-
61
Changing of the characteristics of the labor potential in the transition to the technogenic society
Published 2019-06-01“…The risks of the technogenic society are connected with a person’s dependence on cyberspace, which has a negative impact on his or her mental health, and permanent using of electronic devices pre-determines risks of deteriorating his or her physical health. …”
Get full text
Article -
62
A privacy-enhanced framework with deep learning for botnet detection
Published 2025-01-01Get full text
Article -
63
Teens and Sexual Harassment: Making a Difference
Published 2006-11-01“…It defines sexual harassment and how it can manifest at school, in the workplace, and in cyberspace; discusses how sexual harassment affects teens; and provides some suggestions to offer teens, parents, and educators on how to handle it. …”
Get full text
Article -
64
Teens and Sexual Harassment: Making a Difference
Published 2006-11-01“…It defines sexual harassment and how it can manifest at school, in the workplace, and in cyberspace; discusses how sexual harassment affects teens; and provides some suggestions to offer teens, parents, and educators on how to handle it. …”
Get full text
Article -
65
CONSUMER SOVEREIGNTY AT A TIME OF GLOBALIZATION AND ICT EXPANSION
Published 2016-05-01“…Living in a globalized world with robustly expanding information and communications technology, the 21st century consumer is exposed to innovative business models emerging in the cyberspace. On the one hand, this offers a chance of consumer empowerment and wider choice but on the other, previously unknown issues and threats are making themselves felt, among them electronic surveillance and loss of privacy. …”
Get full text
Article -
66
Affording a Place: The Role of Persistent Structures in Social Navigation
Published 2002-01-01“…Using social navigation as a theoretical framework, it is possible to study and evaluate the patterned behaviour of occupants in cyberspace. It is proposed that an analysis of the type and extent of social navigation occurring in a collaborative virtual environment provides evidence that the environment houses a community. …”
Get full text
Article -
67
Cybercrimes: A Proposed Taxonomy and Challenges
Published 2018-01-01“…Cybersecurity is one of the most important concepts of cyberworld which provides protection to the cyberspace from various types of cybercrimes. This paper provides an updated survey of cybersecurity. …”
Get full text
Article -
68
A Privacy-Preserving Biometric Recognition System with Visual Cryptography
Published 2022-01-01Get full text
Article -
69
Combating Cybercrime and Cyberterrorism in Indonesia
Published 2023-02-01“…The study objective reflects how the government addresses sustaining securitization in cyberspace. This study employed a descriptive qualitative method to analyze the impact of cybercrime in Indonesia and the regulations with an extremely high intercorrelation. …”
Get full text
Article -
70
S’opposer au Maghreb
Published 2009-11-01“…The various areas where action unfolds are themselves indicative of the different forms of opposition and indeed, political protest is channelled through parliament, university campuses, mosques, public areas and cyberspace.…”
Get full text
Article -
71
Medialne reprezentacje kultury literackiej, czyli wiedza o książce dla dzieci – (nie) tylko w Sieci
Published 2017-05-01“…Described some forms of presence of literature for children and youth in cyberspace, such as portals and blog reviewers, websites writers and books, journals and literary blogs, forums readers, radio and TV programs. …”
Get full text
Article -
72
CMAIS-WOA: An Improved WOA with Chaotic Mapping and Adaptive Iterative Strategy
Published 2023-01-01Get full text
Article -
73
Research on Sarcastic Emotion Recognition Based on Multiple Feature Fusion
Published 2025-01-01Get full text
Article -
74
Cyberviolences de genre. Définir et rendre compte du cybersexisme dans les pratiques numériques adolescentes
Published 2021-12-01“…Recent studies have documented the negative interactions occurring in cyberspace, defining them as instances of “cyberviolence”. …”
Get full text
Article -
75
-
76
Exploring communication ethics /
Published 2020Table of Contents: “…An overview of communication ethics -- Philosophical and critical perspectives on communication ethics -- Journalism and broadcasting : content issues -- Journalism and broadcasting : personnel issues -- Journalism and broadcasting : policy issues -- Journalism and broadcasting : privacy issues -- Journalism and broadcasting : accountability issues -- Ethical issues in advertising -- Ethical issues in public relations -- Ethical issues in political communication -- Ethical issues in workplace communication -- Ethical issues in cyberspace and social media.…”
View in OPAC
Book -
77
Avoir-lieu ? : quelques expériences théâtrales de la scène britannique contemporaine
Published 2019-12-01“…However, even as blogs, wikis and other such social media tend to become ubiquitous, the very notion of what is actually “taking place” during the theatrical event is now radically questioned as theatre is gradually dis-located into the cyberspace. The article focuses on some examples of “techno-poetic” creations and nomadic performances to highlight the ways in which the most recent media environments contribute to the emergence of new communities of spectators or rather players or co-creators.…”
Get full text
Article -
78
Dark Margins: Invisibility and Obscenity in Thomas Pynchon’s V., The Crying of Lot 49, and Gravity’s Rainbow
Published 2010-10-01“…The margins between the two is a space of slippage and also, paradoxically, the locus of a discourse of technological power for both “Preterite” and “Elect,” and Pynchon’s treatment of these issues in the 1960s and 1970s is relevant at the beginning of the twenty-first century when the Cartesian model is complicated by a digital culture poised to replace reality with the simulacra of cyberspace; this prospect is initially met by a resistance of invisibility inhabiting the dark margins, not only of textual discourse, but also of society as it takes shape in the practices of everyday life. …”
Get full text
Article -
79
An Efficient Data Analysis Framework for Online Security Processing
Published 2021-01-01“…Industrial cloud security and internet of things security represent the most important research directions of cyberspace security. Most existing studies on traditional cloud data security analysis were focused on inspecting techniques for block storage data in the cloud. …”
Get full text
Article -
80
Local Media Image Propagation Algorithm and Its Governance in the Age of Artificial Intelligence
Published 2022-01-01“…With a large number of images provided by TV and other media flowing into the Internet and the reduction of technical barriers, images have not only become a daily practice for people to record their lives and communicate their behaviors but also become an important means for the public to express their discourse in the cyberspace. Therefore, it is of great significance to analyze the image propagation algorithm using artificial intelligence. …”
Get full text
Article