|Present||Faculty Member, University of Detroit Mercy|
Software Assurance, Supply Chain Security, and Software Engineering
No Subject Area (10)
Managing Government Regulatory Requirements for Security and Privacy Using Existing ...
Transactions of the International Conference on Health Information Technology Advancement (2013)
This paper posits the use of a well-established standard approach to Federal compliance, which can be easily adapted to satisfy ...
Threat Modeling the Cloud Computing, Mobile Device Toting, Consumerized Enterprise ...
AMCIS 2011 Proceedings - All Submissions (2011)
A megatrend triad comprised of cloud computing, converged mobile devices, and consumerization presents complexchallenges to organizations trying to identify, assess, ...