Open Access. Powered by Scholars. Published by Universities.®

Social and Behavioral Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

2016

Discipline
Institution
Keyword
Publication
Publication Type
File Type

Articles 61 - 90 of 26548

Full-Text Articles in Social and Behavioral Sciences

Hiperrealitas Relasi Dalam Sinetron Komedi "Tetangga Masa Gitu?", Eldo Eka Saputra Dec 2016

Hiperrealitas Relasi Dalam Sinetron Komedi "Tetangga Masa Gitu?", Eldo Eka Saputra

Informasi

Emergence of non-mainstream way of women representations in soap operas, where women are constructed as an independent individual, brought an impact to the patterns of relation between men and women. If we look at Indonesian soap operas, there are not many of them that can manage to present a non-mainstream construction of female characters. The shift on women representation is associated to how the men were represented in said soap operas, therefore this is a form of the role of the media in altering gender stigma in the society. However, in the process of construction there is a new reality …


Peran Jaringan Sosial Pada Kampanye Lingkungan Di Media Sosial: Kasus Kampanye Melawan Asap, Ika Hariyani Dec 2016

Peran Jaringan Sosial Pada Kampanye Lingkungan Di Media Sosial: Kasus Kampanye Melawan Asap, Ika Hariyani

Informasi

Campaigns nowadays are oftenly carried through social medias, including campaigns concerning the environment. Based on previous studies, effectivity of campaigns through social medias were affected by many factors, such as the activity of the online administrator, additional socialization that were carried off- line, and also the involvement of the active followers in social medias. However, this paper views environmental campaign in social medias could be effective if viewed from another side,
that is social network. This study sees how social network can improve the effectivity of environmental campaigns in social medias,therefore it's safe to say that this study brings an …


Winona Currents Annual Report 2016, University Advancement - Winona State University Dec 2016

Winona Currents Annual Report 2016, University Advancement - Winona State University

Winona Currents

Winona Currents Annual Report for 2016.


Experiences Of Trust In Longer-Lasting Formal Youth Mentoring Relationships, Michelle Levine Dec 2016

Experiences Of Trust In Longer-Lasting Formal Youth Mentoring Relationships, Michelle Levine

Graduate Doctoral Dissertations

The purpose of this longitudinal qualitative study was to investigate youth experiences of trust and mentor experiences supporting youth trust in longer-term formal youth mentoring relationships. Trust was defined as youth relying on and confiding in their mentors based on experiences of mentor reliability, honesty, and emotional sensitivity and protection from emotional harm. Thematic analysis was conducted on interview data from a longitudinal dataset, involving analysis of narratives from interviews (n=147) with youth, mentors, and parents for mentoring matches that lasted at least two years. Overall, participants in this study identified multiple ways trust was experienced by youth and supported …


Cyberbullying And Self-Perceptions Of Students Associated With Their Academic Performance, Maham Muzamil, Gulzar H. Shah Dec 2016

Cyberbullying And Self-Perceptions Of Students Associated With Their Academic Performance, Maham Muzamil, Gulzar H. Shah

Department of Health Policy and Community Health Faculty Publications

The aim of this study is to explore the factors influencing students’ academic achievements in secondary school level (grades 09 and 10). Those factors include students’ self-reported psychological and issues (e.g. being bullied through social media) as well as socioeconomic status. Study participants included610 students at senior secondary level (237 male and 363 female) randomly selected from ten different government schools. The schools were randomly selected from the lists provided by their respective Education District Officer (EDO). The data were collected by researchers with the help of teachers. Participants’ were offered as incentives a drawing for a gift certificate. Bivariate …


Table Of Contents Dec 2016

Table Of Contents

Journal of Digital Forensics, Security and Law

No abstract provided.


Bloom Filters Optimized Wu-Manber For Intrusion Detection, Monther Aldwairi, Koloud Al-Khamaiseh, Fatima Alharbi, Babar Shah Dec 2016

Bloom Filters Optimized Wu-Manber For Intrusion Detection, Monther Aldwairi, Koloud Al-Khamaiseh, Fatima Alharbi, Babar Shah

Journal of Digital Forensics, Security and Law

With increasing number and severity of attacks, monitoring ingress and egress network traffic is becoming essential everyday task. Intrusion detection systems are the main tools for capturing and searching network traffic for potential harm. Signature-based intrusion detection systems are the most widely used, and they simply use a pattern matching algorithms to locate attack signatures in intercepted network traffic. Pattern matching algorithms are very expensive in terms of running time and memory usage, leaving intrusion detection systems unable to detect attacks in real-time. We propose a Bloom filters optimized Wu-Manber pattern matching algorithm to speed up intrusion detection. The Bloom …


A Survey Of Social Network Forensics, Umit Karabiyik, Muhammed Abdullah Canbaz, Ahmet Aksoy, Tayfun Tuna, Esra Akbas, Bilal Gonen, Ramazan S. Aygun Dec 2016

A Survey Of Social Network Forensics, Umit Karabiyik, Muhammed Abdullah Canbaz, Ahmet Aksoy, Tayfun Tuna, Esra Akbas, Bilal Gonen, Ramazan S. Aygun

Journal of Digital Forensics, Security and Law

Social networks in any form, specifically online social networks (OSNs), are becoming a part of our everyday life in this new millennium especially with the advanced and simple communication technologies through easily accessible devices such as smartphones and tablets. The data generated through the use of these technologies need to be analyzed for forensic purposes when criminal and terrorist activities are involved. In order to deal with the forensic implications of social networks, current research on both digital forensics and social networks need to be incorporated and understood. This will help digital forensics investigators to predict, detect and even prevent …


The Impact Of Md5 File Hash Collisions On Digital Forensic Imaging, Gary C. Kessler Dec 2016

The Impact Of Md5 File Hash Collisions On Digital Forensic Imaging, Gary C. Kessler

Journal of Digital Forensics, Security and Law

The Message Digest 5 (MD5) hash is commonly used as for integrity verification in the forensic imaging process. The ability to force MD5 hash collisions has been a reality for more than a decade, although there is a general consensus that hash collisions are of minimal impact to the practice of computer forensics. This paper describes an experiment to determine the results of imaging two disks that are identical except for one file, the two versions of which have different content but otherwise occupy the same byte positions on the disk, are the same size, and have the same hash …


A New Distributed Chinese Wall Security Policy Model, Saad Fehis, Omar Nouali, Mohand-Tahar Kechadi Dec 2016

A New Distributed Chinese Wall Security Policy Model, Saad Fehis, Omar Nouali, Mohand-Tahar Kechadi

Journal of Digital Forensics, Security and Law

The application of the Chinese wall security policy model (CWSPM) to control the information flows between two or more competing and/or conflicting companies in cloud computing (Multi-tenancy) or in the social network, is a very interesting solution. The main goal of the Chinese Wall Security Policy is to build a wall between the datasets of competing companies, and among the system subjects. This is done by the applying to the subjects mandatory rules, in order to control the information flow caused between them. This problem is one of the hottest topics in the area of cloud computing (as a distributed …


Strategi Komunikasi Guru Sma Islam Terpadu Dalam Menghasilkan Siswa Yang Unggul, Chatia Hastasari, Suranto Aw, Benni Setiawan Dec 2016

Strategi Komunikasi Guru Sma Islam Terpadu Dalam Menghasilkan Siswa Yang Unggul, Chatia Hastasari, Suranto Aw, Benni Setiawan

Informasi

The study aims to explain how the concept of integrated Islamic and the strategy of the
teacher in SMA IT Abu Bakar Yogyakarta and SMA Muhammadiyah 1 Yogyakarta produce
the superior students. It refers to the development of SMA IT which always puts ethics,
religion and the quality of the students. However, the main key to produce the superior
students is the role of professional teacher who encourages the strong characteristic of
students. The method of this research is qualitative and takes place in SMA IT Abu Bakar
and SMA Muhammadiyah 1 Yogyakarta. Furthermore, the samples of this research consist …


Table Of Contents Dec 2016

Table Of Contents

International Journal of Nuclear Security

No abstract provided.


Letter From The Editor Dec 2016

Letter From The Editor

International Journal of Nuclear Security

No abstract provided.


Nuclear Power: Black Sky Liability Or Black Sky Asset?, Sherrell R. Greene Dec 2016

Nuclear Power: Black Sky Liability Or Black Sky Asset?, Sherrell R. Greene

International Journal of Nuclear Security

Ready access to abundant electricity is a key enabler of modern life. During the past decade the vulnerability of Critical Infrastructure sectors in the U.S. to a variety of natural hazards and man-made threats has become increasingly apparent. The electrical infrastructure (the “Grid”) is the foundation for all other critical civil infrastructures upon which our society depends. Therefore, protection of the Grid is an energy security, homeland security, and national security issue of highest importance. Geomagnetic disturbances (GMD) induced by solar coronal mass ejections (CMEs), electromagnetic pulse (EMP) attacks, and cyber attacks are three events having the potential to plunge …


Implementation Of The 1995 Middle East Resolution: A Vital Lifeline To The Extension And Success Of The Non-Proliferation Treaty, Haidy Y. Ghoname, Howard Lewis Hall Dec 2016

Implementation Of The 1995 Middle East Resolution: A Vital Lifeline To The Extension And Success Of The Non-Proliferation Treaty, Haidy Y. Ghoname, Howard Lewis Hall

International Journal of Nuclear Security

This study highlights the core non-proliferation dilemmas we face and suggests an effective mechanism for reviving the spirit and the hope of the Non-Proliferation Treaty. An indispensable key to the treaty calls for a rethinking of what we believe should be referred to as its four pillars: disarmament, non-proliferation, peaceful uses of nuclear energy, and implementation of the 1995 Middle East Resolution. We seek to contribute to the renaissance of the non-proliferation regime by addressing seven dilemmas that arise from the way various Non-Proliferation Treaty participants pursue the goals of the four pillars undergirding the treaty. This study highlights …


A New Pathway To Enhance The Nuclear Security Regime, Francesca Giovannini Dec 2016

A New Pathway To Enhance The Nuclear Security Regime, Francesca Giovannini

International Journal of Nuclear Security

The paper investigates the approach used by a new set of regional institutions, the Disaster Preparedness and Risk Management Organizations (DPRMOs), in strengthening regional governance and cooperation. It also inquires in what ways these new institutions might indirectly contribute to the establishment of a more cohesive global nuclear security framework. More specifically, through the examination of the case of Southeast Asia, the paper argues that these institutions, albeit without a specific and direct mandate to operate in the nuclear security domain, are fundamentally strengthening states’ capacity to assess risks and threats and to map vulnerabilities in timely fashion. They are …


Modern Advancements In Post-Detonation Nuclear Forensic Analysis, S. Adam Stratz, Jonathan A. Gill, John D. Auxier Ii, Howard L. Hall Dec 2016

Modern Advancements In Post-Detonation Nuclear Forensic Analysis, S. Adam Stratz, Jonathan A. Gill, John D. Auxier Ii, Howard L. Hall

International Journal of Nuclear Security

Deterring nuclear terrorism is a critical national asset to support the preclusion of non-state actors from initiating a nuclear attack on the United States. Successful attribution of a detonated nuclear weapon allows for timely responsive measures that prove essential in the period following a nuclear event. In conjunction with intelligence and law enforcement evidence, the technical nuclear forensics (TNF) post-detonation community supports this mission through the development and advancement of expertise to characterize weapon debris through a rapid, accurate, and detailed approach. Though the TNF field is young, numerous strides have been made in recent years toward a more robust …


Evaluation Of Covert Plutonium Production From Unconventional Uranium Sources, Ondrej Chvala, Steven Skutnik, Tyrone Christopher Harris, Emily Anne Frame Dec 2016

Evaluation Of Covert Plutonium Production From Unconventional Uranium Sources, Ondrej Chvala, Steven Skutnik, Tyrone Christopher Harris, Emily Anne Frame

International Journal of Nuclear Security

The potential for a relatively non-advanced nation to covertly acquire a significant quantity of weapons-grade plutonium using a gas-cooled, natural uranium-fueled reactor based on relatively primitive early published designed is evaluated in this article. The economic and technical issues that would influence the design decisions of a covert 239Pu production program are considered.

Several unconventional uranium acquisition approaches were explored. Methods for extracting uranium from enrichment tails, seawater, and coal ash sources were considered. The evaluation indicated that uranium extraction from coal ash or insitu leaching from underground deposits could be performed in economical manner that might be difficult …


Student Competition Cover Dec 2016

Student Competition Cover

International Journal of Nuclear Security

No abstract provided.


Addressing The Tunnel Threat At Nuclear Facilities: A Case Study, Md. Mobasher Ahmed Dec 2016

Addressing The Tunnel Threat At Nuclear Facilities: A Case Study, Md. Mobasher Ahmed

International Journal of Nuclear Security

No abstract provided.


Improving Nuclear Safety, Security, And Nonproliferation In Northeast Asia Through Multinational Approach, Viet Phuong Nguyen Dec 2016

Improving Nuclear Safety, Security, And Nonproliferation In Northeast Asia Through Multinational Approach, Viet Phuong Nguyen

International Journal of Nuclear Security

No abstract provided.


Janus Realized: The Use Of Social Media As A Means Of Transparency Nuclear Communication To The Public, Frances Bachstein Dec 2016

Janus Realized: The Use Of Social Media As A Means Of Transparency Nuclear Communication To The Public, Frances Bachstein

International Journal of Nuclear Security

No abstract provided.


Politics Of Feminist Revision In Di Prima's Loba, Polina Mackay Dec 2016

Politics Of Feminist Revision In Di Prima's Loba, Polina Mackay

CLCWeb: Comparative Literature and Culture

In her article "Politics of Feminist Revision in di Prima's Loba" Polina Mackay explores Diane di Prima's two-volume epic Loba (1998) and, through a comparison of di Prima to the work of Adrienne Rich, argues that Loba practices a politics of feminist revision. Further, Mackay examines the ways in which di Prima starts to move away from the recovery project of female voices in patriarchal culture, associated with late twentieth-century Feminism, towards a women's literature which need not be defined entirely through its resistance to patriarchal narratives of gender in men's literature. Here it focuses on di Prima's revisionist …


Burroughs As A Political Writer?, Alexander Greiffenstern Dec 2016

Burroughs As A Political Writer?, Alexander Greiffenstern

CLCWeb: Comparative Literature and Culture

In his article "Burroughs as a Political Writer?" Alexander Greiffenstern discusses political elements in William S. Burroughs's work. Greiffenstern looks at Burroughs's text "The Coming of the Purple Better One" written for Esquire about the Democratic National Convention in Chicago 1968. By writing a surprisingly personal text, Burroughs might have captured something about the significance of the convention that many later historical accounts miss. In the end, Burroughs leaves the critical reader no other choice than to attempt a historical and political analysis.


Penggunaan Doa Batuna'u Dalam Tradisi Etnik Lio Di Desa Ngalukoja Kecamatan Maurole Kabupaten Ende: Sebuah Kajian Linguistik Kebudayaan, Idris Mboka Dec 2016

Penggunaan Doa Batuna'u Dalam Tradisi Etnik Lio Di Desa Ngalukoja Kecamatan Maurole Kabupaten Ende: Sebuah Kajian Linguistik Kebudayaan, Idris Mboka

Paradigma: Jurnal Kajian Budaya

This study aims to identify and describes the verbal symbols and cultural imagery of Lio Ethnic (LE) community which are contained in Batuna’u Prayer (BP). The theory used as analytical scalpel is the Cultural Linguistics Theory (CLT). This study shows 5 forms of BP used in LE community, which are the traditional house construction BP (THC), going to sow BP (GS), delivering dowry BP (DD), going to school BP (GSC), and deceased person BP (DP). From these five forms of BP, there are verbal symbols of a language grammatical discourse (phonology, morphology, and syntax), and the metaphor styles of language, …


Perubahan Budaya Kerja Pertanian Lahan Kering Atoni Pah Meto Di Kabupaten Timor Tengah Utara, Damasius Sasi Dec 2016

Perubahan Budaya Kerja Pertanian Lahan Kering Atoni Pah Meto Di Kabupaten Timor Tengah Utara, Damasius Sasi

Paradigma: Jurnal Kajian Budaya

The goal of the study is to review changes in dryland farming culture of atoni pah meto in North Center Timor District caused by global climate changes. The research method used was qualitative descriptive: the data collecting method used was interviews, observations, and the document study. Research results prove that the atoni pah meto which consists of eighteen farming rituals, five work patterns, work division between genders, and work ethos, has shifted. It is caused by the interaction of atoni pah meto with other nations, tribes, and ethnic groups, further affected by global climate changes. Climate changes have made a …


Pengaruh Taebo High Dan Low Impact Terhadap Ketahanan Otot Dan Lemak Tubuh Ditinjau Dari Vo2maks, Dedi Budiawan, Suharjana Suharjana Dec 2016

Pengaruh Taebo High Dan Low Impact Terhadap Ketahanan Otot Dan Lemak Tubuh Ditinjau Dari Vo2maks, Dedi Budiawan, Suharjana Suharjana

Jurnal Keolahragaan

Penelitian ini bertujuan untuk mengetahui (1) perbedaan tingkat keefektifan pengaruh senam Taebo high impact dan low impact terhadap ketahanan otot dan persentase lemak tubuh ditinjau dari volume oksigen maksimum, (2) apakah VO2Maks tinggi lebih baik/bagus daripada VO2Maks rendah terhadap peningkatan ketahanan otot dan penurunan persentase lemak tubuh. (3) interaksi yang terjadi antara metode latihan senam Taebo high impact dan low impact terhadap ketahanan otot dan persentase lemak tubuh ditinjau dari volume oksigen maksimum. Penelitian ini merupakan penelitian eksperimen dengan rancangan faktorial 2x2, menggunakan tes awal dan tes akhir dengan dua kelompok yang diberi perlakuan berbeda. Pengumpulan …


'Whose Goals Am I Meeting?' Policy And Practice Dilemmas In Adult Basic Education (Abe) In The Era Of Accountability, Alma Hallulli Biba Dec 2016

'Whose Goals Am I Meeting?' Policy And Practice Dilemmas In Adult Basic Education (Abe) In The Era Of Accountability, Alma Hallulli Biba

Graduate Doctoral Dissertations

For the last two decades, federal legislation and Massachusetts’ state ABE policies have linked adult learners’ educational outcomes to performance systems and accountability requirements. These outcomes, represented as ‘goals’, reflect an emphasis on return-on-investment strategies and outcome-based accountability measures. Greatest emphasis is placed on that subset of adult learners’ goals that are easily measured, attainable, and that are associated with public outcomes. This dissertation, in contrast, seeks to understand the goal setting process from the perspective of learners and local ABE stakeholders. Using a novel, mixed-method approach, this dissertation presents ABE learners’ goal setting as a decision problem in order …


Introduction To Global Beat Studies, Oliver Harris, Polina Mackay Dec 2016

Introduction To Global Beat Studies, Oliver Harris, Polina Mackay

CLCWeb: Comparative Literature and Culture

No abstract provided.


Beat Contenders (Micheline, Sanders, Kupferberg), A. Robert Lee Dec 2016

Beat Contenders (Micheline, Sanders, Kupferberg), A. Robert Lee

CLCWeb: Comparative Literature and Culture

In his article "Beat Contenders (Micheline, Sanders, Kupferberg)" A. Robert Lee asks if we are in danger of too fixed a Beat canonization. That is, do the Usual Suspects—Ginsberg, Kerouac, and Burroughs, with Corso, Ferlinghetti, Cassady, and Snyder in the frame—assume too presiding a role? There is, for sure, rightly, increased recognition of Beat women writers and attention has been given to the Afro-Beat circuit and, indeed, to a wider multicultural roster to include Latino/a and Asian American authorship. Beat's international reach has won its place, from the United Kingdom and Continental Europe to Japan and Australia. Even so, other …