Search Results - "cyberspace"
Suggested Topics within your search.
Suggested Topics within your search.
- Cyberspace 104
- Internet 68
- Social aspects 52
- Security measures 42
- Computer networks 38
- Cyberterrorism 26
- Prevention 26
- Information warfare 22
- Computers and civilization 20
- Information technology 18
- Computers 16
- Government policy 16
- History 16
- Political aspects 16
- Law and legislation 14
- Technological innovations 14
- Computer network resources 13
- Censorship 12
- Computer crimes 12
- Computer security 12
- Mass media 10
- Psychological aspects 10
- Access control 8
- Communication 8
- Distance education 8
- History and criticism 8
- Information society 8
- Information superhighway 8
- Moral and ethical aspects 8
- National security 8
-
221
Legal issues in information security /
Published 2015Table of Contents: “…Laws influencing information security -- Security and privacy of consumer financial information -- Security and privacy of information belonging to children and in educational records -- Security and privacy of health information -- Corporate information security and privacy regulation -- Federal government information security and privacy regulations -- State laws protecting citizen information and breach notification laws -- Intellectual property law -- The role of contracts -- Criminal law and tort law issues in cyberspace -- Part Three. Security and privacy in organizations -- Information security governance -- Risk analysis, incident response, and contingency planning -- Computer forensics and investigations.…”
Book -
222
Legal issues in information security /
Published 2015Table of Contents: “…Laws influencing information security -- Security and privacy of consumer financial information -- Security and privacy of information belonging to children and in educational records -- Security and privacy of health information -- Corporate information security and privacy regulation -- Federal government information security and privacy regulations -- State laws protecting citizen information and breach notification laws -- Intellectual property law -- The role of contracts -- Criminal law and tort law issues in cyberspace -- Part Three. Security and privacy in organizations -- Information security governance -- Risk analysis, incident response, and contingency planning -- Computer forensics and investigations.…”
Book -
223
The Harvard sampler liberal education for the twenty-first century /
Published 2011Table of Contents: “…Asani -- American literature and the American environment : there never was an "is" without a "where" / Lawrence Buell -- The Internet and Hieronymus Bosch : fear, protection, and liberty in cyberspace / Harry R. Lewis -- Nothing in biology makes sense except in the light of evolution : pattern, process, and the evidence / Jonathan B. …”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
224
The Harvard sampler liberal education for the twenty-first century /
Published 2011Table of Contents: “…Asani -- American literature and the American environment : there never was an "is" without a "where" / Lawrence Buell -- The Internet and Hieronymus Bosch : fear, protection, and liberty in cyberspace / Harry R. Lewis -- Nothing in biology makes sense except in the light of evolution : pattern, process, and the evidence / Jonathan B. …”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
225
Sitings critical approaches to Korean geography /
Published 2008Table of Contents: “…Nemeth -- Auspicious places in a mobile landscape: of shamans, shrines, and dreams / Laurel Kendall -- Kyeryong Mountain as Contested Place / Je-Hun Ryu -- Kyôngju namsan: heterotopia, place-agency, and historiographic leverage / Robert Oppenheim Margin -- The Seoul train station square and homeless shelters: thoughts on geographical history regarding welfare citizenship / Jesook Song -- Cyberspace and a space for gays in South Korea / Michael J. …”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
226
Sitings critical approaches to Korean geography /
Published 2008Table of Contents: “…Nemeth -- Auspicious places in a mobile landscape: of shamans, shrines, and dreams / Laurel Kendall -- Kyeryong Mountain as Contested Place / Je-Hun Ryu -- Kyôngju namsan: heterotopia, place-agency, and historiographic leverage / Robert Oppenheim Margin -- The Seoul train station square and homeless shelters: thoughts on geographical history regarding welfare citizenship / Jesook Song -- Cyberspace and a space for gays in South Korea / Michael J. …”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
227
Digital media and democracy tactics in hard times /
Published 2008Table of Contents: “…The shape of publics : new media and global capitalism -- The state of the media : an interview with Robert McChesney / Megan Boler -- The space of tactical media / Alessandra Renzi -- Communicative capitalism : circulation and the foreclosure of politics / Jodi Dean -- Toward open and dense networks : an interview with Geert Lovink / Megan Boler -- Black code redux : censorship, surveillance, and the militarization of cyberspace / Ronald J. Deibert -- Media and democracy / Susan D. …”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
228
Digital media and democracy tactics in hard times /
Published 2008Table of Contents: “…The shape of publics : new media and global capitalism -- The state of the media : an interview with Robert McChesney / Megan Boler -- The space of tactical media / Alessandra Renzi -- Communicative capitalism : circulation and the foreclosure of politics / Jodi Dean -- Toward open and dense networks : an interview with Geert Lovink / Megan Boler -- Black code redux : censorship, surveillance, and the militarization of cyberspace / Ronald J. Deibert -- Media and democracy / Susan D. …”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
229
Computer-mediated communication linguistic, social, and cross-cultural perspectives /
Published 1996Table of Contents: “…Simutis -- Group dynamics in an e-mail forum / Joan Korenman and Nancy Wyatt -- Writing to work : how using e-mail can reflect technological and organizational change / Oren Ziv -- The rhetorical dynamics of a community protest in cyberspace : what happened with Lotus marketplace / Laura J. …”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
230
Computer-mediated communication linguistic, social, and cross-cultural perspectives /
Published 1996Table of Contents: “…Simutis -- Group dynamics in an e-mail forum / Joan Korenman and Nancy Wyatt -- Writing to work : how using e-mail can reflect technological and organizational change / Oren Ziv -- The rhetorical dynamics of a community protest in cyberspace : what happened with Lotus marketplace / Laura J. …”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
231
Technology and the good life?
Published 2000Table of Contents: “…Crossing the Postmodern Divide with -- Borgmann, or Adventures in Cyberspace 234 -- Douglas Kellner -- 14. Technology and Temporal Ambiguity 256 -- Mora Campbell -- 15. …”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
232
Technology and the good life?
Published 2000Table of Contents: “…Crossing the Postmodern Divide with -- Borgmann, or Adventures in Cyberspace 234 -- Douglas Kellner -- 14. Technology and Temporal Ambiguity 256 -- Mora Campbell -- 15. …”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
233
Security/Mobility : Politics of Movement /
Published 2017Table of Contents: “…1 Introduction: Security/ Mobility and the politics of movement -- 1 Prologue: Movement then and now -- 2 Connectivity as problem: security, mobility, liberals, and Christians -- Part I: Things on the move -- 3 The power of cyberspace centralisation: analysing the example of data territorialisation -- 4 Commercialised occupation skills: Israeli security experience as an international brand -- 5 Mobility, circulation, and homeomorphism: data becoming risk information -- Part II: People on the move -- 6 'Illegals' in the Law School of Athens: public presence, discourse, and migrants as threat -- 7 The management of African asylum seekers and the imaginary of the border in Israel -- 8 Reinventing political order? …”
Full text available:
Electronic eBook -
234
Security/Mobility : Politics of Movement /
Published 2017Table of Contents: “…1 Introduction: Security/ Mobility and the politics of movement -- 1 Prologue: Movement then and now -- 2 Connectivity as problem: security, mobility, liberals, and Christians -- Part I: Things on the move -- 3 The power of cyberspace centralisation: analysing the example of data territorialisation -- 4 Commercialised occupation skills: Israeli security experience as an international brand -- 5 Mobility, circulation, and homeomorphism: data becoming risk information -- Part II: People on the move -- 6 'Illegals' in the Law School of Athens: public presence, discourse, and migrants as threat -- 7 The management of African asylum seekers and the imaginary of the border in Israel -- 8 Reinventing political order? …”
Full text available:
Electronic eBook -
235
Virtual society? Technology, cyberbole, reality /
Published 2009Table of Contents: “…Inside the bubble : communion, cognition, and deep play at the intersection of Wall Street and cyberspace / Melvin Pollner -- 14. The day-to-day work of standardization : a sceptial note on the reliance on IT in a retail bank / John A. …”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
236
Virtual society? Technology, cyberbole, reality /
Published 2009Table of Contents: “…Inside the bubble : communion, cognition, and deep play at the intersection of Wall Street and cyberspace / Melvin Pollner -- 14. The day-to-day work of standardization : a sceptial note on the reliance on IT in a retail bank / John A. …”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
237
-
238