Cyberspace

Results: 2446



#Item
651Human–computer interaction / Virtual world / Virtual art / Second Life / Virtual community / Virtual economy / Avatar / Cyberspace / Robots and Avatars / Virtual reality / Computing / Reality

1 Vol 16 Issue 4 – 5 The Translation of Art in Virtual Worlds By Patrick Lichty

Add to Reading List

Source URL: www.leoalmanac.org

Language: English - Date: 2014-02-11 08:13:46
652Privacy / Internet privacy / Ethics / Computer network security / National Strategy for Trusted Identities in Cyberspace

  JOINT  COMMENTS  OF     THE  ELECTRONIC  PRIVACY  INFORMATION  CENTER   and   THE  LIBERTY  COALITION   to  

Add to Reading List

Source URL: epic.org

Language: English - Date: 2011-07-22 16:23:38
653Cyberspace / Stuxnet / Computer insecurity / Information warfare / Cyberwarfare / War / Military science

Information at all.nethttp://all.net/

Add to Reading List

Source URL: all.net

Language: English - Date: 2013-07-10 14:10:09
654

Incentivising the Reduction of Child Pornography Alana Maurushat Cyberspace Law & Policy Centre Faculty of Law, UNSW

Add to Reading List

Source URL: www.cyberlawcentre.org

- Date: 2009-03-31 21:24:52
    655Federation of Genealogical Societies / Family history society / Board for Certification of Genealogists / Association of Professional Genealogists / The New York Genealogical and Biographical Record / Genealogical Society of Pennsylvania / Genealogical societies / Genealogy / National Genealogical Society

    Jones, Thomas W. Mastering Genealogical Proof. Arlington, Virginia: National Genealogical Society, 2013. Mills, Elizabeth Shown. Evidence Explained: Citing History Sources from Cyberspace to Artifacts. 2d ed. revised. Ba

    Add to Reading List

    Source URL: bcgcertification.org

    Language: English - Date: 2014-09-25 20:53:45
    656Rudeness / Abuse / Bullying / Etiquette

    CRN AUSTRALIA - BULLETIN ARTICLE OCTOBERRUDE RECORD A new blog has emerged in cyberspace with a naughty title but a nice concept. Rude Record is a blog which promotes frugal living, recycling, re-use and repair an

    Add to Reading List

    Source URL: communityrecycling.com.au

    Language: English - Date: 2014-10-14 07:52:11
    657Digital media / WAOE / Virtual world / E-learning / Virtual community / Virtual education / Cyberspace / Internet / Virtual reality / Technology / Education

    Untitled Document VOL 3, NO 3 JULY 2003 Maggie McVay Lynch Editor

    Add to Reading List

    Source URL: waoe.org

    Language: English - Date: 2006-08-01 23:46:39
    658Military technology / War / Military science / UC Institute on Global Conflict and Cooperation / International security / Cyber-security regulation / International relations / Department of Defense Strategy for Operating in Cyberspace / U.S. Department of Defense Strategy for Operating in Cyberspace / Cyberwarfare / Electronic warfare / Hacking

    Jon R. Lindsay University of California Institute on Global Conflict and Cooperation 9500 Gilman Drive, Mail Code 0518, La Jolla, CA — ( — www.jonrlindsay.edu

    Add to Reading List

    Source URL: irps.ucsd.edu

    Language: English - Date: 2015-05-27 20:35:29
    659Privacy / Security / Law / Internet privacy / National Strategy for Trusted Identities in Cyberspace / Information privacy / Biometrics / Ethics / Identity / Identity management

    PROVIDING TRUST AND SECURITY IN A HYPERCONNECTED WORLDYann Le Borgne - Deputy General Secretary, Eurosmart

    Add to Reading List

    Source URL: www.eurosmart.com

    Language: English - Date: 2014-12-11 04:23:51
    660Electronic warfare / Nuclear strategies / Military technology / International security / Cyberwarfare / Deterrence theory / United States Cyber Command / U.S. Department of Defense Strategy for Operating in Cyberspace / Department of Defense Strategy for Operating in Cyberspace / Military science / International relations / Hacking

    Deterring Malicious Behavior in Cyberspace Scott Jasper Abstract Recent incidents reveal cyberattacks are being employed and honed in a systematic, coordinated fashion to achieve the objectives of malicious actors. Deter

    Add to Reading List

    Source URL: www.au.af.mil

    Language: English - Date: 2015-02-19 16:04:11
    UPDATE