Search

Search Constraints

Start Over You searched for: Area of Honors Security and Risk Analysis Remove constraint Area of Honors: Security and Risk Analysis

Search Results

2. The Threat of Madrassas: An Evaluation of the Role of Islamic Education in Jemaah Islamiyah Terrorist Attacks in Indonesia

open_access
Open Access

3. PERCEPTIONS OF CYBER RISK HELD AMONG UNDERGRADUATE STUDENTS PURSUING A SECURITY AND RISK ANALYSIS OR AN INFORMATION SCIENCES AND TECHNOLOGY MAJOR OR MINOR

open_access
Open Access

4. EXPERIMENTATION AND EVALUATION OF THE EFFECTIVENESS OF LOW COST UNMANNED AERIAL VEHICLES

open_access
Open Access

9. Advancements in Digital Imaging and Photographic Applications: A Focus on Human Emotion and Intent Driven Communication

open_access
Open Access

10. Improving Analysis Results Within the U.S. Intelligence Community

open_access
Open Access

12. Penn State Red Cell Analytics Lab Grand Challenge: A Study on Analytic Bias

open_access
Open Access

17. On Cloud Security and Usability: How Do We Make Security Usable?

open_access
Open Access

18. Facebook And Twitter And Instragram, Oh My: The Effect Of Social Media On Humanitarian Organizations

open_access
Open Access

22. A New Wave of Terror: An Analysis of Current Trends in Terrorism and the Death of Religious Extremism

open_access
Open Access

23. Comparing the Evolution of Counter-terrorism Responses in the United States (U.S.) and United Kingdom (U.K.)

open_access
Open Access

24. MOTIVATIONS AND ENABLERS PRESENT IN DECEPTION OPERATIONS: HISTORICAL CASE STUDY EXAMPLE - OPERATION FORTITUDE

open_access
Open Access

25. Data Fusion of Security Logs to Measure Critical Security Controls to Increase Situation Awareness

open_access
Open Access

28. SPREADING AWARENESS OF SEX TRAFFICKING IN PENNSYLVANIA AND ONLINE

open_access
Open Access

30. The Practicality of Serious Games as a Pedagogy for Training Aspiring Intelligence Analysts

open_access
Open Access

32. Applied Defenses Against Adversarial Attacks

open_access
Open Access

33. Media Enabled Information Operations: A Framework for the 2020 United States Election

open_access
Open Access

37. Confronting Uncertainty: COVID-19 Information Gathering Practices of Refugees in Kenya

open_access
Open Access

38. Privacy Policy Readability and Teenagers: A Longitudinal Analysis of Privacy Policy Readability and the Impact on the Privacy Governance Space

open_access
Open Access

40. Analyzing Social Media Platforms to Establish Evaluation Metrics for Propensity of S.C.A.R.E. Abuse

open_access
Open Access

41. They Will Not Replace Us: A Comparative Case Analysis of the Radicalization of Terrorists Inspired by the Great Replacement Conspiracy

open_access
Open Access

43. Intelligence Goldmine or Overwhelming Hinderance? Social Media’s Impact on U.S. Intelligence Community Analysis

open_access
Open Access