1,412 research outputs found
Picture Postcard
A thesis presented to the faculty of the Caudill College of Humanities at Morehead State University in partial fulfillment of the requirements for the Degree of Master of Arts by Anthony Fife on December 14, 2007
The Chronicle [August 2, 1995]
The Chronicle, August 2, 1995https://repository.stcloudstate.edu/chron/4144/thumbnail.jp
Privacy, Freedom, and Technology—or “How Did We Get into This Mess?”
Can we live in a free society without personal privacy? The question is worth pondering, not only in light of the ongoing debate about government surveillance of private communications, but also because new technologies continue to erode the boundaries of our personal space. This Article examines our loss of freedom in a variety of disparate contexts, all connected by the thread of erosion of personal privacy. In the scenarios explored here, privacy reducing activities vary from government surveillance, personal stalking conducted by individuals, and profiling by data-driven corporations, to political actors manipulating social media platforms. In each case, new technologies and open platforms are used by a bad actor to harm unwitting individuals. Additionally, the affected person has limited legal recourse to avoid the ill effects of intrusion or outright invasion of privacy. Taken together, these examples illustrate the need for new policies and regulation addressing modern threats to privacy and also the requirement to think globally about privacy as a basic right
A Troop, a Raft, a Bed
A Troop, a Raft, a Bed tells the interwoven fictional stories of three major animals (the mountain gorilla, the Adélie penguin, and the American eel) and four transitional animals (the white stork, the humpback whale, the common octopus, and the great white shark). The stories are told from the animals\u27 perspectives, and are written with language that considers each animal\u27s unique intelligence, mind, and behavior. These stories seek to communicate how animals around the world may be experiencing the various effects of climate change and global warming
Potential Terrorist Uses of Highway-Borne Hazardous Materials, MTI Report 09-03
The Department of Homeland Security (DHS) has requested that the Mineta Transportation Institutes National Transportation Security Center of Excellence (MTI NTSCOE) provide any research it has or insights it can provide on the security risks created by the highway transportation of hazardous materials. This request was submitted to MTI/NSTC as a National Transportation Security Center of Excellence. In response, MTI/NTSC reviewed and revised research performed in 2007 and 2008 and assembled a small team of terrorism and emergency-response experts, led by Center Director Brian Michael Jenkins, to report on the risks of terrorists using highway shipments of flammable liquids (e.g., gasoline tankers) to cause casualties anywhere, and ways to reduce those risks. This report has been provided to DHS. The teams first focus was on surface transportation targets, including highway infrastructure, and also public transportation stations. As a full understanding of these materials, and their use against various targets became revealed, the team shifted with urgency to the far more plentiful targets outside of surface transportation where people gather and can be killed or injured. However, the team is concerned to return to the top of the use of these materials against public transit stations and recommends it as a separate subject for urgent research
Recommended from our members
Nuclear Lessons for Cyber Security?
Identifying “revolutions in military affairs” is arbitrary, but some inflection points in technological change are larger than others: for example, the gunpowder revolution in early modern Europe, the industrial revolution of the nineteenth century, the second industrial revolution of the early twentieth century, and the nuclear revolution in the middle of the last century. In this century, we can add the information revolution that has produced today’s extremely rapid growth of cyberspace. Earlier revolutions in information technology, such as Gutenberg’s printing press, also had profound political effects, but the current revolution can be traced to Moore’s law and the thousand-fold decrease in the costs of computing power that occurred in the last quarter of the twentieth century. Political leaders and analysts are only beginning to come to terms with this transformative technology
- …