A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
Penetration Testing Curriculum Development in Practice
2015
Journal of Information Technology Education Innovations in Practice
Bureau of Labor Statistics (Bureau of Labor Statistics, 2012) indicates that there is, and will continue to be, a severe shortage of cybersecurity professionals nationwide throughout the next decade. ...
As both the frequency and the severity of network breaches have increased in recent years, it is essential that cybersecurity is incorporated into the core of business operations. ...
Advanced Technological Education (ATE, 2014) grant promotes technical education in the 2-year community colleges. ...
doi:10.28945/2189
fatcat:skhzetm4d5aapprj6vr4the5uu
A Survey of Legal Issues Arising from the Deployment of Autonomous and Connected Vehicles
2016
Social Science Research Network
for educating the vehicle operator on the operation and competency of the AV. ...
development of a business model for deployment of infrastructure and the next generation automobiles."). current vehicle becomes sufficiently old or outdated. ...
charged with notice under the circumstances of the dangerous condition at a sufficient time prior to the event to have taken measures to protect against the dangerous condition." ...
doi:10.2139/ssrn.2807059
fatcat:uxpmmujzsfft3jnkd34i7lj5j4
Front Matter
2021
2021 IEEE/AIAA 40th Digital Avionics Systems Conference (DASC)
To address timing, we purposefully scheduled all plenary sessions at an optimal time for all time zones. ...
While this was driven by the pandemic, we feel that this is the wave of the future, where we leverage the best of both formats to provide a fantastic expertise for a wider range of participants. ...
Most recently, he led a team of Embry-Riddle cybersecurity program students to design the first ever aviation cybersecurity competition at the DEF CON Aerospace Village in 2020. ...
doi:10.1109/dasc52595.2021.9594305
fatcat:w4rb7tpe7zfozhm57boudi46le
Security and Society in the Information Age
2018
Figshare
cooperating with the Terrorism Research Center at Collegium Civitas University in Warsaw, Poland. ...
The authors looked among others such issues as cybersecurity and information security, propaganda, the prevention of mass shootings and active shooter situations through education and awareness programs ...
This research paper will provide definitions of the terms "mass shooting", "active shooters", "stressors", and "mental health" as they pertain to the research conducted. ...
doi:10.6084/m9.figshare.7454207.v1
fatcat:kvzzbl2l75fexpjnzsldw2pfiq
Business Intelligence and Analytics: From Big Data to Big Impact
2012
MIS Quarterly
Finally, the six articles that comprise this special issue are introduced and characterized in terms of the proposed BI&A research framework. ...
This introduction to the MIS Quarterly Special Issue on Business Intelligence Research first provides a framework that identifies the evolution, applications, and emerging research areas of BI&A. ...
Lindner College of Business at the University of Cincinnati, and the Eller College of Management at the University of Arizona. ...
doi:10.2307/41703503
fatcat:34ytea7vvrfuvdqyfmdyhhxoi4
What Law Schools Must Change to Train Transactional Lawyers
2022
Pace Law Review
Not all lawyers litigate, but you would not know that from the firstyear curriculum at most law schools. ...
This Article concludes that, in the face of curriculum stagnation, the ABA accrediting body and bar examiners should recognize these changes by requiring and testing these "new" areas of law. ...
Please note that the only schools included were the fifty-four listed in Appendix A. See infra Appendix A. 244. Please note that the author works at the University of Cincinnati Law School. 245. ...
doi:10.58948/2331-3528.2064
fatcat:hpyc5um4yjep3bngo6symkt6xq
Terror on the Internet: Comparing the United States and European Union Social Media Regulations to Prevent Terrorism
2021
Indiana International & Comparative Law Review
School of Law and has a bachelor's degree in International Affairs from the University of Cincinnati. 1. ...
Next, this Note will turn to look at current American laws that may be used to combat terrorist propaganda online. ...
of terrorism." 25 8 After a Klu Klux Klan rally that was broadcast in Cincinnati, members were convicted of violating the syndicalism statute. 259 The Klan members made comments that insinuated and ...
doi:10.18060/25756
fatcat:t72cyaoxwnchjpreflx4dmbp6e
Sustainable Growth or Dead Cat Bounce? A Strategic Inflection Point Analysis of Legal and Professional Education
2018
Social Science Research Network
legal education industry. ...
To survive and thrive long-term, education programs must embrace entrepreneurship, technology, innovation, platforms, and customer service as the means by which to navigate through strategic inflection ...
University of
the Pacific, McGeorge School of Law); see generally ROBERT K. ...
doi:10.2139/ssrn.3170644
fatcat:h2tkklts3vd55oh3eppensnqui
Global Cyber Intermediary Liability: A Legal & Cultural Strategy
2014
Pace Law Review
See generally Braman & Lynch, supra note 13, at 249. The ISP industry has seen tremendous growth through the 2000s. Id. at 252. ...
See Amitai Aviram, Network Responses to Network Threats: The Evolution into Private Cybersecurity Associations, in THE LAW AND ECONOMICS OF CYBERSECURITY 143,143 (Mark F. ...
doi:10.58948/2331-3528.1858
fatcat:zaczzdj5mrdejan4dcqvribnp4
Artificial Intelligence and Life in 2030: The One Hundred Year Study on Artificial Intelligence
[article]
2022
arXiv
pre-print
It was written by a panel of 17 study authors, each of whom is deeply rooted in AI research, chaired by Peter Stone of the University of Texas at Austin. ...
The charge for this report was given to the panel by the AI100 Standing Committee, chaired by Barbara Grosz of Harvard University. ...
The City of Cincinnati uses them to proactively identify and deploy inspectors to properties at risk of code violations. ...
arXiv:2211.06318v1
fatcat:cyfjsijkhzc3pfmpgardpc2cle
Arms and the Man: Strategic Trade Control Challenges of 3D Printing
2018
International Journal of Nuclear Security
These batteries were printed by a team of scientists based at Harvard University and the University of Illinois at Urbana-Champaign with precisely interlaced stacks of tiny battery electrodes, each of ...
Similarly, a 285-nanometer long racecar model has been printed at the Vienna University of Technology in four minutes. ...
doi:10.7290/040107
fatcat:57g3k5nokvdrtifcvnxutb2xju
From Zero to Hero: How Zero-Rating Became a Debate about Human Rights
2016
IEEE Internet Computing
We also extend our sincere appreciation to the
Deanship of Scientific Research at King Saud University for its funding of this International Research Group (IRG14-28). ...
Acknowledgments This work is supported by the National Natural Science Foundation of China (61174169). ...
the SE by Jan Marco Leimeister in his inaugural lecture at the University of St. ...
doi:10.1109/mic.2016.88
fatcat:imrhaaoac5gifool7wjegaxl5q
Book Review: Comparative Politics: Degrees of Democracy: Politics, Public Opinion, and PolicyDegrees of Democracy: Politics, Public Opinion, and Policy by StuartN. Soroka and WlezienChristopher. Cambridge: Cambridge University Press, 2010. 241pp., £16.99, ISBN 978 0 521 68789 8
2012
Political Studies Review
Wolfe (University of Cincinnati) Savage Economics: Wealth, Poverty, and the Temporal Walls of Capitalism by David L. Blaney and Naeem Inayatullah. ...
Chapter 4 makes a moral case for abandoning the policy known as 'don't ask, don't tell'.The next chapter argues that common approaches to moral education fail because they blur distinct levels of moral ...
Peter Harris (University of Texas at Austin) We welcome short reviews of books in all areas of politics and international relations. ...
doi:10.1111/j.1478-9302.2011.00252_10.x
fatcat:y5j5vrwbjzbkdf2mwcq5fzzxoy
Book Review: Comparative Politics: The Rise of Regional Authority: A Comparative Study of 42 DemocraciesThe Rise of Regional Authority: A Comparative Study of 42 Democracies by HoogheLiesbetMarksGary and SchakelArjan H.Abingdon: Routledge, 2010. 224pp., £23.99, ISBN 978 0 415 57776 2
2012
Political Studies Review
Wolfe (University of Cincinnati) Savage Economics: Wealth, Poverty, and the Temporal Walls of Capitalism by David L. Blaney and Naeem Inayatullah. ...
Chapter 4 makes a moral case for abandoning the policy known as 'don't ask, don't tell'.The next chapter argues that common approaches to moral education fail because they blur distinct levels of moral ...
Peter Harris (University of Texas at Austin) We welcome short reviews of books in all areas of politics and international relations. ...
doi:10.1111/j.1478-9302.2011.00252_9.x
fatcat:uppxxprnsnfqji5omh5k6ieewe
D. Trump's Economic Model: Results and Prospects
Экономическая модель Д. Трампа: итоги и перспективы
2020
Mirovaya Ekonomika i Mezhdunarodnye Otnosheniya
Экономическая модель Д. Трампа: итоги и перспективы
outside the cybersecurity community to grasp. ...
Sadly, a whole new generation of Chinese youth knows nothing about what happened at Tiananmen. ...
doi:10.20542/0131-2227-2020-64-7-34-42
fatcat:er3f2xhuvzfurmghiwzacmgu7u
« Previous
Showing results 1 — 15 out of 26 results