To see the other types of publications on this topic, follow the link: Cyberspace Internet.

Journal articles on the topic 'Cyberspace Internet'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Cyberspace Internet.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Boswell, Suzanne F. "“Jack In, Young Pioneer”: Frontier Politics, Ecological Entrapment, and the Architecture of Cyberspace." American Literature 93, no. 3 (2021): 417–44. http://dx.doi.org/10.1215/00029831-9361251.

Full text
Abstract:
Abstract This essay uncovers the environmental and historical conditions that played a role in cyberspace’s popularity in the 1980s and 1990s. Tracing both fictional and critical constructions of cyberspace in a roughly twenty-year period from the publication of William Gibson’s Sprawl trilogy (1984–1988) to the Telecommunications Act of 1996, this essay argues that cyberspace’s infinite, virtual territory provided a solution to the apparent ecological crisis of the 1980s: the fear that the United States was running out of physical room to expand due to overdevelopment. By discursively transfo
APA, Harvard, Vancouver, ISO, and other styles
2

Bernik, Igor. "Internet Study." International Journal of Cyber Warfare and Terrorism 2, no. 3 (2012): 1–11. http://dx.doi.org/10.4018/ijcwt.2012070101.

Full text
Abstract:
The authors present public comprehension and attitudes towards cyber threats and cybercrime in Slovenia. Cyberspace has become a wide area which can be exploited through various criminal activities, considering that access to information technology and the Internet is ubiquitous. As the number of users grows, so does the number of cybercrime incidences. Regrettably, users of information technology and the Internet know too little about the dangers in cyberspace and the protective measures to maximize security; they are also poorly informed about the legislation pertaining to cybercrime. In ord
APA, Harvard, Vancouver, ISO, and other styles
3

Glen, Carol M. "Internet Governance: Territorializing Cyberspace?" Politics & Policy 42, no. 5 (2014): 635–57. http://dx.doi.org/10.1111/polp.12093.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Zhang, Dafang, Guojun Wang, Xin Wang, Zhengyu Li, and Wenjia Li. "Cyberspace Security for Future Internet." Security and Communication Networks 2018 (August 5, 2018): 1. http://dx.doi.org/10.1155/2018/5313980.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Smith, Derek G. "Internet besieged: Countering cyberspace scofflaws." Journal of the American Society for Information Science 49, no. 8 (1998): 764–66. http://dx.doi.org/10.1002/(sici)1097-4571(199806)49:8<764::aid-asi10>3.0.co;2-s.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Hautmann, Gregorio. "Psicoanalisi, identità e Internet. Esplorazioni nel cyberspace [Psychoanalysis, identity and Internet: Explorations in cyberspace]." International Journal of Psychoanalysis 97, no. 5 (2016): 1444–48. http://dx.doi.org/10.1111/1745-8315.12521.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Hartford, Kathleen. "Cyberspace with Chinese Characteristics." Current History 99, no. 638 (2000): 255–62. http://dx.doi.org/10.1525/curh.2000.99.638.255.

Full text
Abstract:
Pundits outside China sometimes assume both the inevitability of the Internet's growth and the inexorability of the political opening—alternative sources of information, communications channels beyond government control—that may follow. But Internet growth is anything but inevitable, and in China, the government's efforts have both nurtured and structured the country's Internet.
APA, Harvard, Vancouver, ISO, and other styles
8

Lambach, Daniel. "The Territorialization of Cyberspace*." International Studies Review 22, no. 3 (2019): 482–506. http://dx.doi.org/10.1093/isr/viz022.

Full text
Abstract:
AbstractThere are widespread worries about the impending fragmentation of the internet. Reviewing the IR literature on cyberspace and internet governance, this paper demonstrates that these debates rest on very traditional understandings of territory and the state, focusing on ways that hard-shelled “power containers” are recreated in cyberspace. Using a practice-oriented conceptual framework drawing on insights from critical geography, the paper highlights how state, corporate, and private actors deterritorialize and reterritorialize cyberspace. Results indicate that there are multiple ways t
APA, Harvard, Vancouver, ISO, and other styles
9

Austin, Lisa, Lilian Edwards, and Charlotte Waelde. "Law & the Internet: Regulating Cyberspace." University of Toronto Law Journal 49, no. 2 (1999): 305. http://dx.doi.org/10.2307/826023.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Clark, D. D., J. Wroclawski, K. R. Sollins, and R. Braden. "Tussle in cyberspace: defining tomorrow's Internet." IEEE/ACM Transactions on Networking 13, no. 3 (2005): 462–75. http://dx.doi.org/10.1109/tnet.2005.850224.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Kaneshige, Thomas. "Cyberspace general targets internet scam artists." Computer Fraud & Security Bulletin 1995, no. 9 (1995): 8. http://dx.doi.org/10.1016/0142-0496(95)80251-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Lippert, Kari J., and Robert Cloutier. "Cyberspace: A Digital Ecosystem." Systems 9, no. 3 (2021): 48. http://dx.doi.org/10.3390/systems9030048.

Full text
Abstract:
Cyberspace is a new frontier, not just for hackers, but for engineers. It is a digital ecosystem, the next generation of Internet and network applications, promising a whole new world of distributed and open systems that can interact, self-organize, evolve, and adapt. These ecosystems transcend traditional collaborative environments, such as client-server, peer-to-peer, or hybrid models (e.g., web services), to become a self-organized, evolving, interactive environment. Understanding cyberspace as a system is critical if we are to properly design systems to exist within it. Considering it to b
APA, Harvard, Vancouver, ISO, and other styles
13

Weitzner, Daniel J. "Promoting Economic Prosperity in Cyberspace." Ethics & International Affairs 32, no. 4 (2018): 425–39. http://dx.doi.org/10.1017/s0892679418000606.

Full text
Abstract:
AbstractUnique among major communications media, the Internet has delivered vast public benefit while being designed, developed, and deployed largely through private initiative and nongovernmental funding. At the same time, key public policy decisions were made early on that established the legal and regulatory foundations necessary for economic innovation and free expression to flourish. Those foundations include strong free speech protections, liability limits on Internet platforms, protections against excessive government surveillance, open technical standards, individual privacy protection
APA, Harvard, Vancouver, ISO, and other styles
14

Mehta, Michael. "Censoring Cyberspace." Asian Journal of Social Science 30, no. 2 (2002): 319–38. http://dx.doi.org/10.1163/156853102320405889.

Full text
Abstract:
This paper explores how Canada and the United States of America have attempted to control of the flow of contentious material coming through the Internet. The paper focuses on the issue of controlling obscene material and provides several case-law examples to illustrate how attempts at censorship have evolved over the decades in both countries. It is concluded that censorship is a tool of the nation-state that is unlikely to significantly reduce the amount of contentious material crossing borders.
APA, Harvard, Vancouver, ISO, and other styles
15

Teivan-Treinovsky, Ya S., and D. A. Ignatov. "CRIME IN CYBERSPACE." Innovatics and Expert Examination, no. 27 (2019): 80–87. http://dx.doi.org/10.35264/1996-2274-2019-2-80-87.

Full text
Abstract:
According to Eurostat, in 2017, 85 % of households and 97 % of enterprises had access to the Internet in the European Union, while in 2010 only 70 % of households had access to the Internet in the European Union. It should be noted that this is a rather controversial achievement, given that a sufficiently large number of amateurs broke into cyberspace, often becoming victims of cybercrime and its «sponsors». The loss of the global economy from cybercrime in 2017 amounted to 600 billion dollars, which is a 25 % increase compared to 2014. Given the global nature of this trend, due to the lack of
APA, Harvard, Vancouver, ISO, and other styles
16

Jin, Biao, Jin-ming Sha, Jian-wan Ji, Yi-su Liu, and Wu-heng Yang. "Studying the Regional Cyberspace by Exploiting Internet Sequential Information Flows." Mathematical Problems in Engineering 2018 (October 8, 2018): 1–13. http://dx.doi.org/10.1155/2018/1016587.

Full text
Abstract:
The study of cyberspace is faced with the challenge of the data shortage and model verification. This paper proposed a method to explore the regional cyberspace by employing Internet sequential information flows crawled from social network platforms. Compared with previous studies which only use one type of data sources for analysis, the main contribution of this manuscript is adopting the scheme that uses one kind of Internet information flow to extract cyberspace feature while relevant data collected from the other network platform is used for verification. Moreover, starting from measuring
APA, Harvard, Vancouver, ISO, and other styles
17

Harutyunyan, M., and S. Sahakyan. "CYBERSPACE AND ITS CONCEPTUAL COMPONENTS." Main Issues Of Pedagogy And Psychology 14, no. 2 (2017): 162–68. http://dx.doi.org/10.24234/miopap.v14i2.90.

Full text
Abstract:
The article considers the problems of the Internet as a global information network and cyberspace. The main focus ofthe study is the disclosure ofthe complex and contradictory nature of the impact of the Internet on transformation processes of modern societies.
APA, Harvard, Vancouver, ISO, and other styles
18

Majewski, Piotr. "Nationalism, Cyberspace and Convergence Culture." Colloquia Humanistica, no. 1 (July 22, 2015): 65–79. http://dx.doi.org/10.11649/ch.2012.005.

Full text
Abstract:
Nationalism, Cyberspace and Convergence CultureThe article analyses the discourse of the Greek-Macedonian dispute as it unfolded in the Internet, including especially the social networking website YouTube. The discourse is based on a mythologized concept of history, in which the national community is perceived as an eternal chain of generations, while the national identity is a stable, static and “natural” foundation of narrations.Nacjonalizm, cyberprzestrzeń i konwergencja kulturowaW swoim artykule analizuję dyskurs odnoszący się do sporu grecko-macedońskiego toczącego się w przestrzeni Inter
APA, Harvard, Vancouver, ISO, and other styles
19

Zunic, Natalija, and Vida Vilic. "Internet and female victimization." Temida 21, no. 2 (2018): 229–47. http://dx.doi.org/10.2298/tem1802229z.

Full text
Abstract:
The subject of this paper is a gender analysis of female victimization in the cyberspace. Since the Internet appears as a global network, it gives a global dimension to the virtual space, connecting any two points on the planet through a cyberspace. From this dimension, the cyberspace is also perceived as a social space. Namely, the Internet and social networks provide a continuous and unlimited place for users? gathering and contact, indicating that, potentially, each user is a potential victim. When analyzing victimization in the cyberspace it is important to notice that anonymity encourages
APA, Harvard, Vancouver, ISO, and other styles
20

A. R., Mubarak. "A Study on Internet Industry Self-regulation in China and Its Implications for Child Protection in Cyberspace." International Journal of Community and Social Development 2, no. 3 (2020): 297–309. http://dx.doi.org/10.1177/2516602620930944.

Full text
Abstract:
Self-regulation of the Internet industry has been a popular policy approach adopted by many countries. However, unlike self-regulation of more traditional industries, self-regulation of the Internet industry has been a challenging process due to the sheer volume of cyberspace and involvement of stakeholders located beyond any single country’s jurisdiction. The industry has achieved limited success in self-regulation, specifically in the area of child protection in cyberspace. China has actively adopted a policy of Internet industry self-regulation and public supervision of the Internet industr
APA, Harvard, Vancouver, ISO, and other styles
21

BRANCO, Paulo Gustavo Gonet, and Pedro Henrique de Moura Gonet BRANCO. "STRUCTURAL WAYS OF GOVERNING THE INTERNET –THE BRAZILIAN POSITION." Revista Juridica 2, no. 55 (2019): 592. http://dx.doi.org/10.21902/revistajur.2316-753x.v2i55.3840.

Full text
Abstract:
ABSTRACTThe article addresses the peculiarities and complexities of the cyberspace regulation, acknowledging, but not endorsing, the utopic ideal of the cyberspace as a no-law virtual territory. It explores the variety of means of regulating people interconnections around the Globe through the Internet. It points up the need of due heteronomous protection of interests and claims linked to the core proposes of the Internet itself, such as those deriving from the freedom of expression and concerns with the right to privacy. The article takes as standing point Lawrence Lessig’s pathetic dot theor
APA, Harvard, Vancouver, ISO, and other styles
22

Gessler, Helin Alagöz. "Securitizing the Internet: The case of Turkey." Central and Eastern European eDem and eGov Days 325 (February 14, 2018): 295–304. http://dx.doi.org/10.24989/ocg.v325.25.

Full text
Abstract:
The rapid digital development in the last two decades has brought the cyberspace to national security agenda in Turkey as one of the significant challenges of the 21st century. Increasing regulation of the Internet and, in particular, online social networks by the state through digital controls and surveillance is being justified addressing the maelstrom of potential cyber threats. Nonetheless, increasing control of cyberspace contrasts with the commitment to the protection of the individual rights and liberties. This paper maps the Internet freedom in Turkey and asks to what extent Turkey is
APA, Harvard, Vancouver, ISO, and other styles
23

Cole, John P., and Bradley R. Wolf. "Cyberspace Chat: The Internet Discussion Forum (IDF)." International Society of Hair Restoration Surgery 25, no. 5 (2015): 194–97. http://dx.doi.org/10.33589/25.5.0194.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Thomas, Graham, and Sally Wyatt. "Shaping Cyberspace—interpreting and transforming the Internet." Research Policy 28, no. 7 (1999): 681–98. http://dx.doi.org/10.1016/s0048-7333(99)00016-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Bodin, Gregory P., and Karen L. Rice. "Vascular nursing Internet resources: Tools for cyberspace." Journal of Vascular Nursing 18, no. 1 (2000): 22–27. http://dx.doi.org/10.1016/s1062-0303(00)90057-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

McKnight, L. W., and J. P. Bailey. "Internet economics: when constituencies collide in cyberspace." IEEE Internet Computing 1, no. 6 (1997): 30–37. http://dx.doi.org/10.1109/4236.643934.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

Krueger, Tara. "Mapping Cyberspace: The Image of the Internet." IEEE Annals of the History of Computing 29, no. 1 (2007): 100. http://dx.doi.org/10.1109/mahc.2007.11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Berberich, Charles W. "Navigating cyberspace: a roadmap to the Internet." Journal - American Water Works Association 88, no. 2 (1996): 44–58. http://dx.doi.org/10.1002/j.1551-8833.1996.tb06501.x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Robak, Marek. "Mass Automated Internet Analysis and Cyberspace Transparency." Social Communication 5, no. 2 (2019): 32–44. http://dx.doi.org/10.2478/sc-2019-0007.

Full text
Abstract:
Abstract One of the roles of media research is to explain social phenomena. The Internet became a place where society expresses itself and where society could be influenced or even manipulated. Therefore, online communication analysis becomes a tool that is expected to guarantee the transparency of the social communication process. Unfortunately, the size of the Internet makes analysis difficult, and traditional methods of analysing communication are not always enough or force the researcher to focus on a fragmentary data. The author asks a question which research methods are suitable for Inte
APA, Harvard, Vancouver, ISO, and other styles
30

Yangyue, Liu. "Controlling Cyberspace in Malaysia." Asian Survey 54, no. 4 (2014): 801–23. http://dx.doi.org/10.1525/as.2014.54.4.801.

Full text
Abstract:
This paper examines how Internet control strategy in Malaysia was shaped by particular forms of online political contention and by a well-coordinated online civil society. It also traces the shift of this strategy to more covert means in the 2011 Sarawak State election.
APA, Harvard, Vancouver, ISO, and other styles
31

Rai, Nitin, and Shailesh R. Chansarkar. "Cyberspace Security : An Overview for Beginners." Defence Science Journal 67, no. 4 (2017): 483. http://dx.doi.org/10.14429/dsj.67.11542.

Full text
Abstract:
Internet is perhaps the only technology invented by mankind which has singly led to what is appearing to be the third revolution after the renaissance and the industrial revolution. The Internet, as of today, proposes to connect everything driven by the semiconductor, naming it off late, as the Internet-of-Things (IoT). It has over the years, connected the semiconductor driven systems and their human users, evolving the connected whole including the human user represented in that common whole, being called the cyberspace. This cyberspace consists of all the computing, processing, storage, prin
APA, Harvard, Vancouver, ISO, and other styles
32

Berghage, Robert D., Dennis J. Wolnick, E. Jay Holcomb, and John E. Erwin. "Trial Gardening in Cyberspace." HortScience 30, no. 4 (1995): 903D—903. http://dx.doi.org/10.21273/hortsci.30.4.903d.

Full text
Abstract:
The Internet offers many new and unique opportunities to disseminate information. The development of the World Wide Web (WWW) and information browsers like Netscap, Mosaic, and simple-to-use server software like MacHTTP provides means to allow low-cost access to information, including pictures and graphics previously unavailable to most people. The Pennsylvania State Univ. variety trial garden annually tests &gt;1000 plants. Information is gathered on garden and pack performance, and photos of superior plants and varieties are taken. To provide wider access to this information, we have begun d
APA, Harvard, Vancouver, ISO, and other styles
33

Milicevic, Mladen. "Cyberspace memes." Organised Sound 6, no. 2 (2001): 117–20. http://dx.doi.org/10.1017/s1355771801002072.

Full text
Abstract:
This paper addresses the issues concerning the impact of music on cyberspace globalisation. It points out that Internet access is limited to only one per cent of the wealthiest human population. It also looks into the future of cyberspace music and predicts that most of the cyberspace activities are going to be unleashing one of many of humanity's predispositions – the predisposition to steal. Cyberspace represents a perfect medium for concealing a person's identity and for the masking of any of the responsibility that is expected from socially acceptable human behaviour. With these aspects in
APA, Harvard, Vancouver, ISO, and other styles
34

Foster, Thomas. "Cyber-Aztecs and Cholo-Punks: Guillermo Gómez-Peña's Five-Worlds Theory." Publications of the Modern Language Association of America 117, no. 1 (2002): 43–67. http://dx.doi.org/10.1632/003081202x63500.

Full text
Abstract:
In the study of postmodern technocultures, including computer-mediated communication and popular narratives about cyberspace, the status of embodiment has emerged as a key question, especially in the context of popular rhetorics that imagine the Internet as a site of freedom from embodied particularity. But while analyses of gender bending and sexual performance on the Internet abound, the future of race in cyberspace has been relatively neglected. This essay traces recent developments in the work of the Mexican American performance artist Guillermo Gómez-Peña, whose earlier interests in immig
APA, Harvard, Vancouver, ISO, and other styles
35

Gultom, Rudy Agus Gemilang. "Internet Eavesdropping: Information Security Challenge in the Cyberspace." Jurnal Pertahanan 3, no. 3 (2017): 243. http://dx.doi.org/10.33172/jp.v3i3.236.

Full text
Abstract:
In the era of information globalization the activity of information tapping over the Internet is one of the negative impacts of the interconnectivity between the Internet users and the ease of the process of exchanging data on the Internet. The disclosure of classified sensitive or confidential information or the loss of important documents is the result of information that is not well protected. Therefore, Internet users need to know more information about eavesdropping via the Internet to improve information security.
APA, Harvard, Vancouver, ISO, and other styles
36

Riordan, Shaun. "The Geopolitics of Cyberspace: a Diplomatic Perspective." Brill Research Perspectives in Diplomacy and Foreign Policy 3, no. 3 (2018): 1–84. http://dx.doi.org/10.1163/24056006-12340011.

Full text
Abstract:
AbstractThe Internet has been seen as the harbinger of a world without borders or sovereignty. But states have recently reemerged in Cyberspace, asserting sovereignty or using it to pursue conflict with rivals. This article explores the geopolitics of Cyberspace. It argues that critical geopolitical concepts like geopolitical fields, culture and conditions can offer insights into the behaviour of actors in Cyberspace. The argument is explored through case studies of the US, Russia and China. The article goes beyond traditional nation states to apply similar analysis to the European Union and I
APA, Harvard, Vancouver, ISO, and other styles
37

Sieber, Ulrich, and Carl-Wendelin Neubert. "Transnational Criminal Investigations in Cyberspace: Challenges to National Sovereignty." Max Planck Yearbook of United Nations Law Online 20, no. 1 (2017): 239–321. http://dx.doi.org/10.1163/13894633_02001010.

Full text
Abstract:
The internet has become a major place of business for criminals. Due to the properties of cyberspace, crime committed on or by means of the internet is typically transnational in nature. This poses a significant obstacle for law enforcement authorities. As a rule, transnational exercise of enforcement jurisdiction traditionally constitutes a violation of another State’s territorial sovereignty. But do the same rules apply in the ‘global cyberspace?’ This article examines the applicability of the principle of territorial sovereignty in cyberspace. It rejects solutions that treat cyberspace as a
APA, Harvard, Vancouver, ISO, and other styles
38

Chudinova, Vera P. "Children in Cyberspace: Challenges for Librarians." Bibliotekovedenie [Russian Journal of Library Science], no. 5 (September 9, 2009): 39–45. http://dx.doi.org/10.25281/0869-608x-2009-0-5-39-45.

Full text
Abstract:
The results of the research the interaction problems between children, teenagers and the Internet, and problems of protection and realization of their rights by librarians are considered in the article. The results of foreign researches on the given theme are also presented. A number of its legal aspects is analysed, the rights of children of direct relevance to the theme of “Children and the Information” on the basis of the UN Convention are placed in strong relief. The main features, possibilities and dangers of the Internet to development of the person are shown.The surveys of schoolchildre
APA, Harvard, Vancouver, ISO, and other styles
39

Jati, Wasisto Raharjo. "CYBERSPACE, INTERNET, DAN RUANG PUBLIK BARU: AKTIVISME ONLINE POLITIK KELAS MENENGAH INDONESIA." Jurnal Pemikiran Sosiologi 3, no. 1 (2016): 25. http://dx.doi.org/10.22146/jps.v3i1.23524.

Full text
Abstract:
Artikel ini bertujuan untuk menganalisis mengenai cyberspace sebagai ruang publik baru bagi kelas menengah Indonesia. Konsep lama ruang publik besasal dari Habermas yang menilai ruang tersebut merupakan bagian dari proses komunikasi dan advokasi publik. Ruang tersebut dipahami sebagai ruang inklusif, deliberatif, dan juga parsipatif yang mendorong publik untuk berdiskusi satu sama lain. Kemunculan cyberspace melalui sosial media ini menarik untuk dicermati karena mampu mentrasnformasi ruang publik dalam bentuk digital. Dibandingkan dengan ruang publik, cyberspace berinteraksi kapanpun dan dima
APA, Harvard, Vancouver, ISO, and other styles
40

Marson, Stephen M., and Sara B. Brackin. "Ethical Interaction in Cyberspace for Social Work Practice." Advances in Social Work 1, no. 1 (2000): 27–42. http://dx.doi.org/10.18060/101.

Full text
Abstract:
The nature of ethics on the Internet may be confusing to some social workers because of the unique characteristics of client contacts in cyberspace. This article addresses three basic issues/questions that clarify the ethical relationships among clients, other professionals and the Internet. These include: a) What must I do to maintain professional ethical standards on the Internet? b) How do I deal with the unethical interaction of others within cyberspace? c) How do I examine and analyze ethical issues with no clear guidelines?
APA, Harvard, Vancouver, ISO, and other styles
41

Pavlichenko, Zulfiia Yu. "PILGRIMAGE AND OTHER RITUALS IN CYBERSPACE." Study of Religion, no. 1 (2018): 52–57. http://dx.doi.org/10.22250/2072-8662.2018.1.52-57.

Full text
Abstract:
Now the Internet as the media channel is becoming the main mass media for religious organizations. This channel not only allows communities of believers to light their activity and to look for new adherents, but influences dogmas and religious practices, allows religious institutes to be more open and flexible in relation to life realities. Rituals in cyberspace have become one of the vivid expressions of social activity related to religion. Under the influence of the Internet some traditional religious practices can expand modes of the existence, forming new ways of cult activity. Pilgrimage
APA, Harvard, Vancouver, ISO, and other styles
42

Ehrlich. "Poe in Cyberspace: Balloons! Drones!! The Global Internet!!!" Edgar Allan Poe Review 16, no. 2 (2015): 242. http://dx.doi.org/10.5325/edgallpoerev.16.2.0242.

Full text
APA, Harvard, Vancouver, ISO, and other styles
43

Deivert, Bert. "Shots in Cyberspace: Film Research on the Internet." Cinema Journal 35, no. 1 (1995): 103. http://dx.doi.org/10.2307/1225810.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

Barnett, George A., Bum-Soo Chon, and Devan Rosen. "The Structure of the Internet Flows in Cyberspace." Netcom 15, no. 1 (2001): 61–80. http://dx.doi.org/10.3406/netco.2001.1505.

Full text
APA, Harvard, Vancouver, ISO, and other styles
45

Lorenzen, Michael. "INTERNET RESOURCES: Distance education: Delivering instruction in cyberspace." College & Research Libraries News 59, no. 5 (1998): 342–46. http://dx.doi.org/10.5860/crln.59.5.342.

Full text
APA, Harvard, Vancouver, ISO, and other styles
46

Saxby, Stephen. "Policies for cyberspace — Illegal content on the Internet." Network Security 1997, no. 6 (1997): 16–19. http://dx.doi.org/10.1016/s1353-4858(97)89531-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
47

Rinesi, Marcelo. "Will the Internet fragment?: Sovereignty, globalization and cyberspace." Prometheus 35, no. 2 (2017): 163–65. http://dx.doi.org/10.1080/08109028.2018.1505877.

Full text
APA, Harvard, Vancouver, ISO, and other styles
48

Jabłońska, Marta R. "Modern Consumer in Cyberspace – Internet and Psychology Approach." Foundations of Management 9, no. 1 (2017): 111–22. http://dx.doi.org/10.1515/fman-2017-0009.

Full text
Abstract:
Abstract Online reality becomes a natural environment for nowadays companies. As more and more companies have understand a necessity of their presence in the cyberspace, they still need to learn about complex nature of young people who are becoming customers. The paper aims to present modern consumer from sociological and psychological perspective. First, it describes generations Y, Z, and C and their most common online activities and then concentrates on their behaviors performed online. To reach the aim of the paper, a study has also been conducted to investigate discussed behaviors.
APA, Harvard, Vancouver, ISO, and other styles
49

Barnes, Stuart J., Hans H. Bauer, Marcus M. Neumann, and Frank Huber. "Segmenting cyberspace: a customer typology for the internet." European Journal of Marketing 41, no. 1/2 (2007): 71–93. http://dx.doi.org/10.1108/03090560710718120.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

Polanski, Paul Przemyslaw. "Fundamental rights in cyberspace and internet customary law." International Journal of Intellectual Property Management 2, no. 1 (2008): 11. http://dx.doi.org/10.1504/ijipm.2008.017850.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!