Academic literature on the topic 'Social psychology. Computer networks. Information warfare'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Social psychology. Computer networks. Information warfare.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Social psychology. Computer networks. Information warfare"
Ayalon, Oshrat, and Eran Toch. "Not Even Past: Information Aging and Temporal Privacy in Online Social Networks." Human–Computer Interaction 32, no. 2 (2016): 73–102. http://dx.doi.org/10.1080/07370024.2016.1203791.
Full textHeravi, Alireza, Sameera Mubarak, and Kim-Kwang Raymond Choo. "Information privacy in online social networks: Uses and gratification perspective." Computers in Human Behavior 84 (July 2018): 441–59. http://dx.doi.org/10.1016/j.chb.2018.03.016.
Full textMata-Rivera, Felix, Miguel Torres-Ruiz, Giovanni Guzmán, Marco Moreno-Ibarra, and Rolando Quintero. "A collaborative learning approach for geographic information retrieval based on social networks." Computers in Human Behavior 51 (October 2015): 829–42. http://dx.doi.org/10.1016/j.chb.2014.11.069.
Full textPutnik, Nenad, and Branislav Milosavljević. "Russian information operations in the Ukrainian armed conflict." Bezbednost, Beograd 63, no. 1 (2021): 62–81. http://dx.doi.org/10.5937/bezbednost2101062p.
Full textHornby, Peter A. "Psychology Software Listings from the PsycLink™ Software Information Service." Journal of Technology in Human Services 16, no. 1 (1999): 33–61. http://dx.doi.org/10.1300/j017v16n01_03.
Full textDay, Ronald E. "Clearing up “implicit knowledge”: Implications for Knowledge Management, information science, psychology, and social epistemology." Journal of the American Society for Information Science and Technology 56, no. 6 (2005): 630–35. http://dx.doi.org/10.1002/asi.20153.
Full textMaria Balmaceda, Jose, Silvia Schiaffino, and Daniela Godoy. "How do personality traits affect communication among users in online social networks?" Online Information Review 38, no. 1 (2014): 136–53. http://dx.doi.org/10.1108/oir-06-2012-0104.
Full textKisekka, Victoria, Sharmistha Bagchi-Sen, and H. Raghav Rao. "Extent of private information disclosure on online social networks: An exploration of Facebook mobile phone users." Computers in Human Behavior 29, no. 6 (2013): 2722–29. http://dx.doi.org/10.1016/j.chb.2013.07.023.
Full textTARASENKO, Yaroslav. "METHOD FOR COMPUTER PREDICTION OF THE PROPAGANDIST’S BEHAVIOR UNDER THE REVERSE PSYCHOLOGICAL INFLUENCE." HERALD OF KHMELNYTSKYI NATIONAL UNIVERSITY 297, no. 3 (2021): 51–57. http://dx.doi.org/10.31891/2307-5732-2021-297-3-51-57.
Full textSederholm, Teija, Petri Jääskeläinen, and Aki-Mauri Huhtinen. "Coronavirus as a Rhizome." International Journal of Cyber Warfare and Terrorism 11, no. 2 (2021): 43–55. http://dx.doi.org/10.4018/ijcwt.2021040104.
Full textDissertations / Theses on the topic "Social psychology. Computer networks. Information warfare"
Kinniburgh, James B. "Who networks? The social psychology of virtual communities." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2004. http://library.nps.navy.mil/uhtbin/hyperion/04Jun%5FKinniburgh.pdf.
Full textBowen, Braeden. "“It Doesn’t Matter Now Who’s Right and Who’s Not:” A Model To Evaluate and Detect Bot Behavior on Twitter." Wittenberg University Honors Theses / OhioLINK, 2021. http://rave.ohiolink.edu/etdc/view?acc_num=wuhonors1623686115831856.
Full textNewlon, Christine Mae. "The effect of shared dynamic understanding on willingness to contribute information| Design and analysis of a mega-collaborative interface." Thesis, Indiana University - Purdue University Indianapolis, 2016. http://pqdtopen.proquest.com/#viewpdf?dispub=10159859.
Full textLong, Bridget L. "Scripts for Online Dating: A Model and Theory of Online Romantic Relationship Initiation." Bowling Green, Ohio : Bowling Green State University, 2010. http://rave.ohiolink.edu/etdc/view?acc%5Fnum=bgsu1268852623.
Full textMäkivierikko, Aram. "A Needs-Based Approach towards Fostering Long-term Engagement with Energy Feedback among Local Residents." Licentiate thesis, KTH, Hållbar utveckling, miljövetenskap och teknik, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-254920.
Full textKalash, Abeer. "Trust modelling through social sciences." Thesis, 2014. http://hdl.handle.net/1805/6454.
Full textBooks on the topic "Social psychology. Computer networks. Information warfare"
Zhongguo shu bu qi de wang luo zhan zheng: We can't lose the cyber war. Hunan ren min chu ban she, 2010.
Find full textG, Cordesman Justin, and Center for Strategic and International Studies (Washington, D.C.), eds. Cyber-threats, information warfare, and critical infrastructure protection: Defending the U.S. homeland. Praeger, 2002.
Find full textWiki at war: Conflict in a socially networked world. Texas A&M University Press, 2012.
Find full textZhongguo shu bu qi de wang luo zhan zheng: We can't lose the cyber war. Hunan ren min chu ban she, 2010.
Find full textMario, Paolucci, ed. Reputation in artificial societies: Social beliefs for social order. Kluwer Academic Publishers, 2002.
Find full textComposing cyberspace: Identity, community, and knowledge in the electronic age. McGraw-Hill, 1998.
Find full textSomitra, Sanadhya, and SpringerLink (Online service), eds. Security, Privacy, and Applied Cryptography Engineering: Second International Conference, SPACE 2012, Chennai, India, November 3-4, 2012. Proceedings. Springer Berlin Heidelberg, 2012.
Find full textLessig, Lawrence. Code and other laws of cyberspace: Version 2.0. Basic Books, 2006.
Find full textBook chapters on the topic "Social psychology. Computer networks. Information warfare"
Saleema, A., and Sabu M. Thampi. "User Recognition Using Cognitive Psychology Based Behavior Modeling in Online Social Networks." In Communications in Computer and Information Science. Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-4828-4_12.
Full text