Open Access. Powered by Scholars. Published by Universities.®
Social and Behavioral Sciences Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Cyber (4)
- Cyber Operations (3)
- Cyber operations (3)
- Emerging Technologies (3)
- Jobs (3)
-
- Public transportation (3)
- Rail and bus manufacturing (3)
- Sequestration (3)
- Transit industry (3)
- Austerity (2)
- Cyber Operations in Space (2)
- Cyberwar (2)
- Defense (2)
- Deterrence (2)
- Fermentation (2)
- Food Microbiology (2)
- History (2)
- Information Assurance (2)
- Information Security (2)
- International Affairs (2)
- Maari (2)
- NATO (2)
- National Security (2)
- National security (2)
- Nuclear (2)
- Nukes (2)
- Phytochemistry (2)
- Space (2)
- State actor (2)
- Trust (2)
- Publication
-
- Professor Katina Michael (8)
- Jan Kallberg (7)
- Pr. Mamoudou H. DICKO, PhD (5)
- DOUGLAS J HENDERSON (1)
- Daniel J Boyle (1)
-
- Darcy M Bullock (1)
- Dr Deogratias Harorimana (1)
- Dr. Mutaz M. Al-Debei (1)
- Elizabeth C Scheyder (1)
- Fathi Habashi (1)
- Florin C MIHAI (1)
- George H Baker (1)
- Gesa Praetorius (1)
- Ishwar Khatiwada (1)
- Jan Comfort (1)
- Jeremy Straub (1)
- Joan Fitzgerald (1)
- Joe McLaughlin (1)
- Marcus Allen (1)
- Michael P. Johnson (1)
- Paul F. Eschenfelder (1)
- Peter Meiksins (1)
- Theodoros Zachariadis (1)
- Yueh-Hsuan Weng (1)
Articles 1 - 30 of 41
Full-Text Articles in Social and Behavioral Sciences
Ict For Poverty Alleviation In Pacific Island Nations: Study Of Icts4d In Fiji, Deogratias Harorimana, Opeti Rokotuinivono, Emali Sewale, Fane Salaiwai, Marica Naulu, Evangelin Roy
Ict For Poverty Alleviation In Pacific Island Nations: Study Of Icts4d In Fiji, Deogratias Harorimana, Opeti Rokotuinivono, Emali Sewale, Fane Salaiwai, Marica Naulu, Evangelin Roy
Dr Deogratias Harorimana
ICT for Poverty Alleviation in Pacific Island Nations: Study of ICTs4D in Fiji There has been a vague and little knowledge on the role or potential of Information and Communications Technologies (ICTs) in relation to addressing poverty in Fiji. This may be probably due to the newness of the technology in the South Pacific Region as a whole but also probably due to the fact that only 9.7% of the current Fiji 931,000 populations are internet users (ITC Figures 2011). This paper reports on finding how ICTs is contributing towards poverty alleviation in Fiji. On the basis of reviewed best …
An Estate Dilemma - Inaccessible Assets Hiding Behind Passwords And Encryption, Douglas J. Henderson
An Estate Dilemma - Inaccessible Assets Hiding Behind Passwords And Encryption, Douglas J. Henderson
DOUGLAS J HENDERSON
Every person living in the modern world holds valuable assets, data, or information in digital mediums. Digital mediums include not only digital hardware storage mediums in personal possession (like external hard drives and internal hard drives within laptop and desktop computers, personal digital assistants, cell phones, and the like), but also those only accessible through a network. Because so much is held in digital mediums, when an individual dies or becomes incapacitated, another person must know how to access the incapacitated person’s digital assets and other important information (this person is known herein as the ‘Responsible Party’). There are potential …
Diseñando Colisiones De Satélites En La Guerra Cibernética Encubierta, Jan Kallberg
Diseñando Colisiones De Satélites En La Guerra Cibernética Encubierta, Jan Kallberg
Jan Kallberg
La guerra concentrada en la red depende de la red de información global para capacidades de combate conjuntas.3 La capa fundamental crea la capacidad de combate global como la columna vertebral espacial de la red de información donde los haberes espaciales son el elemento decisivo. EE.UU. depende de las capacidades espaciales para su éxito y la seguridad nacional de EE.UU. se basa hoy en día en un número limitado de satélites muy utilizados. Estos satélites son cruciales para la disuasión estratégica, la vigilancia, la recopilación de inteligencia y las comunicaciones militares. Si la disuasión estratégica falla, los satélites forman parte …
The Return Of Dr. Strangelove: How Austerity Makes Us Stop Worrying And Love The Bomb…And Cyber War, Jan Kallberg, Adam Lowther
The Return Of Dr. Strangelove: How Austerity Makes Us Stop Worrying And Love The Bomb…And Cyber War, Jan Kallberg, Adam Lowther
Jan Kallberg
With sequestration looming—generating significant cuts to defense spending—the United States may find itself increasingly relying on nuclear and cyber deterrence as an affordable way to guarantee national sovereignty and prevent major conflict. While earlier defense planning and acquisitions were based on economic conditions that no longer exist, Congress’ options to balance the budget by cutting defense spending are politically palatable because far fewer American are “defense voters” than “social welfare voters,” according to a number of recent public opinion surveys.
The Legal Challenges Of Networked Robotics: From The Safety Intelligence Perspective, Yueh-Hsuan Weng, Sophie T.H. Zhao
The Legal Challenges Of Networked Robotics: From The Safety Intelligence Perspective, Yueh-Hsuan Weng, Sophie T.H. Zhao
Yueh-Hsuan Weng
Review Of The Challenger Launch Decision: Risky Technology, Culture And Deviance At Nasa, Peter F. Meiksins
Review Of The Challenger Launch Decision: Risky Technology, Culture And Deviance At Nasa, Peter F. Meiksins
Peter Meiksins
Reviews the book "The Challenger Launch Decision: Risky Technology, Culture and Deviance at NASA," by Diane Vaughan.
Analysis - Toward A New American Military., Adam Lowther, Jan Kallberg
Analysis - Toward A New American Military., Adam Lowther, Jan Kallberg
Jan Kallberg
In releasing the United States Department of Defense’s (DoD) Sustaining U.S. Global Leadership: Priorities for 21st Century Defense and Defense Budget Priorities and Choices in January 2012, President Barack Obama and Secretary of Defense Leon Panetta offered a rationale for the administration’s reductions in defense spending. By stating that the shift in strategic direction is an effort to “put our fiscal house in order” and a response to the 2011 Budget Control Act, which requires DoD to reduce spending by $487 billion between fiscal years 2012 and 2021, the United States’ NATO partners in Europe were given considerable reason for …
Comparison Of Phenolic Compounds And Antioxidant Capacities Of Traditional Sorghum Beers With Other Alcoholic Beverages, Fatouma Abdoul-Latif, Romaric G. Bayili, Louis C. Obame, Mamoudou H. Dicko Prof.
Comparison Of Phenolic Compounds And Antioxidant Capacities Of Traditional Sorghum Beers With Other Alcoholic Beverages, Fatouma Abdoul-Latif, Romaric G. Bayili, Louis C. Obame, Mamoudou H. Dicko Prof.
Pr. Mamoudou H. DICKO, PhD
Thirty samples of sorghum beers “dolo” were selected from traditionally fermented household manufacturers from Burkina Faso. Dolo samples were screened for their total phenolic content, proanthocyanidins and putative antioxidant capacities, and were compared with industrial beers and wines. Total phenols were measured using the Folin-Ciocalteu method. Proanthocyanidins content were determined by the method of HCl-butanol hydrolysis. Antioxidant activities were evaluated both with 2,2-diphenyl-1-picrylhydrazyl (DPPH) assay and by the trolox equivalent antioxidant capacity (TEAC) using 2,2’-azinobis(3-ethyl-benzothiazoline-6-sulfonic acid radical) (ABTS•+). The average contents of total phenols and proanthocyanidins were 506 μg GAE/ml of dolo and 45 μg APE/ml of dolo, respectively. An …
Alternative Energy Proposal, Marcus Allen
Editorial: Social Implications Of Technology- “Il Buono, Il Brutto, Il Cattivo”, Katina Michael
Editorial: Social Implications Of Technology- “Il Buono, Il Brutto, Il Cattivo”, Katina Michael
Professor Katina Michael
Late last year, IEEE SSIT was invited to put together a paper for the centennial edition of Proceedings of the IEEE that was published in May 2012. The paper titled, “Social Implications of Technology: The Past, the Present, and the Future,” brought together five members of SSIT with varying backgrounds, and two intense months of collaboration and exchange of ideas. I personally felt privileged to be working with Karl D. Stephan, Emily Anesta, Laura Jacobs and M.G. Michael on this project.
Book Review: Handbook On Securing Cyber-Physical Critical Infrastructure: Foundations And Challenges (Written By Sajal K. Das, Krishna Kant, Nan Zhang), Katina Michael
Professor Katina Michael
This 800+ page handbook is divided into eight parts and contains thirty chapters, ideal for either an advanced undergraduate or graduate course in security. At the heart of this handbook is how we might go about managing both physical and cyber infrastructures, as they continue to become embedded and enmeshed, through advanced control systems, and new computing and communications paradigms.
The Return Of Dr. Strangelove, Jan Kallberg, Adam Lowther
The Return Of Dr. Strangelove, Jan Kallberg, Adam Lowther
Jan Kallberg
With the prospect of sequestration looming, the United States may find itself increasingly rely ing on nuclear and cy ber deterrence as an affordable means of guaranteeing national sovereignty and preventing major conflict between the U.S. and potential adversaries in the Asia-Pacific. While earlier defense planning and acquisition were based on economic conditions that no longer ex ist, Congress’s options to balance the budget by cutting defense spending are politically palatable because far fewer American are “defense v oters” relative to “social welfare voters,” according to a number of recent public opinion surveys. The simple fact is China’s rise has …
Toxicity Assessment And Analgesic Activity Investigation Of Aqueous Acetone Extracts Of Sida Acuta Burn F. And Sida Cordifolia L. (Malvaceae), Medicinal Plants Of Burkina Faso, Kiessoum Konate, Adama Hilou, Raïssa Rr Aworet-Samseny, Alain Souza, Nicolas Barro, Mamoudou H. Dicko Prof., Jacques Datté, Bertrand M’Batchi
Toxicity Assessment And Analgesic Activity Investigation Of Aqueous Acetone Extracts Of Sida Acuta Burn F. And Sida Cordifolia L. (Malvaceae), Medicinal Plants Of Burkina Faso, Kiessoum Konate, Adama Hilou, Raïssa Rr Aworet-Samseny, Alain Souza, Nicolas Barro, Mamoudou H. Dicko Prof., Jacques Datté, Bertrand M’Batchi
Pr. Mamoudou H. DICKO, PhD
Background Sida acuta Burn f. and Sida cordifolia L. (Malvaceae) are traditionally used in Burkina Faso to treat several ailments, mainly pains, including abdominal infections and associated diseases. Despite the extensive use of these plants in traditional health care, literature provides little information regarding their toxicity and the pharmacology. This work was therefore designed to investigate the toxicological effects of aqueous acetone extracts of Sida acuta Burn f. and Sida cordifolia L. Furthermore, their analgesic capacity was assessed, in order to assess the efficiency of the traditional use of these two medicinal plants from Burkina Faso. Method For acute toxicity …
Common Criteria Meets Realpolitik Trust, Alliances, And Potential Betrayal, Jan Kallberg
Common Criteria Meets Realpolitik Trust, Alliances, And Potential Betrayal, Jan Kallberg
Jan Kallberg
Common Criteria for Information Technology Security Evaluation has the ambition to be a global standard for IT-security certification. The issued certifications are mutually recognized between the signatories of the Common Criteria Recognition Arrangement. The key element in any form of mutual relationships is trust. A question raised in this paper is how far trust can be maintained in Common Criteria when additional signatories enter with conflicting geopolitical interests to earlier signatories. Other issues raised are control over production, the lack of permanent organization in the Common Criteria, which leads to concerns of being able to oversee the actual compliance. As …
Antibacterial Activity Against Beta- Lactamase Producing Methicillin And Ampicillin-Resistants Staphylococcus Aureus: Fractional Inhibitory Concentration Index (Fici) Determination, Kiessoun K Onate, Jacques François Mavoungou, Alexis Nicaise Lepengué, Raïssa Rr Aworet-Samseny, Adama Hilou, Mamoudou H. Dicko Prof., Bertrand M’Batchi
Antibacterial Activity Against Beta- Lactamase Producing Methicillin And Ampicillin-Resistants Staphylococcus Aureus: Fractional Inhibitory Concentration Index (Fici) Determination, Kiessoun K Onate, Jacques François Mavoungou, Alexis Nicaise Lepengué, Raïssa Rr Aworet-Samseny, Adama Hilou, Mamoudou H. Dicko Prof., Bertrand M’Batchi
Pr. Mamoudou H. DICKO, PhD
The present study reports the antibacterial capacity of alkaloid compounds in combination with Methicillin and Ampicillin-resistants bacteria isolated from clinical samples. The resistance of different bacteria strains to the current antibacterial agents, their toxicity and the cost of the treatment have led to the development of natural products against the bacteria resistant infections when applied in combination with conventional antimicrobial drugs. The antibacterial assays in this study were performed by using inhibition zone diameters, MIC, MBC methods, the time-kill assay and the Fractional Inhibitory Concentration Index (FICI) determination. On the whole, fifteen Gram-positive bacterial strains (MRSA/ARSA) were used. Negative control …
Towards Cyber Operations The New Role Of Academic Cyber Security Research And Education, Jan Kallberg, Bhavani Thuraisingham
Towards Cyber Operations The New Role Of Academic Cyber Security Research And Education, Jan Kallberg, Bhavani Thuraisingham
Jan Kallberg
Abstract – The shift towards cyber operations represents a shift not only for the defense establishments worldwide but also cyber security research and education. Traditionally cyber security research and education has been founded on information assurance, expressed in underlying subfields such as forensics, network security, and penetration testing. Cyber security research and education is connected to the homeland security agencies and defense through funding, mutual interest in the outcome of the research, and the potential job market for graduates. The future of cyber security is both defensive information assurance measures and active defense driven information operations that jointly and coordinately …
Location-Based Social Networking And Its Impact On Trust In Relationships, Sarah Jean Fusco, Roba Abbas, Katina Michael, Anas Aloudat
Location-Based Social Networking And Its Impact On Trust In Relationships, Sarah Jean Fusco, Roba Abbas, Katina Michael, Anas Aloudat
Professor Katina Michael
Location based social networking (LBSN) applications are part of a new suite of social networking tools. LBSN is the convergence between location based services (LBS) and online social networking (OSN). LBSN applications offer users the ability to look up the location of another “friend” remotely using a smart phone, desktop or other device, anytime and anywhere. Users invite their friends to participate in LBSN and there is a process of consent that follows. This paper explores the potential impact of LBSN upon trust in society. It looks at the willingness of individuals to share their location data with family, friends, …
Emp And Geomagnetic Storm Protection Of Critical Infrastructure, George H. Baker Iii
Emp And Geomagnetic Storm Protection Of Critical Infrastructure, George H. Baker Iii
George H Baker
EMP and solar storm wide geographic coverage and ubiquitous system effects beg the question of “Where to begin?” with protection efforts. Thus, in addressing these “wide area electromagnetic (EM) effects,” we must be clever in deciding where to invest limited resources. Based on simple risk analysis, the electric power and communication infrastructures emerge as the highest priority for EM protection. Programs focused on these highest risk infrastructures will go a long way in lessoning societal impact. Given the national scope of the effects, such programs must be coordinated at the national level but implemented at local level. Because wide-area EM …
Social Implications Of Technology: Past, Present, And Future, Karl D. Stephan, Katina Michael, M.G. Michael, Laura Jacob, Emily Anesta
Social Implications Of Technology: Past, Present, And Future, Karl D. Stephan, Katina Michael, M.G. Michael, Laura Jacob, Emily Anesta
Professor Katina Michael
The social implications of a wide variety of technologies are the subject matter of the IEEE Society on Social Implications of Technology (SSIT). This paper reviews the SSIT’s contributions since the Society’s founding in 1982, and surveys the outlook for certain key technologies that may have significant social impacts in the future. Military and security technologies, always of significant interest to SSIT, may become more autonomous with less human intervention, and this may have both good and bad consequences. We examine some current trends such as mobile, wearable, and pervasive computing, and find both dangers and opportunities in these trends. …
Reviving The U.S. Rail And Transit Industry: Investments And Job Creation, Joan Fitzgerald, Lisa Granquist, Ishwar Khatiwada, Joe Mclaughlin, Michael Renner, Andrew Sum
Reviving The U.S. Rail And Transit Industry: Investments And Job Creation, Joan Fitzgerald, Lisa Granquist, Ishwar Khatiwada, Joe Mclaughlin, Michael Renner, Andrew Sum
Joe McLaughlin
No abstract provided.
Reviving The U.S. Rail And Transit Industry: Investments And Job Creation, Joan Fitzgerald, Lisa Granquist, Ishwar Khatiwada, Joe Mclaughlin, Michael Renner, Andrew Sum
Reviving The U.S. Rail And Transit Industry: Investments And Job Creation, Joan Fitzgerald, Lisa Granquist, Ishwar Khatiwada, Joe Mclaughlin, Michael Renner, Andrew Sum
Ishwar Khatiwada
No abstract provided.
Reviving The U.S. Rail And Transit Industry: Investments And Job Creation, Joan Fitzgerald, Lisa Granquist, Ishwar Khatiwada, Joe Mclaughlin, Michael Renner, Andrew Sum
Reviving The U.S. Rail And Transit Industry: Investments And Job Creation, Joan Fitzgerald, Lisa Granquist, Ishwar Khatiwada, Joe Mclaughlin, Michael Renner, Andrew Sum
Joan Fitzgerald
No abstract provided.
Book Review: The Basics Of Information Security: Understanding The Fundamentals Of Infosec In Theory And Practice, Katina Michael
Book Review: The Basics Of Information Security: Understanding The Fundamentals Of Infosec In Theory And Practice, Katina Michael
Professor Katina Michael
Dr Jason Andress (ISSAP, CISSP, GPEN, CEH) has written a timely book on Information Security. Andress who is a seasoned security professional with experience in both the academic and business worlds, categorically demonstrates through his book that underlying the operation of any successful business today is how to protect your most valuable asset- “information”. Andress completed his doctorate in computer science in the area of data protection, and presently works for a major software company, providing global information security oversight and performing penetration testing and risks assessment.
Michael Johnson Research Profile, Michael P. Johnson Jr.
Michael Johnson Research Profile, Michael P. Johnson Jr.
Michael P. Johnson
This document summarizes my disciplinary training and my research products.
The Technological Trajectory Of The Automatic Identification Industry: The Application Of The Systems Of Innovation (Si) Framework For The Characterisation And Prediction Of The Auto-Id Industry, Katina Michael
Professor Katina Michael
Traditionally the approach used to analyse technological innovation focused on the application of the techno-economic paradigm with the production function as its foundation. This thesis explores the rise of the evolutionary paradigm as a more suitable conceptual approach to investigating complex innovations like automatic identification (auto-ID) devices. Collecting and analysing data for five auto-ID case studies, (bar codes, magnetic-stripe cards, smart cards, biometrics and RF/ID transponders), it became evident that a process of migration, integration and convergence is happening within the auto-ID technology system (TS). The evolution of auto-ID is characterised by a new cluster of innovations, primarily emerging through …
Integrating Value-Driven Feedback And Recommendation Mechanisms Into Business Intelligence Systems, Byron Keating, Tim Coltman, Michael Katina, Valeria Baker
Integrating Value-Driven Feedback And Recommendation Mechanisms Into Business Intelligence Systems, Byron Keating, Tim Coltman, Michael Katina, Valeria Baker
Professor Katina Michael
Most leading organizations, in all sectors of industry, commerce and government are dependent upon
ERP for their organizational survival. Yet despite the importance of the decision to adopt ERP and its
impact on the entire firm’s performance the IT literature has been in the large part silent on the nature
of the ERP investment decision. This study is the first of its kind to determine the preference structure
of senior managers around the organizational benefits and risks of adopting ERP. We present the
results which provide interesting insights into how managers’ perceive the benefit and risk factors
salient to the …
Engaging New Partners In Transportation Research: Integrating Publishing, Archiving, And Indexing Of Technical Literature Into The Research Process, Mark P. Newton, Darcy M. Bullock, Charles Watkinson, Paul J. Bracke, Deborah K. Horton
Engaging New Partners In Transportation Research: Integrating Publishing, Archiving, And Indexing Of Technical Literature Into The Research Process, Mark P. Newton, Darcy M. Bullock, Charles Watkinson, Paul J. Bracke, Deborah K. Horton
Darcy M Bullock
transportation research. The United States Department of Transportation (USDOT) annually invests approximately $180 million in State Planning and Research (SPR) and University Transportation Centers (UTC). This investment generates an extensive portfolio of “grey literature” that is not yet uniformly cataloged or accessible, despite the best efforts of the National Technical Information Service, the Transportation Research Board, and the National Transportation Library. This paper reports on a review of publishing and archiving practices for transportation research technical reports, summarizes best practices, and recommends that UTC and SPR research programs seek and strengthen partnerships with libraries to facilitate improved production, stewardship and …
Human Rights, Regulation, And National Security, Katina Michael, Simon Bronitt
Human Rights, Regulation, And National Security, Katina Michael, Simon Bronitt
Professor Katina Michael
Law disciplines technology, though it does so in a partial and incomplete way as reflected in the old adage that technology outstrips the capacity of law to regulate it. The rise of new technologies poses a significant threat to human rights – the pervasive use of CCTV (and now mobile CCTV), telecommunications interception, and low-cost audio-visual recording and tracking devices (some of these discreetly wearable), extend the power of the state and corporations significantly to intrude into the lives of citizens.
Designer Satellite Collisions From Covert Cyber War, Jan Kallberg
Designer Satellite Collisions From Covert Cyber War, Jan Kallberg
Jan Kallberg
Outer space has enjoyed two decades of fairly peaceful development since the Cold War, but once again it is becoming more competitive and contested, with increased militarization. Therefore, it is important the United States maintain its space superiority to ensure it has the capabilities required by modern warfare for successful operations. Today is different from earlier periods of space development,1 because there is not a blatantly overt arms race in space,2 but instead a covert challenge to US interests in maintaining superiority, resilience, and capability. A finite number of states consider themselves geopolitical actors; however, as long as the United …
Bacteriocin Formation By Dominant Aerobic Sporeformers Isolated From Traditional Maari, Donatien Kabore, Line Thorsen, Dennis Sandris Nielsen, Torben Sune Berner, Hagrétou Sawadogo-Lingani, Bréhima Diawara, Mamoudou H. Dicko Prof., Mogens Jackobsen
Bacteriocin Formation By Dominant Aerobic Sporeformers Isolated From Traditional Maari, Donatien Kabore, Line Thorsen, Dennis Sandris Nielsen, Torben Sune Berner, Hagrétou Sawadogo-Lingani, Bréhima Diawara, Mamoudou H. Dicko Prof., Mogens Jackobsen
Pr. Mamoudou H. DICKO, PhD
The antimicrobial activity of 8 Bacillus spp. and 2 Lysinibacillus spp. representing the predominant aerobic sporeformers during traditional maari fermentations, a traditional fermented baobab seeds product fromBurkina Faso,was investigated. The antimicrobial activitywas assessed against a total of 31 indicator organisms representing various Gram-negative and positive pathogens. The screening showed that 3 Bacillus subtilis strains (B3, B122 and B222) in particular had antimicrobial activity against some Gram-positive organisms and were selected for further studies. Itwas found that the antimicrobial substances producedwere heat stable, in-sensitive to catalase, sensitive to protease and trypsin but resistant to the proteolytic action of papain and proteinase …