Open Access. Powered by Scholars. Published by Universities.®
Science and Technology Studies Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Wright State University (632)
- Nova Southeastern University (72)
- Selected Works (67)
- University of Massachusetts Amherst (35)
- University of Nevada, Las Vegas (17)
-
- SelectedWorks (16)
- Old Dominion University (14)
- University of Nebraska - Lincoln (12)
- University of Pittsburgh School of Law (11)
- University of Wollongong (10)
- Claremont Colleges (9)
- University of Pennsylvania Carey Law School (8)
- University of New Hampshire (6)
- University of South Florida (6)
- Chapman University (5)
- City University of New York (CUNY) (5)
- Edith Cowan University (5)
- Embry-Riddle Aeronautical University (5)
- University of Kentucky (5)
- University of Nebraska at Omaha (5)
- Dartmouth College (4)
- James Madison University (4)
- Purdue University (4)
- University of New Mexico (4)
- University of Tennessee, Knoxville (4)
- Western University (4)
- California State University, San Bernardino (3)
- Eastern Michigan University (3)
- Florida International University (3)
- Kennesaw State University (3)
- Keyword
-
- Meyer-Roney OTEC Library (70)
- OTEC (70)
- OTEC Liaison (70)
- Ocean energy (70)
- Ocean thermal energy conversion (70)
-
- Oceanography (70)
- Richard Meyer (70)
- Thermal energy (70)
- Technology (52)
- Solar Ocean Energy Liaison (49)
- Semantic Web (46)
- Government (26)
- Ontology (24)
- Semantic Sensor Web (22)
- Privacy (18)
- Twitter (17)
- Social Media (16)
- Emerging Technologies (15)
- RDF (15)
- Social Implications of ICT (13)
- Policy (12)
- Artificial intelligence (11)
- Location-Based Services (11)
- National Security (11)
- SSW (11)
- Ethics (10)
- Machine learning (10)
- Security (10)
- Semantic Analytics (9)
- Surveillance (9)
- Publication Year
- Publication
-
- Kno.e.sis Publications (541)
- Computer Science and Engineering Faculty Publications (91)
- The OTEC Liaison (70)
- National Center for Digital Government (32)
- Professor Katina Michael (25)
-
- Thomas A Faunce (13)
- Associate Professor Katina Michael (10)
- NSTec UNLV Symposium (9)
- All Faculty Scholarship (8)
- Book Chapters (8)
- M. G. Michael (6)
- Articles (4)
- Computer Ethics - Philosophical Enquiry (CEPE) Proceedings (4)
- J. R. Joel Flores-Mariscal (4)
- Journal of Humanistic Mathematics (4)
- Kathleen P King (4)
- Leadership, Counseling, Adult, Career and Higher Education Faculty Publications (4)
- Manoj Maharaj (4)
- Research outputs 2014 to 2021 (4)
- Department of Environmental Studies: Undergraduate Student Theses (3)
- Dissertations, Theses, and Capstone Projects (3)
- Dissertations, Theses, and Masters Projects (3)
- FIU Electronic Theses and Dissertations (3)
- James R. Fleming (3)
- Journal of Cybersecurity Education, Research and Practice (3)
- Law Faculty Scholarship (3)
- Library Faculty Presentations (3)
- Master's Theses and Doctoral Dissertations (3)
- Paul F. Eschenfelder (3)
- Payam Mokhtarian (3)
- Publication Type
Articles 31 - 60 of 1048
Full-Text Articles in Science and Technology Studies
Science, Technology, Engineering, And Mathematics (Stem) Project-Based Learning (Pbl) Education: A New Mexico Case Study For Equity And Inclusion, Kimberly A. Scheerer
Science, Technology, Engineering, And Mathematics (Stem) Project-Based Learning (Pbl) Education: A New Mexico Case Study For Equity And Inclusion, Kimberly A. Scheerer
Teacher Education, Educational Leadership & Policy ETDs
This research addresses how student participation in Science, Technology, Engineering, and Mathematics (STEM) project-based learning (PBL) education activities encourages underrepresented minority student achievement in STEM career field trajectories. Seven New Mexico high school counselors and 12 STEM organization personnel were interviewed during this study. Their responses represent the nuanced professional voices where New Mexico public education intersects with STEM student interest and cultural influence.
For students, STEM PBL can foster deep integration across educational disciplines and enhance STEM career trajectory interest and readiness. STEM education converged with PBL methodologies has the ability to leverage community support while broadening student networks. …
Debris Of Progress: A Political Ethnography Of Critical Infrastructure, Ethan Tupelo
Debris Of Progress: A Political Ethnography Of Critical Infrastructure, Ethan Tupelo
Doctoral Dissertations
In this dissertation, I advance a political ethnography of critical infrastructure to better understand terminal capitalism, in which the waste products of commodification and resource depletion are destroying the ecological systems that support life. My object of study is the massive disjuncture between individual knowledge and intention, and these catastrophic collective planetary outcomes. Theoretically, I develop critical infrastructure theory to diagnose these destructive structures. By “infrastructure,” I mean systems of material and discursive flows fundamental to sedentary human organization, connecting local actions with global systems. Such infrastructure is “critical” in three senses: A) denoting the most important forms of infrastructure …
Path Choice Of Algorithm Intellectual Property Protection, Yulu Jin, Youdan Xiao
Path Choice Of Algorithm Intellectual Property Protection, Yulu Jin, Youdan Xiao
Bulletin of Chinese Academy of Sciences (Chinese Version)
Protection of algorithm by intellectual property is a powerful way to stimulate innovation and regulate the risk of the algorithm. Algorithm that can be protected by intellectual property right is the program algorithm, which is compiled in computer language, in the form of coded instruction sequence, run by the computer and produce independent rational value results. The article is combed out that there are drawbacks to the traditional path of IP to protect program algorithms:it has conflict between program algorithm and copyright law system; the trade secret path is at odds with program algorithmic governance; and program algorithm can hardly …
Public Acceptance Of Medical Screening Recommendations, Safety Risks, And Implied Liabilities Requirements For Space Flight Participation, Cory J. Trunkhill
Public Acceptance Of Medical Screening Recommendations, Safety Risks, And Implied Liabilities Requirements For Space Flight Participation, Cory J. Trunkhill
Doctoral Dissertations and Master's Theses
The space tourism industry is preparing to send space flight participants on orbital and suborbital flights. Space flight participants are not professional astronauts and are not subject to the rules and guidelines covering space flight crewmembers. This research addresses public acceptance of current Federal Aviation Administration guidance and regulations as designated for civil participation in human space flight.
The research utilized an ordinal linear regression analysis of survey data to explore the public acceptance of the current medical screening recommended guidance and the regulations for safety risk and implied liability for space flight participation. Independent variables constituted participant demographic representations …
A Qualitative Look Into Repair Practices, Jumana Labib
A Qualitative Look Into Repair Practices, Jumana Labib
Undergraduate Student Research Internships Conference
This research poster is based on a working research paper which moves beyond the traditional scope of repair and examines the Right to Repair movement from a smaller, more personal lens by detailing the 6 categorical impediments as dubbed by Dr. Alissa Centivany (design, law, economic/business strategy, material asymmetry, informational asymmetry, and social impediments) have continuously inhibited repair and affected repair practices, which has consequently had larger implications (environmental, economic, social, etc.) on ourselves, our objects, and our world. The poster builds upon my research from last year (see "The Right to Repair: (Re)building a better future"), this time pulling …
An Introduction To A Framework For Sustainability Thinking, Jeremy Van Antwerp, Matthew Kuperus Heun
An Introduction To A Framework For Sustainability Thinking, Jeremy Van Antwerp, Matthew Kuperus Heun
Numeracy
Van Antwerp, Jeremy and Matthew Kuperus Heun. 2022. A Framework for Sustainability Thinking: A Student’s Introduction to Global Sustainability Challenges; (Springer, Cham) 275 pp. ISBN 978-3-0317-9184-0.
A Framework for Sustainability Thinking: A Student’s Introduction to Global Sustainability Challenges presents basic information related to sustainability challenges in the context of a cognitive framework that allows students to evaluate problems and potential solutions from a quantitative perspective. Moreover, numerous end-of-chapter discussion questions and project ideas examine moral, ethical, and worldview aspects of sustainability choices and tradeoffs between different approaches to sustainability.
An Overview Of Approaches To Nuclear Security In Ghana, Raymond Agalga, Paul Atta Amoah, Daniel Nii Adjei, Daniel Frederick Charles, Emmanuel Ofori Darko
An Overview Of Approaches To Nuclear Security In Ghana, Raymond Agalga, Paul Atta Amoah, Daniel Nii Adjei, Daniel Frederick Charles, Emmanuel Ofori Darko
International Journal of Nuclear Security
Ghana has significantly improved its nuclear security infrastructure over the years. However, as threats increase by the day and new applications of nuclear and radiological technology are designed and implemented, Ghana must develop a rigid and comprehensive approach to mitigating the negative impacts on its nuclear security while improving prevention, detection, and deterrence of nuclear and radiological terrorism within its geographical space. This paper overviews the approaches adopted by Ghana to build a strong nuclear security regime within the past decade. These include improving legal frameworks for nuclear security by establishing an independent Nuclear Regulatory Authority; assessing nuclear security culture …
Assessing Automated Administration, Cary Coglianese, Alicia Lai
Assessing Automated Administration, Cary Coglianese, Alicia Lai
All Faculty Scholarship
To fulfill their responsibilities, governments rely on administrators and employees who, simply because they are human, are prone to individual and group decision-making errors. These errors have at times produced both major tragedies and minor inefficiencies. One potential strategy for overcoming cognitive limitations and group fallibilities is to invest in artificial intelligence (AI) tools that allow for the automation of governmental tasks, thereby reducing reliance on human decision-making. Yet as much as AI tools show promise for improving public administration, automation itself can fail or can generate controversy. Public administrators face the question of when exactly they should use automation. …
Transdisciplinary Environmental Work: An Evaluation Of Transdisciplinarity In The Field Of Environmental Science And Its Relevance To South Carolina Conservation Efforts In Lake Wateree And The Catawba Indian Reservation, Olivia Mn Shugart
Senior Theses
Transdisciplinarity describes the integration of knowledge and exchange of ideas across diverse academic disciplines, public stakeholders, and decision-makers. In this paper, I discuss the relevance of transdisciplinarity to the environmental field and offer ways in which its principles could be employed to enhance current South Carolina conservation efforts. I advocate for transdisciplinary work through analyzing existing discourse on the value of transdisciplinary research to the environmental field, and I present some of the challenges associated with this mass integration of knowledge. Finally, I describe three models of transdisciplinary research that have been proposed by scholars to address some of these …
A Push For Inclusive Data Collection In Stem Organizations, Nicholas P. Burnett, Alyssa M. Hernandez, Emily E. King, Richelle L. Tanner, Kathryn Wilsterman
A Push For Inclusive Data Collection In Stem Organizations, Nicholas P. Burnett, Alyssa M. Hernandez, Emily E. King, Richelle L. Tanner, Kathryn Wilsterman
Biology, Chemistry, and Environmental Sciences Faculty Articles and Research
Professional organizations in STEM (science, technology, engineering, and mathematics) can use demographic data to quantify recruitment and retention (R&R) of underrepresented groups within their memberships. However, variation in the types of demographic data collected can influence the targeting and perceived impacts of R&R efforts - e.g., giving false signals of R&R for some groups. We obtained demographic surveys from 73 U.S.-affiliated STEM organizations, collectively representing 712,000 members and conference-attendees. We found large differences in the demographic categories surveyed (e.g., disability status, sexual orientation) and the available response options. These discrepancies indicate a lack of consensus regarding the demographic groups that …
Moving Toward Personalized Law, Cary Coglianese
Moving Toward Personalized Law, Cary Coglianese
All Faculty Scholarship
Rules operate as a tool of governance by making generalizations, thereby cutting down on government officials’ need to make individual determinations. But because they are generalizations, rules can result in inefficient or perverse outcomes due to their over- and under-inclusiveness. With the aid of advances in machine-learning algorithms, however, it is becoming increasingly possible to imagine governments shifting away from a predominant reliance on general rules and instead moving toward increased reliance on precise individual determinations—or on “personalized law,” to use the term Omri Ben-Shahar and Ariel Porat use in the title of their 2021 book. Among the various technological, …
Usability Of Health-Related Websites By Filipino-American Adults And Nursing Informatics Experts, Kathleen Begonia
Usability Of Health-Related Websites By Filipino-American Adults And Nursing Informatics Experts, Kathleen Begonia
Dissertations, Theses, and Capstone Projects
Filipino-Americans are an understudied minority group with high prevalence and mortality from chronic conditions, such as cardiovascular disease and diabetes. Facing barriers to care and lack of culturally appropriate health resources, they frequently use the internet to obtain health information. It is unknown whether they perceive health-related websites to be useful or easy to use because there are no published usability studies involving this population. Using the Technology Acceptance Model as a theoretical framework, this study investigated the difference between website design ratings by experts and the perceptions of Filipino-American users to determine if usability guidelines influenced the perceived ease …
Toward A Student-Ready Cybersecurity Program: Findings From A Survey Of Stem-Students, Lora Pitman, Brian K. Payne, Tancy Vandecar-Burdin, Lenora Thorbjornsen
Toward A Student-Ready Cybersecurity Program: Findings From A Survey Of Stem-Students, Lora Pitman, Brian K. Payne, Tancy Vandecar-Burdin, Lenora Thorbjornsen
Journal of Cybersecurity Education, Research and Practice
As the number of available cybersecurity jobs continues to grow, colleges strive to offer to their cybersecurity students an environment which will make them sufficiently prepared to enter the workforce after graduation. This paper explores the academic and professional needs of STEM-students in various higher education institutions across Virginia and how cybersecurity programs can cater to these needs. It also seeks to propose an evidence-based approach for improving the existing cybersecurity programs so that they can become more inclusive and student-ready. A survey of 251 college students in four higher-education institutions in Virginia showed that while there are common patterns …
The Effects Of Stem And Non-Stem Mathematics Corequisite Courses On Student Success At Public Institutions In West Virginia, Vanessa S. Keadle
The Effects Of Stem And Non-Stem Mathematics Corequisite Courses On Student Success At Public Institutions In West Virginia, Vanessa S. Keadle
Theses, Dissertations and Capstones
This study explored the differences in student success outcomes between students enrolled in non-STEM and STEM corequisite mathematics courses at 18 postsecondary institutions across five academic years in West Virginia, using de-identified student data. The researcher analyzed this extant data to determine if student characteristics were predictors of success, as defined as passing the mathematics corequisite course, retention to the next semester, and earning a GPA of 2.0 or higher. The researcher also conducted analyses to understand if the differences in those outcomes between STEM and non-STEM courses were significant. This study identified statistically significant gaps in success for students …
Algorithm Vs. Algorithm, Cary Coglianese, Alicia Lai
Algorithm Vs. Algorithm, Cary Coglianese, Alicia Lai
All Faculty Scholarship
Critics raise alarm bells about governmental use of digital algorithms, charging that they are too complex, inscrutable, and prone to bias. A realistic assessment of digital algorithms, though, must acknowledge that government is already driven by algorithms of arguably greater complexity and potential for abuse: the algorithms implicit in human decision-making. The human brain operates algorithmically through complex neural networks. And when humans make collective decisions, they operate via algorithms too—those reflected in legislative, judicial, and administrative processes. Yet these human algorithms undeniably fail and are far from transparent. On an individual level, human decision-making suffers from memory limitations, fatigue, …
¿Quién Soy Yo? [Who Am I?]: Exploring Identity Through Analyzing Afro-Cuban Poetry And Creative Coding In A Post-Secondary Spanish Literature Classroom, F. Megumi Kivuva
¿Quién Soy Yo? [Who Am I?]: Exploring Identity Through Analyzing Afro-Cuban Poetry And Creative Coding In A Post-Secondary Spanish Literature Classroom, F. Megumi Kivuva
Senior Projects Spring 2022
With efforts to broaden participation in computing by integrating CS education into humanities and developing more critical pedagogy, this research focuses on teaching computing in a post-secondary Spanish literature class through analyzing Afro-Cuban poetry. Its goal was to evaluate how participants may use Twine to reflect on Afro-Cuban poetry and their own identities. A group of 5 participants, one professor, and five students, learned how to use Twine to create interactive narratives reflecting on “El apellido,” a poem by Afro-Cuban poet Nicolás Guillén. Through analyzing researcher notes, participants’ projects, post-workshop surveys, and interviews, the research revealed that students were able …
Bitcoin Selfish Mining Modeling And Dependability Analysis, Chencheng Zhou, Liudong Xing, Jun Guo, Qisi Liu
Bitcoin Selfish Mining Modeling And Dependability Analysis, Chencheng Zhou, Liudong Xing, Jun Guo, Qisi Liu
Electrical & Computer Engineering Faculty Publications
Blockchain technology has gained prominence over the last decade. Numerous achievements have been made regarding how this technology can be utilized in different aspects of the industry, market, and governmental departments. Due to the safety-critical and security-critical nature of their uses, it is pivotal to model the dependability of blockchain-based systems. In this study, we focus on Bitcoin, a blockchain-based peer-to-peer cryptocurrency system. A continuous-time Markov chain-based analytical method is put forward to model and quantify the dependability of the Bitcoin system under selfish mining attacks. Numerical results are provided to examine the influences of several key parameters related to …
From Negative To Positive Algorithm Rights, Cary Coglianese, Kat Hefter
From Negative To Positive Algorithm Rights, Cary Coglianese, Kat Hefter
All Faculty Scholarship
Artificial intelligence, or “AI,” is raising alarm bells. Advocates and scholars propose policies to constrain or even prohibit certain AI uses by governmental entities. These efforts to establish a negative right to be free from AI stem from an understandable motivation to protect the public from arbitrary, biased, or unjust applications of algorithms. This movement to enshrine protective rights follows a familiar pattern of suspicion that has accompanied the introduction of other technologies into governmental processes. Sometimes this initial suspicion of a new technology later transforms into widespread acceptance and even a demand for its use. In this paper, we …
More Amazon Than Mafia: Analysing A Ddos Stresser Service As Organised Cybercrime, Roberto Musotto, David S. Wall
More Amazon Than Mafia: Analysing A Ddos Stresser Service As Organised Cybercrime, Roberto Musotto, David S. Wall
Research outputs 2014 to 2021
© 2020, The Author(s). The internet mafia trope has shaped our knowledge about organised crime groups online, yet the evidence is largely speculative and the logic often flawed. This paper adds to current knowledge by exploring the development, operation and demise of an online criminal group as a case study. In this article we analyse a DDoS (Distributed Denial of Service) stresser (also known as booter) which sells its services online to enable offenders to launch attacks. Using Social Network Analysis to explore the service operations and payment systems, our findings show a central business model that is similar to …
A Novel Arabic Corpus For Text Classification Using Deep Learning And Word Embedding, Roua A. Abou Khachfeh, Islam El Kabani, Ziad Osman
A Novel Arabic Corpus For Text Classification Using Deep Learning And Word Embedding, Roua A. Abou Khachfeh, Islam El Kabani, Ziad Osman
BAU Journal - Science and Technology
Over the last years, Natural Language Processing (NLP) for Arabic language has obtained increasing importance due to the massive textual information available online in an unstructured text format, and its capability in facilitating and making information retrieval easier. One of the widely used NLP task is “Text Classification”. Its goal is to employ machine learning technics to automatically classify the text documents into one or more predefined categories. An important step in machine learning is to find suitable and large data for training and testing an algorithm. Moreover, Deep Learning (DL), the trending machine learning research, requires a lot of …
Application Of Competitive Intelligence For Insular Territories: Automatic Analysis Of Scientific And Technology Trends To Fight The Negative Effects Of Climate Change, Henri Dou, Pierre Fournie
Application Of Competitive Intelligence For Insular Territories: Automatic Analysis Of Scientific And Technology Trends To Fight The Negative Effects Of Climate Change, Henri Dou, Pierre Fournie
International Journal of Islands Research
Islands are fragile territories because of their geographical position. As a result, climate impacts can have serious consequences, of which some are irreversible. Therefore, it is necessary to allow insular territories to benefit from the latest scientific and technological advances in combating climate effects. The current article shows how to deal with automatic analysis of scientific information on the one hand, but also its applications via patents. We will analyse the latest scientific results as well as their possible applications using patent analysis. We will also focus on experts, laboratories, and leading companies, that are active on the field. The …
Integration Of Blockchain Technology Into Automobiles To Prevent And Study The Causes Of Accidents, John Kim
Integration Of Blockchain Technology Into Automobiles To Prevent And Study The Causes Of Accidents, John Kim
Electronic Theses, Projects, and Dissertations
Automobile collisions occur daily. We now live in an information-driven world, one where technology is quickly evolving. Blockchain technology can change the automotive industry, the safety of the motoring public and its surrounding environment by incorporating this vast array of information. It can place safety and efficiency at the forefront to pedestrians, public establishments, and provide public agencies with pertinent information securely and efficiently. Other industries where Blockchain technology has been effective in are as follows: supply chain management, logistics, and banking. This paper reviews some statistical information regarding automobile collisions, Blockchain technology, Smart Contracts, Smart Cities; assesses the feasibility …
Regulating New Tech: Problems, Pathways, And People, Cary Coglianese
Regulating New Tech: Problems, Pathways, And People, Cary Coglianese
All Faculty Scholarship
New technologies bring with them many promises, but also a series of new problems. Even though these problems are new, they are not unlike the types of problems that regulators have long addressed in other contexts. The lessons from regulation in the past can thus guide regulatory efforts today. Regulators must focus on understanding the problems they seek to address and the causal pathways that lead to these problems. Then they must undertake efforts to shape the behavior of those in industry so that private sector managers focus on their technologies’ problems and take actions to interrupt the causal pathways. …
Novel Pilot Development Of A Closed-Loop Sustainable System Between Biogas Renewable Energy, Distilling, And Aquaculture By Vermiculture Of Stillage Wastes, Samuel C. Kessler
Novel Pilot Development Of A Closed-Loop Sustainable System Between Biogas Renewable Energy, Distilling, And Aquaculture By Vermiculture Of Stillage Wastes, Samuel C. Kessler
The Cardinal Edge
This study provides a mixed-methods approach in analyzing a potential closed-loop system between renewable biogas production from anaerobic digestion, vermiculture production, aquaculture production, and organic wastes with a particular focus on stillage wastes. Such system may hold significant promise for significantly reducing organic carbon and methane emissions from its components, and should be assessed for such. The 2021 IPCC report essentially identified methane reduction as the single fastest way to slow global warming (IPCC, 2021), making the study and implementation of methane-reducing systems and supportive policy for them critical. Knowledge gaps to implementing this system were qualitatively identified as disconnect …
A Configurable Social Network For Running Irb-Approved Experiments, Mihovil Mandic
A Configurable Social Network For Running Irb-Approved Experiments, Mihovil Mandic
Dartmouth College Undergraduate Theses
Our world has never been more connected, and the size of the social media landscape draws a great deal of attention from academia. However, social networks are also a growing challenge for the Institutional Review Boards concerned with the subjects’ privacy. These networks contain a monumental variety of personal information of almost 4 billion people, allow for precise social profiling, and serve as a primary news source for many users. They are perfect environments for influence operations that are becoming difficult to defend against. Motivated to study online social influence via IRB-approved experiments, we designed and implemented a flexible, scalable, …
Promoting And Teaching Responsible Leadership In Software Engineering, Devender Goyal, Luiz Fernando Capretz
Promoting And Teaching Responsible Leadership In Software Engineering, Devender Goyal, Luiz Fernando Capretz
Electrical and Computer Engineering Publications
As software and computer technology is becoming more prominent and pervasive in all spheres of life, many researchers and industry folks are realizing the importance of teaching soft skills and values to CS and SE students. Many researchers and leaders, from both academic and non-academic world, are also calling for software researchers and practitioners to seriously consider human values, like respect, integrity, compassion, justice, and honesty when building software, both for greater social good and also for financial considerations. In this paper, we propose and wish to promote teaching soft skills, values, and responsibilities to students, which we term as …
The Future Of Artificial Intelligence In The Healthcare Industry, Erika Bonnist
The Future Of Artificial Intelligence In The Healthcare Industry, Erika Bonnist
Honors Theses
Technology has played an immense role in the evolution of healthcare delivery for the United States and on an international scale. Today, perhaps no innovation offers more potential than artificial intelligence. Utilizing machine intelligence as opposed to human intelligence for the purposes of planning, offering solutions, and providing insights, AI has the ability to alter traditional dynamics between doctors, patients, and administrators; this reality is now producing both elation at artificial intelligence's medical promise and uncertainty regarding its capacity in current systems. Nevertheless, current trends reveal that interest in AI among healthcare stakeholders is continuously increasing, and with the current …
Ecological Risk Assessment Of Managed Relocation As A Climate Change Adaptation Strategy, Aviv Karasov-Olson, Mark W. Schwartz, Julian D. Olden, Sarah Skikne, Jessica J. Hellmann, Sarah Allen, Christy Brigham, Danielle Buttke, David J. Lawrence, Abraham J. Miller-Rushing, Jeffrey T. Morisette, Gregor W. Schuurman, Melissa Trammell, Cat Hawkins Hoffman
Ecological Risk Assessment Of Managed Relocation As A Climate Change Adaptation Strategy, Aviv Karasov-Olson, Mark W. Schwartz, Julian D. Olden, Sarah Skikne, Jessica J. Hellmann, Sarah Allen, Christy Brigham, Danielle Buttke, David J. Lawrence, Abraham J. Miller-Rushing, Jeffrey T. Morisette, Gregor W. Schuurman, Melissa Trammell, Cat Hawkins Hoffman
United States National Park Service: Publications
Executive Summary
Changing climate and introduced species are placing an increasing number of species at risk of extinction. Increasing extinction risk is increasing calls to protect species by relocating, or translocating, them to locations with more favorable biotic or climatic conditions. Managed relocation, or assisted migration, of species entails risks to both the conservation target organisms being moved as well as the recipient ecosystems into which they are moved.
Recognizing this risk, calls have been made for practitioners interested in considering a managed relocation project to engage in a serious risk assessment prior to advancing a project. We engaged a …
The Greta Thunberg Effect: Familiarity With Greta Thunberg Predicts Intentions To Engage In Climate Activism In The United States, Anandita Sabherwal, Matthew T. Ballew, Sander Van Der Linden, Abel Gustafson, Matthew H. Goldberg, Edward W. Maibach, John E. Kotcher, Janet K. Swim, Seth A. Rosenthal, Anthony Leiserowitz
The Greta Thunberg Effect: Familiarity With Greta Thunberg Predicts Intentions To Engage In Climate Activism In The United States, Anandita Sabherwal, Matthew T. Ballew, Sander Van Der Linden, Abel Gustafson, Matthew H. Goldberg, Edward W. Maibach, John E. Kotcher, Janet K. Swim, Seth A. Rosenthal, Anthony Leiserowitz
Psychology Faculty Articles and Research
Despite Greta Thunberg's popularity, research has yet to investigate her impact on the public's willingness to take collective action on climate change. Using cross‐sectional data from a nationally representative survey of U.S. adults (N = 1,303), we investigate the “Greta Thunberg Effect,” or whether exposure to Greta Thunberg predicts collective efficacy and intentions to engage in collective action. We find that those who are more familiar with Greta Thunberg have higher intentions of taking collective actions to reduce global warming and that stronger collective efficacy beliefs mediate this relationship. This association between familiarity with Greta Thunberg, collective efficacy …
Real-Time Monitoring As A Supplementary Security Component Of Vigilantism In Modern Network Environments, Victor R. Kebande, Nickson M. Karie, Richard A. Ikuesan
Real-Time Monitoring As A Supplementary Security Component Of Vigilantism In Modern Network Environments, Victor R. Kebande, Nickson M. Karie, Richard A. Ikuesan
Research outputs 2014 to 2021
© 2020, The Author(s). The phenomenon of network vigilantism is autonomously attributed to how anomalies and obscure activities from adversaries can be tracked in real-time. Needless to say, in today’s dynamic, virtualized, and complex network environments, it has become undeniably necessary for network administrators, analysts as well as engineers to practice network vigilantism, on traffic as well as other network events in real-time. The reason is to understand the exact security posture of an organization’s network environment at any given time. This is driven by the fact that modern network environments do, not only present new opportunities to organizations but …