Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

PDF

Journal

2018

Discipline
Institution
Keyword
Publication

Articles 1 - 30 of 702

Full-Text Articles in Entire DC Network

Introduction To Mca Issue, “Systemic Cyber Defense", Chris C. Demchak Dec 2018

Introduction To Mca Issue, “Systemic Cyber Defense", Chris C. Demchak

Military Cyber Affairs

No abstract provided.


The Evaluation Of Project-Based Learning In Malaysia: Propose A New Framework For Polytechnics System, Sadrina Sadrina, Ramlee Mustapha, Muhammad Ichsan Dec 2018

The Evaluation Of Project-Based Learning In Malaysia: Propose A New Framework For Polytechnics System, Sadrina Sadrina, Ramlee Mustapha, Muhammad Ichsan

Jurnal Pendidikan Vokasi

Technical and Vocational Education is one of the various disciplines that believed could encourage the country's economic growth. Project-Based Learning or PBL was introduced in the Malaysian polytechnics curriculum in terms to produce creative and innovative graduates Thus, Project-Based Learning was introduced because of the ineffectiveness of the traditional lecture method. This study was a kind of descriptive study intended to examine the perception of students and supervisors regarding the Project-Based Learning at one Polytechnic in Malaysia. A population of 170 would be represented by a sample size of 118 respondents and 43 supervisors to participate in the study. The …


Strategi Peningkatan Brand Awareness Mobile Ticketing Apps Melalui Metode Integrated Marketing Communication, Arius Krypton Dec 2018

Strategi Peningkatan Brand Awareness Mobile Ticketing Apps Melalui Metode Integrated Marketing Communication, Arius Krypton

Jurnal Sosial Humaniora Terapan

Effectiveness of Integrated Marketing Communications on Aware Awareness Applications MobileTicketing Goers. Goers is one of the mobile-ticketing apps and information providers around events in Jakarta and Bandung. Goers was first launched on May 15, 2015 for the iOS operating system and August 17, 2015 for the Android system. Goers are under the auspices of PT Sanraya Adi Nattaya and Sammy Ramadan as CoFounder and CEO of Goers. Goers Travel for 2 years, has been working with more than 300 partners and provides thousands of information about events and events every month through applications, websites, and social media.Since the beginning of …


An Initial Exploration On Terrorism Issues In Malaysia And Indonesia: The Case Of The Wall Street Journal, Fauziah Hassan, Sofia Hayati Yuso㯬‚¬, Siti Zobidah Omar Dec 2018

An Initial Exploration On Terrorism Issues In Malaysia And Indonesia: The Case Of The Wall Street Journal, Fauziah Hassan, Sofia Hayati Yuso㯬‚¬, Siti Zobidah Omar

Informasi

The symbiotic relationship between Islam and media is inevitable. The frequent of media coverage about Islam has been researched by many especially since the remarkable incident of September 11 in 2001. From that moment, Islam has been viewed and labelled as negative by the Western media specifically to the Muslims living in America and those in the Middle East countries. This phenomenon has been contagious to the Muslims in Southeast Asian countries such as Malaysia and Indonesia as these two countries are believed to have a connection with recent terrorist groups such as Islamic State of Iraq and the Levant …


The Media Framing Of The Selfie Between Miss Israel And Miss Lebanon From Cnn & Bbc Towards The Politic Interest, Sabrina Bawazier, Lestari Nurhajati Dec 2018

The Media Framing Of The Selfie Between Miss Israel And Miss Lebanon From Cnn & Bbc Towards The Politic Interest, Sabrina Bawazier, Lestari Nurhajati

Informasi

An international controversy occurred after the selfie between Miss Israel and Miss Lebanon went viral. The Instagram post received many responds from public whether its positive or negative feedbacks, the selfie itself involves a group photo of the Miss Universe contestants that are Miss Israel, Miss Lebanon, Miss Slovak and Miss Japan. After the post was posted by Miss Israel and went viral, Miss Lebanon received many critics relating to her existence in the picture. She was then accused of violating the Lebanon policy for being in contact with an Israeli whereas there are strict rules against any form of …


Family's Communication Pattern In Preventing Students' Violence In Yogyakarta, Chatia Hastasari, Suranto Aw, Mami Hajaroh Dec 2018

Family's Communication Pattern In Preventing Students' Violence In Yogyakarta, Chatia Hastasari, Suranto Aw, Mami Hajaroh

Informasi

This investigates the family's communication pattern to avoid senior high school student violence in Yogyakarta. This study employs a qualitative method taking a sample of ten people consist of students' parents (SMAN 6 Yogyakarta, SMAN 8 Yogyakarta, SMAN 9 Yogyakarta, SMA Bopkri 2 Yogyakarta, SMA Muhammadiyah 7 Yogyakarta, and SMA Tamansiswa Yogyakarta); teachers and society figure. The results are (1) Communication pattern which is used effectively to avoid students' violence is one way communication. In this situation parents can give advice and become a role model for their children; and (2) Communication patterns which are used innefectively to avoid students' …


From The Editors, Carole L. Hollingsworth, Michael E. Whitman, Herbert J. Mattord Dec 2018

From The Editors, Carole L. Hollingsworth, Michael E. Whitman, Herbert J. Mattord

Journal of Cybersecurity Education, Research and Practice

Welcome to the Fall 2018 issue of the Journal of Cybersecurity Education, Research, and Practice (JCERP). On behalf of the editorial team, we thank you for taking the time to read this issue and strongly encourage you to submit an article for consideration in an upcoming edition.


Using A Game To Improve Phishing Awareness, Patrickson Weanquoi, Jaris Johnson, Jinghua Zhang Dec 2018

Using A Game To Improve Phishing Awareness, Patrickson Weanquoi, Jaris Johnson, Jinghua Zhang

Journal of Cybersecurity Education, Research and Practice

Cybersecurity education has become increasingly critical as we spend more of our everyday lives online. Research shows that college students are mostly unaware of the many online dangers. To teach students about cybersecurity using their preferred medium, gaming, we developed an educational 2D game called “Bird’s Life” that aims to teach college students, as well as general interest individuals, about phishing. Players will come to understand phishing attacks and how to avoid them in real-world scenarios through a fun gaming context. The game can be deployed to multiple platforms such as PC, web, and mobile devices. To measure the effect …


Using Case Studies To Teach Cybersecurity Courses, Yu Cai Dec 2018

Using Case Studies To Teach Cybersecurity Courses, Yu Cai

Journal of Cybersecurity Education, Research and Practice

This paper introduces a holistic and case-analysis teaching model by integrating case studies into cybersecurity courses. The proposed model starts by analyzing real-world cyber breaches. Students look into the details of these attacks and learn how these attacks took place from the beginning to the end. During the process of case analysis, a list of security topics reflecting different aspects of these breaches is introduced. Through guided in-class discussion and hands-on lab assignments, student learning in lecture will be reinforced. Overall, the entire cybersecurity course is driven by case studies. The proposed model is great for teaching cybersecurity. First, the …


An Examination Of Cybersecurity Knowledge Transfer: Teaching, Research, And Website Security At U.S. Colleges And Universities, Aditya Gupta, James R. Wolf Dec 2018

An Examination Of Cybersecurity Knowledge Transfer: Teaching, Research, And Website Security At U.S. Colleges And Universities, Aditya Gupta, James R. Wolf

Journal of Cybersecurity Education, Research and Practice

This work seeks to answer the question: Does faculty cybersecurity knowledge gained from teaching and research transfer to other IT units in the university? Specifically, do colleges and universities that excel in cybersecurity teaching and research have more secure websites? This work explores a unique setting where the knowledge of the source and recipient are both directly related and observable without outside intervention. Our study employed data from 591 U.S. colleges and universities, the National Centers of Academic Excellence (CAE) program, accepted paper data from the ACM Conference on Computer and Communications Security (CCS) and the IEEE Symposium on Security …


The Communication Effectiveness Of Scientist-Stakeholder Partnerships Addressing Agriculture And Natural Resources Issues: An Analysis Of The Media Attention And Media Framing Of The Florida Water And Climate Alliance, Shuyang Qu, Tracy Irani Dec 2018

The Communication Effectiveness Of Scientist-Stakeholder Partnerships Addressing Agriculture And Natural Resources Issues: An Analysis Of The Media Attention And Media Framing Of The Florida Water And Climate Alliance, Shuyang Qu, Tracy Irani

Journal of Applied Communications

Scientist-stakeholder partnerships are formed by scientists from academic institutions and industry representatives in an effort to address contingent science issues such as climate change, inform the public and influence public policies. Such organizations often lack expertise in communicating to the public and conducting outreach which are crucial components to building a good reputation. This study selected Florida Water and Climate Alliance [FWCA] as an example of such an organization, exploring its media attention and media framing to assess the visibility and reputation of [FWCA]. Results showed very limited media attention had been devoted to [FWCA]. The framing analysis results indicated …


Front Matter Dec 2018

Front Matter

Journal of Digital Forensics, Security and Law

No abstract provided.


Forensic Analysis Of A Crash-Damaged Cheerson Cx-20 Auto Pathfinder Drone, Ian N. Mcateer, Peter Hannay, Muhammad I. Malik, Zubair Baig Dec 2018

Forensic Analysis Of A Crash-Damaged Cheerson Cx-20 Auto Pathfinder Drone, Ian N. Mcateer, Peter Hannay, Muhammad I. Malik, Zubair Baig

Journal of Digital Forensics, Security and Law

Long gone are the days when Unmanned Aerial Vehicles (UAVs) and drones (multirotor UAVs) were the exclusive domain of the military for surveillance or tactical strike purposes. For relatively little money mainly due to high-tech progression in microprocessor design, anyone can now purchase a drone with GNSS-tracking capabilities and can support a live high-resolution video feed to its flight controller. The global population of drones has sky- rocketed in recent years as this new technology has been embraced for both its recreational and commercial applications. However, the more nefarious members of society have also recognized the potential for using drones …


Russia Today, Cyberterrorists Tomorrow: U.S. Failure To Prepare Democracy For Cyberspace, Jonathan F. Lancelot Dec 2018

Russia Today, Cyberterrorists Tomorrow: U.S. Failure To Prepare Democracy For Cyberspace, Jonathan F. Lancelot

Journal of Digital Forensics, Security and Law

This paper is designed to expose vulnerabilities within the US electoral system, the use of cyberspace to exploit weaknesses within the information assurance strategies of the democratic and republican party organizations, and deficiencies within the social media communications and voting machine exploits. A brief history of discriminatory practices in voting rights and voting access will be set as the foundation for the argument that the system is vulnerable in the cyber age, and the need for reform at the local, state and national levels will be emphasized. The possibility of a foreign nation-state influencing the outcome of an election by …


Kolaborasi Antara Universitas, Industri Dan Pemerintah Dalam Meningkatkan Inovasi Dan Kesejahteraan Masyarakat: Konsep, Implementasi Dan Tantangan, Basuki M. Mukhlish Dec 2018

Kolaborasi Antara Universitas, Industri Dan Pemerintah Dalam Meningkatkan Inovasi Dan Kesejahteraan Masyarakat: Konsep, Implementasi Dan Tantangan, Basuki M. Mukhlish

Jurnal Administrasi Bisnis Terapan

In the study of inter-organizational relationships, there is a tendency to look at relationships between two organizations (dyadic), and social networks are considered to be a combination of a number of dyadic relationships. There are often third parties who play a role in influencing the relationship between the two organizations, so the relationship becomes triadic. The third party referred to here is a relationship counselor who has a go-between role to safeguard, cultivate and develop social capital, help, adjust and resolve relationships between the two parties. One of the institutions that have a third role are innovation centers that have …


The Narration Of Digital Literacy Movement In Indonesia, Mery Yanti, Yusnaini Yusnaini Dec 2018

The Narration Of Digital Literacy Movement In Indonesia, Mery Yanti, Yusnaini Yusnaini

Informasi

This article aims to analyze the digital literacy movement in Indonesia and its determinant using the narrative approach. Empirical research is carried out with qualitative content analysis methods. The primary data of the study came from 255 online news which contained digital literacy keywords that were detected by Google search engines and published in trusted online media. Secondary data collected from publications of government, private, and civil society organizations related to digital literacy. We use an interactive model and Atlas.ti 8 to analyze research data. The results showed that each actor had a variety of views about the definitions and …


Virus Wannacry Dalam Teks Berita: Analisis Wacana Kritis Atas Laman Kemkominfo, Kompas.Com, Dan Jawapos.Com, Izhatullaili Izhatullaili Dec 2018

Virus Wannacry Dalam Teks Berita: Analisis Wacana Kritis Atas Laman Kemkominfo, Kompas.Com, Dan Jawapos.Com, Izhatullaili Izhatullaili

Paradigma: Jurnal Kajian Budaya

Critical Discourse Analysis is a study that analyzes language usage in terms of linguistic features and a social practice. Each type of mass media shows a different tendency in conveying information through the language it uses. Likewise, there are some differences between government and non-government media as well. The data in this study were obtained by collecting texts related to WannaCry virus news taken from the Ministry of Communication and Information Technology, Kompas.com and JawaPos.com. Abductive inferences technique was used to draw conclusions by connecting one text to other texts. The different tendencies in media’s linguistic features and ideologies were …


Pengaruh Gaya Komunikasi Dosen Dalam Proses Pembelajaran Terhadap Motivasi Belajar Mahasiswa Humas Program Pendidikan Vokasi, Pijar Suciati, Mareta Maulidiyanti, Fajar M. Triawinata, Nadya Rizkiyanti Dec 2018

Pengaruh Gaya Komunikasi Dosen Dalam Proses Pembelajaran Terhadap Motivasi Belajar Mahasiswa Humas Program Pendidikan Vokasi, Pijar Suciati, Mareta Maulidiyanti, Fajar M. Triawinata, Nadya Rizkiyanti

Jurnal Sosial Humaniora Terapan

Effect of Lecturer Communication Style in Learning-Teaching Process on Motivation of Student Learning in Class. The birth of online media can not be separated from the booming of online media that occurred abroad in the mid-1990s. People glance online media because there is saturation in the print media market post-reformation 1998. Online journalism is increasingly in demand, this is influenced by the development of technology and the tendency of people who prefer practical things, such as ease of reading online news through a gadget that can be done where just and anytime. Online news portals detik.com, kompas.com, and tempo.co occupies …


Good Governance Concept In Shaping Uzbekistan’S Strategy Of Action, D. Khamidova Dec 2018

Good Governance Concept In Shaping Uzbekistan’S Strategy Of Action, D. Khamidova

International Relations: Politics, Economics, Law

Good governance is process of making decision, examining, implementing and monitoring of state affairs. This broad notion and concept rather than government. Uzbekistan has already took measures; there are many things to be done in the field of good governance. In this context, it is critical important to build a shared vision of strategy in order to achieve desired goals.


The Development Of Concept Of Territory In International Relations, Ghifari Athallah Ramadhan Dec 2018

The Development Of Concept Of Territory In International Relations, Ghifari Athallah Ramadhan

Global: Jurnal Politik Internasional

The concept of territory, a politicized space, is not really explored in International Relations, even though territory is where International Relations happen physically. This article explores the development of the concept of territory in International Relations. By seeing the development of the concept of territory in International Relations, I could see the main arguments regarding territory. For example, I could understand the argument behind the jargon of “borderless world” or “return of geography”. In order to fully explain the development of the concept of territory in International Relations, I divide my research into five parts. First, I would describe the …


A Social Media Policy For Clinical Mental Health Counseling Programs, Rebecca A. Willow, David Tobin, Wei Y. Chong, Angela Jeffery, Danielle Strohmeyer, Nicole Morine Dec 2018

A Social Media Policy For Clinical Mental Health Counseling Programs, Rebecca A. Willow, David Tobin, Wei Y. Chong, Angela Jeffery, Danielle Strohmeyer, Nicole Morine

Journal of Counselor Preparation and Supervision

The American Counseling Association 2014 Ethical Code mandates that counselors who engage in social media communication develop knowledge and skills related to ethical and legal considerations (American Counseling Association, 2014). In response to these expectations, this article introduces a social media policy created by faculty in a Clinical Mental Health Counseling program. An example and review of an implemented social media policy is provided, along with guidelines for a student-led training program. Case examples are provided that illustrate potential dilemmas of student misuse of social media, along with examples of faculty interventions. This article is designed to contribute to the …


Developing A Pre-Practicum Environment For Beginning Counselors: Growing My Counselor Educator Self, Logan M. Lamprecht, Sneha Pitre Dec 2018

Developing A Pre-Practicum Environment For Beginning Counselors: Growing My Counselor Educator Self, Logan M. Lamprecht, Sneha Pitre

Journal of Counselor Preparation and Supervision

This paper is a narrative of the challenges experienced as a faculty member in an attempt to transform the existing educational model for how school and clinical mental health counselors are trained to enter field-based clinical experiences with students and clients. The author shares the pre-practicum laboratory training as an important step towards the growth of a counselor both personally and professionally. The laboratory training addresses aspects of student anxiety and self-efficacy with relation to live supervision with use of technology, nature of feedback, reflective journaling, reflective teams, and process group experiences as pedagogical adjuncts to enhance the training and …


Warning! Speak At Your Own Risk: First Amendment Restrictions On Off-Campus Physical, Emotional, Or Cyber Bullying, Melissa Anne Springer Dec 2018

Warning! Speak At Your Own Risk: First Amendment Restrictions On Off-Campus Physical, Emotional, Or Cyber Bullying, Melissa Anne Springer

University of Cincinnati Law Review

No abstract provided.


The Land And Naval Forces Clause, Dakota S. Rudesill Dec 2018

The Land And Naval Forces Clause, Dakota S. Rudesill

University of Cincinnati Law Review

No abstract provided.


Integrated Intelligent Systems For Industrial Automation: The Challenges Of Industry 4.0, Information Granulation And Understanding Agents ., N.R Yusupbekov, V.B Tarassov Dec 2018

Integrated Intelligent Systems For Industrial Automation: The Challenges Of Industry 4.0, Information Granulation And Understanding Agents ., N.R Yusupbekov, V.B Tarassov

Chemical Technology, Control and Management

The objective of the paper consists in considering the challenges of new automation paradigm Industry 4.0 and reviewing the-state-of-the-art in the field of its enabling information and communication technologies, including Cyberphysical Systems, Cloud Computing, Internet of Things and Big Data. Some ways of multi-dimensional, multi-faceted industrial Big Data representation and analysis are suggested. The fundamentals of Big Data processing with using Granular Computing techniques have been developed. The problem of constructing special cognitive tools to build artificial understanding agents for Integrated Intelligent Enterprises has been faced.


Counteraction To Cyber Terrorism: International Legal And Criminal Legal Aspects, A. Rasulev Dec 2018

Counteraction To Cyber Terrorism: International Legal And Criminal Legal Aspects, A. Rasulev

Review of law sciences

This article analysis the international acts and standards of the foreign criminal legislation providing questions of counteraction to cyberterrorism.


Shanghai Cooperation Organization As The Basis Economic Development And Collective Security, D. Musaev Dec 2018

Shanghai Cooperation Organization As The Basis Economic Development And Collective Security, D. Musaev

Review of law sciences

The article is devoted to one of the directions of development of international economic relations at the regional level - the Shanghai Cooperation Organization (SCO). The process of the formation of the SCO is considered, the state, problems and perspectives of the external economic interaction of its member states are analyzed. An assessment of the conditions, characteristics and development possibilities of the SCO is given.


The Impact Of Smart Media Technologies (Smt) On The Spiritual Experience Of Hajj Pilgrims, Jahanzeeb Qurashi, Richard A. Sharpley Dec 2018

The Impact Of Smart Media Technologies (Smt) On The Spiritual Experience Of Hajj Pilgrims, Jahanzeeb Qurashi, Richard A. Sharpley

International Journal of Religious Tourism and Pilgrimage

Over the last three decades, information and communication technologies have advanced rapidly and continue to do so. Nowadays, the popularity and spread of socalled Smart Media Technologies (SMT) is not only transforming the lives of tourists around the world in general, but is impacting on the experience of pilgrims on the Hajj in Saudi Arabia in particular. Indeed, the Saudi government has undertaken a number of initiatives to encourage the use of SMT in the religious tourism industry. Specifically, the availability of SMT services such as Hajj Apps, E-bracelets for pilgrims, free WIFI and mobile charging services in Grand Mosques …


Integrating Machine Learning In Law: A Precis Of Best Practices For Initial Law Firm Adoption, J. Mark Phillips Dec 2018

Integrating Machine Learning In Law: A Precis Of Best Practices For Initial Law Firm Adoption, J. Mark Phillips

The Journal of Business, Entrepreneurship & the Law

Much of the mystery surrounding machine learning lays not just in how it functions, but in how it is applied. This is especially true in the field of law, where the implementation of artificial intelligence has lagged other fields. This précis distills best practices of machine learning implementation and applies them succinctly to the unique environment of law. Guiding principles and considerations are provided for the technology team, the nature of law firm data, and the commitment level of the adopting law firm.


Curb Your Enthusiasm: The Real Implications Of Blockchain In The Legal Industry, Justin Evans Dec 2018

Curb Your Enthusiasm: The Real Implications Of Blockchain In The Legal Industry, Justin Evans

The Journal of Business, Entrepreneurship & the Law

No abstract provided.