Siga este link para ver outros tipos de publicações sobre o tema: Cyberhot.

Artigos de revistas sobre o tema "Cyberhot"

Crie uma referência precisa em APA, MLA, Chicago, Harvard, e outros estilos

Selecione um tipo de fonte:

Veja os 50 melhores artigos de revistas para estudos sobre o assunto "Cyberhot".

Ao lado de cada fonte na lista de referências, há um botão "Adicionar à bibliografia". Clique e geraremos automaticamente a citação bibliográfica do trabalho escolhido no estilo de citação de que você precisa: APA, MLA, Harvard, Chicago, Vancouver, etc.

Você também pode baixar o texto completo da publicação científica em formato .pdf e ler o resumo do trabalho online se estiver presente nos metadados.

Veja os artigos de revistas das mais diversas áreas científicas e compile uma bibliografia correta.

1

Curran, Kevin, and Sheila Mc Kinney . "Cyberart." Journal of Applied Sciences 4, no. 4 (2004): 531–36. http://dx.doi.org/10.3923/jas.2004.531.536.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
2

LEVIN, BRIAN. "Cyberhate." American Behavioral Scientist 45, no. 6 (2002): 958–88. http://dx.doi.org/10.1177/0002764202045006004.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
3

Lewis, Mike. "CYBERLOG." Health Libraries Review 5, no. 3 (1988): 211–14. http://dx.doi.org/10.1046/j.1365-2532.1988.5302102.x.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
4

Wachs, Sebastian, Juan Manuel Machimbarrena, Michelle F. Wright, et al. "Associations between Coping Strategies and Cyberhate Involvement: Evidence from Adolescents across Three World Regions." International Journal of Environmental Research and Public Health 19, no. 11 (2022): 6749. http://dx.doi.org/10.3390/ijerph19116749.

Texto completo da fonte
Resumo:
Cyberhate represents a risk to adolescents’ development and peaceful coexistence in democratic societies. Yet, not much is known about the relationship between adolescents’ ability to cope with cyberhate and their cyberhate involvement. To fill current gaps in the literature and inform the development of media education programs, the present study investigated various coping strategies in a hypothetical cyberhate scenario as correlates for being cyberhate victims, perpetrators, and both victim–perpetrators. The sample consisted of 6829 adolescents aged 12–18 years old (Mage = 14.93, SD = 1.64;
Estilos ABNT, Harvard, Vancouver, APA, etc.
5

Korol, Liliia, and Catherine Blaya. "THE PHENOMENON OF CYBERHATE: ANALYSIS OF CONCEPTUAL APPROACHES AND EMPIRICAL FINDINGS OF YOUTH’S CYBERHATE EXPERIENCES IN FRANCE." Scientific Notes of Ostroh Academy National University: Psychology Series 1, no. 17 (2024): 82–89. http://dx.doi.org/10.25264/2415-7384-2024-17-82-89.

Texto completo da fonte
Resumo:
The article presents an analysis of the content and essence of the phenomenon of cyberhate as well as the synthesis of the conceptual approaches and empirical findings of youth’s cyberhate experiences in France. Specifically, we explore recent developments and conclusions of research on cyberhate and the involvement of young people as exposed, victims, or perpetrators in France to determine the current state of knowledge. We focus on the prevalence of online hate experiences among adolescents, including cyberhate exposure, victimization, and perpetration. Moreover, we analyze whether the youth
Estilos ABNT, Harvard, Vancouver, APA, etc.
6

Almaliki, Malik, Abdulqader M. Almars, Khulood O. Aljuhani, and El-Sayed Atlam. "Combining the Strengths of LLMs and Persuasive Technology to Combat Cyberhate." Computers 14, no. 5 (2025): 173. https://doi.org/10.3390/computers14050173.

Texto completo da fonte
Resumo:
Cyberhate presents a multifaceted, context-sensitive challenge that existing detection methods often struggle to tackle effectively. Large language models (LLMs) exhibit considerable potential for improving cyberhate detection due to their advanced contextual understanding. However, detection alone is insufficient; it is crucial for software to also promote healthier user behaviors and empower individuals to actively confront the spread of cyberhate. This study investigates whether integrating large language models (LLMs) with persuasive technology (PT) can effectively detect cyberhate and enc
Estilos ABNT, Harvard, Vancouver, APA, etc.
7

Porett, Tom. "Cyberart Considerations." Art Journal 53, no. 3 (1994): 32. http://dx.doi.org/10.2307/777416.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
8

Douglas, Karen M., Craig Mcgarty, Ana-Maria Bliuc, and Girish Lala. "Understanding Cyberhate." Social Science Computer Review 23, no. 1 (2005): 68–76. http://dx.doi.org/10.1177/0894439304271538.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
9

Meyer, Helen. "Cybercop scanner." Computers & Security 18, no. 3 (1999): 234. http://dx.doi.org/10.1016/s0167-4048(99)90941-0.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
10

Mróz, Justyna, and Kinga Kaleta. "Internet Addiction as a Moderator of the Relationship between Cyberhate Severity and Decisional Forgiveness." International Journal of Environmental Research and Public Health 19, no. 10 (2022): 5844. http://dx.doi.org/10.3390/ijerph19105844.

Texto completo da fonte
Resumo:
(1) Background: Cyberhate is becoming increasingly prevalent, just as Internet addiction. One way to deal with hate speech may be to make a decision to forgive the offence. However, addiction to the Internet, due to cognitive changes caused, can play a role in the making of this decision. (2) Methods: A total of N = 246 participants completed the Online Cognitive Scale (OCS), Decision to Forgive Scale (DTFS), and a single-item scale to assess cyberhate severity. In our cross-sectional study, we tested the moderating role of Internet addiction in the relationship between the severity of cyberha
Estilos ABNT, Harvard, Vancouver, APA, etc.
11

Celik, Serkan. "Experiences of internet users regarding cyberhate." Information Technology & People 32, no. 6 (2019): 1446–71. http://dx.doi.org/10.1108/itp-01-2018-0009.

Texto completo da fonte
Resumo:
Purpose The purpose of this paper is to explore internet users’ experiences of cyberhate in the aspects of ethnicity, religion, sexual preference and political perspective. Design/methodology/approach Researchers employed an exploratory survey method to examine internet users’ experiences of cyberhate. The participants of the study were determined by purposive sampling methods to attain maximum variety among internet users with high-level digital literacy skills. The data were collected from 355 internet users affiliated with two universities in Turkey and the USA using a personal data form an
Estilos ABNT, Harvard, Vancouver, APA, etc.
12

Celik, Serkan. "Tertiary-level internet users’ opinions and perceptions of cyberhate." Information Technology & People 31, no. 3 (2018): 845–68. http://dx.doi.org/10.1108/itp-05-2017-0147.

Texto completo da fonte
Resumo:
PurposeThe purpose of this paper is to elaborate the opinions and perceptions of internet users regarding online hate speech, and bring cyberhate to the attention of internet users and policy stakeholders.Design/methodology/approachA sectional research design and survey method was adopted throughout the study to examine the opinions and perceptions of internet users regarding cyberhate by descriptively exploring the existing situation from various perspectives. The participants of the study were determined by purposive sampling methods to attain maximum variety among internet users who are con
Estilos ABNT, Harvard, Vancouver, APA, etc.
13

Maulitz, R. C., J. A. Ohles, R. L. Schnuth, M. S. Lipsky, and R. J. Grealish. "The CyberDoc project." Academic Medicine 71, no. 12 (1996): 1325–8. http://dx.doi.org/10.1097/00001888-199612000-00014.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
14

Bakalis, Chara. "Rethinking cyberhate laws." Information & Communications Technology Law 27, no. 1 (2017): 86–110. http://dx.doi.org/10.1080/13600834.2017.1393934.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
15

Mung'ale Wafula, Samuel, Peterson Mwai Kariuki, and Cyprian Ondieki Omari. "Social Media Users Cyberhate Reporting Intentions: Does Users’ Perceptions of Police Effectiveness Matter?" Journal of Information Security and Cybercrimes Research 6, no. 2 (2023): 130–38. http://dx.doi.org/10.26735/nqqq8332.

Texto completo da fonte
Resumo:
In Kenya, social media platforms are the primary medium for cyberhate, and it predominantly affects university students who have extensive social media usage. Although cyberhate is considered as a criminal offence in Kenya, victims, particularly young people, often do not report victimisation to the police. Despite the well-documented harmful effects of cyberhate, the cause behind its underreporting remains unclear. Studies have established the influential role of attitudes, particularly views of police effectiveness, in shaping the choice to report crimes. However, insufficient focus has been
Estilos ABNT, Harvard, Vancouver, APA, etc.
16

Atanasov, Mykola. "THE ROLE OF CYBERHATE AS A COMPONENT OF CYBERBULLYING IN THE SYSTEM OF STAFF DEVELOPMENT IN PUBLIC SERVICE." Public Administration and Regional Development, no. 28 (June 30, 2025): 606–27. https://doi.org/10.34132/pard2025.28.14.

Texto completo da fonte
Resumo:
The article attempts to define the role of cyberhate as a component of cyberbullying. The introductory part emphasizes that the issue of cyberhate is a complex combination of misused, mediated and unregulated freedom of speech. Currently, debates continue in the world about its universal conceptualization. Meanwhile, cyberhate is defined as all forms of expression, mediated by information and communication technologies, inciting, justifying or promoting hatred or violence against individuals or groups based on their gender, race, ethnicity, religion, sexual orientation or other collective char
Estilos ABNT, Harvard, Vancouver, APA, etc.
17

Ameri, Kimia, Michael Hempel, Hamid Sharif, Juan Lopez Jr., and Kalyan Perumalla. "CyBERT: Cybersecurity Claim Classification by Fine-Tuning the BERT Language Model." Journal of Cybersecurity and Privacy 1, no. 4 (2021): 615–37. http://dx.doi.org/10.3390/jcp1040031.

Texto completo da fonte
Resumo:
We introduce CyBERT, a cybersecurity feature claims classifier based on bidirectional encoder representations from transformers and a key component in our semi-automated cybersecurity vetting for industrial control systems (ICS). To train CyBERT, we created a corpus of labeled sequences from ICS device documentation collected across a wide range of vendors and devices. This corpus provides the foundation for fine-tuning BERT’s language model, including a prediction-guided relabeling process. We propose an approach to obtain optimal hyperparameters, including the learning rate, the number of de
Estilos ABNT, Harvard, Vancouver, APA, etc.
18

Ahn, Sung H., V. Sundararajan, Charles Smith, et al. "CyberCut: An Internet-based CAD/CAM System." Journal of Computing and Information Science in Engineering 1, no. 1 (2001): 52–59. http://dx.doi.org/10.1115/1.1351811.

Texto completo da fonte
Resumo:
“CyberCut™” is a testbed for an Internet-based CAD/CAM system. It was specifically designed to be a networked, automated system, with a seamless communication flow from a client-side designer to a server-side machining service. The creation of CyberCut required several new software modules. These include: a) a Web-based design tool in which Design-for-Manufacturing information and machining rules constrain the designer to manufacturable parts; b) a geometric representation called SIF-DSG, for unambiguous communication between the client-side designer and the server-side process planner; c) an
Estilos ABNT, Harvard, Vancouver, APA, etc.
19

Viires, Piret. "Literature in Cyberspace." Folklore: Electronic Journal of Folklore 29 (2005): 153–74. http://dx.doi.org/10.7592/fejf2005.29.cyberlit.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
20

Meyer, Helen. "Cybercop takes on network snoops." Computers & Security 15, no. 8 (1996): 685. http://dx.doi.org/10.1016/s0167-4048(97)89701-5.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
21

Perry, Barbara, and Patrik Olsson. "Cyberhate: the globalization of hate." Information & Communications Technology Law 18, no. 2 (2009): 185–99. http://dx.doi.org/10.1080/13600830902814984.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
22

Costello, Matthew, James Hawdon, Ashley V. Reichelmann, et al. "Defending Others Online: The Influence of Observing Formal and Informal Social Control on One’s Willingness to Defend Cyberhate Victims." International Journal of Environmental Research and Public Health 20, no. 15 (2023): 6506. http://dx.doi.org/10.3390/ijerph20156506.

Texto completo da fonte
Resumo:
This paper examines factors correlated with online self-help—an informal form of social control vis-à-vis intervention—upon witnessing a cyberhate attack. Using online surveys from 18- to 26-year-old respondents in the United States, we explore the roles of various types of online and offline formal and informal social control mechanisms on the enactment of self-help through the use of descriptive statistics and ordinal logistic regression. The results of the multivariate analyses indicate that online collective efficacy is positively related to self-help, as is having close ties to individual
Estilos ABNT, Harvard, Vancouver, APA, etc.
23

Belykh, Vladimir S., and Vladislav O. Puchkov. "The Cybertort Concept in the Anglo-American Law." Jurist 10 (October 1, 2020): 2–11. http://dx.doi.org/10.18572/1812-3929-2020-10-2-11.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
24

Nanduri, Ashok Kumar, G. L. Sravanthi, K. V. K. V. L. Pavan Kumar, Sadhu Ratna Babu, and K. V. S. S. Rama Krishna. "Modified Fuzzy Approach to Automatic Classification of Cyber Hate Speech from the Online Social Networks (OSN’s)." Revue d'Intelligence Artificielle 35, no. 2 (2021): 139–44. http://dx.doi.org/10.18280/ria.350205.

Texto completo da fonte
Resumo:
The extensive use of online media and sharing of data has given considerable benefits to humankind. Sentimental analysis has become the most dynamic and famous application area in current days, which is mainly used in knowing the public's opinion. Most algorithms of machine learning are used as principle methods for sentimental analysis. Even though several methods are available for classification and reviews, all of them belong to a single class of classification which differs among several different classes. No methods are available for the classifying of multi-class instances. Therefore, fu
Estilos ABNT, Harvard, Vancouver, APA, etc.
25

Brown, Alexander. "What is so special about online (as compared to offline) hate speech?" Ethnicities 18, no. 3 (2017): 297–326. http://dx.doi.org/10.1177/1468796817709846.

Texto completo da fonte
Resumo:
There is a growing body of literature on whether or not online hate speech, or cyberhate, might be special compared to offline hate speech. This article aims to both critique and augment that literature by emphasising a distinctive feature of the Internet and of cyberhate that, unlike other features, such as ease of access, size of audience, and anonymity, is often overlooked: namely, instantaneousness. This article also asks whether there is anything special about online (as compared to offline) hate speech that might warrant governments and intergovernmental organisations contracting out, so
Estilos ABNT, Harvard, Vancouver, APA, etc.
26

Domingues, Diana. "Cyberart and interfaces: the coupled body." Digital Creativity 15, no. 3 (2004): 159–74. http://dx.doi.org/10.1080/14626260408520177.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
27

Jane, Emma A. "Feminist Digilante Responses to a Slut-Shaming on Facebook." Social Media + Society 3, no. 2 (2017): 205630511770599. http://dx.doi.org/10.1177/2056305117705996.

Texto completo da fonte
Resumo:
This article examines feminist digilantism in response to the “slut-shaming” of an Australian woman on Facebook in 2015. The activism is used to highlight the nature and significance of the feminist pushback against the worsening problem of cyber violence against women and girls (cyber VAWG). This article builds on my previous research into feminist digilantism and is part of a much larger, mixed-methods, multi-modal study into gendered cyberhate. It uses approaches from Internet historiography, ethnography, and netnography, alongside data drawn from qualitative interviews. Sufficient evidence
Estilos ABNT, Harvard, Vancouver, APA, etc.
28

Rapoport, Sonya. "Color in the Shadows: Bay Area Cyberart." Leonardo 28, no. 1 (1995): 77. http://dx.doi.org/10.2307/1576170.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
29

Yékú, James. "Akposdoncome again:†Nigerian cyberpop hero as trickster." Journal of African Cultural Studies 28, no. 3 (2015): 245–61. http://dx.doi.org/10.1080/13696815.2015.1069735.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
30

Bishop, Charles. "Cyberlog: The Journal of Applied Medical Software." Serials Review 12, no. 1 (1986): 5. http://dx.doi.org/10.1080/00987913.1986.10763662.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
31

A. MOONEY J. G. BLIGH, G. "CyberIST :a virtual game for medical education." Medical Teacher 20, no. 3 (1998): 212–16. http://dx.doi.org/10.1080/01421599880940.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
32

Kubota, Toru. "Clinical Evaluation of the Cyberhoby Computer System." Journal of Japan Gnathology 8, no. 3-4 (1987): 27–32. http://dx.doi.org/10.14399/jacd1982.8.3-4_27.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
33

Bishop, Charles. "Cyberlog: The Journal of Applied Medical Software." Serials Review 12, no. 1 (1986): 5. http://dx.doi.org/10.1016/0098-7913(86)90003-1.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
34

Wachs, Sebastian, Manuel Gámez-Guadix, Michelle F. Wright, Anke Görzig, and Wilfried Schubarth. "How do adolescents cope with cyberhate? Psychometric properties and socio-demographic differences of a coping with cyberhate scale." Computers in Human Behavior 104 (March 2020): 106167. http://dx.doi.org/10.1016/j.chb.2019.106167.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
35

Iwanicka, Agnieszka, and Natalia Walter. "The Exposure of Polish Adolescents to Risky Online Content. Results of a European Longitudinal Study." New Educational Review Special, no. 5 (2024): 9–20. https://doi.org/10.15804/tner.2024.si.5.01.

Texto completo da fonte
Resumo:
One aspect of children and adolescents being in a digital space involves exposure to potentially dangerous behaviours. This paper contributes to the discussion on the exposure to such behaviours of Polish adolescents aged 12–19 in comparison to their peers in 5 other European countries. Based on the collected data (quantitative longitudinal study, using a questionnaire, conducted for ySkills project, Horizon 2020, data collected from three waves in Poland: N1 =1935; N2 =1216; N3 =687), it has been found as follows: 1) Polish adolescents are at high risk of exposure to cyberhate, harmful conten
Estilos ABNT, Harvard, Vancouver, APA, etc.
36

Jane, Emma A. "Systemic misogyny exposed: Translating Rapeglish from the Manosphere with a Random Rape Threat Generator." International Journal of Cultural Studies 21, no. 6 (2017): 661–80. http://dx.doi.org/10.1177/1367877917734042.

Texto completo da fonte
Resumo:
Misogyny online in forms such as explicit rape threats has become so prevalent and rhetorically distinctive it resembles a new dialect or language. Much of this ‘Rapeglish’ is produced by members of an informal alliance of men’s groups online dubbed the ‘Manosphere’. As both a cyberhate researcher and cyberhate target, I have studied as well as contributed to feminist responses to Rapeglish. In 2016, for instance, I helped build a Random Rape Threat Generator (RRTG) – a computer program that splices, shuffles around, and re-stitches in novel combinations fragments of real-life Rapeglish to ill
Estilos ABNT, Harvard, Vancouver, APA, etc.
37

Costello, Matthew, Long Cheng, Feng Luo, et al. "COVID-19: A Pandemic of Anti-Asian Cyberhate." Journal of Hate Studies 17, no. 1 (2021): 108. http://dx.doi.org/10.33972/jhs.198.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
38

Stanley, Ruth. "Software Review: CYBERLOG. Perspectives in Rational Management: Hypertension." DICP 24, no. 9 (1990): 896. http://dx.doi.org/10.1177/106002809002400938.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
39

Bowman, Joseph. "Cyberhood Connections: Educational Webmasters and Designing Hypermedia Environments." Journal of Educational Technology Systems 25, no. 2 (1996): 117–25. http://dx.doi.org/10.2190/36d4-rrgc-r5wd-3cl9.

Texto completo da fonte
Resumo:
As access to the Internet grows, educators are defining how to use its resources for classroom instruction, alternative education models, and as an instructional tool that supports student learning and achievement. The Center for Urban Youth and Technology (CUYT) has developed a design model that introduces educators, teachers, and students to hypermedia and the Internet. The basis for the CyberHood initiative is a concern about the economic and educational conditions in urban cities and a belief in the potential of technology to support and improve the same. Working collaboratively with an In
Estilos ABNT, Harvard, Vancouver, APA, etc.
40

Jane, Emma A. "Gendered cyberhate as workplace harassment and economic vandalism." Feminist Media Studies 18, no. 4 (2018): 575–91. http://dx.doi.org/10.1080/14680777.2018.1447344.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
41

UNGUREANU, Dan-Marian, and Alexandru-Lucian CUCINSCHI. "CyberNSOF – A CRUCIAL FORCE MULTIPLIER IN MODERN WARFARE." INTERNATIONAL SCIENTIFIC CONFERINCE "STRATEGIESXXI" 18, no. 1 (2022): 366–73. http://dx.doi.org/10.53477/2971-8813-22-44.

Texto completo da fonte
Resumo:
Cyber security and special operations (CyberSOF) in the 21st century are constantly evolving and changing to meet today's threats. CyberSOF are constantly evolving as allied countries, strategic partners and key players in the Black Sea discover new tactics to achieve strategic objectives. So far, the one that has remained below the threshold of armed conflict by operating in the grey zone is the Russian Federation. The annexation of Crimea by the Russian Federation is the first strong indicator that CyberSOF binomial operations have been executed. The Romanian Naval Special Operations Forces
Estilos ABNT, Harvard, Vancouver, APA, etc.
42

Walsh, Crosbie. "Political blogs on Fiji: A ‘cybernet democracy’ case study." Pacific Journalism Review : Te Koakoa 16, no. 1 (2010): 154–77. http://dx.doi.org/10.24135/pjr.v16i1.1015.

Texto completo da fonte
Resumo:
Political blogging in politically unstable and repressive countries has been seen as a form of cybernet democracy. This research article examines this claim in post-coup Fiji in the wake of the 2006 military takeover, details the author’s experiences with blogging, comments on the Fiji blogosphere in a climate of conflict, and attempts an analysis of the overall pro and anti-government blog landscape that involves more than 70 political blogs. Unlike earlier published research on Fiji blogs, it is an ‘insider’ view, written by an academic who is also a blog publisher—publishing Fiji As It Was,
Estilos ABNT, Harvard, Vancouver, APA, etc.
43

Inozemtsev, Maxim, and Semen Stepanov. "The Concept of Cybertort and Liability in International Law." International Trends / Mezhdunarodnye protsessy 21, no. 3 (2024): 69–85. http://dx.doi.org/10.17994/2023.21.3.74.2.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
44

Blaya, Catherine. "Cyberhate: A review and content analysis of intervention strategies." Aggression and Violent Behavior 45 (March 2019): 163–72. http://dx.doi.org/10.1016/j.avb.2018.05.006.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
45

Pilloy, W. J. "CyberPET: a PET service distributed over a wide area." Nuclear Medicine Communications 23, no. 12 (2002): 1232–33. http://dx.doi.org/10.1097/00006231-200212000-00038.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
46

Polat, Nil. "The protective role of mindfulness in the cyberhate experience." JOURNAL OF AWARENESS 9, Special Issue/Özel Sayı (2024): 51–59. http://dx.doi.org/10.26809/joa.2251.

Texto completo da fonte
Resumo:
In today's world, widespread and uncontrolled access to social media channels, along with the possibility for individuals to hide their identities or use pseudonyms, can turn the internet, especially the social media environment, into a tool for violence for women due to many potential situations. The purpose of this article is to inform about a study conducted with the participation of ten women actively involved in the Kars/Sarıkamış cooperative, focusing on the impact of mindfulness method on coping with the various short and long-term negative effects of cyberviolence on women. The researc
Estilos ABNT, Harvard, Vancouver, APA, etc.
47

Ahn, S. H., S. McMains, C. H. Séquin, and P. K. Wright. "Mechanical implementation services for rapid prototyping." Proceedings of the Institution of Mechanical Engineers, Part B: Journal of Engineering Manufacture 216, no. 8 (2002): 1193–99. http://dx.doi.org/10.1243/095440502760272467.

Texto completo da fonte
Resumo:
Inspired by the metal oxide system implementation service (MOSIS) project, CyberCut is an experimental fabrication testbed for an Internet-accessible, computerized prototyping and machining service. Client-designers can create mechanical components, generally using our web-based computer aided design (CAD) system (available at http://cad.berkeley.edu ), and submit appropriate files to the server at Berkeley for process planning. CyberCut then utilizes an open-architecture, computer numerical control (CNC) machine tool for fabrication. Rapid tool path planning, novel fixturing techniques and se
Estilos ABNT, Harvard, Vancouver, APA, etc.
48

Aprila, Dzikri, Rizky Mutaqien, Muhamad Rizal Nurul Hadi, Fathi Ridwan Alamsyah, and Ade Iskandar Zulkarnaen. "Peningkatan dan Pelatihan Literasi Media Digital Anti Hoax, Bullying, dan Ujaran Kebencian di Rumah Tahfidz Quran Abulyatama." Jurnal Pengabdian Literasi Digital Indonesia 1, no. 1 (2022): 1–7. http://dx.doi.org/10.57119/abdimas.v1i1.1.

Texto completo da fonte
Resumo:
The development of information and communication technology today has changed the way humans interact with each other. Social media is one of the media that allows humans to interact without being limited by space and time. The most dominant social media users are teenagers. With the rise of social media users for teenagers and even minors, it can certainly have a bad impact, if not used wisely. This is because most teenagers still have an unstable nature and cannot distinguish between real-world communication and the virtual world. The bad impact of using social media can be in the form of so
Estilos ABNT, Harvard, Vancouver, APA, etc.
49

Domínguez-Dorado, Manuel, Francisco J. Rodríguez-Pérez, Javier Carmona-Murillo, David Cortés-Polo, and Jesús Calle-Cancho. "Boosting Holistic Cybersecurity Awareness with Outsourced Wide-Scope CyberSOC: A Generalization from a Spanish Public Organization Study." Information 14, no. 11 (2023): 586. http://dx.doi.org/10.3390/info14110586.

Texto completo da fonte
Resumo:
Public sector organizations are facing an escalating challenge with the increasing volume and complexity of cyberattacks, which disrupt essential public services and jeopardize citizen data and privacy. Effective cybersecurity management has become an urgent necessity. To combat these threats comprehensively, the active involvement of all functional areas is crucial, necessitating a heightened holistic cybersecurity awareness among tactical and operational teams responsible for implementing security measures. Public entities face various challenges in maintaining this awareness, including diff
Estilos ABNT, Harvard, Vancouver, APA, etc.
50

Saraiva, Mario, and Nuno Mateus-Coelho. "CyberSoc Framework a Systematic Review of the State-of-Art." Procedia Computer Science 204 (2022): 961–72. http://dx.doi.org/10.1016/j.procs.2022.08.117.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
Oferecemos descontos em todos os planos premium para autores cujas obras estão incluídas em seleções literárias temáticas. Contate-nos para obter um código promocional único!