Dissertations / Theses on the topic 'Cyborg theory'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 dissertations / theses for your research on the topic 'Cyborg theory.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Merrick, Katherine Anna. "The cyborg is the message a monstrous perspective for communication theory /." [Ames, Iowa : Iowa State University], 2007.
Find full textCraveiro, António Manuel Balazeiro Cascão. "O hipercorpo-tecnologias da carne : do culturista ao cyborg." Master's thesis, Instituições portuguesas -- UP-Universidade do Porto -- -Faculdade de Ciências do Desporto e de Educação Física, 2000. http://dited.bn.pt:80/29212.
Full textBilgen, Funda. "An Ecofeminist Approach To Atwood&." Master's thesis, METU, 2008. http://etd.lib.metu.edu.tr/upload/3/12610246/index.pdf.
Full textBlaeuer, Daniel Matthew. "An Ecology of Performance: Gregory Bateson's Cybernetic Performance." Scholar Commons, 2010. http://scholarcommons.usf.edu/etd/3510.
Full textVan, der Schyff Karlien. "Screen bound/skin bound : the politics of embodiment in the posthuman age." Thesis, Stellenbosch : University of Stellenbosch, 2010. http://hdl.handle.net/10019.1/4139.
Full textVillafana, Johans. "Att (re) –introducera hybrida tankar i ett bilsamhälle : En studie av förbindelsen bil-männniska cyborgen med hjälp av Actor Network Theory." Thesis, Stockholms universitet, Kulturgeografiska institutionen, 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:su:diva-90827.
Full textSwift, Adam Glen. "Mapping posthuman discourse and the evolution of living information." Thesis, Queensland University of Technology, 2006. https://eprints.qut.edu.au/16439/1/Adam_Swift_Thesis.pdf.
Full textSwift, Adam Glen. "Mapping posthuman discourse and the evolution of living information." Queensland University of Technology, 2006. http://eprints.qut.edu.au/16439/.
Full textBolich, Cecilia Madeline. "_Alien_ Thoughts: Spectatorial Pleasure and Mind Reading in Ridley Scott's Horror Film." Scholar Commons, 2011. http://scholarcommons.usf.edu/etd/3012.
Full textAlphin, Caroline Grey. "Living on the Edge of Burnout: Defamiliarizing Neoliberalism Through Cyberpunk Science Fiction." Diss., Virginia Tech, 2019. http://hdl.handle.net/10919/88796.
Full textMiddleton, Steven Anthony, and smi81431@bigpond net au. "A limited study of mechanical intelligence as media." RMIT University. Creative Media, 2008. http://adt.lib.rmit.edu.au/adt/public/adt-VIT20080717.161751.
Full textGuzman, Maria J. "Grace Jones in One Man Show: Music and Culture." Ohio : Ohio University, 2007. http://www.ohiolink.edu/etd/view.cgi?ohiou1187633537.
Full textReventlid, Amanda. "Gränser av hud, glänsande kroppar och längtan : En queer närspelning av Mass Effect 3." Thesis, Södertörns högskola, Institutionen för kultur och lärande, 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:sh:diva-19076.
Full textKronlid, David. "Ecofeminism and Environmental Ethics." Doctoral thesis, Uppsala University, Department of Theology, 2003. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-3307.
Full textMagnuson, Markus Amalthea. "Frihet, jämlikhet, cyborgskap : Drömmen om den mänskligare människan." Thesis, Stockholms universitet, Filmvetenskapliga institutionen, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:su:diva-179043.
Full textSharir, Yacov. "Beyond the electronic connection : the technologically manufactured cyber-human and its physical human counterpart in performance : a theory related to convergence identities." Thesis, University of Plymouth, 2013. http://hdl.handle.net/10026.1/1498.
Full textBen-Ezzer, Tirza. "Naming the Virtual: Digital Subjects and The End of History through Hegel and Deleuze (and a maybe few cyborgs)." Kent State University / OhioLINK, 2021. http://rave.ohiolink.edu/etdc/view?acc_num=kent1626919557257155.
Full textAl-Shamisi, Ahmed. "Active offensive cyber situational awareness : theory and practice." Thesis, Brunel University, 2014. http://bura.brunel.ac.uk/handle/2438/13427.
Full textSommestad, Teodor. "A framework and theory for cyber security assessments." Doctoral thesis, KTH, Industriella informations- och styrsystem, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-103690.
Full textMedvedev, Sergei A. "Offense-defense theory analysis of Russian cyber capability." Thesis, Monterey, California: Naval Postgraduate School, 2015. http://hdl.handle.net/10945/45225.
Full textSalim, Hamid M. "Cyber safety : a systems thinking and systems theory approach to managing cyber security risks." Thesis, Massachusetts Institute of Technology, 2014. http://hdl.handle.net/1721.1/90804.
Full textRafferty, Rebecca S. "Motvations Behind Cyber Bullying and Online Aggression: Cyber Sanctions, Dominance, and Trolling Online." Ohio University / OhioLINK, 2011. http://rave.ohiolink.edu/etdc/view?acc_num=ohiou1306953934.
Full textSpyridopoulos, Theodoros. "A holistic cyber-protection approach for industrial control systems based on systems theory : cyber security in ICSs." Thesis, University of Bristol, 2016. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.702187.
Full textLeili, Jennifer A. "Bystander Intervention, Victimization, and Routine Activities Theory: An Examination of Feminist Routine Activities Theory in Cyber Space." Scholar Commons, 2019. https://scholarcommons.usf.edu/etd/7843.
Full textDayanikli, Gokcen Yilmaz. "Electromagnetic Interference Attacks on Cyber-Physical Systems: Theory, Demonstration, and Defense." Diss., Virginia Tech, 2021. http://hdl.handle.net/10919/104862.
Full textJones, Malachi G. "Asymmetric information games and cyber security." Diss., Georgia Institute of Technology, 2013. http://hdl.handle.net/1853/50284.
Full textDuracz, Adam. "Rigorous Simulation : Its Theory and Applications." Doctoral thesis, Högskolan i Halmstad, Centrum för forskning om inbyggda system (CERES), 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-32608.
Full textHill, Cassandra. "Gendered Nature of Cyber Victimization as a Mechanism of Social Control." Thesis, Université d'Ottawa / University of Ottawa, 2016. http://hdl.handle.net/10393/35368.
Full textHuang, Zhen. "Interdependent Cyber Physical Systems: Robustness and Cascading Failures." Thesis, Université d'Ottawa / University of Ottawa, 2014. http://hdl.handle.net/10393/31517.
Full textEldosouky, Mahmoud Salama Abdelrahman A. "Security of Critical Cyber-Physical Systems: Fundamentals and Optimization." Diss., Virginia Tech, 2019. http://hdl.handle.net/10919/90281.
Full textWerner, Jenna. "Investigating cyber-loafing in South African organisations: the role of theory of planned behaviour." Master's thesis, University of Cape Town, 2020. http://hdl.handle.net/11427/32527.
Full textAkdag, Yavuz. "Cyber Deterrence against Cyberwar between the United States and China: A Power Transition Theory Perspective." Scholar Commons, 2017. http://scholarcommons.usf.edu/etd/6993.
Full textSanjab, Anibal Jean. "Security of Cyber-Physical Systems with Human Actors: Theoretical Foundations, Game Theory, and Bounded Rationality." Diss., Virginia Tech, 2018. http://hdl.handle.net/10919/86204.
Full textAgarwal, Rahul. "Graph-Based Simulation for Cyber-Physical Attacks on Smart Buildings." Thesis, Virginia Tech, 2021. http://hdl.handle.net/10919/103614.
Full textMerritt, Michele. "Queering Cognition: Extended Minds and Sociotechnologically Hybridized Gender." Scholar Commons, 2010. http://scholarcommons.usf.edu/etd/3627.
Full textDardis, Christina M. "An Integrative Theory Analysis of Real-Life and Cyber Unwanted Pursuit Perpetration Following Relationship Break-Up." Ohio University / OhioLINK, 2015. http://rave.ohiolink.edu/etdc/view?acc_num=ohiou1400764792.
Full textIoannou, Georgios. "The Markov multi-phase transferable belief model : a data fusion theory for enhancing cyber situational awareness." Thesis, Brunel University, 2015. http://bura.brunel.ac.uk/handle/2438/13742.
Full textMartin, Jaclyn. "Something Looks Phishy Here: Applications of Signal Detection Theory to Cyber-Security Behaviors in the Workplace." Scholar Commons, 2017. http://scholarcommons.usf.edu/etd/6728.
Full textFerdowsi, Khosrowshahi Aidin. "Distributed Machine Learning for Autonomous and Secure Cyber-physical Systems." Diss., Virginia Tech, 2020. http://hdl.handle.net/10919/99466.
Full textTreurnich, Janetta M. "A secondary school teacher’s experiences as a victim of cyber bullying." Diss., University of Pretoria, 2014. http://hdl.handle.net/2263/45897.
Full textLi, Zuxing. "Privacy-by-Design for Cyber-Physical Systems." Doctoral thesis, KTH, ACCESS Linnaeus Centre, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-211908.
Full textAkillioglu, Hakan. "Demand Responsive Planning : A dynamic and responsive planning framework based on workload control theory for cyber-physical production systems." Doctoral thesis, KTH, Produktionssystem, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-172969.
Full textWei, Longfei. "Game-Theoretic and Machine-Learning Techniques for Cyber-Physical Security and Resilience in Smart Grid." FIU Digital Commons, 2018. https://digitalcommons.fiu.edu/etd/3850.
Full textMarincowitz, Friedl. "Towards an ecological feminist self beyond dualism and essentialism : an inquiry into the contributions made by cultural ecofeminism, critical-transformative ecofeminism and cyber-ecofeminism." Thesis, Stellenbosch : Stellenbosch University, 1998. http://hdl.handle.net/10019.1/51075.
Full textGuidetti, Oliver A. "Measuring and mitigating cyber vigilance decrement in network defence personnel." Thesis, Edith Cowan University, Research Online, Perth, Western Australia, 2022. https://ro.ecu.edu.au/theses/2582.
Full textHjelm, Mattias. "Projecting Power in the Fifth Domain : An assessment of why states use proxies for offensive cyber operations." Thesis, Försvarshögskolan, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:fhs:diva-9980.
Full textNjilla, Laurent L. Y. "Modeling Security and Resource Allocation for Mobile Multi-hop Wireless Neworks Using Game Theory." FIU Digital Commons, 2015. http://digitalcommons.fiu.edu/etd/2284.
Full textReinert, Olof, and Tobias Wiesinger. "DATA QUALITY CONSEQUENCES OF MANDATORY CYBER DATA SHARING BETWEEN DUOPOLY INSURERS." Thesis, Umeå universitet, Institutionen för matematik och matematisk statistik, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:umu:diva-175180.
Full textYoussef, Tarek. "Co-design of Security Aware Power System Distribution Architecture as Cyber Physical System." FIU Digital Commons, 2017. http://digitalcommons.fiu.edu/etd/3210.
Full textRubio, Hernan Jose Manuel. "Detection of attacks against cyber-physical industrial systems." Thesis, Evry, Institut national des télécommunications, 2017. http://www.theses.fr/2017TELE0015/document.
Full text