Browse Results

Showing 9,901 through 9,925 of 52,944 results

Cyber Physical Systems. Model-Based Design: 8th International Workshop, CyPhy 2018, and 14th International Workshop, WESE 2018, Turin, Italy, October 4–5, 2018, Revised Selected Papers (Lecture Notes in Computer Science #11615)

by Walid Taha Roger Chamberlain Martin Törngren

This book constitutes the proceedings of the 8th International Workshop on Design, Modeling, and Evaluation of Cyber Physical Systems, CyPhy 2018 and 14th International Workshop on Embedded and Cyber-Physical Systems Education, WESE 2018, held in conjunction with ESWeek 2018, in Torino, Italy, in October 2018.The 13 full papers presented together with 1 short paper in this volume were carefully reviewed and selected from 18 submissions. The conference presents a wide range of domains including Modeling, simulation, verification, design, cyber-physical systems, embedded systems, real-time systems, safety, and reliability.

Cyber Recon: My Life in Cyber Espionage and Ransomware Negotiation

by Kurtis Minder

An up close and personal look at cyber espionage and digital spycraft In Cyber Recon: My Life in Cyber Espionage and Ransomware Negotiation, 30-year cybersecurity veteran Kurtis Minder delivers a fascinating exploration of real-world cyber espionage in some of the most dangerous places on the Internet. Through his experiences watching and hunting cybercriminals as varied as lone wolfs, the Russian mafia, and other official and unofficial nation-state hackers, he explains how cyber espionage is performed, the tools and skills that people like him use all the time, and the consequences of engaging with cybercriminals on a daily basis. Kurtis teaches you that the same operational security that keeps him and his team of spies safe will keep you and your organization's secrets safer too. And you'll explore whether fake personas on the internet are always bad or are there legitimate business uses for Romanian speaking sock puppets? You'll also discover critical lessons that Minder has learned as he's led his digital risk company, GroupSense, through many of the most dramatic incidents of online crime of the last few decades. Inside the book: Original profiles of cyber espionage and negotiation professionals so you're learning from Jax Scott, Jon DiMaggio, Jason Ingalls, Beau Woods, Brye Ravattine and many more, with QR-code links to extended YouTube interviews An original, non-technical primer on the people that populate the cyber risk landscape and the methods they use to carry out attacks Steps to avoid becoming a target of Lockbit, BlackMatter, NotPetya, and next year's most dangerous ransomware as well as how to minimize the business damage when you are a victim How the intersection of business negotiation and hostage negotiation relates to high-stakes ransomware negotiations The fast-moving transformation generative AI is unleashing in cyber attacks and defense An inside look at an endlessly interesting corner of the field of cybersecurity, Cyber Recon is also a must-read for anyone interested in spycraft, technology, hacking, or digital entrepreneurship.

Cyber Security Cryptography and Machine Learning: Second International Symposium, CSCML 2018, Beer Sheva, Israel, June 21–22, 2018, Proceedings (Lecture Notes in Computer Science #10879)

by Shlomi Dolev Sachin Lodha Itai Dinur

This book constitutes the refereed proceedings of the Second International Symposium on Cyber Security Cryptography and Machine Learning, CSCML 2018, held in Beer-Sheva, Israel, in June 2018. The 16 full and 6 short papers presented in this volume were carefully reviewed and selected from 44 submissions. They deal with the theory, design, analysis, implementation, or application of cyber security, cryptography and machine learning systems and networks, and conceptually innovative topics in the scope.

Cyber Security Cryptography and Machine Learning: Third International Symposium, CSCML 2019, Beer-Sheva, Israel, June 27–28, 2019, Proceedings (Lecture Notes in Computer Science #11527)

by Moti Yung Shlomi Dolev Sachin Lodha Danny Hendler

This book constitutes the refereed proceedings of the Third International Symposium on Cyber Security Cryptography and Machine Learning, CSCML 2019, held in Beer-Sheva, Israel, in June 2019.The 18 full and 10 short papers presented in this volume were carefully reviewed and selected from 36 submissions. They deal with the theory, design, analysis, implementation, or application of cyber security, cryptography and machine learning systems and networks, and conceptually innovative topics in these research areas.

Cyber Security and Computer Science: Second EAI International Conference, ICONCS 2020, Dhaka, Bangladesh, February 15-16, 2020, Proceedings (Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering #325)

by Touhid Bhuiyan Md. Mostafijur Rahman Md. Asraf Ali

This book constitutes the refereed post-conference proceedings of the Second International Conference on Cyber Security and Computer Science, ICONCS 2020, held in Dhaka, Bangladesh, in February 2020. The 58 full papers were carefully reviewed and selected from 133 submissions. The papers detail new ideas, inventions, and application experiences to cyber security systems. They are organized in topical sections on optimization problems; image steganography and risk analysis on web applications; machine learning in disease diagnosis and monitoring; computer vision and image processing in health care; text and speech processing; machine learning in health care; blockchain applications; computer vision and image processing in health care; malware analysis; computer vision; future technology applications; computer networks; machine learning on imbalanced data; computer security; Bangla language processing.

Cyber Security for Next-Generation Computing Technologies

by Mariya Ouaissa Mariyam Ouaissa Muhammad Fazal Ijaz Inam Ullah Khan Zakaria Abou El Houda

This book sheds light on the cyber security challenges associated with nextgeneration computing technologies, emphasizing the serious threats posed to individuals, businesses, and nations. With everything becoming increasingly interconnected via the Internet, data security becomes paramount. As technology advances, people need to secure their data communication processes. Personal data security, including data integrity and confidentiality, is particularly vulnerable. Therefore, the concept of cyber security forensics emerges to ensure data security for everyone, addressing issues such as data control, hijacking, and threats to personal devices such as mobile phones, laptops, and other smart technologies. This book covers key topics related to cyber security in next-generation computing technologies, ultimately enhancing the quality of life for citizens, facilitating interaction with smart governments, and promoting secure communication processes. KEY FEATURES • Highlights innovative principles and practices using next generation computing technologies based cybersecurity. • Presents an introduction to recent trends regarding the convergence of AI/ML in cybersecurity • Offers an overview of theoretical, practical, simulation concepts of cybersecurity

Cyber Security: Ein Einblick für Wirtschaftswissenschaftler (essentials)

by Sebastian Klipper

In diesem Buch erfahren Wirtschaftswissenschaftler, wie Firmen nach Hackerangriffen vom Markt verschwinden und wie Hacker Aktienkurse beeinflussen können. Lernen Sie, wie Homo oeconomicus beim Thema Cyber Security zum Homo carens securitate wird und wie es gelingt, mithilfe der wirtschaftswissenschaftlichen ,,Brille" (oder: Perspektive/Sicht) ganz neue Lösungsansätze und Sichtweisen im Kampf gegen Wirtschaftsspione, Hacker und Cyber-Kriminelle zu erkennen. Cyber Security bzw. IT-Sicherheit ist ein Zukunftsthema, an dem kaum jemand vorbeikommt. Dieses Buch beschreibt anhand aktueller Vorfälle - ohne technisches Grundwissen vorauszusetzen -, was Ökonomen wissen müssen, um sich am Gespräch über eines der wichtigsten Zukunftsthemen unserer Zeit beteiligen zu können.

Cyber Security: Second International Symposium, CSS 2015, Coeur d'Alene, ID, USA, April 7-8, 2015, Revised Selected Papers (Communications in Computer and Information Science #589)

by Kristin Haltinner Dilshani Sarathchandra Jim Alves-Foss Kevin Chang Daniel Conte de Leon Jia Song

This book constitutes the refereed proceedings of the Second International Symposium on Cyber Security, CSS 2015, held in Coeur d'Alene, ID, USA, in April 2015. The 9 revised full papers presented were carefully reviewed and selected from 20 papers. The papers reflect four areas of scholarly work: permissions and trust evaluation, implementation and management; cloud and device security and privacy; social implications of networked and mobile applications; system and process assessments for improved cybersecurity.

Cyber and Face-to-Face Aggression and Bullying among Children and Adolescents: New Perspectives, Prevention and Intervention in Schools (Routledge Studies in Asian Behavioural Sciences)

by FUNG, Annis Lai Chu

The shift from face-to-face communication since the start of the global pandemic has resulted in more conflicts among children and adolescents on social media, and aggressive and bullying behaviour becoming more severe on online platforms such as Instagram, Facebook, Twitter/X, WhatsApp, and Signal. This book holistically discusses the theoretical foundations underlying face-to-face and cyberaggression and provides practical advice for preventing and intervening in both forms of aggression and bullying among schoolchildren and adolescents across different countries.It offers practical tools to address notable shifts in expressions of aggression from offline to online settings since the COVID-19 outbreak in both Eastern and Western contexts. With nine chapters contributed by experts from the USA, Canada, Spain, United Kingdom, Taiwan, Mainland China, and Hong Kong, the chapters offer cross-cultural insights, new definitions, theoretical frameworks, plus preventative and intervention strategies. The book also covers protective factors and issues related to both cyber and traditional forms of bullying and aggression. The book ends by forecasting future trends regarding online and offline aggression and bullying.The prevention and intervention strategies contained within for reducing both face-to-face and cyber aggression and bullying among children and adolescents provide invaluable insights to frontliners such as educators, teachers, social workers, counsellors, psychologists, parents, and policymakers. It will also appeal to researchers by providing cutting-edge knowledge and conceptualisation of online and traditional aggressive and bullying behaviour.

Cyber-Development, Cyber-Democracy and Cyber-Defense: Challenges, Opportunities and Implications for Theory, Policy and Practice

by Elias G. Carayannis David F. J. Campbell Marios Panagiotis Efthymiopoulos

In this volume, contributors from academia, industry, and policy explore the inter-connections among economic development, socio-political democracy and defense and security in the context of a profound transformation, spurred by globalization and supported by the rapid development of information and communication technologies (ICT). This powerful combination of forces is changing the way we live and redefining the way companies conduct business and national governments pursue strategies of innovation, economic growth and diplomacy. Integrating theoretical frameworks, empirical research and case studies, the editors and contributors have organized the chapters into three major sections, focusing on cyber-development, cyber-democracy and cyber-defense. The authors define cyber-development as a set of tools, methodologies and practices that leverage ICT to catalyze and accelerate social, political and economic development, with an emphasis on making the transition to knowledge-based economies. One underlying understanding here is that knowledge, knowledge creation, knowledge production and knowledge application (innovation) behave as crucial drivers for enhancing democracy, society, and the economy. By promoting dissemination and sharing of knowledge, cyber-democracy allows a knowledge conversion of the local into the global (gloCal) and vice versa, resulting in a gloCal platform for communication and knowledge interaction and knowledge enhancement Meanwhile, technology-enabled interconnectivity increases the need to adopt new methods and actions for protection against existing threats and possible challenges to emerge in the future The final section contemplates themes of cyber-defense and security, as well as emerging theories and values, legal aspects and trans-continental links (NATO, international organizations and bilateral relations between states) Collectively, the authors present a unique collection of insights and perspectives on the challenges and opportunities inspired by connectivity.

Cyber-Enabled Intelligence

by Liming Chen Huansheng Ning Ata Ullah Xiong Luo

The book provides an advanced vision and trends of computational intelligence in cyberspace and cyber-enabled spaces. It reviews architectures and models, as well as state-of-the-art computational and interpretation capabilities for social, industrial, and multimedia applications. Cyber-enabled intelligence involves the design and development of intelligent and innovative application scenarios in social networks, computer vision, multimedia, and image processing. Application scenarios can also cover the applicability of intelligent sensing, data collection and predictive analysis in Internet of Things.

CyberGenetics: Health genetics and new media (Genetics and Society)

by Susan Kelly Anna Harris Sally Wyatt

Online genetic testing services are increasingly being offered to consumers who are becoming exposed to, and knowledgeable about, new kinds of genetic technologies, as the launch of a 23andme genetic testing product in the UK testifies. Genetic research breakthroughs, cheek swabbing forensic pathologists and celebrities discovering their ancestral roots are littered throughout the North American, European and Australasian media landscapes. Genetic testing is now capturing the attention, and imagination, of hundreds of thousands of people who can not only buy genetic tests online, but can also go online to find relatives, share their results with strangers, sign up for personal DNA-based musical scores, and take part in research. This book critically examines this market of direct-to-consumer (DTC) genetic testing from a social science perspective, asking, what happens when genetics goes online?With a focus on genetic testing for disease, the book is about the new social arrangements which emerge when a traditionally clinical practice (genetic testing) is taken into new spaces (the internet). It examines the intersections of new genetics and new media by drawing from three different fields: internet studies; the sociology of health; and science and technology studies. While there has been a surge of research activity concerning DTC genetic testing, particularly in sociology, ethics and law, this is the first scholarly monograph on the topic, and the first book which brings together the social study of genetics and the social study of digital technologies. This book thus not only offers a new overview of this field, but also offers a unique contribution by attending to the digital, and by drawing upon empirical examples from our own research of DTC genetic testing websites (using online methods) and in-depth interviews in the United Kingdom with people using healthcare services.

Cyberbullying

by Juan Moises de la Serna Beatriz Sosa Rebelo

O cyberbullying é uma nova modalidade de assédio que qualquer pessoa pode vir a sofrer, mas a situação é especialmente preocupante quando se trata de menores. Neste breve manual são respondidas as perguntas mais importantes sobre este tema que todo pai com filhos em idade escolar deve ter em mente: O que é o Cyberbullying? Quais os efeitos do Cyberbullying? Pode se prevenir o Cyberbullying? e principalmente, O que fazer se nosso filho for vítima do Cyberbullying? Descubra todos os segredos sobre o Cyberbullying com os resultados das últimas pesquisas realizadas no âmbito da psicologia sobre o assunto.

Cyberbullying

by Juan Moises de la Serna Conchi Fuentes

Cyberbullying is a modern form of harassment that anyone can suffer, but the situation is especially worrying when dealing with minors.This short guide presents answers to some of the most important questions on this subject that any parent with children of school age should bear in mind, such as: What is cyberbullying? How does cyberbullying affect people? Can cyberbullying be prevented? And, above all, what to do if your child is suffering from cyberbullying? Discover all the facts about cyberbullying, based on results from the latest research in the field of psychology on this matter.

Cyberbullying and Online Harms: Preventions and Interventions from Community to Campus

by Helen Cowie Carrie-Anne Myers

Cyberbullying and Online Harms identifies online harms and their impact on young people, from communities to campuses, exploring current and future interventions to reduce and prevent online harassment and aggression. This important resource brings together eminent international researchers whose work shines a light on social issues such as bullying/cyberbullying, racism, homophobia, hate crime, and social exclusion. The text collates into one volume current knowledge and evidence of cyberbullying and its effect on young people, facilitating action to protect victims, challenge perpetrators and develop policies and practices to change cultures that are discriminatory and divisive. It also provides a space where those who have suffered online harms and who have often been silenced in the past may have a voice in telling their experiences and recounting interventions and policies that helped them to create safer spaces in which to live in their community, study in their educational institutions and socialise with their peer group. This is essential reading for researchers, academics, undergraduates and postgraduates in sociology, psychology, criminology, media and communication studies, as well as practitioners and policymakers in psychology, education, sociology, criminology, psychiatry, counselling and psychotherapy, and anyone concerned with the issue of bullying, cyberbullying and online harms among young people in higher education.

Cyberbullying and Values Education: Implications for Family and School Education (Routledge Series on Life and Values Education)

by John Chi-Kin Lee Angel Nga Man Leung Kevin Ka Shing Chan Catalina Sau Man Ng

Written by scholars from both the Western and Chinese contexts, this monograph discusses the relation between cyberbullying and socio-emotional-moral competencies, feasible interventions by integrating values education, and provides future directions in the field of cyberpsychology. Cyberbullying has become a growing concern in the digital age as it brings devastating impacts on its victims. Educating the younger generation, particularly through values education, also known as character, moral, or social-emotional learning, helps equip children and adolescents with the necessary ethical and moral attitudes, and foster the necessary socio-emotional competencies for them to navigate the digital world as responsible cyber-citizens. A central focus of the book is intervention and education. Cultivating competences and responsible use of technology in the younger generation through values education and evidence-based intervention helps combat cyberbullying. Families, schools, and communities can work together with suitable school programs, teacher education, and parents/school collaboration to help students cope with cyberbullying and create safer online spaces for them. Technology itself is not inherently good or bad but shaped by human choices and values. Supported by empirical evidence and theoretical insights, this book suggests ways to promote moral and emotional skills, foster digital citizenship, and encourage ethical technology design. This book provides a comprehensive understanding of cyberbullying. This timely resource will contribute to creating a safer and more positive online environment for all. It will inform researchers, educators, parents, and the community in combating cyberbullying by enabling children and adolescents to be responsible, ethical, and happy netizens.

Cyberbullying at University in International Contexts

by Margaret Jackson Wanda Cassidy Chantal Faucher

Cyberbullying is a problem that is being increasingly investigated by researchers, however, much of the cyberbullying research literature to date has focused on children and youth. Cyberbullying at University in International Contexts fills the gap in the research literature by examining the nature, extent, impacts, proposed solutions, and policy and practice considerations of bullying in the cyber-world at post-secondary institutions, where reports of serious cyberbullying incidents have become more prevalent. This book brings together cutting-edge research from around the world to examine the issue of cyberbullying through a multi-disciplinary lens, offering an array of approaches, interpretations, and solutions. It is not solely focused on cyberbullying by and against students, but also includes cyberbullying by and against faculty members, and permutations involving both students and faculty, as well as institutional staff, presenting perspectives from students, practitioners and senior university policy makers. It draws on research from education, criminology, psychology, sociology, communications, law, health sciences, social work, humanities, labour studies and is valuable reading for graduate students in these fields. It is also essential reading for policymakers, practitioners and University administrators who recognize their responsibility to provide a healthy workplace for their staff, as well as a safe and respectful environment for their students.

Cyberbullying in Schools, Workplaces, and Romantic Relationships: The Many Lenses and Perspectives of Electronic Mistreatment

by Robin M. Kowalski Gary W. Giumetti

This volume brings together research on cyberbullying across contexts, age groups, and cultures to gain a fuller perspective of the prevalence and impact of electronic mistreatment on individual, group, and organizational outcomes. This is the first book to integrate research on cyberbullying across three contexts: schools, workplaces, and romantic relationships, providing a unique synthesis of lifespan contexts.For each context, the expert chapter authors bring together three different 'lenses': existing research on the predictors and outcomes of cyberbullying within that context; a cross-cultural review across national borders and cultural boundaries; and a developmental perspective that examines age-related differences in cyberbullying within that context. The book closes by drawing commonalities across these different contexts leading to a richer understanding of cyberbullying as a whole and some possible avenues for future research and practice.This is fascinating reading for researchers and upper-level students in social psychology, counseling, school psychology, industrial-organizational psychology, and developmental psychology, as well as educators and administrators.

Cyberbullying through the New Media: Findings from an international network

by Peter K. Smith Georges Steffgen

Cyberbullying is one of the darker and more troubling aspects to the growing accessibility of new media technologies. Children in developed countries engage with cyberspace at younger and younger ages, and the use of the internet as a means to bully and harass has been greeted with alarm by educationalists, parents, the media, and governments. This important new book is the result of a four-year international collaboration, funded by the EU, to better understand how we can cope and confront cyberbullying, and how new media technologies can be used to actually support the victims of such abuse. The articles initially define the historical and theoretical context to cyberbullying, before examining key issues involved in managing this pervasive phenomenon. Coverage includes: The definition and measurement of cyberbullying. The legal challenges in tackling cyberbullying across a number of international contexts. The role of mobile phone companies and Internet service providers in monitoring and prevention How the media frame and present the issue, and how that influences our understanding. How victims can cope with the effects of cyberbullying, and the guidelines and advice provided in different countries. How cyber-bullying can continue from school into further education, and the strategies that can be used to prevent it. The ways in which accessing 'youth voice', or maximising the contribution of young people themselves to the research process, can enhance our understanding The book concludes with practical guidance to help confront the trauma that cyberbullying can cause. It will be a valuable resource for researchers, students, policy makers and administrators with an interest in how children and young people are rendered vulnerable to bullying and harassment through a variety of online channels.

Cyberbullying: From Theory to Intervention (Bullying And Victimization Ser.)

by Trijntje Völlink Francine Dehue Conor Guckin

The study of cyberbullying has exploded since its first appearance in a peer-reviewed journal article in 2005. Cyberbullying: From theory to intervention aims to make clear and practical sense of this proliferation of coverage by defining the problem of cyberbullying and examining its unique features. The volume provides a thorough overview of state-of-the-art research into the phenomenon, and discusses the development and evaluation of interventions to prevent and combat it. Whereas most research papers offer limited space to describe actual intervention methods, this book provides tremendous insight into the different theoretical methods and practical strategies available to combat cyberbullying. Part One provides readers with a critical review of the existing research literature and collects insights from international researchers involved in bullying and cyberbullying research, tackling key questions such as: how is cyberbullying defined, what is the overlap with traditional bullying, and what are the negative consequences of cyberbullying? Part Two gives an overview of the development and content of evidence-based ICT interventions aimed at preventing and combating bullying and cyberbullying. In addition, some of the important outcomes of the effect evaluations will be described. The book's final chapter integrates the information from Part One with advice regarding practical applications from Part Two. Cyberbullying: From theory to intervention is essential reading for academics and researchers concerned with both cyberbullying and traditional bullying. It can be used in graduate seminars or advanced undergraduate courses in cyberbullying and will also be of interest to teachers, field experts and organisations involved and disseminating cyberbullying solutions.

Cybercrime and Digital Deviance

by Roderick S. Graham 'Shawn K. Smith

Cybercrime and Digital Deviance, Second Edition, combines insights from sociology, criminology, psychology, and cybersecurity to explore cybercrimes such as hacking, identity theft, and romance scams, along with forms of digital deviance such as pornography addiction, trolling, and “canceling” people for perceived violations of norms.Other issues are explored including cybercrime investigations, nation-state cybercrime, the use of algorithms in policing, cybervictimization, and expanded discussion of the theories used to explain cybercrime. Graham and Smith conceptualize the online space as a distinct environment for social interaction, framing their work with assumptions informed by their respective work in urban sociology and spatial criminology, and offering an engaging entry point for understanding what may appear to be a technologically complex course of study. The authors apply a modified version of a typology developed by David Wall: cybertrespass, cyberfraud, cyberviolence, and cyberpornography. This typology is simple enough for students just beginning their inquiry into cybercrime, while its use of legal categories of trespassing, fraud, violent crimes against persons, and moral transgressions provides a solid foundation for deeper study. In this edition each chapter includes a new “Current Events and Critical Thinking” section, using concepts from the chapter to explore a specific event or topic like the effect of disinformation on social cohesion and politics.Taken together, Graham and Smith’s application of a digital environment and Wall’s cybercrime typology makes this an ideal upper-level text for students in sociology and criminal justice. It is also an ideal introductory text for students within the emerging disciplines of cybercrime and cybersecurity.

Cybercrime and Digital Deviance

by Roderick Graham 'Shawn Smith

Cybercrime and Digital Deviance is a work that combines insights from sociology, criminology, and computer science to explore cybercrimes such as hacking and romance scams, along with forms of cyberdeviance such as pornography addiction, trolling, and flaming. Other issues are explored including cybercrime investigations, organized cybercrime, the use of algorithms in policing, cybervictimization, and the theories used to explain cybercrime. Graham and Smith make a conceptual distinction between a terrestrial, physical environment and a single digital environment produced through networked computers. Conceptualizing the online space as a distinct environment for social interaction links this text with assumptions made in the fields of urban sociology or rural criminology. Students in sociology and criminology will have a familiar entry point for understanding what may appear to be a technologically complex course of study. The authors organize all forms of cybercrime and cyberdeviance by applying a typology developed by David Wall: cybertrespass, cyberdeception, cyberviolence, and cyberpornography. This typology is simple enough for students just beginning their inquiry into cybercrime. Because it is based on legal categories of trespassing, fraud, violent crimes against persons, and moral transgressions it provides a solid foundation for deeper study. Taken together, Graham and Smith’s application of a digital environment and Wall’s cybercrime typology makes this an ideal upper level text for students in sociology and criminal justice. It is also an ideal introductory text for students within the emerging disciplines of cybercrime and cybersecurity.

Cyberdipendenza

by Juan Moisés de la Serna Sara Caceffo

La tecnologia è ogni giorno più presente nelle nostre vite. Questo comporta un evidente progresso, ma anche un pericolo, specialmente fra i più giovani, che possono cadere nella cosiddetta cyberdipendenza . Questa si è convertita in una realtà del giorno d'oggi, un problema di salute che non esisteva affatto appena una decina di anni fa, e che ogni giorno provoca nuove vittime, sempre più giovani. Sebbene le conseguenze a lungo termine siano ancora sconosciute, alcuni studi rivelano che il fenomeno riguarda un 30% dei giovani che usano Internet quotidianamente, presupponendo così che un giovane su tre sia a rischio di sviluppare una dipendenza di tipo comportamentale. Nonostante alcuni paesi stiano iniziando ad adottare misure per prevenire il problema, altri ancora non percepiscono la gravità della situazione, di qui segue la necessità di divulgare i risultati delle ultime indagini in tema e dare visibilità a un problema sociale che richiede misure tanto preventive quanto terapeutiche.

Cyberkids: Youth Identities and Communities in an On-line World

by Gill Valentine Sarah Holloway

As Tony Blair has said, "Technology has revolutionised the way we work and is now set to transform education. Children cannot be effective in tomorrow's world if they are trained in yesterday's skills."Cyberkids draws together research in the sociology of childhood and social studies of technology to explore children's experiences in the Information Age. The book addresses key policy debates about social inclusion and exclusion, children's identities and friendships in on-line and off-line worlds and their relationships with families and teachers. It counters contemporary moral panics about children's risk from dangerous strangers on-line, about corruption and lost innocence from adult-centred material on the web and about the addiction to life on the screen. Instead, by showing how children use ICT in balanced and sophisticated ways, the book draws out the importance of everyday uses of technology and the ways in which children's local experiences are embedded within, and in part, constitute the global.

Cyberlibertarianism: The Right-Wing Politics of Digital Technology

by David Golumbia

An urgent reckoning with digital technology&’s fundamentally right-wing legal and economic underpinnings In a timely challenge to the potent political role of digital technology, Cyberlibertarianism argues that right-wing ideology was built into both the technical and social construction of the digital world from the start. Leveraging more than a decade of research, David Golumbia traces how digital evangelism has driven the worldwide shift toward the political right, concealing inequality, xenophobia, dishonesty, and massive corporate concentrations of wealth and power beneath the utopian presumption of digital technology as an inherent social good. Providing an incisive critique of the push for open access and open-source software and the legal battles over online censorship and net neutrality, Cyberlibertarianism details how the purportedly democratic internet has been employed as an organizing tool for terror and hate groups and political disinformation campaigns. As he unpacks our naively utopian conception of the digital world, Golumbia highlights technology&’s role in the advancement of hyperindividualist and antigovernment agendas, demonstrating how Silicon Valley corporations and right-wing economists; antiestablishment figures such as Julian Assange, Elon Musk, Peter Thiel, Edward Snowden, and Mark Zuckerberg; and seemingly positive voices such as John Perry Barlow, Cory Doctorow, the Electronic Freedom Foundation, and Wikipedia all have worked to hamper regulation and weaken legal safeguards against exploitation. Drawing from a wide range of thought in digital theory, economics, law, and political philosophy as well as detailed research and Golumbia&’s own experience as a software developer, Cyberlibertarianism serves as a clarion call to reevaluate the fraught politics of the internet. In the hope of providing a way of working toward a more genuinely democratic and egalitarian future for digital technology, this magisterial work insists that we must first understand the veiled dogmas from which it has been constructed. Retail e-book files for this title are screen-reader friendly.

Refine Search

Showing 9,901 through 9,925 of 52,944 results