All Stories

  1. Applying a holistic cybersecurity framework for global IT organizations
  2. Security Solutions for Hyperconnectivity and the Internet of Things
  3. Developing Next-Generation Countermeasures for Homeland Security Threat Prevention
  4. Understanding User’s Acceptance of Personal Cloud Computing: Using the Technology Acceptance Model
  5. Common protocol to support disparate communication types within industrial Ethernet environments
  6. Microblogging in higher education: Digital Natives, knowledge creation, social engineering, and intelligence analysis of educational tweets
  7. TAM nd the Factors That Influence the Behavioral Intention of Users to Use M-Learning
  8. New Threats and Countermeasures in Digital Crime and Cyber Terrorism
  9. Research in Progress - Defending Android Smartphones from Malware Attacks
  10. DoD cyber technology policies to secure automated information systems
  11. Fostering Entrepreneurship and Building Entrepreneurial Self-Efficacy in Primary and Secondary Education
  12. Open Source Software and Virtualization
  13. Transitional leadership in the defence and aerospace industry: a critical analysis for recruiting and developing talent
  14. Understanding the Methods behind Cyber Terrorism
  15. The Future of National and International Security on the Internet
  16. Advances in Technology Project Management:
  17. A Brief Review of New Threats and Countermeasures in Digital Crime and Cyber Terrorism
  18. Mobile Devices:
  19. Legal Issues:
  20. Mobile Devices:
  21. Open Source Software to Enhance the STEM Learning Environment
  22. Open Source Software to Enhance the STEM Learning Environment
  23. Advances in Technology Project Management
  24. Nurturing Social Entrepreneurship and Building Social Entrepreneurial Self-Efficacy:
  25. Islamic Extremists in Africa:
  26. Exploring Secure Computing for the Internet of Things, Internet of Everything, Web of Things, and Hyperconnectivity
  27. Battlefield Cyberspace:
  28. Tails Linux Operating System: