• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 191
  • 109
  • 40
  • 14
  • 7
  • 5
  • 4
  • 4
  • 4
  • 4
  • 4
  • 4
  • 4
  • 4
  • 3
  • Tagged with
  • 437
  • 155
  • 116
  • 86
  • 70
  • 63
  • 58
  • 53
  • 52
  • 49
  • 42
  • 42
  • 42
  • 37
  • 36
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
151

Technogeopolitics of militarization and security in cyberspace

Yannakogeorgos, Panayotis, January 2009 (has links)
Thesis (Ph. D.)--Rutgers University, 2009. / "Graduate Program in Global Affairs." Includes bibliographical references (p. 225-248).
152

Cyber micropower: a new perspective of computer-mediated communication research

Zhou, Hengyu., 周恒宇. January 2011 (has links)
 The relationship between Internet technology and human beings has been the main focus in the realm of Internet study. Those studies, generally speaking, either paid attention to the political, economical and social influences of the burgeoning Internet technology on human society, or focusing on the changing of human behavior, attitudes and psychological conditions in the Internet technological environment. Lacking of considering the core nature of Internet technology, most of studies, though proposed many insightful arguments, cannot explain why and in what way the Internet has such great influences on human beings. Since the Internet technology constructed the cyberspace, its relationship with human beings has been undoubtedly influenced by the inherent nature of the Internet. Examining the intrinsic nature and the bias of Internet technology, this study proposes the concept of cyber-micropower to describe the power relationships in the Internet field, and explores the origins of cyber-micropower. By investigating the formation and operational mechanism of the three kinds of cyber-micropower – information micropower, context micropower and subject micropower, this study provides a new analytical framework to the Internet study as well as understanding various cyberspace phenomena. The qualitative methods, especially critical literature research, online participant observation, and oral history are adopted to make thick description of various online phenomena, get empirical online data and develop the key concept of cyber-micropower. Particularly, the formation of information micropower is examined through the phenomenon of online free. Based on the analysis of online virtual identity, the formation process of context micropower and subject micropower can be developed. Then, the operational mechanism of cyber-micropower was mainly investigated through human flesh searching phenomenon. Briefly, this study argues that the bias of Internet technology is liquidity. As the core features of the Internet, both digitalization and networking of information directly reflect the widespread requiring for liquidity. This liquid Internet plays the role by empowering cyber subjects. Cyber-micropower, then, is the liquid networking relations among cyber subjects. During online interactions and the Internet use, cyber subjects always tend to make surveillance and self-surveillance, restriction and self-restriction, group participating and other ways, through which cyber subjects adapted to the new liquid cyber contexts and relations, as well as positioning their own locations in the liquid network. This new liquid disciplinary model in the “many watch the many” kind of cyberspace is the operational mechanism of cyber-micropower. Accordingly, disciplined cyber subjects and cyber conditions are like numerous panopticons superimposed together. Then, this study further argues that with the development of Internet technology, the liquid may be faster, and a larger scale of digitalization and intensive networking will follow. Such trends, though may liberate human beings initially, will go beyond humans’ ultimate state in the end. The liquid nature of information restricts cyber subjects’ ability of self-reflexive and understanding. And the liquid cyberspace may promote multiple and unstable virtual identities. As a result, cyber subjects’ cyber-micropower will become more fragile and sensitive. And the human nature may also be networked and liquefied gradually. Yet, when human beings become numerous nodes in the liquid network, not only their traditional ethics and morality are in the danger of reversing, but also the meaning of humans’ existence may be challenged. / published_or_final_version / Linguistics / Doctoral / Doctor of Philosophy
153

Informatikos baudžiamoji teisinė apsauga / Legal Protection of Informatics in Criminal Law

Valužis, Irmantas 31 May 2005 (has links)
The object of the graduation paper for Master’s degree is analysis of the effectiveness of the security provided by criminal law concerning informational technologies. The graduation paper analyses social change aspects related to the process of the informational society formation, it raises the question of relation between rights and propagation of informational technologies as an issue of one of the most stabile social structures. Seeking to evaluate the effectiveness of the security provided by criminal law for cyberspace, the paper provides basic notions and conspectus related to crimes to informational property, analyses standards of criminal law, determining criminal liability for crimes in cyberspace, endeavors to perceive the shortcomings of standards dispositions of this law interfering with practical applications of these standards, identifies the main problems arising while investigating crimes in the field by informational technologies. Evaluating aspects of the problem formulated in the science literature and the available empirical data, the graduation paper defends the following hypotheses: application of legal instruments in the investigation sphere of crimes in the informational field is very problematic. It is especially manifest having in mind that some dispositions of articles in Lithuanian Criminal Code section XXX are construed in such a way that the application of them cannot guarantee the success of pre-trial investigation.
154

Inovacijų elektroninėje erdvėje poveikis įmonės veiklai / An influence of innovations in the cyberspace to company activity

Dubauskas, Linas 03 June 2014 (has links)
Magistro baigiamajame darbe „Inovacijų poveikis įmonės veiklai“ išanalizuota literatūra inovacijų tema, nustatyta inovacijų reikšmė, išsiaiškinta dėl kokių priežasčių įmonės atsisako diegti inovacijas e. erdvėje, nustatyta kokiais finansiniais šaltiniais dažniausiai yra finansuojams inovacijų diegimas, nustatytas inovacijų e. ervėje poveikis atskiriems įmonių veiklos rodikliams, kurie patikrinti empiriniu tyrimu. Pirmoje darbo dalyje analizuojama inovacijų ir e. erdvės sampratos bei jų tarpusavio ryšys. Antrojoje aptariama inovacinės veiklos reikšmė įmonių veiklai, koks e. erdvės vaidmuo inovacijų aktyvinimo procese, aptariamas inovacinės veiklos ir jų pasiteklimo įmonių veikloje vaidmuo tiek tarptautiniame, tiek Lietuvos kontekste. Trečioje dalyje pateikiami konkretūs inovacijų e. erdvėje pavyzdžiai bei aptariama jų reikšmė įmonių veiklai. Paskutinėje, ketvirtoje dalyje aprašomas Lietuvos rinkoje atliktas žvalgybinis empirinis tyrimas, kuriuo siekta nustatyti inovacijų e. erdvėje poveikį Lietuvos įmonių veiklai. Tyrimo rezultatai iliustruoti ir pateikti grafiškai. Pateiktas galutinis rezultatų apibendrinimas ir vertinimas. / Master’s Thesis involves the analysis of the conception of cyberspace innovations, its influence on companies’ activity. It is also submitted what are the main reasons why companies refuse to use innovations in cyberspace and what type of financial resources companies usually use to install cyberspace innovations. Moreover, the influence of innovations in the cyberspace on various companies’ activities has been theoretically defined and verified by empirical research. The first part of this paper includes theoretical aspects of innovations in cyberspace and its interrelationship. In the second part the value of innovative activity and its role in national and international context is discussed with reference to scientific analysis of foreign and Lithuanian author’s works. The third part includes particular cases of innovations in cyberspace and its value to companies’ activity. In the last part, the fourth one, paper presents the results of the empirical research performed in Lithuanian companies in order to reveal the influence of innovations in cyberspace. The research results are analyzed and obtained data are shown in graphical way.
155

The smooth + the striated: the home as a locale of cyberspace

Lee, Fang-Ching Unknown Date (has links)
The home is a material place of routine and isolation. Cyberspace, on the other hand, is associated with the lightness of disembodiment and engagement with others in virtual worlds. I am interested in the home as a locale of cyberspace in regard to the relationship between attaching and detaching, territorializing and de-territorializing, the smooth and the striated. My experimentation is about frozen moments in day-to-day situations. Through experiments with light, materials and installations, I intend to draw out a tactile perspective on cyberspace and domesticity. In terms of materials, I am particularly interested in the residues in everyday life. Light and materials are considered to be tactile as well as visual. Performativity, Heuristics and Active Documentation are my main methodological approaches. My work does not seek to fix a solution, but open up an area of ongoing discovery. The physical makings are the ignition for later developments. Once the installation has been set up, the performativity is transferred to the audience. The surrounding space becomes activated because of the energy released by the audience's engagement. Heuristic use of intuition and informal experience was applied in my working process to discover imperceptible traits of materials and daily situations. Active Documentation helps me to re-consider, re-negotiate, reflect and renew my work throughout the project. In this way, hidden codes can be brought out to the surface.
156

Presenting the self in cyberspace : identity play in moos /

Chester, Andrea. January 2004 (has links)
Thesis (Ph.D.)--University of Melbourne, Dept. of Psychology, 2004. / Typescript (photocopy). Includes bibliographical references (leaves 363-386).
157

An analysis of how the Joint Capabilities Integration and Development System (JCIDS) strengthens the way ahead for cyberspace operations

Treat, Timothy J. January 1900 (has links)
Thesis (M.S.)--Air Force Institute of Technology, 2008 / AFIT/IC4/ENG/07-08. "June 2007." Title from page [3] of PDF file (viewed: Sept. 8, 2008). Includes bibliographical references.
158

Zur Konstituierung von Gemeinschaft in einem Fantasy- und Rollenspielchatraum

Lukaschek, Karoline. January 2007 (has links)
Heidelberg, Univ., Diss., 2007.
159

Online puja, digital darshan, and virtual pilgrimage Hindu image and ritual, 2007 /

Marsh, Natalie Renee. January 2007 (has links)
Thesis (Ph. D.)--Ohio State University, 2007.
160

Accounts and sexual deviance in cyberspace : the case of pedophilia /

Durkin, Keith F., January 1996 (has links)
Thesis (Ph. D.)--Virginia Polytechnic Institute and State University, 1996. / Vita. Abstract. Includes bibliographical references (leaves 118-128). Also available via the Internet.

Page generated in 0.1198 seconds