Link
Search
Menu
Expand
Document
Publications
Cybersecurity Publications
I
§ It Takes the University to Close the Equity Gap
Defining the Equity Gap - Language Matters
Roots of the Equity Gap
Solutions to Closing the Gap
Conclusion
References
§ Interdisciplinary Health Care Professionals’ Perceptions of the Causes and Consequences of the Opioid Crisis - Developing Rural Community Partnerships to Increase Access to Naloxone
Methods
Results
Discussion
Conclusion
References
§ Is There a Relationship Between the Number of Female Students Who Were Cyberbullied and the Number of Female Students Who Seriously Considered Attempting Suicide?
I. INTRODUCTION
II. LITERATURE REVIEW
III. METHODOLOGY
IV. RESULTS
V. DISCUSSION
REFERENCES
§ INNOVATIVE PROCESSES IN THE MICROFINANCE SYSTEM
Introduction
Research methodology
Level of study of the topic
Analysis and results
Conclusion and recommendation
References
§ Information Age Imperialism - China, ‘Race,’ and Neo-Colonialism in Africa and Latin America
I. INTRODUCTION
II. CHINA IN CRISIS
III. STATE-SPONSORED DOMESTIC TERROR
IV. GREAT POWER COMPETITION
V. COLONIALISM
VI. CHINESE NEO-COLONIALISM
VII. CONCLUSION - AMERICAN PROTEST, GLOBAL FREEDOM
§ Impact of Information Breaches on Health Care Records
Chapter 1 - Introduction to the Study
Chapter 2 - Literature Review
Chapter 3 - Research Method
Chapter 4 - Results
Chapter 5 - Discussion, Conclusions, and Recommendations
References
§ Illicit Activity Detection in Large-Scale Dark and Opaque Web Social Networks
§ Israel’s Perspective on Key Legal and Practical Issues Concerning the Application of International Law to Cyber Operations
§ Impact of Social Media on Feminism
§ Internet Architecture and Disability
INTRODUCTION
I. TITLE III AND THE INTERNET - THE WEB AS THE INTERNET AND THE WEBSITE AS THE PLACE
II. INTERNAL/EXTERNAL PERSPECTIVES ON INTERNET ACCESSIBILITY - WEBSITECENTRISM VS. LAYER-CONSCIOUSNESS
III. A LAYER-CONSCIOUS APPROACH TO INTERNET ACCESSIBILITY
CONCLUSION
§ Industry of Anonymity - Inside the Business of Cybercrime, by Jonathan Lusthaus
Just the Docs on GitHub
Cybersecurity Publications