About
22
Publications
1,027
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
42
Citations
Introduction
I prefer research that contributes to the sustainability, resilience, and advancement of human society. My research interests include cybersecurity, education, society, 3D builds for cyber security, and behavioral sciences. I'm working on projects to increase capacity and resilience in cyber defense.
Scopus: 55426010100
Orcid: 0000-0003-1566-526X
Web of Science: AAB-8376-2020
Semantic Scholar: 143675493
https://dblp.org/pid/82/1383.html
https://openreview.net/profile?id=~Erik_Lowell_Moore1
Current institution
Additional affiliations
September 2004 - March 2021
Center for a Reasoning Society
Position
- CEO
Description
- Leading a 501(c)3 non-profit charitable organization to promote better personal and societal thinking through school science and critical thinking programs, library programs, presentations, and a global relief fund. https://www.centerforareasoningsociety.org/
May 2010 - September 2012
Position
- Head of Faculty
Description
- Supervise faculty the colleges of Engineering and Computer Science, and Media Arts including programs like Electronics Engineering , Computer & Information Technology, and Media Design. Initiated the DR DeVry program for hands on undergraduate research and design projects. Contributed to DeVry International strategy, traveling to DeVry sites all over the western hemisphere.
Education
May 2019 - October 2020
January 1996 - June 1997
University of Denver
Field of study
- Telecommunications
September 1986 - August 1988
Publications
Publications (22)
The SolarWinds attack of 2020 was one of the most impactful cyber-
attacks on the US. Our interdisciplinary research team had the opportunity to
observe and analyze the human aspects of the corresponding incident response
as it unfolded. Four main themes were identified through a series of interviews
and incident observations. This led to an unders...
Multi-Shield Cybersecurity Visualization (MSCV) is a method designed to increase attention on and understanding of critical relationships when designing and analyzing cybersecurity infrastructure. It can be used in conjunction with the Zero Trust Reference Architecture (ZTRA) or any other security reference architectures. It provides a way of visua...
As technology proliferates and becomes indispensable to all functions of society, so does the need to ensure its security and resilience through cyber defense training, education, and professional development. This paper presents a layered model that supports cyber defense training progressively through the development of technology services, digit...
To enhance the capabilities of a cyber defense collaborative, a psychometric analysis team was embedded in a collaborative incident response team. Collaborative incident response community members included the State of Colorado, the Colorado National Guard, Regis University, private companies, and others. The collaborative training developed when N...
(full text avaiable at https://pearl.plymouth.ac.uk/handle/10026.1/16608 cc: Attribution-NonCommercial-NoDerivs 3.0) As society advances in terms of information technology, the dependency on cyber secure systems increases. Likewise, the need to enhance both the quality and relevance of education, training, and professional development for cybersecu...
This work presents a model for reviewing the risks of institutions
teaching cybersecurity. The work is based on efforts in this direction at Regis
University and Adams 12 Five Star Schools in Colorado. These two institutions
are described in a comparative case study reviewing the following four aspects
of addressing risk: policy, adjudication, infr...
Following earlier research in demonstrating the significance of behavioral analysis in cyber defense, the authors developed a framework to incorporating multi-disciplinary datasets along a common timeline to increase incident response feedback for coaching. Currently this framework is being introduced in the state of Colorado, USA as apart of a joi...
Abstract: In the United States, the State of Colorado’s Department of Transportation successfully defended and recovered from a recent severe malware attack. The 2018 attack at the Colorado Department of Transportation was mitigated by a rapid multi-agency incident response. This is the first case in the United States where a state’s National Guard...
This study presents the context and measured results of cyber security joint cyber defense training exercises. Building on previously published work by the authors that introduced AGILE methodologies, this study analyzes the outcomes of that professional development and laboratory-supported environment. Analysis focuses on the development of specif...
The loss of cyber identities, accounts, persona, and transactional ability is leading to increased urgency and the need to escalate cyber response as institutions and individuals respond to malicious and inadvertent disruption in cyber presence. Presented here is a model for addressing this challenge that may help to de-escalate disruptions in cybe...
This study provides a summary and analysis of a cyber security multi agency collaboration for rapid response by Regis University (RU), in partnership with the Colorado Army and Air Force National Guard (CONG) and the State of Colorado (SOC), deploying AGILE methods to improve the ability of the CONG and SOC to respond to attacks against Colorado’s...
The increasing proliferation and psychological and physical embeddedness of the global digital infrastructure call us to reconsider traditional models of vulnerability, attack trees, and security auditing. The easy coordination of disparate digital means of attack suggests we should move to tighter coordination between digital information assurance...
In March 2012, the Rocky Mountain Collegiate Cyber Defense Competition (RMCCDC) was hosted at Regis University and attended by seven colleges from the region. CCDC was developed by the University of Texas in San Antonio to provide a structured environment for practical education tied to established information assurance learning objectives in the i...
Teaching physical security can be difficult since classes generally do not have access to physical structures to assess. The purpose of this study was to investigate a new way of teaching physical security using Second Life® and to see if there is a difference in performance related to mode of instruction. The research question sought to determine...
A wide variety of virtualization methods have recently come into common use. Using these methods as a suite of tools to tune service offerings has becoming a viable strategy for enhancing an Academic Research Network (ARNe) as it services a globally dispersed user population. This report will present a model for organizing and applying these virtua...
Visual Philosophy Language 1.0, From Metaphysics to Metadata presents a strikingly innovative metaframework for understanding problems in philosophy that is both intuitive for the novice and full of subtlety and potential for the seasoned scholar. The analysis presented in this book demonstrates original methods of achieving a new level of discours...
This report presents research into the use of iSCSI SAN technology to create ad hoc provisioning for development environments, emergency provisioning, and training scenarios. Included in the topics analyzed are VMware environments, low bandwidth trials, and the use of TOE devices to support scalability. While the primary experience of the author is...
Seeing Through, a response to the five veils of fundamentalism is designed for the reasonable non-religious person who is confronted with the classical arguments of fundamentalism and is looking for clear rational responses. It is also a valuable resource for the reformed or liberal religious person confronted by the fundamentalist forces in their...
The primary purpose of this study is to bridge the gap between information technology (IT) managers and the college faculty by developing a series of forms (see appendix) to be completed by both groups. The IT manager has a broad array of telecommunications resources at his or her disposal, but does not have the expertise or authority to assign tho...
While documenting significant details of the Mt. Fuji Pilgrimage gathered through multiple climbs and interviews, the author has both prepared a climbers guide to the traditions and an analysis of the roots of Japanese identity as revealed through interactions with climbers. Some key Kanji are provided with translation.
A critical exploration of religious notions and iconography, working to create cognitive dissonance that address the empirical context and psychological aspects of icons and ideological assumptions.
This essay supports a fine art portfolio and project requirement at the University of Florida. https://www.worldcat.org/title/structure-of-belief/oclc...