Dissertations / Theses on the topic 'Cyberspace'

To see the other types of publications on this topic, follow the link: Cyberspace.

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'Cyberspace.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Chan, Cho-yan Jonathan, and 陳祖恩. "Traumatic cyberspace: witnessing cyberspace as a site of Trauma." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2002. http://hub.hku.hk/bib/B31227144.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Wipper, Renate. "Umweltbildung im Cyberspace." Universität Potsdam, 1999. http://opus.kobv.de/ubp/volltexte/2005/298/.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Barber, Clair. "Shakespeare and cyberspace." Thesis, University of Sussex, 2003. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.288165.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Ackroyd, Bradley Sterling. "Hinduism in cyberspace." [Gainesville, Fla.] : University of Florida, 2006. http://purl.fcla.edu/fcla/etd/UFE0014320.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Simu, Nicklas. "Strategisk bombning i cyberspace." Thesis, Försvarshögskolan, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:fhs:diva-5514.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Why has some cyber-attacks been more successful than others? There has been in the near past examples of cyber-attacks used with different purposes. How do we understand these chosen targets and what result the attack accomplished? Research has discussed similarities between aviation warfare and cyber warfare, and how the first could explain what is happening in cyber warfare now. There is also opposing opinions whether cyber warfare should be seen as a method to alone force a will on your opponent or if cyber warfare should mere be supporting other military means. The essay test Warden’s theory “The Enemy as a System” capacity to explain why the effect of cyber-attacks can differ. It will also compare the effect in different cases based on standalone and supporting cyber-attacks. The essay concludes that Warden’s theory does not have any explanatory value but the difference in effective and ineffective cases is whether the cyber-attack was supporting other military means or a standalone attack.
6

Young, Peter. "Visualising software in cyberspace." Thesis, Durham University, 1999. http://etheses.dur.ac.uk/4363/.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
The problems of maintaining software systems are well documented. The increasing size and complexity of modern software serves only to worsen matters. Software maintainers are typically confronted with very large and very complex software systems, of which they may have little or no prior knowledge. At this stage they will normally have some maintenance task to perform, though possibly little indication of where or how to start. They need to investigate and understand the software to some extent in order to begin maintenance. This understanding process is termed program comprehension. There are various theories on program comprehension, many of which put emphasis on the construction of a mental model of the software within the mind of the maintainor. These same theories hypothesise a number of techniques employed by the maintainer for the creation and revision of this mental model. Software visualisation attempts to provide tool support for generating, supplementing and verifying the maintainer’s mental model. The majority of software visualisations to date have concentrated on producing two dimensional representations and animations of various aspects of a software system. Very little work has been performed previously regarding the issues involved in visualising software within a virtual reality environment. This research represents a significant first step into this exciting field and offers insight into the problems posed by this new media. This thesis provides an identification of the possibilities afforded byU3D graphics for software visualisation and program comprehension. It begins by defining seven key areas of 3D software visualisation, followed by the definition of two terms, visualisation and representation. These two terms provide a conceptual division between a visualisation and the elements of which it is comprised. This division enables improved discussion of the properties of a 3D visualisation and particularly the idenfification of properties that are desirable for a successful visualisation. A number of such desirable properties are suggested for both visualisations and representations, providing support for the design and evaluation of a 3D software visualisation system. Also presented are a number of prototype visualisations, each providing a different approach to the visualisation of a software system. The prototypes help demonstrate the practicalities and feasibility of 3D software visualisation. Evaluation of these prototypes is performed using a variety of techniques, the results of which emphasise the fact that there is substantial potential for the application of 3D graphics and virtual reality to software visualisation.
7

Karaflogka, Anastasia. "Religious discourse and cyberspace." Thesis, SOAS, University of London, 2005. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.422207.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Herring, Deborah. "Contextual theology in cyberspace." Thesis, University of Sheffield, 2005. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.427215.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Bayne, Siân. "Learning cultures in cyberspace." Thesis, Queen Margaret University, 2004. https://eresearch.qmu.ac.uk/handle/20.500.12289/7328.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
This thesis is a study of emerging learning cultures. Its focus is on students and teachers who are engaged in using internet technologies for learning in higher education in the United Kingdom. The thesis provides an exploration of theoretical approaches to the cultural impact of new technologies, drawing on cultural, cybercultural and educational theory. It applies these theoretical insights to interview texts generated through discussions with learners and teachers. Its contribution lies in the originality of its empirical material and of the insights applied to their analysis, and in its application of cultural and cybercultural theory to the area of online learning and teaching.
10

Qiang, Wen. "Cultural resistances in Chinese cyberspace." Thesis, University of Macau, 2010. http://umaclib3.umac.mo/record=b2150205.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Clayton, Richard. "Anonymity and traceability in cyberspace." Thesis, University of Cambridge, 2005. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.444742.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Sun, Meng M. Arch Massachusetts Institute of Technology. "Cyberspace as a memory container." Thesis, Massachusetts Institute of Technology, 2017. http://hdl.handle.net/1721.1/111488.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Thesis: M. Arch., Massachusetts Institute of Technology, Department of Architecture, 2017.
Cataloged from PDF version of thesis.
Includes bibliographical references (page 61).
Space is a container for memory. This metaphor is built upon the observation that the human mind can easily acquire spatial information without much deliberation. Moreover, non-spatial information can be better retrieved when associated with a spatial memory. The mnemonic function of space has been explored since ancient Greek and Roman times. The method of loci uses imaginary space and its spatial continuity to encode information and its sequence. Physical space, such as museum, was also used as cognitive device to enforce knowledge structures and for future information retrieval. The science of spatial cognition demonstrates how human perception is tuned to the features of the environment. In the digital age, representation of information in visual space shifted from mirroring the real world to triggering experience symbolically. What should virtual space permit and deny in parallel to the real world? Symbolic systems can be capable of eliciting the rich virtual experience from the mind's myriad depths, with even more leverage compared to representing objects in mechanical context. Given space's mnemonic function and cyberspace's rich potential, this thesis explores the design of virtual space for projecting, retrieving, and composing memory. The project propose different spatial design schemes to experiment with and understand the possible relations between virtual space and memory.
by Meng Sun.
M. Arch.
13

Van, Rensburg Erma J. "Love and friendship in cyberspace." Thesis, Stellenbosch : Stellenbosch University, 2012. http://hdl.handle.net/10019.1/52328.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Thesis (M.A.)--University of Stellenbosch, 2001.
ENGLISH ABSTRACT: Since its birth in the early 1960's the Internet has been growing exponentially in all areas and it is predicted that by the year 2002, 490 million people around the world will have Internet access. Similarly, a rapidly increasing number of people are finding themselves working and playing on the Internet, using computer mediated communication (CMC) to converse, exchange information, debate, court, and show compassion. As a result CMC has become a new way for people to find or meet each other via social Internet tools and form and develop personal relationships. Malcolm R. Parks (1997) compiled a theory of relational development, incorporating seven dimensions along which the nature of interaction changes as relationships develop or deteriorate: 1. Interdependence (influence on each other), 2. Breadth (variety of interaction), 3. Depth (intimacy of interaction), 4. Commitment (expectations that a relationship will continue), 5. Predictability and understanding (familiarity with each other), 6. Code change (creating own linguistic forms and culture) and 7. Network convergence (introducing each other to respective online contacts and social networks). This study investigated the relational development reached in interpersonal relationships initiated and maintained online via social Internet tools. As mainly South Africans responded, results provide first time information about South African Web users' online relationships. Results show that the majority of online relationships reached above average levels of relational development as measured by elevated scores on most of the seven dimensions. The results also show significant differences between the levels of relational development reached in online friendships as opposed to online romantic attachments. The results are consistent with past research and could be used as a point of departure for further investigations into South African's Internet social practices and relational development in online settings.
AFRIKAANSE OPSOMMING: Die Internet het, sedert sy oorsprong in die vroee 1960's, eksponensieel gegroei tot die mate dat, teen die jaar 2002, 'n voorspelde 490 miljoen mense wereldwyd Internet toegang sal he. Daar is net so 'n dramatiese toename in die hoeveelheid mense wat die Internet begin gebruik ten einde te werk en te speel, deur CMC (computer mediated communication) te gebruik om te gesels, te debatteer, inligting uit te ruil, mekaar die hof te maak en ondersteuning te verleen. As gevolg hiervan is CMC 'n nuwe platform waar mense mekaar ontmoet deur sosiale Internet instrumente in te span en op hierdie wyse persoonlike verhoudings te begin. Malcolm R. Parks (1997) het 'n teorie van relasionele ontwikkeling saamgestel, waarvolgens hy die sewe dimensies wat verander soos verhoudings groei of disintegreer, inkorporeer. Die dimensies is: 1. Interafhanklikheid (invloed op mekaar), 2. Breedte (variasie van interaksie), 3. Diepte (intimiteit van interaksie), 4. Verbintenis (verwagting dat die verhouding sal hou), 5. Voorspelbaarheid en begrip (bekend wees met mekaar), 6. Kode verandering (nuwe taalvorme en idiome) en 7. Netwerk konversie (om mekaar bekend te stel aan elektroniese en ander kontakte). Hierdie studie het die relasionele ontwikkeling ondersoek wat bereik is deur interpersoonlike verhoudinge wat deur middel van 'n sosiale Internet instrument ge'inisieer en onderhou is. Hoofsaaklik Suid-Afrikaners het deelgeneem en vir die eerste keer is statistiek oor Suid- Afrikaanse Internet gebruikers se elektroniese vehoudings beskikbaar. Resuitate toon dat die meerderheid van die verhoudings hoer as gemiddelde vlakke van relasionele ontwikkeling bereik het, 5005 gemeet deur die sewe dimensies. Die resultate wys ook dat daar 'n betekenisvolle verskil is tussen die relasionele ontwikkeling van elektroniese vriendskappe en romantiese verbintenisse. Die resultate stem ooreen met vorige studies en vorm 'n stewige grondslag vir verdere navorsing oor Suid-Afrikaners se sosiale Internet praktyke en verhoudings.
14

King, James John Robert. "The cultural construction of cyberspace." Thesis, University of Southampton, 2001. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.394053.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Pralea, Cristian. "A Hermeneutical Ontology of Cyberspace." Bowling Green State University / OhioLINK, 2010. http://rave.ohiolink.edu/etdc/view?acc_num=bgsu1262720615.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Pope, Barrington C. "IRL: creating cyberspace in meatspace." University of Cincinnati / OhioLINK, 2011. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1306503222.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Benoit, Marcel L. "The special operations : cyberspace nexus /." Maxwell AFB, Ala. : School of Advanced Air and Space Studies, 2008. https://www.afresearch.org/skins/rims/display.aspx?moduleid=be0e99f3-fc56-4ccb-8dfe-670c0822a153&mode=user&action=downloadpaper&objectid=1f7903b2-a5c1-48a0-9f1b-8229ded2afd4&rs=PublishedSearch.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Watt, Eliza. "Cyberspace, surveillance, law and privacy." Thesis, University of Westminster, 2017. https://westminsterresearch.westminster.ac.uk/item/q3xzx/cyberspace-surveillance-law-and-privacy.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
The thesis titled, Cyberspace, Surveillance, Law and Privacy analyses the implications of state sponsored cyber surveillance on the exercise of the human right to privacy of communications and data privacy of individuals, subject to untargeted interception of digital communications. The principle aim of the thesis is to assess the legality of mass cyber surveillance of the Five Eyes alliance, with an emphasis on the United States and the United Kingdom. The study also considers the growing trend among the law enforcement agencies to access data without consent located in foreign jurisdictions without recourse to the Mutual Legal Assistance arrangements. The objective of the thesis is to demonstrate that these activities breach states’ human rights obligations under the international human rights frameworks and to show the unprecedented impact that surveillance technologies continue to have on this right. The research also highlights the inadequate protection of privacy in the internet. This leads to the evaluation of a number of possible legal solutions on the international level to the problem of mass surveillance, since the internet is a global environment designed for unrestricted data flows among jurisdictions and therefore facilitates continued violation of privacy of communications and data privacy. The thesis finds that bearing in mind (a) the highly politicised nature of the internet governance discourse, (b) the reluctance of states to subject peacetime espionage to international law regulation through a legally binding treaty, (c) the fact that international human rights law relating to privacy of communications is in need of modernization, (d) the reluctance of states to commit to a legally binding cyber treaty, (e) the slow pace with which customary cyber international law rules emerge and (f) the tendencies of states on the domestic level towards the introduction of draconian surveillance legislation at the expense of privacy, any progress in this regard at this stage will be piecemeal and likely to be achieved through a combination of the updating of the existing international and regional human rights and data protection instruments and soft law agreements.
19

Trim, Valerie. "Affecting modalities : configuring meaning in cyberspace." Thesis, University of Birmingham, 2012. http://etheses.bham.ac.uk//id/eprint/3106/.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
The power of the Internet has produced a rich environment for the creation of new art forms. These artefacts, which can employ complex graphics, animation, music, written and spoken text and user-interactivity, are extremely fluid and variable. Encountering them requires a new and specifically multimedia literacy. This thesis examines in detail four online texts: Faith, Hometown, The Shower, and Blue Han, in order to investigate the possibility of such a literacy. Both Faith and Hometown are subjected to an extended visual, aural, and textual analysis, using theoretical approaches drawn from art history, narratology, literary theory and music. The Shower is analysed by reference to film theory, musical semiotics, the concept of openness and user interface design. Blue Han is used to test claims that digital artworks can function as paintings. This analytical work leads to an analysis and rethinking of some common assumptions made about the nature of interactivity, online collaboration and the mimetic possibilities of the digitalisation of texts. The thesis concludes that analysis of multimedia texts is indeed possible, but that their diversity requires a range of analytical approaches working together to uncover meaning. Such a variable combination of methods of reading, it is suggested, would provide the beginning of a new form of literacy.
20

Moranski, Wojciech. "Cyberspace: Ethical Issues and Catholic Perspectives." Thesis, Boston College, 2017. http://hdl.handle.net/2345/bc-ir:107473.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Thesis advisor: Andrea Vicini
Thesis advisor: Richard Spinello
In this thesis, I try to make a small contribution to this search for an Order in cyberspace. In the first chapter I study some new dimensions of freedom, which arose together with the development of the internet. I present the technology and the culture of hackers as two sources of a new understanding of liberty in cyberspace. I also highlight two moral issues, which are present in cyberspace, and that, in my opinion, were caused by this redefinition of freedom. In the second chapter, I try to apply Christian moral theology to address, interpret, and suggest some possible solutions for some ethical issues in cyberspace. In order to build a theological foundation to address further considerations, I study the relation between God’s plan of creation and the rise of the internet. In the second section of this chapter, studying the issue of hate speech online and the phenomenon of Wikipedia, I present cyberspace simultaneously as a structure of sin and a structure of grace. The theology of the Trinity, and of Jesus as the Word of God, help me to give some Christian interpretation of this discrepancy. In the last section of this chapter, I study the phenomenon of video games, particularly online multiplayer games. I identify a deep relation between the video game culture and transhumanism, and I address its implications for morality. However, I also find some ethical virtues particularly present in the community of gamers. Finally, I identify some occurrences of the three theological virtues, faith, hope, and charity, in the virtual world of video games. This helps me to give some Christian moral interpretation of the virtual world of video games
Thesis (STL) — Boston College, 2017
Submitted to: Boston College. School of Theology and Ministry
Discipline: Sacred Theology
21

Schwarz, Kevin James. "The Securitization of Cyberspace Through Technification." Thesis, Virginia Tech, 2016. http://hdl.handle.net/10919/71758.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
This thesis adds to the literature surrounding technification in securitizing cyberspace by examining the role of technical experts in constituting threats in cyberspace at the level of the state. Furthermore, this thesis considers the impact of technocratic framing on the public's understanding of cyberspace and the historical conditions under which this framing developed.
Master of Arts
22

Downes, Daniel M. (Daniel Mark) Carleton University Dissertation Communication. "Manifesting destiny: the colonization of cyberspace." Ottawa, 1993.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
23

Usman, Muhammad. "Does Cyberspace outdate Jurisdictional Defamation Laws?" Thesis, University of Bradford, 2019. http://hdl.handle.net/10454/17461.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Cyberspace produces friction when the law is implemented by domestic courts using 'state-laws'. These laws are based on a ‘physical presence’ of an individual within the territory. It elevates conflicts relating to cyberspace jurisdiction. This research examines private international law complications associated with cyberspace. The paradigm of libel that takes place within the domain of social media is used to evaluate the utility of traditional laws. This research is conducted using ‘black-letter’ methodology, keeping in mind the changes constituted by the Defamation Act 2013. It pinpoints that the instantaneous nature of social media communication demands an unambiguous exercise of 'personal-jurisdiction', beyond the doctrine of territoriality. An innovation to the code of Civil Procedure is recommended to revise the process of service for non-EU defendants. The permission to serve a writ via social networks (or to the relevant Embassy of the defendant’s domicile state), can accelerate the traditional judicial process. This thesis can be utilised as a roadmap by libel victims for preliminary information. It contributes to the knowledge by discovering that the thresholds under Section 1 and Section 9 of the Defamation Act 2013 overlap with the conventional ‘forum-conveniens’ tests. This crossover is causing legal uncertainty in the application of existing rules to the digital libel proceedings. Section 1 and Section 9 thresholds do not fulfil the purpose of eliminating ‘libel-tourism’ and maintaining a balance between speech freedom and reputation rights. They raised the bar for potential victims and restricted their rights to justice. It is proposed that the traditional ‘conveniens test’ must be used for social media libel victims to produce legal certainty in cyberspace defamation.
24

Currier, Dianne 1963. "Technology and transformation : Deleuze, feminism and cyberspace." Monash University, Centre for Comparative Literature and Cultural Studies, 2001. http://arrow.monash.edu.au/hdl/1959.1/8916.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Finkelstein, Adam B. A. "A holistic approach to the cyberspace metaphor." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1998. http://www.collectionscanada.ca/obj/s4/f2/dsk1/tape11/PQDD_0005/MQ43864.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Yuan, Xiaotong 1979. "Copyright protection to musical works in cyberspace." Thesis, McGill University, 2004. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=82675.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
The objective of this thesis is to demonstrate, through analysis of the current Canadian Copyright Act and related cases, how the rapid development of Internet technology has challenged the legal protection of musical works under Canadian copyright legislation and jurisprudence. Canadian government and courts have begun contemplating these issues and attempted to formulate constitutional reform policies and effective measures for Canada. These initiatives related to copyright protection of musical works reflect a sophisticated analysis of each participant involved in music transmission through the Internet and are unique in this way. More flexible business mechanisms may contribute towards the achievement of a delicate balance between all the parties involved under the copyright umbrella.
27

Stoate, Robin. "Reading cyberspace : fictions, figures and (dis)embodiment." Thesis, University of Newcastle Upon Tyne, 2011. http://hdl.handle.net/10443/1129.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
My thesis tracks the human body in cyberspace as a popular cultural construct, from its origins in cyberpunk fiction in the 1980s to the pervasion of cyberspatial narratives in contemporary fictions, along with its representations within wider cultural texts, such as film, the mainstream media, and on the Internet. Across the two respective sections of the thesis, I focus upon six recurring literal-metaphorical characters, entities or motifs which serve as points of collision, entanglement and reiteration for a wide variety of discourses. These figures—the avatar, the hacker, the nanotechnological swarm, the fursona, the caring computer, and the decaying digital—have varying cultural functions in their respective representations of the human/technological interface. Informed by theorists such as Donna Haraway (1991, 2008), N. Katherine Hayles (2001) and others, I trace both their origins and their shifting and (often increasingly prolific) representations from the 1980s to the present. This allows me to uncover these figures’ registering of contextual discourses, and permits, in turn, an interrogation of the extent of their normative character, along with measuring how and to what extent, if any, these figures may offer alternative visions of human (and other) subjectivity. It also permits a rethinking of “cyberspace” itself. Section One analyses three figures that depict the human/technological interface as a space for reinscribing and reifying Cartesian dualistic views of human subjectivity, along with the exclusive and marginalising implications of the remapping of that dualism. The figures in Section One—the avatar, the hacker, and the nanotechnological swarm—have their roots in the 1980s, and have stratified over time, commonly deployed in describing the human/technological interface. These figures function in first evoking and then managing the threats to the unified masculine subject posed by the altering human/machine relationship, policing rather than collapsing the subjective boundaries between them. They maintain and reiterate their attendant logics of identity, recapitulating an image of technology as the object of human invention, and never a contributor to the substantiation of the human subject. Science fiction–especially cyberpunk—has at least partially set the terms for understanding present-day relationships between humans and technologies, and those terms are relentlessly humanistic and teleological, despite their putatively postmodern and fragmentary aesthetic. The threat of the technological other is almost invariably femininecoded, and my work in this section is explicated particularly in the light of Haraway’s work and feminist theories of embodiment, including the work of Elizabeth Grosz (1994) and Margrit Shildrick (1997, 2002). Section Two analyses three emerging figures—ones not so clearly and widely defined in fiction and popular culture—that depict the human/technological interface as fundamentally co-substantiating, rather than the latter being the product of the former. Acting as nodes of connection and constitution for various phenomena both depicted in fiction and enacted/performed at the human/technological interface itself, these three figures—the fursona, the caring computer, and the decaying digital—demonstrate potential ways to understand the human/technological interface outside of conventional, dualistic discourses of transcendental disembodiment of a bounded subject-self. Deploying theoretical work on concepts such as Alison Landsberg’s notion of prosthetic memory (2004) and Brian Massumi’s reading of the “real-material-but-incorporeal” body (2002), as well as Haraway’s later work on companion species (2008), I position these figures as representative visions of technologically-mediated subjectivity that allow us to imagine our relationships with technology as co-operative, open and materially co-substantiating. I argue that they recover the potential to rupture the unified and dualistic mind-subject that is both represented and contained by the figures seen in Section One, while reflecting a more recognisably prosaic, ongoing transformation of subjective participants in human/technological encounters. In opening up these two respective clusters of human-technological figures, I map two attendant visions of cyberspace. The first is the most common: the smooth, Euclidean grid into which the discrete unified consciousness is projected away from the body, which is conflated with (a reductive understanding of) virtuality, and to which access is allowed or denied based on highly conventional lines of gender, race, sexuality and so on. The second vision is emerging: it is possible to view cyberspace as less of a “space” at all, and more of a technologically-mediated field of material implication—one which is not discrete from the putatively offline world, which is implicit in the subject formation of its users and participants, and accounts for, rather than disavowing, the physical, bodily substrate from which it is explicated.
28

Yau, Hon-Min. "Taiwan's security in cyberspace : a critical perspective." Thesis, Aberystwyth University, 2018. http://hdl.handle.net/2160/accd3656-175a-4523-b4c0-ad53718cf875.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
This thesis investigates the interplay between international politics and cyberspace, and explains how Taiwan's cybersecurity policy was formed prior to 2016. It examines how politics can shape or reshape the future direction of technologies. By using Taiwan as the object of the case study, the central research question is, "How is Taiwan counterbalancing China's rising power in cyberspace and what are the implications?" The investigation for the first part of the research question provides a general account of issues affecting Taiwan's practice of cybersecurity policy via a constructivist approach. While I do not deny the technology determinist's logic that new technology can drive the way of politics, the empirical observations from Taiwan focus our attention on a different perspective, that politics can still reshape future direction and the use of technology. It explains to us through the case of Taiwan how politics trump both technical decisions and direction of technology, and further exposes the underlying knowledge structure within Taiwanese policy makers' "world." While this knowledge structure, as a form of theory, constitutes the world we live in, the second part of the research question scrutinizes this taken-for-granted knowledge structure. I challenge well-accepted assumptions regarding cyberwarfare to investigate its limitations and explore its problematic effects within the context of Taiwan. By using the principles of Critical Security Studies, I argue that an alternative conceptualization of cybersecurity can still embrace the security end that Taiwan intends to achieve, and propose a critical strategy to engage Taiwan's security challenge while avoiding adverse consequences from cyberwarfare. Looking closely at the case of Taiwan's cybersecurity contributes to the broader International Relations (IR) literature concerning the effects of norms and interest, and extends a constructivist approach to the domain of cyberspace. It also allows knowledge in Cybersecurity Studies to establish a dialogue with IR literature, and reduces the knowledge gap of Taiwan's cybersecurity in Taiwan studies. This project was conducted via interdisciplinary approaches situated at the intersection of IR, Cybersecurity Studies, and Taiwan Studies, and is a timely reminder of the need to examine Taiwan's security with a more contemporary, localized, and theoretically-grounded framework that will help policymakers understand the new challenges that they face in the 21st Century. It is a discourse of resistance to the current discussions that centre on cyberwarfare and instead turns our attention to true cybersecurity.
29

Varanda, Paula Gouveia. "Dance performance in cyberspace : transfer and transformation." Thesis, Middlesex University, 2015. http://eprints.mdx.ac.uk/18820/.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
The aim of this research undertaking is to understand the potential development of dance performance in the context of cyberculture, by examining the way practitioners use new media to create artworks that include audience participation, and by endeavouring in their theorization. With specific reference to cyberspace as a concept of electronic, networked and navigable space, the enquiry traces the connections such practices have with conventions of the medium of dance, which operate in its widely known condition as a live performing art. But acknowledgement that new media and new contexts of production and reception inform the characteristics of these artworks and their discursive articulation, in terms of the way people and digital technologies interact in contemporary culture, is a major principle to their analysis and evaluation. This qualitative research is based on case-study design as a means of finding pragmatic evidence in particulars, to illustrate abstract concepts, technological processes and aesthetic values that are underway in a new area of knowledge. The field where this research operates within is located by a mapping of published literature that informs a theoretical interdisciplinary framework, which contextualizes the interpretation of artworks. The selected case studies have been subject to a process of systematic and detailed analysis, entailed with a model devised for the purpose of this enquiry. From this undertaking it can be claimed that while an extensive array of technologies, media and interactive models is available in this field, the artists pursue a commitment to demonstrate their worth for specifically developing (new media) dance performance, and for dance performance to articulate technological and critical issues for cyberculture studies. The results of this enquiry also contribute to conceptual understanding of what dance can be, today, in the light of technological changes.
30

Bohannon, Leland. "Cyberspace and the new age of influence /." Maxwell AFB, Ala. : School of Advanced Air and Space Studies, 2008. https://www.afresearch.org/skins/rims/display.aspx?moduleid=be0e99f3-fc56-4ccb-8dfe-670c0822a153&mode=user&action=downloadpaper&objectid=caa501f3-8bec-4650-9466-a0d9db7fffb0&rs=PublishedSearch.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Correa, Denise de Mesquita. "Blade Runners and electric sheep in cyberspace." reponame:Repositório Institucional da UFSC, 1995. https://repositorio.ufsc.br/xmlui/handle/123456789/157980.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Dissertação (mestrado) - Universidade Federal de Santa Catarina, Centro de Comunicação e Expressão
Made available in DSpace on 2016-01-08T20:12:37Z (GMT). No. of bitstreams: 1 103986.pdf: 11670293 bytes, checksum: ae86db783a486345be77b5112f50fd68 (MD5) Previous issue date: 1995
Análise de duas obras pós-modernas, o romance Do Androids Dream of Electric Sheep? de Philip K. Dick, e o filme Blade Runner de Ridley Scott, visando discutir o significado do termo humanidade no contexto pós-moderno.Tomando como base teórica a visão do americano Frederic Jameson sobre uma sociedade pós-capitalista e o conceito de simulacro do filósofo francês Jean Baudrillard, o estudo enfoca o novo indivíduo que articula a condição pós-moderna e todas as suas contradições. A conclusão mostra que a definição pós-moderna de indivíduo acaba num processo aberto.
32

Neuenhausen, Benedikta. "Bildung in der Digitale eine Untersuchung der Bildungsrelevanz virtueller Welten /." [S.l. : s.n.], 2002. http://deposit.ddb.de/cgi-bin/dokserv?idn=966341066.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Paxton, Steven G. B. "Enhanced cyberspace defense with real-time distributed systems using covert channel publish-subscribe broker pattern communications." Thesis, Monterey, Calif. : Naval Postgraduate School, 2008. http://handle.dtic.mil/100.2/ADA483906.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Thesis (M.S. in Information Warfare Systems Engineering)--Naval Postgraduate School, June 2008.
Thesis Advisor(s): Michael, James B. "June 2008." Description based on title screen as viewed on August 26, 2008. Includes bibliographical references (p. 91-98). Also available in print.
34

Tveit, Amund. "Customizing Cyberspace : Methods for User Representation and Prediction." Doctoral thesis, Norwegian University of Science and Technology, Department of Computer and Information Science, 2004. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-1605.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:

Cyberspace plays an increasingly important role in people’s life due to its plentiful offering of services and information, e.g. the Word Wide Web, the Mobile Web and Online Games. However, the usability of cyberspace services is frequently reduced by its lack of customization according to individual needs and preferences.

In this thesis we address the cyberspace customization issue by focusing on methods for user representation and prediction. Examples of cyberspace customization include delegation of user data and tasks to software agents, automatic pre-fetching, or pre-processing of service content based on predictions. The cyberspace service types primarily investigated are Mobile Commerce (e.g. news, finance and games) and Massively Multiplayer Online Games (MMOGs).

First a conceptual software agent architecture for supporting users of mobile commerce services will be presented, including a peer-to-peer based collaborative filtering extension to support product and service recommendations.

In order to examine the scalability of the proposed conceptual software agent architecture a simulator for MMOGs is developed. Due to their size and complexity, MMOGs can provide an estimated “upper bound” for the performance requirements of other cyberspace services using similar agent architectures.

Prediction of cyberspace user behaviour is considered to be a classification problem, and because of the large and continuously changing nature of cyberspace services there is a need for scalable classifiers. This is handled by proposed classifiers that are incrementally trainable, support a large number of classes, and supports efficient decremental untraining of outdated classification knowledge, and are efficiently parallelized in order to scale well.

Finally the incremental classifier is empirically compared with existing classifiers on: 1) general classification data sets, 2) user clickstreams from an actual web usage log, and 3) a synthetic game usage log from the developed MMOG simulator. The proposed incremental classifier is shown to an order of magnitude faster than the other classifiers, significantly more accurate than the naive bayes classifier on the selected data sets, and with insignificantly different accuracy from the other classifiers.

The papers leading to this thesis have combined been cited more than 50 times in book, journal, magazine, conference, workshop, thesis, whitepaper and technical report publications at research events and universities in 20 countries. 2 of the papers have been applied in educational settings for university courses in Canada, Finland, France, Germany, Norway, Sweden and USA.

35

Proietti, Salvatore. "The cyborg, cyberspace, and North American science fiction." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1998. http://www.collectionscanada.ca/obj/s4/f2/dsk1/tape11/PQDD_0021/NQ44558.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

Kinley, Kelli. "What constitutes an act of war in cyberspace?" Wright-Patterson AFB : Air Force Institute of Technology, 2008. http://handle.dtic.mil/100.2/ADA480404.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Thesis (M.S. in Information Resource Management) --Air Force Institute of Technology, 2008.
Title from title page of PDF document (viewed on Aug 8, 2008). "AFIT/GIR/ENV/08-M12" Includes bibliographical references.
37

Tang, Lijun. "Coping with separation : Chinese seafarer-partners in cyberspace." Thesis, Cardiff University, 2007. http://orca.cf.ac.uk/54640/.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
This thesis examines a group of Chinese seafarer-partners' participation in a discussion website called Home of Chinese Seafarers. Specifically, it investigates the ways and extent to which participation in the site serves to ameliorate problems associated with separation and loneliness for seafarers-partners caused by the seafarers work patterns. The study utilised qualitative research methods. Online participant observation was conducted for a period in excess of two years and face to face and email interviews were carried out with seafarer-partner participants and the website managers. Web-based content from the site was also recorded and analysed. In analysing the data three central themes were developed: forms of participation, the production of friendship and the potential effect of participation upon the self. The findings suggest that participation in this particular website enables seafarer-partners to pool their available resources to provide each other with informational help, emotional support, and differing degrees of friendship. With these resources it appears that they are better equipped to combat the loneliness and isolation experienced as a result of their partners repeated prolonged absences. Their participation in the site also helps them to make sense of and validate their experiences and to gain a sense of security and certainty. As a result, seafarer-partners become more positive towards their lives and future, and make claims for improved well-being. The analysis of the data further reveals that seafarer-partners produce and reproduce a set of group norms and values within the website which promote understanding, supportive and self-sacrificing seafarers' wives/partners. This raises the issue of whether participating in the website is repressive or can be regarded as empowering.
38

Frye, Heath W. "Cyberpeace through cyberspace nation-building against transnational terrorism." Thesis, Monterey, California. Naval Postgraduate School, 2010. http://hdl.handle.net/10945/4995.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Approved for public release; distribution is unlimited
Due to recent vulnerabilities of Department of Defense (DoD) networks, along with the rising importance of cyberspace and cyberspace warfare endeavors among competing great powers, the DoD is quickly recognizing the importance of cyberspace. At the same time, the roles of the military are shifting from traditional, strategic and conventional conflict into what Secretary of Defense Robert Gates calls "soft power"--the capacity to perform nation-building missions against transnational terrorism. Cyberspace operations can play an important role in soft power as developing countries grow in their connectivity to information, especially with the proliferation of cell phone networks. By the end of 2010, 71 percent of new Internet users will be from developing nations. Ninety percent of the entire globe already has mobile phone access. This thesis studies two promising utilizations of mobile phones: mobile money and mobile surveillance. It is found that mobile money may reduce the threat of crime in non-stable areas where the United States is conducting nation-building operations. It then discusses new technologies through mobile phones and mobile devices which may help to prevent the theft of WMD.
39

Malone, Patrick J. "Offense-defense balance in cyberspace: a proposed model." Thesis, Monterey, California. Naval Postgraduate School, 2012. http://hdl.handle.net/10945/27863.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
The offense-defense balance is an indicator of the conflict dynamic in a system. Cyberspace is a domain where offense-defense costs are clearer than in the physical world. While there have been numerous comments about the current balance there has not been a study conducted. In this thesis, I use a heuristic model to show what the current theoretical balance point is, and what it was for two different case studies, Estonia in 2007 and Stuxnet. Based on the data, the cost of one dollar by the attacker spent on offense, the defender spends $1.32. When looked at from an aggregate perspective, using the data from the model, attackers to defenders, the disparity is significantly larger, with a one dollar to $131 cost ratio. The Estonia case study had a one dollar to $424 cost ratio, and Stuxnet had a one dollar to seven dollar ratio. This proposed model may provide a glimpse of what the current balance is for a specific system. Using this model, it may be possible to provide measures of effectiveness for modifications made to the system, which could help mitigate costs for cyber defenders.
40

Berglund, Nancy, and Jenny-Maria Ericsson. "Mars och Venus i cyberspace : genusmönster i bloggen." Thesis, Högskolan i Borås, Institutionen Biblioteks- och informationsvetenskap / Bibliotekshögskolan, 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:hb:diva-18568.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
The purpose of this thesis is to find out if people have changed the way in which they write since the introduction of the internet. Men and women have been writing books, articles, letters, diaries and different types of literature for centuries. To give the reader some background about the weblog as a literary media, this thesis has a whole chapter on half-public literature that includes the history of letters and diaries. The weblog is a unique way for anyone to be whoever they want, whether it be a man or woman, old or young. The reader has no possible way of knowing if the script is true or not. The reader also may not conclude anything personal about the writer at all. The writer essentially remains anonymous. We have followed eight weblogs; four male and four female. To gain a close relationship with our writers we followed them for two years from 2005 to 2006. We decided to analyze them with quantative as well as qualitative methods as well as using text analysis. The methods used are derived from the theories of Jurgen Habermas and Anthony Giddens. We have also used some genus theory for the purpose of showing the differences between the way men and women write and communice on the internet. What we are trying to show with this thesis is that with the new techniques women and men have at their disposal to publish themselves and reach out into cyberspace, have people change the way in which they write at all?
Uppsatsnivå: D
41

Joe, Raymond K. (Raymond Kim). "Cyberspace and the seas : lessons to be learned." Thesis, Massachusetts Institute of Technology, 1998. http://hdl.handle.net/1721.1/47725.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Thesis (S.M.)--Massachusetts Institute of Technology, Dept. of Ocean Engineering, 1998.
Includes bibliographical references.
With computer science technology and the Information Superhighway, or cyberspace, developing rapidly, information services and resources are playing an increasingly fundamental role in everyday life. The question of rights over information is correspondingly becoming more complicated as well. Regulation over cyberspace is inconsistent, and continues to develop in piecemeal fashion, while the debate remains unsettled whether cyberspace should be regulated at all. Currently no overall legal design for cyberspace is in view. Meanwhile, recent studies report that self-regulation in cyberspace has failed to protect even basic rights of privacy with respect to information. An investigation was made to evaluate the 1983 United Nations Convention on the Law of the Sea as a prototype for a cyberspace legal regime. The provisions for the high seas were found to be readily adaptable for parallel rules for cyberspace. Likewise, the Part XI provisions concerning the deep sea bed, provided for a very detailed organizational framework from which an international and coordinated management of information transactions in cyberspace may be pursued. The detailed provisions regarding settlement dispute were almost directly applicable to cyberspace, with little if any modification. A cyberspace legal regime modeled from the Law of the Sea would eliminate some of the jurisdiction, accountability, and enforcement difficulties of Internet regulation.
by Raymond K. Joe.
S.M.
42

Simner, Janni, and Susan McGinley. "The iPIant Collaborative: Taking plant biology into cyberspace." College of Agriculture and Life Sciences, University of Arizona (Tucson, AZ), 2007. http://hdl.handle.net/10150/622124.

Full text
APA, Harvard, Vancouver, ISO, and other styles
43

Li, Yu. "Securing Modern Cyberspace Using A Multi-Faceted Approach." Wright State University / OhioLINK, 2019. http://rave.ohiolink.edu/etdc/view?acc_num=wright1559662803668983.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

Andersen, Barbara Anne. "Virtually biosocial: IBD patienthood and community in cyberspace /." Burnaby B.C. : Simon Fraser University, 2006. http://ir.lib.sfu.ca/handle/1892/2645.

Full text
APA, Harvard, Vancouver, ISO, and other styles
45

Moseley, Amanda Jane. "A theology of interconnectivity : Buber, dialogue and cyberspace." Thesis, University of Kent, 2015. https://kar.kent.ac.uk/48040/.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Relationships are a fundamental part of being human; they enable communication, a shared sense of belonging, and a means of building identity and social capital. However, the hallmarks of late modernity can be encapsulated by the themes of detraditionalisation, individualisation and globalisation, which have essentially challenged the mode and means of engaging in relationships. This thesis uses the theology of Martin Buber to demonstrate how his dialogical claims about relationships, namely the “I-It” and “I-Thou” model, can provide a new ethical dimension to communication in the technological era. This thesis argues that through co-creation in cyberspace there is a realisation of the need for a new theological understanding of interconnection. Theology can utilise the platform of technology to facilitate a re-connection in all spheres of relationality and, ultimately, to the Divine. This thesis will first outline the predicament for theology in late modernity. It will discuss how detraditionalisation has led to an emphasis on individual spirituality, as opposed to collective doctrinal beliefs. The global nature of cyberspace has facilitated the means to experiment with these alternative forms of spirituality, which has allowed theology to be commodified and has introduced a challenge to the dimension of relationships. Cyberspace presents a paradox for relationship: the medium transforms modes of relating because the self is re-configured through its contact with technology. This facilitates communication as the individual merges with the machine, resulting in models such as the cyborg. However, this can also be seen to erode the essence of humanity, as humans find themselves on the fringes of relationships. Their hybrid status means that they are no longer fully human or fully machine but become dominated by the latter. They exist on the boundary of both domains and cannot cultivate genuine relationships of the “Thou” variety. This leads to alienation from surroundings, community and the Divine. Second, the thesis will discuss how Buber’s theology can be used to re-position relationships by providing a means to reflect on different aspects of dialogue and communication. By applying Buber’s dialectic to cyberspace it will be demonstrated how interconnectivity causes individuals to re-think the notion of self-in-relation. The three spheres of relationship which Buber identified: “man with nature, man with man, man with forms of the spirit” will be re-contextualised in cyberspace to show how the medium manifests both aspects of the dialectic but allows for a greater awareness of interconnection. Buber’s insistence on the centrality of creative dialogue provides a solution to overcome this dilemma by bringing awareness of the interconnectivity of the self to all aspects of creation. It is through informed use of the medium of cyberspace that humans can re-envisage relationships characterised by a more genuine ethical dimension. These “Thou” moments begin the process of redemption; each one is part of the relationship with the “eternal Thou” and has the potential to draw the Divine down into the encounter, to re-connect with creation. This thesis is arguing for a new theology of interconnectivity that is able to redeem the potentiality of cyberspace as a medium for genuine “Thou” relationality.
46

Vaghetti, César Augusto Otero. "Exergames em rede: a Educação Física no cyberspace." reponame:Repositório Institucional da FURG, 2013. http://repositorio.furg.br/handle/1/4824.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Submitted by William Paiva (williampaiva17@hotmail.com) on 2015-04-17T18:22:06Z No. of bitstreams: 1 César Augusto Otero Vaghetti.pdf: 3899885 bytes, checksum: ba0136c01429d3c75cece5dc5b0f833f (MD5)
Approved for entry into archive by Vitor de Carvalho (vitor_carvalho_im@hotmail.com) on 2015-05-08T16:12:56Z (GMT) No. of bitstreams: 1 César Augusto Otero Vaghetti.pdf: 3899885 bytes, checksum: ba0136c01429d3c75cece5dc5b0f833f (MD5)
Made available in DSpace on 2015-05-08T16:12:56Z (GMT). No. of bitstreams: 1 César Augusto Otero Vaghetti.pdf: 3899885 bytes, checksum: ba0136c01429d3c75cece5dc5b0f833f (MD5) Previous issue date: 2013
O jogo, nas suas diversas formas, constitui uma parte importante da aprendizagem e do processo de interação social das crianças. No contexto do desenvolvimento cognitivo, por exemplo, a reprodução é considerada fundamental para os processos de estabilização e para o desenvolvimento das estruturas cognitivas. Os videogames têm se tornado uma atividade ubíqua na sociedade atual. Os games, além de serem utilizados como entretenimento, também o são com o objetivo de educar ou de treinar alguma habilidade, nas áreas da educação e da computação. Dessa forma, os games fazem parte das novas tecnologias usadas para a criação de ambientes virtuais de aprendizagem, amplamente discutidas em educação em ciências. Recentemente, em razão da disponibilidade de utilização de tecnologias de sensoriamento e rastreio de baixo custo, uma nova classe de videogame surgiu: o exergame, combinando game e exercício físico. O objetivo desta tese foi explorar a experiência do uso de exergame em rede para o ensino de educação física no cyberspace, em crianças na idade escolar (n=39) e estudantes universitários (n=46), identificando seus aspectos motivacionais, através do uso da Teoria do Fluxo e da Teoria da Autodeterminação. Foi utilizado como instrumento de medida o Long Flow State Scale (FSS-2) – Physical para verificar a motivação dos estudantes no exergame Kinect Sports, modalidade table tennis, do console Kinect XBOX. Os resultados desta tese indicam que o sistema exergame Kinect table tennis possui feedback suficiente para o ensino das técnicas do tênis de mesa no cyberspace, local onde os jogadores trocaram informações acerca dos fundamentos desse esporte; assim, a observação dos movimentos do avatar também pôde ser utilizada para a aprendizagem motora. Os valores de fluxo encontrados nesta pesquisa confirmaram a hipótese de que os valores mais elevados estariam no grupo Networked. Embora tenham sido encontrados valores crescentes de fluxo a partir do grupo Singleplayer, com o menor valor, o único com valor médio acima de 4 (quatro) foi encontrado no grupo Networked, caracterizando, assim, um estado de fluxo. Exergames em rede podem ser usados como Social Exergames, ou seja, como redes sociais para atividades físicas.
The game is an important part of learning cognitive and social interaction of children. In the context of cognitive, for example, reproduction is considered essential for the stabilization processes, and for the development of cognitive structures. Video games have become a ubiquitous activity in today's society. Games, besides being used as entertainment, are being used in order to educate or train some skill in the areas of education and computing. Games are part of the new technologies used to create virtual learning environments widely discussed in science education. Recently due to the availability of use of sensing technologies and low cost screening, a new class of game emerged, the Exergame, matching game and exercise. The purpose of this dissertation was to explore the use of Exergame network for teaching physical education in cyberspace, in school age children (n=39) and college students (n=46), identifying their motivational aspects through the use of Theory Flow and Self-Determination. The measuring instrument Long Flow State Scale (FSS-2) Physical was used to verify student motivation while playing Exergame Kinect Sports, table tennis modality, in Kinect XBOX console.The results of this thesis indicate the system Exergame Kinect table tennis has enough feedback to teaching the techniques of table tennis in cyberspace, where players exchanged information on the grounds of sport, thereby observing the movements of the avatar could also be used for motor learning. Flow values found in this study confirm the hypothesis that higher values would Networked group. Although we found increasing values of flow from the group Singleplayer, with the lowest value, the one with above average value of 4 (four) was found in the group Networked, characterizing a state of flux. Exergames network can be used as social exergames, i.e. how social networks to physical activities.
47

Cantón, Federico Alberto. "The Fourth Amendment and Cyberspace: Conflict or Cohesion?" PDXScholar, 2011. https://pdxscholar.library.pdx.edu/open_access_etds/336.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
The purpose of the study was to determine how the Fourth Amendment is treated in the age of the internet. To determine the degree of the significance of this relationship a comparative approach is used. Court opinions from cases involving other technological innovations and the Fourth Amendment were examined and their reasoning was compared to that of cases involving the internet and the Fourth Amendment. The results indicated that contrary to some fears that the internet would require a different approach with respect to the law it actually did not present many novel barriers to its application. The principle conclusion was that the reasoning used in cases involving older technologies, namely the test outlined in Katz v. United States, was consistently applied even in the age of the internet.
48

Ogunlana, Sunday Oludare. "Countering Expansion and Organization of Terrorism in Cyberspace." ScholarWorks, 2018. https://scholarworks.waldenu.edu/dissertations/6079.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Terrorists use cyberspace and social media technology to create fear and spread violent ideologies, which pose a significant threat to public security. Researchers have documented the importance of the application of law and regulation in dealing with the criminal activities perpetrated through the aid of computers in cyberspace. Using routine activity theory, this study assessed the effectiveness of technological approaches to mitigating the expansion and organization of terrorism in cyberspace. The study aligned with the purpose area analysis objective of classifying and assessing potential terrorist threats to preempt and mitigate the attacks. Data collection included document content analysis of the open-source documents, government threat assessments, legislation, policy papers, and peer-reviewed academic literature and semistructured interviews with fifteen security experts in Nigeria. Yin's recommended analysis process of iterative and repetitive review of materials was applied to the documents analysis, including interviews of key public and private sector individuals to identify key themes on Nigeria's current effort to secure the nation's cyberspace. The key findings were that the new generation of terrorists who are more technological savvy are growing, cybersecurity technologies are effective and quicker tools, and bilateral/multilateral cooperation is essential to combat the expansion of terrorism in cyberspace. The implementation of recommendations from this study will improve the security in cyberspace, thereby contributing to positive social change. The data provided may be useful to stakeholders responsible for national security, counterterrorism, law enforcement on the choice of cybersecurity technologies to confront terrorist expansion, and organization in cyberspace.
49

Raut, Bimal Kumar. "Determining the Judicial Juristiction in the Transnational Cyberspace." Thesis, Queensland University of Technology, 2004. https://eprints.qut.edu.au/15830/1/Bimal_Raut_Thesis.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
This thesis analyses the traditional notion of jurisdiction in the light of Internet based activities which are inherently decentralised and ubiquitous. It is clear that the unique nature of the Internet has undermined the very foundation of the traditional notion of jurisdiction and the territorially based concepts of law and their application. Which court should hear disputes arising out of Internet activities? On what grounds may a court assert or decline the jurisdiction? These are perplexing questions currently facing courts worldwide because of the trans-national nature of the Internet by which people can transcend borders readily and rapidly. One simple and straightforward factor confronting lawmakers is that while most laws have a territorial nexus, the Internet defies the notion of territoriality. Traditionally, judicial jurisdiction has been exercised on a number of bases, such as where the defendant resides, whether the defendant is present within the forum and whether the defendant has property in the forum or not. These elements have been made largely irrelevant by the Internet. The Internet does not respect traditional boundaries and territories and it can even enable people to cross borders without any physical mobility. For instance, people are able to interact and even do business without revealing their identity. In the absence of any definite international law on Internet jurisdiction, how have the courts responded to this challenge? This thesis has examined the recent case law in Australia, United States of America and France. In examining the case authorities, the only conclusion that can be reached is that current court approaches are unworkable. This thesis has also examined some international proposals on the matter and found them to be deficient. Now, the dilemma before us is this: on the one hand, the present court approaches on Internet jurisdiction are unworkable. On the other hand, there is no clear international guidance to govern the jurisdictional issue. I believe this book makes a small contribution towards this perplexing question by proposing a new transnational principle which could be achieved through a "trans-national judicial dialogue". Trans-national judicial dialogue can play a significant role in the creation, recognition, and enforcement of global norms. There are a number of benefits to be gained if this approach is adopted in Internet jurisdiction cases. Ideally, trans-national judicial dialogue would reduce the conflicts among courts and foster a consensual approach, thus providing a stable and predictable paradigm for the crucial issue of jurisdiction. Moreover, the parties involved in a case would be prevented from forum shopping in search of a forum with a greater likelihood of a favourable decision. Also, courts would not be able to decline jurisdiction merely because of foreign elements involved. This may be the most appropriate global approach which is urgently required to address an increasingly global problem.
50

Raut, Bimal Kumar. "Determining the Judicial Juristiction in the Transnational Cyberspace." Queensland University of Technology, 2004. http://eprints.qut.edu.au/15830/.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
This thesis analyses the traditional notion of jurisdiction in the light of Internet based activities which are inherently decentralised and ubiquitous. It is clear that the unique nature of the Internet has undermined the very foundation of the traditional notion of jurisdiction and the territorially based concepts of law and their application. Which court should hear disputes arising out of Internet activities? On what grounds may a court assert or decline the jurisdiction? These are perplexing questions currently facing courts worldwide because of the trans-national nature of the Internet by which people can transcend borders readily and rapidly. One simple and straightforward factor confronting lawmakers is that while most laws have a territorial nexus, the Internet defies the notion of territoriality. Traditionally, judicial jurisdiction has been exercised on a number of bases, such as where the defendant resides, whether the defendant is present within the forum and whether the defendant has property in the forum or not. These elements have been made largely irrelevant by the Internet. The Internet does not respect traditional boundaries and territories and it can even enable people to cross borders without any physical mobility. For instance, people are able to interact and even do business without revealing their identity. In the absence of any definite international law on Internet jurisdiction, how have the courts responded to this challenge? This thesis has examined the recent case law in Australia, United States of America and France. In examining the case authorities, the only conclusion that can be reached is that current court approaches are unworkable. This thesis has also examined some international proposals on the matter and found them to be deficient. Now, the dilemma before us is this: on the one hand, the present court approaches on Internet jurisdiction are unworkable. On the other hand, there is no clear international guidance to govern the jurisdictional issue. I believe this book makes a small contribution towards this perplexing question by proposing a new transnational principle which could be achieved through a "trans-national judicial dialogue". Trans-national judicial dialogue can play a significant role in the creation, recognition, and enforcement of global norms. There are a number of benefits to be gained if this approach is adopted in Internet jurisdiction cases. Ideally, trans-national judicial dialogue would reduce the conflicts among courts and foster a consensual approach, thus providing a stable and predictable paradigm for the crucial issue of jurisdiction. Moreover, the parties involved in a case would be prevented from forum shopping in search of a forum with a greater likelihood of a favourable decision. Also, courts would not be able to decline jurisdiction merely because of foreign elements involved. This may be the most appropriate global approach which is urgently required to address an increasingly global problem.

To the bibliography