Link
Search
Menu
Expand
Document
Cybersecurity Research
Papers
5G
§ 5G Technology, U.S. - China Race, And the Competition for Dominance
Chapter 1 - Introduction
Chapter 2 - History of 5G
Chapter 3 - China and 5G
Chapter 4 - United States and 5G
Chapter 5 - Europe and 5G
Chapter 6 - The Context of 5G Competition - U.S.-China Relationship
Chapter 7 - Assessments and Projections
Chapter 8 - Policy Implications and Responses
Chapter 9 - Conclusion and Outlook
List of References
Artificial Intelligence
§ Artificial Intelligence and the Ethics Behind It
Introduction
What is Artificial Intelligence
How Artificial Intelligence Is Used Today
Benefits of Artificial Intelligence
Artificial Intelligence and the Ethics Driving It
Social Media – A Doppelganger in the Cloud
The Future of AI
Conclusion
References
Breaches
§ Impact of Information Breaches on Health Care Records
Chapter 1 - Introduction to the Study
Chapter 2 - Literature Review
Chapter 3 - Research Method
Chapter 4 - Results
Chapter 5 - Discussion, Conclusions, and Recommendations
References
Behavior
§ Bullying in the C-Suite - A Nurse Leader Perspective
§ Behavioral Skills Training to Teach Online Safety Responses to Youth with Autism Spectrum Disorder
Introduction
Method
Results
Discussion
References
Table 1
Figure 1
§ Grief is love with nowhere to go
I’ve been trying to think ...
In the fall of 2016 ...
I often wondered ...
In the months before ...
“PlushieCouture” on Etsy ...
I often wondered—and still do wonder ...
It wasn’t until the end ...
When I thought about ...
I sent Claire a few ...
I had a dream about ..
Years after my sexual ...
In the same conversation ...
§ Dating App Facilitated Sexual Violence - The Prevalence and Mental Health Effects
INTRODUCTION
CHAPTER 1 - LITERATURE REVIEW
CHAPTER 2 - METHODS
CHAPTER 3 - RESULTS
CHAPTER 4 - DISCUSSION
CHAPTER 5 - STRENGTHS, LIMITATIONS, AND SUGGESTIONS FOR FUTURE RESEARCH
CHAPTER 6 - CONCLUSION
APPENDIX A - RESEARCH STUDY TABLES
APPENDIX B - DATING APP USE FIGURES
APPENDIX C - DEMOGRAPHIC QUESTIONS
APPENDIX D - TECHNOLOGY FACILITATED SEXUAL VIOLENCE MEASURE
APPENDIX E - GENERAL SEXUAL VIOLENCE QUESTIONS
APPENDIX F - POST-TRAUMATIC STRESS DISORDER MEASURE
APPENDIX G - DEPRESSION MEASURE
APPENDIX H - ANXIETY MEASURE
APPENDIX I - SELF-ESTEEM MEASURE
APPENDIX J - LONELINESS MEASURE
APPENDIX K - PERCEIVED SELF-CONTROL MEASURE
APPENDIX L - MENTAL HEALTH RESOURCES PROVIDED
APPENDIX M - IRB APPROVAL LETTER AND MODIFICATION
REFERENCES
Cybercrime
§ When Does a Cyber Crime Become an Act of Cyber Warfare
§ Are Terrorist Networks Just Glorifified Criminal Cells?
§ CYBER AND TRIA - EXPANDING THE DEFINITION OF AN “ACT OF TERRORISM” TO INCLUDE CYBER ATTACKS
§ Deterrence and Response Improvements for a Large-Scale Cyberterrorism Attack
Chapter 1 - Introduction to the Study
Chapter 2 - Literature Review
Chapter 3 - Research Method
Chapter 4 - Results
Chapter 5 - Discussion, Conclusions, and Recommendations
References
Appendix A - Interview Protocol
Appendix B - Interview Questions
Appendix C - Second Cycle Codes
§ Illicit Activity Detection in Large-Scale Dark and Opaque Web Social Networks
§ The Future of Cybercrime Prevention Strategies - Human Factors and A Holistic Approach to Cyber Intelligence
§ Anti-Money Laundering
§ Industry of Anonymity - Inside the Business of Cybercrime, by Jonathan Lusthaus
Cryptocurrency
§ Evaluating Security in Cryptocurrency Wallets
Chapter I - Introduction
Chapter II - Background and Review of Literature
Chapter III - Methodology
Chapter IV - Data Presentation and Analysis
Chapter V - Results, Conclusion, and Recommendations
References
§ Crypto and Blockchain Fundamentals
I. FROM THE “INTERNET OF INFORMATION” TO THE “INTERNET OF VALUE”
II. THE INGENUITY AND LIMITATIONS OF BITCOIN
III. Beyond Bitcoin - Other Technical Innovations
IV. BLOCKCHAIN-BASED APPLICATION EXAMPLES
V. New Fundraising Models
VI. WHY THE “INTERNET OF VALUE” NEEDS LEGAL PRACTITIONERS
§ Blockchain-mediated Licensing - Legal Engineering for Artist Empowerment
Introduction
Part I)Background Research > 1)Literature Review > 1.1) Scoping Review
1.2 Research Questions
1.3 Report Structure
1.4 Research Methodology
1.5 Music Business Perspective
1.6 Legal Perspective
1.7 Automation Perspective
1.8 Value Web Perspective
2) Music Industry Supply Chain and Work Registration Standards
3) Legal Frameworks Primer
4) Music Licensing Primer
5) Technology Primer
Part II) Ricardian Contract > 6) Motivation
7) Decentralized Media Platforms
8) Methods
9) Discussion
Conclusion
References
Appendix
§ TOKEN TAXONOMY - The Need for Open-Source Standards Around Digital Assets
§ Who Owns Bitcoin? Private Law Facing the Blockchain
INTRODUCTION
A. DOES CODE NEED LAW?
B. CODE’S RESISTANCE TO THE LAW
C. HOW TO RECONCILE DLT AND PRIVATE LAW
D. COUNTER-ARGUMENTS AND COMPLICATIONS
CONCLUSION
§ U.S. Regulation of Blockchain Currencies - A Policy Overview
Children
§ Art and Eco Therapies - Benefifits to Motor Development of Preschool-Age Children in the Screen Era
Introduction
Methods
Child Development
Development, Screens, and Nature
Ecotherapy
Art Therapy
Art and Ecotherapy
Art-Eco Therapy and Child Motor Skills
Discussion
References
Cyberbully
§ Is There a Relationship Between the Number of Female Students Who Were Cyberbullied and the Number of Female Students Who Seriously Considered Attempting Suicide?
I. INTRODUCTION
II. LITERATURE REVIEW
III. METHODOLOGY
IV. RESULTS
V. DISCUSSION
REFERENCES
§ Cyberbullying and Punishments (Concentrating on Kerala Women)
Kerala a South Indian State
Cyber Harassment Cases in Kerala and Culture
How fish fries can make someone feminist?
Parvathy Thiruvothu- A Fearless Woman
Bhagyalakshmi and group
Ethically Right Or Wrong?
A Positive Change
References
Data Protection
§ The European Union - Data Protection for Economic Competition and Regional Security
§ How the Growth of Technology has Forced Accounting Firms to put an Emphasis on Cybersecurity
Encryption
§ Cryptography, Passwords, Privacy, and the Fifth Amendment
Electric Vehicle
§ Cybersecurity Best Practices for the Safety of Modern Vehicles
§ Cybersecurity of Smart Electric Vehicle Charging - A Power Grid Perspective
§ Electric Vehicle Charging Infrastructure Trends from the Alternative Fueling Station Locator - First Quarter 2020
§ Securing Vehicle Charging Infrastructure
§ DOE/DHS/DOT Volpe Technical Meeting on Electric Vehicle and Charging Station Cybersecurity Report
1. Background / Introduction
2. Organizational Structure
3. Incorporating Cybersecurity into Design
4. Trust
5. Ownership and Maintenance
6. Coordination
7. Gaps and Conclusions
Appendix A - Electric Vehicle Technical Standards Overview
§ National Plug-In Electric Vehicle Infrastructure Analysis
1 Introduction
2 Existing Vehicle and Infrastructure Status
3 Non-Residential L2 and DCFC for Community Charging
4 DCFCs for Corridor Charging
5 Conclusions
References
Appendix A - Supplementary Statistics on Existing EVSE
Appendix B - EVSE/PEV Adjustment Factors to Account for Local Conditions
Appendix C - Central Scenario PEV/EVSE Estimates by State
Appendix D - Long-Distance Travel Frequency from the SHRP2 NDS
§ Cybersecurity Best Practices for Modern Vehicles
Education
§ CYBERSECURITY - CREATING A CYBERSECURITY CULTURE
CHAPTER ONE - INTRODUCTION
CHAPTER TWO - CYBERCRIME IN GOVERNMENTS
CHAPTER THREE - METHODOLOGY
CHAPTER FOUR - RESULTS
CHAPTER FIVE - DISCUSSION
REFERENCES
§ An exploratory study of mode efficacy in cybersecurity training
INTRODUCTION
THEORY AND HYPOTHESES
METHOD
RESULTS
DISCUSSION AND CONCLUSIONS
REFERENCES
Forensics
§ Towards Increasing Trust In Expert Evidence Derived From Malware Forensic Tools
1. INTRODUCTION
2. BACKGROUND AND RELATED WORK
3. REQUIREMENTS FOR CONDUCTING MALWARE FORENSICS
4. DESIGN OF THE FRAMEWORK
5. DISCUSSION
6. CONCLUSIONS AND FURTHER WORK
7. REFERENCES
Hacker
§ Assessing the Credibility of Cyber Adversaries
Introduction
Literature Review and Methodology
Proposed Model for Online Adversary Credibility Assessment
Discussion
Limitations and Future Directions
Summary
Declaration of Interest Statement
References
§ Subculture of Hackers in Russia
Health
§ Effects of Social Technology on Older Adults in a Residential Living Facility
Introduction
Literature Review
Methods
Results
Discussion
Conclusion
References
Appendix A
Appendix B
Appendix C
Identity
§ Digital Identity - A Human-Centered Risk Awareness Study
CHAPTER ONE - INTRODUCTION
CHAPTER TWO - ABOUT IDENTITY
CHAPTER THREE - LITERATURE REVIEW
CHAPTER FOUR - METHODOLOGY
CHAPTER FIVE - FINDINGS
CHAPTER SIX - DISCUSSION
REFERENCES
APPENDIX A - INTERVIEW SOLICITATION FLYER
APPENDIX B - IRB VERBAL CONSENT FORM
APPENDIX C - INTERVIEW QUESTIONNAIRE
APPENDIX D - IRB APPROVAL EXEMPT FORM
APPENDIX E - ITRC 2019 DATA BREACH REPORT STATISTICS
§ The District of Columbia Circuit Finds Article III Standing Based on the Risk of Future Identity Theft in In re U.S. Office of Personnel Management Data Security Breach Litigation
Internet
§ “Draw the Internet.” A visual exploration of how children think an everyday technology.
§ Cyberbullying - Its Social and Psychological Harms Among Schoolers
Introduction
Literature Review
Methods
Results
Discussions
Conclusion
Declaration of Interest Statement
References
§ Jack Voltaic 3.0 Cyber Research Report
1. FOREWORD
2. ACKNOWLEDGMENTS
3. INTRODUCTION - JACK VOLTAIC 3.0
4. JACK VOLTAIC RESEARCH METHODOLOGY
5. EXECUTION
6. FINDINGS
7. CONCLUSION
APPENDIX A – ACRONYMS
APPENDIX B – PARTNERS
APPENDIX C – SCENARIO
APPENDIX D – LAW/POLICY TABLETOP EXERCISE (TTX)
APPENDIX E – LIVE-FIRE EXERCISE
APPENDIX F – MILITARY TESTIMONIALS
APPENDIX G – PRIVATE INDUSTRY TESTIMONIALS
APPENDIX H – ALL HAZARDS ANALYSIS (AHA)
APPENDIX I – CIRI FORT-TO-PORT DISRUPTION
APPENDIX J – REQUIRED DELIVERY DATE (RDD) SIMULATION
APPENDIX K – DSCA/DSCIR
§ The Brick-and-Mortar Bank is Dead — COVID-19 Killed It
I. INTRODUCTION
II. BACKGROUND ON DATA SECURITY IN THE FINANCIAL SERVICES INDUSTRY
III. DATA PROTECTION LAWS REGULATING CONSUMER FINANCIAL INFORMATION
IV. THE PRESENT IMPACT OF COVID-19 ON THE BANKING INDUSTRY
V. THE FUTURE IMPACT OF COVID-19 ON THE BANKING INDUSTRY
VI. RECOMMENDATIONS FOR NAVIGATING BANKING POST COVID-19
VII. CONCLUSION
§ PREVALENCE OF CYBERBULLYING AMONG TRADITIONAL UNDERGRADUATE STUDENTS ATTENDING FAITH-BASED UNIVERSITIES - A CAUSAL-COMPARATIVE STUDY
CHAPTER ONE - INTRODUCTION
CHAPTER TWO - LITERATURE REVIEW
CHAPTER THREE - METHODS
CHAPTER FOUR - FINDINGS
CHAPTER FIVE - CONCLUSIONS
REFERENCES
APPENDIX A - CYBERBULLYING AND ONLINE AGGRESSION SURVEY
APPENDIX B - DUKE UNIVERSITY RELIGION INDEX (DUREL)
APPENDIX C - INSTITUTIONAL REVIEW BOARD PERMISSION
APPENDIX D - STUDENT RECRUITMENT EMAIL
APPENDIX E - PARTICIPANT CONSENT FORM
APPENDIX F - STUDENT THANK YOU E-MAIL
APPENDIX G - STUDENT RECRUITMENT FOLLOW-UP E-MAIL
APPENDIX H - PERMISSION CORRESPONDENCE TO CONDUCT RESEARCH
§ Aspects of the Cybersecurity Ecosystem in the United States
§ Articulating the Cloud - Understanding Data Centers, Renewable Energy, and Public Policy
CHAPTER ONE - INTRODUCTION
CHAPTER TWO - REVIEW OF LITERATURE
CHAPTER THREE - METHOD
CHAPTER FOUR - FINDINGS
CHAPTER FIVE - ANALYSIS
CHAPTER SIX - CONCLUSION
APPENDICES
REFERENCES
§ A COPY OF A COPY OF A COPY - INTERNET MIMESIS AND THE COPYRIGHTABILITY OF MEMES
§ Cyber Security’s Influence on Modern Society
§ Cyber Mobs, Disinformation, and Death Videos - The Internet as It Is (and as It Should Be)
§ Internet Architecture and Disability
INTRODUCTION
I. TITLE III AND THE INTERNET - THE WEB AS THE INTERNET AND THE WEBSITE AS THE PLACE
II. INTERNAL/EXTERNAL PERSPECTIVES ON INTERNET ACCESSIBILITY - WEBSITECENTRISM VS. LAYER-CONSCIOUSNESS
III. A LAYER-CONSCIOUS APPROACH TO INTERNET ACCESSIBILITY
CONCLUSION
§ The Internet as a Speech Machine and Other Myths Confounding Section 230 Reform
§ The Networked Question in the Digital Era - How Do Networked, Bounded, and Limited Individuals Connect at Different Stages in the Life Course?
Infrastructure
§ Construction Cybersecurity and Critical Infrastructure Protection - Significance, Overlaps, and Proposed Action Plan
§ Securing Cyber Assets - Addressing Urgent Cyber Threats to Critical Infrastructure
Introduction
Recommendations and Supporting Findings
Moving Forward - Fundamental Change
Appendix
§ NESCOR Guide to Penetration Testing for Electric Utilities
1 Introduction
2 Penetration Test Scoping
3 Target System Setup
4 Embedded Device Penetration Tasks
5 Network Communications Penetration Tasks
6 Server OS Penetration Tasks
7 Server Application Penetration Tasks
8 End-to-End Penetration Test Analysis
9 Result Interpretation and Reporting
Internet of Things
§ A Review on Emerging Threats and Vulnerabilities in Internet of Things and its Applications
Law
§ Handle with Care - Domestic Violence Safety Planning in the Age of Data Privacy Laws
I. INTRODUCTION
II. DOMESTIC VIOLENCE TERMS AND CLARIFICATIONS
III. DOMESTIC VIOLENCE LEGAL STRUCTURE AND SYSTEM
IV. ADVOCACY ORGANIZATIONS AS NON-LEGAL RELIEF FOR DOMESTIC VIOLENCE SURVIVORS
V. TECHNOLOGY AS A NEW TOOL FOR ABUSE
VI. DATA AND INFORMATION-DRIVEN TECHNOLOGY ABUSE
VII. DATA PRIVACY PROTECTION LAWS
VIII. WHERE DATA PRIVACY PROTECTION LAWS CAN HELP DOMESTIC VIOLENCE SURVIVORS
IX. SAFETY PLANNING IN THE MODERN AGE
X. CONCLUSION
§ The Bumble Bill - A Critical Analysis on Texas’s New Law Taking Indecent Exposure Regulations Online
I. INTRODUCTION
II. OVERVIEW
III. TEXAS PENAL CODE SECTION 21.19 WILL BE DECLARED UNCONSTITUTIONAL
IV. UNDERLYING ISSUES
V. TEXAS PENAL CODE SECTION 21.19 FILLS THE GAP FOR DIGITAL SEXUAL HARASSMENT
VI. CONCLUSION
§ Unfriending Tinker - The Third Circuit Holds Schools Cannot Regulate Off-Campus Social Media Speech
I. NOW TRENDING - THE INCREASE IN SOCIAL MEDIA USE AND ITS CONSEQUENCES
III. SNAPCHAT STORY TO SUSPENSION - THE FACTS OF B.L
IV. THE THIRD CIRCUIT HAS ENTERED THE CHAT
V. PUTTING A FILTER ON SPEECH
VI. TTYL
§ Repeal the Defend Trade Secret Act - Why Congress Can't Rely on Trade Secret Law to Protect America's Trade Secrets
§ Israel’s Perspective on Key Legal and Practical Issues Concerning the Application of International Law to Cyber Operations
§ The Internet Never Forgets - A Federal Solution to the Dissemination of Nonconsensual Pornography
Privacy
§ Privacy in the Public Eye - Frogs Boiling and the Right to Privacy
I. INTRODUCTION
II. BACKGROUND
III. RESEARCH DESIGN
IV. FOCUS GROUP FINDINGS
V. THE RESIGNATION CURVE - PROFILES IN PRIVACY
VI. CONCLUSION - REFRAMING PRIVACY’S MEANING
APPENDIX A - GENERAL SCRIPT/QUESTIONS FOR FOCUS GROUPS
APPENDIX B - RESPONDENTS’ ONE-WORD DESCRIPTIONS OF PRIVACY IN THE FUTURE
§ DIGITAL DOMINION - How the Syrian regime’s mass digital surveillance violates human rights
I. Introduction
II. Factual Background - Telecommunications Infrastructure and Key Players
III. Human Rights and Surveillance
IV. How Surveillance Leads to Censorship, Monitoring, Hacking and Violence
V. Conclusion
§ A Post for Change - Social Media and the Unethical Dissemination of Nonconsensual Pornography
§ Cryptography, Passwords, Privacy, and the Fifth Amendment
§ A New Compact for Sexual Privacy
Introduction
I. UNDERSTANDING PRIVATE-SECTOR SURVEILLANCE OF INTIMATE LIFE
II. ASSESSING THE DAMAGE AND LAW’S RESPONSE
III. REIMAGINING PROTECTIONS FOR INTIMATE INFORMATION
CONCLUSION
§ Revenge Porn and the First Amendment - Should Nonconsensual Distribution of Sexually Explicit Images Receive Constitutional Protection?
Politics
§ Unilateral Economic Sanctions and Protecting U.S. National Security
I. Introduction
II. Conventional Nation-Wide Sanctions
III. Legislative Bases of U.S. Unilateral Economic Sanctions Regulations
IV. National Security Challenges to the U.S. Unilateral Economic Sanctions
V. Effectiveness of U.S. Unilateral Economic Sanctions
VI. Unilateral Economic Sanctions and the Fight Against Terrorism
VII. Alternative Solutions
VIII. Conclusion
§ Information Age Imperialism - China, ‘Race,’ and Neo-Colonialism in Africa and Latin America
I. INTRODUCTION
II. CHINA IN CRISIS
III. STATE-SPONSORED DOMESTIC TERROR
IV. GREAT POWER COMPETITION
V. COLONIALISM
VI. CHINESE NEO-COLONIALISM
VII. CONCLUSION - AMERICAN PROTEST, GLOBAL FREEDOM
§ Defending Democracy - Taking Stock of the Global Fight Against Digital Repression, Disinformation, and Election Insecurity
I. Introduction
II. Unpacking the Cyber Threat to Democracies
III. U.S. Efforts to Protect Democratic Institutions
IV. Lessons from Other Democracies
V. Implications for Policymakers
VI. Conclusion
§ Great Power Politics - The United States’ War on Disinformation with Consideration to Russian and Chinese Offensive Efforts
Introduction and Overview
Russian Disinformation Efforts
Chinese Disinformation Efforts
Conclusion — Evaluating Future Strategies
Works Cited
§ Cyber Mercenaries - A New Threat to National Security
§ Cybersecurity in Elections - Models of Interagency Collaboration
1. Introduction
2. Cyberthreats throughout the electoral cycle
3. Models of interagency collaboration
4. Operationalizing interagency collaboration
5. Conclusions and recommendations
Annex A - Case studies
References and further reading
About the authors
About International IDEA
§ Nation-State Hacking - Uniting Policy and Code to Limit the Threat
Phishing
§ Applying Usability Methods to Categorization of Phishing Emails
Pornography
§ Exposure to Pornography Among Young Eritreans - An Exploratory Study
Introduction
Literature Review
Methods
Results
Conclusion
References
Software Security
§ Web Application Security - Report from Dagstuhl Seminar 18321
§ Web Application Security - Report from Dagstuhl Seminar 12401
Social Engineering
§ Gophish - Implementing a Real-World Phishing Exercise to Teach Social Engineering
Social Media
§ Media Consumption Effect on Therapuetic Aesthetics
Literature Review
Discussion
§ Social Media Awareness - The Impact of Social Media on Mental Health
Introduction
Literature Review
Training Information
Training
References
§ The Threat of Social Media to Society and National Security - A Call for Social Media Policy and Legislation
§ Social Media User Relationship Framework (SMURF)
1. INTRODUCTION
2. LITERATURE REVIEW
3. SMURF
4. BUILDING THE SMURF FRAMEWORK
5. CREATING A POC SMURF IMPLEMENTATION
6. CASE STUDY - SMURF ON TWITTER
7. DISCUSSION
8. CONCLUSION AND FUTURE WORK
REFERENCES
A.
§ PREVENTATIVE STEPS SOCIAL NETWORKS, SUCH AS FACEBOOK, TAKE AGAINST SEX TRAFFICKING
CHAPTER 1 SEX TRAFFICKING IN AMERICA THROUGH FACEBOOK
CHAPTER 2 METHODOLOGY
CHAPTER 3 RESULTS
CHAPTER 4 DISCUSSION
CHAPTER 5 SUMMARY
REFERENCES
APPENDIX
Sex
§ The Factors Involved in the Exit from Sex Trafficking - A Review
Introduction
Theoretical Background
Methods
Results
Discussion
Conclusion
References
§ A Study of Recidivism among Online Sexual Predators
A Study of Recidivism Among Online Sexual Predators
Literature Review
Gaps in the Literature
Methodology
Data Analysis
Discussion and Conclusion
Appendix
ENDNOTES
Women
§ Impact of Social Media on Feminism
§ The Red Swimsuit - Essays
INTRODUCTION
The Red Swimsuit
The New YouTube - Suburbia & Sleek Sabotage
A Record of the World as She Sees It
Reckoning Your Barbie Savior
Wanted - Someone with Whom to Simply Pass the Days
NOTES
ACKNOWLEDGMENTS
Work
§ Employment Status for “Essential Workers” - The Case for Gig Worker Parity
I. INTRODUCTION
II. GIG WORKERS - A STUDY IN PRECARITY
III. GIG WORKERS AND THE PROBLEM OF EMPLOYMENT CLASSIFICATION
IV. Gig Workers as Essential Workers
V. THE ARGUMENT FOR PARITY
VI. CONCLUSION
§ Digitizing the ‘Ideal’ Latina Information Worker
Introduction
Designing Virtual Assistants as Virtual Workers
Latinas as labor problem and solution
Gender-coding controllable workers
Designing the ‘right kind’ of Latina
Consumable Latinidad
Digital Formations of In/visible Latina Information Labor
References
Just the Docs on GitHub
Behavior
§ Behavioral Skills Training to Teach Online Safety Responses to Youth with Autism Spectrum Disorder
Table 1
Table 1
IRPI Probes Types Used During Baseline, BST and Posttest Conditions
Table 1
IRPI Probes Types Used During Baseline, BST and Posttest Conditions
Table of Contents
Introduction
Method
Results
Discussion
References
Table 1
Figure 1
Table of contents