Browse Results

Showing 9,851 through 9,875 of 52,613 results

Cybercrime and Digital Deviance

by Roderick S. Graham 'Shawn K. Smith

Cybercrime and Digital Deviance, Second Edition, combines insights from sociology, criminology, psychology, and cybersecurity to explore cybercrimes such as hacking, identity theft, and romance scams, along with forms of digital deviance such as pornography addiction, trolling, and “canceling” people for perceived violations of norms.Other issues are explored including cybercrime investigations, nation-state cybercrime, the use of algorithms in policing, cybervictimization, and expanded discussion of the theories used to explain cybercrime. Graham and Smith conceptualize the online space as a distinct environment for social interaction, framing their work with assumptions informed by their respective work in urban sociology and spatial criminology, and offering an engaging entry point for understanding what may appear to be a technologically complex course of study. The authors apply a modified version of a typology developed by David Wall: cybertrespass, cyberfraud, cyberviolence, and cyberpornography. This typology is simple enough for students just beginning their inquiry into cybercrime, while its use of legal categories of trespassing, fraud, violent crimes against persons, and moral transgressions provides a solid foundation for deeper study. In this edition each chapter includes a new “Current Events and Critical Thinking” section, using concepts from the chapter to explore a specific event or topic like the effect of disinformation on social cohesion and politics.Taken together, Graham and Smith’s application of a digital environment and Wall’s cybercrime typology makes this an ideal upper-level text for students in sociology and criminal justice. It is also an ideal introductory text for students within the emerging disciplines of cybercrime and cybersecurity.

Cybercrime and Digital Deviance

by Roderick Graham 'Shawn Smith

Cybercrime and Digital Deviance is a work that combines insights from sociology, criminology, and computer science to explore cybercrimes such as hacking and romance scams, along with forms of cyberdeviance such as pornography addiction, trolling, and flaming. Other issues are explored including cybercrime investigations, organized cybercrime, the use of algorithms in policing, cybervictimization, and the theories used to explain cybercrime. Graham and Smith make a conceptual distinction between a terrestrial, physical environment and a single digital environment produced through networked computers. Conceptualizing the online space as a distinct environment for social interaction links this text with assumptions made in the fields of urban sociology or rural criminology. Students in sociology and criminology will have a familiar entry point for understanding what may appear to be a technologically complex course of study. The authors organize all forms of cybercrime and cyberdeviance by applying a typology developed by David Wall: cybertrespass, cyberdeception, cyberviolence, and cyberpornography. This typology is simple enough for students just beginning their inquiry into cybercrime. Because it is based on legal categories of trespassing, fraud, violent crimes against persons, and moral transgressions it provides a solid foundation for deeper study. Taken together, Graham and Smith’s application of a digital environment and Wall’s cybercrime typology makes this an ideal upper level text for students in sociology and criminal justice. It is also an ideal introductory text for students within the emerging disciplines of cybercrime and cybersecurity.

Cyberdipendenza

by Juan Moisés de la Serna Sara Caceffo

La tecnologia è ogni giorno più presente nelle nostre vite. Questo comporta un evidente progresso, ma anche un pericolo, specialmente fra i più giovani, che possono cadere nella cosiddetta cyberdipendenza . Questa si è convertita in una realtà del giorno d'oggi, un problema di salute che non esisteva affatto appena una decina di anni fa, e che ogni giorno provoca nuove vittime, sempre più giovani. Sebbene le conseguenze a lungo termine siano ancora sconosciute, alcuni studi rivelano che il fenomeno riguarda un 30% dei giovani che usano Internet quotidianamente, presupponendo così che un giovane su tre sia a rischio di sviluppare una dipendenza di tipo comportamentale. Nonostante alcuni paesi stiano iniziando ad adottare misure per prevenire il problema, altri ancora non percepiscono la gravità della situazione, di qui segue la necessità di divulgare i risultati delle ultime indagini in tema e dare visibilità a un problema sociale che richiede misure tanto preventive quanto terapeutiche.

Cyberkids: Youth Identities and Communities in an On-line World

by Gill Valentine Sarah Holloway

As Tony Blair has said, "Technology has revolutionised the way we work and is now set to transform education. Children cannot be effective in tomorrow's world if they are trained in yesterday's skills."Cyberkids draws together research in the sociology of childhood and social studies of technology to explore children's experiences in the Information Age. The book addresses key policy debates about social inclusion and exclusion, children's identities and friendships in on-line and off-line worlds and their relationships with families and teachers. It counters contemporary moral panics about children's risk from dangerous strangers on-line, about corruption and lost innocence from adult-centred material on the web and about the addiction to life on the screen. Instead, by showing how children use ICT in balanced and sophisticated ways, the book draws out the importance of everyday uses of technology and the ways in which children's local experiences are embedded within, and in part, constitute the global.

Cyberlibertarianism: The Right-Wing Politics of Digital Technology

by David Golumbia

An urgent reckoning with digital technology&’s fundamentally right-wing legal and economic underpinnings In a timely challenge to the potent political role of digital technology, Cyberlibertarianism argues that right-wing ideology was built into both the technical and social construction of the digital world from the start. Leveraging more than a decade of research, David Golumbia traces how digital evangelism has driven the worldwide shift toward the political right, concealing inequality, xenophobia, dishonesty, and massive corporate concentrations of wealth and power beneath the utopian presumption of digital technology as an inherent social good. Providing an incisive critique of the push for open access and open-source software and the legal battles over online censorship and net neutrality, Cyberlibertarianism details how the purportedly democratic internet has been employed as an organizing tool for terror and hate groups and political disinformation campaigns. As he unpacks our naively utopian conception of the digital world, Golumbia highlights technology&’s role in the advancement of hyperindividualist and antigovernment agendas, demonstrating how Silicon Valley corporations and right-wing economists; antiestablishment figures such as Julian Assange, Elon Musk, Peter Thiel, Edward Snowden, and Mark Zuckerberg; and seemingly positive voices such as John Perry Barlow, Cory Doctorow, the Electronic Freedom Foundation, and Wikipedia all have worked to hamper regulation and weaken legal safeguards against exploitation. Drawing from a wide range of thought in digital theory, economics, law, and political philosophy as well as detailed research and Golumbia&’s own experience as a software developer, Cyberlibertarianism serves as a clarion call to reevaluate the fraught politics of the internet. In the hope of providing a way of working toward a more genuinely democratic and egalitarian future for digital technology, this magisterial work insists that we must first understand the veiled dogmas from which it has been constructed. Retail e-book files for this title are screen-reader friendly.

Cybernetic Avatar

by Hiroshi Ishiguro Fuki Ueno Eiki Tachibana

This open access book presents a vision of a future, where avatars play an integral role in shaping the fabric of our interconnected society. The book introduces the authors’ ongoing efforts to advance avatar technologies and is structured into nine chapters. Chapter 1 discusses the potentially revolutionary impact of cybernetic avatars (CAs) as a new medium of communication, liberating individuals from physical barriers and creating more flexible work environments. Chapters 2, 3, and 4 present developments in CAs with advanced autonomous functionality. Chapters 5 and 6 discuss the creation of a CA platform that connects multiple operators and CAs. Chapter 7 explores the physiological and neuroscientific effects of avatars and other media on operators and users. Finally, Chapters 8 and 9 discuss the societal implementation of CAs. This book is stemmed from one of the Moonshot R&D projects funded by the Japan Science and Technology Agency (JST).

Cybernetic Psychology and Mental Health: A Circular Logic Of Control Beyond The Individual (Concepts for Critical Psychology)

by Timothy J. Beck

This book explores the cultural importance of cybernetic technologies and their relationship to human experience through a critical theoretical lens. Bringing several often-marginalized histories of cybernetics, psychology, and mental health into dialogue with one another, Beck questions common assumptions about human life such as that our minds operate as information processing machines and our neurons communicate with one another. Rather than suggest that such ideas are either right or wrong, however, this book analyzes how and why we have come to frame questions about ourselves in these ways, as if our brains were our own personal computers. Here, the rationality underlying information theories in psychology is followed to its logical conclusion, only to find it circles back to where it began: engineered methods of human control. After tracing a series of recent developments in this vein across fields related to mental health, Beck highlights emerging psychosocial alternatives by incorporating recent work of scholars and activists who have already begun creating collective support networks in radical ways. Their work overlaps fruitfully with ideas from those, including Gilbert Simondon and Fernand Deligny, who foresaw many of the current problems with how information theories have been coupled with psychology and mental health care. This book is fascinating reading for advanced undergraduate and postgraduate students across psychology, mental health programs, and digital media studies, and academics and researchers with a theoretical interest in the philosophy of technology. It’s also an interesting resource for professionals with a practical interest in organizing care services under the data-driven imperatives of contemporary capitalism.

Cybernetics and the Constructed Environment: Design Between Nature and Technology

by Zihao Zhang

Grounded in contemporary landscape architecture theory and practice, Cybernetics and the Constructed Environment blends examples from art, design, and engineering with concepts from cybernetics and posthumanism, offering a transdisciplinary examination of the ramifications of cybernetics on the constructed environment. Cybernetics, or the study of communication and control in animals and machines, has grown increasingly relevant nearly 80 years after its inception. Cyber-physical systems, sensing networks, and spatial computing—algorithms and intelligent machines—create endless feedback loops with human and non-human actors, co-producing a cybernetic environment. Yet, when an ecosystem is meticulously managed by intelligent machines, can we still call it wild nature? Posthumanism ideas, such as new materialism, actor-network theory, and object-oriented ontology, have become increasingly popular among design disciplines, including landscape architecture, and may have provided transformative frameworks to understand this entangled reality. However, design still entails a sense of intentionality and an urge to control. How do we, then, address the tension between the designer’s intentionality and the co-produced reality of more-than-human agents in the cybernetic environment? Is posthumanism enough to develop a framework to think beyond our all-too-human ways of thinking? For researchers, scholars, practitioners, and students in environmental design and engineering disciplines, this book maps out a paradigm of environmentalism and ecological design rooted in non-communication and uncontrollability, and puts a speculative turn on cybernetics.Chapters 8 and 9 of this book are freely available as a downloadable Open Access PDF at http://www.taylorfrancis.com under a Creative Commons Attribution-Non Commercial-No Derivatives (CC-BY-NC-ND) 4.0 license.

Cybernics: Fusion of human, machine and information systems

by Yoshiyuki Sankai Kenji Suzuki Yasuhisa Hasegawa

Cybernics plays a significant role in coping with an aging society using state-of-the-art technologies from engineering, clinical medicine and humanities. This new interdisciplinary field studies technologies that enhance, strengthen, and support physical and cognitive functions of human beings, based on the fusion of human, machine, and information systems. The design of a seamless interface for interaction between the interior and exterior of the human body is described in this book from diverse aspects such as the physical, neurophysiological, and cognitive levels. It is the first book to cover the many aspects of cybernics, allowing readers to understand the life support robotics technology for the elderly, including remote, in-home, hospital, institutional, community medical welfare, and vital-sensing systems. Serving as a valuable resource, this volume will interest not only graduate students, scientists, and engineers but also newcomers to the field of cybernics.

Cyberpower: An Introduction to the Politics of Cyberspace

by Tim Jordan

This is the first complete introduction to and analysis of the politics of the internet. Chapters are arranged around key words and use case studies to guide the reader through a wealth of material.Cyberpower presents all the key concepts of cyberspace including:* power and cyberspace* the virtual individual* society in cyberspace* imagination and the internet.

Cyberprotest: New Media, Citizens and Social Movements

by Dieter Rucht Brian D. Loader Paul G. Nixon Wim Van De Donk

Ever since the anti-globalisation protests in Seattle in 1999 the adoption of new information and communications technologies (ICTs) by social movement activists has offered the prospect for the development of global cyberprotest. The Internet with its transnational many-to-many communication facility offers a revolutionary potential for social movements to go online and circumvent the 'official' messages of political and commercial organisations and the traditional media, by speaking directly to the citizens of the world. Furthermore the use of electronic mail (e-mail), mailing lists, websites, electronic forums and other online applications provide powerful media tools for co-ordinating the activity of often physically dispersed movement actors. Moreover, ICTs may also contribute to the important function of social movements of shaping collective identity and countering the claims and arguments of established political interests. A growing body of literature during the last decades of the twentieth century attests to the significant impact SMs have had upon the restructuring of the political landscape. Most of that literature addresses the more traditional actors and institutions (e.g. parliaments, political parties, bureaucracy etc.). Less attention has been devoted to those manifestations of political action that are concentrated around social movements and all kinds of more or less institutionalised and sustainable forms of citizen mobilisation. This book is a collection of cases that take a critical look into the way ICTs are finding their way into the world of social movements

Cyberpsychology and New Media: A thematic reader

by Andrew Power Gráinne Kirwan

Cyberpsychology is the study of human interactions with the internet, mobile computing and telephony, games consoles, virtual reality, artificial intelligence, and other contemporary electronic technologies. The field has grown substantially over the past few years and this book surveys how researchers are tackling the impact of new technology on human behaviour and how people interact with this technology. Examining topics as diverse as online dating, social networking, online communications, artificial intelligence, health-information seeking behaviour, education online, online therapies and cybercrime, Cyberpsychology and New Media book provides an in-depth overview of this burgeoning field, and allows those with little previous knowledge to gain an appreciation of the diversity of the research being undertaken in the area. Arranged thematically and structured for accessibility, Cyberpsychology and New Media will be essential reading for researchers and students in Social Psychology and Cyberpsychology, and in Communication and Media Studies.

Cyberpsychology and Society: Current Perspectives

by Andrew Dr Power

Human interaction with technology is constantly evolving, with rapid developments in online interaction, gaming, and artificial intelligence all impacting upon and altering our behaviour. The speed of this change has led to an urgent need for a new field of study, cyberpsychology, in order to investigate the ways in which human behaviour is affected by the addition of technology, and the benefits and risks thereof. Cyberpsychology and Society does not offer a description of or justification for the field of study, but is rather a presentation of some of the most recent research in many key sub-topics within the area. Based on the work being done in the Institute of Art, Design and Technology (IADT) in Dublin, Ireland, Cyberpsychology and Society brings together a unique collection of writings by contributors on cyberpsychology in relation to health, education, gaming, consumer behaviour, and social change in an online world. The book focuses on the impact of societies’ increasing interaction with technology, and is a presentation of some of the most recent research in the area. Describing cutting-edge research while employing a tone which is accessible to both students and academic staff, this book is an invaluable resource for students, researchers and academics of cyberpsychology and related areas.

Cyberpsychology: An Introduction to Human–Computer Interaction

by Norman Kent L.

This textbook provides a comprehensive overview of the human-computer interface in clear, non-technical language, making it an ideal introduction for students of both psychology and computer science. Covering the past, present, and future developments in technology and psychology, it combines cutting-edge academic research with engaging illustrations and examples that show students how the material relates to their lives. Topics addressed include: human factors of input devices, and the basics of sensation and perception; memory and cognitive issues of users navigating their way through interfaces; communication via programming languages and natural speech interaction; cyberpathologies such as techno-stress and Internet addiction disorders; and challenges surrounding automation and artificial intelligence. This thoroughly updated second edition features new chapters on virtual reality and cybersecurity; expanded coverage of social media, mobile computing, e-learning, and video games; and end-of-chapter review questions that ensure students have mastered key objectives.

Cyberpsychology: The Study of Individuals, Society and Digital Technologies

by Monica T. Whitty Garry Young

An important new BPS Textbook in Psychology exploring the interactions between individuals, societies, and digital technologies Outlines key theories and empirical research within cyberpsychology and provides critical assessments of this rapidly changing field Identifies areas in need of further research and ways to use digital technologies as a research tool Covers topics such as online identity, online relationships and dating, pornography, children's use of the internet, cyberbullying, online games and gambling, and deception and online crime Engaging and accessible for students at the undergraduate and graduate level with real life examples, activities, and discussion questions

Cybersecurity Awareness Among Students and Faculty

by Abbas Moallem

In modern times, all individuals need to be knowledgeable about cybersecurity. They must have practical skills and abilities to protect themselves in cyberspace. What is the level of awareness among college students and faculty, who represent the most technologically active portion of the population in any society? According to the Federal Trade Commission’s 2016 Consumer Sentinel Network report, 19 percent of identity theft complaints came from people under the age of 29. About 74,400 young adults fell victim to identity theft in 2016. This book reports the results of several studies that investigate student and faculty awareness and attitudes toward cybersecurity and the resulting risks. It proposes a plan of action that can help 26,000 higher education institutions worldwide with over 207 million college students, create security policies and educational programs that improve security awareness and protection. Features Offers an understanding of the state of privacy awareness Includes the state of identity theft awareness Covers mobile phone protection Discusses ransomware protection Discloses a plan of action to improve security awareness

Cybersecurity Culture

by Gulsebnem Bishop

The culture of cybersecurity is a complex subject. We can look at cybersecurity culture from different perspectives. We can look at it from the organizational point of view or from within the culture. Each organization has a culture. Attitudes toward security have different manifestations in each organizational culture. We also see how the cybersecurity phenomenon unfolds in other cultures is complicated. Each culture reacts differently to this phenomenon. This book will emphasize both aspects of cybersecurity. From the organizational point of view, this book will emphasize the importance of the culture of cybersecurity in organizations, what it is, and how it can be achieved. This includes the human aspects of security, approach and awareness, and how we can design systems that promote the culture of security. It is also important to emphasize the psychological aspects briefly because it is a big part of the human approach.From a cultural point of view, this book will emphasize how different cultures approach the culture of cybersecurity. The cultural complexity of cybersecurity will be noted by giving examples from different cultures. How leadership in different cultures approach security and how different cultures approach change. Case studies from each culture will be presented to demonstrate different approaches to implementing security and training practices. Overall, the textbook will be a good resource for cybersecurity students who want to understand how cultures and organizations within those cultures approach security. It will also provide a good resource for instructors who would like to develop courses on cybersecurity culture.Finally, this book will be an introductory resource for anyone interested in cybersecurity's organizational or cultural aspects.

Cybersecurity Governance in Latin America: States, Threats, and Alliances (SUNY series in Ethics and the Challenges of Contemporary Warfare)

by Carlos Solar

Cybersecurity Governance in Latin America discusses how the massification of the Internet has exposed emerging democracies' high-tech vulnerabilities to cyber-attacks and questions why states have decided to introduce policies and legislation facilitating the militarization of cyberspace. Carlos Solar offers a comparative analysis using the cases of Argentina, Brazil, Chile, Colombia, Mexico, and Venezuela to help navigate the changing security landscape and the growing risks found in the digital domain. His analysis includes a review of civilian and military preparedness emphasizing the ongoing alliances with the world's superpowers to finally debate what are the side effects for peace and development in the Americas from the current cybersecurity rivalry between the United States and China. Providing a much-needed account of state-technology affairs in the global south Cybersecurity Governance in Latin America challenges scholars and policymakers to rethink the protection of cyberspace to avoid unnecessarily sacrificing rights and freedoms in the name of national security.

Cybersecurity Lessons from CoVID-19

by Robert Slade

Using the SARS-CoV-2/CoVID-19 pandemic as a giant case study, and following the structure of the domains of information security, this book looks at what the crisis teaches us about security. It points out specific security fundamentals where social, medical, or business responses to the crisis failed or needed to make specific use of those concepts. For the most part, these lessons are simply reminders of factors that get neglected during times of non-crisis. The lessons particularly point out the importance of planning and resilience in systems and business. Those studying cybersecurity and its preventive measures and applications, as well as those involved in risk management studies and assessments, will all benefit greatly from the book. Robert Slade has had an extensive and prolific career in management, security, and telecommunications research, analysis, and consultancy. He has served as an educator visiting universities and delivering lecturers and seminars.

Cybersecurity Readiness: A Holistic and High-Performance Approach

by Dave Chatterjee

Cybersecurity has traditionally been the purview of information technology professionals, who possess specialized knowledge and speak a language that few outside of their department can understand. In our current corporate landscape, however, cybersecurity awareness must be an organization-wide management competency in order to mitigate major threats to an organization’s well-being—and be prepared to act if the worst happens. With rapidly expanding attacks and evolving methods of attack, organizations are in a perpetual state of breach and have to deal with this existential threat head-on. Cybersecurity preparedness is a critical and distinctive competency, and this book is intended to help students and practitioners develop and enhance this capability, as individuals continue to be both the strongest and weakest links in a cyber defense system. In addition to providing the non-specialist with a jargon-free overview of cybersecurity threats, Dr. Chatterjee focuses most of the book on developing a practical and easy-to-comprehend management framework and success factors that will help leaders assess cybersecurity risks, address organizational weaknesses, and build a collaborative culture that is informed and responsive. Through brief case studies, literature review, and practical tools, he creates a manual for the student and professional alike to put into practice essential skills for any workplace.

Cybersecurity Readiness: A Holistic and High-Performance Approach

by Dave Chatterjee

Cybersecurity has traditionally been the purview of information technology professionals, who possess specialized knowledge and speak a language that few outside of their department can understand. In our current corporate landscape, however, cybersecurity awareness must be an organization-wide management competency in order to mitigate major threats to an organization’s well-being—and be prepared to act if the worst happens. With rapidly expanding attacks and evolving methods of attack, organizations are in a perpetual state of breach and have to deal with this existential threat head-on. Cybersecurity preparedness is a critical and distinctive competency, and this book is intended to help students and practitioners develop and enhance this capability, as individuals continue to be both the strongest and weakest links in a cyber defense system. In addition to providing the non-specialist with a jargon-free overview of cybersecurity threats, Dr. Chatterjee focuses most of the book on developing a practical and easy-to-comprehend management framework and success factors that will help leaders assess cybersecurity risks, address organizational weaknesses, and build a collaborative culture that is informed and responsive. Through brief case studies, literature review, and practical tools, he creates a manual for the student and professional alike to put into practice essential skills for any workplace.

Cybersecurity in Germany (SpringerBriefs in Cybersecurity)

by Martin Schallbruch Isabel Skierka

In 2016, Germany's government presented its third cybersecurity strategy, which aims to strengthen the national cyber defence architecture, cooperation between the state and industry, and individual users’ agency. For many years, Germany has followed/adopted a preventive and engineering approach to cybersecurity, which emphasizes technological control of security threats in cyberspace over political, diplomatic and military approaches. Accordingly, the technically oriented Federal Office for Information Security (BSI) has played a leading role in Germany’s national cybersecurity architecture. Only in 2016 did the military expand and reorganize its cyber defence capabilities. Moreover, cybersecurity is inextricably linked to data protection, which is particularly emphasised in Germany and has gained high public attention since Edward Snowden’s revelations. On the basis of official documents and their insights from many years of experience in cybersecurity policy, the two authors describe cyber security in Germany in the light of these German peculiarities. They explain the public perception of cybersecurity, its strong link with data protection in Germany, the evolution of Germany's cybersecurity strategies, and the current organisation of cybersecurity across the government and industry. The Brief takes stock of past developments and works out the present and future gaps and priorities in Germany’s cybersecurity policy and strategy, which will be decisive for Germany’s political role in Europe and beyond. This includes the cybersecurity priorities formulated by the current German government which took office in the spring of 2018.

Cyberspace Crime (International Library Of Criminology, Criminal Justice And Penology - Second Ser. #Vol. 2)

by David S. Wall

This book was published in 2003.This book is a collection of key texts that have contributed towards, or have reflected, the various debates that have taken place over crime and the internet during that past decade. The texts are organised into three parts. The first contains a number of viewpoints and perspectives that facilitate our broader understanding of cyberspace crime/ cybercrimes. The second part addresses each of the major types of cybercrime - trespass/ hacking/cracking, thefts/ deceptions, obscenities/ pornography, violence - and illustrate their associated problems of definition and resolution. The third and final part contains a selection of texts that each deal with the impact of cyberspace crime upon specific criminal justice processes: the police and the trial process.

Cyberspace Data and Intelligence, and Cyber-Living, Syndrome, and Health: International 2020 Cyberspace Congress, CyberDI/CyberLife 2020, Beijing, China, December 10–12, 2020, Proceedings (Communications in Computer and Information Science #1329)

by Huansheng Ning Feifei Shi

This volume constitutes the proceedings of the Forth International Conference on Cyberspace Data and Intelligence, Cyber DI 2020, and the International Conference on Cyber-Living, Cyber-Syndrome, and Cyber-Health, CyberLife 2020, held under the umbrella of the 2020 Cyberspace Congress, held in Beijing, China, in December 2020.*The 13 full papers presented were carefully reviewed and selected from 36 submissions. The papers are grouped in the following topics: machine learning and ubiquitous and intelligent computing. * The conference was held virtually due to the COVID-19 pandemic.

Cyberspace Divide: Equality, Agency and Policy in the Information Society

by Brian D. Loader

The dramatic advances in computer and telecommunications technologies such as the Internet, virtual reality, smart cards or multimedia applications are increasingly regarded as ushering in a new form of society: the information society. Politicians, policy makers and business gurus are all encouraging us to join the information superhighway at the nearest junction or risk being excluded from the social and economic benefits of the information revolution. Cyberspace Divide critically considers the complex relationship between technological change, its effect upon social divisions, its consequences for social action and the emerging strategies for social inclusion in the Information Age. Cyberspace Divide will be invaluable reading for those studying social policy, sociology, computing and communication studies.

Refine Search

Showing 9,851 through 9,875 of 52,613 results