Open Access. Powered by Scholars. Published by Universities.®
Communication Technology and New Media Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Keyword
-
- Analytics (1)
- Arkansas (1)
- Communication (1)
- Comprehensive cyber defense (1)
- Computer crime (1)
-
- Computer hacking (1)
- Computers and information (1)
- Countermeasures (1)
- Cyber defense (1)
- Cyber espionage (1)
- Cyberattack (1)
- Cybersecurity (1)
- Data security digital rhetoric (1)
- Digital (1)
- Digital Rhetoric (1)
- Frameworks (1)
- Inter-disciplinary studies (1)
- Internet (1)
- Internet History (1)
- Internet Protocols (1)
- Internet security (1)
- Large organizations (1)
- Malware (1)
- Phishing (1)
- Privacy (1)
- Privacy-invasive software (1)
- Publics (1)
- Razorbacks (1)
- Reporting (1)
- Rhetoric (1)
- Publication
Articles 1 - 5 of 5
Full-Text Articles in Communication Technology and New Media
Rhetsec_ | Rhetorical Security, Jennifer Mead
Rhetsec_ | Rhetorical Security, Jennifer Mead
Culminating Projects in English
Rhetsec_ examines the rhetorical situation, the rhetorical appeals, and how phishing emails simulate "real" emails in five categories of phishing emails. While the first focus of cybersecurity is security, you must also understand the language of computers to know how to secure them. Phishing is one way to compromise security using computers, and so the computer becomes a tool for malicious language (phishing emails and malware) to be transmitted. Therefore to be concerned with securing computers, then you must also be concerned with language. Language is rhetoric's domain, and the various rhetorical elements which create an identity of the phisher …
Advanced Statistics In Arkansas Sports Reporting, Andrew Lee Epperson
Advanced Statistics In Arkansas Sports Reporting, Andrew Lee Epperson
Graduate Theses and Dissertations
This study seeks to analyze how Arkansas’ sports journalists are adapting to the recent surge in available advanced statistics that are being used by certain national news organizations. Using in-depth qualitative research that includes in-depth interviews with a number of individuals in the print, broadcast, and athletics side of sports coverage, we discover how journalists and coaches use these next-generation analytics, what they fundamentally mean for the evolution of each respective path, and why so few Arkansas reporters and writers use them at the time of this paper’s defense. We see how budgets and deadlines restrict the use of these …
Culture And Code: The Evolution Of Digital Architecture And The Formation Of Networked Publics, Geoffrey Gimse
Culture And Code: The Evolution Of Digital Architecture And The Formation Of Networked Publics, Geoffrey Gimse
Theses and Dissertations
Culture and Code traces the construction of the modern idea of the Internet and offers a potential glimpse of how that idea may change in the near future. Developed through a theoretical framework that links Sheila Jasanoff and Sang-Hyun Kim’s theory of the sociotechnical imaginary to broader theories on publics and counterpublics, Culture and Code offers a way to reframe the evolution of Internet technology and its culture as an enmeshed part of larger socio-political shifts within society. In traveling the history of the modern Internet as detailed in its technical documentation, legal documents, user created content, and popular media …
Examining Shared Understanding And Team Performance In Global Virtual Teams, Alva Bullard
Examining Shared Understanding And Team Performance In Global Virtual Teams, Alva Bullard
CCE Theses and Dissertations
Modern organizations face many significant challenges because of turbulent environments and a competitive global economy. These competitive demands have forced many organizations to increase levels of flexibility and adaptability through the use of virtual environments, and global teams are prevalent in business organizations. Although significant research has been conducted on virtual teams, the development of shared understanding among the members of these teams has not been studied adequately. Time/space barriers, communication complexities, and team diversity hinder the development of shared understanding in these teams.
Based on the Media Synchronicity Theory (MST), a new theoretical model was created that used the …
A Comprehensive Cybersecurity Defense Framework For Large Organizations, Willarvis Smith
A Comprehensive Cybersecurity Defense Framework For Large Organizations, Willarvis Smith
CCE Theses and Dissertations
There is a growing need to understand and identify overarching organizational requirements for cybersecurity defense in large organizations. Applying proper cybersecurity defense will ensure that the right capabilities are fielded at the right locations to safeguard critical assets while minimizing duplication of effort and taking advantage of efficiencies. Exercising cybersecurity defense without an understanding of comprehensive foundational requirements instills an ad hoc and in many cases conservative approach to network security. Organizations must be synchronized across federal and civil agencies to achieve adequate cybersecurity defense. Understanding what constitutes comprehensive cybersecurity defense will ensure organizations are better protected and more efficient. …