Link
Search
Menu
Expand
Document
Publications
Cybersecurity Publications
T
§ The Dynamic Negotiated Exchange Model of Heroism and Heroic Leadership - Lessons From the COVID-19 Pandemic
Introduction
Definitions of Heroism and Heroic Leadership
Exchange Models of Leadership and Heroism
Frontliners and the Hero–Recipient Exchange
Dynamic Negotiated Exchange during Times of Crisis
Specific Hypotheses Deriving from the DNE Model
Summary and Concluding Thoughts
References
§ Therapeutic Servicescapes, COVID Stress, and Customer Revisit Intention in the Hospitality Industry Post-Lockdown
Introduction
Literature Review and Hypotheses Development
Methods
Discussion
References
§ The Cuban Missile Crisis – Miscalculation - Nuclear Risks and the Human Dimension
Start of the Nuclear Era
Prelude
Concerns
Reaction
Crisis
Resolution
Lessons Learned
§ The Killing Machine of Juarez - A Literature Review on the Maquiladora Industry and Femicide in the City
Introduction
Methodological Approach
A brief history of feminism and femicide
NAFTA and other factors that can affect maquiladoras
Reported Cases of Femicide from Maquiladora Workers
Discussion
Limitations and Future Studies
Conclusion
Works Cited
§ The Symptom of Ethics - Rethinking Ethics in the Face of the Machine
A Symptom of the Symptom
The Symptom of Ethics
Enjoy Your Symptom
How to Survive the Robot Apocalypse
Summary and Conclusions
Notes
Author Biography
References
§ Towards an ethical framework for the design and development of inclusive home-based smart technology for smart spaces for older adults and people with disabilities
1 INTRODUCTION
2 HOME-BASED SMART TECHNOLOGY
3 ETHICS AND TECHNOLOGY
4 HUMAN CENTRED DESIGN
5 PERSONAS AND ETHICS
6 PROPOSED 5D FRAMEWORK
7 CONCLUSIONS
ACKNOWLEDGEMENTS
REFERENCES
APPENDIX
§ The Volatility Implications of the Chinese Cryptocurrency Ban
1. Introduction
2. Data Description
3. Empirical Results
4. Concluding Remarks
References
Tables & Figures
§ The Intersectionality of Racism-Globalization-Climate-Change and Forced Migration
Introduction
Problems
Approaches
Conclusion
References
§ THE FAR RIGHT AND JANUARY 6, 2021 - HOW CYBER AND REAL LIFE SPACES BECAME ONE AND THE IMAGERY THAT FACILITATED THE PROCESS
CHAPTER ONE - INTRODUCTION
CHAPTER TWO - LITERATURE REVIEW
CHAPTER THREE - METHODS
CHAPTER FOUR - FINDINGS
CHAPTER FIVE - CONCLUSIONS AND RECOMMENDATIONS
APPENDIX A - Google Form
APPENDIX B - SPREADSHEET OF RESPONSES
REFERENCES
§ The Digital Yuan and the BeiDou Satellite System - China’s Increasing Structural Power in an Interdependent World
INTRODUCTION
CHAPTER 1
CHAPTER 2
CHAPTER 3
CONCLUSION
WORKS CITED
§ The Factors Involved in the Exit from Sex Trafficking - A Review
Introduction
Theoretical Background
Methods
Results
Discussion
Conclusion
References
§ The European Union - Data Protection for Economic Competition and Regional Security
§ The Bumble Bill - A Critical Analysis on Texas’s New Law Taking Indecent Exposure Regulations Online
I. INTRODUCTION
II. OVERVIEW
III. TEXAS PENAL CODE SECTION 21.19 WILL BE DECLARED UNCONSTITUTIONAL
IV. UNDERLYING ISSUES
V. TEXAS PENAL CODE SECTION 21.19 FILLS THE GAP FOR DIGITAL SEXUAL HARASSMENT
VI. CONCLUSION
§ The Threat of Social Media to Society and National Security - A Call for Social Media Policy and Legislation
§ The Internet Never Forgets - A Federal Solution to the Dissemination of Nonconsensual Pornography
§ Towards Increasing Trust In Expert Evidence Derived From Malware Forensic Tools
1. INTRODUCTION
2. BACKGROUND AND RELATED WORK
3. REQUIREMENTS FOR CONDUCTING MALWARE FORENSICS
4. DESIGN OF THE FRAMEWORK
5. DISCUSSION
6. CONCLUSIONS AND FURTHER WORK
7. REFERENCES
§ “The Jews love numbers” - Steven L. Anderson, Christian Conspiracists, and the Spiritual Dimensions of Holocaust Denial
Theocentric Christian Conspiracists and Holocaust Denial on the Web
Framing the World, *Marching to Zion*, and Texe Marrs
“What’s the real Holocaust?” - Steven Anderson’s Holocaust Denial
Conclusion
Acknowledgements
Bibliography
§ The Problem of Pornography
Morgann Hagar
Works Cited
§ The Red Swimsuit - Essays
INTRODUCTION
The Red Swimsuit
The New YouTube - Suburbia & Sleek Sabotage
A Record of the World as She Sees It
Reckoning Your Barbie Savior
Wanted - Someone with Whom to Simply Pass the Days
NOTES
ACKNOWLEDGMENTS
§ The Networked Question in the Digital Era - How Do Networked, Bounded, and Limited Individuals Connect at Different Stages in the Life Course?
§ TOKEN TAXONOMY - The Need for Open-Source Standards Around Digital Assets
§ The Internet as a Speech Machine and Other Myths Confounding Section 230 Reform
§ The Future of Cybercrime Prevention Strategies - Human Factors and A Holistic Approach to Cyber Intelligence
§ The Brick-and-Mortar Bank is Dead — COVID-19 Killed It
I. INTRODUCTION
II. BACKGROUND ON DATA SECURITY IN THE FINANCIAL SERVICES INDUSTRY
III. DATA PROTECTION LAWS REGULATING CONSUMER FINANCIAL INFORMATION
IV. THE PRESENT IMPACT OF COVID-19 ON THE BANKING INDUSTRY
V. THE FUTURE IMPACT OF COVID-19 ON THE BANKING INDUSTRY
VI. RECOMMENDATIONS FOR NAVIGATING BANKING POST COVID-19
VII. CONCLUSION
§ The District of Columbia Circuit Finds Article III Standing Based on the Risk of Future Identity Theft in In re U.S. Office of Personnel Management Data Security Breach Litigation
Just the Docs on GitHub
Cybersecurity Publications