Literatura científica selecionada sobre o tema "Cyberhot"

Crie uma referência precisa em APA, MLA, Chicago, Harvard, e outros estilos

Selecione um tipo de fonte:

Consulte a lista de atuais artigos, livros, teses, anais de congressos e outras fontes científicas relevantes para o tema "Cyberhot".

Ao lado de cada fonte na lista de referências, há um botão "Adicionar à bibliografia". Clique e geraremos automaticamente a citação bibliográfica do trabalho escolhido no estilo de citação de que você precisa: APA, MLA, Harvard, Chicago, Vancouver, etc.

Você também pode baixar o texto completo da publicação científica em formato .pdf e ler o resumo do trabalho online se estiver presente nos metadados.

Artigos de revistas sobre o assunto "Cyberhot":

1

Curran, Kevin, e Sheila Mc Kinney . "Cyberart". Journal of Applied Sciences 4, n.º 4 (15 de setembro de 2004): 531–36. http://dx.doi.org/10.3923/jas.2004.531.536.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
2

LEVIN, BRIAN. "Cyberhate". American Behavioral Scientist 45, n.º 6 (fevereiro de 2002): 958–88. http://dx.doi.org/10.1177/0002764202045006004.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
3

Lewis, Mike. "CYBERLOG". Health Libraries Review 5, n.º 3 (setembro de 1988): 211–14. http://dx.doi.org/10.1046/j.1365-2532.1988.5302102.x.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
4

Porett, Tom. "Cyberart Considerations". Art Journal 53, n.º 3 (1994): 32. http://dx.doi.org/10.2307/777416.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
5

Meyer, Helen. "Cybercop scanner". Computers & Security 18, n.º 3 (janeiro de 1999): 234. http://dx.doi.org/10.1016/s0167-4048(99)90941-0.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
6

Douglas, Karen M., Craig Mcgarty, Ana-Maria Bliuc e Girish Lala. "Understanding Cyberhate". Social Science Computer Review 23, n.º 1 (fevereiro de 2005): 68–76. http://dx.doi.org/10.1177/0894439304271538.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
7

Maulitz, R. C., J. A. Ohles, R. L. Schnuth, M. S. Lipsky e R. J. Grealish. "The CyberDoc project". Academic Medicine 71, n.º 12 (dezembro de 1996): 1325–8. http://dx.doi.org/10.1097/00001888-199612000-00014.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
8

Bakalis, Chara. "Rethinking cyberhate laws". Information & Communications Technology Law 27, n.º 1 (30 de outubro de 2017): 86–110. http://dx.doi.org/10.1080/13600834.2017.1393934.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
9

Celik, Serkan. "Experiences of internet users regarding cyberhate". Information Technology & People 32, n.º 6 (2 de dezembro de 2019): 1446–71. http://dx.doi.org/10.1108/itp-01-2018-0009.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
Resumo:
Purpose The purpose of this paper is to explore internet users’ experiences of cyberhate in the aspects of ethnicity, religion, sexual preference and political perspective. Design/methodology/approach Researchers employed an exploratory survey method to examine internet users’ experiences of cyberhate. The participants of the study were determined by purposive sampling methods to attain maximum variety among internet users with high-level digital literacy skills. The data were collected from 355 internet users affiliated with two universities in Turkey and the USA using a personal data form and a survey (Cyberhate Experience Survey) of which reliability and validity indexes were ensured. Findings The results indicated that participants have observed and experienced cyberhate at different levels targeting their ethnic, religious, gender-based and political identities. The findings also pointed out that gender, income and socio-political identities are significant variables on exposure to cyberhate regardless of cultural and educational boundaries. The majority of survey respondents reported that they had encountered cyberhate mostly on social media platforms. Social implications The findings of the study imply that to address the hate speech problem comprehensively, the author must enlighten people, change their way of thinking and broaden their perspectives by using measures such as intercultural dialogue, critical thinking, media literacy, education on tolerance and diversity. Originality/value This research was intended to contribute into the need to elaborate on various aspects of cyberhate, which is shared by academics, thinkers, journalists and educators. It may also serve to clarify how frequently internet users encounter hateful content and harassment online, which can have social consequences and influence young people’s trust to other people.
10

Celik, Serkan. "Tertiary-level internet users’ opinions and perceptions of cyberhate". Information Technology & People 31, n.º 3 (4 de junho de 2018): 845–68. http://dx.doi.org/10.1108/itp-05-2017-0147.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
Resumo:
PurposeThe purpose of this paper is to elaborate the opinions and perceptions of internet users regarding online hate speech, and bring cyberhate to the attention of internet users and policy stakeholders.Design/methodology/approachA sectional research design and survey method was adopted throughout the study to examine the opinions and perceptions of internet users regarding cyberhate by descriptively exploring the existing situation from various perspectives. The participants of the study were determined by purposive sampling methods to attain maximum variety among internet users who are considered as highly literate in technology use. The data were collected through a personal data form and a survey (Cyberhate Perception Scale) from 372 internet users living in Turkey and the USA.FindingsThe findings of the study revealed that the majority of participants do not perceive cyberhate as a part of freedom of speech and they believe that online hate behaviors, which they also consider to be a violation of human rights, should be deemed illegal and be punished accordingly. The findings, which were discussed in line with the existing research, indicated some significant predictors of internet users’ perceptions on cyberhate.Originality/valueAs cyberhate is an understudied area that raises concerns in terms of internet user exposure, the objective of this research is to understand tendencies about the opinions and perceptions of internet users regarding online hate speech, and bring cyberhate to the attention of internet users and policy stakeholders.

Teses / dissertações sobre o assunto "Cyberhot":

1

Olsson, Sanna, e Isabella Hultberg. "Cybersäkerhet - Att stärka den svaga länken : En flerfallsstudie om hur formella och informella styrmedel förebygger interna cyberhot i banksektorn". Thesis, Linköpings universitet, Institutionen för ekonomisk och industriell utveckling, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-176804.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
Resumo:
Bakgrund: Banker fyller en mycket viktig funktion i samhället och har sedan digitaliseringen varit särskilt utsatta för cyberhot. Samtidigt bygger bankens verksamhet till stor del på att upprätthålla förtroendet hos sina kunder, varpå det är av stor vikt för banker att ha en hög cybersäkerhet. Framför allt kan interna cyberhot i form av mänskliga misstag konstateras vara den svaga länken i bankers säkerhetsarbete idag. Därför är det intressant att undersöka hur banker i Sverige arbetar för att öka cybersäkerheten genom formella och informella styrmedel, som kan påverka anställdas beteenden.  Syfte: Studien syftar till att bidra till ökad förståelse om hur banker styr sin verksamhet med formella och informella styrmedel för att förebygga interna cyberhot på arbetsplatsen.  Metod: Studien har ett hermeneutiskt perspektiv och är utformad enligt en kvalitativ metod. Vidare har en abduktiv ansats format uppsatsen. Syfte och frågeställningar har besvarats genom en flerfallstudie av fyra olika banker i Sverige. Det empiriska materialet har inhämtats med hjälp av intervjuer med representanter från respektive bank som arbetar med säkerhet.  Slutsats: För att förebygga interna cyberhot arbetar banker med formella styrmedel främst i form av regler, där de tar hjälp av globala standarder vid utformningen. Reglerna utformas även utifrån bankens kultur och uppdateras ofta. Vi har sett att kompetens och medvetenhet inom cybersäkerhet hos anställda är något som samtliga fallföretag värderar högt, och för att stärka kompetensen lägger bankerna stora resurser på utbildning. Att göra säkerhetstänket till en naturlig del av anställdas dagliga arbete har framför allt understrukits av respondenterna, samtidigt som arbetet med kultur till stor del görs passivt då det starka regelverket formar kulturen. Informella dialoger menas dock vara något som ökar medvetenheten och därmed stärker kulturen. Slutligen har vi identifierat att samtliga styrmedel nämnda ovan påverkar varandra, varpå det är viktigt att ha ett helhetstänk vid styrningsarbetet vad gäller cybersäkerhet.
Background: Banks play an important role in society and have since the increasing digitalization been particularly exposed to cyber threats. At the same time, the bank's operations are largely based on maintaining trust of its customers, and therefore it is of great importance for banks to have a high level of cyber security. Above all, internal cyber threats in the form of human error constitute one of the greatest risks to banks' security work today. Therefore, it is interesting to investigate how banks work to mitigate internal cyber threats through formal and informal management controls.  Purpose: This study aims to contribute to an increased understanding of how banks use formal and informal management control to mitigate internal cyber threats in the workplace.  Methodology: This study adopts a hermeneutic perspective and uses qualitative method. Furthermore, an abductive approach has shaped the essay. The purpose and research questions have been answered through a multiple case study of four different banks in Sweden. The empirical material has been obtained with the help of interviews with representatives from each bank who work with security.  Conclusion: To prevent internal cyber threats, banks work with rules which global standards and the company’s culture help design. We have noted that competence and awareness in cyber security is something that is valued highly. To strengthen the competence banks invest large resources in training. Making the idea of safety a natural part of employees' daily work has above all been emphasized by, at the same time as cultural development is largely done passively as the strong regulations shape culture. Informal dialogues, however, increase awareness and thus strengthen culture. Finally, we have identified that all the management controls mentioned above affect each other. Therefore, it is important to have a holistic approach to the governance work regarding cyber security.
2

Fearn, Harriet. "The impacts of cyberhate". Thesis, University of Sussex, 2017. http://sro.sussex.ac.uk/id/eprint/66869/.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
Resumo:
The thesis explores the impacts of being exposed to hate material online, so called cyberhate, using social psychological theories of group identity as a framework to explore victimisation experiences when targeted directly or witnessing others from the same identity group being targeted, known as indirect victimisation. Three papers examine these impacts with two commonly stigmatised groups; Lesbian, Gay, Bisexual and Transgender people (LGB&T) and Muslims. Paper 1 reports the results from two online surveys about the nature of cyberhate experienced by these two groups. Results indicate it is a common and frequent problem occurring over a range of internet platforms and mediums and there are a number of negative emotional reactions and behavioural intentions similar to those reported by Intergroup Emotions Theory after group identity challenges. Paper 2 uses qualitative interviews with victims of cyberhate to gain a detailed understanding of the impacts of being victimised. Participants indicated that there is a level of resilience to being targeted as bad behaviour is expected online, but being exposed to hateful material causes many to take avoidance action, avoiding certain parts of the internet. Paper 3 presents the results of an innovative experimental study exposing members of the stigmatised groups and a control to hate material. Those viewing group specific hate material felt angrier than when just viewing generally unpleasant material. The current research finds that being targeted online has similar negative impacts to offline hate crime, both to those who are targeted directly but also those who are indirectly victimised.
3

Cheung, Kwong-chung. "Reinforced earth wall design & construction in northern access road for Cyberport Development /". View the Table of Contents & Abstract, 2005. http://sunzi.lib.hku.hk/hkuto/record/B3676288X.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
4

Cheung, Kwong-chung, e 張光中. "Reinforced earth wall design & construction in northern access road for Cyberport Development". Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2005. http://hub.hku.hk/bib/B45014279.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
5

Kabil, Alexandre. "CyberCOP 3D : visualisation 3D interactive et collaborative de l'état de sécurité d'un système informatique". Thesis, Ecole nationale supérieure Mines-Télécom Atlantique Bretagne Pays de la Loire, 2019. http://www.theses.fr/2019IMTA0166.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
Resumo:
L’objectif de la thèse était d’étudier l’utilisation d’Environnements Virtuels Collaboratifs (EVC) pour l’analyse de l’état de sécuritéde systèmes informatiques, aussi appelée la Cyber Situational Awareness (CSA). Après avoir étudié les modèles et outils de la CSA, nous avons pu visiter les Security Operations Center (SOCs) de quatre partenaires industriels de la Chaire Cyber CNI, afin de mieux cerner les besoins et attentes des cyber analystes. Ces visites ont été effectuées dans le cadre d’un protocole de l’analyse de l’activité collaborative et nous ont permises de proposer un modèle, le CyberCOP 3D. En nous basant sur notre modèle ainsi que sur une modélisation du rançongiciel WannaCry, nous avons développé un EVC pour la cybersécurité ainsi qu’un moteur de scénarisation simplifié permettant à des utilisateurs de concevoir leurs propres scénarios d’analyse d’alertes. Nous avons effectué une évaluation de l’utilisabilité d’un environnement virtuel pour l’analyse d’alertes auprès d’utilisateurs non-experts en cybersécurité
The aim of this thesis was to study the use of Collaborative Virtual Environments (CVE) for the analysis of the state of security of computer systems, also called Cyber Situational Awareness (CSA). After studying CSA’s models and tools, we have had the opportunity to visit the Security Operations Centers (SOCs) of four industrial partners of the CyberCNI chair, in order to better understand the needs and expectations of cyber analysts. These visits were made as part of a collaborative activity analysis protocol and have allowed us to propose a model, the 3D Cyber-COP. Based on this model and a model of the WannaCry ransomware, we have developed a CVE and a simplified scenario engine that allows users to design their own alert analysis scenarios. We have also performed a usability evaluation of a virtual environment for alert analysis, with a panel of novice users
6

Dul, Anna, e Johanna Velin. "How Do Leadership Behaviours Affect Employee Attitudes Towards Sustainability? A case study on IT consultancy Cybercom". Thesis, Malmö universitet, Fakulteten för kultur och samhälle (KS), 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:mau:diva-23091.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
Resumo:
While managers increasingly see the importance of corporate social responsibility, incorporating it in the business often fails (Keys et al., 2009). Organizational sustainability performance can improve if employees have positive attitudes towards sustainability (Wang et al., 2011). This thesis aims to explore how different leadership behaviours in case company Cybercom have influenced the attitudes of its employees. New analytical tools are developed for analysing the data collected through interviews with employees at Cybercom. The findings indicate several connections between the leadership behaviours studied, and the attitudinal components. One main finding was that all four leadership behaviours in Cybercom had, to a certain extent, led to the affective outcome of feeling that sustainability was more important, the cognitive outcome of learning about the business perspective of sustainability, and the behavioural outcome of communicating more or differently about sustainability. It is concluded that Cybercom has helped shape its employees’ attitudes through various factors such as employee training, leaders acting as role models and motivators, written materials and workshops.The theoretical contributions of this paper consist of new knowledge in the field of leadership shaping employee attitudes, as well as new analytical tools. The practical contributions of this paper are managerial implications for Cybercom.
7

Strauss, Juergen. "Interaktions- und Animationstechniken in virtuellen Welten". Master's thesis, Universitätsbibliothek Chemnitz, 1997. http://nbn-resolving.de/urn:nbn:de:bsz:ch1-199700063.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
Resumo:
Die vorliegende Arbeit beschreibt die Spezifikation und den Entwurf eines Systems der Virtuellen Realitaet. Das Verhalten der Objekte in diesem System basiert dabei auf ausgewählten physikalischen Gesetzmaessigkeiten. Es wurde eine kurze Analyse der am Lehrstuhl verfuegbaren Soft- und Hardware durchgefuehrt, um einen Ausgangspunkt fuer die weiteren Betrachtungen zu gewinnen. Bei Spezifikation und Entwurf des Basissystems wurde Wert auf ein strukturiertes Vorgehen, einen modularen Aufbau und eine gute Erweiterbarkeit für spaetere Arbeiten gelegt. Der praktische Teil der Arbeit realisiert die Implementation eines Experimentalsystems auf einem IBM-kompatiblen Computer unter dem Betriebssystem WindowsNT und der Entwicklungs- umgebung VisualC++ 4.0.
8

Edin, Andreas. "Autentisering med OAuth 2.0 i SiteVision : Jämförelse mellan Java Portlets och WebApps". Thesis, Mittuniversitetet, Avdelningen för informationssystem och -teknologi, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:miun:diva-33878.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
Resumo:
The aim of this project has been to explore alternative technical solutions for making own extensions in the CMS SiteVision. The purpose of these extensions is to retrieve data from an external API (Office 365) which requires OAuth 2.0 authentication. Additional, the alternative technical solutions have been evaluated and compared. The comparisons have been made based on criteria developed through interviews with professional IT-consultants. The purpose of the project has been to contribute to more efficient digitization, integration and individualization of datasystems. Within the project, an applied example (POC) has been created to show examples of how the technology can be used. In this example, Java Portlets have been used to implement the above functionality. WebApps in SiteVision have also been studied since this technology is an alternative to Java Portlets. The survey shows that it is fully possible to create a separate extension in SiteVision that performs authentication with OAuth 2.0 and then uses it to retrieve data from an external API. The results from the comparison between the two different Java Portlets and WebApps technologies show that there are pros and cons of each technique. The alternatives studied where comparable in performance. Individual circumstances can dictate which alternative is best.
Det övergripande syftet med detta projekt har varit att bidra till en effektiviserad digitalisering och individualisering. Målet för projektet har varit att undersöka alternativa tekniska lösningar för att göra egna tillägg i CMS:et SiteVision. Tillägg vars uppgift består i att hämta data från ett externt API (Office 365) som kräver autentisering med OAuth 2.0. Vidare har de alternativa tekniska lösningarna värderats och jämförts. Jämförelsen har gjorts utifrån kriterier som tagits fram genom intervjuer med utvecklare på ett IT-konsultbolag. Inom projektet har ett tillämpat exempel (POC) skapats för att visa exempel på hur tekniken kan användas. I detta exempel har Java Portlets använts för att implementera ovanstående funktionalitet. Även WebApps i SiteVision har studerats då den tekniken utgör ett alternativ till Java Portlets. Undersökningen visar att det är fullt möjligt att skapa ett eget tillägg i SiteVision som genomför autentisering med OAuth 2.0 och sedan använda denna för att hämta data från ett externt API. Resultaten från jämförelsen mellan de två olika teknikerna Java Portlets och WebApps visar att det finns för- och nackdelar med respektive teknik. Båda alternativen framstår som jämstarka i jämförelsen. De individuella omständigheterna kring ett framtida användande bör fälla avgörandet för vilken teknik som väljs.
9

Nicolas, Clémence. "Polymérisation par ouverture de cycle par métathèse de monomères antioxydants en vue de l’amélioration des propriétés de matériaux à base de polydicyclopentadiène". Thesis, Le Mans, 2019. http://cyberdoc-int.univ-lemans.fr/Theses/2019/2019LEMA1025.pdf.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
Resumo:
Le polydicyclopentadiène (PDCPD) est un matériau polymère thermodurcissable possédant des propriétés particulièrement intéressantes : il combine une très haute résistance aux chocs, une bonne résistance à la corrosion chimique et possède une température de fléchissement sous charge élevée. Ces caractéristiques permettent d’envisager son utilisation dans des conditions extrêmes comme joint de pipeline pour l’extraction du pétrole offshore. Malgré ses avantages, l’essor de son utilisation est limité par sa sensibilité à l’oxydation en raison de la présence de doubles liaisons sur son squelette. L’'ajout d’additifs qui limitent la dégradation du PDCPD en inhibant son oxydation est donc nécessaire. Cependant, les additifs classiques sont sujets à la diffusion au sein du matériau à cause de leur faible masse molaire, ce qui limite leur efficacité sur le long terme.Pour pallier ce problème, deux stratégies ont été étudiées : (1) le greffage d’additifs à propriétés antioxydantes sur le squelette du PDCPD par polymérisation par ouverture de cycle par métathèse (ROMP) du dicyclopentadiène (DCPD) avec des comonomères norbornène porteurs de groupements antioxydants ; (2) la ROMP de ces monomères pour synthétiser des additifs de masses molaires élevées moins susceptibles de subir de la diffusion au sein du matériau. Les nouveaux matériaux obtenus à partir de formulations industrielles à base de PDCPD et des monomères et polymères synthétisés ont montré une stabilité supérieure par rapport aux formulations à base d’additifs commerciaux, validant ainsi la pertinence des stratégies mises en œuvre lors de ce travail de thèse
Polydicyclopentadiene (PDCPD) is a thermoset polymer material with particularly interesting properties: it combines high impact resistance, good resistance to chemical corrosion and high heat deflection temperature. These features allow to consider its use in extreme conditions as a pipeline joint for the extraction of offshore oil. However, its use is limited by its oxidation sensibility because of the presence of double bonds in its backbone. Adding additives to PDCPD materials is needed to limit the PDCPD degradation by inhibition of oxidation. However, conventional additives undergo diffusion that decreases their long-term efficacy because of their low molar mass. To address this issue, two strategies were studied: (1) the grafting of additives with antioxidant properties within the backbone by ring-opening metathesis polymerization (ROMP) of dicyclopentadiene (DCPD) with norbornenyl antioxidant-functionalized comonomers; (2) ROMP of these monomers to prepare additives with higher molar masses, which are less likely to undergo diffusion. The original materials obtained from industrial formulations based on PDCPD and the synthesized monomers and polymers have shown a better stability than the formulations based on commercially available additives, confirming the relevance of the strategies implemented in this thesis work
10

Clavier, Batiste. "Synthèse, caractérisations et évaluation de l'activité bactéricide de composés inorganiques à base de cuivre". Thesis, Le Mans, 2019. http://cyberdoc-int.univ-lemans.fr/Theses/2019/2019LEMA1041.pdf.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
Resumo:
Les bactéries pathogènes responsables des infections associées aux soins posent des problèmes permanents et croissants dans les établissements de santé. En France, les bactéries Escherichia coli et Staphylococcus aureus sont responsables de plus de 40% de ces infections. Face à l'adaptation permanente de ces bactéries aux nouveaux antibiotiques mis sur le marché, des solutions complémentaires doivent être trouvées. Une des solutions proposée dans ce travail de thèse vise à exacerber les performances de composés bactéricides connus (effet de synergie) ou à procurer des propriétés bactéricides à des composés inactifs en substituant partiellement des ions magnésium par les ions cuivriques ou vice versa. De nouvelles solutions solides ont ainsi été découvertes. Des réactions dans l'état solide, la co-précipitation, la voie hydrothermale ou la mécanosynthèse ont été employées pour synthétiser des particules de taille micro- ou nanométrique des composés désirés. Une fois obtenues, la Diffraction des Rayons X, les Microscopies Electroniques, l'adsorption de diazote, les spectroscopies IR/UV-visible, l'Analyse ThermoGravimétrique couplée à la Spectrométrie de Masse et la Spectrométrie d'Emission Atomique ont été utilisées afin de déterminer la nature, la composition et la taille de ces particules ainsi que leur stabilité dans l'eau ou sous une atmosphère riche en CO2. L'évaluation des propriétés bactéricides dans l'eau et à 20°C révèle que la substitution partielle du magnésium par le cuivre accroît l'activité des composés à la fois en termes d'amplitude et de cinétique. Ces performances accrues ne sont pas nécessairement liées à la teneur en cuivre dans le composé actif
Bacterial pathogens causing healthcare-associated-infections pose ongoing and increasing challenges to care facilities. In France, Escherichia coli and Staphylococcus aureus are responsible for more than 40% of these infections. Due to the permanent adaptation of these bacteria to new antibiotics placed on the market, complementary solutions must be found. One of these solutions proposed in this thesis work aims to exacerbate performances of known bactericidal materials (synergistic effect) or to provide bactericidal properties to non-active compounds by partially substituting magnesium ions by cupric ones or vice versa. New solid solutions were thus highlighted. Solid state reaction, co-precipitation, hydrothermal routes or mechanosynthesis were employed to synthesize micrometer-sized or nanometer-sized particles of those desired compounds. When obtained, X-Ray Diffraction, electron microscopies, dinitrogen adsorption, IR/UV-visible spectroscopies, ThermoGravimetric Analysis-Mass Spectrometry and Atomic Emission Spectroscopy are used to determine the nature, composition and size of those particles as well as their stability in water or CO2 rich atmosphere. The evaluation of bactericidal properties in water and at 20°C showed that the partial substitution of magnesium by copper enhances the activity of compounds both in terms of magnitude and kinetics. These increased performances are not necessarily related to the copper content in the active compound

Livros sobre o assunto "Cyberhot":

1

Heickerö, Roland. Internets mörka sidor: Om cyberhot och informationskrigföring. Stockholm: Atlantis, 2012.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
2

Heickerö, Roland. Emerging cyber threats and Russian views on information warfare and information operations: Utveckling av cyberhot och den ryska synen på informationskrigföring och informationsoperationer. Stockholm: FOI, Swedish Defence Research Agency, Division of Defence Analysis, 2010.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
3

Gerson, Corinne. Cyberdog. Unionville, N.Y: Royal Fireworks Press, 1998.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
4

Feiler, Jesse. Cyberdog: The complete guide to Apple's Internet productivity technology. Boston: AP Professional, 1996.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
5

Kissell, Joe. Cyberdog: Live objects on the Internet. New York: MIS Press, 1997.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
6

Matrix, Sidney Eve. Cyberpop: Digital lifestyles and commodity culture. New York, NY: Routledge, 2007.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
7

Kisseleva, Olga. Cyberart: Un essai sur l'art du dialogue. Paris: Harmattan, 1998.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
8

Boyle, Sean 1977. Perfect horizon: Finiens perfectus 215X : HDL cyberpop setting. Rochester, NY: Tremorworks, LLC, 2006.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
9

Robin, Régine. Le Golem de l'ecriture: De l'autofiction au cybersoi. Montréal, Québec: XYZ éditeur, 1997.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
10

Vanacker, Bastiaan. Global medium, local laws: Regulating cross-border cyberhate. El Paso: LFB Scholarly Pub., 2009.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.

Capítulos de livros sobre o assunto "Cyberhot":

1

Jane, Emma A., e Nicole A. Vincent. "Cyberhate, Communication and Transdisciplinarity". In Reimagining Communication: Meaning, 170–96. First edition. | Abingdon, Oxon ; New York, NY : Routledge, 2020.: Routledge, 2020. http://dx.doi.org/10.4324/9781351007924-10.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
2

Shi, Shumin, Xinyu Zhou, Meng Zhao e Heyan Huang. "Identifying Suspected Cybermob on Tieba". In Lecture Notes in Computer Science, 375–86. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-47674-2_31.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
3

Prokopenko, Mikhail, Peter Wang e Thomas Howard. "Cyberoos’2001: “Deep Behaviour Projection” Agent Architecture". In RoboCup 2001: Robot Soccer World Cup V, 507–10. Berlin, Heidelberg: Springer Berlin Heidelberg, 2002. http://dx.doi.org/10.1007/3-540-45603-1_70.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
4

Jane, Emma A. "Feminist flight and fight responses to gendered cyberhate". In Gender, Technology and Violence, 45–61. 1 Edition. | New York : Routledge, 2017. | Series: Routledge studies in crime and society ; 31: Routledge, 2017. http://dx.doi.org/10.4324/9781315441160-4.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
5

Prokopenko, Mikhail, Marc Butler, Wai Yat Wong e Thomas Howard. "Cyberoos’99: Tactical Agents in the RoboCup Simulation League". In RoboCup-99: Robot Soccer World Cup III, 546–49. Berlin, Heidelberg: Springer Berlin Heidelberg, 2000. http://dx.doi.org/10.1007/3-540-45327-x_47.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
6

Vassanelli, Stefano, Florian Felderer, Mufti Mahmud, Marta Maschietto e Stefano Girardi. "CyberRat Probes: High-Resolution Biohybrid Devices for Probing the Brain". In Biomimetic and Biohybrid Systems, 274–85. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-31525-1_24.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
7

Kabil, Alexandre, Thierry Duval, Nora Cuppens, Gérard Le Comte, Yoran Halgand e Christophe Ponchel. "3D CyberCOP: A Collaborative Platform for Cybersecurity Data Analysis and Training". In Lecture Notes in Computer Science, 176–83. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-00560-3_24.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
8

Prokopenko, Mikhail, e Peter Wang. "Disruptive Innovations in RoboCup 2D Soccer Simulation League: From Cyberoos’98 to Gliders2016". In RoboCup 2016: Robot World Cup XX, 529–41. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-68792-6_44.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
9

Kabil, Alexandre, Thierry Duval, Nora Cuppens, Gérard Le Comte, Yoran Halgand e Christophe Ponchel. "From Cyber Security Activities to Collaborative Virtual Environments Practices Through the 3D CyberCOP Platform". In Information Systems Security, 272–87. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-05171-6_14.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
10

Jane, Emma. "Gendered cyberhate". In Theorizing Digital Divides, 186–98. Routledge, 2017. http://dx.doi.org/10.4324/9781315455334-15.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.

Trabalhos de conferências sobre o assunto "Cyberhot":

1

Omidosu, Joseph, e Michael Kyobe. "Towards a harm-based framework to evaluate Cyberhate". In 2021 Conference on Information Communications Technology and Society (ICTAS). IEEE, 2021. http://dx.doi.org/10.1109/ictas50802.2021.9395008.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
2

Kim, Jae H., Fu-Chung Wang, Carlo H. Séquin e Paul K. Wright. "Design for Machining Over the Internet". In ASME 1999 Design Engineering Technical Conferences. American Society of Mechanical Engineers, 1999. http://dx.doi.org/10.1115/detc99/dfm-8938.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
Resumo:
Abstract Inspired by MOSIS, the CyberCut project has been developing a manufacturing service for mechanical parts over the Internet. Among the various services provided by CyberCut, this paper will focus on the front end of the design process, in particular on the on-line CAD tool that the designers will be working with when defining the final geometry of a part to be fabricated with 3-axis milling. To date we have constructed two prototype versions of a design interface for CyberCut, called WebCAD, and tested them on audiences consisting mostly of students at Berkeley and at some sister institutions with research groups working on similar problems in design for machining. We learned that it is surprisingly difficult to create such a front end that will lead the designer to manufacturable design on 3-axis milling machine. We will discuss the results of these initial trials, and the insights gained from them, which then led to the specifications for WebCAD 1.5 which is currently nearing completion. We will discuss the simple and consistent view of the milling process that needs to be presented to the users of WebCAD, some of the key paradigms in the user interface, and the extra utilities that we had to incorporate into the WebCAD tool for users who have had no previous exposure to machining.
3

Sun, Jianhua, Kun Sun e Qi Li. "CyberMoat: Camouflaging critical server infrastructures with large scale decoy farms". In 2017 IEEE Conference on Communications and Network Security (CNS). IEEE, 2017. http://dx.doi.org/10.1109/cns.2017.8228642.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
4

Gil, Debora, Aura Hernandez-Sabate, David Castells-Rufas e Jordi Carrabina. "CYBERH: Cyber-Physical Systems in Health for Personalized Assistance". In 2017 19th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing (SYNASC). IEEE, 2017. http://dx.doi.org/10.1109/synasc.2017.00067.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
5

Teles, Lucio. "Re-engineering adult education through students' production of cyberart to support curriculum learning". In 2014 9th International Conference on Computer Science & Education (ICCSE). IEEE, 2014. http://dx.doi.org/10.1109/iccse.2014.6926463.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
6

Wrona, Maciej, Mariusz Kastek, Marcin Szolucha, Jaroslaw Bareła e Krzysztof Firmanty. "CYBERDOG: monitoring and control system for law enforcement forces K-9 special activities". In Counterterrorism, Crime Fighting, Forensics, and Surveillance Technologies, editado por Henri Bouma, Robert J. Stokes, Yitzhak Yitzhaky e Radhakrishna Prabhu. SPIE, 2018. http://dx.doi.org/10.1117/12.2325581.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
7

Fox, J. F., e A. N. Papanicolaou. "Carbon and Nitrogen Isotopes and C / N Ratio as a Fingerprinting tracer within Eco-Cybernet". In Watershed Management Conference 2005. Reston, VA: American Society of Civil Engineers, 2005. http://dx.doi.org/10.1061/40763(178)17.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
8

Inouye, Ryan, e Paul K. Wright. "Design Rules and Technology Guides for Web-Based Manufacturing". In ASME 1999 Design Engineering Technical Conferences. American Society of Mechanical Engineers, 1999. http://dx.doi.org/10.1115/detc99/cie-9082.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
Resumo:
Abstract The paper establishes a set of machining rules for web-based manufacturing and discusses the guidelines for their classification and implementation. Rule checking is split into three levels, the Design Interface. Process Planning, and Machine Tool levels. Rules are placed in these different levels according the resources available and the inherent constraints of each level while maintaining their principle functionality. The implementation of rule checking on the CyberCut 3-D interface, a web-based manufacturing tool for machining, is discussed. The current implementation checks for the four most common conflicts between mechanical designers and manufacturing engineers.
9

Kong, Daniel K. S., Andrew W. C. Kwong e Hugo H. N. Wong. "Use of Glass Reinforced Concrete in the Construction of Bel-Air No. 8, Cyberport, Hong Kong". In 7th International Conference on Tall Buildings. Singapore: Research Publishing Services, 2009. http://dx.doi.org/10.3850/9789628014194_0037.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
10

Subba, Rajib, e Tung Bui. "Self-Coordinated Defense Mechanisms against Cyberhate: An Analysis of Postings Related to the 2010 Haiti Earthquake on Facebook". In 2012 45th Hawaii International Conference on System Sciences (HICSS). IEEE, 2012. http://dx.doi.org/10.1109/hicss.2012.521.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.

Vá para a bibliografia