Link
Search
Menu
Expand
Document
Publications
Cybersecurity Publications
5
§ 5G Technology, U.S. - China Race, And the Competition for Dominance
Chapter 1 - Introduction
Chapter 2 - History of 5G
Chapter 3 - China and 5G
Chapter 4 - United States and 5G
Chapter 5 - Europe and 5G
Chapter 6 - The Context of 5G Competition - U.S.-China Relationship
Chapter 7 - Assessments and Projections
Chapter 8 - Policy Implications and Responses
Chapter 9 - Conclusion and Outlook
A
§ Artificial Intelligence and the Ethics Behind It
Introduction
What is Artificial Intelligence
How Artificial Intelligence Is Used Today
Benefits of Artificial Intelligence
Artificial Intelligence and the Ethics Driving It
Social Media – A Doppelganger in the Cloud
The Future of AI
Conclusion
References
D
§ Dating App Facilitated Sexual Violence - The Prevalence and Mental Health Effects
INTRODUCTION
CHAPTER 1 - LITERATURE REVIEW
CHAPTER 2 - METHODS
CHAPTER 3 - RESULTS
CHAPTER 4 - DISCUSSION
CHAPTER 5 - STRENGTHS, LIMITATIONS, AND SUGGESTIONS FOR FUTURE RESEARCH
CHAPTER 6 - CONCLUSION
APPENDIX A - RESEARCH STUDY TABLES
APPENDIX B - DATING APP USE FIGURES
APPENDIX C - DEMOGRAPHIC QUESTIONS
APPENDIX D - TECHNOLOGY FACILITATED SEXUAL VIOLENCE MEASURE
APPENDIX E - GENERAL SEXUAL VIOLENCE QUESTIONS
APPENDIX F - POST-TRAUMATIC STRESS DISORDER MEASURE
APPENDIX G - DEPRESSION MEASURE
APPENDIX H - ANXIETY MEASURE
APPENDIX I - SELF-ESTEEM MEASURE
APPENDIX J - LONELINESS MEASURE
APPENDIX K - PERCEIVED SELF-CONTROL MEASURE
APPENDIX L - MENTAL HEALTH RESOURCES PROVIDED
APPENDIX M - IRB APPROVAL LETTER AND MODIFICATION
REFERENCES
G
§ Grief is love with nowhere to go
I’ve been trying to think ...
In the fall of 2016 ...
I often wondered ...
In the months before ...
“PlushieCouture” on Etsy ...
I often wondered—and still do wonder ...
It wasn’t until the end ...
When I thought about ...
I sent Claire a few ...
I had a dream about ..
Years after my sexual ...
In the same conversation ...
I
§ Impact of Information Breaches on Health Care Records
Chapter 1 - Introduction to the Study
Chapter 2 - Literature Review
Chapter 3 - Research Method
Chapter 4 - Results
Chapter 5 - Discussion, Conclusions, and Recommendations
References
T
§ The Problem of Pornography
Morgann Hagar
Works Cited
Just the Docs on GitHub
Cybersecurity Publications