To see the other types of publications on this topic, follow the link: Cyborg theory.

Dissertations / Theses on the topic 'Cyborg theory'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'Cyborg theory.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Merrick, Katherine Anna. "The cyborg is the message a monstrous perspective for communication theory /." [Ames, Iowa : Iowa State University], 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Craveiro, António Manuel Balazeiro Cascão. "O hipercorpo-tecnologias da carne : do culturista ao cyborg." Master's thesis, Instituições portuguesas -- UP-Universidade do Porto -- -Faculdade de Ciências do Desporto e de Educação Física, 2000. http://dited.bn.pt:80/29212.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Bilgen, Funda. "An Ecofeminist Approach To Atwood&amp." Master's thesis, METU, 2008. http://etd.lib.metu.edu.tr/upload/3/12610246/index.pdf.

Full text
Abstract:
This thesis analyzes the analogy between woman and nature and ecofeminist theory that emphasizes the parallelism between man&#039<br>s exploitation of woman and nature. It aims to make an ecofeminist analysis of three novels: Surfacing by Margaret Atwood, The Cleft by Doris Lessing and The Stone Gods by Jeanette Winterson. First, this thesis introduces the history and main principles of ecofeminist theory. These novels by different women writers investigate the embodiment of these main principles in three novels despite the fact that the same aspects of the theory can sometimes be interpreted
APA, Harvard, Vancouver, ISO, and other styles
4

Blaeuer, Daniel Matthew. "An Ecology of Performance: Gregory Bateson's Cybernetic Performance." Scholar Commons, 2010. http://scholarcommons.usf.edu/etd/3510.

Full text
Abstract:
This dissertation is a case study of the public performances of Gregory Bateson at The Esalen Institute. The case study is a reconsideration of the work of Gregory Bateson from the perspective of performance studies. The author brings together performativity, cybernetics, and the sacred to argue that Gregory Bateson, in his public performances, was striving for grace in encounters with others. The author has conducted archival research into Bateson’s presentations and has spoken with several close to Bateson to get a sense of how his process of public presentation paralleled his ideas—a proces
APA, Harvard, Vancouver, ISO, and other styles
5

Van, der Schyff Karlien. "Screen bound/skin bound : the politics of embodiment in the posthuman age." Thesis, Stellenbosch : University of Stellenbosch, 2010. http://hdl.handle.net/10019.1/4139.

Full text
Abstract:
Thesis (MA (English))--University of Stellenbosch, 2010.<br>ENGLISH ABSTRACT: The end of the second millennium saw a sudden return to corporeality, especially within feminist scholarship, where embodiment and issues surrounding the body were, for the first time, made explicit. This study examines the corporeal body in relation to technology and the impact that newly emerging virtual technologies have on our understanding of the body, not only through examining representations of the technologically modified body, but also by exploring how contemporary cultural practices produce corporeal
APA, Harvard, Vancouver, ISO, and other styles
6

Villafana, Johans. "Att (re) –introducera hybrida tankar i ett bilsamhälle : En studie av förbindelsen bil-männniska cyborgen med hjälp av Actor Network Theory." Thesis, Stockholms universitet, Kulturgeografiska institutionen, 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:su:diva-90827.

Full text
Abstract:
Denna studie belyser behovet av alternativa synsätt och alternativa lösningar på hur bilismen och transportsektorn medverkar till miljöproblemen i samhället. Studien undersöker bilens roll för bilisten genom att lyfta fram förbindelsen bil-människa och hur denna förbindelse påverkar valet mellan bilen och kollektiva färdsätt i tre bostadsområden i Stockholmsregion. För att nå förståelse för förbindelsen bil-människa utgår studien från ett aktör-nätverksperspektiv. Metoden utgår från dels kvalitativa intervjuer och litteraturstudier. Under studiens gång uppstod ny förståelse för förbindelsen bi
APA, Harvard, Vancouver, ISO, and other styles
7

Swift, Adam Glen. "Mapping posthuman discourse and the evolution of living information." Thesis, Queensland University of Technology, 2006. https://eprints.qut.edu.au/16439/1/Adam_Swift_Thesis.pdf.

Full text
Abstract:
The discourse that surrounds and constitutes the post-human emerged as a response to earlier claims of an essential or universal human or human nature. These discussions claim that the human is a discursive construct that emerges from various configurations of nature, embodiment, technology, and culture, configurations that have also been variously shaped by the forces of social history. And in the absence of an essential human figure, post-human discourses suggest that there are no restrictions or limitations on how the human can be reconfigured. This axiom has been extended in light of a ple
APA, Harvard, Vancouver, ISO, and other styles
8

Swift, Adam Glen. "Mapping posthuman discourse and the evolution of living information." Queensland University of Technology, 2006. http://eprints.qut.edu.au/16439/.

Full text
Abstract:
The discourse that surrounds and constitutes the post-human emerged as a response to earlier claims of an essential or universal human or human nature. These discussions claim that the human is a discursive construct that emerges from various configurations of nature, embodiment, technology, and culture, configurations that have also been variously shaped by the forces of social history. And in the absence of an essential human figure, post-human discourses suggest that there are no restrictions or limitations on how the human can be reconfigured. This axiom has been extended in light of a ple
APA, Harvard, Vancouver, ISO, and other styles
9

Bolich, Cecilia Madeline. "_Alien_ Thoughts: Spectatorial Pleasure and Mind Reading in Ridley Scott's Horror Film." Scholar Commons, 2011. http://scholarcommons.usf.edu/etd/3012.

Full text
Abstract:
Pleasure experienced in an unpleasant film genre, like horror, has prompted numerous discussions in film studies. Noted scholars like Carol J. Clover and Noël Carroll have rationalized spectatorial enjoyment of a genre that capitalizes on human anxieties and complicates cultural categories. Clover admits that horror initially satisfies sadistic tendencies in young male viewers but then pushes them to cross gender lines and identify with the strong female heroine who defeats the film's threat. Carroll provides a basic explanation, citing spectators' cognitive curiosity as the source of pleasure
APA, Harvard, Vancouver, ISO, and other styles
10

Alphin, Caroline Grey. "Living on the Edge of Burnout: Defamiliarizing Neoliberalism Through Cyberpunk Science Fiction." Diss., Virginia Tech, 2019. http://hdl.handle.net/10919/88796.

Full text
Abstract:
A dominant trend in cyberpunk scholarship draws from Fredric Jameson's diagnosis of postmodernism as the logic of late capitalism, using Jameson's spatial pastiche, schizophrenic temporality, and waning of affect, along with Jameson's characterization of Baudrillard's simulacrum to interpret postmodern cultural artifacts. For many cultural critics, the city of cyberpunk is thoroughly postmodern because parallels can be drawn between the cyberpunk city and the postmodern condition. However, very little work has considered the ways in which cyberpunk can defamiliarize the necro-spatial and nec
APA, Harvard, Vancouver, ISO, and other styles
11

Middleton, Steven Anthony, and smi81431@bigpond net au. "A limited study of mechanical intelligence as media." RMIT University. Creative Media, 2008. http://adt.lib.rmit.edu.au/adt/public/adt-VIT20080717.161751.

Full text
Abstract:
The project investigates mathematics, informatics, statistical analysis and their histories, the history of human engagement with machines, and illustrates some uses of artificial intelligence and robotic technologies as media. It is concerned with, amongst other issues, the sentient and not sentient binaries offered in discourses on machine intelligence. The term intelligence is used to distinguish between human and not human. However, a non-human, the intelligent machine, has become incorporated into the processes by which our culture defines intelligence. Those processes were explored
APA, Harvard, Vancouver, ISO, and other styles
12

Guzman, Maria J. "Grace Jones in One Man Show: Music and Culture." Ohio : Ohio University, 2007. http://www.ohiolink.edu/etd/view.cgi?ohiou1187633537.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Reventlid, Amanda. "Gränser av hud, glänsande kroppar och längtan : En queer närspelning av Mass Effect 3." Thesis, Södertörns högskola, Institutionen för kultur och lärande, 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:sh:diva-19076.

Full text
Abstract:
This essay aims to examine how the synthetic non-human subjects, EDI and Legion, are constituted in terms of their bodies, gender, desire and emotion, in the gaming series Mass Effect. In a close-gaming method I also want to explore in which way the gamer can effect or even change the expressions of the body, gen­der, desire, and emotion made by the synthetic non-human subjects. In order to do this I use Judith Butlers and Sara Ahmeds queer theory, and Donna Haraways cyborg feminism. I concluded that EDI em­braces her embodiments and is given a highly sexualized female body, being more of a wo
APA, Harvard, Vancouver, ISO, and other styles
14

Kronlid, David. "Ecofeminism and Environmental Ethics." Doctoral thesis, Uppsala University, Department of Theology, 2003. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-3307.

Full text
Abstract:
<p>This study focuses on ecofeminist ethical theory. A first aim is to clarify ecofeminist views on five central issues in the field of environmental ethics. These issues are: (1) Views of nature, (2) social constructivism and nature, (3) values of nature, (4) ethical contextualism, and (5) ethical pluralism. A second aim is to compare ecofeminist standpoints with certain standpoints within nonfeminist environmental ethical theory. A third aim is to critically discuss some of the main standpoints in ecofeminism. The analysis focuses on the works of Karen Warren, Sallie McFague, Chris Cuomo, an
APA, Harvard, Vancouver, ISO, and other styles
15

Magnuson, Markus Amalthea. "Frihet, jämlikhet, cyborgskap : Drömmen om den mänskligare människan." Thesis, Stockholms universitet, Filmvetenskapliga institutionen, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:su:diva-179043.

Full text
Abstract:
This thesis explores the metaphoric cyborg concept, based on the classic essay "A Cyborg Manifesto" by Donna J. Haraway, through Claudia Springer and her analysis of cyborgs in popular culture, and in relation to Judith Butler and queer theory. By extending the cyborg term to include contemporary forms of cyborgship such as our internet lives and personas, I advocate discussion of philosophical matters concering man/machine-compounds today rather than tomorrow. The main purpose is to restore the cyborg concept as a meaningful analytic and philosophic tool for studying man/machine-relations, in
APA, Harvard, Vancouver, ISO, and other styles
16

Sharir, Yacov. "Beyond the electronic connection : the technologically manufactured cyber-human and its physical human counterpart in performance : a theory related to convergence identities." Thesis, University of Plymouth, 2013. http://hdl.handle.net/10026.1/1498.

Full text
Abstract:
This thesis is an investigation of the complex processes and relationships between the physical human performer and the technologically manufactured cyber-human counterpart. I acted as both researcher and the physical human performer, deeply engaged in the moment-to-moment creation of events unfolding within a shared virtual reality environment. As the primary instigator and activator of the cyber-human partner, I maintained a balance between the live and technological performance elements, prioritizing the production of content and meaning. By way of using practice as research, this thesis ar
APA, Harvard, Vancouver, ISO, and other styles
17

Ben-Ezzer, Tirza. "Naming the Virtual: Digital Subjects and The End of History through Hegel and Deleuze (and a maybe few cyborgs)." Kent State University / OhioLINK, 2021. http://rave.ohiolink.edu/etdc/view?acc_num=kent1626919557257155.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Al-Shamisi, Ahmed. "Active offensive cyber situational awareness : theory and practice." Thesis, Brunel University, 2014. http://bura.brunel.ac.uk/handle/2438/13427.

Full text
Abstract:
There is an increasing gap between the progress of technological systems and the successful exploitation of these systems through cyber-attack. Whilst the mechanism and scope of cyberspace is progressing with each passing day, risk factors and the ability to process the required amount of data from cyberspace efficiently are proving to be major obstacles to achieving desired outcomes from cyber operations. This, coupled with the dramatic increase in the numbers of cyber attackers, who are constantly producing new ways of attacking and paralysing cyber systems for political or financial gain, i
APA, Harvard, Vancouver, ISO, and other styles
19

Sommestad, Teodor. "A framework and theory for cyber security assessments." Doctoral thesis, KTH, Industriella informations- och styrsystem, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-103690.

Full text
Abstract:
Information technology (IT) is critical and valuable to our society. An important type of IT system is Supervisor Control And Data Acquisition (SCADA) systems. These systems are used to control and monitor physical industrial processes like electrical power supply, water supply and railroad transport. Since our society is heavily dependent on these industrial processes we are also dependent on the behavior of our SCADA systems. SCADA systems have become (and continue to be) integrated with other IT systems they are thereby becoming increasingly vulnerable to cyber threats. Decision makers need
APA, Harvard, Vancouver, ISO, and other styles
20

Medvedev, Sergei A. "Offense-defense theory analysis of Russian cyber capability." Thesis, Monterey, California: Naval Postgraduate School, 2015. http://hdl.handle.net/10945/45225.

Full text
Abstract:
Approved for public release; distribution is unlimited<br>The Russian Federation is a key state actor in cyberspace; cyber events associated with Russian state and non-state actors have threatened Russia’s neighbors, shaped international cyber norms, as well as influenced strategists’ understanding of cyber power. This thesis seeks to understand Russian cyber capability through the lens of Robert Jervis’s offense-defense theory in order to answer the thesis’s central question: Do Russian cyber capabilities reflect an investment in offensive or defensive cyber weapons, and do Russia’s cyber tec
APA, Harvard, Vancouver, ISO, and other styles
21

Salim, Hamid M. "Cyber safety : a systems thinking and systems theory approach to managing cyber security risks." Thesis, Massachusetts Institute of Technology, 2014. http://hdl.handle.net/1721.1/90804.

Full text
Abstract:
Thesis: S.M. in Engineering and Management, Massachusetts Institute of Technology, Engineering Systems Division, System Design and Management Program, 2014.<br>Thesis: S.M., Massachusetts Institute of Technology, Department of Electrical Engineering and Computer Science, 2014.<br>93<br>Cataloged from PDF version of thesis.<br>Includes bibliographical references (pages 148-156).<br>If we are to manage cyber security risks more effectively in today's complex and dynamic Web 2.0 environment, then a new way of thinking is needed to complement traditional approaches. According to Symantec's 2014 In
APA, Harvard, Vancouver, ISO, and other styles
22

Rafferty, Rebecca S. "Motvations Behind Cyber Bullying and Online Aggression: Cyber Sanctions, Dominance, and Trolling Online." Ohio University / OhioLINK, 2011. http://rave.ohiolink.edu/etdc/view?acc_num=ohiou1306953934.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

Spyridopoulos, Theodoros. "A holistic cyber-protection approach for industrial control systems based on systems theory : cyber security in ICSs." Thesis, University of Bristol, 2016. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.702187.

Full text
Abstract:
Being the cornerstone of today's Industry, Industrial Control Systems (ICSs) play an important role in the overall function and quality of modern society. Their use to control critical processes within the Industry (power production, transportation, manufacturing etc.) makes them an integral part of the Critical National Infrastructure (CNI), as defined by the European Council (2008), rendering thereby their protection a process of critical importance. Traditionally, ICSs have been operated as closed, isolated systems. However, the connection of contemporary ICS installations with external net
APA, Harvard, Vancouver, ISO, and other styles
24

Leili, Jennifer A. "Bystander Intervention, Victimization, and Routine Activities Theory: An Examination of Feminist Routine Activities Theory in Cyber Space." Scholar Commons, 2019. https://scholarcommons.usf.edu/etd/7843.

Full text
Abstract:
Routine Activities Theory (RAT) is one of the most widely used theories to explain victimization. It has been applied to a wide range of criminal victimizations, such as property crimes (Miethe, Stafford, & Long, 1987) and urban murder (Messner & Tardiff, 1985). While traditional RAT has been used to explain violence against women, the feminist perspective of RAT developed by Schwartz and Pitts (1995) provides a better explanation by incorporating cultural factors that shape the conditions that give rise to offending. The current study draws on feminist RAT in order to explore three different
APA, Harvard, Vancouver, ISO, and other styles
25

Dayanikli, Gokcen Yilmaz. "Electromagnetic Interference Attacks on Cyber-Physical Systems: Theory, Demonstration, and Defense." Diss., Virginia Tech, 2021. http://hdl.handle.net/10919/104862.

Full text
Abstract:
A cyber-physical system (CPS) is a complex integration of hardware and software components to perform well-defined tasks. Up to this point, many software-based attacks targeting the network and computation layers have been reported by the researchers. However, the physical layer attacks that utilize natural phenomena (e.g., electromagnetic waves) to manipulate safety-critic signals such as analog sensor outputs, digital data, and actuation signals have recently taken the attention. The purpose of this dissertation is to detect the weaknesses of cyber-physical systems against low-power Intentio
APA, Harvard, Vancouver, ISO, and other styles
26

Jones, Malachi G. "Asymmetric information games and cyber security." Diss., Georgia Institute of Technology, 2013. http://hdl.handle.net/1853/50284.

Full text
Abstract:
A cyber-security problem is a conflict-resolution scenario that typically consists of a security system and at least two decision makers (e.g. attacker and defender) that can each have competing objectives. In this thesis, we are interested in cyber-security problems where one decision maker has superior or better information. Game theory is a well-established mathematical tool that can be used to analyze such problems and will be our tool of choice. In particular, we will formulate cyber-security problems as stochastic games with asymmetric information, where game-theoretic methods can then
APA, Harvard, Vancouver, ISO, and other styles
27

Duracz, Adam. "Rigorous Simulation : Its Theory and Applications." Doctoral thesis, Högskolan i Halmstad, Centrum för forskning om inbyggda system (CERES), 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-32608.

Full text
Abstract:
Designing Cyber-Physical Systems is hard. Physical testing can be slow, expensive and dangerous. Furthermore computational components make testing all possible behavior unfeasible. Model-based design mitigates these issues by making it possible to iterate over a design much faster. Traditional simulation tools can produce useful results, but their results are traditionally approximations that make it impossible to distinguish a useful simulation from one dominated by numerical error. Verification tools require skills in formal specification and a priori understanding of the particular dynamica
APA, Harvard, Vancouver, ISO, and other styles
28

Hill, Cassandra. "Gendered Nature of Cyber Victimization as a Mechanism of Social Control." Thesis, Université d'Ottawa / University of Ottawa, 2016. http://hdl.handle.net/10393/35368.

Full text
Abstract:
This research used a deductive post-hoc statistical design and Statistics Canada’s 2009 General Social Survey on victimization to explore the social control function of cyber victimization and determine whether this is gendered. Social control was operationalized as a composite measure of self-responsibilization. A multiple regression analysis identified predictors of social control and additional multiple regression models were used for a gender specific examination of social control. A total of 14 predictor variables were entered into three blocks: cyber victimization; sociodemographic chara
APA, Harvard, Vancouver, ISO, and other styles
29

Huang, Zhen. "Interdependent Cyber Physical Systems: Robustness and Cascading Failures." Thesis, Université d'Ottawa / University of Ottawa, 2014. http://hdl.handle.net/10393/31517.

Full text
Abstract:
The cyber-physical systems (CPS), such as smart grid and intelligent transportation system, permeate into our modern societies recently. The infrastructures in such systems are closely interconnected and related, e.g., the intelligent transportation system is based on the reliable communication system, which requires the stable electricity provided by power grid for the proper function. We call such mutually related systems interdependent networks. This thesis addresses the cascading failure issue in interdependent cyber physical system. We consider CPS as a system that consists of physical-r
APA, Harvard, Vancouver, ISO, and other styles
30

Eldosouky, Mahmoud Salama Abdelrahman A. "Security of Critical Cyber-Physical Systems: Fundamentals and Optimization." Diss., Virginia Tech, 2019. http://hdl.handle.net/10919/90281.

Full text
Abstract:
Cyber-physical systems (CPSs) are systems that integrate physical elements with a cyber layer that enables sensing, monitoring, and processing the data from the physical components. Examples of CPSs include autonomous vehicles, unmanned aerial vehicles (UAVs), smart grids, and the Internet of Things (IoT). In particular, many critical infrastructure (CI) that are vital to our modern day cities and communities, are CPSs. This wide range of CPSs domains represents a cornerstone of smart cities in which various CPSs are connected to provide efficient services. However, this level of connectivity
APA, Harvard, Vancouver, ISO, and other styles
31

Werner, Jenna. "Investigating cyber-loafing in South African organisations: the role of theory of planned behaviour." Master's thesis, University of Cape Town, 2020. http://hdl.handle.net/11427/32527.

Full text
Abstract:
Organisations are increasingly becoming aware of employees' internet use for nonwork- related activities, a phenomenon known as cyber-loafing. This poses a problem for organisations as both employee and organisational productivity are negatively impacted. Cyber-loafing is a fairly nascent concept within the Counterproductive Work Behaviour (CWB) literature, given the recent rise in technological advancements. Employees who engage in cyber-loafing divert their energy and attention away from work for prolonged periods of time, which is classified as a withdrawal behaviour under the CWB typology.
APA, Harvard, Vancouver, ISO, and other styles
32

Akdag, Yavuz. "Cyber Deterrence against Cyberwar between the United States and China: A Power Transition Theory Perspective." Scholar Commons, 2017. http://scholarcommons.usf.edu/etd/6993.

Full text
Abstract:
In the last three decades, states and societies have increasingly been connected to each other through Information and Communication Technologies (ICTs) such as satellites and the Internet, thus expanding the sphere of influence of cyberspace. While offering numerous economic and security benefits, this increased global connectivity also poses various security challenges and threats at the national and international level. In particular, the threat of cyberwar has become one of the top national security issues in both the United States and China, as reflected in an incr
APA, Harvard, Vancouver, ISO, and other styles
33

Sanjab, Anibal Jean. "Security of Cyber-Physical Systems with Human Actors: Theoretical Foundations, Game Theory, and Bounded Rationality." Diss., Virginia Tech, 2018. http://hdl.handle.net/10919/86204.

Full text
Abstract:
Cyber-physical systems (CPSs) are large-scale systems that seamlessly integrate physical and human elements via a cyber layer that enables connectivity, sensing, and data processing. Key examples of CPSs include smart power systems, smart transportation systems, and the Internet of Things (IoT). This wide-scale cyber-physical interconnection introduces various operational benefits and promises to transform cities, infrastructure, and networked systems into more efficient, interactive, and interconnected smart systems. However, this ubiquitous connectivity leaves CPSs vulnerable to menacing sec
APA, Harvard, Vancouver, ISO, and other styles
34

Agarwal, Rahul. "Graph-Based Simulation for Cyber-Physical Attacks on Smart Buildings." Thesis, Virginia Tech, 2021. http://hdl.handle.net/10919/103614.

Full text
Abstract:
As buildings evolve towards the envisioned smart building paradigm, smart buildings' cyber-security issues and physical security issues are mingling. Although research studies have been conducted to detect and prevent physical (or cyber) intrusions to smart building systems(SBS), it is still unknown (1) how one type of intrusion facilitates the other, and (2) how such synergic attacks compromise the security protection of whole systems. To investigate both research questions, the author proposes a graph-based testbed to simulate cyber-physical attacks on smart buildings. The testbed models bot
APA, Harvard, Vancouver, ISO, and other styles
35

Merritt, Michele. "Queering Cognition: Extended Minds and Sociotechnologically Hybridized Gender." Scholar Commons, 2010. http://scholarcommons.usf.edu/etd/3627.

Full text
Abstract:
In the last forty years, significant developments in neuroscience, psychology, and robotic technology have been cause for major trend changes in the philosophy of mind. One such shift has been the reallocation of focus from entirely brain-centered theories of mind to more embodied, embedded, and even extended answers to the questions, what are cognitive processes and where do we find such phenomena? Given that hypotheses such as Clark and Chalmers‘ (1998) Extended Mind or Hutto‘s (2006) Radical Enactivism, systematically undermine the organism-bound, internal, and static pictures of minds a
APA, Harvard, Vancouver, ISO, and other styles
36

Dardis, Christina M. "An Integrative Theory Analysis of Real-Life and Cyber Unwanted Pursuit Perpetration Following Relationship Break-Up." Ohio University / OhioLINK, 2015. http://rave.ohiolink.edu/etdc/view?acc_num=ohiou1400764792.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

Ioannou, Georgios. "The Markov multi-phase transferable belief model : a data fusion theory for enhancing cyber situational awareness." Thesis, Brunel University, 2015. http://bura.brunel.ac.uk/handle/2438/13742.

Full text
Abstract:
eXfiltration Advanced Persistent Threats (XAPTs) increasingly account for incidents concerned with critical information exfiltration from High Valued Targets (HVT's) by terrorists, cyber criminals or enemy states. Existing Cyber Defence frameworks and data fusion models do not adequately address (i) the multi-stage nature of XAPTs and (ii) the uncertainty and conflicting information associated with XAPTs. A new data fusion theory, called the Markov Multi-phase Transferable Belief Model (MM-TBM) is developed, for tracking and predicting XAPTs. MM-TBM expands the attack kill-chain model to attac
APA, Harvard, Vancouver, ISO, and other styles
38

Martin, Jaclyn. "Something Looks Phishy Here: Applications of Signal Detection Theory to Cyber-Security Behaviors in the Workplace." Scholar Commons, 2017. http://scholarcommons.usf.edu/etd/6728.

Full text
Abstract:
Cyber-security is an ever-increasing problem in the 21st century. Though the majority of cyber-security breaches are a direct result of human error (Hu, Dinev, Hart, & Cooke, 2012), there is a dearth of research in psychology on the application of human decision-making for cyber-security compliance. Through an online inbox simulation, the present research examined the utility of a robust psychological model for decision-making, signal detection theory (SDT) for modeling decision-making in the context of receiving and responding to phishing and spear-phishing email scams. The influence of indiv
APA, Harvard, Vancouver, ISO, and other styles
39

Ferdowsi, Khosrowshahi Aidin. "Distributed Machine Learning for Autonomous and Secure Cyber-physical Systems." Diss., Virginia Tech, 2020. http://hdl.handle.net/10919/99466.

Full text
Abstract:
Autonomous cyber-physical systems (CPSs) such as autonomous connected vehicles (ACVs), unmanned aerial vehicles (UAVs), critical infrastructure (CI), and the Internet of Things (IoT) will be essential to the functioning of our modern economies and societies. Therefore, maintaining the autonomy of CPSs as well as their stability, robustness, and security (SRS) in face of exogenous and disruptive events is a critical challenge. In particular, it is crucial for CPSs to be able to not only operate optimally in the vicinity of a normal state but to also be robust and secure so as to withstand poten
APA, Harvard, Vancouver, ISO, and other styles
40

Treurnich, Janetta M. "A secondary school teacher’s experiences as a victim of cyber bullying." Diss., University of Pretoria, 2014. http://hdl.handle.net/2263/45897.

Full text
Abstract:
The purpose of this study was to explore and describe the experiences of a secondary school teacher from Gauteng who was a victim of learner cyber bullying. Cyber bullying of teachers is a relatively under researched phenomenon in South Africa and can be a painful event for many teachers. The ultimate goal of this study was to raise awareness about learner cyber bullying and the effect it had on the emotional and professional well-being of the participant. Awareness about this phenomenon might lead to better support and understanding by different role players such as departments of education,
APA, Harvard, Vancouver, ISO, and other styles
41

Li, Zuxing. "Privacy-by-Design for Cyber-Physical Systems." Doctoral thesis, KTH, ACCESS Linnaeus Centre, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-211908.

Full text
Abstract:
It is envisioned that future cyber-physical systems will provide a more convenient living and working environment. However, such systems need inevitably to collect and process privacy-sensitive information. That means the benefits come with potential privacy leakage risks. Nowadays, this privacy issue receives more attention as a legal requirement of the EU General Data Protection Regulation. In this thesis, privacy-by-design approaches are studied where privacy enhancement is realized through taking privacy into account in the physical layer design. This work focuses in particular on cyber-ph
APA, Harvard, Vancouver, ISO, and other styles
42

Akillioglu, Hakan. "Demand Responsive Planning : A dynamic and responsive planning framework based on workload control theory for cyber-physical production systems." Doctoral thesis, KTH, Produktionssystem, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-172969.

Full text
Abstract:
Recent developments in the area of Cyber-Physical Production Systems prove that high technology readiness level is already achieved and industrialization of such technologies is not far from today. Although these technologies seem to be convenient in providing solutions to environmental uncertainties, their application provides adaptability only at shop floor level. Needless to say, an enterprise cannot reach true adaptability without ensuring adaptation skills at every level in its hierarchy. Commonly used production planning and control approaches in industry today inherit from planning solu
APA, Harvard, Vancouver, ISO, and other styles
43

Wei, Longfei. "Game-Theoretic and Machine-Learning Techniques for Cyber-Physical Security and Resilience in Smart Grid." FIU Digital Commons, 2018. https://digitalcommons.fiu.edu/etd/3850.

Full text
Abstract:
The smart grid is the next-generation electrical infrastructure utilizing Information and Communication Technologies (ICTs), whose architecture is evolving from a utility-centric structure to a distributed Cyber-Physical System (CPS) integrated with a large-scale of renewable energy resources. However, meeting reliability objectives in the smart grid becomes increasingly challenging owing to the high penetration of renewable resources and changing weather conditions. Moreover, the cyber-physical attack targeted at the smart grid has become a major threat because millions of electronic devices
APA, Harvard, Vancouver, ISO, and other styles
44

Marincowitz, Friedl. "Towards an ecological feminist self beyond dualism and essentialism : an inquiry into the contributions made by cultural ecofeminism, critical-transformative ecofeminism and cyber-ecofeminism." Thesis, Stellenbosch : Stellenbosch University, 1998. http://hdl.handle.net/10019.1/51075.

Full text
Abstract:
Thesis (MA)--University of Stellenbosch, 1998.<br>ENGLISH ABSTRACT: In this thesis an inquiry is made into the contributions that cultural ecofeminism, critical-transformative ecofeminism and cyber-(eco)feminism make towards the articulation of an ecological feminist notion of the self that can generate or promote an ethical relation with nature from a position beyond dualism and essentialism. In the first chapter, titled Cultural ecofeminism, different aspects of patriarchal Western culture are identified that are responsible for the twin dominations of women and nature. In the light o
APA, Harvard, Vancouver, ISO, and other styles
45

Guidetti, Oliver A. "Measuring and mitigating cyber vigilance decrement in network defence personnel." Thesis, Edith Cowan University, Research Online, Perth, Western Australia, 2022. https://ro.ecu.edu.au/theses/2582.

Full text
Abstract:
Vigilance decrement refers to a psychophysiological decline in the capacity to sustain attention to monotonous tasks after prolonged periods. Vigilance decrement was explored in the cyber security domain across two studies. The Western Australian Cyber Defence Task (WACDT) was designed, developed and validated as a network defence sustained attention task in Study 1. The WACDT is the only cyber vigilance task presented to the literature outside of antiquated products developed by the United States Air Force. The WACDT was then used in Study 2 as an experimental platform by which to explore psy
APA, Harvard, Vancouver, ISO, and other styles
46

Hjelm, Mattias. "Projecting Power in the Fifth Domain : An assessment of why states use proxies for offensive cyber operations." Thesis, Försvarshögskolan, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:fhs:diva-9980.

Full text
Abstract:
In the 21st century, cyber operations have become the modern manifestation of political warfare between great powers. Many states have made considerable efforts to build up their respective cyber commands. Contrary, or as a complement to this, some states choses to rely upon actors detached from the state for conducting their operations online. What incentives explain this strategy? There are inherent risks with employing proxies and states nowadays have an ability to conduct cyber operations from central military commands. This presents a puzzle. By using a comparative case study approach, th
APA, Harvard, Vancouver, ISO, and other styles
47

Njilla, Laurent L. Y. "Modeling Security and Resource Allocation for Mobile Multi-hop Wireless Neworks Using Game Theory." FIU Digital Commons, 2015. http://digitalcommons.fiu.edu/etd/2284.

Full text
Abstract:
This dissertation presents novel approaches to modeling and analyzing security and resource allocation in mobile ad hoc networks (MANETs). The research involves the design, implementation and simulation of different models resulting in resource sharing and security’s strengthening of the network among mobile devices. Because of the mobility, the network topology may change quickly and unpredictably over time. Moreover, data-information sent from a source to a designated destination node, which is not nearby, has to route its information with the need of intermediary mobile nodes. However, not
APA, Harvard, Vancouver, ISO, and other styles
48

Reinert, Olof, and Tobias Wiesinger. "DATA QUALITY CONSEQUENCES OF MANDATORY CYBER DATA SHARING BETWEEN DUOPOLY INSURERS." Thesis, Umeå universitet, Institutionen för matematik och matematisk statistik, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:umu:diva-175180.

Full text
Abstract:
Cyber attacks against companies are becoming more common as technology advances and digitalization is increasing exponentially. All Swedish insurance companies that sell cyber insurance encounter the same problem, there is not enough data to do good actuarial work. In order for the pricing procedure to improve and general knowledge of cyber insurance to increase, it has been proposed that insurance companies should share their data with each other. The goal of the thesis is to do mathematical calculations to explore data quality consequences of such a sharing regime. This thesis is based on so
APA, Harvard, Vancouver, ISO, and other styles
49

Youssef, Tarek. "Co-design of Security Aware Power System Distribution Architecture as Cyber Physical System." FIU Digital Commons, 2017. http://digitalcommons.fiu.edu/etd/3210.

Full text
Abstract:
The modern smart grid would involve deep integration between measurement nodes, communication systems, artificial intelligence, power electronics and distributed resources. On one hand, this type of integration can dramatically improve the grid performance and efficiency, but on the other, it can also introduce new types of vulnerabilities to the grid. To obtain the best performance, while minimizing the risk of vulnerabilities, the physical power system must be designed as a security aware system. In this dissertation, an interoperability and communication framework for microgrid control and
APA, Harvard, Vancouver, ISO, and other styles
50

Rubio, Hernan Jose Manuel. "Detection of attacks against cyber-physical industrial systems." Thesis, Evry, Institut national des télécommunications, 2017. http://www.theses.fr/2017TELE0015/document.

Full text
Abstract:
Nous abordons des problèmes de sécurité dans des systèmes cyber-physiques industriels. Les attaques contre ces systèmes doivent être traitées à la fois en matière de sûreté et de sécurité. Les technologies de contrôles imposés par les normes industrielles, couvrent déjà la sûreté. Cependant, du point de vue de la sécurité, la littérature a prouvé que l’utilisation de techniques cyber pour traiter la sécurité de ces systèmes n’est pas suffisante, car les actions physiques malveillantes seront ignorées. Pour cette raison, on a besoin de mécanismes pour protéger les deux couches à la fois. Certai
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!