Academic literature on the topic 'Cyberspace'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Cyberspace.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Cyberspace"

1

Kachynskyi, A. B., and I. S. Styopochkina. "A systematic approach to the analysis of phenomena of the information and cyberspaces." Reports of the National Academy of Sciences of Ukraine, no. 11 (2020): 16–23. http://dx.doi.org/10.15407/dopovidi2020.11.016.

Full text
Abstract:
The terms “information space” and “cyberspace” form the basis of definitions of information security and cyber security. The actual issue is to determine the essence of the phenomena of the information and cyberspace, which currently do not have a unified vision. The paper proposes a study of the structure and properties of the information space and cyber space, based on a mathematical formalism, which distinguishes the work from the previous ones, where the corresponding spaces were considered descriptively. The information and cyberspaces are considered as complex systems to which a system a
APA, Harvard, Vancouver, ISO, and other styles
2

Kellerman, Aharon. "Cyberspace Classification and Cognition: Information and Communications Cyberspaces." Journal of Urban Technology 14, no. 3 (2007): 5–32. http://dx.doi.org/10.1080/10630730801923110.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Boswell, Suzanne F. "“Jack In, Young Pioneer”: Frontier Politics, Ecological Entrapment, and the Architecture of Cyberspace." American Literature 93, no. 3 (2021): 417–44. http://dx.doi.org/10.1215/00029831-9361251.

Full text
Abstract:
Abstract This essay uncovers the environmental and historical conditions that played a role in cyberspace’s popularity in the 1980s and 1990s. Tracing both fictional and critical constructions of cyberspace in a roughly twenty-year period from the publication of William Gibson’s Sprawl trilogy (1984–1988) to the Telecommunications Act of 1996, this essay argues that cyberspace’s infinite, virtual territory provided a solution to the apparent ecological crisis of the 1980s: the fear that the United States was running out of physical room to expand due to overdevelopment. By discursively transfo
APA, Harvard, Vancouver, ISO, and other styles
4

Ehrlich, Heyward. "Poe in Cyberspace: Populating Cyberspace." Edgar Allan Poe Review 8, no. 1 (2007): 91–96. http://dx.doi.org/10.2307/41506028.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

AFRINA, CUT. "CYBERSPACE ANALYSIS IN NA'VI AVATAR FILM AS A REQUIREMENT OF VIRTUAL SPACES." Ekspresi Seni : Jurnal Ilmu Pengetahuan dan Karya Seni 23, no. 1 (2021): 10. http://dx.doi.org/10.26887/ekspresi.v22i2.1024.

Full text
Abstract:
Cyberspace as Virtual space embodiment in Na'vi's Avatar Film by using the analysis theory according to Mark Slouka. The purpose of the Film Avatar analysis is to further understand the elements of the Cyberspace in the film, the results of the analysis of the authors on the movie Avatar is the advancement of technology and communication with a network capable of creating Cyberspace in a life. Where the human sense of being now leads to machine culture as a product of media communication technology is Internet. Cyberspace in the movie Aavatar is able to disrupt the balance that is on the Na'vi
APA, Harvard, Vancouver, ISO, and other styles
6

Hurley, John S. "Cyberspace." International Journal of Cyber Warfare and Terrorism 7, no. 3 (2017): 1–15. http://dx.doi.org/10.4018/ijcwt.2017070101.

Full text
Abstract:
The transition of the warfare mentality from the conventional domains of engagement (air, land, maritime, and space) to the cyberspace domain has not been an easy one for established organizations and institutions. The battlefield, in which now speed and stealth instead of size and budget are the determining factors that provide an edge have not well for many, especially those in the military. Now they do not clearly dictate who amongst combatants have the ‘upper hand' and represent a significant paradigm shift from factors that were very good predictors of a potential outcome of military conf
APA, Harvard, Vancouver, ISO, and other styles
7

Bollas, Christopher. "Cyberspace." Psychoanalytic Review 94, no. 1 (2007): 7–10. http://dx.doi.org/10.1521/prev.2007.94.1.7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Scheffler, A. L. "CyberSpace." Quality and Safety in Health Care 11, no. 2 (2002): 200–201. http://dx.doi.org/10.1136/qhc.11.2.200.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Richard, Michael A. "Cyberspace." Employee Assistance Quarterly 19, no. 2 (2004): 51–60. http://dx.doi.org/10.1300/j022v19n02_04.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Pesce, M. D., P. Kennard, and A. S. Parisi. "Cyberspace." Computer Networks and ISDN Systems 27, no. 2 (1994): 315. http://dx.doi.org/10.1016/s0169-7552(94)90171-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Cyberspace"

1

Chan, Cho-yan Jonathan, and 陳祖恩. "Traumatic cyberspace: witnessing cyberspace as a site of Trauma." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2002. http://hub.hku.hk/bib/B31227144.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Wipper, Renate. "Umweltbildung im Cyberspace." Universität Potsdam, 1999. http://opus.kobv.de/ubp/volltexte/2005/298/.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Barber, Clair. "Shakespeare and cyberspace." Thesis, University of Sussex, 2003. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.288165.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Ackroyd, Bradley Sterling. "Hinduism in cyberspace." [Gainesville, Fla.] : University of Florida, 2006. http://purl.fcla.edu/fcla/etd/UFE0014320.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Simu, Nicklas. "Strategisk bombning i cyberspace." Thesis, Försvarshögskolan, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:fhs:diva-5514.

Full text
Abstract:
Why has some cyber-attacks been more successful than others? There has been in the near past examples of cyber-attacks used with different purposes. How do we understand these chosen targets and what result the attack accomplished? Research has discussed similarities between aviation warfare and cyber warfare, and how the first could explain what is happening in cyber warfare now. There is also opposing opinions whether cyber warfare should be seen as a method to alone force a will on your opponent or if cyber warfare should mere be supporting other military means. The essay test Warden’s theo
APA, Harvard, Vancouver, ISO, and other styles
6

Young, Peter. "Visualising software in cyberspace." Thesis, Durham University, 1999. http://etheses.dur.ac.uk/4363/.

Full text
Abstract:
The problems of maintaining software systems are well documented. The increasing size and complexity of modern software serves only to worsen matters. Software maintainers are typically confronted with very large and very complex software systems, of which they may have little or no prior knowledge. At this stage they will normally have some maintenance task to perform, though possibly little indication of where or how to start. They need to investigate and understand the software to some extent in order to begin maintenance. This understanding process is termed program comprehension. There ar
APA, Harvard, Vancouver, ISO, and other styles
7

Karaflogka, Anastasia. "Religious discourse and cyberspace." Thesis, SOAS, University of London, 2005. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.422207.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Herring, Deborah. "Contextual theology in cyberspace." Thesis, University of Sheffield, 2005. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.427215.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Bayne, Siân. "Learning cultures in cyberspace." Thesis, Queen Margaret University, 2004. https://eresearch.qmu.ac.uk/handle/20.500.12289/7328.

Full text
Abstract:
This thesis is a study of emerging learning cultures. Its focus is on students and teachers who are engaged in using internet technologies for learning in higher education in the United Kingdom. The thesis provides an exploration of theoretical approaches to the cultural impact of new technologies, drawing on cultural, cybercultural and educational theory. It applies these theoretical insights to interview texts generated through discussions with learners and teachers. Its contribution lies in the originality of its empirical material and of the insights applied to their analysis, and in its a
APA, Harvard, Vancouver, ISO, and other styles
10

Qiang, Wen. "Cultural resistances in Chinese cyberspace." Thesis, University of Macau, 2010. http://umaclib3.umac.mo/record=b2150205.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Cyberspace"

1

Ramírez, J. Martín, and Luis A. García-Segura, eds. Cyberspace. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-54975-0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Trevor, Winkfield, Granary Books (Firm), and Press Collection (Library of Congress), eds. Cyberspace. Granary Books, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Buick, Joanna. Introducing cyberspace. Totem Books, 1995.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Fang, Binxing. Cyberspace Sovereignty. Springer Singapore, 2018. http://dx.doi.org/10.1007/978-981-13-0320-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Bolhuis, Herman E. van. Cyberspace reflections. VUB Press, 1995.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Villafuerte, Nelly Favis. Understanding-- cyberspace. Appels of Gold, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

1956-, Wall David, ed. Cyberspace crime. Ashgate, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Orme, David. Cyberspace warrior. Stanley Thornes, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Dodge, Martin E. Mapping Cyberspace. Routledge, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

ill, Beaumont Laura, ed. Cyberspace adventure. Barron's, 1995.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Cyberspace"

1

Woolley, Benjamin. "Cyberspace." In Die Wirklichkeit der virtuellen Welten. Birkhäuser Basel, 1994. http://dx.doi.org/10.1007/978-3-0348-6179-3_7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Powell, Larry, and Joseph Cowart. "Cyberspace." In Political Campaign Communication. Routledge, 2017. http://dx.doi.org/10.4324/9781315265049-14.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Domingo, Francis C. "Cyberspace." In The Routledge Handbook of Great Power Competition. Routledge, 2024. http://dx.doi.org/10.4324/9781003340997-25.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Rennie, Frank, and Keith Smyth. "Cyberspace." In Digital Learning: The Key Concepts, 2nd ed. Routledge, 2019. http://dx.doi.org/10.4324/9780429425240-51.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Skillicorn, David B. "Cyberspace." In Cyberspace, Data Analytics, and Policing. Chapman and Hall/CRC, 2021. http://dx.doi.org/10.1201/9781003126225-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Nicaso, Antonio, and Marcel Danesi. "Cyberspace." In Organized Crime. Routledge, 2021. http://dx.doi.org/10.4324/9781003027072-15.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Kellerman, Aharon. "Cyberspace." In The Encyclopedia of Human Geography. Springer International Publishing, 2024. http://dx.doi.org/10.1007/978-3-031-25900-5_157-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Elizalde, Emilio. "On How the Cyberspace Arose to Fulfill Theoretical Physicists’ Needs and Eventually Changed the World: Personal Recallings and a Practitioner’s Perspective." In Cyberspace. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-54975-0_1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Cesteros, Francisco José. "Collaboration of Private Investigation with Public Institutions Within the Spanish Cybersecurity Strategy. How Private Investigation Gathers Proof on Cyber Delinquency." In Cyberspace. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-54975-0_10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Fernández-Rodríguez, Juan Carlos, and Fernando Miralles-Muñoz. "Psychosociological Characteristics of Cybercrime." In Cyberspace. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-54975-0_11.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Cyberspace"

1

Pawlicka, Aleksandra, Michał Choraś, and Marek Pawlicki. "Cyberspace threats." In ARES 2020: The 15th International Conference on Availability, Reliability and Security. ACM, 2020. http://dx.doi.org/10.1145/3407023.3409181.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

A McDaniel, Elizabeth, and Michael S. Piller. "Mapping Cyberspace." In InSITE 2012: Informing Science + IT Education Conference. Informing Science Institute, 2012. http://dx.doi.org/10.28945/1672.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

"Survivability in cyberspace." In Systems (ICCES). IEEE, 2010. http://dx.doi.org/10.1109/icces.2010.5674916.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Clark, David D., John Wroclawski, Karen R. Sollins, and Robert Braden. "Tussle in cyberspace." In the 2002 conference. ACM Press, 2002. http://dx.doi.org/10.1145/633025.633059.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Thiha, Amara. "Revolution through cyberspace." In the 4th ACM/IEEE International Conference. ACM Press, 2010. http://dx.doi.org/10.1145/2369220.2369266.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Neuharth, Allen. "Freedom in cyberspace." In the second conference. ACM Press, 1992. http://dx.doi.org/10.1145/142652.142656.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Xianwei Zhou, Zhimi Cheng, Jianwei An, Jinhua Liu, and Fuhong Lin. "Cyberspace based wisdom." In International Conference on Cyberspace Technology (CCT 2013). Institution of Engineering and Technology, 2013. http://dx.doi.org/10.1049/cp.2013.2114.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Kvasov, O. N. "INSTITUTIONALIZATION OF CYBERSPACE." In Digital society: problems and prospects of development. Voronezh State University of Forestry and Technologies named after G.F. Morozov, Voronezh, Russia, 2021. http://dx.doi.org/10.34220/dsppd2021_89-95.

Full text
Abstract:
The work examines the formation of digital space as a social institution. The main features of the institutionalization of cyberspace are analyzed, such as the regulatory function, a set of roles, ritualized interaction, a set of regulatory institutions and the system of public control of this institution. The author makes a number of conclusions and forecasts regarding the formation of the institution of cyberspace.
APA, Harvard, Vancouver, ISO, and other styles
9

Clear, Tony, and Graeme Foot. "Avatars in cyberspace." In the 7th annual conference. ACM Press, 2002. http://dx.doi.org/10.1145/544414.544490.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

"Issues in CyberSpace." In 2014 7th International Symposium on Telecommunications (IST). IEEE, 2014. http://dx.doi.org/10.1109/istel.2014.7000757.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Cyberspace"

1

Radice, Richard A. Dominating Cyberspace. Defense Technical Information Center, 2007. http://dx.doi.org/10.21236/ada468855.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Blaha, Leslie M., Daniel W. Repperger, Katheryn A. Farris, et al. Cyberspace Math Models. Defense Technical Information Center, 2013. http://dx.doi.org/10.21236/ada589817.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Rizer, Scott W. Sun Tzu in Cyberspace. Defense Technical Information Center, 2008. http://dx.doi.org/10.21236/ada540083.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Veazie, Arnold K. US Strategy for Cyberspace. Defense Technical Information Center, 2003. http://dx.doi.org/10.21236/ada416602.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Knapp, Jr, and Everett D. Unconventional Warfare in Cyberspace. Defense Technical Information Center, 2012. http://dx.doi.org/10.21236/ada561663.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Andrusyszyn, Greta. Cyberspace: A Selected Bibliography. Defense Technical Information Center, 2013. http://dx.doi.org/10.21236/ada585290.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Caulkins, Bruce D. Proactive Self Defense in Cyberspace. Defense Technical Information Center, 2009. http://dx.doi.org/10.21236/ada494722.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Schwalm, Keith T. National Strategy to Secure Cyberspace. Defense Technical Information Center, 2006. http://dx.doi.org/10.21236/ada457208.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Lee, Carolyn J. Limitless Battlespace: Operations in Cyberspace. Defense Technical Information Center, 1999. http://dx.doi.org/10.21236/ada370758.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Olson, Matthew L. Tackling Cyberspace Force Development Issues. Defense Technical Information Center, 2009. http://dx.doi.org/10.21236/ada539194.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!