Dr. Steven A. Brown
stevenbrown@drstevenbrown.com
University of the Cumberlands
....Doctoral mentor for emerging technologies, cybersecurity, management and cyberpsychology learners
Courses Taught
Dissertation related classes, such as methodology and design.
Capella University 2004 -2018
....Doctoral mentor for technology and cybersecurity learners
Courses Taught, Ph.D. and Masters
Network Security Advances
Secure system Development and Cryptography
Wireless Security
Computer Forensics and Investigations
Security Management Practices
Enterprise Network Security
Legal areas in Criminal Justice
University 2004 - 2018
Applied Cryptography
Introduction to Information Systems
Digital Forensics
Legal Issues in Information Security
Ethical Hacking
Information Technology Security
Global Investigations
Principles of Information Security
Sullivan University 2013- 2017
Digital Forensics
Electronic Commerce and Internet development
North Central University 2003-2011
....Doctoral mentor for technology and cybersecurity learners
Courses Taught, Ph.D. and Masters
Advanced Computer Security Technology
Cyber Forensics Evidence
Cyberterrorism, Information Warfare
Risk Management
Legal and Ethical Issues in Information Assurance
Homeland Security
PUBLICATIONS
Brown, S. & Winfred Y. (2017). Evolution in Cyber Security Certifications: Adding Theoretical Bodies of Knowledge. Global Conference on Information Technology, Sullivan University, Louisville, KY, USA / GOCICT.2016.12
Winfred Y. Brown, S (2016). Towards Modelling the Impact of Security Policy on Compliance. Journal of Information Technology Research (JITR) 9(2). 1-16
Winfred Y. Brown, S. & Adjei., P.O. (2015). Information Technology Governance Barriers, Drivers, IT/Business Alignment, and Maturity in Ghanaian Universities. International Journal of Information Systems in the Service Sector (IJISSS), 7(4), p66-83
Yaokumah, W & Brown, S. (2015) Empirical Examination of the Relationship Between Strategic Alignment and Information Security Governance Domain Areas Based on Corporate Governance Theories. Journal of Business Systems, Governance and Ethics. 4(1), 1-19
Brown, S. (2010). Computer Security. In L.A. Tomei (Ed.), Lexicon of Online and Distance Education. Lanham, MD, Rowman & Littlefield Education.
Brown, S. (2008). Understanding Computer Security. In L.A. Tomei (Ed.). Encyclopedia of Information Technology Curriculum Integration, Volumes I and II, Idea Group.
Brown, S. (2008) Combating Computer Fraud. In L.A. Tomei (Ed.). Encyclopedia of Information Technology Curriculum Integration, Volumes I and II, Idea Group.
Brown, S. (2008). Investigating Computer Forensics. In L.A. Tomei (Ed.). Encyclopedia of Information Technology Curriculum Integration, Volumes I and II, Idea Group.
Brown, S. (2007). A Theoretical Model to deliver value in electronic commerce. Journal of Information Privacy & Security, 3(1), p3-28
Brown, S. (1997) Web-Based Network Monitoring, A Free Add-On to HP-Openview, Sys-Admin.
CONFERENCES / PRESENTATIONS
Brown, S. (2018). Oscar. U. A Quantitative Study Examining the Level of Educational Factors on Reducing Data Security Breaches. Twenty-second Colloquium for Information Systems Security Education (CISSE) Annual Conference, New Orleans, LA, June 12, 2018
Brown, S. (2017). Building a Talented Cyber Security Ph.D. Workforce from Working Adult Online Learners. National Initiative for CyberSecurity Education (NICE), Nov 7, 2017.
Brown, S. & Winfred Y. (2017). Evolution in Cyber Security Certifications: Theoretical Bodies of Knowledge. Twenty-first Colloquium for Information Systems Security Education (CISSE) Annual Conference, Las Vegas, NV, June 14, 2017
Yaokumah, W., Brown, S., & Amponsah R. (Dec, 2015). Accessibility, Quality and Performance of Government Portals and Ministry Web Sites: A View Using Diagnostic Tools. Global Conference on Information Technology, Sullivan University, Louisville, KY, USA / GOCICT.2015.12
Yaokumah, W. & Brown. S. (2014). An Empirical Study into Information Security Governance Focus Areas and their Effects on Risk Management. Annual Global Conference on Information and Computer Technology. IEEE Conference Publications, p42-49. doi: 10.1109/GOCICT.2014.12
Brown, S., Chow, T, &, McClain, Charles (2011, June 12). Alignment of MSIT Information Assurance and Security Curriculum with CNSS Standards. XV annual National Colloquium for Information Systems Security Education (NCISS). Fairborn, OH.
Brown, S. (2010, July 13). Data Privacy and Security: Where Are Regulations Headed? International Information Systems Security Certification Consortium, Inc., (ISC2) Roundtable.
Brown, S. & Brown, M. (2010). Using learning taxonomies as a model for the creation of a model for Information Assurance Curriculum development from Undergraduate to PhD. XIV annual National Colloquium for Information Systems Security Education (NCISS). Baltimore, MD.
Brown, S. (July, 2009). From Theory to Practice: The Value of an Online Education. iSMG, Information Security Media Group. http://www.govinfosecurity.com/articles.php?art_id=1669
Brown, S. (Aug, 2009). Unique Programs: Information Assurance at Capella University. Podcast iSMG, Information Security Media Group. http://www.bankinfosecurity.com/podcasts.php?podcastID=305
Brown, S. (Presenter) (May 19, 2009). NetSmartz Internet Safety Presentation. Moncure Elementary School, Moncure, N.C.
Brown, S. (Oct, 2008). National Centers of academic excellence in Information Assurance Education (CAE/IAE) – or CAE-Research. National Security Agency (NSA) CAE Principals meeting. Phoenix, AZ.
Brown, S (Oct, 2007). Creation of an NSA Center of Excellence. National Security Agency (NSA) CAE Principals meeting. Albuquerque, NM.
Brown, S (Oct, 2005). Creating Value in Online Collaboration in eCommerce. International Association of Computing Information Systems Proceedings (IACIS), Atlanta.
Brown, S. & Lahoud, H. (Oct, 2005). An Examination of Innovative Lab Technologies. Special Interest Group Information Technology Education (SIGITE) Proceedings. Newark, N.J.
Brown, S. (April, 2005). C&W Security Conference. Writing Internet Security Policy Guidelines. Manchester, UK,
Brown, S. (Oct, 1999). AIIS Security Conference. Can Internet VPNs Deliver Performance and Security and Scale. Boston, MA.
Brown, S. (Jan, 1999). AIIS Security Conference. Authentication and Security in Distributed Systems, Spartanburg, SC.
Brown, S. (1997). The Issues and Evolution of Marketing Information Systems, Global-Sales, C&W corporate meeting, Manchester, UK.
PROFESSIONAL CERTIFICATIONS
Information Systems Security Architecture Professional (ISSAP) 2004
Certified Information Systems Security Professional (CISSP) 2000
Checkpoint Certified Security Engineer, Checkpoint 1999
Checkpoint Certified Security Administrator, Checkpoint 1998
Certified Solaris Administrator, Sun Microsystems 1995
Certified Novell Engineer, Novell 1993
BOOKS / CHAPTERS
Successful Cybersecurity Professionals: How To Change Your Behavior to Protect Your Organization. (2020) Business Expert Press. 9781952538421
Brown, S. & Brown, M. (Eds) (2011). Ethical Issues and Security Monitoring in Global Healthcare: Technological Advancements. IGI global publishing
Brown, S. (2004). The Value Matrix Approach, Cary, N.C. Lulupress,
Brown, S. (1999). Implementing Virtual Private Networks, NY: McGraw-Hill.
Brown, S. & Marcus G. (1999). Check Point Firewall-1, NY: McGraw-Hill
ACADEMIC REVIEWER
Colloquium for Information Systems Security Education (CISSE)
National Initiative for Cybersecurity Education (NICE)
Electronic Commerce Research and Applications
International Journal of Electronic Commerce
International Association for Computing Information Systems
Journal of Information Privacy and Security
Journal of Electronic Commerce Research
MENTORED DISSERTATIONS
2018
Peake C. (2018). Accepting the cloud: A quantitative predictive analysis of cloud trust and acceptance among IT security professionals. Capella University, Not Published Yet
Crunk, J. (2018). Examining tuckman's team theory in non-collocated software development teams utilizing collocated software development methodologies (Order No. 10929105). Available from ProQuest Dissertations & Theses Global. (2091417244).
2017
Mohapatra, S. (2017). Cloud computing relationships between deployments model selection and it security (Order No. 10255126). Available from ProQuest Dissertations & Theses Global. (1876037344).
Apple, B. G. (2017). How the adoption of the big-data paradigm affects the key factors that influence the effectiveness of an information assurance (IA) framework: A multiple-case study (Order No. 10257655). Available from ProQuest Dissertations & Theses Global. (1878937891).
2016
Harper, A. A. (2016). The impact of consumer security awareness on adopting the internet of things: A correlational study (Order No. 10196140). Available from ProQuest Dissertations & Theses Global. (1853097232).
Caldwell, Z. B. (2016). A security measure paradigm for assessing industrial control system cyber security management effectiveness (Order No. 10142167). Available from ProQuest Dissertations & Theses Global. (1823238547).
Koman, V. P. (2016). Age and the acceptance and use of cyber-security: A quantitative survey of U.S. baby boomer mobile-device security practices (Order No. 10075464). Available from ProQuest Dissertations & Theses Global. (1777347121).
Nelson, F. F. (2016). An analysis of information technology factors that influence the lack of adoption of agile scrum methodology: A qualitative study (Order No. 10156661). Available from ProQuest Dissertations & Theses Global. (1839259407).
Francois, M. T. (2016). A quantitative study on the relationship of information security policy awareness, enforcement, and maintenance to information security program effectiveness (Order No. 10252444). Available from ProQuest Dissertations & Theses Global. (1868428830). Retrieved
Buzzell, R. L. (2016). Multiagent system technology: A quantitative stepwise regression study of the influences related to the growth of its use (Order No. 10129948). Available from ProQuest Dissertations & Theses Global. (1815064775).
Morga, J. J. (2016). Mobile commerce adoption in older adults: A quantitative study (Order No. 10127837). Available from ProQuest Dissertations & Theses Global. (1810157732).
2015
Wallace, D. R. (2015). Interpreting the usability of learning management system interface: A case study on older learners' preceptions (Order No. 10132042). Available from ProQuest Dissertations & Theses Global. (1810428475).
Wampach, A. E. (2015). Establishing an information assurance curricula baseline within existing computer science, software engineering, and information technology programs (Order No. 3718665). Available from ProQuest Dissertations & Theses Global. (1712665591).
Amey, L. A. (2015). A quantitative study of dynamic performance contract fulfillment and resistance to enterprise system use (Order No. 3684947). Available from ProQuest Dissertations & Theses Global. (1660978159).
Ehujor, D. M. (2015). Server virtualization: Understanding the security training issues facing American rail transit agencies (Order No. 3682573). Available from ProQuest Dissertations & Theses Global. (1658144030).
Williams, C. D. (2015). The socialization of secure computing practices for home internet users: A quantitative analysis of individual perceptions (Order No. 10002585). Available from ProQuest Dissertations & Theses Global. (1761867482).
Dillon, M. J. (2015). Factors that influence adoption of multi-factored authentication within large organizations (Order No. 3738395). Available from ProQuest Dissertations & Theses Global. (1749006066).
2014
Evans, S. A., Sr. (2014). Resistance to technology, evolving from paper contracting to electronic contracting: A case study of army contracting (Order No. 3670188). Available from ProQuest Dissertations & Theses Global. (1650230292).
2013
Cox, D. S. Z. (2013). Factors influencing the adoption of information technology infrastructure library: Utilizing the technology acceptance model (TAM) (Order No. 3556722). Available from ProQuest Dissertations & Theses Global. (1328395733).
Venkatesh, V. P. (2013). An assessment of security vulnerabilities comprehension of cloud computing environments: A quantitative study using the unified theory of acceptance and use (Order No. 3564324). Available from ProQuest Dissertations & Theses Global. (1412660176).
Yaokumah, W. (2013). Evaluating the effectiveness of information security governance practices in developing nations: A case of Ghana (Order No. 3557634). Available from ProQuest Dissertations & Theses Global. (1346677782).
2012
Naser, R. J. (2012). Electronic health record adoption as a function of success: Implications for meaningful use (Order No. 3505748). Available from ProQuest Dissertations & Theses Global. (1013836717).
Toevs, B. E. (2012). The influence of written information security policy on digital forensic data analysis: A case study of law enforcement and private investigative operations (Order No. 3527704). Available from ProQuest Dissertations & Theses Global. (1095134546).
Tadesse, Y. (2012). An investigation of influencing factors for adopting federated identity authentication in service-oriented architecture (SOA) (Order No. 3498092). Available from ProQuest Dissertations & Theses Global. (926193818).
2011
Donahue, S. E. (2011). Assessing the impact that organizational culture has on enterprise information security incidents (Order No. 3486968). Available from ProQuest Dissertations & Theses Global. (911988729).
McCracken, D. (2011). Factors in the decision of information technology managers to recommend server virtualization (Order No. 3472262). Available from ProQuest Dissertations & Theses Global. (887981559).
2010
Asante, K. K. (2010). Information technology (IT) strategic alignment: A correlational study between the impact of IT governance structures and IT strategic alignment (Order No. 3402048). Available from ProQuest Dissertations & Theses Global. (288328919).
Ryan, D. L. (2010). Towards the development of a model for hardware standards in information technology procurement: Factors for consideration (Order No. 3398341). Available from ProQuest Dissertations & Theses Global. (219919897).
Peterson, K. (2010). Assessing factors affecting implementation of information technology infrastructure library process measurements (Order No. 3421239). Available from ProQuest Dissertations & Theses Global. (750488688).
Lockett, W. (2010). Student perceptions about the effectiveness and quality of online musical instrument instruction (Order No. 3419163). Available from ProQuest Dissertations & Theses Global. (756009697).
Tillman, R. A. (2010). Exploring security certification and accreditation using the agile software development lifecycle process (Order No. 3402069). Available from ProQuest Dissertations & Theses Global. (288329999).
Wiggins, C. (2010). Investigation of ERP teaching and practitioner experiences related to ISO 9000 core standards (Order No. 3396968). Available from ProQuest Dissertations & Theses Global. (305242810).
2009
Smith, R. J. (2009). The influence of written information security policy on forensic data collection: A case study (Order No. 3380473). Available from ProQuest Dissertations & Theses Global. (305161084).
Smith, S. S. (2009). The effect of rank and military occupational speciality on technology acceptance in military information technology managers (Order No. 3379680). Available from ProQuest Dissertations & Theses Global. (305162982).
TRAINING EXPERIENCE:
Developed and taught coursework for distributed financial and Internet security network applications to both technical and non-technical personnel. Coursework developed and addressed to target audience. Lectured to graduate level students on advanced networking concepts, and invited speaker to various conferences on Internet security.
Reuter’s New York 1985 to 1995
Technical trainer and course developer
Financial Distributed Application
PROFESSIONAL EXPERIENCE:
Cable and Wireless / MCI, Raleigh, N.C 1997 to 2003
Senior manager in a staff of highly trained engineers, concentrating on implementing firewalls and virtual private networks (Check Point, Nokia, Sun) in a distributed Provider-1 (4.1 & NG) environment, to organizations, both small and multinationals, commercial and government across the world. Responsibilities included troubleshooting over the carrier’s backbone, e.g., routing, DNS, frame packets, and encryption were just a few of the problems we faced on a daily basis. Advanced designing of customer’s Internet points of presence was also required, such as using multiple firewalls, in conjunction with VPN devices, e.g., Nortel, Cisco routers, WAN connections, using router supplied protocols such as VRRP, HSRP, MLPPP, and BGP. Other responsibilities included intrusion detection alerting and monitoring, vendor interfacing, and communicating with customers on a pre/post sale placement to ensure successful implementation of design
Consultant
Paranet, Raleigh, N.C 1995-1997
Work as a security consultant for security firm Paranet, doing security work and assessments for companies and governments to establish a baseline on their exposure and to work with them to develop a sound security policy, and to make sure adherence to that policy, and updates when necessary.
Financial Institutions
Reuter, New York, N. Y 1985 to 1995
Responsible for design and installation of major well-known financial institutions in NY, such as Merrill Lynch, Solomon Brothers, Bear Stearns, NY Stock Exchange, AMEX, etc., with Reuter's inc. Primarily responsible for installing Triarch, a delivery mechanism for delivering real-time data over corporate LANs and WANs using state of the art equipment in mixed heterogeneous environments for banking and financial institutions. Worked with a multitude of software products, using multi-vendor, multi-protocol suite of tools, applications, real-time systems and leading vendors GUI's and coordinating the integration, testing and final approval, and extensive experience in integrating small to large networks, ranging from hundreds to tens of thousands of sites and nodes. Due to the enormous financial transactions being done in the banking and brokerage industry (usually in the billions) and the importance of governmental security concerns, I assisted in the security designs for these installations, along with disaster-recovery, hot-sites, and considering the security of the LAN/WAN vs. the flexibility for users to conduct business vs. the potential threat of intrusions.
INTERNATIONAL EXPERIENCE
Germany
Consultant, Paranet, Raleigh, N.C 1995-1997
Responsible for setting up a pilot system for Germany's cellular telephone system, Deutsche-Telecom, worked with a team implementing Sun hardware, NT platforms and various other hardware and software platforms. The end goal was to take all of Deutsche-Telecoms legacy systems data and move to an Oracle database with NT accessible GUI's.
England
Reuters, N.Y 1985-1995
Responsible for analyzing a computer-based touch screen system over a Novell network for a major banking system in New York. Aspects such as cabling, electrical, functional and telephony requirements had to be examined because of the different standards between the two countries.
PROFESSIONAL CERTIFICATIONS:
Information Systems Security Architecture Professional (ISSAP) 2004
Certified Information Systems Security Professional (CISSP) 2000
Checkpoint Certified Security Engineer, Checkpoint 1999
Checkpoint Certified Security Administrator, Checkpoint 1998
Certified Solaris Administrator, Sun Microsystems 1995
Certified Novell Engineer, Novell 1993
RESEARCH SKILLS
Information System Concentration
Information Assurance Curriculum Development
Online development of a web-based survey
Questionnaire design
Means-end chain and laddering methodologies
Interviewing skills
Statistics (SPSS on UNIX), ANOVA, Tukey, Paired-T Tests
ONLINE TEACHING PLATFORM EXPERIENCE
Breeze
WebCT
Common Ground
Blackboard
Vista
eCollege
Horizon Live
Web Tyco
AWARDS and HONORS:
Sigma Beta Delta, Nova, 2004
Faculty Service Award, 2003
Who’s Who in Information Technology, 2000
Academic Excellence Award, Queensboro University, 1983
Academic Activities/Memberships
ACM, Association of Computing Machinery
SIGITE Curriculum Committee Information Assurance and Security Working Group
International Information Systems Security Certification Consortium, ISC2
Information Systems Security Association (ISSA)
National Security Agency Centers for Academic Excellence, CNSS mapping and application for the center of excellence in IA research
International Association for Computer Information Systems
Academic Journal Reviewer
Colloquium for Information Systems Security Education (CISSE)
National Initiative for Cybersecurity Education (NICE)
Electronic Commerce Research and Applications
International Journal of Electronic Commerce
International Association for Computing Information Systems
Journal of Information Privacy and Security
Journal of Electronic Commerce Research
Subject Matter Expert for Graduate course development, various publishers
Computer Forensics and Investigations
Wireless Security
Role Based Authentication
Networking Protocols
Computer Networks
Book reviewer for various book publishers, Thompson,
Pearson, McGraw-Hill