نتایج جستجو برای: cyber space

تعداد نتایج: 509520  

Journal: :زن در توسعه و سیاست 0
علیرضا دهقان نیری دانشیار گروه ارتباطات اجتماعی دانشگاه تهران عاطفه آقایی دانشجوی دکتری ارتباطات دانشگاه تهران محدثه ضیاچی کارشناس ارشد جامعه شناسی دانشگاه علامه طباطبایی

cyberspace and empowerment of muted groups a study of pregnant women referring to the websites related to pregnancy issuesalireza dehghan niri atefe aghaie mohaddese ziachi the purpose of this paper is to study pregnant women’s attendance in cyber space as a muted group. this is a qualitative research which has been done using grounded theory method and interview technique. we interviewed a num...

Journal: :مطالعات حقوق خصوصی 0
پرویز ساورایی استادیار گروه حقوق خصوصی دانشکدۀ حقوق دانشگاه شهید بهشتی

the “original document rule” provides when a document is adduced as substantive evidence of its contents. due to the nature of electronic document which is difficult to class as original, the said rule has been abolished by many jurisdictions. the uncitral model law as well as iranian electronic commerce law pre-empts this by making it clear that a data message shall not be denied admissibility...

2013
Johan Van Niekerk Kerry-Lynn Thomson Rayne Reid

Protecting the youth against the dangers posed by cyber space has become a matter of national priority. Parents often lack the necessary cyberspace know-how, to teach their own children how to be safe online. It has thus become the responsibility of society at large to educate the youth. This paper reports on a cyber safety poster creation campaign in the Nelson Mandela Metropolis in South Africa.

2011
Haitao Du Shanchieh Jay Yang

This paper investigates collaborative cyber attacks based on social network analysis. An Attack Social Graph (ASG) is defined to represent cyber attacks on the Internet. Features are extracted from ASGs to analyze collaborative patterns. We use principle component analysis to reduce the feature space, and hierarchical clustering to group attack sources that exhibit similar behavior. Experiments...

2013

It is no surprise that research on cyber behavior has increasingly gained the attention of various stakeholders ranging from legislative policy makers to school administers, from teachers to parents, from mass media to communities, and from researchers to professional practitioners such as counselors, social workers, and school psychologists (Zheng, Burrow-Sanchez, Donnelly, Call, & Drew, 2010)...

2013

It is no surprise that research on cyber behavior has increasingly gained the attention of various stakeholders ranging from legislative policy makers to school administers, from teachers to parents, from mass media to communities, and from researchers to professional practitioners such as counselors, social workers, and school psychologists (Zheng, Burrow-Sanchez, Donnelly, Call, & Drew, 2010)...

2009
Amit SHARMA

The last couple of decades have seen a colossal change in terms of the influence that computers have on the battle field, to an extent that defence pundits claim it to be a dawn of a new era in warfare. The use of computers and information in defence has manifested into various force multipliers such as Information Operations, C4I2SR Systems, Network Centric Warfare, to the extent that commenta...

2015
Jose R. Agustina

Researchers in the fields of sociology, psychology, behavioural sciences and law are trying to comprehend the radical rise of a new relational paradigm derived from the current proliferation of ICT. Crime dynamics and victimisation are not alien to the set of changes wrought by the digital era. The way in which victims behave in cyber space decisively elevates their risk of victimization. In co...

2013
Jose R. Agustina

As cyber crime has proliferated exponentially across the globe, those in the criminal justice field have lacked suitable and updated knowledge concerning the pedestrian reality of modern cyber crime. Popular media has created an image of cyber crime that suggests a lone hacker breaking through seemingly impossible security measures to access lucrative secret data. Crimes like these are very rar...

Background and Objectives: Increasingly, cyberbullying has become a common phenomenon eroding the social media environment. The present study was conducted with the aim of determining the structural relationship pattern of cyber aggression based on self-control with the mediation of mobile phone addiction in adolescents. Materials and Methods: In this descriptive study, the statistical populat...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید