Academia.edu no longer supports Internet Explorer.
To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to upgrade your browser.
IEEE Communications Magazine, 2020
2016
The field of Information Technology (IT) has experienced rapid change over the past few decades. Since the late 90’s, many businesses in the IT industry begun to require certifications for specific technologies. Corporations begun to collaborate with traditional educational institutions so that they can control the quality and content of students that have the desire to learn their networking concepts. The Department of Information Technology (DIT) at Central University of Technology (CUT) adopted the Cisco program and teach students the Cisco curriculum. Cisco curriculum is the most widely used computer networking curriculum and the international standard by which professional competency in this field can be measured. The DIT has been experiencing a decline in student pass-rate and this has raised a lot of concern. Hence, the main aim of this research project was to investigate the low pass-rate of CCNA-1 students at CUT. Due to time constraints, this research examined the delivery...
Nuts About Leadership, 2024
This research analyzes the American leaders' subservient tendencies toward Israel's interests in adjusting their foreign policy decisions. Using an exploratory research approach based on historical evidence, it identifies specific cases that show how the United States of America's (U.S.A.) support of Israel has risked Americans' national interests. It informs American leaders of the perils of this compliant propensity. The study suggests the concepts of transnational networks and relational authority as alternatives to the conventional paradigm of power hierarchies. These concepts may aid American leaders in initiating a new season of relationships with Israel. They encourage the U.S.A. leaders to prioritize protecting their sovereignty and national interests by implementing the distinction between conventional state-centric authority and transnational networked authority.
This paper analyzes the complex interethnic configuration that shaped the development of rock and roll in the 1950s.
2020
Proponer hoy un libro sobre la horizontalidad como perspectiva metodológica de trabajo en ciencias sociales y humanidades implica ver con la metáfora espacial que la palabra invoca: entre un fondo de visión a la misma altura de todos y una predilección de futuro, de objetivo que está tachado de antemano por su propio signo: el horizonte está siempre más allá. Los capítulos que reúne esta obra, cada uno a su manera, parten de esa condición aporética de la horizontalidad: una necesidad de igualar los términos del diálogo entre investigadores e investigados, y una condición que ya se sabe irresoluble, agonística, procesual, quizá esta última característica sea lo que mueve con más énfasis las argumentaciones del volumen. Producir conocimiento desde un plano horizontal, con voces científicas y no académicas, ha sido nuestra forma de trabajo conjunto desde hace una década. Hemos recorrido caminos para entablar diálogos entre saberes con un método dispuesto a modificarse según el contexto...
Research Papers in Economics, 2020
This paper provides comprehensive evidence on the effects of cyber-attacks (cyber-crime, cyber espionage, cyber warfare and hacktivism) and cyber security on the risk-adjusted returns, realised volatilities and trading volumes of the three main cryptocurrencies (Bitcoin, Ethereum and Litecoin). We find that stronger cyber security is generally effective in increasing the risk-adjusted returns of cryptocurrencies and trading activity even in the presence of cyber-attacks. Hacktivism appears to be the most significant threat to cryptocurrency investors. Further, cyber-attackers hitting the cryptocurrency exchanges are most likely to attack other sectors (government, industry and finance) as well. In addition, in the case of the US they target the government and industry sectors in preference to the cryptocurrency exchanges given the corresponding potential benefits and costs. In all cases appropriate strategies should be designed to enhance cyber security.
Rei Cretariae Romanae Fautorum Acta, 1997
The Association of the Continental Philosophy of Religion, 2024
Atmospheric Pollution Research, 2013
Journal of Clinical Investigation, 1989
Information and Communication Technologies in Tourism 2004, 2004
Mechanics of Composite Materials, 1982
Верховный Суд Республики Карелия: век служения государству, обществу и праву, 2023
Comparative Literature: East & West, 2000