• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 191
  • 109
  • 40
  • 14
  • 7
  • 5
  • 4
  • 4
  • 4
  • 4
  • 4
  • 4
  • 4
  • 4
  • 3
  • Tagged with
  • 437
  • 155
  • 116
  • 86
  • 70
  • 63
  • 58
  • 53
  • 52
  • 49
  • 42
  • 42
  • 42
  • 37
  • 36
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
111

Blurred Boundaries and Return to Authenticity: Image Politics of Arts in Cyberspace

Chiu, Chih-yung 07 October 2005 (has links)
No description available.
112

Ontological Security: State Identity and Self-Image in the Digital Age

Ralston, Robert James 17 June 2014 (has links)
The driving argument of this thesis is that states, particularly the United States, are vulnerable in cyberspace for reasons that go beyond the material vulnerabilities that present studies on state insecurity in cyberspace focus on. This vulnerability in cyberspace is an ontological insecurity. Ontological insecurity reveals itself in the contradictions in official state discourse regarding cyberspace. State security of self—preserving and maintaining the seemingly concrete and consistent nature of what a state is about, how the state is understood in relation to other states, and how the state comes to understand itself through its own conceptions of self-identity—is challenged by cyberspace as a vehicle for massive amounts of information and challenges to state identity in relation to the state's behavior in cyberspace. Therefore, state identity and self-image are challenged in relation to cyberspace in two ways: first, through the vehicle that is cyberspace, and, second, through the practices that the state adopts to secure cyberspace and its broader security aims. The language that states, in this case the United States, use in order to justify surveillance practices and to impose meaning to cyberspace ultimately leads to projections of power that attempt to reinforce state strength and legitimacy vis-à-vis cyberspace, but these attempts fall short; contradictions arise in state discourse, and weaknesses are highlighted through these contradictions. Cyberspace, then, is an ontological as well as physical security threat to states. / Master of Arts
113

Instant Messaging Usage and Academic and Social Integration

Wood, Kia Jannelle 16 January 2008 (has links)
Research suggests that college students persist in college when they feel connected to something or someone at their institution. These connections are often established through academic and social engagement. Tinto (1987) described these concepts as academic integration and social integration. Much research has been done regarding the importance of academic and social integration. Some have looked at technology's impact on the ways in which students achieve social and academic integration. However, there has been little research regarding how the current student population uses Instant Messaging to supplement traditional behaviors associated with academic and social engagement. The present study was designed to address these gaps in the present literature on social and academic integration. The purpose of this study was to examine how college students use Instant Messenger (IM). Specifically, the present study explored if college students use IM to supplement traditional behaviors associated with academic and social integration. Data were collected from emailed IM conversations, logsheets submitted by the participants, and answers to IM survey questions. The results of the analysis of these data were compared to Gatz's (1998) lists of traditional behaviors associated with academic and social integration. Results seem to suggest that college students use Instant Messaging for primarily social purposes. When students engage socially through IM, it is most often used to connect or stay connected with friends. Interestingly, the majority of the friends college students are Instant Messaging are fellow students from their home institution. When students do use IM for academic purposes, it is most often used to set up project meeting times or ask questions about a class. / Master of Arts
114

Humanity in digital age. / 數碼時代的新社交空間 / Shu ma shi dai de xin she jiao kong jian

January 2008 (has links)
Lam Hiu Kwan. / "Architecture Department, Chinese University of Hong Kong, Master of Architecture Programme 2007-2008, design report." / Includes bibliographical references (leaves 19). / Includes some text in Chinese. / Chapter 1. --- Thesis Statement --- p.2 / Chapter 2. --- Background / Chapter I. --- background stories --- p.3 / 26 years old; 12 years old / Chapter II. --- terminology --- p.4-5 / Chapter 1. --- cyborg; / Chapter 2. --- cyberpunk; / Chapter 3. --- hikikomori; / Chapter 4. --- otaku; / Chapter 5. --- cosplay; / Chapter 6. --- kiduIt; / Chapter 7. --- cyberspace / Chapter III. --- sociological discourses --- p.6-8 / Chapter 1. --- live in simcity - William Gibson / Will actual life be taken over by the virtual one? / Chapter 2. --- influx of information and hyperreality - Jean Baudrillard / Will actual life be taken over by the virtual one? / Chapter 3. --- popular culture from Japan - Tong Ching-Siu / "We like idle, we like cuteness!" / Chapter 4. --- overturn of social order and multi-identities - Donna Haraway / Who am I? Who are you? / Chapter 5. --- together and isolation / Chapter IV. --- architectural discourses --- p.9-10 / Chapter 1. --- overturn of social order - Kazuyo Sejima / Chapter 2. --- together and isolation - Kisho Kurokawa / Chapter 3. --- "visualize cyberspace - Marcos Novak, Clayton Graham" / Chapter 4. --- "virtual quality - Zaha Had id, Kazuyo Sejima" / Chapter 5. --- interactivity - Ole Bouman / Chapter 6. --- computer aided deisgn - Ole Bouman / Chapter 3. --- Overview of Design Proposal --- p.11 / Chapter I. --- program selection - Cyborg Culture Centre / Chapter II. --- site selection - Tuen Mun Park / Chapter 4. --- Overview of Architectural Studies --- p.12 / Chapter I. --- materialize the non-space of cyber world (analogical analysis) / Chapter a. --- cultural activities of cyborg groups in virtual space / Chapter b. --- humanity influences by virtual space / Chapter II. --- reveal the contrast of cyber & actual worlds (graphical analysis) / Chapter 5. --- Findings from Studies --- p.13-15 / Chapter la. --- internet maps; / Chapter lb. --- psycological distances; / Chapter II. --- "spatial variety, perspective, approach, design target" / Chapter 6. --- Testings of Design Strategies --- p.16-18 / Chapter 1. --- program derived from internet map / Chapter 2. --- quality of introversive cyberspace / Chapter 3. --- quality of extroversive connection / Chapter 7. --- Bibliography --- p.19 / Chapter 8. --- Renewed Thesis Statement --- p.20 / Chapter 9. --- Final Presentation (including summary of studies and design responses) / Chapter I. --- issue in summary --- p.21-22 / Chapter a. --- cyborg generation / Chapter b. --- cyborg culture and living style / Chapter c. --- human-human & human-machine contacts / Chapter d. --- humanities of the cyborg / Chapter II. --- site context in summary --- p.23 / Chapter III. --- program and spacial organization --- p.24-25 / Chapter a) --- spacial organization / Chapter b) --- program / Chapter c) --- studies & proposal / Chapter IV. --- circulation --- p.26 / Chapter V. --- detail in single rental living units --- p.27 / Chapter VI. --- graphical presentation --- p.28-30 / Chapter II. --- model presentation --- p.31 / Chapter 10. --- Accreditation
115

A Hermeneutical Ontology of Cyberspace

Pralea, Cristian 13 April 2010 (has links)
No description available.
116

Rapid Mission Assurance Assessment via Sociotechnical Modeling and Simulation

Lanham, Michael Jay 01 May 2015 (has links)
How do organizations rapidly assess command-level effects of cyber attacks? Leaders need a way of assuring themselves that their organization, people, and information technology can continue their missions in a contested cyber environment. To do this, leaders should: 1) require assessments be more than analogical, anecdotal or simplistic snapshots in time; 2) demand the ability to rapidly model their organizations; 3) identify their organization’s structural vulnerabilities; and 4) have the ability to forecast mission assurance scenarios. Using text mining to build agent based dynamic network models of information processing organizations, I examine impacts of contested cyber environments on three common focus areas of information assurance—confidentiality, integrity, and availability. I find that assessing impacts of cyber attacks is a nuanced affair dependent on the nature of the attack, the nature of the organization and its missions, and the nature of the measurements. For well-manned information processing organizations, many attacks are in the nuisance range and that only multipronged or severe attacks cause meaningful failure. I also find that such organizations can design for resiliency and provide guidelines in how to do so.
117

Dynamique des accès et des usages du téléphone et d'Internet à Dakar : quels liens avec l'aménagement urbain ? / Dynamic of accesses and practices of the telephone and Internet in Dakar : what links with the urban development?

Sary, Ousmane 05 July 2012 (has links)
En ce début de siècle, l'information a pris une dimension capitale grâce aux nouvelles technologies. On parle de la société mondiale de l'information, réduisant la planète en un « village global ». Cependant, les pays des Suds, à la périphérie de ce processus, souffrent de la fracture numérique. Néanmoins, une dynamique des Tic s’y développe à travers des modèles d’accès adaptés aux réalités socio-économiques. A Dakar, ces modèles populaires ont permis une appropriation profonde du mobile alors qu’Internet, l’élément essentiel de cette révolution numérique, tarde à s’ancrer dans l’espace urbain. Dakar, ville primatiale est marquée par une forte polarisation des activités au niveau du centre historique. Cette répartition déséquilibrée est à l’origine des dysfonctionnements territoriaux quotidiens. Le caractère immatériel de la manifestation des nouvelles technologies semble représenter alors un moyen pour atténuer les effets de la question cruciale de la déficience de l’aménagement du territoire, notamment en termes de mobilités. Ainsi, grâce aux usages d’Internet, quelques pratiques urbaines dans divers domaines d’activités se déroulent sur le cyberespace. Mais en raison de leurs impacts peu conséquents sur les territoires réels, les attentes parfois exagérés des acteurs gouvernementaux, la société civile et les opérateurs, tardent à se concrétiser. En effet, malgré la bonne connexion du pays à la dorsale internationale, le taux de pénétration d’Internet au Sénégal ne permet pas pour le moment d’infléchir les dysfonctionnements. En réalité, sur le web sénégalais, la dynamique des usages associés aux pratiques urbaines n’a pas fait émerger de véritables liens entre Internet et l’aménagement territorial urbain à Dakar / Since the turn of the century, communications play a key role thanks to information technology. We now talk of a global community of information, shrinking our planet to a mere ‘global village’. Nevertheless, the countries of the developing countries still lingering outside this network, have trouble catching up. However IT industries are picking up slowly in keeping with the reality of the social and economic developments in these countries. In Dakar, for instance, mobile phones have become increasingly popular while the Internet, the key element to a numerical revolution, has been rather slow to take root in the urban environment. Moreover, Dakar seems to suffer from a lack of balance when it comes to the activities of its historical city center, due to a seemingly malfunctioning of its territorial administration. Information technology which requires few material investments could reduce the effects of this imbalance and the deficiency in its infra structure, making it possible for a variety of activities to take place in a cyberspace. In fact, inspite of efficient connection of the country with the international networking, it still is not enough to cope with the malfunctions of its local infrastructure. Thus the network in Senegal does not reveal truly strong links between the Internet and urban territorial infrastructures in Dakar
118

Best practice strategy framework for developing countries to secure cyberspace

12 November 2015 (has links)
M.Com. (Informatics) / Cyber issues are global phenomena in a world of inter-related systems, and as such, the discussion on cybersecurity frameworks, policies and strategies inevitably requires reference to, and benchmarking with regional, continental and global trends and solutions. This, in the context of the effects of globalisation on developing countries, with specific reference to areas such as Africa as a developing continent with regard to the protection of its cyberspace. More drastic measures, such as the utilization of cyber warfare techniques and pre-emptive cyber strike-teams in addition to traditional cybersecurity mechanisms as an essential part of a national security effort to protect cyberspace has become more prevalent within the developed worlds. Likewise, developing nations need to gear themselves in a structured, coordinated and responsible way in order to do their part to secure their own environments. Cyberspace is a dynamic global environment with cyber related issues being a global concern. Although countries generally regulate their own cyber environment through policy; cross-border cyber issues are difficult to resolve and the lack of international cyber laws impede cybersecurity efforts. Cybercrime and the management of cross-border cyber incidents are becoming a growing national security concern as the lack of effective controls leave critical infrastructure and the cyber-connected environment vulnerable to attack. Some developing countries are on track with the maturity of their cybersecurity initiatives, but appropriate cybersecurity frameworks for many developing countries require careful consideration, especially due to the lack of resources, infrastructure and local technology development capabilities.
119

Barriers to implementation of the (SA) National Cybersecurity Policy Framework

Gwala, Sizwe January 2016 (has links)
Thesis (M.M. (Security))--University of the Witwatersrand, Faculty of Commerce, Law and Management, Graduate School of Public and Development Management, 2016 / Technological advancement have seen South African government departments, state owned entities and private companies using cyberspace as a platform of interaction and the storage of information. Technological advancements have a positive impact due to the compression of space, time and thereby ensuring fastpaced interaction across borders. These technological advancements have, however resulted in most organisations, both private and public, becoming prone to cybercrimes and related incidents. In an initiative aimed at countering these threats, the South African government has passed various laws. The National Cybersecurity Policy Framework (NCPF) is a South African Policy framework aimed at countering an increase in the occurrence of cybercrimes and related incidents. This research analyses the status in the implementation of the NCPF objectives allocated to the Department of Telecommunications and Postal Services (DTPS). Then the barriers in the Implementation are unpacked guided by the literature reviewed and finally recommendations on how to counter the identified barriers are provided post the data collection. The report firstly provides an outline of the global perspectives on cybersecurity which is followed by the regional cybersecurity measures, and then the national cybersecurity measures proposed by the South African Government department are outlined. The latter parts of the report focuses on the NCPF in terms of its scope, goals, objectives and stakeholders. Finally, focus is shifted to the DTPS as a chosen area of research wherein data was collected in a form of one-on-one, semi-structured interviews with relevant parties. The results of this research are presented as a narrative description that is synthesised to develop the theoretical conjecture and empirical generalisation of the entire research. This research uncovered that there are numerous barriers in the implementation of the NCPF both within the DTPS as well as between the DTPS and various stakeholders entrusted with the implementation responsibility. The last chapter consists of general conclusions made by the researcher based on the research conducted which is then followed by recommended countermeasures which will be communicated to the DTPS as well as all stakeholders who will be affected by the proposed recommendations. / GR2018
120

--- / Regulation of internet

Poloni, Marek January 2018 (has links)
Regulation of Internet Abstract The internet is today one of the most rapidly evolving technological tools at our disposal. What started out being used for research and academic purposes over four decades ago, has evolved into a behemoth virtual community that has been shaped by millions of role-players and users. What started out as a self-regulated platform is coming under serious scrutiny as more and more we are finding that the current regulatory framework has massive gaping holes and human rights breaches are happening by the thousands, on a daily basis, across various internet platforms. It seems it is only a matter of time before a serious human rights or data catastrophe is on our hands. Regulation created under the stress of trying to recover from a catastrophe would be strict and have excessively tight controls and result in the loss of many freedoms which the internet has afforded the world. It is in light of this that the topic of the regulation of the internet is explored through this thesis. The internet has grown and evolved exponentially, and it is time that regulation of this space catches up to this evolution and is able to effectively govern and regulate this vast and multidimensional layer. The aim of this diploma thesis was to understand the dynamic relationship between regulation and...

Page generated in 0.022 seconds