{"id":399,"date":"2026-04-21T18:07:08","date_gmt":"2026-04-21T18:07:08","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/destinyh\/?page_id=399"},"modified":"2026-05-05T18:34:16","modified_gmt":"2026-05-05T18:34:16","slug":"research-papers","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/destinyh\/research-papers\/","title":{"rendered":"Selected Works"},"content":{"rendered":"\n<p>A selection of research papers reflecting my broad range of other security-related topics within the cybersecurity field. <\/p>\n\n\n\n<p><strong>IDS 300W&nbsp;Interdisciplinary Theory and Concepts<\/strong><br><br>This interdisciplinary paper examines the significant risks of genome editing and the<br>integration of artificial intelligence to human autonomy and rights. This paper integrates perspectives from medicine and health, law, and philosophy to analyze how these technologies affect them. <\/p>\n\n\n\n<div class=\"wp-block-group is-layout-constrained wp-block-group-is-layout-constrained\"><div class=\"wp-block-group__inner-container\">\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/destinyh\/wp-content\/uploads\/sites\/32241\/2026\/05\/AI-and-Genome-Editing-IDS-300W.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of AI and Genome Editing .\"><\/object><a id=\"wp-block-file--media-94d805e8-e796-41c5-83ab-79d1eb5bfd24\" href=\"https:\/\/sites.wp.odu.edu\/destinyh\/wp-content\/uploads\/sites\/32241\/2026\/05\/AI-and-Genome-Editing-IDS-300W.pdf\">AI and Genome Editing <\/a><a href=\"https:\/\/sites.wp.odu.edu\/destinyh\/wp-content\/uploads\/sites\/32241\/2026\/05\/AI-and-Genome-Editing-IDS-300W.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-94d805e8-e796-41c5-83ab-79d1eb5bfd24\">Download<\/a><\/div>\n<\/div><\/div>\n\n\n\n<p><strong>CYSE 425W Cyber Strategy and Policy <\/strong><br><br>This policy analysis paper examines the&nbsp;<strong>National Cybersecurity Strategy Policy (2023)&nbsp;<\/strong>and its role in shaping national cybersecurity governance. The analysis explores how the strategy addresses systemic cybersecurity risks, promotes shared responsibility across public and private sectors, and strengthens national resilience against cyber threats.<\/p>\n\n\n\n<div class=\"wp-block-group is-layout-constrained wp-block-group-is-layout-constrained\"><div class=\"wp-block-group__inner-container\">\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/destinyh\/wp-content\/uploads\/sites\/32241\/2026\/04\/Midterm-Paper-CYSE-425-1-1.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of National Cybersecurity Strategy Policy Analysis.\"><\/object><a id=\"wp-block-file--media-468ef211-ce9b-44fd-a054-054a9233eef3\" href=\"https:\/\/sites.wp.odu.edu\/destinyh\/wp-content\/uploads\/sites\/32241\/2026\/04\/Midterm-Paper-CYSE-425-1-1.pdf\">National Cybersecurity Strategy Policy Analysis<\/a><a href=\"https:\/\/sites.wp.odu.edu\/destinyh\/wp-content\/uploads\/sites\/32241\/2026\/04\/Midterm-Paper-CYSE-425-1-1.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-468ef211-ce9b-44fd-a054-054a9233eef3\">Download<\/a><\/div>\n<\/div><\/div>\n\n\n\n<p><strong>CYSE 425W Cyber Strategy and Policy<\/strong><br><br>This policy research paper gives an overview of the General Data Protection Regulation policy and its enforcement mechanisms.  It explores how this unified legal framework replaced the European Data Protection Directive to address modern cross-border data challenges while establishing a global standard for data privacy and company accountability.<\/p>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/destinyh\/wp-content\/uploads\/sites\/32241\/2026\/05\/Paper-1-CYSE-425-1.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of Overview of GDPR and Its Enforcement Mechanisms.\"><\/object><a id=\"wp-block-file--media-35500660-f11d-44f7-8d34-ace2aef4f1e6\" href=\"https:\/\/sites.wp.odu.edu\/destinyh\/wp-content\/uploads\/sites\/32241\/2026\/05\/Paper-1-CYSE-425-1.pdf\">Overview of GDPR and Its Enforcement Mechanisms<\/a><a href=\"https:\/\/sites.wp.odu.edu\/destinyh\/wp-content\/uploads\/sites\/32241\/2026\/05\/Paper-1-CYSE-425-1.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-35500660-f11d-44f7-8d34-ace2aef4f1e6\">Download<\/a><\/div>\n\n\n\n<p><strong>CYSE 280: Windows System Management and Security<\/strong> <br><br>This paper examines the evolution of the Windows operating system. <span data-path-to-node=\"0,2\">It highlights how each generational release introduced pivotal features, such as Active Directory, Hyper-V, and Azure services, to transform the efficiency and security of enterprise computing environments<\/span><span data-path-to-node=\"0,3\"><sup class=\"superscript\"><\/sup><\/span><span data-path-to-node=\"0,4\">.<\/span> <\/p>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/destinyh\/wp-content\/uploads\/sites\/32241\/2026\/05\/The-Evolution-of-Windows-Servers-1.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of The Evolution of Windows Servers .\"><\/object><a id=\"wp-block-file--media-9765d289-bf51-4c79-9408-270ec7c44c45\" href=\"https:\/\/sites.wp.odu.edu\/destinyh\/wp-content\/uploads\/sites\/32241\/2026\/05\/The-Evolution-of-Windows-Servers-1.pdf\">The Evolution of Windows Servers <\/a><a href=\"https:\/\/sites.wp.odu.edu\/destinyh\/wp-content\/uploads\/sites\/32241\/2026\/05\/The-Evolution-of-Windows-Servers-1.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-9765d289-bf51-4c79-9408-270ec7c44c45\">Download<\/a><\/div>\n\n\n\n<p><strong>CYSE 300: Introduction To Cybersecurity<\/strong><br>This policy outlines essential database security practices designed to protect sensitive information through access control, data classification, and the use of the Advanced Encryption Standard (AES) for data protection. It emphasizes the importance of server maintenance and environmental management to mitigate vulnerabilities such as malware and system downtime.<br><\/p>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/destinyh\/wp-content\/uploads\/sites\/32241\/2026\/05\/Short-Writing-Assignment-2-1.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of Short Writing Assignment 2: Database Security Policy.\"><\/object><a id=\"wp-block-file--media-7ac16e6e-958f-4eb5-9bf9-2d3326d387f2\" href=\"https:\/\/sites.wp.odu.edu\/destinyh\/wp-content\/uploads\/sites\/32241\/2026\/05\/Short-Writing-Assignment-2-1.pdf\">Short Writing Assignment 2: Database Security Policy<\/a><a href=\"https:\/\/sites.wp.odu.edu\/destinyh\/wp-content\/uploads\/sites\/32241\/2026\/05\/Short-Writing-Assignment-2-1.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-7ac16e6e-958f-4eb5-9bf9-2d3326d387f2\">Download<\/a><\/div>\n","protected":false},"excerpt":{"rendered":"<p>A selection of research papers reflecting my broad range of other security-related topics within the cybersecurity field. IDS 300W&nbsp;Interdisciplinary Theory and Concepts This interdisciplinary paper examines the significant risks of genome editing and theintegration of artificial intelligence to human autonomy and rights. This paper integrates perspectives from medicine and health, law, and philosophy to analyze &hellip; <a href=\"https:\/\/sites.wp.odu.edu\/destinyh\/research-papers\/\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">Selected Works<\/span><\/a><\/p>\n","protected":false},"author":26014,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/destinyh\/wp-json\/wp\/v2\/pages\/399"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/destinyh\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/destinyh\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/destinyh\/wp-json\/wp\/v2\/users\/26014"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/destinyh\/wp-json\/wp\/v2\/comments?post=399"}],"version-history":[{"count":5,"href":"https:\/\/sites.wp.odu.edu\/destinyh\/wp-json\/wp\/v2\/pages\/399\/revisions"}],"predecessor-version":[{"id":505,"href":"https:\/\/sites.wp.odu.edu\/destinyh\/wp-json\/wp\/v2\/pages\/399\/revisions\/505"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/destinyh\/wp-json\/wp\/v2\/media?parent=399"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}