Open Access. Powered by Scholars. Published by Universities.®
Communication Technology and New Media Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Publication
Articles 1 - 2 of 2
Full-Text Articles in Communication Technology and New Media
Rhetsec_ | Rhetorical Security, Jennifer Mead
Rhetsec_ | Rhetorical Security, Jennifer Mead
Culminating Projects in English
Rhetsec_ examines the rhetorical situation, the rhetorical appeals, and how phishing emails simulate "real" emails in five categories of phishing emails. While the first focus of cybersecurity is security, you must also understand the language of computers to know how to secure them. Phishing is one way to compromise security using computers, and so the computer becomes a tool for malicious language (phishing emails and malware) to be transmitted. Therefore to be concerned with securing computers, then you must also be concerned with language. Language is rhetoric's domain, and the various rhetorical elements which create an identity of the phisher …
United States Diplomacy In The Age Of The Internet, Allison S. Greene
United States Diplomacy In The Age Of The Internet, Allison S. Greene
Graduate Program in International Studies Theses & Dissertations
The dynamics of international relations are constantly changing, and the origin of an extraordinary amount of that change can be traced to what has been coined the ‘Information Revolution.’ It is a revolution as profound and as significant as Gutenberg's invention of moveable metal type, and may result in social and political consequences of comparable magnitude. One of the most significant and far-reaching implications of this phenomenon is the emergence of the Internet. Since its inception, there have been many claims and assertions about existing and potential repercussions of the Internet within the diplomatic realm.
The purpose of this work …