Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Law (300)
- Social and Behavioral Sciences (108)
- Physical Sciences and Mathematics (85)
- Computer Sciences (80)
- Engineering (72)
-
- Computer Engineering (54)
- Business (48)
- Internet Law (48)
- Computer Law (46)
- Education (44)
- Privacy Law (43)
- Arts and Humanities (41)
- Science and Technology Law (36)
- Information Security (35)
- International Law (29)
- Communication (28)
- Intellectual Property Law (26)
- Public Affairs, Public Policy and Public Administration (26)
- Medicine and Health Sciences (25)
- Operations Research, Systems Engineering and Industrial Engineering (24)
- Artificial Intelligence and Robotics (23)
- Military, War, and Peace (22)
- Numerical Analysis and Scientific Computing (22)
- Systems Science (22)
- First Amendment (21)
- Electrical and Computer Engineering (19)
- National Security Law (19)
- Higher Education (18)
- Health Law and Policy (16)
- History (16)
- Institution
-
- University of South Florida (26)
- Universitas Indonesia (23)
- China Simulation Federation (22)
- U.S. Naval War College (21)
- Duke Law (18)
-
- Embry-Riddle Aeronautical University (18)
- Fordham Law School (17)
- Southern Methodist University (17)
- TÜBİTAK (17)
- Kennesaw State University (12)
- University of North Carolina School of Law (12)
- Vanderbilt University Law School (12)
- Bridgewater State University (11)
- University of Maryland Francis King Carey School of Law (11)
- California State University, San Bernardino (10)
- University of Michigan Law School (10)
- University of Pennsylvania Carey Law School (10)
- American Dental Association (9)
- University of Miami Law School (9)
- Nova Southeastern University (8)
- University of Tennessee College of Law (8)
- William & Mary Law School (8)
- Emory University School of Law (7)
- Loyola Marymount University and Loyola Law School (7)
- Ministry of Higher and Secondary Specialized Education of the Republic of Uzbekistan (7)
- The University of Akron (7)
- US Army War College (7)
- University of Washington School of Law (7)
- Brooklyn Law School (6)
- DePaul University (6)
- Keyword
-
- Cybersecurity (23)
- Internet (20)
- The U.S. Naval War College (18)
- Social media (14)
- Cyberspace (13)
-
- Privacy (13)
- Technology (13)
- Cybercrime (12)
- Russia (10)
- Cyber (7)
- Facebook (7)
- First Amendment (7)
- Intellectual property (7)
- International relations (7)
- China (6)
- GDPR (6)
- International security (6)
- National security (6)
- Strategy (6)
- Artificial Intelligence (5)
- Bitcoin (5)
- Cryptocurrency (5)
- Data breach (5)
- Blockchain (4)
- Communications Decency Act (4)
- Cyberbullying (4)
- Ethics (4)
- Freedom of speech (4)
- Innovation (4)
- Law (4)
- Publication
-
- Journal of System Simulation (22)
- Naval War College Review (18)
- Turkish Journal of Electrical Engineering and Computer Sciences (17)
- Journal of Digital Forensics, Security and Law (13)
- Military Cyber Affairs (13)
-
- Journal of Strategic Security (12)
- Duke Law & Technology Review (11)
- International Journal of Cybersecurity Intelligence & Cybercrime (9)
- The Journal of the Michigan Dental Association (9)
- Journal of Cybersecurity Education, Research and Practice (8)
- Vanderbilt Journal of Entertainment & Technology Law (8)
- Fordham Law Review (7)
- Maryland Law Review (7)
- SMU Data Science Review (7)
- The US Army War College Quarterly: Parameters (7)
- Fordham Intellectual Property, Media and Entertainment Law Journal (6)
- Nebraska Law Review (6)
- Transactions: The Tennessee Journal of Business Law (6)
- Asia-Pacific Social Science Review (5)
- Emory International Law Review (5)
- Jurnal Kajian Stratejik Ketahanan Nasional (5)
- Jurnal Komunikasi Indonesia (5)
- Paideia (5)
- University of Miami National Security & Armed Conflict Law Review (5)
- Akron Law Review (4)
- Communications of the IIMA (4)
- DePaul Law Review (4)
- Dickinson Law Review (2017-Present) (4)
- Fordham International Law Journal (4)
- Idaho Law Review (4)
Articles 1 - 30 of 684
Full-Text Articles in Entire DC Network
The Effect Of Arias Learning Model On The Learning Outcomes About Continental Food Processing In Bogor 3 State Vocational Schools From Creativity Of Students, Supari Muslim, Nisa Rahmaniyah Utami, Rita Ismawati, Erina Rahmadyanti, Nita Kusumawati, Ridwan Che Rus
The Effect Of Arias Learning Model On The Learning Outcomes About Continental Food Processing In Bogor 3 State Vocational Schools From Creativity Of Students, Supari Muslim, Nisa Rahmaniyah Utami, Rita Ismawati, Erina Rahmadyanti, Nita Kusumawati, Ridwan Che Rus
Jurnal Pendidikan Vokasi
This study aims to obtain information about: (1) differences in learning outcomes between students who study using the ARIAS learning model and students who learn using direct learning (DL); (2) differences in learning outcomes between students who have high creativity and students who have low creativity; and (3) whether the relationship between the use of learning models and learning outcomes in continental food processing is influenced by students' creativity. This experimental study was conducted using a 2 x 2 factorial design, with the moderator variable being students' creativity. In the experiment, the separation of the level of student creativity was …
A Cacophony Of Speech, Law, And Persona: Battling Against The Vortex Of #Metoo In France And The U.S., Anne Wagner, Sarah Marusek
A Cacophony Of Speech, Law, And Persona: Battling Against The Vortex Of #Metoo In France And The U.S., Anne Wagner, Sarah Marusek
Journal of Civil Law Studies
The pervasive proliferation of rumors, through #MeToo and #BalanceTonPorc, communicates meaningful and meaningless-making processes on misconducts both in the French and U.S. con-texts. Such rumors have transformed the online practices by culti-vating both verbal and non-verbal hate speech free and/or free speech. This cacophony of speech, law, and persona has led to a debate relayed on social media platforms, exposing people to a dan-ger zone mostly based as shame, hate, fear, or even destruction, as anonymity and due process no longer prevail.
Book Review: Indonesia's Digital-Based Economic Transformation: The Emergence Of New Technological, Business, Economic, And Policy Trends In Indonesia, Anika Widiana
Economics and Finance in Indonesia
No abstract provided.
Maintaining Economic Stabilization In Indonesia And South Korea Through Digital Farming, Aprillia Christianawati
Maintaining Economic Stabilization In Indonesia And South Korea Through Digital Farming, Aprillia Christianawati
Journal of Environmental Science and Sustainable Development
Digital farming is a type of digital economy that cannot be separated from essential elements, such as data availability and farmers themselves. Digital farming is found easily in many developed or agricultural countries, such as southern Europe and Brazil, nor to Indonesia and South Korea. However, Indonesia and South Korea experienced internet utilization and agricultural land area discrepancies which come to similar result, still developing sustainable agriculture. Thus, subjects of the study are Indonesia and South Korea due to their location in the Asian continent and similar history as developing countries in the past. Using farmer households and land agricultural …
Sistem Kendali Dan Akuisisi Data Suhu Serta Kelembaban Ruang Budidaya Jamur Tiram (Pleurotus Ostreatus) Berbasis Internet Of Things (Iot), Amalia Rohmah, Satriyo Agung Dewanto
Sistem Kendali Dan Akuisisi Data Suhu Serta Kelembaban Ruang Budidaya Jamur Tiram (Pleurotus Ostreatus) Berbasis Internet Of Things (Iot), Amalia Rohmah, Satriyo Agung Dewanto
Elinvo (Electronics, Informatics, and Vocational Education)
This study aims to determine the performance of temperature and humidity control technology of the Internet of Things (IoT) automatic oyster mushroom cultivation space. The stages of device development consist of analysis, design, assembly and testing. The design developed combines hardware control, software, and cloud server. This tool consists of 3 main processes, namely input using DHT11 sensors, process and output, namely 220 V AC actuators. There are two tests namely technical and effectiveness. The test results that have been carried out are: (1) the performance test results obtained an average error of 1.44% and a mean humidity of 3.35%, …
View Or Download The Full Issue
The Persuasive Da'wah Communication Of Kh Asyhari Marzuqi And Its Implications In Modern Life, Anton Prasetyo
The Persuasive Da'wah Communication Of Kh Asyhari Marzuqi And Its Implications In Modern Life, Anton Prasetyo
Informasi
This research was aimed to find out one of the Da'wah activists, namely KH Asyhari Marzuqi in delivering Da'wah material. Was it using persuasive words or just the opposite, coercive that causes fear? By using persuasive communication theory and other related theories, researchers analyzed the data using qualitative research methods. The approach used in this study was a case study. Data analysis model was with explanation development. Qualitative research is identical to a critical and interpretative research. After conducting the research, the researcher obtained the result that KH Asyhari Marzuqi was a figure of Da'i who was able to preach …
Parents' Perception Towards The Effect Of Mobile And Internet Use On Their Children's Health, Ahmed A. Mashal, Ali M. Elshafie, Nagwa N. Hegazy, Yousra A. Alghalban
Parents' Perception Towards The Effect Of Mobile And Internet Use On Their Children's Health, Ahmed A. Mashal, Ali M. Elshafie, Nagwa N. Hegazy, Yousra A. Alghalban
Menoufia Medical Journal
Objective The aim of this study was to identify parents' perception towards the effect of internet use on their children health. Background The consequences of using internet sources at a young age are currently being studied comprehensively across the different parts of the world, as surfing the web had been found to have its pros and cons. It gives users independence, provides opportunities for global learning, and creates a platform for initiating social change. In contrast, it increase the likelihood of engaging in high risk and socially destructive behaviors. Parents recognize the significance of adopting technology in order to function …
Parents' Role In Teens' Personal Photo Sharing: A Moderated Mediation Model Incorporating Privacy Concerns And Network Size, Cong Liu, May Lwin, Rebecca Ang
Parents' Role In Teens' Personal Photo Sharing: A Moderated Mediation Model Incorporating Privacy Concerns And Network Size, Cong Liu, May Lwin, Rebecca Ang
Makara Human Behavior Studies in Asia
Disclosure of personal photographs on social networking sites could lead to potential harm to adolescent users. This study aims to understand parents’ role in adolescents’ visual information disclosure on Facebook as well as the mediating role of privacy concern and moderating role of Facebook network size. A total of 351 secondary school students who use Facebook participated in the study (49.6% boys; mean age M = 13.98, SD = 0.94). Results showed a significant mediating effect of privacy concern on the relationship between parental mediation and visual disclosure (b= -0.07, Boot SE = 0.02, 95% CI [-0.116, -0.028]). Furthermore, the …
Internet Screen Time And Related Factors: Threat To Adolescence In Indonesia, Kristiana Kurniasanti, Karina Firdaus, Hans Christian, Tjhin Wiguna, Martina Wiwie, Raden Ismail
Internet Screen Time And Related Factors: Threat To Adolescence In Indonesia, Kristiana Kurniasanti, Karina Firdaus, Hans Christian, Tjhin Wiguna, Martina Wiwie, Raden Ismail
Makara Human Behavior Studies in Asia
The widespread use of the internet has produced both positive and negative impacts. Among the latter is internet addiction (IA). The worldwide prevalence of this addiction has been measured at approximately 6%, although the specific prevalence in Indonesia is uncertain because no validated instrument to measure IA has been developed for the Indonesian context. Hence, screen time was used in this study as an alternative measure of the magnitude of IA in Indonesia, where more than 6 hours is considered risk for IA. Researchers measured internet screen time (IST) and potential related factors in adolescents. The subjects of this cross-sectional …
The Evolution Of The German-Chinese Strategic Partnership: A Case Study Approach, Marian Ehret
The Evolution Of The German-Chinese Strategic Partnership: A Case Study Approach, Marian Ehret
Asia-Pacific Social Science Review
This paper examined current and future tendencies in the evolution of the German-Chinese strategic partnership. Because of current events, both countries acted increasingly aligned. The central research question is: will the strategic partnership between China and Germany supersede the American-German alliance regarding political importance? A literature review and a media content analysis in a German context, focusing on the years from 2013 until 2018, showed that German scholars and publishers evaluated the direction and potential of the binational relations as (mostly) positive. As their judgment came from a short-term observation, Oswald Spengler’s culture-historical approach was applied, as it allowed embedding …
Development Of Structures Of Intellectual Information Protection System, Tulkun Fayzievich Bekmuratov, Fayzullajon Bakhtiyorovich Botirov
Development Of Structures Of Intellectual Information Protection System, Tulkun Fayzievich Bekmuratov, Fayzullajon Bakhtiyorovich Botirov
Chemical Technology, Control and Management
The structures of intelligent information protection systems are considered. The tree of tasks for protecting information of the information system of enterprise is presented. Information security management systems without automation of management processes and automated information security management systems are considered. The functional capabilities of multi-agent information protection systems are investigated and possible risks are analyzed. The proposed schemes of automated and automated information security management systems are described. The proposed technology for constructing a software package for an enterprise information security management system is considered, based on the concept of multi-agent systems as the basic technology for software implementation …
In Defense Of Brandenburg: The Aclu And Incitement Doctrine In 1919, 1969, And 2019, Emerson J. Sykes
In Defense Of Brandenburg: The Aclu And Incitement Doctrine In 1919, 1969, And 2019, Emerson J. Sykes
Brooklyn Law Review
In the United States, full-throated advocacy—even advocacy of violence—is protected by the First Amendment of the Constitution. Few other countries define “incitement to violence” as narrowly, and governments tend to exploit any authority to regulate speech. The ACLU has played a central role in developing America’s speech-protective modern incitement doctrine over the last century, sometimes by representing clients with abhorrent views, including in the landmark Brandenburg v. Ohio. The Brandenburg test sets a high bar for incitement that should be maintained, even with respect to online speech. Calls for increased regulation of speech should not be heeded.
Protecting The Millennial Generation: Beyond The Scope Of The Internet, Alexandria Vasquez Esq.
Protecting The Millennial Generation: Beyond The Scope Of The Internet, Alexandria Vasquez Esq.
Child and Family Law Journal
No abstract provided.
Critical Engagement On Digital Sovereignty In International Relations: Actor Transformation And Global Hierarchy, Abid A. Adonis
Critical Engagement On Digital Sovereignty In International Relations: Actor Transformation And Global Hierarchy, Abid A. Adonis
Global: Jurnal Politik Internasional
The idea of digital sovereignty in the last twenty years increasingly reifies into chiefly policy making debates as the reaction of China’s determined activism on internet governance, Snowden’s case, and increasingly big internet corporations’ unchecked endeavors. International actors’ growing concerns on security, economy, data protection, and socio-political issues invoke new discourses on digital sovereignty since it bears global political consequences by nature. This stimulates recent intellectual debate in academic literature on how digital sovereignty affects (or be affected by) international politics. This article critically examines the development of digital sovereignty literatures. This article classifies literature taxonomically on four major themes: …
Reterminalization Phenomenon In The Process Of Formation Of Internet Terminology, Dilfuzakhon Saidkodirova Senior Teacher, Phd Department Of Intensive Teaching Of Second Language
Reterminalization Phenomenon In The Process Of Formation Of Internet Terminology, Dilfuzakhon Saidkodirova Senior Teacher, Phd Department Of Intensive Teaching Of Second Language
Philology Matters
The article analyses features of Internet terms in formation of borrowings. Analysis of the structure of Internet terminology in Uzbek shows that majority of Internet terms are borrowed from English and some of them are borrowed from Russian. This is the main point of researching problems of borrowings, structural features of Internet terms in the Uzbek language. There are some-terms, semi terms which were borrowed by model words (tracing and semi tracing) in the Uzbek language. Moreover we can see that borrowed Internet terms from English and Russian are formed with the help of prefixes, which are quite often used …
Smart Factories, Dumb Policy? Managing Cybersecurity And Data Privacy Risks In The Industrial Internet Of Things, Scott J. Shackelford
Smart Factories, Dumb Policy? Managing Cybersecurity And Data Privacy Risks In The Industrial Internet Of Things, Scott J. Shackelford
Minnesota Journal of Law, Science & Technology
No abstract provided.
When Cute Becomes Criminal: Emoji, Threats And Online Grooming, Marilyn M. Mcmahon, Elizabeth A. Kirley
When Cute Becomes Criminal: Emoji, Threats And Online Grooming, Marilyn M. Mcmahon, Elizabeth A. Kirley
Minnesota Journal of Law, Science & Technology
No abstract provided.
Independent Cinema In The Digital Age: Is Digital Transformation The Only Way To Survival?, Karolina Maria Sadlowska, Paula Sonja Karlsson, Steven Caldwell Brown
Independent Cinema In The Digital Age: Is Digital Transformation The Only Way To Survival?, Karolina Maria Sadlowska, Paula Sonja Karlsson, Steven Caldwell Brown
Economic and Business Review
Development of digital technologies has resulted in the creative and cultural industries having to adapt business models in light of evolving consumer preferences. This paper aims to examine how independent cinemas can transform their delivery in light of the challenges posed by digital disruption, and more specifically, whether this has to focus entirely on digital transformation. This conceptual paper examines one independent cinema in Scotland, concluding that digitalisation should be used to complement existing activities, along with exploring other innovative business models. It is crucial to understand that the old-time patterns of running a business have irrevocably changed.
Construction 4.0 – Digital Transformation Of One Of The Oldest Industries, Robert Klinc, Žiga Turk
Construction 4.0 – Digital Transformation Of One Of The Oldest Industries, Robert Klinc, Žiga Turk
Economic and Business Review
In the early 2010s, the German industry started their reform and revival under the keyword "Industrie Vier Punkt Null". The European Union’s strategies adopted most of the ideas and member states followed. The European construction industry too stared to explore how to benefit from it. In this review paper, we explain the ideas behind Industry 4.0. We present aspects of Industry 4.0: what it means for the customer, business and industry as a whole. Based on that framework we analysed the potentials of Industry 4.0 in the construction industry and where – due to some specifics of the industry – …
Implementing Ethics Into Artificial Intelligence: A Contribution, From A Legal Perspective, To The Development Of An Ai Governance Regime, Axel Walz, Kay Firth-Butterfield
Implementing Ethics Into Artificial Intelligence: A Contribution, From A Legal Perspective, To The Development Of An Ai Governance Regime, Axel Walz, Kay Firth-Butterfield
Duke Law & Technology Review
The increasing use of AI and autonomous systems will have revolutionary impacts on society. Despite many benefits, AI and autonomous systems involve considerable risks that need to be managed. Minimizing these risks will emphasize the respective benefits while at the same time protecting the ethical values defined by fundamental rights and basic constitutional principles, thereby preserving a human centric society. This Article advocates for the need to conduct in-depth risk-benefit-assessments with regard to the use of AI and autonomous systems. This Article points out major concerns in relation to AI and autonomous systems such as likely job losses, causation of …
Book Review Of "The Future Of War" By Lawrence Freedman, Jonathan A.S. Honig
Book Review Of "The Future Of War" By Lawrence Freedman, Jonathan A.S. Honig
International Journal of Nuclear Security
The Future of War, by Lawrence Freedman, is a comprehensive work on warfare, its evolution, and its predicted future course which is appropriate for experts and novices alike. Published in 2017, this book contains both historical and contemporary examples of warfare right up to such recent events as the Syrian civil war and the advent of the self-styled Islamic State group. This book is in its first edition and is an excellent marshaling of information on a varied and complex subject.
#Gaslighting, Karissa Moody
#Gaslighting, Karissa Moody
Counseling and Family Therapy Scholarship Review
As the utilization of social media continues to integrate itself into domains of culture, livelihood, and worldviews, the following exposition aims to introduce how such integration may pose as a new realm of gaslighting that has yet to be discussed. The progressive conceptualization of gaslighting as a form of manipulation will aid in providing readers with an understanding of this idea through a systemic lens by first, explaining underlying reasons for manipulation as an all-inclusive concept. The value of explication will serve in identifying plausible reasons of manipulation which pertain to the concept of gaslighting within social media. Within this …
Multi-Sensor Data Fusion With Network Delays And Correlated Noises, Shankai Zhang, Zhu Cui, Su Zhong, Dai Juan
Multi-Sensor Data Fusion With Network Delays And Correlated Noises, Shankai Zhang, Zhu Cui, Su Zhong, Dai Juan
Journal of System Simulation
Abstract: This paper focuses on the state estimation for multi-sensor system with network delays and correlated noises. An orthogonal transformation method is applied to remove the correlations between different noises. For the problem of packet delays due to the unreliable network, a buffer with certain length is introduced to store the measurements, and the measurements are reordered using a timestamp in the buffer. Based on that, a novel sequential data fusion algorithm is proposed, by which the influence of the noise correlation and packet delays can be weakened effectively. Compared with the traditional sequential fusion method, the proposed algorithm has …
Research On The Simulation Technology For Multi-Aerocraft Cooperative Guidance, Li Jing, Han Jian, Zhang Qing
Research On The Simulation Technology For Multi-Aerocraft Cooperative Guidance, Li Jing, Han Jian, Zhang Qing
Journal of System Simulation
Abstract: The formal system of multi- aerocraft cooperative simulation system is identified as the discrete event system & different equation system specifications (DEV&DESS) through the analysis of the composition and running mechanism. The running control problem of cooperative simulation system is transformed into simulation control problem of a specific DEV&DESS system. A dynamic operation control method for cooperative guidance simulation system based on coordinator is proposed, and this method is validated by real-time mathematical simulation experiments.
Featurization And The Myth Of Data Empowerment, Nur Lalji
Featurization And The Myth Of Data Empowerment, Nur Lalji
Washington Journal of Law, Technology & Arts
Every day, we make a series of tradeoffs between privacy and convenience. We may check our email, post on social media, use the free Wi-Fi in public spaces, or take our cellphones with us wherever we go without a clear understanding of what information we are giving away when we do so. Increasingly, we are seeing products that claim to defy this opaqueness associated with big data and put users at the helm of their information. These "featurized" products wrap themselves in a data empowerment narrative, but ultimately erode individual privacy in new ways, sometimes even capitalizing on it. This …
Censorship, Free Speech & Facebook: Applying The First Amendment To Social Media Platforms Via The Public Function Exception, Matthew P. Hooker
Censorship, Free Speech & Facebook: Applying The First Amendment To Social Media Platforms Via The Public Function Exception, Matthew P. Hooker
Washington Journal of Law, Technology & Arts
Society has a love-hate relationship with social media. Thanks to social media platforms, the world is more connected than ever before. But with the ever-growing dominance of social media there have come a mass of challenges. What is okay to post? What isn't? And who or what should be regulating those standards? Platforms are now constantly criticized for their content regulation policies, sometimes because they are viewed as too harsh and other times because they are characterized as too lax. And naturally, the First Amendment quickly enters the conversation. Should social media platforms be subject to the First Amendment? Can—or …
Gcps Adaptive Scheduling Model Based On Cooperative Executor, Zhang Jing, Chen Yao, Sun Jun, Hongbo Fan
Gcps Adaptive Scheduling Model Based On Cooperative Executor, Zhang Jing, Chen Yao, Sun Jun, Hongbo Fan
Journal of System Simulation
Abstract: Aiming at the problem that the uncertainty of grid cyber physical systems leads to chain failure, an adaptive GCPS dispatching model based on co-actuator is established. First, the constraint conditions of the system are analyzed. A model constraints of GCPS system is presented to describe the constraint conditions of the power system, and it is proved that it meets the consistency of the measure and representing methods. Second, the optimal value of approximation error is solved by PILOT, and the framework of CA-SADM is described. Finally, the performance index, output power accuracy and the influence of fault on the …
Review Of Evaluation Methods Of Contribution Rate To System Of Systems, Xiaojing Yin, Xiaofeng Hu, Rong Ming, Haiyang Liu, Yongli Yang
Review Of Evaluation Methods Of Contribution Rate To System Of Systems, Xiaojing Yin, Xiaofeng Hu, Rong Ming, Haiyang Liu, Yongli Yang
Journal of System Simulation
Abstract: The warfare is the encounter of system of systems (SoS). The evaluation on the contribution rate to SoS is of great importance to the development of operational SoS as a measure of the evaluating units’ contribution to SoS. In this paper the basic concept and classification of the contribution rate to operational SoS are elaborated; its connotation and nature are analyzed; and the current research status and the technical difficulties in this research field are summarized. The development trend is predicted, which provides a useful reference for relative research.