Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Physical Sciences and Mathematics (1450)
- Earth Sciences (1069)
- Education (722)
- Social and Behavioral Sciences (704)
- Arts and Humanities (661)
-
- Business (574)
- Mathematics (299)
- Feminist, Gender, and Sexuality Studies (270)
- English Language and Literature (247)
- Literature in English, British Isles (232)
- Educational Methods (231)
- Public Affairs, Public Policy and Public Administration (218)
- History (211)
- Geology (198)
- Science and Mathematics Education (185)
- Law (183)
- Theatre and Performance Studies (182)
- Dramatic Literature, Criticism and Theory (176)
- Tourism and Travel (170)
- Hospitality Administration and Management (158)
- Life Sciences (134)
- Defense and Security Studies (131)
- Political Science (128)
- Holocaust and Genocide Studies (126)
- Sociology (125)
- National Security Law (118)
- Portfolio and Security Analysis (108)
- Higher Education (106)
- Engineering (100)
- Marketing (95)
- Keyword
-
- Genocide (161)
- Quantitative literacy (132)
- Terrorism / counterterrorism (117)
- National security (107)
- Security studies (89)
-
- Numeracy (84)
- International security (77)
- Intelligence analysis (69)
- Quantitative reasoning (69)
- Violent extremism (68)
- Counterterrorism (67)
- Intelligence studies/education (64)
- Management (64)
- Romania (61)
- Tourism (60)
- Cybersecurity (59)
- History (58)
- Assessment (56)
- Poesía (56)
- Asymmetric warfare (55)
- International relations (55)
- Security policy (55)
- Strategy (55)
- Nonstate actors (54)
- Radicalization (52)
- COVID-19 (50)
- Foreign policy (49)
- Mathematics (47)
- Karst (44)
- Russia (44)
- Publication Year
- Publication
-
- Bird Observer (2909)
- North American Bird Bander (2792)
- Journal of Raptor Research (1843)
- Florida Field Naturalist (1484)
- Ornitología Neotropical (1219)
-
- Marine Ornithology (1089)
- International Journal of Speleology (1079)
- Genocide Studies and Prevention: An International Journal (646)
- Journal of Strategic Security (632)
- Journal of Public Transportation (607)
- Tampa Bay History (531)
- Sunland Tribune (398)
- Numeracy (350)
- University of South Florida (USF) M3 Publishing (287)
- Revista Surco Sur (285)
- ABO: Interactive Journal for Women in the Arts, 1640-1830 (259)
- Studia UBB Geologia (256)
- Journal of Ecological Anthropology (186)
- Undergraduate Journal of Mathematical Modeling: One + Two (180)
- Revista Venezolana de Ornitología (127)
- Journal of Global Business Insights (103)
- Alambique. Revista académica de ciencia ficción y fantasía / Jornal acadêmico de ficção científica e fantasía (99)
- Journal of Global Education and Research (93)
- The Migrant - Tennessee Ornithological Society (93)
- Journal of Practitioner Research (77)
- Peace and Conflict Management Review (74)
- Journal of African Conflicts and Peace Studies (71)
- Military Cyber Affairs (57)
- Arizona Birds (43)
- Journal of Global Hospitality and Tourism (40)
- File Type
Articles 1 - 30 of 18013
Full-Text Articles in Entire DC Network
Intermediate Conformity Of Hrm Practices In Host Countries: Why And How They Work, Wenjuan Guo
Intermediate Conformity Of Hrm Practices In Host Countries: Why And How They Work, Wenjuan Guo
Journal of Global Business Insights
The institutional theory suggests that multinational enterprises (MNEs) need to conform to institutional norms to gain legitimacy, thereby enhancing their survival in host countries. Conversely, from the perspective of business strategy, MNEs gain a competitive advantage by leveraging organizational capabilities worldwide. These two perspectives imply that MNEs face conflicting pressures when adopting HRM practices in their host country subsidiaries. This article discusses the rationale for why MNEs’ subsidiaries should intermediately conform to both internal and external institutional forces and adopt a combination of home and host country HRM practices. Furthermore, it suggests that intermediate conformity contributes to a higher survival …
Antecedents Of Entrepreneurial Activity And Poverty: Mediating Effect Of Entrepreneurial Activity, Bashir I. Bugaje, Azmawani Abd Rahman, Rusmawati Said, Jo A. Ho, Abubakar A. Adamu
Antecedents Of Entrepreneurial Activity And Poverty: Mediating Effect Of Entrepreneurial Activity, Bashir I. Bugaje, Azmawani Abd Rahman, Rusmawati Said, Jo A. Ho, Abubakar A. Adamu
Journal of Global Business Insights
Poverty rates in Sub-Saharan Africa (SSA) have risen, with 47% of the region’s population living in poverty. In Nigeria, approximately 87 million are classified as extremely poor. Existing research on the relationship between entrepreneurship and poverty in this region is fragmented and inconsistent. Traditional economic measures of poverty have proven inadequate, prompting the need for a multidimensional approach. The paper examined the mediating effect of entrepreneurial activity on the relationship between the precursors of entrepreneurship and poverty. The study used a survey method and partial least squares structural equation modeling (PLS-SEM) to analyze the data, which confirmed all hypotheses, revealing …
“In My Blood”: External Factors For International Stem Postdoctoral Scholars’ Career Decisions, Kathryn J. Watson, Sylvia L. Mendez
“In My Blood”: External Factors For International Stem Postdoctoral Scholars’ Career Decisions, Kathryn J. Watson, Sylvia L. Mendez
Journal of Global Education and Research
This instrumental case study (Stake, 1995) explores the external factors that influence international science, technology, engineering, and mathematics (STEM) postdoctoral scholars in the United States to pursue a career in STEM. Interviews with 20 international STEM postdoctoral scholars were analyzed deductively to shed light on their unique backgrounds and experiences. Three themes emerged: (a) parents were highly encouraging, (b) a love of science was nurtured in school, and (c) they were eager to engage in and promote scientific innovation. These findings illustrate the ways in which family, schools, and community influence the STEM career trajectories of international postdoctoral scholars.
Too Little, Too Late: The Icc And The Politics Of Prosecutorial Procrastination In Georgia, Marco Bocchese
Too Little, Too Late: The Icc And The Politics Of Prosecutorial Procrastination In Georgia, Marco Bocchese
Genocide Studies and Prevention: An International Journal
In August 2008, just days after belligerent parties had reached a ceasefire agreement, the Office of the Prosecutor (OTP) announced the opening of a preliminary examination into the situation of Georgia. Yet, it was only in March 2022 that International Criminal Court (ICC) Chief Prosecutor Karim Khan applied for arrest warrants in relation to three individuals from Georgia’s breakaway region of South Ossetia. That said, how can such prolonged inaction be accounted for? How much blame does the OTP carry for it? And how did ICC-state relations develop over time? This paper conducts a within-case analysis of the situation of …
Improving Ethics Surrounding Collegiate-Level Hacking Education: Recommended Implementation Plan & Affiliation With Peer-Led Initiatives, Shannon Morgan, Dr. Sanjay Goel
Improving Ethics Surrounding Collegiate-Level Hacking Education: Recommended Implementation Plan & Affiliation With Peer-Led Initiatives, Shannon Morgan, Dr. Sanjay Goel
Military Cyber Affairs
Cybersecurity has become a pertinent concern, as novel technological innovations create opportunities for threat actors to exfiltrate sensitive data. To meet the demand for professionals in the workforce, universities have ramped up their academic offerings to provide a broad range of cyber-related programs (e.g., cybersecurity, informatics, information technology, digital forensics, computer science, & engineering). As the tactics, techniques, and procedures (TTPs) of hackers evolve, the knowledge and skillset required to be an effective cybersecurity professional have escalated accordingly. Therefore, it is critical to train cyber students both technically and theoretically to actively combat cyber criminals and protect the confidentiality, integrity, …
Using Digital Twins To Protect Biomanufacturing From Cyberattacks, Brenden Fraser-Hevlin, Alec W. Schuler, B. Arda Gozen, Bernard J. Van Wie
Using Digital Twins To Protect Biomanufacturing From Cyberattacks, Brenden Fraser-Hevlin, Alec W. Schuler, B. Arda Gozen, Bernard J. Van Wie
Military Cyber Affairs
Understanding of the intersection of cyber vulnerabilities and bioprocess regulation is critical with the rise of artificial intelligence and machine learning in manufacturing. We detail a case study in which we model cyberattacks on network-mediated signals from a novel bioreactor, where it is important to control medium feed rates to maintain cell proliferation. We use a digital twin counterpart reactor to compare glucose and oxygen sensor signals from the bioreactor to predictions from a kinetic growth model, allowing discernment of faulty sensors from hacked signals. Our results demonstrate a successful biomanufacturing cyberattack detection system based on fundamental process control principles.
Surmounting Challenges In Aggregating Results From Static Analysis Tools, Dr. Ann Marie Reinhold, Brittany Boles, A. Redempta Manzi Muneza, Thomas Mcelroy, Dr. Clemente Izurieta
Surmounting Challenges In Aggregating Results From Static Analysis Tools, Dr. Ann Marie Reinhold, Brittany Boles, A. Redempta Manzi Muneza, Thomas Mcelroy, Dr. Clemente Izurieta
Military Cyber Affairs
Aggregation poses a significant challenge for software practitioners because it requires a comprehensive and nuanced understanding of raw data from diverse sources. Suites of static-analysis tools (SATs) are commonly used to assess organizational security but simultaneously introduce significant challenges. Challenges include unique results, scales, configuration environments for each SAT execution, and incompatible formats between SAT outputs. Here, we document our experiences addressing these issues. We highlight the problem of relying on a single vendor's SAT version and offer a solution for aggregating findings across multiple SATs, aiming to enhance software security practices and deter threats early with robust defensive operations.
Characterizing Advanced Persistent Threats Through The Lens Of Cyber Attack Flows, Logan Zeien, Caleb Chang, Ltc Ekzhin Ear, Dr. Shouhuai Xu
Characterizing Advanced Persistent Threats Through The Lens Of Cyber Attack Flows, Logan Zeien, Caleb Chang, Ltc Ekzhin Ear, Dr. Shouhuai Xu
Military Cyber Affairs
Effective cyber defense must build upon a deep understanding of real-world cyberattacks to guide the design and deployment of appropriate defensive measures against current and future attacks. In this abridged paper (of which the full paper is available online), we present important concepts for understanding Advanced Persistent Threats (APTs), our methodology to characterize APTs through the lens of attack flows, and a detailed case study of APT28 that demonstrates our method’s viability to draw useful insights. This paper makes three technical contributions. First, we propose a novel method of constructing attack flows to describe APTs. This abstraction allows technical audiences, …
Generative Machine Learning For Cyber Security, James Halvorsen, Dr. Assefaw Gebremedhin
Generative Machine Learning For Cyber Security, James Halvorsen, Dr. Assefaw Gebremedhin
Military Cyber Affairs
Automated approaches to cyber security based on machine learning will be necessary to combat the next generation of cyber-attacks. Current machine learning tools, however, are difficult to develop and deploy due to issues such as data availability and high false positive rates. Generative models can help solve data-related issues by creating high quality synthetic data for training and testing. Furthermore, some generative architectures are multipurpose, and when used for tasks such as intrusion detection, can outperform existing classifier models. This paper demonstrates how the future of cyber security stands to benefit from continued research on generative models.
Machine Learning Security For Tactical Operations, Dr. Denaria Fields, Shakiya A. Friend, Andrew Hermansen, Dr. Tugba Erpek, Dr. Yalin E. Sagduyu
Machine Learning Security For Tactical Operations, Dr. Denaria Fields, Shakiya A. Friend, Andrew Hermansen, Dr. Tugba Erpek, Dr. Yalin E. Sagduyu
Military Cyber Affairs
Deep learning finds rich applications in the tactical domain by learning from diverse data sources and performing difficult tasks to support mission-critical applications. However, deep learning models are susceptible to various attacks and exploits. In this paper, we first discuss application areas of deep learning in the tactical domain. Next, we present adversarial machine learning as an emerging attack vector and discuss the impact of adversarial attacks on the deep learning performance. Finally, we discuss potential defense methods that can be applied against these attacks.
Securing The Void: Assessing The Dynamic Threat Landscape Of Space, Brianna Bace, Dr. Unal Tatar
Securing The Void: Assessing The Dynamic Threat Landscape Of Space, Brianna Bace, Dr. Unal Tatar
Military Cyber Affairs
Outer space is a strategic and multifaceted domain that is a crossroads for political, military, and economic interests. From a defense perspective, the U.S. military and intelligence community rely heavily on satellite networks to meet national security objectives and execute military operations and intelligence gathering. This paper examines the evolving threat landscape of the space sector, encompassing natural and man-made perils, emphasizing the rise of cyber threats and the complexity introduced by dual-use technology and commercialization. It also explores the implications for security and resilience, advocating for collaborative efforts among international organizations, governments, and industry to safeguard the space sector.
Commercial Enablers Of China’S Cyber-Intelligence And Information Operations, Ethan Mansour, Victor Mukora
Commercial Enablers Of China’S Cyber-Intelligence And Information Operations, Ethan Mansour, Victor Mukora
Military Cyber Affairs
In a globally commercialized information environment, China uses evolving commercial enabler networks to position and project its goals. They do this through cyber, intelligence, and information operations. This paper breaks down the types of commercial enablers and how they are used operationally. It will also address the CCP's strategy to gather and influence foreign and domestic populations throughout cyberspace. Finally, we conclude with recommendations for mitigating the influence of PRC commercial enablers.
Full Issue, The Migrant
Full Issue, The Migrant
The Migrant - Tennessee Ornithological Society
No abstract provided.
Full Issue, The Migrant
Full Issue, The Migrant
The Migrant - Tennessee Ornithological Society
No abstract provided.
Full Issue, The Migrant
Full Issue, The Migrant
The Migrant - Tennessee Ornithological Society
No abstract provided.
Full Issue, The Migrant
Full Issue, The Migrant
The Migrant - Tennessee Ornithological Society
No abstract provided.
Full Issue, The Migrant
Full Issue, The Migrant
The Migrant - Tennessee Ornithological Society
No abstract provided.
Full Issue, The Migrant
Full Issue, The Migrant
The Migrant - Tennessee Ornithological Society
No abstract provided.
Full Issue, The Migrant
Full Issue, The Migrant
The Migrant - Tennessee Ornithological Society
No abstract provided.
Full Issue, The Migrant
Full Issue, The Migrant
The Migrant - Tennessee Ornithological Society
No abstract provided.
Full Issue, The Migrant
Full Issue, The Migrant
The Migrant - Tennessee Ornithological Society
No abstract provided.
Full Issue, The Migrant
Full Issue, The Migrant
The Migrant - Tennessee Ornithological Society
No abstract provided.
Full Issue, The Migrant
Full Issue, The Migrant
The Migrant - Tennessee Ornithological Society
No abstract provided.
Full Issue, The Migrant
Full Issue, The Migrant
The Migrant - Tennessee Ornithological Society
No abstract provided.
Klimchouk’S Impact On The Development Of Speleogenetic Models For Castile Evaporites: West Texas And Southeastern New Mexico, Usa, Kevin W. Stafford
Klimchouk’S Impact On The Development Of Speleogenetic Models For Castile Evaporites: West Texas And Southeastern New Mexico, Usa, Kevin W. Stafford
International Journal of Speleology
Due to the pioneering work of Alexander Klimchouk (2007), hypogene karst is now recognized as being complex and extensive throughout Permian strata of the greater Delaware Basin in West Texas and southeastern New Mexico (USA). Klimchouk heavily influenced our current understanding of hypogene speleogenesis in the Permian Ochoan Castile Formation where we now recognize diverse hypogene manifestations that include vertically-extensive breccia pipes, laterally-extensive blanket breccias, morphologically-varied caves, diagenetically-altered sulfates, and unique venting structures. Underlying Bell Canyon strata provide the transmissive zone for delivery and removal of solutionally aggressive fluids to the conformably overlying Castile evaporites. Current speleogenetic models indicate that …
Full Issue, The Migrant
Full Issue, The Migrant
The Migrant - Tennessee Ornithological Society
No abstract provided.
Full Issue, The Migrant
Full Issue, The Migrant
The Migrant - Tennessee Ornithological Society
No abstract provided.
Full Issue, The Migrant
Full Issue, The Migrant
The Migrant - Tennessee Ornithological Society
No abstract provided.
Full Issue, The Migrant
Full Issue, The Migrant
The Migrant - Tennessee Ornithological Society
No abstract provided.
Full Issue, The Migrant
Full Issue, The Migrant
The Migrant - Tennessee Ornithological Society
No abstract provided.