Link
Search
Menu
Expand
Document
Publications
Cybersecurity Publications
W
§ When Love Hurts - How romance depictions in film contribute to relationship abuse
How are we affected by media?
Why are we affected by media?
Who is most affected by media?
Romantic Media
Conclusion
References
§ Whose Crisis Is It? Reconsidering the “Migrant Crisis”
Introduction
Background
Conclusions
References
§ When Does a Cyber Crime Become an Act of Cyber Warfare
§ We Will Outlive Them - Antisemitism in Modern America
We Will Outlive Them - Antisemitism in Modern America
References
§ Why Women Leave White Nationalist Movements - Exploring the Deradicalization Process
INTRODUCTION
THE SIGNIFICANCE OF WOMEN IN WHITE POWER MOVEMENT
HOW WOMEN ARE RADICALIZED INTO WHITE SUPREMACY
WHY WOMEN LEAVE THE WHITE POWER MOVEMENT
LIMITATIONS
CONCLUSION
ENDNOTES
§ WHAT DO WE TALK ABOUT WHEN WE TALK ABOUT AI?
Artificial Intelligence For What?
Data Quality
Ethics Is Not Enough
Involved rights beyond privacy
How Are Intelligence Strategies Being Developed In Our Region?
From Standards to Practical Applications
Artificial Intelligence from The South
§ Who Owns Bitcoin? Private Law Facing the Blockchain
INTRODUCTION
A. DOES CODE NEED LAW?
B. CODE’S RESISTANCE TO THE LAW
C. HOW TO RECONCILE DLT AND PRIVATE LAW
D. COUNTER-ARGUMENTS AND COMPLICATIONS
CONCLUSION
§ Web Application Security - Report from Dagstuhl Seminar 18321
§ Web Application Security - Report from Dagstuhl Seminar 12401
§ WIRETAPPING-THE RIGHT TO PRIVACY-MINIMIZATION OF NONPERTINENT COMMUNICATIONS REQUIRED BY NEW JERSEY STATUTE
Just the Docs on GitHub
Cybersecurity Publications