Browse Results

Showing 9,801 through 9,825 of 49,558 results

Cyberpower: An Introduction to the Politics of Cyberspace

by Tim Jordan

This is the first complete introduction to and analysis of the politics of the internet. Chapters are arranged around key words and use case studies to guide the reader through a wealth of material.Cyberpower presents all the key concepts of cyberspace including:* power and cyberspace* the virtual individual* society in cyberspace* imagination and the internet.

Cyberprotest: New Media, Citizens and Social Movements

by Wim Van De Donk Brian D. Loader Paul G. Nixon Dieter Rucht

Ever since the anti-globalisation protests in Seattle in 1999 the adoption of new information and communications technologies (ICTs) by social movement activists has offered the prospect for the development of global cyberprotest. The Internet with its transnational many-to-many communication facility offers a revolutionary potential for social movements to go online and circumvent the 'official' messages of political and commercial organisations and the traditional media, by speaking directly to the citizens of the world. Furthermore the use of electronic mail (e-mail), mailing lists, websites, electronic forums and other online applications provide powerful media tools for co-ordinating the activity of often physically dispersed movement actors. Moreover, ICTs may also contribute to the important function of social movements of shaping collective identity and countering the claims and arguments of established political interests. A growing body of literature during the last decades of the twentieth century attests to the significant impact SMs have had upon the restructuring of the political landscape. Most of that literature addresses the more traditional actors and institutions (e.g. parliaments, political parties, bureaucracy etc.). Less attention has been devoted to those manifestations of political action that are concentrated around social movements and all kinds of more or less institutionalised and sustainable forms of citizen mobilisation. This book is a collection of cases that take a critical look into the way ICTs are finding their way into the world of social movements

Cyberpsychology: An Introduction to Human–Computer Interaction

by Norman Kent L.

This textbook provides a comprehensive overview of the human-computer interface in clear, non-technical language, making it an ideal introduction for students of both psychology and computer science. Covering the past, present, and future developments in technology and psychology, it combines cutting-edge academic research with engaging illustrations and examples that show students how the material relates to their lives. Topics addressed include: human factors of input devices, and the basics of sensation and perception; memory and cognitive issues of users navigating their way through interfaces; communication via programming languages and natural speech interaction; cyberpathologies such as techno-stress and Internet addiction disorders; and challenges surrounding automation and artificial intelligence. This thoroughly updated second edition features new chapters on virtual reality and cybersecurity; expanded coverage of social media, mobile computing, e-learning, and video games; and end-of-chapter review questions that ensure students have mastered key objectives.

Cyberpsychology: The Study of Individuals, Society and Digital Technologies

by Monica T. Whitty Garry Young

An important new BPS Textbook in Psychology exploring the interactions between individuals, societies, and digital technologies Outlines key theories and empirical research within cyberpsychology and provides critical assessments of this rapidly changing field Identifies areas in need of further research and ways to use digital technologies as a research tool Covers topics such as online identity, online relationships and dating, pornography, children's use of the internet, cyberbullying, online games and gambling, and deception and online crime Engaging and accessible for students at the undergraduate and graduate level with real life examples, activities, and discussion questions

Cyberpsychology and New Media: A thematic reader

by Andrew Power Gráinne Kirwan

Cyberpsychology is the study of human interactions with the internet, mobile computing and telephony, games consoles, virtual reality, artificial intelligence, and other contemporary electronic technologies. The field has grown substantially over the past few years and this book surveys how researchers are tackling the impact of new technology on human behaviour and how people interact with this technology. Examining topics as diverse as online dating, social networking, online communications, artificial intelligence, health-information seeking behaviour, education online, online therapies and cybercrime, Cyberpsychology and New Media book provides an in-depth overview of this burgeoning field, and allows those with little previous knowledge to gain an appreciation of the diversity of the research being undertaken in the area. Arranged thematically and structured for accessibility, Cyberpsychology and New Media will be essential reading for researchers and students in Social Psychology and Cyberpsychology, and in Communication and Media Studies.

Cyberpsychology and Society: Current Perspectives

by Andrew Dr Power

Human interaction with technology is constantly evolving, with rapid developments in online interaction, gaming, and artificial intelligence all impacting upon and altering our behaviour. The speed of this change has led to an urgent need for a new field of study, cyberpsychology, in order to investigate the ways in which human behaviour is affected by the addition of technology, and the benefits and risks thereof. Cyberpsychology and Society does not offer a description of or justification for the field of study, but is rather a presentation of some of the most recent research in many key sub-topics within the area. Based on the work being done in the Institute of Art, Design and Technology (IADT) in Dublin, Ireland, Cyberpsychology and Society brings together a unique collection of writings by contributors on cyberpsychology in relation to health, education, gaming, consumer behaviour, and social change in an online world. The book focuses on the impact of societies’ increasing interaction with technology, and is a presentation of some of the most recent research in the area. Describing cutting-edge research while employing a tone which is accessible to both students and academic staff, this book is an invaluable resource for students, researchers and academics of cyberpsychology and related areas.

Cybersecurity Awareness Among Students and Faculty

by Abbas Moallem

In modern times, all individuals need to be knowledgeable about cybersecurity. They must have practical skills and abilities to protect themselves in cyberspace. What is the level of awareness among college students and faculty, who represent the most technologically active portion of the population in any society? According to the Federal Trade Commission’s 2016 Consumer Sentinel Network report, 19 percent of identity theft complaints came from people under the age of 29. About 74,400 young adults fell victim to identity theft in 2016. This book reports the results of several studies that investigate student and faculty awareness and attitudes toward cybersecurity and the resulting risks. It proposes a plan of action that can help 26,000 higher education institutions worldwide with over 207 million college students, create security policies and educational programs that improve security awareness and protection. Features Offers an understanding of the state of privacy awareness Includes the state of identity theft awareness Covers mobile phone protection Discusses ransomware protection Discloses a plan of action to improve security awareness

Cybersecurity Governance in Latin America: States, Threats, and Alliances (SUNY series in Ethics and the Challenges of Contemporary Warfare)

by Carlos Solar

Cybersecurity Governance in Latin America discusses how the massification of the Internet has exposed emerging democracies' high-tech vulnerabilities to cyber-attacks and questions why states have decided to introduce policies and legislation facilitating the militarization of cyberspace. Carlos Solar offers a comparative analysis using the cases of Argentina, Brazil, Chile, Colombia, Mexico, and Venezuela to help navigate the changing security landscape and the growing risks found in the digital domain. His analysis includes a review of civilian and military preparedness emphasizing the ongoing alliances with the world's superpowers to finally debate what are the side effects for peace and development in the Americas from the current cybersecurity rivalry between the United States and China. Providing a much-needed account of state-technology affairs in the global south Cybersecurity Governance in Latin America challenges scholars and policymakers to rethink the protection of cyberspace to avoid unnecessarily sacrificing rights and freedoms in the name of national security.

Cybersecurity in Germany (SpringerBriefs in Cybersecurity)

by Martin Schallbruch Isabel Skierka

In 2016, Germany's government presented its third cybersecurity strategy, which aims to strengthen the national cyber defence architecture, cooperation between the state and industry, and individual users’ agency. For many years, Germany has followed/adopted a preventive and engineering approach to cybersecurity, which emphasizes technological control of security threats in cyberspace over political, diplomatic and military approaches. Accordingly, the technically oriented Federal Office for Information Security (BSI) has played a leading role in Germany’s national cybersecurity architecture. Only in 2016 did the military expand and reorganize its cyber defence capabilities. Moreover, cybersecurity is inextricably linked to data protection, which is particularly emphasised in Germany and has gained high public attention since Edward Snowden’s revelations. On the basis of official documents and their insights from many years of experience in cybersecurity policy, the two authors describe cyber security in Germany in the light of these German peculiarities. They explain the public perception of cybersecurity, its strong link with data protection in Germany, the evolution of Germany's cybersecurity strategies, and the current organisation of cybersecurity across the government and industry. The Brief takes stock of past developments and works out the present and future gaps and priorities in Germany’s cybersecurity policy and strategy, which will be decisive for Germany’s political role in Europe and beyond. This includes the cybersecurity priorities formulated by the current German government which took office in the spring of 2018.

Cybersecurity Lessons from CoVID-19

by Robert Slade

Using the SARS-CoV-2/CoVID-19 pandemic as a giant case study, and following the structure of the domains of information security, this book looks at what the crisis teaches us about security. It points out specific security fundamentals where social, medical, or business responses to the crisis failed or needed to make specific use of those concepts. For the most part, these lessons are simply reminders of factors that get neglected during times of non-crisis. The lessons particularly point out the importance of planning and resilience in systems and business. Those studying cybersecurity and its preventive measures and applications, as well as those involved in risk management studies and assessments, will all benefit greatly from the book. Robert Slade has had an extensive and prolific career in management, security, and telecommunications research, analysis, and consultancy. He has served as an educator visiting universities and delivering lecturers and seminars.

Cybersecurity Readiness: A Holistic and High-Performance Approach

by Dave Chatterjee

Cybersecurity has traditionally been the purview of information technology professionals, who possess specialized knowledge and speak a language that few outside of their department can understand. In our current corporate landscape, however, cybersecurity awareness must be an organization-wide management competency in order to mitigate major threats to an organization’s well-being—and be prepared to act if the worst happens. With rapidly expanding attacks and evolving methods of attack, organizations are in a perpetual state of breach and have to deal with this existential threat head-on. Cybersecurity preparedness is a critical and distinctive competency, and this book is intended to help students and practitioners develop and enhance this capability, as individuals continue to be both the strongest and weakest links in a cyber defense system. In addition to providing the non-specialist with a jargon-free overview of cybersecurity threats, Dr. Chatterjee focuses most of the book on developing a practical and easy-to-comprehend management framework and success factors that will help leaders assess cybersecurity risks, address organizational weaknesses, and build a collaborative culture that is informed and responsive. Through brief case studies, literature review, and practical tools, he creates a manual for the student and professional alike to put into practice essential skills for any workplace.

Cybersecurity Readiness: A Holistic and High-Performance Approach

by Dave Chatterjee

Cybersecurity has traditionally been the purview of information technology professionals, who possess specialized knowledge and speak a language that few outside of their department can understand. In our current corporate landscape, however, cybersecurity awareness must be an organization-wide management competency in order to mitigate major threats to an organization’s well-being—and be prepared to act if the worst happens. With rapidly expanding attacks and evolving methods of attack, organizations are in a perpetual state of breach and have to deal with this existential threat head-on. Cybersecurity preparedness is a critical and distinctive competency, and this book is intended to help students and practitioners develop and enhance this capability, as individuals continue to be both the strongest and weakest links in a cyber defense system. In addition to providing the non-specialist with a jargon-free overview of cybersecurity threats, Dr. Chatterjee focuses most of the book on developing a practical and easy-to-comprehend management framework and success factors that will help leaders assess cybersecurity risks, address organizational weaknesses, and build a collaborative culture that is informed and responsive. Through brief case studies, literature review, and practical tools, he creates a manual for the student and professional alike to put into practice essential skills for any workplace.

Cyberspace Crime (International Library Of Criminology, Criminal Justice And Penology - Second Ser. #Vol. 2)

by David S. Wall

This book was published in 2003.This book is a collection of key texts that have contributed towards, or have reflected, the various debates that have taken place over crime and the internet during that past decade. The texts are organised into three parts. The first contains a number of viewpoints and perspectives that facilitate our broader understanding of cyberspace crime/ cybercrimes. The second part addresses each of the major types of cybercrime - trespass/ hacking/cracking, thefts/ deceptions, obscenities/ pornography, violence - and illustrate their associated problems of definition and resolution. The third and final part contains a selection of texts that each deal with the impact of cyberspace crime upon specific criminal justice processes: the police and the trial process.

Cyberspace Data and Intelligence, and Cyber-Living, Syndrome, and Health: International 2020 Cyberspace Congress, CyberDI/CyberLife 2020, Beijing, China, December 10–12, 2020, Proceedings (Communications in Computer and Information Science #1329)

by Huansheng Ning Feifei Shi

This volume constitutes the proceedings of the Forth International Conference on Cyberspace Data and Intelligence, Cyber DI 2020, and the International Conference on Cyber-Living, Cyber-Syndrome, and Cyber-Health, CyberLife 2020, held under the umbrella of the 2020 Cyberspace Congress, held in Beijing, China, in December 2020.*The 13 full papers presented were carefully reviewed and selected from 36 submissions. The papers are grouped in the following topics: machine learning and ubiquitous and intelligent computing. * The conference was held virtually due to the COVID-19 pandemic.

Cyberspace Divide: Equality, Agency and Policy in the Information Society

by Brian D. Loader

The dramatic advances in computer and telecommunications technologies such as the Internet, virtual reality, smart cards or multimedia applications are increasingly regarded as ushering in a new form of society: the information society. Politicians, policy makers and business gurus are all encouraging us to join the information superhighway at the nearest junction or risk being excluded from the social and economic benefits of the information revolution. Cyberspace Divide critically considers the complex relationship between technological change, its effect upon social divisions, its consequences for social action and the emerging strategies for social inclusion in the Information Age. Cyberspace Divide will be invaluable reading for those studying social policy, sociology, computing and communication studies.

Cyberspace Safety and Security: 10th International Symposium, CSS 2018, Amalfi, Italy, October 29–31, 2018, Proceedings (Lecture Notes in Computer Science #11161)

by Arcangelo Castiglione Florin Pop Massimo Ficco Francesco Palmieri

This book constitutes the proceedings of the 10th International Symposium on Cyberspace Safety and Security, CSS 2018, held in Amalfi, Italy, in October 2018. The 25 full papers presented in this volume were carefully reviewed and selected from 79 submissions.The papers focus on cybersecurity; cryptography, data security, and biometric techniques; and social security, ontologies, and smart applications.

Cyberspace Safety and Security: 14th International Symposium, CSS 2022, Xi'an, China, October 16–18, 2022, Proceedings (Lecture Notes in Computer Science #13547)

by Xiaofeng Chen Jian Shen Willy Susilo

This book LNCS 13547 constitutes the proceedings of the 14th International Symposium on Cyberspace Safety and Security, CSS 2022, held in Xi’an, China, in October 2022.The 26 revised full papers presented were carefully reviewed and selected from 104 initial submissions. The papers focus on Cyberspace Safety and Security, such as authentication, access control, availability, integrity, privacy, confidentiality, dependability and sustainability issues of cyberspace.

Cyberspace Safety and Security: 11th International Symposium, CSS 2019, Guangzhou, China, December 1–3, 2019, Proceedings, Part II (Lecture Notes in Computer Science #11983)

by Jaideep Vaidya Xiao Zhang Jin Li

The two volumes LNCS 11982 and 11983 constitute the proceedings of the 11th International Symposium on Cyberspace Safety and Security, CSS 2019, held in Guangzhou, China, in December 2019.The 61 full papers and 40 short papers presented were carefully reviewed and selected from 235 submissions. The papers cover a broad range of topics in the field of cyberspace safety and security, such as authentication, access control, availability, integrity, privacy, confidentiality, dependability and sustainability issues of cyberspace. They are organized in the following topical sections: network security; system security; information security; privacy preservation; machine learning and security; cyberspace safety; big data and security; and cloud and security;

Cyberspace Safety and Security: 9th International Symposium, CSS 2017, Xi’an China, October 23–25, 2017, Proceedings (Lecture Notes in Computer Science #10581)

by Wei Wu Aniello Castiglione Sheng Wen

This book constitutes the proceedings of the 9th International Symposium on Cyberspace Safety and Security, CSS 2017, held in Xi'an, China in October 2017. The 31 full papers and 10 short papers presented in this volume were carefully reviewed and selected from 120 submissions. The papers focus on cyberspace safety and security such as authentication, access control, availability, integrity, privacy, confidentiality, dependability and sustainability issues of cyberspace.

Cyberwars in the Middle East (War Culture)

by Ahmed Al-Rawi

Cyberwars in the Middle East argues that hacking is a form of online political disruption whose influence flows vertically in two directions (top-bottom or bottom-up) or horizontally. These hacking activities are performed along three political dimensions: international, regional, and local. Author Ahmed Al-Rawi argues that political hacking is an aggressive and militant form of public communication employed by tech-savvy individuals, regardless of their affiliations, in order to influence politics and policies. Kenneth Waltz’s structural realism theory is linked to this argument as it provides a relevant framework to explain why nation-states employ cyber tools against each other. On the one hand, nation-states as well as their affiliated hacking groups like cyber warriors employ hacking as offensive and defensive tools in connection to the cyber activity or inactivity of other nation-states, such as the role of Russian Trolls disseminating disinformation on social media during the US 2016 presidential election. This is regarded as a horizontal flow of political disruption. Sometimes, nation-states, like the UAE, Saudi Arabia, and Bahrain, use hacking and surveillance tactics as a vertical flow (top-bottom) form of online political disruption by targeting their own citizens due to their oppositional or activists’ political views. On the other hand, regular hackers who are often politically independent practice a form of bottom-top political disruption to address issues related to the internal politics of their respective nation-states such as the case of a number of Iraqi, Saudi, and Algerian hackers. In some cases, other hackers target ordinary citizens to express opposition to their political or ideological views which is regarded as a horizontal form of online political disruption. This book is the first of its kind to shine a light on many ways that governments and hackers are perpetrating cyber attacks in the Middle East and beyond, and to show the ripple effect of these attacks.

Cyborg Futures: Cross-disciplinary Perspectives on Artificial Intelligence and Robotics (Social and Cultural Studies of Robots and AI)

by Teresa Heffernan

This volume brings together academics from evolutionary biology, literary theory, robotics, digital culture, anthropology, sociology, and environmental studies to consider the impact of robotics and AI on society. By bringing these perspectives together in one book, readers gain a sense of the complex scientific, social, and ideological contexts within which AI and robotics research is unfolding, as well as the illusory suppositions and distorted claims being mobilized by the industry in the name of bettering humanity’s future. Discussions about AI and robotics have been shaped by computer science and engineering, steered by corporate and military interests, forged by transhumanist philosophy and libertarian politics, animated by fiction, and hyped by the media. From fiction passing as science to the illusion of AI autonomy to the business of ethics to the automation of war, this collection recognizes the inevitable entanglement of humanity and technology, while exposing the problematic assumptions and myths driving the field in order to better assess its risks and potential.

Cyborg-TV

by Sven Stollfuß

In Zeiten hoher Forderungen nach Optimierung und Leistungssteigerung scheint der Mensch im 21. Jahrhundert erneut in der Krise. Als Seismograf und Motor kritischer, kultureller Selbstbeschreibung wird in diesem Zusammenhang die TV-Serie auf ihr Einwirken auf gesellschaftliche Selbstverständigungsdiskurse untersucht. Mit Analysen zu Serien wie u.a. Orphan Black und Continuum oder auch Dark Angel und The Six Million Dollar Man arbeitet das Buch Kybernetik und Genetik als Bestandteile einer gemeinsamen Populärkultur der computertechnologischen Informatisierung unter Voraussetzung eines politisierenden Potentials des kybernetischen Körpers innerhalb der nordamerikanischen Fernsehserienkultur auf.

Cyburbia: The Dangerous Idea That's Changing How We Live and Who We Are

by James Harkin

Once there was no text messaging. No email and no social network sites like Facebook, Bebo and MySpace. The way we live has apparently been transformed by new ways of communicating. But where did these trends start? And if they can change our behaviour, can they also change the way we think?In Cyburbia James Harkin describes how the architecture of our digital lives was built over seventy years. In a brilliant narrative that encompasses the work of crackpots, inventors and visionaries, it shows how a concept that began with the need to shoot down German bombers has evolved to govern almost everything - from our lives online to modern films like Memento and 21 Grams, from TV shows and plays to military strategy. Gripping, revelatory and fiercely intelligent, this extraordinary book will change forever the way you think about everything you do.

Cycle of Lies: The Fall of Lance Armstrong

by Juliet Macur

The definitive account of Lance Armstrong's spectacular rise and fall.In June 2013, when Lance Armstrong fled his palatial home in Texas, downsizing in the face of multimillion-dollar lawsuits, Juliet Macur was there—talking to his girlfriend and children and listening to Armstrong's version of the truth. She was one of the few media members aside from Oprah Winfrey to be granted extended one-on-one access to the most famous pariah in sports.At the center of Cycle of Lies is Armstrong himself, revealed through face-to-face interviews.But this unfolding narrative is given depth and breadth by the firsthand accounts of more than one hundred witnesses, including family members whom Armstrong had long since turned his back on—the adoptive father who gave him the Armstrong name, a grandmother, an aunt. Perhaps most damning of all is the taped testimony of the late J.T. Neal, the most influential of Armstrong's many father figures, recorded in the final years of Neal's life as he lost his battle with cancer just as Armstrong gained fame for surviving the disease.In the end, it was Armstrong's former friends, those who had once occupied the precious space of his inner circle, who betrayed him. They were the ones who dealt Armstrong his fatal blow by breaking the code of silence that shielded the public from the grim truth about the sport of cycling—and the grim truth about its golden boy, Armstrong.Threading together the vivid and disparate voices of those with intimate knowledge of the private and public Armstrong, Macur weaves a comprehensive and unforgettably rich tapestry of one man's astonishing rise to global fame and fortune and his devastating fall from grace.

Cycle of Segregation: Social Processes and Residential Stratification

by Maria Krysan Kyle Crowder

The Fair Housing Act of 1968 outlawed housing discrimination by race and provided an important tool for dismantling legal segregation. But almost fifty years later, residential segregation remains virtually unchanged in many metropolitan areas, particularly where large groups of racial and ethnic minorities live. Why does segregation persist at such high rates and what makes it so difficult to combat? In Cycle of Segregation, sociologists Maria Krysan and Kyle Crowder examine how everyday social processes shape residential stratification. Past neighborhood experiences, social networks, and daily activities all affect the mobility patterns of different racial groups in ways that have cemented segregation as a self-perpetuating cycle in the twenty-first century. Through original analyses of national-level surveys and in-depth interviews with residents of Chicago, Krysan and Crowder find that residential stratification is reinforced through the biases and blind spots that individuals exhibit in their searches for housing. People rely heavily on information from friends, family, and coworkers when choosing where to live. Because these social networks tend to be racially homogenous, people are likely to receive information primarily from members of their own racial group and move to neighborhoods that are also dominated by their group. Similarly, home-seekers who report wanting to stay close to family members can end up in segregated destinations because their relatives live in those neighborhoods. The authors suggest that even absent of family ties, people gravitate toward neighborhoods that are familiar to them through their past experiences, including where they have previously lived, and where they work, shop, and spend time. Because historical segregation has shaped so many of these experiences, even these seemingly race-neutral decisions help reinforce the cycle of residential stratification. As a result, segregation has declined much more slowly than many social scientists have expected. To overcome this cycle, Krysan and Crowder advocate multi-level policy solutions that pair inclusionary zoning and affordable housing with education and public relations campaigns that emphasize neighborhood diversity and high-opportunity areas. They argue that together, such programs can expand the number of destinations available to low-income residents and help offset the negative images many people hold about certain neighborhoods or help introduce them to places they had never considered. Cycle of Segregation demonstrates why a nuanced understanding of everyday social processes is critical for interrupting entrenched patterns of residential segregation.

Refine Search

Showing 9,801 through 9,825 of 49,558 results