Open Access. Powered by Scholars. Published by Universities.®
![Digital Commons Network](http://assets.bepress.com/20200205/img/dcn/DCsunburst.png)
Social and Behavioral Sciences Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Library and Information Science (6)
- Scholarly Communication (3)
- Computer Sciences (2)
- Engineering (2)
- International and Area Studies (2)
-
- Physical Sciences and Mathematics (2)
- Public Affairs, Public Policy and Public Administration (2)
- Artificial Intelligence and Robotics (1)
- Asian Studies (1)
- Business (1)
- Civil and Environmental Engineering (1)
- Communication (1)
- Computer-Aided Engineering and Design (1)
- Databases and Information Systems (1)
- Defense and Security Studies (1)
- Ergonomics (1)
- Human Factors Psychology (1)
- Intellectual Property Law (1)
- Judges (1)
- Law (1)
- Law Librarianship (1)
- Law and Gender (1)
- Legal Education (1)
- Legal Profession (1)
- Legal Writing and Research (1)
- Mechanical Engineering (1)
- Operational Research (1)
- Operations Research, Systems Engineering and Industrial Engineering (1)
- Other International and Area Studies (1)
- Institution
Articles 1 - 13 of 13
Full-Text Articles in Social and Behavioral Sciences
Strategic Petroleum Reserve: Origins And Evolution, Bert Chapman
Strategic Petroleum Reserve: Origins And Evolution, Bert Chapman
FORCES Initiative: Strategy, Security, and Social Systems
The U.S. Strategic Petroleum Reserve (SPR) is located on the Texas and Louisiana Gulf Coasts and has served as a national emergency petroleum supply resource since 1975. Contents of this report include:
- Information on the historical origins of U.S. national petroleum reserves dating back to 1910.
- The U.S.’ increasing growth as a petroleum consumer and its energy policy interactions with other countries.
- How the 1973 Arab Oil Embargo forced drastic changes in U.S. energy policy leading to the SPR’s establishment.
- The SPR’s legal purpose being creating and maintaining a strategic oil reserve to mitigate against future oil import interruptions or …
Security Of Information Resources In Academic Libraries In Kwara State, Nigeria, Abdrahman Atanda Moustapha
Security Of Information Resources In Academic Libraries In Kwara State, Nigeria, Abdrahman Atanda Moustapha
Library Philosophy and Practice (e-journal)
This study was on the security of information resources in academic libraries in Kwara State, Nigeria. Academic libraries in Kwara State include both private and public institutions. The libraries were predominantly selected for academic purposes, such as Kwara State University, University of Ilorin, Al-Hikmah University, and Kwara State Polytechnic Ilorin. Four research questions and four corresponding objectives of the study were framed. The case study design was approved for research. Targeted sampling was used to select 25 respondents from a pool of 115 professionals in all four academic libraries in Kwara State. Semi-structured interview guides were used to collect data …
Awareness Of Social Media Privacy & Security: A Study Among Engineering Students In Spsr Nellore Dist., A.P., Nagaraju Kuppugari
Awareness Of Social Media Privacy & Security: A Study Among Engineering Students In Spsr Nellore Dist., A.P., Nagaraju Kuppugari
Library Philosophy and Practice (e-journal)
This paper presents the results of a study conducted on the engineering student’s awareness of social media privacy and security issues. For this purpose, the survey method was adopted and a questionnaire was administered among the engineering students. The results revealed that majority of the respondents (60.8 percent) are reading the privacy policies on social media Majority of the respondents (76.31 percent) are avoiding friend requests from unknown persons. The study recommends that the users of social media should not assume that all privacy policies are identical; they vary from one platform to another; also, they do not provide sufficient …
Multi-Functional Job Roles To Support Operations In A Multi-Faceted Jewel Enabled By Ai And Digital Transformation, Steven M. Miller
Multi-Functional Job Roles To Support Operations In A Multi-Faceted Jewel Enabled By Ai And Digital Transformation, Steven M. Miller
Research Collection School Of Computing and Information Systems
In this story, we highlight the way in which the use of AI enabled support systems, together with work process digital transformation and innovative approaches to job redesign, have combined to dramatically change the nature of the work of the front-line service staff who protect and support the facility and visitors at the world’s most iconic airport mall and lifestyle destination.
Relevance Of Digital Libraries In The Promotion Of Security Through Community Policing Strategies In Rivers State, Nigeria, Adaobi Nwoye, Judith Ugwueke, Chinyere Anigbogu, Christian Olori
Relevance Of Digital Libraries In The Promotion Of Security Through Community Policing Strategies In Rivers State, Nigeria, Adaobi Nwoye, Judith Ugwueke, Chinyere Anigbogu, Christian Olori
Library Philosophy and Practice (e-journal)
No abstract provided.
Security Problems Of Academic Libraries In Nigeria, Angelyna Mindapa
Security Problems Of Academic Libraries In Nigeria, Angelyna Mindapa
Library Philosophy and Practice (e-journal)
Abstract
Librarians across Nigeria are gradually more concerned with the safety and physical integrity of important intellectual property or properties. Security and prevention of crimes in libraries more specifically academic libraries are necessary library duties for librarians to accomplish. Due to security breaches in university libraries, users at times are not able to get the information resources needed and this makes the library ineffective in satisfying users’ information needs. The security of collections in a library embraces a large number of responsibilities. The cost of acquiring processing, and maintaining collections are soaring. If information materials are stolen or damaged or …
Protecting Our Community From The Hidden Vulnerabilities Of Today’S Intelligent Transportation Systems, Shahab Tayeb
Protecting Our Community From The Hidden Vulnerabilities Of Today’S Intelligent Transportation Systems, Shahab Tayeb
Mineta Transportation Institute
The ever-evolving technology interwoven into the transportation industry leaves it frequently at risk for cyber-attacks. This study analyzes the security of a common in-vehicle network, the Controller Area Network (CAN), standard in most vehicles being manufactured today. Like many other networks, CAN comes with inherent vulnerabilities that leave CAN implementations at risk of being targeted by cybercriminals. Such vulnerabilities range from eavesdropping, where the attacker can read the raw data traversing the vehicle, to spoofing, where the attacker can place fabricated traffic on the network. The research team initially performed a simulation of CAN traffic generation followed by hardware implementation …
Digital Privacy In The Home, Kelley Flannery Rowan
Digital Privacy In The Home, Kelley Flannery Rowan
Works of the FIU Libraries
This workshop covers how to stay safe in a digital environment while using the many conveniences a smart home offers. The first half focuses on understanding where the risks are in the digital environment and how to stay safe by creating secure networks and employing strong security tactics with biometrics, passwords, and other available features. The second half focuses on the Internet of Things, covering everything you are likely to find in a smart home. The presentation offers tips on how to reduce the risk of hackers invading your privacy through smart speakers and TVs, as well as addressing the …
Strategic Concealment: Locating Armed Private Contractors In State Foreign Policy, Jared A. Michaels
Strategic Concealment: Locating Armed Private Contractors In State Foreign Policy, Jared A. Michaels
Student Publications
The global expansion of armed private contractors has led to a revived interest in researching armed private contracting firms, especially investigating how their personnel have functioned as an extension of state foreign policy. However, the literature on the industry contains a confusing diversity of terms when reviewing such firms, whether private military company, private security company, private military security company, or even just mercenary. Using the Singer (2010) ‘tip of the spear’ typology, I analyze the distinctions across armed private contracting firms and discuss the differences between armed private contractors and conventional militaries, armed private contractors and mercenaries, and highlight …
Law Library Blog (March 2022): Legal Beagle's Blog Archive, Roger Williams University School Of Law
Law Library Blog (March 2022): Legal Beagle's Blog Archive, Roger Williams University School Of Law
Law Library Newsletters/Blog
No abstract provided.
Human Ergonomic Simulation To Support The Design Of An Exoskeleton For Lashing/De-Lashing Operations Of Containers Cargo, Francesco Longo, Antonio Padovano, Vittorio Solina, Virginia D' Augusta, Stefan Venzl, Roberto Calbi, Michele Bartuni, Ornella Anastasi, Rafael Diaz
Human Ergonomic Simulation To Support The Design Of An Exoskeleton For Lashing/De-Lashing Operations Of Containers Cargo, Francesco Longo, Antonio Padovano, Vittorio Solina, Virginia D' Augusta, Stefan Venzl, Roberto Calbi, Michele Bartuni, Ornella Anastasi, Rafael Diaz
VMASC Publications
Lashing and de-lashing operations of containers cargo on board containerships are considered as quite strenuous activities in which operators are required to work continuously over a 6 or 8 hours shift with very limited break. This is mostly because containerships need to leave the port as soon as possible and containers loading and unloading operations must be executed with very high productivity (stay moored in a port is a totally unproductive time for a ship and a loss-making business for a shipping company). Operators performing lashing and de-lashing operations are subjected to intense ergonomic stress and uncomfortable working postures. To …
Testing The Limits Of International Society? Trust, Aukus And Indo-Pacific Security, Jamal Barnes, Samuel M. Makinda
Testing The Limits Of International Society? Trust, Aukus And Indo-Pacific Security, Jamal Barnes, Samuel M. Makinda
Research outputs 2022 to 2026
When Australia reneged on a AUD$90 billion submarine contract with France in 2021 as it joined AUKUS, a new trilateral military partnership between Australia, the UK and the US, it was accused of lying and breaching France's trust. This perceived act of betrayal not only led to a deterioration in the diplomatic relationship between Australia and France, but it also drew attention to the consequences of violating the norm of pacta sunt servanda—agreements must be kept. Although it is recognized that breaches of trust undermine relationships, what has been underexplored is how a violation of norms can also undermine the …
Relevance Of Internet Of Things To Health Institutions In Clinical Data Management: Implication For Librarians, Faith O. Mesagan, Moses Elechi, Francis O. Adurota, Chinedu Obinna Ejimonye, Onyinyechi G. Ossai
Relevance Of Internet Of Things To Health Institutions In Clinical Data Management: Implication For Librarians, Faith O. Mesagan, Moses Elechi, Francis O. Adurota, Chinedu Obinna Ejimonye, Onyinyechi G. Ossai
Library Philosophy and Practice (e-journal)
The Internet of Things (IoT) is the internetworking of physical devices which consists of an embedded system with sensors, actuators and network connectivity that enable collection and exchange of data. Each day, we are witnessing the emergence of new technologies that have the capability to embed into our environment and measure the physical, social and contextual phenomenon. The technology behind IOT is driven by various technological forces such as smart devices, wireless network, and pervasive connectivity among others. Data collection, management and accessibility are made easy with Internet of Things IOT. The Internet of Things (IoT) is aimed at formulating …