Zeitschriftenartikel zum Thema „Cyberhot“

Um die anderen Arten von Veröffentlichungen zu diesem Thema anzuzeigen, folgen Sie diesem Link: Cyberhot.

Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an

Wählen Sie eine Art der Quelle aus:

Machen Sie sich mit Top-50 Zeitschriftenartikel für die Forschung zum Thema "Cyberhot" bekannt.

Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.

Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.

Sehen Sie die Zeitschriftenartikel für verschiedene Spezialgebieten durch und erstellen Sie Ihre Bibliographie auf korrekte Weise.

1

Curran, Kevin, und Sheila Mc Kinney . „Cyberart“. Journal of Applied Sciences 4, Nr. 4 (15.09.2004): 531–36. http://dx.doi.org/10.3923/jas.2004.531.536.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

LEVIN, BRIAN. „Cyberhate“. American Behavioral Scientist 45, Nr. 6 (Februar 2002): 958–88. http://dx.doi.org/10.1177/0002764202045006004.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Lewis, Mike. „CYBERLOG“. Health Libraries Review 5, Nr. 3 (September 1988): 211–14. http://dx.doi.org/10.1046/j.1365-2532.1988.5302102.x.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Porett, Tom. „Cyberart Considerations“. Art Journal 53, Nr. 3 (1994): 32. http://dx.doi.org/10.2307/777416.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Meyer, Helen. „Cybercop scanner“. Computers & Security 18, Nr. 3 (Januar 1999): 234. http://dx.doi.org/10.1016/s0167-4048(99)90941-0.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Douglas, Karen M., Craig Mcgarty, Ana-Maria Bliuc und Girish Lala. „Understanding Cyberhate“. Social Science Computer Review 23, Nr. 1 (Februar 2005): 68–76. http://dx.doi.org/10.1177/0894439304271538.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Maulitz, R. C., J. A. Ohles, R. L. Schnuth, M. S. Lipsky und R. J. Grealish. „The CyberDoc project“. Academic Medicine 71, Nr. 12 (Dezember 1996): 1325–8. http://dx.doi.org/10.1097/00001888-199612000-00014.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Bakalis, Chara. „Rethinking cyberhate laws“. Information & Communications Technology Law 27, Nr. 1 (30.10.2017): 86–110. http://dx.doi.org/10.1080/13600834.2017.1393934.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Celik, Serkan. „Experiences of internet users regarding cyberhate“. Information Technology & People 32, Nr. 6 (02.12.2019): 1446–71. http://dx.doi.org/10.1108/itp-01-2018-0009.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
Annotation:
Purpose The purpose of this paper is to explore internet users’ experiences of cyberhate in the aspects of ethnicity, religion, sexual preference and political perspective. Design/methodology/approach Researchers employed an exploratory survey method to examine internet users’ experiences of cyberhate. The participants of the study were determined by purposive sampling methods to attain maximum variety among internet users with high-level digital literacy skills. The data were collected from 355 internet users affiliated with two universities in Turkey and the USA using a personal data form and a survey (Cyberhate Experience Survey) of which reliability and validity indexes were ensured. Findings The results indicated that participants have observed and experienced cyberhate at different levels targeting their ethnic, religious, gender-based and political identities. The findings also pointed out that gender, income and socio-political identities are significant variables on exposure to cyberhate regardless of cultural and educational boundaries. The majority of survey respondents reported that they had encountered cyberhate mostly on social media platforms. Social implications The findings of the study imply that to address the hate speech problem comprehensively, the author must enlighten people, change their way of thinking and broaden their perspectives by using measures such as intercultural dialogue, critical thinking, media literacy, education on tolerance and diversity. Originality/value This research was intended to contribute into the need to elaborate on various aspects of cyberhate, which is shared by academics, thinkers, journalists and educators. It may also serve to clarify how frequently internet users encounter hateful content and harassment online, which can have social consequences and influence young people’s trust to other people.
10

Celik, Serkan. „Tertiary-level internet users’ opinions and perceptions of cyberhate“. Information Technology & People 31, Nr. 3 (04.06.2018): 845–68. http://dx.doi.org/10.1108/itp-05-2017-0147.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
Annotation:
PurposeThe purpose of this paper is to elaborate the opinions and perceptions of internet users regarding online hate speech, and bring cyberhate to the attention of internet users and policy stakeholders.Design/methodology/approachA sectional research design and survey method was adopted throughout the study to examine the opinions and perceptions of internet users regarding cyberhate by descriptively exploring the existing situation from various perspectives. The participants of the study were determined by purposive sampling methods to attain maximum variety among internet users who are considered as highly literate in technology use. The data were collected through a personal data form and a survey (Cyberhate Perception Scale) from 372 internet users living in Turkey and the USA.FindingsThe findings of the study revealed that the majority of participants do not perceive cyberhate as a part of freedom of speech and they believe that online hate behaviors, which they also consider to be a violation of human rights, should be deemed illegal and be punished accordingly. The findings, which were discussed in line with the existing research, indicated some significant predictors of internet users’ perceptions on cyberhate.Originality/valueAs cyberhate is an understudied area that raises concerns in terms of internet user exposure, the objective of this research is to understand tendencies about the opinions and perceptions of internet users regarding online hate speech, and bring cyberhate to the attention of internet users and policy stakeholders.
11

Ahn, Sung H., V. Sundararajan, Charles Smith, Balaji Kannan, Roshan D’Souza, Ganping Sun, Ashish Mohole et al. „CyberCut: An Internet-based CAD/CAM System“. Journal of Computing and Information Science in Engineering 1, Nr. 1 (01.01.2001): 52–59. http://dx.doi.org/10.1115/1.1351811.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
Annotation:
“CyberCut™” is a testbed for an Internet-based CAD/CAM system. It was specifically designed to be a networked, automated system, with a seamless communication flow from a client-side designer to a server-side machining service. The creation of CyberCut required several new software modules. These include: a) a Web-based design tool in which Design-for-Manufacturing information and machining rules constrain the designer to manufacturable parts; b) a geometric representation called SIF-DSG, for unambiguous communication between the client-side designer and the server-side process planner; c) an automated process planning system with several sub-modules that convert an incoming design to a set of tool-paths for execution on a 3-axis CNC milling machine. Using this software-pipeline, a CyberCut service, modeled on the MOSIS service for VLSI chips, has been now been launched for limited student-use at a group of cooperating universities.
12

Meyer, Helen. „Cybercop takes on network snoops“. Computers & Security 15, Nr. 8 (Januar 1996): 685. http://dx.doi.org/10.1016/s0167-4048(97)89701-5.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
13

Perry, Barbara, und Patrik Olsson. „Cyberhate: the globalization of hate“. Information & Communications Technology Law 18, Nr. 2 (Juli 2009): 185–99. http://dx.doi.org/10.1080/13600830902814984.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
14

Viires, Piret. „Literature in Cyberspace“. Folklore: Electronic Journal of Folklore 29 (2005): 153–74. http://dx.doi.org/10.7592/fejf2005.29.cyberlit.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
15

Belykh, Vladimir S., und Vladislav O. Puchkov. „The Cybertort Concept in the Anglo-American Law“. Jurist 10 (01.10.2020): 2–11. http://dx.doi.org/10.18572/1812-3929-2020-10-2-11.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
16

Domingues, Diana. „Cyberart and interfaces: the coupled body“. Digital Creativity 15, Nr. 3 (August 2004): 159–74. http://dx.doi.org/10.1080/14626260408520177.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
17

Nanduri, Ashok Kumar, G. L. Sravanthi, K. V. K. V. L. Pavan Kumar, Sadhu Ratna Babu und K. V. S. S. Rama Krishna. „Modified Fuzzy Approach to Automatic Classification of Cyber Hate Speech from the Online Social Networks (OSN’s)“. Revue d'Intelligence Artificielle 35, Nr. 2 (30.04.2021): 139–44. http://dx.doi.org/10.18280/ria.350205.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
Annotation:
The extensive use of online media and sharing of data has given considerable benefits to humankind. Sentimental analysis has become the most dynamic and famous application area in current days, which is mainly used in knowing the public's opinion. Most algorithms of machine learning are used as principle methods for sentimental analysis. Even though several methods are available for classification and reviews, all of them belong to a single class of classification which differs among several different classes. No methods are available for the classifying of multi-class instances. Therefore, fuzzy methods are used for classifying the instances depended on multi-class for achieving a clear-cut view by indicating suitable labels to objects during the classification of text. This paper includes the categorization of cyberhate information. If there is a growth in dislike speeches of the online social network may lead to a worse impact amongst social activities, which causes tensions among communication and regional. So, there is the most demand for cyberhate conversation detection automatically through online social media. Generally, an updated process of fuzzy words is designed that includes two stages of training for the classification of cyberhate conversation into 4 forms, race, disability, sexual orientation, and religion. Depended on the types of classification, experiments have been conducted on these four forms by gathering different conversations through online media. Systems based on rules of fuzzy approach have been used. This fuzzy with rule-based is for the classification of features using Machine Learning techniques such as the words that implants for future bag-of-words and extraction methods. In this, the cyberhate conversations are taken from OSN's depended on the attributes defined in a dataset using rule-based fuzzy.
18

Brown, Alexander. „What is so special about online (as compared to offline) hate speech?“ Ethnicities 18, Nr. 3 (19.05.2017): 297–326. http://dx.doi.org/10.1177/1468796817709846.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
Annotation:
There is a growing body of literature on whether or not online hate speech, or cyberhate, might be special compared to offline hate speech. This article aims to both critique and augment that literature by emphasising a distinctive feature of the Internet and of cyberhate that, unlike other features, such as ease of access, size of audience, and anonymity, is often overlooked: namely, instantaneousness. This article also asks whether there is anything special about online (as compared to offline) hate speech that might warrant governments and intergovernmental organisations contracting out, so to speak, the responsibility for tackling online hate speech to the very Internet companies which provide the websites and services that hate speakers utilise.
19

Jane, Emma A. „Feminist Digilante Responses to a Slut-Shaming on Facebook“. Social Media + Society 3, Nr. 2 (April 2017): 205630511770599. http://dx.doi.org/10.1177/2056305117705996.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
Annotation:
This article examines feminist digilantism in response to the “slut-shaming” of an Australian woman on Facebook in 2015. The activism is used to highlight the nature and significance of the feminist pushback against the worsening problem of cyber violence against women and girls (cyber VAWG). This article builds on my previous research into feminist digilantism and is part of a much larger, mixed-methods, multi-modal study into gendered cyberhate. It uses approaches from Internet historiography, ethnography, and netnography, alongside data drawn from qualitative interviews. Sufficient evidence is available to support the broad argument that the feminist digilantism involved in the case study under analysis was efficacious as well as ethically justified given the dearth of institutional interventions. That said, I demonstrate that while such activism has benefits, it also has risks and disadvantages, and raises ethical issues. This critique of digilantism is not intended as yet another type of victim blaming which suggests the activist responses of cyberhate targets are flawed. Instead, my case is that appraising the efficacy and ethics of such forms of extrajudicial activism should take place within a framing acknowledging that these actions are primarily diagnostic of rather than a solution to cyber VAWG. As such, the increasing prevalence and strength of feminist digilantism lends further support to the case that gendered cyberhate is a problem demanding urgent and multifaceted intervention.
20

Rapoport, Sonya. „Color in the Shadows: Bay Area Cyberart“. Leonardo 28, Nr. 1 (1995): 77. http://dx.doi.org/10.2307/1576170.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
21

Yékú, James. „Akposdoncome again:†Nigerian cyberpop hero as trickster“. Journal of African Cultural Studies 28, Nr. 3 (07.08.2015): 245–61. http://dx.doi.org/10.1080/13696815.2015.1069735.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
22

A. MOONEY J. G. BLIGH, G. „CyberIST :a virtual game for medical education“. Medical Teacher 20, Nr. 3 (Januar 1998): 212–16. http://dx.doi.org/10.1080/01421599880940.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
23

Kubota, Toru. „Clinical Evaluation of the Cyberhoby Computer System“. Journal of Japan Gnathology 8, Nr. 3-4 (1987): 27–32. http://dx.doi.org/10.14399/jacd1982.8.3-4_27.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
24

Bishop, Charles. „Cyberlog: The Journal of Applied Medical Software“. Serials Review 12, Nr. 1 (März 1986): 5. http://dx.doi.org/10.1080/00987913.1986.10763662.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
25

Bishop, Charles. „Cyberlog: The Journal of Applied Medical Software“. Serials Review 12, Nr. 1 (März 1986): 5. http://dx.doi.org/10.1016/0098-7913(86)90003-1.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
26

Wachs, Sebastian, Manuel Gámez-Guadix, Michelle F. Wright, Anke Görzig und Wilfried Schubarth. „How do adolescents cope with cyberhate? Psychometric properties and socio-demographic differences of a coping with cyberhate scale“. Computers in Human Behavior 104 (März 2020): 106167. http://dx.doi.org/10.1016/j.chb.2019.106167.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
27

Jane, Emma A. „Systemic misogyny exposed: Translating Rapeglish from the Manosphere with a Random Rape Threat Generator“. International Journal of Cultural Studies 21, Nr. 6 (02.11.2017): 661–80. http://dx.doi.org/10.1177/1367877917734042.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
Annotation:
Misogyny online in forms such as explicit rape threats has become so prevalent and rhetorically distinctive it resembles a new dialect or language. Much of this ‘Rapeglish’ is produced by members of an informal alliance of men’s groups online dubbed the ‘Manosphere’. As both a cyberhate researcher and cyberhate target, I have studied as well as contributed to feminist responses to Rapeglish. In 2016, for instance, I helped build a Random Rape Threat Generator (RRTG) – a computer program that splices, shuffles around, and re-stitches in novel combinations fragments of real-life Rapeglish to illustrate the formulaic, machine-like, and impersonal nature of misogynist discourse online. This article uses Yuri Lotman’s ideas about intra- and inter-cultural conflict involving something akin to the translation of a foreign language to frame the RRTG as one example of the way women are ‘talking back’ both to and with Rapeglish (the latter involving appropriations and subversions of the original discourse).
28

Stanley, Ruth. „Software Review: CYBERLOG. Perspectives in Rational Management: Hypertension“. DICP 24, Nr. 9 (September 1990): 896. http://dx.doi.org/10.1177/106002809002400938.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
29

Bowman, Joseph. „Cyberhood Connections: Educational Webmasters and Designing Hypermedia Environments“. Journal of Educational Technology Systems 25, Nr. 2 (Dezember 1996): 117–25. http://dx.doi.org/10.2190/36d4-rrgc-r5wd-3cl9.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
Annotation:
As access to the Internet grows, educators are defining how to use its resources for classroom instruction, alternative education models, and as an instructional tool that supports student learning and achievement. The Center for Urban Youth and Technology (CUYT) has developed a design model that introduces educators, teachers, and students to hypermedia and the Internet. The basis for the CyberHood initiative is a concern about the economic and educational conditions in urban cities and a belief in the potential of technology to support and improve the same. Working collaboratively with an Internet web company (the Aframian World Enterprises) and a school-to-work program (Youth Construction Initiative Program) at the University at Albany, our research focused on development of an educational hypermedia model for instruction and design.
30

Jane, Emma A. „Gendered cyberhate as workplace harassment and economic vandalism“. Feminist Media Studies 18, Nr. 4 (16.03.2018): 575–91. http://dx.doi.org/10.1080/14680777.2018.1447344.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
31

Walsh, Crosbie. „Political blogs on Fiji: A ‘cybernet democracy’ case study“. Pacific Journalism Review : Te Koakoa 16, Nr. 1 (01.05.2010): 154–77. http://dx.doi.org/10.24135/pjr.v16i1.1015.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
Annotation:
Political blogging in politically unstable and repressive countries has been seen as a form of cybernet democracy. This research article examines this claim in post-coup Fiji in the wake of the 2006 military takeover, details the author’s experiences with blogging, comments on the Fiji blogosphere in a climate of conflict, and attempts an analysis of the overall pro and anti-government blog landscape that involves more than 70 political blogs. Unlike earlier published research on Fiji blogs, it is an ‘insider’ view, written by an academic who is also a blog publisher—publishing Fiji As It Was, Is and Can Be (FAIW).
32

Pilloy, W. J. „CyberPET: a PET service distributed over a wide area“. Nuclear Medicine Communications 23, Nr. 12 (Dezember 2002): 1232–33. http://dx.doi.org/10.1097/00006231-200212000-00038.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
33

Blaya, Catherine. „Cyberhate: A review and content analysis of intervention strategies“. Aggression and Violent Behavior 45 (März 2019): 163–72. http://dx.doi.org/10.1016/j.avb.2018.05.006.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
34

Ahn, S. H., S. McMains, C. H. Séquin und P. K. Wright. „Mechanical implementation services for rapid prototyping“. Proceedings of the Institution of Mechanical Engineers, Part B: Journal of Engineering Manufacture 216, Nr. 8 (01.08.2002): 1193–99. http://dx.doi.org/10.1243/095440502760272467.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
Annotation:
Inspired by the metal oxide system implementation service (MOSIS) project, CyberCut is an experimental fabrication testbed for an Internet-accessible, computerized prototyping and machining service. Client-designers can create mechanical components, generally using our web-based computer aided design (CAD) system (available at http://cad.berkeley.edu ), and submit appropriate files to the server at Berkeley for process planning. CyberCut then utilizes an open-architecture, computer numerical control (CNC) machine tool for fabrication. Rapid tool path planning, novel fixturing techniques and sensor-based precision machining techniques allow the designer to take delivery of a component machined from high-strength materials with good tolerances, e.g. ±0.002in (0.05 mm). There are also instances where the complex geometry of a component cannot be prototyped on our three-axis machine tool. For these components use is made of solid freeform fabrication (SFF) technologies such as fused deposition modelling (FDM) to build a prototype of the design. Based on experience with this testbed, a new characterization of types of relationship, or ‘couplings’, between design and manufacturing has been developed using the three classifications ‘loose and repetitive’, ‘stiff and one-way’ or ‘strong and bidirectional’. These three couplings represent different trade-offs between ‘design flexibility’ and ‘guaranteed manufacturability’.
35

Sidiq, Hadi Kurniawan, Dana Sulistyo Kusumo und Indra Lukmana Sardi. „Mendeteksi Cyberhate pada Twitter Menggunakan Text Classification dan Crowdsourced Labeling“. Jurnal Nasional Teknik Elektro dan Teknologi Informasi (JNTETI) 8, Nr. 4 (20.11.2019): 315. http://dx.doi.org/10.22146/jnteti.v8i4.530.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
36

Smith, Charles S., und Paul K. Wright. „CyberCut: A World Wide Web based design-to-fabrication tool“. Journal of Manufacturing Systems 15, Nr. 6 (Januar 1996): 432–42. http://dx.doi.org/10.1016/s0278-6125(97)83056-7.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
37

Mauro, Vincent F. „Book Review: Cyberlog: A Library of Applied Medical Software: Arrhythmias“. DICP 25, Nr. 6 (Juni 1991): 684. http://dx.doi.org/10.1177/106002809102500631.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
38

Abel, Pierre, Pascal Gros, Didier Loisel, Cristina Russo Dos Santos und Jean-Pierre Paris. „CyberNet: A framework for managing networks using 3D metaphoric worlds“. Annales Des Télécommunications 55, Nr. 3-4 (März 2000): 131–42. http://dx.doi.org/10.1007/bf03001906.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
39

Khorrami, E. „E-Health und Cyberdoc - Gesundheitsportale im Blickfeld von Standesrecht und Qualitätssicherung“. Das Gesundheitswesen 64, Nr. 8/9 (August 2002): 466–75. http://dx.doi.org/10.1055/s-2002-33779.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
40

Mrđenović, Maja. „Hatsune Miku: The subversive potential of a participatory-created cyberpop idol“. Kultura, Nr. 169 (2020): 113–29. http://dx.doi.org/10.5937/kultura2069113m.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
Annotation:
Virtual worlds and online interactions are the base of cyberpop culture, in which consumption also causes production of meaning. It possibly can, but does not have to bring out subversive and/or activist potential. The overflow of the virtual into the spaces of physical reality, by use of technologies as gestural interfaces, holographic projections and the like, allows direct bodily interactions with virtual objects. Some of these objects are so-called virtual idols. Their appearance, identity and celebrity status are constructed and assigned by real people in the real world. This paper analyses the role of fans in the creation of the most famous virtual idol, the vocaloid Hatsune Miku. Based on this analysis, the paper puts forward a thesis that existence of Hatsune Miku puts emphasis on the activity (participation) per se, instead of activism. It does not serve the idea of social change, but the maintaining of the social status quo.
41

Sundararajan, V., und Paul K. Wright. „Feature Based Macroplanning Including Fixturing“. Journal of Computing and Information Science in Engineering 2, Nr. 3 (01.09.2002): 179–91. http://dx.doi.org/10.1115/1.1526506.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
Annotation:
Macroplanning is concerned with deciding on setups and sequences of operations by taking into account interactions between features and issues of fixturing. The algorithms presented in this paper use a set of features arranged in a graph-like data structure to determine the fixture configurations and setups. Operation sequences for the features and tool-paths are determined by separate modules working in conjunction with the macroplanner. Examples are presented to demonstrate the capability of the algorithms implemented in an integrated CAD/ CAM system called CyberCut.
42

Kumkale, Zeynep, und Abdullah Adiguzel. „The impact of cyberhunt on reading comprehension level in foreign language teaching“. Journal of Higher Education and Science 9, Nr. 2 (2019): 268. http://dx.doi.org/10.5961/jhes.2019.329.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
43

Oksanen, Atte, Markus Kaakinen, Jaana Minkkinen, Pekka Räsänen, Bernard Enjolras und Kari Steen-Johnsen. „Perceived Societal Fear and Cyberhate after the November 2015 Paris Terrorist Attacks“. Terrorism and Political Violence 32, Nr. 5 (09.04.2018): 1047–66. http://dx.doi.org/10.1080/09546553.2018.1442329.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
44

Sobocki, J., P. Thor, G. Krolczyk, J. Uson, I. Diaz-Guemes und M. Lipinski. „The Cybergut. An Experimental Study on Permanent Microchip Neuromodulation for Control of Gut Function“. Acta Chirurgica Belgica 102, Nr. 2 (Januar 2002): 68–70. http://dx.doi.org/10.1080/00015458.2002.11679268.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
45

Wachs, Sebastian, Michelle F. Wright und Alexander T. Vazsonyi. „Understanding the overlap between cyberbullying and cyberhate perpetration: Moderating effects of toxic online disinhibition“. Criminal Behaviour and Mental Health 29, Nr. 3 (Juni 2019): 179–88. http://dx.doi.org/10.1002/cbm.2116.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
46

Trofymenko, Olena, Yuliia Prokop, Nataliia Lohinova und Oleksandr Zadereiko. „Monitoring of Cybersecurity Level of Ukraine in World Ratings“. Information Security of the Person, Society and State, Nr. 27 (2019): 119–26. http://dx.doi.org/10.51369/2707-7276-2019-3-13.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
Annotation:
The article is devoted to monitoring of the level of cybersecurity of Ukraine in world rankings. The authors’ attention was focused on analyzing the main problems of building a national cyber defense system, considering international experience. According to the authors, ensuring the cybersecurity of the country is possible only with the comprehensive and continuous use of legal and technical methods of protection not only at the national, but also at the international level. International cooperation will ensure an adequate level of cybersecurity and protect information infrastructures in modern conditions of the information society development. Key words: cybersecurity, cyberat-tacks, cyber incidents, cyberthreat, infor-mation security, cybersecurity strategy.
47

Storey, Patrick B. „Hypertension. A review of third issue of cyberlog. Michael G. Sormeyer, M.D. Morris Davidman, M.D.“ Möbius: A Journal for Continuing Education Professionals in Health Sciences 7, Nr. 1 (Januar 1987): 71–73. http://dx.doi.org/10.1002/chp.4760070112.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
48

Sakabe, Fabiana Forti, Daniel Iwai Sakabe, Fátima Regina Marracini Fernandes und Gisele Reges. „Estimulação pulsada de alta voltagem reduz a área de úlceras de diferentes etiologias“. Fisioterapia Brasil 19, Nr. 1 (17.03.2018): 72. http://dx.doi.org/10.33233/fb.v19i1.2124.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
Annotation:
As úlceras são definidas como rupturas de estruturas anatômicas do corpo, levando ao comprometimento da função fisiológica dos tecidos envolvidos. A estimulação elétrica de alta voltagem (EEAV) pode auxiliar na cicatrização de tecidos. O objetivo desse estudo foi avaliar o efeito de 30 sessões de EEAV na cicatrização de úlceras de diferentes etiologias. Participaram 6 voluntários e foram tratadas 10 úlceras cutâneas. Para quantificar a área das lesões (cm2) foi realizada a fotogrametria a cada 10 sessões (câmera digital Sony Cybershot, 7.2 megapixels). A intervenção consistiu na aplicação da EEAV (T=100 ms; f= 100 Hz; intensidade de100 a 150 V), 2 a 3x/semana, por 30 minutos. Os eletrodos ativos (negativo) foram fixados sobre a lesão e o dispersivo (positivo) fixado no trajeto vascular. Com relação à área das lesões por pressão, a úlcera sacral reduziu 84,10% da sua área, a trocanteriana e do maléolo medial cicatrizaram completamente em 10 sessões. As úlceras neuropáticas fecharam completamente em 20 sessões. As cinco úlceras venosas (região do tornozelo), apresentaram redução em sua área de 26,29%, 80%, 44,69%, 28,23% e 6,27%. A EEAV foi eficaz pois promoveu a cicatrização completa de quatro úlceras e auxiliou a redução na área de outras seis lesões.Palavras-chave: estimulação elétrica, cicatrização de feridas, fotogrametria.
49

Kavanagh, Emma, Chelsea Litchfield und Jaquelyn Osborne. „Sporting Women and Social Media: Sexualization, Misogyny, and Gender-Based Violence in Online Spaces“. International Journal of Sport Communication 12, Nr. 4 (01.12.2019): 552–72. http://dx.doi.org/10.1123/ijsc.2019-0079.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
Annotation:
This study investigated gender-based violence targeting high-profile women in virtual environments through the case of women’s tennis. Using a netnographic approach and the lens of third-wave feminism, 2 popular social media platforms (Facebook and Twitter) were analyzed to examine social commentary and fan interaction surrounding the top-5-seeded female tennis players during the Wimbledon Tennis Championships. Athletes were exposed to violent interactions in a number of ways. Four themes were identified through data analysis: threats of physical violence, sexualization that focused on the female physical appearance, sexualization that expressed desire and/or proposed physical or sexual contact, and sexualization that was vile, explicit, and threateningly violent in a sexual or misogynistic manner. Findings demonstrate how social media provides a space for unregulated gender-based cyberhate targeting high-profile women in their workplace in a way that traditional sport media does not.
50

YOSHIDA, Hiroshi, und Hiroatsu MATSUURA. „CyberMol-A Molecular Graphics Program System on the World Wide Web Using the Common Gateway Interface.“ Journal of Chemical Software 3, Nr. 4 (1997): 157–63. http://dx.doi.org/10.2477/jchemsoft.3.157.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen

Zur Bibliographie