Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Sociology

Journal

Institution
Keyword
Publication Year
Publication

Articles 1 - 30 of 245

Full-Text Articles in Entire DC Network

Strategic Pathways To Minimal Deterrence And Counter-Terrorism: Enhancing Brunei’S Defense Capabilities, Brice Tseen Fu Lee, Filip Komšić, Juan Pablo Sims May 2024

Strategic Pathways To Minimal Deterrence And Counter-Terrorism: Enhancing Brunei’S Defense Capabilities, Brice Tseen Fu Lee, Filip Komšić, Juan Pablo Sims

Journal of Terrorism Studies

This paper explores the strategic enhancement of Brunei’s military capabilities under the guidelines of the Brunei Defense White Paper 2021, focusing on establishing a robust minimal level deterrence. It emphasizes transitioning from conventional defense paradigms to an integrated, technologically advanced military structure tailored to contemporary and future security challenges. The significance of minimal level deterrence is analyzed, illustrating how a proportionate and efficient military force not only deters potential aggressors but also supports counter-terrorism efforts. This approach underscores the dual benefits of ensuring national security while facilitating economic stability and growth, allowing Brunei to allocate resources more effectively between defense …


Online Criticism Of Parents After Child Accidents: A Reflexive Thematic Analysis, Kelsi Toews, Jorden A. Cummings, Michelle Mclean, Laura Knowles May 2024

Online Criticism Of Parents After Child Accidents: A Reflexive Thematic Analysis, Kelsi Toews, Jorden A. Cummings, Michelle Mclean, Laura Knowles

The Qualitative Report

When a child is harmed, parents frequently experience condemnation and blame from others. This blame is amplified online. Our online worlds reflect our offline ones, and this negative atmosphere toward parents can influence both parents themselves and societal expectations for parents. Previous research on parental blame has either directly asked people about their blame attributions or utilized hypothetical vignettes. Our thematic analysis expands on this research by analyzing unsolicited online comments left on news stories about two, real-world incidents of child harm: A child who fell into a gorilla enclosure at the Cincinnati Zoo, and a child who was killed …


Chippin’ In: An Analysis Of The Criminological Concepts Within Cyberpunk 2077, Morgan J. Steele Apr 2024

Chippin’ In: An Analysis Of The Criminological Concepts Within Cyberpunk 2077, Morgan J. Steele

SACAD: John Heinrichs Scholarly and Creative Activity Days

The cyberpunk genre dominates much of our popular culture, from how we think of cyber- and white-collar crime, to our understanding of how technology influences the criminal justice system. This article explores the common criminological themes prevalent within the recent video game Cyberpunk 2077 as an example of popular criminology. Specifically, it explores the game’s story and environment by examining key characters’ responses to structural inequalities through an anomie theory lens. Key characters and groups within the game exemplify Merton’s (1938) different responses to rampant poverty and socioeconomic inequality. Thus, the game can be used to explore how cultural goals …


The Relationship Between Social Stigma And Career Decisions Of Individualized And Freelance Male Sex Workers, Luis Miguel Dos Santos, Ho Fai Lo Mar 2024

The Relationship Between Social Stigma And Career Decisions Of Individualized And Freelance Male Sex Workers, Luis Miguel Dos Santos, Ho Fai Lo

The Qualitative Report

Switching from a white-collar professional to a sex worker is not an easy step, particularly for individuals with a postgraduate degree in South Korea who may have significant expectations from their parents, peers, and communities. Based on the social stigma theory and social cognitive career and motivation theory, this study aims to understand how stress and pressure impact the motivations, career decisions, and decision-making processes of individualized and freelance male sex workers and their career transition experiences in South Korea. Based on the thematic analysis, ten highly educated male sex workers joined and shared their experiences. The researchers categorized three …


Us-Taiwan Relations And The Future Of The Liberal Order, Christina Lai Mar 2024

Us-Taiwan Relations And The Future Of The Liberal Order, Christina Lai

The US Army War College Quarterly: Parameters

Strengthening ties with Taiwan is the best chance the United States has to preserve the liberal international order in Asia and improve its security relative to China. This study offers a normative perspective on how Taiwan can contribute to US-led international institutions and the Asian regional order and reduce conflict risk. It concludes with recommendations for the United States and its partners to integrate Taiwan into multilateral institutions in Asia.


International Law, Self-Defense, And The Israel-Hamas Conflict, Eric A. Heinze Mar 2024

International Law, Self-Defense, And The Israel-Hamas Conflict, Eric A. Heinze

The US Army War College Quarterly: Parameters

This article examines the international law of self-defense as it applies to the ongoing Israel-Hamas conflict to determine whether the October 2023 attacks by Hamas against Israel can be interpreted under Article 51 of the UN Charter as an “armed attack” that gives Israel the right to use military force in self-defense against non-state actors. It situates the conflict within ongoing legal and political debates, shows how this conflict fits into a changing global reality where the most dangerous security threats do not exclusively emanate from other states and concludes that Israel’s resort to force in the current conflict appears …


China's Use Of Nontraditional Strategic Landpower In Asia, Sheena Chestnut Greitens Mar 2024

China's Use Of Nontraditional Strategic Landpower In Asia, Sheena Chestnut Greitens

The US Army War College Quarterly: Parameters

This article argues that the People’s Republic of China uses its police and internal security forces as a nontraditional means of projecting strategic Landpower in the Indo-Pacific and Central Asia. Instead of limiting analysis of China’s power projection to military forces, this article employs new data on Chinese police engagements abroad to fill a gap in our understanding of the operating environment in Asia. Policymakers will gain an understanding of how these activities enhance China’s presence, partnerships, and influence across the region to inform the development of recommendations for a more effective response.


Strategy As Problem-Solving, Andrew Carr Mar 2024

Strategy As Problem-Solving, Andrew Carr

The US Army War College Quarterly: Parameters

This article proposes a new definition of strategy as problem-solving that challenges the focus on goals and assumptions of order within many post–Cold War approaches to strategy. It argues that the military needs strategy to diagnose the complex problems of the twenty-first century before they can be solved. Inspired by practitioners such as Andrew Marshall and George F. Kennan, this new definition clarifies what strategists do and offers a logic for distinguishing the use of the term strategy. Practitioners will also find problem-solving tools and pedagogies they can adopt today.


Full Issue Mar 2024

Full Issue

Comparative Civilizations Review

No abstract provided.


Navigating The Digital Frontier: The Intersection Of Cybersecurity Challenges And Young Adult Life, Hannarae Lee Feb 2024

Navigating The Digital Frontier: The Intersection Of Cybersecurity Challenges And Young Adult Life, Hannarae Lee

International Journal of Cybersecurity Intelligence & Cybercrime

Papers from this issue advocate for empowering young adults with knowledge and tools to navigate cyberspace safely, emphasizing the necessity of heightened cybersecurity measures and proactive education. As we advance into the digital abyss, this call becomes imperative, ensuring that the young adults' experience remains a journey of growth and enlightenment, unaffected by the shadows of unseen online threats.


The Need For A Cybersecurity Education Program For Internet Users With Limited English Proficiency: Results From A Pilot Study, Fawn T. Ngo, Rustu Deryol, Brian Turnbull, Jack Drobisz Feb 2024

The Need For A Cybersecurity Education Program For Internet Users With Limited English Proficiency: Results From A Pilot Study, Fawn T. Ngo, Rustu Deryol, Brian Turnbull, Jack Drobisz

International Journal of Cybersecurity Intelligence & Cybercrime

According to security experts, cybersecurity education and awareness at the user level are key in combating cybercrime. Hence, in the U.S., cybersecurity and Internet safety workshops, classes, and resources targeting children, adolescents, adults, and senior citizens abound. However, most cybercrime prevention programs are only available in English, thus, ignoring a substantial proportion of Internet users and potential cybercrime victims—Internet users with limited English proficiency (LEP). Yet, successfully combating cybercrime requires that all computer and Internet users, regardless of their language abilities and skills, have access to pertinent cybersecurity information and resources to protect themselves online. This paper presents the results …


Cyberbullying During Covid-19 Pandemic: Relation To Perceived Social Isolation Among College And University Students, Nadya Stefani Neuhaeusler Feb 2024

Cyberbullying During Covid-19 Pandemic: Relation To Perceived Social Isolation Among College And University Students, Nadya Stefani Neuhaeusler

International Journal of Cybersecurity Intelligence & Cybercrime

One tell-tale sign of the impact of the COVID-19 pandemic is the heavy reliance on electronic devices. Young adults in particular have indicated a greater presence on social media and high levels of loneliness during the pandemic. This trend has raised concerns about increased feelings of social isolation and reliance on technology, which could lead to more internet or computer crimes—including cyberbullying. Despite a growing body of literature, little is known about the association between cyberbullying victimization and social isolation among young adults— with even less known about this phenomenon in the context of the ongoing pandemic. Drawing on survey …


Thematic Analysis Through Artificial Intelligence (Ai), Prokopis A. Christou Phd Feb 2024

Thematic Analysis Through Artificial Intelligence (Ai), Prokopis A. Christou Phd

The Qualitative Report

Thematic analysis, a well-enforced qualitative analytic method, is likely to continue evolving with the adoption of AI technologies. This how-to report does not delve into the details of thematic analysis itself, as there are ample existing studies on the topic. Instead, it acknowledges the potential impacts, dynamics, and pitfalls of AI in thematic analysis while offering valuable advice, particularly for novice analysts, on how to incorporate and document AI tools in each phase of a thematic analysis. The author underscores the importance of not allowing AI to overshadow the analyst's critical evaluative and interpretive skills but instead supporting the use …


Viewing The World Through The Prism Of Cross-Cultural Romances: Film Review Of Christmas As Usual (2023) And Further Reflections, Raja Ramanathan Feb 2024

Viewing The World Through The Prism Of Cross-Cultural Romances: Film Review Of Christmas As Usual (2023) And Further Reflections, Raja Ramanathan

Markets, Globalization & Development Review

No abstract provided.


Knowledge Ethics: Conceptual Preliminaries Scope And Justification, Norman Mooradian Jan 2024

Knowledge Ethics: Conceptual Preliminaries Scope And Justification, Norman Mooradian

School of Information Student Research Journal

This paper lays out the conceptual groundwork for a long-term project examining ethical issues raised when addressing the value of knowledge to a knowledge economy. The project includes a series of papers on specific topics that interrelate to the subjects of knowledge, ethics and organizations. While some of the planned articles for the project will have a practical focus, others, such as this one, will be conceptual in nature. The following outlines selected key concepts for an ethics of knowledge and their relationship with cognate areas of inquiry and practice.


Do Judges Understand Technology? How Attorneys And Advocates View Judicial Responsibility In Cyberstalking And Cyberharassment Cases, Kateryna Kaplun Dec 2023

Do Judges Understand Technology? How Attorneys And Advocates View Judicial Responsibility In Cyberstalking And Cyberharassment Cases, Kateryna Kaplun

International Journal on Responsibility

As new technologies emerge and are increasingly used to commit interpersonal cybercrimes like cyberstalking and cyberharassment, the legal system lags in assisting victims in obtaining justice in these types of experiences. This qualitative research study explores how attorney and advocate interviewees from Illinois, New Jersey, and New York view judges’ responsibility to the law in cyberstalking and cyberharassment cases. This study finds three themes: judges’ lack of understanding of technology and its harms, discretion, and law on the books versus law in action as important factors and frameworks that contribute to why judges do not consider the importance of technology …


Understanding Digital Well-Being And Insights From Technological Impacts On University Students’ Everyday Lives In Bangkok, Chulanee Thianthai, Patrapan Tamdee Dec 2023

Understanding Digital Well-Being And Insights From Technological Impacts On University Students’ Everyday Lives In Bangkok, Chulanee Thianthai, Patrapan Tamdee

Journal of Health Research

Background - Digital wellbeing has been widely discussed due to the influence of digital technology on our life. This paper defined digital wellbeing for university students in Bangkok and reviewed how they engaged with technology, while examining the technological impacts on their everyday lives.

Methods - Qualitative data was collected from university students across different majors and genders, ranging in age from 18-32 years old. The researchers used 30 in-depth individual interviews in conjunction with a brain writing 6-3-5 design thinking technique to gain insight into how digital natives living in Bangkok defined digital wellbeing and experienced daily life impacts …


Guidelines For The Integration Of Large Language Models In Developing And Refining Interview Protocols, Jessica L. Parker Edd, Veronica M. Richard, Kimberly Becker Dec 2023

Guidelines For The Integration Of Large Language Models In Developing And Refining Interview Protocols, Jessica L. Parker Edd, Veronica M. Richard, Kimberly Becker

The Qualitative Report

Rapid advancements in generative artificial intelligence (AI), specifically large language models (LLMs), offer unprecedented opportunities and challenges for qualitative researchers. This paper presents comprehensive guidelines for the ethical and effective use of LLMs in the development and refinement of interview protocols. Through a multidisciplinary lens, this paper explores potential pitfalls, ethical considerations, and best practices to ensure the responsible integration of LLMs in the research process. The guidelines proposed serve not only as a methodological roadmap for researchers but also as a catalyst for dialogue on the ethical dimensions of LLMs in qualitative research. Furthermore, the authors describe and share …


Power Projection And Counter-Terrorism: Strategies For Small States Like Brunei Darussalam, Brice Tseen Fu Lee, Gulshan Bibi Ms Dec 2023

Power Projection And Counter-Terrorism: Strategies For Small States Like Brunei Darussalam, Brice Tseen Fu Lee, Gulshan Bibi Ms

Journal of Terrorism Studies

This study delves into the intricacies of power projection strategies and counter-terrorism measures, emphasizing their relevance to small states, with a specific focus on Brunei Darussalam. Using a dual matrix model, the research categorizes various strategies based on risk-reward parameters, offering a structured insight into potential approaches these states can employ against potential aggressors. The counter-terrorism matrix is the initial focal point, recognizing the contemporary significance of terror threats and their unique challenges for small nations. Subsequently, the power projection matrix offers a broader view of defense tactics beyond counter-terrorism. By synthesizing information from primary academic sources, the study aims …


Humor And Surveillance - “That’S Not Funny” (Or Is It?): For Professor Serge Gutwirth On His Retirement, Gary T. Marx Oct 2023

Humor And Surveillance - “That’S Not Funny” (Or Is It?): For Professor Serge Gutwirth On His Retirement, Gary T. Marx

Secrecy and Society

No abstract provided.


The Perspective Of University Students On The Availability And Effectiveness Of Cyberbullying Prevention And Response Initiatives On Campus: Virtual Semi-Structured Interviews On Resources, Barriers, And Solutions, Molly-Gloria R. Patel, Anabel Quan-Haase Oct 2023

The Perspective Of University Students On The Availability And Effectiveness Of Cyberbullying Prevention And Response Initiatives On Campus: Virtual Semi-Structured Interviews On Resources, Barriers, And Solutions, Molly-Gloria R. Patel, Anabel Quan-Haase

Journal of Educational Research and Practice

Cyberbullying is a problem in educational settings, and much of the research has focused on the development of effective prevention and response initiatives. Because of the vulnerability of children, cyberbullying research and intervention programs have largely targeted elementary students. A growing body of research has shown that cyberbullying is not limited to elementary settings, but the problem is also prevalent in postsecondary institutions, with potentially severe negative consequences. Yet, there is a gap in research about interventions tailored to this life stage. To address this gap, we conducted virtual semistructured interviews through Zoom with 21 university students on the availability …


Article Summaries Sep 2023

Article Summaries

Journal of Nonprofit Innovation

No abstract provided.


Online Protection Laws.Full Issue Sep 2023

Online Protection Laws.Full Issue

Journal of Nonprofit Innovation

No abstract provided.


Online Safety Laws By Country, Haoming Song, Angie Holzer Sep 2023

Online Safety Laws By Country, Haoming Song, Angie Holzer

Journal of Nonprofit Innovation

No abstract provided.


S&T Innovation Study For The Digital Belt And Road, Huadong Guo, Fang Chen, Yu Chen, Guozhuang Shen, Chuansheng Liu, Yunwei Tang Sep 2023

S&T Innovation Study For The Digital Belt And Road, Huadong Guo, Fang Chen, Yu Chen, Guozhuang Shen, Chuansheng Liu, Yunwei Tang

Bulletin of Chinese Academy of Sciences (Chinese Version)

Digital technology can promote the sustainable development of countries and regions along the route of Belt and Road Initiative and help enhance interconnectivity in technology, standards, rules, and digital infrastructure. Science and technology play a crucial role in the construction of the Digital Belt and Road. However, currently, some countries and regions along the route of Belt and Road Initiative lack sufficient digital infrastructure, and there is a shortage of critical core digital technology and challenges in its promotion. It is essential to build an innovative ecosystem for the Digital Belt and Road that includes facilities, technology, mechanisms, and capabilities …


Harnessing Large Language Models To Simulate Realistic Human Responses To Social Engineering Attacks: A Case Study, Mohammad Asfour, Juan Carlos Murillo Aug 2023

Harnessing Large Language Models To Simulate Realistic Human Responses To Social Engineering Attacks: A Case Study, Mohammad Asfour, Juan Carlos Murillo

International Journal of Cybersecurity Intelligence & Cybercrime

The research publication, “Generative Agents: Interactive Simulacra of Human Behavior,” by Stanford and Google in 2023 established that large language models (LLMs) such as GPT-4 can generate interactive agents with credible and emergent human-like behaviors. However, their application in simulating human responses in cybersecurity scenarios, particularly in social engineering attacks, remains unexplored. In addressing that gap, this study explores the potential of LLMs, specifically the Open AI GPT-4 model, to simulate a broad spectrum of human responses to social engineering attacks that exploit human social behaviors, framing our primary research question: How does the simulated behavior of human targets, based …


Understanding The Use Of Artificial Intelligence In Cybercrime, Katalin Parti, Thomas Dearden, Sinyong Choi Aug 2023

Understanding The Use Of Artificial Intelligence In Cybercrime, Katalin Parti, Thomas Dearden, Sinyong Choi

International Journal of Cybersecurity Intelligence & Cybercrime

Artificial intelligence is one of the newest innovations which offenders exploit to satisfy their criminal desires. Although understanding cybercrime that is associated with this relatively new technology is essential in developing proper preventive measures, little has been done to examine this area. Therefore, this paper provides an overview of the two articles featured in the special issue of the International Journal of Cybersecurity Intelligence and Cybercrime, one about deepfakes in the metaverse and the other about social engineering attacks. The articles were written by the winners of the student paper competition at the 2023 International White Hat Conference.


Victimization By Deepfake In The Metaverse: Building A Practical Management Framework, Julia Stavola, Kyung-Shick Choi Aug 2023

Victimization By Deepfake In The Metaverse: Building A Practical Management Framework, Julia Stavola, Kyung-Shick Choi

International Journal of Cybersecurity Intelligence & Cybercrime

Deepfake is digitally altered media aimed to deceive online users for political favor, monetary gain, extortion, and more. Deepfakes are the prevalent issues of impersonation, privacy, and fake news that cause substantial damage to individuals, groups, and organizations. The metaverse is an emerging 3-dimensional virtual platform led by AI and blockchain technology where users freely interact with each other. The purpose of this study is to identify the use of illicit deep fakes which can potentially contribute to cybercrime victimization in the metaverse. The data will be derived from expert interviews (n=8) and online open sources to design a framework …


A Historical Perspective On Today’S Recruiting Crisis, Brian Mcallister Linn Aug 2023

A Historical Perspective On Today’S Recruiting Crisis, Brian Mcallister Linn

The US Army War College Quarterly: Parameters

This article analyzes the US Army’s successive recruiting crises, identifying their consistent patterns and the efforts to resolve them, and makes three provocative arguments. First, there is a long-standing institutional tension between recruiting personnel for the combat arms and technical and administrative specialists. Second, many of today’s talent management problems were first identified in a 1907 General Staff report and reiterated in subsequent studies. Third, the Army has pursued innovative recruitment strategies, but much of their success depended on factors outside the service’s control. The essay concludes with four history-based recruiting lessons and an affirmation that the 2019 Army People …


Parameters Autumn 2023, Usawc Press Aug 2023

Parameters Autumn 2023, Usawc Press

The US Army War College Quarterly: Parameters

No abstract provided.