Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Nova Southeastern University (59)
- Bridgewater State University (56)
- University of Rhode Island (15)
- Brigham Young University (11)
- US Army War College (11)
-
- Lindenwood University (8)
- Northwestern Pritzker School of Law (7)
- Universitas Indonesia (7)
- University of Massachusetts Boston (6)
- San Jose State University (5)
- Kennesaw State University (4)
- Brigham Young University Law School (3)
- California Institute of Integral Studies (3)
- Western Michigan University (3)
- American Dental Association (2)
- Arcadia University (2)
- California Polytechnic State University, San Luis Obispo (2)
- California State University, San Bernardino (2)
- James Madison University (2)
- Kansas State University Libraries (2)
- Technological University Dublin (2)
- University of Nevada, Las Vegas (2)
- Walden University (2)
- Butler University (1)
- Cal Poly Humboldt (1)
- Chinese Academy of Sciences (1)
- Chulalongkorn University (1)
- Cleveland State University (1)
- College of Saint Benedict and Saint John's University (1)
- College of the Holy Cross (1)
- Keyword
-
- Cybercrime (14)
- Cyberbullying (13)
- Cybersecurity (12)
- Internet (8)
- Qualitative Research (7)
-
- Social media (6)
- Technology (6)
- Prostitution (5)
- Artificial intelligence (4)
- Cyberterrorism (4)
- Ethnography (4)
- Qualitative research (4)
- Race (4)
- Sex trafficking (4)
- Sexting (4)
- Anonymity (3)
- Awareness (3)
- COVID-19 (3)
- China (3)
- Civilization (3)
- Cyborg (3)
- Facebook (3)
- Film (3)
- Future of work (3)
- Gender (3)
- Interviews (3)
- Law (3)
- Military (3)
- Policy (3)
- Pornography (3)
- Publication Year
- Publication
-
- The Qualitative Report (57)
- International Journal of Cybersecurity Intelligence & Cybercrime (55)
- The US Army War College Quarterly: Parameters (11)
- Dignity: A Journal of Analysis of Exploitation and Violence (9)
- Journal of International and Global Studies (8)
-
- Comparative Civilizations Review (7)
- Journal of Criminal Law and Criminology (7)
- Markets, Globalization & Development Review (6)
- New England Journal of Public Policy (6)
- Masyarakat: Jurnal Sosiologi (4)
- Journal of Conscious Evolution (3)
- Journal of Cybersecurity Education, Research and Practice (3)
- Journal of Nonprofit Innovation (3)
- BYU Law Review (2)
- Journal of Terrorism Studies (2)
- Secrecy and Society (2)
- The ITB Journal (2)
- The Journal of Sociology & Social Welfare (2)
- The Journal of the Michigan Dental Association (2)
- sprinkle: an undergraduate journal of feminist and queer studies (2)
- Backstage Pass (1)
- Bridgewater Review (1)
- Brigham Young University International Law & Management Review (1)
- Buffalo Intellectual Property Law Journal (1)
- Bulletin of Chinese Academy of Sciences (Chinese Version) (1)
- Butler Journal of Undergraduate Research (1)
- Cleveland State Law Review (1)
- Contemporary Issues in Juvenile Justice (1)
- Emancipations: A Journal of Critical Social Analysis (1)
- Forum Magazine (1)
Articles 1 - 30 of 245
Full-Text Articles in Entire DC Network
Strategic Pathways To Minimal Deterrence And Counter-Terrorism: Enhancing Brunei’S Defense Capabilities, Brice Tseen Fu Lee, Filip Komšić, Juan Pablo Sims
Strategic Pathways To Minimal Deterrence And Counter-Terrorism: Enhancing Brunei’S Defense Capabilities, Brice Tseen Fu Lee, Filip Komšić, Juan Pablo Sims
Journal of Terrorism Studies
This paper explores the strategic enhancement of Brunei’s military capabilities under the guidelines of the Brunei Defense White Paper 2021, focusing on establishing a robust minimal level deterrence. It emphasizes transitioning from conventional defense paradigms to an integrated, technologically advanced military structure tailored to contemporary and future security challenges. The significance of minimal level deterrence is analyzed, illustrating how a proportionate and efficient military force not only deters potential aggressors but also supports counter-terrorism efforts. This approach underscores the dual benefits of ensuring national security while facilitating economic stability and growth, allowing Brunei to allocate resources more effectively between defense …
Online Criticism Of Parents After Child Accidents: A Reflexive Thematic Analysis, Kelsi Toews, Jorden A. Cummings, Michelle Mclean, Laura Knowles
Online Criticism Of Parents After Child Accidents: A Reflexive Thematic Analysis, Kelsi Toews, Jorden A. Cummings, Michelle Mclean, Laura Knowles
The Qualitative Report
When a child is harmed, parents frequently experience condemnation and blame from others. This blame is amplified online. Our online worlds reflect our offline ones, and this negative atmosphere toward parents can influence both parents themselves and societal expectations for parents. Previous research on parental blame has either directly asked people about their blame attributions or utilized hypothetical vignettes. Our thematic analysis expands on this research by analyzing unsolicited online comments left on news stories about two, real-world incidents of child harm: A child who fell into a gorilla enclosure at the Cincinnati Zoo, and a child who was killed …
Chippin’ In: An Analysis Of The Criminological Concepts Within Cyberpunk 2077, Morgan J. Steele
Chippin’ In: An Analysis Of The Criminological Concepts Within Cyberpunk 2077, Morgan J. Steele
SACAD: John Heinrichs Scholarly and Creative Activity Days
The cyberpunk genre dominates much of our popular culture, from how we think of cyber- and white-collar crime, to our understanding of how technology influences the criminal justice system. This article explores the common criminological themes prevalent within the recent video game Cyberpunk 2077 as an example of popular criminology. Specifically, it explores the game’s story and environment by examining key characters’ responses to structural inequalities through an anomie theory lens. Key characters and groups within the game exemplify Merton’s (1938) different responses to rampant poverty and socioeconomic inequality. Thus, the game can be used to explore how cultural goals …
The Relationship Between Social Stigma And Career Decisions Of Individualized And Freelance Male Sex Workers, Luis Miguel Dos Santos, Ho Fai Lo
The Relationship Between Social Stigma And Career Decisions Of Individualized And Freelance Male Sex Workers, Luis Miguel Dos Santos, Ho Fai Lo
The Qualitative Report
Switching from a white-collar professional to a sex worker is not an easy step, particularly for individuals with a postgraduate degree in South Korea who may have significant expectations from their parents, peers, and communities. Based on the social stigma theory and social cognitive career and motivation theory, this study aims to understand how stress and pressure impact the motivations, career decisions, and decision-making processes of individualized and freelance male sex workers and their career transition experiences in South Korea. Based on the thematic analysis, ten highly educated male sex workers joined and shared their experiences. The researchers categorized three …
Us-Taiwan Relations And The Future Of The Liberal Order, Christina Lai
Us-Taiwan Relations And The Future Of The Liberal Order, Christina Lai
The US Army War College Quarterly: Parameters
Strengthening ties with Taiwan is the best chance the United States has to preserve the liberal international order in Asia and improve its security relative to China. This study offers a normative perspective on how Taiwan can contribute to US-led international institutions and the Asian regional order and reduce conflict risk. It concludes with recommendations for the United States and its partners to integrate Taiwan into multilateral institutions in Asia.
International Law, Self-Defense, And The Israel-Hamas Conflict, Eric A. Heinze
International Law, Self-Defense, And The Israel-Hamas Conflict, Eric A. Heinze
The US Army War College Quarterly: Parameters
This article examines the international law of self-defense as it applies to the ongoing Israel-Hamas conflict to determine whether the October 2023 attacks by Hamas against Israel can be interpreted under Article 51 of the UN Charter as an “armed attack” that gives Israel the right to use military force in self-defense against non-state actors. It situates the conflict within ongoing legal and political debates, shows how this conflict fits into a changing global reality where the most dangerous security threats do not exclusively emanate from other states and concludes that Israel’s resort to force in the current conflict appears …
China's Use Of Nontraditional Strategic Landpower In Asia, Sheena Chestnut Greitens
China's Use Of Nontraditional Strategic Landpower In Asia, Sheena Chestnut Greitens
The US Army War College Quarterly: Parameters
This article argues that the People’s Republic of China uses its police and internal security forces as a nontraditional means of projecting strategic Landpower in the Indo-Pacific and Central Asia. Instead of limiting analysis of China’s power projection to military forces, this article employs new data on Chinese police engagements abroad to fill a gap in our understanding of the operating environment in Asia. Policymakers will gain an understanding of how these activities enhance China’s presence, partnerships, and influence across the region to inform the development of recommendations for a more effective response.
Strategy As Problem-Solving, Andrew Carr
Strategy As Problem-Solving, Andrew Carr
The US Army War College Quarterly: Parameters
This article proposes a new definition of strategy as problem-solving that challenges the focus on goals and assumptions of order within many post–Cold War approaches to strategy. It argues that the military needs strategy to diagnose the complex problems of the twenty-first century before they can be solved. Inspired by practitioners such as Andrew Marshall and George F. Kennan, this new definition clarifies what strategists do and offers a logic for distinguishing the use of the term strategy. Practitioners will also find problem-solving tools and pedagogies they can adopt today.
Navigating The Digital Frontier: The Intersection Of Cybersecurity Challenges And Young Adult Life, Hannarae Lee
Navigating The Digital Frontier: The Intersection Of Cybersecurity Challenges And Young Adult Life, Hannarae Lee
International Journal of Cybersecurity Intelligence & Cybercrime
Papers from this issue advocate for empowering young adults with knowledge and tools to navigate cyberspace safely, emphasizing the necessity of heightened cybersecurity measures and proactive education. As we advance into the digital abyss, this call becomes imperative, ensuring that the young adults' experience remains a journey of growth and enlightenment, unaffected by the shadows of unseen online threats.
The Need For A Cybersecurity Education Program For Internet Users With Limited English Proficiency: Results From A Pilot Study, Fawn T. Ngo, Rustu Deryol, Brian Turnbull, Jack Drobisz
The Need For A Cybersecurity Education Program For Internet Users With Limited English Proficiency: Results From A Pilot Study, Fawn T. Ngo, Rustu Deryol, Brian Turnbull, Jack Drobisz
International Journal of Cybersecurity Intelligence & Cybercrime
According to security experts, cybersecurity education and awareness at the user level are key in combating cybercrime. Hence, in the U.S., cybersecurity and Internet safety workshops, classes, and resources targeting children, adolescents, adults, and senior citizens abound. However, most cybercrime prevention programs are only available in English, thus, ignoring a substantial proportion of Internet users and potential cybercrime victims—Internet users with limited English proficiency (LEP). Yet, successfully combating cybercrime requires that all computer and Internet users, regardless of their language abilities and skills, have access to pertinent cybersecurity information and resources to protect themselves online. This paper presents the results …
Cyberbullying During Covid-19 Pandemic: Relation To Perceived Social Isolation Among College And University Students, Nadya Stefani Neuhaeusler
Cyberbullying During Covid-19 Pandemic: Relation To Perceived Social Isolation Among College And University Students, Nadya Stefani Neuhaeusler
International Journal of Cybersecurity Intelligence & Cybercrime
One tell-tale sign of the impact of the COVID-19 pandemic is the heavy reliance on electronic devices. Young adults in particular have indicated a greater presence on social media and high levels of loneliness during the pandemic. This trend has raised concerns about increased feelings of social isolation and reliance on technology, which could lead to more internet or computer crimes—including cyberbullying. Despite a growing body of literature, little is known about the association between cyberbullying victimization and social isolation among young adults— with even less known about this phenomenon in the context of the ongoing pandemic. Drawing on survey …
Thematic Analysis Through Artificial Intelligence (Ai), Prokopis A. Christou Phd
Thematic Analysis Through Artificial Intelligence (Ai), Prokopis A. Christou Phd
The Qualitative Report
Thematic analysis, a well-enforced qualitative analytic method, is likely to continue evolving with the adoption of AI technologies. This how-to report does not delve into the details of thematic analysis itself, as there are ample existing studies on the topic. Instead, it acknowledges the potential impacts, dynamics, and pitfalls of AI in thematic analysis while offering valuable advice, particularly for novice analysts, on how to incorporate and document AI tools in each phase of a thematic analysis. The author underscores the importance of not allowing AI to overshadow the analyst's critical evaluative and interpretive skills but instead supporting the use …
Viewing The World Through The Prism Of Cross-Cultural Romances: Film Review Of Christmas As Usual (2023) And Further Reflections, Raja Ramanathan
Viewing The World Through The Prism Of Cross-Cultural Romances: Film Review Of Christmas As Usual (2023) And Further Reflections, Raja Ramanathan
Markets, Globalization & Development Review
No abstract provided.
Knowledge Ethics: Conceptual Preliminaries Scope And Justification, Norman Mooradian
Knowledge Ethics: Conceptual Preliminaries Scope And Justification, Norman Mooradian
School of Information Student Research Journal
This paper lays out the conceptual groundwork for a long-term project examining ethical issues raised when addressing the value of knowledge to a knowledge economy. The project includes a series of papers on specific topics that interrelate to the subjects of knowledge, ethics and organizations. While some of the planned articles for the project will have a practical focus, others, such as this one, will be conceptual in nature. The following outlines selected key concepts for an ethics of knowledge and their relationship with cognate areas of inquiry and practice.
Do Judges Understand Technology? How Attorneys And Advocates View Judicial Responsibility In Cyberstalking And Cyberharassment Cases, Kateryna Kaplun
Do Judges Understand Technology? How Attorneys And Advocates View Judicial Responsibility In Cyberstalking And Cyberharassment Cases, Kateryna Kaplun
International Journal on Responsibility
As new technologies emerge and are increasingly used to commit interpersonal cybercrimes like cyberstalking and cyberharassment, the legal system lags in assisting victims in obtaining justice in these types of experiences. This qualitative research study explores how attorney and advocate interviewees from Illinois, New Jersey, and New York view judges’ responsibility to the law in cyberstalking and cyberharassment cases. This study finds three themes: judges’ lack of understanding of technology and its harms, discretion, and law on the books versus law in action as important factors and frameworks that contribute to why judges do not consider the importance of technology …
Understanding Digital Well-Being And Insights From Technological Impacts On University Students’ Everyday Lives In Bangkok, Chulanee Thianthai, Patrapan Tamdee
Understanding Digital Well-Being And Insights From Technological Impacts On University Students’ Everyday Lives In Bangkok, Chulanee Thianthai, Patrapan Tamdee
Journal of Health Research
Background - Digital wellbeing has been widely discussed due to the influence of digital technology on our life. This paper defined digital wellbeing for university students in Bangkok and reviewed how they engaged with technology, while examining the technological impacts on their everyday lives.
Methods - Qualitative data was collected from university students across different majors and genders, ranging in age from 18-32 years old. The researchers used 30 in-depth individual interviews in conjunction with a brain writing 6-3-5 design thinking technique to gain insight into how digital natives living in Bangkok defined digital wellbeing and experienced daily life impacts …
Guidelines For The Integration Of Large Language Models In Developing And Refining Interview Protocols, Jessica L. Parker Edd, Veronica M. Richard, Kimberly Becker
Guidelines For The Integration Of Large Language Models In Developing And Refining Interview Protocols, Jessica L. Parker Edd, Veronica M. Richard, Kimberly Becker
The Qualitative Report
Rapid advancements in generative artificial intelligence (AI), specifically large language models (LLMs), offer unprecedented opportunities and challenges for qualitative researchers. This paper presents comprehensive guidelines for the ethical and effective use of LLMs in the development and refinement of interview protocols. Through a multidisciplinary lens, this paper explores potential pitfalls, ethical considerations, and best practices to ensure the responsible integration of LLMs in the research process. The guidelines proposed serve not only as a methodological roadmap for researchers but also as a catalyst for dialogue on the ethical dimensions of LLMs in qualitative research. Furthermore, the authors describe and share …
Power Projection And Counter-Terrorism: Strategies For Small States Like Brunei Darussalam, Brice Tseen Fu Lee, Gulshan Bibi Ms
Power Projection And Counter-Terrorism: Strategies For Small States Like Brunei Darussalam, Brice Tseen Fu Lee, Gulshan Bibi Ms
Journal of Terrorism Studies
This study delves into the intricacies of power projection strategies and counter-terrorism measures, emphasizing their relevance to small states, with a specific focus on Brunei Darussalam. Using a dual matrix model, the research categorizes various strategies based on risk-reward parameters, offering a structured insight into potential approaches these states can employ against potential aggressors. The counter-terrorism matrix is the initial focal point, recognizing the contemporary significance of terror threats and their unique challenges for small nations. Subsequently, the power projection matrix offers a broader view of defense tactics beyond counter-terrorism. By synthesizing information from primary academic sources, the study aims …
Humor And Surveillance - “That’S Not Funny” (Or Is It?): For Professor Serge Gutwirth On His Retirement, Gary T. Marx
Humor And Surveillance - “That’S Not Funny” (Or Is It?): For Professor Serge Gutwirth On His Retirement, Gary T. Marx
Secrecy and Society
No abstract provided.
The Perspective Of University Students On The Availability And Effectiveness Of Cyberbullying Prevention And Response Initiatives On Campus: Virtual Semi-Structured Interviews On Resources, Barriers, And Solutions, Molly-Gloria R. Patel, Anabel Quan-Haase
The Perspective Of University Students On The Availability And Effectiveness Of Cyberbullying Prevention And Response Initiatives On Campus: Virtual Semi-Structured Interviews On Resources, Barriers, And Solutions, Molly-Gloria R. Patel, Anabel Quan-Haase
Journal of Educational Research and Practice
Cyberbullying is a problem in educational settings, and much of the research has focused on the development of effective prevention and response initiatives. Because of the vulnerability of children, cyberbullying research and intervention programs have largely targeted elementary students. A growing body of research has shown that cyberbullying is not limited to elementary settings, but the problem is also prevalent in postsecondary institutions, with potentially severe negative consequences. Yet, there is a gap in research about interventions tailored to this life stage. To address this gap, we conducted virtual semistructured interviews through Zoom with 21 university students on the availability …
Online Protection Laws.Full Issue
Online Protection Laws.Full Issue
Journal of Nonprofit Innovation
No abstract provided.
Online Safety Laws By Country, Haoming Song, Angie Holzer
Online Safety Laws By Country, Haoming Song, Angie Holzer
Journal of Nonprofit Innovation
No abstract provided.
S&T Innovation Study For The Digital Belt And Road, Huadong Guo, Fang Chen, Yu Chen, Guozhuang Shen, Chuansheng Liu, Yunwei Tang
S&T Innovation Study For The Digital Belt And Road, Huadong Guo, Fang Chen, Yu Chen, Guozhuang Shen, Chuansheng Liu, Yunwei Tang
Bulletin of Chinese Academy of Sciences (Chinese Version)
Digital technology can promote the sustainable development of countries and regions along the route of Belt and Road Initiative and help enhance interconnectivity in technology, standards, rules, and digital infrastructure. Science and technology play a crucial role in the construction of the Digital Belt and Road. However, currently, some countries and regions along the route of Belt and Road Initiative lack sufficient digital infrastructure, and there is a shortage of critical core digital technology and challenges in its promotion. It is essential to build an innovative ecosystem for the Digital Belt and Road that includes facilities, technology, mechanisms, and capabilities …
Harnessing Large Language Models To Simulate Realistic Human Responses To Social Engineering Attacks: A Case Study, Mohammad Asfour, Juan Carlos Murillo
Harnessing Large Language Models To Simulate Realistic Human Responses To Social Engineering Attacks: A Case Study, Mohammad Asfour, Juan Carlos Murillo
International Journal of Cybersecurity Intelligence & Cybercrime
The research publication, “Generative Agents: Interactive Simulacra of Human Behavior,” by Stanford and Google in 2023 established that large language models (LLMs) such as GPT-4 can generate interactive agents with credible and emergent human-like behaviors. However, their application in simulating human responses in cybersecurity scenarios, particularly in social engineering attacks, remains unexplored. In addressing that gap, this study explores the potential of LLMs, specifically the Open AI GPT-4 model, to simulate a broad spectrum of human responses to social engineering attacks that exploit human social behaviors, framing our primary research question: How does the simulated behavior of human targets, based …
Understanding The Use Of Artificial Intelligence In Cybercrime, Katalin Parti, Thomas Dearden, Sinyong Choi
Understanding The Use Of Artificial Intelligence In Cybercrime, Katalin Parti, Thomas Dearden, Sinyong Choi
International Journal of Cybersecurity Intelligence & Cybercrime
Artificial intelligence is one of the newest innovations which offenders exploit to satisfy their criminal desires. Although understanding cybercrime that is associated with this relatively new technology is essential in developing proper preventive measures, little has been done to examine this area. Therefore, this paper provides an overview of the two articles featured in the special issue of the International Journal of Cybersecurity Intelligence and Cybercrime, one about deepfakes in the metaverse and the other about social engineering attacks. The articles were written by the winners of the student paper competition at the 2023 International White Hat Conference.
Victimization By Deepfake In The Metaverse: Building A Practical Management Framework, Julia Stavola, Kyung-Shick Choi
Victimization By Deepfake In The Metaverse: Building A Practical Management Framework, Julia Stavola, Kyung-Shick Choi
International Journal of Cybersecurity Intelligence & Cybercrime
Deepfake is digitally altered media aimed to deceive online users for political favor, monetary gain, extortion, and more. Deepfakes are the prevalent issues of impersonation, privacy, and fake news that cause substantial damage to individuals, groups, and organizations. The metaverse is an emerging 3-dimensional virtual platform led by AI and blockchain technology where users freely interact with each other. The purpose of this study is to identify the use of illicit deep fakes which can potentially contribute to cybercrime victimization in the metaverse. The data will be derived from expert interviews (n=8) and online open sources to design a framework …
A Historical Perspective On Today’S Recruiting Crisis, Brian Mcallister Linn
A Historical Perspective On Today’S Recruiting Crisis, Brian Mcallister Linn
The US Army War College Quarterly: Parameters
This article analyzes the US Army’s successive recruiting crises, identifying their consistent patterns and the efforts to resolve them, and makes three provocative arguments. First, there is a long-standing institutional tension between recruiting personnel for the combat arms and technical and administrative specialists. Second, many of today’s talent management problems were first identified in a 1907 General Staff report and reiterated in subsequent studies. Third, the Army has pursued innovative recruitment strategies, but much of their success depended on factors outside the service’s control. The essay concludes with four history-based recruiting lessons and an affirmation that the 2019 Army People …
Parameters Autumn 2023, Usawc Press
Parameters Autumn 2023, Usawc Press
The US Army War College Quarterly: Parameters
No abstract provided.