Search
Skip to Search Results- 3Concordia University of Edmonton
- 2University of Alberta Library
- 2University of Alberta Library/Libraries Staff Publications
- 2Concordia University of Edmonton/Master of Information Systems Security Management (MISSM) and Master of Information Systems Assurance Management (MISAM) Project Reports (Concordia University of Edmonton)
- 1Forum for Information Professionals
- 1Forum for Information Professionals/FIP 2020
-
2021-04-29
Recent controversies in Canadian librarianship—the Toronto Public Library room rental to a "gender-critical feminist" group and the institution of “airport-style” security at the Winnipeg Public Library—have exposed divisions within the profession. This article attempts to untangle the...
-
Spring 2022
This dissertation reads the informational ethos of authors Herman Melville and Walt Whitman through the lens of critical data studies and surveillance studies, examining how emerging data cultures in the nineteenth century gave rise to new subjectivities. The study situates these authors at a...
-
2019-04-01
Public access to government information forms the foundation of a healthy liberal democracy, but because this information can be precarious, it needs stewardship. Government Information in Canada provides analysis about the state of Canadian government information publishing. Practitioners from...
-
2022
Fitness trackers can help improve physical activity, and thereby reduce the risksof diseases such as diabetes, obesity, as well as hypertension. Despite these health related benefits, the way these devices are being used by the end user, play a crucial role for the persistent success of fitness...
-
Network security (confidentiality, integrity & availability) protection against Metasploit exploit using SNORT and Wireshark
Download2020
The project includes snort rule formation and refinement for defense against Metasploit 2 exploits to protect confidentiality, integrity and availability of data. Rule profiling for better and efficient performance of rules is also carried out. Tools such as snort and Wireshark are used for this...
-
Network security (confidentiality, integrity & availability) protection against Metasploit exploit using SNORT and Wireshark
Download2020
The project includes snort rule formation and refinement for defense against Metasploit 2 exploits to protect confidentiality, integrity and availability of data. Rule profiling for better and efficient performance of rules is also carried out.
-
Proxying the Data Body: Artificial Intelligence, Federated Identity, and Machinic Subjection
Download2020-08-06
Academic libraries have recently seen a shift from self-management of user-authentication of licensed resources themselves, to cloud-based implementations of "federated identity" technologies. Such technologies aim to solve the problems of fragile access to licensed resources while also better...
-
Resilient or Resistant Librarians?: An Exploration of "Resilience" Discourses In Contemporary Librarianship
Download2020-02-07
This presentation explores discourses of "resilience" in contemporary librarianship, analyzing the term using excerpts from "Resilient Life: The Art of Living Dangerously" by Brad Evans and Julian Reid. What might it mean about this historical moment in librarianship - and in society at large -...