Link
Search
Menu
Expand
Document
Publications
Cybersecurity Publications
P
§ Putin’s Invasion of Ukraine in 2022 - Implications for Strategic Studies
The Waning of Major War
Strategic Coercion—A Closer Look
War amongst the People—Still
War’s Changing Character and Dynamic Nature
Conclusions and Recommendations
§ Performance Comparison of Operations in the File System and in Embedded Key-Value Databases
1. Introduction
2. State of the Art
3. Underpinnings of our Approach
4. Methodology
5. Results
6. Future Work
7. Conclusion
References
§ Protection of Online Gender-Based Violence Victims - A Feminist Legal Analysis
I. Introduction
II. OGBV case in Indonesia
AP, LM, and CT Case (2010)
GA and MYD Case (2020)
The Cases of LBH APIK Jakarta Partners (2021)
III. Stagnation and Legal Vacancies in Indonesia
IV. Application of OGBV Law with a Victim Perspective
V. Conclusion
BIBLIOGRAPHY
§ PROTECTING VIOLENT FREE SPEECH AND COMBATTING TRUE HOMICIDAL THREATS IN CYBERSPACE
Introduction
Misconstrual of Privacy in Cyberspace
Demystifying True Online Threats vs. Protected Violent Speech
Cyberspace is a Hunting Ground
Shrinking Big Data
Behavioral Profiling and Human Judgment
Conclusion
Bibliography
§ Platforms and Tools used for Online Learning all over the World during Covid-19 - A Study
1. INTRODUCTION
2. REVIEW OF LITERATURE
3. METHODOLOGY
4. DATA ANALYSIS
5. TOOLS USED FOR ONLINE LEARNING
6. CONCLUSION
REFERENCES
§ Proliferation of NFT Transactions Raises Numerous US Tax Questions
Background on Taxation of Digital Assets
How To Characterize NFTs and NFT Transactions
How To Treat Costs Incurred in Creating an NFT
How To Report NFT Transactions
State and Local Tax Considerations
§ Privacy in the Public Eye - Frogs Boiling and the Right to Privacy
I. INTRODUCTION
II. BACKGROUND
III. RESEARCH DESIGN
IV. FOCUS GROUP FINDINGS
V. THE RESIGNATION CURVE - PROFILES IN PRIVACY
VI. CONCLUSION - REFRAMING PRIVACY’S MEANING
APPENDIX A - GENERAL SCRIPT/QUESTIONS FOR FOCUS GROUPS
APPENDIX B - RESPONDENTS’ ONE-WORD DESCRIPTIONS OF PRIVACY IN THE FUTURE
§ Pornography Its Harms and a New Legal Strategy - Research and Experience in Japan
From an Obscenity to a Discrimination Approach
MacKinnon and Dworkin’s Paradigm Shift
From the MacKinnon-Dworkin Ordinance to “Anti-Pornography and Prostitution Research Group’s” Classification
Harms in Production
Harms of Spy-Cam Filming
Harms Arising Through Pornography’s Circulation
Harms Arising Through Pornography’s Consumption
The Fourth Form of Pornography’s Harms - Social Harms
Harms of the Existence of Pornography
Prospects for a New Legal Strategy
Our Strategic Alternative
ACKNOWLEDGMENTS
REFERENCES
§ PREVALENCE OF CYBERBULLYING AMONG TRADITIONAL UNDERGRADUATE STUDENTS ATTENDING FAITH-BASED UNIVERSITIES - A CAUSAL-COMPARATIVE STUDY
CHAPTER ONE - INTRODUCTION
CHAPTER TWO - LITERATURE REVIEW
CHAPTER THREE - METHODS
CHAPTER FOUR - FINDINGS
CHAPTER FIVE - CONCLUSIONS
REFERENCES
APPENDIX A - CYBERBULLYING AND ONLINE AGGRESSION SURVEY
APPENDIX B - DUKE UNIVERSITY RELIGION INDEX (DUREL)
APPENDIX C - INSTITUTIONAL REVIEW BOARD PERMISSION
§ Protecting Children in the Frontier of Surveillance Capitalism
I. INTRODUCTION
II. RECLAIMING PRIVACY
III. CONTEXTUALIZING THE PROBLEM OF PRIVACY
IV. PROPOSED ADJUSTMENTS
V. CONCLUSION
§ PREVENTATIVE STEPS SOCIAL NETWORKS, SUCH AS FACEBOOK, TAKE AGAINST SEX TRAFFICKING
CHAPTER 1 SEX TRAFFICKING IN AMERICA THROUGH FACEBOOK
CHAPTER 2 METHODOLOGY
CHAPTER 3 RESULTS
CHAPTER 4 DISCUSSION
CHAPTER 5 SUMMARY
REFERENCES
APPENDIX
Just the Docs on GitHub
Cybersecurity Publications