Open Access. Powered by Scholars. Published by Universities.®

Social and Behavioral Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 2 of 2

Full-Text Articles in Social and Behavioral Sciences

Online Communication Wars: A Critical Recursive Frame Analysis Of Online Responses To The Article Entitled, “This Is Why Colin Kaepernick Took A Knee”, Rebecca Jean Arklie Jan 2021

Online Communication Wars: A Critical Recursive Frame Analysis Of Online Responses To The Article Entitled, “This Is Why Colin Kaepernick Took A Knee”, Rebecca Jean Arklie

Department of Conflict Resolution Studies Theses and Dissertations

The World Wide Web provides us with a doorway to explore our world and access to social media; a “place” where we can keep in touch with family and friends and meet people from different cultures. Social media provides us with the ability to communicate using an Avatar, providing us with anonymity. Unfortunately, this anonymity gives people the freedom to unapologetically express their opinions, using any type of language they desire, without fear of repercussions. This study of the social and cultural implications from anonymous, unrestrained comments in a discussion thread will interest communications experts, psychologists, academics, and peacekeepers because …


An Assessment Of The Impacts Of Social Media Inputs And Court Case Information On Mitigating Insider Threats, Robert Jones Jan 2021

An Assessment Of The Impacts Of Social Media Inputs And Court Case Information On Mitigating Insider Threats, Robert Jones

CCE Theses and Dissertations

The insider threat is a global problem that impacts organizations and produces a gamut of undesired outcomes. Businesses often experience lost revenue and stolen trade secrets, which can leave a tarnished reputation. Insider threats can also cause harm to individuals and national security. Past efforts have not mitigated the problem in its entirety. Documented instances of insider threats are as recent as March 2020. Many researchers have focused on monitoring technologies and relying on human monitoring in a reactive posture. An ideal solution would scrutinize an individual’s character and ascertain whether unique traits associated with actors of insider threats are …