Browsing by Subject "Exploitation"
Now showing items 1-2 of 2
-
An analysis into the exploitation of the post-attendee URL feature in Zoom webinar regarding malware transmission
(2022)In response to the COVID-19 pandemic, large businesses and organizations relied on video conferencing applications such as Zoom to maintain public health guidelines due in part to their robust set of features to facilitate ... -
Beyond Exploitation: Metadata Justice and Prison Labor
(2023-07-20)Large-scale digitization projects require enormous amounts of resources and labor, both of which are frequently in short supply in libraries and archives. How, then, has Oklahoma’s Yearbook Project been able to scan and ...