Executive SummaryOn September 11th, 2001 the United States experienced the largest terrorist attack in its history. This event caused many government agencies to review their security practices and procedures. It also has raised awareness of other avenues that terrorists might pursue to achieve their goals, including cyber terrorism. Cyber terrorism can be described as politically motivated attacks in cyberspace. These attacks are intended to cause grave harm, such as loss of life or severe economic damage. Often the term "weapons of mass disruption" is used in describing these potential computer-based threats.The threat of these attacks intensified the need for more computer professionals to have computer security expertise. It also pointed to the need for students studying computer related fields to be exposed to topics in computer security, particularly the threat posed by cyber terrorism.We examined a random sample of sixteen textbooks in the field of computer security to determine the coverage dedicated to cyber terrorism. Textbooks typically provide resources for faculty to teach students various topics in a course -in this case resources to help students understand the potential threats, techniques, and targets of cyber terrorists.The results show that computer security textbooks do not give cyber terrorism the depth of coverage warranted by its significance for the IT industry. Therefore, faculty need to find their own references and re-sources to address cyber terrorism adequately in their class. This paper concludes by providing numerous web sites and trade books that can be used to help faculty provide more information to their students on cyber terrorism.
Abstract. A real-time database is a database in which both the data and the operations upon the data may h a ve timing constraints. We have i n tegrated real-time, object-oriented, semantic and active database approaches to develop a formal model called RTSORAC for real-time databases. This paper describes the components of the RTSORAC model including objects, relationships, constraints, updates, and transactions.
This paper describes real-time extensions to the Open Object-Oriented Database system using the RT-SORAC data model. This model combines an objectoriented data model, real-time requirements, exible transactions, semantic relationships among objects, and active database features. Several extensions to the Open Object-Oriented Database system, including development o f i n terfaces for real-time objects and realtime transactions, use of a real-time operating system, incorporation of real-time object management, and incorporation of real-time transaction management, are also described.
This study examines how the Twittersphere talked about candidates running for the U.S senate in the 2018 congressional elections. We classify Twitter users as Liberal or Conservative to better understand how the two groups use social media during a major national political election. Using tweet sentiment, we assess how the Twittersphere felt about in-group party versus outgroup party candidates. When we further break these findings down based on the candidates' gender, we find that male senatorial candidates were talked about more positively than female candidates. We also find that Conservatives talked more positively about female Republican candidates than they did about Republican male candidates. Female candidates of the out-group party were talked about the least favorably of all candidates. Conservative tweeters exhibit the most positive level of in-group party sentiment and the most negative level of out-group party sentiment. We therefore attribute the most intense affective polarization to this ideological group.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.