Books
- 1984, By George Orwell
- 2020, INTERNET CRIME REPORT, FEDERAL BUREAU OF INVESTIGATION, INTERNET CRIME COMPLAINT CENTER
- 5G Technology, U.S. - China Race, And the Competition for Dominance
- Art and Eco Therapies: Benefifits to Motor Development of Preschool-Age Children in the Screen Era, by Tatiana J. Miranda Orama
- Artificial Intelligence and the Ethics Behind It
- Behavioral Skills Training to Teach Online Safety Responses to Youth with Autism Spectrum Disorder
- Book Review - Industry of Anonymity: Inside the Business of Cybercrime, by Jonathan Lusthaus
- Blockchain-mediated Licensing - Legal Engineering for Artist Empowerment, by Charles Adjovu; Ewa Fabian
- CYBERSECURITY - CREATING A CYBERSECURITY CULTURE, by Steven Edward Ogden
- Cybersecurity in Elections - Models of Interagency Collaboration, by Sam van der Staak and Peter Wolf
- Crypto and Blockchain Fundamentals, by Mary C. Lacity
- Dating App Facilitated Sexual Violence: The Prevalence and Mental Health Effects, by Samantha G. Echevarria
- DIGITAL DOMINION:How the Syrian regime’s mass digital surveillance violates human rights
- Digitizing the ‘Ideal’ Latina Information Worker, by Miriam Sweeney and Melissa Villa-Nicholas
- Deploying Secure Unified Communications/Voice and Video over IP Systems
- Deterrence and Response Improvements for a Large-Scale Cyberterrorism Attack, by Harrison Cunningham
- Employment Status for “Essential Workers”: The Case for Gig Worker Parity
- Ethical Hacking, By Alana Maurushat
- Evaluating Security in Cryptocurrency Wallets
- Great Power Politics: The United States’ War on Disinformation with Consideration to Russian and Chinese Offensive Efforts
- Grief is love with nowhere to go, by Sara Sampson
- Handle with Care: Domestic Violence Safety Planning in the Age of Data Privacy Laws, by Jenny Wu
- Jack Voltaic 3.0 Cyber Research Report, by United States Military Academy
- Impact of Information Breaches on Health Care Records
- Information Age Imperialism: China, ‘Race,’ and Neo-Colonialism in Africa and Latin America, by James Dever & Jack Dever
- NESCOR Guide to Penetration Testing for Electric Utilities, by National Electric Sector Cybersecurity Organization Resource (NESCOR)
- PREVALENCE OF CYBERBULLYING AMONG TRADITIONAL UNDERGRADUATE STUDENTS ATTENDING FAITH-BASED UNIVERSITIES: A CAUSAL-COMPARATIVE STUDY, by Susan A. Hayes-McElroy
- RIGHTS OF MAN, By Thomas Paine
- Social Media User Relationship Framework (SMURF)
- Social Media Awareness: The Impact of Social Media on Mental Health
- The Bumble Bill: A Critical Analysis on Texas’s New Law Taking Indecent Exposure Regulations Online
- The Red Swimsuit: Essays
- Unilateral Economic Sanctions and Protecting U.S. National Security
- Who Owns Bitcoin? Private Law Facing the Blockchain