2022
DOI: 10.4018/978-1-6684-3460-4.ch022
|View full text |Cite
|
Sign up to set email alerts
|

Change From Within

Abstract: The author reflects on her own journey through academia and the moments in which change has and has not happened throughout her time as a doctoral student to understand what foundations are needed for transformational change in society and the implications of these implications on academia. Though this process of reflection, the author argues that the bedrock of societal transformation is change that begins within and through experience. These experiences allow for the individual to embody the radical ideas ne… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 7 publications
0
1
0
Order By: Relevance
“…For instance, a notable incident occurred in June 2022 when Turkish Pegasus Airlines experienced a substantial data breach, exposing approximately 6.5 TB of sensitive flight data due to unprotected AWS cloud storage [12]. Another critical issue is ensuring data availability, user data has always been collected and processed by service providers, which results in users losing control over accessing and extracting their self-generated data, so many advocate for user-centered storage models to empower end-users with control over their data access [13,14]. Furthermore, escalating cybersecurity threats compound these challenges, particularly in domains like smart cities, where attackers exploit vulnerabilities to access and exploit private data for extortion or fraud [15].…”
Section: Introductionmentioning
confidence: 99%
“…For instance, a notable incident occurred in June 2022 when Turkish Pegasus Airlines experienced a substantial data breach, exposing approximately 6.5 TB of sensitive flight data due to unprotected AWS cloud storage [12]. Another critical issue is ensuring data availability, user data has always been collected and processed by service providers, which results in users losing control over accessing and extracting their self-generated data, so many advocate for user-centered storage models to empower end-users with control over their data access [13,14]. Furthermore, escalating cybersecurity threats compound these challenges, particularly in domains like smart cities, where attackers exploit vulnerabilities to access and exploit private data for extortion or fraud [15].…”
Section: Introductionmentioning
confidence: 99%