Papers by Judith Tabron
Modelado de la biodegradación en biorreactores de lodos de hidrocarburos totales del petróleo int... more Modelado de la biodegradación en biorreactores de lodos de hidrocarburos totales del petróleo intemperizados en suelos y sedimentos (Biodegradation modeling of sludge bioreactors of total petroleum hydrocarbons weathering in soil and sediments)

The interactive human components of serious cybersecurity breaches continue to be a problem for e... more The interactive human components of serious cybersecurity breaches continue to be a problem for every organization. Helping people identify social engineering attempts over the phone will be cheaper and more effective than yet another technological implementation. At minimum it will add an important and necessary layer to defense in depth.
Forensic linguistics is the study of language as evidence for the law. It is a relatively new field and has not previously been applied to cybersecurity. Linguistic analysis uncovers several features of language interaction in a limited data set (recorded IRS phone scammers) that begin to answer how forensic linguistics could assist in cybersecurity defense.
This paper will briefly introduce and explain polar tag questions, topic control, question deferral, and irregular narrative constructions in IRS scam phone calls, and offer some starting points for identifying such linguistic properties during the course of a phone call to help improve defense at the human level.
Aligning IT management with the university's instructional goals.
One of the features common to postcolonial literature from all nations is a preoccupation with ma... more One of the features common to postcolonial literature from all nations is a preoccupation with maps - maps, which encapsulate the other concerns of postcolonial literature: history, technology, and writing itself. Patrick White's Voss illustrates and illuminates Australia's creation and depiction of itself.
slayageonline.com
Click on a contributor's name in order to learn more about him or her.
... Her ongoing projects include 'Kathinka Zitz-Halein&a... more ... Her ongoing projects include 'Kathinka Zitz-Halein', 'Adalbert Stifter', 'Women Warriors in Literature and History' and 'Relationship Triangles in Early German Science Fiction (Kurt LaBwitz)'. Jo Storm is a writer and academic who lives in Toronto, Ontario. ... Walter Harriman Maj. ...
Chronicle of Higher Education, 2008
Three years ago, when I returned to university information-technology administration from teachin... more Three years ago, when I returned to university information-technology administration from teaching, I thought that I might have missed key developments in the uses of technology for teaching purposes during my two years away. Two years is a long time in technology terms. But most of the issues facing instructional technology are the same now as they were 15 years ago, when I started using technology to try to foster changes in teaching.
Slayage: The Online International Journal of …, 2004
Teaching Documents by Judith Tabron
Lists research on the linguistics of hate speech, particularly from the point of view of its usef... more Lists research on the linguistics of hate speech, particularly from the point of view of its usefulness to forensic linguistics students and researchers, but also with an eye toward what texts might be useful to anyone in the social sciences wanting to teach about hate speech in the undergraduate or graduate classroom.
Drafts by Judith Tabron
Word choices in our 2020 conventions, 2020
White paper analyzing language used at both the Democratic and Republican party conventions in 20... more White paper analyzing language used at both the Democratic and Republican party conventions in 2020, discussing word choices that stood out when analyzed in comparison to a corpora of standard English and when analyzed in comparison to each other.
Uploads
Papers by Judith Tabron
Forensic linguistics is the study of language as evidence for the law. It is a relatively new field and has not previously been applied to cybersecurity. Linguistic analysis uncovers several features of language interaction in a limited data set (recorded IRS phone scammers) that begin to answer how forensic linguistics could assist in cybersecurity defense.
This paper will briefly introduce and explain polar tag questions, topic control, question deferral, and irregular narrative constructions in IRS scam phone calls, and offer some starting points for identifying such linguistic properties during the course of a phone call to help improve defense at the human level.
Teaching Documents by Judith Tabron
Drafts by Judith Tabron
Forensic linguistics is the study of language as evidence for the law. It is a relatively new field and has not previously been applied to cybersecurity. Linguistic analysis uncovers several features of language interaction in a limited data set (recorded IRS phone scammers) that begin to answer how forensic linguistics could assist in cybersecurity defense.
This paper will briefly introduce and explain polar tag questions, topic control, question deferral, and irregular narrative constructions in IRS scam phone calls, and offer some starting points for identifying such linguistic properties during the course of a phone call to help improve defense at the human level.