51 |
A experiência turística em narrativas de viagem : uma tentativa antropológica no ciberspaçoCamargo, Henrique Patto Pinho Vieira de 01 November 2012 (has links)
Fruto da constante movimentação de um turismólogo tentando se ambientar ao olhar antropológico, e suas nuances etnográficas, este trabalho busca complexificar a compreensão e utilização da(s) Experiência(s) Turística(s), tanto pela academia científica, como pelo “trade” turístico. Enquanto busca subsídios teóricos para compreensão proposta pela Antropologia da Experiência, de Victor Turner e Edward Bruner, e sua abordagem científica de uma Experiência, que destaca sua forma processual e ritual, pessoal e subjetiva, este trabalho tenta compreender porque uma história de vida só pode ser percebida e sentida pela pessoa que experiencia as realidades que defronta, nos diferentes espaços em que circula, ao longo de sua vida, e expressada da forma que desejar e conseguir representar. Imerso no ciberespaço, ao mesmo tempo em que experimenta metodologias para emersão de pistas nesse universo aberto, não fixo e plural, que possibilita expressões descentralizadas e desterritorializadas, de acordo com os interesses e diretrizes significativas de cada pessoa que as externa, busca narrativas em blogs de viagens que possam expressar as representações das pessoas a respeito de suas experiências turísticas, envoltas (frente) a um fenômeno que desloca indivíduos de seu cotidiano espaço e tempo, como o turismo, que, ao mesmo tempo, possibilita momentos de estranhamento, de confrontamento dramático entre seus conhecimentos prévios e a realidade a sua frente. Parte-se da compreensão de cultura como uma rede dinâmica de interações, construída por cada indivíduo ao longo das relações vividas na sua existência e pelos deslocamentos proporcionados pelo turismo e pela comunicação, como no caso da rede de relacionamentos estabelecida a partir do interesse comum pelas viagens, apesar de cada personagem presente expressar diferentes perspectivas sobre o assunto. A partir disso, questiona-se a compreensão de uma experiência turística a partir de suas estruturas físicas e fixas, sendo os personagens principais e cognoscentes de todo esse processo, pessoas com suas próprias diretrizes significativas e relações espaço-temporais diante das diferentes realidades que experienciar, conforme suas próprias bagagens de vida. / Consequence of the constant movement of a tourismologist trying to acclimatize to the anthropological gaze, and its ethnographic nuances, this paper seeks to complexify the understanding and uses of Touristic(s) Experience(s), either by scientific academy, as by the tourism trade. While searching theoretical basis for understanding the proposal by the Anthropology of Experience, by Victor Turner and Edward Bruner, and its scientific approach to Experience, highlighting its procedural form and ritual, personal and subjective, this work attempts to understand why a life story can only be perceived and felt by the person who experiences the realities that faces in different spaces that circulates throughout his life, and expresses the way that wants and is able to represent. Immersed in cyberspace, while experiencing methodologies for emergence of clues in this opened universe, plural and not fixed, allowing expressions decentralized and deterritorialized, according to the interests and meaningful guidelines of each person that externalizes them, search narratives in Travel blogs that can express representations about their traveling experiences, wrapped (in front) to a phenomenon that displaces individuals from their everyday space and time, such as tourism, which at the same time, enables moments of strangeness, of dramatic confrontation between their previous knowledge and the reality in front of them. By understanding of culture as a dynamic network of interactions, built by each individual along the relationships experienced in their lives and the displacement provided by tourism and communication, such as the network of relationships established from the common interest by travel, although each present character express different perspectives on the subject. From this, we question the understanding of a touristic experience from their physical structures and fixed, considering the main characters cognizant of this whole process, people with their own meaningful guidelines and space-temporal relations given the different realities that experience as its own baggage of life.
|
52 |
Teoretické koncepce subjektivních práv a jejich ochrany v kyberprostoru / The Theoretical Concepts of Rights and Their Protection in CyberspaceJirková, Veronika January 2016 (has links)
of Master's Thesis The Theoretical Concepts of Rights and Their Protection in Cyberspace Author: Veronika Jirková Supervisor: doc. JUDr. Karel Beran, Ph.D. Department: Department of Legal Theory and Legal Doctrines This master's thesis is focused on questions regarding the concept and protection of users' rights in cyberspace. This thesis concerns the notion of cyberspace, regulatory systems in it, and finally the extent and protection of rights in cyberspace. The aim of this thesis is, first, to analyse the situation of protection of rights in cyberspace, and second, to identify the ways to improve this situation. This thesis is subdivided into four parts. The first part is of descriptive nature. It covers some fundamental concepts related to the topic. It describes the notion of cyberspace, the notion and structure of the Internet and the actors who play a role in governance of the Internet. The second part is aimed at regulatory systems. It describes regulatory systems in both online world (cyberspace) and offline world. These two groups are then compared. Finally, this part demonstrates the impact of the identified discrepancies on practical examples. The third part relates to the extent of rights in cyberspace. It tries to choose an appropriate theoretical method and it discusses the...
|
53 |
Kriminologické aspekty kybernetické kriminality / Criminal Aspects of CybercrimeŠtičková, Věra January 2016 (has links)
The purpose of this thesis is to introduce the issue of cyber crime, a phenomenon which is gaining importance in recent years. The first chapter outlines the basic problem: Mass use of information and communications technologies may have downsides. Consequently, the reader learns briefly about development of computers, which resulted in the emergence of the Internet. Especially, how this short evolution affected the terminology regarding crimes related to information technology. The term "cyberspace", from which we derive the term "cyber crime", becomes crucial. This virtual world is not only a place of fun but unfortunately also full of malicious behavior. Further, the work deals with the specifics of cybercrime and its differences that distinguish it from other types of crime. The fifth chapter deals with the legal regulation, both domestic and international. It lists major legislation related to the cyber crime and is especially dedicated to analysis of the Criminal Code, the law on cyber security and the Convention on Cybercrime. Next comes the main section of the thesis dedicated to crime in cyberspace. It describes the most common malicious activities which occur in cyberspace. A table of individual crimes is included to ease orientation. Particular attention is paid to copyright violations...
|
54 |
Global MuseumGroenewald, Johannes H.M. 19 June 2007 (has links)
The task of this project is to design a visitor-orientated museum using contemporary museum design models and state-of-the-art display technologies and link them with other international museum organizations so as to put Pretoria on the global museum map. Such a facility will also provide the people of Pretoria with a wealth of freely available and accredited information from local, national and international sources, as well as recreation and enjoyment. The museum could fit into the existing urban fabric, to contribute to the city’s cultural and economic status. The Global Museum could then be a building tying museum-related information into a contemporary visitor-orientated display using digital and cyberspace technology to allow both dynamic and visitor-specific displays, allowing each individual visitor to be a curator for his/her own cultural landscape. The museum should focus on commercial, recreational, and visitor enjoyment activities to promote museum popularity and privatize/de-politicize the museum. The museum should also cater for mass-information availability, interactive visitor experience and social functions as well as any personal agenda the visitor might have that would lead to a museum activity a person would take for granted. (Falk H. and Dierking LD. 1990) “The visitor’s personal context is perhaps the single greatest influence on the visitors museum experience … is important for museum professionals to understand the significance of visitors’ agendas and to recognize that they can be manipulated by the museum” (Falk H. and Dierking LD. 1990:37) An architectural problem we are faced with today is the integration of physical and virtual space with the medium through which people view and perceive the digital. While databases, information networks and internet-related information sources are primarily Information Technology (IT) problems, the interface/medium between these and humans are architectural in nature. / Dissertation (MArch (Prof))--University of Pretoria, 2007. / Architecture / Unrestricted
|
55 |
Trestněprávní a kriminologické aspekty šíření ransomware / Criminological and criminal law aspects of the ransomware spreadOborák, Daniel January 2021 (has links)
The subject of this diploma thesis is the ransomware spread, which is currently one of the most prominent global cybernetic threats. Ransomware is malicious code that, when activated on a computer system, usually blocks access to that system or encrypts the data contained in it, which is then used to blackmail the user. This thesis deals with criminological and criminal aspects of this phenomenon. In its criminological part, this thesis deals with the issue of the etiology of the ransomware spread and its criminogenic factors, while examining, among other things, the applicability of cybercriminological theory named space transition theory to a given phenomenon. It also deals with the victimological aspect of the matter, listing the most fundamental factors influencing victimization, both in the case of widespread non-targeted ransomware attacks and in the case of specifically targeted attacks. It also examines the issue of the high latency of this phenomenon and cybercrime in general and the possibility of prevention, which it considers to be the best way to defend against a ransomware attack. In particular, it deals with the issue of ransomware attacks on hospitals and critical infrastructure, and also raises the issue of the increase in the number of attacks due to the COVID-19 pandemic. The...
|
56 |
National Resilience in Cyberspace: an analysis of the evolution of the United Kingdom's National Cyber Security Strategy and its response to dynamic cyber security challenges / National Resilience in CyberSpace: The UK's National Cyber Security Strategy Evolving Response to Dynamic Cyber Security ChallengesJohnson, Kailyn January 2018 (has links)
Criminals and other threat actors are adapting to the growing reliance individuals, organisations, and nations have upon technology and the internet and have augmented their capabilities to be oriented in that direction for malevolent purposes. Cyberspace has become an extremely large vulnerability for countries because it facilitates any person with access to a computer or other technology along with malicious intent, to cause harm. The increased risk people and organisations now face in cyberspace is not isolated to just them. Nations now are also at an increased risk because of the evolving ubiquity of cyberspace and technology. States are at risk of cyber threats because of vulnerabilities in individual citizens and organisations. Nations have now become intended targets by a larger spectrum of threat actors. This research examines how the United Kingdom has developed their specific national cyber security strategy to improve national resilience to threats, and how well the UK government adapts to an ever- changing threat landscape. The UK is still deficient in the appropriate and thorough execution of their proposed strategies and strategic policies to attain national resilience and security. There have been strides to achieve that goal, but the national strategy continues to fail to...
|
57 |
Kriminalizace útoků na informační systémy / The Criminalization of Cyberattacks on Information SystemsEliášová, Alexandra January 2020 (has links)
131 NÁZEV DIPLOMOVÉ PRÁCE V ANGLICKÉM JAZYCE The Criminalization of Cyberattacks on Information Systems ABSTRACT Cybercrime represents an increasing danger to human society. The main aim of this thesis is to find out which attacks on information systems pose a threat to the state and whether new technological trends represent a challenge for the current Czech legislation in the field of criminal law. The methodology varies across this thesis. The analytical method together with the synthesis is used to fulfil the aim. In some parts, an empirical approach is used. The introductory part of the thesis explains the key institutes in the field of cybercrime and international instruments for combating cybercrime. The most important document is the Council of Europe Convention on Cybercrime. The main part of the thesis is devoted to the difficulties of current Czech legislation in connection with cyberattacks. The final part of the thesis deals with current technological trends, such as Artificial Intelligence, Cloud Computing, Cryptocurrencies and the Internet of Things, which play an important role in the field of attacks on information systems. The current Czech legislation has responded to the growing tendency of cybercrime, and therefore new types of criminal offenses have been introduced. Artificial...
|
58 |
Terorismus v kyberprostoru / Terrorism in CyberspaceCitta, Adam January 2013 (has links)
Although it seems to be a global phenomenon, the internet is a part of human society for relatively short time. Existing in different forms there are phenomena that are present in human society for decades, and that we might not expect in cyberspace. In addition to a mutation of social pathologies such as bullying, child pornography and stalking, internet is used by extremist movements and terrorist groups for their activities such as propaganda, mutual communication, but also for invasive activities. This thesis is focused among other things on terrorism in cyberspace. The introduction places the issue in the current state of society, connecting it with technological and social changes. The second section presents a brief overview of the relevant literature, which is focused on the issue of conventional terrorism and terrorism in cyberspace. The following chapters attempt to define its form, find its essence, and describe the similarities and differences especially in relation to conventional terrorism. These findings are achieved by confrontating both forms of terrorism, its fundamental aspects and classification criteria. This work provides an unusual insight into the relationship of technology and society, which despite its relative youth requires more and more attention. It shows that...
|
59 |
A holistic approach to the cyberspace metaphor /Finkelstein, Adam B. A. January 1998 (has links)
No description available.
|
60 |
Discovering U.S. Government Threat Hunting Processes And ImprovementsWilliam Pierce Maxam III (15339184) 24 April 2023 (has links)
<p><strong>INTRODUCTION:</strong> Cyber Threat Hunting (TH) is the activity of looking for potential</p>
<p>compromises that other cyber defenses may have missed. These compromises cost organiza-</p>
<p>tions an estimated $10M each and an effective Threat Hunt can reduce this cost. TH is a</p>
<p>new discipline and processes have not yet been standardized. Most TH teams operate with</p>
<p>no defined process. This is a problem as repeatable processes are important for a mature</p>
<p>TH team.</p>
<p><strong>OBJECTIVES:</strong> This thesis offers a Threat Hunt process as well as lessons learned</p>
<p>derived from government TH practice.</p>
<p><strong>METHODS:</strong> To achieve this I conducted 12 interviews, 1 hour in length, with govern-</p>
<p>ment threat hunters. The transcripts of these interviews were analyzed with process and</p>
<p>thematic coding. The coding was validated with a second reviewer.</p>
<p><strong>RESULTS:</strong> I present a novel TH process depicting the process followed by government</p>
<p>threat hunters. Common challenges and suggested solutions brought up by threat hunters</p>
<p>were also enumerated and described. The most common problems were minimal automation</p>
<p>and missing measures of TH expertise. Challenges with open questions were also identified.</p>
<p>Open questions include: determining how to identify the best data to collect, how to create</p>
<p>a specific but not rigid process and how to measure and compare the effectiveness of TH pro-</p>
<p>cesses. Finally, subjects also provided features that indicate expertise to TH team members</p>
<p>and recommendations on how to best integrate newer members into a TH team.</p>
<p><strong>CONCLUSION:</strong> This thesis offers a first look at government TH processes. In the short</p>
<p>term, the process recommendations provided in this thesis can be implemented and tested.</p>
<p>In the long term, experiments in this sensitive context remain an open challenge.</p>
|
Page generated in 0.0167 seconds