Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Keyword
-
- Editor (4)
- Table (4)
- Contents (3)
- Technology (3)
- Information (2)
-
- International (2)
- Journal (2)
- Management (2)
- Air gaps (1)
- Attribution (1)
- Bandwidth (1)
- Bibliographic instruction (1)
- Bootstrap (1)
- CSS3 (1)
- Carnivalesque (1)
- Chabad (1)
- Cloud computing (1)
- College of Arts Humanities and Social Sciences (1)
- Communication (1)
- Communications & computer law (1)
- Computer Engineering (1)
- Computer Science (1)
- Computers (1)
- Congestion management (1)
- Contractibility (1)
- Critical infrastructure (1)
- Cyber-law (1)
- Cyberattack (1)
- Cybersecurity (1)
- Cyberwar (1)
- Publication
- Publication Type
Articles 1 - 17 of 17
Full-Text Articles in Computer Engineering
Study Of The Research Status On E-Navigation, Qiwei Chen
Study Of The Research Status On E-Navigation, Qiwei Chen
Maritime Safety & Environment Management Dissertations (Dalian)
No abstract provided.
Creating A Data-Based Facebook Engagement Plan For Chabad At Binghamton, Justin Hayet
Creating A Data-Based Facebook Engagement Plan For Chabad At Binghamton, Justin Hayet
Capstone Projects 2015-Present
Core Capstone Question: How does Chabad at Binghamton maximize its online Facebook Engagement in a fashion which mirrors the needs of its diverse online stakeholders?
Schmalzbauer (2013) calculated that two thirds of America’s 400,000 Jewish college students attend schools with a Chabad chapter” (p. 120). Binghamton University’s student population is thirty percent Jewish, that is, 3,500 Jewish students (Hillel, 2014). Chabad at Binghamton’s seven full time staff members and student leadership of eighty-seven designated positions seek to engage all 3,500 of those students through weekly programs, Shabbat dinners, large scale programs and individual meetings. Chabad at Binghamton has been serving …
Alternative Models Of Connectivity: Reclaiming Networked Spaces, Philip M. Bain
Alternative Models Of Connectivity: Reclaiming Networked Spaces, Philip M. Bain
Electronic Theses and Dissertations
Alternative networking is a growing field of study and practice due to advancements in computer networking hardware, and software protocols. Methods of integrating alternative networking configurations into infrastructure present enhanced forms of empowerment and embodiment for participants. Through an analysis of multiple hardware and software examples, this research suggests that practices of sharing and collaboration, which are embedded in the history of computer networking, have the potential to reinvigorate the notion of a virtual public sphere, and support the ideals of digital democracy.
Fundamentals Of Library Instruction, Darren Sweeper
Fundamentals Of Library Instruction, Darren Sweeper
Sprague Library Scholarship and Creative Works
No abstract provided.
Session D-4: Coolhub.Imsa: Collaborative Innovation In Action, Carl Heine, James Gerry
Session D-4: Coolhub.Imsa: Collaborative Innovation In Action, Carl Heine, James Gerry
Carl Heine
Transform STEM teaching and learning with CoolHub.IMSA, a free virtual platform where youth and adults collaborate on projects they create. Explore the site through the eyes of project members and discover powerful ways to collaborate, innovate and network for learning.
Design, Programming, And User-Experience, Kaila G. Manca
Design, Programming, And User-Experience, Kaila G. Manca
Honors Scholar Theses
This thesis is a culmination of my individualized major in Human-Computer Interaction. As such, it showcases my knowledge of design, computer engineering, user-experience research, and puts into practice my background in psychology, com- munications, and neuroscience.
I provided full-service design and development for a web application to be used by the Digital Media and Design Department and their students.This process involved several iterations of user-experience research, testing, concepting, branding and strategy, ideation, and design. It lead to two products.
The first product is full-scale development and optimization of the web appli- cation.The web application adheres to best practices. It was …
Cloud Computing, Contractibility, And Network Architecture, Christopher S. Yoo
Cloud Computing, Contractibility, And Network Architecture, Christopher S. Yoo
All Faculty Scholarship
The emergence of the cloud is heightening the demands on the network in terms of bandwidth, ubiquity, reliability, latency, and route control. Unfortunately, the current architecture was not designed to offer full support for all of these services or to permit money to flow through it. Instead of modifying or adding specific services, the architecture could redesigned to make Internet services contractible by making the relevant information associated with these services both observable and verifiable. Indeed, several on-going research programs are exploring such strategies, including the NSF’s NEBULA, eXpressive Internet Architecture (XIA), ChoiceNet, and the IEEE’s Intercloud projects.
Re-Examining Resistance: Fan-Produced Queer Readings And Teen Wolf, Joshua J. Espinoza
Re-Examining Resistance: Fan-Produced Queer Readings And Teen Wolf, Joshua J. Espinoza
Open Access Theses & Dissertations
MTV's popular television series, Teen Wolf (2011), has amassed a large online following of fans that create their own queer narratives through fan-fiction, subverting the show's hegemonic heteronormativity. Through a textual thematic analysis of Teen Wolf, this case study illustrates how online fandoms can subvert hegemony through queer readings of literary characters, resisting the dominant heteronormativity on network television. This article argues that rearticulating the showâ??s narratives into queer readings functions as a form of LGBT resistance, effectively counteracting the heteronormativity and hegemony portrayed on screen. This study examines how Teen Wolf approaches queer content, including homoeroticism and LGBT themes …
Table Of Contents
Journal of International Technology and Information Management
No abstract provided.
From The Desk Of The Editor
Journal of International Technology and Information Management
No abstract provided.
Table Of Contents
Journal of International Technology and Information Management
No abstract provided.
From The Desk Of The Editor
Journal of International Technology and Information Management
No abstract provided.
Table Of Contents
Journal of International Technology and Information Management
No abstract provided.
Cyber Espionage Or Cyber War?: International Law, Domestic Law, And Self-Protective Measures, Christopher S. Yoo
Cyber Espionage Or Cyber War?: International Law, Domestic Law, And Self-Protective Measures, Christopher S. Yoo
All Faculty Scholarship
Scholars have spent considerable effort determining how the law of war (particularly jus ad bellum and jus in bello) applies to cyber conflicts, epitomized by the Tallinn Manual on the International Law Applicable to Cyber Warfare. Many prominent cyber operations fall outside the law of war, including the surveillance programs that Edward Snowden has alleged were conducted by the National Security Agency, the distributed denial of service attacks launched against Estonia and Georgia in 2007 and 2008, the 2008 Stuxnet virus designed to hinder the Iranian nuclear program, and the unrestricted cyber warfare described in the 1999 book by …
From The Desk Of The Editor
Journal of International Technology and Information Management
No abstract provided.
Table Of Contents
Journal of International Technology and Information Management
No abstract provided.
From The Desk Of The Editor
Journal of International Technology and Information Management
No abstract provided.