To see the other types of publications on this topic, follow the link: Cyberspace.

Dissertations / Theses on the topic 'Cyberspace'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'Cyberspace.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Chan, Cho-yan Jonathan, and 陳祖恩. "Traumatic cyberspace: witnessing cyberspace as a site of Trauma." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2002. http://hub.hku.hk/bib/B31227144.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Wipper, Renate. "Umweltbildung im Cyberspace." Universität Potsdam, 1999. http://opus.kobv.de/ubp/volltexte/2005/298/.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Barber, Clair. "Shakespeare and cyberspace." Thesis, University of Sussex, 2003. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.288165.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Ackroyd, Bradley Sterling. "Hinduism in cyberspace." [Gainesville, Fla.] : University of Florida, 2006. http://purl.fcla.edu/fcla/etd/UFE0014320.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Simu, Nicklas. "Strategisk bombning i cyberspace." Thesis, Försvarshögskolan, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:fhs:diva-5514.

Full text
Abstract:
Why has some cyber-attacks been more successful than others? There has been in the near past examples of cyber-attacks used with different purposes. How do we understand these chosen targets and what result the attack accomplished? Research has discussed similarities between aviation warfare and cyber warfare, and how the first could explain what is happening in cyber warfare now. There is also opposing opinions whether cyber warfare should be seen as a method to alone force a will on your opponent or if cyber warfare should mere be supporting other military means. The essay test Warden’s theo
APA, Harvard, Vancouver, ISO, and other styles
6

Young, Peter. "Visualising software in cyberspace." Thesis, Durham University, 1999. http://etheses.dur.ac.uk/4363/.

Full text
Abstract:
The problems of maintaining software systems are well documented. The increasing size and complexity of modern software serves only to worsen matters. Software maintainers are typically confronted with very large and very complex software systems, of which they may have little or no prior knowledge. At this stage they will normally have some maintenance task to perform, though possibly little indication of where or how to start. They need to investigate and understand the software to some extent in order to begin maintenance. This understanding process is termed program comprehension. There ar
APA, Harvard, Vancouver, ISO, and other styles
7

Karaflogka, Anastasia. "Religious discourse and cyberspace." Thesis, SOAS, University of London, 2005. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.422207.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Herring, Deborah. "Contextual theology in cyberspace." Thesis, University of Sheffield, 2005. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.427215.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Bayne, Siân. "Learning cultures in cyberspace." Thesis, Queen Margaret University, 2004. https://eresearch.qmu.ac.uk/handle/20.500.12289/7328.

Full text
Abstract:
This thesis is a study of emerging learning cultures. Its focus is on students and teachers who are engaged in using internet technologies for learning in higher education in the United Kingdom. The thesis provides an exploration of theoretical approaches to the cultural impact of new technologies, drawing on cultural, cybercultural and educational theory. It applies these theoretical insights to interview texts generated through discussions with learners and teachers. Its contribution lies in the originality of its empirical material and of the insights applied to their analysis, and in its a
APA, Harvard, Vancouver, ISO, and other styles
10

Qiang, Wen. "Cultural resistances in Chinese cyberspace." Thesis, University of Macau, 2010. http://umaclib3.umac.mo/record=b2150205.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Clayton, Richard. "Anonymity and traceability in cyberspace." Thesis, University of Cambridge, 2005. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.444742.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Sun, Meng M. Arch Massachusetts Institute of Technology. "Cyberspace as a memory container." Thesis, Massachusetts Institute of Technology, 2017. http://hdl.handle.net/1721.1/111488.

Full text
Abstract:
Thesis: M. Arch., Massachusetts Institute of Technology, Department of Architecture, 2017.<br>Cataloged from PDF version of thesis.<br>Includes bibliographical references (page 61).<br>Space is a container for memory. This metaphor is built upon the observation that the human mind can easily acquire spatial information without much deliberation. Moreover, non-spatial information can be better retrieved when associated with a spatial memory. The mnemonic function of space has been explored since ancient Greek and Roman times. The method of loci uses imaginary space and its spatial continuity to
APA, Harvard, Vancouver, ISO, and other styles
13

Van, Rensburg Erma J. "Love and friendship in cyberspace." Thesis, Stellenbosch : Stellenbosch University, 2012. http://hdl.handle.net/10019.1/52328.

Full text
Abstract:
Thesis (M.A.)--University of Stellenbosch, 2001.<br>ENGLISH ABSTRACT: Since its birth in the early 1960's the Internet has been growing exponentially in all areas and it is predicted that by the year 2002, 490 million people around the world will have Internet access. Similarly, a rapidly increasing number of people are finding themselves working and playing on the Internet, using computer mediated communication (CMC) to converse, exchange information, debate, court, and show compassion. As a result CMC has become a new way for people to find or meet each other via social Internet tools
APA, Harvard, Vancouver, ISO, and other styles
14

King, James John Robert. "The cultural construction of cyberspace." Thesis, University of Southampton, 2001. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.394053.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Pralea, Cristian. "A Hermeneutical Ontology of Cyberspace." Bowling Green State University / OhioLINK, 2010. http://rave.ohiolink.edu/etdc/view?acc_num=bgsu1262720615.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Pope, Barrington C. "IRL: creating cyberspace in meatspace." University of Cincinnati / OhioLINK, 2011. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1306503222.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Benoit, Marcel L. "The special operations : cyberspace nexus /." Maxwell AFB, Ala. : School of Advanced Air and Space Studies, 2008. https://www.afresearch.org/skins/rims/display.aspx?moduleid=be0e99f3-fc56-4ccb-8dfe-670c0822a153&mode=user&action=downloadpaper&objectid=1f7903b2-a5c1-48a0-9f1b-8229ded2afd4&rs=PublishedSearch.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Watt, Eliza. "Cyberspace, surveillance, law and privacy." Thesis, University of Westminster, 2017. https://westminsterresearch.westminster.ac.uk/item/q3xzx/cyberspace-surveillance-law-and-privacy.

Full text
Abstract:
The thesis titled, Cyberspace, Surveillance, Law and Privacy analyses the implications of state sponsored cyber surveillance on the exercise of the human right to privacy of communications and data privacy of individuals, subject to untargeted interception of digital communications. The principle aim of the thesis is to assess the legality of mass cyber surveillance of the Five Eyes alliance, with an emphasis on the United States and the United Kingdom. The study also considers the growing trend among the law enforcement agencies to access data without consent located in foreign jurisdictions
APA, Harvard, Vancouver, ISO, and other styles
19

Trim, Valerie. "Affecting modalities : configuring meaning in cyberspace." Thesis, University of Birmingham, 2012. http://etheses.bham.ac.uk//id/eprint/3106/.

Full text
Abstract:
The power of the Internet has produced a rich environment for the creation of new art forms. These artefacts, which can employ complex graphics, animation, music, written and spoken text and user-interactivity, are extremely fluid and variable. Encountering them requires a new and specifically multimedia literacy. This thesis examines in detail four online texts: Faith, Hometown, The Shower, and Blue Han, in order to investigate the possibility of such a literacy. Both Faith and Hometown are subjected to an extended visual, aural, and textual analysis, using theoretical approaches drawn from a
APA, Harvard, Vancouver, ISO, and other styles
20

Moranski, Wojciech. "Cyberspace: Ethical Issues and Catholic Perspectives." Thesis, Boston College, 2017. http://hdl.handle.net/2345/bc-ir:107473.

Full text
Abstract:
Thesis advisor: Andrea Vicini<br>Thesis advisor: Richard Spinello<br>In this thesis, I try to make a small contribution to this search for an Order in cyberspace. In the first chapter I study some new dimensions of freedom, which arose together with the development of the internet. I present the technology and the culture of hackers as two sources of a new understanding of liberty in cyberspace. I also highlight two moral issues, which are present in cyberspace, and that, in my opinion, were caused by this redefinition of freedom. In the second chapter, I try to apply Christian moral theology
APA, Harvard, Vancouver, ISO, and other styles
21

Schwarz, Kevin James. "The Securitization of Cyberspace Through Technification." Thesis, Virginia Tech, 2016. http://hdl.handle.net/10919/71758.

Full text
Abstract:
This thesis adds to the literature surrounding technification in securitizing cyberspace by examining the role of technical experts in constituting threats in cyberspace at the level of the state. Furthermore, this thesis considers the impact of technocratic framing on the public's understanding of cyberspace and the historical conditions under which this framing developed.<br>Master of Arts
APA, Harvard, Vancouver, ISO, and other styles
22

Downes, Daniel M. (Daniel Mark) Carleton University Dissertation Communication. "Manifesting destiny: the colonization of cyberspace." Ottawa, 1993.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
23

Usman, Muhammad. "Does Cyberspace outdate Jurisdictional Defamation Laws?" Thesis, University of Bradford, 2019. http://hdl.handle.net/10454/17461.

Full text
Abstract:
Cyberspace produces friction when the law is implemented by domestic courts using 'state-laws'. These laws are based on a ‘physical presence’ of an individual within the territory. It elevates conflicts relating to cyberspace jurisdiction. This research examines private international law complications associated with cyberspace. The paradigm of libel that takes place within the domain of social media is used to evaluate the utility of traditional laws. This research is conducted using ‘black-letter’ methodology, keeping in mind the changes constituted by the Defamation Act 2013. It pinpoints t
APA, Harvard, Vancouver, ISO, and other styles
24

Currier, Dianne 1963. "Technology and transformation : Deleuze, feminism and cyberspace." Monash University, Centre for Comparative Literature and Cultural Studies, 2001. http://arrow.monash.edu.au/hdl/1959.1/8916.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Finkelstein, Adam B. A. "A holistic approach to the cyberspace metaphor." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1998. http://www.collectionscanada.ca/obj/s4/f2/dsk1/tape11/PQDD_0005/MQ43864.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Yuan, Xiaotong 1979. "Copyright protection to musical works in cyberspace." Thesis, McGill University, 2004. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=82675.

Full text
Abstract:
The objective of this thesis is to demonstrate, through analysis of the current Canadian Copyright Act and related cases, how the rapid development of Internet technology has challenged the legal protection of musical works under Canadian copyright legislation and jurisprudence. Canadian government and courts have begun contemplating these issues and attempted to formulate constitutional reform policies and effective measures for Canada. These initiatives related to copyright protection of musical works reflect a sophisticated analysis of each participant involved in music transmission
APA, Harvard, Vancouver, ISO, and other styles
27

Stoate, Robin. "Reading cyberspace : fictions, figures and (dis)embodiment." Thesis, University of Newcastle Upon Tyne, 2011. http://hdl.handle.net/10443/1129.

Full text
Abstract:
My thesis tracks the human body in cyberspace as a popular cultural construct, from its origins in cyberpunk fiction in the 1980s to the pervasion of cyberspatial narratives in contemporary fictions, along with its representations within wider cultural texts, such as film, the mainstream media, and on the Internet. Across the two respective sections of the thesis, I focus upon six recurring literal-metaphorical characters, entities or motifs which serve as points of collision, entanglement and reiteration for a wide variety of discourses. These figures—the avatar, the hacker, the nanotechnolog
APA, Harvard, Vancouver, ISO, and other styles
28

Yau, Hon-Min. "Taiwan's security in cyberspace : a critical perspective." Thesis, Aberystwyth University, 2018. http://hdl.handle.net/2160/accd3656-175a-4523-b4c0-ad53718cf875.

Full text
Abstract:
This thesis investigates the interplay between international politics and cyberspace, and explains how Taiwan's cybersecurity policy was formed prior to 2016. It examines how politics can shape or reshape the future direction of technologies. By using Taiwan as the object of the case study, the central research question is, "How is Taiwan counterbalancing China's rising power in cyberspace and what are the implications?" The investigation for the first part of the research question provides a general account of issues affecting Taiwan's practice of cybersecurity policy via a constructivist app
APA, Harvard, Vancouver, ISO, and other styles
29

Varanda, Paula Gouveia. "Dance performance in cyberspace : transfer and transformation." Thesis, Middlesex University, 2015. http://eprints.mdx.ac.uk/18820/.

Full text
Abstract:
The aim of this research undertaking is to understand the potential development of dance performance in the context of cyberculture, by examining the way practitioners use new media to create artworks that include audience participation, and by endeavouring in their theorization. With specific reference to cyberspace as a concept of electronic, networked and navigable space, the enquiry traces the connections such practices have with conventions of the medium of dance, which operate in its widely known condition as a live performing art. But acknowledgement that new media and new contexts of p
APA, Harvard, Vancouver, ISO, and other styles
30

Bohannon, Leland. "Cyberspace and the new age of influence /." Maxwell AFB, Ala. : School of Advanced Air and Space Studies, 2008. https://www.afresearch.org/skins/rims/display.aspx?moduleid=be0e99f3-fc56-4ccb-8dfe-670c0822a153&mode=user&action=downloadpaper&objectid=caa501f3-8bec-4650-9466-a0d9db7fffb0&rs=PublishedSearch.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Correa, Denise de Mesquita. "Blade Runners and electric sheep in cyberspace." reponame:Repositório Institucional da UFSC, 1995. https://repositorio.ufsc.br/xmlui/handle/123456789/157980.

Full text
Abstract:
Dissertação (mestrado) - Universidade Federal de Santa Catarina, Centro de Comunicação e Expressão<br>Made available in DSpace on 2016-01-08T20:12:37Z (GMT). No. of bitstreams: 1 103986.pdf: 11670293 bytes, checksum: ae86db783a486345be77b5112f50fd68 (MD5) Previous issue date: 1995<br>Análise de duas obras pós-modernas, o romance Do Androids Dream of Electric Sheep? de Philip K. Dick, e o filme Blade Runner de Ridley Scott, visando discutir o significado do termo humanidade no contexto pós-moderno.Tomando como base teórica a visão do americano Frederic Jameson sobre uma sociedade pós-capitali
APA, Harvard, Vancouver, ISO, and other styles
32

Neuenhausen, Benedikta. "Bildung in der Digitale eine Untersuchung der Bildungsrelevanz virtueller Welten /." [S.l. : s.n.], 2002. http://deposit.ddb.de/cgi-bin/dokserv?idn=966341066.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Paxton, Steven G. B. "Enhanced cyberspace defense with real-time distributed systems using covert channel publish-subscribe broker pattern communications." Thesis, Monterey, Calif. : Naval Postgraduate School, 2008. http://handle.dtic.mil/100.2/ADA483906.

Full text
Abstract:
Thesis (M.S. in Information Warfare Systems Engineering)--Naval Postgraduate School, June 2008.<br>Thesis Advisor(s): Michael, James B. "June 2008." Description based on title screen as viewed on August 26, 2008. Includes bibliographical references (p. 91-98). Also available in print.
APA, Harvard, Vancouver, ISO, and other styles
34

Tveit, Amund. "Customizing Cyberspace : Methods for User Representation and Prediction." Doctoral thesis, Norwegian University of Science and Technology, Department of Computer and Information Science, 2004. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-1605.

Full text
Abstract:
<p>Cyberspace plays an increasingly important role in people’s life due to its plentiful offering of services and information, e.g. the Word Wide Web, the Mobile Web and Online Games. However, the usability of cyberspace services is frequently reduced by its lack of customization according to individual needs and preferences.</p><p>In this thesis we address the cyberspace customization issue by focusing on methods for user representation and prediction. Examples of cyberspace customization include delegation of user data and tasks to software agents, automatic pre-fetching, or pre-processing o
APA, Harvard, Vancouver, ISO, and other styles
35

Proietti, Salvatore. "The cyborg, cyberspace, and North American science fiction." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1998. http://www.collectionscanada.ca/obj/s4/f2/dsk1/tape11/PQDD_0021/NQ44558.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

Kinley, Kelli. "What constitutes an act of war in cyberspace?" Wright-Patterson AFB : Air Force Institute of Technology, 2008. http://handle.dtic.mil/100.2/ADA480404.

Full text
Abstract:
Thesis (M.S. in Information Resource Management) --Air Force Institute of Technology, 2008.<br>Title from title page of PDF document (viewed on Aug 8, 2008). "AFIT/GIR/ENV/08-M12" Includes bibliographical references.
APA, Harvard, Vancouver, ISO, and other styles
37

Tang, Lijun. "Coping with separation : Chinese seafarer-partners in cyberspace." Thesis, Cardiff University, 2007. http://orca.cf.ac.uk/54640/.

Full text
Abstract:
This thesis examines a group of Chinese seafarer-partners' participation in a discussion website called Home of Chinese Seafarers. Specifically, it investigates the ways and extent to which participation in the site serves to ameliorate problems associated with separation and loneliness for seafarers-partners caused by the seafarers work patterns. The study utilised qualitative research methods. Online participant observation was conducted for a period in excess of two years and face to face and email interviews were carried out with seafarer-partner participants and the website managers. Web-
APA, Harvard, Vancouver, ISO, and other styles
38

Frye, Heath W. "Cyberpeace through cyberspace nation-building against transnational terrorism." Thesis, Monterey, California. Naval Postgraduate School, 2010. http://hdl.handle.net/10945/4995.

Full text
Abstract:
Approved for public release; distribution is unlimited<br>Due to recent vulnerabilities of Department of Defense (DoD) networks, along with the rising importance of cyberspace and cyberspace warfare endeavors among competing great powers, the DoD is quickly recognizing the importance of cyberspace. At the same time, the roles of the military are shifting from traditional, strategic and conventional conflict into what Secretary of Defense Robert Gates calls "soft power"--the capacity to perform nation-building missions against transnational terrorism. Cyberspace operations can play an important
APA, Harvard, Vancouver, ISO, and other styles
39

Malone, Patrick J. "Offense-defense balance in cyberspace: a proposed model." Thesis, Monterey, California. Naval Postgraduate School, 2012. http://hdl.handle.net/10945/27863.

Full text
Abstract:
The offense-defense balance is an indicator of the conflict dynamic in a system. Cyberspace is a domain where offense-defense costs are clearer than in the physical world. While there have been numerous comments about the current balance there has not been a study conducted. In this thesis, I use a heuristic model to show what the current theoretical balance point is, and what it was for two different case studies, Estonia in 2007 and Stuxnet. Based on the data, the cost of one dollar by the attacker spent on offense, the defender spends $1.32. When looked at from an aggregate perspective, usi
APA, Harvard, Vancouver, ISO, and other styles
40

Berglund, Nancy, and Jenny-Maria Ericsson. "Mars och Venus i cyberspace : genusmönster i bloggen." Thesis, Högskolan i Borås, Institutionen Biblioteks- och informationsvetenskap / Bibliotekshögskolan, 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:hb:diva-18568.

Full text
Abstract:
The purpose of this thesis is to find out if people have changed the way in which they write since the introduction of the internet. Men and women have been writing books, articles, letters, diaries and different types of literature for centuries. To give the reader some background about the weblog as a literary media, this thesis has a whole chapter on half-public literature that includes the history of letters and diaries. The weblog is a unique way for anyone to be whoever they want, whether it be a man or woman, old or young. The reader has no possible way of knowing if the script is true
APA, Harvard, Vancouver, ISO, and other styles
41

Joe, Raymond K. (Raymond Kim). "Cyberspace and the seas : lessons to be learned." Thesis, Massachusetts Institute of Technology, 1998. http://hdl.handle.net/1721.1/47725.

Full text
Abstract:
Thesis (S.M.)--Massachusetts Institute of Technology, Dept. of Ocean Engineering, 1998.<br>Includes bibliographical references.<br>With computer science technology and the Information Superhighway, or cyberspace, developing rapidly, information services and resources are playing an increasingly fundamental role in everyday life. The question of rights over information is correspondingly becoming more complicated as well. Regulation over cyberspace is inconsistent, and continues to develop in piecemeal fashion, while the debate remains unsettled whether cyberspace should be regulated at all. Cu
APA, Harvard, Vancouver, ISO, and other styles
42

Simner, Janni, and Susan McGinley. "The iPIant Collaborative: Taking plant biology into cyberspace." College of Agriculture and Life Sciences, University of Arizona (Tucson, AZ), 2007. http://hdl.handle.net/10150/622124.

Full text
APA, Harvard, Vancouver, ISO, and other styles
43

Li, Yu. "Securing Modern Cyberspace Using A Multi-Faceted Approach." Wright State University / OhioLINK, 2019. http://rave.ohiolink.edu/etdc/view?acc_num=wright1559662803668983.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

Andersen, Barbara Anne. "Virtually biosocial: IBD patienthood and community in cyberspace /." Burnaby B.C. : Simon Fraser University, 2006. http://ir.lib.sfu.ca/handle/1892/2645.

Full text
APA, Harvard, Vancouver, ISO, and other styles
45

Moseley, Amanda Jane. "A theology of interconnectivity : Buber, dialogue and cyberspace." Thesis, University of Kent, 2015. https://kar.kent.ac.uk/48040/.

Full text
Abstract:
Relationships are a fundamental part of being human; they enable communication, a shared sense of belonging, and a means of building identity and social capital. However, the hallmarks of late modernity can be encapsulated by the themes of detraditionalisation, individualisation and globalisation, which have essentially challenged the mode and means of engaging in relationships. This thesis uses the theology of Martin Buber to demonstrate how his dialogical claims about relationships, namely the “I-It” and “I-Thou” model, can provide a new ethical dimension to communication in the technologica
APA, Harvard, Vancouver, ISO, and other styles
46

Vaghetti, César Augusto Otero. "Exergames em rede: a Educação Física no cyberspace." reponame:Repositório Institucional da FURG, 2013. http://repositorio.furg.br/handle/1/4824.

Full text
Abstract:
Submitted by William Paiva (williampaiva17@hotmail.com) on 2015-04-17T18:22:06Z No. of bitstreams: 1 César Augusto Otero Vaghetti.pdf: 3899885 bytes, checksum: ba0136c01429d3c75cece5dc5b0f833f (MD5)<br>Approved for entry into archive by Vitor de Carvalho (vitor_carvalho_im@hotmail.com) on 2015-05-08T16:12:56Z (GMT) No. of bitstreams: 1 César Augusto Otero Vaghetti.pdf: 3899885 bytes, checksum: ba0136c01429d3c75cece5dc5b0f833f (MD5)<br>Made available in DSpace on 2015-05-08T16:12:56Z (GMT). No. of bitstreams: 1 César Augusto Otero Vaghetti.pdf: 3899885 bytes, checksum: ba0136c01429d3c75cece5dc5
APA, Harvard, Vancouver, ISO, and other styles
47

Cantón, Federico Alberto. "The Fourth Amendment and Cyberspace: Conflict or Cohesion?" PDXScholar, 2011. https://pdxscholar.library.pdx.edu/open_access_etds/336.

Full text
Abstract:
The purpose of the study was to determine how the Fourth Amendment is treated in the age of the internet. To determine the degree of the significance of this relationship a comparative approach is used. Court opinions from cases involving other technological innovations and the Fourth Amendment were examined and their reasoning was compared to that of cases involving the internet and the Fourth Amendment. The results indicated that contrary to some fears that the internet would require a different approach with respect to the law it actually did not present many novel barriers to its applicati
APA, Harvard, Vancouver, ISO, and other styles
48

Ogunlana, Sunday Oludare. "Countering Expansion and Organization of Terrorism in Cyberspace." ScholarWorks, 2018. https://scholarworks.waldenu.edu/dissertations/6079.

Full text
Abstract:
Terrorists use cyberspace and social media technology to create fear and spread violent ideologies, which pose a significant threat to public security. Researchers have documented the importance of the application of law and regulation in dealing with the criminal activities perpetrated through the aid of computers in cyberspace. Using routine activity theory, this study assessed the effectiveness of technological approaches to mitigating the expansion and organization of terrorism in cyberspace. The study aligned with the purpose area analysis objective of classifying and assessing potential
APA, Harvard, Vancouver, ISO, and other styles
49

Raut, Bimal Kumar. "Determining the Judicial Juristiction in the Transnational Cyberspace." Thesis, Queensland University of Technology, 2004. https://eprints.qut.edu.au/15830/1/Bimal_Raut_Thesis.pdf.

Full text
Abstract:
This thesis analyses the traditional notion of jurisdiction in the light of Internet based activities which are inherently decentralised and ubiquitous. It is clear that the unique nature of the Internet has undermined the very foundation of the traditional notion of jurisdiction and the territorially based concepts of law and their application. Which court should hear disputes arising out of Internet activities? On what grounds may a court assert or decline the jurisdiction? These are perplexing questions currently facing courts worldwide because of the trans-national nature of the Inte
APA, Harvard, Vancouver, ISO, and other styles
50

Raut, Bimal Kumar. "Determining the Judicial Juristiction in the Transnational Cyberspace." Queensland University of Technology, 2004. http://eprints.qut.edu.au/15830/.

Full text
Abstract:
This thesis analyses the traditional notion of jurisdiction in the light of Internet based activities which are inherently decentralised and ubiquitous. It is clear that the unique nature of the Internet has undermined the very foundation of the traditional notion of jurisdiction and the territorially based concepts of law and their application. Which court should hear disputes arising out of Internet activities? On what grounds may a court assert or decline the jurisdiction? These are perplexing questions currently facing courts worldwide because of the trans-national nature of the Internet
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!