Cyberspace

Results: 2446



#Item
571

Children and Young Persons with Abusive and Violent Experiences Connected to Cyberspace Challenges for Research, Rehabilitation, Prevention and Protection In may 2006 the Swedish Children’s Welfare Foundation and the

Add to Reading List

Source URL: www.childcentre.info

Language: English - Date: 2008-11-20 10:23:27
    572Cyberspace / Law / Internet privacy / Legal aspects of computing / Information privacy / Surveillance / Ethics / Privacy / Computer law

    Microsoft Word - Summary e-Conference Stockholm 2008 final.doc

    Add to Reading List

    Source URL: www.juridicum.su.se

    Language: English - Date: 2009-07-03 10:49:09
    573Data security / Computer network security / Computer security / Public safety / Information security / Internet privacy / Cloud computing / NIST Special Publication 800-53 / Department of Defense Strategy for Operating in Cyberspace / Security / Crime prevention / National security

    How TMT organizations perceive their security 88% 68%

    Add to Reading List

    Source URL: deloitte.wsj.com

    Language: English
    574Human behavior / Deception / Bioethics / Cheating / Use of performance-enhancing drugs in sport / Olympic Games / Match fixing / Bribery / Sport governing body / Sports / Drugs in sport / Doping

    The Very Reverend, Vice-Chancellor, colleagues and friends, distinguished guests, followers in Cyberspace, ladies and gentlemen: It is exactly two weeks ago today that a young Austrian man came forward and said:

    Add to Reading List

    Source URL: www.playthegame.org

    Language: English - Date: 2014-05-07 10:21:02
    575Deception / Business ethics / Organized crime / China / Counterfeit medications / Counterfeit consumer goods / Crime / Counterfeit

    DIGITAL CITIZENS ALLIANCE REPORT GARTH BRUEN’S OBSERVATIONS FROM BEIJING: CHINA’S COUNTERFEITERS AND THEIR COMPLEX ROLE IN CYBERSPACE U.S. CUSTOMS REPORTS THAT MORE

    Add to Reading List

    Source URL: media.digitalcitizensactionalliance.org

    Language: English - Date: 2013-09-16 13:34:03
    576United States federal executive departments / Critical infrastructure protection / U.S. Department of Defense Strategy for Operating in Cyberspace / Under Secretary of Defense for Policy / National security / United States Department of Defense

    United States Government Accountability Office GAO Report to the Ranking Member, Subcommittee on National Security and

    Add to Reading List

    Source URL: www.gao.gov

    Language: English - Date: 2007-07-02 12:42:50
    577Military science / United Nations General Assembly observers / Military / Military of Russia / Department of Defense Strategy for Operating in Cyberspace / Information warfare / Armed Forces of the Russian Federation / Cyberterrorism / Cyberspace / Cyberwarfare / International relations / Computer crimes

    CyCon_2012_book_web_sisu.indd

    Add to Reading List

    Source URL: www.conflictstudies.org.uk

    Language: English - Date: 2012-07-17 05:31:37
    578Email marketing / Engagement marketing / Business / Email / Marketing / Constant Contact

    FOR IMMEDIATE RELEASE Media Contact: Terence Kierans Cyberspace Virtual Services +

    Add to Reading List

    Source URL: www.virtualservices.com.au

    Language: English - Date: 2013-08-26 23:40:13
    579Crime / Electronic warfare / Military technology / Criminology / Military science / Cyber-security regulation / Department of Defense Strategy for Operating in Cyberspace / Computer crimes / Cyberwarfare / Hacking

    Cyber Security WeekApril Showcasing the Strength of Dutch Cyber Security Innovations and Knowledge In the same week as the Global Conference on Cyber Space 2015 and the NCSC One Conference, a unique ‘Cyber Secur

    Add to Reading List

    Source URL: www.westholland.cn

    Language: English - Date: 2015-03-31 09:09:36
    580Distance education / E-learning / Pedagogy / Education / Knowledge / Cognition

    As a direct result of the evolution and interface of technology and Cyberspace, children – at an increasingly younger age – have access to the Internet in the palm of their hands. They communicate and socialize, make

    Add to Reading List

    Source URL: auth.isafe.org

    Language: English - Date: 2015-06-16 14:21:37
    UPDATE