Open Access. Powered by Scholars. Published by Universities.®

Social and Behavioral Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

2016

Security

Discipline
Institution
Publication
Publication Type

Articles 31 - 36 of 36

Full-Text Articles in Social and Behavioral Sciences

International Law In The Obama Administration's Pivot To Asia: The China Seas Disputes, The Trans- Pacific Partnership, Rivalry With The Prc, And Status Quo Legal Norms In U.S. Foreign Policy, Jacques Delisle Jan 2016

International Law In The Obama Administration's Pivot To Asia: The China Seas Disputes, The Trans- Pacific Partnership, Rivalry With The Prc, And Status Quo Legal Norms In U.S. Foreign Policy, Jacques Delisle

All Faculty Scholarship

The Obama administration’s “pivot” or “rebalance” to Asia has shaped the Obama administration’s impact on international law. The pivot or rebalance has been primarily about regional security in East Asia (principally, the challenges of coping with a rising and more assertive China—particularly in the context of disputes over the South China Sea—and resulting concerns among regional states), and secondarily about U.S. economic relations with the region (including, as a centerpiece, the Trans-Pacific Partnership). In both areas, the Obama administration has made international law more significant as an element of U.S. foreign policy and has sought to present the U.S. as …


Empirical Analysis Of Socio-Cognitive Factors Affecting Security Behaviors And Practices Of Smartphone Users, Joseph P. Simpson Jan 2016

Empirical Analysis Of Socio-Cognitive Factors Affecting Security Behaviors And Practices Of Smartphone Users, Joseph P. Simpson

CCE Theses and Dissertations

The overall security posture of information systems (IS) depends on the behaviors of the IS users. Several studies have shown that users are the greatest vulnerability to IS security. The proliferation of smartphones is introducing an entirely new set of risks, threats, and vulnerabilities. Smartphone devices amplify this data exposure problem by enabling instantaneous transmission and storage of personally identifiable information (PII) by smartphone users, which is becoming a major security risk. Moreover, companies are also capitalizing on the availability and powerful computing capabilities of these smartphone devices and developing a bring-your-own-device (BYOD) program, which makes companies susceptible to divulgence …


Big Data And The Future For Privacy, Neil M. Richards, Jonathan H. King Jan 2016

Big Data And The Future For Privacy, Neil M. Richards, Jonathan H. King

Scholarship@WashULaw

In our inevitable big data future, critics and skeptics argue that privacy will have no place. We disagree. When properly understood, privacy rules will be an essential and valuable part of our digital future, especially if we wish to retain the human values on which our political, social, and economic institutions have been built. In this paper, we make three simple points. First, we need to think differently about "privacy." Privacy is not merely about keeping secrets, but about the rules we use to regulate information, which is and always has been in intermediate states between totally secret and known …


An Empirical Assessment Of Employee Cyberslacking In The Public Sector, Wilnelia Hernández Jan 2016

An Empirical Assessment Of Employee Cyberslacking In The Public Sector, Wilnelia Hernández

CCE Theses and Dissertations

With the increasing use of the Internet, new challenges are presented to employees in the workplace. Employees spend time during work hours on non-work related activities including visiting e-commerce Websites, managing personal email accounts, and engaging in e-banking. These types of actions in the workplace are known as cyberslacking. Cyberslacking affects the employees’ productivity, presents legal concerns, and undermines the security of the organization’s network. This research study addressed the problem of cyberslacking in the public sector, by assessing the ethical severity of cyberslacking activities, as well as how employees perceived that the frequency of such activities occurred by their …


The International Community's Response To The Hypothetical Emergence Of Superheroes, Brittany Nicole Woods Jan 2016

The International Community's Response To The Hypothetical Emergence Of Superheroes, Brittany Nicole Woods

CMC Senior Theses

In a golden era for comic based media, this paper uses the hypothetical emergence of superheroes to analyze the assumptions and predictions of three international relations theories: realism, liberalism, and constructivism. Comics consistently reflect the real world, paralleling events and concepts discussed in foreign affairs dialogues. The thought experiment, and the comic genre itself, provides a vehicle for thinking broadly about the political and social ramifications of successful or failed problem solving, state interaction, and scientific advances.


To Continued Success: Reforming Internal Tunisian Security Policy, Thomas Eli Banghart V Jan 2016

To Continued Success: Reforming Internal Tunisian Security Policy, Thomas Eli Banghart V

Electronic Theses and Dissertations

Tunisia's reputation as the success story from the Arab Spring rests on the integration of a stable democratic regime. Domestic as well as regional threats continue to push the boundaries of this fledgling democracy. Development measures, and reform of the Tunisian Internal Security Forces are paramount for the state's survival. This work presents measures for Security Sector Reform within Tunisia, then proceeds to create a map a developmental intervention aimed at securing stability through several drivers. Understanding that development is a security threat for Tunisia will help allies, other regional actors, NGO's, and other organizations furthers the unique situation where …