120 research outputs found

    Cyber War, Cybered Conflict, and the Maritime Domain

    Get PDF
    Those who dismiss cyber war as mere hype or as driven by potential profits dismiss much too quickly growing evidence of the importance of cyber operations—to which the Navy may be uniquely qualified to adapt

    Privacy in crowdsourcing:a systematic review

    Get PDF
    The advent of crowdsourcing has brought with it multiple privacy challenges. For example, essential monitoring activities, while necessary and unavoidable, also potentially compromise contributor privacy. We conducted an extensive literature review of the research related to the privacy aspects of crowdsourcing. Our investigation revealed interesting gender differences and also differences in terms of individual perceptions. We conclude by suggesting a number of future research directions.</p

    Ten Years In: Implementing Strategic Approaches to Cyberspace

    Get PDF
    This book represents a look beyond theories and analogies to examine the challenges of strategy implementation. In the essays that follow, practitioners who are building cyberspace forces at-scale join scholars who study power and force in this new domain to collectively offer a unique perspective on the evolution and future of cyber strategy and operations.https://digital-commons.usnwc.edu/usnwc-newport-papers/1044/thumbnail.jp

    The Technological culture of war

    Get PDF
    The article proceeds from the argument that war is a social institution and not a historical inevitability of human interaction, that is, war can be “unlearned.” This process involves deconstructing/dismantling war as an institution in society. An important step in this process is to understand the philosophical and cultural bases on which technology is employed as “tools” of war. The article focuses on such questions as, Is technology just viewed as instruments in the hand of its human masters in war? Does technology take on an autonomous role in war? How should we assess the impact of context (political, economic, and cultural) of technology when employed in war? By exploring these points, the article hopes to provide input into the discussion on the control of war technologies and ultimately the dismantling of war as an institution in society

    Low back pain as the presenting sign in a patient with primary extradural melanoma of the thoracic spine - A metastatic disease 17 Years after complete surgical resection

    Get PDF
    Primary spinal melanomas are extremely rare lesions. In 1906, Hirschberg reported the first primary spinal melanoma, and since then only 40 new cases have been reported. A 47-year-old man was admitted suffering from low back pain, fatigue and loss of body weight persisting for three months. He had a 17-year-old history of an operated primary spinal melanoma from T7-T9, which had remained stable for these 17 years. Routine laboratory findings and clinical symptoms aroused suspicion of a metastatic disease. Multislice computed tomography and magnetic resonance imaging revealed stage-IV melanoma with thoracic, abdominal and skeletal metastases without the recurrence of the primary process. Transiliac crest core bone biopsy confirmed the diagnosis of metastatic melanoma. It is important to know that in all cases of back ore skeletal pain and unexplained weight loss, malignancy must always be considered in the differential diagnosis, especially in the subjects with a positive medical history. Patients who have back, skeletal, or joint pain that is unresponsive to a few weeks of conservative treatment or have known risk factors with or without serious etiology, are candidates for imaging studies. The present case demonstrates that complete surgical resection alone may result in a favourable outcome, but regular medical follow-up for an extended period, with the purpose of an early detection of a metastatic disease, is highly recommended

    Team Collaboration: The Use of Behavior Principles for Serving Students With ASD

    Full text link
    PurposeSpeech-language pathologists (SLPs) and behavior analysts are key members of school-based teams that serve children with autism spectrum disorders (ASD). Behavior analysts approach assessment and intervention through the lens of applied behavior analysis (ABA). ABA-based interventions have been found effective for targeting skills across multiple domains for children with ASD. However, some SLPs may be unfamiliar with the breadth of ABA-based interventions. The intent of this tutorial is to briefly introduce key ABA principles, provide examples of ABA-based interventions used within schools, and identify strategies for successful collaboration between behavior analysts and SLPs.MethodThis tutorial draws from empirical studies of ABA-based interventions for children with ASD within school settings, as well as discussions in the extant literature about the use of behavior principles by SLPs and strategies for interdisciplinary collaboration.ConclusionGiven the prevalence of ASD at 1 in 68 children (Centers for Disease Control and Prevention, 2014) and the high cost of serving these children within schools (an average cost of 286% over regular education; Chambers, Shkolnik, &amp; Perez, 2003), the need for effective, comprehensive service provision and efficiency within interdisciplinary teams is paramount. Communication, mutual understanding, and recognition of common ground between SLPs and behavior analysts can lead to successful collaboration

    Protocol for a statewide randomized controlled trial to compare three training models for implementing an evidence-based treatment

    Full text link

    Introduction to MCA Issue, “Systemic Cyber Defense

    Get PDF
    corecore