Cyberspace

14,000,000 Leading Edge Experts on the ideXlab platform

Scan Science and Technology

Contact Leading Edge Experts & Companies

Scan Science and Technology

Contact Leading Edge Experts & Companies

The Experts below are selected from a list of 40029 Experts worldwide ranked by ideXlab platform

Michal Dolev-cohen - One of the best experts on this subject based on the ideXlab platform.

  • Comparing cyberbullying and school bullying among school students: prevalence, gender, and grade level differences
    Social Psychology of Education, 2015
    Co-Authors: Noam Lapidot-lefler, Michal Dolev-cohen
    Abstract:

    Recent technological developments have added Cyberspace as part of adolescents’ social milieu. Bullying, which is prevalent in adolescents’ social environment, also takes place in Cyberspace, although it is believed to have a more potent and harmful effect. A study of cyberbullying and FtF bullying could elucidate critical implications for children, educators, and policy makers. The present study examined cyberbullying and school bullying among 465 junior-high and high-school students (136 boys and 329 girls) in Israel, through an online survey. Findings revealed that the phenomenon of cyberbullying is less prevalent than school bullying. In the majority of cases in Cyberspace, the identity of the cyber bully was known to the victim and the audience. According to the findings, in Cyberspace, boys tended to bully more often than did girls; no correlation was found between gender and victim or gender and audience. The implications of these findings are discussed in the context of online communication theory.

Seymour E. Goodman - One of the best experts on this subject based on the ideXlab platform.

  • Toward a safer and more secure Cyberspace
    Communications of the ACM, 2007
    Co-Authors: Herbert S. Lin, Alfred Z. Spector, Peter G. Neumann, Seymour E. Goodman
    Abstract:

    Given the growing importance of Cyberspace to nearly all aspects of national life, a secure Cyberspace is vitally important to the nation, but Cyberspace is far from secure today. The United States faces the real risk that adversaries will exploit vulnerabilities in the nation's critical information systems, thereby causing considerable suffering and damage. Online e-commerce business, government agency files, and identity records are all potential security targets."Toward a Safer and More Secure Cyberspace" examines these Internet security vulnerabilities and offers a strategy for future research aimed at countering cyber attacks. It also explores the nature of online threats and some of the reasons why past research for improving cybersecurity has had less impact than anticipated, and considers the human resource base needed to advance the cybersecurity research agenda. This book will be an invaluable resource for Internet security professionals, information technologists, policy makers, data stewards, e-commerce providers, consumer protection advocates, and others interested in digital security and safety.

Alfred C Yen - One of the best experts on this subject based on the ideXlab platform.

  • western frontier or feudal society metaphors and perceptions of Cyberspace
    Social Science Research Network, 2002
    Co-Authors: Alfred C Yen
    Abstract:

    The Article examines how metaphors influence perceptions of Cyberspace. Among other things, the Article studies the comparison of Cyberspace to the American western frontier and the metaphor's construction Cyberspace as a "place" whose natural characteristics guarantee freedom and opportunity. This supports an often-made claim that Cyberspace is different from real space, and that government should generally refrain from regulating the Internet. The Article surveys the basis of the western frontier metaphor in academic history and popular culture and concludes that the metaphor misleads people to overestimate Cyberspace's "natural" ability to guarantee freedom and opportunity. The Article accomplishes this in part by offering feudal society as a metaphor for Cyberspace and showing how prominent features of Cyberspace correspond to key components of feudal society. The Article does not claim that Cyberspace is thoroughly feudal, but it does argue that the feudal society metaphor valuably dislodges the western frontier metaphor and reminds us that law has an important role to play in shaping the future of the Internet.

  • western frontier or feudal society metaphors and perceptions of Cyberspace
    Berkeley Technology Law Journal, 2002
    Co-Authors: Alfred C Yen
    Abstract:

    This Article examines how metaphors influence perceptions of Cyberspace. Among other things, the Article studies the comparison of Cyberspace to the American western frontier and the metaphor's construction of Cyberspace as a "place" whose natural characteristics guarantee freedom and opportunity. This supports an often-made claim that Cyberspace is different from real space, and that government should generally refrain from regulating the Internet. The Article surveys the basis of the Western Frontier metaphor in academic history and popular culture, and concludes that the metaphor misleads people to overestimate Cyberspace's "natural" ability to guarantee freedom and opportunity. The Article accomplishes this, in part, by offering feudal society as a metaphor for Cyberspace and showing how prominent features of Cyberspace correspond to key components of feudal society. The Article does not claim that Cyberspace is thoroughly feudal, but it does argue that the feudal society metaphor valuably dislodges the Western Frontier metaphor and reminds us that law has an important role to play in shaping the future of the Internet.

Noam Lapidot-lefler - One of the best experts on this subject based on the ideXlab platform.

  • Comparing cyberbullying and school bullying among school students: prevalence, gender, and grade level differences
    Social Psychology of Education, 2015
    Co-Authors: Noam Lapidot-lefler, Michal Dolev-cohen
    Abstract:

    Recent technological developments have added Cyberspace as part of adolescents’ social milieu. Bullying, which is prevalent in adolescents’ social environment, also takes place in Cyberspace, although it is believed to have a more potent and harmful effect. A study of cyberbullying and FtF bullying could elucidate critical implications for children, educators, and policy makers. The present study examined cyberbullying and school bullying among 465 junior-high and high-school students (136 boys and 329 girls) in Israel, through an online survey. Findings revealed that the phenomenon of cyberbullying is less prevalent than school bullying. In the majority of cases in Cyberspace, the identity of the cyber bully was known to the victim and the audience. According to the findings, in Cyberspace, boys tended to bully more often than did girls; no correlation was found between gender and victim or gender and audience. The implications of these findings are discussed in the context of online communication theory.

Herbert S. Lin - One of the best experts on this subject based on the ideXlab platform.

  • Toward a safer and more secure Cyberspace
    Communications of the ACM, 2007
    Co-Authors: Herbert S. Lin, Alfred Z. Spector, Peter G. Neumann, Seymour E. Goodman
    Abstract:

    Given the growing importance of Cyberspace to nearly all aspects of national life, a secure Cyberspace is vitally important to the nation, but Cyberspace is far from secure today. The United States faces the real risk that adversaries will exploit vulnerabilities in the nation's critical information systems, thereby causing considerable suffering and damage. Online e-commerce business, government agency files, and identity records are all potential security targets."Toward a Safer and More Secure Cyberspace" examines these Internet security vulnerabilities and offers a strategy for future research aimed at countering cyber attacks. It also explores the nature of online threats and some of the reasons why past research for improving cybersecurity has had less impact than anticipated, and considers the human resource base needed to advance the cybersecurity research agenda. This book will be an invaluable resource for Internet security professionals, information technologists, policy makers, data stewards, e-commerce providers, consumer protection advocates, and others interested in digital security and safety.