Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Journal

Law

Institution
Keyword
Publication Year
Publication

Articles 1 - 30 of 522

Full-Text Articles in Engineering

How Can Generative Ai (Genai) Enhance Or Hinder Qualitative Studies? A Critical Appraisal From South Asia, Nepal, Niroj Dahal Mar 2024

How Can Generative Ai (Genai) Enhance Or Hinder Qualitative Studies? A Critical Appraisal From South Asia, Nepal, Niroj Dahal

The Qualitative Report

Qualitative researchers can benefit from using generative artificial intelligence (GenAI), such as different versions of ChatGPT—GPT-3.5 or GPT-4, Google Bard—now renamed as a Gemini, and Bing Chat—now renamed as a Copilot, in their studies. The scientific community has used artificial intelligence (AI) tools in various ways. However, using GenAI has generated concerns regarding potential research unreliability, bias, and unethical outcomes in GenAI-generated research results. Considering these concerns, the purpose of this commentary is to review the current use of GenAI in qualitative research, including its strengths, limitations, and ethical dilemmas from the perspective of critical appraisal from South Asia, Nepal. …


The Role Of Artificial Intelligence In Determining The Criminal Fingerprint, Saeed Al Matrooshi Jan 2024

The Role Of Artificial Intelligence In Determining The Criminal Fingerprint, Saeed Al Matrooshi

Journal of Police and Legal Sciences

The research aimed to identify the motives and justifications for the use of artificial intelligence in predicting crimes, to explain the challenges of artificial intelligence algorithms, the risks of bias and their ethical rules, and to highlight the role of artificial intelligence in identifying the criminal fingerprint during the detection of crimes. The research relied on the analytical approach, for the purpose of identifying the motives and justifications for the use of intelligence. Artificial intelligence in crime detection, explaining the challenges of artificial intelligence algorithms, their risks of bias, and ethical rules, and exploring how artificial intelligence technology can hopefully …


Analysis Of Marine Zone Management In Disputed Island Territories, Khomsin Khomsin, Danar Guruh Pratomo, Ayu Isnania Zahra Dec 2023

Analysis Of Marine Zone Management In Disputed Island Territories, Khomsin Khomsin, Danar Guruh Pratomo, Ayu Isnania Zahra

Journal of Environmental Science and Sustainable Development

Indonesia has 17,204 islands registered, named, and coordinated by Geospatial Information Agency (BIG). The number of islands can threaten maritime boundary disputes between provinces, districts, and cities. One of the disputes is the claim over Pulau Tujuh, which is mutually contested for ownership by the Province of Bangka Belitung and the Province of Riau Islands. This study aims to analyze the marine management zone of the Pulau Tujuh claim. It is carried out using the cartometric method. This study of regional boundaries refers to the Regulation of The Minister of Home Affairs of The Republic of Indonesia 141 of 2017, …


Reducing Food Scarcity: The Benefits Of Urban Farming, S.A. Claudell, Emilio Mejia Dec 2023

Reducing Food Scarcity: The Benefits Of Urban Farming, S.A. Claudell, Emilio Mejia

Journal of Nonprofit Innovation

Urban farming can enhance the lives of communities and help reduce food scarcity. This paper presents a conceptual prototype of an efficient urban farming community that can be scaled for a single apartment building or an entire community across all global geoeconomics regions, including densely populated cities and rural, developing towns and communities. When deployed in coordination with smart crop choices, local farm support, and efficient transportation then the result isn’t just sustainability, but also increasing fresh produce accessibility, optimizing nutritional value, eliminating the use of ‘forever chemicals’, reducing transportation costs, and fostering global environmental benefits.

Imagine Doris, who is …


Journal Of Roleplaying Studies And Steam (Jrpssteam) Vol. 2 [2023], (Issue 2)., Ricardo Morales-Carbajal, Cristo Leon, Sarah Lynne Bowman, Ligia-Estefania Estefania Canul-Noh, Vania C. Tovilla, Laura I. Quiroz, Elektra Diakolambrianou Nov 2023

Journal Of Roleplaying Studies And Steam (Jrpssteam) Vol. 2 [2023], (Issue 2)., Ricardo Morales-Carbajal, Cristo Leon, Sarah Lynne Bowman, Ligia-Estefania Estefania Canul-Noh, Vania C. Tovilla, Laura I. Quiroz, Elektra Diakolambrianou

Journal of Roleplaying Studies and STEAM

Editorial

Sangre, sudor, lágrimas y burocracia

Estamos muy contentos con la edición de este tercer número del Journal of Roleplaying Studies and STEAM, en primer lugar porque ¡ya contamos con ISSN!, suena a un logro menor pero debemos considerar los vericuetos burocráticos por los que hemos pasado semana tras semana para lograrlo. En segundo lugar, ¡por fin tenemos un artículo en inglés!, lo cual es motivo de celebración porque además es para nosotros un honor que sea de Elektra Diakolambrianou y Sarah Lynne Bowman, quienes en una gran muestra de confianza enviaron para dictamen su artículo denominado Dual Consciousness: What …


De Las 7 Bolas De Dragón A Los 7 Reinos De Poniente: Viajando Por La Ficción Para Transformar La Realidad, Vania C. Tovilla Nov 2023

De Las 7 Bolas De Dragón A Los 7 Reinos De Poniente: Viajando Por La Ficción Para Transformar La Realidad, Vania C. Tovilla

Journal of Roleplaying Studies and STEAM

resumen

El libro es una muestra de la experiencia y dedicación que tiene Issac Pérez López, quien con más de veinte años de práctica en la creación de entornos lúdicos nos sumerge en una suerte de juego donde al leer sus páginas a través de un lenguaje coloquial y cercano. . a la realidad de los docentes del “Cole” nos ejemplifica y ayuda a comprender un poco más los conceptos y pasos que involucran el término “gamificación”.

Podría ser considerado un libro de autoayuda potenciado (en el buen sentido) para los docentes que se están integrando al mundo de los …


Editorial - Sangre, Sudor, Lágrimas Y Burocracia, Mauricio Rangel Nov 2023

Editorial - Sangre, Sudor, Lágrimas Y Burocracia, Mauricio Rangel

Journal of Roleplaying Studies and STEAM

Estamos muy contentos con la edición de este tercer número del Journal of Roleplaying Studies and STEAM, en primer lugar porque ¡ya contamos con ISSN!, suena a un logro menor pero debemos considerar los vericuetos burocráticos por los que hemos pasado semana tras semana para lograrlo.


Aprendizaje Situado En Mundos Virtuales, Una Experiencia De Participación A Través De Juegos De Rol., Vania C. Tovilla Mgtr. Nov 2023

Aprendizaje Situado En Mundos Virtuales, Una Experiencia De Participación A Través De Juegos De Rol., Vania C. Tovilla Mgtr.

Journal of Roleplaying Studies and STEAM

En tiempos actuales el uso de las tecnologías y la comunicación masiva se hace cada vez más frecuente, ya sea por medio de Internet, los teléfonos inteligentes y otros instrumentos que quizás resignifican el modo en el que los jóvenes en la actualidad conciben términos como virtualidad, aprendiendo y sobre toda la realidad, relacionándose con otros alrededor de todo el mundo. Es quizás por este auge de tecnologías que surgió en el año 2003, la herramienta virtual Second Life ; concebida como un mundo complejo y completamente virtual que permite a los usuarios aprender y vivir en otra realidad como …


Integrating Nist And Iso Cybersecurity Audit And Risk Assessment Frameworks Into Cameroonian Law, Bernard Ngalim Oct 2023

Integrating Nist And Iso Cybersecurity Audit And Risk Assessment Frameworks Into Cameroonian Law, Bernard Ngalim

Journal of Cybersecurity Education, Research and Practice

This paper reviews cybersecurity laws and regulations in Cameroon, focusing on cybersecurity and information security audits and risk assessments. The importance of cybersecurity risk assessment and the implementation of security controls to cure deficiencies noted during risk assessments or audits is a critical step in developing cybersecurity resilience. Cameroon's cybersecurity legal framework provides for audits but does not explicitly enumerate controls. Consequently, integrating relevant controls from the NIST frameworks and ISO Standards can improve the cybersecurity posture in Cameroon while waiting for a comprehensive revision of the legal framework. NIST and ISO are internationally recognized as best practices in information …


Adoption Of Cybersecurity Policies By Local Governments 2020, Donald F. Norris Phd, Laura K. Mateczun Jd Oct 2023

Adoption Of Cybersecurity Policies By Local Governments 2020, Donald F. Norris Phd, Laura K. Mateczun Jd

Journal of Cybersecurity Education, Research and Practice

This paper should be of interest to the readers of this journal because it addresses a subject that has received little scholarly attention; namely, local government cybersecurity. The U.S. has over 90,000 units of local government, of which almost 39,000 are “general purpose” units (i.e., municipalities, counties, towns and townships). On average, these governments do not practice cybersecurity effectively (Norris, et al., 2019 and 2020). One possible reason is that they do not adopt and/or implement highly recommended cybersecurity policies. In this paper, we examine local government adoption or lack of adoption of cybersecurity policies using data from three surveys. …


Mechanisms To Reduce Cyber Threats And Risks, Saad Alsuwaileh Jul 2023

Mechanisms To Reduce Cyber Threats And Risks, Saad Alsuwaileh

Journal of Police and Legal Sciences

Addressing the mechanisms of reducing cyber threats and risks Research Because cyberspace is an important arena for various international interactions, especially in recent times in light of the increase in cyber-attacks between some countries, which affects their national security. In this context, many countries are trying to make an effort to develop their capabilities to be used in any cyber-attack, or to take adequate preventive measures to protect them from any possible cyberattacks, especially in light of the impact of these attacks on vital places and institutions such as banks and ministries or on important facilities such as water and …


An Ml Based Digital Forensics Software For Triage Analysis Through Face Recognition, Gaurav Gogia, Parag H. Rughani Jul 2023

An Ml Based Digital Forensics Software For Triage Analysis Through Face Recognition, Gaurav Gogia, Parag H. Rughani

Journal of Digital Forensics, Security and Law

Since the past few years, the complexity and heterogeneity of digital crimes has increased exponentially, which has made the digital evidence & digital forensics paramount for both criminal investigation and civil litigation cases. Some of the routine digital forensic analysis tasks are cumbersome and can increase the number of pending cases especially when there is a shortage of domain experts. While the work is not very complex, the sheer scale can be taxing. With the current scenarios and future predictions, crimes are only going to become more complex and the precedent of collecting and examining digital evidence is only going …


Effectiveness Of Integrated Traffic Management Of Military Police And Traffic Police In Reducing Drive Speed N Arterial Roads: An Experimental Study, Teguh Patriot Jun 2023

Effectiveness Of Integrated Traffic Management Of Military Police And Traffic Police In Reducing Drive Speed N Arterial Roads: An Experimental Study, Teguh Patriot

CSID Journal of Infrastructure Development

The Indonesian National Police Traffic Corps (KORLANTAS POLRI) and the Army Staff and Command School (SESKOAD) conducted a joint study in early March 2023 to reduce the number of traffic accident victims by implementing traffic regulations by the Military Police and Traffic Police. One of the methods used by KORLANTAS POLRI is the installation of ETLE speed cameras on Jakarta toll roads, such as Cikampek, Jagorawi, Bitung, and others. At the end of 2022, 75 additional speed cameras had been installed on arterial roads in Jakarta.

The purpose of this study is to analyze the effectiveness …


Shared Fantasy: Role-Playing Games As Social Worlds By Gary Alan Fine (2002) [Reseña], Cristo Leon Jun 2023

Shared Fantasy: Role-Playing Games As Social Worlds By Gary Alan Fine (2002) [Reseña], Cristo Leon

Journal of Roleplaying Studies and STEAM

This classic study still provides one of the most acute descriptions available of an often misunderstood subculture: that of fantasy role playing games like Dungeons & Dragons. Gary Alan Fine immerses himself in several different gaming systems, offering insightful details on the nature of the games and the patterns of interaction among players—as well as their reasons for playing.

Este estudio clásico todavía proporciona una de las descripciones más agudas disponibles de una subcultura a menudo incomprendida: la de los juegos de rol de fantasía como Dungeons & Dragons. Gary Alan Fine se sumerge en varios sistemas de juego diferentes …


Editorial - Un Paso A La Vez, Mauricio Rangel Jun 2023

Editorial - Un Paso A La Vez, Mauricio Rangel

Journal of Roleplaying Studies and STEAM

Editorial - Un paso a la vez


Journal Of Roleplaying Studies And Steam (Jrpssteam) Vol. 2 [2023], Issue 1., Cristo Leon, Felipe Ignacio García-Soriano, Francisca Faret Moreno, Daniel S. González Cohens, Daniel Serrano Robles, Daniel Romero Benguigui, Ruben Darío Hernández Mendo Jun 2023

Journal Of Roleplaying Studies And Steam (Jrpssteam) Vol. 2 [2023], Issue 1., Cristo Leon, Felipe Ignacio García-Soriano, Francisca Faret Moreno, Daniel S. González Cohens, Daniel Serrano Robles, Daniel Romero Benguigui, Ruben Darío Hernández Mendo

Journal of Roleplaying Studies and STEAM

Journal of Roleplaying Studies and STEAM (JRPSSTEAM) Vol. 2 [2023], Issue 1.


Security-Enhanced Serial Communications, John White, Alexander Beall, Joseph Maurio, Dane Fichter, Dr. Matthew Davis, Dr. Zachary Birnbaum May 2023

Security-Enhanced Serial Communications, John White, Alexander Beall, Joseph Maurio, Dane Fichter, Dr. Matthew Davis, Dr. Zachary Birnbaum

Military Cyber Affairs

Industrial Control Systems (ICS) are widely used by critical infrastructure and are ubiquitous in numerous industries including telecommunications, petrochemical, and manufacturing. ICS are at a high risk of cyber attack given their internet accessibility, inherent lack of security, deployment timelines, and criticality. A unique challenge in ICS security is the prevalence of serial communication buses and other non-TCP/IP communications protocols. The communication protocols used within serial buses often lack authentication and integrity protections, leaving them vulnerable to spoofing and replay attacks. The bandwidth constraints and prevalence of legacy hardware in these systems prevent the use of modern message authentication and …


Rebuilding Grid Governance, Joel B. Eisen, Heather E. Payne May 2023

Rebuilding Grid Governance, Joel B. Eisen, Heather E. Payne

BYU Law Review

As climate change sharpens the focus on our electricity systems, there is widespread agreement that the institutions that govern our electric grid must change to realize a clean energy future in the timescale necessary. Scholars are actively debating how grid governance needs to change, but in this Article we demonstrate that current proposals are insufficient because they do not contemplate “rebuilding.” This Article defines “rebuilding” as ending entities tasked with grid governance and creating new ones to take their place. We propose what no one else has: an overarching framework for rebuilding any grid governance institutions.

This Article discusses when …


Enhancing The Battleverse: The People’S Liberation Army’S Digital Twin Strategy, Joshua Baughman May 2023

Enhancing The Battleverse: The People’S Liberation Army’S Digital Twin Strategy, Joshua Baughman

Military Cyber Affairs

No abstract provided.


What Senior U.S. Leaders Say We Should Know About Cyber, Dr. Joseph H. Schafer May 2023

What Senior U.S. Leaders Say We Should Know About Cyber, Dr. Joseph H. Schafer

Military Cyber Affairs

On April 6, 2023, the Atlantic Council’s Cyber Statecraft Initiative hosted a panel discussion on the new National Cybersecurity Strategy. The panel featured four senior officials from the Office of the National Cyber Director (ONCD), the Department of State (DoS), the Department of Justice (DoJ), and the Department of Homeland Security (DHS). The author attended and asked each official to identify the most important elements that policymakers and strategists must understand about cyber. This article highlights historical and recent struggles to express cyber policy, the responses from these officials, and the author’s ongoing research to improve national security cyber policy.


Operationalizing Deterrence By Denial In The Cyber Domain, Gentry Lane May 2023

Operationalizing Deterrence By Denial In The Cyber Domain, Gentry Lane

Military Cyber Affairs

No abstract provided.


Law Informs Code: A Legal Informatics Approach To Aligning Artificial Intelligence With Humans, John J. Nay Apr 2023

Law Informs Code: A Legal Informatics Approach To Aligning Artificial Intelligence With Humans, John J. Nay

Northwestern Journal of Technology and Intellectual Property

Artificial Intelligence (AI) capabilities are rapidly advancing. Highly capable AI could cause radically different futures depending on how it is developed and deployed. We are unable to specify human goals and societal values in a way that reliably directs AI behavior. Specifying the desirability (value) of AI taking a particular action in a particular state of the world is unwieldy beyond a very limited set of state-action-values. The purpose of machine learning is to train on a subset of states and have the resulting agent generalize an ability to choose high value actions in unencountered circumstances. Inevitably, the function ascribing …


The Security And Cyber Defence Realities And Difficulties In Algeria, Kada Aicha Jan 2023

The Security And Cyber Defence Realities And Difficulties In Algeria, Kada Aicha

Journal of Police and Legal Sciences

This research paper aims to shed light on the digital challenge faced by Algeria as it enters the world of the knowledge society, which qualifies it to achieve cybersecurity and cyber defense against various forms and types of security threats, including cyber threats. The researcher used an analytical approach to understand the phenomenon under study and trace its causes, in addition to a case study method to study all aspects of the studied phenomenon and identify the characteristics of the case study - Algeria was chosen as the analysis unit. The study concluded several important results, including:

The deficiency of …


Ground Risk Model For Uavs, Andrew V. Shelley Jan 2023

Ground Risk Model For Uavs, Andrew V. Shelley

International Journal of Aviation, Aeronautics, and Aerospace

This paper develops an alternative to the ground risk model provided by JARUS SORA. Key inconsistencies in the SORA ground risk model are identified, specifically ground risk continuing to increase when there is no further increase in fatality probability.

Population density is a critical component of UAS ground risk. Definitions of population density adopted by various regulatory jurisdictions are reviewed. A categorisation of population density is developed based on official statistics categories for New Zealand. This categorisation is more granular than that provided by SORA, enabling a more nuanced assessment of risk.

A ground risk model is then developed using …


Journal Of Roleplaying Studies And Steam (Jrpssteam) Vol. 1 [2022], Issue 1., Cristo Leon, James Lipuma, Ricardo Morales-Carbajal, Miguel A. Bastarrachea-Magnani, Alain Arriaga, Christian Miguel Rudich De La Rosa, Edgar Meritano, Mauricio Rangel Nov 2022

Journal Of Roleplaying Studies And Steam (Jrpssteam) Vol. 1 [2022], Issue 1., Cristo Leon, James Lipuma, Ricardo Morales-Carbajal, Miguel A. Bastarrachea-Magnani, Alain Arriaga, Christian Miguel Rudich De La Rosa, Edgar Meritano, Mauricio Rangel

Journal of Roleplaying Studies and STEAM

Volumen completo del Journal of Roleplaying Studies and STEAM (JRPSSTEAM) Vol. 1 [2022], Issue 1.


An Evaluation Framework For Digital Image Forensics Tools, Zainab Khalid, Sana Qadir Oct 2022

An Evaluation Framework For Digital Image Forensics Tools, Zainab Khalid, Sana Qadir

Journal of Digital Forensics, Security and Law

The boom of digital cameras, photography, and social media has drastically changed how humans live their day-to-day, but this normalization is accompanied by malicious agents finding new ways to forge and tamper with images for unlawful monetary (or other) gains. Disinformation in the photographic media realm is an urgent threat. The availability of a myriad of image editing tools renders it almost impossible to differentiate between photo-realistic and original images. The tools available for image forensics require a standard framework against which they can be evaluated. Such a standard framework can aid in evaluating the suitability of an image forensics …


Metasoftware: Building Blocks For Legal Technology, Houman Shadab May 2022

Metasoftware: Building Blocks For Legal Technology, Houman Shadab

Seattle Journal of Technology, Environmental & Innovation Law

This Article develops a novel concept in information technology called “metasoftware.” It then applies the concept of metasoftware to developing legal technology.

Metasoftware enables users to create the software of their choosing and stands in sharp contrast to traditional, functional. Functional software is the default type of software that is currently produced and includes word processing, email, social networking, enterprise resource management, online marketplaces, and video game software. Metasoftware, by contrast, is not functional. Metasoftware presents the user with a blank slate upon which to build functional software.

I argue that software is metasoftware to that extent that (1) it …


Defensive Industrial Policy: Cybersecurity Interventions To Reduce Intellectual Property Theft, Dr. Chad Dacus, Dr. Carl (Cj) Horn May 2022

Defensive Industrial Policy: Cybersecurity Interventions To Reduce Intellectual Property Theft, Dr. Chad Dacus, Dr. Carl (Cj) Horn

Military Cyber Affairs

Through cyber-enabled industrial espionage, China has appropriated what Keith Alexander, the former Director of the National Security Agency, dubbed “the largest transfer of wealth in history.” Although China disavows intellectual property (IP) theft by its citizens and has set self-sustained research and development as an important goal, it is unrealistic to believe IP theft will slow down meaningfully without changing China’s decision calculus. China and the United States have twice agreed, in principle, to respect one another’s IP rights. However, these agreements have lacked any real enforcement mechanism, so the United States must do more to ensure its IP is …


Support New Business To Solve Old Problems With Kentucky’S Keystone Waste From Bourbon & Brewing, Samuel C. Kessler May 2022

Support New Business To Solve Old Problems With Kentucky’S Keystone Waste From Bourbon & Brewing, Samuel C. Kessler

Commonwealth Policy Papers

Provided here is a policy solution from the backside of Kentucky bourbon and brewing to upcycle Kentucky’s “keystone” wastes and grow businesses in the process. Potential effects range from removing the bottleneck on bourbon production and producing GHG-friendly biogas to lowering the price of milk.This full whitepaper brief provides an incentive model for keystone wastes which have a provider and a use. It is equally applicable for policymakers or advocates wishing to place a policy incentive behind waste-to-product upcycling, businesses involved with methane sequestration & renewable biogas energy, and shifting regulatory and penalizing models of pollution into incentive model for …


Offensive Cyber Operations And Future Littoral Operating Concepts, Jd Work May 2022

Offensive Cyber Operations And Future Littoral Operating Concepts, Jd Work

Military Cyber Affairs

Introduction of new ground-launch cruise missile options to hold adversary naval targets at risk in order to support conventional deterrence objectives through sea control and sea denial missions is the centerpiece of proposed reorganization of Marine Littoral forces, as part of new “Expeditionary Advanced Base Operations,” and “Littoral Operations in Contested Environments” concepts. Effective distributed sea control fires against pacing threat maritime formations requires defeat of integrated air defense systems. Offensive cyber operations capabilities may be considered as a means of altering the calculus of attrition in missile fires exchanges, but due to various sensitivities it has been difficult to …