Higher Learning Commission Standards
Middle States Standards
Southern Association Standards
SECTION 1: The Principle of Integrity
SECTION 2: Mission
SECTION 3: Basic Edibility Standard
SECTION 4: Governing Board
SECTION 5: Administration and Organization
SECTION 6: Faculty
SECTION 7: Institutional Planning and Effectiveness
SECTION 8: Student Achievement
SECTION 9: Educational Program Structure and Content
SECTION 10: Educational Policies, Procedures, and Practices
SECTION 11: Library and Learning/Information Resources
SECTION 12: Academic and Student Support Services
SECTION 13: Financial and Physical Resources
SECTION 14: Transparency and Institutional Representation
Master’s Subject Areas Taught
Graduate (CTU; Online)
1. Fundamentals of Cybersecurity Management
2. Computer Systems Security Foundations
3. Information Technology Governance and Risk Management
4. Applied Cybersecurity Management
Graduate (UMGC; Blended/Hybrid)
1. Advanced Cyber Exploration and Mitigation Methodologies
2. Prevention of Cyber Attack Methodologies
3. Information Systems Infrastructure
4. Communicating, Problem Solving, and Leading in Cybersecurity
5. Cyberspace and Cybersecurity Foundations
6. Intrusion Detection and Intrusion Prevention
7. Information Assurance Capstone
8. Capstone in Cybersecurity
a. Includes Cyberattack Software Simulation
9. Information Systems Analysis, Modeling, and Design
Graduate (University of Bridgeport; Online)
1. Foundations in Business Analytics
2. Enterprise Intelligence and Decision Support Systems
3. Introduction to Information Systems and Technology
4. Information Systems and Knowledge Management
Graduate (Nova Southeastern University; Team Taught/Blended)
1. Information Security Management
Graduate (South University; Blended)
1. Senior Capstone Project
2. Internet Security Algorithms
3. Corporate Information Systems
4. Fundamentals of Information Systems
5. Fundamentals of Information Technology Infrastructure
Graduate (Technical University of Kaiserslautern, Germany; On-Round)
1. Foundations of Information/Computer Security
2. Information/Computer Security (A Case Study Approach)
Bachelor’s/Associate’s Subject Areas Taught
Undergraduate (CTU; Online)
1. Introduction to Computer Security
2. Security Risk Management
Undergraduate (South University; Onground)
1. Computer and Internet Literacy
2. Information Technology Fundamentals
3. Ethics in IT
4. Theory of Computation
5. Network Fundamentals
6. Programming Logic
7. Human Computer Interface
8. Database Design and Development
9. Multimedia Web Development
10. Advanced Networking
11. Security: Access and Protection
12. Applied Systems Analysis I
13. Applied Systems Analysis II
14. IT Research
15. IT Capstone
16. IT Capstone II
17. IT Specialization Capstone
18. Internship
19. Case Studies in Computer Security
20. Cybercrime
21. Management Information Systems
Undergraduate (South University; Blended)
1. Database Design and Development
2. IT Research
3. IT Capstone
4. IT Capstone II
5. Internship
6. Case Studies in Computer SecurityUndergraduate (Gulf Coast University; Online)
1. Software Security
REFEREED CONFERENCE PUBLICATIONS
SYMPOSIUMS
BOOK CHAPTERS
BOOK REVIEWER
BOOK MATERIALS
PRESENTATIONS
29. Sedlack, D. (2022), “Using Instant Messaging (IM) to Enhance your Classroom”. Aug 5, COLLT Education Conference, Colorado Springs, Colorado.
28. Sedlack, D. & Ssekibaamu, J. (2022). “CTU CSET Presentation of IT204 Strategies for Success Seminar with Dr. John Ssekibaamu”. Zoom Presentation. July 30, 2022.
27. Sedlack, D. & Wilson, Brent. (2021). “Understanding the purpose of realistic classroom feedback”, Aug 5, COLLT Education Conference, Colorado Springs, Colorado.
26. Sedlack, D. (2021). “The Realm of Cybersecurity”, June 28, Online Synchronous Video, https://careered.libguides.com/ctu/career/
25. Sedlack, D. & Abbas, N. (2021). “Population and Participants in Scientific Research”, Doctoral Symposium for continuing students, Feb 4, Online Synchronous Video.
24. Sedlack, D., Abbas, N., and Qu, Y. (2021). “Understanding aspects of Computer Science Research”, Doctoral Symposium for entry and continuing students, Feb 5, Online Synchronous Video.
23. Sedlack, D., Tejay, G. (2020). “AI Powered Privacy Compliance Tool”, UC Berkeley Project Symposium on Data Science and Artificial Intelligence, Sept 8, virtual conference.
22. Sedlack, D., Tejay, G. (2020). “AI Powered Threat Analysis System”, UC Berkeley Project Symposium on Data Science and Artificial Intelligence, Sept 8, virtual conference.
21. Sedlack, D., Abbas, N., and Qu, Y. (2020). “Understanding aspects of Computer Science Research”, Doctoral Symposium for entry and continuing students, Jun 4-5, Online Synchronous Video.
20. Sedlack, D. (2020). “Avoiding the traps and pitfalls of Cybersecurity research”. Doctoral Symposium for entry and continuing students, Jun 4-5, Online Synchronous Video.
19. Sedlack, D., Abbas, N., and Qu, Y. (2020). “Understanding aspects of Computer Science Research”, Doctoral Symposium for entry and continuing students, Jan 13-16, Colorado Springs, Colorado.
18. Sedlack, D. (2020). “Avoiding the traps and pitfalls of Cybersecurity research”. Doctoral Symposium for entry and continuing students, Jan 13-16, Colorado Springs, Colorado.
17. Sedlack, D. (2019). 6th Annual World Congress of InfoTech-2019. Invited speaker. May 10-12, Nanjing, China.
16. Sedlack, D. (2018). “The Risks of Cyberwarfare and Risk Positions of the Military.” Distinguished Presenter for The Armed Forces Communications and Electronics Association at the Officer’s Club, Ramstein Airforce Base.
15. Sedlack, D. (2018). “Understanding the roles of gender in Cybersecurity.” Invited Presenter for St. Franziskus Gymnasium by TU Kaiserslautern, Fachbereich Informatik Studienmanager.
14. Sedlack, D. (2017). “Understanding Risks Associated with Technology.” Presented for the General Staff upon request from Gen. Tod D. Wolters is Commander, U.S. Air Forces in Europe; Commander, U.S. Air Forces Africa; Commander, Allied Air Command, headquartered at Ramstein Air Base, Germany; and Director, Joint Air Power Competence Centre, Kalkar, Germany. He is responsible for the air and missile defense of 29 NATO Alliance member nations while commanding U.S. airpower across more than 19 million square miles. This area includes 104 countries in Europe, Africa, Asia and the Middle East, the Arctic, Atlantic and Indian Oceans, possesses more than a quarter of the world’s population, and generates more than a quarter of the world’s gross domestic product.
13. Sedlack, D. (2013). “Integrating Infrared Motion Detection into Business Activities.” Presented at South University, 5 Sept, Royal Palm Beach, Florida, USA.
12. Sedlack, D. (2012). “Reducing Incongruity of Perceptions Related to Information Risk: Dialogical Action Research in Organizations.” Presented at Nova Southeastern University, 8 Aug, Davie, Florida, USA.
11. Sedlack, D. (2012). “Technology in the Classroom.” Presented at the 43rd Proceedings of Decision Sciences Institute, 19-22 Nov, San Francisco, California, USA.
10. Sedlack, D. (2012, June 6). Should Employers Ask for Your Facebook Password? Serving Moderator, 6 June, South University, Royal Palm Beach, Florida, USA.
9. South University, (2012, March 8). Are Social Networking Sites Doing Us Any Good or Are They Just a Sophisticated Way of Stalking People? Serving Moderator, 8 March, South University, Royal Palm Beach, Florida, USA.
8. Sedlack, D. (2012). “Reducing Incongruity of Perceptions Related to Information Risk: Dialogical Action Research in Organizations.” Presented at the Winter Post Session, 14 Jan, Davie, Florida, USA.
7. Sedlack, D. and Tejay, G.P.S. (2011). “Analyzing Information Security Failure in a Healthcare Organization: A Case Study.” Presented at the 42nd Proceedings of Decision Sciences International, 19-22 Nov, Boston, Massachusetts, USA.
6. Sedlack, D. and Tejay, G.P.S. (2011). “Improving Information Security Through Technological Frames of Reference.” Presented at the 13th Annual Conference of the Southern Association for Information Systems, 25-26 Aug, Atlanta, Georgia, USA.
5. Sedlack, D. (2010). “Reducing Incongruent Perceptions of Information Risk Through Action Research.” Presented at the Information Security Workshop. Graduate School of Computer and Information Sciences, 15 Oct, Nova Southeastern University, Davie, Florida, USA.
4. Sedlack, D. (2009). “Perceptions of Information Risk.” Presented at the Information Security Workshop. Graduate School of Computer and Information Sciences, 16 Oct, Nova Southeastern University, Davie, Florida, USA.
3. Sedlack, D. (2005). “Military Applications of an Integrated Presentation Server.” Presented for the U.S. Army at Citrix Systems, 24 Oct, Fort Lauderdale, Florida, USA.
2. Sedlack, D. (2000). “Dynamic Data Transfer Through Military Information Systems.” Presented for the U.S. Air Force, 14 Dec, Wiesbaden, Germany.
1. Sedlack, D. (1999). “Improved Ordering Efficiency Through Collaborative Design.” Presented at the Microsoft Windows 2000 Release Launch, 16 Sept, Austin, Texas, USA.
IRB REVIEWED PROPOSALS / COMPLETED PROJECTS (113 total):
Doctor of Computer Science (72)
CTU, DCS, 02/22/2023, A Phenomenological Study of U.S. Army Special Forces Leadership Strategies during the Global War on Terror.
CTU, DCS, 02/22/2023, Laser Weaponization Technologies of Space Systems in Outer Space Warfare: A Qualitative Study.
CTU, DCS, 01/23/2023, Quantitatively Validating the Design of an Effective Tool to Support the Cybersecurity Risk Management Process in Maritime Transportation Ecosystem
CTU, DCS, 01/18/2023, Cybersecurity Risk Assessment for Consumer Goods Manufacturers via Design Science Research.
CTU, DCS, 11/28/2022, A Qualitative Inquiry into the Security Concerns Affecting Cloud Adoption Rates of Healthcare Organizations.
CTU, DCS, 10/04/2022, Exploring the Perceptions of Countering Insider Threats with Artificial Intelligence and Machine Learning Algorithms.
CTU, DCS, 08/23/2022, The purpose of the quantitative design science study is to provide a set of procedures that an IT organization can use to improve fault tolerance in a hybrid cloud.
CTU, DCS, 08/11/2022, Identity Theft Prediction Model using Historical Data and Supervised Machine Learning: Design Science Research Study.
CTU, DCS, 07/29/2022, A Qualitative Study on Governance Improvements Needed for the Implementation of Internet of Things in Small and Medium Sized Cities.
CTU, DCS, 07/12/2022, Mandatory Gamified Security Awareness Training Impacts on Texas Public Middle School Students: A Qualitative Study.
CTU, DCS, 06/13/2022, A Qualitative Study of a Four-Phase Process for Managing Solution of the United States’ Biometric Identity Repository.
CTU, DCS, 06/02/2022, Applying Advanced Deep Learning Technique to Accurately Forecast the Energy Cost in Home-Based Small Business.
CTU, DCS, 04/06/2022, How Hackers and Malicious Actors and Using Artificial Intelligence to Commit Cyber-Crimes in the Banking Industry.
CTU, DCS, 03/24/2022, DataOps: Applying DevOps Continuous Improvement Model to Data Science.
CTU, DCS, 03/11/2022, Exploring Vehicle Security Improvements Framework in the Safety Messaging System to Protect Against Hackers.
CTU, DCS, 18/01/2022, Understanding the Sociotechnical Phenomena Associated with Homeless Individual's Interaction with Autonomous Mobile Robots: An Exploratory Study.
CTU, DCS, 12/15/2021, Exploring the Machine Learning and Artificial Intelligence Algorithms Needed to Detect Healthcare Financial Statement Anomalies.
CTU, DCS, 12/06/2021, Exploring Education as the Most Effective Strategy for Household Cybersecurity Using the Protection Motivation Theory.
CTU, DCS, 12/06/2021, Action Research Study on Soldier Led Software Development to Reduce Security Vulnerabilities.
CTU, DCS, 10/16/2021, A Comprehensive Threat and Risk Quantitative Design Model Measuring Return on Investment of Security Risk Management Programs.
CTU, DCS, 10/13/2021, Validating Functional Requirements of the Spine Implant Closed Loop Inventory Control System through Quantitatively Analyzing Use Cases.
CTU, DCS, 10/7/2021, Improving the Accuracy of Open-Set Classification in Human Activity Recognition by Applying a Residual Neural Network.
CTU, DCS, 9/28/2021, Exploring strategies DoD cybersecurity professionals need to use that involve big data analytics methods to detect insider threats.
CTU, DCS, 9/13/2021, The Effect of Pre- and Post-Marketing Safety Data on COVID-19 Vaccine Hesitancy Among American Adults.
CTU, DCS, 7/15/2021, An Exploratory Study on Education as the Most Effective Strategy for Household Cybersecurity Using the Protection Motivation Theory.
CTU, DCS, 6/21/2021, Metadata Analysis for Geospatial Criminal Justice.
CTU, DCS, 6/10/2021, Exploring the conditions required for big data analysts to manufacture the occurrence of Parrondo’s Paradox, within the sample space defined by Kelly’s Criterion.
CTU, DCS, 6/08/2021, Grid Template Pattern Detection Improves The Trend Prediction Of Stock Price Through Genetic Algorithm And Support And Resistance Values.
CTU, DCS, 6/03/2021, A Tool to Map Relational Database Table Keys Using Query Predicates.
CTU, DCS, 5/17/2021, Exploring the Technology Acceptance of the Oliver Einstein Engine in a SUNY Comprehensive Business School – a Design Science Approach.
CTU, DCS, 5/10/2021, An Exploratory Study on the Reluctance of US Companies to Implement more Proactive Responses and Actions to Associated Ransom Cyber-attacks and the Resulting Proliferation of Crypto-Malware.
CTU, DCS, 4/22/2021, The purpose of the proposed exploratory qualitative study is to explore collegiate cybersecurity instructors' qualities needed to maximize the engagement of Generation Z cybersecurity learners to successfully become cybersecurity specialists.
CTU, DCS, 4/20/2021, Exploring the Changes Needed Within the Data Lake Repository to Improve The Data Scientist Exploration.
CTU, DCS, 4/19/2021, Exploring the Strategies Collegiate Cybersecurity Instructors Need to Maximize Engagement of Generation Z Cybersecurity Learners.
CTU, DCS, 3/22/2021, Implementing Blockchain Technology to Develop a National Electronic Data Exchange System for Medical Record.
CTU, DCS, 3/19/2021, Engagement and Commitment Components Needed to Motivate Catholic Members to Volunteer in Their Churches and Communities.
CTU, DCS, 3/18/2021, Exploring the Security Constructs Cyber Security Professionals Need to Improve Blockchain Adoption in the Enterprise.
CTU, DCS, 3/08/2021, Examining the Relationship between Converged-Network Architecture and Remote Grassfire Alert Transmission Delay in Southeast Colorado.
CTU, DCS, 2/19/2021, Examining the Strategies Cybersecurity Specialists Need to Implement to Mitigate Vulnerabilities in Cloud Data Usage.
CTU, DCS, 2/12/2021, An Analysis of Common Security Risk Signals in Reducing the Recurrence of Security Breaches Suffered by Small Businesses.
CTU, DCS, 1/27/2021, Using Automated Feature Engineering to Improve the Predictive Performance of Random Forest Models For Type 2 Diabetes Prediction.
CTU, DCS, 1/25/2021, Exploring the Differences of Risk Management in Traditional and Agile Development A Qualitative Case Study.
CTU, DCS, 1/21/2021, Artificial Intelligence Considerations IT Specialists Need to Automate Small Business Analysis of Prospective Helium-Natural Gas Wells.
CTU, DCS, 1/20/2021, Understanding U.S. Employees’ Personality Traits for Phishing Emails Prevention: A Quantitative Study.
CTU, DCS, 1/15/2021, Exploring the Factors Limiting Organizations from Implementing a Defensive Strategy with Cyber Threat Intelligence.
CTU, DCS, 12/22/2020, Identifying Machine Learning Specific Security Controls – A Qualitative Phenomenological Study.
CTU, DCS, 12/21/2020, Machine Learning Model Time Series Clustering for Energy Optimized Virtual Machine Placement using Time Series Performance Data.
CTU, DCS, 12/10/2020, A Quantitative ANOVA Study: Digital Forensics Training Delivery Methods’ Impacting Capable Guardianship.
CTU, DCS, 12/9/2020, A Phenomenological Study of Security Policies in Higher Education Institutions.
CTU, DCS, 11/9/2020, Ethical Organizational Global Leaders Need to Mitigate Dark Leadership Attributes: A Qualitative Study.
CTU, DCS, 10/26/2020, Qualitative Case Study: Implementing Enterprise Resource Planning Financial Management Modules in the U.S. Military.
CTU, DCS, 10/20/2020, Examining the Relationship Between Query Performances when using Different Data Models within Relational Database.
CTU, DCS, 9/22/2020, Blockchain Technology Protocols Cybersecurity Analysts Must Use to Protect Transaction Records in the Food Supply Chain Industry.
CTU, DCS, 9/16/2020, Exploring the Anti-Hacking Protocols Cybersecurity Specialists Need to Protect Small Medical Businesses.
CTU, DCS, 9/1/2020, Countering Persistent Artificial Intelligence Attacks a Qualitative Study.
CTU, DCS, 8/30/2020, An Assessment of the Communication Component Technology Managers Need to Adopt to Improve Inter-Generational Social Media Technology Communication.
CTU, DCS, 8/30/2020, The Quantitative Design Science of Security Access Levels for Cloud Hosted Content Management System.
CTU, DCS, 8/18/2020, Optimizing the Design of a Cloud-based Telehealth Service Cost Effective Solution Management System through a Quantitative Study.
CTU, DCS, 8/11/2020, Exploring a Cost-Benefit Cloud-Based On-Demand Cybersecurity Service Solution for Small Businesses: A Quantitative Examination.
CTU, DCS, 8/11/2020, A Quantitative Research to Discover the Most Effective Machine Learning Algorithm for Predicting Breast Cancer.
CTU, DCS, 8/11/2020, Best Practices to Address Readiness Challenges Triggered by the Implementation of Business Intelligence Solutions in the Banking Industry.
CTU, DCS, 8/04/2020, Exploring the Data Quality Challenges of Big Data Analytics Solution Implementations for Clinical Data.
CTU, DCS, 8/04/2020, A Comparative Analysis of the Impact of Changes to the Security Posture of Software Systems.
CTU, DCS, 7/28/2020, A Data-Driven Optimization of Instruction Content and Delivery in Intelligent Tutoring System for advancing STEM Education.
CTU, DCS, 7/28/2020, A Composite Vulnerability Extension Tool for Multi-factor Authentication Technologies.
CTU, DCS, 7/27/2020, Side Channel Attacks and Mitigations: An Experimental Design Study of the Vulnerability of Side Channel Attack Countermeasures to Electromagnetic Analysis.
CTU, DCS, 6/29/2020, Identification of Manual Cybersecurity Tasks for Artificial Intelligence Automation Conversion: A Qualitative Study.
CTU, DCS, 6/25/2020, Prediction Model to detect influenza outbreak using social media and official CDC data.
CTU, DCS, 6/24/2020, The Strategies IT Professionals Need to Improve Employee Security Behavior Affecting the Organization’s Security Risks.
CTU, DCS, 6/14/2020, Relationship between Governance of Big Data, CTO Leadership Styles, and Information Security Risk Management Effectiveness.
CTU, DCS, 5/15/2020, Exploratory Study of Requirements of Cybersecurity Specialists to Implement Security in Hybrid Cloud Infrastructures.
CTU, DCS, 5/12/2020, Exploratory Study of Requirements of Cybersecurity Specialists to Implement Next Generation Security Information and Event Management Tools in Hybrid Cloud Infrastructures.
CTU, DCS, 5/08/2020, Examining the Relationship between Cybersecurity-Employee Vulnerabilities and Reduction of Security Breaches in Information Technology Organizations.
CTU, DCS, 4/26/2020, The High Dimensional Data Components Needed by Big Data Specialists for Improving Decision Making in International Development and Humanitarian Organizations.
CTU, DCS, 4/22/2020, Role of Anonymous Content Type in Cyberbullying Rate.
CTU, DCS, 3/24/2020, Security Improvements for Implementing the Internet of Things into Medium and Large-Sized Businesses.
CTU, DCS, 3/20/2020, Exploring Data Protection Decision-Making Strategies Implemented within Manhattan Law Firms.
CTU, DCS, 3/19/2020, Big Data in Financial Institutions: How Text Analytics Can Help in Mitigating Banks’ Business Risk.
Doctor of Information Assurance (3)
CTU, DCSIA, 7/27/2021, Exploring Cybersecurity Specialist Perceptions of Internet of Things (IoT) Toward the Use of IoT When Presented with Privacy and Security Issues.
CTU, DCSIA, 3/15/2021, Implementing Blockchain Technology to Develop a National Electronic Data Exchange System for Medical Record.
CTU, DCSIA, 2/02/2021, Factors Influencing Domestic Airline Traveler’s Acceptance of Biometric Boarding Systems: A Quantitative Study.
Doctor of Management (39)
CTU, DM, 01/16/2023, A Phenomenological Study of U.S. Army Special Forces Leadership Strategies during the Global War on Terror.
CTU, DM, 01/16/2023, Situational leadership: U.S. executive luxury leaders’ practice perspective commonalities – A qualitative exploratory study.
CTU, DM, 04/20/2022, Qualitative Interpretive Phenomenology Study of Marginalized Group Access to Start up Capital for Entrepreneurial Ventures.
CTU, DM, 02/08/2022, An Exploratory Study of Large-Scale Unplanned Change to Remote Work on Contractors Supporting the Department of Defense.
CTU, DM, 01/24/2022, Examining Strategies That Healthcare Leaders Should Adopt to Reduce Staff Turnover in Healthcare Facilities in Aurora, Colorado.
CTU, DM/HML, 12/21/2021, The Challenges and Strategies of Virtual Management on Teams and Productivity.
CTU, DM/HS, 7/08/2021, Evolving America’s Workforce: A Quantitative Study on Job Satisfaction in Millennial and Gen Z Federal Employees.
CTU, DM/HL, 2/05/2021, A Qualitative Study of How Healthcare Managers Cope with Resistance to Change in a Nursing Home Setting.
CTU, DM/IT, 2/04/2021, Implementation and Management of Cloud Technology.
CTU, DM, 7/27/2021, Phenomenological Study of How Mentoring Resources are Utilized by Women-Owned Small Businesses in Dallas/Fort Worth.
CTU, DM, 7/09/2021, Strategies Business Managers Need to Improve Employee Ethical Behavior Second Home Adult Daycare: A Case Study.
CTU, DM, 6/21/2021, Exploring Strategies Middle Managers Need to Improve Employee Engagement.
CTU, DM, 5/07/2021, Organizational Management in Healthcare as a Determinant for Promoting Evidence-Based Practice Integration.
CTU, DM, 5/05/2021, Slow Fashion vs. Fast Fashion: Slow Fashion Advocates Perceptions on Consumer Behavior in Puerto Rico.
CTU, DM, 5/04/2021, The Processes HVAC Owner-Operators Need to Prepare Their Organizations for AR, VR, and IoT Technology.
CTU, DM, 4/28/2021, An Ethnographic Study on Reducing Resistance to Change by Using Microlearning.
CTU, DM, 4/26/2021, Exploring the factors healthcare insurance leaders need to implement in a net promoter score system to improve customer loyalty.
CTU, DM, 4/20/2021, A Phenomenological Study on the Perceptions of College Students’ Sense of Belonging and the Impact of COVID-19 on their Academic Outcome.
CTU, DM, 3/29/2021, Servant Leadership Skills Social Worker Managers Need to Lead Their Staff in A Foster-Care System.
CTU, DM, 2/16/2021, Exploring Policy and Procedure Improvements Criminal Justice Managers Need to Remove Cultural Bias in a State Correctional System.
CTU, DM, 2/10/2021, Exploring the Contribution Strategy Improvements Nonprofit Leaders Need to Sustain the Organization’s Mission.
CTU, DM, 2/10/2021, Exploring Assessment Improvements Higher Education Leaders Need for Sustainment of a General Education Program.
CTU, DM, 2/02/2021, Cultural Changes Healthcare Managers Need to Improve Team Engagement During High-Stress Situations in Long-Term Care Facilities.
CTU, DM, 2/02/2021, Strategies Project Managers Need to Facilitate Rational Decision-Making in the Front-End Phase of Emergent Projects.
CTU, DM, 1/29/2021, Ethics and End-of-Life Care for Alzheimer’s Disease Patients: A Phenomenological Study of Clinical Healthcare Managers’ Viewpoints.
CTU, DM, 1/29/2021, Exploring U.S. Re-Entry Checks Homeland Security Managers Need to Reduce Lone-Wolf Threats.
CTU, DM, 1/27/2021, Strategies Army Veteran Global Leaders use to make Ethical decisions.
CTU, DM, 1/7/2021, Evaluating Incident Command System Utilization by Law Enforcement First Responders: A Qualitative Phenomenological Study.
CTU, DM, 12/09/2020, Exploring the Strategies Nonprofit Social Entrepreneurs need to Expand a Social Enterprise.
CTU, DM, 12/03/2020, Evaluating Incident Command System Utilization by Law Enforcement First Responders: A Qualitative Phenomenological Study.
CTU, DM, 11/18/2020, Identifying the Challenges Rural School Officials Face While Providing Safety: A Qualitative Phenomenological Study.
CTU, DM, 9/30/2020, Exploring the CPI Methods Federal Government Managers Need to Implement to Maintain Employee Satisfaction.
CTU, DM, 9/24/2020, LED by example: Sustainable Management of Light-Emitting Diodes (LEDs)
CTU, DM, 9/22/2020, The Unintended Consequences of Government Intervention Displayed Through Data Visualization.
CTU, DM, 6/16/2020, Exploring the Active Shooter Training Improvements First Responders Need to Enhance Civilian Preparations for Active Shooter Incidents.
CTU, DM, 5/8/2020, A Phenomenological Study on Strategies Millennials Use to Be Promoted to Top Executive Leadership Positions.
CTU, DM/ESS, 2,25,2022, Examining the Difference Between COVID-19 and Food Waste in Colorado Public School Districts.
CTU, DM/IT, 5/06/2020, A Qualitative Study: The Strategies Technology Managers Need to Retain Technology Employees During a Layoff.
CTU, DM/IT, 5/02/2020, An Exploratory Study Regarding Information Technology Solutions to Administration Processes at an Information Technology Firm.
CTU, DBA, 12/22/2020, Exploring the Meanings Behind the Quality Assurance Requirements for Higher Education Industry Regional Accreditation.
CTU, DBA, 4/27/2020, Developing Strategies Needed To Influence Consumer Preference for Smartphone.
PROFESSIONAL ACTIVITIES
2022 Invited Presenter, CTU EAC Presentation on Information Security, Online, Oct 20, 2022.
2022 Lead Presenter at COLLT, Denver, Co. Aug 3-4, 2022.
2021 Lead Presenter at COLLT, Online, Aug 3-4, 2021.
2020 Attendee 2020 Assessment Institute hosted by IUPUI
2020 CAE Tech Talk/Forum Working Group Discussion
2013 Co-chair (profitable), Technology Sandbox: Hands-on Mini-conference. Decision Sciences Institute, 16-19 Nov, Baltimore, Maryland, USA.
2012 Coordinator, Technology in the Classroom. Decision Sciences Institute, 19-22 Nov, San Francisco, California, USA.
2009 Select Member, Arthur I. Meyer Academy Technology Committee, Palm Beach, Florida.
2008 Select Member, Experience.com Alumni Board of Directors
2005 Member, Cyber Security Industry Alliance Spyware Committee
2005 Member, Cyber Security Industry Alliance Education Committee
2005 Co-Chair, Greater Fort Lauderdale Chamber of Commerce Outreach Education, Chair of Web Redesign Committee)
2004 Chair, Junior Achievement of South Florida Technology Committee Resulting in the Huizenga World at Broward College
1999 Select Member, Dell Customer Satisfaction Committee
Lorem ipsum dolor sit amet, consectetur adipisicing elit. Maiores ipsum repellat minus nihil. Labore, delectus, nam dignissimos ea repudiandae minima voluptatum magni pariatur possimus quia accusamus harum facilis corporis animi nisi. Enim, pariatur, impedit quia repellat harum ipsam laboriosam voluptas dicta illum nisi obcaecati reprehenderit quis placeat recusandae tenetur aperiam.
Lorem ipsum dolor sit amet, consectetur adipisicing elit. Maiores ipsum repellat minus nihil. Labore, delectus, nam dignissimos ea repudiandae minima voluptatum magni pariatur possimus quia accusamus harum facilis corporis animi nisi. Enim, pariatur, impedit quia repellat harum ipsam laboriosam voluptas dicta illum nisi obcaecati reprehenderit quis placeat recusandae tenetur aperiam.
Lorem ipsum dolor sit amet, consectetur adipisicing elit. Maiores ipsum repellat minus nihil. Labore, delectus, nam dignissimos ea repudiandae minima voluptatum magni pariatur possimus quia accusamus harum facilis corporis animi nisi. Enim, pariatur, impedit quia repellat harum ipsam laboriosam voluptas dicta illum nisi obcaecati reprehenderit quis placeat recusandae tenetur aperiam.