Journal articles on the topic 'Cyberspace Internet'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Cyberspace Internet.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Boswell, Suzanne F. "“Jack In, Young Pioneer”: Frontier Politics, Ecological Entrapment, and the Architecture of Cyberspace." American Literature 93, no. 3 (2021): 417–44. http://dx.doi.org/10.1215/00029831-9361251.
Full textBernik, Igor. "Internet Study." International Journal of Cyber Warfare and Terrorism 2, no. 3 (2012): 1–11. http://dx.doi.org/10.4018/ijcwt.2012070101.
Full textGlen, Carol M. "Internet Governance: Territorializing Cyberspace?" Politics & Policy 42, no. 5 (2014): 635–57. http://dx.doi.org/10.1111/polp.12093.
Full textZhang, Dafang, Guojun Wang, Xin Wang, Zhengyu Li, and Wenjia Li. "Cyberspace Security for Future Internet." Security and Communication Networks 2018 (August 5, 2018): 1. http://dx.doi.org/10.1155/2018/5313980.
Full textSmith, Derek G. "Internet besieged: Countering cyberspace scofflaws." Journal of the American Society for Information Science 49, no. 8 (1998): 764–66. http://dx.doi.org/10.1002/(sici)1097-4571(199806)49:8<764::aid-asi10>3.0.co;2-s.
Full textHautmann, Gregorio. "Psicoanalisi, identità e Internet. Esplorazioni nel cyberspace [Psychoanalysis, identity and Internet: Explorations in cyberspace]." International Journal of Psychoanalysis 97, no. 5 (2016): 1444–48. http://dx.doi.org/10.1111/1745-8315.12521.
Full textHartford, Kathleen. "Cyberspace with Chinese Characteristics." Current History 99, no. 638 (2000): 255–62. http://dx.doi.org/10.1525/curh.2000.99.638.255.
Full textLambach, Daniel. "The Territorialization of Cyberspace*." International Studies Review 22, no. 3 (2019): 482–506. http://dx.doi.org/10.1093/isr/viz022.
Full textAustin, Lisa, Lilian Edwards, and Charlotte Waelde. "Law & the Internet: Regulating Cyberspace." University of Toronto Law Journal 49, no. 2 (1999): 305. http://dx.doi.org/10.2307/826023.
Full textClark, D. D., J. Wroclawski, K. R. Sollins, and R. Braden. "Tussle in cyberspace: defining tomorrow's Internet." IEEE/ACM Transactions on Networking 13, no. 3 (2005): 462–75. http://dx.doi.org/10.1109/tnet.2005.850224.
Full textKaneshige, Thomas. "Cyberspace general targets internet scam artists." Computer Fraud & Security Bulletin 1995, no. 9 (1995): 8. http://dx.doi.org/10.1016/0142-0496(95)80251-7.
Full textLippert, Kari J., and Robert Cloutier. "Cyberspace: A Digital Ecosystem." Systems 9, no. 3 (2021): 48. http://dx.doi.org/10.3390/systems9030048.
Full textWeitzner, Daniel J. "Promoting Economic Prosperity in Cyberspace." Ethics & International Affairs 32, no. 4 (2018): 425–39. http://dx.doi.org/10.1017/s0892679418000606.
Full textMehta, Michael. "Censoring Cyberspace." Asian Journal of Social Science 30, no. 2 (2002): 319–38. http://dx.doi.org/10.1163/156853102320405889.
Full textTeivan-Treinovsky, Ya S., and D. A. Ignatov. "CRIME IN CYBERSPACE." Innovatics and Expert Examination, no. 27 (2019): 80–87. http://dx.doi.org/10.35264/1996-2274-2019-2-80-87.
Full textJin, Biao, Jin-ming Sha, Jian-wan Ji, Yi-su Liu, and Wu-heng Yang. "Studying the Regional Cyberspace by Exploiting Internet Sequential Information Flows." Mathematical Problems in Engineering 2018 (October 8, 2018): 1–13. http://dx.doi.org/10.1155/2018/1016587.
Full textHarutyunyan, M., and S. Sahakyan. "CYBERSPACE AND ITS CONCEPTUAL COMPONENTS." Main Issues Of Pedagogy And Psychology 14, no. 2 (2017): 162–68. http://dx.doi.org/10.24234/miopap.v14i2.90.
Full textMajewski, Piotr. "Nationalism, Cyberspace and Convergence Culture." Colloquia Humanistica, no. 1 (July 22, 2015): 65–79. http://dx.doi.org/10.11649/ch.2012.005.
Full textZunic, Natalija, and Vida Vilic. "Internet and female victimization." Temida 21, no. 2 (2018): 229–47. http://dx.doi.org/10.2298/tem1802229z.
Full textA. R., Mubarak. "A Study on Internet Industry Self-regulation in China and Its Implications for Child Protection in Cyberspace." International Journal of Community and Social Development 2, no. 3 (2020): 297–309. http://dx.doi.org/10.1177/2516602620930944.
Full textBRANCO, Paulo Gustavo Gonet, and Pedro Henrique de Moura Gonet BRANCO. "STRUCTURAL WAYS OF GOVERNING THE INTERNET –THE BRAZILIAN POSITION." Revista Juridica 2, no. 55 (2019): 592. http://dx.doi.org/10.21902/revistajur.2316-753x.v2i55.3840.
Full textGessler, Helin Alagöz. "Securitizing the Internet: The case of Turkey." Central and Eastern European eDem and eGov Days 325 (February 14, 2018): 295–304. http://dx.doi.org/10.24989/ocg.v325.25.
Full textCole, John P., and Bradley R. Wolf. "Cyberspace Chat: The Internet Discussion Forum (IDF)." International Society of Hair Restoration Surgery 25, no. 5 (2015): 194–97. http://dx.doi.org/10.33589/25.5.0194.
Full textThomas, Graham, and Sally Wyatt. "Shaping Cyberspace—interpreting and transforming the Internet." Research Policy 28, no. 7 (1999): 681–98. http://dx.doi.org/10.1016/s0048-7333(99)00016-5.
Full textBodin, Gregory P., and Karen L. Rice. "Vascular nursing Internet resources: Tools for cyberspace." Journal of Vascular Nursing 18, no. 1 (2000): 22–27. http://dx.doi.org/10.1016/s1062-0303(00)90057-8.
Full textMcKnight, L. W., and J. P. Bailey. "Internet economics: when constituencies collide in cyberspace." IEEE Internet Computing 1, no. 6 (1997): 30–37. http://dx.doi.org/10.1109/4236.643934.
Full textKrueger, Tara. "Mapping Cyberspace: The Image of the Internet." IEEE Annals of the History of Computing 29, no. 1 (2007): 100. http://dx.doi.org/10.1109/mahc.2007.11.
Full textBerberich, Charles W. "Navigating cyberspace: a roadmap to the Internet." Journal - American Water Works Association 88, no. 2 (1996): 44–58. http://dx.doi.org/10.1002/j.1551-8833.1996.tb06501.x.
Full textRobak, Marek. "Mass Automated Internet Analysis and Cyberspace Transparency." Social Communication 5, no. 2 (2019): 32–44. http://dx.doi.org/10.2478/sc-2019-0007.
Full textYangyue, Liu. "Controlling Cyberspace in Malaysia." Asian Survey 54, no. 4 (2014): 801–23. http://dx.doi.org/10.1525/as.2014.54.4.801.
Full textRai, Nitin, and Shailesh R. Chansarkar. "Cyberspace Security : An Overview for Beginners." Defence Science Journal 67, no. 4 (2017): 483. http://dx.doi.org/10.14429/dsj.67.11542.
Full textBerghage, Robert D., Dennis J. Wolnick, E. Jay Holcomb, and John E. Erwin. "Trial Gardening in Cyberspace." HortScience 30, no. 4 (1995): 903D—903. http://dx.doi.org/10.21273/hortsci.30.4.903d.
Full textMilicevic, Mladen. "Cyberspace memes." Organised Sound 6, no. 2 (2001): 117–20. http://dx.doi.org/10.1017/s1355771801002072.
Full textFoster, Thomas. "Cyber-Aztecs and Cholo-Punks: Guillermo Gómez-Peña's Five-Worlds Theory." Publications of the Modern Language Association of America 117, no. 1 (2002): 43–67. http://dx.doi.org/10.1632/003081202x63500.
Full textGultom, Rudy Agus Gemilang. "Internet Eavesdropping: Information Security Challenge in the Cyberspace." Jurnal Pertahanan 3, no. 3 (2017): 243. http://dx.doi.org/10.33172/jp.v3i3.236.
Full textRiordan, Shaun. "The Geopolitics of Cyberspace: a Diplomatic Perspective." Brill Research Perspectives in Diplomacy and Foreign Policy 3, no. 3 (2018): 1–84. http://dx.doi.org/10.1163/24056006-12340011.
Full textSieber, Ulrich, and Carl-Wendelin Neubert. "Transnational Criminal Investigations in Cyberspace: Challenges to National Sovereignty." Max Planck Yearbook of United Nations Law Online 20, no. 1 (2017): 239–321. http://dx.doi.org/10.1163/13894633_02001010.
Full textChudinova, Vera P. "Children in Cyberspace: Challenges for Librarians." Bibliotekovedenie [Russian Journal of Library Science], no. 5 (September 9, 2009): 39–45. http://dx.doi.org/10.25281/0869-608x-2009-0-5-39-45.
Full textJati, Wasisto Raharjo. "CYBERSPACE, INTERNET, DAN RUANG PUBLIK BARU: AKTIVISME ONLINE POLITIK KELAS MENENGAH INDONESIA." Jurnal Pemikiran Sosiologi 3, no. 1 (2016): 25. http://dx.doi.org/10.22146/jps.v3i1.23524.
Full textMarson, Stephen M., and Sara B. Brackin. "Ethical Interaction in Cyberspace for Social Work Practice." Advances in Social Work 1, no. 1 (2000): 27–42. http://dx.doi.org/10.18060/101.
Full textPavlichenko, Zulfiia Yu. "PILGRIMAGE AND OTHER RITUALS IN CYBERSPACE." Study of Religion, no. 1 (2018): 52–57. http://dx.doi.org/10.22250/2072-8662.2018.1.52-57.
Full textEhrlich. "Poe in Cyberspace: Balloons! Drones!! The Global Internet!!!" Edgar Allan Poe Review 16, no. 2 (2015): 242. http://dx.doi.org/10.5325/edgallpoerev.16.2.0242.
Full textDeivert, Bert. "Shots in Cyberspace: Film Research on the Internet." Cinema Journal 35, no. 1 (1995): 103. http://dx.doi.org/10.2307/1225810.
Full textBarnett, George A., Bum-Soo Chon, and Devan Rosen. "The Structure of the Internet Flows in Cyberspace." Netcom 15, no. 1 (2001): 61–80. http://dx.doi.org/10.3406/netco.2001.1505.
Full textLorenzen, Michael. "INTERNET RESOURCES: Distance education: Delivering instruction in cyberspace." College & Research Libraries News 59, no. 5 (1998): 342–46. http://dx.doi.org/10.5860/crln.59.5.342.
Full textSaxby, Stephen. "Policies for cyberspace — Illegal content on the Internet." Network Security 1997, no. 6 (1997): 16–19. http://dx.doi.org/10.1016/s1353-4858(97)89531-1.
Full textRinesi, Marcelo. "Will the Internet fragment?: Sovereignty, globalization and cyberspace." Prometheus 35, no. 2 (2017): 163–65. http://dx.doi.org/10.1080/08109028.2018.1505877.
Full textJabłońska, Marta R. "Modern Consumer in Cyberspace – Internet and Psychology Approach." Foundations of Management 9, no. 1 (2017): 111–22. http://dx.doi.org/10.1515/fman-2017-0009.
Full textBarnes, Stuart J., Hans H. Bauer, Marcus M. Neumann, and Frank Huber. "Segmenting cyberspace: a customer typology for the internet." European Journal of Marketing 41, no. 1/2 (2007): 71–93. http://dx.doi.org/10.1108/03090560710718120.
Full textPolanski, Paul Przemyslaw. "Fundamental rights in cyberspace and internet customary law." International Journal of Intellectual Property Management 2, no. 1 (2008): 11. http://dx.doi.org/10.1504/ijipm.2008.017850.
Full text