Open Access. Powered by Scholars. Published by Universities.®
Social and Behavioral Sciences Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Political Science (14)
- Physical Sciences and Mathematics (13)
- International Relations (12)
- Computer Sciences (10)
- Public Affairs, Public Policy and Public Administration (10)
-
- International and Area Studies (9)
- Law (8)
- Engineering (7)
- Communication (6)
- Defense and Security Studies (6)
- Education (6)
- Sociology (6)
- Arts and Humanities (5)
- Business (5)
- Information Security (5)
- Peace and Conflict Studies (4)
- Science and Technology Studies (4)
- Geography (3)
- History (3)
- Human Resources Management (3)
- Nuclear (3)
- Physics (3)
- Political History (3)
- African Studies (2)
- Asian Studies (2)
- Communication Technology and New Media (2)
- Computer Engineering (2)
- Creative Writing (2)
- Economic Policy (2)
- Institution
-
- University of Wollongong (4)
- Edith Cowan University (3)
- University of Tennessee, Knoxville (3)
- Florida International University (2)
- Nova Southeastern University (2)
-
- Selected Works (2)
- American University in Cairo (1)
- Brigham Young University (1)
- California State University, San Bernardino (1)
- Claremont Colleges (1)
- Concordia University St. Paul (1)
- Eastern Kentucky University (1)
- Purdue University (1)
- Singapore Management University (1)
- Technological University Dublin (1)
- The University of Southern Mississippi (1)
- University for Business and Technology in Kosovo (1)
- University of Central Florida (1)
- University of Denver (1)
- University of Georgia School of Law (1)
- University of Massachusetts Boston (1)
- University of Nevada, Las Vegas (1)
- University of Pennsylvania Carey Law School (1)
- University of South Florida (1)
- Valparaiso University (1)
- Washington University in St. Louis (1)
- Publication
-
- International Journal of Nuclear Security (3)
- Australian Information Security Management Conference (2)
- CCE Theses and Dissertations (2)
- FIU Electronic Theses and Dissertations (2)
- Faculty of Engineering and Information Sciences - Papers: Part A (2)
-
- Faculty of Social Sciences - Papers (Archive) (2)
- All Faculty Scholarship (1)
- Athina Karatzogianni (1)
- Australian Digital Forensics Conference (1)
- CMC Senior Theses (1)
- Capstone and Graduation Projects (1)
- Conference papers (1)
- Dissertations (1)
- Electronic Theses and Dissertations (1)
- Georgia Journal of International & Comparative Law (1)
- Graduate Masters Theses (1)
- Information Technology Master Theses (1)
- Journal of African Conflicts and Peace Studies (1)
- Journal of International Technology and Information Management (1)
- Libraries Faculty and Staff Scholarship and Research (1)
- MA IDS Thesis Projects (1)
- Online Theses and Dissertations (1)
- Research Collection School Of Computing and Information Systems (1)
- Scholarship@WashULaw (1)
- TSOS Interview Gallery (1)
- Tracy Mitrano (1)
- UBT International Conference (1)
- UCF Forum (1)
- UNLV Theses, Dissertations, Professional Papers, and Capstones (1)
Articles 31 - 36 of 36
Full-Text Articles in Social and Behavioral Sciences
International Law In The Obama Administration's Pivot To Asia: The China Seas Disputes, The Trans- Pacific Partnership, Rivalry With The Prc, And Status Quo Legal Norms In U.S. Foreign Policy, Jacques Delisle
All Faculty Scholarship
The Obama administration’s “pivot” or “rebalance” to Asia has shaped the Obama administration’s impact on international law. The pivot or rebalance has been primarily about regional security in East Asia (principally, the challenges of coping with a rising and more assertive China—particularly in the context of disputes over the South China Sea—and resulting concerns among regional states), and secondarily about U.S. economic relations with the region (including, as a centerpiece, the Trans-Pacific Partnership). In both areas, the Obama administration has made international law more significant as an element of U.S. foreign policy and has sought to present the U.S. as …
Empirical Analysis Of Socio-Cognitive Factors Affecting Security Behaviors And Practices Of Smartphone Users, Joseph P. Simpson
Empirical Analysis Of Socio-Cognitive Factors Affecting Security Behaviors And Practices Of Smartphone Users, Joseph P. Simpson
CCE Theses and Dissertations
The overall security posture of information systems (IS) depends on the behaviors of the IS users. Several studies have shown that users are the greatest vulnerability to IS security. The proliferation of smartphones is introducing an entirely new set of risks, threats, and vulnerabilities. Smartphone devices amplify this data exposure problem by enabling instantaneous transmission and storage of personally identifiable information (PII) by smartphone users, which is becoming a major security risk. Moreover, companies are also capitalizing on the availability and powerful computing capabilities of these smartphone devices and developing a bring-your-own-device (BYOD) program, which makes companies susceptible to divulgence …
Big Data And The Future For Privacy, Neil M. Richards, Jonathan H. King
Big Data And The Future For Privacy, Neil M. Richards, Jonathan H. King
Scholarship@WashULaw
In our inevitable big data future, critics and skeptics argue that privacy will have no place. We disagree. When properly understood, privacy rules will be an essential and valuable part of our digital future, especially if we wish to retain the human values on which our political, social, and economic institutions have been built. In this paper, we make three simple points. First, we need to think differently about "privacy." Privacy is not merely about keeping secrets, but about the rules we use to regulate information, which is and always has been in intermediate states between totally secret and known …
An Empirical Assessment Of Employee Cyberslacking In The Public Sector, Wilnelia Hernández
An Empirical Assessment Of Employee Cyberslacking In The Public Sector, Wilnelia Hernández
CCE Theses and Dissertations
With the increasing use of the Internet, new challenges are presented to employees in the workplace. Employees spend time during work hours on non-work related activities including visiting e-commerce Websites, managing personal email accounts, and engaging in e-banking. These types of actions in the workplace are known as cyberslacking. Cyberslacking affects the employees’ productivity, presents legal concerns, and undermines the security of the organization’s network. This research study addressed the problem of cyberslacking in the public sector, by assessing the ethical severity of cyberslacking activities, as well as how employees perceived that the frequency of such activities occurred by their …
The International Community's Response To The Hypothetical Emergence Of Superheroes, Brittany Nicole Woods
The International Community's Response To The Hypothetical Emergence Of Superheroes, Brittany Nicole Woods
CMC Senior Theses
In a golden era for comic based media, this paper uses the hypothetical emergence of superheroes to analyze the assumptions and predictions of three international relations theories: realism, liberalism, and constructivism. Comics consistently reflect the real world, paralleling events and concepts discussed in foreign affairs dialogues. The thought experiment, and the comic genre itself, provides a vehicle for thinking broadly about the political and social ramifications of successful or failed problem solving, state interaction, and scientific advances.
To Continued Success: Reforming Internal Tunisian Security Policy, Thomas Eli Banghart V
To Continued Success: Reforming Internal Tunisian Security Policy, Thomas Eli Banghart V
Electronic Theses and Dissertations
Tunisia's reputation as the success story from the Arab Spring rests on the integration of a stable democratic regime. Domestic as well as regional threats continue to push the boundaries of this fledgling democracy. Development measures, and reform of the Tunisian Internal Security Forces are paramount for the state's survival. This work presents measures for Security Sector Reform within Tunisia, then proceeds to create a map a developmental intervention aimed at securing stability through several drivers. Understanding that development is a security threat for Tunisia will help allies, other regional actors, NGO's, and other organizations furthers the unique situation where …