Search results for "Cyberspace"
showing 10 items of 30 documents
Research and Science Today Supplement
2013
In this issue are included scientific articles who debate problems from social science fields: development, power of the state, European policy, democracy, freedom of choice, social science. Authors talk about subjects as Sport policy and heroes in the Romanian communism, Food in war time in Transylvania, Global Security, Cyberspace, Postcommunism, Evaluation of some toxic compounds in water, Public policies. Research and Science Today Journal is a publication founded in 2011 and it is dedicated to the students of all levels (license, master and doctoral) of faculties in the country and abroad. We want to offer the participants the opportunity to present their scientific works in the follow…
The Modern Strategies in the Cyber Warfare
2018
As there is no generally accepted definition for cyber warfare, it is a term that is quite liberally used in describing events and actions in the digital cyber world. The concept of cyber warfare became extremely popular from 2008 to 2010, partly superseding the previously used concept of information warfare which was launched in the 1990s. For some, cyber warfare is war that is conducted in the virtual domain. For others, it is a counterpart to conventional “kinetic” warfare. According to the OECD’s 2001 report, cyberwar military doctrines resemble those of so-called conventional war: retaliation and deterrence. Researchers agree with the notion that the definition of cyberwar should addre…
Nel cyberspazio. Visioni urbane delle giga-città
2015
L’autrice riflette sulle immagini delle giga-città, o smart cities, attualmente in fase di costruzione in aree completamente desertiche dell’India, dell’Africa, del Nuovo Messico, della Cina e degli Emirati Arabi, che strutturano i propri spazi con codici della rappresentazione rapportati alla dimensione del cyberspazio. Il disegno urbano di queste città digitali si caratterizza per gli avveniristici volumi architettonici, per le sperimentazioni tecnologiche e per la lettura attraverso layer delle piattaforme virtuali e delle infrastrutture trasparenti. The author reflects on the images of giga-cities, or smart cities, currently under construction in completely desert areas in India, Africa…
Situation Understanding for Operational Art in Cyber Operations
2016
This paper presents a theoretically motivated framework and methodology that has been designed for finding out the emergent phenomena and information needs for planning and decision-making. The approach is based on complexity thinking, system modeling, communication and cognition philosophy, social system theories and content analysis research technique. It provides results with the analysis of quite small sets of information. The paper demonstrates the approach with a case study. The study was performed in an international cyber experiment of the Multinational Capability Development Campaign (MCDC) 2013-2014. The case study shows that the proposed approach is plausible for increasing under…
Unfolding Cyberspace: Cyberplaces of the Contrade and the Style of Representation in the Global Arena
2017
This chapter shows that, in the online representation of the contrade of Siena, the global level is not opposed to the local but is, instead, a particular way in which the local is represented. The method of placing their community on the global stage is that of an idealised inhabitation, one which also allows them to keep control over the formation of their collective identities. Furthermore, it shows that in the globalised world, the neighbourhoods of Siena encounter a global interest in their way of life which has made them alter their modes of self-representation . In order to position themselves in both local and global contexts, they have chosen to use the World Wide Web to present th…
A Study of a Social Behavior inside the Online Black Markets
2010
Illegal activities in cyberspace involving software vulnerabilities have resulted in tangible damage on computer-based environments. Lately, online black market sites for trading stolen goods, credentials, malware and exploit kits have been intensively examined. The market players are identifiably a group of loosely tied individuals but posses shared interests. However, their social behavior has only been discussed in a limited manner. This paper examines the arrangement of the market insiders’ social behavior that enables such forums to continue or discontinue their operation and become a meaningful threat to security. The results reveal that particular formal and informal regulations and …
Geographies of Cyberspace: Internet, Community, Space, and Place
2017
This chapter “Geographies of Cyberspace” discusses the term “cyberspace” in relation to the concepts of “space”, “place”, and “community” by reviewing the academic literature from human geography, sociology, and cultural anthropology. It forms the basis for the development of a phenomenological perspective on cyberspace. Instead of presenting all possible approaches towards cyberspace, this chapter discusses only those concepts that focus on the connections between on- and offline life. It proposes that cyberspace not only includes spatial and territorial metaphors , as several human geographers have pointed out, but that it is also characterised by complex geographies, which have to be exp…
Cyberspace from the hybrid threat perspective
2013
Hybrid threats use conventional and unconventional means to achieve their goals. This paper explores the cyber threats as one possible aspect of hybrid threats. It describes three ways of approaching cyberspace (operations) from the hybrid threats perspective: supporting conventional operations, exploiting non-military systems, and exploring the opportunities provided by this environment. In particular, it highlights the aspects that are or likely will be relevant to the military community. peerReviewed
Bezpieczeństwo młodzieży gimnazjalnej województwa opolskiego w cyberprzestrzeni
2017
Przedmiotem niniejszego artykułu jest bezpieczeństwo młodzieży gimnazjalnej w Internecie, w województwie opolskim. W kwietniu 2016 r. przeprowadzono anonimowe badanie nad poczuciem bezpieczeństwa w sieci uczniów wybranych szkół gimnazjalnych, w klasach od I do III. Na ankiety odpowiedziało 799 uczniów, w tym 393 kobiet i 406 mężczyzn. Z badań wynika, że wszyscy badani korzystają z Internetu, większość z nich codziennie. Poczucie bezpieczeństwa wśród badanych jest wysokie. Większość uczniów korzysta z Internetu zarówno dla rozrywki i aby przygotować się do zajęć w szkole. Warto zauważyć, że młodzież w wieku gimnazjalnym bardzo dużo czasu poświęca na rozrywkę w Internecie. Większość ankietowa…
A Framework of the Impact of Cyberspace on Contemporary Organizations
2006
This paper is an attempt to create a holistic approach to the problem of the impact of the elements operating in cyberspace on an organization. Firstly, a classification of the entities operating in cyberspace is offered. Next, a taxonomy of the possible types of influences of the elements of cyberspace on an organization is presented. In the following part of the paper two matrices concerning types of direct and indirect impact of the above mentioned entities are provided along with examples. Finally, conclusions are offered.