Link
Search
Menu
Expand
Document
Publications
Cybersecurity Publications
D
§ Dalit Women - Narratives of Vulnerability Violence and a Culture of Impunity
Introduction - Indian Feminism and Intersectionality
Select Writings of Dalit Women
Domestic Violence
Public Violence
Victims of Religious Practices
Conclusion and Approach to Prevention
References
§ Data Privacy Is Not Meta - Why Facebook’s Foray Into the Metaverse Could Be Flawed From the Start
§ Digital Financial Literacy Skills among Library and Information Science Professionals in Northeast India - A Study
Introduction
Digital Financial Literacy and Digital Payment
Review of Literature
Objective of the Study
Methodology
Conclusion and recommendation
Reference
§ DATA BREACH RESPONSE - A Guide for Business
Secure Your Operations
Fix Vulnerabilities
Notify Appropriate Parties
For More Guidance From the FTC
§ DDoS - From Activist Event to Perpetual Crisis
Introduction
DDoS – Technical Developments
Phases of Hacktivism
Phases of DDoS - Technological developments
Effectivity and Legitimacy of DDoS
Breakdown and visibility
DDoS as breakdown
DDoS becomes ordinary
The politics of infrastructuring
Conclusions
Bibliography
§ Deconstructing Sexual Shame - Implications for Clinical Counselors and Counselor Educators
Introduction
Sexual Shame
Factors That Influence Sexual Shame
Deconstructing Sexual Shame in Counseling
Developing a Sex-Affirming Counseling Framework
Common Issues Related to Sexual Shame
Addressing Sexual Shame in Therapeutic Settings
Specific Strategies to Enhance Sexual Empowerment
Referral to Specialists
Attending to Countertransference
Conclusion
References
§ “Draw the Internet.” A visual exploration of how children think an everyday technology.
§ Dossier - Uyghur Women in China’s Genocide
Introduction
Policies against the Uyghur Women - Genocidal Intent
China’s Genocidal Policy Ideas - Where did they Originate?
Brief History of Colonization of East Turkistan
China’s Ideological Tools of Genocide - Punishment in Legalism
Conclusion
Bibliography
§ Digitizing the ‘Ideal’ Latina Information Worker
Introduction
Designing Virtual Assistants as Virtual Workers
Latinas as labor problem and solution
Gender-coding controllable workers
Designing the ‘right kind’ of Latina
Consumable Latinidad
§ Dating App Facilitated Sexual Violence - The Prevalence and Mental Health Effects
INTRODUCTION
CHAPTER 1 - LITERATURE REVIEW
CHAPTER 2 - METHODS
CHAPTER 3 - RESULTS
CHAPTER 4 - DISCUSSION
CHAPTER 5 - STRENGTHS, LIMITATIONS, AND SUGGESTIONS FOR FUTURE RESEARCH
CHAPTER 6 - CONCLUSION
APPENDIX A - RESEARCH STUDY TABLES
APPENDIX B - DATING APP USE FIGURES
APPENDIX C - DEMOGRAPHIC QUESTIONS
APPENDIX D - TECHNOLOGY FACILITATED SEXUAL VIOLENCE MEASURE
APPENDIX E - GENERAL SEXUAL VIOLENCE QUESTIONS
APPENDIX F - POST-TRAUMATIC STRESS DISORDER MEASURE
APPENDIX G - DEPRESSION MEASURE
APPENDIX H - ANXIETY MEASURE
APPENDIX I - SELF-ESTEEM MEASURE
APPENDIX J - LONELINESS MEASURE
APPENDIX K - PERCEIVED SELF-CONTROL MEASURE
APPENDIX L - MENTAL HEALTH RESOURCES PROVIDED
APPENDIX M - IRB APPROVAL LETTER AND MODIFICATION
REFERENCES
§ DIGITAL DOMINION - How the Syrian regime’s mass digital surveillance violates human rights
I. Introduction
II. Factual Background - Telecommunications Infrastructure and Key Players
III. Human Rights and Surveillance
IV. How Surveillance Leads to Censorship, Monitoring, Hacking and Violence
V. Conclusion
§ Deterrence and Response Improvements for a Large-Scale Cyberterrorism Attack
Chapter 1 - Introduction to the Study
Chapter 2 - Literature Review
Chapter 3 - Research Method
Chapter 4 - Results
Chapter 5 - Discussion, Conclusions, and Recommendations
References
Appendix A - Interview Protocol
Appendix B - Interview Questions
Appendix C - Second Cycle Codes
§ Defending Democracy - Taking Stock of the Global Fight Against Digital Repression, Disinformation, and Election Insecurity
I. Introduction
II. Unpacking the Cyber Threat to Democracies
III. U.S. Efforts to Protect Democratic Institutions
IV. Lessons from Other Democracies
V. Implications for Policymakers
VI. Conclusion
§ Digital Identity - A Human-Centered Risk Awareness Study
CHAPTER ONE - INTRODUCTION
CHAPTER TWO - ABOUT IDENTITY
CHAPTER THREE - LITERATURE REVIEW
CHAPTER FOUR - METHODOLOGY
CHAPTER FIVE - FINDINGS
CHAPTER SIX - DISCUSSION
REFERENCES
APPENDIX A - INTERVIEW SOLICITATION FLYER
APPENDIX B - IRB VERBAL CONSENT FORM
APPENDIX C - INTERVIEW QUESTIONNAIRE
APPENDIX D - IRB APPROVAL EXEMPT FORM
APPENDIX E - ITRC 2019 DATA BREACH REPORT STATISTICS
§ DOE/DHS/DOT Volpe Technical Meeting on Electric Vehicle and Charging Station Cybersecurity Report
1. Background / Introduction
2. Organizational Structure
3. Incorporating Cybersecurity into Design
4. Trust
5. Ownership and Maintenance
6. Coordination
7. Gaps and Conclusions
Appendix A - Electric Vehicle Technical Standards Overview
Just the Docs on GitHub
Cybersecurity Publications