Search results for "Cyberspace"

showing 10 items of 30 documents

Research and Science Today Supplement

2013

In this issue are included scientific articles who debate problems from social science fields: development, power of the state, European policy, democracy, freedom of choice, social science. Authors talk about subjects as Sport policy and heroes in the Romanian communism, Food in war time in Transylvania, Global Security, Cyberspace, Postcommunism, Evaluation of some toxic compounds in water, Public policies. Research and Science Today Journal is a publication founded in 2011 and it is dedicated to the students of all levels (license, master and doctoral) of faculties in the country and abroad. We want to offer the participants the opportunity to present their scientific works in the follow…

Conceptualizationbusiness.industrymedia_common.quotation_subjectFreedom of choicePublic policyPublic relationsDemocracyPolitical scienceInternational securitySocial sciencebusinessCyberspaceLicenseCommunismmedia_commonSSRN Electronic Journal
researchProduct

The Modern Strategies in the Cyber Warfare

2018

As there is no generally accepted definition for cyber warfare, it is a term that is quite liberally used in describing events and actions in the digital cyber world. The concept of cyber warfare became extremely popular from 2008 to 2010, partly superseding the previously used concept of information warfare which was launched in the 1990s. For some, cyber warfare is war that is conducted in the virtual domain. For others, it is a counterpart to conventional “kinetic” warfare. According to the OECD’s 2001 report, cyberwar military doctrines resemble those of so-called conventional war: retaliation and deterrence. Researchers agree with the notion that the definition of cyberwar should addre…

CyberwarfareComputer scienceCognitive computingComputerApplications_COMPUTERSINOTHERSYSTEMSDeterrence theorySpace (commercial competition)Computer securitycomputer.software_genreBattlespaceCyberspacecomputerInformation warfareUse of force
researchProduct

Nel cyberspazio. Visioni urbane delle giga-città

2015

L’autrice riflette sulle immagini delle giga-città, o smart cities, attualmente in fase di costruzione in aree completamente desertiche dell’India, dell’Africa, del Nuovo Messico, della Cina e degli Emirati Arabi, che strutturano i propri spazi con codici della rappresentazione rapportati alla dimensione del cyberspazio. Il disegno urbano di queste città digitali si caratterizza per gli avveniristici volumi architettonici, per le sperimentazioni tecnologiche e per la lettura attraverso layer delle piattaforme virtuali e delle infrastrutture trasparenti. The author reflects on the images of giga-cities, or smart cities, currently under construction in completely desert areas in India, Africa…

Disegno rappresentazione cyberspazio cittàSettore ICAR/17 - DisegnoDrawing representation cyberspace city
researchProduct

Situation Understanding for Operational Art in Cyber Operations

2016

This paper presents a theoretically motivated framework and methodology that has been designed for finding out the emergent phenomena and information needs for planning and decision-making. The approach is based on complexity thinking, system modeling, communication and cognition philosophy, social system theories and content analysis research technique. It provides results with the analysis of quite small sets of information. The paper demonstrates the approach with a case study. The study was performed in an international cyber experiment of the Multinational Capability Development Campaign (MCDC) 2013-2014. The case study shows that the proposed approach is plausible for increasing under…

EngineeringInformation Systems and ManagementComputer Networks and Communicationsbusiness.industryManagement scienceCognitionInformation needsSystems modelingOperational level of warHardware and ArchitectureContent analysisMultinational corporationSocial systemSafety Risk Reliability and QualitybusinessCyberspaceSafety ResearchSoftwareInternational Journal of Cyber Warfare and Terrorism
researchProduct

Unfolding Cyberspace: Cyberplaces of the Contrade and the Style of Representation in the Global Arena

2017

This chapter shows that, in the online representation of the contrade of Siena, the global level is not opposed to the local but is, instead, a particular way in which the local is represented. The method of placing their community on the global stage is that of an idealised inhabitation, one which also allows them to keep control over the formation of their collective identities. Furthermore, it shows that in the globalised world, the neighbourhoods of Siena encounter a global interest in their way of life which has made them alter their modes of self-representation . In order to position themselves in both local and global contexts, they have chosen to use the World Wide Web to present th…

Engineeringbusiness.industryOrder (exchange)Collective identityPosition (finance)Artificial intelligenceRepresentation (arts)CyberspacebusinessControl (linguistics)EpistemologyStyle (sociolinguistics)
researchProduct

A Study of a Social Behavior inside the Online Black Markets

2010

Illegal activities in cyberspace involving software vulnerabilities have resulted in tangible damage on computer-based environments. Lately, online black market sites for trading stolen goods, credentials, malware and exploit kits have been intensively examined. The market players are identifiably a group of loosely tied individuals but posses shared interests. However, their social behavior has only been discussed in a limited manner. This paper examines the arrangement of the market insiders’ social behavior that enables such forums to continue or discontinue their operation and become a meaningful threat to security. The results reveal that particular formal and informal regulations and …

Exploitbusiness.industryComputer scienceInternet privacycomputer.software_genreComputer securitySoftwareMalwareThe InternetBlack marketbusinessCyberspacecomputerCyber threats2010 Fourth International Conference on Emerging Security Information, Systems and Technologies
researchProduct

Geographies of Cyberspace: Internet, Community, Space, and Place

2017

This chapter “Geographies of Cyberspace” discusses the term “cyberspace” in relation to the concepts of “space”, “place”, and “community” by reviewing the academic literature from human geography, sociology, and cultural anthropology. It forms the basis for the development of a phenomenological perspective on cyberspace. Instead of presenting all possible approaches towards cyberspace, this chapter discusses only those concepts that focus on the connections between on- and offline life. It proposes that cyberspace not only includes spatial and territorial metaphors , as several human geographers have pointed out, but that it is also characterised by complex geographies, which have to be exp…

GeographyCultural anthropologybusiness.industryHuman geographyPerspective (graphical)The InternetSpace and placeSpace (commercial competition)Public relationsbusinessCyberspaceRelation (history of concept)Epistemology
researchProduct

Cyberspace from the hybrid threat perspective

2013

Hybrid threats use conventional and unconventional means to achieve their goals. This paper explores the cyber threats as one possible aspect of hybrid threats. It describes three ways of approaching cyberspace (operations) from the hybrid threats perspective: supporting conventional operations, exploiting non-military systems, and exploring the opportunities provided by this environment. In particular, it highlights the aspects that are or likely will be relevant to the military community. peerReviewed

Internetcyberspacekybersodankäyntihybridisotahybrid threatkyberavaruuscyber operationmilitary
researchProduct

Bezpieczeństwo młodzieży gimnazjalnej województwa opolskiego w cyberprzestrzeni

2017

Przedmiotem niniejszego artykułu jest bezpieczeństwo młodzieży gimnazjalnej w Internecie, w województwie opolskim. W kwietniu 2016 r. przeprowadzono anonimowe badanie nad poczuciem bezpieczeństwa w sieci uczniów wybranych szkół gimnazjalnych, w klasach od I do III. Na ankiety odpowiedziało 799 uczniów, w tym 393 kobiet i 406 mężczyzn. Z badań wynika, że wszyscy badani korzystają z Internetu, większość z nich codziennie. Poczucie bezpieczeństwa wśród badanych jest wysokie. Większość uczniów korzysta z Internetu zarówno dla rozrywki i aby przygotować się do zajęć w szkole. Warto zauważyć, że młodzież w wieku gimnazjalnym bardzo dużo czasu poświęca na rozrywkę w Internecie. Większość ankietowa…

Internetinternet hatecyberspaceresearchteenagersankietasecuritybadaniecyberprzestrzeńmłodzieżhejtjunior high schoolsurveygimnazjumbezpieczeństwoHoryzonty Bezpieczeństwa
researchProduct

A Framework of the Impact of Cyberspace on Contemporary Organizations

2006

This paper is an attempt to create a holistic approach to the problem of the impact of the elements operating in cyberspace on an organization. Firstly, a classification of the entities operating in cyberspace is offered. Next, a taxonomy of the possible types of influences of the elements of cyberspace on an organization is presented. In the following part of the paper two matrices concerning types of direct and indirect impact of the above mentioned entities are provided along with examples. Finally, conclusions are offered.

Knowledge managementComputer sciencebusiness.industryTaxonomy (general)The InternetCyberspacebusinessIndirect impact17th International Conference on Database and Expert Systems Applications (DEXA'06)
researchProduct