Research
Pending December 15, 2021
• Bullying in the C-Suite - A Nurse Leader Perspective HTML
Abstract
An estimated 35% of American workers have experienced bullying, and in 80% of those situations, the perpetrator was a supervisor or boss. However, the reality is that bullying can come from anyone in the workplace, including subordinates.August, 2021
• CYBERSECURITY - CREATING A CYBERSECURITY CULTURE HTML
Abstract
The government industry was one of three main industries where 95% of all records were breached (Milkovich, 2020).July 28, 2021
• The Problem of Pornography HTML
Abstract
His eyes met mine as he scoffed, “It’s just videos. It’s not like it’s real or anything. It’s not that big of a deal!” It should not have surprised me then, that our relationship would end with his gaze trailing another woman, as he had spent so much of the years we dated with his eyes lingering on other women on screens, pages, and incognito tabs on his phone.July 7, 2021
• Is There a Relationship Between the Number of Female Students Who Were Cyberbullied and the Number of Female Students Who Seriously Considered Attempting Suicide? HTML
Abstract
In the United States, cyberbullying has become a major public health concern. Indeed, many people who are victims of cyberbullying consider harming themselves.July, 2021
• An exploratory study of mode efficacy in cybersecurity training HTML
Abstract
Cybersecurity capabilities in organizations and governmental agencies continue to lag behind the threats.June 25, 2021
• A Study of Recidivism among Online Sexual Predators HTML
Abstract
Since the development of internet communication platforms and social media, the online sexual predation of minors has affected as much as an estimated 19 percent of the undereighteen-years-old population.June 14, 2021
• Effects of Social Technology on Older Adults in a Residential Living Facility HTML
Abstract
Loneliness and social isolation impact physical and mental health negatively for older adults. Researchers noted an increased relevance of the need for social technology with the emergence of COVID-19.June, 2021
• The Factors Involved in the Exit from Sex Trafficking - A Review HTML
Abstract
Sexual trafficking and exploitation are a worldwide phenomenon affecting a huge number of women. Many studies have examined the process of sex trafficking entering, but less have analyzed the exit process.June, 2021
• Unilateral Economic Sanctions and Protecting U.S. National Security HTML
Abstract
Terrorism remains the most important national security concern. Multi-national economic organizations around the world have increasingly established counter-terrorism commissions to assess the magnitude of the threat posed by terrorism.June, 2021
• “Draw the Internet.” A visual exploration of how children think an everyday technology. HTML
Abstract
The Internet is today a significant part of children’s daily lives, and digital competences have been included as basic learning goals in many school systems worldwide.May 22, 2021
• Media Consumption Effect on Therapuetic Aesthetics HTML
Abstract
This paper conceptualizes and proposes the current thesis topic: how does media consumption and screen time usage affect our therapeutic aesthetics?May 14, 2021
• Privacy in the Public Eye - Frogs Boiling and the Right to Privacy HTML
Abstract
This paper presents a qualitative study, consisting of six focus groups organized according to the age of participants, on public attitudes surrounding the right to privacy.May 14, 2021
• Information Age Imperialism: China, ‘Race,’ and Neo-Colonialism in Africa and Latin America HTML
Abstract
There is little to no historical antipathy between China and Africa or China and Latin America. The issue is not merely whether China is a neo-colonial power (it is) but rather how colonial and post-colonial legacies facilitated China’s rise and continued welcomed presence in specific regions.May 14, 2021
• Social Media Awareness: The Impact of Social Media on Mental Health HTML
Abstract
Communication technology, especially smartphones and the social media apps on them, has become a very large part of the modern world. People of all ages spend hours every day on social media either posting about their experiences or viewing other posts.May 12, 2021
• Employment Status for “Essential Workers”: The Case for Gig Worker Parity HTML
Abstract
Gig workers have been on the frontlines of the coronavirus pandemic, providing essential services like grocery shopping, transportation, and food delivery.May 7, 2021
• How the Growth of Technology has Forced Accounting Firms to put an Emphasis on Cybersecurity HTML
Abstract
The advancement of technology has brought many changes to accounting firms. Computer applications such as Microsoft Excel have made calculators and physical spreadsheets obsolete.May 7, 2021
• Handle with Care: Domestic Violence Safety Planning in the Age of Data Privacy Laws HTML
Abstract
Domestic violence is a pervasive and persistent public health crisis endangering many within our own communities, affecting about one in four women and nearly one in ten men and incurring a lifetime economic cost of $3.6 trillion.May 6, 2021
• Behavioral Skills Training to Teach Online Safety Responses to Youth with Autism Spectrum Disorder HTML
Abstract
Youth with autism spectrum disorder (ASD) frequently play video games. Social deficits underlying the disorder make this population more vulnerable to safety threats online than neurotypical children.May 6, 2021
• Behavioral Skills Training to Teach Online Safety Responses to Youth with Autism Spectrum Disorder HTML
Abstract
Youth with autism spectrum disorder (ASD) frequently play video games. Social deficits underlying the disorder make this population more vulnerable to safety threats online than neurotypical children.May 4, 2021
• Art and Eco Therapies: Benefifits to Motor Development of Preschool-Age Children in the Screen Era HTML
Abstract
In the highly technological society we currently live in, children are spending more time in front of screens instead of engaging in play or spending time in nature.May 1, 2021
• Evaluating Security in Cryptocurrency WalletsHTML
Abstract
The number of users who are interested in trading Cryptocurrency is tremendously increasing, however, some users of cryptocurrency wallets do not know how to protect themselves or how to use a wallet with high protection.May 1, 2021
• 5G Technology, U.S. - China Race, And the Competition for Dominance HTML
Abstract
For much of the 21st century, the United States and China have been competing to determine which world superpower will have the upper-hand for decades to come.May, 2021
• The European Union: Data Protection for Economic Competition and Regional Security HTML
Abstract
The collection and use of personal data is being increasingly scrutinized by governments and the European Union (EU) has been attempting to handle the development of data protection based progressive protections to protect its citizens data and right to privacy.May, 2021
• When Does a Cyber Crime Become an Act of Cyber Warfare HTML
Abstract
Since the existence of the online world, cyber attacks have been a threat. As the online world has developed and evolved so have the attacks on them. The advancement of technology has meant the advancement and increased complexity of cyber attacks.April 29, 2021
• Grief is love with nowhere to go HTML
Abstract
Your absence has gone through me Like thread through a needle. Everything I do is stitched with its color.April 27, 2021
• Unfriending Tinker : The Third Circuit Holds Schools Cannot Regulate Off-Campus Social Media Speech HTML
Abstract
After coming across sexually explicit messages between sixteen-yearold Channing Smith and another male student, a peer shared the images to their public Instagram and Snapchat stories.April 15, 2021
• Digitizing the ‘Ideal’ Latina Information Worker HTML
Abstract
Recent examples of virtual assistant technologies designed as Latina information service workers are noteworthy objects of study for their potential to bridge analyses of Latinas’ labor history and information technology.April 5, 2021
• Cyberbullying: Its Social and Psychological Harms Among Schoolers HTML
Abstract
Criminal justice around the world has prioritized the prevention and protection of bullying and its victims due to the rapid increases in peer violence.April 5, 2021
• Assessing the Credibility of Cyber Adversaries HTML
Abstract
Online communications are ever increasing, and we are constantly faced with the challenge of whether online information is credible or not. Being able to assess the credibility of others was once the work solely of intelligence agencies.April, 2021
• The Bumble Bill: A Critical Analysis on Texas’s New Law Taking Indecent Exposure Regulations Online HTML
Abstract
The year is 2021. Meeting people, dating, and talking to people online is not as frowned upon as it was years ago. Many find meeting others online— either for friendship or romantic relationships—is more convenient and less time-consuming than venturing into the real world for these initial connections.March 30, 2021
• Cyberbullying and Punishments (Concentrating on Kerala Women) HTML
Abstract
Kerala is a south Indian state, where the literacy rate is 100%. Kerala also has the highest Human Development Index rate in India. In Kerala, from past years, women who are open about their opinion are the easy targets of cyberbullies.March 5, 2021
• The Threat of Social Media to Society and National Security: A Call for Social Media Policy and Legislation HTML
Abstract
Social media is a growing existential threat. In the Constitution, We the People affirm ourselves to domestic tranquility, our common defense and general welfare to secure the blessings of Liberty.March, 2021
• Artificial Intelligence and the Ethics Behind It HTML
Abstract
Artificial intelligence (AI) has been a widely used buzzword for the past couple of years. If there is a technology that works without human interaction, it is labeled as AI. But what is AI, and should individuals be concerned? The following research aims to define what artificial intelligence is, specifically machine learning (ML) and neural networks.Spring, 2021
• Dating App Facilitated Sexual Violence: The Prevalence and Mental Health Effects HTML
Abstract
Dating apps are in growing popularity, with 48% of dating app users in the United States being adults under 30 (Pew Research Center, 2020Spring, 2021
• Applying Usability Methods to Categorization of Phishing Emails HTML
Abstract
Phishing emails are a continuing threat in today's society—this study aimed to unpeel the layers on why certain people are prone to phishing emails than others.March, 2021
• DIGITAL DOMINION: How the Syrian regime’s mass digital surveillance violates human rights HTML
Abstract
The Assad regime conducts mass electronic and digital monitoring of its people. Anyone who dares to voice opposition or fails to proclaim their loyalty is deemed dangerous and quickly falls under suspicion.March, 2021
• Are Terrorist Networks Just Glorifified Criminal Cells? HTML
Abstract
The notions of organized crime and terrorism have an old and rich history around the globe. Researchers and practitioners have been studying events and phenomena related to these notions for a long time. There are pointers in the literature in which it is misleading to see the unfair comparison between terrorist and criminal networks with the argument that all actors involved in these networks are simply evil individuals.March, 2021
• Jack Voltaic 3.0 Cyber Research Report HTML
Abstract
During this period of strategic competition, nation-state competitors are attempting to gain strategic advantage by exploiting our Nation’s critical infrastructure sectors. Secure and resilient critical infrastructure is essential for economic and national security. Every day we depend on and take the basic services provided by these sectors for granted. Given the interdependencies of these services, a risk to one can be a risk to all, and our networks are only as strong as their weakest links.March 3, 2021
• CYBER AND TRIA: EXPANDING THE DEFINITION OF AN “ACT OF TERRORISM” TO INCLUDE CYBER ATTACKS HTML
Abstract
The 9/11 terrorist attacks brought on financial losses that caused insurers and Congress to reevaluate how the United States approaches terrorism risk coverage. Congress quelled concerns of insurers evading coverage of future terrorist attacks by enacting the Terrorism Risk Insurance Act in 2002. This Note considers the difficulties presented by the out-of-date language employed by Congress in 2002 and proposes amendments so that the Act more clearly covers acts of cyberterrorism, which are ever-growing in their destructive potential.March 1, 2021
• The Brick-and-Mortar Bank is Dead — COVID-19 Killed It HTML
Abstract
A rule of thumb is to strike while the iron is hot; for cybercriminals, that iron is a global pandemic. The novel coronavirus dubbed “COVID-19” is an infectious disease that was first identified in Wuhan, China in December 2019. In March 2020, the World Health Organization (“WHO”) officially declared the COVID-19 disease a pandemic following rapid global transmission. This pandemic brought the world to a screeching halt as governments frantically tried to “flatten the curve.” Indeed, COVID-19’s effects permeated nearly every layerFebruary 16, 2021
• Social Media User Relationship Framework (SMURF) HTML
Abstract
The use of social media has spread through many aspects of society, allowing millions of individuals, corporate as well as government entities to leverage the opportunities it affords.February 3, 2021
• The District of Columbia Circuit Finds Article III Standing Based on the Risk of Future Identity Theft in In re U.S. Office of Personnel Management Data Security Breach Litigation HTML
Abstract
The effects of identity theft can haunt data breach victims for years. Some victims report the need to constantly shut down fraudulent accounts. Likewise, some report countless fraudulent inquiries on their credit reports. Some victims even report fraudulent tax returns filed in their names. Many consumers believe there is not much they can do to protect their data in the first place.February 1, 2021
• Illicit Activity Detection in Large-Scale Dark and Opaque Web Social Networks HTML
Abstract
Many online chat applications live in a grey area between the legitimate web and the dark net. The Telegram network in particular can aid criminal activities. Telegram hosts “chats” which consist of varied conversations and advertisements. These chats take place among automated “bots” and human users. Classifying legitimate activity from illegitimate activity can aid law enforcement in finding criminals. Social network analysis of Telegram chats presents a difficult problem. Users can change their username or create new accounts. Users involved in criminal activity often do this to obscure their identity. This makes establishing the unique identity behind a given username challenging. Thus we explored classifying users from their language usage in their chat messages.February, 2021
• Exposure to Pornography Among Young Eritreans - An Exploratory Study HTML
Abstract
The pornography industry is a multibillion-dollar global industry, and it has been normalized in many aspects of popular culture.February, 2021
• Deterrence and Response Improvements for a Large-Scale Cyberterrorism Attack HTML
Abstract
A successful large-scale cyberterrorism attack has never been conducted against the United States, yet cyberterrorism is a real and evolving threat.February, 2021
• Impact of Information Breaches on Health Care Records HTML
Abstract
Although there were almost 3.5 million reported information breaches of health care data in the first quarter of 2019, health care providers do not know the extent of digital and nondigital breaches of patient medical recordsi ...February, 2021
• PREVALENCE OF CYBERBULLYING AMONG TRADITIONAL UNDERGRADUATE STUDENTS ATTENDING FAITH-BASED UNIVERSITIES: A CAUSAL-COMPARATIVE STUDY HTML
Abstract
Cyberbullying among traditional undergraduate students is a relatively new issue that involves the safety of postsecondary students. The purpose of this study was to provide statistical data to faith-based universities that relate the prevalence of cyberbullying victimization experiences and the prevalence of cyberbullying offending experiences of traditional undergraduate students to biological gender (female/male) and level of religiosity (higher/lower), and to add to the small body of research conducted among this demographic.February, 2021
• Protecting Children in the Frontier of Surveillance Capitalism HTML
Abstract
This article examines the ongoing technological revolution and its impact on today’s consumers. In particular, this article addresses the promulgation of the Children’s Online Privacy Protection Act (COPPA) in the context of “surveillance capitalism” and analyzes the harms associated with social media and data collection. Finally, this paper will argue that COPPA should be revamped to better regulate the Internet of 2020. A just society ought to protect children from the lurking perils of social media.January, 2021
• Gophish: Implementing a Real-World Phishing Exercise to Teach Social Engineering HTML
Abstract
Social engineering is a large problem in our modern technological world, but while conceptually understood, it is harder to teach compared to traditional pen testing techniques. This research details a class project where students implemented a phishing exercise against real-world targets. Through cooperation with an external corporate partner, students learned the legal, technical, behavioral, analysis, and reporting aspects of social engineering. The outcome provided both usable data for a real-world corporation as well as valuable educational experience for the students.January, 2021
• Repeal the Defend Trade Secret Act: Why Congress Can’t Rely on Trade Secret Law to Protect America’s Trade Secrets HTML
Abstract
“[T]here are only ‘two categories’ of companies affected by trade secret theft — ‘[T]hose [sic] that know they’ve been compromised and those that don’t know yet.’” Whether you imagine a cyber thief subverting a company’s network defenses or an employee selling secret information to a competitor, trade secret theft is a real threat. The epidemic has ballooned to such proportions- $600 billion –that combatting trade secret theft enjoys bipartisan congressional support. Despite Congress’s best efforts, there is no evidence the bleeding has slowed, much less stopped.January, 2021
• Israel’s Perspective on Key Legal and Practical Issues Concerning the Application of International Law to Cyber Operations HTML
Abstract
I would like to present, here today, Israel’s perspective on key aspects of the application of international law in connection with cyber operations, with a particular emphasis on issues related to the use of force and armed conflicts.Winter, 2021
• A Post for Change: Social Media and the Unethical Dissemination of Nonconsensual Pornography HTML
Abstract
In today’s world, where instant gratification is king and the majority craves being shocked and awed, stories that exploit the personal endeavors and escapades of our peers and superiors reign supreme. Of particular interest are those relating to sex; whether it’s the kinks of a congressman, the intimacies of an idol, or the extramarital affair of a neighbor, people love the nitty-gritty and no one is safe from the dissemination of these exceedingly private details. This includes the distribution of intimate photos and videos taken with or without the consent of the individual depicted.December 16, 2020
• Book Review - Industry of Anonymity: Inside the Business of Cybercrime, by Jonathan Lusthaus HTML
Abstract
In Industry of Anonymity: Inside the Business of Cybercrime, Jonathan Lusthaus attempts to demystify the increasingly sophisticated business of cybercrime and examine how it has matured into a large, profit-driven industry. Through interviews with hundreds of subjects involved in the cybercrime industry in varying capacities, Lusthaus has sought to draw a map that, by showing how seemingly disparate elements in the industry relate to one another, can better explain how the cybercrime industry functions. In particular, Lusthaus strives to produce a better understanding of the people behind cybercrime and the contexts in which they operate. By doing so, the book endeavors to lift the veil of anonymity that has historically hidden cybercrime offenders and their activities from public view.December, 2020
• PREVENTATIVE STEPS SOCIAL NETWORKS, SUCH AS FACEBOOK, TAKE AGAINST SEX TRAFFICKING HTML
Abstract
The increasing use of social media enables predators to seek out and recruit victims through social networking sites. The overall goal is outsmarting their manipulation on users by understanding and exposing their techniques to families and communities.December, 2020
• Cybersecurity Best Practices for the Safety of Modern Vehicles HTML
Abstract
This document from the National Highway Traffic Safety Administration (NHTSA) updates the Agency’s non-binding and voluntary guidance to the automotive industry for improving motor vehicle cybersecurity. NHTSA encourages vehicle and equipment manufacturers to review this guidance to determine whether and, if so, how to apply this guidance to their unique systems.November 30, 2020
• Great Power Politics: The United States’ War on Disinformation with Consideration to Russian and Chinese Offensive Efforts HTML
Abstract
The purpose of this thesis is to examine the growing national security threat posed by Russia and China’s willingness to exercise 21st century information warfare techniques against the United States and its areas of strategic interest. This study will describe the composition of these state’s foreign disinformation entities while providing several case studies that display their advanced capabilities and the direct effects that each poses on the general public both domestically and internationally.November 27, 2020
• Cybersecurity of Smart Electric Vehicle Charging: A Power Grid Perspective HTML
Abstract
With the roll-out of electric vehicles (EVs), the automobile industry is transitioning away from conventional gasoline-fueled vehicles. As a result, the EV charging demand is continuously growing and to meet this growing demand, various types of electric vehicle charging stations (EVCSs) are being deployed for commercial and residential use. This nexus of EVs, EVCSs, and power grids creates complex cyber-physical interdependencies that can be maliciously exploited to damage each of these components. This paper describes and analyzes cyber vulnerabilities that arise at this nexus and points to the current and emerging gaps in the security of the EV charging ecosystem. These vulnerabilities must be addressed as the number of EVs continue to grow worldwide and their impact on the power grid becomes more viable. The purpose of this paper is to list and characterize all backdoors that can be exploited to seriously harm either EV and EVCS equipments, or power grid, or both. The presented issues and challenges intend to ignite research efforts on cybersecurity of smart EV charging and enhancing power grid resiliency against such demand-side cyberattacks in general.November 23, 2020
• The Internet Never Forgets: A Federal Solution to the Dissemination of Nonconsensual Pornography HTML
Abstract
As technology evolves, new outlets for interpersonal conflict and crime evolve with it. The law is notorious for its inability to keep pace with this evolution. This Comment focuses on one area that the law urgently needs to regulate—the dissemination of “revenge porn,” otherwise known as nonconsensual pornography. Currently, no federal law exists in the U.S. that criminalizes the dissemination of nonconsensual pornography. Most U.S. states have criminalized the offense, but with vastly different degrees of severity, resulting in legal inconsistencies and jurisdictional conflicts. This Comment proposes a federal solution to the dissemination of nonconsensual pornography that carefully balances the interests of victims with the variety of scenarios that may give rise to this crime.November, 2020
• Digital Identity: A Human-Centered Risk Awareness Study HTML
Abstract
Cybersecurity threats and compromises have been at the epicenter of media attention; their risk and effect on people’s digital identity is something not to be taken lightly. Though cyber threats have affected a great number of people in all age groups, this study focuses on 55 to 75-year-olds, as this age group is close to retirement or already retired. Therefore, a notable compromise impacting their digital identity can have a major impact on their life.October 27, 2020
• Towards Increasing Trust In Expert Evidence Derived From Malware Forensic Tools HTML
Abstract
Following a series of high profile miscarriages of justice in the UK linked to questionable expert evidence, the post of the Forensic Science Regulator was created in 2008.October, 2020
• Electric Vehicle Charging Infrastructure Trends from the Alternative Fueling Station Locator: First Quarter 2020 HTML
Abstract
The US. Department of Energy’s (DOE’s) Alternative Fueling Station Locator contains information on public and private non-residential alternative fueling stations in the United States and Canada and currently tracks ethanol (E85), biodiesel, compressed natural gas, electric vehicle (EV) charging, hydrogen, liquefied natural gas, and propane stations. Of these fuels, EV charging continues to experience rapidly changing technology and growing infrastructure. This report provides a snapshot of the state of EV charging infrastructure in the United States in the first calendar quarter of 2020 (Q1). Using data from the Station Locator, this report breaks down the growth of public and private charging infrastructure by charging level, network, and location. Additionally, this report measures the current state of charging infrastructure compared with the amount projected to meet charging demand for an estimated 15 million plug-in electric vehicles by 2030. This information is intended to help transportation planners, policymakers, researchers, infrastructure developers, and others understand the rapidly changing landscape for EV charging.Fall , 2020
• Defending Democracy: Taking Stock of the Global Fight Against Digital Repression, Disinformation, and Election Insecurity HTML
Abstract
Amidst the regular drumbeat of reports about Russian attempts to undermine U.S. democratic institutions from Twitter bots to cyber-attacks on Congressional candidates, it is easy to forget that the problem of election security is not isolated to the United States and extends far beyond safeguarding insecure voting machines. Consider Australia, which has long been grappling with repeated Chinese attempts to interfere with its political system. Yet Australia has taken a distinct approach in how it has sought to protect its democratic institutions, including reclassifying its political parties as “critical infrastructure,” a step that the U.S. government has yet to take despite repeated breaches at both the Democratic and Republican National Committees.August, 2020
• Crypto and Blockchain Fundamentals HTML
Abstract
Since the 1990s, we have had an “Internet of Information” that allows us to seamlessly share information such as documents, images, emails, and videos over the Internet. While most Internet users do not need to understand the details of the technical protocols2 operating underneath user-friendly software interfaces, it is helpful to understand how they work at a high-level. With the “Internet of Information,” copies of information are routed.August, 2020
• Cryptography, Passwords, Privacy, and the Fifth Amendment HTML
Abstract
Military-grade cryptography has been widely available at no cost for personal and commercial use since the early 1990s. Since the introduction of Pretty Good Privacy (PGP), more and more people encrypt files and devices, and we are now at the point where our smartphones are encrypted by default. While this ostensibly provides users with a high degree of privacy, compelling a user to provide a password has been interpreted by some courts as a violation of our Fifth Amendment protections, becoming an often insurmountable hurdle to law enforcement lawfully executing a search warrant. This paper will explore some of the issues around this complex legal and social issue, including the evolution in the use of digital cryptography and the evolving legal interpretations of privacy.July 8, 2020
• Blockchain-mediated Licensing - Legal Engineering for Artist Empowerment HTML
Abstract
Licensing is one of the essential means of exploiting the monetary value of a musical work, and yet it is an area fraught with many issues and transactional costs which make it a di cult process for individuals and organizations.June, 2020
• Aspects of the Cybersecurity Ecosystem in the United States HTML
Abstract
The field of cybersecurity with all its complexities has been steadily gaining in importance over the last decade – and now, due to the Coronavirus-induced heightened dependency on digital infrastructure this process is further accelerated. This country report shows that cybersecurity has evolved into a key national security issue and gives an overview of certain aspects of the U.S. cybersecurity landscape, by tracing policy developments from before the Covid-19 pandemic as well as current legislative considerations.June, 2020
• Impact of Social Media on Feminism HTML
Abstract
“A feminist assessment of social media, then, is an exploration of how communities form and interact in social media spaces as well as if values expressed via these participatory cultures align or misalign with feminist ethical criteria. Digital social media invite participation based on the values of openness, collaboration, and networking, which in theory align with feminist values such as access, cooperation, and inclusion. However, the opportunities social media platforms afford are increasingly shaped by the business models and algorithms behind them, not to mention the material biases users bring with them” (Ott, 2018)June, 2020
• A New Compact for Sexual Privacy HTML
Abstract
Intimate life is under constant surveillance. Firms track people’s periods, hot flashes, abortions, sexual assaults, sex toy use, sexual fantasies, and nude photos. Individuals hardly appreciate the extent of the monitoring, and even if they did, little can be done to curtail it. What is big business for firms is a big risk for individuals. The handling of intimate data undermines the values that sexual privacy secures—autonomy, dignity, intimacy, and equality. It can imperil people’s job, housing, insurance, and other crucial opportunities. More often, women and minorities shoulder a disproportionate amount of the burden.May 10, 2020
• Construction Cybersecurity and Critical Infrastructure Protection: Significance, Overlaps, and Proposed Action Plan HTML
Abstract
The umbrella concept for the current efforts to digitize construction is known as Construction 4.0. One of its key concepts is cyber-physical systems. The construction industry is not only creating increasingly valuable digital assets (in addition to physical ones) but also the buildings and built infrastructures are increasingly monitored and controlled using digital technology. Both make construction a vulnerable target of cyber-attacks.May 9, 2020
• The Red Swimsuit: Essays HTML
Abstract
JACQUELINE KNIRNSCHILD: This thesis is a collection of creative non-fiction essays that offers a collage of ethnography, reportage and memoir. The Red Swimsuit blurs the lines between what is considered social science, journalism and art. These essays will become part of a booklength work of creative non-fiction that will explore what it’s like to grow up as a woman in a globalized world wrought with social media, hookup culture and cross-cultural interactions. The Red Swimsuit provides first-hand experience, reflexive narration, and reflection on life as a member of Generation Z, also known as iGen. (Under the direction of Beth Ann Fennelly)May 4, 2020
• Cyber Mobs, Disinformation, and Death Videos: The Internet as It Is (and as It Should Be) HTML
Abstract
Nick Drnaso’s1 graphic novel Sabrina provides a powerful snapshot of online norms. The picture is not pretty: A young woman goes missing. Her grief-stricken boyfriend cannot bear to stay in their home and escapes to a friend’s house. Her sister struggles with the pain of her loss. We learn that the woman’s neighbor, a misogynist loner, killed her and recorded the murder. Online, people clamor for the video.May, 2020
• Articulating the Cloud: Understanding Data Centers, Renewable Energy, and Public Policy HTML
Abstract
Experts urge that drastic steps must be taken to reduce carbon dioxide emissions as the ongoing climate crisis worsens. Amid this, it is also important to understand the relationships between media infrastructures and the finite resources they require. This thesis goes beyond arguing that data centers are inherently unsustainable media infrastructures that consumers rely on to access the Internet and cloud storage. Instead, this thesis focuses on Google as an industry leading company in the United States to assess how the company understands their role in the climate crisis, and how they define renewable energy and sustainability. To do so, this thesis used critical discourse analysis of Google’s public-facing documents, government documents, and related joint reports between external research organizations and Google related to their data centers. The findings revealed the company defines sustainability as a commitment and company value, and that they have an immense renewable energy portfolio through additional acquisitions measures. Ultimately, this thesis argues that Google discursively positions themselves as corporately benevolent and masks retroactive sustainability in the guise of activism while simultaneously firing activist employees, having fossil fuel industry clientele, and financially contributing to anti-climate change organizations. This thesis contributes to important conversations related to media infrastructure sustainability, in particular emphasizing the complex tensions and dynamics at work to make banal technologies possible. It is important for consumers to understand the limitations and items lacking in corporate discourse to advocate for a more sustainable future for everyone.May, 2020
• Cyber Security’s Influence on Modern Society HTML
Abstract
The world of cyber security is evolving every day, and cyber-criminals are trying to take advantage of it to gain as much money and power as possible. As the Internet continues to grow, more people around the world join the Internet. The purpose of this is to see how much of an importance cyber security has and how cyber-criminals are able to utilize the cyberworld for their own personal gain. Research has been done on how the cyberworld got where it is today. Additionally, individual research has been done in an effort to learn how to hack. A hack lab has been created and a study has been done to see if it is possible to hack into a cell phone within one month without obtaining any knowledge prior to the start of the study.April 17, 2020
• A Copy of a Copy of a Copy: Internet Mimesis and the Copyrightability of Memes HTML
Abstract
Memes have become a staple of Internet culture. They provide a crucial form of cultural interchange by allowing billions to communicate and commiserate about all facets of life through the sharing of amusing and relatable phenomena. However, many memes are created from copyrighted images, making it unclear whether their use constitutes copyright infringement actionable by the original copyright owners. This Note considers memes in the context of U.S. copyright law and proposes that memes could be protected against copyright infringement by the fair use doctrine, which excuses infringement if the would-be infringer’s use is socially desirable and aligned with the basic aims of copyright law. To illustrate this, this Note analyzes the “typical meme” through a thorough examination of the four statutory factors of fair use.April 5, 2020
• Internet Architecture and Disability HTML
Abstract
The Internet is essential for education, employment, information, and cultural and democratic participation. For tens of millions of people with disabilities in the United States, barriers to accessing the Internet—including the visual presentation of information to people who are blind or visually impaired, the aural presentation of information to people who are deaf or hard of hearing, and the persistence of Internet technology, interfaces, and content without regard to prohibitive cognitive load for people with cognitive and intellectual disabilities—collectively pose one of the most significant civil rights issues of the information age. Yet disability law lacks a comprehensive theoretical approach for fully facilitating Internet accessibility. The prevailing doctrinal approach to Internet accessibility seeks to treat websites as metaphorical “places” subject to Title III of the Americans with Disabilities Act (ADA), which requires places of public accommodations to be accessible to people with disabilities. While this place-centric approach to Title III has succeeded to a significant degree in making websites accessible over the last two decades, large swaths of the Internet—more broadly construed to include Internet technologies beyond websites—remain inaccessible to millions of people with a variety of disabilities.April 1, 2020
• The Networked Question in the Digital Era: How Do Networked, Bounded, and Limited Individuals Connect at Different Stages in the Life Course? HTML
Abstract
We used in-depth interviews with 101 participants in the East York section of Toronto, Canada to understand how digital media affects social connectivity in general–and networked individualism in particular–for people at different stages of the life course. Although people of all ages intertwined their use of digital media with their face-to-face interactions, younger adults used more types of digital media and more diversified personal networks. People in different age-groups conserved media, tending to stick with the digital media they learned to use in earlier life stages. Approximately one-third of the participants were Networked Individuals: In each age-group, they were the most actively using digital media to maintain ties and to develop new ones. Another one-third were Socially Bounded, who often actively used digital media but kept their connectivity within a smaller set of social groups. The remaining one-third, who were Socially Limited, were the least likely to use digital media. Younger adults were the most likely to be Networked Individuals, leading us to wonder if the percentage of the population who are Bounded or Limited will decline over time.February 7 , 2020
• Who Owns Bitcoin? Private Law Facing the Blockchain HTML
Abstract
Blockchain, or “distributed ledger technology” (DLT), has been devised as an alternative to the law of finance. While it has become clear by now that regulation in the public interest is necessary—for example to avoid money laundering, drug dealing, or tax evasion—the particularly thorny issues of private law have been less discussed. These include, for instance, the right to reverse an erroneous transfer, the ownership of stolen coins, and the effects of succession or bankruptcy of a bitcoin holder. All of these questions require answers from a legal perspective because the technology does not answer them.February , 2020
• TOKEN TAXONOMY HTML
Abstract
Few concepts are more widely discussed and poorly understood in today’s blockchain world than the token. The world seems to know that tokens are important, but little else; the word token is used in myriad ways today, many of which conflict.January, 2020
• A Review on Emerging Threats and Vulnerabilities in Internet of Things and its Applications HTML
Abstract
Nowadays, Internet of Things (IoT) plays a crucial part in the area of Information Technology (IT). At present, providing security to information has become one of the difficult tasks. Recently, the IoT and the devices connected on it have accepted a sizeable attention towards the research. The IoT is contemplated as the future of the Internet.January, 2020
• The Internet as a Speech Machine and Other Myths Confounding Section 230 Reform HTML
Abstract
A robust public debate is currently underway about the responsibility of online platforms. We have long called for this discussion, but only recently has it been seriously taken up by legislators and the public. The debate begins with a basic question: should platforms should be responsible for user-generated content? If so, under what circumstances? What exactly would such responsibility look like? Under consideration is Section 230 of the Communications Decency Act—a provision originally designed to encourage tech companies to clean up “offensive” online content. The public discourse around Section 230, however, is riddled with misconceptions. As an initial matter, many people who opine about the law are unfamiliar with its history, text, and application. This lack of knowledge impairs thoughtful evaluation of the law’s goals and how well they have been achieved. Accordingly, Part I of this Article sets the stage with a description of Section 230—its legislative history and purpose, its interpretation in the courts, and the problems that current judicial interpretation raises. A second, and related, major source of misunderstanding is the conflation of Section 230 and the First Amendment. Part II details how this conflation distorts discussion in three ways: it assumes all Internet activity is protected speech; it treats private actors as though they were government actors; and it presumes that regulation will inevitably result in less speech. These distortions must be addressed in order to pave the way for clear-eyed policy reform. Part III offers potential solutions to help Section 230 achieve its legitimate goals.September 6, 2019
• The Future of Cybercrime Prevention Strategies: Human Factors and A Holistic Approach to Cyber Intelligence HTML
Abstract
New technology is rapidly emerging to fight increasing cybercrime threats, however, there is one important component of a cybercrime that technology cannot always impact and that is human behavior.July 19, 2019
• Cybersecurity in Elections - Models of Interagency Collaboration HTML
Abstract
Information and communication technologies are increasingly prevalent in electoral management and democratic processes. These technologies offer numerous new opportunities, but also new threats. Cybersecurity is currently one of the greatest electoral challenges, even for countries without any form of electronic voting. It involves a broad range of actors, including electoral management bodies, cybersecurity expert bodies and security agencies. Many countries have found that interagency collaboration is essential for defending elections against digital threats. In recent years significant advances have been made in organizing such collaboration at the domestic and international levels.June, 2019
• Revenge Porn and the First Amendment - Should Nonconsensual Distribution of Sexually Explicit Images Receive Constitutional Protection? HTML
Abstract
Like many issues related to relationships and sexuality, “revenge porn” has become more complicated—and its consequences more sinister—thanks to twenty-first century technology. Revenge porn, often referred to as nonconsensual pornography, involves the publication or distribution of sexually explicit images without the subject’s consent. This may include images obtained without consent, as well as images initially obtained with consent—often within the context of an intimate relationship—but later shared broadly or used as blackmail. The issue received increased public attention after a 2014 incident in which a hacker accessed and leaked sexually explicit photos of several celebrities. But celebrities are far from the only victims: a 2016 study found that roughly one in twenty-five Americans have been threatened with or been the victim of nonconsensual image sharing.October 1, 2018
• Securing Vehicle Charging Infrastructure HTML
Abstract
As the US electrifies the transportation sector, cyber attacks targeting vehicle charging could bring consequences to electrical system infrastructure. This is a growing area of concern as charging stations increase power delivery and must communicate to a range of entities to authorize charging, sequence the charging process, and manage load (grid operators, vehicles, OEM vendors, charging network operators, etc.).August 5, 2018
• Web Application Security HTML
Abstract
This report documents the program and the outcomes of Dagstuhl Seminar 18321 “Web Application Security”. In this third seminar on the topic, a healthy mix of academics, practitioners and representatives of all major browser vendors reflected on the last decade of web security research and discussed the upcoming security challenges for the Web platform. In addition, for the first time, the list of attendees included several members of the human factors in security community, to enable broadening the web security topic towards this important facet of application security.June, 2018
• U.S. Regulation of Blockchain Currencies: A Policy Overview HTML
Abstract
With its increasing significance in real-world financial transactions, blockchain currency has risen to a level of significance that regulators and policymakers can no longer ignore. Cryptocurrency has developed so fast. It is outpacing the regulatory and legislative developments necessary to address the issues that it has stirred up. Although cryptocurrency regulations have been in place for the past several years, already, lawmakers have struggled to keep up with the increasing popularity and technical complexity of cryptocurrency market activity.March, 2018
• DOE/DHS/DOT Volpe Technical Meeting on Electric Vehicle and Charging Station Cybersecurity Report HTML
Abstract
On November 29-30, 2017, the U.S. Department of Energy’s (DOE) Office of Policy (OP), in collaboration with DOE’s Vehicle Technology Office (VTO), the U.S. Department of Homeland Security’s (DHS) Science and Technology Directorate (S&T) Cyber Security Division (CSD), and the U.S. Department of Transportation’s (U.S. DOT) John A. Volpe National Transportation Systems Center (Volpe) held a technical meeting on key aspects of electric vehicle (EV) and electric vehicle supply equipment (EVSE) cybersecurity. This report summarizes key takeaways and discussion points.September, 2017
• National Plug-In Electric Vehicle Infrastructure Analysis HTML
Abstract
This report addresses the fundamental question of how much plug-in electric vehicle (PEV) charging infrastructure—also known as electric vehicle supply equipment (EVSE)—is needed in the United States to support both plug-in hybrid electric vehicles (PHEVs) and battery electric vehicles (BEVs). It complements ongoing EVSE initiatives by providing a comprehensive analysis of national PEV charging infrastructure requirements. The result is a quantitative estimate for a U.S. network of non-residential (public and workplace) EVSE that would be needed to support broader PEV adoption. The analysis provides guidance to public and private stakeholders who are seeking to provide nationwide charging coverage, improve the EVSE business case by maximizing station utilization, and promote effective use of private/public infrastructure investments.August, 2017
• Securing Cyber Assets - Addressing Urgent Cyber Threats to Critical Infrastructure HTML
Abstract
Our review of hundreds of studies and interviews with 38 cyber and industry experts revealed an echo chamber, loudly reverberating what needs to be done to secure critical U.S. infrastructure against aggressive and targeted cyber attacks. Cyber is the sole arena where private companies are the front line of defense in a nation-state attack on U.S. infrastructure. When a cyber attack can deliver the same damage or consequences as a kinetic attack, it requires national leadership and close coordination of our collective resources, capabilities, and authorities.January, 2017
• Nation-State Hacking - Uniting Policy and Code to Limit the Threat HTML
Abstract
This article examines nation-state hacking and analyzes some possible defenses against these attacks by combining policy and code level defense.October, 2016
• Cybersecurity Best Practices for Modern Vehicles HTML
Abstract
This document describes the National Highway Traffic Safety Administration’s nonbinding guidance to the automotive industry for improving motor vehicle cybersecurity.January, 2016
• Anti-Money Laundering HTML
Abstract
This past year has seen continued activity in money laundering ("ML") regulation and enforcement involving "cryptocurrency," terrorist finance ("TF"), and forfeiture law.September, 2014
• NESCOR Guide to Penetration Testing for Electric Utilities HTML
Abstract
his security test plan template was created by the National Electric Sector Cybersecurity Organization Resource (NESCOR) to provide guidance to electric utilities on how to perform penetration tests on Smart Grid systems. Penetration testing is one of the many different types of assessments utilities can perform to assess their overall security posture.August 22, 2014
• Subculture of Hackers in Russia, by Roman Dremliuga HTML
Abstract
This article observes the situation with hacker subculture in Russia. The author is analyzing the reasons why this subculture doesn’t need a lot of time to conquer Russian net society. He is proving that tremendous growth of popularity of hacker subculture in Russia is caused by easy acceptance of hacker’s ideology. Also, the author is studying modern functions of hacker subculture and researching why Russian society does not regard hackers as criminals.September 30, 2012
• Web Application Security HTML