Cyberspace

Results: 2446



#Item
921Cyberspace / Information Age / Virtual reality / William Gibson / Sense of place / David Harvey / Prostitution / Human geography / Cultural geography / Geography / Landscape architecture

cultural geographies[removed]: 479–492 book reviews Who am I? An autobiography of emotion, mind and spirit. By Y.-F. Tuan. Madison, WI: University of Wisconsin Press[removed]pp. US$21.95 cloth. ISBN[removed]Th

Add to Reading List

Source URL: www.mappingcyberspace.com

Language: English - Date: 2004-05-12 08:48:53
922Virtual communities / World Wide Web / Web 2.0 / Cyberspace Law and Policy Centre / UNSW Faculty of Law / Legal aspects of computing / Law school / Law / User-generated content / University of New South Wales / Social information processing / Computing

GENL0230 Law in the Information Age, and GENL0231 Law in the Information Age 2.0* Summer 2010 Statement of objectives and assessment *NB: These courses are offered concurrently this session. GENL 0230 is an existing 3 un

Add to Reading List

Source URL: www.bakercyberlawcentre.org

Language: English - Date: 2011-10-14 12:57:43
923Law / Computing / Legal aspects of computing / Jonathan Zittrain / Law of the Horse / Lawrence Lessig / Internaut / Internet-related prefixes / Computer law / Cyberspace / Internet

FINALHLS.DOC[removed] – 10:19 AM COMMENTARIES THE LAW OF THE HORSE:

Add to Reading List

Source URL: cyber.law.harvard.edu

Language: English - Date: 1999-12-03 13:28:42
924Criminal law / Computer law / International Cybercrime / Convention on Cybercrime / Crimes Act / Computer crime / Legal aspects of computing / Theft / Cyberstalking / Computer crimes / Law / Crimes

06 - Cyberspace Law materials - Crime Page[removed]Cyberspace Law materials - Crime

Add to Reading List

Source URL: www.bakercyberlawcentre.org

Language: English - Date: 2013-12-09 02:25:53
925Computer network security / National Strategy for Trusted Identities in Cyberspace / Security / Social change / Standards organizations / Identity / Internet privacy / National Institute of Standards and Technology / Privacy / Identity management / Social issues / Ethics

March 26, 2015 ANNOUNCEMENT OF FEDERAL FUNDING OPPORTUNITY (FFO) National Strategy for Trusted Identities in Cyberspace (NSTIC) Privacy Pilots Cooperative Agreement Program EXECUTIVE SUMMARY •

Add to Reading List

Source URL: www.nist.gov

Language: English - Date: 2015-03-26 14:25:39
926Cyberwarfare / Computing / Multi-agent systems / Spamming / Denial-of-service attack / Botnet / Internet / Cyberspace / Computer network security / Denial-of-service attacks / Prolexic Technologies

PDF Document

Add to Reading List

Source URL: www.prolexic.com

Language: English - Date: 2014-03-20 17:26:52
927International nongovernmental organizations / Professional associations / Standards organizations / Cyberspace Law and Policy Centre / Institute of Electrical and Electronics Engineers / Legal aspects of computing / Deep packet inspection / Network neutrality / Internet / Computer law / University of New South Wales / Computing

IEEE Society on Social Implications of Technology presents Faculty of Law Cyberspace Law and Policy Centre ISP-LEVEL INTERNET FILTERING : THE PATH TO DEEP PACKET INSPECTION ?

Add to Reading List

Source URL: cyberlawcentre.org

Language: English - Date: 2010-09-02 02:52:42
928Open educational resources / WikiEducator / Association of Commonwealth Universities / Commonwealth of Learning / National Institute of Open Schooling / Blended learning / Universitas Terbuka / E-learning / Open University / Education / Distance education / Open content

Open Educational Resources: Conversations in Cyberspace

Add to Reading List

Source URL: www.col.org

Language: English - Date: 2009-10-21 17:19:12
929Medicine / Mental health / Adolescence / Aggression / Self-harm / Youth / Online community / Borderline personality disorder / Eating disorder / Abnormal psychology / Psychiatry / Mind

Microsoft Word - SI Cyberspace Diss.doc

Add to Reading List

Source URL: www.selfinjury.bctr.cornell.edu

Language: English - Date: 2014-03-12 10:13:11
930Electronic warfare / Hacking / Military technology / Cyber-security regulation / Computer security / Military science / International Multilateral Partnership Against Cyber Threats / Department of Defense Strategy for Operating in Cyberspace / U.S. Department of Defense Strategy for Operating in Cyberspace / Computer crimes / Cyberwarfare / Security

CYBERSECURITY September 2012  Cybersecurity has increasingly become an area of concern for policymakers. Government agencies and American businesses, including critical infrastructure, are

Add to Reading List

Source URL: cdn.ccianet.org

Language: English - Date: 2014-09-06 05:31:42
UPDATE