Internet users are often victimized by malicious attackers. Some attackers infect and use innocent users’ machines to launch large‐scale attacks without the users’ knowledge. One…
The increasing traffic volume and new requirements of highly scalable and efficient distribution of contents exceed the capabilities of the current Internet architecture. Information centric…
Burdens of poverty are often compounded by respiratory problems. This study aimed to identify the support needs and intervention preferences for low-income families facing this…
In this book, I propose a theory of equality centred on human flourishing or wellbeing, and argue that egalitarianism should be understood as seeking to make…
Are NATO’s mutual security commitments strong enough today to deter all adversaries? Is the nuclear umbrella as credible as it was during the Cold War?…
See also “Surveillance Culture: Engagement, Exposure and Ethics in Digital Modernity” The International Journal of Communication. 11, 2017. Surveillance stories hit the headlines almost every…
Surveillance is sometimes spoken of as a God’s eye view of the world. This idea is explored in relation to the ‘objective gaze’ of disengaged…
This SSHRC funded project is led by SSC Director David Lyon, with a team of five co-investigators, ten collaborators, and ten national and international academic…
The controls on the mobility and fate of arsenic in lakes impacted by historical gold ore roasting in northern Canada have been examined. A detailed…
The Mount Polley mine tailings embankment breach on August 4th, 2014, in British Columbia, Canada, is the second largest mine waste spill on record. The…