Pour voir les autres types de publications sur ce sujet consultez le lien suivant : Cyberspace.

Thèses sur le sujet « Cyberspace »

Créez une référence correcte selon les styles APA, MLA, Chicago, Harvard et plusieurs autres

Choisissez une source :

Consultez les 50 meilleures thèses pour votre recherche sur le sujet « Cyberspace ».

À côté de chaque source dans la liste de références il y a un bouton « Ajouter à la bibliographie ». Cliquez sur ce bouton, et nous générerons automatiquement la référence bibliographique pour la source choisie selon votre style de citation préféré : APA, MLA, Harvard, Vancouver, Chicago, etc.

Vous pouvez aussi télécharger le texte intégral de la publication scolaire au format pdf et consulter son résumé en ligne lorsque ces informations sont inclues dans les métadonnées.

Parcourez les thèses sur diverses disciplines et organisez correctement votre bibliographie.

1

Chan, Cho-yan Jonathan, and 陳祖恩. "Traumatic cyberspace: witnessing cyberspace as a site of Trauma." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2002. http://hub.hku.hk/bib/B31227144.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
2

Wipper, Renate. "Umweltbildung im Cyberspace." Universität Potsdam, 1999. http://opus.kobv.de/ubp/volltexte/2005/298/.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
3

Barber, Clair. "Shakespeare and cyberspace." Thesis, University of Sussex, 2003. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.288165.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
4

Ackroyd, Bradley Sterling. "Hinduism in cyberspace." [Gainesville, Fla.] : University of Florida, 2006. http://purl.fcla.edu/fcla/etd/UFE0014320.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
5

Simu, Nicklas. "Strategisk bombning i cyberspace." Thesis, Försvarshögskolan, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:fhs:diva-5514.

Texte intégral
Résumé :
Why has some cyber-attacks been more successful than others? There has been in the near past examples of cyber-attacks used with different purposes. How do we understand these chosen targets and what result the attack accomplished? Research has discussed similarities between aviation warfare and cyber warfare, and how the first could explain what is happening in cyber warfare now. There is also opposing opinions whether cyber warfare should be seen as a method to alone force a will on your opponent or if cyber warfare should mere be supporting other military means. The essay test Warden’s theo
Styles APA, Harvard, Vancouver, ISO, etc.
6

Young, Peter. "Visualising software in cyberspace." Thesis, Durham University, 1999. http://etheses.dur.ac.uk/4363/.

Texte intégral
Résumé :
The problems of maintaining software systems are well documented. The increasing size and complexity of modern software serves only to worsen matters. Software maintainers are typically confronted with very large and very complex software systems, of which they may have little or no prior knowledge. At this stage they will normally have some maintenance task to perform, though possibly little indication of where or how to start. They need to investigate and understand the software to some extent in order to begin maintenance. This understanding process is termed program comprehension. There ar
Styles APA, Harvard, Vancouver, ISO, etc.
7

Karaflogka, Anastasia. "Religious discourse and cyberspace." Thesis, SOAS, University of London, 2005. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.422207.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
8

Herring, Deborah. "Contextual theology in cyberspace." Thesis, University of Sheffield, 2005. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.427215.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
9

Bayne, Siân. "Learning cultures in cyberspace." Thesis, Queen Margaret University, 2004. https://eresearch.qmu.ac.uk/handle/20.500.12289/7328.

Texte intégral
Résumé :
This thesis is a study of emerging learning cultures. Its focus is on students and teachers who are engaged in using internet technologies for learning in higher education in the United Kingdom. The thesis provides an exploration of theoretical approaches to the cultural impact of new technologies, drawing on cultural, cybercultural and educational theory. It applies these theoretical insights to interview texts generated through discussions with learners and teachers. Its contribution lies in the originality of its empirical material and of the insights applied to their analysis, and in its a
Styles APA, Harvard, Vancouver, ISO, etc.
10

Qiang, Wen. "Cultural resistances in Chinese cyberspace." Thesis, University of Macau, 2010. http://umaclib3.umac.mo/record=b2150205.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
11

Clayton, Richard. "Anonymity and traceability in cyberspace." Thesis, University of Cambridge, 2005. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.444742.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
12

Sun, Meng M. Arch Massachusetts Institute of Technology. "Cyberspace as a memory container." Thesis, Massachusetts Institute of Technology, 2017. http://hdl.handle.net/1721.1/111488.

Texte intégral
Résumé :
Thesis: M. Arch., Massachusetts Institute of Technology, Department of Architecture, 2017.<br>Cataloged from PDF version of thesis.<br>Includes bibliographical references (page 61).<br>Space is a container for memory. This metaphor is built upon the observation that the human mind can easily acquire spatial information without much deliberation. Moreover, non-spatial information can be better retrieved when associated with a spatial memory. The mnemonic function of space has been explored since ancient Greek and Roman times. The method of loci uses imaginary space and its spatial continuity to
Styles APA, Harvard, Vancouver, ISO, etc.
13

Van, Rensburg Erma J. "Love and friendship in cyberspace." Thesis, Stellenbosch : Stellenbosch University, 2012. http://hdl.handle.net/10019.1/52328.

Texte intégral
Résumé :
Thesis (M.A.)--University of Stellenbosch, 2001.<br>ENGLISH ABSTRACT: Since its birth in the early 1960's the Internet has been growing exponentially in all areas and it is predicted that by the year 2002, 490 million people around the world will have Internet access. Similarly, a rapidly increasing number of people are finding themselves working and playing on the Internet, using computer mediated communication (CMC) to converse, exchange information, debate, court, and show compassion. As a result CMC has become a new way for people to find or meet each other via social Internet tools
Styles APA, Harvard, Vancouver, ISO, etc.
14

King, James John Robert. "The cultural construction of cyberspace." Thesis, University of Southampton, 2001. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.394053.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
15

Pralea, Cristian. "A Hermeneutical Ontology of Cyberspace." Bowling Green State University / OhioLINK, 2010. http://rave.ohiolink.edu/etdc/view?acc_num=bgsu1262720615.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
16

Pope, Barrington C. "IRL: creating cyberspace in meatspace." University of Cincinnati / OhioLINK, 2011. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1306503222.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
17

Benoit, Marcel L. "The special operations : cyberspace nexus /." Maxwell AFB, Ala. : School of Advanced Air and Space Studies, 2008. https://www.afresearch.org/skins/rims/display.aspx?moduleid=be0e99f3-fc56-4ccb-8dfe-670c0822a153&mode=user&action=downloadpaper&objectid=1f7903b2-a5c1-48a0-9f1b-8229ded2afd4&rs=PublishedSearch.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
18

Watt, Eliza. "Cyberspace, surveillance, law and privacy." Thesis, University of Westminster, 2017. https://westminsterresearch.westminster.ac.uk/item/q3xzx/cyberspace-surveillance-law-and-privacy.

Texte intégral
Résumé :
The thesis titled, Cyberspace, Surveillance, Law and Privacy analyses the implications of state sponsored cyber surveillance on the exercise of the human right to privacy of communications and data privacy of individuals, subject to untargeted interception of digital communications. The principle aim of the thesis is to assess the legality of mass cyber surveillance of the Five Eyes alliance, with an emphasis on the United States and the United Kingdom. The study also considers the growing trend among the law enforcement agencies to access data without consent located in foreign jurisdictions
Styles APA, Harvard, Vancouver, ISO, etc.
19

Trim, Valerie. "Affecting modalities : configuring meaning in cyberspace." Thesis, University of Birmingham, 2012. http://etheses.bham.ac.uk//id/eprint/3106/.

Texte intégral
Résumé :
The power of the Internet has produced a rich environment for the creation of new art forms. These artefacts, which can employ complex graphics, animation, music, written and spoken text and user-interactivity, are extremely fluid and variable. Encountering them requires a new and specifically multimedia literacy. This thesis examines in detail four online texts: Faith, Hometown, The Shower, and Blue Han, in order to investigate the possibility of such a literacy. Both Faith and Hometown are subjected to an extended visual, aural, and textual analysis, using theoretical approaches drawn from a
Styles APA, Harvard, Vancouver, ISO, etc.
20

Moranski, Wojciech. "Cyberspace: Ethical Issues and Catholic Perspectives." Thesis, Boston College, 2017. http://hdl.handle.net/2345/bc-ir:107473.

Texte intégral
Résumé :
Thesis advisor: Andrea Vicini<br>Thesis advisor: Richard Spinello<br>In this thesis, I try to make a small contribution to this search for an Order in cyberspace. In the first chapter I study some new dimensions of freedom, which arose together with the development of the internet. I present the technology and the culture of hackers as two sources of a new understanding of liberty in cyberspace. I also highlight two moral issues, which are present in cyberspace, and that, in my opinion, were caused by this redefinition of freedom. In the second chapter, I try to apply Christian moral theology
Styles APA, Harvard, Vancouver, ISO, etc.
21

Schwarz, Kevin James. "The Securitization of Cyberspace Through Technification." Thesis, Virginia Tech, 2016. http://hdl.handle.net/10919/71758.

Texte intégral
Résumé :
This thesis adds to the literature surrounding technification in securitizing cyberspace by examining the role of technical experts in constituting threats in cyberspace at the level of the state. Furthermore, this thesis considers the impact of technocratic framing on the public's understanding of cyberspace and the historical conditions under which this framing developed.<br>Master of Arts
Styles APA, Harvard, Vancouver, ISO, etc.
22

Downes, Daniel M. (Daniel Mark) Carleton University Dissertation Communication. "Manifesting destiny: the colonization of cyberspace." Ottawa, 1993.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
23

Usman, Muhammad. "Does Cyberspace outdate Jurisdictional Defamation Laws?" Thesis, University of Bradford, 2019. http://hdl.handle.net/10454/17461.

Texte intégral
Résumé :
Cyberspace produces friction when the law is implemented by domestic courts using 'state-laws'. These laws are based on a ‘physical presence’ of an individual within the territory. It elevates conflicts relating to cyberspace jurisdiction. This research examines private international law complications associated with cyberspace. The paradigm of libel that takes place within the domain of social media is used to evaluate the utility of traditional laws. This research is conducted using ‘black-letter’ methodology, keeping in mind the changes constituted by the Defamation Act 2013. It pinpoints t
Styles APA, Harvard, Vancouver, ISO, etc.
24

Currier, Dianne 1963. "Technology and transformation : Deleuze, feminism and cyberspace." Monash University, Centre for Comparative Literature and Cultural Studies, 2001. http://arrow.monash.edu.au/hdl/1959.1/8916.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
25

Finkelstein, Adam B. A. "A holistic approach to the cyberspace metaphor." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1998. http://www.collectionscanada.ca/obj/s4/f2/dsk1/tape11/PQDD_0005/MQ43864.pdf.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
26

Yuan, Xiaotong 1979. "Copyright protection to musical works in cyberspace." Thesis, McGill University, 2004. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=82675.

Texte intégral
Résumé :
The objective of this thesis is to demonstrate, through analysis of the current Canadian Copyright Act and related cases, how the rapid development of Internet technology has challenged the legal protection of musical works under Canadian copyright legislation and jurisprudence. Canadian government and courts have begun contemplating these issues and attempted to formulate constitutional reform policies and effective measures for Canada. These initiatives related to copyright protection of musical works reflect a sophisticated analysis of each participant involved in music transmission
Styles APA, Harvard, Vancouver, ISO, etc.
27

Stoate, Robin. "Reading cyberspace : fictions, figures and (dis)embodiment." Thesis, University of Newcastle Upon Tyne, 2011. http://hdl.handle.net/10443/1129.

Texte intégral
Résumé :
My thesis tracks the human body in cyberspace as a popular cultural construct, from its origins in cyberpunk fiction in the 1980s to the pervasion of cyberspatial narratives in contemporary fictions, along with its representations within wider cultural texts, such as film, the mainstream media, and on the Internet. Across the two respective sections of the thesis, I focus upon six recurring literal-metaphorical characters, entities or motifs which serve as points of collision, entanglement and reiteration for a wide variety of discourses. These figures—the avatar, the hacker, the nanotechnolog
Styles APA, Harvard, Vancouver, ISO, etc.
28

Yau, Hon-Min. "Taiwan's security in cyberspace : a critical perspective." Thesis, Aberystwyth University, 2018. http://hdl.handle.net/2160/accd3656-175a-4523-b4c0-ad53718cf875.

Texte intégral
Résumé :
This thesis investigates the interplay between international politics and cyberspace, and explains how Taiwan's cybersecurity policy was formed prior to 2016. It examines how politics can shape or reshape the future direction of technologies. By using Taiwan as the object of the case study, the central research question is, "How is Taiwan counterbalancing China's rising power in cyberspace and what are the implications?" The investigation for the first part of the research question provides a general account of issues affecting Taiwan's practice of cybersecurity policy via a constructivist app
Styles APA, Harvard, Vancouver, ISO, etc.
29

Varanda, Paula Gouveia. "Dance performance in cyberspace : transfer and transformation." Thesis, Middlesex University, 2015. http://eprints.mdx.ac.uk/18820/.

Texte intégral
Résumé :
The aim of this research undertaking is to understand the potential development of dance performance in the context of cyberculture, by examining the way practitioners use new media to create artworks that include audience participation, and by endeavouring in their theorization. With specific reference to cyberspace as a concept of electronic, networked and navigable space, the enquiry traces the connections such practices have with conventions of the medium of dance, which operate in its widely known condition as a live performing art. But acknowledgement that new media and new contexts of p
Styles APA, Harvard, Vancouver, ISO, etc.
30

Bohannon, Leland. "Cyberspace and the new age of influence /." Maxwell AFB, Ala. : School of Advanced Air and Space Studies, 2008. https://www.afresearch.org/skins/rims/display.aspx?moduleid=be0e99f3-fc56-4ccb-8dfe-670c0822a153&mode=user&action=downloadpaper&objectid=caa501f3-8bec-4650-9466-a0d9db7fffb0&rs=PublishedSearch.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
31

Correa, Denise de Mesquita. "Blade Runners and electric sheep in cyberspace." reponame:Repositório Institucional da UFSC, 1995. https://repositorio.ufsc.br/xmlui/handle/123456789/157980.

Texte intégral
Résumé :
Dissertação (mestrado) - Universidade Federal de Santa Catarina, Centro de Comunicação e Expressão<br>Made available in DSpace on 2016-01-08T20:12:37Z (GMT). No. of bitstreams: 1 103986.pdf: 11670293 bytes, checksum: ae86db783a486345be77b5112f50fd68 (MD5) Previous issue date: 1995<br>Análise de duas obras pós-modernas, o romance Do Androids Dream of Electric Sheep? de Philip K. Dick, e o filme Blade Runner de Ridley Scott, visando discutir o significado do termo humanidade no contexto pós-moderno.Tomando como base teórica a visão do americano Frederic Jameson sobre uma sociedade pós-capitali
Styles APA, Harvard, Vancouver, ISO, etc.
32

Neuenhausen, Benedikta. "Bildung in der Digitale eine Untersuchung der Bildungsrelevanz virtueller Welten /." [S.l. : s.n.], 2002. http://deposit.ddb.de/cgi-bin/dokserv?idn=966341066.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
33

Paxton, Steven G. B. "Enhanced cyberspace defense with real-time distributed systems using covert channel publish-subscribe broker pattern communications." Thesis, Monterey, Calif. : Naval Postgraduate School, 2008. http://handle.dtic.mil/100.2/ADA483906.

Texte intégral
Résumé :
Thesis (M.S. in Information Warfare Systems Engineering)--Naval Postgraduate School, June 2008.<br>Thesis Advisor(s): Michael, James B. "June 2008." Description based on title screen as viewed on August 26, 2008. Includes bibliographical references (p. 91-98). Also available in print.
Styles APA, Harvard, Vancouver, ISO, etc.
34

Tveit, Amund. "Customizing Cyberspace : Methods for User Representation and Prediction." Doctoral thesis, Norwegian University of Science and Technology, Department of Computer and Information Science, 2004. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-1605.

Texte intégral
Résumé :
<p>Cyberspace plays an increasingly important role in people’s life due to its plentiful offering of services and information, e.g. the Word Wide Web, the Mobile Web and Online Games. However, the usability of cyberspace services is frequently reduced by its lack of customization according to individual needs and preferences.</p><p>In this thesis we address the cyberspace customization issue by focusing on methods for user representation and prediction. Examples of cyberspace customization include delegation of user data and tasks to software agents, automatic pre-fetching, or pre-processing o
Styles APA, Harvard, Vancouver, ISO, etc.
35

Proietti, Salvatore. "The cyborg, cyberspace, and North American science fiction." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1998. http://www.collectionscanada.ca/obj/s4/f2/dsk1/tape11/PQDD_0021/NQ44558.pdf.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
36

Kinley, Kelli. "What constitutes an act of war in cyberspace?" Wright-Patterson AFB : Air Force Institute of Technology, 2008. http://handle.dtic.mil/100.2/ADA480404.

Texte intégral
Résumé :
Thesis (M.S. in Information Resource Management) --Air Force Institute of Technology, 2008.<br>Title from title page of PDF document (viewed on Aug 8, 2008). "AFIT/GIR/ENV/08-M12" Includes bibliographical references.
Styles APA, Harvard, Vancouver, ISO, etc.
37

Tang, Lijun. "Coping with separation : Chinese seafarer-partners in cyberspace." Thesis, Cardiff University, 2007. http://orca.cf.ac.uk/54640/.

Texte intégral
Résumé :
This thesis examines a group of Chinese seafarer-partners' participation in a discussion website called Home of Chinese Seafarers. Specifically, it investigates the ways and extent to which participation in the site serves to ameliorate problems associated with separation and loneliness for seafarers-partners caused by the seafarers work patterns. The study utilised qualitative research methods. Online participant observation was conducted for a period in excess of two years and face to face and email interviews were carried out with seafarer-partner participants and the website managers. Web-
Styles APA, Harvard, Vancouver, ISO, etc.
38

Frye, Heath W. "Cyberpeace through cyberspace nation-building against transnational terrorism." Thesis, Monterey, California. Naval Postgraduate School, 2010. http://hdl.handle.net/10945/4995.

Texte intégral
Résumé :
Approved for public release; distribution is unlimited<br>Due to recent vulnerabilities of Department of Defense (DoD) networks, along with the rising importance of cyberspace and cyberspace warfare endeavors among competing great powers, the DoD is quickly recognizing the importance of cyberspace. At the same time, the roles of the military are shifting from traditional, strategic and conventional conflict into what Secretary of Defense Robert Gates calls "soft power"--the capacity to perform nation-building missions against transnational terrorism. Cyberspace operations can play an important
Styles APA, Harvard, Vancouver, ISO, etc.
39

Malone, Patrick J. "Offense-defense balance in cyberspace: a proposed model." Thesis, Monterey, California. Naval Postgraduate School, 2012. http://hdl.handle.net/10945/27863.

Texte intégral
Résumé :
The offense-defense balance is an indicator of the conflict dynamic in a system. Cyberspace is a domain where offense-defense costs are clearer than in the physical world. While there have been numerous comments about the current balance there has not been a study conducted. In this thesis, I use a heuristic model to show what the current theoretical balance point is, and what it was for two different case studies, Estonia in 2007 and Stuxnet. Based on the data, the cost of one dollar by the attacker spent on offense, the defender spends $1.32. When looked at from an aggregate perspective, usi
Styles APA, Harvard, Vancouver, ISO, etc.
40

Berglund, Nancy, and Jenny-Maria Ericsson. "Mars och Venus i cyberspace : genusmönster i bloggen." Thesis, Högskolan i Borås, Institutionen Biblioteks- och informationsvetenskap / Bibliotekshögskolan, 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:hb:diva-18568.

Texte intégral
Résumé :
The purpose of this thesis is to find out if people have changed the way in which they write since the introduction of the internet. Men and women have been writing books, articles, letters, diaries and different types of literature for centuries. To give the reader some background about the weblog as a literary media, this thesis has a whole chapter on half-public literature that includes the history of letters and diaries. The weblog is a unique way for anyone to be whoever they want, whether it be a man or woman, old or young. The reader has no possible way of knowing if the script is true
Styles APA, Harvard, Vancouver, ISO, etc.
41

Joe, Raymond K. (Raymond Kim). "Cyberspace and the seas : lessons to be learned." Thesis, Massachusetts Institute of Technology, 1998. http://hdl.handle.net/1721.1/47725.

Texte intégral
Résumé :
Thesis (S.M.)--Massachusetts Institute of Technology, Dept. of Ocean Engineering, 1998.<br>Includes bibliographical references.<br>With computer science technology and the Information Superhighway, or cyberspace, developing rapidly, information services and resources are playing an increasingly fundamental role in everyday life. The question of rights over information is correspondingly becoming more complicated as well. Regulation over cyberspace is inconsistent, and continues to develop in piecemeal fashion, while the debate remains unsettled whether cyberspace should be regulated at all. Cu
Styles APA, Harvard, Vancouver, ISO, etc.
42

Simner, Janni, and Susan McGinley. "The iPIant Collaborative: Taking plant biology into cyberspace." College of Agriculture and Life Sciences, University of Arizona (Tucson, AZ), 2007. http://hdl.handle.net/10150/622124.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
43

Li, Yu. "Securing Modern Cyberspace Using A Multi-Faceted Approach." Wright State University / OhioLINK, 2019. http://rave.ohiolink.edu/etdc/view?acc_num=wright1559662803668983.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
44

Andersen, Barbara Anne. "Virtually biosocial: IBD patienthood and community in cyberspace /." Burnaby B.C. : Simon Fraser University, 2006. http://ir.lib.sfu.ca/handle/1892/2645.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
45

Moseley, Amanda Jane. "A theology of interconnectivity : Buber, dialogue and cyberspace." Thesis, University of Kent, 2015. https://kar.kent.ac.uk/48040/.

Texte intégral
Résumé :
Relationships are a fundamental part of being human; they enable communication, a shared sense of belonging, and a means of building identity and social capital. However, the hallmarks of late modernity can be encapsulated by the themes of detraditionalisation, individualisation and globalisation, which have essentially challenged the mode and means of engaging in relationships. This thesis uses the theology of Martin Buber to demonstrate how his dialogical claims about relationships, namely the “I-It” and “I-Thou” model, can provide a new ethical dimension to communication in the technologica
Styles APA, Harvard, Vancouver, ISO, etc.
46

Vaghetti, César Augusto Otero. "Exergames em rede: a Educação Física no cyberspace." reponame:Repositório Institucional da FURG, 2013. http://repositorio.furg.br/handle/1/4824.

Texte intégral
Résumé :
Submitted by William Paiva (williampaiva17@hotmail.com) on 2015-04-17T18:22:06Z No. of bitstreams: 1 César Augusto Otero Vaghetti.pdf: 3899885 bytes, checksum: ba0136c01429d3c75cece5dc5b0f833f (MD5)<br>Approved for entry into archive by Vitor de Carvalho (vitor_carvalho_im@hotmail.com) on 2015-05-08T16:12:56Z (GMT) No. of bitstreams: 1 César Augusto Otero Vaghetti.pdf: 3899885 bytes, checksum: ba0136c01429d3c75cece5dc5b0f833f (MD5)<br>Made available in DSpace on 2015-05-08T16:12:56Z (GMT). No. of bitstreams: 1 César Augusto Otero Vaghetti.pdf: 3899885 bytes, checksum: ba0136c01429d3c75cece5dc5
Styles APA, Harvard, Vancouver, ISO, etc.
47

Cantón, Federico Alberto. "The Fourth Amendment and Cyberspace: Conflict or Cohesion?" PDXScholar, 2011. https://pdxscholar.library.pdx.edu/open_access_etds/336.

Texte intégral
Résumé :
The purpose of the study was to determine how the Fourth Amendment is treated in the age of the internet. To determine the degree of the significance of this relationship a comparative approach is used. Court opinions from cases involving other technological innovations and the Fourth Amendment were examined and their reasoning was compared to that of cases involving the internet and the Fourth Amendment. The results indicated that contrary to some fears that the internet would require a different approach with respect to the law it actually did not present many novel barriers to its applicati
Styles APA, Harvard, Vancouver, ISO, etc.
48

Ogunlana, Sunday Oludare. "Countering Expansion and Organization of Terrorism in Cyberspace." ScholarWorks, 2018. https://scholarworks.waldenu.edu/dissertations/6079.

Texte intégral
Résumé :
Terrorists use cyberspace and social media technology to create fear and spread violent ideologies, which pose a significant threat to public security. Researchers have documented the importance of the application of law and regulation in dealing with the criminal activities perpetrated through the aid of computers in cyberspace. Using routine activity theory, this study assessed the effectiveness of technological approaches to mitigating the expansion and organization of terrorism in cyberspace. The study aligned with the purpose area analysis objective of classifying and assessing potential
Styles APA, Harvard, Vancouver, ISO, etc.
49

Raut, Bimal Kumar. "Determining the Judicial Juristiction in the Transnational Cyberspace." Thesis, Queensland University of Technology, 2004. https://eprints.qut.edu.au/15830/1/Bimal_Raut_Thesis.pdf.

Texte intégral
Résumé :
This thesis analyses the traditional notion of jurisdiction in the light of Internet based activities which are inherently decentralised and ubiquitous. It is clear that the unique nature of the Internet has undermined the very foundation of the traditional notion of jurisdiction and the territorially based concepts of law and their application. Which court should hear disputes arising out of Internet activities? On what grounds may a court assert or decline the jurisdiction? These are perplexing questions currently facing courts worldwide because of the trans-national nature of the Inte
Styles APA, Harvard, Vancouver, ISO, etc.
50

Raut, Bimal Kumar. "Determining the Judicial Juristiction in the Transnational Cyberspace." Queensland University of Technology, 2004. http://eprints.qut.edu.au/15830/.

Texte intégral
Résumé :
This thesis analyses the traditional notion of jurisdiction in the light of Internet based activities which are inherently decentralised and ubiquitous. It is clear that the unique nature of the Internet has undermined the very foundation of the traditional notion of jurisdiction and the territorially based concepts of law and their application. Which court should hear disputes arising out of Internet activities? On what grounds may a court assert or decline the jurisdiction? These are perplexing questions currently facing courts worldwide because of the trans-national nature of the Internet
Styles APA, Harvard, Vancouver, ISO, etc.
Nous offrons des réductions sur tous les plans premium pour les auteurs dont les œuvres sont incluses dans des sélections littéraires thématiques. Contactez-nous pour obtenir un code promo unique!