Blog focuses on Linux, open source software, cyber security, futuring, innovation, systems engineering, Africa, and other items related to technology.
Tuesday, December 31, 2013
CALL FOR CHAPTER PROPOSALS Proposal Submission Deadline: February 15, 2014 Handbook of Research on New Threats and Countermeasures in Digital Crime and Cyber Terrorism
CALL
FOR CHAPTER PROPOSALS
Proposal
Submission Deadline: February 15, 2014
Handbook of Research on New Threats and
Countermeasures in Digital Crime and Cyber Terrorism
A book edited by
Dr.
Maurice Dawson (Alabama A&M University, USA)
Dr. Marwan Omar (Nawroz University, Iraq)
The Advances in Information Security,
Privacy, & Ethics (AISPE) Book Series is
the source for this research, as the series provides only the most cutting-edge
research on how information is utilized in the digital age.
Introduction
This handbook of
research will explore multiple aspects of cyber terrorism and cyber crime in
today's society. This book provides insights on the negatives uses of
technology with comprehensive review of the associated vulnerabilities and
mitigations. Researchers, practitioners, and professionals will benefits from
this publication’s broad perspective.
Objective of the Book
This proposed
publication takes an entirely different route in describing digital crime and cyber
terrorism. This publication has the potential to aid organizations everywhere
to effectively defend their systems.
Target Audience
The handbook of
research is expected to get a large amount of attention in the cyber security
realm. This will cover all emerging negative uses of technologies which will
allow individuals to gain insight so they can better defend these new attacks.
This can be used by training organization, intelligence community, and others
responsible for network defense.
Recommended topics include, but are not
limited to, the following:
·
Network and Mobile Security
·
Virtual Words for Terrorism Training Grounds
·
Attacking Health Care Devices
·
Automobiles Access Points
·
Cyber Terrorism
·
Cyber Crime
·
Software Assurance
·
Exploiting Code Vulnerabilities
·
Future Predictions of Cyber Crime
·
Department of Defense Information Assurance Controls
·
Reverse Engineering
·
Vulnerabilities in Mixed & Augmented Reality
·
Vulnerabilities in Google Glass
·
Systems of Systems Attacks
·
Unmanned Systems Exploitations
·
Certification and Accreditation
·
Cryptosystems
We strongly welcome other topics suggestions, dealing with other negative uses of technology and science such as attacking national infrastructure, cloud computing security, offensive security practices, and other unknown exploits.
Submission Procedure
Researchers are
invited to submit on or before February
15, 2014, a 2-3 page chapter proposal clearly explaining the mission and
concerns of his or her proposed chapter. Authors of accepted proposals will be
notified March 31, 2014 about the
status of their proposals and sent chapter guidelines. Authors of accepted
proposals will be sent guidelines to prepare the full chapter (7,000 – 11,000
words length). Full chapters are expected to be submitted by June 15, 2014. All submitted chapter
will be reviewed on a double-blind review basis. Contributors may also be
requested to serve as a reviewer for this project.
Publisher
This
book is scheduled to be published by IGI Global (formerly Idea Group Inc.),
publisher of the Information Science Reference (formerly Idea Group Reference),
Medical Information Science Reference, Business Science Reference, and
Engineering Science Reference imprints. For additional information regarding
the publisher, please visit www.igi-global.com. This book is
anticipated to be released in 2014.
Important Dates
1st Proposal Submission Deadline: February
15, 2014
2nd Proposal Submission Deadline: March 15, 2014
Last Call for Proposals: April 15, 2014
Full chapter Submission: June 15, 2014
Review Process: June 15, 2014 –July 30, 2014
Review Results to Authors: August 15, 2014
Revised Chapter Submission: September 15, 2014
Final Acceptance Notifications: September 30, 2014
Submission of Final Chapters: October 15, 2014
Final Deadline: November 30, 2014
2nd Proposal Submission Deadline: March 15, 2014
Last Call for Proposals: April 15, 2014
Full chapter Submission: June 15, 2014
Review Process: June 15, 2014 –July 30, 2014
Review Results to Authors: August 15, 2014
Revised Chapter Submission: September 15, 2014
Final Acceptance Notifications: September 30, 2014
Submission of Final Chapters: October 15, 2014
Final Deadline: November 30, 2014
Inquiries can be forwarded to
Inquires can be forwarded to
electronically (Word document):
Dr. Maurice Dawson
Department of Management and Marketing
College of Business and Public Affairs
Alabama A&M University
Tel.: +1-256-372-4801
Primary Email: maurice.e.dawson@gmail.com
Secondary Email: maurice.dawson@aamu.edu
Dr. Maurice Dawson
Department of Management and Marketing
College of Business and Public Affairs
Alabama A&M University
Tel.: +1-256-372-4801
Primary Email: maurice.e.dawson@gmail.com
Secondary Email: maurice.dawson@aamu.edu
Labels:
book,
cyber,
digital crime,
dr maurice eugene dawson jr,
new threats,
phd,
proposal,
research,
tenure
25 Free Resources To Learn Java Programming Language Online
25 Free Resources To Learn Java Programming Language Online [Original Post Found Here]
25+ Free Resources To Learn Java Programming Language Online | ||||||||||||
|
Monday, December 30, 2013
Call for Chapters: Handbook of Research on New Threats and Countermeasures in Digital Crime and Cyber Terrorism
IGI Global: Call for Chapter Details
Dr. Maurice Dawson, Alabama A&M University, USA
Dr. Marwan Omar, Nawroz University, Iraq
Proposals Submission Deadline: February 15, 2014Full Chapters Due: June 15, 2014Submission Date: October 15, 2014
This handbook of research will explore multiple aspects of cyber terrorism and cyber crime in today's society. This book provides insights on the negatives uses of technology with comprehensive review of the associated vulnerabilities and mitigations. Researchers, practitioners, and professionals will benefits from this publication’s broad perspective.
This proposed publication takes an entirely different route in describing digital crime and cyber terrorism. This publication has the potential to aid organizations everywhere to effectively defend their systems.
The handbook of research is expected to get a large amount of attention in the cyber security realm. This will cover all emerging negative uses of technologies which will allow individuals to gain insight so they can better defend these new attacks. This can be used by training organization, intelligence community, and others responsible for network defense.
We strongly welcome other topics suggestions, dealing with other negative uses of technology and science such as attacking national infrastructure, cloud computing security, offensive security practices, and other unknown exploits.
Researchers are invited to submit on or before February 15, 2014, a 2-3 page chapter proposal clearly explaining the mission and concerns of his or her proposed chapter. Authors of accepted proposals will be notified March 31, 2014 about the status of their proposals and sent chapter guidelines. Authors of accepted proposals will be sent guidelines to prepare the full chapter (7,000 – 11,000 words length). Full chapters are expected to be submitted by June 15, 2014. All submitted chapter will be reviewed on a double-blind review basis. Contributors may also be requested to serve as a reviewer for this project.
This handbook of research is scheduled to be published by IGI Global (formerly Idea Group Inc.), publisher of the “Information Science Reference” (formerly Idea Group Reference), “Medical Information Science Reference”, “Business Science Reference”, and “Engineering Science Reference” imprints. For additional information regarding the publisher, please visit www.igi-global.com.. This publication is anticipated to be released early 2015.
1st Proposal Submission Deadline: February 15, 2014
2nd Proposal Submission Deadline: March 15, 2014
Last Call for Proposals: April 15, 2014
Full chapter Submission: June 15, 2014
Review Process: June 15, 2014 –July 30, 2014
Review Results to Authors: August 15, 2014
Revised Chapter Submission: September 15, 2014
Final Acceptance Notifications: September 30, 2014
Submission of Final Chapters: October 15, 2014
Final Deadline: November 30, 2014
Inquires can be forwarded to electronically (Word document):
Dr. Maurice Dawson
Department of Management and Marketing
College of Business and Public Affairs
Alabama A&M University
Tel.: +1-256-372-4801
Primary Email: maurice.e.dawson@gmail.com
Secondary Email: maurice.dawson@aamu.edu
Call for Chapters: Handbook of Research on New Threats and Countermeasures in Digital Crime and Cyber Terrorism
Editors
Dr. Marwan Omar, Nawroz University, Iraq
Call for Chapters
Introduction
Objective
Target Audience
Recommended Topics
- Network and Mobile Security
- Virtual Words for Terrorism Training Grounds
- Attacking Health Care Devices
- Automobiles Access Points
- Cyber Terrorism
- Cyber Crime
- Software Assurance
- Exploiting Code Vulnerabilities
- Future Predictions of Cyber Crime
- Department of Defense Information Assurance Controls
- Reverse Engineering
- Vulnerabilities in Mixed & Augmented Reality
- Vulnerabilities in Google Glass
- Systems of Systems Attacks
- Unmanned Systems Exploitations
- Certification and Accreditation
- Cryptosystems
We strongly welcome other topics suggestions, dealing with other negative uses of technology and science such as attacking national infrastructure, cloud computing security, offensive security practices, and other unknown exploits.
Submission Procedure
Publisher
Important Dates
2nd Proposal Submission Deadline: March 15, 2014
Last Call for Proposals: April 15, 2014
Full chapter Submission: June 15, 2014
Review Process: June 15, 2014 –July 30, 2014
Review Results to Authors: August 15, 2014
Revised Chapter Submission: September 15, 2014
Final Acceptance Notifications: September 30, 2014
Submission of Final Chapters: October 15, 2014
Final Deadline: November 30, 2014
Inquiries
Dr. Maurice Dawson
Department of Management and Marketing
College of Business and Public Affairs
Alabama A&M University
Tel.: +1-256-372-4801
Primary Email: maurice.e.dawson@gmail.com
Secondary Email: maurice.dawson@aamu.edu
Windows vs Mac vs Linux: The Pros And Cons
Windows vs Mac vs Linux: The Pros And Cons
Windows vs Mac vs Linux: The Pros And Cons | |||||||||||
|
Sunday, December 29, 2013
Saturday, December 28, 2013
Wednesday, December 25, 2013
Subscribe to:
Posts (Atom)