AI-based sentiment analysis has recently proven useful through the mining of large amounts of text. These texts can be drawn from various sources, but most valuably can be used to reach conclusions about public opinion, especially regarding current events. As a result, sentiment analysis provides a method for researchers to determine public opinion under…
Digital autocracies leverage invasive technologies to carry out common authoritarian practices that aim to quell dissent, suppress democratic movements, and control their citizens through restricting their internet freedom. Azerbaijan exemplifies this through the documented surveillance of its dissidents. The social landscape of Azerbaijan disproportionately targets women through shame tactics that have transitioned to the…
Neurotechnology, the integration of technology with the nervous system, is an advancing field with potential medical applications by offering individuals with neuromuscular disorders or physical injuries an alternative means of communication beyond traditional verbal speech. One such advancement is the development of an electroencephalography-based brain-computer interface (EEG-based BCI) system, which functions to record and…
Internet censorship has long been a controversial issue which involves the selective restriction of information. This could simply be as mundane as upholding copyright laws, but censorship also extends into political repression and human rights violations. Restrictive and authoritarian regimes have been shown to be far more likely to suppress political content to subdue…
For as long as the TOR network has existed one of its primary uses has been the circumvention of Internet firewalls run by oppressive regimes. Iran is no exception to this trend, and in as early as 2011 Iran was the 2nd highest country by TOR users.1 There was even a point where TOR…
The Tor network provides unparalleled anonymity to its users. Using anonymity features on top of TCP, The Onion Router has proved useful for moderately low-latency tasks such as web browsing (Borinsov and Goldberg 2008). Tor networks operate through a network of thousands of decentralized, independently run nodes across the world. To connect to the…
Last week I arrived in Kyiv after 48 hours to planes and trains to a rain and snow mix falling on the Kyiv central train station. Men eagerly ran up to the arriving train carriages with flowers in hand to greet wives and girlfriends who had made the journey back to Ukraine. The train…
In the ever-evolving landscape of healthcare, the significance of cybersecurity cannot be overstated, as it plays a pivotal role in both preserving the integrity of services and safeguarding sensitive patient data. With the continuous digitization of healthcare, including the widespread adoption of electronic health records and the integration of new medical devices, the need…
The term “medical devices” is usually used very broadly when referring to a type of technology that helps patients with their health. There are challenges with the categorization of medical devices that might impact their approval process and their availability on the market for patients and providers to use. A slower and more diligent…
It was a privilege to have been asked to represent Virginia Tech at the 74th Annual Class of 1971 Student Conference on U.S. Affairs – SCUSA 74. This conference has been occurring since 1949 and this year, the class of 1971 graciously donated funds for this event. Since 1949, delegates both nationally and internationally…