Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

University of South Florida

Journal

Discipline
Keyword
Publication Year
Publication
File Type

Articles 1 - 30 of 18013

Full-Text Articles in Entire DC Network

Intermediate Conformity Of Hrm Practices In Host Countries: Why And How They Work, Wenjuan Guo Sep 2024

Intermediate Conformity Of Hrm Practices In Host Countries: Why And How They Work, Wenjuan Guo

Journal of Global Business Insights

The institutional theory suggests that multinational enterprises (MNEs) need to conform to institutional norms to gain legitimacy, thereby enhancing their survival in host countries. Conversely, from the perspective of business strategy, MNEs gain a competitive advantage by leveraging organizational capabilities worldwide. These two perspectives imply that MNEs face conflicting pressures when adopting HRM practices in their host country subsidiaries. This article discusses the rationale for why MNEs’ subsidiaries should intermediately conform to both internal and external institutional forces and adopt a combination of home and host country HRM practices. Furthermore, it suggests that intermediate conformity contributes to a higher survival …


Antecedents Of Entrepreneurial Activity And Poverty: Mediating Effect Of Entrepreneurial Activity, Bashir I. Bugaje, Azmawani Abd Rahman, Rusmawati Said, Jo A. Ho, Abubakar A. Adamu Sep 2024

Antecedents Of Entrepreneurial Activity And Poverty: Mediating Effect Of Entrepreneurial Activity, Bashir I. Bugaje, Azmawani Abd Rahman, Rusmawati Said, Jo A. Ho, Abubakar A. Adamu

Journal of Global Business Insights

Poverty rates in Sub-Saharan Africa (SSA) have risen, with 47% of the region’s population living in poverty. In Nigeria, approximately 87 million are classified as extremely poor. Existing research on the relationship between entrepreneurship and poverty in this region is fragmented and inconsistent. Traditional economic measures of poverty have proven inadequate, prompting the need for a multidimensional approach. The paper examined the mediating effect of entrepreneurial activity on the relationship between the precursors of entrepreneurship and poverty. The study used a survey method and partial least squares structural equation modeling (PLS-SEM) to analyze the data, which confirmed all hypotheses, revealing …


“In My Blood”: External Factors For International Stem Postdoctoral Scholars’ Career Decisions, Kathryn J. Watson, Sylvia L. Mendez Jul 2024

“In My Blood”: External Factors For International Stem Postdoctoral Scholars’ Career Decisions, Kathryn J. Watson, Sylvia L. Mendez

Journal of Global Education and Research

This instrumental case study (Stake, 1995) explores the external factors that influence international science, technology, engineering, and mathematics (STEM) postdoctoral scholars in the United States to pursue a career in STEM. Interviews with 20 international STEM postdoctoral scholars were analyzed deductively to shed light on their unique backgrounds and experiences. Three themes emerged: (a) parents were highly encouraging, (b) a love of science was nurtured in school, and (c) they were eager to engage in and promote scientific innovation. These findings illustrate the ways in which family, schools, and community influence the STEM career trajectories of international postdoctoral scholars.


Too Little, Too Late: The Icc And The Politics Of Prosecutorial Procrastination In Georgia, Marco Bocchese May 2024

Too Little, Too Late: The Icc And The Politics Of Prosecutorial Procrastination In Georgia, Marco Bocchese

Genocide Studies and Prevention: An International Journal

In August 2008, just days after belligerent parties had reached a ceasefire agreement, the Office of the Prosecutor (OTP) announced the opening of a preliminary examination into the situation of Georgia. Yet, it was only in March 2022 that International Criminal Court (ICC) Chief Prosecutor Karim Khan applied for arrest warrants in relation to three individuals from Georgia’s breakaway region of South Ossetia. That said, how can such prolonged inaction be accounted for? How much blame does the OTP carry for it? And how did ICC-state relations develop over time? This paper conducts a within-case analysis of the situation of …


Improving Ethics Surrounding Collegiate-Level Hacking Education: Recommended Implementation Plan & Affiliation With Peer-Led Initiatives, Shannon Morgan, Dr. Sanjay Goel May 2024

Improving Ethics Surrounding Collegiate-Level Hacking Education: Recommended Implementation Plan & Affiliation With Peer-Led Initiatives, Shannon Morgan, Dr. Sanjay Goel

Military Cyber Affairs

Cybersecurity has become a pertinent concern, as novel technological innovations create opportunities for threat actors to exfiltrate sensitive data. To meet the demand for professionals in the workforce, universities have ramped up their academic offerings to provide a broad range of cyber-related programs (e.g., cybersecurity, informatics, information technology, digital forensics, computer science, & engineering). As the tactics, techniques, and procedures (TTPs) of hackers evolve, the knowledge and skillset required to be an effective cybersecurity professional have escalated accordingly. Therefore, it is critical to train cyber students both technically and theoretically to actively combat cyber criminals and protect the confidentiality, integrity, …


Using Digital Twins To Protect Biomanufacturing From Cyberattacks, Brenden Fraser-Hevlin, Alec W. Schuler, B. Arda Gozen, Bernard J. Van Wie May 2024

Using Digital Twins To Protect Biomanufacturing From Cyberattacks, Brenden Fraser-Hevlin, Alec W. Schuler, B. Arda Gozen, Bernard J. Van Wie

Military Cyber Affairs

Understanding of the intersection of cyber vulnerabilities and bioprocess regulation is critical with the rise of artificial intelligence and machine learning in manufacturing. We detail a case study in which we model cyberattacks on network-mediated signals from a novel bioreactor, where it is important to control medium feed rates to maintain cell proliferation. We use a digital twin counterpart reactor to compare glucose and oxygen sensor signals from the bioreactor to predictions from a kinetic growth model, allowing discernment of faulty sensors from hacked signals. Our results demonstrate a successful biomanufacturing cyberattack detection system based on fundamental process control principles.


Surmounting Challenges In Aggregating Results From Static Analysis Tools, Dr. Ann Marie Reinhold, Brittany Boles, A. Redempta Manzi Muneza, Thomas Mcelroy, Dr. Clemente Izurieta May 2024

Surmounting Challenges In Aggregating Results From Static Analysis Tools, Dr. Ann Marie Reinhold, Brittany Boles, A. Redempta Manzi Muneza, Thomas Mcelroy, Dr. Clemente Izurieta

Military Cyber Affairs

Aggregation poses a significant challenge for software practitioners because it requires a comprehensive and nuanced understanding of raw data from diverse sources. Suites of static-analysis tools (SATs) are commonly used to assess organizational security but simultaneously introduce significant challenges. Challenges include unique results, scales, configuration environments for each SAT execution, and incompatible formats between SAT outputs. Here, we document our experiences addressing these issues. We highlight the problem of relying on a single vendor's SAT version and offer a solution for aggregating findings across multiple SATs, aiming to enhance software security practices and deter threats early with robust defensive operations.


Characterizing Advanced Persistent Threats Through The Lens Of Cyber Attack Flows, Logan Zeien, Caleb Chang, Ltc Ekzhin Ear, Dr. Shouhuai Xu May 2024

Characterizing Advanced Persistent Threats Through The Lens Of Cyber Attack Flows, Logan Zeien, Caleb Chang, Ltc Ekzhin Ear, Dr. Shouhuai Xu

Military Cyber Affairs

Effective cyber defense must build upon a deep understanding of real-world cyberattacks to guide the design and deployment of appropriate defensive measures against current and future attacks. In this abridged paper (of which the full paper is available online), we present important concepts for understanding Advanced Persistent Threats (APTs), our methodology to characterize APTs through the lens of attack flows, and a detailed case study of APT28 that demonstrates our method’s viability to draw useful insights. This paper makes three technical contributions. First, we propose a novel method of constructing attack flows to describe APTs. This abstraction allows technical audiences, …


Generative Machine Learning For Cyber Security, James Halvorsen, Dr. Assefaw Gebremedhin May 2024

Generative Machine Learning For Cyber Security, James Halvorsen, Dr. Assefaw Gebremedhin

Military Cyber Affairs

Automated approaches to cyber security based on machine learning will be necessary to combat the next generation of cyber-attacks. Current machine learning tools, however, are difficult to develop and deploy due to issues such as data availability and high false positive rates. Generative models can help solve data-related issues by creating high quality synthetic data for training and testing. Furthermore, some generative architectures are multipurpose, and when used for tasks such as intrusion detection, can outperform existing classifier models. This paper demonstrates how the future of cyber security stands to benefit from continued research on generative models.


Machine Learning Security For Tactical Operations, Dr. Denaria Fields, Shakiya A. Friend, Andrew Hermansen, Dr. Tugba Erpek, Dr. Yalin E. Sagduyu May 2024

Machine Learning Security For Tactical Operations, Dr. Denaria Fields, Shakiya A. Friend, Andrew Hermansen, Dr. Tugba Erpek, Dr. Yalin E. Sagduyu

Military Cyber Affairs

Deep learning finds rich applications in the tactical domain by learning from diverse data sources and performing difficult tasks to support mission-critical applications. However, deep learning models are susceptible to various attacks and exploits. In this paper, we first discuss application areas of deep learning in the tactical domain. Next, we present adversarial machine learning as an emerging attack vector and discuss the impact of adversarial attacks on the deep learning performance. Finally, we discuss potential defense methods that can be applied against these attacks.


Securing The Void: Assessing The Dynamic Threat Landscape Of Space, Brianna Bace, Dr. Unal Tatar May 2024

Securing The Void: Assessing The Dynamic Threat Landscape Of Space, Brianna Bace, Dr. Unal Tatar

Military Cyber Affairs

Outer space is a strategic and multifaceted domain that is a crossroads for political, military, and economic interests. From a defense perspective, the U.S. military and intelligence community rely heavily on satellite networks to meet national security objectives and execute military operations and intelligence gathering. This paper examines the evolving threat landscape of the space sector, encompassing natural and man-made perils, emphasizing the rise of cyber threats and the complexity introduced by dual-use technology and commercialization. It also explores the implications for security and resilience, advocating for collaborative efforts among international organizations, governments, and industry to safeguard the space sector.


Commercial Enablers Of China’S Cyber-Intelligence And Information Operations, Ethan Mansour, Victor Mukora May 2024

Commercial Enablers Of China’S Cyber-Intelligence And Information Operations, Ethan Mansour, Victor Mukora

Military Cyber Affairs

In a globally commercialized information environment, China uses evolving commercial enabler networks to position and project its goals. They do this through cyber, intelligence, and information operations. This paper breaks down the types of commercial enablers and how they are used operationally. It will also address the CCP's strategy to gather and influence foreign and domestic populations throughout cyberspace. Finally, we conclude with recommendations for mitigating the influence of PRC commercial enablers.


Full Issue, The Migrant Apr 2024

Full Issue, The Migrant

The Migrant - Tennessee Ornithological Society

No abstract provided.


Full Issue, The Migrant Apr 2024

Full Issue, The Migrant

The Migrant - Tennessee Ornithological Society

No abstract provided.


Full Issue, The Migrant Apr 2024

Full Issue, The Migrant

The Migrant - Tennessee Ornithological Society

No abstract provided.


Full Issue, The Migrant Apr 2024

Full Issue, The Migrant

The Migrant - Tennessee Ornithological Society

No abstract provided.


Full Issue, The Migrant Apr 2024

Full Issue, The Migrant

The Migrant - Tennessee Ornithological Society

No abstract provided.


Full Issue, The Migrant Apr 2024

Full Issue, The Migrant

The Migrant - Tennessee Ornithological Society

No abstract provided.


Full Issue, The Migrant Apr 2024

Full Issue, The Migrant

The Migrant - Tennessee Ornithological Society

No abstract provided.


Full Issue, The Migrant Apr 2024

Full Issue, The Migrant

The Migrant - Tennessee Ornithological Society

No abstract provided.


Full Issue, The Migrant Apr 2024

Full Issue, The Migrant

The Migrant - Tennessee Ornithological Society

No abstract provided.


Full Issue, The Migrant Apr 2024

Full Issue, The Migrant

The Migrant - Tennessee Ornithological Society

No abstract provided.


Full Issue, The Migrant Apr 2024

Full Issue, The Migrant

The Migrant - Tennessee Ornithological Society

No abstract provided.


Full Issue, The Migrant Apr 2024

Full Issue, The Migrant

The Migrant - Tennessee Ornithological Society

No abstract provided.


Klimchouk’S Impact On The Development Of Speleogenetic Models For Castile Evaporites: West Texas And Southeastern New Mexico, Usa, Kevin W. Stafford Apr 2024

Klimchouk’S Impact On The Development Of Speleogenetic Models For Castile Evaporites: West Texas And Southeastern New Mexico, Usa, Kevin W. Stafford

International Journal of Speleology

Due to the pioneering work of Alexander Klimchouk (2007), hypogene karst is now recognized as being complex and extensive throughout Permian strata of the greater Delaware Basin in West Texas and southeastern New Mexico (USA). Klimchouk heavily influenced our current understanding of hypogene speleogenesis in the Permian Ochoan Castile Formation where we now recognize diverse hypogene manifestations that include vertically-extensive breccia pipes, laterally-extensive blanket breccias, morphologically-varied caves, diagenetically-altered sulfates, and unique venting structures. Underlying Bell Canyon strata provide the transmissive zone for delivery and removal of solutionally aggressive fluids to the conformably overlying Castile evaporites. Current speleogenetic models indicate that …


Full Issue, The Migrant Apr 2024

Full Issue, The Migrant

The Migrant - Tennessee Ornithological Society

No abstract provided.


Full Issue, The Migrant Apr 2024

Full Issue, The Migrant

The Migrant - Tennessee Ornithological Society

No abstract provided.


Full Issue, The Migrant Apr 2024

Full Issue, The Migrant

The Migrant - Tennessee Ornithological Society

No abstract provided.


Full Issue, The Migrant Apr 2024

Full Issue, The Migrant

The Migrant - Tennessee Ornithological Society

No abstract provided.


Full Issue, The Migrant Apr 2024

Full Issue, The Migrant

The Migrant - Tennessee Ornithological Society

No abstract provided.