnerabilities in Mixed & Augmented Reality
Vulnerabilities in Google Glass
Systems of Systems Attacks
Unmanned Systems Exploitations
Certification and Accreditation
Cryptosystems
We strongly welcome other topics suggestions, dealing with other negative uses of
technology and science such as attacking national infrastructure, cloud computing security,
offensive security practices, and other unknown exploits.

Submission Procedure
Researchers are invited to submit on or before February 15, 2014, a 2-3 page chapter
proposal clearly explaining the mission and concerns of his or her proposed chapter.
Authors of accepted proposals will be notified March 31, 2014 about the status of their
proposals and sent chapter guidelines. Authors of accepted proposals will be sent guidelines
to prepare the full chapter (7,000 – 11,000 words length). Full chapters are expected to be
submitted by June 15, 2014. All submitted chapter will be reviewed on a double-blind review
basis. Contributors may also be requested to serve as a reviewer for this project.
Publisher
This handbook of research is scheduled to be published by IGI Global (formerly Idea Group
Inc.), publisher of the “Information Science Reference” (formerly Idea Group Reference),
“Medical Information Science Reference”, “Business Science Reference”, and “Engineering
Science Reference” imprints. For additional information regarding the publisher, please
visit www.igi-global.com.. This publication is anticipated to be released early 2015.
Important Dates
1st Proposal Submission Deadline: February 15, 2014
2nd Proposal Submission Deadline: March 15, 2014
Last Call for Proposals: April 15, 2014
Full chapter Submission: June 15, 2014
Review Process: June 15, 2014 –July 30, 2014
Review Results to Authors: August 15, 2014
Revised Chapter Submission: September 15, 2014
Final Acceptance Notifications: September 30, 2014
Submission of Final Chapters: October 15, 2014
Final Deadline: November 30, 2014
Inquiries
Inquires can be forwarded to electronically (Word document):
Dr. Maurice Dawson
Department of Management and Marketing
College of Business and Public Affairs
Alabama A&M University
Tel.: +1-256-372-4801
Primary Email: maurice.e.dawson@gmail.com
Secondary Email: maurice.dawson@aamu.edu

Propose a chapter for this book

Weitere ähnliche Inhalte

Ähnlich wie Call for Chapters: Handbook of Research on New Threats and Countermeasures in Digital Crime and Cyber Terrorism [2]

Call for chapter_proposals for Technology, Innovation and Enterprise Transfor...
Call for chapter_proposals for Technology, Innovation and Enterprise Transfor...Call for chapter_proposals for Technology, Innovation and Enterprise Transfor...
Call for chapter_proposals for Technology, Innovation and Enterprise Transfor...
Maurice Dawson
 
Call for Chapters: Security Solutions for Hyperconnectivity and the Internet ...
Call for Chapters: Security Solutions for Hyperconnectivity and the Internet ...Call for Chapters: Security Solutions for Hyperconnectivity and the Internet ...
Call for Chapters: Security Solutions for Hyperconnectivity and the Internet ...
Maurice Dawson
 
Social media’s role in tenure and promotion 2014 03-17
Social media’s role in tenure and promotion 2014 03-17Social media’s role in tenure and promotion 2014 03-17
Social media’s role in tenure and promotion 2014 03-17
Louise Spiteri
 
EVOLVING RANSOMWARE ATTACKS ON HEALTHCARE PROVIDERS
EVOLVING RANSOMWARE ATTACKS ON HEALTHCARE PROVIDERSEVOLVING RANSOMWARE ATTACKS ON HEALTHCARE PROVIDERS
EVOLVING RANSOMWARE ATTACKS ON HEALTHCARE PROVIDERS
Ayed Al Qartah
 

Ähnlich wie Call for Chapters: Handbook of Research on New Threats and Countermeasures in Digital Crime and Cyber Terrorism [2] (20)

Call for chapter_proposals for Technology, Innovation and Enterprise Transfor...
Call for chapter_proposals for Technology, Innovation and Enterprise Transfor...Call for chapter_proposals for Technology, Innovation and Enterprise Transfor...
Call for chapter_proposals for Technology, Innovation and Enterprise Transfor...
 
Research Visibility and Impact in the Next Generation Libraries
Research Visibility and Impact in the Next Generation LibrariesResearch Visibility and Impact in the Next Generation Libraries
Research Visibility and Impact in the Next Generation Libraries
 
Recent Talks in Big Data
Recent Talks in Big DataRecent Talks in Big Data
Recent Talks in Big Data
 
Publishing of an article
Publishing of an article Publishing of an article
Publishing of an article
 
Call For Chapters Conv Agent
Call For Chapters Conv AgentCall For Chapters Conv Agent
Call For Chapters Conv Agent
 
International Journal of Mechanical Dynamics & Analysis vol 2 issue 1
International Journal of Mechanical Dynamics & Analysis vol 2 issue 1International Journal of Mechanical Dynamics & Analysis vol 2 issue 1
International Journal of Mechanical Dynamics & Analysis vol 2 issue 1
 
Recent Talks in Big Data
Recent Talks in Big DataRecent Talks in Big Data
Recent Talks in Big Data
 
Call for Chapters: Security Solutions for Hyperconnectivity and the Internet ...
Call for Chapters: Security Solutions for Hyperconnectivity and the Internet ...Call for Chapters: Security Solutions for Hyperconnectivity and the Internet ...
Call for Chapters: Security Solutions for Hyperconnectivity and the Internet ...
 
Nerc per-funding-call
Nerc per-funding-callNerc per-funding-call
Nerc per-funding-call
 
Nerc per-funding-call
Nerc per-funding-callNerc per-funding-call
Nerc per-funding-call
 
Crowdsource Application A Pragmatic Approach for Participation in Healthcare...
Crowdsource Application  A Pragmatic Approach for Participation in Healthcare...Crowdsource Application  A Pragmatic Approach for Participation in Healthcare...
Crowdsource Application A Pragmatic Approach for Participation in Healthcare...
 
Unit 5
Unit  5Unit  5
Unit 5
 
International Journal of Composite Materials and Matrices vol 2 issue 1
International Journal of Composite Materials and Matrices vol 2 issue 1International Journal of Composite Materials and Matrices vol 2 issue 1
International Journal of Composite Materials and Matrices vol 2 issue 1
 
Social media’s role in tenure and promotion 2014 03-17
Social media’s role in tenure and promotion 2014 03-17Social media’s role in tenure and promotion 2014 03-17
Social media’s role in tenure and promotion 2014 03-17
 
International Journal of Composite Materials and Matrices (Vol 2 Issue 2)
International Journal of Composite Materials and Matrices  (Vol 2 Issue 2)International Journal of Composite Materials and Matrices  (Vol 2 Issue 2)
International Journal of Composite Materials and Matrices (Vol 2 Issue 2)
 
Introduction to “Research Tools”: Tools for Collecting, Writing, Publishing, ...
Introduction to “Research Tools”: Tools for Collecting, Writing, Publishing, ...Introduction to “Research Tools”: Tools for Collecting, Writing, Publishing, ...
Introduction to “Research Tools”: Tools for Collecting, Writing, Publishing, ...
 
IRJET - Social Media Intelligence Tools
IRJET -  	  Social Media Intelligence ToolsIRJET -  	  Social Media Intelligence Tools
IRJET - Social Media Intelligence Tools
 
International Conference on Health Information Technology and Primary Healthc...
International Conference on Health Information Technology and Primary Healthc...International Conference on Health Information Technology and Primary Healthc...
International Conference on Health Information Technology and Primary Healthc...
 
EVOLVING RANSOMWARE ATTACKS ON HEALTHCARE PROVIDERS
EVOLVING RANSOMWARE ATTACKS ON HEALTHCARE PROVIDERSEVOLVING RANSOMWARE ATTACKS ON HEALTHCARE PROVIDERS
EVOLVING RANSOMWARE ATTACKS ON HEALTHCARE PROVIDERS
 
Enhance Your Journal’s Visibility and Impact
Enhance Your Journal’s Visibility and ImpactEnhance Your Journal’s Visibility and Impact
Enhance Your Journal’s Visibility and Impact
 

Mehr von Maurice Dawson

Understanding the Challenge of Cybersecurity in Critical Infrastructure Sectors
Understanding the Challenge of Cybersecurity in Critical Infrastructure SectorsUnderstanding the Challenge of Cybersecurity in Critical Infrastructure Sectors
Understanding the Challenge of Cybersecurity in Critical Infrastructure Sectors
Maurice Dawson
 
MWAIS 2018 : 13th Annual Conference of the Midwest Association for Informatio...
MWAIS 2018 : 13th Annual Conference of the Midwest Association for Informatio...MWAIS 2018 : 13th Annual Conference of the Midwest Association for Informatio...
MWAIS 2018 : 13th Annual Conference of the Midwest Association for Informatio...
Maurice Dawson
 

Mehr von Maurice Dawson (20)

Understanding the Challenge of Cybersecurity in Critical Infrastructure Sectors
Understanding the Challenge of Cybersecurity in Critical Infrastructure SectorsUnderstanding the Challenge of Cybersecurity in Critical Infrastructure Sectors
Understanding the Challenge of Cybersecurity in Critical Infrastructure Sectors
 
Unprotected Data: Your Risk of Internet-Enabled Psychological and Information...
Unprotected Data: Your Risk of Internet-Enabled Psychological and Information...Unprotected Data: Your Risk of Internet-Enabled Psychological and Information...
Unprotected Data: Your Risk of Internet-Enabled Psychological and Information...
 
Security Solutions for Hyperconnectivity in the Internet of Things
Security Solutions for Hyperconnectivity in the Internet of ThingsSecurity Solutions for Hyperconnectivity in the Internet of Things
Security Solutions for Hyperconnectivity in the Internet of Things
 
Framework for the Development of Virtual Labs for Industrial Internet of Thin...
Framework for the Development of Virtual Labs for Industrial Internet of Thin...Framework for the Development of Virtual Labs for Industrial Internet of Thin...
Framework for the Development of Virtual Labs for Industrial Internet of Thin...
 
Unprepared for Cybersecurity in Saudi Arabia: Argument for a Shift Towards Cy...
Unprepared for Cybersecurity in Saudi Arabia: Argument for a Shift Towards Cy...Unprepared for Cybersecurity in Saudi Arabia: Argument for a Shift Towards Cy...
Unprepared for Cybersecurity in Saudi Arabia: Argument for a Shift Towards Cy...
 
CTRL, Search, Exploit, and Destroy
CTRL, Search, Exploit, and DestroyCTRL, Search, Exploit, and Destroy
CTRL, Search, Exploit, and Destroy
 
MWAIS Fall 2017 Newsletter
MWAIS Fall 2017 NewsletterMWAIS Fall 2017 Newsletter
MWAIS Fall 2017 Newsletter
 
MWAIS Fall 2018 Newsletter
MWAIS Fall 2018 NewsletterMWAIS Fall 2018 Newsletter
MWAIS Fall 2018 Newsletter
 
Information Technology Use in West African Agriculture – challenges and oppor...
Information Technology Use in West African Agriculture – challenges and oppor...Information Technology Use in West African Agriculture – challenges and oppor...
Information Technology Use in West African Agriculture – challenges and oppor...
 
The Case for IT Training within Guinea’s Ministry of Agriculture: Evaluating ...
The Case for IT Training within Guinea’s Ministry of Agriculture: Evaluating ...The Case for IT Training within Guinea’s Ministry of Agriculture: Evaluating ...
The Case for IT Training within Guinea’s Ministry of Agriculture: Evaluating ...
 
Schedule for the 13th Annual Conference of the Midwest AIS
Schedule for the 13th Annual Conference of the Midwest AIS Schedule for the 13th Annual Conference of the Midwest AIS
Schedule for the 13th Annual Conference of the Midwest AIS
 
UMSL IS | Farmer 2 Farmer Program
UMSL IS | Farmer 2 Farmer ProgramUMSL IS | Farmer 2 Farmer Program
UMSL IS | Farmer 2 Farmer Program
 
Midwest Association for Information Systems - MWAIS2018
Midwest Association for Information Systems - MWAIS2018Midwest Association for Information Systems - MWAIS2018
Midwest Association for Information Systems - MWAIS2018
 
MWAIS 2018 - 13th Annual Conference
MWAIS 2018 - 13th Annual ConferenceMWAIS 2018 - 13th Annual Conference
MWAIS 2018 - 13th Annual Conference
 
MWAIS 2018 : 13th Annual Conference of the Midwest Association for Informatio...
MWAIS 2018 : 13th Annual Conference of the Midwest Association for Informatio...MWAIS 2018 : 13th Annual Conference of the Midwest Association for Informatio...
MWAIS 2018 : 13th Annual Conference of the Midwest Association for Informatio...
 
Technological Advancements for Intelligence Collection, Analysis, and Dissemi...
Technological Advancements for Intelligence Collection, Analysis, and Dissemi...Technological Advancements for Intelligence Collection, Analysis, and Dissemi...
Technological Advancements for Intelligence Collection, Analysis, and Dissemi...
 
Hacking, Privacy and Security in a Hyperconnected Society
Hacking, Privacy and Security in a Hyperconnected SocietyHacking, Privacy and Security in a Hyperconnected Society
Hacking, Privacy and Security in a Hyperconnected Society
 
University of Missouri - Saint Louis Cyber Security
University of Missouri - Saint Louis Cyber SecurityUniversity of Missouri - Saint Louis Cyber Security
University of Missouri - Saint Louis Cyber Security
 
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
 
Security Solutions for Hyperconnectivity and the Internet of Things
Security Solutions for Hyperconnectivity and the Internet of ThingsSecurity Solutions for Hyperconnectivity and the Internet of Things
Security Solutions for Hyperconnectivity and the Internet of Things
 

Kürzlich hochgeladen

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Kürzlich hochgeladen (20)

ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 

Call for Chapters: Handbook of Research on New Threats and Countermeasures in Digital Crime and Cyber Terrorism [2]

  • 1. Call for Chapters: Handbook of Research on New Threats and Countermeasures in Digital Crime and Cyber Terrorism See http://www.igi-global.com/publish/call-for-papers/calldetails/1205 Editors Dr. Maurice Dawson, Alabama A&M University, USA Dr. Marwan Omar, Nawroz University, Iraq Call for Chapters Proposals Submission Deadline: February 15, 2014 Full Chapters Due: June 15, 2014 Submission Date: October 15, 2014 Introduction This handbook of research will explore multiple aspects of cyber terrorism and cyber crime in today's society. This book provides insights on the negatives uses of technology with comprehensive review of the associated vulnerabilities and mitigations. Researchers, practitioners, and professionals will benefits from this publication’s broad perspective. Objective This proposed publication takes an entirely different route in describing digital crime and cyber terrorism. This publication has the potential to aid organizations everywhere to effectively defend their systems. Target Audience The handbook of research is expected to get a large amount of attention in the cyber security realm. This will cover all emerging negative uses of technologies which will allow individuals to gain insight so they can better defend these new attacks. This can be used by training organization, intelligence community, and others responsible for network defense. Recommended Topics • • • • • • • • • Network and Mobile Security Virtual Words for Terrorism Training Grounds Attacking Health Care Devices Automobiles Access Points Cyber Terrorism Cyber Crime Software Assurance Exploiting Code Vulnerabilities Future Predictions of Cyber Crime
  • 2. • • • • • • • • Department of Defense Information Assurance Controls Reverse Engineering Vulnerabilities in Mixed & Augmented Reality Vulnerabilities in Google Glass Systems of Systems Attacks Unmanned Systems Exploitations Certification and Accreditation Cryptosystems We strongly welcome other topics suggestions, dealing with other negative uses of technology and science such as attacking national infrastructure, cloud computing security, offensive security practices, and other unknown exploits. Submission Procedure Researchers are invited to submit on or before February 15, 2014, a 2-3 page chapter proposal clearly explaining the mission and concerns of his or her proposed chapter. Authors of accepted proposals will be notified March 31, 2014 about the status of their proposals and sent chapter guidelines. Authors of accepted proposals will be sent guidelines to prepare the full chapter (7,000 – 11,000 words length). Full chapters are expected to be submitted by June 15, 2014. All submitted chapter will be reviewed on a double-blind review basis. Contributors may also be requested to serve as a reviewer for this project. Publisher This handbook of research is scheduled to be published by IGI Global (formerly Idea Group Inc.), publisher of the “Information Science Reference” (formerly Idea Group Reference), “Medical Information Science Reference”, “Business Science Reference”, and “Engineering Science Reference” imprints. For additional information regarding the publisher, please visit www.igi-global.com.. This publication is anticipated to be released early 2015. Important Dates 1st Proposal Submission Deadline: February 15, 2014 2nd Proposal Submission Deadline: March 15, 2014 Last Call for Proposals: April 15, 2014 Full chapter Submission: June 15, 2014 Review Process: June 15, 2014 –July 30, 2014 Review Results to Authors: August 15, 2014 Revised Chapter Submission: September 15, 2014 Final Acceptance Notifications: September 30, 2014 Submission of Final Chapters: October 15, 2014 Final Deadline: November 30, 2014
  • 3. Inquiries Inquires can be forwarded to electronically (Word document): Dr. Maurice Dawson Department of Management and Marketing College of Business and Public Affairs Alabama A&M University Tel.: +1-256-372-4801 Primary Email: maurice.e.dawson@gmail.com Secondary Email: maurice.dawson@aamu.edu Propose a chapter for this book