Blog focuses on Linux, open source software, cyber security, futuring, innovation, systems engineering, Africa, and other items related to technology.
Friday, January 31, 2014
Wednesday, January 29, 2014
Friday, January 24, 2014
Sunday, January 12, 2014
Call for Chapters: Handbook of Research on New Threats and Countermeasures in Digital Crime and Cyber Terrorism
Call for Chapters: Handbook of Research on New Threats and Countermeasures in Digital Crime and Cyber Terrorism
Editors
Dr. Marwan Omar, Nawroz University, Iraq
Call for Chapters
Introduction
Objective
Target Audience
Recommended Topics
- Network and Mobile Security
- Virtual Words for Terrorism Training Grounds
- Attacking Health Care Devices
- Automobiles Access Points
- Cyber Terrorism
- Cyber Crime
- Software Assurance
- Exploiting Code Vulnerabilities
- Future Predictions of Cyber Crime
- Department of Defense Information Assurance Controls
- Reverse Engineering
- Vulnerabilities in Mixed & Augmented Reality
- Vulnerabilities in Google Glass
- Systems of Systems Attacks
- Unmanned Systems Exploitations
- Certification and Accreditation
- Cryptosystems
We strongly welcome other topics suggestions, dealing with other negative uses of technology and science such as attacking national infrastructure, cloud computing security, offensive security practices, and other unknown exploits.
Submission Procedure
Publisher
Important Dates
2nd Proposal Submission Deadline: March 15, 2014
Last Call for Proposals: April 15, 2014
Full chapter Submission: June 15, 2014
Review Process: June 15, 2014 –July 30, 2014
Review Results to Authors: August 15, 2014
Revised Chapter Submission: September 15, 2014
Final Acceptance Notifications: September 30, 2014
Submission of Final Chapters: October 15, 2014
Final Deadline: November 30, 2014
Inquiries
Dr. Maurice Dawson
Department of Management and Marketing
College of Business and Public Affairs
Alabama A&M University
Tel.: +1-256-372-4801
Primary Email: maurice.e.dawson@gmail.com
Secondary Email: maurice.dawson@aamu.edu
Saturday, January 11, 2014
PUTS-14 Call for Extended Abstracts
The 1st International Workshop on the Positive Use of Technology and Science (PUTS-14)
The PUTS-14 workshop is an annual workshop for researchers in technology and science that will be held in Banjul, The Gambia. PUTS-14 seeks papers on positive uses of technology and science within the Sub-Saharan African region.
Location: The University of The Gambia.
Deadline Submission: 8 March 2014
Date: 19 March 2014
Submit Paper: Click following link to submit paper https://www.easychair.org/conferences/?conf=puts14
Topics: Possible topics include, but are not limited to:
- Health information technology
- Open source software
- Technology innovation
- Techno-entrepreneurship
- Networking
- Mobile learning
- Cyber security
- Manufacturing robotics
- Surgical technology
- Military defense technology
Proceedings will be published in a book with Common Ground Publishing's Technology, Knowledge, and Society or IGI Global. Only proceedings published with a minimum of 8 pages single spaced will be included in the book. However only abstracts will be published in the general proceedings booklet. The format for full papers can be found at http://mdslab.unime.it/fsci11/authors_information-IGI_Chapter_Template.doc The book will be titled "Handbook of Research on Sub-Saharan African Innovations in Technology and Science".
*For those not affiliated with The University of The Gambia the fee is $100.00 USD for registration. Payment will occur via PayPal. Submit payment to maurice.e.dawson@gmail.com for PUTS-14. Each registered and paid individual will be eligible for full book submission, certificate of attendance, and certificate of presentation.
Hotels: See http://www.hotelscombined.com/Place/Banjul.htm for a list of affordable hotels in the Banjul or Serrekunda which is nearby.
Program Chair:
Dr. Maurice Dawson
Assistant Professor of Management Information Systems
Department of Management and Marketing
College of Business and Public Affairs
P.O. Box 429
Normal, Alabama 35762
+1-256-372-4801
maurice.e.dawson@gmail.com
maurice.dawson@aamu.edu
Labels:
academic,
africa,
computer,
conference,
engineering,
information,
technology
Friday, January 10, 2014
CES 2014 News: Android Privacy Issue Solved - KXNet - Bismarck/Minot/Williston/Dickinson
CES 2014 News: Android Privacy Issue Solved - KXNet - Bismarck/Minot/Williston/Dickinson
My paper was cited at this news station's website in North Dakota! Exciting news!
My paper was cited at this news station's website in North Dakota! Exciting news!
Title
Cyber Security and Mobile Threats: The Need for Antivirus Applications for Smart Phones
Authors
Jorja Wright, Maurice Dawson, Marwan Omar
Publication date
2012
Journal name
Journal of Information Systems Technology and Planning
Volume
5
Issue
12
Pages
40-60
Publisher
Intellectbase International Consortium
Total citations
Citations per year
Scholar articles
CYBER SECURITY AND MOBILE THREATS: THE NEED FOR ANTIVIRUS APPLICATIONS FOR SMART PHONES ∗
J Wright, ME Dawson Jr, M Omar
Cited by 1 - Related articles
J Wright, ME Dawson Jr, M Omar
Cited by 1 - Related articles
Thursday, January 9, 2014
Sunday, January 5, 2014
Saturday, January 4, 2014
KIM DOTCOM: THE MAN BEHIND MEGA
Excellent video on a gentlemen who goes against the grain! Love live the internet and those that seek to make various items free.
Wednesday, January 1, 2014
Call for Chapters: Handbook of Research on New Threats and Countermeasures in Digital Crime and Cyber Terrorism
Editors
Dr. Marwan Omar, Nawroz University, Iraq
Call for Chapters
Introduction
Objective
Target Audience
Recommended Topics
- Network and Mobile Security
- Virtual Words for Terrorism Training Grounds
- Attacking Health Care Devices
- Automobiles Access Points
- Cyber Terrorism
- Cyber Crime
- Software Assurance
- Exploiting Code Vulnerabilities
- Future Predictions of Cyber Crime
- Department of Defense Information Assurance Controls
- Reverse Engineering
- Vulnerabilities in Mixed & Augmented Reality
- Vulnerabilities in Google Glass
- Systems of Systems Attacks
- Unmanned Systems Exploitations
- Certification and Accreditation
- Cryptosystems
We strongly welcome other topics suggestions, dealing with other negative uses of technology and science such as attacking national infrastructure, cloud computing security, offensive security practices, and other unknown exploits.
Submission Procedure
Publisher
Important Dates
2nd Proposal Submission Deadline: March 15, 2014
Last Call for Proposals: April 15, 2014
Full chapter Submission: June 15, 2014
Review Process: June 15, 2014 –July 30, 2014
Review Results to Authors: August 15, 2014
Revised Chapter Submission: September 15, 2014
Final Acceptance Notifications: September 30, 2014
Submission of Final Chapters: October 15, 2014
Final Deadline: November 30, 2014
Inquiries
Dr. Maurice Dawson
Department of Management and Marketing
College of Business and Public Affairs
Alabama A&M University
Tel.: +1-256-372-4801
Primary Email: maurice.e.dawson@gmail.com
Secondary Email: maurice.dawson@aamu.edu
Subscribe to:
Posts (Atom)