Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Keyword
-
- Cybersecurity (2)
- #KRKTR (1)
- 3D printing (1)
- ASL (1)
- Accessibility (1)
-
- Action learning (1)
- Action research (1)
- Agency (1)
- Allies (1)
- American Sign Language (1)
- Anthropology (1)
- Apache (1)
- Appreciative inquiry (1)
- Art (1)
- Asylum (1)
- Backward chaining (1)
- Big data (1)
- Bitcoin (1)
- Blockchain (1)
- Breach (1)
- Calibration (1)
- Chronotope (1)
- Civil rights (1)
- Civil society (1)
- Climate change (1)
- Collective intelligence (1)
- Commodity (1)
- Communication (1)
- Community interpreting (1)
- Community of practice (1)
Articles 1 - 8 of 8
Full-Text Articles in Computer Engineering
The Exigency And How To Improve And Implement International Humanitarian Legislations More Advantageously In Times Of Both Cyber-Warfare And Cyberspace, Shawn J. Lalman
The Exigency And How To Improve And Implement International Humanitarian Legislations More Advantageously In Times Of Both Cyber-Warfare And Cyberspace, Shawn J. Lalman
Doctoral Dissertations and Master's Theses
This study provides a synopsis of the following topics: the prospective limiters levied on cyber-warfare by present–day international legislation; significant complexities and contentions brought up in the rendering & utilization of International Humanitarian Legislation against cyber-warfare; feasible repercussions of cyber-warfare on humanitarian causes. It is also to be contended and outlined in this research study that non–state actors can be held accountable for breaches of international humanitarian legislation committed using cyber–ordnance if sufficient resources and skill are made available. It details the factors that prosecutors and investigators must take into account when organizing investigations into major breaches of humanitarian legislation …
Global Privacy Concerns Of Facial Recognition Big Data, Myranda Westbrook
Global Privacy Concerns Of Facial Recognition Big Data, Myranda Westbrook
Honors Theses
Facial recognition technology is a system of automatic acknowledgement that recognizes individuals by categorizing specific features of their facial structure to link the scanned information to stored data. Within the past few decades facial recognition technology has been implemented on a large scale to increase the security measures needed to access personal information. This has been specifically used in surveillance systems, social media platforms, and mobile device access control. The extensive use of facial recognition systems has created challenges as it relates to biometric information control and privacy concerns. This concern raises the cost and benefit analysis of an individual’s …
Stability In Government, Emerging Technology, And Decentralized Economies: An Analysis Of Alternative Uses Of Cryptocurrencies, Mickayla Stogsdill
Stability In Government, Emerging Technology, And Decentralized Economies: An Analysis Of Alternative Uses Of Cryptocurrencies, Mickayla Stogsdill
Chancellor’s Honors Program Projects
No abstract provided.
Procure-To-Pay Software In The Digital Age: An Exploration And Analysis Of Efficiency Gains And Cybersecurity Risks In Modern Procurement Systems, Drew Lane
MPA/MPP/MPFM Capstone Projects
Procure-to-Pay (P2P) softwares are an integral part of the payment and procurement processing functions at large-scale governmental institutions. These softwares house all of the financial functions related to procurement, accounts payable, and often human resources, helping to facilitate and automate the process from initiation of a payment or purchase, to the actual disbursal of funds. Often, these softwares contain budgeting and financial reporting tools as part of the offering. As such an integral part of the financial process, these softwares obviously come at an immense cost from a set of reputable vendors. In the case of government, these vendors mainly …
Consuming Digital Debris In The Plasticene, Stephen R. Parks
Consuming Digital Debris In The Plasticene, Stephen R. Parks
Theses and Dissertations
Claims of customization and control by socio-technical industries are altering the role of consumer and producer. These narratives are often misleading attempts to engage consumers with new forms of technology. By addressing capitalist intent, material, and the reproduction limits of 3-D printed objects’, I observe the aspirational promise of becoming a producer of my own belongings through new networks of production. I am interested in gaining a better understanding of the data consumed that perpetuates hyper-consumptive tendencies for new technological apparatuses. My role as a designer focuses on the resolution of not only the surface of the object through 3-D …
Breadcrumbs: Privacy As A Privilege, Prachi Bhardwaj
Breadcrumbs: Privacy As A Privilege, Prachi Bhardwaj
Capstones
Breadcrumbs: Privacy as a Privilege Abstract
By: Prachi Bhardwaj
In 2017, the world saw more data breaches than in any year prior. The count was more than the all-time high record in 2016, which was 40 percent more than the year before that.
That’s because consumer data is incredibly valuable today. In the last three decades, data storage has gone from being stored physically to being stored almost entirely digitally, which means consumer data is more accessible and applicable to business strategies. As a result, companies are gathering data in ways previously unknown to the average consumer, and hackers are …
Interpreting, Stephanie Jo Kent
Interpreting, Stephanie Jo Kent
Doctoral Dissertations
What do community interpreting for the Deaf in western societies, conference interpreting for the European Parliament, and language brokering in international management have in common? Academic research and professional training have historically emphasized the linguistic and cognitive challenges of interpreting, neglecting or ignoring the social aspects that structure communication. All forms of interpreting are inherently social; they involve relationships among at least three people and two languages. The contexts explored here, American Sign Language/English interpreting and spoken language interpreting within the European Parliament, show that simultaneous interpreting involves attitudes, norms and values about intercultural communication that overemphasize information and discount …
Real World Computer Forensics, Jessica Riccio
Real World Computer Forensics, Jessica Riccio
Liberal Arts and Engineering Studies
No abstract provided.