Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Computer Law (2)
- Computer and Systems Architecture (2)
- Digital Communications and Networking (2)
- Law (2)
- Military, War, and Peace (2)
-
- National Security Law (2)
- Other Computer Engineering (2)
- Social and Behavioral Sciences (2)
- Administrative Law (1)
- Agency (1)
- Asian Studies (1)
- Computer Sciences (1)
- Data Storage Systems (1)
- Disability and Equity in Education (1)
- Education (1)
- Electrical and Computer Engineering (1)
- Information Security (1)
- Intellectual Property Law (1)
- International Law (1)
- International Relations (1)
- International and Area Studies (1)
- Internet Law (1)
- Legal Writing and Research (1)
- Near and Middle Eastern Studies (1)
- Physical Sciences and Mathematics (1)
- Political Science (1)
- President/Executive Department (1)
- Risk Analysis (1)
- Institution
Articles 1 - 3 of 3
Full-Text Articles in Engineering
Defensive Industrial Policy: Cybersecurity Interventions To Reduce Intellectual Property Theft, Dr. Chad Dacus, Dr. Carl (Cj) Horn
Defensive Industrial Policy: Cybersecurity Interventions To Reduce Intellectual Property Theft, Dr. Chad Dacus, Dr. Carl (Cj) Horn
Military Cyber Affairs
Through cyber-enabled industrial espionage, China has appropriated what Keith Alexander, the former Director of the National Security Agency, dubbed “the largest transfer of wealth in history.” Although China disavows intellectual property (IP) theft by its citizens and has set self-sustained research and development as an important goal, it is unrealistic to believe IP theft will slow down meaningfully without changing China’s decision calculus. China and the United States have twice agreed, in principle, to respect one another’s IP rights. However, these agreements have lacked any real enforcement mechanism, so the United States must do more to ensure its IP is …
Removing The Veil: Shining Light On The Lack Of Inclusivity In Cybersecurity Education For Students With Disabilities, Felicia Hellems, Sajal Bhatia
Removing The Veil: Shining Light On The Lack Of Inclusivity In Cybersecurity Education For Students With Disabilities, Felicia Hellems, Sajal Bhatia
School of Computer Science & Engineering Faculty Publications
There are currently over one billion people living with some form of disability worldwide. The continuous increase in new technologies in today's society comes with an increased risk in security. A fundamental knowledge of cybersecurity should be a basic right available to all users of technology. A review of literature in the fields of cybersecurity, STEM, and computer science (CS) has revealed existent gaps regarding educational methods for teaching cybersecurity to students with disabilities (SWD's). To date, SWD's are largely left without equitable access to cybersecurity education. Our goal is to identify current educational methods being used to teach SWD's …
Book Review: This Is How They Tell Me The World Ends: The Cyberweapons Arms Race (2020) By Nicole Perlroth, Amy C. Gaudion
Book Review: This Is How They Tell Me The World Ends: The Cyberweapons Arms Race (2020) By Nicole Perlroth, Amy C. Gaudion
Dickinson Law Review (2017-Present)
No abstract provided.