
My path to academia was circuitous about best. I graduated from West Point in the early eighties. For the next three decades, I focused on understanding and operationalizing military and government information networks to move secure voice and data to the decision-maker in the correct format at the right time. Conceptually, cybersecurity existed long before science fiction writer Bill Gibson (1984) coined the term. My focus has always been to provide that kind of security with information. Even after retiring from service, I focused on secure information technology solutions, spending the next decade in companies like Cisco, Hewlett Packard Enterprise, and others. Realizing that my eligibility for the post-911 GI Bill was about to end, I pivoted to academia by getting a doctorate and joining the University of Southern Maine (USM).My current role allows me to use my expansive background to focus on human-centered cybersecurity research. This desire to learn state-of-the-art practices led me to apply for the Trusted Cyberinfrastructure (CI) Fellowship. The curriculum opened my eyes to the challenges of research cybersecurity. The program of study gave me a more expansive view of researchers' cyber hygiene challenges. This new perspective allows me to take what I have learned and fold in best practices for cyber hygiene into my everyday work and research community.
| citations This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | 0 | |
| popularity This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network. | Average | |
| influence This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | Average | |
| impulse This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network. | Average |
