scispace - formally typeset
Search or ask a question
Institution

Gettysburg College

EducationGettysburg, Pennsylvania, United States
About: Gettysburg College is a education organization based out in Gettysburg, Pennsylvania, United States. It is known for research contribution in the topics: Population & Politics. The organization has 1223 authors who have published 2348 publications receiving 52162 citations. The organization is also known as: Pennsylvania College.


Papers
More filters
Journal ArticleDOI
TL;DR: In this paper, synthetic routes were developed for the preparation of clathrochelate complexes of ruthenium(II) utilizing a totally encapsulating ligand derived from dioxime ligands (1,2-cyclohexanedione dioximide, diphenylglyoxime and dimethylglyoxideime) and various boron capping agents (boronic acids, borate esters, and bboron halides).

17 citations

Journal ArticleDOI
TL;DR: In this article, the effects of Lorentz-and $CPT-violating operators of mass dimensions up to six on the energy levels and cyclotron frequencies of particles and antiparticles were investigated.
Abstract: Applications of the general theory of quantum electrodynamics with Lorentz- and $CPT$-violating operators of mass dimensions up to six are presented to Penning-trap experiments comparing charge-to-mass ratios between particles and antiparticles. Perturbation theory is used to derive Lorentz- and $CPT$-violating contributions to the energy levels and cyclotron frequencies of confined particles and antiparticles. We show that whether the experimental interpreted quantity $(|q|/m{)}_{\overline{w}}/(|q|/m{)}_{w}\ensuremath{-}1$ is a clean measure of a $CPT$ test depends on the context of the relevant theory. Existing experimental results of charge-to-mass ratio comparisons are used to obtain first-time constraints on 69 coefficients for Lorentz and $CPT$ violation.

17 citations

Journal ArticleDOI
TL;DR: In this paper, the integration of information literacy standards into the management classroom can address underdeveloped student research strategies and promote effective use of print, digital, and free Web resources, which can support management educators in their need to balance disciplinary content, departmental curriculum, and broader educational goals that support the preparation of future managers.
Abstract: This article proposes that the integration of information literacy standards into the management classroom can address underdeveloped student research strategies and promote effective use of print, digital, and free Web resources. Incorporating information literacy can support management educators in their need to balance disciplinary content, departmental curriculum, and broader educational goals that support the preparation of future managers. This article begins with a review of core information literacy concepts and standards. An in-depth discussion of information literacy challenges on campus and in the workplace follows. Next, the authors offer an evolving case example that illustrates the incorporation of information literacy skills and concepts into an introductory management course. Implications and suggestions for management educators are explored.

17 citations

Journal ArticleDOI
TL;DR: Examination of the plausibility of adding participant age, time spent online and perceptions of country technology access to the Barlett Gentile Cyberbullying Model showed that cyberbullying attitudes and perpetration were both negatively correlated with perceptions ofCountry technology access and positively correlated with time online.

17 citations

Journal ArticleDOI
01 Jul 2015
TL;DR: The authors empirically develop a latent structure for a variety of types of cyber attacks, link that structure to levels of operator suspicion, link suspicion to users' cognitive and emotional states, and develop initial implications for cyber training.
Abstract: Despite the importance that human error in the cyber domain has had in recent reports, cyber warfare research to date has largely focused on the effects of cyber attacks on the target computer system. In contrast, there is little empirical work on the role of human operators during cyber breaches. More specifically, there is a need to understand the human-level factors at play when attacks occur. This paper views cyber attacks through the lens of suspicion, a construct that has been used in other contexts, but inadequately defined, in prior research. After defining the construct of suspicion, the authors demonstrate the role that suspicion plays as the conduit between computer operators' normal working behaviors and their ability to alter that behavior to detect and react to cyber attacks. With a focus on the user, rather than the target computer, the authors empirically develop a latent structure for a variety of types of cyber attacks, link that structure to levels of operator suspicion, link suspicion to users' cognitive and emotional states, and develop initial implications for cyber training.

17 citations


Authors

Showing all 1237 results

Network Information
Related Institutions (5)
Miami University
19.5K papers, 568.4K citations

86% related

California State University, Long Beach
13.9K papers, 377.3K citations

86% related

University of North Carolina at Greensboro
13.7K papers, 456.2K citations

85% related

Georgia State University
35.8K papers, 1.1M citations

85% related

City University of New York
56.5K papers, 1.7M citations

84% related

Performance
Metrics
No. of papers from the Institution in previous years
YearPapers
20236
202234
202185
202084
201985
201883