Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Law (278)
- Social and Behavioral Sciences (117)
- Internet Law (45)
- Physical Sciences and Mathematics (43)
- Science and Technology Law (40)
-
- Education (39)
- Business (38)
- Computer Sciences (38)
- Arts and Humanities (36)
- Sociology (33)
- Privacy Law (32)
- Computer Law (29)
- Information Security (28)
- Communication (27)
- Engineering (26)
- International Law (26)
- Public Affairs, Public Policy and Public Administration (23)
- Military, War, and Peace (21)
- Political Science (21)
- Defense and Security Studies (20)
- National Security Law (19)
- Computer Engineering (17)
- Constitutional Law (16)
- First Amendment (16)
- History (16)
- Intellectual Property Law (16)
- Law and Society (15)
- Psychology (15)
- International Humanitarian Law (14)
- International Relations (14)
- Institution
-
- U.S. Naval War College (131)
- Universitas Indonesia (24)
- Kennesaw State University (18)
- Southern Methodist University (17)
- University of South Florida (17)
-
- Embry-Riddle Aeronautical University (15)
- Nova Southeastern University (15)
- Vanderbilt University Law School (15)
- Brigham Young University (14)
- University of North Carolina School of Law (14)
- US Army War College (12)
- TÜBİTAK (10)
- Bridgewater State University (9)
- Duke Law (9)
- University of Maryland Francis King Carey School of Law (9)
- University of Michigan Law School (9)
- University of Pennsylvania Carey Law School (9)
- American University Washington College of Law (8)
- Northwestern Pritzker School of Law (8)
- Seton Hall University (8)
- The Catholic University of America, Columbus School of Law (8)
- University of Georgia School of Law (8)
- University of Minnesota Law School (8)
- University of Rhode Island (8)
- Brooklyn Law School (7)
- Fordham Law School (7)
- San Jose State University (7)
- Texas A&M University School of Law (7)
- University of Cincinnati College of Law (7)
- University of Miami Law School (7)
- Keyword
-
- The U.S. Naval War College (60)
- Cybersecurity (21)
- The u.s naval war college review (15)
- Book Review (13)
- Internet (13)
-
- Technology (12)
- Full Issue (11)
- Privacy (11)
- Russia (11)
- Social media (10)
- Book reviews (9)
- Blockchain (8)
- Education (7)
- Law of Armed Conflict (7)
- National security (7)
- Regulation (7)
- Book review (6)
- Bullying (6)
- International humanitarian law (5)
- International law (5)
- President's Forum (5)
- Security (5)
- Strategy (5)
- Young Adult (5)
- Artificial Intelligence (4)
- Artificial intelligence (4)
- China (4)
- Consent (4)
- Counterterrorism (4)
- Cryptocurrency (4)
- Publication
-
- Naval War College Review (126)
- Journal of Digital Forensics, Security and Law (12)
- The Qualitative Report (12)
- The US Army War College Quarterly: Parameters (12)
- Turkish Journal of Electrical Engineering and Computer Sciences (10)
-
- Journal of Cybersecurity Education, Research and Practice (9)
- Military Cyber Affairs (8)
- Minnesota Journal of Law, Science & Technology (8)
- Vanderbilt Journal of Transnational Law (8)
- Journal of Strategic Security (7)
- Nebraska Law Review (7)
- North Carolina Journal of Law & Technology (7)
- University of Cincinnati Law Review (7)
- Catholic University Journal of Law and Technology (6)
- International Journal of Cybersecurity Intelligence & Cybercrime (6)
- The International Lawyer (6)
- Children's Book and Media Review (5)
- Indiana Law Journal (5)
- International Law Studies (5)
- Jurnal Kajian Stratejik Ketahanan Nasional (5)
- Jurnal Komunikasi Indonesia (5)
- Penn State Law Review (5)
- SMU Science and Technology Law Review (5)
- Texas A&M Journal of Property Law (5)
- University of Miami Law Review (5)
- Vanderbilt Journal of Entertainment & Technology Law (5)
- Against the Grain (4)
- Chicago Journal of International Law (4)
- Dignity: A Journal of Analysis of Exploitation and Violence (4)
- Fordham International Law Journal (4)
Articles 1 - 30 of 703
Full-Text Articles in Entire DC Network
Introduction To Mca Issue, “Systemic Cyber Defense", Chris C. Demchak
Introduction To Mca Issue, “Systemic Cyber Defense", Chris C. Demchak
Military Cyber Affairs
No abstract provided.
The Evaluation Of Project-Based Learning In Malaysia: Propose A New Framework For Polytechnics System, Sadrina Sadrina, Ramlee Mustapha, Muhammad Ichsan
The Evaluation Of Project-Based Learning In Malaysia: Propose A New Framework For Polytechnics System, Sadrina Sadrina, Ramlee Mustapha, Muhammad Ichsan
Jurnal Pendidikan Vokasi
Technical and Vocational Education is one of the various disciplines that believed could encourage the country's economic growth. Project-Based Learning or PBL was introduced in the Malaysian polytechnics curriculum in terms to produce creative and innovative graduates Thus, Project-Based Learning was introduced because of the ineffectiveness of the traditional lecture method. This study was a kind of descriptive study intended to examine the perception of students and supervisors regarding the Project-Based Learning at one Polytechnic in Malaysia. A population of 170 would be represented by a sample size of 118 respondents and 43 supervisors to participate in the study. The …
The Media Framing Of The Selfie Between Miss Israel And Miss Lebanon From Cnn & Bbc Towards The Politic Interest, Sabrina Bawazier, Lestari Nurhajati
The Media Framing Of The Selfie Between Miss Israel And Miss Lebanon From Cnn & Bbc Towards The Politic Interest, Sabrina Bawazier, Lestari Nurhajati
Informasi
An international controversy occurred after the selfie between Miss Israel and Miss Lebanon went viral. The Instagram post received many responds from public whether its positive or negative feedbacks, the selfie itself involves a group photo of the Miss Universe contestants that are Miss Israel, Miss Lebanon, Miss Slovak and Miss Japan. After the post was posted by Miss Israel and went viral, Miss Lebanon received many critics relating to her existence in the picture. She was then accused of violating the Lebanon policy for being in contact with an Israeli whereas there are strict rules against any form of …
Kolaborasi Antara Universitas, Industri Dan Pemerintah Dalam Meningkatkan Inovasi Dan Kesejahteraan Masyarakat: Konsep, Implementasi Dan Tantangan, Basuki M. Mukhlish
Kolaborasi Antara Universitas, Industri Dan Pemerintah Dalam Meningkatkan Inovasi Dan Kesejahteraan Masyarakat: Konsep, Implementasi Dan Tantangan, Basuki M. Mukhlish
Jurnal Administrasi Bisnis Terapan
In the study of inter-organizational relationships, there is a tendency to look at relationships between two organizations (dyadic), and social networks are considered to be a combination of a number of dyadic relationships. There are often third parties who play a role in influencing the relationship between the two organizations, so the relationship becomes triadic. The third party referred to here is a relationship counselor who has a go-between role to safeguard, cultivate and develop social capital, help, adjust and resolve relationships between the two parties. One of the institutions that have a third role are innovation centers that have …
Pengaruh Gaya Komunikasi Dosen Dalam Proses Pembelajaran Terhadap Motivasi Belajar Mahasiswa Humas Program Pendidikan Vokasi, Pijar Suciati, Mareta Maulidiyanti, Fajar M. Triawinata, Nadya Rizkiyanti
Pengaruh Gaya Komunikasi Dosen Dalam Proses Pembelajaran Terhadap Motivasi Belajar Mahasiswa Humas Program Pendidikan Vokasi, Pijar Suciati, Mareta Maulidiyanti, Fajar M. Triawinata, Nadya Rizkiyanti
Jurnal Sosial Humaniora Terapan
Effect of Lecturer Communication Style in Learning-Teaching Process on Motivation of Student Learning in Class. The birth of online media can not be separated from the booming of online media that occurred abroad in the mid-1990s. People glance online media because there is saturation in the print media market post-reformation 1998. Online journalism is increasingly in demand, this is influenced by the development of technology and the tendency of people who prefer practical things, such as ease of reading online news through a gadget that can be done where just and anytime. Online news portals detik.com, kompas.com, and tempo.co occupies …
Strategi Peningkatan Brand Awareness Mobile Ticketing Apps Melalui Metode Integrated Marketing Communication, Arius Krypton
Strategi Peningkatan Brand Awareness Mobile Ticketing Apps Melalui Metode Integrated Marketing Communication, Arius Krypton
Jurnal Sosial Humaniora Terapan
Effectiveness of Integrated Marketing Communications on Aware Awareness Applications MobileTicketing Goers. Goers is one of the mobile-ticketing apps and information providers around events in Jakarta and Bandung. Goers was first launched on May 15, 2015 for the iOS operating system and August 17, 2015 for the Android system. Goers are under the auspices of PT Sanraya Adi Nattaya and Sammy Ramadan as CoFounder and CEO of Goers. Goers Travel for 2 years, has been working with more than 300 partners and provides thousands of information about events and events every month through applications, websites, and social media.Since the beginning of …
Using Case Studies To Teach Cybersecurity Courses, Yu Cai
Using Case Studies To Teach Cybersecurity Courses, Yu Cai
Journal of Cybersecurity Education, Research and Practice
This paper introduces a holistic and case-analysis teaching model by integrating case studies into cybersecurity courses. The proposed model starts by analyzing real-world cyber breaches. Students look into the details of these attacks and learn how these attacks took place from the beginning to the end. During the process of case analysis, a list of security topics reflecting different aspects of these breaches is introduced. Through guided in-class discussion and hands-on lab assignments, student learning in lecture will be reinforced. Overall, the entire cybersecurity course is driven by case studies. The proposed model is great for teaching cybersecurity. First, the …
The Communication Effectiveness Of Scientist-Stakeholder Partnerships Addressing Agriculture And Natural Resources Issues: An Analysis Of The Media Attention And Media Framing Of The Florida Water And Climate Alliance, Shuyang Qu, Tracy Irani
The Communication Effectiveness Of Scientist-Stakeholder Partnerships Addressing Agriculture And Natural Resources Issues: An Analysis Of The Media Attention And Media Framing Of The Florida Water And Climate Alliance, Shuyang Qu, Tracy Irani
Journal of Applied Communications
Scientist-stakeholder partnerships are formed by scientists from academic institutions and industry representatives in an effort to address contingent science issues such as climate change, inform the public and influence public policies. Such organizations often lack expertise in communicating to the public and conducting outreach which are crucial components to building a good reputation. This study selected Florida Water and Climate Alliance [FWCA] as an example of such an organization, exploring its media attention and media framing to assess the visibility and reputation of [FWCA]. Results showed very limited media attention had been devoted to [FWCA]. The framing analysis results indicated …
Forensic Analysis Of A Crash-Damaged Cheerson Cx-20 Auto Pathfinder Drone, Ian N. Mcateer, Peter Hannay, Muhammad I. Malik, Zubair Baig
Forensic Analysis Of A Crash-Damaged Cheerson Cx-20 Auto Pathfinder Drone, Ian N. Mcateer, Peter Hannay, Muhammad I. Malik, Zubair Baig
Journal of Digital Forensics, Security and Law
Long gone are the days when Unmanned Aerial Vehicles (UAVs) and drones (multirotor UAVs) were the exclusive domain of the military for surveillance or tactical strike purposes. For relatively little money mainly due to high-tech progression in microprocessor design, anyone can now purchase a drone with GNSS-tracking capabilities and can support a live high-resolution video feed to its flight controller. The global population of drones has sky- rocketed in recent years as this new technology has been embraced for both its recreational and commercial applications. However, the more nefarious members of society have also recognized the potential for using drones …
Russia Today, Cyberterrorists Tomorrow: U.S. Failure To Prepare Democracy For Cyberspace, Jonathan F. Lancelot
Russia Today, Cyberterrorists Tomorrow: U.S. Failure To Prepare Democracy For Cyberspace, Jonathan F. Lancelot
Journal of Digital Forensics, Security and Law
This paper is designed to expose vulnerabilities within the US electoral system, the use of cyberspace to exploit weaknesses within the information assurance strategies of the democratic and republican party organizations, and deficiencies within the social media communications and voting machine exploits. A brief history of discriminatory practices in voting rights and voting access will be set as the foundation for the argument that the system is vulnerable in the cyber age, and the need for reform at the local, state and national levels will be emphasized. The possibility of a foreign nation-state influencing the outcome of an election by …
Virus Wannacry Dalam Teks Berita: Analisis Wacana Kritis Atas Laman Kemkominfo, Kompas.Com, Dan Jawapos.Com, Izhatullaili Izhatullaili
Virus Wannacry Dalam Teks Berita: Analisis Wacana Kritis Atas Laman Kemkominfo, Kompas.Com, Dan Jawapos.Com, Izhatullaili Izhatullaili
Paradigma: Jurnal Kajian Budaya
Critical Discourse Analysis is a study that analyzes language usage in terms of linguistic features and a social practice. Each type of mass media shows a different tendency in conveying information through the language it uses. Likewise, there are some differences between government and non-government media as well. The data in this study were obtained by collecting texts related to WannaCry virus news taken from the Ministry of Communication and Information Technology, Kompas.com and JawaPos.com. Abductive inferences technique was used to draw conclusions by connecting one text to other texts. The different tendencies in media’s linguistic features and ideologies were …
An Examination Of Cybersecurity Knowledge Transfer: Teaching, Research, And Website Security At U.S. Colleges And Universities, Aditya Gupta, James R. Wolf
An Examination Of Cybersecurity Knowledge Transfer: Teaching, Research, And Website Security At U.S. Colleges And Universities, Aditya Gupta, James R. Wolf
Journal of Cybersecurity Education, Research and Practice
This work seeks to answer the question: Does faculty cybersecurity knowledge gained from teaching and research transfer to other IT units in the university? Specifically, do colleges and universities that excel in cybersecurity teaching and research have more secure websites? This work explores a unique setting where the knowledge of the source and recipient are both directly related and observable without outside intervention. Our study employed data from 591 U.S. colleges and universities, the National Centers of Academic Excellence (CAE) program, accepted paper data from the ACM Conference on Computer and Communications Security (CCS) and the IEEE Symposium on Security …
An Initial Exploration On Terrorism Issues In Malaysia And Indonesia: The Case Of The Wall Street Journal, Fauziah Hassan, Sofia Hayati Yuso㯬‚¬, Siti Zobidah Omar
An Initial Exploration On Terrorism Issues In Malaysia And Indonesia: The Case Of The Wall Street Journal, Fauziah Hassan, Sofia Hayati Yuso㯬‚¬, Siti Zobidah Omar
Informasi
The symbiotic relationship between Islam and media is inevitable. The frequent of media coverage about Islam has been researched by many especially since the remarkable incident of September 11 in 2001. From that moment, Islam has been viewed and labelled as negative by the Western media specifically to the Muslims living in America and those in the Middle East countries. This phenomenon has been contagious to the Muslims in Southeast Asian countries such as Malaysia and Indonesia as these two countries are believed to have a connection with recent terrorist groups such as Islamic State of Iraq and the Levant …
Family's Communication Pattern In Preventing Students' Violence In Yogyakarta, Chatia Hastasari, Suranto Aw, Mami Hajaroh
Family's Communication Pattern In Preventing Students' Violence In Yogyakarta, Chatia Hastasari, Suranto Aw, Mami Hajaroh
Informasi
This investigates the family's communication pattern to avoid senior high school student violence in Yogyakarta. This study employs a qualitative method taking a sample of ten people consist of students' parents (SMAN 6 Yogyakarta, SMAN 8 Yogyakarta, SMAN 9 Yogyakarta, SMA Bopkri 2 Yogyakarta, SMA Muhammadiyah 7 Yogyakarta, and SMA Tamansiswa Yogyakarta); teachers and society figure. The results are (1) Communication pattern which is used effectively to avoid students' violence is one way communication. In this situation parents can give advice and become a role model for their children; and (2) Communication patterns which are used innefectively to avoid students' …
The Narration Of Digital Literacy Movement In Indonesia, Mery Yanti, Yusnaini Yusnaini
The Narration Of Digital Literacy Movement In Indonesia, Mery Yanti, Yusnaini Yusnaini
Informasi
This article aims to analyze the digital literacy movement in Indonesia and its determinant using the narrative approach. Empirical research is carried out with qualitative content analysis methods. The primary data of the study came from 255 online news which contained digital literacy keywords that were detected by Google search engines and published in trusted online media. Secondary data collected from publications of government, private, and civil society organizations related to digital literacy. We use an interactive model and Atlas.ti 8 to analyze research data. The results showed that each actor had a variety of views about the definitions and …
From The Editors, Carole L. Hollingsworth, Michael E. Whitman, Herbert J. Mattord
From The Editors, Carole L. Hollingsworth, Michael E. Whitman, Herbert J. Mattord
Journal of Cybersecurity Education, Research and Practice
Welcome to the Fall 2018 issue of the Journal of Cybersecurity Education, Research, and Practice (JCERP). On behalf of the editorial team, we thank you for taking the time to read this issue and strongly encourage you to submit an article for consideration in an upcoming edition.
Using A Game To Improve Phishing Awareness, Patrickson Weanquoi, Jaris Johnson, Jinghua Zhang
Using A Game To Improve Phishing Awareness, Patrickson Weanquoi, Jaris Johnson, Jinghua Zhang
Journal of Cybersecurity Education, Research and Practice
Cybersecurity education has become increasingly critical as we spend more of our everyday lives online. Research shows that college students are mostly unaware of the many online dangers. To teach students about cybersecurity using their preferred medium, gaming, we developed an educational 2D game called “Bird’s Life” that aims to teach college students, as well as general interest individuals, about phishing. Players will come to understand phishing attacks and how to avoid them in real-world scenarios through a fun gaming context. The game can be deployed to multiple platforms such as PC, web, and mobile devices. To measure the effect …
Good Governance Concept In Shaping Uzbekistan’S Strategy Of Action, D. Khamidova
Good Governance Concept In Shaping Uzbekistan’S Strategy Of Action, D. Khamidova
International Relations: Politics, Economics, Law
Good governance is process of making decision, examining, implementing and monitoring of state affairs. This broad notion and concept rather than government. Uzbekistan has already took measures; there are many things to be done in the field of good governance. In this context, it is critical important to build a shared vision of strategy in order to achieve desired goals.
The Development Of Concept Of Territory In International Relations, Ghifari Athallah Ramadhan
The Development Of Concept Of Territory In International Relations, Ghifari Athallah Ramadhan
Global: Jurnal Politik Internasional
The concept of territory, a politicized space, is not really explored in International Relations, even though territory is where International Relations happen physically. This article explores the development of the concept of territory in International Relations. By seeing the development of the concept of territory in International Relations, I could see the main arguments regarding territory. For example, I could understand the argument behind the jargon of “borderless world” or “return of geography”. In order to fully explain the development of the concept of territory in International Relations, I divide my research into five parts. First, I would describe the …
A Social Media Policy For Clinical Mental Health Counseling Programs, Rebecca A. Willow, David Tobin, Wei Y. Chong, Angela Jeffery, Danielle Strohmeyer, Nicole Morine
A Social Media Policy For Clinical Mental Health Counseling Programs, Rebecca A. Willow, David Tobin, Wei Y. Chong, Angela Jeffery, Danielle Strohmeyer, Nicole Morine
Journal of Counselor Preparation and Supervision
The American Counseling Association 2014 Ethical Code mandates that counselors who engage in social media communication develop knowledge and skills related to ethical and legal considerations (American Counseling Association, 2014). In response to these expectations, this article introduces a social media policy created by faculty in a Clinical Mental Health Counseling program. An example and review of an implemented social media policy is provided, along with guidelines for a student-led training program. Case examples are provided that illustrate potential dilemmas of student misuse of social media, along with examples of faculty interventions. This article is designed to contribute to the …
Developing A Pre-Practicum Environment For Beginning Counselors: Growing My Counselor Educator Self, Logan M. Lamprecht, Sneha Pitre
Developing A Pre-Practicum Environment For Beginning Counselors: Growing My Counselor Educator Self, Logan M. Lamprecht, Sneha Pitre
Journal of Counselor Preparation and Supervision
This paper is a narrative of the challenges experienced as a faculty member in an attempt to transform the existing educational model for how school and clinical mental health counselors are trained to enter field-based clinical experiences with students and clients. The author shares the pre-practicum laboratory training as an important step towards the growth of a counselor both personally and professionally. The laboratory training addresses aspects of student anxiety and self-efficacy with relation to live supervision with use of technology, nature of feedback, reflective journaling, reflective teams, and process group experiences as pedagogical adjuncts to enhance the training and …
Warning! Speak At Your Own Risk: First Amendment Restrictions On Off-Campus Physical, Emotional, Or Cyber Bullying, Melissa Anne Springer
Warning! Speak At Your Own Risk: First Amendment Restrictions On Off-Campus Physical, Emotional, Or Cyber Bullying, Melissa Anne Springer
University of Cincinnati Law Review
No abstract provided.
The Land And Naval Forces Clause, Dakota S. Rudesill
The Land And Naval Forces Clause, Dakota S. Rudesill
University of Cincinnati Law Review
No abstract provided.
Integrated Intelligent Systems For Industrial Automation: The Challenges Of Industry 4.0, Information Granulation And Understanding Agents ., N.R Yusupbekov, V.B Tarassov
Integrated Intelligent Systems For Industrial Automation: The Challenges Of Industry 4.0, Information Granulation And Understanding Agents ., N.R Yusupbekov, V.B Tarassov
Chemical Technology, Control and Management
The objective of the paper consists in considering the challenges of new automation paradigm Industry 4.0 and reviewing the-state-of-the-art in the field of its enabling information and communication technologies, including Cyberphysical Systems, Cloud Computing, Internet of Things and Big Data. Some ways of multi-dimensional, multi-faceted industrial Big Data representation and analysis are suggested. The fundamentals of Big Data processing with using Granular Computing techniques have been developed. The problem of constructing special cognitive tools to build artificial understanding agents for Integrated Intelligent Enterprises has been faced.
Counteraction To Cyber Terrorism: International Legal And Criminal Legal Aspects, A. Rasulev
Counteraction To Cyber Terrorism: International Legal And Criminal Legal Aspects, A. Rasulev
Review of law sciences
This article analysis the international acts and standards of the foreign criminal legislation providing questions of counteraction to cyberterrorism.
Shanghai Cooperation Organization As The Basis Economic Development And Collective Security, D. Musaev
Shanghai Cooperation Organization As The Basis Economic Development And Collective Security, D. Musaev
Review of law sciences
The article is devoted to one of the directions of development of international economic relations at the regional level - the Shanghai Cooperation Organization (SCO). The process of the formation of the SCO is considered, the state, problems and perspectives of the external economic interaction of its member states are analyzed. An assessment of the conditions, characteristics and development possibilities of the SCO is given.
The Impact Of Smart Media Technologies (Smt) On The Spiritual Experience Of Hajj Pilgrims, Jahanzeeb Qurashi, Richard A. Sharpley
The Impact Of Smart Media Technologies (Smt) On The Spiritual Experience Of Hajj Pilgrims, Jahanzeeb Qurashi, Richard A. Sharpley
International Journal of Religious Tourism and Pilgrimage
Over the last three decades, information and communication technologies have advanced rapidly and continue to do so. Nowadays, the popularity and spread of socalled Smart Media Technologies (SMT) is not only transforming the lives of tourists around the world in general, but is impacting on the experience of pilgrims on the Hajj in Saudi Arabia in particular. Indeed, the Saudi government has undertaken a number of initiatives to encourage the use of SMT in the religious tourism industry. Specifically, the availability of SMT services such as Hajj Apps, E-bracelets for pilgrims, free WIFI and mobile charging services in Grand Mosques …
Integrating Machine Learning In Law: A Precis Of Best Practices For Initial Law Firm Adoption, J. Mark Phillips
Integrating Machine Learning In Law: A Precis Of Best Practices For Initial Law Firm Adoption, J. Mark Phillips
The Journal of Business, Entrepreneurship & the Law
Much of the mystery surrounding machine learning lays not just in how it functions, but in how it is applied. This is especially true in the field of law, where the implementation of artificial intelligence has lagged other fields. This précis distills best practices of machine learning implementation and applies them succinctly to the unique environment of law. Guiding principles and considerations are provided for the technology team, the nature of law firm data, and the commitment level of the adopting law firm.
Curb Your Enthusiasm: The Real Implications Of Blockchain In The Legal Industry, Justin Evans
Curb Your Enthusiasm: The Real Implications Of Blockchain In The Legal Industry, Justin Evans
The Journal of Business, Entrepreneurship & the Law
No abstract provided.