Auswahl der wissenschaftlichen Literatur zum Thema „Cyberspace“

Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an

Wählen Sie eine Art der Quelle aus:

Machen Sie sich mit den Listen der aktuellen Artikel, Bücher, Dissertationen, Berichten und anderer wissenschaftlichen Quellen zum Thema "Cyberspace" bekannt.

Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.

Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.

Zeitschriftenartikel zum Thema "Cyberspace"

1

Kachynskyi, A. B., und I. S. Styopochkina. „A systematic approach to the analysis of phenomena of the information and cyberspaces“. Reports of the National Academy of Sciences of Ukraine, Nr. 11 (2020): 16–23. http://dx.doi.org/10.15407/dopovidi2020.11.016.

Der volle Inhalt der Quelle
Annotation:
The terms “information space” and “cyberspace” form the basis of definitions of information security and cyber security. The actual issue is to determine the essence of the phenomena of the information and cyberspace, which currently do not have a unified vision. The paper proposes a study of the structure and properties of the information space and cyber space, based on a mathematical formalism, which distinguishes the work from the previous ones, where the corresponding spaces were considered descriptively. The information and cyberspaces are considered as complex systems to which a system approach is applied. Structural models of information and cyberspaces consisting of subsystems of the first, second, and third levels, and elements of the fourth level are offered. Based on the proposed models of systems, the indicators of integrity and autonomy are analyzed, which allows us to conclude that, in both spaces, there is a greater tendency to the structural monolithicity than to the autonomy of the components. But cyberspace shows a greater interdependence of components, compared to the information space, despite their higher dynamism and a less degree of attachment to real objects. The Jacquard similarity coefficient is calculated for the elements of the 4th level. It indicates a significant difference between the systems of the information space and the cyberspace. Descriptive analysis of the elements of the information and cyberspaces showed that the cyberspace, in contrast to the information space, operates not only information, but also data that are necessary to support its technological functioning. Another distinctive feature of the cyberspace is the information control to achieve a specific goal; while the information space deals only with the processing and storage of information.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Boswell, Suzanne F. „“Jack In, Young Pioneer”: Frontier Politics, Ecological Entrapment, and the Architecture of Cyberspace“. American Literature 93, Nr. 3 (26.07.2021): 417–44. http://dx.doi.org/10.1215/00029831-9361251.

Der volle Inhalt der Quelle
Annotation:
Abstract This essay uncovers the environmental and historical conditions that played a role in cyberspace’s popularity in the 1980s and 1990s. Tracing both fictional and critical constructions of cyberspace in a roughly twenty-year period from the publication of William Gibson’s Sprawl trilogy (1984–1988) to the Telecommunications Act of 1996, this essay argues that cyberspace’s infinite, virtual territory provided a solution to the apparent ecological crisis of the 1980s: the fear that the United States was running out of physical room to expand due to overdevelopment. By discursively transforming the technology of cyberspace into an “electronic frontier,” technologists, lobbyists, and journalists turned cyberspace into a solution for the apparent American crisis of overdevelopment and resource loss. In a period when Americans felt detached from their own environment, cyberspace became a new frontier for exploration and a so-called American space to which the white user belonged as an indigenous inhabitant. Even Gibson’s critique of the sovereign cyberspace user in the Sprawl trilogy masks the violence of cybercolonialism by privileging the white American user. Sprawl portrays the impossibility of escaping overdevelopment through cyberspace, but it routes this impossibility through the specter of racial contamination by Caribbean hackers and Haitian gods. This racialized frontier imaginary shaped the form of internet technologies throughout the 1990s, influencing the modern user’s experience of the internet as a private space under their sovereign control. In turn, the individualism of the internet experience restricts our ability to create collective responses to the climate crisis, encouraging internet users to see themselves as disassociated from conditions of environmental and social catastrophe.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Kellerman, Aharon. „Cyberspace Classification and Cognition: Information and Communications Cyberspaces“. Journal of Urban Technology 14, Nr. 3 (Dezember 2007): 5–32. http://dx.doi.org/10.1080/10630730801923110.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Ehrlich, Heyward. „Poe in Cyberspace: Populating Cyberspace“. Edgar Allan Poe Review 8, Nr. 1 (2007): 91–96. http://dx.doi.org/10.2307/41506028.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

AFRINA, CUT. „CYBERSPACE ANALYSIS IN NA'VI AVATAR FILM AS A REQUIREMENT OF VIRTUAL SPACES“. Ekspresi Seni : Jurnal Ilmu Pengetahuan dan Karya Seni 23, Nr. 1 (01.06.2021): 10. http://dx.doi.org/10.26887/ekspresi.v22i2.1024.

Der volle Inhalt der Quelle
Annotation:
Cyberspace as Virtual space embodiment in Na'vi's Avatar Film by using the analysis theory according to Mark Slouka. The purpose of the Film Avatar analysis is to further understand the elements of the Cyberspace in the film, the results of the analysis of the authors on the movie Avatar is the advancement of technology and communication with a network capable of creating Cyberspace in a life. Where the human sense of being now leads to machine culture as a product of media communication technology is Internet. Cyberspace in the movie Aavatar is able to disrupt the balance that is on the Na'vi community. Cyberspace's identity built in the Avatar is a modern human-controlled indetity. Technology is the human work that is controlled by human beings themselves. The results of the Avatar technology product are not solely acceptable to the Na'vi community. The integrity and solidarity of the Na'vi community to defend the earth of Pandora, with a teeter fight against the sophistication of modern human technology.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Hurley, John S. „Cyberspace“. International Journal of Cyber Warfare and Terrorism 7, Nr. 3 (Juli 2017): 1–15. http://dx.doi.org/10.4018/ijcwt.2017070101.

Der volle Inhalt der Quelle
Annotation:
The transition of the warfare mentality from the conventional domains of engagement (air, land, maritime, and space) to the cyberspace domain has not been an easy one for established organizations and institutions. The battlefield, in which now speed and stealth instead of size and budget are the determining factors that provide an edge have not well for many, especially those in the military. Now they do not clearly dictate who amongst combatants have the ‘upper hand' and represent a significant paradigm shift from factors that were very good predictors of a potential outcome of military conflicts. The battles of the past were largely over territories and resources (Landscape Metrics, 2015). We see outcomes now being influenced by a broader range of factors, including politics, culture, economy, religion, and ethnicity. These new ‘pivot points' for conflict require a very different understanding and approach to achieve desired outcomes. Technology continues to be the main enabler that has transformed the battlefield and the rules of engagement from the conventional domains to cyberspace. The issue of attribution has been a huge differentiator and looms very large in cyberspace conflicts because it is very difficult to determine within a sufficient timeframe the source of an attack and to be able to respond to or prevent attacks. Now conflicts have expanded in such a way that combatants now cross all prospective levels of society from targets to attackers or perpetrators. The low cost required to provide significant damage to a desired target environment in cyberspace has been a game changer. As a result, the rules of engagement which were much clearer in conventional domains on military fronts are much more blurred due to the new realm of combatants, and as such, has changed many of the approaches and methodologies that were standard practices in traditional campaigns. In this paper, we focus on cyber conflicts and how the cultural differences of these three communities have plagued the ability to achieve a simple and coherent response against attackers and perpetrators. We pursue the relevance of trust and deterrence and their influence on ‘warfare' tactics in the cyberspace domain. We also look at culture and the ‘new norm' and how they have required consideration of new and unconventional approaches. We see how data can better inform decision makers and those responsible for designing and implementing campaigns in this new era of conflict. Our results indicate the need for a different model to work through the differences in culture if better are to be obtained by the combatants. In addition, we see that an approach that includes cyber deterrence framed in the context of active defense provides optimism on future outcomes.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Bollas, Christopher. „Cyberspace“. Psychoanalytic Review 94, Nr. 1 (Februar 2007): 7–10. http://dx.doi.org/10.1521/prev.2007.94.1.7.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Scheffler, A. L. „CyberSpace“. Quality and Safety in Health Care 11, Nr. 2 (01.06.2002): 200–201. http://dx.doi.org/10.1136/qhc.11.2.200.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Richard, Michael A. „Cyberspace“. Employee Assistance Quarterly 19, Nr. 2 (08.12.2004): 51–60. http://dx.doi.org/10.1300/j022v19n02_04.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

Pesce, M. D., P. Kennard und A. S. Parisi. „Cyberspace“. Computer Networks and ISDN Systems 27, Nr. 2 (November 1994): 315. http://dx.doi.org/10.1016/s0169-7552(94)90171-6.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen

Dissertationen zum Thema "Cyberspace"

1

Chan, Cho-yan Jonathan, und 陳祖恩. „Traumatic cyberspace: witnessing cyberspace as a site of Trauma“. Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2002. http://hub.hku.hk/bib/B31227144.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Wipper, Renate. „Umweltbildung im Cyberspace“. Universität Potsdam, 1999. http://opus.kobv.de/ubp/volltexte/2005/298/.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Barber, Clair. „Shakespeare and cyberspace“. Thesis, University of Sussex, 2003. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.288165.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Ackroyd, Bradley Sterling. „Hinduism in cyberspace“. [Gainesville, Fla.] : University of Florida, 2006. http://purl.fcla.edu/fcla/etd/UFE0014320.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Simu, Nicklas. „Strategisk bombning i cyberspace“. Thesis, Försvarshögskolan, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:fhs:diva-5514.

Der volle Inhalt der Quelle
Annotation:
Why has some cyber-attacks been more successful than others? There has been in the near past examples of cyber-attacks used with different purposes. How do we understand these chosen targets and what result the attack accomplished? Research has discussed similarities between aviation warfare and cyber warfare, and how the first could explain what is happening in cyber warfare now. There is also opposing opinions whether cyber warfare should be seen as a method to alone force a will on your opponent or if cyber warfare should mere be supporting other military means. The essay test Warden’s theory “The Enemy as a System” capacity to explain why the effect of cyber-attacks can differ. It will also compare the effect in different cases based on standalone and supporting cyber-attacks. The essay concludes that Warden’s theory does not have any explanatory value but the difference in effective and ineffective cases is whether the cyber-attack was supporting other military means or a standalone attack.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Young, Peter. „Visualising software in cyberspace“. Thesis, Durham University, 1999. http://etheses.dur.ac.uk/4363/.

Der volle Inhalt der Quelle
Annotation:
The problems of maintaining software systems are well documented. The increasing size and complexity of modern software serves only to worsen matters. Software maintainers are typically confronted with very large and very complex software systems, of which they may have little or no prior knowledge. At this stage they will normally have some maintenance task to perform, though possibly little indication of where or how to start. They need to investigate and understand the software to some extent in order to begin maintenance. This understanding process is termed program comprehension. There are various theories on program comprehension, many of which put emphasis on the construction of a mental model of the software within the mind of the maintainor. These same theories hypothesise a number of techniques employed by the maintainer for the creation and revision of this mental model. Software visualisation attempts to provide tool support for generating, supplementing and verifying the maintainer’s mental model. The majority of software visualisations to date have concentrated on producing two dimensional representations and animations of various aspects of a software system. Very little work has been performed previously regarding the issues involved in visualising software within a virtual reality environment. This research represents a significant first step into this exciting field and offers insight into the problems posed by this new media. This thesis provides an identification of the possibilities afforded byU3D graphics for software visualisation and program comprehension. It begins by defining seven key areas of 3D software visualisation, followed by the definition of two terms, visualisation and representation. These two terms provide a conceptual division between a visualisation and the elements of which it is comprised. This division enables improved discussion of the properties of a 3D visualisation and particularly the idenfification of properties that are desirable for a successful visualisation. A number of such desirable properties are suggested for both visualisations and representations, providing support for the design and evaluation of a 3D software visualisation system. Also presented are a number of prototype visualisations, each providing a different approach to the visualisation of a software system. The prototypes help demonstrate the practicalities and feasibility of 3D software visualisation. Evaluation of these prototypes is performed using a variety of techniques, the results of which emphasise the fact that there is substantial potential for the application of 3D graphics and virtual reality to software visualisation.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Karaflogka, Anastasia. „Religious discourse and cyberspace“. Thesis, SOAS, University of London, 2005. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.422207.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Herring, Deborah. „Contextual theology in cyberspace“. Thesis, University of Sheffield, 2005. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.427215.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Bayne, Siân. „Learning cultures in cyberspace“. Thesis, Queen Margaret University, 2004. https://eresearch.qmu.ac.uk/handle/20.500.12289/7328.

Der volle Inhalt der Quelle
Annotation:
This thesis is a study of emerging learning cultures. Its focus is on students and teachers who are engaged in using internet technologies for learning in higher education in the United Kingdom. The thesis provides an exploration of theoretical approaches to the cultural impact of new technologies, drawing on cultural, cybercultural and educational theory. It applies these theoretical insights to interview texts generated through discussions with learners and teachers. Its contribution lies in the originality of its empirical material and of the insights applied to their analysis, and in its application of cultural and cybercultural theory to the area of online learning and teaching.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

Qiang, Wen. „Cultural resistances in Chinese cyberspace“. Thesis, University of Macau, 2010. http://umaclib3.umac.mo/record=b2150205.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen

Bücher zum Thema "Cyberspace"

1

Ramírez, J. Martín, und Luis A. García-Segura, Hrsg. Cyberspace. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-54975-0.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Trevor, Winkfield, Granary Books (Firm) und Press Collection (Library of Congress), Hrsg. Cyberspace. New York City: Granary Books, 2000.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Buick, Joanna. Introducing cyberspace. New York, NY: Totem Books, 1995.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Fang, Binxing. Cyberspace Sovereignty. Singapore: Springer Singapore, 2018. http://dx.doi.org/10.1007/978-981-13-0320-3.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Bolhuis, Herman E. van. Cyberspace reflections. Brussels: VUB Press, 1995.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Villafuerte, Nelly Favis. Understanding-- cyberspace. Makati City, Philippines: Appels of Gold, 2001.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

1956-, Wall David, Hrsg. Cyberspace crime. Aldershot, Hants, England: Ashgate, 2003.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Orme, David. Cyberspace warrior. Cheltenham: Stanley Thornes, 1998.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Dodge, Martin E. Mapping Cyberspace. London: Routledge, 2000.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

ill, Beaumont Laura, Hrsg. Cyberspace adventure. Hauppauge, N.Y: Barron's, 1995.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen

Buchteile zum Thema "Cyberspace"

1

Woolley, Benjamin. „Cyberspace“. In Die Wirklichkeit der virtuellen Welten, 133–48. Basel: Birkhäuser Basel, 1994. http://dx.doi.org/10.1007/978-3-0348-6179-3_7.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Powell, Larry, und Joseph Cowart. „Cyberspace“. In Political Campaign Communication, 267–88. Third edition. | New York : Routledge, 2018. | “First edition published 2003 by Pearson Education, Inc.”—T.p. verso. | “Second edition published 2013 by Pearson Education, Inc.”—T.p. verso.: Routledge, 2017. http://dx.doi.org/10.4324/9781315265049-14.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Skillicorn, David B. „Cyberspace“. In Cyberspace, Data Analytics, and Policing, 3–20. Boca Raton: Chapman and Hall/CRC, 2021. http://dx.doi.org/10.1201/9781003126225-2.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Nicaso, Antonio, und Marcel Danesi. „Cyberspace“. In Organized Crime, 238–49. Abingdon, Oxon ; New York, NY : Routledge, 2021.: Routledge, 2021. http://dx.doi.org/10.4324/9781003027072-15.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Kellerman, Aharon. „Cyberspace“. In The Encyclopedia of Human Geography, 1–4. Cham: Springer International Publishing, 2024. http://dx.doi.org/10.1007/978-3-031-25900-5_157-1.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Rennie, Frank, und Keith Smyth. „Cyberspace“. In Digital Learning: The Key Concepts, 52. 2. Aufl. London: Routledge, 2019. http://dx.doi.org/10.4324/9780429425240-51.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Domingo, Francis C. „Cyberspace“. In The Routledge Handbook of Great Power Competition, 265–76. London: Routledge, 2024. http://dx.doi.org/10.4324/9781003340997-25.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Elizalde, Emilio. „On How the Cyberspace Arose to Fulfill Theoretical Physicists’ Needs and Eventually Changed the World: Personal Recallings and a Practitioner’s Perspective“. In Cyberspace, 3–21. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-54975-0_1.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Cesteros, Francisco José. „Collaboration of Private Investigation with Public Institutions Within the Spanish Cybersecurity Strategy. How Private Investigation Gathers Proof on Cyber Delinquency“. In Cyberspace, 165–80. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-54975-0_10.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

Fernández-Rodríguez, Juan Carlos, und Fernando Miralles-Muñoz. „Psychosociological Characteristics of Cybercrime“. In Cyberspace, 181–95. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-54975-0_11.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen

Konferenzberichte zum Thema "Cyberspace"

1

Pawlicka, Aleksandra, Michał Choraś und Marek Pawlicki. „Cyberspace threats“. In ARES 2020: The 15th International Conference on Availability, Reliability and Security. New York, NY, USA: ACM, 2020. http://dx.doi.org/10.1145/3407023.3409181.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

A McDaniel, Elizabeth, und Michael S. Piller. „Mapping Cyberspace“. In InSITE 2012: Informing Science + IT Education Conference. Informing Science Institute, 2012. http://dx.doi.org/10.28945/1672.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

„Survivability in cyberspace“. In Systems (ICCES). IEEE, 2010. http://dx.doi.org/10.1109/icces.2010.5674916.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Clark, David D., John Wroclawski, Karen R. Sollins und Robert Braden. „Tussle in cyberspace“. In the 2002 conference. New York, New York, USA: ACM Press, 2002. http://dx.doi.org/10.1145/633025.633059.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Thiha, Amara. „Revolution through cyberspace“. In the 4th ACM/IEEE International Conference. New York, New York, USA: ACM Press, 2010. http://dx.doi.org/10.1145/2369220.2369266.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Neuharth, Allen. „Freedom in cyberspace“. In the second conference. New York, New York, USA: ACM Press, 1992. http://dx.doi.org/10.1145/142652.142656.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Xianwei Zhou, Zhimi Cheng, Jianwei An, Jinhua Liu und Fuhong Lin. „Cyberspace based wisdom“. In International Conference on Cyberspace Technology (CCT 2013). Institution of Engineering and Technology, 2013. http://dx.doi.org/10.1049/cp.2013.2114.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Kvasov, O. N. „INSTITUTIONALIZATION OF CYBERSPACE“. In Digital society: problems and prospects of development. Voronezh State University of Forestry and Technologies named after G.F. Morozov, Voronezh, Russia, 2021. http://dx.doi.org/10.34220/dsppd2021_89-95.

Der volle Inhalt der Quelle
Annotation:
The work examines the formation of digital space as a social institution. The main features of the institutionalization of cyberspace are analyzed, such as the regulatory function, a set of roles, ritualized interaction, a set of regulatory institutions and the system of public control of this institution. The author makes a number of conclusions and forecasts regarding the formation of the institution of cyberspace.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Clear, Tony, und Graeme Foot. „Avatars in cyberspace“. In the 7th annual conference. New York, New York, USA: ACM Press, 2002. http://dx.doi.org/10.1145/544414.544490.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

„Issues in CyberSpace“. In 2014 7th International Symposium on Telecommunications (IST). IEEE, 2014. http://dx.doi.org/10.1109/istel.2014.7000757.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen

Berichte der Organisationen zum Thema "Cyberspace"

1

Radice, Richard A. Dominating Cyberspace. Fort Belvoir, VA: Defense Technical Information Center, März 2007. http://dx.doi.org/10.21236/ada468855.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Blaha, Leslie M., Daniel W. Repperger, Katheryn A. Farris, Fairul Mohd-Zaid, Paul R. Havig, Xiaoping Shen, Russell Francis, John P. McIntire, Lyndsey McIntire und David J. Rieksts. Cyberspace Math Models. Fort Belvoir, VA: Defense Technical Information Center, Juni 2013. http://dx.doi.org/10.21236/ada589817.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Rizer, Scott W. Sun Tzu in Cyberspace. Fort Belvoir, VA: Defense Technical Information Center, Dezember 2008. http://dx.doi.org/10.21236/ada540083.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Veazie, Arnold K. US Strategy for Cyberspace. Fort Belvoir, VA: Defense Technical Information Center, April 2003. http://dx.doi.org/10.21236/ada416602.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Knapp, Jr, und Everett D. Unconventional Warfare in Cyberspace. Fort Belvoir, VA: Defense Technical Information Center, März 2012. http://dx.doi.org/10.21236/ada561663.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Andrusyszyn, Greta. Cyberspace: A Selected Bibliography. Fort Belvoir, VA: Defense Technical Information Center, Mai 2013. http://dx.doi.org/10.21236/ada585290.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Caulkins, Bruce D. Proactive Self Defense in Cyberspace. Fort Belvoir, VA: Defense Technical Information Center, Februar 2009. http://dx.doi.org/10.21236/ada494722.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Schwalm, Keith T. National Strategy to Secure Cyberspace. Fort Belvoir, VA: Defense Technical Information Center, August 2006. http://dx.doi.org/10.21236/ada457208.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Lee, Carolyn J. Limitless Battlespace: Operations in Cyberspace. Fort Belvoir, VA: Defense Technical Information Center, Mai 1999. http://dx.doi.org/10.21236/ada370758.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

Olson, Matthew L. Tackling Cyberspace Force Development Issues. Fort Belvoir, VA: Defense Technical Information Center, April 2009. http://dx.doi.org/10.21236/ada539194.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
Wir bieten Rabatte auf alle Premium-Pläne für Autoren, deren Werke in thematische Literatursammlungen aufgenommen wurden. Kontaktieren Sie uns, um einen einzigartigen Promo-Code zu erhalten!

Zur Bibliographie