Artigos de revistas sobre o tema "Cyberhot"
Crie uma referência precisa em APA, MLA, Chicago, Harvard, e outros estilos
Veja os 50 melhores artigos de revistas para estudos sobre o assunto "Cyberhot".
Ao lado de cada fonte na lista de referências, há um botão "Adicionar à bibliografia". Clique e geraremos automaticamente a citação bibliográfica do trabalho escolhido no estilo de citação de que você precisa: APA, MLA, Harvard, Chicago, Vancouver, etc.
Você também pode baixar o texto completo da publicação científica em formato .pdf e ler o resumo do trabalho online se estiver presente nos metadados.
Veja os artigos de revistas das mais diversas áreas científicas e compile uma bibliografia correta.
Curran, Kevin, and Sheila Mc Kinney . "Cyberart." Journal of Applied Sciences 4, no. 4 (2004): 531–36. http://dx.doi.org/10.3923/jas.2004.531.536.
Texto completo da fonteLEVIN, BRIAN. "Cyberhate." American Behavioral Scientist 45, no. 6 (2002): 958–88. http://dx.doi.org/10.1177/0002764202045006004.
Texto completo da fonteLewis, Mike. "CYBERLOG." Health Libraries Review 5, no. 3 (1988): 211–14. http://dx.doi.org/10.1046/j.1365-2532.1988.5302102.x.
Texto completo da fonteWachs, Sebastian, Juan Manuel Machimbarrena, Michelle F. Wright, et al. "Associations between Coping Strategies and Cyberhate Involvement: Evidence from Adolescents across Three World Regions." International Journal of Environmental Research and Public Health 19, no. 11 (2022): 6749. http://dx.doi.org/10.3390/ijerph19116749.
Texto completo da fonteKorol, Liliia, and Catherine Blaya. "THE PHENOMENON OF CYBERHATE: ANALYSIS OF CONCEPTUAL APPROACHES AND EMPIRICAL FINDINGS OF YOUTH’S CYBERHATE EXPERIENCES IN FRANCE." Scientific Notes of Ostroh Academy National University: Psychology Series 1, no. 17 (2024): 82–89. http://dx.doi.org/10.25264/2415-7384-2024-17-82-89.
Texto completo da fonteAlmaliki, Malik, Abdulqader M. Almars, Khulood O. Aljuhani, and El-Sayed Atlam. "Combining the Strengths of LLMs and Persuasive Technology to Combat Cyberhate." Computers 14, no. 5 (2025): 173. https://doi.org/10.3390/computers14050173.
Texto completo da fontePorett, Tom. "Cyberart Considerations." Art Journal 53, no. 3 (1994): 32. http://dx.doi.org/10.2307/777416.
Texto completo da fonteDouglas, Karen M., Craig Mcgarty, Ana-Maria Bliuc, and Girish Lala. "Understanding Cyberhate." Social Science Computer Review 23, no. 1 (2005): 68–76. http://dx.doi.org/10.1177/0894439304271538.
Texto completo da fonteMeyer, Helen. "Cybercop scanner." Computers & Security 18, no. 3 (1999): 234. http://dx.doi.org/10.1016/s0167-4048(99)90941-0.
Texto completo da fonteMróz, Justyna, and Kinga Kaleta. "Internet Addiction as a Moderator of the Relationship between Cyberhate Severity and Decisional Forgiveness." International Journal of Environmental Research and Public Health 19, no. 10 (2022): 5844. http://dx.doi.org/10.3390/ijerph19105844.
Texto completo da fonteCelik, Serkan. "Experiences of internet users regarding cyberhate." Information Technology & People 32, no. 6 (2019): 1446–71. http://dx.doi.org/10.1108/itp-01-2018-0009.
Texto completo da fonteCelik, Serkan. "Tertiary-level internet users’ opinions and perceptions of cyberhate." Information Technology & People 31, no. 3 (2018): 845–68. http://dx.doi.org/10.1108/itp-05-2017-0147.
Texto completo da fonteMaulitz, R. C., J. A. Ohles, R. L. Schnuth, M. S. Lipsky, and R. J. Grealish. "The CyberDoc project." Academic Medicine 71, no. 12 (1996): 1325–8. http://dx.doi.org/10.1097/00001888-199612000-00014.
Texto completo da fonteBakalis, Chara. "Rethinking cyberhate laws." Information & Communications Technology Law 27, no. 1 (2017): 86–110. http://dx.doi.org/10.1080/13600834.2017.1393934.
Texto completo da fonteMung'ale Wafula, Samuel, Peterson Mwai Kariuki, and Cyprian Ondieki Omari. "Social Media Users Cyberhate Reporting Intentions: Does Users’ Perceptions of Police Effectiveness Matter?" Journal of Information Security and Cybercrimes Research 6, no. 2 (2023): 130–38. http://dx.doi.org/10.26735/nqqq8332.
Texto completo da fonteAtanasov, Mykola. "THE ROLE OF CYBERHATE AS A COMPONENT OF CYBERBULLYING IN THE SYSTEM OF STAFF DEVELOPMENT IN PUBLIC SERVICE." Public Administration and Regional Development, no. 28 (June 30, 2025): 606–27. https://doi.org/10.34132/pard2025.28.14.
Texto completo da fonteAmeri, Kimia, Michael Hempel, Hamid Sharif, Juan Lopez Jr., and Kalyan Perumalla. "CyBERT: Cybersecurity Claim Classification by Fine-Tuning the BERT Language Model." Journal of Cybersecurity and Privacy 1, no. 4 (2021): 615–37. http://dx.doi.org/10.3390/jcp1040031.
Texto completo da fonteAhn, Sung H., V. Sundararajan, Charles Smith, et al. "CyberCut: An Internet-based CAD/CAM System." Journal of Computing and Information Science in Engineering 1, no. 1 (2001): 52–59. http://dx.doi.org/10.1115/1.1351811.
Texto completo da fonteViires, Piret. "Literature in Cyberspace." Folklore: Electronic Journal of Folklore 29 (2005): 153–74. http://dx.doi.org/10.7592/fejf2005.29.cyberlit.
Texto completo da fonteMeyer, Helen. "Cybercop takes on network snoops." Computers & Security 15, no. 8 (1996): 685. http://dx.doi.org/10.1016/s0167-4048(97)89701-5.
Texto completo da fontePerry, Barbara, and Patrik Olsson. "Cyberhate: the globalization of hate." Information & Communications Technology Law 18, no. 2 (2009): 185–99. http://dx.doi.org/10.1080/13600830902814984.
Texto completo da fonteCostello, Matthew, James Hawdon, Ashley V. Reichelmann, et al. "Defending Others Online: The Influence of Observing Formal and Informal Social Control on One’s Willingness to Defend Cyberhate Victims." International Journal of Environmental Research and Public Health 20, no. 15 (2023): 6506. http://dx.doi.org/10.3390/ijerph20156506.
Texto completo da fonteBelykh, Vladimir S., and Vladislav O. Puchkov. "The Cybertort Concept in the Anglo-American Law." Jurist 10 (October 1, 2020): 2–11. http://dx.doi.org/10.18572/1812-3929-2020-10-2-11.
Texto completo da fonteNanduri, Ashok Kumar, G. L. Sravanthi, K. V. K. V. L. Pavan Kumar, Sadhu Ratna Babu, and K. V. S. S. Rama Krishna. "Modified Fuzzy Approach to Automatic Classification of Cyber Hate Speech from the Online Social Networks (OSN’s)." Revue d'Intelligence Artificielle 35, no. 2 (2021): 139–44. http://dx.doi.org/10.18280/ria.350205.
Texto completo da fonteBrown, Alexander. "What is so special about online (as compared to offline) hate speech?" Ethnicities 18, no. 3 (2017): 297–326. http://dx.doi.org/10.1177/1468796817709846.
Texto completo da fonteDomingues, Diana. "Cyberart and interfaces: the coupled body." Digital Creativity 15, no. 3 (2004): 159–74. http://dx.doi.org/10.1080/14626260408520177.
Texto completo da fonteJane, Emma A. "Feminist Digilante Responses to a Slut-Shaming on Facebook." Social Media + Society 3, no. 2 (2017): 205630511770599. http://dx.doi.org/10.1177/2056305117705996.
Texto completo da fonteRapoport, Sonya. "Color in the Shadows: Bay Area Cyberart." Leonardo 28, no. 1 (1995): 77. http://dx.doi.org/10.2307/1576170.
Texto completo da fonteYékú, James. "Akposdoncome again:†Nigerian cyberpop hero as trickster." Journal of African Cultural Studies 28, no. 3 (2015): 245–61. http://dx.doi.org/10.1080/13696815.2015.1069735.
Texto completo da fonteBishop, Charles. "Cyberlog: The Journal of Applied Medical Software." Serials Review 12, no. 1 (1986): 5. http://dx.doi.org/10.1080/00987913.1986.10763662.
Texto completo da fonteA. MOONEY J. G. BLIGH, G. "CyberIST :a virtual game for medical education." Medical Teacher 20, no. 3 (1998): 212–16. http://dx.doi.org/10.1080/01421599880940.
Texto completo da fonteKubota, Toru. "Clinical Evaluation of the Cyberhoby Computer System." Journal of Japan Gnathology 8, no. 3-4 (1987): 27–32. http://dx.doi.org/10.14399/jacd1982.8.3-4_27.
Texto completo da fonteBishop, Charles. "Cyberlog: The Journal of Applied Medical Software." Serials Review 12, no. 1 (1986): 5. http://dx.doi.org/10.1016/0098-7913(86)90003-1.
Texto completo da fonteWachs, Sebastian, Manuel Gámez-Guadix, Michelle F. Wright, Anke Görzig, and Wilfried Schubarth. "How do adolescents cope with cyberhate? Psychometric properties and socio-demographic differences of a coping with cyberhate scale." Computers in Human Behavior 104 (March 2020): 106167. http://dx.doi.org/10.1016/j.chb.2019.106167.
Texto completo da fonteIwanicka, Agnieszka, and Natalia Walter. "The Exposure of Polish Adolescents to Risky Online Content. Results of a European Longitudinal Study." New Educational Review Special, no. 5 (2024): 9–20. https://doi.org/10.15804/tner.2024.si.5.01.
Texto completo da fonteJane, Emma A. "Systemic misogyny exposed: Translating Rapeglish from the Manosphere with a Random Rape Threat Generator." International Journal of Cultural Studies 21, no. 6 (2017): 661–80. http://dx.doi.org/10.1177/1367877917734042.
Texto completo da fonteCostello, Matthew, Long Cheng, Feng Luo, et al. "COVID-19: A Pandemic of Anti-Asian Cyberhate." Journal of Hate Studies 17, no. 1 (2021): 108. http://dx.doi.org/10.33972/jhs.198.
Texto completo da fonteStanley, Ruth. "Software Review: CYBERLOG. Perspectives in Rational Management: Hypertension." DICP 24, no. 9 (1990): 896. http://dx.doi.org/10.1177/106002809002400938.
Texto completo da fonteBowman, Joseph. "Cyberhood Connections: Educational Webmasters and Designing Hypermedia Environments." Journal of Educational Technology Systems 25, no. 2 (1996): 117–25. http://dx.doi.org/10.2190/36d4-rrgc-r5wd-3cl9.
Texto completo da fonteJane, Emma A. "Gendered cyberhate as workplace harassment and economic vandalism." Feminist Media Studies 18, no. 4 (2018): 575–91. http://dx.doi.org/10.1080/14680777.2018.1447344.
Texto completo da fonteUNGUREANU, Dan-Marian, and Alexandru-Lucian CUCINSCHI. "CyberNSOF – A CRUCIAL FORCE MULTIPLIER IN MODERN WARFARE." INTERNATIONAL SCIENTIFIC CONFERINCE "STRATEGIESXXI" 18, no. 1 (2022): 366–73. http://dx.doi.org/10.53477/2971-8813-22-44.
Texto completo da fonteWalsh, Crosbie. "Political blogs on Fiji: A ‘cybernet democracy’ case study." Pacific Journalism Review : Te Koakoa 16, no. 1 (2010): 154–77. http://dx.doi.org/10.24135/pjr.v16i1.1015.
Texto completo da fonteInozemtsev, Maxim, and Semen Stepanov. "The Concept of Cybertort and Liability in International Law." International Trends / Mezhdunarodnye protsessy 21, no. 3 (2024): 69–85. http://dx.doi.org/10.17994/2023.21.3.74.2.
Texto completo da fonteBlaya, Catherine. "Cyberhate: A review and content analysis of intervention strategies." Aggression and Violent Behavior 45 (March 2019): 163–72. http://dx.doi.org/10.1016/j.avb.2018.05.006.
Texto completo da fontePilloy, W. J. "CyberPET: a PET service distributed over a wide area." Nuclear Medicine Communications 23, no. 12 (2002): 1232–33. http://dx.doi.org/10.1097/00006231-200212000-00038.
Texto completo da fontePolat, Nil. "The protective role of mindfulness in the cyberhate experience." JOURNAL OF AWARENESS 9, Special Issue/Özel Sayı (2024): 51–59. http://dx.doi.org/10.26809/joa.2251.
Texto completo da fonteAhn, S. H., S. McMains, C. H. Séquin, and P. K. Wright. "Mechanical implementation services for rapid prototyping." Proceedings of the Institution of Mechanical Engineers, Part B: Journal of Engineering Manufacture 216, no. 8 (2002): 1193–99. http://dx.doi.org/10.1243/095440502760272467.
Texto completo da fonteAprila, Dzikri, Rizky Mutaqien, Muhamad Rizal Nurul Hadi, Fathi Ridwan Alamsyah, and Ade Iskandar Zulkarnaen. "Peningkatan dan Pelatihan Literasi Media Digital Anti Hoax, Bullying, dan Ujaran Kebencian di Rumah Tahfidz Quran Abulyatama." Jurnal Pengabdian Literasi Digital Indonesia 1, no. 1 (2022): 1–7. http://dx.doi.org/10.57119/abdimas.v1i1.1.
Texto completo da fonteDomínguez-Dorado, Manuel, Francisco J. Rodríguez-Pérez, Javier Carmona-Murillo, David Cortés-Polo, and Jesús Calle-Cancho. "Boosting Holistic Cybersecurity Awareness with Outsourced Wide-Scope CyberSOC: A Generalization from a Spanish Public Organization Study." Information 14, no. 11 (2023): 586. http://dx.doi.org/10.3390/info14110586.
Texto completo da fonteSaraiva, Mario, and Nuno Mateus-Coelho. "CyberSoc Framework a Systematic Review of the State-of-Art." Procedia Computer Science 204 (2022): 961–72. http://dx.doi.org/10.1016/j.procs.2022.08.117.
Texto completo da fonte