Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

University of South Florida

Journal

Discipline
Keyword
Publication Year
Publication

Articles 1 - 30 of 274

Full-Text Articles in Entire DC Network

Regulating Deepfakes: An Indian Perspective, Shinu Vig Oct 2024

Regulating Deepfakes: An Indian Perspective, Shinu Vig

Journal of Strategic Security

Deepfakes are a growing concern throughout the world including India. Deepfakes can be used for several purposes, both innocuous or malicious. In India, several problems related to regulation of deepfakes have emerged. This paper makes an examination of current legal challenges posed by deepfakes as well as solutions in India that can be repurposed to address these challenges, including intellectual property laws, criminal laws, and the right to privacy. While these existing laws can be used to address certain aspects of the deep fake problem, there is an increasing recognition that specific legislations and regulations addressing deep fakes and synthetic …


Understanding Russian Hybrid Warfare Against Europe In The Energy Sector And In The Future ‘Energy-Resources-Climate’ Security Nexus., Maurizio Geri Oct 2024

Understanding Russian Hybrid Warfare Against Europe In The Energy Sector And In The Future ‘Energy-Resources-Climate’ Security Nexus., Maurizio Geri

Journal of Strategic Security

To avoid escalations to full kinetic (military) wars is imperative to win the non-kinetic part of the so-called “hybrid warfare”, which use both kinetic and non-kinetic methods. The goal of the non-kinetic methods of hybrid warfare, or as others call it “grey zone” activities, or “subthreshold” tactics, is to defeat hearts and minds, as well as pockets, of adversaries, with social, political, and economic tools. This article focuses on energy as the crucial sector of the economic tools, and specifically uses an innovative approach, what the author calls the ‘energy-resources-climate security nexus’, as a new battleground for future strategic competition …


Behavior And Taxonomic Status Of Grayson's Dove, Luis F. Baptista, William I. Boarman, Paraskevas Kandianidis Sep 2024

Behavior And Taxonomic Status Of Grayson's Dove, Luis F. Baptista, William I. Boarman, Paraskevas Kandianidis

The Auk

No abstract provided.


The Piranhas: Endgame Of Banking In Indonesia, F. Mario Andaru, Bambang Hadinugroho Sep 2024

The Piranhas: Endgame Of Banking In Indonesia, F. Mario Andaru, Bambang Hadinugroho

Journal of Global Business Insights

Neobank is a form of financial technology innovation that offers banking services without a branch office. This is a form of disruption in the banking industry. Therefore, this paper aims to look at the phenomenon regarding the shift in the banking industry due to the presence of neobanks and, at the same time, question whether this is the beginning of the extinction of conventional banking. Based on an analysis of the literature on fintech and digital banking from research, case studies, and news media in both English and Indonesian, this study discusses research related to neobank trends disrupting the conventional …


Application Of New Media In Peace Building And Conflict Resolution In Nigeria, Eric Msughter Aondover, Ademolu Patrick Okuneye, Timothy Ekeledirichukwu Onyejelem Aug 2024

Application Of New Media In Peace Building And Conflict Resolution In Nigeria, Eric Msughter Aondover, Ademolu Patrick Okuneye, Timothy Ekeledirichukwu Onyejelem

Journal of African Conflicts and Peace Studies

The role of new media in conflict prevention, resolution and escalation is now a global concern to both peace and conflict scholars and public policy makers. The kind of information the media disseminate is critical to sustaining peace and harmony in society and vice versa. New media has a long history. The media have suffered deprivation in the hands of both military and civilian regimes. However, this has not in anywhere diminished the growth of the media in all its ramifications. Traditional media genre like newspaper, radio and television has received much recognition and seminal attention, but social or new …


Atrocity Prevention In The Digital Era: Adapting Norms, Laws, And Code To Changes In The Ways Atrocities Are Committed, David J. Simon, Samhitha Josyula, Joshua Lam, Julian D. Melendi Jul 2024

Atrocity Prevention In The Digital Era: Adapting Norms, Laws, And Code To Changes In The Ways Atrocities Are Committed, David J. Simon, Samhitha Josyula, Joshua Lam, Julian D. Melendi

Genocide Studies and Prevention: An International Journal

Emerging digital technologies have changed some of the ways that genocides are planned and executed. This paper examines those differences, calling attention to how changes in the execution of genocide should prompt a shift in the approaches to atrocity prevention. It develops a conceptual framework addressing how atrocity prevention efforts might adapt to new technology within three realms of potential prevention efforts: the ethical (norms), the legal (laws), and the digital (code).


The Relationship Between Physical Activity Level, Digital Game Addiction, And Academic Success Levels Of University Students, Aydin Ilhan Jul 2024

The Relationship Between Physical Activity Level, Digital Game Addiction, And Academic Success Levels Of University Students, Aydin Ilhan

Journal of Global Education and Research

This study examined the relationship between physical activity, digital game addiction, and academic success among university students. Participants were university 704 students from Turkiye who did physical activity and played digital games. The sample group consisted of 704 university students (342 women and 362 men), selected through random sampling. Data were collected using demographic information forms, a digital game addiction scale, and an international short-form questionnaire about physical activity. The data were analyzed using Pearson correlation, t-tests, one-way ANOVA, and post-hoc tests. The findings revealed a significant negative relationship between academic success and both physical activity and digital game …


Online Teaching And Learning At Chinese Universities During Covid-19: Insiders’ Perspectives, Youliang Zhang, Yidan Zhu, Tongjie Chen, Tongfei Ma Jul 2024

Online Teaching And Learning At Chinese Universities During Covid-19: Insiders’ Perspectives, Youliang Zhang, Yidan Zhu, Tongjie Chen, Tongfei Ma

Journal of Global Education and Research

During attempts to prevent and control the COVID-19 pandemic in China, higher education programs shifted their traditional educational models to online models. This paper aimed to explore how Chinese universities organized online teaching and learning during the pandemic. It investigated the factors affecting the implementation of online teaching and provided policy recommendations for improving the quality of education in the post-pandemic period. The primary data for this study came from in-depth interviews with nine students and five teaching and administrative staff at eight major universities in mainland China. Literature was obtained in both English and Chinese from January 2020 to …


Nuclear War: A Scenario By Annie Jacobson, New York: Dutton, 2024., Edward M. Roche, Ph.D., Jd Jul 2024

Nuclear War: A Scenario By Annie Jacobson, New York: Dutton, 2024., Edward M. Roche, Ph.D., Jd

Journal of Strategic Security

No abstract provided.


Cold Rivals: The New Era Of Us-China Strategic Competition Ed. Evan S. Medeiros, Georgetown University Press, 2023., Mark T. Peters Ii Ph.D. Jul 2024

Cold Rivals: The New Era Of Us-China Strategic Competition Ed. Evan S. Medeiros, Georgetown University Press, 2023., Mark T. Peters Ii Ph.D.

Journal of Strategic Security

No abstract provided.


Digital Transformation Perceptions In Tourism Businesses: The Case Of Batman Province, Ferhat Kurt Jul 2024

Digital Transformation Perceptions In Tourism Businesses: The Case Of Batman Province, Ferhat Kurt

Journal of Mediterranean Tourism Research

This study explores the perceptions of digital transformation within tourism businesses in Batman Province, with a specific focus on accommodation, food and beverage and tourism agencies. Perceptions of digital transformation are considered to have of growing influence on the tourism business, and the research of these perceptions is a critical study not only for academic research but also for practical applications. Experiences, strategies, and challenges of the businesses in digitalization are studied with qualitative research methods, specifically semi structured interviews with five businesses running in Batman, Turkey. The findings highlight the varying degrees of digital transformation awareness and the different …


The Handbook Of African Intelligence Cultures. Ryan Shaffer, Editor. London: Rowman & Littlefield, 2023., Edward M. Roche Ph.D., Jd Jul 2024

The Handbook Of African Intelligence Cultures. Ryan Shaffer, Editor. London: Rowman & Littlefield, 2023., Edward M. Roche Ph.D., Jd

Journal of Strategic Security

No abstract provided.


Improving Ethics Surrounding Collegiate-Level Hacking Education: Recommended Implementation Plan & Affiliation With Peer-Led Initiatives, Shannon Morgan, Dr. Sanjay Goel May 2024

Improving Ethics Surrounding Collegiate-Level Hacking Education: Recommended Implementation Plan & Affiliation With Peer-Led Initiatives, Shannon Morgan, Dr. Sanjay Goel

Military Cyber Affairs

Cybersecurity has become a pertinent concern, as novel technological innovations create opportunities for threat actors to exfiltrate sensitive data. To meet the demand for professionals in the workforce, universities have ramped up their academic offerings to provide a broad range of cyber-related programs (e.g., cybersecurity, informatics, information technology, digital forensics, computer science, & engineering). As the tactics, techniques, and procedures (TTPs) of hackers evolve, the knowledge and skillset required to be an effective cybersecurity professional have escalated accordingly. Therefore, it is critical to train cyber students both technically and theoretically to actively combat cyber criminals and protect the confidentiality, integrity, …


Using Digital Twins To Protect Biomanufacturing From Cyberattacks, Brenden Fraser-Hevlin, Alec W. Schuler, B. Arda Gozen, Bernard J. Van Wie May 2024

Using Digital Twins To Protect Biomanufacturing From Cyberattacks, Brenden Fraser-Hevlin, Alec W. Schuler, B. Arda Gozen, Bernard J. Van Wie

Military Cyber Affairs

Understanding of the intersection of cyber vulnerabilities and bioprocess regulation is critical with the rise of artificial intelligence and machine learning in manufacturing. We detail a case study in which we model cyberattacks on network-mediated signals from a novel bioreactor, where it is important to control medium feed rates to maintain cell proliferation. We use a digital twin counterpart reactor to compare glucose and oxygen sensor signals from the bioreactor to predictions from a kinetic growth model, allowing discernment of faulty sensors from hacked signals. Our results demonstrate a successful biomanufacturing cyberattack detection system based on fundamental process control principles.


Surmounting Challenges In Aggregating Results From Static Analysis Tools, Dr. Ann Marie Reinhold, Brittany Boles, A. Redempta Manzi Muneza, Thomas Mcelroy, Dr. Clemente Izurieta May 2024

Surmounting Challenges In Aggregating Results From Static Analysis Tools, Dr. Ann Marie Reinhold, Brittany Boles, A. Redempta Manzi Muneza, Thomas Mcelroy, Dr. Clemente Izurieta

Military Cyber Affairs

Aggregation poses a significant challenge for software practitioners because it requires a comprehensive and nuanced understanding of raw data from diverse sources. Suites of static-analysis tools (SATs) are commonly used to assess organizational security but simultaneously introduce significant challenges. Challenges include unique results, scales, configuration environments for each SAT execution, and incompatible formats between SAT outputs. Here, we document our experiences addressing these issues. We highlight the problem of relying on a single vendor's SAT version and offer a solution for aggregating findings across multiple SATs, aiming to enhance software security practices and deter threats early with robust defensive operations.


Characterizing Advanced Persistent Threats Through The Lens Of Cyber Attack Flows, Logan Zeien, Caleb Chang, Ltc Ekzhin Ear, Dr. Shouhuai Xu May 2024

Characterizing Advanced Persistent Threats Through The Lens Of Cyber Attack Flows, Logan Zeien, Caleb Chang, Ltc Ekzhin Ear, Dr. Shouhuai Xu

Military Cyber Affairs

Effective cyber defense must build upon a deep understanding of real-world cyberattacks to guide the design and deployment of appropriate defensive measures against current and future attacks. In this abridged paper (of which the full paper is available online), we present important concepts for understanding Advanced Persistent Threats (APTs), our methodology to characterize APTs through the lens of attack flows, and a detailed case study of APT28 that demonstrates our method’s viability to draw useful insights. This paper makes three technical contributions. First, we propose a novel method of constructing attack flows to describe APTs. This abstraction allows technical audiences, …


Generative Machine Learning For Cyber Security, James Halvorsen, Dr. Assefaw Gebremedhin May 2024

Generative Machine Learning For Cyber Security, James Halvorsen, Dr. Assefaw Gebremedhin

Military Cyber Affairs

Automated approaches to cyber security based on machine learning will be necessary to combat the next generation of cyber-attacks. Current machine learning tools, however, are difficult to develop and deploy due to issues such as data availability and high false positive rates. Generative models can help solve data-related issues by creating high quality synthetic data for training and testing. Furthermore, some generative architectures are multipurpose, and when used for tasks such as intrusion detection, can outperform existing classifier models. This paper demonstrates how the future of cyber security stands to benefit from continued research on generative models.


Machine Learning Security For Tactical Operations, Dr. Denaria Fields, Shakiya A. Friend, Andrew Hermansen, Dr. Tugba Erpek, Dr. Yalin E. Sagduyu May 2024

Machine Learning Security For Tactical Operations, Dr. Denaria Fields, Shakiya A. Friend, Andrew Hermansen, Dr. Tugba Erpek, Dr. Yalin E. Sagduyu

Military Cyber Affairs

Deep learning finds rich applications in the tactical domain by learning from diverse data sources and performing difficult tasks to support mission-critical applications. However, deep learning models are susceptible to various attacks and exploits. In this paper, we first discuss application areas of deep learning in the tactical domain. Next, we present adversarial machine learning as an emerging attack vector and discuss the impact of adversarial attacks on the deep learning performance. Finally, we discuss potential defense methods that can be applied against these attacks.


Securing The Void: Assessing The Dynamic Threat Landscape Of Space, Brianna Bace, Dr. Unal Tatar May 2024

Securing The Void: Assessing The Dynamic Threat Landscape Of Space, Brianna Bace, Dr. Unal Tatar

Military Cyber Affairs

Outer space is a strategic and multifaceted domain that is a crossroads for political, military, and economic interests. From a defense perspective, the U.S. military and intelligence community rely heavily on satellite networks to meet national security objectives and execute military operations and intelligence gathering. This paper examines the evolving threat landscape of the space sector, encompassing natural and man-made perils, emphasizing the rise of cyber threats and the complexity introduced by dual-use technology and commercialization. It also explores the implications for security and resilience, advocating for collaborative efforts among international organizations, governments, and industry to safeguard the space sector.


Commercial Enablers Of China’S Cyber-Intelligence And Information Operations, Ethan Mansour, Victor Mukora May 2024

Commercial Enablers Of China’S Cyber-Intelligence And Information Operations, Ethan Mansour, Victor Mukora

Military Cyber Affairs

In a globally commercialized information environment, China uses evolving commercial enabler networks to position and project its goals. They do this through cyber, intelligence, and information operations. This paper breaks down the types of commercial enablers and how they are used operationally. It will also address the CCP's strategy to gather and influence foreign and domestic populations throughout cyberspace. Finally, we conclude with recommendations for mitigating the influence of PRC commercial enablers.


Deter, Disrupt, Or Deceive: Assessing Cyber Conflict As An Intelligence Contest, Robert Chesney And Max Smeets, Eds. Georgetown University Press, 2023, Chris Bronk, Phd Apr 2024

Deter, Disrupt, Or Deceive: Assessing Cyber Conflict As An Intelligence Contest, Robert Chesney And Max Smeets, Eds. Georgetown University Press, 2023, Chris Bronk, Phd

Journal of Strategic Security

No abstract provided.


Hybrid Warfare: How To Escape The Conceptual Gray-Zone, Borislav Bankov Apr 2024

Hybrid Warfare: How To Escape The Conceptual Gray-Zone, Borislav Bankov

Journal of Strategic Security

Hybrid warfare (HW) is one of the most debated concepts in contemporary military science. While most scholars agree that HW is conducted in the gray-zone between war and peace, they define the phenomenon differently. This disagreement has resulted in a conceptual gray-zone. The lack of theoretical clarity is exacerbated by the fact that authors have coined additional security and defense concepts that are based on the idea of hybridity, such as hybrid peace and hybrid influence. This article examines the different views on HW and aims to offer a more precise framework for its analysis. To fulfill its objective, it …


Engagement With Radical Propaganda Drives Cognitive Radicalization: An Analysis Of A Right-Wing Online Ecosystem, Julius B. Calvert Apr 2024

Engagement With Radical Propaganda Drives Cognitive Radicalization: An Analysis Of A Right-Wing Online Ecosystem, Julius B. Calvert

Journal of Strategic Security

Cognitive radicalization remains an issue for communities battling terrorism. Recent empirical investigations into the psycho-social processes involved with radicalization have revealed social exclusion, cognitive inflexibility, and perceived threats to an ingroup as significant predictors for one’s propensity to engage with radical content and commit to offline behaviors. This study investigates the utility of user engagement and the proxy effect on cognitive radicalization by examining users’ engagement with a radical-right online ecosystem. The study supported the assumption that content featuring outgroup prejudice would affect the cognitive radicalization process. Several results demonstrate the importance of user engagement in the process of radicalization. …


Western Bird Banding Association Annual Meeting 2009 Abstracts Of Presentations, North American Bird Bander Jan 2024

Western Bird Banding Association Annual Meeting 2009 Abstracts Of Presentations, North American Bird Bander

North American Bird Bander

No abstract provided.


Abstracts From Wbba's 2007 Annual Meeting, North American Bird Bander Jan 2024

Abstracts From Wbba's 2007 Annual Meeting, North American Bird Bander

North American Bird Bander

No abstract provided.


Eastern Regional News, North American Bird Bander Jan 2024

Eastern Regional News, North American Bird Bander

North American Bird Bander

No abstract provided.


Effect Of Influencers On The Intention To Taste Local Food And Beverages, Yeliz Demir, Serkan Bertan Dec 2023

Effect Of Influencers On The Intention To Taste Local Food And Beverages, Yeliz Demir, Serkan Bertan

Journal of Mediterranean Tourism Research

The study aims to determine the impact of influencers promoting local food and beverages on individuals’ intention to taste local food. In this study, Instagram accounts were selected as the social media platform. The research data were obtained from Turkish Instagram users over the age of 18 by using an online survey and purposive sampling method, and usable data were obtained from 81 people. Of the participants, 56.8% stated that they follow Instagram accounts related to gastronomy, and 43.2% stated that they do not follow these social media accounts but look at the photos and videos of gastronomy accounts when …


Marsh Birding The West Meadows Wildlife Management Area In West Bridgewater, Steve Arena Dec 2023

Marsh Birding The West Meadows Wildlife Management Area In West Bridgewater, Steve Arena

Bird Observer

No abstract provided.


Bird Sightings: November-December 1998 Summary, Marjorie W. Rines, Simon A. Perkins, Robert H. Stymeist Dec 2023

Bird Sightings: November-December 1998 Summary, Marjorie W. Rines, Simon A. Perkins, Robert H. Stymeist

Bird Observer

No abstract provided.


Megacities And Urban Warfare In The 21st Century: The City As The Cemetery Of Revolutionaries And Resources, José De Arimatéia Da Cruz Ph.D./Mph Oct 2023

Megacities And Urban Warfare In The 21st Century: The City As The Cemetery Of Revolutionaries And Resources, José De Arimatéia Da Cruz Ph.D./Mph

Journal of Strategic Security

No abstract provided.