Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








26 Hits in 8.0 sec

Penetration Testing Curriculum Development in Practice

Chengcheng Li
2015 Journal of Information Technology Education Innovations in Practice  
Bureau of Labor Statistics (Bureau of Labor Statistics, 2012) indicates that there is, and will continue to be, a severe shortage of cybersecurity professionals nationwide throughout the next decade.  ...  As both the frequency and the severity of network breaches have increased in recent years, it is essential that cybersecurity is incorporated into the core of business operations.  ...  Advanced Technological Education (ATE, 2014) grant promotes technical education in the 2-year community colleges.  ... 
doi:10.28945/2189 fatcat:skhzetm4d5aapprj6vr4the5uu

A Survey of Legal Issues Arising from the Deployment of Autonomous and Connected Vehicles

Daniel A. Crane, Kyle D. Logue, Bryce C. Pilz
2016 Social Science Research Network  
for educating the vehicle operator on the operation and competency of the AV.  ...  development of a business model for deployment of infrastructure and the next generation automobiles."). current vehicle becomes sufficiently old or outdated.  ...  charged with notice under the circumstances of the dangerous condition at a sufficient time prior to the event to have taken measures to protect against the dangerous condition."  ... 
doi:10.2139/ssrn.2807059 fatcat:uxpmmujzsfft3jnkd34i7lj5j4

Front Matter

2021 2021 IEEE/AIAA 40th Digital Avionics Systems Conference (DASC)  
To address timing, we purposefully scheduled all plenary sessions at an optimal time for all time zones.  ...  While this was driven by the pandemic, we feel that this is the wave of the future, where we leverage the best of both formats to provide a fantastic expertise for a wider range of participants.  ...  Most recently, he led a team of Embry-Riddle cybersecurity program students to design the first ever aviation cybersecurity competition at the DEF CON Aerospace Village in 2020.  ... 
doi:10.1109/dasc52595.2021.9594305 fatcat:w4rb7tpe7zfozhm57boudi46le

Security and Society in the Information Age

Paulina Piasecka, Katarzyna Maniszewska
2018 Figshare  
cooperating with the Terrorism Research Center at Collegium Civitas University in Warsaw, Poland.  ...  The authors looked among others such issues as cybersecurity and information security, propaganda, the prevention of mass shootings and active shooter situations through education and awareness programs  ...  This research paper will provide definitions of the terms "mass shooting", "active shooters", "stressors", and "mental health" as they pertain to the research conducted.  ... 
doi:10.6084/m9.figshare.7454207.v1 fatcat:kvzzbl2l75fexpjnzsldw2pfiq

Business Intelligence and Analytics: From Big Data to Big Impact

Chen, Chiang, Storey
2012 MIS Quarterly  
Finally, the six articles that comprise this special issue are introduced and characterized in terms of the proposed BI&A research framework.  ...  This introduction to the MIS Quarterly Special Issue on Business Intelligence Research first provides a framework that identifies the evolution, applications, and emerging research areas of BI&A.  ...  Lindner College of Business at the University of Cincinnati, and the Eller College of Management at the University of Arizona.  ... 
doi:10.2307/41703503 fatcat:34ytea7vvrfuvdqyfmdyhhxoi4

What Law Schools Must Change to Train Transactional Lawyers

Stephanie Hunter McMahon
2022 Pace Law Review  
Not all lawyers litigate, but you would not know that from the firstyear curriculum at most law schools.  ...  This Article concludes that, in the face of curriculum stagnation, the ABA accrediting body and bar examiners should recognize these changes by requiring and testing these "new" areas of law.  ...  Please note that the only schools included were the fifty-four listed in Appendix A. See infra Appendix A. 244. Please note that the author works at the University of Cincinnati Law School. 245.  ... 
doi:10.58948/2331-3528.2064 fatcat:hpyc5um4yjep3bngo6symkt6xq

Terror on the Internet: Comparing the United States and European Union Social Media Regulations to Prevent Terrorism

Madeline Schneider
2021 Indiana International & Comparative Law Review  
School of Law and has a bachelor's degree in International Affairs from the University of Cincinnati. 1.  ...  Next, this Note will turn to look at current American laws that may be used to combat terrorist propaganda online.  ...  of terrorism." 25 8 After a Klu Klux Klan rally that was broadcast in Cincinnati, members were convicted of violating the syndicalism statute. 259 The Klan members made comments that insinuated and  ... 
doi:10.18060/25756 fatcat:t72cyaoxwnchjpreflx4dmbp6e

Sustainable Growth or Dead Cat Bounce? A Strategic Inflection Point Analysis of Legal and Professional Education

Hilary G Escajeda
2018 Social Science Research Network  
legal education industry.  ...  To survive and thrive long-term, education programs must embrace entrepreneurship, technology, innovation, platforms, and customer service as the means by which to navigate through strategic inflection  ...  University of the Pacific, McGeorge School of Law); see generally ROBERT K.  ... 
doi:10.2139/ssrn.3170644 fatcat:h2tkklts3vd55oh3eppensnqui

Global Cyber Intermediary Liability: A Legal & Cultural Strategy

Jason H. Peterson, Lydia Segal, Anthony Eonas
2014 Pace Law Review  
See generally Braman & Lynch, supra note 13, at 249. The ISP industry has seen tremendous growth through the 2000s. Id. at 252.  ...  See Amitai Aviram, Network Responses to Network Threats: The Evolution into Private Cybersecurity Associations, in THE LAW AND ECONOMICS OF CYBERSECURITY 143,143 (Mark F.  ... 
doi:10.58948/2331-3528.1858 fatcat:zaczzdj5mrdejan4dcqvribnp4

Artificial Intelligence and Life in 2030: The One Hundred Year Study on Artificial Intelligence [article]

Peter Stone, Rodney Brooks, Erik Brynjolfsson, Ryan Calo, Oren Etzioni, Greg Hager, Julia Hirschberg, Shivaram Kalyanakrishnan, Ece Kamar, Sarit Kraus, Kevin Leyton-Brown, David Parkes (+5 others)
2022 arXiv   pre-print
It was written by a panel of 17 study authors, each of whom is deeply rooted in AI research, chaired by Peter Stone of the University of Texas at Austin.  ...  The charge for this report was given to the panel by the AI100 Standing Committee, chaired by Barbara Grosz of Harvard University.  ...  The City of Cincinnati uses them to proactively identify and deploy inspectors to properties at risk of code violations.  ... 
arXiv:2211.06318v1 fatcat:cyfjsijkhzc3pfmpgardpc2cle

Arms and the Man: Strategic Trade Control Challenges of 3D Printing

Arjun Banerjee
2018 International Journal of Nuclear Security  
These batteries were printed by a team of scientists based at Harvard University and the University of Illinois at Urbana-Champaign with precisely interlaced stacks of tiny battery electrodes, each of  ...  Similarly, a 285-nanometer long racecar model has been printed at the Vienna University of Technology in four minutes.  ... 
doi:10.7290/040107 fatcat:57g3k5nokvdrtifcvnxutb2xju

From Zero to Hero: How Zero-Rating Became a Debate about Human Rights

Linnet Taylor
2016 IEEE Internet Computing  
We also extend our sincere appreciation to the Deanship of Scientific Research at King Saud University for its funding of this International Research Group (IRG14-28).  ...  Acknowledgments This work is supported by the National Natural Science Foundation of China (61174169).  ...  the SE by Jan Marco Leimeister in his inaugural lecture at the University of St.  ... 
doi:10.1109/mic.2016.88 fatcat:imrhaaoac5gifool7wjegaxl5q

Book Review: Comparative Politics: Degrees of Democracy: Politics, Public Opinion, and PolicyDegrees of Democracy: Politics, Public Opinion, and Policy by StuartN. Soroka and WlezienChristopher. Cambridge: Cambridge University Press, 2010. 241pp., £16.99, ISBN 978 0 521 68789 8

P. Young Shaun
2012 Political Studies Review  
Wolfe (University of Cincinnati) Savage Economics: Wealth, Poverty, and the Temporal Walls of Capitalism by David L. Blaney and Naeem Inayatullah.  ...  Chapter 4 makes a moral case for abandoning the policy known as 'don't ask, don't tell'.The next chapter argues that common approaches to moral education fail because they blur distinct levels of moral  ...  Peter Harris (University of Texas at Austin) We welcome short reviews of books in all areas of politics and international relations.  ... 
doi:10.1111/j.1478-9302.2011.00252_10.x fatcat:y5j5vrwbjzbkdf2mwcq5fzzxoy

Book Review: Comparative Politics: The Rise of Regional Authority: A Comparative Study of 42 DemocraciesThe Rise of Regional Authority: A Comparative Study of 42 Democracies by HoogheLiesbetMarksGary and SchakelArjan H.Abingdon: Routledge, 2010. 224pp., £23.99, ISBN 978 0 415 57776 2

Scott L. Greer
2012 Political Studies Review  
Wolfe (University of Cincinnati) Savage Economics: Wealth, Poverty, and the Temporal Walls of Capitalism by David L. Blaney and Naeem Inayatullah.  ...  Chapter 4 makes a moral case for abandoning the policy known as 'don't ask, don't tell'.The next chapter argues that common approaches to moral education fail because they blur distinct levels of moral  ...  Peter Harris (University of Texas at Austin) We welcome short reviews of books in all areas of politics and international relations.  ... 
doi:10.1111/j.1478-9302.2011.00252_9.x fatcat:uppxxprnsnfqji5omh5k6ieewe

D. Trump's Economic Model: Results and Prospects
Экономическая модель Д. Трампа: итоги и перспективы

V. Supyan, Institute of the USA and Canadian Studies, Russian Academy of Sciences, 2/3 Khlebnyi Per., Moscow, 121069, Russian Federation
2020 Mirovaya Ekonomika i Mezhdunarodnye Otnosheniya  
outside the cybersecurity community to grasp.  ...  Sadly, a whole new generation of Chinese youth knows nothing about what happened at Tiananmen.  ... 
doi:10.20542/0131-2227-2020-64-7-34-42 fatcat:er3f2xhuvzfurmghiwzacmgu7u
« Previous Showing results 1 — 15 out of 26 results