Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Journal

2017

Discipline
Institution
Keyword
Publication

Articles 1 - 30 of 547

Full-Text Articles in Entire DC Network

Pemetaan Gerakan Literasi Digital Di Lingkup Universitas Negeri Yogyakarta, Theresia Amelia Jordana, Dyna Herlina Suwarto Dec 2017

Pemetaan Gerakan Literasi Digital Di Lingkup Universitas Negeri Yogyakarta, Theresia Amelia Jordana, Dyna Herlina Suwarto

Informasi

ABSTRAK

Konten digital pada masa ini dapat diakses dengan mudah oleh beragam kalangan. Walau begitu, masih terdapat kesenjangan dalam penggunaan internet di kalangan masyarakat Indonesia. Hal itulah yang melatarbelakangi upaya berbagai pihak untuk meningkatkan kemampuan literasi digital masyarat Indonesia. Penelitian ini mencoba untuk memetakan gerakan literasi digital yang dilakukan di lingkup Universitas Negeri Yogyakarta (UNY). Metode yang digunakan adalah deskriptif kualitatif dengan metode pengambilan data wawancara mendalam terhadap pelaku kegiatan dengan menggunakan instrumen dari Jaringan Pegiat Literasi Digital. Sejumlah lima belas kegiatan literasi digital di lingkup UNY dianalisis dan digolongkan kedalam enam pendekatan literasi media berdasarkan hasil indeks latar belakang, …


Peperangan Generasi Digital Natives Melawan Digital Hoax Melalui Kompetisi Kreatif, Yanti Dwi Astuti Dec 2017

Peperangan Generasi Digital Natives Melawan Digital Hoax Melalui Kompetisi Kreatif, Yanti Dwi Astuti

Informasi

The phenomenon of hoax and hate speech dissemination that occurs in the digital world
has brought anxiety and concern in the community. Many of the hoax information
distributed by Social Media and Instant Messaging tend to be SARA, provocative and
bombastic. Ironically, not a few people who without thinking directly spread information
and even reproduce the information without thinking about the impact caused after.
Digital media is currently dominated by teenagers born in the millennium era and is a
"digital natives" that is a generation that cannot be separated by the digital world. If this
generation is not given enough …


Local Governments In The Digital Era, Yossathorn Taweephon, Nopraenue Sajjarax Dhirathiti, Somsak Amornsiriphong Dec 2017

Local Governments In The Digital Era, Yossathorn Taweephon, Nopraenue Sajjarax Dhirathiti, Somsak Amornsiriphong

Asia-Pacific Social Science Review

No abstract provided.


Low-Cost Carrier Passenger Repurchase Intention: A Structural Equation Model Analysis, Sujira Vuthisopon, Chalita Srinuan Dec 2017

Low-Cost Carrier Passenger Repurchase Intention: A Structural Equation Model Analysis, Sujira Vuthisopon, Chalita Srinuan

Asia-Pacific Social Science Review

Low-cost carrier (LCC) aviation has exploded globally, which now represents 26% of all passenger seats, while in Southeast Asia LCC passengers have soared to 54%. The purpose of this research was, therefore, to develop and examine the accuracy of a structural equation model of the factors affecting repurchase intention of low-cost carrier passengers in Thailand. Convenience sampling was utilized to obtain a sample of 440 individuals from four Thai low-cost carriers, including Thai AirAsia, Nok Air, Thai Lion Air (Don Muang Airport-DMK), and Thai Smile Airways (Suvarnabhumi Airport-BKK) in 2016. To examine the study’s five latent and 22 observed variables, …


Bentuk-Bentuk Kekerasan Domestik Dan Permasalahannya (Studi Perbandingan Hukum Indonesia Dan Malaysia), Kuswardani - Dec 2017

Bentuk-Bentuk Kekerasan Domestik Dan Permasalahannya (Studi Perbandingan Hukum Indonesia Dan Malaysia), Kuswardani -

Jurnal Hukum & Pembangunan

The paper is purposed to describe / explain criminal laws which regulate domestic violence and the problems happen in Indonesia. This study uses the comparison method which compare substance criminal law of Indonesia with criminal law of Malaysia. The study is focused in the subject matter from criminal law of substantive. The result point out that both of the two countries have had criminal law on domestic violence, Indonesia is regulated at The Act of Elimination of Domestic Violence No 23 of 2004, while Malaysia is appointed at Domestic Violence 1994, and this was amendment on February 20, 2012. This …


Electronic Anonymous Communications: Considerations For Higher Education Administrators, Sandra C. Coyner, Peggy L. Mccann Dec 2017

Electronic Anonymous Communications: Considerations For Higher Education Administrators, Sandra C. Coyner, Peggy L. Mccann

Journal of Research, Assessment, and Practice in Higher Education

Communications via electronic technology have expanded to encompass daily life for most higher education students, faculty, staff, and administrators. The Pew Research Center reports that nearly 100% of undergraduate and graduate students access the Internet (Smith, Rainie, & Zikuhr, 2011). Computers, cell phones, and tablets are an integral part of university life and student communications using social media websites, text messaging, online chat, and websites are widespread. Electronic communications can be categorized as websites, application, or social media. A subset of these electronic communications, characterized as anonymous, may present a particular challenge to those working in higher education institutions. Created …


Neutrality And Outer Space, Wolff Heintschel Von Heinegg Dec 2017

Neutrality And Outer Space, Wolff Heintschel Von Heinegg

International Law Studies

This article discusses the law of neutrality as it pertains to belligerent operations in and through outer space as well as belligerent outer space operations involving the territory and national airspace of neutral States. As far as the latter is concerned, the traditional law of neutrality is fully applicable. Accordingly, international law prohibits belligerents from launching space objects from neutral territory or through neutral national airspace. While neutral States may not provide belligerents with outer space assets or the use of communications infrastructure located in their territories, they are not obliged to prevent their nationals from providing any of the …


Social Media Risk Perceptions Of Human Resource Professionals: Issues Undergraduate Students Should Consider, Julio C. Rivera, Jack Howard, Samuel Goh, James L. Worrell, Paul Di Gangi Dec 2017

Social Media Risk Perceptions Of Human Resource Professionals: Issues Undergraduate Students Should Consider, Julio C. Rivera, Jack Howard, Samuel Goh, James L. Worrell, Paul Di Gangi

Journal of Cybersecurity Education, Research and Practice

This study contrasts the social media risk perceptions of undergraduate students, versus those of certified Human Resource professionals. Social media is widely used by most segments of the population, and particularly among the age group that includes most undergraduate students. Organizations hiring employees are increasingly examining job applicant's social media postings as part of the applicant screening process. In this study we examine how these groups differ in their perceptions of the risks inherent in using social media, and what these differences may mean for students seeking employment. Recommendations are made for raising undergraduate student awareness of these risks.


A Toolkit Approach To Information Security Awareness And Education, Peter Korovessis, Steven Furnell, Maria Papadaki, Paul Haskell-Dowland Dec 2017

A Toolkit Approach To Information Security Awareness And Education, Peter Korovessis, Steven Furnell, Maria Papadaki, Paul Haskell-Dowland

Journal of Cybersecurity Education, Research and Practice

In today’s business environment where all operations are enabled by technology, information security has become an established discipline as more and more businesses realize its value. The human component has been recognized to have an important role in information security since the only way to reduce security risks is through making employees more information security aware. Towards this goal the research will appreciate the importance of information security awareness by illustrating the need for more effective user training. Further to that it proposes and develops an information security toolkit as a prototype awareness raising initiative. Apart from the elements of …


A Developmental Study On Assessing The Cybersecurity Competency Of Organizational Information System Users, Richard K. Nilsen, Yair Levy, Steven R. Terrell Ph.D., Dawn Beyer Dec 2017

A Developmental Study On Assessing The Cybersecurity Competency Of Organizational Information System Users, Richard K. Nilsen, Yair Levy, Steven R. Terrell Ph.D., Dawn Beyer

Journal of Cybersecurity Education, Research and Practice

Organizational information system users (OISUs) that are open to cyber threats vectors are contributing to major financial and information losses for individuals, businesses, and governments. Moreover, technical cybersecurity controls may be rendered useless due to a lack of cybersecurity competency of OISUs. The main goal of this research study was to propose and validate, using subject matter experts (SMEs), a reliable hands-on assessment prototype tool for measuring the knowledge, skills, and abilities (KSAs) that comprise the cybersecurity competency of an OISU. Primarily using the Delphi methodology, this study implemented four phases of data collection using cybersecurity SMEs for proposing and …


Synergistic Security: A Work System Case Study Of The Target Breach, Martha Nanette Harrell Dec 2017

Synergistic Security: A Work System Case Study Of The Target Breach, Martha Nanette Harrell

Journal of Cybersecurity Education, Research and Practice

Recent publicized security breaches can be used to evaluate information security programs. The processes and procedures that allowed the event to occur can be examined in a case study and then be used to find methods for future mitigation of risk. The Target security breach is used in this study to examine the organization’s information security program using a macro-ergonomic model. This research posits that an information security program should consider the work system design, based in macro-ergonomics, to help mitigate information security risk to the organization and ensure an efficient and effective information security program. Based on a seminal …


Buzzwords Dec 2017

Buzzwords

Marriott Student Review

Learn how to use the following buzzwords correctly:

  • Kill chain
  • Storytelling
  • ROR
  • Moat
  • Push Tolerance


Unexpected Connections: Full Issue Of Volume 1, Issue 3, Marianna E. Richardson Dec 2017

Unexpected Connections: Full Issue Of Volume 1, Issue 3, Marianna E. Richardson

Marriott Student Review

Unexpected Connections is the Fall 2017 Issue of Marriott Student Review.


Horizontal Cybersurveillance Through Sentiment Analysis, Margaret Hu Dec 2017

Horizontal Cybersurveillance Through Sentiment Analysis, Margaret Hu

William & Mary Bill of Rights Journal

This Essay describes emerging big data technologies that facilitate horizontal cybersurveillance. Horizontal cybersurveillance makes possible what has been termed as “sentiment analysis.” Sentiment analysis can be described as opinion mining and social movement forecasting. Through sentiment analysis, mass cybersurveillance technologies can be deployed to detect potential terrorism and state conflict, predict protest and civil unrest, and gauge the mood of populations and subpopulations. Horizontal cybersurveillance through sentiment analysis has the likely result of chilling expressive and associational freedoms, while at the same time risking mass data seizures and searches. These programs, therefore, must be assessed as adversely impacting a combination …


The Future Of Nuclear Security: A Medical Physicist’S Perspective, Katharine E. Thomson Dec 2017

The Future Of Nuclear Security: A Medical Physicist’S Perspective, Katharine E. Thomson

International Journal of Nuclear Security

Planning for the future of nuclear security is a vital and complex task, requiring cooperation and contribution from many disciplines and industries. This diversity of expertise should include the medical sector, which faces many of the same challenges as the nuclear industry: controlling access to dangerous material, creating a strong security culture, cooperating with the wider world and engaging the public.

Medical physicists, of which the author is one, oversee all aspects of small-scale radiation use. This paper discusses three key areas increasingly important to both medical and nuclear uses of radioactive materials: public engagement, prevention of nuclear and radiological …


The Investigative Dynamics Of The Use Of Malware By Law Enforcement, Paul Ohm Dec 2017

The Investigative Dynamics Of The Use Of Malware By Law Enforcement, Paul Ohm

William & Mary Bill of Rights Journal

The police have started to use malware—and other forms of government hacking—to solve crimes. Some fear coming abuses—the widespread use of malware when traditional investigative techniques would work just as well or to investigate political opponents or dissident speakers. This Article argues that these abuses will be checked, at least in part, by the very nature of malware and the way it must be controlled. This analysis utilizes a previously unformalized research methodology called “investigative dynamics” to come to these conclusions. Because every use of malware risks spoiling the tool—by revealing a software vulnerability that can be patched—the police will …


Encryption, Asymmetric Warfare, And The Need For Lawful Access, Geoffrey S. Corn Dec 2017

Encryption, Asymmetric Warfare, And The Need For Lawful Access, Geoffrey S. Corn

William & Mary Bill of Rights Journal

No abstract provided.


Touch Dna And Chemical Analysis Of Skin Trace Evidence: Protecting Privacy While Advancing Investigations, Mary Graw Leary Dec 2017

Touch Dna And Chemical Analysis Of Skin Trace Evidence: Protecting Privacy While Advancing Investigations, Mary Graw Leary

William & Mary Bill of Rights Journal

This Article addresses touch DNA, chemical analysis of skin traces, and the implications for crime scene investigation, arguing that changes in how trace evidence is analyzed require alterations in the law’s approach to its use. Part I discusses the history of traditional DNA analysis. Part II examines the emergence of touch DNA and related technologies and how they differ from traditional DNA analysis. Part III outlines the specific risks created by the collection and storing of results under the current outdated jurisprudence. Part IV focuses on specific risks to suspects and victims of crime. Part V proposes a legal framework …


Private Actors, Corporate Data And National Security: What Assistance Do Tech Companies Owe Law Enforcement?, Caren Morrison Dec 2017

Private Actors, Corporate Data And National Security: What Assistance Do Tech Companies Owe Law Enforcement?, Caren Morrison

William & Mary Bill of Rights Journal

When the government investigates a crime, do citizens have a duty to assist? This question was raised in the struggle between Apple and the FBI over whether the agency could compel Apple to defeat its own password protections on the iPhone of one of the San Bernardino shooters. That case was voluntarily dismissed as moot when the government found a way of accessing the data on the phone, but the issue remains unresolved.

Because of advances in technology, software providers and device makers have been able to develop almost impenetrable protection for their customers’ information, effectively locking law enforcement out …


Factors Affecting Faculty Use Of Video Conferencing In Teaching: A Mixed-Method Study, Juhong Christie Liu, Rob Alexander Dec 2017

Factors Affecting Faculty Use Of Video Conferencing In Teaching: A Mixed-Method Study, Juhong Christie Liu, Rob Alexander

Journal of Educational Technology Development and Exchange (JETDE)

Teaching and learning can now utilize a variety of real-time technologies to build online social presence and learning interactions. However, teachers and students must effectively prepare for this experience; and the identification of contextual and perceptual influences become evolving and necessary (Lehman & Conceição, 2010; Liu & Kaye, 2016). In this paper, the authors explore factors that impact faculty use of synchronous video conferencing (VC) in teaching. The two-phase mixed-method study spanned a year, converging qualitative and quantitative approaches through observations and recordings during a 6-week faculty professional development program, a campus-wide survey, and focus groups. Thematic analysis was used …


Five Reasons Why Crisis Communications Fails, Ross K. Goldberg Dec 2017

Five Reasons Why Crisis Communications Fails, Ross K. Goldberg

The Journal of Values-Based Leadership

No abstract provided.


Winter/Spring 2018 Dec 2017

Winter/Spring 2018

The Journal of Values-Based Leadership

No abstract provided.


A Palimpsest Of Diné Voices, Frances Vitali, Brian C. O'Connor Dec 2017

A Palimpsest Of Diné Voices, Frances Vitali, Brian C. O'Connor

Proceedings from the Document Academy

We use the idea of a palimpsest to probe and illuminate Hayse's model of communication as a dance - not simply the erasure of a single manuscript but the scraping away of the communication system of an entire people.

Among Navajo (Dine’), oral tradition and oral language still operates within mediated print and digital technologies as a complementarity. There is still a commitment to honoring whose voice is telling the stories in American Indian literature, for colonialist attitudes may still be coded with unchallenged stereotypes, cultural inaccuracies for readers.

Modeling the intersection of Diné culture and Anglo culture – both …


The Scrivener’S Secrets Seen Through The Spyglass: Gchq And The International Right To Journalistic Expression, Matthew B. Hurowitz Dec 2017

The Scrivener’S Secrets Seen Through The Spyglass: Gchq And The International Right To Journalistic Expression, Matthew B. Hurowitz

Brooklyn Journal of International Law

As part of the U.K.’s electronic surveillance program, the Government Communications Headquarters (GCHQ), started in 1909 to combat German Spies, now collects metadata from both foreigners and its own citizens. Through the express statutory authority of the Regulation of Investigatory Powers Act of 2000 (RIPA), and a loophole in section 94 of the Telecommunications Act of 1984, the GCHQ collects metadata, which is all of the information that is extrinsic to the actual contents of a communication. The GCHQ can request an authorization from a public authority—a member of its own staff—to collect traffic data, service use information, or subscriber …


Secrecy For The Sake Of It: The Defend Trade Secrets Act, Lauren Rayner Davis Dec 2017

Secrecy For The Sake Of It: The Defend Trade Secrets Act, Lauren Rayner Davis

Brooklyn Law Review

With foreign economic espionage and national security concerns thrust to the forefront of the discussion, Congress nearly unanimously passed the Defend Trade Secrets Act after a concerted effort by the executive branch, federal law enforcement, and intellectual property scholars. While this landmark legislation provides the long sought-after grounds of original federal jurisdiction for trade secret misappropriation claims, the statute also offers litigants a powerful remedy—the ex parte seizure provision. This unprecedented provision in trade secrets law allows a plaintiff, with no notice to the defendant, to file an application with the court requesting that U.S. Marshals seize and hold the …


Our Digital Legacy: An Archival Perspective, Michael S. Moss, Tim J. Gollins Dec 2017

Our Digital Legacy: An Archival Perspective, Michael S. Moss, Tim J. Gollins

Journal of Contemporary Archival Studies

Our digital memories are threatened by archival hubris, technical misdirection, and simplistic application of rules to protect privacy rights. The obsession with the technical challenge of digital preservation has blinded much of the archival community to the challenges, created by the digital transition, to the other core principles of archival science - namely, appraisal (what to keep), sensitivity review (identifying material that cannot yet be disclosed for ethical or legal reasons) and access. The essay will draw on the considerations of appraisal and sensitivity review to project a vision of some aspects of access to the Digital Archive. This essay …


Ethics In The Cloud, Corinne Rogers, Luciana Duranti Dec 2017

Ethics In The Cloud, Corinne Rogers, Luciana Duranti

Journal of Contemporary Archival Studies

For the past several decades, information communication technologies (ICTs) have been changing the way we create, share, and keep our records and data. How are we adapting? Today, individuals and organizations are increasingly creating, sharing, and storing information of all kinds in the cloud, some of them with the same expectations of privacy, access, intellectual rights, and control they have when storing it in in-house systems, either digital or analog. Such expectations provoke outrage when it is discovered that behavior in the cloud is not guided by long-established ethical rules guiding information creation, sharing, and use, but needs to be …


Virtually Free Speech: The Problem Of Unbridled Debates On Social Media Dec 2017

Virtually Free Speech: The Problem Of Unbridled Debates On Social Media

Intuition: The BYU Undergraduate Journal of Psychology

How individuals communicate on the internet has been influenced by the rise of social networking and the introduction of Web 2.0. Contentious sociopolitical arguments containing false polarization and confirmation bias, accompanied by egocentric and ethnocentric thinking are common. Ideological radicalization has also increased, as evidenced by the prevalence of ISIS and White supremacists on sites such as Twitter and Reddit. One consequence is the online practice known as flaming—intensely aggressive, personal verbal attacks. To reduce its occurrence, both macro- and micro-solutions should be implemented. On the macro-level, social networks and related online organizations should establish and enforce guide lines while …


"The Exclusive Right To Their Writings": Copyright And Control In The Digital Age, Jane C. Ginsburg Dec 2017

"The Exclusive Right To Their Writings": Copyright And Control In The Digital Age, Jane C. Ginsburg

Maine Law Review

The recent coincidence of new technology and new legislation in the United States may have enhanced the ability of U.S. copyright owners to wield electronic protective measures to control the exploitation of their works. The legislation, which reinforces the technology, has led many to perceive and to deplore a resulting imbalance between copyright owners and the copyright-using public. Critics assert that the goals of copyright law have never been, and should not now become, to grant “control” over works of authorship. Instead, copyright should accord certain limited rights over some kinds of exploitations. Economic incentives to create may be needed …


Telecommuting: The Escher Stairway Of Work/Family Conflict, Michelle A. Travis Dec 2017

Telecommuting: The Escher Stairway Of Work/Family Conflict, Michelle A. Travis

Maine Law Review

According to Working Mother magazine, telecommuting is a “wonderful arrangement for working moms.” Advertisements for telecommuting jobs and related technologies show us pictures of these happy telecommuting moms, who are conducting important business on the telephone or typing busily at their computers, as their smiling toddlers play quietly by their sides or sit contentedly in their laps. Some employers have offered this wonderful experience in direct response to concerns raised by “women's issues” committees. That was probably just what Jack Nilles had in mind when he first coined the term “telecommuting” in the 1970s and described it as a way …