Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Cyber Policy (1)
- Cyber-diplomacy (1)
- Digital preservation (1)
- Distributed information systems (1)
- E-governance (1)
-
- Elections (1)
- Electronic publishing (1)
- Image classification (1)
- Indexing (1)
- Information retrieval (1)
- Information systems (1)
- Libraries (1)
- Natural language processing (1)
- Open access (1)
- Optical character recognition software (1)
- Recommender systems (1)
- Search engines (1)
- Software engineering (1)
- Strategy (1)
- Taxonomy (1)
- Technology (1)
- Text mining (1)
- Text processing (1)
- User experience (1)
- User-centered design (1)
Articles 1 - 2 of 2
Full-Text Articles in Systems Architecture
Building And Using Digital Libraries For Etds, Edward A. Fox
Building And Using Digital Libraries For Etds, Edward A. Fox
The Journal of Electronic Theses and Dissertations
Despite the high value of electronic theses and dissertations (ETDs), the global collection has seen limited use. To extend such use, a new approach to building digital libraries (DLs) is needed. Fortunately, recent decades have seen that a vast amount of “gray literature” has become available through a diverse set of institutional repositories as well as regional and national libraries and archives. Most of the works in those collections include ETDs and are often freely available in keeping with the open-access movement, but such access is limited by the services of supporting information systems. As explained through a set of …
Russia Today, Cyberterrorists Tomorrow: U.S. Failure To Prepare Democracy For Cyberspace, Jonathan F. Lancelot
Russia Today, Cyberterrorists Tomorrow: U.S. Failure To Prepare Democracy For Cyberspace, Jonathan F. Lancelot
Journal of Digital Forensics, Security and Law
This paper is designed to expose vulnerabilities within the US electoral system, the use of cyberspace to exploit weaknesses within the information assurance strategies of the democratic and republican party organizations, and deficiencies within the social media communications and voting machine exploits. A brief history of discriminatory practices in voting rights and voting access will be set as the foundation for the argument that the system is vulnerable in the cyber age, and the need for reform at the local, state and national levels will be emphasized. The possibility of a foreign nation-state influencing the outcome of an election by …