Zobrazeno 1 - 10
of 37
pro vyhledávání: '"Rebecca Slayton"'
Publikováno v:
MedEdPORTAL, Vol 5 (2009)
Abstract Introduction Researchers at the University of Michigan School Of Dentistry, along with genetics leaders from across the country, collaborated in designing the Genetics Education in Dentistry Case Simulator to integrate genetics into existing
Externí odkaz:
https://doaj.org/article/4b34a3c2d5cc4618ab83c8e019f90864
Autor:
Rebecca Slayton
In the mid-1970s, Whitfield Diffie and Martin Hellman invented public key cryptography, an innovation that ultimately changed the world. Today public key cryptography provides the primary basis for secure communication over the internet, enabling onl
Autor:
Rebecca Slayton
Publikováno v:
Cyberspace and Instability ISBN: 9781399512510
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::b00a6a2217d8a91dd2fb960414f5abec
https://doi.org/10.1515/9781399512510-009
https://doi.org/10.1515/9781399512510-009
Autor:
Yue Zhao, Rebecca Slayton
Publikováno v:
IEEE Annals of the History of Computing. 45:43-54
Autor:
Rebecca Slayton
Publikováno v:
Democratizing Cryptography ISBN: 9781450398275
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::8653f763af045e72e536d990458e19a0
https://doi.org/10.1145/3549993.3549996
https://doi.org/10.1145/3549993.3549996
Autor:
Rebecca Slayton
Publikováno v:
Science, Technology, & Human Values. 46:81-111
Information security governance has become an elusive goal and a murky concept. This paper problematizes both information security governance and the broader concept of governance. What does it mean to govern information security, or for that matter,
Autor:
Rebecca Slayton, Aaron Clark-Ginsberg
Publikováno v:
Science and Public Policy. 46:339-346
One of the first empirical studies of the effects of mandatory cybersecurity regulations for critical infrastructure.
Autor:
Rebecca Slayton
Publikováno v:
ACM SIGCAS Computers and Society. 47:145-150
This was originally published as "The Paradoxical Authority of the Certified Ethical Hacker," Limn 8, Febuary 2017 http://limn.it/the-paradoxical-authority-of-the-certified-ethical-hacker/
Autor:
Rebecca Slayton, Aaron Clark-Ginsberg
Publikováno v:
Regulation & Governance. 12:115-130
Complex industries such as petroleum production, civil aviation, and nuclear power produce “public risks” that are widely distributed and temporally remote, and thus tend to be ignored by the risk producers. Regulation is perhaps the most common
Autor:
Nathan Ensmenger, Rebecca Slayton
Publikováno v:
Information & Culture. 52:295-303
In much of the literature on the information society, its defining characteristic is assumed to be its immateriality. That is to say, as our interactions and activities become less depende...