Статті в журналах з теми "Cyberhot"

Щоб переглянути інші типи публікацій з цієї теми, перейдіть за посиланням: Cyberhot.

Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями

Оберіть тип джерела:

Ознайомтеся з топ-50 статей у журналах для дослідження на тему "Cyberhot".

Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.

Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.

Переглядайте статті в журналах для різних дисциплін та оформлюйте правильно вашу бібліографію.

1

Curran, Kevin, and Sheila Mc Kinney . "Cyberart." Journal of Applied Sciences 4, no. 4 (September 15, 2004): 531–36. http://dx.doi.org/10.3923/jas.2004.531.536.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

LEVIN, BRIAN. "Cyberhate." American Behavioral Scientist 45, no. 6 (February 2002): 958–88. http://dx.doi.org/10.1177/0002764202045006004.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Lewis, Mike. "CYBERLOG." Health Libraries Review 5, no. 3 (September 1988): 211–14. http://dx.doi.org/10.1046/j.1365-2532.1988.5302102.x.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Porett, Tom. "Cyberart Considerations." Art Journal 53, no. 3 (1994): 32. http://dx.doi.org/10.2307/777416.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Meyer, Helen. "Cybercop scanner." Computers & Security 18, no. 3 (January 1999): 234. http://dx.doi.org/10.1016/s0167-4048(99)90941-0.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Douglas, Karen M., Craig Mcgarty, Ana-Maria Bliuc, and Girish Lala. "Understanding Cyberhate." Social Science Computer Review 23, no. 1 (February 2005): 68–76. http://dx.doi.org/10.1177/0894439304271538.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Maulitz, R. C., J. A. Ohles, R. L. Schnuth, M. S. Lipsky, and R. J. Grealish. "The CyberDoc project." Academic Medicine 71, no. 12 (December 1996): 1325–8. http://dx.doi.org/10.1097/00001888-199612000-00014.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Bakalis, Chara. "Rethinking cyberhate laws." Information & Communications Technology Law 27, no. 1 (October 30, 2017): 86–110. http://dx.doi.org/10.1080/13600834.2017.1393934.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Celik, Serkan. "Experiences of internet users regarding cyberhate." Information Technology & People 32, no. 6 (December 2, 2019): 1446–71. http://dx.doi.org/10.1108/itp-01-2018-0009.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Purpose The purpose of this paper is to explore internet users’ experiences of cyberhate in the aspects of ethnicity, religion, sexual preference and political perspective. Design/methodology/approach Researchers employed an exploratory survey method to examine internet users’ experiences of cyberhate. The participants of the study were determined by purposive sampling methods to attain maximum variety among internet users with high-level digital literacy skills. The data were collected from 355 internet users affiliated with two universities in Turkey and the USA using a personal data form and a survey (Cyberhate Experience Survey) of which reliability and validity indexes were ensured. Findings The results indicated that participants have observed and experienced cyberhate at different levels targeting their ethnic, religious, gender-based and political identities. The findings also pointed out that gender, income and socio-political identities are significant variables on exposure to cyberhate regardless of cultural and educational boundaries. The majority of survey respondents reported that they had encountered cyberhate mostly on social media platforms. Social implications The findings of the study imply that to address the hate speech problem comprehensively, the author must enlighten people, change their way of thinking and broaden their perspectives by using measures such as intercultural dialogue, critical thinking, media literacy, education on tolerance and diversity. Originality/value This research was intended to contribute into the need to elaborate on various aspects of cyberhate, which is shared by academics, thinkers, journalists and educators. It may also serve to clarify how frequently internet users encounter hateful content and harassment online, which can have social consequences and influence young people’s trust to other people.
10

Celik, Serkan. "Tertiary-level internet users’ opinions and perceptions of cyberhate." Information Technology & People 31, no. 3 (June 4, 2018): 845–68. http://dx.doi.org/10.1108/itp-05-2017-0147.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
PurposeThe purpose of this paper is to elaborate the opinions and perceptions of internet users regarding online hate speech, and bring cyberhate to the attention of internet users and policy stakeholders.Design/methodology/approachA sectional research design and survey method was adopted throughout the study to examine the opinions and perceptions of internet users regarding cyberhate by descriptively exploring the existing situation from various perspectives. The participants of the study were determined by purposive sampling methods to attain maximum variety among internet users who are considered as highly literate in technology use. The data were collected through a personal data form and a survey (Cyberhate Perception Scale) from 372 internet users living in Turkey and the USA.FindingsThe findings of the study revealed that the majority of participants do not perceive cyberhate as a part of freedom of speech and they believe that online hate behaviors, which they also consider to be a violation of human rights, should be deemed illegal and be punished accordingly. The findings, which were discussed in line with the existing research, indicated some significant predictors of internet users’ perceptions on cyberhate.Originality/valueAs cyberhate is an understudied area that raises concerns in terms of internet user exposure, the objective of this research is to understand tendencies about the opinions and perceptions of internet users regarding online hate speech, and bring cyberhate to the attention of internet users and policy stakeholders.
11

Ahn, Sung H., V. Sundararajan, Charles Smith, Balaji Kannan, Roshan D’Souza, Ganping Sun, Ashish Mohole, et al. "CyberCut: An Internet-based CAD/CAM System." Journal of Computing and Information Science in Engineering 1, no. 1 (January 1, 2001): 52–59. http://dx.doi.org/10.1115/1.1351811.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
“CyberCut™” is a testbed for an Internet-based CAD/CAM system. It was specifically designed to be a networked, automated system, with a seamless communication flow from a client-side designer to a server-side machining service. The creation of CyberCut required several new software modules. These include: a) a Web-based design tool in which Design-for-Manufacturing information and machining rules constrain the designer to manufacturable parts; b) a geometric representation called SIF-DSG, for unambiguous communication between the client-side designer and the server-side process planner; c) an automated process planning system with several sub-modules that convert an incoming design to a set of tool-paths for execution on a 3-axis CNC milling machine. Using this software-pipeline, a CyberCut service, modeled on the MOSIS service for VLSI chips, has been now been launched for limited student-use at a group of cooperating universities.
12

Meyer, Helen. "Cybercop takes on network snoops." Computers & Security 15, no. 8 (January 1996): 685. http://dx.doi.org/10.1016/s0167-4048(97)89701-5.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
13

Perry, Barbara, and Patrik Olsson. "Cyberhate: the globalization of hate." Information & Communications Technology Law 18, no. 2 (July 2009): 185–99. http://dx.doi.org/10.1080/13600830902814984.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
14

Viires, Piret. "Literature in Cyberspace." Folklore: Electronic Journal of Folklore 29 (2005): 153–74. http://dx.doi.org/10.7592/fejf2005.29.cyberlit.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
15

Belykh, Vladimir S., and Vladislav O. Puchkov. "The Cybertort Concept in the Anglo-American Law." Jurist 10 (October 1, 2020): 2–11. http://dx.doi.org/10.18572/1812-3929-2020-10-2-11.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
16

Domingues, Diana. "Cyberart and interfaces: the coupled body." Digital Creativity 15, no. 3 (August 2004): 159–74. http://dx.doi.org/10.1080/14626260408520177.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
17

Nanduri, Ashok Kumar, G. L. Sravanthi, K. V. K. V. L. Pavan Kumar, Sadhu Ratna Babu, and K. V. S. S. Rama Krishna. "Modified Fuzzy Approach to Automatic Classification of Cyber Hate Speech from the Online Social Networks (OSN’s)." Revue d'Intelligence Artificielle 35, no. 2 (April 30, 2021): 139–44. http://dx.doi.org/10.18280/ria.350205.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
The extensive use of online media and sharing of data has given considerable benefits to humankind. Sentimental analysis has become the most dynamic and famous application area in current days, which is mainly used in knowing the public's opinion. Most algorithms of machine learning are used as principle methods for sentimental analysis. Even though several methods are available for classification and reviews, all of them belong to a single class of classification which differs among several different classes. No methods are available for the classifying of multi-class instances. Therefore, fuzzy methods are used for classifying the instances depended on multi-class for achieving a clear-cut view by indicating suitable labels to objects during the classification of text. This paper includes the categorization of cyberhate information. If there is a growth in dislike speeches of the online social network may lead to a worse impact amongst social activities, which causes tensions among communication and regional. So, there is the most demand for cyberhate conversation detection automatically through online social media. Generally, an updated process of fuzzy words is designed that includes two stages of training for the classification of cyberhate conversation into 4 forms, race, disability, sexual orientation, and religion. Depended on the types of classification, experiments have been conducted on these four forms by gathering different conversations through online media. Systems based on rules of fuzzy approach have been used. This fuzzy with rule-based is for the classification of features using Machine Learning techniques such as the words that implants for future bag-of-words and extraction methods. In this, the cyberhate conversations are taken from OSN's depended on the attributes defined in a dataset using rule-based fuzzy.
18

Brown, Alexander. "What is so special about online (as compared to offline) hate speech?" Ethnicities 18, no. 3 (May 19, 2017): 297–326. http://dx.doi.org/10.1177/1468796817709846.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
There is a growing body of literature on whether or not online hate speech, or cyberhate, might be special compared to offline hate speech. This article aims to both critique and augment that literature by emphasising a distinctive feature of the Internet and of cyberhate that, unlike other features, such as ease of access, size of audience, and anonymity, is often overlooked: namely, instantaneousness. This article also asks whether there is anything special about online (as compared to offline) hate speech that might warrant governments and intergovernmental organisations contracting out, so to speak, the responsibility for tackling online hate speech to the very Internet companies which provide the websites and services that hate speakers utilise.
19

Jane, Emma A. "Feminist Digilante Responses to a Slut-Shaming on Facebook." Social Media + Society 3, no. 2 (April 2017): 205630511770599. http://dx.doi.org/10.1177/2056305117705996.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
This article examines feminist digilantism in response to the “slut-shaming” of an Australian woman on Facebook in 2015. The activism is used to highlight the nature and significance of the feminist pushback against the worsening problem of cyber violence against women and girls (cyber VAWG). This article builds on my previous research into feminist digilantism and is part of a much larger, mixed-methods, multi-modal study into gendered cyberhate. It uses approaches from Internet historiography, ethnography, and netnography, alongside data drawn from qualitative interviews. Sufficient evidence is available to support the broad argument that the feminist digilantism involved in the case study under analysis was efficacious as well as ethically justified given the dearth of institutional interventions. That said, I demonstrate that while such activism has benefits, it also has risks and disadvantages, and raises ethical issues. This critique of digilantism is not intended as yet another type of victim blaming which suggests the activist responses of cyberhate targets are flawed. Instead, my case is that appraising the efficacy and ethics of such forms of extrajudicial activism should take place within a framing acknowledging that these actions are primarily diagnostic of rather than a solution to cyber VAWG. As such, the increasing prevalence and strength of feminist digilantism lends further support to the case that gendered cyberhate is a problem demanding urgent and multifaceted intervention.
20

Rapoport, Sonya. "Color in the Shadows: Bay Area Cyberart." Leonardo 28, no. 1 (1995): 77. http://dx.doi.org/10.2307/1576170.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
21

Yékú, James. "Akposdoncome again:†Nigerian cyberpop hero as trickster." Journal of African Cultural Studies 28, no. 3 (August 7, 2015): 245–61. http://dx.doi.org/10.1080/13696815.2015.1069735.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
22

A. MOONEY J. G. BLIGH, G. "CyberIST :a virtual game for medical education." Medical Teacher 20, no. 3 (January 1998): 212–16. http://dx.doi.org/10.1080/01421599880940.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
23

Kubota, Toru. "Clinical Evaluation of the Cyberhoby Computer System." Journal of Japan Gnathology 8, no. 3-4 (1987): 27–32. http://dx.doi.org/10.14399/jacd1982.8.3-4_27.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
24

Bishop, Charles. "Cyberlog: The Journal of Applied Medical Software." Serials Review 12, no. 1 (March 1986): 5. http://dx.doi.org/10.1080/00987913.1986.10763662.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
25

Bishop, Charles. "Cyberlog: The Journal of Applied Medical Software." Serials Review 12, no. 1 (March 1986): 5. http://dx.doi.org/10.1016/0098-7913(86)90003-1.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
26

Wachs, Sebastian, Manuel Gámez-Guadix, Michelle F. Wright, Anke Görzig, and Wilfried Schubarth. "How do adolescents cope with cyberhate? Psychometric properties and socio-demographic differences of a coping with cyberhate scale." Computers in Human Behavior 104 (March 2020): 106167. http://dx.doi.org/10.1016/j.chb.2019.106167.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
27

Jane, Emma A. "Systemic misogyny exposed: Translating Rapeglish from the Manosphere with a Random Rape Threat Generator." International Journal of Cultural Studies 21, no. 6 (November 2, 2017): 661–80. http://dx.doi.org/10.1177/1367877917734042.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Misogyny online in forms such as explicit rape threats has become so prevalent and rhetorically distinctive it resembles a new dialect or language. Much of this ‘Rapeglish’ is produced by members of an informal alliance of men’s groups online dubbed the ‘Manosphere’. As both a cyberhate researcher and cyberhate target, I have studied as well as contributed to feminist responses to Rapeglish. In 2016, for instance, I helped build a Random Rape Threat Generator (RRTG) – a computer program that splices, shuffles around, and re-stitches in novel combinations fragments of real-life Rapeglish to illustrate the formulaic, machine-like, and impersonal nature of misogynist discourse online. This article uses Yuri Lotman’s ideas about intra- and inter-cultural conflict involving something akin to the translation of a foreign language to frame the RRTG as one example of the way women are ‘talking back’ both to and with Rapeglish (the latter involving appropriations and subversions of the original discourse).
28

Stanley, Ruth. "Software Review: CYBERLOG. Perspectives in Rational Management: Hypertension." DICP 24, no. 9 (September 1990): 896. http://dx.doi.org/10.1177/106002809002400938.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
29

Bowman, Joseph. "Cyberhood Connections: Educational Webmasters and Designing Hypermedia Environments." Journal of Educational Technology Systems 25, no. 2 (December 1996): 117–25. http://dx.doi.org/10.2190/36d4-rrgc-r5wd-3cl9.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
As access to the Internet grows, educators are defining how to use its resources for classroom instruction, alternative education models, and as an instructional tool that supports student learning and achievement. The Center for Urban Youth and Technology (CUYT) has developed a design model that introduces educators, teachers, and students to hypermedia and the Internet. The basis for the CyberHood initiative is a concern about the economic and educational conditions in urban cities and a belief in the potential of technology to support and improve the same. Working collaboratively with an Internet web company (the Aframian World Enterprises) and a school-to-work program (Youth Construction Initiative Program) at the University at Albany, our research focused on development of an educational hypermedia model for instruction and design.
30

Jane, Emma A. "Gendered cyberhate as workplace harassment and economic vandalism." Feminist Media Studies 18, no. 4 (March 16, 2018): 575–91. http://dx.doi.org/10.1080/14680777.2018.1447344.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
31

Walsh, Crosbie. "Political blogs on Fiji: A ‘cybernet democracy’ case study." Pacific Journalism Review : Te Koakoa 16, no. 1 (May 1, 2010): 154–77. http://dx.doi.org/10.24135/pjr.v16i1.1015.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Political blogging in politically unstable and repressive countries has been seen as a form of cybernet democracy. This research article examines this claim in post-coup Fiji in the wake of the 2006 military takeover, details the author’s experiences with blogging, comments on the Fiji blogosphere in a climate of conflict, and attempts an analysis of the overall pro and anti-government blog landscape that involves more than 70 political blogs. Unlike earlier published research on Fiji blogs, it is an ‘insider’ view, written by an academic who is also a blog publisher—publishing Fiji As It Was, Is and Can Be (FAIW).
32

Pilloy, W. J. "CyberPET: a PET service distributed over a wide area." Nuclear Medicine Communications 23, no. 12 (December 2002): 1232–33. http://dx.doi.org/10.1097/00006231-200212000-00038.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
33

Blaya, Catherine. "Cyberhate: A review and content analysis of intervention strategies." Aggression and Violent Behavior 45 (March 2019): 163–72. http://dx.doi.org/10.1016/j.avb.2018.05.006.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
34

Ahn, S. H., S. McMains, C. H. Séquin, and P. K. Wright. "Mechanical implementation services for rapid prototyping." Proceedings of the Institution of Mechanical Engineers, Part B: Journal of Engineering Manufacture 216, no. 8 (August 1, 2002): 1193–99. http://dx.doi.org/10.1243/095440502760272467.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Inspired by the metal oxide system implementation service (MOSIS) project, CyberCut is an experimental fabrication testbed for an Internet-accessible, computerized prototyping and machining service. Client-designers can create mechanical components, generally using our web-based computer aided design (CAD) system (available at http://cad.berkeley.edu ), and submit appropriate files to the server at Berkeley for process planning. CyberCut then utilizes an open-architecture, computer numerical control (CNC) machine tool for fabrication. Rapid tool path planning, novel fixturing techniques and sensor-based precision machining techniques allow the designer to take delivery of a component machined from high-strength materials with good tolerances, e.g. ±0.002in (0.05 mm). There are also instances where the complex geometry of a component cannot be prototyped on our three-axis machine tool. For these components use is made of solid freeform fabrication (SFF) technologies such as fused deposition modelling (FDM) to build a prototype of the design. Based on experience with this testbed, a new characterization of types of relationship, or ‘couplings’, between design and manufacturing has been developed using the three classifications ‘loose and repetitive’, ‘stiff and one-way’ or ‘strong and bidirectional’. These three couplings represent different trade-offs between ‘design flexibility’ and ‘guaranteed manufacturability’.
35

Sidiq, Hadi Kurniawan, Dana Sulistyo Kusumo, and Indra Lukmana Sardi. "Mendeteksi Cyberhate pada Twitter Menggunakan Text Classification dan Crowdsourced Labeling." Jurnal Nasional Teknik Elektro dan Teknologi Informasi (JNTETI) 8, no. 4 (November 20, 2019): 315. http://dx.doi.org/10.22146/jnteti.v8i4.530.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
36

Smith, Charles S., and Paul K. Wright. "CyberCut: A World Wide Web based design-to-fabrication tool." Journal of Manufacturing Systems 15, no. 6 (January 1996): 432–42. http://dx.doi.org/10.1016/s0278-6125(97)83056-7.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
37

Mauro, Vincent F. "Book Review: Cyberlog: A Library of Applied Medical Software: Arrhythmias." DICP 25, no. 6 (June 1991): 684. http://dx.doi.org/10.1177/106002809102500631.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
38

Abel, Pierre, Pascal Gros, Didier Loisel, Cristina Russo Dos Santos, and Jean-Pierre Paris. "CyberNet: A framework for managing networks using 3D metaphoric worlds." Annales Des Télécommunications 55, no. 3-4 (March 2000): 131–42. http://dx.doi.org/10.1007/bf03001906.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
39

Khorrami, E. "E-Health und Cyberdoc - Gesundheitsportale im Blickfeld von Standesrecht und Qualitätssicherung." Das Gesundheitswesen 64, no. 8/9 (August 2002): 466–75. http://dx.doi.org/10.1055/s-2002-33779.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
40

Mrđenović, Maja. "Hatsune Miku: The subversive potential of a participatory-created cyberpop idol." Kultura, no. 169 (2020): 113–29. http://dx.doi.org/10.5937/kultura2069113m.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Virtual worlds and online interactions are the base of cyberpop culture, in which consumption also causes production of meaning. It possibly can, but does not have to bring out subversive and/or activist potential. The overflow of the virtual into the spaces of physical reality, by use of technologies as gestural interfaces, holographic projections and the like, allows direct bodily interactions with virtual objects. Some of these objects are so-called virtual idols. Their appearance, identity and celebrity status are constructed and assigned by real people in the real world. This paper analyses the role of fans in the creation of the most famous virtual idol, the vocaloid Hatsune Miku. Based on this analysis, the paper puts forward a thesis that existence of Hatsune Miku puts emphasis on the activity (participation) per se, instead of activism. It does not serve the idea of social change, but the maintaining of the social status quo.
41

Sundararajan, V., and Paul K. Wright. "Feature Based Macroplanning Including Fixturing." Journal of Computing and Information Science in Engineering 2, no. 3 (September 1, 2002): 179–91. http://dx.doi.org/10.1115/1.1526506.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Macroplanning is concerned with deciding on setups and sequences of operations by taking into account interactions between features and issues of fixturing. The algorithms presented in this paper use a set of features arranged in a graph-like data structure to determine the fixture configurations and setups. Operation sequences for the features and tool-paths are determined by separate modules working in conjunction with the macroplanner. Examples are presented to demonstrate the capability of the algorithms implemented in an integrated CAD/ CAM system called CyberCut.
42

Kumkale, Zeynep, and Abdullah Adiguzel. "The impact of cyberhunt on reading comprehension level in foreign language teaching." Journal of Higher Education and Science 9, no. 2 (2019): 268. http://dx.doi.org/10.5961/jhes.2019.329.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
43

Oksanen, Atte, Markus Kaakinen, Jaana Minkkinen, Pekka Räsänen, Bernard Enjolras, and Kari Steen-Johnsen. "Perceived Societal Fear and Cyberhate after the November 2015 Paris Terrorist Attacks." Terrorism and Political Violence 32, no. 5 (April 9, 2018): 1047–66. http://dx.doi.org/10.1080/09546553.2018.1442329.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
44

Sobocki, J., P. Thor, G. Krolczyk, J. Uson, I. Diaz-Guemes, and M. Lipinski. "The Cybergut. An Experimental Study on Permanent Microchip Neuromodulation for Control of Gut Function." Acta Chirurgica Belgica 102, no. 2 (January 2002): 68–70. http://dx.doi.org/10.1080/00015458.2002.11679268.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
45

Wachs, Sebastian, Michelle F. Wright, and Alexander T. Vazsonyi. "Understanding the overlap between cyberbullying and cyberhate perpetration: Moderating effects of toxic online disinhibition." Criminal Behaviour and Mental Health 29, no. 3 (June 2019): 179–88. http://dx.doi.org/10.1002/cbm.2116.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
46

Trofymenko, Olena, Yuliia Prokop, Nataliia Lohinova, and Oleksandr Zadereiko. "Monitoring of Cybersecurity Level of Ukraine in World Ratings." Information Security of the Person, Society and State, no. 27 (2019): 119–26. http://dx.doi.org/10.51369/2707-7276-2019-3-13.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
The article is devoted to monitoring of the level of cybersecurity of Ukraine in world rankings. The authors’ attention was focused on analyzing the main problems of building a national cyber defense system, considering international experience. According to the authors, ensuring the cybersecurity of the country is possible only with the comprehensive and continuous use of legal and technical methods of protection not only at the national, but also at the international level. International cooperation will ensure an adequate level of cybersecurity and protect information infrastructures in modern conditions of the information society development. Key words: cybersecurity, cyberat-tacks, cyber incidents, cyberthreat, infor-mation security, cybersecurity strategy.
47

Storey, Patrick B. "Hypertension. A review of third issue of cyberlog. Michael G. Sormeyer, M.D. Morris Davidman, M.D." Möbius: A Journal for Continuing Education Professionals in Health Sciences 7, no. 1 (January 1987): 71–73. http://dx.doi.org/10.1002/chp.4760070112.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
48

Sakabe, Fabiana Forti, Daniel Iwai Sakabe, Fátima Regina Marracini Fernandes, and Gisele Reges. "Estimulação pulsada de alta voltagem reduz a área de úlceras de diferentes etiologias." Fisioterapia Brasil 19, no. 1 (March 17, 2018): 72. http://dx.doi.org/10.33233/fb.v19i1.2124.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
As úlceras são definidas como rupturas de estruturas anatômicas do corpo, levando ao comprometimento da função fisiológica dos tecidos envolvidos. A estimulação elétrica de alta voltagem (EEAV) pode auxiliar na cicatrização de tecidos. O objetivo desse estudo foi avaliar o efeito de 30 sessões de EEAV na cicatrização de úlceras de diferentes etiologias. Participaram 6 voluntários e foram tratadas 10 úlceras cutâneas. Para quantificar a área das lesões (cm2) foi realizada a fotogrametria a cada 10 sessões (câmera digital Sony Cybershot, 7.2 megapixels). A intervenção consistiu na aplicação da EEAV (T=100 ms; f= 100 Hz; intensidade de100 a 150 V), 2 a 3x/semana, por 30 minutos. Os eletrodos ativos (negativo) foram fixados sobre a lesão e o dispersivo (positivo) fixado no trajeto vascular. Com relação à área das lesões por pressão, a úlcera sacral reduziu 84,10% da sua área, a trocanteriana e do maléolo medial cicatrizaram completamente em 10 sessões. As úlceras neuropáticas fecharam completamente em 20 sessões. As cinco úlceras venosas (região do tornozelo), apresentaram redução em sua área de 26,29%, 80%, 44,69%, 28,23% e 6,27%. A EEAV foi eficaz pois promoveu a cicatrização completa de quatro úlceras e auxiliou a redução na área de outras seis lesões.Palavras-chave: estimulação elétrica, cicatrização de feridas, fotogrametria.
49

Kavanagh, Emma, Chelsea Litchfield, and Jaquelyn Osborne. "Sporting Women and Social Media: Sexualization, Misogyny, and Gender-Based Violence in Online Spaces." International Journal of Sport Communication 12, no. 4 (December 1, 2019): 552–72. http://dx.doi.org/10.1123/ijsc.2019-0079.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
This study investigated gender-based violence targeting high-profile women in virtual environments through the case of women’s tennis. Using a netnographic approach and the lens of third-wave feminism, 2 popular social media platforms (Facebook and Twitter) were analyzed to examine social commentary and fan interaction surrounding the top-5-seeded female tennis players during the Wimbledon Tennis Championships. Athletes were exposed to violent interactions in a number of ways. Four themes were identified through data analysis: threats of physical violence, sexualization that focused on the female physical appearance, sexualization that expressed desire and/or proposed physical or sexual contact, and sexualization that was vile, explicit, and threateningly violent in a sexual or misogynistic manner. Findings demonstrate how social media provides a space for unregulated gender-based cyberhate targeting high-profile women in their workplace in a way that traditional sport media does not.
50

YOSHIDA, Hiroshi, and Hiroatsu MATSUURA. "CyberMol-A Molecular Graphics Program System on the World Wide Web Using the Common Gateway Interface." Journal of Chemical Software 3, no. 4 (1997): 157–63. http://dx.doi.org/10.2477/jchemsoft.3.157.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.

До бібліографії