Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Journal

Discipline
Institution
Keyword
Publication Year
Publication
File Type

Articles 1 - 30 of 10418

Full-Text Articles in Entire DC Network

Looking Ahead: Incorporating Ai In Mlis Competencies, Souvick Ghosh, Denise Mccoy May 2024

Looking Ahead: Incorporating Ai In Mlis Competencies, Souvick Ghosh, Denise Mccoy

School of Information Student Research Journal

Libraries have long been essential for democratizing knowledge and providing reliable information, extending their services to meet diverse community needs, including educational programs and internet access (Pawley, 2022; Freudenberger, 2022). Librarians, as custodians of information and culture, possess core competencies in information organization, digital literacy, and research skills. The San José State University (SJSU) School of Information (iSchool) aims to educate professionals who significantly impact global communities through high-quality education, research, and technology innovation. This article examines the Master of Library and Information Science (MLIS) program at SJSU iSchool, focusing on the evolution of its 14 core competencies to incorporate …


Hashtag Counterpublics: #Lifeinleggings As Feminist Disruption To Mainstream Public Media Discourses, Alicia Haynes May 2024

Hashtag Counterpublics: #Lifeinleggings As Feminist Disruption To Mainstream Public Media Discourses, Alicia Haynes

Journal of International Women's Studies

This essay explores the disruptive impact that the hashtag #LifeinLeggings, founded by the Caribbean Alliance against Gender-Based Violence, had upon mainstream media, highlighting its role in reshaping public discourse from feminist counterpublics. It examines how women, through the sharing and documentation of their stories, unsettle mass media spaces to initiate crucial conversations about their mundane experiences with sexism and misogyny. Through a critical technocultural discourse analysis, I interrogate the disparities in discourse and representation of the movement in online newspapers at the start of the movement. The article contrasts the silence of local media in Barbados, with more detailed reporting …


Review Of “Varsity’S Soldiers: The University Of Toronto Contingent Of The Canadian Officers’ Training Corps, 1914-1968” By Eric Mcgeer, Joel Watson May 2024

Review Of “Varsity’S Soldiers: The University Of Toronto Contingent Of The Canadian Officers’ Training Corps, 1914-1968” By Eric Mcgeer, Joel Watson

Canadian Military History

Review of Varsity’s Soldiers: The University of Toronto Contingent of the Canadian Officers’ Training Corps, 1914-1968 by Eric McGeer


Volume 122, Number 6 - Tuesday, May 21st, 2024, Saint Mary's College Of California May 2024

Volume 122, Number 6 - Tuesday, May 21st, 2024, Saint Mary's College Of California

The Collegian

No abstract provided.


Trying Out The Electronic Case Management System In The Uae And Its Compliance With Fundamental Judicial Guarantees, Abdulla A. Alkhatib May 2024

Trying Out The Electronic Case Management System In The Uae And Its Compliance With Fundamental Judicial Guarantees, Abdulla A. Alkhatib

An-Najah University Journal for Research - B (Humanities)

This study considers the Electronic Case Management System (ECMS) and the challenges it faces in achieving basic litigation guarantees, according to the legislation of the UAE, and comparing them with the practices followed by the judicial authorities. The importance of the study lies in the fact that electronic justice has replaced the traditional justice system, where all procedures from registering the case, submitting memoranda, conducting trials, issuing judgments, appealing, and implementing them are carried out through it remotely. This raised the question about the extent to which ECMS provides basic litigation guarantees, specifically the principles of equality, confrontation, defense, and …


Pola Tuturan Perundungan Siber (Cyberbullying) Di Kalangan Pelajar Indonesia, Bayu Permana Sukma, Devi Ambarwati Puspitasari, Siti Afni Afiyani, Indah Okitasari, Dian Palupi, Fani Kusumawardani, Husnul Khatimah, Reza Amarta Prayoga May 2024

Pola Tuturan Perundungan Siber (Cyberbullying) Di Kalangan Pelajar Indonesia, Bayu Permana Sukma, Devi Ambarwati Puspitasari, Siti Afni Afiyani, Indah Okitasari, Dian Palupi, Fani Kusumawardani, Husnul Khatimah, Reza Amarta Prayoga

Bahasa dan Seni: Jurnal Bahasa, Sastra, Seni, dan Pengajarannya

Language evidence is consulted in dealing with cyberbullying cases. Linguistic analysis is used to reveal the nature of speech and cyberbullying expressions that have legal implications. This study aimed to find the speech patterns used by students in cyberbullying, identify the features of insults in cyberbullying speech, and identify the legal implications of cyberbullying speech on social media. 504 speech data were collected from Facebook and Twitter from January to April 2020. They were all written in social media accounts of Indonesian high school students. The cyberbullying speech data was analyzed qualitatively using forensic linguistics analysis, i.e., analyzing the linguistic …


Persepsi Mahasiswa Terhadap Informasi Hoax Di Media Digital, Nur Octavi Mandasari, Primardiana Hermilia Wijayati, Rizman Usman May 2024

Persepsi Mahasiswa Terhadap Informasi Hoax Di Media Digital, Nur Octavi Mandasari, Primardiana Hermilia Wijayati, Rizman Usman

Bahasa dan Seni: Jurnal Bahasa, Sastra, Seni, dan Pengajarannya

This study aims to determine student perception of hoax information distributed in digital media. The research is a survey study involving bachelor and master’s students from 18 study programs at the Faculty of Letters, Universitas Negeri Malang, as participants. Data were collected through questionnaires circulatedonline using Google Form. They were then analyzed using SPSS, including Descriptive Statistics and Independence Sample T-Test. The results showed that the majority of students aredeeply concerned about hoax information in digital media. The majority of students checked the information available in the media, confirmed whether the information received is valid, and further assessed that media …


The Legal Nature Of Cyberbullying: A Comparative Study Between The American And The Jordanian Laws, Alaeldin Mansour Maghaireh Dr. May 2024

The Legal Nature Of Cyberbullying: A Comparative Study Between The American And The Jordanian Laws, Alaeldin Mansour Maghaireh Dr.

UAEU Law Journal

The research is aimed to highlight the emerging phenomenon of cyberbullying in Jordan by analysing some of the main legal aspects of cyberbullying and relevant laws. It analysed whether the nature of the phenomenon constitutes a crime, and therefore, must be explicitly stated in the relevant laws, or it is only a bad social phenomenon that can be addressed within the school environment, and therefore no need for legislative provisions to prohibit it. The research showed the gravity of the psychological and physical effects of cyberbullying and its diversity forms and methods. Also, it underscored the paucity of the legal …


Choice Of Law Issues In Eleventh Circuit Insurance Cases Arising From Lex Loci Contractus, Tom Schulte, Andrea Defield, Jorge Aviles May 2024

Choice Of Law Issues In Eleventh Circuit Insurance Cases Arising From Lex Loci Contractus, Tom Schulte, Andrea Defield, Jorge Aviles

University of Miami Law Review

A growing number of cases have emerged from the Eleventh Circuit struggling with the application of lex loci contractus to choice-of-law issues in the insurance context. And while the federal courts continue to struggle, the state courts in the Eleventh Circuit have not yet offered definitive guidance on when to apply lex loci contractus, and when to depart from it. In light of this choice-of-law issue, which can be and often is outcome determinative, this Article offers practical guidance on how policyholders can avoid application of an unfavorable state’s law to their insurance dispute, both before and after litigation …


Protecting Elections And Its Workers During The Social Media Era, Julia López May 2024

Protecting Elections And Its Workers During The Social Media Era, Julia López

University of the Pacific Law Review

No abstract provided.


An Examination Of The Framing Of Canada’S Copyright Exclusive Rights And Exceptions From A Human Rights Perspective, Justice Ogoroh, Zachary Lomo May 2024

An Examination Of The Framing Of Canada’S Copyright Exclusive Rights And Exceptions From A Human Rights Perspective, Justice Ogoroh, Zachary Lomo

The Transnational Human Rights Review

This paper examines the intersection of the framing of copyright law in Canada from the perspective of human rights. The study seeks to reconcile the rights of creators with public access to content. Asserting that copyright law is not a human right but a means to uphold the inherent human rights of both creators and the public. This study explores the legal instruments that articulate a copyright framework that aims to achieve the reconciliation of the rights of creators and the public. The discussion begins with the roots of copyright in Canada, tracing back to the Statute of Anne, and …


Persecution Of Catholic Leaders In The Ussr, Jenevra Owen May 2024

Persecution Of Catholic Leaders In The Ussr, Jenevra Owen

The Thetean: A Student Journal for Scholarly Historical Writing

In the early 1900s Russian people sought for change in the government because they were not pleased with the capitalist system under the Tsar. The year 1917 saw the end of the Tsar's reign as he fell to the Bolshevik Party (a socialist group) during the Russian Revolution. This completely altered the face of the Russian government as it ushered in a new era for the Russian people. They had been longing for a transformation within the government, and the revolution served as the means to bring about that change. As a result, the Bolshevik Party was created to provide …


Greening Indian Financial Markets For Sustainable Development, Pradiptarathi Panda, Latha Chari, Ciorstan Smark May 2024

Greening Indian Financial Markets For Sustainable Development, Pradiptarathi Panda, Latha Chari, Ciorstan Smark

Australasian Accounting, Business and Finance Journal

This paper highlights the recent developments in India’s securities markets regulations, instruments, and intermediaries. Further, we focus on the developments in sustainable financial instruments and the ESG frameworks implemented by the Indian securities markets’ regulator. We highlight the unique changes in the Indian securities markets in implementing the fastest settlement cycle to T+0, introducing Zero Coupon and Zero principal bonds, blue, green, and yellow bonds, and setting up an efficient market structure by strengthening the governance system. Researchers will benefit from updating their knowledge of sustainable Indian markets, instruments, and regulations through this article. In short, this article highlights the …


Improving Ethics Surrounding Collegiate-Level Hacking Education: Recommended Implementation Plan & Affiliation With Peer-Led Initiatives, Shannon Morgan, Dr. Sanjay Goel May 2024

Improving Ethics Surrounding Collegiate-Level Hacking Education: Recommended Implementation Plan & Affiliation With Peer-Led Initiatives, Shannon Morgan, Dr. Sanjay Goel

Military Cyber Affairs

Cybersecurity has become a pertinent concern, as novel technological innovations create opportunities for threat actors to exfiltrate sensitive data. To meet the demand for professionals in the workforce, universities have ramped up their academic offerings to provide a broad range of cyber-related programs (e.g., cybersecurity, informatics, information technology, digital forensics, computer science, & engineering). As the tactics, techniques, and procedures (TTPs) of hackers evolve, the knowledge and skillset required to be an effective cybersecurity professional have escalated accordingly. Therefore, it is critical to train cyber students both technically and theoretically to actively combat cyber criminals and protect the confidentiality, integrity, …


Using Digital Twins To Protect Biomanufacturing From Cyberattacks, Brenden Fraser-Hevlin, Alec W. Schuler, B. Arda Gozen, Bernard J. Van Wie May 2024

Using Digital Twins To Protect Biomanufacturing From Cyberattacks, Brenden Fraser-Hevlin, Alec W. Schuler, B. Arda Gozen, Bernard J. Van Wie

Military Cyber Affairs

Understanding of the intersection of cyber vulnerabilities and bioprocess regulation is critical with the rise of artificial intelligence and machine learning in manufacturing. We detail a case study in which we model cyberattacks on network-mediated signals from a novel bioreactor, where it is important to control medium feed rates to maintain cell proliferation. We use a digital twin counterpart reactor to compare glucose and oxygen sensor signals from the bioreactor to predictions from a kinetic growth model, allowing discernment of faulty sensors from hacked signals. Our results demonstrate a successful biomanufacturing cyberattack detection system based on fundamental process control principles.


Surmounting Challenges In Aggregating Results From Static Analysis Tools, Dr. Ann Marie Reinhold, Brittany Boles, A. Redempta Manzi Muneza, Thomas Mcelroy, Dr. Clemente Izurieta May 2024

Surmounting Challenges In Aggregating Results From Static Analysis Tools, Dr. Ann Marie Reinhold, Brittany Boles, A. Redempta Manzi Muneza, Thomas Mcelroy, Dr. Clemente Izurieta

Military Cyber Affairs

Aggregation poses a significant challenge for software practitioners because it requires a comprehensive and nuanced understanding of raw data from diverse sources. Suites of static-analysis tools (SATs) are commonly used to assess organizational security but simultaneously introduce significant challenges. Challenges include unique results, scales, configuration environments for each SAT execution, and incompatible formats between SAT outputs. Here, we document our experiences addressing these issues. We highlight the problem of relying on a single vendor's SAT version and offer a solution for aggregating findings across multiple SATs, aiming to enhance software security practices and deter threats early with robust defensive operations.


Characterizing Advanced Persistent Threats Through The Lens Of Cyber Attack Flows, Logan Zeien, Caleb Chang, Ltc Ekzhin Ear, Dr. Shouhuai Xu May 2024

Characterizing Advanced Persistent Threats Through The Lens Of Cyber Attack Flows, Logan Zeien, Caleb Chang, Ltc Ekzhin Ear, Dr. Shouhuai Xu

Military Cyber Affairs

Effective cyber defense must build upon a deep understanding of real-world cyberattacks to guide the design and deployment of appropriate defensive measures against current and future attacks. In this abridged paper (of which the full paper is available online), we present important concepts for understanding Advanced Persistent Threats (APTs), our methodology to characterize APTs through the lens of attack flows, and a detailed case study of APT28 that demonstrates our method’s viability to draw useful insights. This paper makes three technical contributions. First, we propose a novel method of constructing attack flows to describe APTs. This abstraction allows technical audiences, …


Generative Machine Learning For Cyber Security, James Halvorsen, Dr. Assefaw Gebremedhin May 2024

Generative Machine Learning For Cyber Security, James Halvorsen, Dr. Assefaw Gebremedhin

Military Cyber Affairs

Automated approaches to cyber security based on machine learning will be necessary to combat the next generation of cyber-attacks. Current machine learning tools, however, are difficult to develop and deploy due to issues such as data availability and high false positive rates. Generative models can help solve data-related issues by creating high quality synthetic data for training and testing. Furthermore, some generative architectures are multipurpose, and when used for tasks such as intrusion detection, can outperform existing classifier models. This paper demonstrates how the future of cyber security stands to benefit from continued research on generative models.


Machine Learning Security For Tactical Operations, Dr. Denaria Fields, Shakiya A. Friend, Andrew Hermansen, Dr. Tugba Erpek, Dr. Yalin E. Sagduyu May 2024

Machine Learning Security For Tactical Operations, Dr. Denaria Fields, Shakiya A. Friend, Andrew Hermansen, Dr. Tugba Erpek, Dr. Yalin E. Sagduyu

Military Cyber Affairs

Deep learning finds rich applications in the tactical domain by learning from diverse data sources and performing difficult tasks to support mission-critical applications. However, deep learning models are susceptible to various attacks and exploits. In this paper, we first discuss application areas of deep learning in the tactical domain. Next, we present adversarial machine learning as an emerging attack vector and discuss the impact of adversarial attacks on the deep learning performance. Finally, we discuss potential defense methods that can be applied against these attacks.


Securing The Void: Assessing The Dynamic Threat Landscape Of Space, Brianna Bace, Dr. Unal Tatar May 2024

Securing The Void: Assessing The Dynamic Threat Landscape Of Space, Brianna Bace, Dr. Unal Tatar

Military Cyber Affairs

Outer space is a strategic and multifaceted domain that is a crossroads for political, military, and economic interests. From a defense perspective, the U.S. military and intelligence community rely heavily on satellite networks to meet national security objectives and execute military operations and intelligence gathering. This paper examines the evolving threat landscape of the space sector, encompassing natural and man-made perils, emphasizing the rise of cyber threats and the complexity introduced by dual-use technology and commercialization. It also explores the implications for security and resilience, advocating for collaborative efforts among international organizations, governments, and industry to safeguard the space sector.


How To Prevent Student Mental Health Problems In Metaverse Era?, Muslihati Muslihati, Yuliati Hotifah, Wahyu Nur Hidayat, Ahmad Yusuf Sobri, Anabelie V. Valdez, Achmad Miftahul Ilmi, Nur Mega Aris Saputra May 2024

How To Prevent Student Mental Health Problems In Metaverse Era?, Muslihati Muslihati, Yuliati Hotifah, Wahyu Nur Hidayat, Ahmad Yusuf Sobri, Anabelie V. Valdez, Achmad Miftahul Ilmi, Nur Mega Aris Saputra

Jurnal Kajian Bimbingan dan Konseling

Metaverse, a combination of social media, gaming, and virtual reality technology innovation, is a new concept that has attracted the attention of various groups. This concept has also aided numerous groups of people, including the academician. As Metaverse offers various means to innovate, it is projected to change human lives and patterns of interaction. However, Metaverse also presents a number of negative impacts on mental health, even greater than the impacts of online games. This literature review aims to examine the impacts of the Metaverse on adolescents. Then, it develops the relevant preventive strategy through school guidance and counseling programs. …


Smartphone Addiction Among Adolescence Students: Its Implication Toward Family Communication, Learning, Guidance And Counselling, Adi Atmoko, Indah Kartika Sari, Augusto Da Costa, Nugraheni Warih Utami, Eny Tri Wahyuni May 2024

Smartphone Addiction Among Adolescence Students: Its Implication Toward Family Communication, Learning, Guidance And Counselling, Adi Atmoko, Indah Kartika Sari, Augusto Da Costa, Nugraheni Warih Utami, Eny Tri Wahyuni

Jurnal Kajian Bimbingan dan Konseling

The symptoms of smartphone addiction have been extensively observed in adolescent students. This study aims to investigate the effects of smartphone addiction on students’ communication with their families, their learning, as well as guidance and counseling processes. The causal correlational design was applied, involving 103 participants selected total samplings of eighth-graders junior high school students. The data was garnered through the smartphone addiction scale and family communication scale. Both of those scales had item validity of 0.3, with Alpha Cronbach reliability of 0.937 and 0.850, respectively. The obtained data were analyzed using regression. The analysis results suggest that smartphone addiction …


Impact Of Cyber Relational Addiction On Undergraduates’ Interpersonal Relationship In Nigeria, Mulikat Ladi Abdulqadir Mustapha, Michael Ajokpaniovo, Faith Elizabeth Olaoye May 2024

Impact Of Cyber Relational Addiction On Undergraduates’ Interpersonal Relationship In Nigeria, Mulikat Ladi Abdulqadir Mustapha, Michael Ajokpaniovo, Faith Elizabeth Olaoye

Jurnal Kajian Bimbingan dan Konseling

The upsurge in the use of cyberspace in recent years has led to pathological use for some individuals especially in the area of cyber relational addiction. This study aimed to investigate the influence of cyber relational addiction on interpersonal relationships and how variables of age, religion, levels of study, and gender of respondents moderate the influence of cyber relational addiction on their interpersonal relationships. This study employed a descriptive survey research design and administered a self-designed questionnaire on 420 randomly selected undergraduates from seven faculties at the University of Ilorin. A research question was answered in this study, while the …


Online Media Usage In Guidance And Counseling Services During Covid-19 Pandemic, Maria Margaretha Sri Hastuti, Prias Hayu Purbaning Tyas May 2024

Online Media Usage In Guidance And Counseling Services During Covid-19 Pandemic, Maria Margaretha Sri Hastuti, Prias Hayu Purbaning Tyas

Jurnal Kajian Bimbingan dan Konseling

The Covid-19 pandemic has brought restraints into people’s activities. Consequently, during the pandemic, the school guidance and counseling services should be conducted online. Therefore, this study seeks to identify the types of online media frequently used by school counselors in classical guidance and individual or group counseling, as well as the rationale. This descriptive quantitative study involved 106 school counselors and used an Online Media Usage questionnaire to obtain the data. The results suggest that Google Form and Google Classroom have become the most used applications in classical guidance, while WhatsApp is the most popular application for individual or group …


Theoretical Validity Of Problem Focused-Coping Skill Guideline To Develop Students’ Critical Thinking Skills, Nur Hidayah, Anis Tri Yuliana, Husni Hanafi May 2024

Theoretical Validity Of Problem Focused-Coping Skill Guideline To Develop Students’ Critical Thinking Skills, Nur Hidayah, Anis Tri Yuliana, Husni Hanafi

Jurnal Kajian Bimbingan dan Konseling

Critical thinking skills are central for students to become human resources with character. The process of developing thinking skills is currently done contextually within the implementation of learning materials, while critical thinking skills are also needed in everyday life situations. Developmental counselling services through the Problem Focused-Coping Skill (PFCS) strategy are an alternative to foster critical thinking skills through contextual situations in students’ daily lives. Anchored by a research and development model through preliminary studies, product development, and expert validation, the present study unraveled the theoretical validity of PFCS strategy to enhance students’ critical thinking skills. Participants involved were evaluators …


Career Choice Tendency Of State Senior High School Students In Industry 4.0 Era, Zulfianti Rosyida Zahro, Arbin Janu Setiyowati, Irene Maya Simon May 2024

Career Choice Tendency Of State Senior High School Students In Industry 4.0 Era, Zulfianti Rosyida Zahro, Arbin Janu Setiyowati, Irene Maya Simon

Jurnal Kajian Bimbingan dan Konseling

This study aims to describe the career choice tendency of state senior high school students in the industry 4.0 era. This research is quantitative descriptive research, in the form of a percentage, involving 236 students as the participants. The sample was chosen using cluster random sampling technique. For the instrument, this research used a questionnaire of students’ career choice tendency in the industry 4.0 era. The obtained data were analyzed using percentage descriptive statistics. The findings reveal that 93% of senior high school students in Malang city tend to choose a career in the business and repair services sector, then …


Keefektifan Teknik Drama Segitiga Karpman Untuk Meningkatkan Keterampilan Empati Siswa Sekolah Menengah Pertama, Leny Latifah May 2024

Keefektifan Teknik Drama Segitiga Karpman Untuk Meningkatkan Keterampilan Empati Siswa Sekolah Menengah Pertama, Leny Latifah

Jurnal Kajian Bimbingan dan Konseling

Empathic skills encourage an individual to look into the problems more clearly and objectively. Without empathy, it is difficult to know what others are experiencing because it is not possible to feel and understand the conditions of others. The particular study aimed to determine the effectiveness of Karpman drama triangle technique to increase junior high school students’ empathy skill. The research subjects were six students of eighth grade in Sekolah Menengah Pertama Negeri 1 Turen, Malang. The particular research was Quasi-Experiment using the pretest and posttest design. The instruments were student empathy scale; experimental guidelines; and observation guidelines. The study …


Online Criticism Of Parents After Child Accidents: A Reflexive Thematic Analysis, Kelsi Toews, Jorden A. Cummings, Michelle Mclean, Laura Knowles May 2024

Online Criticism Of Parents After Child Accidents: A Reflexive Thematic Analysis, Kelsi Toews, Jorden A. Cummings, Michelle Mclean, Laura Knowles

The Qualitative Report

When a child is harmed, parents frequently experience condemnation and blame from others. This blame is amplified online. Our online worlds reflect our offline ones, and this negative atmosphere toward parents can influence both parents themselves and societal expectations for parents. Previous research on parental blame has either directly asked people about their blame attributions or utilized hypothetical vignettes. Our thematic analysis expands on this research by analyzing unsolicited online comments left on news stories about two, real-world incidents of child harm: A child who fell into a gorilla enclosure at the Cincinnati Zoo, and a child who was killed …


Commercial Enablers Of China’S Cyber-Intelligence And Information Operations, Ethan Mansour, Victor Mukora May 2024

Commercial Enablers Of China’S Cyber-Intelligence And Information Operations, Ethan Mansour, Victor Mukora

Military Cyber Affairs

In a globally commercialized information environment, China uses evolving commercial enabler networks to position and project its goals. They do this through cyber, intelligence, and information operations. This paper breaks down the types of commercial enablers and how they are used operationally. It will also address the CCP's strategy to gather and influence foreign and domestic populations throughout cyberspace. Finally, we conclude with recommendations for mitigating the influence of PRC commercial enablers.


Decoding Cryptocurrency Taxes: The Challenges For Estate Planners, Max Angel May 2024

Decoding Cryptocurrency Taxes: The Challenges For Estate Planners, Max Angel

Duke Law & Technology Review

In this article, Angel explores the unique challenges of estate planning with cryptocurrency, which include accurately valuing those assets, preserving their value, and addressing the complex tax implications of transferring cryptocurrency to heirs.