-
101
-
102
-
103
-
104
The razor's edge of the news malfunction in cyberspace: The narrative of the Yazdian youth about the spread of rumors in cyberspace
Published 2022-12-01Subjects: Get full text
Article -
105
-
106
-
107
-
108
-
109
-
110
-
111
-
112
-
113
SELECTED MODELS OF INFORMATION WARFARE IN CYBERSPACE
Published 2017-03-01Subjects: “…cyberspace…”
Get full text
Article -
114
Cyberanalysis: Transference and Its Management in the Cyberspace
Published 2006-06-01Get full text
Article -
115
Cyberspace Protection – the Challenge of Our Time?
Published 2018-04-01Subjects: “…cyberspace…”
Get full text
Article -
116
“Just Chatting”: Research Ethics and Cyberspace
Published 2007-06-01“…In this article the author examines the changing role of assent/consent, confidentiality, and participant observation in qualitative research conducted in cyberspace. She concludes that REBs (research ethic boards) might be becoming more conservative in their decisions at the very moment that Internet research requires more flexibility and broader ethical definitions.…”
Get full text
Article -
117
Cyberspace and individual: a possible synthesis?
Published 2012-05-01“…From this concept derives the duality between “global” and “local”, submitted to economic, political, social and cultural processes, which in a closer examination shows the confl uence of latent crisis regarding the individual identity, even more oriented by global processes, inserted in an also global and virtual space, cyberspace. It follows, however, the problematic about the loss of individuals humanity by the impersonal logic of consumerism and its infl uence on individual thought.…”
Get full text
Article -
118
Research on cyberspace security situation awareness
Published 2016-10-01“…Cyberspace is the fifth sovereignty space after the sea,land,sky and space.The security of cyberspace is closely relative to national security.How to discover threat in time,how to defense network attack,how to trace attackers were the problems to be selved.Facing the polyphyletic,isomeric,disconnected properties in the cyberspace,bases on a credible IaaS,a cyberspace security situation awareness was constructed by ontology,semantic Web and linked data theory.While guarantee the access security of integrating data,the model could make a comprehensive analysis on the properties in the cyberspace,which contributes to cyberspace governance.…”
Get full text
Article -
119
Aspects of size and geography of an African cyberspace
Published 2010-01-01Subjects: Get full text
Article -
120
Modelling Hegemonic Power Transition in Cyberspace
Published 2018-01-01“…Cyberspace is the newest domain of conflict and cooperation between states. …”
Get full text
Article