نتایج جستجو برای: cyberspace regulation

تعداد نتایج: 554296  

2006
Keivan Jourabchi

The current article approaches interaction between architecture and machine in one of its several dimensions, namely computer technology and virtual reality. We begin with an introduction to complexity sciences and continue with a brief description of Systems Theory and Cybernetics, leading to the notion of virtual reality and cyberspace. The approach to the virtual architecture presented in th...

2004
Yves POULLET

In a recent Bibliography on self-regulation on the Internet, a report prepared for the OECD1 stated : « while there is a broad consensus that self regulation of the Internet is critical to its future growth, there is little consensus about how to achieve and to implement a self-regulatory régime ». Self-regulation is a word and a myth : the concept is presented as an adequate solution due to th...

Journal: :Jurnal HAM (Badan Penelitian dan Pengembangan Hak Asasi Manusia) 2021

Cyberspace is the interdependent network of information technology infrastructures such as internet, telecommunications networks, and computer systems. Meanwhile, Indonesia’s Law Number 11 2008 its amendment through Indonesian 19 2016 governing cyberspace have been viewed to contradict infringe other areas law, protection press or freedom expression. Hence, this study seeks identify controversi...

2004
Shigeo MORISHIMA

Recently computer can make cyberspace to walk through by an interactive virtual reality technique. An avatar in cyberspace can bring us a virtual face-to-face communication environment. In this paper, we realize an avatar which has a real face in cyberspace to construct a multi-user -communication system by voice transmission through network. Voice from microphone is transmitted and analyzed, t...

ژورنال: رویش روانشناسی 2022

The aim of this study was to investigate the role of Hexaco personality dimensions and religious attitudes and moral intelligence in predicting cyberspace injuries in female high school students in Mashhad. The statistical population of this study consisted of all female high school students in Mashhad in the academic year 2020-2021. The sample size was selected using 228 clusters random sampli...

2015
William D. Bryant

Rigid cyberspace defenses are proving unable to meet advanced and modern cyberspace threats. As a result, there has been increasing focus and interest in cyber resiliency, but what will it take to be resilient in future cyber combat? We can glean some useful concepts from the ancient Japanese proverb about the resiliency of bamboo in a storm. In comparison with the massive oak, which relies on ...

2017
SHAHRAM YAZDANI ZOHREH KHOSHGOFTAR SOLEIMAN AHMADY HASSAN RASTEGARPOUR SEYED ABBAS FOROUTAN

INTRODUCTION Over the past few decades, two revolutionary approaches have emerged as a new form of medical education: Electronic Medical Education and Web-based Medical Education. A number of well-known medical institutions, such as Harvard and Johns Hopkins used a wide range of cyberspace capabilities to increase their competitiveness. Researchers have expressed that cyberspace will change hea...

Journal: :Inf. Soc. 2002
Adrian Mihalache

Various spatial metaphors related to cyberspace suffer from two major deŽ ciencies. First, they do not take into account that cyberspace is not a preexistent territory, but an entity that emerges in the process of its development. Second, cyberspace is not a metric space, so that most of the ready-made constructs, like the topologic spaces, cannot be of much use. An interpretation of Blake’s wo...

2016
Scott D. Lathrop Stoney Trent Robert Hoffman George G. Meade

Cyberspace operations are dependent upon highly sophisticated technology. Unfortunately, it is challenging to find or develop solutions that successfully support critical processes and decisions. Innovation, and the resources associated with innovation, appear to focus primarily on the technology with little emphasis on the human factors associated with employment, training, and sustainment of ...

Journal: :JNW 2012
Bing Chen Chengxiang Tan Bo Jin Xiang Zou Yuebo Dai

With the moving development of networks, especially Internet of Things, electronic identity administration in cyberspace is becoming more and more important. And personal identity management in cyberspace associated with individuals in reality has been one significant and urgent task for the further development of information construction in China. So this paper presents a RFID-based electronic...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید